[iwar] news

From: Fred Cohen (fc@all.net)
Date: 2001-07-25 04:40:09


Return-Path: <sentto-279987-1474-996061211-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 25 Jul 2001 04:45:35 -0700 (PDT)
Received: (qmail 13101 invoked by uid 510); 25 Jul 2001 10:42:47 -0000
Received: from n26.groups.yahoo.com (216.115.96.76) by 204.181.12.215 with SMTP; 25 Jul 2001 10:42:47 -0000
X-eGroups-Return: sentto-279987-1474-996061211-fc=all.net@returns.onelist.com
Received: from [10.1.4.52] by fg.egroups.com with NNFMP; 25 Jul 2001 11:40:11 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_2_0); 25 Jul 2001 11:40:11 -0000
Received: (qmail 31367 invoked from network); 25 Jul 2001 11:40:10 -0000
Received: from unknown (10.1.10.142) by m8.onelist.org with QMQP; 25 Jul 2001 11:40:10 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 25 Jul 2001 11:40:10 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id EAA22315 for iwar@onelist.com; Wed, 25 Jul 2001 04:40:09 -0700
Message-Id: <200107251140.EAA22315@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 25 Jul 2001 04:40:09 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

July 24, 2001

[FC - I think the DMCA is a particularly interesting and outrageous law
that will fail the test of time, but it is the law here for now and such
cases as this will provide the necessary impetus to throw it out.  For
those who will ask - yes I think it is relevant to information warfare -
and that it is particularly interesting to this list because of its
involvement with a Russian here for a conference on information
security, who did the deed when not even in this country.  If you stole
a CD from a bookstore in London would you be arrested by the FBI here?]

Adobe backtracks, seeks release of Russian programmer
In a change of heart, Adobe Systems asked federal
authorities Monday to release a Russian programmer
who was arrested last week at the company's urging.
Dmitry Sklyarov, 26, is accused of trafficking in
computer code that would have allowed users of
Adobe's eBook Reader software to read and copy
electronic books without restrictions. He is
being held without bail and charged with violating
the Digital Millennium Copyright Act (DMCA), a
controversial law passed in 1998 that extends
copyright protections to digital works.
http://www.siliconvalley.com/docs/news/svfront/adobe072401.htm

The Copyright Cops Go Too Far
A recent law to protect online intellectual property
still has some big problems, but handcuffs aren't the
answer. Call me a communist, or call me a left-wing,
paranoid, conspiracy theorist. Either way, it won't
change my opinion that we ("we" defined as the U.S.
government and citizens thereof) went too far last
week by arresting Russian programmer Dmitry Skylarov
on charges of criminal copyright violations.
http://www.business2.com/articles/web/0,1653,16542,FF.html

Adobe's change of heart doesn't clear up case of jailed programmer
http://www.siliconvalley.com/docs/news/tech/032681.htm
Sklyarov Release in Feds' Hands
http://www.wired.com/news/politics/0,1283,45484,00.html
Release the Russian, Adobe Says
http://www.wired.com/news/politics/0,1283,45489,00.html
Throw the E-Book at Sklyarov?
http://www.wired.com/news/ebiz/0,1272,45466,00.html
Protesters target FBI nominee over Russian arrest
http://www.siliconvalley.com/docs/news/reuters_wire/1360885l.htm

-----------------------------------------------------------------------

[FC - Latest figures on Code Red from those who felt it's inbound
attempts (they all started in the same address range) was that about
280,000 IPs were emitting attacks from Code Red last Thursday.]

Pentagon thwarts 'worm' and reopens Web sites Public access to hundreds
of Defense Department computer Web sites was restored Tuesday, after
protection was installed against the damaging ''Code Red'' computer
worm, a Pentagon spokeswoman said.  ``The Code Red worm appears to have
gone dormant,'' Susan Hansen said in a brief statement released by the
Pentagon.  ''Accordingly we are able to allow public access to DOD
(Department of Defense) Web sites to resume.''
http://www.siliconvalley.com/docs/news/tech/063459.htm
http://www.zdnet.com/zdnn/stories/news/0,4586,5094649,00.html
http://www.govexec.com/dailyfed/0701/072501j1.htm

