[iwar] News


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Fri, 9 Jun 2000 03:46:40 -0700 (PDT)


fc  Fri Jun  9 03:47:14 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Fri, 09 Jun 2000 03:47:14 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Fri Jun  9 10:47:07 2000)
X-From_: sentto-279987-396-960547607-fc=all.net@returns.onelist.com  Fri Jun  9 05:46:43 2000
Received: from ci.egroups.com (ci.egroups.com [207.138.41.176]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id FAA21890 for ; Fri, 9 Jun 2000 05:46:43 -0500
X-eGroups-Return: sentto-279987-396-960547607-fc=all.net@returns.onelist.com
Received: from [10.1.10.38] by ci.egroups.com with NNFMP; 09 Jun 2000 10:46:48 -0000
Received: (qmail 5874 invoked from network); 9 Jun 2000 10:46:41 -0000
Received: from unknown (10.1.10.27) by m4.onelist.org with QMQP; 9 Jun 2000 10:46:41 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta2 with SMTP; 9 Jun 2000 10:46:40 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id DAA22705 for iwar@onelist.com; Fri, 9 Jun 2000 03:46:40 -0700
Message-Id: <200006091046.DAA22705@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Fri, 9 Jun 2000 03:46:40 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] News
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Malicious program embedded on home computers linked to Internet
Hackers have embedded a malicious program
disguised as a movie clip on 2,000 commercial
and home computers, positioning themselves to
launch an attack designed to shut down Web
sites, security experts told the government
in an alert Thursday. The problem, detected
by a security firm that does work for the
Justice Department, demonstrates the growing
vulnerability that home computer users face
as they begin to purchase permanent,
high-speed connections to the Internet.
http://www.mercurycenter.com/svtech/news/breaking/merc/docs/036282.htm
http://news.cnet.com/news/0-1003-200-2042695.html

Hackers said poised for attack
The FBI will meet with experts from a security
company Friday to discuss the firm's discovery
that hackers have embedded a malicious program
disguised as a movie clip on 2,000 commercial
and home computers, positioning themselves to
launch an attack designed to shut down Web sites.
http://www.mercurycenter.com/svtech/news/breaking/ap/docs/79855l.htm

Internet killer lured victims with jobs, sex
A Kansas man suspected of being a serial killer
may have lured some of his female victims via
the Internet with promises of work and job
training or offers of sexual escapades,
investigators said on Thursday.
John E. Robinson Sr., 56, who is being held
in Johnson County jail on sexual assault
charges, is a suspect in the murders of five
women whose bludgeoned bodies were found stuffed
in barrels in Kansas and Missouri over the last
week. He is also suspected of foul play in the
disappearance of three more women and a
5 month old girl, according to authorities.
http://www.mercurycenter.com/svtech/news/breaking/internet/docs/78465l.htm

Justice Dept Ponders Net-Based Serial Murders
Attorney General Janet Reno today said that there
are no easy answers to solving jurisdictional issues
when it comes to prosecuting Internet-based crimes.
"The Internet has given us a tool of remarkable
opportunity. It has also given us some extraordinary
challenges," Reno said, in response to a question
at her weekly press conference on whether the Justice
Department will investigate a series of nine deaths
that are tied to a man who used the Internet to seek
out sadomasochistic sex.
http://www.newsbytes.com/pubNews/00/150282.html

FBI Raids Homes in Probe of Badge Sales
FBI agents have raided the homes of five people,
including a D.C. police officer living in Virginia,
who allegedly sold federal law enforcement badges
over the Internet. The raids came just three days
after undercover investigators revealed that they
had used fake credentials to gain access to 19
secure federal agencies. Authorities in five states
seized more than 200 credentials in the raids,
including badges purportedly from the FBI, the Drug
Enforcement Administration, the U.S. Secret Service
and the U.S. Marshals Service, officials said.
Targets were selected after they allegedly sold
badges to undercover investigators through auctions
at a collectors Web site, according to search
warrant affidavits filed in Alexandria and Ohio.
http://washingtonpost.com/wp-dyn/articles/A18000-2000Jun7.html
http://www.apbnews.com/newscenter/breakingnews/2000/06/08/badges0608_01.html

