Return-Path: <sentto-279987-1294-991744186-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Tue, 05 Jun 2001 05:31:08 -0700 (PDT) Received: (qmail 17038 invoked by uid 510); 5 Jun 2001 11:30:59 -0000 Received: from c9.egroups.com (208.50.99.230) by 204.181.12.215 with SMTP; 5 Jun 2001 11:30:59 -0000 X-eGroups-Return: sentto-279987-1294-991744186-fc=all.net@returns.onelist.com Received: from [10.1.4.53] by c9.egroups.com with NNFMP; 05 Jun 2001 12:29:46 -0000 X-Sender: fc@all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_1_3); 5 Jun 2001 12:29:45 -0000 Received: (qmail 31341 invoked from network); 5 Jun 2001 12:29:45 -0000 Received: from unknown (10.1.10.142) by l7.egroups.com with QMQP; 5 Jun 2001 12:29:45 -0000 Received: from unknown (HELO all.net) (65.0.156.78) by mta3 with SMTP; 5 Jun 2001 12:29:45 -0000 Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA20413 for iwar@onelist.com; Tue, 5 Jun 2001 05:29:44 -0700 Message-Id: <200106051229.FAA20413@all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 5 Jun 2001 05:29:44 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] news Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit U.S. Falling Behind in Cyber Combat As the latest computer virus -- this one featuring actress Jennifer Lopez -- makes its way around the Internet via e-mail, the number of people who wonder if the government is up to the task of providing electronic security is growing. The Jennifer Lopez file, which spreads the highly destructive Chernobyl virus, is the latest in a string of mass-mailing worm viruses -- copycat versions of the Anna Kournikova virus which spread across the globe last February. While these kinds of viruses have the potential for causing millions of dollars in damage, at least they are usually detected early in the process. It's the unannounced hack attacks and cybercrime that comprise the real problem facing both government and business. And from all appearances, the bad guys are way ahead. http://www.newsfactor.com/perl/story/10193.html Bennett urges agencies to sharpen security tests Agencies should regularly test systems security as if they expect an onslaught from terrorists or a hostile government, Sen. Robert Bennett (R-Utah) says. Civilian agencies are logical candidates for attack because their systems aren't locked down as tight as those operated by the Defense Department or the intelligence community, the Utah Republican said. Bennett spoke last month at an Armed Forces Communications and Electronics Association conference in Washington. Testing in which one agency team tries to hack into its own computers as another team tries to fend off the attack may be the key to protecting systems, Bennett said. Agencies should use Presidential Decision Directive 63, which orders agencies to protect systems that manage the nation's infrastructure, as a starting point for more stringent control over government systems, he said. http://www.gcn.com/vol20_no13/news/4383-1.html Trojan lets cyber-cops plant bogus evidence A new tool of Fascist control, with which law-enforcement agents can secretly monitor the entire range of a suspect's computer activity, has been developed by self-proclaimed 'computer surveillance experts' Codex Data Systems, according to a document sent to Cryptome.org. The source here is a PowerPoint slide show, presumably by Codex PR bunnies, boasting of D.I.R.T.'s amazing capabilities to violate in secret the last vestiges of civil protections from state oppression. "Imagine being able to remotely monitor any PC in the world anytime you want," the company taunts. "Suppose you could read every keystroke... Access and retrieve any file from the hard drive without having physical access... No more secrets..." The company slide show is carefully crafted to generate maximum suspense among Feds and cops straining to find ways around such regrettable obstacles as civil rights. http://www.theregister.co.uk/content/8/19404.html Secure mobile phone offers public military-grade protection It used to be that top-secret communication gadgets were reserved for the military and security services. Now, a German company is selling a cellular phone that offers consumers military-grade privacy. The TopSec cell phone is being marketed toward corporate executives and government officials who want to discuss sensitive matters wherever they are. Security experts believe the $3,000 phone is the first mass-marketed mobile phone that offers a reliable, secure conversation with a high level of encryption. http://www.siliconvalley.com/docs/news/tech/054988.htm Security expert waves DDoS white flag Security expert Steve Gibson has posted a plea on his Web site grc.com for hackers to leave him alone. "I surrender. I surrender right now, completely and unconditionally," it begins. Now what kind of talk is that? Of course this is all over Steve's widely read piece on the DDoS attacks he was suffering. Steve did a whole lotta investigative work but also made some strong comments about various parties. We gave it some publicity of course, particularly his claim that Windows XP threatens the stability of the Internet. The article certainly started some debate and attracted plenty of criticism - some of it nonsense ranting, some more reasoned. http://www.theregister.co.uk/content/8/19425.html [FC - how much of an expert can he really be?] Up from the Underground Never mind the economic slowdown-vandalism and larceny continue to plague computer networks. Corporations are dramatically increasing security budgets, creating lots of new, high-paying jobs for skilled security professionals. Who is earning the big bucks? Mostly young men, from their late teens to their early thirties. College educated? Who cares, as long as they know their stuff. Slovenly? Whatever. Questionable backgrounds? Well...fact is, some of the best anti-crook hackers have at some point in their young lives danced along some serious ethical and legal lines. Guys with raging testosterone power hormones and skills that make the game of trespass challenging but winnable find it hard to resist. http://www.business2.com/magazine/2001/06/up_from_underground.htm ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:15 PDT