|
Are these lawyers really that stupid
The FBI doesn't want to disclose its key-logging methods. The lawyers are
up in arms. Who hasn't had a key-logger set off their anti-virus software?
Maybe that's why the feds want to keep it secret. Who wants to have to go
and build a new or better one that standard utilities from Norton and McAfee
won't pick up?
Read more...
|
Russian Hackers fall for an old trick
The FBI pulled another fast one on a pair of foreign criminals. This
time luring them out of Russia with a fake job offer. A lot less extravegant
than luring someone out on a boat, but a lot easier to deal with.
Read more...
|
FBI to polygraph sys admins
While we can certainly understand the reluctance of IT types to subject
themselves to polygraphs, why hasn't this been required before? Anyone
who has browsed around on networks knows that these guys often hold
the keys to the castle.
Read more...
|
When will someone besides the GAO take security seriously
Once again the GAO has found a number of ways to penetrate a government agency.
This time it is the IRS. While this isn't surprising, the fact that there is
seemingly no way for the GAO to force the IRS to do anything is.
Read more....
|
New IDS/Network Forensic tool
SilentRunner from Raytheon is slowing becoming public.
All reviews I've heard are that the product is great. Now
to get one's hands on it.
Read more...
|
Are federal agencies violating the law
Congress is starting to apply pressure on the GAO and federal
agencies to see if they are properly securing their systems. So they
are going to conduct penetration tests. Anyone want to start placing
bets on what the results will be?
Read more...
|
People say the internet has hole
Earth-shattering development. Internet has security holes
Read more...
|
More reasons to hate HTML mail
As if receiving mail encoded with HTML isn't annoying enough in a text based
system. And those stupid fonts that are all over various spam messages
don't make it more appealing. Now people can drop stuff into your html
messages....And guess whose software is most commonly vulnerable?
Read more...
|
Microsoft decides to implement backup DNS servers
In one of the most recent large blunders by the giant MS,
they have finally decided that it might be a good idea to introduce
geographically separate DNS servers. I guess they finally read the FAQ.
Read more...
|
New sources for Free Food
Just walk yourself into a .com and eat some free snacks for a few weeks
Read more...
|
Security talent shortage
In what will probably be the first of many articles: Like the rest of the
IT industry, there is predicted to be a shortage of InfoSec talent (especially
given the lack of school programs...not that anything of use is ever learned
in school)
Read more...
|
US to come under attack because of trouble in Mid-East
It's no secret that the U.S. is a big supporter of Israel. It seems
to be something of a secret that the U.S. has also given a lot of
aid to the Palestinians. In any event, for future and past misdeeds, activists
seem determined that U.S. targets will be high on the list in the online
battle in the Mid-East.
Read more..
|
Do as we SAY, not as we DO!
Microsoft is once again the victim of a hacker attack. This time
by a vulnerability that was released as a patch back in August
Read more...
|
Will the latest MS crackers get caught...not likely
With the U.S. government's stellar record of catching computer criminals
and successfully prosecuting them, chances are slim, given that those who
did it aren't out boasting on IRC boards, that anyone will ever be fingered
Read more...
|
MicroSoft Gets Broken into
Source code and versions of the next office and windows versions
Read more...
|
Voicemail Hacker gets 3 years
In what reads to be a very funny article about the exploits of
a Canadian criminal, detective's voicemail boxes were cracked.
Read more...
|
MI-6 Hit by Missle
Even though small arms are illegal to carry in the UK. It appears that
people can sneak off a rocket launcher without a problem
Read more...
|
U.S. Gov't Computer Security Hit with Low Grade
Those that made the article were wallowing in the D range. Unsurprisingly
U.S. Gov't agencies have been hit with a low grade. One would think that the
years of negative press and occurances of breakins might spur some initiative
to fix something. However, in trying to prove the gov't worker stereotype true
they've decided to do nothing.
Read more...
|
Someone at our company would never do anything illegal...
In an attempt to cover his losses (and boy did he cover them) a former
employee of Internet Wire is charged with submitting a false press release
on Emulex to make up for his shortfall when shorting the stock. The last
case of insider (or formerly insider) theft? Yea, right.
Read more...
|
PWC/Information Week Security Survey shows things haven't changed
Perhaps they didn't even bother to send out surveys this year, but while
that is rather unlikely, it seems that the respondants to the surveys kept their
answers pretty much the same as last years.
