[iwar] Historical posting


From: Fred Cohen
From: fc@all.net
To: iwar@onelist.com

Mon, Jan 1, 1999


fc  Mon Jan 1, 1999
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA15269 for iwar@onelist.com; Tue, 18 Apr 2000 05:21:43 -0700
To: iwar@onelist.com
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, Jan 1, 1999
From: Fred Cohen 
Reply-To: iwar@egroups.com
Subject: [iwar] Historical posting

          

Cyberattacks against DOD up 300 percent this year The number of cyberattacks reported this year against the Defense Department's information networks has more than tripled compared with last year, according to the director of the Defense Information Systems Agency.  The number of reported cyberattacks or unauthorized intrusions into DOD networks and systems skyrocketed from 5,844 in 1998 to 18,433 so far during 1999, according to Lt.  Gen.  David Kelley, director of DISA and manager of the National Communications System.  Because not all attacks and intrusions are detected or reported by local system administrators and security officials, that number could be significantly higher.  http://www.fcw.com/pubs/fcw/1999/1101/web-attack-11-03-99.html

[Note that more reported almost certainly means more detected - which is to say - they started looking.]

World Global spy network revealed Listening in to your phone calls and reading your emails Imagine a global spying network that can eavesdrop on every single phone call, fax or e-mail, anywhere on the planet.  It sounds like science fiction, but it's true.  Two of the chief protagonists - Britain and America - officially deny its existence.  But the BBC has confirmation from the Australian Government that such a network really does exist and politicians on both sides of the Atlantic are calling for an inquiry.  http://news.bbc.co.uk/hi/english/world/newsid_503000/503224.stm

Feds Set for Cyberattack Disguised as Y2K Bug Law enforcement officials are bracing for cyberattacks from any number of groups hoping to sow electronic chaos under the guise of the year 2000 computer glitch.  Concerned officials from the U.S.  and Canada, gathering at the annual police chiefs conference in Charlotte, N.C., detailed the steps government agencies are taking to protect critical infrastructure, including the banking and finance systems, transportation networks, emergency services, energy systems and even water supplies.  http://www.apbnews.com/newscenter/internetcrime/1999/11/03/nipc1103_01.html?s=emil

Taiwan Vulnerable to Cyber Attacks
In five years, China could be able to use computer viruses, hackers and other types of cyber warfare to break down Taiwan's defenses and prepare for an invasion, the Taiwanese military said Tuesday. Taiwan's economy, government and military are highly dependent on computers and could be vulnerable to a high-tech assault, the official Central News Agency quoted Chang Jia-sheng of the Defense Ministry as saying. Chang said Taiwan should form a team of experts to prepare the island for possible cyber warfare, the agency reported. http://wire.ap.org/APnews/center_story.html?FRONTID=ASIA&STORYID=APIS70FKMVO0

Moscow hackers gain access to Reuters data base MOSCOW, November 2 (Itar-Tass) -- The Russian Interior Ministry's department for struggle against economic crime in the sphere of intellectual property has exposed a criminal group reported to have gained illegal access to the data base of Britain's Reuters news agency, press secretary of the Russian Chief Administration for Struggle against Economic Crime Alexander Vorobyov told Tass on Tuesday.  The so-called Kentavr dealing centre was based on a computer class of a Moscow school.

A former Reuters employee has been reported to be involved in the crime.  The Russian law-enforcement bodies have already informed the British agency about Kentavr having picked the safety software locks and used the information of the agency to their own advantage.  Head of the Russian department for struggle against crime in the sphere of intellectual property Mikhail Sukhodolsky told Tass that about a year ago, Kentavr had signed a contract with the economic department of Reuters, and under the contract was granted computer hardware and software, including the passwords to the agency's the Reuters' information.  Kentavr then "picked" the safety locks of the agency and gained illegal satellite-supported access to stock-exchange automated quotations and facilities of Reuters.  Kentavr was reported to have rented a floor in a Moscow school.  The company entered into criminal collusion with the school administration, which helped to misappropriate
40 personal computers originally bought to equip a computer class at the school.  The dealing centre then advertised in the media that it would provide for low-price access to Reuters network.  The police are now after natural and law persons having signed contracts with Kentavr.  According to Reuters security service, the damage done by Kentavr has exceeded 3 million dollars.

According to Vorobyov, the so called dealing centre had been operating without even having registered as a law person.  At the same time, the law-enforcement officers were reported to have found documents providing ample evidence of the company having its own bank operating underground, and evading taxes.

The Russian Interior Ministry has qualified that criminal case as a major and most sophisticated crime recently committed in Russia in the sphere of economic crimes against intellectual property.

FC