[iwar] News


From: Fred Cohen
To: Information Warfare Mailing List
From: fc@all.net
To: iwar@onelist.com

Thu, 29 Mar 2001 07:14:49 -0800 (PST)


fc  Thu Mar 29 07:16:08 2001
Return-Path: 
Delivered-To: fc@all.net
Received: from 204.181.12.215
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Thu, 29 Mar 2001 07:16:08 -0800 (PST)
Received: (qmail 28205 invoked by uid 510); 29 Mar 2001 15:16:20 -0000
Received: from ck.egroups.com (208.50.144.69)
  by 204.181.12.215 with SMTP; 29 Mar 2001 15:16:20 -0000
X-eGroups-Return: sentto-279987-1078-985878941-fc=all.net@returns.onelist.com
Received: from [10.1.4.56] by ck.egroups.com with NNFMP; 29 Mar 2001 15:15:41 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_0_4); 29 Mar 2001 15:15:39 -0000
Received: (qmail 83798 invoked from network); 29 Mar 2001 15:14:50 -0000
Received: from unknown (10.1.10.142) by l10.egroups.com with QMQP; 29 Mar 2001 15:14:50 -0000
Received: from unknown (HELO all.net) (65.0.156.78) by mta3 with SMTP; 29 Mar 2001 16:15:54 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id HAA15659 for iwar@onelist.com; Thu, 29 Mar 2001 07:14:49 -0800
Message-Id: <200103291514.HAA15659@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Thu, 29 Mar 2001 07:14:49 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] News
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

March 27, 2001

Teen convicted of hacking military computers
A teenage hacker nabbed by an Army cybercrimes
investigative unit has been sentenced to a year
in prison and ordered to pay $15,000 to his
victims. Dennis Moran, known as Coolio, now 18
years old and a resident of New Hampshire,
successfully hacked three Army servers, an Air
Force server, and two private sector computers.
The military servers were domain name servers,
key computers that direct network traffic and
function as the white pages of the Internet,
said David Shaver, a special agent with the
Army Criminal Investigative Command=92s Computer
Crime Investigative Unit, based at Fort Belvoir,
Va. When hackers get unrestricted access to
such servers they can redirect network traffic
anywhere they wish, said Shaver.
http://www.govexec.com/dailyfed/0301/032601j1.htm

Hate From Abroad
When a 13-year-old Michigan boy named Bradley
first visited an Internet chat room several
years ago, he expected to meet some new friends.
Instead, he met a racist. "I was on my computer
in a chat room and, out of the blue, someone
asked me if my grandparents were one of the six
million," Bradley told "CyberCrime" cohost
Jennifer London. "I didn't know how to respond,
and I said, 'No, they survived.' And then the
next statement that appeared on my screen said,
'Oh, that's too bad.' And that remark puzzled me,
so I then asked what was meant by that statement
and the person wrote 'any Jew that survived was
a mistake and now you are here.'" When Bradley
next checked his email, he found more than
1,500 messages from someone named Adolph, Jr.
http://www.techtv.com/cybercrime/viceonline/story/0,23008,3317938,00.html

Don't Talk to Strangers
http://www.techtv.com/cybercrime/viceonline/story/0,23008,3318314,00.html

Bush team opposes proposed euro privacy rules
The Bush administration is objecting strongly
to a set of proposed European Commission privacy
rules that could hurt transatlantic e-commerce,
the Wall Street Journal reported in its online
edition Tuesday. In a March 23 letter to a top
commission official, the Commerce and Treasury
Departments said the proposed rules ''impose
unduly burdensome requirements that are
incompatible with real-world operations,''
according to the report. At issue are proposed
``standard clauses'' for contracts between U.S.
and European firms that would obligate U.S.
firms to operate under European Union privacy
standards, which are much stricter than U.S.
law, the paper said.
http://www.siliconvalley.com/docs/news/reuters_wire/1011335l.htm
http://www.zdnet.com/zdnn/stories/news/0,4586,2701370,00.html
http://www.techtv.com/news/politicsandlaw/story/0,23008,3318829,00.html

UN to Devise Strategy for Global E-Security
Delegates from the United Nations' 189 member
countries this week will meet with
representatives from the U.S. high-tech
industry to devise new strategies for dealing
with Internet crime and global e-commerce
security requirements. However, to ensure a
coherent global strategy, world leaders must
be better educated about the need for global
security standards and the threat that cybercrime
poses to the global economy, said Percy Mangoaela,
the UN ambassador from Lesotho.
http://www.computerworld.com/cwi/stories/0,1199,NAV47-68-84-88_STO58959,00.=
html

