[iwar] news


From: Fred Cohen
To: Information Warfare Mailing List
From: fc@all.net
To: iwar@onelist.com

Sun, 25 Feb 2001 06:22:18 -0800 (PST)


fc  Sun Feb 25 06:23:08 2001
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Sun, 25 Feb 2001 06:23:08 -0800 (PST)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Sun Feb 25 14:23:02 2001)
X-From_: fc@all.net  Sun Feb 25 08:22:19 2001
Received: from hi.egroups.com (hi.egroups.com [208.50.99.211])
	by multi33.netcomi.com (8.9.3/8.9.3) with SMTP id IAA22922
	for ; Sun, 25 Feb 2001 08:22:16 -0600
X-eGroups-Return: sentto-279987-989-983110940-fc=all.net@returns.onelist.com
Received: from [10.1.4.56] by hi.egroups.com with NNFMP; 25 Feb 2001 14:22:21 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_0_4); 25 Feb 2001 14:22:20 -0000
Received: (qmail 80749 invoked from network); 25 Feb 2001 14:22:19 -0000
Received: from unknown (10.1.10.142) by l10.egroups.com with QMQP; 25 Feb 2001 14:22:19 -0000
Received: from unknown (HELO all.net) (65.0.156.78) by mta3 with SMTP; 25 Feb 2001 15:23:24 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id GAA18446 for iwar@onelist.com; Sun, 25 Feb 2001 06:22:19 -0800
Message-Id: <200102251422.GAA18446@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Sun, 25 Feb 2001 06:22:18 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Accused Spy Wanted to Work for Anti-Hacker Computer Firm
Accused FBI turncoat Robert Hanssen wanted to
retire into a job selling anti-hacker technology
to the government _ to guard against double agents
_ a former CIA director said Thursday. James
Woolsey, who led the CIA under former President
Bill Clinton, said Hanssen pushed for a job with
Invicta Networks, a firm founded by Soviet KGB
defector Viktor Sheymov to develop hack-proof
computer software for U.S. spy agencies.
http://www.nydailynews.com/2001-02-23/News_and_Views/Beyond_the_City/a-10092=208.asp

Hong Kong Computer Crimes Grow 10 Times in 2 Years
Hong Kong's computer-related criminal cases
increased 10 times in the past two years.
Hacker break-ins increased the most, and more
than a third of arrested computer criminals
are younger than 18. In order to crack down
on computer-related crime, the police hope to
quadruple its staff from the current 17 to 70
this year to better investigate computer crime.
In addition, the police will set up its own
computer diagnostic institute and acquire more
computer software, hardware and investigation
equipment, reported Zaobao.com on Feb. 21.
http://www.chinaonline.com/topstories/010223/1/C01022008.asp

Beijing police pull plug on illegal Internet caf=E9s
Beijing police have recently been cracking down
on illegal Internet caf=E9s, fining those that
operate without official approval. On Feb. 17,
officers from the Department of Science,
Technology, Information and Communications at
the Beijing Public Security Bureau=92s Chaoyang
District Bureau Branch scouted the district
for illegal Internet caf=E9s.
http://www.chinaonline.com/topstories/010223/1/C01021611.asp

Terrorist Act will not deter hackers
Act unlikely to catch most hackers, despite its
new cybercrime provisions Legal and technical
experts say that the new Terrorism 2000 Act,
which encompassed computer hacking for the first
time, is unlikely to tackle the most common types
of hacking or deter ordinary hackers. The Act
broadens the definition of terrorism to include
actions that "seriously interfere with or
seriously disrupt an electronic system" where
there is an intent "to influence the government
or to intimidate the public".
http://www.zdnet.co.uk/news/2001/7/ns-21151.html

Microsoft Tells How Hacker Got Access to Secret Source Code
A top Microsoft executive revealed yesterday how
a hacker was able to view some of the company's
top-secret source code last October, shedding
light on a notorious attack that raised concern
worldwide about network security. A hacker gained
broad access because an employee forgot to create
a password when configuring a server, leaving the
password blank, said Bob Herbold, Microsoft
executive vice president and chief operating officer.
http://www.antionline.org/2001/02/24/krtbn/0000-0291-SE-MICROSOFT.html

Teen-age Norwegian computergeek: A villain to Hollywood, a hero to hackers
In the basement of an old farmhouse deep in the
Norwegian countryside, a 15-year-old computer geek
named Jon Lech Johansen pecked out the finishing
touches on a piece of programming that had been
keeping him busy after school and homework. Jon
says he didn't realize it at the time, but when
he pressed 'enter' on his keyboard 16 months ago
and launched his handiwork into cyberspace, he
was setting off an intercontinental earthquake.
http://www0.mercurycenter.com/svtech/news/breaking/merc/docs/023590.htm

Kournikova's Godfather Speaks Out
[K]alamar, now going by the nickname [K], is the
creator of the VBS Worm Generator program used
by OnTheFly to create the SST/Anna worm.
[K] agreed to answer questions in an exclusive
interview with SecurityPortal. At[K]'s request,
his English has been slightly modified to make
it more readable =97 [K] was provided this document
for review prior to publication.
http://securityportal.com/articles/kspeaksout20010222.html

------------------------ Yahoo! Groups Sponsor ---------------------~-~>
eGroups is now Yahoo! Groups
Click here for more details
http://us.click.yahoo.com/kWP7PD/pYNCAA/4ihDAA/kzAVlB/TM
---------------------------------------------------------------------_->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/