* via http://theMezz.com/lists * subscribe at http://techPolice.com
U.S. tries to protect self on crucial front MIKE TONER Copyright 2001 The Atlanta Constitution The Atlanta Journal and Constitution National Guardsmen patrol the airport. Corporations screen their mail for suspicious packages. But as America tightens its defenses against chemical, biological and nuclear terrorism, there is mounting concern over one realm where national borders are still poorly defended: cyberspace. As the unseen information "infrastructure" binds the country ever more tightly in its web of bits and bytes, experts fear that it presents an inviting, and all too vulnerable, target for terrorists and other criminals. The Sept. 11 terrorists clearly had a working familiarity with computers, encrypted messages and the Internet. Mohamed Atta and other hijackers used laptop computers and Internet cafes for e-mail messages. Based on what is currently known, however, cyberspace was for them more a tool of terror than a target. But experts say that just as those terrorists turned the nation's transportation system into an unexpected weapon of terror, the information highway could be both the means, and the objective, of future terrorist operations. "Information technology pervades all aspects of our daily lives," says Tom Ridge, the Bush administration's director of homeland security. "Disrupt it, destroy it or shut it down, and you shut down America as we know it." The world is now so heavily dependent on the "connectivity" of the Internet and other networks that any major disruptions can have far-reaching consequences. More than 109 million computer systems are currently linked to the Internet. As the number grows daily, so do the speed and destructive capabilities of computer viruses and worms. In 1999, the Melissa virus, initially launched by a New Jersey hacker from an X-rated Web site and spread around the world by e-mail, did an estimated $80 million in damage to corporate and government computer systems. A year later, the "I Love You" virus, which propagated in the Philippines, cost an estimated $10 billion in lost work time. On Sept. 18, just seven days after the terrorist attacks, a new virus named Nimda virus (admin spelled backward) provided a new and more dramatic reminder of the vulnerabilities of the interconnected Net. "Within an hour of the time it was first reported, numerous organizations were telling us that they were paralyzed by the worm," says Richard Pethia, director of the Computer Emergency Response Team at Carnegie Mellon University, a federally funded clearinghouse for computer security information. "By the end of the day, more than 100,000 computers had been affected." Although all systems recovered, the specter of so many systems being brought to their knees so quickly, at such a critical time, underscored the dangers. A new analysis by Symantec, which makes anti-virus software, last week warned that the next generation of Nimda-like viruses and worms might be even more devastating --- capable of using "mass-mailing" techniques that could infect every PC connected to the Internet within 20 minutes. To improve the security of cyberspace, the Bush administration earlier this month appointed Richard Clarke, once the national counterterrorism coordinator in the Clinton White House, to be the president's special adviser for cyberspace security. Clarke's task will be to prepare for what he calls "the war next time" by coordinating government and industry efforts on electronic security. "America has built cyberspace, and America must now defend its cyberspace," he warned. His first action was to call for construction of a secure government voice and data network, called Govnet, to be used for critical government functions. If approved, the alternative to the Internet, which would be completely isolated from the commercial or private networks, would likely take years to build and cost billions of dollars. Some experts dismiss the threat of cyberterrorism as a low-grade threat perpetrated by misguided hackers and electronic "ankle biters." Others see it as an "electronic Pearl Harbor" waiting to happen. But while many Americans might think of hacking, computer worms and fast-spreading viruses as a disruptive nuisance, in recent years, cyberattacks have begun to mirror the political tensions in the physical world. During this year's dispute between the United States and China over the EP-3 spy plane, U.S. Internet sites were swamped by a wave of coordinated computer network intrusions that included the defacement of more than 1,200 Web sites. The sites included the White House, the U.S. Air Force and the Energy Department. Michael Vatis, director of the Institute for Security Technology Studies at Dartmouth College, a government-funded research center that focuses on counterterrorism and computer security, says the "massive and sustained weeklong campaign of cyberattacks" was organized by hacker groups that included the Honker Union of China and the Chinese Red Guest Network Technology. "In light of the fact that these activities were highly visible and no arrests were made by Chinese officials, it can be assumed that they were at least tolerated, if not directly supported by Chinese authorities," Vatis says. "What we saw coming out of China was a massive amount of hacking --- coordinated attacks that amounted to nothing less than low-grade information warfare," says Chris Ruland, the director of Atlanta-based Internet Security Systems X-Force, a team of