On Monday, August 26, 2002, at 08:37  PM, R. A. Hettinga wrote:

> --- begin forwarded text
>
> Date: Mon, 26 Aug 2002 19:14:44 -0400
> From: Sean Trainor <[EMAIL PROTECTED]>
> Subject: [dgc.chat] Crowne Gold Update
> To: GoldMoney List Server <[EMAIL PROTECTED]>
> Organization: Crowne Gold
> ...
> Update: Crowne Gold

...long account of nature of intrusion elided....

> By getting an administrator to respond directly to email, the hackers
> gained access to a computer half a world away from the front-end server 
> and
> eventually captured administrative logons.  The primary server system 
> was
> not attacked until Carnival was in full swing in the Caribbean from
> whence Crowne Gold customer service functions are provided.  When it was
> discovered that hackers had penetrated the system, IP addresses were put
> under trace and the information gained was submitted to Interpol.

And what will happen if and when TLAs decide the best way to undermine 
confidence in upstart, anarchic extra-governmental banks who haven't 
been paying bribes and taxes for generations, like some Swiss banks, 
etc. is to hack them, drain the accounts, or at least shut them down for 
distressing amounts of time?

Will Interpol do anything when HMRG or POTUS was behind the attack?

And considering that CERT wants to be notified first of any identified 
weaknesses, and presumably they and others in HomeSec and other BlackOps 
TLAs know weaknesses not yet publicized or fixed, wanna bet whether they 
could attack many of the upstart offshore banks?

> As you may be aware, Crowne Gold absorbed the former 3PGold whose 
> front-end
> server was located at Havenco at the Principality of Sealand.  Havenco 
> is
> physically secure but when the hackers accessed Crowne Golds equipment 
> at
> the Havenco server farm, there was no one on location at Havenco to 
> support
> the several IT persons on the Crowne Gold side who desperately needed on
> site assistance.   It took several days for Havenco staff to respond to
> calls for assistance and then it became immediately apparent that those 
> in
> communication were nowhere near the actual Havenco platform.

You have just now realized that the Sealand platform is minimally 
staffed?  We heard this a couple of years ago, straight from people who 
ought to know. Seems to me that you have not done due diligence....

(I mean, how can Ryan be on the platform and also be on his way to 
Burning Man? (As an example...I haven't heard from Ryan in a long while, 
but I know that at one time he was administering the Sealand routers and 
boxes remotely.)

> Again we apologize for the delay. We have been rudely educated. Yet as
> things go it has been a dramatic wake-up call and probably the best time
> possible for us to live through this experience.

This will not be the last such attack. Nor could it be expected to be.

Banks have been robbed, blackmailed, threatened, and even burned for 
thousands of years. If digital banking (in its various forms) is 
successful at all, it will be attacked.

Some will try to attack these banks because that's where the money is, 
as Willie Sutton used to say. Others will attack because of the threat 
the digital banks pose, to other banks, to tax collectors, to the status 
quo. For this second class of attackers, disrupting or tarnishing the 
reputation of the operation is enough.

Much more could be said on this.

--Tim May

Reply via email to