[iwar] * Air-Traffic Control System Penetrable By Computer Hackers. (fwd)
From: Fred Cohen
To: CJ 626 UNH Class
From: fc@all.net
To: cj626@all.net
Fri, 29 Sep 2000 16:45:54 -0700 (PDT)
fc Fri Sep 29 16:46:31 2000
Received: from 207.222.214.225
by localhost with POP3 (fetchmail-5.1.0)
for fc@localhost (single-drop); Fri, 29 Sep 2000 16:46:31 -0700 (PDT)
Received: by multi33.netcomi.com for CJ626
(with Netcom Interactive pop3d (v1.21.1 1998/05/07) Fri Sep 29 23:41:45 2000)
X-From_: fc@all.net Fri Sep 29 18:41:11 2000
Received: from gw1 (gw1.mail.troy.psi.com [38.223.235.10]) by multi33.netcomi.com (8.8.5/8.7.4) with ESMTP id SAA09473 for ; Fri, 29 Sep 2000 18:41:11 -0500
Received: from all.net (c118194-a.lvrmr1.sfba.home.com [24.1.84.100]) by gw1 (8.8.8+Sun/SMI-5.4-PSI)
id TAA19307; Fri, 29 Sep 2000 19:45:55 -0400 (EDT)
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id QAA27922 for cj626@all.net@psi.com; Fri, 29 Sep 2000 16:45:54 -0700
Message-Id: <200009292345.QAA27922@all.net>
Subject: [iwar] * Air-Traffic Control System Penetrable By Computer Hackers. (fwd)
To: cj626@all.net (CJ 626 UNH Class)
Date: Fri, 29 Sep 2000 16:45:54 -0700 (PDT)
From: Fred Cohen
Reply-To: fc@all.net
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Air-Traffic Control System Penetrable By Computer Hackers.
USA Today (9/28, Morrison) reported, "The nation's air-traffic control=
system could be vulnerable to hackers because the Federal Aviation=
Administration has failed to adequately address 'pervasive weaknesses in=
its computer programs,' a congressional report to be released Wednesday=
contends." USA added, "In addition, General Accounting Office (GAO)=
investigators found the agency has not performed adequate background=
checks on computer experts hired to spot system vulnerabilities or on=
foreign nationals hired to tackle Y2K problems. 'As a result,' the report=
reads, 'FAA allowed and is continuing to allow contractors to undertake=
sensitive assessments of the weaknesses in its systems without sufficient=
assurance that the individuals performing these assessments are reliable=
and trustworthy.'"