[iwar] news


From: Fred Cohen
To: Information Warfare Mailing List
From: fc@all.net
To: iwar@onelist.com

Tue, 6 Mar 2001 08:06:49 -0800 (PST)


fc  Tue Mar  6 08:09:33 2001
Return-Path: 
Delivered-To: fc@all.net
Received: from 204.181.12.215
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Tue, 06 Mar 2001 08:09:33 -0800 (PST)
Received: (qmail 11153 invoked by uid 510); 6 Mar 2001 16:05:40 -0000
Received: from hi.egroups.com (208.50.99.211)
  by 204.181.12.215 with SMTP; 6 Mar 2001 16:05:40 -0000
X-eGroups-Return: sentto-279987-1011-983894812-fc=all.net@returns.onelist.com
Received: from [10.1.4.54] by hi.egroups.com with NNFMP; 06 Mar 2001 16:06:53 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_0_4); 6 Mar 2001 16:06:52 -0000
Received: (qmail 18947 invoked from network); 6 Mar 2001 16:06:50 -0000
Received: from unknown (10.1.10.26) by l8.egroups.com with QMQP; 6 Mar 2001 16:06:50 -0000
Received: from unknown (HELO all.net) (65.0.156.78) by mta1 with SMTP; 6 Mar 2001 16:06:50 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id IAA22047 for iwar@onelist.com; Tue, 6 Mar 2001 08:06:49 -0800
Message-Id: <200103061606.IAA22047@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Tue, 6 Mar 2001 08:06:49 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Hacker Gets Hold of Top Secret U.S. Space Codes
An unidentified computer hacker has got hold
of top secret U.S. computer system codes for
guiding space ships, rockets and satellites,
a lawyer in Sweden said on Friday. Computer
experts raided the offices of an information
technology company in Stockholm last month
and found a copy of the source codes for the
software program OS/COMET developed by U.S.
firm Exigent Software Technology, Johan
Starell, legal counsel for Exigent in Sweden,
told Reuters. A source code contains full
details of how a software program works.
OS/COMET has been deployed by the U.S. Air
Force on the NAVSTAR Global Positioning
System (GPS) Colorado Springs Monitor Station,
Exigent said in a statement in December.
http://my.aol.com/news/news_story.psp?type=1&cat=0200&id=0103020933120301
http://www.zdnet.com/zdnn/stories/newsbursts/0,7407,2692028,00.html
http://www.zdnet.com/zdnn/stories/news/0,4586,2692296,00.html
http://www.techtv.com/cybercrime/story/0,23158,3314771,00.html
http://www.newsbytes.com/news/01/162665.html

Brussels plays down cipher unit security breach
The European Commission tried to calm down
suspicions about links between its cipher
unit and the US intelligence service, the
National Security Agency (NSA). Suspicions
were raised after the testimony of an British
EU official became known, suggesting that the
NSA had access to the Commission's security
systems.
http://www.thestandardeurope.com/article/display/0,1151,15267,00.html

SETI project slowed by copper thieves
The search for life in outer space hit a snag
earlier this week when the SETI@Home project
ran into some very terrestrial problems. A
group of vandals apparently disrupted cables
in the SETI@Home network while searching for
valuable copper wire. The SETI project uses a
distributed computing model to search for
signs of extraterrestrial life. The University
of California at Berkeley (U.C. Berkeley) began
the effort as a way to make use of idle computing
resources from users around the world.
http://www.cnn.com/2001/TECH/internet/03/02/seti.cable.idg/index.html

Congress wants proof that agencies protect against hackers
[FC - me too...]
A congressional subcommittee asked 15 federal
agencies Friday to report how they've been
testing and securing their computer systems
from outside attack. Under a federal law passed
last year, agencies have to do their own security
testing and hire an outside auditor to do
``penetration testing,'' in which hackers are
paid to try to break into a network. Its passage
came amid a flurry of reports that federal
computers were open to devastating attacks.
http://www.siliconvalley.com/docs/news/tech/071280.htm
http://news.cnet.com/news/0-1005-200-5005739.html

Lawmaker Grills Officials About Agency Cyber-Security
Putting federal agencies on alert about computer
security, an influential lawmaker today sent
letters to 15 agency heads reminding the
officials of their duties to protect the
electronic infrastructure under their
control. "The law requires each Federal
agency to develop, implement, and review a
comprehensive agency-wide security program
that includes periodic assessments of security
risks to information systems and data supporting
its critical operations," Rep. James Greenwood,
R-Pa., wrote in a letter to the agency heads.
http://www.newsbytes.com/news/01/162658.html

CIA using 'data Mining' Technology to find nuggets
The CIA, faced with a daily avalanche of
information, is using new ``data mining''
technology to find useful nuggets within
thousands of documents and broadcasts
in different languages. The spy agency
must sift through a barrage of information
from both classified and unclassified
sources in varied formats such as hard text,
digital text, imagery, and audio in more
than 35 languages. The Office of Advanced
Information Technology (AIT), part of the
CIA's Directorate of Science and Technology,
is focused on finding solutions to the
``volume challenge.''
http://www.siliconvalley.com/docs/news/reuters_wire/915432l.htm

Domain Name System security still lax
Companies rushed to upgrade Domain Name System
software after warnings were issued in late
January about a flaw in widely used DNS software.
In the past weeks, however, upgrading has come
to a halt, concludes the Iceland DNS consultancy
and software firm Men & Mice. Men & Mice tested
the DNS systems for the Web sites of Fortune 1000
companies and random, .com domains at set dates
after the alerts were released. The results were
made public on the company's site. The Computer
Emergency Response Team (CERT) at Carnegie Mellon
University, meanwhile, said this week that it
has begun receiving reports of Berkeley Internet
Name Domain (BIND) holes being successfully exploited.
http://www.cnn.com/2001/TECH/internet/03/02/lax.on.DNS.idg/index.html

Persistent hacker evades Microsoft security
A leading Microsoft executive has admitted
that an individual who broke into the Microsoft
security system last October was able to roam
around for 10 to 14 days before being caught.
Bob Herbold, a chief operating officer, told
an audience at the University of Washington
Business School that the hacker had gained
access because an employee inadvertently left
a password blank when configuring a server.
http://www.computerweekly.com/cwarchive/daily/20010302/cwcontainer.asp?name= 
C5.HTML&SubSection=6&ct=daily

SafeWeb Offers Triangle Boy Source Code
Online privacy company SafeWeb has released
the source code of its Triangle Boy client,
a peer-to-peer application that the company
said prevents anyone, such as corporations,
governments, and schools, from blocking access
to SafeWeb. The initial beta release of
Triangle Boy can be download directly from
the SafeWeb Web site at http://www.safeweb.com .
SafeWeb's technology lets users surf the Web
anonymously and "protect themselves against
intrusions into their online activities and
communications..." by acting as an intermediary,
encrypting all data transmitted between an
individual's computer and the Web sites visited. 	
http://www.newsbytes.com/news/01/162638.html

------------------------ Yahoo! Groups Sponsor ---------------------~-~>
Find software faster. Search more than 20,000
software solutions on KnowledgeStorm. Register
now and get started.
http://us.click.yahoo.com/ncHzAA/yMSCAA/7f4EAA/kzAVlB/TM
---------------------------------------------------------------------_->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/