_________________________________________________________________ London, Wednesday, October 23, 2002 _________________________________________________________________
INFOCON News _________________________________________________________________ IWS - The Information Warfare Site http://www.iwar.org.uk _________________________________________________________________ --------------------------------------------------------------------- To subscribe - send an email to "[EMAIL PROTECTED]" with "subscribe infocon" in the body To unsubscribe - send an email to "[EMAIL PROTECTED]" with "unsubscribe infocon" in the body --------------------------------------------------------------------- _________________________________________________________________ ---------------------------------------------------- [News Index] ---------------------------------------------------- [1] Attack on Net servers fails [2] Could a Worm Take Over the Net in Minutes? [3] Less noise at the CIA [4] Inside ICANN - The Jonathan Cohen Interview - part 1 [5] Software security--a matter of trust [6] Army making strides in intell [7] Web of deceit [8] Web Vandalism on the Rise [9] E-tailers join up to fight online fraud [10] UK ISPs balk at giving customer data to police [11] PsyOps leaflets may be dropped again [12] PSYOPS battalion heading to Iraq? [13] Encryption gets business boost [14] PGP reborn makes its pitch for the mainstream [15] Army mobilized on Objective Force [16] Customs planning classified net [17] Agencies collaborate with industry on nuclear supercomputer _________________________________________________________________ News _________________________________________________________________ (It is very difficult to attack such systems as there are too many redundancies. Such an attack would only have a chance of success if it lasted for a long time as other DNS servers would then be unable to update their lists. What I am interested in is to know what would happen if the US decided to cut off some countries and removed their domains from the root DNS, would there be an impact? Does anyone know? WEN) '... Still, the results were not severe. According to Matrix NetSystems, the peak of the attack saw the average reachability for the entire DNS network dropped only to 94 percent from its normal levels near 100 percent. ...' [1] Attack on Net servers fails By Robert Lemos Staff Writer, CNET News.com October 22, 2002, 7:40 PM PT An attempt to cripple the computers that serve as the address books for the Internet failed Monday. The so-called distributed denial-of-service attack leveled a barrage of data at the 13 domain-name service root servers beginning around 1 p.m. PDT Monday and apparently is ongoing, according to Internet performance measurement company Matrix NetSystems. Traffic from several Internet service providers have been slightly delayed, but because the domain name system is spread out and because the 13 root servers are the last resort for address searches, the attack had almost no effect on the Internet itself. http://news.com.com/2100-1001-963005.html Net backbone comes under cyberattack http://www.boston.com/dailyglobe2/296/business/Net_backbone_comes_under_ cyberattack+.shtml Key Internet servers hit by attack http://www.cnn.com/2002/TECH/internet/10/23/internet.attack.ap/index.htm l Hackers' bid to cripple Internet fails http://www.abc.net.au/news/scitech/2002/10/item20021023130601_1.htm Root server DoS attack slows net http://www.theregister.co.uk/content/6/27731.html ---------------------------------------------------- (The paper is quite a cybergeddon scenario, but it is still interesting to read. Luckily reality looks different as most (but not all) virus/worm creators are quite lame, i.e. Nimda, Cod Red were quite primitive compared to what would have been possible. I would be really surprised if someone came up with a perfect virus or worm. Nevertheless, I would not be surprised if the military were working on such a program in research labs as it got potential. WEN) [2] Could a Worm Take Over the Net in Minutes? Could a Worm Take Over the Net in Minutes? Researchers are warning of dangerous new worms that would be almost impossible to stop, but not everyone is convinced. Ellen Messmer, Network World Tuesday, October 22, 2002 Computer science researchers are predicting new types of dangerous worms that would be able to infect Web servers, browsers, and other software so quickly that the working Internet itself could be taken over in a matter of minutes. Though still in the realm of theory, the killer worms described in a research paper entitled, "How to Own the Internet in Your Spare Time", are triggering some skepticism but the idea of them is seldom dismissed as outlandish science fiction. http://www.pcworld.com/news/article/0,aid,106187,00.asp Paper: How to 0wn the Internet in Your Spare Time http://www.icir.org/vern/papers/cdc-usenix-sec02/ ---------------------------------------------------- [3] Less noise at the CIA David Ignatius IHT Saturday, October 12, 2002 Tools for analysts WASHINGTON Amid a daily tidal wave of information, how do we turn raw data into useful knowledge? Many of us feel as if we are drowning in data, adrift in a sea of unanswered e-mails and meddlesome voice-mail messages. As the tools of communication become more sophisticated, they seem to add more noise to our lives, not more clarity. http://www.iht.com/articles/73451.html ---------------------------------------------------- [4] Inside ICANN - The Jonathan Cohen Interview - part 1 18th October, 2002 - Click for printer friendly version In the first of this three part interview with Jonathan Cohen, Director of ICANN and leading IP lawyer, Mr Cohen reveals what it's like to be a board member of the not-for-profit organisation that co-ordinates policy for the Internet domain name and addressing system. Demys: We would like to begin by putting two quotations to you - I relish the possible opportunity to address the multi-faceted and complex issues which