The Ghost of Fireballs Past
Eerie-sounding echoes from Leonid and Geminid meteors were captured by amateurs monitoring the Navy's Space Surveillance Radar. During a shower like the Leonids, radio signals from TV stations, RADAR facilities, and AM/FM transmitters are constantly bouncing off meteor trails. The echoes can be heard around the world.
Sunday, December 31, 2000
Naval Space Surveillance System : NAVSPASUR
NAVSPASUR is a unique multistatic radar system that detects orbital objects passing over the contiguous United States. It can detect objects as small as 10cm diameter at orbital heights up to 15,000 nautical miles, and measure the positions and velocity vectors of detected objects as they pass through its detection plane. It is operated by the US Navy, has headquarters at Dahlgren, Virginia, and is an important data source for NORAD .
NAVSPASUR is a unique multistatic radar system that detects orbital objects passing over the contiguous United States. It can detect objects as small as 10cm diameter at orbital heights up to 15,000 nautical miles, and measure the positions and velocity vectors of detected objects as they pass through its detection plane. It is operated by the US Navy, has headquarters at Dahlgren, Virginia, and is an important data source for NORAD .
At Lourdes, air is filled with secrets
Just south of the Cuban capital’s Jose Marti airport—and clearly visible to passengers on final approach—is a little known Russian military base, one without weapons systems but with scores of antennas and satellite dishes straining to hear some of America’s closest held secrets.
Just south of the Cuban capital’s Jose Marti airport—and clearly visible to passengers on final approach—is a little known Russian military base, one without weapons systems but with scores of antennas and satellite dishes straining to hear some of America’s closest held secrets.
DSD - Sigint and history
Signals intelligence and information security have a long and honourable history in the service of the Australian Government and its allies in times of peace, crisis and conflict. The current generation of Australia's Sigint and Infosec professionals are proud to inherit that record, and to add their own contributions to it.
But it is a history little known to the public at large. Because of the secrecy that surrounds the the business of intelligence collection, many of the great successes of Sigint cannot be revealed until many years later.
Signals intelligence and information security have a long and honourable history in the service of the Australian Government and its allies in times of peace, crisis and conflict. The current generation of Australia's Sigint and Infosec professionals are proud to inherit that record, and to add their own contributions to it.
But it is a history little known to the public at large. Because of the secrecy that surrounds the the business of intelligence collection, many of the great successes of Sigint cannot be revealed until many years later.
Friday, December 29, 2000
Eraser: Wipe files from your hard drive
Eraser is a free file wipe utility that securely removes sensitive data from your hard drive. It easy to use, well documented, and effective.
Eraser is a free file wipe utility that securely removes sensitive data from your hard drive. It easy to use, well documented, and effective.
Spy agencies enter kinder, gentler age on Web
In these post-Cold War days, with formerly hot spy thrillers on the remainder table, the spook business has taken to the Internet with a warmer, friendlier image, to let the public know that it is still there and, by the way, is even looking for help.
In these post-Cold War days, with formerly hot spy thrillers on the remainder table, the spook business has taken to the Internet with a warmer, friendlier image, to let the public know that it is still there and, by the way, is even looking for help.
Defense Intelligence Agency - Homepage
As a Combat Support Agency of the Department of Defense, the DIA mission is to provide timely, objective, and cogent military intelligence to the warfighters, soldiers, sailors, airmen, marines, and to the decisionmakers and policy makers of the United States Department of Defense and United States Government.
As a Combat Support Agency of the Department of Defense, the DIA mission is to provide timely, objective, and cogent military intelligence to the warfighters, soldiers, sailors, airmen, marines, and to the decisionmakers and policy makers of the United States Department of Defense and United States Government.
Intelligence Resource Program
Federation of American Scientist website. This site provides a selection of official and unofficial resources on intelligence policy, structure, function, organization and operations.
Federation of American Scientist website. This site provides a selection of official and unofficial resources on intelligence policy, structure, function, organization and operations.
Eyes Only: Espionage Museum Planned for D.C.
Fans of the spy game will be stirred, not shaken by the news: A Cleveland-based company said yesterday it intends to open "the largest permanent exhibit dedicated to the history of espionage" in downtown Washington by the spring of 2002.
Fans of the spy game will be stirred, not shaken by the news: A Cleveland-based company said yesterday it intends to open "the largest permanent exhibit dedicated to the history of espionage" in downtown Washington by the spring of 2002.
Critters that dig tunnels under our feet
Some researchers and scholars believe that the Third Reich collapsed because of a mole. (A big and highly specialized mole, to be sure.) This mole was a Soviet agent working inside Hitler's headquarters. His codename was "Werther." The importance of Werther lies in the fact that he was able to transmit Hitler's plans to Stalin in a matter of hours. In some instances, Stalin saw Germany's war plans before the German field commanders saw them.
In a book entitled "Hitler's Traitor," Pulitzer Prize-winning journalist Louis Kilzer now claims to have discovered the identity of Werther. Using previous secret World War II archives, Kilzer builds a convincing case that Werther was none other than Martin Bormann, Hitler's most trusted deputy.
Some researchers and scholars believe that the Third Reich collapsed because of a mole. (A big and highly specialized mole, to be sure.) This mole was a Soviet agent working inside Hitler's headquarters. His codename was "Werther." The importance of Werther lies in the fact that he was able to transmit Hitler's plans to Stalin in a matter of hours. In some instances, Stalin saw Germany's war plans before the German field commanders saw them.
In a book entitled "Hitler's Traitor," Pulitzer Prize-winning journalist Louis Kilzer now claims to have discovered the identity of Werther. Using previous secret World War II archives, Kilzer builds a convincing case that Werther was none other than Martin Bormann, Hitler's most trusted deputy.
Israel Acknowledges Hunting Down Arab Militants
Senior Israeli officials have acknowledged a new tactic of hunting down and killing individual Palestinian militants whom Israel holds responsible for planning attacks on or attacking its citizens.
Senior Israeli officials have acknowledged a new tactic of hunting down and killing individual Palestinian militants whom Israel holds responsible for planning attacks on or attacking its citizens.
CIA's Tree: Some Kind of Secret
LANGLEY, Virginia -- The hottest holiday party at CIA headquarters is put on by the masters of spy gadgetry who use Christmas ornaments to display the latest technology.
It's not cameras in cigarette lighters anymore, but the tree at the Office of Technical Service party this year would thrill even fans of the fictional "Q" who produced pens that could fire bullets and cars that could swim for British agent James Bond.
LANGLEY, Virginia -- The hottest holiday party at CIA headquarters is put on by the masters of spy gadgetry who use Christmas ornaments to display the latest technology.
It's not cameras in cigarette lighters anymore, but the tree at the Office of Technical Service party this year would thrill even fans of the fictional "Q" who produced pens that could fire bullets and cars that could swim for British agent James Bond.
Chinese espionage handbook details ease of swiping secrets
China's government is engaged in large-scale science and technology spying targeted primarily on gaining U.S. defense secrets for military use, according to a translated Chinese government manual.
China's government is engaged in large-scale science and technology spying targeted primarily on gaining U.S. defense secrets for military use, according to a translated Chinese government manual.
Terrorists Plotted Jan. 2000 Attacks
Islamic militants headed by Osama bin Laden appear to have planned a spectacular three-country attack last January that would have included multiple bombings in Jordan and the United States and the sinking of a U.S. destroyer in Yemen, the Clinton administration's counterterrorism chief said last week.
Islamic militants headed by Osama bin Laden appear to have planned a spectacular three-country attack last January that would have included multiple bombings in Jordan and the United States and the sinking of a U.S. destroyer in Yemen, the Clinton administration's counterterrorism chief said last week.
Security-Enhanced Linux
Recently the U.S. National Security Agency released a distribution
called Security-enhanced Linux.
This includes a modified version of the kernel and some utilities that
provide a new mandatory access control architecture for Linux.
Recently the U.S. National Security Agency released a distribution
called Security-enhanced Linux.
