-Caveat Lector-   <A HREF="http://www.ctrl.org/">
</A> -Cui Bono?-

from:
http://www.aci.net/kalliste/
Click Here: <A HREF="http://www.aci.net/kalliste/">The Home Page of J. Orlin
Grabbe</A>
-----

Information Warfare


Army on Worldwide Alert Against Boys from Brazil


Defend that web page or die trying.

HOUSTON — The Army has placed its cyberdefense teams on full alert after a
known hacker group threatened to take down the Army's World Wide Web home
page this Friday.

On Tuesday evening the Army placed its cyberdefenders at the Land Information
Warfare center at Fort Belvoir, Va., on full alert after a group known as the
Boys from Brazil threatened to hack into the Army home page on Friday.

But today the Army clarified that the hacker group it is watching is Hacking
for Girliez, which took down the New York Times' site in September 1998. Most
of the hackers' remarks appeared in comment tags, which can be seen in source
material but not on a Web page. The tags include such remarks as "'Immature
kids' were able to bypass...$25,000 firewalls [and] bypass the security put
there."

Philip Loranger, chief of the Command and Control Protect Division in the
Army's Information Assurance Office, speaking here at the 2000 Army Directors
of Information Management Conference, said the Army is prepared for any
attack against the its Web site.

"We've had to activate some countermeasures to protect the Army home page,"
Loranger said, declining to provide specifics for security reasons. However,
he said the countermeasures being put in place do not include disconnecting
the Army site from the Internet.

Specific details emerged today on some of the steps the Army has taken in the
past few months to prepare for these types of attacks. Lt. Col. James
Withers, a systems engineering specialist with the Army signal command, said
the Army's regional CERTs have written special software scripts that will
help defend against known hacker tactics. The Army also developed Web cache
proxy servers that divert Web surfers away from primary servers residing
behind firewalls on Army installations.

The Army is also in the process of deploying a protected domain name system
architecture that will help the service regain control of all Army Internet
sites and network entry points.

"We know the hackers mapped [the old architecture]," Withers said, adding
that 90 percent of the Army's global protected DNS architecture should be
completed by April.

Loranger demonstrated for conference attendees how simple it is for hackers
to exploit known operating system vulnerabilities using widely available
hacker tools and standard systems administrator procedures. In fact,
Loranger, with the approval of the Army's staff counsel, demonstrated a live
hacking of another computer system to show how within minutes hackers can
crack into known password vulnerabilities and take over entire systems and
networks.

Loranger also said that the lack of international laws governing conduct on
the Internet poses real obstacles to the government's ability to respond to
foreign-based hacker attacks. Loranger pointed out that some graduate-level
computer education schools in India, for example, have established hacking
into U.S. government systems as an academic requirement.

Lt. Col. LeRoy Lundgren, program manager for the Army's National Security
Improvement Program, said as many as 285,000 network queries were denied by
Army security systems last year because of the questionable method used.
Lundgren added that the Army has seen an increase in the number of queries
originating in foreign countries, particularly China and Bulgaria.
Federal Computer Week, March 16, 2000
-----
Aloha, He'Ping,
Om, Shalom, Salaam.
Em Hotep, Peace Be,
All My Relations.
Omnia Bona Bonis,
Adieu, Adios, Aloha.
Amen.
Roads End

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are not allowed. Substance—not soap-boxing!  These are sordid matters
and 'conspiracy theory'—with its many half-truths, misdirections and outright
frauds—is used politically by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to