[iwar] news


From: Fred Cohen
To: Information Warfare Mailing List
From: fc@all.net
To: iwar@onelist.com

Thu, 29 Mar 2001 17:31:16 -0800 (PST)


fc  Thu Mar 29 17:32:08 2001
Return-Path: 
Delivered-To: fc@all.net
Received: from 204.181.12.215
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Thu, 29 Mar 2001 17:32:08 -0800 (PST)
Received: (qmail 22245 invoked by uid 510); 30 Mar 2001 01:31:59 -0000
Received: from mq.egroups.com (208.50.144.79)
  by 204.181.12.215 with SMTP; 30 Mar 2001 01:31:59 -0000
X-eGroups-Return: sentto-279987-1083-985915879-fc=all.net@returns.onelist.com
Received: from [10.1.4.54] by mq.egroups.com with NNFMP; 30 Mar 2001 01:31:19 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_0_4); 30 Mar 2001 01:31:18 -0000
Received: (qmail 1399 invoked from network); 30 Mar 2001 01:31:17 -0000
Received: from unknown (10.1.10.26) by l8.egroups.com with QMQP; 30 Mar 2001 01:31:17 -0000
Received: from unknown (HELO all.net) (65.0.156.78) by mta1 with SMTP; 30 Mar 2001 01:31:17 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id RAA21625 for iwar@onelist.com; Thu, 29 Mar 2001 17:31:16 -0800
Message-Id: <200103300131.RAA21625@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Thu, 29 Mar 2001 17:31:16 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Military Fears Attacks from Cyberspace
The U.S. military's space chief said he is
worried about China's growing capability to
conduct computer warfare against U.S. military
networks, The Washington Times reported
Thursday. "It concerns us when we see these
capabilities out there," said Air Force Gen.
Ralph E. Eberhart. He said North Korea, Iran,
Iraq and other nations are working on cyber
attack capabilities that threaten the U.S.
military's increasing reliance on information
systems. Like the use of satellites for
communications, "we've become so reliant on
our computer systems, our information, and as
we train and exercise and are involved in these
contingency operations, we've come to take those
capabilities . . . for granted," he said. U.S.
intelligence officials have said China has
conducted military exercises involving
information attacks. China also is suspected of
conducting some computer attacks on Taiwan's
computer infrastructure.
http://kevxml.infospace.com/info/kevxml?kcfg=upi-article&sin=200103290320180 
004563&otmpl=/upi/story.htm&qcat=news&rn=29417&qk=10&passdate=03/29/2001

Pentagon can't share wireless air
A Commerce Department study says that the
U.S. Defense Department can't share its
spectrum with the wireless industry and
can't shift key communications activities
to other airwaves until 2017 without
jeopardizing national security, according
to a report citing unnamed sources familiar
with the study. The report by Commerce's
National Telecommunications & Information
Administration, expected Friday, reinforces
the Pentagon's opposition to sharing or
relinquishing the airwaves for so-called
third-generation wireless services, The
Washington Post said. The spectrum would be
used for high-speed Internet communications
to mobile phones and handheld computers, the
paper reported. The Defense Department uses
the spectrum to communicate with satellites
and field installations, the paper said.
http://news.cnet.com/news/0-1004-200-5376385.html

VA picks cybersecurity chief
The Department of Veterans Affairs has named
Bruce Brody to help secure the agency's systems.
Brody started his job this week as associate
deputy assistant secretary for cybersecurity.
Most recently, he was director of the Defense
Department's Information Superiority Investment
Strategy, which was responsible for making budget
recommendations for DOD's information superiority
efforts. The VA is "among a handful of agencies"
that have hired a senior executive to lead
cybersecurity efforts; it indicates the attention
being given the issue, said Robert Bubniak, the
VA's associate deputy assistant secretary for
telecommunications. Brody will work under the VA
chief information officer.
http://www.fcw.com/fcw/articles/2001/0326/web-va-03-29-01.asp

War driving - the latest hacker fad
The introduction of wireless networking has
spawned a fresh sub-culture in the digital
underground. It has brought script kiddies
out of their bedrooms and onto the roads.
War dialling, the hacking practice of
phoning up every extension of a corporate
phone network until the number associated
with a firm's modem bank is hit upon, has
been replaced by war driving with the
introduction of wireless LANS. Our source
tell us that war driving, which is apparently
particular popular in Silicon Valley, involves
motoring between likely target firms with a PC
fitted with a LAN card and trying to break
into their networks. Giving the flakey state
of wireless security models this is normally
childishly simple with even basic cracking
tools.
http://www.theregister.co.uk/content/8/17976.html

What fuels the mind of a hacker?
Temple Grandin recalls the sense of recognition
she felt when she saw notorious computer hacker
Kevin Mitnick being interviewed on 60 Minutes
about a year ago. Casual viewers may have noticed
Mitnick's mannerisms a twitchy lack of poise,
inability to look people in the eye, stunted
formality in diction and obsessive interest in
technology but Grandin saw something else:
possible signs of Asperger syndrome, or AS.
Grandin, professor of animal science at Colorado
State University and an internationally respected
authority on the meat industry, is perhaps the
world's best-known sufferer of AS. She recognized
those traits and others exhibited by Mitnick as
typical of the syndrome, a recently identified
disorder closely associated with autism.
http://www.usatoday.com/life/cyber/tech/2001-03-29-hacker.htm

------------------------ Yahoo! Groups Sponsor ---------------------~-~>
Secure your servers with 128-bit SSL encryption!
Grab your copy of VeriSign's FREE Guide,
"Securing Your Web site for Business." Get it now!
http://us.click.yahoo.com/KVNB7A/e.WCAA/bT0EAA/kzAVlB/TM
---------------------------------------------------------------------_->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/