Read more...
|
Security Watch Authors bruise knees on table
In a bit more of a knee-jerk reaction to Carnivore, the Security Watch
authors go on to complain about Carnivore, the FBI's by now
way overhyped internet filtering tool. Oh well
Read more...
|
FAA to develop security certification
The FAA in conjuction with ISC2 is to develop a security certification
program for FAA systems security workers. Now workers in the FAA can have
a resume building acronym as well.
Read more...
|
Two arrested in Bloomberg extortion case
Two from Kazakhstan, have been arrested by the FBI for trying to blackmail
Bloomberg based on supposed security findings
Read more...
Alternate article
|
University to be selected to review Carnivore
A university should be selected in the next day or two to review the
Carnivore system from the FBI. The results will then be released for public
comment.
Read more...
|
Think SSL makes your server protected?
Chris and Saumil beg to differ (as does a good portion of the security
industry (at least that part that knows what it is doing)). The article
walks you though how easy it is to go after vulnerabilities existing
behind an SSL server.
Read more..
|
How to handle your servers securely
A high-level view on how to go about distributing files and configurations
to your server environment securely.
Read more...
|
Would you hire a Mitnick?
Tales and legends of hiring ex-hackers and some reasons why companies
won't.
Read more...
|
Inflating numbers?
PWC's Fred Rica does his part
to inflate numbers, both of security's costs and number of "hackers" in
his firm. 700 Worldwide...um, that includes quite a large
number of others.
Read more
|
Too many middle agers
The NSA, one of the agencies with the biggest need to hire
young computer talent is finding it difficult to find open
hiring slots (and budget) to competitively hire the new guard.
Read more...
|
Loose lips help foreign spies get into our business
Nothing that is new, but more stories of how loose lips have led
foreigners to underbid and win contracts thanks to some
well timed and placed ears.
Read more...
|
Allegations CIA endorsed 70's Italy Bombings
An ex-Italian secret service general who is in self imposed exile
claims that the CIA endorsed bombings in Italy. A little more reading
into the article shows a lot less blame on the CIA.
Read more...
|
Hacker Convention
In what was probably one of the bigger wastes of time. An article
on DefCon
<Read more...
Three Security Startups look to fill the void
An introduction to 3 security startups, @Stake, Counterpane and Foundstone
and the areas that they are trying to fill.
Read more...
|
Perfect time to lose your keys
The U.K. is trying to pass a bill that would require companies or individuals
to turn over their keys used to encrypt/decrypt email. Ooops, I don't know
where I left them...
Read more...
|
Teens arrested for hacking NASA
In what basically can be described as a show of stupidity some
teens have been arrested for hacking into NASA computers. They did
such smart things as run an IRC server and basically made it easy
for the feds to close in on them.
Read more...
|
FBI e-mail snooping device attacked
A new black box from the FBI that snoops on all email at an ISP is coming
under attack. Under normal wiretaps, the phone company controls the tap.
The ability for the FBI to abuse this system is huge. And there is no one
who can provide any oversight on it since the FBI controls the box.
Read more...
|
Scanning the Internet
A stealth mode company is scanning the entire Internet (minus Gov't sites)
for an unexplained reason. They are nice enough to set off firewalls
and IDS systems at various hours of the night, but they aren't violating
their AUP with Exodus.
Read more...
|
China choosed Linux, fearing holes in Microsoft products
Fearing unknown security holes and backdoors in Microsoft products
China has decided to standardize on Linux. Initial ramifications
include a dramatic drop in software piracy (since Linux is free anyway)
and probably higher unemployment for those in the piracy field.
Read more...
|
The Real ISS
After a good attempt at writing a truthful article on ISS and Chris Klaus
the author got a bit of feedback. Here is his followup article accompanied
by a bit more research.
Read more...
|
Industrial espionage goes high-tech
In a summary of a number of recent events, many high tech companies are
sliding into the grey area on the legal vs. illegal ways of obtaining information
on their competitors.
Read more...
|
EU to investigate U.S. Spy System
Sue Nike?
In a feeble attempt to make money, the owner of the ISP that Nike's
redirected traffic went through is trying to sue Nike for negligence. Note that
this guy previously was sued by Amazon himself.
Read more...
|
Attacks Welcome
A startup in combination with EWeek magazine have opened something of a hacking
challenge. As if this hasn't been done before. Amazing what VC money
will get people to do.
Read more...
|
If you don't share, you won't be allowed to play
IS security execs are doubting the ability of the NIPC to work
as planned based on the FBI's lack of desire to share data with
other members.
