Return-Path: <sentto-279987-1361-993213940-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Fri, 22 Jun 2001 05:47:07 -0700 (PDT) Received: (qmail 5994 invoked by uid 510); 22 Jun 2001 11:47:51 -0000 Received: from n2.groups.yahoo.com (HELO hi.egroups.com) (216.115.96.52) by 204.181.12.215 with SMTP; 22 Jun 2001 11:47:51 -0000 X-eGroups-Return: sentto-279987-1361-993213940-fc=all.net@returns.onelist.com Received: from [10.1.4.55] by hi.egroups.com with NNFMP; 22 Jun 2001 12:45:40 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_1_3); 22 Jun 2001 12:45:39 -0000 Received: (qmail 48675 invoked from network); 22 Jun 2001 12:45:39 -0000 Received: from unknown (10.1.10.27) by l9.egroups.com with QMQP; 22 Jun 2001 12:45:39 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta2 with SMTP; 22 Jun 2001 12:45:38 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id FAA18303 for iwar@onelist.com; Fri, 22 Jun 2001 05:45:38 -0700 Message-Id: <200106221245.FAA18303@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Fri, 22 Jun 2001 05:45:38 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] news Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Fifteen Year Old Becomes 'Hacker Queen' A middle school student ranked first place in the "Hacker Queen Contest" organized by an Internet security provider it was reported Thursday with fifteen-year-old Choi Hae-ran chosen as number one among 70 hackers competing in the contest. Choi surprised the watchers as she broke into all five test stages in under four hours, when others took as long as four days on average. Analysts noted that with her hacking skill, she can easily break into almost any homepage of any company. Choi says that she never went to academies or took private lessons, but simply browsed around the various web sites related to hacking. Although she is more into reading computer magazines and books than school textbooks, she rarely fails to top her class. http://www.chosun.com/w21data/html/news/200106/200106210282.html High-tech thieves plant money 'bugs' Clever real-world credit card thieves apparently have a new high-tech tool in their arsenal. A credit card terminal maker says it has discovered the existence of small, number stealing electronic "bugs." The devices can be secretly placed inside store terminals, where they "skim" card numbers with each transaction. The bugs are even smart enough to trick a terminal into "phoning home," delivering batches of stolen numbers to fake credit card manufacturing locations. While acknowledging the threat may be real, Visa International and other terminal makers caution that use of the James Bond-esque device is hardly widespread. http://www.msnbc.com/news/589575.asp CIA says hackers move too fast The CIA cannot predict computer attacks on U.S. systems before they happen, as the agency is expected to do with political and military events, a top CIA official told Congress on Thursday. Despite a major increase in intelligence efforts dedicated to computer security, attackers still develop new tools and techniques faster than the CIA can keep up, Lawrence K. Gershwin said. Often, "we end up detecting it after it's happened," said Gershwin, the CIA's top adviser on science and technology issues. "I don't feel very good about our ability to anticipate." http://www.salon.com/tech/wire/2001/06/21/cia/index.html http://news.cnet.com/news/0-1003-200-6344815.html http://www.usatoday.com/life/cyber/tech/2001-06-21-cia-hackers.htm http://www.msnbc.com/news/590637.asp Cyber-Terrorists Still Prefer Bombs Over Bytes - CIA Traditional terrorist adversaries of the United States, despite their intentions to damage U.S. interests, are less developed in their computer network capabilities and thus pose only a limited cyber-threat, an intelligence officer for the Central Intelligence Agency (CIA) told lawmakers today. "In the near term, terrorists are likely to stay focused on traditional attack methods - bombs still work better than bytes," said Lawrence K. Gershwin, national intelligence officer for science and technology at the CIA's National Intelligence Council. "But we anticipate more substantial cyber-threats are possible in the future as a more technically competent generation enters the ranks," Gershwin said at a Senate Joint Economic Committee hearing today. http://www.newsbytes.com/news/01/167150.html Cyberspace: The next battlefield They don't drive tanks, fly jets or even wear boots. But the computer technicians hunkered down in virtual foxholes in a pale yellow building here in suburban Washington might well be the frontline soldiers in the nation's next war. They work for the Defense Information Systems Agency, which figures that future conflicts won't be won by shooting down the enemy's aircraft but by shutting down its computers. Today, they defend the U.S. military's 2.5 million computers against hackers. But they are being trained to guard against computer attacks by other countries and to launch computer virus invasions that will bring chaos to a foe's communications networks, financial systems and power grids. http://www.usatoday.com/life/cyber/tech/2001-06-19-cyberwar-full.htm Russia, China working on cyber warfare - US official Russia and China appear to be developing computer-based tools with the potential to do long-lasting harm to the U.S. economy, a top intelligence official told Congress on Thursday. Such arms will give future foes new leverage over the United States, including a way to ratchet up pressure and the prospect of anonymity, said Lawrence Gershwin, the national intelligence officer for science and technology. Testifying before the Joint Economic Committee, Gershwin cited what he called some nations' public acknowledgment of the role cyber attacks would play as the ``next wave of military operations.'' http://www.siliconvalley.com/docs/news/reuters_wire/1303934l.htm http://www.zdnet.com/zdnn/stories/news/0,4586,2779131,00.html California Hack Points to Possible Surveillane Threat THIS MONTH'S revelation that hackers broke into computer systems owned by California's primary electric power grid operator highlights a growing fear on the part of federal officials that such intrusions could be part of long-term intelligence-gathering activities. The intrusion, which occurred this spring, remained undetected for 17 days. The intent of the network break-in at the Folsom, Calif. -- based California Independent System Operator (Cal-ISO) wasn't clear. But security analysts said the lack of apparent damage indicates that the break-in was conducted either by an unsophisticated group of hackers or by attackers whose intent was to collect information about the systems and to document vulnerabilities. http://63.108.181.201/2001/06/21/23762/74278492-0079-KEYWORD.Missing.html ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:18 PDT