[iwar] news

From: Fred Cohen (fc@all.net)
Date: 2001-04-12 06:42:18

Return-Path: <sentto-279987-1136-987082943-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Thu, 12 Apr 2001 06:43:07 -0700 (PDT)
Received: (qmail 30828 invoked by uid 510); 12 Apr 2001 12:43:23 -0000
Received: from ci.egroups.com ( by with SMTP; 12 Apr 2001 12:43:23 -0000
X-eGroups-Return: sentto-279987-1136-987082943-fc=all.net@returns.onelist.com
Received: from [] by ci.egroups.com with NNFMP; 12 Apr 2001 13:42:23 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_1_1); 12 Apr 2001 13:42:22 -0000
Received: (qmail 83132 invoked from network); 12 Apr 2001 13:42:19 -0000
Received: from unknown ( by m8.onelist.org with QMQP; 12 Apr 2001 13:42:19 -0000
Received: from unknown (HELO all.net) ( by mta2 with SMTP; 12 Apr 2001 13:42:19 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id GAA09231 for iwar@onelist.com; Thu, 12 Apr 2001 06:42:18 -0700
Message-Id: <200104121342.GAA09231@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 12 Apr 2001 06:42:18 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

A Chinese Call to Hack U.S.  Chinese crackers are being encouraged to
"hack the USA" in retaliation for the mid-air collision between a U.S. 
spy plane and a Chinese fighter jet which claimed the life of a Chinese
pilot.  Websites such as KillUSA.com and Sohu are filled with messages
pointing to proposed cracking targets such as the United States' Defense
Technical Information Center and the Defense Department's news site,
along with encouragement to "Hack it Great Chinese!!!" But despite all
the calls for cyber-retaliation, the only incident that can be
officially connected with the standoff is a crack of an obscure U.S. 
Navy website.  http://www.wired.com/news/politics/0,1283,42982,00.html

DOD creates cybercrimes position The Defense Department has created a
senior executive service position to oversee its computer forensics
laboratory and investigator training program.  The 30-day Office of
Personnel and Management notice for an executive director of the Defense
Cybercrimes Center will come out within a week, said Brig.  Gen. 
Francis Taylor, commanding general of the Air Force Office of Special
Investigations.  In supervising as many as 80 employees and a $12.5
million budget, the director will lay out a long-term strategy for the
center, including how to best serve nearly 3,800 DOD law enforcement
special agents who take courses with the Department of Defense Computer
Investigations Training Program and send materials to the Air Force=92s
forensics lab for examination, he said. 

FSB: U.S.  Tried to Recruit Hacker Staff Writer The Federal Security
Service said Tuesday that intelligence officers at the U.S.  Embassy in
Moscow tried to recruit a young Russian hacker to try to break into its
computer network.  While declining to provide details, an FSB officer
confirmed a report by the Moskovsky Komsomolets newspaper Tuesday that
said the 20-year- old hacker was offered $10,000 to hack into the FSB
network in January, but he changed his mind after a sleepless night and
turned himself in.  The U.S.  Embassy declined to comment on the
allegation.  The alleged recruitment attempt comes as Russia and the
United States are embroiled in a spying scandal that kicked off in
February when the FBI charged veteran agent Robert Philip Hanssen with
spying for Russia.  Then in March, the United States threatened to expel
50 Russian diplomats for espionage.  Russia said it would respond in

Fear of a Hacked Planet A new cure for cybercrime may be worse than the
disease.  Uncle Sam subjects new drugs to thorough scrutiny before
approving them.  Were he equally careful with new laws, people wouldn't
wonder whether his top hat and beard conceal Big Brother underneath.  At
issue: the Council of Europe's Cybercrime Convention, which, said former
deputy associate attorney general Ethan M.  Posner during congressional
testimony in May 2000, "will define cybercrime offenses and address such
topics as jurisdiction, international cooperation, and search and
seizure." Not to mention threatening the rights of individuals and
businesses worldwide, according to numerous opposition groups including
the American Civil Liberties Union and the Center for Democracy &
Technology, or CDT.  To date, the U.S.  Department of Justice has been
supportive of the Cybercrime Convention as a means to better address the
global dimension of cybercrime.  If deliberations can be concluded by
June 2001 as planned, then the international treaty will be open to
ratification by all countries, including the United States. 

RSA show pushes for global Web patrol If a Web site in Israel breaks
Italian laws, does the Italian Supreme Court have the right to shut it
down? Or if a U.S.  site sells Nazi material on a site that could be
accessed by French citizens, does a French court have the right to ban
them from doing so? The answer so far in both of those cases, it would
appear, is yes.  As more people jump online worldwide, the number of
cybercases involving cross-border jurisdiction is rapidly increasing,
but the methods of resolving such disputes are far from
consistent--partly because the languages, cultures and laws of the
countries involved can be so radically different, according to panelists
here at the RSA Conference 2001. 

The Hacker Did Us a Favor "CyberCrime's" cohost asks if hackers help
make the Internet more secure.  I am sitting in Edwin Gould's living
room motioning with my hands for him to stop talking.  I glance over at
the audio technician, who's rolling his eyes as we stop the interview
for the third time in as many minutes and wait for a bus to pass.  It is
a challenging interview, not only because of the bus stop stationed on
the street just outside the living room, but because Gould is not what I
expected.  Although I had spoken to him over the phone prior to our
interview, I was not fully prepared for what he had to say.  Here was an
older American, victimized by a hacker who wanted to expose security
holes in the University of Washington Medical Center patient database. 
Gould's name and address were exposed, along with his social security
number, date of birth, hospital number, and the name of his doctor. 

------------------------ Yahoo! Groups Sponsor ---------------------~-~>
Find software faster. Search more than 20,000
software solutions on KnowledgeStorm. Register
now and get started.


Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 

This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:08 PDT