Read more...
|
Survey says, most hacks aren't that complicated
A study taken in part by SecurityFocus setting up honeypots on the net show just how random and
easy most hacking attacks are.
Read more...
|
Scanner Security Checks DOS Cisco's
In a case of this won't be the first time and it won't be the last time. An
unidentified security scanner can DOS a Cisco router when checking for unrelated
UNIX vulnerabilities.
Read more...
|
Canadian Encryption Experts get NSA Approval
Canadian encryption experts Kasten-Chase have been granted approval by
the NSA to encrypt
data on the hard drives of sensitive computers. This would have rendered
the disks believed stolen at Los Alamos useless unless the posessed the correct
key
Read more...
|
NY Times leaks Spies Names
The NY Times inadvertantly released a photo that listed names of Iranians who
assisted the CIA in the overthrow of the Shah.
Read more...
|
Anyone got a generator?
As the heat wave showed a week or so ago, Northern California's power
grid is especially weak and unable to handle demand. While new power generators
have been approved, it seems that if you're running a data-center or
an office building you better make sure your generators are working.
(This of course helps the "Save the Air" campaign.
Read more...
|
Nike.Com domain hijacked
Offsite email virus scanning
NATO hit by computer virus
...released by NATO. In trying to protect their machines from virii,
they released a virus that they developed on themselves. Oh well. Maybe
someday they'll learn to work and play on separate networks.
Read more...
|
Americans worried about hackers
Too bad none work in the C*O's office. A recent poll shows that a number
of Americans are worried about the threats brought on by hackers.
Read more...
|
The experts point the finger at other places
At NetSec2000 in San Francisco a panel of security experts were queried
with pointing the finger at whom was to blame for the horrible state
of computer security. Don't worry, even you didn't escape blame.
Read more...
|
A case for less H1-B Visas
In a report about numerous security gaffes at the FAA, the GAO's biggest
complaint is the lack of background checks and the number of foreigners
who had access to sensitive computers who had no checks.
Read more...
|
Service Based Security
With a total of somewhere way south of 10 customers Ernst and Young are
heavily promoting their ESecurityOnline.com site. Another company
Vigilate.com
(where else but on Long Island) is starting similar services. Will they
eventually get customers for a service that consists of reading
mailing lists and formatting that info onto a web page?
Read more...
|
Retired U.S. Officer Charged with Spying for USSR
Recruited by a childhood friend, a former Colonel was arrested in Tampa
for allegedly spying for the USSR from 1969 to 1994. Previously arrested in
Germany, but let go because the statute of limitations had run out in Germany,
he now faces charges in the U.S. where there are no limitations on
prosecution for espionage.
Read more...
|
How To Hire a Hacker
Say you're a small business, say you've been hacked, say you don't have
enough desire to go to one of the big consulting shops. Here's an article
about someone who went to hired guns to figure out how he was broken
into.
Read more...
|
Hard drives missing at Los Alamos
Seems like in the clearing out for the fires, some very important
hard drives (with data like how-to's for disarming nuclear missles) have
gone missing. Now, the big search.
Read more..
Reuters
|
Security Job Marketplace Hot
Well, thank heavens. The security job marketplace is expected to be hot
with the help of growing budgets for the next 3-5 years easy. Does your
background lend you towards this profession?
Read more...
|
Movie Trojan Virus
CDUniverse evidence corrupted
In a case of failing Computer Forensics 101, someone from the group
handling the data collected from the CDUniverse Credit Card scandal
has corrupted the data by working on the only copy, rather that creating
an image. Is this a case of too many cooks, or too many interns?
Read more...
|
Canadian Mounties don't always get their man (or funding)
In another case of "If you aren't going to fund this work, I'll go elsewhere"
is a story of a now former Mountie who left after 15 years on the force
to join KPMG and lead their computer forensics practice. Not the first
time this story will be told.
Read more...
|
EU pushes U.S. hand to ease encryption restrictions
In the slow moving push towards easing U.S. encryption standards, it appears
that the U.S. will relax theirs following the offical relaxation by the EU.
What specifically this means is anyone's guess.
Read more...
|
Mafiaboy being hit with more charges
Seems that the Fed's have more evidence tying Mafiaboy to other online
attacks. This time CNN's
Read more...
|
Host your web server and grow really big tomatoes
Looking for that place to host your web server that is secure from
bombs, has a large back-up power supply and has an environment suited
to growing large vegetables? House it in a former Brittish nuclear
bunker.