Europe to create cybercrime forum
http://www.theregister.co.uk/content/6/17905.html

SEALAND: MAN-MADE NATION TOUTS PRIVACY
As countries go, Sealand isn't much. It's cold,
cramped and utterly devoid of natural resources.
In fact, the entire nation state is confined to
a 6,000-square-foot steel deck and a pair of
hollow concrete towers that anchor it to the
floor of the North Sea, 6 miles off the coast
of England. It lacks many things--like soil, for
example--that most countries take for granted.
What Sealand does have, however, is the world's
most secure Web server. It's got a bunch of them,
actually, crammed into those concrete towers and
connected to the Net by high-speed satellite and
wireless links.
http://chicagotribune.com/business/businessnews/article/0,2669,SAV-0103260237,FF.html

Security: an uneasy alliance
JUST AS THE federal government was beginning to
enlist a sometimes-reluctant private sector to
share details about information system intrusions
that could affect national security, it seems
that the Bush administration has come to town
armed with new ideas. Despite ongoing efforts by
the FBI and other government agencies to share CIP
(critical infrastructure protection) information
with businesses, the new administration has yet
to recommit the Clinton administration's
initiatives in government-industry collaboration.
In fact, sources say Bush may move the CIP
operations to the Department of Defense and out
of the National Security Council, which could
scare off companies that have begun to share
information about possible system vulnerabilities
with the government.
http://www.infoworld.com/articles/hn/xml/01/03/26/010326hnpartners.xml

Animated Response to Security
Imagine working in a place where your desktop
computer restricts access. No personal e-mail.
No Internet. Imagine rules enforced where --
not only are you not allowed to tell outsiders
what goes on within your walls -- you're not
even allowed to tell colleagues working at the
same place on the very same project. Tough new
security precautions at the FBI? Nope. Just
standard procedure in the paranoid world of
animation. "We don't want the rug taken out
from under us," said Ken Schretzmann, an editor
at Pixar Animation Studios. Animators say tight
security is necessary in the business, in large
part because much of a film's success is dependent
on how fresh the latest technology or innovation is.
http://www.wired.com/news/culture/0,1284,42578,00.html

Security outside the security net
The last few weeks have been full of stories of
new and re-emerging viruses and other technical
forms of attack on companies' security. Less
publicised has been a growing number of forms
of attack on all-important company and brand
image that fall outside the usual security net.
There's not a lot more to say about the recent
spate of virus attacks. The usual number of dozy
users can be expected to open email attachments
from unknown sources and the usual number of
sites can be expected to have failed to implement
patches available for known security weaknesses.
http://www.it-director.com/article.asp?id=3D1682

Hacker Nation
Computer intrusions have more than tripled
in the last two years. Who are the people
trying to get their hands on your data,
and why? We got answers from some experts
--including hackers themselves. He couldn't
be more than 12 years old--a "tween," in
the parlance of the Britney Spears generation.
But that doesn't stop him from possessing the
swagger of a pop star as he takes a swig of
Jolt Cola, stubs out a cigarette, and squints
at the screen that has held his attention for
the past 6 hours. With the sides of his scalp
shaved bare, he resembles a Mad Max ruffian
perched amidst yards of cable and tables
piled high with jury-rigged circuit boards,
souped-up laptops, and phone-surveillance
equipment. He's one of hundreds of hackers who
have turned the Alexis Park Resort in Las Vegas
into a makeshift commando station for the
annual hackers convention, Def Con (from the
military's term for its levels of alertness).
http://www.pcworld.com/features/article/0,aid,44544,00.asp

Mr. President, cybercrime is much more than just
a pesky computer virus
WHEN WE THINK of cybercrime, we tend to think
of the latest pesky computer virus or some
socially undeveloped individual trying to hack
into a government Web site. The truth is that
cybercrime is serious stuff, and a real threat
to any business with a presence on the Internet.
Therefore, my plea to President Bush is to enforce
law and order on the Web. Cybercriminals know that
a corporation's information about its customers,
as well as a company's intellectual capital, can
be sold on the open market.
http://www.infoworld.com/articles/op/xml/01/03/26/010326opgartner.xml

------------------------ Yahoo! Groups Sponsor ---------------------~-~>
Secure your servers with 128-bit SSL encryption!
Grab your copy of VeriSign's FREE Guide,
"Securing Your Web site for Business." Get it now!
http://us.click.yahoo.com/4cW4jC/e.WCAA/bT0EAA/kzAVlB/TM
---------------------------------------------------------------------_->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/