This includes a modified version of the kernel and some utilities that
provide a new mandatory access control architecture for Linux.
Friday, December 22, 2000
Optimizing SSL processing for Web
The Secure Sockets Layer protocol is the de facto means for transmitting data over the Internet privately and securely. The protocol is integrated into every browser and every Web server, allowing any user to interact with any Web site in a secure manner.
The Secure Sockets Layer protocol is the de facto means for transmitting data over the Internet privately and securely. The protocol is integrated into every browser and every Web server, allowing any user to interact with any Web site in a secure manner.
Microsoft 'set hacker trap' theory
Hackers who broke into Microsoft's corporate network last month could have been lured into a hacker trap containing nothing more than dummy data, according to researcher Gartner.
Hackers who broke into Microsoft's corporate network last month could have been lured into a hacker trap containing nothing more than dummy data, according to researcher Gartner.
SafeNet
Security is the big question, and the answer is... er, privacy policies and smart cards. These, at least, were the only obvious concrete suggestions Bill Gates had to put forward when he opened Microsoft's prestige Safenet 2000 conference in Redmond yesterday.
Security is the big question, and the answer is... er, privacy policies and smart cards. These, at least, were the only obvious concrete suggestions Bill Gates had to put forward when he opened Microsoft's prestige Safenet 2000 conference in Redmond yesterday.
Security Research Center
The Johns Hopkins University, supported by a $10 million "seed" gift, is establishing a research center to tackle the complex technological, legal, ethical and public policy challenges of keeping information private and computer systems secure in an increasingly electronic world.
The Johns Hopkins University, supported by a $10 million "seed" gift, is establishing a research center to tackle the complex technological, legal, ethical and public policy challenges of keeping information private and computer systems secure in an increasingly electronic world.
Forget passwords, what about pictures?
Instead of creating a password, users select a personal "pass portfolio" of five abstract color images from thousands generated by a random-art computer program. It's necessary to commit them to memory by examining them carefully. Then, when they want to log into a secure system, they are challenged to identify the five out of a line-up of 25, most of them random decoys.
Instead of creating a password, users select a personal "pass portfolio" of five abstract color images from thousands generated by a random-art computer program. It's necessary to commit them to memory by examining them carefully. Then, when they want to log into a secure system, they are challenged to identify the five out of a line-up of 25, most of them random decoys.
Code breakers believe Poe puzzle solved after 150 years
Edgar Allan Poe, master of the mysterious and the macabre, may have uttered his last words from beyond the grave.
A coded message published by Poe in 1841 in a magazine where he worked as editor has been deciphered with the help of modern computing and the intuition of a young puzzle solver, 151 years after Poe's death.
Edgar Allan Poe, master of the mysterious and the macabre, may have uttered his last words from beyond the grave.
A coded message published by Poe in 1841 in a magazine where he worked as editor has been deciphered with the help of modern computing and the intuition of a young puzzle solver, 151 years after Poe's death.
Quality Security Tools
In May/June of 2000, we conducted a survey of 1200 Nmap users from the nmap-hackers mailing list to determine their favorite security tools. Each respondant could list up to 5.
I was so impressed by the list they created that I am putting the top 50 up here where everyone can benefit from them. I think anyone in the security field would be well advisted to go over the list and investigate any tools they are unfamiliar with. I also plan to point newbies to this page whenever they write me saying "I do not know where to start".
In May/June of 2000, we conducted a survey of 1200 Nmap users from the nmap-hackers mailing list to determine their favorite security tools. Each respondant could list up to 5.
I was so impressed by the list they created that I am putting the top 50 up here where everyone can benefit from them. I think anyone in the security field would be well advisted to go over the list and investigate any tools they are unfamiliar with. I also plan to point newbies to this page whenever they write me saying "I do not know where to start".
Secure your Windows 2000
The document is entitled "Secure Internet Information Services 5 Checklist" and lists a dozen specific items that must be addressed in addition to a few tweaks to the underlying Windows 2000 operating system.
The document is entitled "Secure Internet Information Services 5 Checklist" and lists a dozen specific items that must be addressed in addition to a few tweaks to the underlying Windows 2000 operating system.
Nessie
The main objective of the project is to put forward a portfolio of strong cryptographic primitives that has been obtained after an open call and been evaluated using a transparent and open process.
The main objective of the project is to put forward a portfolio of strong cryptographic primitives that has been obtained after an open call and been evaluated using a transparent and open process.
Wednesday, December 20, 2000
Tuesday, December 19, 2000
The Ten Immutable Laws of Security
Here at the Microsoft Security Response Center, we investigate thousands of security reports every year. In some cases, we find that a report describes a bona fide security vulnerability resulting from a flaw in one of our products; when this happens, we develop a patch as quickly as possible to correct the error. In other cases, the reported problems simply result from a mistake someone made in using the product. But many fall in between. They discuss real security problems, but the problems don't result from product flaws. Over the years, we've developed a list of issues like these, that we call the Ten Immutable Laws of Security.
Here at the Microsoft Security Response Center, we investigate thousands of security reports every year. In some cases, we find that a report describes a bona fide security vulnerability resulting from a flaw in one of our products; when this happens, we develop a patch as quickly as possible to correct the error. In other cases, the reported problems simply result from a mistake someone made in using the product. But many fall in between. They discuss real security problems, but the problems don't result from product flaws. Over the years, we've developed a list of issues like these, that we call the Ten Immutable Laws of Security.
Security red alert
If the network administrators and security specialists at the Small Business Administration, in Washington, were to push the panic button every time a potentially serious virus or software vulnerability alert was posted on the Web, the small businesses that rely on the SBA for loans and other assistance would be out of luck.
If the network administrators and security specialists at the Small Business Administration, in Washington, were to push the panic button every time a potentially serious virus or software vulnerability alert was posted on the Web, the small businesses that rely on the SBA for loans and other assistance would be out of luck.
Monday, December 18, 2000
Security Scanners
PC Magazine's review on intrusion detection gives you the bad news you need to avoid worse news later.
PC Magazine's review on intrusion detection gives you the bad news you need to avoid worse news later.
Installing a secure web server
With ``e-commerce'' becoming an important part of many businesses, it's useful to know how to set up your Apache server to run SSL for secure transfer of sensitive information.
With ``e-commerce'' becoming an important part of many businesses, it's useful to know how to set up your Apache server to run SSL for secure transfer of sensitive information.
Tuesday, December 12, 2000
Remarks by George J. Tenet
This afternoon, I would like to talk about the world in which—thanks to people like you—the United States is the leading force. And what American Intelligence does in that world for our nation and thus for you.
This afternoon, I would like to talk about the world in which—thanks to people like you—the United States is the leading force. And what American Intelligence does in that world for our nation and thus for you.
Blocked?
Appendix A to 31 CFR chapter V contains the names of blocked
persons, specially designated nationals, specially designated
terrorists, foreign terrorist organizations, and specially designated
narcotics traffickers designated pursuant to the various economic
sanctions programs administered by the Office of Foreign Assets Control.
Appendix A to 31 CFR chapter V contains the names of blocked
persons, specially designated nationals, specially designated
terrorists, foreign terrorist organizations, and specially designated
narcotics traffickers designated pursuant to the various economic
sanctions programs administered by the Office of Foreign Assets Control.
The Moscow Coup and MI6's Murders
What is it all about? Well, I and Sir Teddy Taylor [letters below] (a British Member of Parliament) are trying to force the British government to investigate two murders that the British Secret Intelligence Service (MI6) were directly responsible for. They are the 'Bulgarian Umbrella' murder of Georgi Markov in 1978 (a British double agent tricked the Bulgarians into murdering him) and the murder of the newspaper owner Robert Maxwell in 1991. Both murders are related to the failed KGB coup in Moscow in August 1991, with which I was fairly directly connected. A large file exists which gives the evidence for all this in considerable detail. There is now a copy of it in the House of Commons Library in London, although the Security Services had arranged its concealment for some months. Other copies disappeared from my mother's home in Scotland during the spring. At present, the Home Office and the Foreign Office are tossing the ball between them.
