[iwar] news


From: Fred Cohen
To: Information Warfare Mailing List
From: fc@all.net
To: iwar@onelist.com

Tue, 13 Mar 2001 12:16:24 -0800 (PST)


fc  Tue Mar 13 12:16:36 2001
Return-Path: 
Delivered-To: fc@all.net
Received: from 204.181.12.215
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Tue, 13 Mar 2001 12:16:36 -0800 (PST)
Received: (qmail 22025 invoked by uid 510); 13 Mar 2001 20:15:03 -0000
Received: from ei.egroups.com (64.211.240.237)
  by 204.181.12.215 with SMTP; 13 Mar 2001 20:15:03 -0000
X-eGroups-Return: sentto-279987-1025-984514587-fc=all.net@returns.onelist.com
Received: from [10.1.4.52] by ei.egroups.com with NNFMP; 13 Mar 2001 20:16:27 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_0_4); 13 Mar 2001 20:16:26 -0000
Received: (qmail 52702 invoked from network); 13 Mar 2001 20:16:25 -0000
Received: from unknown (10.1.10.26) by m8.onelist.org with QMQP; 13 Mar 2001 20:16:25 -0000
Received: from unknown (HELO all.net) (65.0.156.78) by mta1 with SMTP; 13 Mar 2001 20:16:25 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id MAA12402 for iwar@onelist.com; Tue, 13 Mar 2001 12:16:24 -0800
Message-Id: <200103132016.MAA12402@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Tue, 13 Mar 2001 12:16:24 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Teacher jailed for anti-beijing banner on net
China has sentenced a teacher to two years'
jail for posting a banner critical of the
ruling Communist Party on the Internet, a
Hong Kong human rights group said on Monday.
The Nanchong City Intermediate People's Court
in central China's Sichuan province imposed
the sentence on Jiang Xihua for ``inciting to
subvert state power,'' the Information Center
for Human Rights & Democracy said in a
statement.
http://www.siliconvalley.com/docs/news/reuters_wire/950061l.htm

German Government Practices for Cyberwar
For the first time, Germany is going to practice
for a war held over the Internet. In the latest
edition of "Der Spiegel," the news magazine
reports that German authorities, major
corporations and the German Ministry of the
Interior want to follow the lead of their
American counterparts and take part in a
business game this year that simulates a
coordinated attack on German computer systems.
According to the magazine, the scenario envisions
that a "Mafia-like, internationally operating
group" wants to force Germany to "withdraw its
military contingent from Kosovo." To achieve
this goal, the band of criminals first penetrates
the computers of a Berlin energy supplier and
"brings the entire energy supply system to a
standstill for several hours."
http://www.internetnews.com/intl-news/article/0,,6_710251,00.html

E-mail encryption failing to catch on
Elana Kehoe doesn't like the idea of
governments and hackers reading her e-mail
as it traverses the Internet. So a few weeks
ago, she installed a tool to scramble her
messages. But she's having trouble using
Pretty Good Privacy encryption. She knows
of only four other PGP users, including her
husband, Brendan. That means everything else
goes through regular e-mail, which is as
private as sending a postcard. Kehoe has
tried to persuade friends to install the free
software, too, but they couldn't be bothered.
``Since I don't know that many people who use
PGP, I don't know what I can fully do with it
now,'' said Kehoe, a Dublin, Ireland, resident
visiting Cambridge for a computer conference
this past week.
http://www.siliconvalley.com/docs/news/tech/077230.htm
http://www.msnbc.com/news/542688.asp
http://www.usatoday.com/life/cyber/tech/2001-03-12-e-mail-encryption.htm

Group Charges Government Agencies Trade Personal Data
With some federal government agencies already
burned in the last year by revelations that
they plant cookies on Internet users' computers,
a new report from a privacy public-policy group
claims government agencies routinely trade
personal user information. Privacilla.org, an
online think-tank, in a report released today
said that "new government information-sharing
programs have been announced more than once
every two weeks."
http://www.newsbytes.com/news/01/163042.html

Putting The Web In A BIND
Late last month, a hacker calling himself Fluffy
Bunny attacked a Domain Name System server
belonging to McDonald's fast food restaurants
in England and redirected traffic to a dummy site
in the U.S. Visitors found the familiar golden
arches, but not much else looked the same. The
company name had been changed to McDick's, and,
along with some suspect menu choices, the hacker
had posted a repetitive description of his bunny
character, including "The Fluffy Bunny likes to
make babiez," and "The Fluffy Bunny is not
wearing any pantiez."
http://www.zdnet.com/intweek/stories/news/0,4164,2694514,00.html

The anti-piracy =91poison pill=92
Try to hack InTether, and it destroys the
document A small Austin start-up run by
intelligence community alums is parachuting
into the burgeoning, post-Napster, copy
protection market with a remarkably thin,
invisible software product that claims to
offer nearly invincible armor for music,
video, film and e-books alike. But the most
remarkable part is, it fights back at
would-be pirates. IF YOU TRY to hack it,
it destroys itself, explains company CEO
George Friedman.
http://www.msnbc.com/news/543124.asp

Inside Russia's Hacking Culture
Security experts were not surprised by the FBI's
warning last week that more than 1 million credit
card numbers have been stolen from e-commerce
websites in the last 12 months by crackers who
took advantage of a hole that could have been
patched with software that was made available
three years ago. But a bit of intrigue was added
to that report: Most of the dirty work was being
done by "organized hacking" groups in Russia and
the Ukraine. Security experts weren't surprised
about that, either. Many of their peers in the
Western world say Eastern Europe's computer
crackers and hackers are the most skillful in
the world -- far superior to the so-called
"script kiddies" who have gained a fair amount
of notoriety.
http://www.wired.com/news/culture/0,1284,42346,00.html

Russia's Cracking Addicts
Russian hackers who break into networks say they
do it for money, not love. (Wired Radio)
http://www.wired.com/news/technology/0,1282,42370,00.html

Web site attacks reflect systemic problems, security expert says
They don=92t all garner headlines, but successful
hacks of government Web sites are startlingly
common. A successful hack, said Alan Paller,
director of the SANS Institute of Bethesda, Md.,
is one in which the intruder manages to change
a page. Using reports found at a site that
tracks hacking incidents, www.attrition.org,
Paller calculated that in a four-month period
late last year, hackers altered as many as 75
.mil and .gov sites. Attrition listed 37, but
Paller figures its scans only find about 50
percent of the damaged sites. The number
reflects a systemic problem, not individual
errors by webmasters and systems administrators,
Paller said at the recent FedWeb conference at
the National Institutes of Health campus in
Bethesda. He pointed to Web server hardware
preloaded with operating systems as the source
of the problem.
http://www.gcn.com/vol1_no1/daily-updates/3788-1.html

TCP security flaw--an age-old problem
Researchers have found a serious flaw in one
of the key pieces of the Internet's software
backbone. But despite Monday's advisory, the
INS flaw is hardly a new problem. The architects
of the early Internet knew that the lack of
randomness in the way that INS (Initial Sequence
Numbers) are chosen would be a problem as far
back as the mid-1980s and warned of the potential
consequences.
http://www.zdnet.com/zdnn/stories/news/0,4586,2694878,00.html


------------------------ Yahoo! Groups Sponsor ---------------------~-~>
Find software faster. Search more than 20,000
software solutions on KnowledgeStorm. Register
now and get started.
http://us.click.yahoo.com/ncHzAA/yMSCAA/7f4EAA/kzAVlB/TM
---------------------------------------------------------------------_->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/