Read more...
|
Top 10 Security Holes
SANS released their top-10 list of
security vulnerabilities found in the IT world. While I have to agree with the
list. It is still scary in retrospect how many companies and agencies
still fail a large number of these.
Read more...
|
Toothless Privacy Deal between U.S. and E.U. near
A deal that leaves E.U. members' personal data open to misuse and
has no provisions for the financial services sector is getting approval
from E.U. bodies. Those against the campaign hope that the Americans
will wake up and demand sticter privacy standards.
Read more...
|
Albright says no
A report issued by Congress recommended a broader role for the CIA
and military within the U.S. and sanctions against Greece and Pakistan
if they continue to support terrorism. Albright says no to the sanctions,
and the American-Arab Anti-discrimination Committee is feeling a little
guilty, thinking the the monitoring of all foreign students in the US
is pointing the finger at them.
Read more...
|
Tools from the underground
Article pointing out a number of the most commonly used hacking and
security audit tools with a little bio about their history. Not a bad read
and some decent links in case you can't remember where to find them.
Read more...
|
One weekend a month, 2 weeks a year...to hack
About a year after a DOD request, the Senate is urging the Pentagon to
study how it can use the Army National Guard to make up for the shortage
of computer programmers and information security specialists. Probably a good
idea, but what happens to their billing rates?
Read more...
|
Don't knowingly pass on that virus in PA
A bill signed into law in PA on May 26 makes spreading a computer virus
intentionally a seven-year sentence and a $15K fine as well as restitution
for any damages caused by it (assuming conviction). Gee, this will keep all
of those millionaires from writing viruses. How this will hold up to a federal
challenge should be interesting.
Read more...
|
Digex gets SAS70 Certification...
... and the world goes "So?". In what Digex is claiming is a first for
and ASP is really a non-news item. Companies complete a SAS70. It isn't
a security certification. It says that you do things the way you
say you do. As long as you say you leave a huge back-door into your
network (and actually do leave one) you can get your SAS70.
Read more...
|
New type of airport search
I think I'm for this. I've been stopped enough because I'm carrying one of
those new-fangled (yea right) laptop bags with (would you believe it Vern?)
a laptop inside. Given this system wouldn't be perfect. It would seem
great fot something like customs, as this checks for particles of drugs
and explosives on your travel documents.
Read more...
|
New Regulations prevent foreigners from working on space research
A shift in space research responsibility from the Commerce Department
to the State Department is causing some rumblings from some research
universities. Based on the recent and not so recent past, I can understand
the reasoning behind it (even if it is ironic that it comes from the
State Department).
Read more...
|
U.S. DOD redefining ops
In an evolutionary change, the U.S. DOD is putting together an organized force
to include cyber-forces for use in attacks against foreign countries.
Contrary to other buzz-word catching articles, this one talks of how
they are going to use it for more than just trying to "hack" into
an enemy's infrastructure, but also using it for propoganda and deception
attacks.
Read more...
|
Yet another MS Outlook (potential) virus found
Shock upon shock. Another potential virus has been found in Outlook Express.
And again M$ denies there is anything wrong.
Read more...
|
Dark Side of the Internet
A mostly fluff piece going over topics that have been beaten like a dead
horse. Once again someone saying that there are plenty of ways for your
credit-card info to be used illegally without you ever touching the net.
Read more...
|
INS official guilty of espionage
In a "shocking" decision (to maybe two people) the INS official accused of
leaking secrets to Cuban officials was found guilty today. Finally a
case with enough lack of interference that it was closed up within a year.
Read more...
|
Can't we just bankrupt them like we did Russia
Waiting on an intelligence briefing, there is quite a cloud of dust being
knocked up in the Washington area in regards to the missile defense initiative.
On one side, is those who say it doesn't work, on the other, the defense
contractors. On yet another side are those that believe if we build something
that will "magically" knock out 100 missiles, China (our great adversary, who,
if I'm not mistaken the U.S. just signed a landmark trade agreement with, and
I can't think of any reason for a need to bomb them (other than population
control)) will build 101 missiles so one gets through. And if China builds them
India will (another target for population control) and therefore Pakistan (at
least maybe they will tax the Pakistani defense contractors) will as well.
Well, why don't we do it, hide our true capabilities, bankrupt China and India
(Pakistan is pretty much there anyway) and solve it that way (total time, 50 years). Meanwhile our defense contractors will be healthily employed.
Read more...
|
Crack the "numbers" stations
This is something that was carried on NPR. On shortwave there are a number
of stations that can be picked up with a monotonous stream of numbers being
read. This has been going on for over 30 years and some believe it is
an intelligence sent source of information. Some have even made recordings
of the numbers.
