[iwar] latest scaremonger story


From: Wanja Eric Naef \(IWS\)
To: Iwar@Egroups. Com
From: w.naef@iwar.org.uk
To: iwar@egroups.com

Fri, 29 Dec 2000 17:45:29 -0000


fc  Fri Dec 29 09:46:08 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Fri, 29 Dec 2000 09:46:08 -0800 (PST)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Fri Dec 29 17:41:56 2000)
X-From_: w.naef@iwar.org.uk  Fri Dec 29 11:41:39 2000
Received: from fh.egroups.com (fh.egroups.com [208.50.144.71]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id LAA26690 for ; Fri, 29 Dec 2000 11:41:38 -0600
X-eGroups-Return: sentto-279987-858-978111944-fc=all.net@returns.onelist.com
Received: from [10.1.4.55] by fh.egroups.com with NNFMP; 29 Dec 2000 17:45:48 -0000
X-Sender: w.naef@iwar.org.uk
X-Apparently-To: iwar@egroups.com
Received: (EGP: mail-6_3_1_3); 29 Dec 2000 17:45:43 -0000
Received: (qmail 36042 invoked from network); 29 Dec 2000 17:45:43 -0000
Received: from unknown (10.1.10.26) by l9.egroups.com with QMQP; 29 Dec 2000 17:45:43 -0000
Received: from unknown (HELO rhenium) (194.73.73.93) by mta1 with SMTP; 29 Dec 2000 17:45:43 -0000
Received: from [213.123.140.223] (helo=vanya) by rhenium with smtp (Exim 3.03 #83) id 14C3b3-00029p-00 for iwar@egroups.com; Fri, 29 Dec 2000 17:45:42 +0000
To: "Iwar@Egroups. Com" 
Message-ID: 
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4522.1200
From: "Wanja Eric Naef \(IWS\)" 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Fri, 29 Dec 2000 17:45:29 -0000
Reply-To: iwar@egroups.com
Subject: [iwar] latest scaremonger story
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

I am wondering whether the gov and mil InfoSec people are desperate for
money as
they release one scare story after another (see Newsbyte article below).

To counter this I recommend you to read this article on how the NIPC
 http://www.iwar.org.uk/cip/resources/nipc/2000-06.html dealt with one
of its first test cases (I-love-you virus). Quite funny as they first
warning
was:

ALERT
             Philippines Alert
             Issued 09/01/2000

             It has been reported that a new virus has spread in the
Philippines.

(i.e. where did all the funding go??? In the in the UK we have an
organisation called
the National Infrastructure Security Coordination Centre (NISCC) which
should be the
UK version of the NIPC. The NISCC is even worse than NIPC as they have no
web site
(due to the British obsession with secrecy) and surprise surprise:
it failed miserably when the I-love-you virus went around.)

*************************************************************


29Dec00 USA: ****HORDES OF ZOMBIES COULD BRING DOWN THE NET.

By Martin Stone, Newsbytes.

The US government reportedly fears that tens of thousands of computer
systems may have been turned into "zombies" waiting for commands from
hackers to cripple the Internet.

A report by United Press International said a top National Security Council
analyst, Richard Clark, special assistant to the president for
trans-national threats, said the explosion of zombies makes it possible for
hackers to launch an assault that would make last February's
denial-of-service attacks look "fairly minor." The proliferation of digital
subscriber lines and cable modems means that more computers are "hard
wired" to the Web, making hacker access easier, UPI added.
The report said unsuspecting users continue to operate their computers in a
normal way. But, a vast number of computers may now contain a software time
bomb which could launch dedicated denial of service (DDOS) attacks to bring
down computer networks by overwhelming them with more traffic than they can
process. NSC reportedly believes hackers may have hidden DDOS "packets" or
"daemons" in the computer systems of unwitting users. At a specific time,
or after receiving a signal from the hacker, hundreds of zombies would
launch against a single target, UPI said.
Last February, multiple zombies flooded high-profile commerce sites such as
E-Bay and CNN.com with messages that overloaded systems and caused some to
shut down for several days.
A 16-year-old Montrealer known as Mafiaboy is a suspect in that attack. He
will be tried in March.

Reported by Newsbytes.com, http://www.newsbytes.com.
10:33 CST.
Newsbytes News Network, Copyright 2000.
NEWSBYTES NEWS NETWORK 29/12/2000




-------------------------- eGroups Sponsor -------------------------~-~>
eLerts
It's Easy. It's Fun. Best of All, it's Free!
http://click.egroups.com/1/9699/1/_/595019/_/978111944/
---------------------------------------------------------------------_->

------------------
http://all.net/