will surely face this Board... [Acceptance by Jonathan Cohen of nomination for election to ICANN Board, October 6, 1999] It's a hoot being a Volunteer in Cyberhell [email to Mary Hewitt @ ICANN, August 16, 2002] Johnathan Cohen: I meant every word of the nomination acceptance. I have found it to be one of the most interesting and challenging experiences of my life and I consider myself to be very fortunate indeed to have kind of stumbled into this. When you do the same thing for a very long time it's more difficult to find challenge and to test your mettle. I'm the kind of person who feels it's very important to continue to grow and the only way is to put yourself in situations that are new and difficult. http://www.demys.net/news/02_oct_18_inside_icann.htm ---------------------------------------------------- [5] Software security--a matter of trust By Larry Seltzer October 22, 2002 You can make a good argument that any practical computer security arrangement involves some level of trust between software providers and software users. We make security trust decisions all the time--for instance, when accepting or rejecting a digital certificate prior to downloading software. But can we know whether the software we download is truly safe? Maybe not, as recent attacks against well-known open source software sites suggest. Both attacks were against the source code distributions of the products, not the binaries, and both took the clever step of compromising the build process, rather than the actual executable produced. The first attack was against OpenSSH, a popular open-source secure shell tool. The attacker appears to have planted modified sources on the OpenSSH FTP server. For a one- or two-day period, anyone who downloaded some versions of OpenSSH and built the sources was vulnerable; the attack code connected to a particular host over a port 6667. http://techupdate.zdnet.com/techupdate/stories/main/0,14179,2895282,00.h tml ---------------------------------------------------- '... The Army is working with the Defense Advanced Research Projects Agency on developing a total information awareness system that combines strategic analysis with knowledge discovery to promote collaboration among users worldwide. Total information awareness incorporates transactional data systems, biometric authentication technologies, intelligence data and automated virtual data repositories, and the agencies are working on building a "mediation layer" that allows all the databases to link together, Alexander said. ...' [6] Army making strides in intell BY Dan Caterinicchia Oct. 22, 2002 The Army's intelligence capabilities are improving steadily thanks to new technologies paying dividends in the field and an unprecedented amount of collaboration with Defense Department and national intelligence community colleagues. But the service and its partners are still a long way from being able to quickly process, analyze and act on the approximately 1 billion pieces of intelligence information that come in daily, and technology is only part of the solution, according to Army officials. http://www.fcw.com/fcw/articles/2002/1021/web-ausa-10-22-02.asp ---------------------------------------------------- [7] Web of deceit Who's sending you all those scam Nigerian e-mails? By Brendan I. Koerner SLATE.COM Oct. 22 - Perhaps you heard from Daniel A. Oluwa over the past few days. He's a member of Nigeria's Federal Audit Committee. He dropped you an e-mail, labeled "Strictly Confidential," stating that he's discovered a frozen account containing $42.5 million. Mr. Oluwa wants to snag the loot, but, for unfathomable reasons, he needs a foreign-based partner to act as an intermediary. Interested? Merely send along your "bank name, address, account number, swift code, ABA number (if any), beneficiary of account, telephone and fax numbers of bank." Thirty percent of the booty shall eventually be yours. http://www.msnbc.com/news/824336.asp ---------------------------------------------------- [8] Web Vandalism on the Rise By Jim Wagner Web vandalism is on the rise around the world, underscoring the shoddy state of affairs in IT security, according to the owner of a Web site that tracks such information. In the past two weeks, Zone-H.org proprietor Roberto Preatoni said defacements have increased to more than 500 separate attacks a day and more than 1,500 over weekends. A year ago, he said, his site got around 30 to 50 defacement notices a day from hackers. This increasing trend, he said, should put IT managers on notice, because if crackers (malicious hackers) have access to the Web server controlling public pages, they likely have access to the entire network. "There are some defacements not getting to the root level, but most of the time there is a root privilege access behind the defacement, therefore everything which is contained in the Web server is at danger," he said. http://www.internetnews.com/dev-news/article.php/1485601 ---------------------------------------------------- [9] E-tailers join up to fight online fraud By Dinah Greek [23-10-2002] Nationwide system will alert shops to web-based scams A new scheme to help retailers fight online fraud will be in place by the end of the month. As the growth of e-commerce leads to a boom in fraudulent online transactions, a system developed by the Interactive Media in Retail Group (IMRG), a trade association for e-tailers, aims to combat the shady shoppers. http://www.vnunet.com/News/1136196 ---------------------------------------------------- [10] UK ISPs balk at giving customer data to police The Internet industry dealt a blow to Britain's tough anti-terrorism legislation on Tuesday by refusing to reveal personal cyber-data to police. It has turned down a request from Home Secretary David Blunkett to allow police and intelligence officers to access the personal records of their customers on request without the approval of a judge. http://zdnet.com.com/2110-1105-962950.html ---------------------------------------------------- (Influence