What is it all about? Well, I and Sir Teddy Taylor [letters below] (a British Member of Parliament) are trying to force the British government to investigate two murders that the British Secret Intelligence Service (MI6) were directly responsible for. They are the 'Bulgarian Umbrella' murder of Georgi Markov in 1978 (a British double agent tricked the Bulgarians into murdering him) and the murder of the newspaper owner Robert Maxwell in 1991. Both murders are related to the failed KGB coup in Moscow in August 1991, with which I was fairly directly connected. A large file exists which gives the evidence for all this in considerable detail. There is now a copy of it in the House of Commons Library in London, although the Security Services had arranged its concealment for some months. Other copies disappeared from my mother's home in Scotland during the spring. At present, the Home Office and the Foreign Office are tossing the ball between them.
Friday, December 08, 2000
m-o-o-t
m-o-o-t is an open-design, open-source cryptography project begun to defeat RIPAPart3 and make it look silly, and to allow UK citizens to communicate and to store information without worrying about it. It will also defeat Carnivore and the Australian and proposed NZ and Council of Europe laws.
m-o-o-t is an open-design, open-source cryptography project begun to defeat RIPAPart3 and make it look silly, and to allow UK citizens to communicate and to store information without worrying about it. It will also defeat Carnivore and the Australian and proposed NZ and Council of Europe laws.
U.S. finds link between bin Laden and Cole bombing
U.S. officials said Thursday there is evidence linking suspects in the October 12 bombing of the USS Cole in Yemen with known operatives of accused terrorist Osama bin Laden's organization.
U.S. officials said Thursday there is evidence linking suspects in the October 12 bombing of the USS Cole in Yemen with known operatives of accused terrorist Osama bin Laden's organization.
Pardon recommended for jailed U.S. 'spy'
A Russian presidential commission has recommended convicted U.S. spy Edmond Pope be given a pardon.
A Russian presidential commission has recommended convicted U.S. spy Edmond Pope be given a pardon.
Thursday, December 07, 2000
Spy School
Spying seems to have existed since humans could look across at their neighbors and wonder what they were up to. Here's your chance to find out about the shadowy world of what's been called the "second-oldest profession." But be careful, someone may be watching.
Spying seems to have existed since humans could look across at their neighbors and wonder what they were up to. Here's your chance to find out about the shadowy world of what's been called the "second-oldest profession." But be careful, someone may be watching.
2,619 CIA Sources: The Crowley Files
Robert Trumbull Crowley died in a Washington DC hospital on October 8, 2000. He was a senior Central Intelligence Agency officer from 1948 until the mid-1980s. During his tenure with the CIA, Crowley became Assistant Deputy Director for Operations and the second-in-command of the clandestine Directorate of Operations. He wrote a book entitled The New KGB: Engine of Soviet Power that was published in 1985 by William Morrow. In 1996, prior to what Crowley felt might be a fatal major surgery for suspected lung cancer, he gave a number of historical documents from his extensive personal files to an American journalist with whom he had been working.
Robert Trumbull Crowley died in a Washington DC hospital on October 8, 2000. He was a senior Central Intelligence Agency officer from 1948 until the mid-1980s. During his tenure with the CIA, Crowley became Assistant Deputy Director for Operations and the second-in-command of the clandestine Directorate of Operations. He wrote a book entitled The New KGB: Engine of Soviet Power that was published in 1985 by William Morrow. In 1996, prior to what Crowley felt might be a fatal major surgery for suspected lung cancer, he gave a number of historical documents from his extensive personal files to an American journalist with whom he had been working.
VULN-DEV
The VULN-DEV list exists to allow people to report potential or undeveloped holes. The idea is to help people who lack expertise, time, or information about how to research a hole do so.
The VULN-DEV list exists to allow people to report potential or undeveloped holes. The idea is to help people who lack expertise, time, or information about how to research a hole do so.
OpenBSD
Three years without a remote hole in the default install!
The OpenBSD project produces a FREE, multi-platform 4.4BSD-based UNIX-like operating system. Our efforts emphasize portability, standardization, correctness, proactive security and integrated cryptography.
Three years without a remote hole in the default install!
The OpenBSD project produces a FREE, multi-platform 4.4BSD-based UNIX-like operating system. Our efforts emphasize portability, standardization, correctness, proactive security and integrated cryptography.
The Nessus Project
The "Nessus" Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner.
A security scanner is a software which will audit remotely a given network and determine whether bad guys (aka 'crackers') may break into it, or misuse it in some way.
The "Nessus" Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner.
A security scanner is a software which will audit remotely a given network and determine whether bad guys (aka 'crackers') may break into it, or misuse it in some way.
Madison Gurkha
Former hackers start a company: We are proud to announce the establishment of Madison Gurkha B.V. Madison Gurkha will focus on the Design, Implementation and Audit of Security and Open Source IT infrastructures.
Former hackers start a company: We are proud to announce the establishment of Madison Gurkha B.V. Madison Gurkha will focus on the Design, Implementation and Audit of Security and Open Source IT infrastructures.
Wednesday, December 06, 2000
STASI
For 30 years, East German spies sought Britain's secrets. Who helped them? A six-month search by Stephen Grey and John Goetz has uncovered details of a large espionage ring. But it would have remained unknown without the skills of a former East German dissident
For 30 years, East German spies sought Britain's secrets. Who helped them? A six-month search by Stephen Grey and John Goetz has uncovered details of a large espionage ring. But it would have remained unknown without the skills of a former East German dissident
Feature Stories
The awesome satellite espionage series is now published here on the Web! You will find the true stories about the satellite signal reception of hidden signals, such as secret services and governments
The awesome satellite espionage series is now published here on the Web! You will find the true stories about the satellite signal reception of hidden signals, such as secret services and governments
THE FIFTH BOMB: DID PUTIN’S SECRET POLICE BOMB MOSCOW IN A DEADLY BLACK OPERATION?
The critical evidence are these photographs of a detonator.
The photographs of a detonator, taken by a Russian bomb squad, and other fresh evidence point to a plot carried out by the FSB working to assist their old spymaster, Vladimir Putin, in his rise to control the world’s number two superpower and its nuclear arsenal.
The critical evidence are these photographs of a detonator.
The photographs of a detonator, taken by a Russian bomb squad, and other fresh evidence point to a plot carried out by the FSB working to assist their old spymaster, Vladimir Putin, in his rise to control the world’s number two superpower and its nuclear arsenal.
Electronic Evidence Gathering
The presentation: Electronic Evidence Gathering is designed to introduce the audiance to the discipline and detail exactly what can be discovered using various techniques and tools. The technical aspects, while important, do not constitute the entire presentation. Normal forensic investigative techniques must also be observed in order to produce usable results and therefore these will also be addressed in the context of the computing environment and in parallel with the tools and techniques.
The presentation: Electronic Evidence Gathering is designed to introduce the audiance to the discipline and detail exactly what can be discovered using various techniques and tools. The technical aspects, while important, do not constitute the entire presentation. Normal forensic investigative techniques must also be observed in order to produce usable results and therefore these will also be addressed in the context of the computing environment and in parallel with the tools and techniques.
Security Research Group
Welcome to the Security Research Group of the University of Otago's home page. Here we will bring you many links to our own research and work that is being done around the world in the realms of security and other related issues.
Welcome to the Security Research Group of the University of Otago's home page. Here we will bring you many links to our own research and work that is being done around the world in the realms of security and other related issues.
FBI Fakes Foreign Intelligence Surveillance Actions
Today in Washington there is a secret court that exists soley for something called FISA, the Foreign Intelligence Surveillance Act. It's a court where the FBI has regularly secured permission to wire tap, bug and search the homes of individuals the FBI suspects of committing espionage against the United States.
Today in Washington there is a secret court that exists soley for something called FISA, the Foreign Intelligence Surveillance Act. It's a court where the FBI has regularly secured permission to wire tap, bug and search the homes of individuals the FBI suspects of committing espionage against the United States.
