[iwar] news

From: Fred Cohen (fc@all.net)
Date: 2001-04-26 08:20:48


Return-Path: <sentto-279987-1160-988298461-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Thu, 26 Apr 2001 08:22:07 -0700 (PDT)
Received: (qmail 26661 invoked by uid 510); 26 Apr 2001 14:22:18 -0000
Received: from hk.egroups.com (208.50.99.220) by 204.181.12.215 with SMTP; 26 Apr 2001 14:22:18 -0000
X-eGroups-Return: sentto-279987-1160-988298461-fc=all.net@returns.onelist.com
Received: from [10.1.4.55] by hk.egroups.com with NNFMP; 26 Apr 2001 15:21:01 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_1_2); 26 Apr 2001 15:21:00 -0000
Received: (qmail 82812 invoked from network); 26 Apr 2001 15:20:50 -0000
Received: from unknown (10.1.10.142) by l9.egroups.com with QMQP; 26 Apr 2001 15:20:50 -0000
Received: from unknown (HELO all.net) (65.0.156.78) by mta3 with SMTP; 26 Apr 2001 15:20:48 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id IAA24355 for iwar@onelist.com; Thu, 26 Apr 2001 08:20:48 -0700
Message-Id: <200104261520.IAA24355@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 26 Apr 2001 08:20:48 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

British defence ministry refuses comment on spy bugs report Britain's

defence ministry on Monday refused to confirm or deny press reports
which said that some 30 electronic listening devices had been discovered
at ministry headquarters.  "It is not our policy to comment on
security," a ministry spokeswoman said.  She also refused to comment on
a report by the Daily Telegraph that implicated French firms in the
bugging scandal, alleging that the bugs were planted for the purpose of
industrial espionage.  The bugs were discovered during a rearrangement
of the office in the centre of London, according to information
published by the Sunday Times. 
http://63.108.181.201/2001/04/23/ANA/0560-0498-Britain-security....html

Army casts Internet filter The Army will field Internet filtering
software at 100 facilities worldwide by June 1, possibly the largest
such deployment in history, industry sources say.  The software falls
under a networking contract awarded in February.  As part of the initial
rollout, the Army will install Websense Inc.=92s Enterprise software to
manage the Internet use of more than 500,000 employees in the United
States, Europe and the Pacific region.  The software can block workers
from surfing undesirable Web sites gambling, pornography or personal
shopping sites, for example.  Sites can be blocked completely or just at
certain times, such as during business hours. 
http://www.fcw.com/fcw/articles/2001/0423/news-army-04-23-01.asp

SDMI cracks revealed The academic cracker crew led by Princeton
University Computer Science Professor Edward Felten, which answered the
HackSDMI public challenge of last September with 'unqualified' results,
has received veiled threats of criminal prosecution under the Digital
Millennium Copyright Act (DMCA) from the SDMI Foundation in hopes that
the team will be cowed into withholding what it's learned from an
upcoming computer science conference.  "Any disclosure of information
gained from participating in the Public Challenge....could subject you
and your research team to actions under the Digital Millennium Copyright
Act," SDMI Foundation mouthpiece Matthew Oppenheim warns in a letter to
the Felten team.
http://www.theregister.co.uk/content/8/18434.html

A335,000 hacking challenge cracked Challenge backfire as hackers crack
challenge within 24 hours, and Solaris gets the blame.  A team of
computer hackers has captured =A335,000 for hacking into a computer
system just twenty-four hours after the competition began.  The hack is
likely to be a major embarrassment for the company behind the
high-profile hacking comptetion, despite its assertion that the break in
has highlighted a major new vulnerability in the Solaris operating
system running on Intel x86 microprocessors.  Argus Systems organised
the competition -- to break into a Web server locked down using its
security product called PitBull -- to promote its products and to
coincide with the start of Infosec, the UK's premier computer security
event.
http://www.zdnet.co.uk/news/2001/16/ns-22388.html

Will the Real Hackers Stand Up?
http://www.wired.com/news/technology/0,1282,43190,00.html

[FC - when the prizes start getting realistic, the attackers start winning.]

Warning Issued Against Fast-Spreading Hacking Worm An information
security institute reported a new hacking tool that is spreading quickly
between companies and personal computers in Korea.  The Korea
Information Security Agency (KISA) said yesterday the worm, known as
Carko, is similar in potency to last year's worm that severely damaged
some high-profile websites such as Yahoo! and CNN.  The agency's
computer forensics experts expressed concern that cases of the new virus
will increase just as distributed denial-of-service (DDoS) tools did
last year.  DDoS tools can flood a single website or Internet server
with so much data, and from so many sources that the computer
effectively would disappear from Internet. 
http://www.korealink.co.kr/kt_tech/200104/t2001042417422445110.htm

FBI uses reverse hacking to catch Russians Two men have been indicted in
what news reports described as a Russian computer hacking ring that
victimized banks and other businesses through extortion and the theft of
credit card numbers.  Alexey Ivanov, 20, and Vasiliy Gorshkov, 25, were
arrested after the FBI established a bogus Internet security firm called
"Invita," let the men hack into it and then lured them to the United
States to apply for jobs, according to a 20-count federal grand jury
indictment. 
http://www.cnn.com/2001/TECH/internet/04/24/russia.hacking.ap/index.html
http://www.msnbc.com/news/563379.asp

Scientists detail Web-based terrorist surveillance Tracking system used
at Democratic Convention As Democrats gathered in Los Angeles last
summer to nominate Al Gore for president, health officials were quietly
using a new, Web-based tracking system to watch for biological
terrorism.  The network linked 11 hospital emergency rooms, an airport
and federal health officials, who checked a secure Internet site as
often as every hour to detect signs of bacteria circulated to spread
deadly disease.
http://www.msnbc.com/news/563795.asp

US and Chinese hackers plan to launch a cyberwar Despite the present
impasse in diplomatic talks between China and the United States over the
spy plane, computer-savvy citizens from both countries have begun to
wage their own hacking war on the Internet.  Chinese hackers are vowing
to retaliate with a week -long attack on US-based websites and computer
networks, starting May 1.  American hackers are also advocating an
assault on websites hosted in China, and claim that hundreds of Chinese
websites have already been disrupted.  Messages posted on some
underground Internet chat rooms indicate that US hackers plan to
continue the blitz they have dubbed the "China Killer." And Chinese
hackers are promising to respond in kind. 
http://www1.chinadaily.com.cn/bw/2001-04-24/2147.html


------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:09 PDT