Operations during the 91 Gulf War were very successful: 'a captured general said that "Second to the allied bombing campaign, Psyop leaflets were the highest threat to the moral of the troops."' WEN) [11] PsyOps leaflets may be dropped again CORRESPONDENT / PAUL DEGAETA Congress' recent authorization allowing President Bush the use of military force to deal with Iraq has all but set a date for Gulf War II. Military planners have indicated that this will be a different war than the first in 1991, but one thing that isn't likely to change is the dropping of leaflets on enemy forces by U.S. Psychological Operations (PsyOps) detachments. A decade ago, as many of our area Gulf War veterans recall, millions of psychological warfare leaflets rained down on Iraqi military forces and the civilian population. Some GIs kept them as souvenirs when they found them blowing around the desert. They are purposefully colorful: People are more likely to pick them up if they attract their attention. http://www.heraldtribune.com/apps/pbcs.dll/article?Site=SH&Date=20021017 &Category=COLUMNIST62&ArtNo=210170332&Ref=AR&Profile=1053&SectionCat=NEW S0103 See also: Persian Gulf War 10 years later - Winning the war by convincing the enemy to go home http://www.iwar.org.uk/psyops/resources/gulf-war/13th_psyops.htm ---------------------------------------------------- [12] PSYOPS battalion heading to Iraq? Source says psychological-warfare troops preparing for action Posted: October 22, 2002 1:00 a.m. Eastern By Jon Dougherty C 2002 WorldNetDaily.com In another sign that the United States could be gearing up for war against Iraq, the U.S. Army's 10th Psychological Operations Battalion is gearing up to deploy overseas, probably in support of anticipated military action against Iraq, WorldNetDaily has learned. http://www.worldnetdaily.com/news/article.asp?ARTICLE_ID=29361 ---------------------------------------------------- [13] Encryption gets business boost By Matt Loney ZDNet (UK) October 22, 2002, 11:59 AM PT Troubled security software maker Baltimore Technologies is hoping to boost the adoption of public-key encryption by building the technology into a new suite of products. Public-key encryption is used to secure electronic transactions and to digitally sign important documents such as contracts and legal forms. Baltimore creates some of the building blocks for conducting such transactions and allows third parties to verify the identity of digital signatures--a system known as the public-key infrastructure (PKI). http://zdnet.com.com/2100-1104-962945.html ---------------------------------------------------- [14] PGP reborn makes its pitch for the mainstream By John Leyden Posted: 10/22/2002 at 12:24 EST Encryption products need to become as easy and transparent to use as AV software packages. That's the goal of Phil Dunkelberger, President and CEO of PGP Corporation, who's over in London this week for the European launch of the newly-formed company. PGP Corporation was created to market PGP Desktop and Wireless encryption products bought from Network Associates back in August. The deal ended month of speculation over the future of the technology following Network Associates' decision to mothball it back in March. http://www.theregus.com/content/55/26727.html ---------------------------------------------------- [15] Army mobilized on Objective Force BY Dan Caterinicchia Oct. 22, 2002 The Army is using new training, acquisition and development techniques in an attempt to meet its aggressive timetable for fielding the Objective Force by the end of the decade. The Objective Force is a strategy to develop advanced information technology tools, vehicles and weaponry to make the Army's armored forces more agile and lethal and better able to survive an all-out fight. http://www.fcw.com/fcw/articles/2002/1021/web-army-10-22-02.asp ---------------------------------------------------- [16] Customs planning classified net BY Judi Hasson Oct. 22, The U.S. Customs Service is looking for vendors with security clearances to build a classified network for sensitive law enforcement data. Customs is expected to issue a draft proposal Oct. 25 that will be available only to vendors that already have certified they have a top-secret facility security clearance and personnel holding valid security clearances. http://www.fcw.com/fcw/articles/2002/1021/web-customs-10-22-02.asp ---------------------------------------------------- [17] Agencies collaborate with industry on nuclear supercomputer >From National Journal's Technology Daily The Energy Department and National Nuclear Security Administration (NNSA) will join forces with Sandia National Laboratories and the technology firm Cray to develop a supercomputer as part of the department's Stockpile Stewardship Program. Dubbed "Red Storm," the $90 million project will be part of the NNSA's plan to provide a computer system that can simulate nuclear weapons operations. It will complement the NNSA's advanced simulation and computing program, which joins the NNSA with U.S. computer manufacturers in order to produce more powerful computing systems. http://www.govexec.com/dailyfed/1002/102202td1.htm ---------------------------------------------------- _____________________________________________________________________ The source material may be copyrighted and all rights are retained by the original author/publisher. Copyright 2002, IWS - The Information Warfare Site _____________________________________________________________________ Wanja Eric Naef Webmaster & Principal Researcher IWS - The Information Warfare Site <http://www.iwar.org.uk> --------------------------------------------------------------------- To subscribe - send an email to "[EMAIL PROTECTED]" with "subscribe infocon" in the body To unsubscribe - send an email to "[EMAIL PROTECTED]" with "unsubscribe infocon" in the body --------------------------------------------------------------------- IWS INFOCON Mailing List @ IWS - The Information Warfare Site http://www.iwar.org.uk