[iwar] news

From: Fred Cohen (fc@all.net)
Date: 2001-06-28 06:14:38

Return-Path: <sentto-279987-1382-993734080-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Thu, 28 Jun 2001 06:16:14 -0700 (PDT)
Received: (qmail 13394 invoked by uid 510); 28 Jun 2001 12:16:18 -0000
Received: from ci.egroups.com ( by with SMTP; 28 Jun 2001 12:16:18 -0000
X-eGroups-Return: sentto-279987-1382-993734080-fc=all.net@returns.onelist.com
Received: from [] by ci.egroups.com with NNFMP; 28 Jun 2001 13:14:40 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_1_3); 28 Jun 2001 13:14:39 -0000
Received: (qmail 56962 invoked from network); 28 Jun 2001 13:14:38 -0000
Received: from unknown ( by l7.egroups.com with QMQP; 28 Jun 2001 13:14:38 -0000
Received: from unknown (HELO big.all.net) ( by mta1 with SMTP; 28 Jun 2001 13:14:38 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id GAA25614 for iwar@onelist.com; Thu, 28 Jun 2001 06:14:38 -0700
Message-Id: <200106281314.GAA25614@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 28 Jun 2001 06:14:38 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Net espionage stirs Cold-War tensions Fears of Cold War tensions are
finding new life in cyberspace, as the threat of Internet espionage
shifts the nuclear-age doctrine of "mutually assured destruction" to
that of mutually assured disruption.  In one long- running operation,
the subject of a U.S.  spy investigation dubbed "Storm Cloud," hackers
traced back to Russia were found to have been quietly downloading
millions of pages of sensitive data, including one colonel's entire
e-mail inbox.  During three years, most recently in April, government
computer operators have watched--often helplessly-- as reams of
electronic documents flowed from Defense Department computers, among
others.  The heist is "equivalent to a stack of printed copier paper
three times the height of the Washington Monument," says Air Force Maj. 
Gen.  Bruce Wright of the Air Intelligence Agency. 

Navy systems management 'alarming' Intrusions into Navy unclassified
networks are increasing, and officials are blaming poor systems
management and the availability of Web-based hacking tools.  In fiscal
2001, there have been 125 successful intrusions into Navy unclassified
networks, up from 117 in 1999 and 89 in 2000, said Scott Henderson, the
Navy Marine Corps Intranet information assurance division head at the
Space and Naval Warfare Systems Command in San Diego.  He spoke June 26
at an NMCI press conference. 

Navy says new intranet will upgrade computer security

Motorola Unveils New Weapon to Thwart Cyber Intruders Network
administrators now have a new first line of defense in the protection of
information assets.  Motorola, Inc.  announced a visualization and
analysis software tool that helps the user visually interpret network
attacks at a glance and respond quickly.  Motorola Intrusion Vision
provides a single, intuitive display of information received from many
network and host-based intrusion detection sensors within a business or
operation.  Additionally, it can correlate attack information received
from different sensors to let operators know of a serious attack. 
Because the data is displayed in near-real time, the user can react
quickly based on responses defined by the operation's security policy. 
Rapid response can serve to eliminate or mitigate potential damage to
the network. 

In War Against Cyberspace Intruders, Knowledge Is Power In warfare,
information is power.  The better you understand your enemy, the more
able you are to defeat him.  In the war against malicious hackers,
network intruders and the other black-hat denizens of cyberspace, the
good guys have surprisingly little information.  Most security
experts--even those who design products to protect against attacks--are
ignorant of the tools, tactics and motivations of the enemy.  The
Honeynet Project, a group of 30 researchers from academia and the
commercial sector, is trying to change that.  The group obtains
information through the use of a Honeynet--a computer network on the
Internet that's designed to be compromised. 


Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 

This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:19 PDT