Return-Path: <sentto-279987-1474-996061211-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 25 Jul 2001 04:45:35 -0700 (PDT) Received: (qmail 13101 invoked by uid 510); 25 Jul 2001 10:42:47 -0000 Received: from n26.groups.yahoo.com (216.115.96.76) by 204.181.12.215 with SMTP; 25 Jul 2001 10:42:47 -0000 X-eGroups-Return: sentto-279987-1474-996061211-fc=all.net@returns.onelist.com Received: from [10.1.4.52] by fg.egroups.com with NNFMP; 25 Jul 2001 11:40:11 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_2_0); 25 Jul 2001 11:40:11 -0000 Received: (qmail 31367 invoked from network); 25 Jul 2001 11:40:10 -0000 Received: from unknown (10.1.10.142) by m8.onelist.org with QMQP; 25 Jul 2001 11:40:10 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 25 Jul 2001 11:40:10 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id EAA22315 for iwar@onelist.com; Wed, 25 Jul 2001 04:40:09 -0700 Message-Id: <200107251140.EAA22315@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Wed, 25 Jul 2001 04:40:09 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] news Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit July 24, 2001 [FC - I think the DMCA is a particularly interesting and outrageous law that will fail the test of time, but it is the law here for now and such cases as this will provide the necessary impetus to throw it out. For those who will ask - yes I think it is relevant to information warfare - and that it is particularly interesting to this list because of its involvement with a Russian here for a conference on information security, who did the deed when not even in this country. If you stole a CD from a bookstore in London would you be arrested by the FBI here?] Adobe backtracks, seeks release of Russian programmer In a change of heart, Adobe Systems asked federal authorities Monday to release a Russian programmer who was arrested last week at the company's urging. Dmitry Sklyarov, 26, is accused of trafficking in computer code that would have allowed users of Adobe's eBook Reader software to read and copy electronic books without restrictions. He is being held without bail and charged with violating the Digital Millennium Copyright Act (DMCA), a controversial law passed in 1998 that extends copyright protections to digital works. http://www.siliconvalley.com/docs/news/svfront/adobe072401.htm The Copyright Cops Go Too Far A recent law to protect online intellectual property still has some big problems, but handcuffs aren't the answer. Call me a communist, or call me a left-wing, paranoid, conspiracy theorist. Either way, it won't change my opinion that we ("we" defined as the U.S. government and citizens thereof) went too far last week by arresting Russian programmer Dmitry Skylarov on charges of criminal copyright violations. http://www.business2.com/articles/web/0,1653,16542,FF.html Adobe's change of heart doesn't clear up case of jailed programmer http://www.siliconvalley.com/docs/news/tech/032681.htm Sklyarov Release in Feds' Hands http://www.wired.com/news/politics/0,1283,45484,00.html Release the Russian, Adobe Says http://www.wired.com/news/politics/0,1283,45489,00.html Throw the E-Book at Sklyarov? http://www.wired.com/news/ebiz/0,1272,45466,00.html Protesters target FBI nominee over Russian arrest http://www.siliconvalley.com/docs/news/reuters_wire/1360885l.htm ----------------------------------------------------------------------- [FC - Latest figures on Code Red from those who felt it's inbound attempts (they all started in the same address range) was that about 280,000 IPs were emitting attacks from Code Red last Thursday.] Pentagon thwarts 'worm' and reopens Web sites Public access to hundreds of Defense Department computer Web sites was restored Tuesday, after protection was installed against the damaging ''Code Red'' computer worm, a Pentagon spokeswoman said. ``The Code Red worm appears to have gone dormant,'' Susan Hansen said in a brief statement released by the Pentagon. ''Accordingly we are able to allow public access to DOD (Department of Defense) Web sites to resume.'' http://www.siliconvalley.com/docs/news/tech/063459.htm http://www.zdnet.com/zdnn/stories/news/0,4586,5094649,00.html http://www.govexec.com/dailyfed/0701/072501j1.htm Singapore broadcaster invaded by Code Red worm http://www.zdnetasia.com/news/internet/story/0,2000024714,30097839,00.htm