New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 981
Comments: 19
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image at: Security HeadLines: Intelligence Experts Comb Web for Terror Clues image
Anti-Terror
Intelligence Experts Comb Web for Terror Clues
By Bernhard Warner,
European Internet Correspondent

LONDON (Reuters) - Cyber investigators are scouring the World Wide Web for clues on any future suicide bomb attacks, deploying satellites and other high-tech wizardry to hone in on suspicious Web surfing activity.

Intelligence officials had warned some kind of attack would occur in Saudi Arabia before Sunday's suicide bomb blast in Riyadh after finding evidence on anonymous postings on Arabic Web sites and other forms of Internet chatter. The strike killed at least 18 people and wounded 120 others.

The Internet is a very useful open source for investigators. But as with any unattributable piece of information, tips must be corroborated and verified, and only then can they be added to the overall intelligence mix, a British cyber investigator told Reuters.

Intelligence experts say they have evidence extremist groups are using the Web and e-mail for a variety of purposes ranging from recruitment and fund-raising to spreading propaganda and scouting out potential targets.

Investigators probing the Saudi blast will be combing the Web for disguised, or encrypted, e-mails and statements on Internet discussion forums that drum up anti-Western sentiments, the intelligence experts said.

But they also said it is rare to find information which might point to a specific target.

There is also scant evidence subversive groups are using the Net to launch digital attacks on a country's critical national infrastructure, computer networks that control everything from police emergency response hotlines to power grids.

GROWING ROLE OF WEB

But all signs point to the ever growing role the Web is playing in spy games.

The Echelon satellite system used for eavesdropping on mobile phones has a Net cousin -- Internet monitoring software capable of siphoning up vast bits of Web traffic that, in theory, can trace suspect Web activity.

In the United States, the technology is referred to as the DCS-1000, or Carnivore. A host of Western countries are believed to be deploying similar technology, said Ira Winkler, former intelligence and computer system analyst with the U.S. government agency, the National Security Agency.

Meanwhile, intelligence watchers point out that intelligence agencies are deploying the classic spy tactic of setting up so-called honey pots with a high-tech twist -- in this case, setting up a bogus Web site to attract the very people they are trying to monitor.

And their targets are engaging in a similar spin war.

If terrorists think they are being monitored, they could release chatter just to screw with people's minds. Creating fear and uncertainty is what they do, said Winkler, who is now chief security strategist for PC maker Hewlett-Packard .

Investigators and security experts are quick to point out that despite the influx of high-tech gadgets, the art of intelligence gathering has not changed, and is certainly no more precise.

X almost never marks the spot in intelligence gathering, said Richard Starnes, director of incident response for British telecoms firm Cable & Wireless and an adviser to Scotland Yard's Computer Crime Unit.

The only time you are going to get an X-marks-the-spot-scenario is if you have inside information, a person inside that is verified as being accurate in the past. That will always be highest level of intelligence. If you get it wrong, you can get people killed. If you get it right, you can save lives, he added.


Reuters
Posted on Friday, 14 November 2003 @ 04:40:00 EST by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Linux Games
· OpenSource
· Intel
· HotScripts
· W3 Consortium
· More about Anti-Terror
· News by phoenix22


Most read story about Anti-Terror:
IncrediMail: The war of the coder.

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register