Tuesday, December 05, 2000
Breaking the Windows Script Encoder
The Windows Script Encoder (screnc.exe) is a Microsoft tool that can be used to encode your scripts (i.e. JScript, ASP pages, VBScript). Yes: encode, not encrypt. The use of this tool is to be able to prevent people from looking at, or modifying, your scripts. Microsoft recommends using the Script Encoder to obfuscate your ASP pages, so in case your server is compromised the hacker would be unable to find out how your ASP applications work.
The Windows Script Encoder (screnc.exe) is a Microsoft tool that can be used to encode your scripts (i.e. JScript, ASP pages, VBScript). Yes: encode, not encrypt. The use of this tool is to be able to prevent people from looking at, or modifying, your scripts. Microsoft recommends using the Script Encoder to obfuscate your ASP pages, so in case your server is compromised the hacker would be unable to find out how your ASP applications work.
Convicted terrorist to face new trial in Jordan
Jordanian officials said Monday they will retry a U.S. citizen convicted and sentenced to death in connection with a terrorist plot against Israeli and American tourists in Jordan during New Year's celebrations.
Jordanian officials said Monday they will retry a U.S. citizen convicted and sentenced to death in connection with a terrorist plot against Israeli and American tourists in Jordan during New Year's celebrations.
Comments on the Carnivore System Technical Review
Although the IITRI study appears to represent a good-faith effort at independent review, the limited nature of the analysis described in the draft report simply cannot support a conclusion that Carnivore is correct, safe, or always consistent with legal limitations. Those who are concerned that the system produces correct evidence, represents no threat to the networks on which it is installed, or complies with the scope of court orders should not take much comfort from the analysis described in the report or its conclusions.
Although the IITRI study appears to represent a good-faith effort at independent review, the limited nature of the analysis described in the draft report simply cannot support a conclusion that Carnivore is correct, safe, or always consistent with legal limitations. Those who are concerned that the system produces correct evidence, represents no threat to the networks on which it is installed, or complies with the scope of court orders should not take much comfort from the analysis described in the report or its conclusions.
Wednesday, November 22, 2000
Real Time Cryptanalysis of A5/1 on a PC
A5/1 is the strong version of the encryption algorithm used by about 130 million GSM customers in Europe to protect the over-the-air privacy of their cellular voice and data communication. The best published attacks against it require between 240 and 245 steps. This level of security makes it vulnerable to hardware-based attacks by large organizations, but not to software-based attacks on multiple targets by hackers.
A5/1 is the strong version of the encryption algorithm used by about 130 million GSM customers in Europe to protect the over-the-air privacy of their cellular voice and data communication. The best published attacks against it require between 240 and 245 steps. This level of security makes it vulnerable to hardware-based attacks by large organizations, but not to software-based attacks on multiple targets by hackers.
Killing Pablo
Eight years ago, at the request of the Colombian government, U.S. military and spy forces helped fund and guide a massive manhunt that ended with the killing of Pablo Escobar, the richest cocaine trafficker in the world.
Eight years ago, at the request of the Colombian government, U.S. military and spy forces helped fund and guide a massive manhunt that ended with the killing of Pablo Escobar, the richest cocaine trafficker in the world.
International co-operation in internet surveillance
The police, Security Intelligence Service and the Government Communications Security Bureau of New Zealand are pushing for major new surveillance powers including the ability to spy on emails.
The police, Security Intelligence Service and the Government Communications Security Bureau of New Zealand are pushing for major new surveillance powers including the ability to spy on emails.
Did Swisscom sell our Secrets to the USA?
Swisscom may have violated an agreement made with the Confederation by selling sensitive installations to the Americans of Verestar. The military suspects that this company is related to the Echelon network for interception.
Swisscom may have violated an agreement made with the Confederation by selling sensitive installations to the Americans of Verestar. The military suspects that this company is related to the Echelon network for interception.
Draft Report: Independent Technical Review of the Carnivore System
This Draft Report from the IIT Research Institute (IITRI) is part of an overall review of the Carnivore system requested by the Attorney General.
This Draft Report from the IIT Research Institute (IITRI) is part of an overall review of the Carnivore system requested by the Attorney General.
State Department Employees Pressed to Protect Secrets
Paper shredders, State Department employees are told, must trim classified documents down to slices no larger than 1/32 inch by 1/2 inch. Disposal can also be achieved, they are advised, with machines that can "pulverize" secrets into powder. Safes storing sensitive materials must weigh at least 500 pounds — too heavy to be carted off.
Paper shredders, State Department employees are told, must trim classified documents down to slices no larger than 1/32 inch by 1/2 inch. Disposal can also be achieved, they are advised, with machines that can "pulverize" secrets into powder. Safes storing sensitive materials must weigh at least 500 pounds — too heavy to be carted off.
Monday, November 20, 2000
Stolen Enigma retrieved
The Sunday Times has negotiated secretly for weeks to ensure the safe return of the three vital rotors from the historic Enigma code machine that was stolen from Bletchley Park.
The Sunday Times has negotiated secretly for weeks to ensure the safe return of the three vital rotors from the historic Enigma code machine that was stolen from Bletchley Park.
Monday, November 13, 2000
Stealth secrets feared stolen
A Russian mathematician who was given access to an American supercomputer loaded with stealth warplane design software is under investigation for espionage.
A Russian mathematician who was given access to an American supercomputer loaded with stealth warplane design software is under investigation for espionage.
Thursday, November 09, 2000
Pings and E-Arrows Fly in Mideast Cyber-War
A spearhead force of Israeli hackers, augmented by thousands of teenage keyboard warriors, launched their Internet assault on Hezbollah and other Arab world Web sites earlier this month as violence in the region spun out of control.
A spearhead force of Israeli hackers, augmented by thousands of teenage keyboard warriors, launched their Internet assault on Hezbollah and other Arab world Web sites earlier this month as violence in the region spun out of control.
Intelligence Newswatch - Intel "Stuff" by John Macartney - Washington Brief
John Macartney is Scholar in Residence at The American University School of International Service where he teaches a graduate course on Intelligence.
John Macartney is Scholar in Residence at The American University School of International Service where he teaches a graduate course on Intelligence.
US Air Intelligence Agency merges with ACC
Plans are under way to realign the US Air Intelligence Agency (AIA), located at Kelly Air Force Base in Texas, under Air Combat Command, US Air Force officials said last week.
Plans are under way to realign the US Air Intelligence Agency (AIA), located at Kelly Air Force Base in Texas, under Air Combat Command, US Air Force officials said last week.
NSA Careers
You're about to enter a whole new world...to explore an opportunity with one of the most important and advanced agencies of its kind. Get ready to be surprised and inspired.
You're about to enter a whole new world...to explore an opportunity with one of the most important and advanced agencies of its kind. Get ready to be surprised and inspired.
Spy vs. spy
If it takes a thief to catch a thief, then it follows that it takes a spy to catch a spy -- specifically Internet "crackers," those annoying nerds that are a constant threat to corporate networks.
If it takes a thief to catch a thief, then it follows that it takes a spy to catch a spy -- specifically Internet "crackers," those annoying nerds that are a constant threat to corporate networks.
INFORMATION WARFARE SUCCESS IN KOSOVO AIR OPS.
Information and psychological warfare conducted by the U.S. during the Kosovo air campaign had mixed results, an outcome that is pushing both the Navy and Air Force to develop new technologies for future conflicts.
Information and psychological warfare conducted by the U.S. during the Kosovo air campaign had mixed results, an outcome that is pushing both the Navy and Air Force to develop new technologies for future conflicts.
Stealth secrets feared stolen
A Russian mathematician who was given access to an American supercomputer loaded with stealth warplane design software is under investigation for espionage.
A Russian mathematician who was given access to an American supercomputer loaded with stealth warplane design software is under investigation for espionage.
Hackers' Tricks to Avoid Detection
Hackers are not only clever in how they invade servers; they are also devious in how they disguise their attacks. Malicious attackers use a variety of evasive techniques, which we will examine in this column so that we, as administrators, can be better prepared to detect and respond to them.
