[iwar] Historical posting


From: Fred Cohen
From: fc@all.net
To: iwar@onelist.com

Mon, Jan 1, 1999


fc  Mon Jan 1, 1999
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA15269 for iwar@onelist.com; Tue, 18 Apr 2000 05:21:43 -0700
To: iwar@onelist.com
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, Jan 1, 1999
From: Fred Cohen 
Reply-To: iwar@egroups.com
Subject: [iwar] Historical posting

          

Info attacks on Defense systems rise, DISA says
Reports of information attacks against Defense Department systems have increased more than threefold since last year, Defense Information Systems Agency officials say. Cyberattack reports increased from 5,844 last year to 18,433 through last month, said Army Lt. Gen. David J. Kelley, DISA's director. "Folks, that's a growth industry," he said early this month during a speech at the Armed Forces Communications and Electronics Association MilCom '99 conference in Atlantic City, N.J. Kelley attributed the increase in part to DOD's improved ability to detect and report attacks. "We are getting a lot better at detecting attacks" using network sensors, he said in another recent speech, at the Army Information Assurance Conference (AIAC) in Arlington, Va. http://www.gcn.com/vol18_no37/news/983-1.html

Covert menace to computer networks found
A malicious software program, designed to wreak havoc on both public and private computer networks, has been covertly installed in thousands of Unix-based computers around the world, experts said yesterday. The program -- dubbed "trinoo" -- has not been used to attack any systems since it was discovered late this summer, said Kevin Houle of the federally funded Computer Emergency Response Team, or CERT, at Carnegie Mellon University. http://www.uniontrib.com/news/utarchives/cgi/idoc.cgi?511253+unix++www.uniontrib.com..80+Union-Tribune+Union-Tribune+Library+Library++%28Covert

Covert Channels and Web Sites
John is a computer programmer who wants an edge over other investors in XYZ Computer Corporation. So, if John learns before the market does about the movement of funds for XYZ to acquire ABC Computers, he can purchase XYZ's stock before the price goes up. Unfortunately, John's unit at XYZ doesn't own this highly sensitive information. But as a programmer, he has access to the Financial Planning (FP) program. He inserts a Trojan Horse into the FP. When the FP shows a fund allocation for the ABC acquisition, the Trojan Horse will signal John. http://securityportal.com/coverstory.html

Spies in the 'forests'
THE US Department of Defense is lab-testing technology that could make it easier automatically to sift through a vast pool of private communications, including international telephone phone calls, in a similar manner to using an Internet search engine. The technology, called "Semantic Forests", is a software program that analyses voice transcripts and other documents in order to allow intelligent searching for specific topics. The software could be used to analyse computer-transcribed telephone conversations. It is named for its use of an electronic dictionary to make a weighted "tree" of meanings for each word in a target document. http://www.independent.co.uk/news/Digital/Features/spies221199.shtml

FC