[iwar] Historical posting


From: Fred Cohen
From: fc@all.net
To: iwar@onelist.com

Mon, Jan 1, 1999


fc  Mon Jan 1, 1999
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA15269 for iwar@onelist.com; Tue, 18 Apr 2000 05:21:43 -0700
To: iwar@onelist.com
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, Jan 1, 1999
From: Fred Cohen 
Reply-To: iwar@egroups.com
Subject: [iwar] Historical posting

          

 Cyber attacks -- both old and new
Over the past six weeks, U.S. network servers have come under assault
by a fundamentally new style of computer attack, said experts here at
the National Information Systems Security Conference. Known as
"distributed coordinated attacks," this new style is particularly good
at defeating present-day defenses against those intent on stopping
Internet traffic to a particular company or Internet service -- a result
known as denial of service.
http://www.zdnet.com/zdnn/stories/news/0,4586,2376768,00.htm

For more details on DCA, see:
	http://all.net/
	=>	Technical Safeguards
		=> 1996 Paper: A Note On Distributed Coordinated Attacks 

Navy issues warning on Y2K Trojan horse
The Navy Computer Incident Response Team warned Navy and Marine Corps
computer users worldwide that an e-mail attachment masquerading as a
utility to check a system's readiness for the Year 2000 date rollover
could contain a virus. The message, NAVCIRT Advisory 99-045, sent last
week, said the so-called Year 2000 readiness programs are carried as
an attachment to an e-mail message that may claim to originate from
Microsoft Corp. or other well-known PC vendors. "Some of these programs
have turned out to be Trojan horses programs that claim to or appear to
do one thing, but actually carry a hidden routine which is executed
without the users knowledge," the warning stated.
http://www.fcw.com/pubs/fcw/1999/1018/web-navy-10-19-99.html

Stick it to the snoops
So, you want to monkeywrench the busybodies, but you don't want to get
your fingernails dirty. You're willing to do your bit to sabotage the
modern nanny state, but you'd prefer that it not involve crawling
through a culvert at midnight with a fistful of drugged hamburger for
doping ill-tempered rotweilers. Well, we've got the assignment for
you. On October 21, the Hacktivism mailing list is inviting one and all
to help jam Echelon, the world-wide electronic snooping system operated
by spy agencies in the United States, the United Kingdom, Canada,
Australia, and New Zealand  a consortium called "UKUSA."
http://civilliberty.about.com/culture/issuescauses/civilliberty/library/week
ly/aa101899.htm

Steganography - Electronic Spycraft
In the physical world, Steganography (literally "covered writing") involves
invisible inks or messages in hidden places. Herodotus, the ancient Greek
historian, relates how a messenger had his head shaved and then had a secret
message written on his scalp. With newly grown hair, he traveled to the
targeted destination where his head again shaved revealed the message. In
the virtual world, the digital process inserts messages into graphic, sound,
and even text files. By using apparently harmless GIF, BMP, JPEG, or WAV
files, steganography creates a formidable security threat with the hiding of
pornography or the disguising of corporate espionage.
http://www.securityportal.com/coverstory.html

FC