[iwar] news

From: Fred Cohen (fc@all.net)
Date: 2001-05-31 18:16:39


Return-Path: <sentto-279987-1273-991358203-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Thu, 31 May 2001 18:17:08 -0700 (PDT)
Received: (qmail 4954 invoked by uid 510); 1 Jun 2001 00:17:37 -0000
Received: from ej.egroups.com (64.211.240.230) by 204.181.12.215 with SMTP; 1 Jun 2001 00:17:37 -0000
X-eGroups-Return: sentto-279987-1273-991358203-fc=all.net@returns.onelist.com
Received: from [10.1.4.55] by ej.egroups.com with NNFMP; 01 Jun 2001 01:16:44 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_1_3); 1 Jun 2001 01:16:43 -0000
Received: (qmail 48840 invoked from network); 1 Jun 2001 01:16:39 -0000
Received: from unknown (10.1.10.27) by l9.egroups.com with QMQP; 1 Jun 2001 01:16:39 -0000
Received: from unknown (HELO all.net) (65.0.156.78) by mta2 with SMTP; 1 Jun 2001 01:16:39 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id SAA04760 for iwar@onelist.com; Thu, 31 May 2001 18:16:39 -0700
Message-Id: <200106010116.SAA04760@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 31 May 2001 18:16:39 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Layoffs lead to revenge hacking When someone cracked Slip.net's computer
system, altered customer accounts and deleted important databases, the
Internet service provider didn't need to look far to find the attacker. 
It wasn't a criminal outfit seeking credit card numbers, and it wasn't a
scrawny whiz-kid hacking away for a challenge in his dark bedroom.  It
was Nicholas Middleton, a former computer administrator for Slip.net,
who had been unhappy at the San Francisco company and recently quit. 
Middleton fought the resulting criminal charges on a legal technicality
but lost and got three years' probation. 
http://www.usatoday.com/life/cyber/tech/2001-05-31-revenge-hacking.htm

Hacktivists multiply attacks against Japanese sites Japanese websites
are coming increasingly under fire from Chinese and South Korean
hackers, angry about Japan's version of historical events as written in
a forthcoming textbook.  According to Japanese Internet watchdog
Everyday People, 63 Japanese websites were hacked in 2000, while during
the first five months of 2001, crackers hit at least 650 domains.  Even
the total for May 2001 -- 250 defaced and hacked sites -- surpasses last
year's count.  This spring, South Korean hackers used a
Denial-of-Service attack to crash the website representing Japan's
Ministry of Education, Culture, Sports and Science and Technology.  The
attack prompted Japan to ask South Korea to crack down on the hackers. 
http://www.securitywatch.com/newsforward/default.asp?AID=7832

Gangs Finding New Turf Members are claiming corners in cyberspace,
taking their rivalries online with Web sites.  Anthony, a brawny
Sacramento teenager who hangs with the Nortenos street gang, was
casually surfing the Web one day and was stunned when he stumbled on a
smattering of home pages posted by members of the Sureno gang, the
Nortenos' sworn and sometimes bloody rival.  It became a matter of pride
for Anthony, an 18-year-old high school graduate, to learn enough about
building a Web site to represent his gang online.  "NORTENOS!" blares
his SacTown Gangstas Web site, decorated with pictures of a modified
United Farm Workers logo, a gleaming red Impala, an automatic pistol,
two pit bull terriers and a cheery Web button inviting visitors to
"e-mail me."
http://www.latimes.com/business/cutting/20010531/t000045511.html

Acting Defense CIO cautious about outsourcing In order to make
outsourcing work, military organizations should ensure that they retain
in-house expertise, and they should carefully scrutinize their vendors'
security plans, the armed service's top information technology official
said Wednesday.  "We should make sure we don't just rush to outsource,"
because it's in vogue, said Linton Wells II, the Defense Department's
acting chief information officer and assistant secretary of Defense for
command, control, communications and intelligence (ASD/C3I).  He spoke
at the Army Small Computer Program Status Review conference in
Baltimore. 
http://www.fcw.com/fcw/articles/2001/0528/web-dod-05-31-01.asp


------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:14 PDT