[iwar] news

From: Fred Cohen (fc@all.net)
Date: 2001-06-27 05:30:16


Return-Path: <sentto-279987-1378-993645020-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 27 Jun 2001 05:31:10 -0700 (PDT)
Received: (qmail 11884 invoked by uid 510); 27 Jun 2001 11:32:24 -0000
Received: from n2.groups.yahoo.com (HELO hi.egroups.com) (216.115.96.52) by 204.181.12.215 with SMTP; 27 Jun 2001 11:32:23 -0000
X-eGroups-Return: sentto-279987-1378-993645020-fc=all.net@returns.onelist.com
Received: from [10.1.4.53] by hi.egroups.com with NNFMP; 27 Jun 2001 12:30:20 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_1_3); 27 Jun 2001 12:30:19 -0000
Received: (qmail 7196 invoked from network); 27 Jun 2001 12:30:16 -0000
Received: from unknown (10.1.10.142) by l7.egroups.com with QMQP; 27 Jun 2001 12:30:16 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 27 Jun 2001 12:30:16 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id FAA14959 for iwar@onelist.com; Wed, 27 Jun 2001 05:30:16 -0700
Message-Id: <200106271230.FAA14959@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 27 Jun 2001 05:30:16 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

DOD agents continue chasing computer hackers Defense Department computer
security systems and specialists foiled nearly 22,500 would-be intruders
in 1999, and 24,500 in 2000.  There is no let-up in sight.  Special
Agent Jim Christy said he and others on his law enforcement staff are in
a growth business, chasing hackers and spies and running down other
criminal activities.  As representatives of the office of the assistant
secretary of defense for command, control, communications and
intelligence, they also counsel DOD employees on being an effective
first line of defense instead of the weakest link. 
http://www.af.mil/news/Jun2001/n20010626_0866.shtml

Revenge of the Laid-Off Techies Angry ex-employees can do real damage to
your company's computer networks.  Here's how to make sure pink slips
don't lead to meltdowns.  These are busy times at the FBI's San
Francisco office, home of the most active computer-crimes unit in the
country.  Thanks to the availability of automated tools that can wreak
havoc on the Web, investigators there are seeing increasing reports of
malicious hacking.  The FBI is also seeing rampant insider hacking,
which accounts for 60% to 80% of corporate computer crimes, according to
consultants such as Gartner Group.  As layoffs at technology and
manufacturing companies continue to climb, more and more disgruntled
former employees are attempting to damage or break into their former
employers' networks.  "It has definitely been on the rise.  We have had
more referrals to and complaints from victim companies," says Andrew
Black, a special agent in the office. 
http://www.businessweek.com/bwdaily/dnflash/jun2001/nf20010626_024.htm

CIA grappling with its role amid IT revolution Unless the CIA can find a
way to tap into the IT revolution taking place in the private sector, it
runs the risk of becoming an irrelevant player in the major national
security policy debates of the future, according to an internal agency
memo made public this week.  "I worry that the agency could see its
usefulness diminish over time," wrote former CIA Inspector General L. 
Britt Snider in a farewell letter to agency officials before his
retirement in January.  "I believe the continued ability of the agency
to add value will be largely a function of its ability to harness the
technological advances being made in the private sector to its tasks,"
he said. 
http://www.cnn.com/2001/TECH/industry/06/26/cia.role.idg/index.html

Survey: Security Password Picks Are Easy Prey The UK survey found that
47 percent of respondents used their own name or a nickname as a
password, and 32 percent chose their favorite football team or
celebrity.  A new computer password survey of British employees
highlights what many security experts see as an underrated threat:
passwords that are obvious to people or to "cracking" programs widely
available on the Internet.  The survey, conducted by UK domain registry
CentralNic, revealed that nearly half of the workers polled use their
own name or a nickname and a third used a favorite sports team or
celebrity for their passwords.  Security experts say most employees are
not aware how easy it is to guess -- or more commonly, use a cracking
tool -- to uncover passwords and gain access to the company network. 
http://www.newsfactor.com/perl/story/11524.html
[FC - will this never change?]

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:19 PDT