Make your own free website on Tripod.com

keshavs counterterrorism portal

Internet 'cloaking' terrorist threat
Counter-terrorism for Corporations
Profile: Pakistan's military intelligence agency
CHAT ROOM
Kargils first hero
N.Korean missile crisis
Cyberterrorism
Dangers of open internet
Pak funding of N.Korean missiles with heroin
Internet 'cloaking' terrorist threat
ISI--the Al Qaeda link
Militancy in Kashmir
Kashmir-a flashpoint
How Modern Terrorism Uses the Internet
How Modern Terrorism Uses the Internet
Cyberterrorism: How Real Is the Threat?
Open Source Intelligence OSINT
Celebrating militant Islam
Pakistans Ghauri threat
India's most wanted
Social Network Analysis
ISI & Taliban
LeT--A profile
US Terrorism Exclusion List
Pakistans Nuclear Development
Modern terrorism & net
dangers of cyberterrorism
Pak nuclear know-how clandestine supply

Internet 'cloaking' emerges as new Web security threat

Terrorist organizations and other national enemies have launched bogus Web sites that mask their covert information or provide misleading information to users they identify as federal employees or agents, according to Lance Cottrell, founder and chief scientist at Anonymizer of San Diego.

The criminal and terrorist organizations also increasingly are blocking all traffic from North America or from Internet Protocol addresses that point back to users who rely on the English language, Cotrell told an educational seminar in Washington at the FOSE 2006 trade show’s Homeland Security Center yesterday. FOSE is sponsored by PostNewsweek Tech Media, the parent company of Government Computer News.

Among the risks of the terrorist cloaking practice are that the organizations can provide bogus passwords to covert meetings. By doing so they can pinpoint federal intelligence agents who attend the meetings, making them vulnerable to being kidnapped or becoming the unwitting carriers of false information, Cottrell said.

Cloaking is just one means by which hostile intelligence organizations can exploit the ability of IP addresses to reveal the physical location—and frequently the organizational identity—of a user visiting a Web site.

Another method Cottrell described was a case in which hackers set a number of criteria that they all shared using the Linux operating system and the Netscape browser, among other factors. When federal investigators using PCs running Windows and using Internet Explorer visited the hackers' shared site, the hackers' system immediately mounted a distributed denial-of-service attack against the federal system.

Cottrell said his company had helped humanitarian activists in the former Yugoslav republic of Kosovo shield themselves from attacks by paramilitary goons employed by Serbian strongman Slobodan Milošević. The Milošević paramilitaries were using the activists' IP addresses to pinpoint their physical locations and follow up with attacks aimed at preventing the activists' campaigns against specific human rights abuses.

"Imagine the kind of damage a mole at Google could do," Cottrell said, noting that Google keeps logs of the Web searches it provides, which provide a comprehensive picture of users' Web traffic patterns.

In a similar fashion, Web-savvy intelligence specialists can use IP address data to analyze what types of information a particular federal user is seeking and, by inference, what types of intelligence or counterintelligence operations federal agencies are carrying out.

Cottrell described a situation in which Anonymizer employees had worked on a Navy aircraft carrier that allowed sailors to access the Web. He noted that by analyzing Web traffic that could be traced back to that ship via the IP addresses of its public browsers, hostile intelligence services could determine the name of the ship, the port it was visiting and other information.

Cottrell said his company, which sells technology to prevent the use of IP address information for such purposes, had shielded the identities of the providers of 25,000 tips to the FBI in one recent three-month period.

Even as the use of IP address security technology is critical to maintaining Web security, Cottrell noted that the use of firewalls, antivirus software, measures to defeat social engineering and reduce human error are also essential.

Anonymizer has received a contract from the Broadcasting Board of Governors, the foreign-policy agency that runs the Voice of America international radio service, to provide technology that the people of Iran can use to circumvent their government's Web censorship program. Anonymizer also soon will launch, at its own expense, a service that will allow the people of China to overcome Beijing's massive program to censor the Web, Cottrell said.

Enter supporting content here

Click Here for Web Detective

GCF Global Learning®

Click here to view keshavs flash intro

get toolbar traffic for extremely high hits abs. FREE

CallWave Free Trial - Click Here!

75% off with FREE shipping on all hardware and software and household electronics!!!!

search engine submission

B2B Marketing Tools

Sign up for PayPal and start accepting credit card payments instantly.

counterterrorism and aid to 9/11 victims

Word of the Day

Article of the Day

This Day in History

Today's Birthday

In the News

Quotation of the Day

Match Up
Match each word in the left column with its synonym on the right. When finished, click Answer to see the results. Good luck!

 

Hangman