Hackers are not only clever in how they invade servers; they are also devious in how they disguise their attacks. Malicious attackers use a variety of evasive techniques, which we will examine in this column so that we, as administrators, can be better prepared to detect and respond to them.
Monday, November 06, 2000
4 Men Linked to USS Cole Bombing
The men who bombed the USS Cole got help from Yemeni officials who fought with them in Afghanistan in the 1980s, sources close to the case said Monday as the crippled Cole began a five-week trip home.
The men who bombed the USS Cole got help from Yemeni officials who fought with them in Afghanistan in the 1980s, sources close to the case said Monday as the crippled Cole began a five-week trip home.
Tuesday, October 31, 2000
TOP SECRETS REVEALED: MASSIVE DOCUMENT LEAK SHOWS 'CHINA THREAT'
The nation's intelligence community is bracing for the release of a new bombshell book that discloses and documents specific Chinese threats against America, the DRUDGE REPORT has learned.
The nation's intelligence community is bracing for the release of a new bombshell book that discloses and documents specific Chinese threats against America, the DRUDGE REPORT has learned.
AFIO
AFIO is a non-profit, non-political, educational association of former intelligence professionals and supporters.
AFIO is a non-profit, non-political, educational association of former intelligence professionals and supporters.
Pentagon to Add 450 Experts to Protect Defense Secrets
The Pentagon is hiring 450 counterintelligence specialists to protect defense secrets after learning that China has obtained classified U.S. missile technology, including critical information about the heat shield that keeps America's most advanced missiles from burning up as they reenter the atmosphere, senior defense officials said.
The Pentagon is hiring 450 counterintelligence specialists to protect defense secrets after learning that China has obtained classified U.S. missile technology, including critical information about the heat shield that keeps America's most advanced missiles from burning up as they reenter the atmosphere, senior defense officials said.
Intel Jobs
Links to Vacancy Pages of International Organizations and Companies active in the Security Community.
Links to Vacancy Pages of International Organizations and Companies active in the Security Community.
Pentagon to Add 450 Experts to Protect Defense Secrets
The Pentagon is hiring 450 counterintelligence specialists to protect defense secrets after learning that China has obtained classified U.S. missile technology, including critical information about the heat shield that keeps America's most advanced missiles from burning up as they reenter the atmosphere, senior defense officials said.
The Pentagon is hiring 450 counterintelligence specialists to protect defense secrets after learning that China has obtained classified U.S. missile technology, including critical information about the heat shield that keeps America's most advanced missiles from burning up as they reenter the atmosphere, senior defense officials said.
British secret Cold War plan for Russia - exaggerate
Military planners worked out an elaborate strategy to counter the Soviet Union's Cold War power by feeding Moscow exaggerated accounts of British military strength, secret papers released on Friday revealed.
Military planners worked out an elaborate strategy to counter the Soviet Union's Cold War power by feeding Moscow exaggerated accounts of British military strength, secret papers released on Friday revealed.
JORN assures early warning for Australia
Australia is using a sophisticated new radar network that can detect stealth bombers, curb illegal immigration and spy on neighboring nations from at least 3000 kilometers away. The $A1.8 billion Jindalee Operational Radar Network (JORN) has taken more than 30 years to complete but is now undergoing final trials.
Australia is using a sophisticated new radar network that can detect stealth bombers, curb illegal immigration and spy on neighboring nations from at least 3000 kilometers away. The $A1.8 billion Jindalee Operational Radar Network (JORN) has taken more than 30 years to complete but is now undergoing final trials.
Top Pentagon Gulf Official Resigned
The Pentagon's top intelligence expert on terrorist threats in the Persian Gulf region resigned the day after the USS Cole was attacked in Yemen.
The Pentagon's top intelligence expert on terrorist threats in the Persian Gulf region resigned the day after the USS Cole was attacked in Yemen.
Ataxia: The Chem-Bio Terrorism Threat and the US Response
Ataxia is a comprehensive research report that examines the many facets of the unconventional terrorism issue in the United States.
Ataxia is a comprehensive research report that examines the many facets of the unconventional terrorism issue in the United States.
NSA's warning arrived too late to save the Cole
The National Security Agency issued a top-secret intelligence report on the day the destroyer USS Cole was bombed, warning that terrorists were planning an attack in the region.
The National Security Agency issued a top-secret intelligence report on the day the destroyer USS Cole was bombed, warning that terrorists were planning an attack in the region.
US National Security Agency (NSA) badly crippled
The Register is a computer news site, but occasionally they stray into territories only tangientally relevant to computing. The article breezes over the NSA's current weaknesses, and the posturing of it and other agencies to be or not to be the point agency in the growing cyber/crime field.
The Register is a computer news site, but occasionally they stray into territories only tangientally relevant to computing. The article breezes over the NSA's current weaknesses, and the posturing of it and other agencies to be or not to be the point agency in the growing cyber/crime field.
NSA - New Enterprise Team Recommendations: the Director's Work Plan for Change
This is one of two reports released 17 October 2000 by the National Security Agency on October 1999 recommendations for its reorganization (after releasing them to Inside Defense under FOIA request):
This is one of two reports released 17 October 2000 by the National Security Agency on October 1999 recommendations for its reorganization (after releasing them to Inside Defense under FOIA request):
Sunday, October 29, 2000
Thursday, October 26, 2000
In-Q-Tel
In-Q-Tel provides value not only to the CIA and the technology companies with which it partners, but also to the investment community in their efforts to select and validate their investments in technology firms.
In-Q-Tel provides value not only to the CIA and the technology companies with which it partners, but also to the investment community in their efforts to select and validate their investments in technology firms.
Report: Former CIA Head Disregarded Security
Former CIA Director John Deutch, who is already under investigation by the Justice Department for violating security rules while head of the agency, also showed “complete and total disregard” for security procedures while he served as the number two man at the Pentagon in 1994 and 1995, according to a report by the Defense Department Inspector General.
Former CIA Director John Deutch, who is already under investigation by the Justice Department for violating security rules while head of the agency, also showed “complete and total disregard” for security procedures while he served as the number two man at the Pentagon in 1994 and 1995, according to a report by the Defense Department Inspector General.
Americans warned of terrorist threats 'worldwide'
U.S. officials on Wednesday reiterated that the level of terrorist threats against Americans "is as intense as the time surrounding the millennium," and said the threats exist worldwide.
U.S. officials on Wednesday reiterated that the level of terrorist threats against Americans "is as intense as the time surrounding the millennium," and said the threats exist worldwide.
SafeWeb Startpage
SafeWeb provides the first free, completely private and secure way to surf the Web anywhere, anytime.
SafeWeb provides the first free, completely private and secure way to surf the Web anywhere, anytime.
Tuesday, October 24, 2000
USS Cole Attackers Had Expertise
Behind a cinderblock fence, two men prepared their fiberglass boat, welding metal pockets inside to carry a load of explosives.
From a hilltop apartment with a roof commanding a sweeping view of the harbor, they spied on ships that stopped to refuel, probably using a pair of binoculars investigators found at the site.
They were sometimes joined by a few other men. At two other locations, they built the bombs that would blast a hole in the USS Cole, killing 17 American sailors and injuring 39 others.
Behind a cinderblock fence, two men prepared their fiberglass boat, welding metal pockets inside to carry a load of explosives.
From a hilltop apartment with a roof commanding a sweeping view of the harbor, they spied on ships that stopped to refuel, probably using a pair of binoculars investigators found at the site.
They were sometimes joined by a few other men. At two other locations, they built the bombs that would blast a hole in the USS Cole, killing 17 American sailors and injuring 39 others.
Monday, October 23, 2000
National Military Intelligence Association
The NMIA was established in 1974 as an organization to provide intelligence professionals in the Military Services, Intelligence Agencies, Offices of the United States Government, Congress, industry, and academia with a professional forum to share and exchange ideas for their individual professional enhancement and the good of the entire Intelligence Community.