elite computer security specialists who try to keep the company's 8,000 corporate customers one step ahead of cybercriminals. ISS saw a spike in computer attacks on Sept. 11 that prompted the issuance of an "Alert-Con 3" warning to its customers that reflects increasing hacker attacks at what the company calls "unusually high levels" --- just one stage short of "a catastrophic problem" requiring "immediate, decisive action" by system operators. "The past six months have witnessed a clear escalation in the number of politically motivated cyberattacks, often embroiling hackers from around the world in regional disputes," Vatis says. "Although initially relatively benign, recent attacks have increasingly targeted vital communications and infrastructure systems." The first cyberattacks linked to the Sept. 11 attacks were actually aimed by pro-American hacker vigilantes against targets they believed were linked to terrorists. In October, members of a hacker group calling itself Yihat, for Young Intelligent Hackers Against Terrorism, claimed to have penetrated the network of the Arab National Bank in Saudi Arabia, downloaded the account records of a few customers and promised to turn them over to the FBI. The bank has tightened its security. Retaliation was swift. A Pakistani hacker group calling itself G-Force defaced two U.S. government Web sites --- leaving the equivalent of electronic graffiti --- and promised to attack hundreds more to protest the U.S. military raids in Afghanistan. Other cyberattacks have been more serious. Pakistani hacker groups have repeatedly penetrated computer systems operated by the Indian Parliament, the Indian Institute of Science, and the Bhabha Atomic Research Center, where they downloaded possibly sensitive research information. Indian hackers regularly sabotage Pakistani sites as well. During NATO's bombing campaign in Yugoslavia in 1999, Serbian hackers --- now believed to have been employed by the Yugoslav military --- mounted sustained cyberattacks on NATO servers that periodically brought them to a standstill. And in the Middle East, as tensions between Israelis and Palestinians have escalated in the streets, the tempo of attacks has also increased in cyberspace. Israeli hackers have mounted sustained "denial of service" assaults --- shutting down Web sites by overloading them --- against the Palestinian Authority and the pro-Palestinian groups Hezbollah and Hamas, and released destructive computer worms and electronic Trojan horses against other Palestinian sites. Palestinians have countered with a "cyberjihad" that temporarily shut down sites belonging to the Israeli Parliament, the Israeli Defense Forces, the Foreign Ministry and the Tel Aviv Stock Exchange. One group, operating under the name Unity, has outlined a four-phase strategy of escalation, which would eventually conclude with cyberattacks on communications systems and foreign targets. In recent months, law enforcement authorities have been increasingly proactive in trying to head off more trouble in cyberspace. Five days before the Sept. 11 attacks, 80 FBI and other federal agents raided the offices of InfoCom Inc., a Richardson, Texas, company that provided Internet service to 500 clients, many of them in the Middle East. The FBI shut down company Internet services and froze some of its bank accounts. So far, authorities have not disclosed any motives for the raid, but InfoCom's attorney, Arch McColl, says the company is a merely a group of Palestinian "computer nerds" who are victims of guilt by association. In early October, police from Scotland Yard shut down a "Jihad" Web operated by a London chef, 43-year-old Sulayman Balal Zainulabidin, who was charged under the British Terrorism Act with "providing training or instruction in the making of firearms, explosives or chemical, biological or nuclear weapons." In the long run, new tactics may be needed to defend electronic frontiers. One proposal from Sen. Ron Wyden (D-Ore.) calls for a pool of experts that would be on call to respond to any emergency. "What this country needs is essentially a technology equivalent of the National Guard," Wyden says, a "National Emergency Technology Guard that in times of crisis would be in a position to mobilize our nation's information technology community to action." Others call for even more sweeping measures. What is needed today is essentially a "Manhattan Project" for counterterrorism technology, says Vatis. "A significant portion of that effort should focus on technology to secure the information infrastructure that provides the foundation for much of our economy and national security." ============================================================ Upgrade your server! Get VeriSign's FREE guide, "Securing Your Web Site for Business" for everything you need to know about using 128-bit SSL to encrypt your e-commerce transactions online security. Click here! http://click.topica.com/caaadV7b1dhr0b2EDp2f/VeriSign ============================================================ --via http://techPolice.com archive: http://theMezz.com/cybercrime/archive subscribe: [EMAIL PROTECTED] --via http://theMezz.com ==^================================================================ EASY UNSUBSCRIBE click here: http://topica.com/u/?b1dhr0.b2EDp2 Or send an email To: [EMAIL PROTECTED] This email was sent to: archive@jab.org T O P I C A -- Register now to manage your mail! http://www.topica.com/partner/tag02/register ==^================================================================