(Today's newsletter seems to have vanished in the so called
ESpace, so I am sending it again. WEN)

-----Original Message-----
From: Wanja Eric Naef [IWS] 
Sent: 04 October 2002 14:49
To: 'Infocon'
Subject: News 10/04/02

    _________________________________________________________________

                      London, Friday, October 04, 2002
    _________________________________________________________________

                                INFOCON News
    _________________________________________________________________

                            IWS - The Information Warfare Site
                                    http://www.iwar.org.uk 

    _________________________________________________________________

To subscribe - send an email to "[EMAIL PROTECTED]" with "subscribe
infocon" in the body

To unsubscribe - send an email to "[EMAIL PROTECTED]" with
"unsubscribe
infocon" in the body

    _________________________________________________________________

    
          ----------------------------------------------------
                              [News Index]
          ----------------------------------------------------

[1] Report: Satellites at Risk of Hacks
[2] Hackers deface State Department site
[3] Microsoft says 1 percent of bugs cause half of all software errors
[4] Senate cybersecurity bill hits snag
[5] Army looking to outsource

[6] (CA) Federal proposal tells only part of cybercrime story
[7] Bill aims at foreign Web censorship
[8] Bush steps up demand for action on homeland security bill
[9] Northcom faces obstacles at launch
[10] State again target of hacking

[11] Allies Drop Leaflets Warning Iraqis
[12] 'Cowboy' WLANs letting industry down, analyst warns
[13] U.N. arms inspectors run into a few bugs
[14] House Passes Net Gambling Bill
[15] Teaming up against cyberthreats

[16] Klez-H enjoying its final days on infamy?
[17] Assessing Internet Security Risk, Part Four: Custom Web
Applications

    _________________________________________________________________

                                News
    _________________________________________________________________


[1] Report: Satellites at Risk of Hacks

Want to find the most-ignored cybersecurity hole in America's critical
infrastructure? Congressional investigators say, Look up! 
By Kevin Poulsen, Oct 3 2002 4:42PM

Critical commercial satellite systems relied upon by federal agencies,
civilians and the Pentagon are potentially vulnerable to a variety of
sophisticated hack attacks that could cause service disruptions, or even
send a satellite spinning out of control, according to a new report by
the General Accounting Office, the investigative arm of Congress. 

The GAO report, dated August 30th but not released publicly until
Thursday, criticizes the White House for not taking the vulnerabilities
into account in its national cybersecurity planning, a criticism it also
extends back to the Clinton administration.

http://online.securityfocus.com/news/942 

See also:

http://www.mail-archive.com/infocon@infowarrior.org/msg00249.html 

         ----------------------------------------------------

[2] Hackers deface State Department site

Unidentified hackers scrawled virtual obscenities on a State Department
Web site, forcing the department to close the site down, spokesman
Richard Boucher said Thursday. The obscenities appeared Wednesday on the
Web site www.usinfo.state.gov, which is designed to provide information
to computer users outside the United States. Boucher did not describe
the obscenities or know if they were politically motivated.

http://zdnet.com.com/2110-1105-960706.html 

http://news.com.com/2110-1001-960706.html?tag=cdshrt 

http://www.washingtonpost.com/wp-dyn/articles/A39528-2002Oct3.html 


A FoGIS (http://www.fogis.de) member spotted the following:

State Press Briefing 03.10.02

QUESTION:  Yeah, I have tried yesterday afternoon and this morning to
get into your overseas website and have been unsuccessful.  Are you 
all having trouble with that?

MR. BOUCHER:  One of our sites was hacked.  The International
Information website, the usinfo.state.gov site, which is run by the
Bureau of International Information Programs, largely directed at
foreign audiences, was temporarily shut down after the main page was
defaced on October 2nd.  This affects this particular site only.  Our
main site, www.state.gov remains open and most embassy sites from
overseas are not affected.

The defacement was on the main page.  The investigation is being
coordinated by State's Internal Computer Incident Response Team.  
It's not possible to surmise any intent of the intruders beyond
vandalism 
At this point.

The affected site was hosted by a service outside the Department.  At
no time were any inside computers or classified information or
sensitive information in any danger of compromise.  We're fixing the
website and trying to put it back up and running as soon as possible.