FBI Computer Experts Feel SirCam Worm's Bite An e-mail worm sweeping the Internet has infected at least one computer in the FBI's National Infrastructure Protection Center. Messages containing the SirCam worm were sent from an FBI.gov account of a NIPC special agent this morning to several private-sector security professionals, including the operators of the Safemode defacement archive. http://www.newsbytes.com/news/01/168288.html ----------------------------------------------------------------------- Hackers Hit Again With Hitler Mustache, Music A cyber-battle has broken out between Austria's right wing Freedom Party (FPOE) and Web site hackers. The hackers have struck the FPOE's Web site a second time; this time, it was not only a defacement, as occurred over the weekend, but an audio-visual attack: defacement plus an audio feed added to the Web site. http://www.newsbytes.com/news/01/168290.html Swiss Hackers Grab 250,000 E-mail Addresses, Passwords Swiss hackers were able to infiltrate the mail server of SwissOnline, Switzerland's third largest Internet service provider (ISP), and gain access to 250,000 e-mail addresses and passwords, including some for the embassies of France, Sweden and Israel. Mina Dello Buono, spokeswoman for Swissonline in Otelfingen, confirmed the security breach, which was reported Sunday by the SonntagsZeitung newspaper. http://www.newsbytes.com/news/01/168272.html Sniffer Trojan blamed for posting accounts Telstra is investigating how account details belonging to 69 BigPond broadband network customers, all believed to be ADSL users, were posted on a website at the weekend. A Telstra spokesman said it is believed account details were gathered by a subseven Trojan placed on users' computers, which sniffed details, including account names and passwords. A cracker known only as oxyg3n appears to be responsible for releasing the account details on Saturday. The list of account details also makes reference to L4m4, a cracker who defaced almost 50 IISbased websites earlier this month. The spokesman said Telstra had changed the passwords of the accounts that had been compromised. http://it.mycareer.com.au/opinion/networkpawn/2001/07/24/FFXAL7U4HPC.html Security concerns over new wireless services Lawmakers, Pentagon officials and industry executives are struggling to find room on the congested airwaves that can be used to deliver new wireless services -- like high-speed Internet access -- to mobile phones and handheld computers. It's a tough task that has forced policy-makers to balance national security concerns against their desire to keep the United States on the cutting edge of the communications sector. http://www.siliconvalley.com/docs/news/tech/033030.htm White House Web site moves to Linux The White House Web site has been moved onto a Linux platform after its administrators managed to successfully side step an attack by the Code Red worm. Netcraft reports that Whitehouse.gov is now being hosted by a peering firm and that the site uses a Netscape-Enterprise/3.6 Web server on a Linux platform. Prior to its forced move, Netcraft suggests the site was run on a Sun server, and the site still may be, since Netcraft's data on this is far from conclusive. http://www.theregister.co.uk/content/55/20587.html [FC - $200K is starting to hit the ballpark where it might be worth bothering...] RSA launches crypto-cracking challenge Internet security firm RSA Security is challenging individuals to test the strength of its algorithms in its latest crypto Factoring Challenge, with a cash prize of up to $200,000 at stake. Cryptography experts must determine the two prime numbers that have been used to generate eight "challenge" numbers, ranging in size from 576 bits to 2,048 bits. The first person to submit a correct factoring of any of the challenge numbers is eligible for a cash prize of between $10,000 for a 576-bit key to $200,000 for a 2,048-bit key. http://news.cnet.com/news/0-1003-200-6655873.html http://news.zdnet.co.uk/story/0,,t269-s2091852,00.html ------------------------ Yahoo! Groups Sponsor ---------------------~--> Small business owners... Tell us what you think! http://promo2.yahoo.com/sbin/Yahoo!_BusinessNewsletter/survey.cgi http://us.click.yahoo.com/vO1FAB/txzCAA/ySSFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:38 PDT