Read more...
|
Philippine Hijacker found Dead
OK, this isn't really security related. But it is just so damn stupid
it had to be included. A day or two ago an armed robbery was committed in
mid-air. The guy then had the pilot depressurize the cabin and then jumped
with a homemade parachute. He landed at an excessive velocity.
Read more...
|
Poor poor FBI
If this bill passes, I feel real sorry for the FBI. They will be so overworked
(to complement their already understaffed position). This bill plans to make
a federal crime out of defacing websites (even a friend's) and sniffing
traffic at work. Maybe it's a ploy to get the Israelies to stop.
Read more...
|
Source Address Spoofing, how to protect
Source address spoofing has long been the bane of the big back-bone network
providers. Here is an article that explains some of the fixes that can be
put in place. Some conversations with ISP don't agree with all of the
author's points. Maybe not everyone has the same budget available as he does
Read more...
|
Network Security - Even at home
While this article doesn't provide any earth-shattering news, it is a good
reminder that home users need to be aware of security issues as well as
DSL and cable modems proliferate. Some suppliers like
Road Runner now
ship their cable modems blocking the nefarious port 139, but DSL providers
don't (yet anyway). One thing of note that the author doesn't cover. While sites
like Yahoo may have
been taken down by DDOS attacks, if you cobble together enough DSL and
cable modem users you can launch quite a successful DDOS attack against
anyone you wish (and fairly easily I might add).
Read more...
|
GAO with fake badges obtained over the Internet "break-in" to numerous
fed sights
In what had to have been a ton of fun for the GAO employees doing the work,
with fake badges obtained over the Internet they managed to break into or bypass
security at Reagan National Airport, FBI headquarters, the State Department
and the Justice Department amongst others. Hey, government employees don't
need to be searched for firearms. It's the better paid contractors that
are ever so dangerous. At least a couple agencies faired a bit better than
the others.
Read more...
Congress Demands Tighter Federal Security
Reuters Coverage
|
NHL.com hit by denial of service attacks
OK, this one hurts. They are hitting the NHL website with DDOS attacks.
Now from our point of view you can take out all the financial sites
and who cares. It probably saves some day-traders money since they can't blow
theirs on a dropping market. But for those of us who have all our savings
under our mattresses or buried in the backyard for some y2k+1 disasters,
all we have left is the NHL playoffs. And with Lindros coming back
I can't even root for the Flyers anymore.
Read more...
|
Hacking outage == Property Damage?
A BusinessWeek report shows examples of a number of companies
trying to use the property damage portions of their insurance policies
to cover hacking attacks. Guess what, it seems close to working.
Read more...
|
LoveBug takes on new form as Porn Advertiser
In a humorous turn of events. The LoveBug virus is now being used as a
way to market port sites. The new one ads a shortcut onto your desktop
(after asking if it is OK) and then proceedes to mail your outlook
mailbox.
|
Australian Parliament Laptops Stolen
In the continuing saga of stolen laptops, now the Australian authorities have
issues to deal with. Five Parliament laptops were stolen and while
password protected, they don't feel that will stop anyone from trying
to use them to break into the Parliament's network.
Read more...
|
Gauntlet "World's Most Secure Firewall" is broken into
Gauntlet firewall from Network Associates
which touted itself as the most secure firewall has been found to have
a serious vulnerability in its UNIX versions.
Read more...
|
EU sets encryption free. US Protests
The EU has decided to drop all export restrictions on ecryption software
to countries outside the EU. The move is in an effort to spur electronic
commerce. The US is less than happy, as is to be expected. How much longer
before the US faces the economic pressure to do the same.
Read more...
|
More Spying at the White House
Another stolen laptop
This time the laptop doesn't contain classified info, but once again a laptop
was stolen at Paddington station that was supposed to be in the possession
of an Naval officer. Is it long before they have recorded announcements over
the PA to warn you to hold onto your laptop bags?
Read more...
|
How to Hack a Bank
Not that this is earth-shattering news, or that it hasn't been covered before,
or that it doesn't contain huge pieces of the methodolgies of most
consulting companies (in condensed form). But Forbes' ASAP walks you through
how to hack a bank. FWIW some of their assumptions are a little off base,
personally I'd try it on a larger bank because it would be easier to hide.
Read more...
|
New Love-Bug Variant more stealthy and more dangerous
A new variation of the "Love Bug" ASP script is making its rounds starting
thursday night. This one changes its subject every time it gets resent.
