<<< Date Index >>>     <<< Thread Index >>>

[IP] Online Data A Gold Mine For Terrorists





Begin forwarded message:

From: "John F. McMullen" <observer@xxxxxxxxxxx>
Date: August 10, 2004 5:38:26 PM EDT
To: johnmac's living room <johnmacsgroup@xxxxxxxxxxxxxxx>
Cc: Commonweal Mailing List <commonweal@xxxxxxxxxxxxxxx>, Declan McCullagh <declan@xxxxxxxx>, Dave Farber <farber@xxxxxxxxxxxxx>, America_at_War <America_at_War@xxxxxxxxxxxxxxx>, USA Talk List <USAtalk@xxxxxxxxxxxxxxx>
Subject: Online Data A Gold Mine For Terrorists

From OSINT
---------- Forwarded message ----------
From: Bruce Tefft <btefft@xxxxxxxxxxxxxxxxxxxxxx>

One of the major problems today - just because we can publish - we
don't need to publish everything - information overflow.


http://www.computerworld.com/newsletter/0,4902,95098,00.html?nlid=SEC

Online data a gold mine for terrorists
IT's high-alert response overlooks corporate sites
News Story by Dan Verton and Lucas Mearian


   AUGUST 06, 2004 (COMPUTERWORLD) - The widespread availability of
sensitive information on corporate Web sites appears to have been largely
overlooked by IT and security managers responding this week to the
Department of Homeland Security's warning of a heightened terrorist threat
against the financial services sector.
Freely available on the Web, for example, are 3-D models of the exterior and limited portions of the interior of the Citigroup Inc. headquarters building
in Manhattan -- one of the sites specifically named in the latest terror
advisory issued by the DHS. Likewise, details of the Citigroup building's
history of structural design weaknesses, including its susceptibility to
toppling over in high winds, the construction of its central support column
and the fire rating of the materials used in the building, are readily
available on the Web.

A Citigroup spokeswoman declined to comment, referring the matter to the
building owner, Boston Properties Inc.

Similarly, the Web site of the Chicago Board of Trade includes photographs of the facility's underground parking garages, floor plans of office suites
and contact names and phone numbers for the telecommunications service
providers that serve the building.

Maria Gemskie, a spokeswoman for the CBOT, said the company could not
comment publicly about specific security precautions being put in place. But she stressed that "all aspects of security are taken very seriously and we
are looking into [our Web content] as well."

Such information can be a gold mine for terrorists, security experts said. A senior intelligence official at the DHS, speaking on condition of anonymity, said the recent capture of al-Qaeda computer expert Muhammad Naeem Noor Khan in Pakistan yielded a computer filled with photographs and floor diagrams of
buildings in the U.S. that terrorists may have been planning to attack.

"Not thinking through the security implications of some of the information put online can be a very dangerous mistake," said Amit Yoran, director of the National Cyber Security Division at the DHS. "The Pentagon has looked very closely at this issue, and certainly corporate America should do the
same."

In fact, Yoran said the situation is serious enough that the DHS may need to
look into publishing best-practices guidelines for companies to follow.

Eric Friedberg, managing director of New York-based security firm Stroz
Friedberg LLC, said the warnings about sensitive Web site postings that his company took to the private sector two years ago have "fallen on deaf ears"
(see story).

MacDonnell Ulsch, managing director of Janus Risk Management Inc. in
Marlboro, Mass., said making this type of information available is
inexcusable.

"It may make it easier for contractors and service providers to do their
jobs, but the risk may exceed the benefit," said Ulsch. "A well-trained
engineer can easily discern the greatest points of vulnerability in a
building by analyzing the design. Making this information available is a
fundamental mistake with deadly consequences."

According to Ulsch, what companies do or fail to do in response to a threat is a direct result of their understanding of the risk. Consequently, when companies are told to beware of terrorists driving truck bombs into or near
their buildings, they deploy concrete barriers, he said.

And that seems to be exactly what has happened in the aftermath of the
latest threat-level increase, with most firms focusing on redundancy and
recovery while paying very little attention to countersurveillance and
information control.

New York Stock Stock Exchange spokesman Raymond Pellecchia, for example,
said the perimeter around the building has been "beefed up" but so far that
is "the principle change" that has taken place since the alert level
changed. "We've long had a very hardened security profile," he said.

Sylvain Pendaries, CIO at CDC Ixis North America Inc. in Manhattan, said
previous terror alerts have loosened the purse strings of executives in his
company, enabling him to complete disaster recovery plans. CDC Ixis in
February completed an upgrade to its communications network, moving from two T3 lines to a Sonet ring that connects sites in New York and New Jersey at
OC48 port speeds.

While an increased focus on disaster recovery is necessary, Yoran said the
lack of focus on blocking cybersurveillance activities stems from a
disconnect between the terrorist alert system and the role of cybersecurity
in homeland defense. "In practical terms, tuning a firewall, changing
parameters on antivirus software and advocating more frequent password
changes don't really line up with the different threat levels," he said.

Michelle Petrovich, a spokeswoman for Robert Liscouski, assistant secretary for infrastructure protection at the DHS, said that while companies have the
right to post whatever information they want, the DHS encourages all
companies to add Web site reviews to their list of preventive security
measures.

--------------------------
Brooks Isoldi, editor
bisoldi@xxxxxxxxxxxxx
http://www.intellnet.org
  Subscribe:    osint-subscribe@xxxxxxxxxxxxxxx

*** FAIR USE NOTICE. This message contains copyrighted material whose use has not been specifically authorized by the copyright owner. OSINT, as a part of The Intelligence Network, is making it available without profit to OSINT YahooGroups members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of intelligence and law enforcement organizations, their activities, methods, techniques, human rights, civil liberties, social justice and other intelligence related issues, for non-profit research and educational purposes only. We believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml

 "When you come to the fork in the road, take it" - L.P. Berra
   "Always make new mistakes" -- Esther Dyson
"Any sufficiently advanced technology is indistinguishable from magic"
    -- Arthur C. Clarke
    "You Gotta Believe" - Frank "Tug" McGraw (1944 - 2004 RIP)

                          John F. McMullen
   johnmac@xxxxxxx johnmac@xxxxxxxxxxxx johnmac@xxxxxxxxxxxxxxxxxx
         johnmac@xxxxxxxxx johnmac@xxxxxxxxx johnmac@xxxxxxxxxxx
           jmcmullen@xxxxxxxxxxxxxxxxx johnmac@xxxxxxxxxxxxxxx
              ICQ: 4368412 Skype, AIM & Yahoo Messenger: johnmac13
                  http://www.westnet.com/~observer

-------------------------------------
You are subscribed as roessler@xxxxxxxxxxxxxxxxxx
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/