The NMIA was established in 1974 as an organization to provide intelligence professionals in the Military Services, Intelligence Agencies, Offices of the United States Government, Congress, industry, and academia with a professional forum to share and exchange ideas for their individual professional enhancement and the good of the entire Intelligence Community.
National Military Intelligence Association
The NMIA was established in 1974 as an organization to provide intelligence professionals in the Military Services, Intelligence Agencies, Offices of the United States Government, Congress, industry, and academia with a professional forum to share and exchange ideas for their individual professional enhancement and the good of the entire Intelligence Community.
The NMIA was established in 1974 as an organization to provide intelligence professionals in the Military Services, Intelligence Agencies, Offices of the United States Government, Congress, industry, and academia with a professional forum to share and exchange ideas for their individual professional enhancement and the good of the entire Intelligence Community.
Can George Tenet save the CIA?
Like most senior officials in Washington, George Tenet, the 46-year-old director of central intelligence, likes to get to the office at an early hour. But that's where the similarity ends.
"I'll come in and his door will be shut, and he'll be blasting opera music," one of Tenet's subordinates explains. (The director's current favorite is Andrea Bocelli, the blind tenor.) "He'll be in sweatpants, unshaven--which is fine, you know, at seven a.m. So we'll start talking about what's in the papers, and what's in the President's Daily Brief. Then all of a sudden it's time for the eight o'clock meeting, when we go over the previous night's cable traffic. And he'll still be in sweats, unshaven--and that's fine. And then at eight-thirty there's a much bigger meeting of all the senior staff, and he's still in sweats. And you kinda begin to wonder ... when's he gonna change?"
Like most senior officials in Washington, George Tenet, the 46-year-old director of central intelligence, likes to get to the office at an early hour. But that's where the similarity ends.
"I'll come in and his door will be shut, and he'll be blasting opera music," one of Tenet's subordinates explains. (The director's current favorite is Andrea Bocelli, the blind tenor.) "He'll be in sweatpants, unshaven--which is fine, you know, at seven a.m. So we'll start talking about what's in the papers, and what's in the President's Daily Brief. Then all of a sudden it's time for the eight o'clock meeting, when we go over the previous night's cable traffic. And he'll still be in sweats, unshaven--and that's fine. And then at eight-thirty there's a much bigger meeting of all the senior staff, and he's still in sweats. And you kinda begin to wonder ... when's he gonna change?"
China Spy Probe Shifts to Missiles
A new review of Chinese military documents provided by a defector in 1995 has led U.S. intelligence agencies to conclude that Chinese espionage has gathered more American missile technology than nuclear weapons secrets, senior U.S. officials said.
A new review of Chinese military documents provided by a defector in 1995 has led U.S. intelligence agencies to conclude that Chinese espionage has gathered more American missile technology than nuclear weapons secrets, senior U.S. officials said.
Thursday, October 19, 2000
A Resource for Internet Users Prepared by Majority Staff
KNOW THE RULES - USE THE TOOLS, Privacy in the Digital Age: A Resource for Internet Users
KNOW THE RULES - USE THE TOOLS, Privacy in the Digital Age: A Resource for Internet Users
The Feds' Latest Crusade
The U.S. government is now embarking on a new war against teen hackers. It's likely to be no more successful than our "War on Drugs," but geeky keyboard desperados, handicapped by raging hormones and other afflictions of puberty, are much easier and safer marks than well-armed cartel terrorists.
The U.S. government is now embarking on a new war against teen hackers. It's likely to be no more successful than our "War on Drugs," but geeky keyboard desperados, handicapped by raging hormones and other afflictions of puberty, are much easier and safer marks than well-armed cartel terrorists.
Carnivore does more than previously thought
Heavily censored FBI documents obtained by US watchdog outfit the Electronic Privacy Information Centre (EPIC), under a Freedom of Information Act (FOIA) lawsuit, indicate that the FBI's electronic snoop known as Carnivore might be able to monitor a good deal more than just e-mail traffic.
Heavily censored FBI documents obtained by US watchdog outfit the Electronic Privacy Information Centre (EPIC), under a Freedom of Information Act (FOIA) lawsuit, indicate that the FBI's electronic snoop known as Carnivore might be able to monitor a good deal more than just e-mail traffic.
Stratfor Hotspot: Israel & Palestine
Excellent newsfeed. Great for keeping up-to-date about the world's Hotspots.
Excellent newsfeed. Great for keeping up-to-date about the world's Hotspots.
Regional Information Sharing Systems Program
The Regional Information Sharing Systems (RISS) Program is composed of six regional centers that share intelligence and coordinate efforts against criminal networks that operate in many locations across jurisdictional lines. Typical targets of RISS activities are drug trafficking, violent crime and gang activity, and organized criminal activities. Each of the centers, however, selects its own target crimes and the range of services provided to member agencies.
The Regional Information Sharing Systems (RISS) Program is composed of six regional centers that share intelligence and coordinate efforts against criminal networks that operate in many locations across jurisdictional lines. Typical targets of RISS activities are drug trafficking, violent crime and gang activity, and organized criminal activities. Each of the centers, however, selects its own target crimes and the range of services provided to member agencies.
The RISS Files
Each and every day, the names of political activists are being added to a vast law enforcement data bank known as the Regional Information Sharing System (RISS).
Each and every day, the names of political activists are being added to a vast law enforcement data bank known as the Regional Information Sharing System (RISS).
Tuesday, October 17, 2000
Stolen German Code Machine Turns Up
After disappearing from a museum on April Fool's Day, a World War II-era encryption machine turned up Tuesday - in the mailroom of the British Broadcasting Corp.
After disappearing from a museum on April Fool's Day, a World War II-era encryption machine turned up Tuesday - in the mailroom of the British Broadcasting Corp.
All Quiet on the Network Front
Twenty-four hours inside a security command center scanning the nation's networks for digital intrusions.
Twenty-four hours inside a security command center scanning the nation's networks for digital intrusions.
Secret Pilots Can Finally Tell Their Tales
Six weeks ago -- with a phone call out of the blue -- George Saylor learned that, finally, he could reveal to family and friends a secret he had kept for nearly 50 years.
Six weeks ago -- with a phone call out of the blue -- George Saylor learned that, finally, he could reveal to family and friends a secret he had kept for nearly 50 years.
Monday, October 16, 2000
Sommercon
For those of you who do not know about Summercon, it is the oldest of the security/hacker conferences. Its origins are well tied to the early years of Phrack Magazine.
For those of you who do not know about Summercon, it is the oldest of the security/hacker conferences. Its origins are well tied to the early years of Phrack Magazine.
Sunday, October 15, 2000
Cryptographic software solutions and how to use them.
This book is intended as a basic primer for people that do not know a lot (or anything as the case may be) about cryptography but are interested or concerned about it (in an actual "should I be using it, and if yes, what should I use, and how?"). The book starts with a brief set of explanations of why you might want to use cryptographic software, and how cryptography works. This is followed by chapters on the various tasks or problems you wish to solve using cryptography and which packages might be useful. The bulk of the book is practical explanations of how to install, configure and use various software packages for various situations (such as encrypting email in Windows).
This book is intended as a basic primer for people that do not know a lot (or anything as the case may be) about cryptography but are interested or concerned about it (in an actual "should I be using it, and if yes, what should I use, and how?"). The book starts with a brief set of explanations of why you might want to use cryptographic software, and how cryptography works. This is followed by chapters on the various tasks or problems you wish to solve using cryptography and which packages might be useful. The bulk of the book is practical explanations of how to install, configure and use various software packages for various situations (such as encrypting email in Windows).
Special Electronic Security Products Ltd.
Israel's leading Manufacturer of Electronic Surveillance, Bugging & Counter Measures Equipment. Including the JAMMER AND PARALYZER OF CELLULAR TELEPHONES (wow!).
Israel's leading Manufacturer of Electronic Surveillance, Bugging & Counter Measures Equipment. Including the JAMMER AND PARALYZER OF CELLULAR TELEPHONES (wow!).