Read more...
|
Congressional report finds intelligence agencies inadequate
Not that eroding morale might not be a reason because of all of the
Congressional "oversight." Congress is willing to give other reasons for
the degredation of the U.S. Intelligence Services. Once upon a time
politicians kept their mouths shut every now and then.
Read more...
|
Microsoft's Clippy a security nightmare!
@Stake is reporting a security hole found
in Microsoft Office's 'Clippy' helper application. Clippy is that annoying
paper-clip thing that shows up when you first install word (and before
you figure out how to turn it off quickly). Evidentally Clippy has a huge
number of priviledges to do pretty much anything it wants to on your computer.
And it can be activated by clicking on an email message attachment.
For more...
|
Law enfocement fears that cybersleuths may turn to vigilatism
As federal through local levels of law enforcement are finding that they are
overworked and undertrained, they are increasinly turning to the private sector
for help catching cyber-criminals. However, fears of these citizens' backgrounds
has these officials worried that these individuals might take matters into
their own hands.
For more...
|
French Minister urges compatibility in Cybercrime laws
French Interior Minister Jean-Pierre Chevenement addressed the G8, urging
them towards uniform cybercrime laws in an attempt to weed out "Safe Havens"
around the world for illegal hacking activities.
For more...
|
Spies pose as Journalists
In a stunning report (more so because it stunned Slick Willie and the State
Department) the FBI has informed the House International Relations Committee
that some foreign countries actually place spies in the U.S. posing
as journalists. Now maybe all those non-fiction books and fictional movies
are just something that I see and read, but the fact that this shocking
to anyone in the Federal Government whose duty it is to protect U.S. secrets,
bothers me. Did they just fall off the turnip truck?
For more...
The State Department trying to cover-up their stupidity
|
Encrypt your business phone calls
L-3 Communications now has a commercially
available telephone encryption product that will use 168 bit 3DES
encryption. Given that NSA has finally allowed this to be marketed to the
private sector, it is possible that they have a way of breaking it.
But, this product has to be putting a scare in some foreign governments
who rely so heavily on intercepted information.
Privatel Product
|
Security Flaws at the State Department
A systematic failure to protect secrets at the State Department has the CIA
witholding Top-Secret information.
Read more...
|
AtomicTangerien Announces first spin-off
If M$ Splits, Viruses will be harder to detect
According to M$ Co-Founder Bill Gates, if Microsoft splits up, detecting viruses
like 'Love Bug' and 'Melissa' will be harder to protect against. According to
un-named experts, if everyone used the 'elm' mail reader, these viruses
wouldn't be possible. How can Bill think a company split will increase the
number of VBScript vulnerabilities?
Read more...
|
Second State Department Laptop Missing
A second laptop has gone missing at the US State Department. This time it isn't
supposed to have classified information on it.
For More...
|
`I Love You' Email Virus spreading
FBI investigates AboveNet Attack
As investigators try to determine the cause of the attack, another provider is hit by a different type of attack.
In some circles, the AboveNet attack is being blamed on bad passwords and sniffed passwords.
For more...
|
Telecommuters on Security Alert
As home users are increasingly scanned and probed, personal firewall devices are
on the rise. Now to ease integration, companies are releasing "enterprise class"
personal firewalls that let IT managers handle the security policies.
For more...
|
New Denial Of Service Software Found
Britain to build Internet Surveillance Center
British government plans to build a $39.17 million
Internet surveillance center.... The new center, which will be called the Government Technical Assistance
Center, should be up and running by the end of the year and will be sited at
the London headquarters of Britain's MI5 domestic security service.
For more...
|
South Asia a major terrorist hub
The State Department has for the first time
identified South Asia as a major hub of
international terrorism, accusing Pakistan and
Afghanistan of providing safe haven and
support to international terrorist groups.
For more...
|
Brazil To Open 'Condor' Files
Seeking to raise a longtime curtain of secrecy, Brazil's high court has ordered
classified files opened to an Argentine judge investigating how the two countries cooperated in the past to
eliminate political enemies.
Read more... |
Netscape Engineers Are Weenies
Some sifting through the source-code for MS Frontpage 98 found a backdoor
putting down the creators of a competing browser
Read more
|
Puerto Ricans hold island hostage
In an effort to protect an island that has been a bombing range for god knows how log, 60 Puerto Rican's are protecting staging a sit-in on an island. Duck and Cover
Read more...
|
|
|
|