QUESTION:  What was the defacement?

MR. BOUCHER:  I don't have information here.

         ----------------------------------------------------

[3] Microsoft says 1 percent of bugs cause half of all software errors
 
SEATTLE (Reuters) - One percent of the bugs in Microsoft Corp.'s
software cause half of all reported errors, with 20 percent of bugs
responsible for 80 percent of the mistakes, Chief Executive Steve
Ballmer said on Wednesday.

Microsoft, the world's largest software company, has been criticised for
unstable and unwieldy software -- which runs on more than 90 percent of
personal computers.

``Let's acknowledge a sad truth about software: any code of significant
scope and power will have bugs in it,'' Ballmer told customers in a memo
similar to one by Chairman Bill Gates this year renewing Microsoft's
commitment to trustworthy computing.

http://www.siliconvalley.com/mld/siliconvalley/4201832.htm 

         ----------------------------------------------------

[4] Senate cybersecurity bill hits snag
By William New, National Journal's Technology Daily

An effort to quickly move through the Senate a bipartisan bill
authorizing $903 million over five years for cybersecurity research has
snagged on an anonymous Republican "hold," sources said. GOP aides on
Thursday said the issue of concern has been resolved and the hold will
be lifted, but at presstime, the Senate Democratic cloakroom said it is
still active.

"It is our understanding there is a hold on it from the Republican
side," said Carol Guthrie, the spokeswoman for bill sponsor Ron Wyden,
D-Ore. "This is particularly distressing in light of Senator Wyden's
policy of publicly announcing when he puts a hold on a piece of
legislation." Publicly announcing a hold is "a step toward resolving
differences in a bipartisan manner." 

A Republican aide, however, said the delay is not a formal hold but
rather one Republican office "taking a closer look" the legislation. 

http://www.govexec.com/dailyfed/1002/100302td1.htm 

         ----------------------------------------------------

... We're already doing that business with [the Defense Information
Systems Agency], where roughly 85 percent of the work is outsourced,"
White told Federal Computer Week immediately following an Oct. 3
luncheon speech sponsored by the Washington, D.C., chapter of the Armed
Forces Communications and Electronics Association. ...

[5] Army looking to outsource
BY Dan Caterinicchia 
Oct. 4, 2002 

Army Secretary Thomas White said the service cannot truly transform
unless its business processes are part of the plan. Therefore, he said
the Army will "privatize every non-core function" that it can develop a
good business case for - including information technology and
communications positions.

http://www.fcw.com/fcw/articles/2002/0930/web-army-10-04-02.asp 

         ----------------------------------------------------

[6] Federal proposal tells only part of cybercrime story

MICHAEL GEIST

Thursday, October 3, 2002

In the wake of the Sept. 11 terrorist attacks, the Canadian government
hurriedly introduced a series of new anti-terror measures.

Quietly included was a seemingly innocuous announcement -- Canada,
alongside other countries such as the United States, would implement the
global cybercrime treaty developed by the Council of Europe.

The full impact of that decision began to take shape last month when
Ottawa released a discussion document outlining the changes required to
bring Canadian law into conformity with the treaty. The document, titled
Lawful Access, details significant changes in the surveillance practices
of Internet service providers (ISP) and in law enforcement's access to
computer data. The proposal is troubling not only for what it says, but
even more so for what it doesn't say.

http://www.globetechnology.com/servlet/ArticleNews/gtnews/TGAM/20021003/
TWGEIS 

         ----------------------------------------------------

[7] Bill aims at foreign Web censorship 
 
By Lisa M. Bowman
  
Oct. 3 - A new bill designed to fight foreign Web censorship has been
introduced in Congress. The legislation, unveiled Wednesday by Rep.
Chris Cox, R-Ca., would create an Office of Global Internet Freedom
charged with fighting Internet blocking and helping Web users in
countries such as China and Syria get around censorship efforts and
avoid punishment. The bill also would allocate $50 million each year
over the next two years to develop and promote anti-blocking technology.

http://www.msnbc.com/news/816770.asp 

         ----------------------------------------------------

[8] Bush steps up demand for action on homeland security bill
By Keith Koffler and Pamela Barnett, CongressDaily 

President Bush Thursday sharpened his call for Congress to send him
homeland security legislation, insisting that lawmakers not go home
until the bill is finished.

