[iwar] news

From: Fred Cohen (fc@all.net)
Date: 2001-06-22 05:45:38

Return-Path: <sentto-279987-1361-993213940-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Fri, 22 Jun 2001 05:47:07 -0700 (PDT)
Received: (qmail 5994 invoked by uid 510); 22 Jun 2001 11:47:51 -0000
Received: from n2.groups.yahoo.com (HELO hi.egroups.com) ( by with SMTP; 22 Jun 2001 11:47:51 -0000
X-eGroups-Return: sentto-279987-1361-993213940-fc=all.net@returns.onelist.com
Received: from [] by hi.egroups.com with NNFMP; 22 Jun 2001 12:45:40 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_1_3); 22 Jun 2001 12:45:39 -0000
Received: (qmail 48675 invoked from network); 22 Jun 2001 12:45:39 -0000
Received: from unknown ( by l9.egroups.com with QMQP; 22 Jun 2001 12:45:39 -0000
Received: from unknown (HELO big.all.net) ( by mta2 with SMTP; 22 Jun 2001 12:45:38 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id FAA18303 for iwar@onelist.com; Fri, 22 Jun 2001 05:45:38 -0700
Message-Id: <200106221245.FAA18303@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Fri, 22 Jun 2001 05:45:38 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Fifteen Year Old Becomes 'Hacker Queen' A middle school student ranked
first place in the "Hacker Queen Contest" organized by an Internet
security provider it was reported Thursday with fifteen-year-old Choi
Hae-ran chosen as number one among 70 hackers competing in the contest. 
Choi surprised the watchers as she broke into all five test stages in
under four hours, when others took as long as four days on average. 
Analysts noted that with her hacking skill, she can easily break into
almost any homepage of any company.  Choi says that she never went to
academies or took private lessons, but simply browsed around the various
web sites related to hacking.  Although she is more into reading
computer magazines and books than school textbooks, she rarely fails to
top her class. 

High-tech thieves plant money 'bugs' Clever real-world credit card
thieves apparently have a new high-tech tool in their arsenal.  A credit
card terminal maker says it has discovered the existence of small,
number stealing electronic "bugs." The devices can be secretly placed
inside store terminals, where they "skim" card numbers with each
transaction.  The bugs are even smart enough to trick a terminal into
"phoning home," delivering batches of stolen numbers to fake credit card
manufacturing locations.  While acknowledging the threat may be real,
Visa International and other terminal makers caution that use of the
James Bond-esque device is hardly widespread. 

CIA says hackers move too fast The CIA cannot predict computer attacks
on U.S.  systems before they happen, as the agency is expected to do
with political and military events, a top CIA official told Congress on
Thursday.  Despite a major increase in intelligence efforts dedicated to
computer security, attackers still develop new tools and techniques
faster than the CIA can keep up, Lawrence K.  Gershwin said.  Often, "we
end up detecting it after it's happened," said Gershwin, the CIA's top
adviser on science and technology issues.  "I don't feel very good about
our ability to anticipate."

Cyber-Terrorists Still Prefer Bombs Over Bytes - CIA Traditional
terrorist adversaries of the United States, despite their intentions to
damage U.S.  interests, are less developed in their computer network
capabilities and thus pose only a limited cyber-threat, an intelligence
officer for the Central Intelligence Agency (CIA) told lawmakers today. 
"In the near term, terrorists are likely to stay focused on traditional
attack methods - bombs still work better than bytes," said Lawrence K. 
Gershwin, national intelligence officer for science and technology at
the CIA's National Intelligence Council.  "But we anticipate more
substantial cyber-threats are possible in the future as a more
technically competent generation enters the ranks," Gershwin said at a
Senate Joint Economic Committee hearing today. 

Cyberspace: The next battlefield They don't drive tanks, fly jets or
even wear boots.  But the computer technicians hunkered down in virtual
foxholes in a pale yellow building here in suburban Washington might
well be the frontline soldiers in the nation's next war.  They work for
the Defense Information Systems Agency, which figures that future
conflicts won't be won by shooting down the enemy's aircraft but by
shutting down its computers.  Today, they defend the U.S.  military's
2.5 million computers against hackers.  But they are being trained to
guard against computer attacks by other countries and to launch computer
virus invasions that will bring chaos to a foe's communications
networks, financial systems and power grids. 

Russia, China working on cyber warfare - US official Russia and China
appear to be developing computer-based tools with the potential to do
long-lasting harm to the U.S.  economy, a top intelligence official told
Congress on Thursday.  Such arms will give future foes new leverage over
the United States, including a way to ratchet up pressure and the
prospect of anonymity, said Lawrence Gershwin, the national intelligence
officer for science and technology.  Testifying before the Joint
Economic Committee, Gershwin cited what he called some nations' public
acknowledgment of the role cyber attacks would play as the ``next wave
of military operations.''

California Hack Points to Possible Surveillane Threat THIS MONTH'S
revelation that hackers broke into computer systems owned by
California's primary electric power grid operator highlights a growing
fear on the part of federal officials that such intrusions could be part
of long-term intelligence-gathering activities.  The intrusion, which
occurred this spring, remained undetected for 17 days.  The intent of
the network break-in at the Folsom, Calif.  -- based California
Independent System Operator (Cal-ISO) wasn't clear.  But security
analysts said the lack of apparent damage indicates that the break-in
was conducted either by an unsophisticated group of hackers or by
attackers whose intent was to collect information about the systems and
to document vulnerabilities.


Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 

This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:18 PDT