Re: [iwar] news

From: c.b r (
Date: 2001-05-31 22:27:23

Return-Path: <>
Received: from by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Thu, 31 May 2001 22:28:07 -0700 (PDT)
Received: (qmail 14266 invoked by uid 510); 1 Jun 2001 04:28:15 -0000
Received: from ( by with SMTP; 1 Jun 2001 04:28:15 -0000
Message-ID: <>
Received: from [] by; Thu, 31 May 2001 22:27:23 PDT
Date: Thu, 31 May 2001 22:27:23 -0700 (PDT)
From: "c.b r" <>
Subject: Re: [iwar] news
In-Reply-To: <>
Content-Type: text/plain; charset=us-ascii

Hi Fred:
Another day goes by the and lots of bad "juju"1  has
occured in "cyberlandia", a suggested  name for your
"beat". And I can say that my learning curve has gone
from asymtotic to beyond  in a very short period of
time, with a little help from you. It is hard enough
to know what is real and what is a binary hoax.  Im
just glad folks at places like NORAD and their pals
here, at the Pentagon, have taken notice. (Well, I can
hope for the best, can't I?)
Granted, they are all on the level of feeble children.

Most disconcerting is the fact that while the GOP have
all assured us that guys like Don Rumsfled and Colin
Powell had kept up with world change while out of
office and would collectively be ready for the 21st C,

"we are still waiting".  It seems like even Dr. Conde
Rice does not "get it" The world went and
changed-bigtime-since she was an NSC staff member
during Daddy Bushes reign, or our plucky pal, with the
not too pluck heart was just SecDef, not
SEC_DEF_STATE_ENERGY_and SEC "what ever else W. wanted
him to be on a given day". The VP is not your average

Untill I ran into, I really had no idea of the
sheer magnitude of the fiscial and functional downside
our country faces when bytes are used for doing ill.If
you add together your reckless hacker kids in with the
int'l sub-nations actors, a plain old country/ies, or
even int'l organized crime, we have way too much to
worry about given there is no real body that governs,
or are Cops on the Net. 
 We live in binary Dodge City and it is a dangerous
situation. Even your garden variety terorists that has
computer capacity and capability is a nasty thought
out there in the INFOWAR world. I am startng to think
that the only way the USA can stay on top
internationally is to play the cyber offense. The
problem is, so few legislators even understand this
threat that it is frightening in its own right.
However, choose we must a cyber offense and play it
every day  The primary obstacle is W. With him in the
White House no much will get done until appreciable
damage is done to us.

1Bad JUJU- something nastier than anyone wants to
ponder."Things are really bad and the ride downhill is
only going to get faster until either the trains
derails, or it jumps the tracks entirely".  Either
way, bad juju.
russell paraphrase of the term bad JUJU
-- Fred Cohen <> wrote:
> Layoffs lead to revenge hacking When someone cracked
>'s computer
> system, altered customer accounts and deleted
> important databases, the
> Internet service provider didn't need to look far to
> find the attacker. 
> It wasn't a criminal outfit seeking credit card
> numbers, and it wasn't a
> scrawny whiz-kid hacking away for a challenge in his
> dark bedroom.  It
> was Nicholas Middleton, a former computer
> administrator for,
> who had been unhappy at the San Francisco company
> and recently quit. 
> Middleton fought the resulting criminal charges on a
> legal technicality
> but lost and got three years' probation. 
> Hacktivists multiply attacks against Japanese sites
> Japanese websites
> are coming increasingly under fire from Chinese and
> South Korean
> hackers, angry about Japan's version of historical
> events as written in
> a forthcoming textbook.  According to Japanese
> Internet watchdog
> Everyday People, 63 Japanese websites were hacked in
> 2000, while during
> the first five months of 2001, crackers hit at least
> 650 domains.  Even
> the total for May 2001 -- 250 defaced and hacked
> sites -- surpasses last
> year's count.  This spring, South Korean hackers
> used a
> Denial-of-Service attack to crash the website
> representing Japan's
> Ministry of Education, Culture, Sports and Science
> and Technology.  The
> attack prompted Japan to ask South Korea to crack
> down on the hackers. 
> Gangs Finding New Turf Members are claiming corners
> in cyberspace,
> taking their rivalries online with Web sites. 
> Anthony, a brawny
> Sacramento teenager who hangs with the Nortenos
> street gang, was
> casually surfing the Web one day and was stunned
> when he stumbled on a
> smattering of home pages posted by members of the
> Sureno gang, the
> Nortenos' sworn and sometimes bloody rival.  It
> became a matter of pride
> for Anthony, an 18-year-old high school graduate, to
> learn enough about
> building a Web site to represent his gang online. 
> "NORTENOS!" blares
> his SacTown Gangstas Web site, decorated with
> pictures of a modified
> United Farm Workers logo, a gleaming red Impala, an
> automatic pistol,
> two pit bull terriers and a cheery Web button
> inviting visitors to
> "e-mail me."
> Acting Defense CIO cautious about outsourcing In
> order to make
> outsourcing work, military organizations should
> ensure that they retain
> in-house expertise, and they should carefully
> scrutinize their vendors'
> security plans, the armed service's top information
> technology official
> said Wednesday.  "We should make sure we don't just
> rush to outsource,"
> because it's in vogue, said Linton Wells II, the
> Defense Department's
> acting chief information officer and assistant
> secretary of Defense for
> command, control, communications and intelligence
> (ASD/C3I).  He spoke
> at the Army Small Computer Program Status Review
> conference in
> Baltimore. 

Do You Yahoo!?
Get personalized email addresses from Yahoo! Mail - only $35 
a year!

This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:14 PDT