[iwar] Investigative Reports: e-terror (fwd)


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Fri, 9 Jun 2000 09:55:03 -0700 (PDT)


fc  Fri Jun  9 09:55:16 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Fri, 09 Jun 2000 09:55:16 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Fri Jun  9 16:55:09 2000)
X-From_: sentto-279987-401-960569704-fc=all.net@returns.onelist.com  Fri Jun  9 11:54:59 2000
Received: from hj.egroups.com (hj.egroups.com [208.50.144.90]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id LAA13887 for ; Fri, 9 Jun 2000 11:54:59 -0500
X-eGroups-Return: sentto-279987-401-960569704-fc=all.net@returns.onelist.com
Received: from [10.1.10.38] by hj.egroups.com with NNFMP; 09 Jun 2000 16:55:05 -0000
Received: (qmail 13305 invoked from network); 9 Jun 2000 16:55:04 -0000
Received: from unknown (10.1.10.142) by m4.onelist.org with QMQP; 9 Jun 2000 16:55:04 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta3 with SMTP; 9 Jun 2000 16:55:03 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id JAA25593 for iwar@onelist.com; Fri, 9 Jun 2000 09:55:03 -0700
Message-Id: <200006091655.JAA25593@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Fri, 9 Jun 2000 09:55:03 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] Investigative Reports:  e-terror (fwd)
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

INVESTIGATIVE REPORTS: e-terror 
Airs Wednesday, June 14 at 10pm ET/PT 

In light of the February 2000 Web attacks on popular commercial Web sites,
Investigative Reports takes an in-depth look at security on the Internet. We
visit the hackers who know how to exploit software weaknesses, a hacker
convicted of cybercrime, a victim of Internet credit card fraud, the
National Infrastructure Protection Center, housed at the FBI in Washington,
D.C., and the military's Joint Task Force for Computer Network Defense, in
Arlington, VA. 

Despite law enforcement's efforts to keep criminals in check, the hacker,
Dead Addict, describes how the recent Web attacks can be done with relative
ease. Members of an elite hacker group, the L0pht, tell us that the World
Wide Web has been pieced together with Band-Aids and bubble gum. We also
cover the story of Kevin Mitnick, the legendary hacker, who managed to elude
law enforcement for years. Concluding our coverage is an examination of the
threat of "Information Warfare" or I-War, as the military calls it, and the
growing concern over the Pentagon's ability to protect itself against
computer attacks. 

The lack of security on the Internet has left us all vulnerable. Guns and
getaway cars are being replaced by a laptop and a modem as the police and
government try to combat a new kind of outlaw: the cybercriminal. 

------------------------------------------------------------------------
Take your development to new heights. Work with clients like Dell and
pcOrder. Submit your resume to jobs@liaison.com. Visit us at
http://click.egroups.com/1/4358/7/_/595019/_/960569704/
------------------------------------------------------------------------

------------------
http://all.net/