Bush issued the call before a meeting with Hispanic leaders at the White
House, calling for Congress to finish the bill before leaving to
campaign.

The president's statement appears to equate the homeland security bill
with the fiscal 2003 Defense appropriations bill, which Bush also wants
to sign before Congress goes home to campaign.

http://www.govexec.com/dailyfed/1002/100302cd1.htm 

         ----------------------------------------------------

[9] Northcom faces obstacles at launch
BY Dan Caterinicchia 
Sept. 30, 2002 

The Defense Department's new Northern Command is scheduled to start up
Oct. 1, but Northcom faces major cultural and technical obstacles in
communicating and sharing information - both internally and with the
civilian authorities it will support.

The command will include representatives from all the armed services,
and it is charged with ensuring homeland defense capabilities and
supporting civil authorities when directed by the president or secretary
of Defense.

Technology would play a role in easing the flow of information between
Northcom and its new partners, and Peter Verga, special assistant to the
secretary of Defense for homeland security noted an example while
speaking Sept. 26 at the Heritage Foundation, a Washington, D.C., think
tank.

http://www.fcw.com/fcw/articles/2002/0923/web-dod-09-27-02.asp 

         ----------------------------------------------------

[10] State again target of hacking

Agencies are warned that the 'Godzilla' server was breached.

By Sam Stanton and Denny Walsh -- Bee Staff Writers
Published 2:15 a.m. PDT Wednesday, October 2, 2002

Five months after investigators found a computer hacker had gained
access to sensitive personal data on thousands of state employees,
officials are warning hundreds of agencies of new assaults on a state
computer server nicknamed "Godzilla."

In letters sent to 260 state agencies over the past few days, U.S.
Attorney John Vincent and California Highway Patrol Commissioner D.O.
"Spike" Helmick are warning of "possible intrusions" of state computer
systems.

Both letters ask officials to check the security of their computers and
report back by Thursday on whether they are secure.

http://www.sacbee.com/content/news/story/4631373p-5649680c.html 

         ----------------------------------------------------

... Defense officials said coalition aircraft dropped 120,000 leaflets
depicting a jet bombing a missile launcher and a radar site with the
message: "Iraqi ADA (air defense artillery) Beware! Don't track or fire
on coalition aircraft!" 

The back side of the leaflet had another message. "The destruction
experienced by your colleagues in other air defense locations is a
response to your continuing aggression toward planes of the coalition
forces," leaflets written in Arabic said. 

"No tracking or firing on these aircraft will be tolerated. You could be
next," said an English translation released by defense officials. ...

[11] Allies Drop Leaflets Warning Iraqis 
Thu Oct 3, 3:32 PM ET
By PAULINE JELINEK, Associated Press Writer 

WASHINGTON (AP) - In a direct message to Iraqi troops, allied forces
dropped thousands of leaflets over the southern no-fly zone in Iraq
warning gunners to stop firing on U.S. and British patrol planes. 

Iraqi forces responded by firing on aircraft delivering the leaflets.
That led allied forces to bomb an air defense operations center, U.S.
Central Command officials said. 

The leaflet drop was the first known direct warning from the Pentagon (
news - web sites) to Iraq's military rank and file in the Bush
administration's campaign to topple Iraqi President Saddam Hussein (
news - web sites). 

http://story.news.yahoo.com/news?tmpl=story&u=/ap/20021003/ap_on_re_mi_e
a/us_iraq_propaganda_1 


         ----------------------------------------------------

[12] 'Cowboy' WLANs letting industry down, analyst warns 

By David Legard 
October 3, 2002 5:43 am PT

  
 THE WIRELESS LAN (WLAN) industry has neither technical nor business
stability and is in danger of causing another round of business
disasters in the telecommunication sector, according to independent
Australian analyst Paul Budde.

