[iwar] news


From: Fred Cohen
To: Information Warfare Mailing List
From: fc@all.net
To: iwar@onelist.com

Wed, 21 Feb 2001 05:49:54 -0800 (PST)


fc  Wed Feb 21 05:53:07 2001
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Wed, 21 Feb 2001 05:53:07 -0800 (PST)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Wed Feb 21 13:53:01 2001)
X-From_: fc@all.net  Wed Feb 21 07:52:01 2001
Received: from mk.egroups.com (mk.egroups.com [208.50.144.76])
	by multi33.netcomi.com (8.9.3/8.9.3) with SMTP id HAA06551
	for ; Wed, 21 Feb 2001 07:50:18 -0600
X-eGroups-Return: sentto-279987-976-982763397-fc=all.net@returns.onelist.com
Received: from [10.1.4.54] by mk.egroups.com with NNFMP; 21 Feb 2001 13:49:58 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_0_4); 21 Feb 2001 13:49:57 -0000
Received: (qmail 87604 invoked from network); 21 Feb 2001 13:49:54 -0000
Received: from unknown (10.1.10.142) by l8.egroups.com with QMQP; 21 Feb 2001 13:49:54 -0000
Received: from unknown (HELO all.net) (65.0.156.78) by mta3 with SMTP; 21 Feb 2001 14:50:59 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA02087 for iwar@onelist.com; Wed, 21 Feb 2001 05:49:54 -0800
Message-Id: <200102211349.FAA02087@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Wed, 21 Feb 2001 05:49:54 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Disgruntled cracker defaces 30 Chinese websites
Administrators across mainland China woke this
morning to a nasty surprise. A cracker identified
only as 'O.~' defaced 30 websites, leaving in his
wake an angry text berating Chinese telecoms for
taking their sweet time to repair a severed cable.
A number of the hacked sites belonged to Beijing
Telecom, which is owned by one of the cable's
operators, China Telecom. Since February 9,
millions of Chinese users have been unable to
access foreign email accounts and instant
messaging services due to a broken underwater
cable. According to China's official Xinhua news
agency, the cable has since been repaired, with
full service restored last night.
http://www.securitywatch.com/newsforward/default.asp?AID=5899
http://china.scmp.com/ZZZ50LWL2IC.html

Cybercrime a major threat in Asia, says Interpol
The head of Interpol predicted on Tuesday that
cybercrime and electric vandalism would emerge
as the biggest criminal threats to Asia, and
existing problems will get worse. Interpol
Secretary General Ronald Noble sounded the alarm
at the opening of the group's 16th Asian regional
conference in Bangkok. "The range of serious crime
problems that are the unintended consequences of
economic globalisation and new technologies, like
the Internet, are of grave concern to police all
around the world. Asia isn't immune to this,"
Mr Noble said in a speech opening the three-day
meeting.
http://technology.scmp.com/internet/Daily/20010220191837468.asp

High court hears home-snooping-device case
Supreme Court justices joined a spirited debate
Tuesday over whether law enforcement officials
violated an Oregon man's constitutional rights
when they used a heat-sensing device to find
he was growing marijuana in his home. At issue
is whether narcotics agents violated a
constitutional ban on unreasonable searches
when they trained a thermal imaging device on
Danny Lee Kyllo's house without a search warrant.
http://www.usatoday.com/life/cyber/tech/review/2001-02-20-thermal.htm

Registrars meet to discuss hijacking of domains
Pushing for uniformity in the handling of
Internet domain name disputes, the World
Intellectual Property Organization (WIPO)
on Tuesday kicked off a conference in Geneva
with representatives from 66 country domain
registrars. On the agenda are issues like
abusive registration of domain names, dubbed
cybersquatting, and other key policy issues
related to intellectual property conflicts
in country code top-level domains. These are
the domains used for countries like".uk" for
the U.K. and ".fr" for France. WIPO will also
present its "Best Practices for Intellectual
Property Dispute Prevention and Resolution."
http://www.cnn.com/2001/TECH/internet/02/20/WIPO.meeting.idg/index.html

FBI surveillance systems get digital upgrade
Amid ongoing debate over surveillance tools'
potential to invade privacy, the FBI is
replacing its analog wiretapping equipment
with digital systems in all 56 field offices.
Under the Digital Storm program, the bureau
will replace large reel-to-reel tape recorders
with PC specially tuned for audio storage
capability. The minimum requirement for running
the digital recording applications is an 800-MHz
Pentium PC with 256M of RAM and RAID Level 5
storage. About 20 percent of the FBI offices
already have the new digital systems. With a
budget of $30 million for fiscal 2001, the FBI
Laboratory this year will upgrade as many field
offices as possible, said Michael T. Elliott,
unit chief for telecommunications intercept
and collection technology. The bureau plans to
finish the conversion to digital by 2003.
http://www.gcn.com/vol20_no4/news/3709-1.html

The Key Vanishes: Scientist Outlines Unbreakable Code
A computer science professor at Harvard says
he has found a way to send coded messages that
cannot be deciphered, even by an all-powerful
adversary with unlimited computing power. And,
he says, he can prove it. If he is right, and
he does have some supporters, his code may be
the first that is both practical and provably
secure. While there are commercially available
coding systems that seem very hard to break,
no one can prove that they cannot be cracked,
mathematicians say.
http://cryptome.org/key-poof.htm

[FC - not exactly... but... a one-time pad based on open information?!?!?!
...
The coding starts with a continuously generated string of random
numbers, say from a satellite put up to broadcast them or from some
other source.  The numbers can be coming by at an enormous speed - 10
million million per second, for example. 

The sender of a message and its recipient agree to start plucking a
sequence of numbers from that string.  They may agree, for example, to
send a message, encoded with any of today's publicly available
encryption systems saying "start" and giving instructions on capturing
certain of the random numbers.  As they capture the numbers, the sender
uses them to encode a message, and the recipient uses the numbers to
decode it. 

An eavesdropper can know the mathematical formula used to encode and
decode, but without knowing the exact sequence of random numbers that
were used in the formula to send a particular message, the eavesdropper
cannot decode the message.  And the only way to have that sequence is to
just happen to be storing numbers from the unending stream at exactly
the right moment.]

------------------------ Yahoo! Groups Sponsor ---------------------~-~>
eGroups is now Yahoo! Groups
Click here for more details
http://us.click.yahoo.com/kWP7PD/pYNCAA/4ihDAA/kzAVlB/TM
---------------------------------------------------------------------_->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/