[iwar] Historical posting


From: Fred Cohen
From: fc@all.net
To: iwar@onelist.com

Mon, Jan 1, 1999


fc  Mon Jan 1, 1999
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA15269 for iwar@onelist.com; Tue, 18 Apr 2000 05:21:43 -0700
To: iwar@onelist.com
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, Jan 1, 1999
From: Fred Cohen 
Reply-To: iwar@egroups.com
Subject: [iwar] Historical posting

          

Experts uncover PC-prying program
Russian Web site snared Internet data
Computer security experts have discovered an insidious new program that
conducts "electronic reconnaissance" of the Internet -- and has been
transmitting captured data to a Russian Web site. The stealthy program,
which was deciphered this week during a conference in New Orleans, was
designed to infect Windows-based PCs without the users' knowledge.
http://www.uniontribune.com/news/uniontrib/sat/news/news_1n9cyber.html

In Theory, Reality, U.S. Open to Cyber-Attack
Security: An NSA test exposed vulnerability of critical computer
systems to hackers. Outside assault proved it.
The ground rules were simple: Use laptop computers purchased at
local stores and software downloaded from the Internet. Target
only unclassified government computer systems. And see how far
you can get. The "Red Team" hackers hit the jackpot. In less than
three months, they secretly penetrated computers that control
electrical grids in Los Angeles, Washington and other major cities.
They broke into networks that direct 911 emergency response systems.
They even got access to the Pentagon's National Military Command Center,
the heart of America's war fighting operation.
http://www.latimes.com/news/nation/19991009/t000091171.html
http://straitstimes.asia1.com/cyb/cyb3_1011.html

Hill axes DOE security funds: $35 billion was sought for IT protections
The fiscal 2000 budget could force the Energy Department to scale back
cybersecurity plans that chief information officer John Gilligan
announced last month. Congress late last month passed a fiscal 2000
appropriations bill for the department that eliminates the $35 million
Energy requested to implement the reforms, Energy Secretary Bill
Richardson said. The bill has been sent to the White House for the
president's signature. http://www.gcn.com/vol18_no34/news/819-1.html

Electromagnetic pulse attacks: The wave of the future, panel says
The detonation of a small nuclear weapon in the upper atmosphere
could lead to widespread paralysis of the nation's critical
electronic infrastructure and cripple the Defense Department's
ability to wage war, experts warn.
http://www.fcw.com/pubs/fcw/1999/1011/web-emp-10-11-99.html

Kashmir-minded Pakistani 'hacktivists' blitz Web sites
Since October 1, the two students who make up the Pakistan Hackerz
Club have defaced over 40 Web sites, according to a hacking mirror
site. From the Mildew Removal Specialists site to several government
sites within China, the PHC hasn't shown one overarching pattern in
their choice of targets. Not so for the results; almost every site's
main page has been replaced with the PHC logo and a treatise in
defense of the disputed region of Kashmir as well as graphic
photographs depicting charred bodies and wounded Kashmiri children.
http://www.cnn.com/TECH/computing/9910/08/pakistani.hack/index.html

Hackers sabotage ministers' website
MINISTERS had to shut down their website yesterday after it was
sabotaged by computer hackers. The move came a week after security
was upgraded because computer experts said it was poor. The hackers
caused chaos on the site's home page, altering the text and
superimposing the head of Alex Salmond, the Scottish National Party
leader, on the picture of Donald Dewar, the First Minister.
http://www.telegraph.co.uk:80/et?ac=001897244212554&rtmo=r3Fbtr2X&atmo=rrrrr
rrq&pg=/et/99/9/9/nweb09.html

Hunt for the log files
On October 19 and 20 the Ministers of Interior and Justice of the
G-8 states will meet in Moscow. A goal is to act together more
powerfully in the future against cyber criminality. An appropriate
convention is already in preparation in the Council of Europe.
http://cryptome.org/g8-hunt.htm (English Translation)
http://www.spiegel.de/netzwelt/politik/0,1518,45748,00.html (in German)

FC
--