New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 983
Comments: 19
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image at: Patriot Act: Virus Writers Probed for Terror Ties Cyber Cop image
Anti-Terror
Virus Writers Probed for Terror Ties Cyber Cop
By Bernhard Warner,
European Internet Correspondent

LONDON (Reuters) - Britain's task force against high-tech crime is investigating links between virus writers and extremist groups as it prepares defenses for a possible attack, a top law enforcement officer told Reuters.

The National Hi-Tech Crime Unit (NHTCU) has started working with anti-virus firms to identify patterns in the source code of the most damaging Internet worms and virus programs to determine whether they are the work of organized subversive groups or crime syndicates.

The hope is that buried somewhere in the lines of code will be clues to the author's identity, motive and possibly, future acts of sabotage.

Of the dozens of viruses and worms that emerge on the Internet each week, none has been traced back to organized crime or subversives aiming to disrupt a country's infrastructure.

But as increasingly sophisticated programs surface, some capable of knocking vast computer networks offline, law enforcement officials are preparing themselves for this type of cyber warfare.

It's a tactic that could be utilized. We've seen legitimate programs used in a way which allows people to have remote access to compromised systems. And similarly, viruses, Trojans and worms can be used by organized crime to launch attacks, said Detective Chief Superintendent Len Hynds, head of the NHTCU.

The challenge for law enforcement is in catching the suspects. Police have tracked down an increasing number of virus writers lately, but creators of the most damaging outbreaks remain at large and, some security officials say, may never be caught.

SUMMER OUTBREAKS OFFER GLIMPSE

Some increasingly potent viruses and worms, including this summer's Sobig.F virus and Blaster worm, wreaked havoc on corporate and government computer systems around the world.

Sobig.F carried a type of Trojan program, so named because it embeds itself on an infected machine and gives the virus writer the capability of controlling the computer from a remote location.

A mounting concern among security officials everywhere is that such a program could bore into a computer network and compromise, say, a police emergency response phone system or air traffic control system.

A digital attack in isolation would inflict relatively little damage, experts say. But should the incident be timed to coincide with a physical act of sabotage -- in what security experts refer to as a blended threat -- the toll could be high.

With security forces on high alert in the wake of the Sept. 11, 2001 attacks in the United States, response plans to all potential acts of sabotage -- digital or physical -- are being reviewed.

Hynds said the NHTCU has trained officers to work with the UK's National Infrastructure Security Coordination Center, the government body charged with protecting critical infrastructure, in honing a response.

Hynds declined to comment on the likelihood of a computer-generated attack on the country's infrastructure, but added: we train for them.
Reuters
Posted on Saturday, 11 October 2003 @ 05:20:00 EDT by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· HotScripts
· W3 Consortium
· More about Anti-Terror
· News by phoenix22


Most read story about Anti-Terror:
IncrediMail: The war of the coder.

image
Article Rating
Average Score: 4
Votes: 1


Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register