[iwar] News


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Fri, 4 Aug 2000 07:15:00 -0700 (PDT)


fc  Fri Aug  4 07:15:14 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Fri, 04 Aug 2000 07:15:14 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Fri Aug  4 14:15:07 2000)
X-From_: sentto-279987-473-965398502-fc=all.net@returns.onelist.com  Fri Aug  4 09:15:01 2000
Received: from b05.egroups.com (b05.egroups.com [208.50.144.96]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id JAA20621 for ; Fri, 4 Aug 2000 09:15:01 -0500
X-eGroups-Return: sentto-279987-473-965398502-fc=all.net@returns.onelist.com
Received: from [10.1.10.36] by b05.egroups.com with NNFMP; 04 Aug 2000 14:15:05 -0000
Received: (qmail 16399 invoked from network); 4 Aug 2000 14:15:01 -0000
Received: from unknown (10.1.10.142) by m2.onelist.org with QMQP; 4 Aug 2000 14:15:01 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta1 with SMTP; 4 Aug 2000 14:15:01 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id HAA26260 for iwar@onelist.com; Fri, 4 Aug 2000 07:15:00 -0700
Message-Id: <200008041415.HAA26260@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Fri, 4 Aug 2000 07:15:00 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] News
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Hackers linked to China stole Los Alamos documents
Hackers suspected of working for a Chinese government
institute in Beijing broke into a computer system at
Los Alamos National Laboratory and pilfered large
amounts of sensitive information, including documents
containing the word "nuclear," The Washington Times
has learned. The incident involving sensitive but
unclassified data was uncovered by a National Security
Agency computer analyst early last year but kept secret
until now, said U.S. intelligence officials who spoke
on the condition of anonymity.
http://www.washingtontimes.com/national/default-20008321179.htm

Hackers close down Myanmar government Web site
Myanmar telecommunications engineers were trying Thursday
to restore the military government's Web site after hackers
shut it down, a military intelligence officer said. An
officer of the Directorate of Defense Services Intelligence
said myanmar.com was closed down by hackers Wednesday, but
declined to elaborate. He spoke on customary condition of
anonymity.
http://www.mercurycenter.com/svtech/news/breaking/merc/docs/033002.htm

Hackers close down Burmese web site
The military authorities in Burma have blamed the opposition
for closing down the government's internet web site.
Officials said that activists had committed a computer crime
by altering files on the site, which promotes tourism and
foreign investment in the country. Computer hackers broke
into the site on Wednesday, preventing internet users from
gaining access to it.
http://news.bbc.co.uk/hi/english/world/asia-pacific/newsid_813000/813403.stm

Reno to check on FBI Internet-wiretap system review
Attorney General Janet Reno vowed Thursday to check on
why it has taken so long to begin the review of the FBI's
Internet-wiretap system called Carnivore, a program that
has raised privacy concerns. Reno said she has asked
Justice Department officials to work with the FBI in
selecting the appropriate experts to review the computer
program's source code. ``If there is any disagreement,
then I will resolve it,'' Reno said, adding that she
ultimately she will be responsible for the review.
http://www.mercurycenter.com/svtech/news/breaking/merc/docs/000018.htm

More than 200 reports of new computer virus in Japan
A computer virus that could cause e-mail servers to
malfunction has made its way from the United States
to Japan, with more than 200 cases reported in July,
a government-affiliated organization said Thursday.
The virus, called ``Stages,'' invades address books
in Microsoft Outlook programs through an attachment
labeled Life--Stages.txt.shs, said Fumio Kidani, an
official at the Information Technology Promotion
Agency.
http://www.mercurycenter.com/svtech/news/breaking/merc/docs/021805.htm

Microsoft executive named to White House computer security panel
Microsoft executive Craig Mundie has been named to a White
House advisory panel on computer security, the White House
and Microsoft announced Wednesday. President Clinton named
Mundie, Microsoft's senior vice president for consumer
strategy, to the National Security Telecommunications
Advisory Committee. The committee is made up of high-tech
industry executives who advise the White House on the
nation's security against telecommunications attacks, such
as computer hacking. Other members include Cisco Systems
CEO John Chambers and AT&T CEO Michael Armstrong. The
panel is chaired by Van Honeycutt, chairman and CEO of
Computer Sciences Corp.
http://www.nandotimes.com/technology/story/body/0,1634,500235329-500343607-501976670-0,00.html

An Old Spy with a New Vision of Encryption
Ex-NSA official and now Cylink CEO Bill Crowell is reviving
the software maker and helping to bridge the government
industry divide. William Crowell doesn't look like what
you'd expect. Espionage expert? Give me a break. Silicon
Valley executive? No way. The 59-year-old Crowell, with
his snowy white hair, sheepish smile, and soft-spoken
style, seems more like someone's retired grandfather.
http://www.businessweek.com/ebiz/0008/em0802.htm

EMP
In its heyday, the late 1980s, Omni magazine featured an
opinion piece by G. Gordon Liddy, "Rules of the Game."
Liddy's discussion of terrorist options in America
explained how extremists could blow up railroad bridges,
attack key transport centers, and use electromagnetic pulse
(EMP) to fry computers. Liddy did not go into the details
of building an EMP device, but his introduction of the topic
seemed reasonable within the context of his scenario.
Questions about the seriousness of the threat echo throughout
CompSec to this day.
http://www.securityportal.com/topnews/emp20000803.html

---------------------------------------------------------------------

------------------
http://all.net/