[iwar] Historical posting


From: Fred Cohen
From: fc@all.net
To: iwar@onelist.com

Mon, Jan 1, 1999


fc  Mon Jan 1, 1999
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA15269 for iwar@onelist.com; Tue, 18 Apr 2000 05:21:43 -0700
To: iwar@onelist.com
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, Jan 1, 1999
From: Fred Cohen 
Reply-To: iwar@egroups.com
Subject: [iwar] Historical posting

          

-- 24 January 2000  Library of Congress Site to Evaluate On Line Security In response to the recent attack on a Library of Congress web site, staff members examined the site's security precautions and procedures. A systems upgrade had already been planned due to steadily increasing traffic on the site.  http://www.gcn.com/vol19_no2/news/1196-1.html

Precursor: 18 January: Library of Congress Site Attacked, Defaced A group of crackers attacked a Library of Congress site that allows people to track Congressional legislation.   The group defaced the site with fragments of the code used to crack the site's security, and with links to other sites, including one to a site about Kevin Mitnick.  In the same article, some Internet Service Providers (ISPs) in the northwest have experienced a rash of denial of service attacks. http://www.apbnews.com/newscenter/internetcrime/2000/01/18/attacks0118_01.html

-- 24 January 2000  DOJ Says It's Getting Harder to Prosecute Cyber Crime The Justice Department (DOJ) says that while computer crime is on the rise, prosecuting those responsible is becoming increasingly difficult. E-criminals are harder to find, prosecution across borders is complex, and many businesses are reluctant to make public any cyber attacks they have suffered.  http://www.currents.net/newstoday/00/01/24/news2.html

-- 24 January 2000  DOD Says Computer Y2K Problem was not Serious The Defense Department (DOD) says the spy satellite computer outage was "insignificant", and intelligence collection systems were never "blinded." http://www.gcn.com/vol19_no2/news/1192-1.html

-- 21 January 2000  Monitoring Software Will Add Notification/Acknowledgment
                    Banner
Invisible keystroke monitoring software e-mails reports of computer
activity to the systems administrator or employee supervisor.  A new
version of the software will incorporate the option of banners that will
let users acknowledge that their activity will be monitored.
http://www.techweb.com/wire/story/TWB20000121S0014

-- 20 January 2000  NSA at RSA
The National Security Agency (NSA) was at the RSA Security conference to connect government agencies with commercial security technology. The NSA advises many government agencies on security systems purchases, and provides software evaluation services for the government. http://www.wired.com/news/politics/0,1283,33776,00.html

-- 19 January 2000  WTO Sponsor Site Fended Off Flood Attack The sponsor of the World Trade Organization (WTO) meetings held in Seattle late last year said its site experienced almost 700 probes, 54 crack attempts, and that it successfully defended itself against a flood attack on December 3, 1999. http://www.usatoday.com/life/cyber/tech/cth175.htm

-- 19 January 2000  55 Alleged Crackers Arrested in Spain Spanish authorities arrested 55 people on charges of fraudulently using toll-free phone lines to access the Internet.  The crackers allegedly broke into other systems and stole user names and passwords. http://sg.dailynews.yahoo.com/headlines/technology/afp/article.html?s=singapore/headlines/000119/technology/afp/Spanish_police_break-up__Internet_hacking_ring_.html

-- 19 January 2000  Administration Asserts Authority to Search for
                    Encryption Keys
In a letter to Congress, Attorney General Janet Reno and Deputy Defense
Secretary John Hamre said that law enforcement has the authority to
search computers for encryption keys without immediately notifying the
owners.  The letter also encourages support of Fidnet, a federal computer
intrusion-monitoring plan.
http://www.wired.com/news/business/0,1367,33779,00.html

FC