You could always start with "Reflections on Trusting Trust" for a "has
this ever happened" paper.  http://www.acm.org/classics/sep95/

There is lots of folklore that it has happened recently, but none of it
is real.  There were lots of rumor that the US used trojaned copiers
against Hussein in Desert Storm, but that was an April Fools joke that
the foreign press didn't understand.  There are web sites that have set
up special content for competitors to see, but that isn't in the same
league.

The terrible thing is that such an attack is possible, doable, and can
be nearly impossible to detect, prove, or disprove.  It all comes down
to trust.

On Tue, Feb 05, 2002 at 09:50:49AM -0800, [EMAIL PROTECTED] wrote:
> I remember reading years ago discussions like this about Firewall-1
> and for the most part nothing of interest ever came from it. Does
> anyone have any evidence which can be publicly cited that something
> like this has ever happened? And does anyone here have any idea how we
> would go about performing a review like this without looking like
> conspiracy theorists?



--
William Colburn, "Sysprog" <[EMAIL PROTECTED]>
Computer Center, New Mexico Institute of Mining and Technology
http://www.nmt.edu/tcc/     http://www.nmt.edu/~wcolburn

----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/

Reply via email to