Return-Path: <sentto-279987-1589-997540599-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Sat, 11 Aug 2001 07:38:11 -0700 (PDT) Received: (qmail 7927 invoked by uid 510); 11 Aug 2001 13:38:43 -0000 Received: from n4.groups.yahoo.com (216.115.96.54) by 204.181.12.215 with SMTP; 11 Aug 2001 13:38:43 -0000 X-eGroups-Return: sentto-279987-1589-997540599-fc=all.net@returns.onelist.com Received: from [10.1.4.54] by hk.egroups.com with NNFMP; 11 Aug 2001 14:36:39 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_3_1); 11 Aug 2001 14:36:38 -0000 Received: (qmail 23369 invoked from network); 11 Aug 2001 14:36:37 -0000 Received: from unknown (10.1.10.26) by l8.egroups.com with QMQP; 11 Aug 2001 14:36:37 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 11 Aug 2001 14:36:36 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id HAA05646 for iwar@onelist.com; Sat, 11 Aug 2001 07:36:36 -0700 Message-Id: <200108111436.HAA05646@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sat, 11 Aug 2001 07:36:36 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] News: Who is Red Crack? Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Bill Gertz and Rowan Scarborough, Washington Times, 8/10/2001 http://www.washtimes.com/national/20010810-61087445.htm The U.S. intelligence community has been tasked to find a Chinese hacker who goes by the name of Red Crack. All intelligence services, including the CIA, Defense Intelligence Agency, and especially the National Security Agency, have launched major searches for the elusive computer hacker. The order came from senior Bush administration national security officials. According to Internet security specialists, Red Crack took part in what has been termed "Cyberwars." The wars erupted between U.S. and Chinese hacker communities over the April 1 collision between a U.S. EP-3E surveillance aircraft and a Chinese F-8. Red Crack is believed to be behind a computer break-in at the Web site belonging to the Naval Computer and Telecommunications Station in Washington. The hacker left a message in both Chinese and English saying "Beat down Imperialism of USA," "Strongly protest against the hegemonication of USA on encroaching upon China's territorial integrity and sovereignty!" along with a profanity we can't repeat. During the spring U.S.-China hacker wars, at least two Chinese hacker groups, China Eagle and Red Guest, joined forces to "overthrow all the hegemonies of the world." A computer security specialist who tracks Chinese hackers told us it is unlikely that Red Crack is linked to the notorious Code Red worm that propagated on hundreds of thousands of computers over recent weeks. That worm left a message that stated "Welcome to http://www.worm.com! Hacked by Chinese!" This specialist said Red Crack is also known as Red Crackz and has a reputation among hackers as a "Warez Puppy" -- a hacker who can break purchased software and use it without having to pay for it. Chinese officials denied the malicious code originated in their country. But the fact that the worm did not appear in China has raised suspicions that it was produced by Chinese hackers. ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:39 PDT