Singapore broadcaster invaded by Code Red worm
http://www.zdnetasia.com/news/internet/story/0,2000024714,30097839,00.htm

FBI Computer Experts Feel SirCam Worm's Bite An e-mail worm sweeping the
Internet has infected at least one computer in the FBI's National
Infrastructure Protection Center.  Messages containing the SirCam worm
were sent from an FBI.gov account of a NIPC special agent this morning
to several private-sector security professionals, including the
operators of the Safemode defacement archive. 
http://www.newsbytes.com/news/01/168288.html

-----------------------------------------------------------------------
Hackers Hit Again With Hitler Mustache, Music A cyber-battle has broken
out between Austria's right wing Freedom Party (FPOE) and Web site
hackers.  The hackers have struck the FPOE's Web site a second time;
this time, it was not only a defacement, as occurred over the weekend,
but an audio-visual attack: defacement plus an audio feed added to the
Web site.
http://www.newsbytes.com/news/01/168290.html

Swiss Hackers Grab 250,000 E-mail Addresses, Passwords Swiss hackers
were able to infiltrate the mail server of SwissOnline, Switzerland's
third largest Internet service provider (ISP), and gain access to
250,000 e-mail addresses and passwords, including some for the embassies
of France, Sweden and Israel.  Mina Dello Buono, spokeswoman for
Swissonline in Otelfingen, confirmed the security breach, which was
reported Sunday by the SonntagsZeitung newspaper. 
http://www.newsbytes.com/news/01/168272.html

Sniffer Trojan blamed for posting accounts Telstra is investigating how
account details belonging to 69 BigPond broadband network customers, all
believed to be ADSL users, were posted on a website at the weekend.  A
Telstra spokesman said it is believed account details were gathered by a
subseven Trojan placed on users' computers, which sniffed details,
including account names and passwords.  A cracker known only as oxyg3n
appears to be responsible for releasing the account details on Saturday. 
The list of account details also makes reference to L4m4, a cracker who
defaced almost 50 IISbased websites earlier this month.  The spokesman
said Telstra had changed the passwords of the accounts that had been
compromised. 
http://it.mycareer.com.au/opinion/networkpawn/2001/07/24/FFXAL7U4HPC.html

Security concerns over new wireless services Lawmakers, Pentagon
officials and industry executives are struggling to find room on the
congested airwaves that can be used to deliver new wireless services --
like high-speed Internet access -- to mobile phones and handheld
computers.  It's a tough task that has forced policy-makers to balance
national security concerns against their desire to keep the United
States on the cutting edge of the communications sector. 
http://www.siliconvalley.com/docs/news/tech/033030.htm

White House Web site moves to Linux The White House Web site has been
moved onto a Linux platform after its administrators managed to
successfully side step an attack by the Code Red worm.  Netcraft reports
that Whitehouse.gov is now being hosted by a peering firm and that the
site uses a Netscape-Enterprise/3.6 Web server on a Linux platform. 
Prior to its forced move, Netcraft suggests the site was run on a Sun
server, and the site still may be, since Netcraft's data on this is far
from conclusive.
http://www.theregister.co.uk/content/55/20587.html

[FC - $200K is starting to hit the ballpark where it might be worth bothering...]
RSA launches crypto-cracking challenge Internet security firm RSA
Security is challenging individuals to test the strength of its
algorithms in its latest crypto Factoring Challenge, with a cash prize
of up to $200,000 at stake.  Cryptography experts must determine the two
prime numbers that have been used to generate eight "challenge" numbers,
ranging in size from 576 bits to 2,048 bits.  The first person to submit
a correct factoring of any of the challenge numbers is eligible for a
cash prize of between $10,000 for a 576-bit key to $200,000 for a
2,048-bit key.
http://news.cnet.com/news/0-1003-200-6655873.html
http://news.zdnet.co.uk/story/0,,t269-s2091852,00.html

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Small business owners...
Tell us what you think! http://promo2.yahoo.com/sbin/Yahoo!_BusinessNewsletter/survey.cgi
http://us.click.yahoo.com/vO1FAB/txzCAA/ySSFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:38 PDT