The lack of regulation is causing problems for end users, with
reliability and security being ignored in favor of providing multiple
services over broadband WLANs at the lowest possible price, according to
Budde.

http://www.infoworld.com/articles/hn/xml/02/10/03/021003hnwlans.xml 

         ----------------------------------------------------

[13] U.N. arms inspectors run into a few bugs
Mercury News

U.N. inspectors preparing to search Iraq for biological weapons already
have found viruses.

The computer variety.

The viruses were in a mass of overdue reports on four CD-ROMs an Iraqi
official handed to biological, nuclear and chemical inspectors in Vienna
on Monday.

http://www.siliconvalley.com/mld/siliconvalley/4201505.htm 

         ----------------------------------------------------

[14] House Passes Net Gambling Bill
by Mika Takahashi, WINNERonline.com
Updated 2 Oct 2002
  
    
 On Tuesday the U.S. House of Representatives voted to pass Bill HR556,
the Unlawful Internet Gambling Funding Prohibition Act, under a
suspension of the rules. The bill would make it unlawful for banks,
credit card companies, and other financial firms knowingly to transfer
money to Internet gambling sites. It would also make it a federal crime
to operate an "unlawful Internet gambling" Web site. 

http://www.winneronline.com/articles/october2002/hr556.htm 

         ----------------------------------------------------

[15] Teaming up against cyberthreats
BY Diane Frank 
Oct. 3, 2002 

A new list of the top 20 computer security vulnerabilities comes with a
little help this year, as the public and private sectors have teamed up
to close the holes that cause the most problems.

The SANS Institute, the National Infrastructure Protection Center, the
Federal Computer Incident Response Center and the head of the
President's Critical Infrastructure Protection Board came together Oct.
2 to announce a new list of the top vulnerabilities in the Unix and
Microsoft Corp. Windows environments. SANS and the NIPC released the
first list last year.

http://www.fcw.com/fcw/articles/2002/0930/web-alert-10-03-02.asp 

         ----------------------------------------------------

[16] Klez-H enjoying its final days on infamy?
By John Leyden
Posted: 10/02/2002 at 10:00 EST

The nasty BugBear worm made a race for infamy at the end of the month,
but that old favourite Klez-H still made it to the top of the virus
charts last month 

That's according to monthly statistics from managed services firm
MessageLabs, which stopped 576,100 copies of the viruses in September.
It's the fifth month in a row Klez-H has topped the chart. 

MessageLabs reports that virus infection rates are running at around one
per 200 emails, compared to one in 30 infected emails at the heights of
the Goner and Love Bug epidemics.  

http://www.theregus.com/content/56/26491.html 


         ----------------------------------------------------

[17] Assessing Internet Security Risk, Part Four: Custom Web
Applications 
by Charl van der Walt 
last updated October 3, 2002 

This article is the fourth in a series that is designed to help readers
to assess the risk that their Internet-connected systems are exposed to.
In the first installment, we established the reasons for doing a
technical risk assessment. In the second article, we started to discuss
the methodology that we follow in performing this kind of assessment.
The third part discussed methodology in more detail, focussing on
visibility and vulnerability scanning. This installment will discuss a
relatively unexplored aspect of Internet security, custom Web
applications. 

Web Application Analysis 

Of all the possible services on the Internet DNS, e-mail and the World
Wide Web are by far the most pervasive. (In fact, in July 2002, the
monthly Netcraft Web site survey reported that 37,235,470 active Web
servers were connected to the Internet.) Of these, Web services are the
most complex and the most frequently abused. 

http://online.securityfocus.com/infocus/1631 


         ----------------------------------------------------



_____________________________________________________________________

The source material may be copyrighted and all rights are
retained by the original author/publisher.

Copyright 2002, IWS - The Information Warfare Site
_____________________________________________________________________

Wanja Eric Naef
Webmaster & Principal Researcher
IWS - The Information Warfare Site
<http://www.iwar.org.uk>

---------------------------------------------------------------------

To subscribe - send an email to "[EMAIL PROTECTED]" with "subscribe
infocon" in the body

To unsubscribe - send an email to "[EMAIL PROTECTED]" with
"unsubscribe
infocon" in the body

---------------------------------------------------------------------




IWS INFOCON Mailing List
@ IWS - The Information Warfare Site
http://www.iwar.org.uk


Reply via email to