[iwar] news

From: Fred Cohen (fc@all.net)
Date: 2001-06-02 21:40:40


Return-Path: <sentto-279987-1279-991543241-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Sat, 02 Jun 2001 21:42:08 -0700 (PDT)
Received: (qmail 26541 invoked by uid 510); 3 Jun 2001 03:41:57 -0000
Received: from hp.egroups.com (208.50.99.201) by 204.181.12.215 with SMTP; 3 Jun 2001 03:41:57 -0000
X-eGroups-Return: sentto-279987-1279-991543241-fc=all.net@returns.onelist.com
Received: from [10.1.4.56] by hp.egroups.com with NNFMP; 03 Jun 2001 04:40:41 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_1_3); 3 Jun 2001 04:40:40 -0000
Received: (qmail 95226 invoked from network); 3 Jun 2001 04:40:40 -0000
Received: from unknown (10.1.10.142) by l10.egroups.com with QMQP; 3 Jun 2001 04:40:40 -0000
Received: from unknown (HELO all.net) (65.0.156.78) by mta3 with SMTP; 3 Jun 2001 04:40:40 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id VAA27835 for iwar@onelist.com; Sat, 2 Jun 2001 21:40:40 -0700
Message-Id: <200106030440.VAA27835@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sat, 2 Jun 2001 21:40:40 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Three Indicted in Lucent Trade Secret Case Men face maximum penalty of
10 years in prison and up to $250,000 in fines.  Three men were indicted
by a federal grand jury on Thursday for conspiring to steal trade
secrets from telecommunications equipment maker Lucent Technologies and
transfer them to a Chinese state-owned company.  Former Lucent employees
Lin Hai and Xu Kai worked on Lucent's PathStar Access Server, which
facilitates transmission of voice communications over the Internet as
well as other features such as call-waiting and speed-dialing.  The
third defendant, Cheng Yong-Qing, is the former vice president of
Village Networks, an optical networking firm in Eatontown, New Jersey. 
He allegedly created a business plan for a joint venture company that
would transfer key trade secrets to a state-owned Chinese company.  The
men face a maximum penalty of 10 years in prison and up to $250,000 in
fines. 
http://www.techtv.com/news/politicsandlaw/story/0,24195,3330423,00.html

First Arrest of a Hacker Made in Beijing The People's Procuratorate of
Beijing's Haidian Districtarrested Lu Chun, a suspect of Beijing's first
hacker case on May 29.  Lu Chun, a 21-year old sophomore in Beijing,
decoded and embezzled a company's account and password to log on the
Internet by using the downloaded hacker software.  Lu not only spread
this account and password to his schoolmates and friends for visiting
Internet free of charge, he also sold it at a cheap price through the
Internet, resulting in that over 1000 people used this account surfing
on the Internet. 
http://english.peopledaily.com.cn/200105/31/print20010531_71479.html
[FC - amazing - they can catch this person but not the ones who announce
their names in the cyber-exchange.  Both the US and China allow this
activity to happen - both know how to catch and punish attackers.  It
seems to me that they both want the exchanges to happen.]

DoS attacks: No remedy in sight Denial-of-service attacks are becoming
more common and, in many cases, more serious, security experts said in
the wake of an attack on the Internet's main warning system for security
threats.  An unknown attacker last week hit the Computer Emergency
Response Team (CERT) Coordination Center, an important agency for
passing information on the latest vulnerabilities in computer systems
among security experts.  The denial-of-service attack flooded the
center's Web site with data requests and made the site--and its crucial
security advisories--almost impossible to access for more than 24 hours. 
"While there are other agencies out there providing similar services to
CERT, what if it had been a more sensitive system or one we had more
dependence on?" said Stefan Savage, a professor of computer science at
the University of California, San Diego, and co-founder of security
company Asta Networks. 
http://www.zdnet.com/zdnn/stories/news/0,4586,5092020,00.html
http://news.cnet.com/news/0-1003-200-6158264.html
[FC - of course this is not right - we know how to stop DoS attacks - it's
just not in the best financial interest of those being attacked.]

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:14 PDT