Friday, October 13, 2000
Security mailing Lists
The following FAQ is a comprehensive list of security mailing lists. These security mailing lists are important tools to network administrators, network security officers, security consultants, and anyone who needs to keep abreast of the most current security information available.
The following FAQ is a comprehensive list of security mailing lists. These security mailing lists are important tools to network administrators, network security officers, security consultants, and anyone who needs to keep abreast of the most current security information available.
COAST Hotlist: Computer Security, Law and Privacy
The COAST archive at Purdue is probably the most complete archive of security-related links on the Internet. If it has to do with security, it's probably in the COAST archive.
The COAST archive at Purdue is probably the most complete archive of security-related links on the Internet. If it has to do with security, it's probably in the COAST archive.
How to Write Secure Code
In the process of writing and auditing our code, we've become increasingly upset at the lack of documentation about writing secure code. To try and fix that, and hopefully make your life easier in the process, we've compiled a list of resources we've stumbled across.
In the process of writing and auditing our code, we've become increasingly upset at the lack of documentation about writing secure code. To try and fix that, and hopefully make your life easier in the process, we've compiled a list of resources we've stumbled across.
The Linux Internet Server Administration Guide
How to build a safe Linux Server. Highly recommended reading, including for Linux newbies.
How to build a safe Linux Server. Highly recommended reading, including for Linux newbies.
Ex-NSA expert warns of concealed backdoors
Ex-spook believes that software backdoors are out there, fuelling conspiracy theories
Ex-spook believes that software backdoors are out there, fuelling conspiracy theories
Linux Encryption HOWTO
How to set up a Linux 2.2 system to use encryption in both disk and network accesses. This document describes how you can use the International Kernel Patch and other packages to make harddisk contents and network traffic inaccessible to others by encrypting them.
How to set up a Linux 2.2 system to use encryption in both disk and network accesses. This document describes how you can use the International Kernel Patch and other packages to make harddisk contents and network traffic inaccessible to others by encrypting them.
Ex-CIA chief compromised secrets
Former CIA Director John Deutch compromised some of the most sensitive defense programs by improperly transferring data about ultrasecret Pentagon programs to computers he used to send e-mail and access the Internet, The Washington Times has learned.
Former CIA Director John Deutch compromised some of the most sensitive defense programs by improperly transferring data about ultrasecret Pentagon programs to computers he used to send e-mail and access the Internet, The Washington Times has learned.
Thursday, October 12, 2000
PGP Freeware
Download the PGP freeware edition US Strenght, eventhough you're outside the USA (thanks to Anonymiser)
Download the PGP freeware edition US Strenght, eventhough you're outside the USA (thanks to Anonymiser)
The Gaul Mysteries
In 1974, the Hull trawler Gaul sank with all hands in the Barents Sea off the North Cape. A quarter of a century on, how and why she sank remains a mystery. She had been spying for British intelligence against the Soviet Northern Fleet. But did the Russians sink her?
In 1974, the Hull trawler Gaul sank with all hands in the Barents Sea off the North Cape. A quarter of a century on, how and why she sank remains a mystery. She had been spying for British intelligence against the Soviet Northern Fleet. But did the Russians sink her?
Cryptome
This website keeps track of security related information and encryption. Definately a 'must read' website.
This website keeps track of security related information and encryption. Definately a 'must read' website.
US Frequency Allocation Chart
This chart displays the US Frequency Allocation.
Source: TSCM Mailing list.
This chart displays the US Frequency Allocation.
Source: TSCM Mailing list.
How we Cracked the Code Book Ciphers
A couple of Swedish guys broke the code challenge (see CODEBOOK for details. Great reading!
A couple of Swedish guys broke the code challenge (see CODEBOOK for details. Great reading!
Wednesday, October 11, 2000
Ad-Adware
Ad-Aware now includes the detection and removal of Web3000, Gator, Cydoor, Radiate\Aureate, Flyswat, Conducent\TimeSink and CometCursor (1.0 and 2.0).
This program (freeware) removes so-called 'spy-ware' from your Windows PC. Just try it and you'll be amazed what is found on your PC...
Ad-Aware now includes the detection and removal of Web3000, Gator, Cydoor, Radiate\Aureate, Flyswat, Conducent\TimeSink and CometCursor (1.0 and 2.0).
This program (freeware) removes so-called 'spy-ware' from your Windows PC. Just try it and you'll be amazed what is found on your PC...
kim-spy: Intelligence and CounterIntelligence
This site has a huge collection of links. It's incredible. Go check it out!
This site has a huge collection of links. It's incredible. Go check it out!
LOCATE MISSING PERSONS - INVESTIGATOR TRAINING
Interesting page with links to sites and tips on how to locate missing persons in the USA.
Interesting page with links to sites and tips on how to locate missing persons in the USA.
Zone Alarm
ZoneAlarm delivers powerful new features and comprehensive Internet security for all users of always-on Internet-connected PCs, whether in a small business office or home setting, and whether using an individual or networked PC.
ZoneAlarm is compatible with Windows 95/98/Me/NT/2000.
ZoneAlarm delivers powerful new features and comprehensive Internet security for all users of always-on Internet-connected PCs, whether in a small business office or home setting, and whether using an individual or networked PC.
ZoneAlarm is compatible with Windows 95/98/Me/NT/2000.
Army Counterintelligence Online
Army Counterintelligence Online is an unofficial web portal for the Army Counterintelligence Discussion Group
Mailing List (ACIDG-L).
With the exception of the ACIDG-L and ACIDG-Lite mailing lists, all resources at this site are open to the public. All information presented on this site is from the public domain and is unclassified.
Army Counterintelligence Online is an unofficial web portal for the Army Counterintelligence Discussion Group
Mailing List (ACIDG-L).
With the exception of the ACIDG-L and ACIDG-Lite mailing lists, all resources at this site are open to the public. All information presented on this site is from the public domain and is unclassified.
Interesting Site "Onkruit"
A Dutch action group called 'Onkruid' (weed) has seized documents about the nuclair arms that are present on the American base 'Volkel' in the Netherlands. Website is in Dutch.
A Dutch action group called 'Onkruid' (weed) has seized documents about the nuclair arms that are present on the American base 'Volkel' in the Netherlands. Website is in Dutch.
Interesting article "Mitnick: ‘Everybody is suspect’"
Infamous hacker Kevin Mitnick warned IT managers Wednesday that unless they educate every employee — from the CEO to the receptionist — about how hackers work and how to bolster security, corporate networks and Web sites will never be safe from attack.
Source: TSCM Mailing List
Infamous hacker Kevin Mitnick warned IT managers Wednesday that unless they educate every employee — from the CEO to the receptionist — about how hackers work and how to bolster security, corporate networks and Web sites will never be safe from attack.
Source: TSCM Mailing List
Interesting article "Freedom Ship 'will be target for terrorists' "
Experts warn of crime wave, security crackdown and danger of hostage-taking on mile-long vessel
Source: TSCM Mailing List
Experts warn of crime wave, security crackdown and danger of hostage-taking on mile-long vessel
Source: TSCM Mailing List
Interesting article "Beware The Security Zealot"
In a certain way, the "hunters" couldn't have been more different. Ex-hacker Chris Davis was responsible for cornering the Welsh teenage Curador - the 18-year-old computer security consultant turned computer criminal - who thought it was cool to snare credit cards from mom-and-pop Web sites and post them where all could see and admire his cunning. It took Davis two days to locate Curador's name, address and phone number.
Source: TSCM Mailing List
In a certain way, the "hunters" couldn't have been more different. Ex-hacker Chris Davis was responsible for cornering the Welsh teenage Curador - the 18-year-old computer security consultant turned computer criminal - who thought it was cool to snare credit cards from mom-and-pop Web sites and post them where all could see and admire his cunning. It took Davis two days to locate Curador's name, address and phone number.
