Return-Path: <sentto-279987-1378-993645020-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 27 Jun 2001 05:31:10 -0700 (PDT) Received: (qmail 11884 invoked by uid 510); 27 Jun 2001 11:32:24 -0000 Received: from n2.groups.yahoo.com (HELO hi.egroups.com) (216.115.96.52) by 204.181.12.215 with SMTP; 27 Jun 2001 11:32:23 -0000 X-eGroups-Return: sentto-279987-1378-993645020-fc=all.net@returns.onelist.com Received: from [10.1.4.53] by hi.egroups.com with NNFMP; 27 Jun 2001 12:30:20 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_1_3); 27 Jun 2001 12:30:19 -0000 Received: (qmail 7196 invoked from network); 27 Jun 2001 12:30:16 -0000 Received: from unknown (10.1.10.142) by l7.egroups.com with QMQP; 27 Jun 2001 12:30:16 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 27 Jun 2001 12:30:16 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id FAA14959 for iwar@onelist.com; Wed, 27 Jun 2001 05:30:16 -0700 Message-Id: <200106271230.FAA14959@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Wed, 27 Jun 2001 05:30:16 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] news Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit DOD agents continue chasing computer hackers Defense Department computer security systems and specialists foiled nearly 22,500 would-be intruders in 1999, and 24,500 in 2000. There is no let-up in sight. Special Agent Jim Christy said he and others on his law enforcement staff are in a growth business, chasing hackers and spies and running down other criminal activities. As representatives of the office of the assistant secretary of defense for command, control, communications and intelligence, they also counsel DOD employees on being an effective first line of defense instead of the weakest link. http://www.af.mil/news/Jun2001/n20010626_0866.shtml Revenge of the Laid-Off Techies Angry ex-employees can do real damage to your company's computer networks. Here's how to make sure pink slips don't lead to meltdowns. These are busy times at the FBI's San Francisco office, home of the most active computer-crimes unit in the country. Thanks to the availability of automated tools that can wreak havoc on the Web, investigators there are seeing increasing reports of malicious hacking. The FBI is also seeing rampant insider hacking, which accounts for 60% to 80% of corporate computer crimes, according to consultants such as Gartner Group. As layoffs at technology and manufacturing companies continue to climb, more and more disgruntled former employees are attempting to damage or break into their former employers' networks. "It has definitely been on the rise. We have had more referrals to and complaints from victim companies," says Andrew Black, a special agent in the office. http://www.businessweek.com/bwdaily/dnflash/jun2001/nf20010626_024.htm CIA grappling with its role amid IT revolution Unless the CIA can find a way to tap into the IT revolution taking place in the private sector, it runs the risk of becoming an irrelevant player in the major national security policy debates of the future, according to an internal agency memo made public this week. "I worry that the agency could see its usefulness diminish over time," wrote former CIA Inspector General L. Britt Snider in a farewell letter to agency officials before his retirement in January. "I believe the continued ability of the agency to add value will be largely a function of its ability to harness the technological advances being made in the private sector to its tasks," he said. http://www.cnn.com/2001/TECH/industry/06/26/cia.role.idg/index.html Survey: Security Password Picks Are Easy Prey The UK survey found that 47 percent of respondents used their own name or a nickname as a password, and 32 percent chose their favorite football team or celebrity. A new computer password survey of British employees highlights what many security experts see as an underrated threat: passwords that are obvious to people or to "cracking" programs widely available on the Internet. The survey, conducted by UK domain registry CentralNic, revealed that nearly half of the workers polled use their own name or a nickname and a third used a favorite sports team or celebrity for their passwords. Security experts say most employees are not aware how easy it is to guess -- or more commonly, use a cracking tool -- to uncover passwords and gain access to the company network. http://www.newsfactor.com/perl/story/11524.html [FC - will this never change?] ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:19 PDT