Return-Path: <sentto-279987-1382-993734080-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Thu, 28 Jun 2001 06:16:14 -0700 (PDT) Received: (qmail 13394 invoked by uid 510); 28 Jun 2001 12:16:18 -0000 Received: from ci.egroups.com (64.211.240.235) by 204.181.12.215 with SMTP; 28 Jun 2001 12:16:18 -0000 X-eGroups-Return: sentto-279987-1382-993734080-fc=all.net@returns.onelist.com Received: from [10.1.4.53] by ci.egroups.com with NNFMP; 28 Jun 2001 13:14:40 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_1_3); 28 Jun 2001 13:14:39 -0000 Received: (qmail 56962 invoked from network); 28 Jun 2001 13:14:38 -0000 Received: from unknown (10.1.10.26) by l7.egroups.com with QMQP; 28 Jun 2001 13:14:38 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 28 Jun 2001 13:14:38 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id GAA25614 for iwar@onelist.com; Thu, 28 Jun 2001 06:14:38 -0700 Message-Id: <200106281314.GAA25614@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Thu, 28 Jun 2001 06:14:38 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] news Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Net espionage stirs Cold-War tensions Fears of Cold War tensions are finding new life in cyberspace, as the threat of Internet espionage shifts the nuclear-age doctrine of "mutually assured destruction" to that of mutually assured disruption. In one long- running operation, the subject of a U.S. spy investigation dubbed "Storm Cloud," hackers traced back to Russia were found to have been quietly downloading millions of pages of sensitive data, including one colonel's entire e-mail inbox. During three years, most recently in April, government computer operators have watched--often helplessly-- as reams of electronic documents flowed from Defense Department computers, among others. The heist is "equivalent to a stack of printed copier paper three times the height of the Washington Monument," says Air Force Maj. Gen. Bruce Wright of the Air Intelligence Agency. http://www.zdnet.com/zdnn/stories/news/0,4586,2780523,00.html Navy systems management 'alarming' Intrusions into Navy unclassified networks are increasing, and officials are blaming poor systems management and the availability of Web-based hacking tools. In fiscal 2001, there have been 125 successful intrusions into Navy unclassified networks, up from 117 in 1999 and 89 in 2000, said Scott Henderson, the Navy Marine Corps Intranet information assurance division head at the Space and Naval Warfare Systems Command in San Diego. He spoke June 26 at an NMCI press conference. http://www.fcw.com/fcw/articles/2001/0625/web-nmci-06-27-01.asp Navy says new intranet will upgrade computer security http://www.govexec.com/dailyfed/0601/062701j1.htm Motorola Unveils New Weapon to Thwart Cyber Intruders Network administrators now have a new first line of defense in the protection of information assets. Motorola, Inc. announced a visualization and analysis software tool that helps the user visually interpret network attacks at a glance and respond quickly. Motorola Intrusion Vision provides a single, intuitive display of information received from many network and host-based intrusion detection sensors within a business or operation. Additionally, it can correlate attack information received from different sensors to let operators know of a serious attack. Because the data is displayed in near-real time, the user can react quickly based on responses defined by the operation's security policy. Rapid response can serve to eliminate or mitigate potential damage to the network. http://www.Ybreo.com/main/printProductInfo.cfm?ReleaseID=USA.09.00580.27062001.08230 In War Against Cyberspace Intruders, Knowledge Is Power In warfare, information is power. The better you understand your enemy, the more able you are to defeat him. In the war against malicious hackers, network intruders and the other black-hat denizens of cyberspace, the good guys have surprisingly little information. Most security experts--even those who design products to protect against attacks--are ignorant of the tools, tactics and motivations of the enemy. The Honeynet Project, a group of 30 researchers from academia and the commercial sector, is trying to change that. The group obtains information through the use of a Honeynet--a computer network on the Internet that's designed to be compromised. http://www.internetweek.com/columns01/secure061801.htm ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:19 PDT