[iwar] News


From: Fred Cohen
To: Information Warfare Mailing List
From: fc@all.net
To: iwar@onelist.com

Sat, 24 Feb 2001 08:30:09 -0800 (PST)


fc  Sat Feb 24 08:32:09 2001
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Sat, 24 Feb 2001 08:32:09 -0800 (PST)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Sat Feb 24 16:32:03 2001)
X-From_: fc@all.net  Sat Feb 24 10:30:15 2001
Received: from hj.egroups.com (hj.egroups.com [208.50.99.212])
	by multi33.netcomi.com (8.9.3/8.9.3) with SMTP id KAA03812
	for ; Sat, 24 Feb 2001 10:30:13 -0600
X-eGroups-Return: sentto-279987-987-983032217-fc=all.net@returns.onelist.com
Received: from [10.1.4.53] by hj.egroups.com with NNFMP; 24 Feb 2001 16:30:17 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_0_4); 24 Feb 2001 16:30:16 -0000
Received: (qmail 25100 invoked from network); 24 Feb 2001 16:30:11 -0000
Received: from unknown (10.1.10.27) by l7.egroups.com with QMQP; 24 Feb 2001 16:30:11 -0000
Received: from unknown (HELO all.net) (65.0.156.78) by mta2 with SMTP; 24 Feb 2001 16:30:10 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id IAA07515 for iwar@onelist.com; Sat, 24 Feb 2001 08:30:09 -0800
Message-Id: <200102241630.IAA07515@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Sat, 24 Feb 2001 08:30:09 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] News
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Suspect hacked into FBI system
A veteran FBI agent charged this week with spying
for Moscow hacked into the office computer of the
bureau's top Russian counterintelligence official
in the early 1990s, according to former senior
intelligence officials. At the time, Robert Philip
Hanssen did not try to hide his actions. He told
FBI officials that he had hacked into the computer
to demonstrate the vulnerability of a system used
by counterintelligence agents at the Washington
headquarters. But the former officials say the
espionage charges against him now raise the
question of whether he drew attention to his
hacking to develop a cover story in case his
penetration of the computer was discovered.
http://www.usatoday.com/news/washdc/2001-02-21-spyhacker.htm

Old Spy, New Tricks
Robert Philip Hanssen is not only an accused
spy who federal agents say is responsible for
one of the most serious breaches of national
security in years. He's also allegedly a geek.
In a 150KB affidavit, the FBI says that the
56-year-old counterintelligence specialist
used a Palm III, encryption and flash memory
cards to convey documents to his Russian
handlers. Instead of old-fashioned midnight
meetings, the affidavit says, Hanssen
suggested in 1985 that communications take
place through a computer bulletin board system.
http://www.wired.com/news/politics/0,1283,41950,00.html

Man pleads `self defense' after hacking
MISTAKEN IDENTITY: After the computer of a
Hsinchu engineer was hacked he retaliated
by hacking the source of the attack. But
police say he attacked a victim of a very
nasty computer virus. The Criminal
Investigation Bureau (CIB) yesterday
referred to prosecutors a computer engineer
who allegedly hacked into a computer server
in what he called "self-defense." The
Hsinchu computer engineer, surnamed Fan
(=ADS), said he thought that the other side
attacked his computer first, while the truth
was that the other side was an innocent party
which had been attacked by a so-called Trojan
horse program, a special type of computer
virus, the police said.
http://www.taipeitimes.com/news/2001/02/21/story/0000074560

Computer Criminals Weave Web of Deceit
Cyber Criminals Are Targeting Companies,
with Lucrative Results. Probes The Rise
of High-Tech Crime Internet and technology
companies often claim that the risk of high
tech crime is exaggerated, but the threat
is real enough. The Federal Bureau of
Investigation (FBI), for example, said its
technology-based case load has nearly tripled
over the past three years. In October 1997,
it had around 453 pending investigations into
such areas as computer intrusions and viruses.
It now has more than 1,200 such cases, which
do not even include other internet-related
crimes, including fraud or child pornography.
http://www.telegraph.co.uk/et?ac=3D004406893020233&rtmo=3DQwxpxzOR&atmo=3Drrrrrrrq=20&pg=3D/et/01/2/22/ecfcrim22.html

Government to ban 'hate emails'
Sending a threatening email or text message
could land you with six months in jail
The government will table an amendment to the
Criminal Justice and Police Bill on Thursday
that will, if successful, ban hate emails and
hate text messages. Home secretary Jack Straw
intends to make it a criminal offence to send
hate mail by electronic means, in the same way
as it is illegal to send threats in a traditional
letter. Those found guilty could be sentenced
to six months imprisonment or fined =A35,000.
http://www.zdnet.co.uk/news/2001/7/ns-21127.html

Security hole in Java may expose servers
Sun Microsystems has revealed a security hole
in several versions of a critical component of
Java that could allow an attacker to run harmful
programs on a victim's computer. The vulnerability
appears in versions of the Java Runtime Environment
that Sun has released for servers running Windows,
Linux and Sun's Solaris operating systems. However,
the company asserts that the flaw doesn't affect
the Java components included in Microsoft's Internet
Explorer and Netscape's Navigator browsers.
http://news.cnet.com/news/0-1003-201-4917560-0.html

------------------------ Yahoo! Groups Sponsor ---------------------~-~>
eGroups is now Yahoo! Groups
Click here for more details
http://us.click.yahoo.com/kWP7PD/pYNCAA/4ihDAA/kzAVlB/TM
---------------------------------------------------------------------_->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/