Source: TSCM Mailing List
Microsoft
#include
#include
#include /* Microsoft Network Connectivity library */
#include /* For the court of law */
#define say(x) lie(x)
#define computeruser ALL_WANT_TO_BUY_OUR_BUGWARE
#define next_year soon
#define the_product_is_ready_to_shipanother_beta_version
void main()
{
if (latest_window_version>one_month_old)
{
if (there_are_still_bugs)
market(bugfix);
if (sales_drop_below_certain_point)
raise(RUMOURS_ABOUT_A_NEW_BUGLESS_VERSION);
}
while(everyone_chats_about_new_version)
{
make_false_promise(it_will_be_multitasking); /* Standard Call, in
lie.h */
if (rumours_grow_wilder)
make_false_promise(it_will_be_plug_n_play);
if (rumours_grow_even_wilder)
{
market_time=ripe;
say("It will be ready in one month);
order(programmers, stop_fixing_bugs_in_old_version);
order(programmers, start_brainstorm_about_new_version);
order(marketingstaff, permission_to_spread_nonsense);
vapourware=TRUE;
break;
}
}
switch (nasty_questions_of_the_worldpress)
{
case WHEN_WILL_IT_BE_READY:
say("It will be ready in", today+30_days," we're just testing");
break;
case WILL_THIS_PLUG_AND_PLAY_THING_WORK:
say("Yes it will work");
ask(programmers, why_does_it_not_work);
pretend(there_is_no_problem);
break;
case WHAT_ARE_MINIMAL_HARDWARE_REQUIREMENTS:
say("It will run on a 8086 with lightning speed due to"
" the 32 bits architecture");
inform(INTEL, "Pentium sales will rise skyhigh");
inform(SAMSUNG, "Start a new memorychip plant"
"'cos all those customers will need at least 32 megs");
inform(QUANTUM, "Thanks to our fatware your sales will triple");
get_big_bonus(INTEL, SAMSUNG, QUANTUM);
break;
case DOES_MICROSOFT_GET_TOO_MUCH_INFLUENCE:
say("Oh no, we are just here to make a better world for
everyone");
register(journalist, Big_Bill_Book);
when(time_is_ripe)
{
arrest(journalist);
brainwash(journalist);
when(journalist_says_windows95_is_bugfree)
{
order(journalist, "write a nice objective article");
release (journalist);
}
}
break;
}
while (vapourware)
{
introduction_date++; /* Delay */
if (no_one_believes_anymore_there_will_be_a_release)
break;
say("It will be ready in",today+ONE_MONTH);
}
release(beta_version)
while (everyone_is_dumb_enough_to_buy_our_bugware)
{
bills_bank_account += 150*megabucks;
release(new_and_even_better_beta_version);
introduce(more_memory_requirements);
if (customers_report_installation_problems)
{
say("that is a hardware problem, not a software problem");
if (smart_customer_says_but_you_promised_plug_and_play)
{
ignore(customer);
order(microsoft_intelligence_agency, "Keep an eye on this
bastard");
}
}
if ( bills_bank_account>skyhigh && marriage>two_years )
{
divorce(woman_that_was_beautiful_when_I_married_her);
wave(dollars, at_lusty_chicks);
marry(young_blond_virgin);
devirginize(young_blond_virgin);
dump(young_blond_virgin_with_big_boobies);
if (there_is_another_company)
{
steal(their_ideas);
accuse(company, stealing_our_ideas);
hire(a_lot_of_lawyers); /* in process.h */
wait(until_other_company_cannot_afford_another_lawsuit);
buy_out(other_company);
}
}
/* Now everyone realizes that we sell bugware and they are all angry at
us */
order(plastic_surgeon, make_bill_look_like_poor_bastard);
buy(nice_little_island); hire(harem);
laugh_at(everyone,
for_having_the_patience_year_after_year_for_another_unfinished_version);
}
void bugfix(void)
{
charge (a_lot_of_money)
if (customer_says_he_does_not_want_to_pay_for_bugfix)
say("It is not a bugfix but a new version");
if (still_complaints)
{
ignore(customer);
register(customer, big_Bill_book);
/* We'll get him when everyone uses Billware!!*/
}
}
#include
#include
#include
#include
#define say(x) lie(x)
#define computeruser ALL_WANT_TO_BUY_OUR_BUGWARE
#define next_year soon
#define the_product_is_ready_to_shipanother_beta_version
void main()
{
if (latest_window_version>one_month_old)
{
if (there_are_still_bugs)
market(bugfix);
if (sales_drop_below_certain_point)
raise(RUMOURS_ABOUT_A_NEW_BUGLESS_VERSION);
}
while(everyone_chats_about_new_version)
{
make_false_promise(it_will_be_multitasking); /* Standard Call, in
lie.h */
if (rumours_grow_wilder)
make_false_promise(it_will_be_plug_n_play);
if (rumours_grow_even_wilder)
{
market_time=ripe;
say("It will be ready in one month);
order(programmers, stop_fixing_bugs_in_old_version);
order(programmers, start_brainstorm_about_new_version);
order(marketingstaff, permission_to_spread_nonsense);
vapourware=TRUE;
break;
}
}
switch (nasty_questions_of_the_worldpress)
{
case WHEN_WILL_IT_BE_READY:
say("It will be ready in", today+30_days," we're just testing");
break;
case WILL_THIS_PLUG_AND_PLAY_THING_WORK:
say("Yes it will work");
ask(programmers, why_does_it_not_work);
pretend(there_is_no_problem);
break;
case WHAT_ARE_MINIMAL_HARDWARE_REQUIREMENTS:
say("It will run on a 8086 with lightning speed due to"
" the 32 bits architecture");
inform(INTEL, "Pentium sales will rise skyhigh");
inform(SAMSUNG, "Start a new memorychip plant"
"'cos all those customers will need at least 32 megs");
inform(QUANTUM, "Thanks to our fatware your sales will triple");
get_big_bonus(INTEL, SAMSUNG, QUANTUM);
break;
case DOES_MICROSOFT_GET_TOO_MUCH_INFLUENCE:
say("Oh no, we are just here to make a better world for
everyone");
register(journalist, Big_Bill_Book);
when(time_is_ripe)
{
arrest(journalist);
brainwash(journalist);
when(journalist_says_windows95_is_bugfree)
{
order(journalist, "write a nice objective article");
release (journalist);
}
}
break;
}
while (vapourware)
{
introduction_date++; /* Delay */
if (no_one_believes_anymore_there_will_be_a_release)
break;
say("It will be ready in",today+ONE_MONTH);
}
release(beta_version)
while (everyone_is_dumb_enough_to_buy_our_bugware)
{
bills_bank_account += 150*megabucks;
release(new_and_even_better_beta_version);
introduce(more_memory_requirements);
if (customers_report_installation_problems)
{
say("that is a hardware problem, not a software problem");
if (smart_customer_says_but_you_promised_plug_and_play)
{
ignore(customer);
order(microsoft_intelligence_agency, "Keep an eye on this
bastard");
}
}
if ( bills_bank_account>skyhigh && marriage>two_years )
{
divorce(woman_that_was_beautiful_when_I_married_her);
wave(dollars, at_lusty_chicks);
marry(young_blond_virgin);
devirginize(young_blond_virgin);
dump(young_blond_virgin_with_big_boobies);
if (there_is_another_company)
{
steal(their_ideas);
accuse(company, stealing_our_ideas);
hire(a_lot_of_lawyers); /* in process.h */
wait(until_other_company_cannot_afford_another_lawsuit);
buy_out(other_company);
}
}
/* Now everyone realizes that we sell bugware and they are all angry at
us */
order(plastic_surgeon, make_bill_look_like_poor_bastard);
buy(nice_little_island); hire(harem);
laugh_at(everyone,
for_having_the_patience_year_after_year_for_another_unfinished_version);
}
void bugfix(void)
{
charge (a_lot_of_money)
if (customer_says_he_does_not_want_to_pay_for_bugfix)
say("It is not a bugfix but a new version");
if (still_complaints)
{
ignore(customer);
register(customer, big_Bill_book);
/* We'll get him when everyone uses Billware!!*/
}
}
Subscribe to:
Posts (Atom)