CD Universe evidence compromised
Six months after "Maxim" broke into the computers
of Internet retailer CD Universe and stole 300,000
credit cards, U.S. authorities have been unable to
find the thief. And even if they do, they are
unlikely to be able to successfully prosecute the
case because electronic evidence collected from
the company's computers was not adequately
protected, MSNBC.com has learned.
http://www.msnbc.com/news/417406.asp

Gore to outlaw sale of Social Security numbers
Vice President Gore proposed legislation on
Thursday to protect personal privacy by making
it illegal to sell Social Security numbers for
profit, a problem on the rise with the growth
of the Internet. The legislation, introduced
in Congress on Thursday, would make it a federal
crime to buy or sell Social Security numbers for
a profit.
http://www.mercurycenter.com/svtech/news/breaking/internet/docs/78972l.htm

Kid Surfers Exposed to Cybersex
One out of four children who regularly
socialize on the Internet last year was
exposed to pornography, and one out of
five was solicited for cybersex by a
stranger, according to a government
financed survey released on Thursday.
http://www.zdnet.com/zdtv/cybercrime/privacy/story/0,9955,2583622,00.html
http://www.newsbytes.com/pubNews/00/150294.html

EC prepares interception directive for email
Telecoms operators must allow law enforcement
agencies to intercept e-mail messages according
to new legislation being prepared by the
European Commission. The proposals, prompted by
a perceived increase in crime over the Internet,
will also look at the prevention of spam mail
and anonymous and unsolicited messages. The
drive will broaden existing EU data privacy
directives to cover email, but is expected to
suggest strict guidelines on exactly what
communications can be intercepted and why.
http://www.zdnet.co.uk/news/2000/22/ns-15855.html

GSA casting for FIDNet comments
The General Services Administration today
released the draft request for proposals on
the Federal Intrusion Detection Network, a
program that will provide a single analysis
and response center for governmentwide
cyberattacks. The FIDNet program is intended
to create an environment that will enable
civilian agencies to react collectively to
cyberattacks and security incidents rather
than having each agency trying to respond
on its own.
http://www.fcw.com/fcw/articles/2000/0605/web-fidnet-06-08-00.asp

Beware the "Island Hopping" Hacker
The technique of entering a closed network through
a remote link poses more of a threat as companies
expand their connections. France -- the land of the
Eiffel Tower and foie gras -- is also a favorite
destination for hackers on virtual journeys.
Likewise, Poland is a big draw for malicious
cypherpunks. Is kielbasa the lure? Hardly. The
governments of France and Poland have steadfastly
refused to allow businesses or colleges and
universities to use strong encryption technologies
to guard the content and traffic on their computer
systems.
http://www.businessweek.com/bwdaily/dnflash/june2000/nf00606g.htm

Pro and Con: What do you get when you hire a
hacker to solve your security woes? If you're
not careful, you can get more than you bargained
for. Here's how to do it right. ALL THE HACKERS
HAD to go on were five innocuous e-mail messages.
Within four hours, they had taken control of their
target's bank account, changed his password and
locked him out. They had also acquired his credit
card numbers, the details of his driving record
and his salary to the penny. For the coup de grce,
they infiltrated his office and left a puckish
note on his desk: "Hi Matt, from your friends at Jaws."
http://www.cio.com/archive/060100_con.html

------------------------------------------------------------------------
Take your development to new heights. Work with clients like Dell and
pcOrder. Submit your resume to jobs@liaison.com. Visit us at
http://click.egroups.com/1/4358/7/_/595019/_/960547608/
------------------------------------------------------------------------

------------------
http://all.net/