Thursday, October 19, 2000

A Resource for Internet Users Prepared by Majority Staff
KNOW THE RULES - USE THE TOOLS, Privacy in the Digital Age: A Resource for Internet Users
The Feds' Latest Crusade
The U.S. government is now embarking on a new war against teen hackers. It's likely to be no more successful than our "War on Drugs," but geeky keyboard desperados, handicapped by raging hormones and other afflictions of puberty, are much easier and safer marks than well-armed cartel terrorists.
Carnivore does more than previously thought
Heavily censored FBI documents obtained by US watchdog outfit the Electronic Privacy Information Centre (EPIC), under a Freedom of Information Act (FOIA) lawsuit, indicate that the FBI's electronic snoop known as Carnivore might be able to monitor a good deal more than just e-mail traffic.
Mitnick to IT managers
Mitnick to IT managers: 'Everybody is suspect'.
Stratfor Hotspot: Israel & Palestine
Excellent newsfeed. Great for keeping up-to-date about the world's Hotspots.
Regional Information Sharing Systems Program
The Regional Information Sharing Systems (RISS) Program is composed of six regional centers that share intelligence and coordinate efforts against criminal networks that operate in many locations across jurisdictional lines. Typical targets of RISS activities are drug trafficking, violent crime and gang activity, and organized criminal activities. Each of the centers, however, selects its own target crimes and the range of services provided to member agencies.
The RISS Files
Each and every day, the names of political activists are being added to a vast law enforcement data bank known as the Regional Information Sharing System (RISS).
Secure webmail
Free encrypted webmail via this site. Beware: site is in Dutch.

Tuesday, October 17, 2000

Stolen German Code Machine Turns Up
After disappearing from a museum on April Fool's Day, a World War II-era encryption machine turned up Tuesday - in the mailroom of the British Broadcasting Corp.
USENIX
Articles.
3 Phases of security
Interesting reading.
All Quiet on the Network Front
Twenty-four hours inside a security command center scanning the nation's networks for digital intrusions.
Secret Pilots Can Finally Tell Their Tales
Six weeks ago -- with a phone call out of the blue -- George Saylor learned that, finally, he could reveal to family and friends a secret he had kept for nearly 50 years.

Monday, October 16, 2000

Sommercon
For those of you who do not know about Summercon, it is the oldest of the security/hacker conferences. Its origins are well tied to the early years of Phrack Magazine.

Sunday, October 15, 2000

Cryptographic software solutions and how to use them.
This book is intended as a basic primer for people that do not know a lot (or anything as the case may be) about cryptography but are interested or concerned about it (in an actual "should I be using it, and if yes, what should I use, and how?"). The book starts with a brief set of explanations of why you might want to use cryptographic software, and how cryptography works. This is followed by chapters on the various tasks or problems you wish to solve using cryptography and which packages might be useful. The bulk of the book is practical explanations of how to install, configure and use various software packages for various situations (such as encrypting email in Windows).
Special Electronic Security Products Ltd.
Israel's leading Manufacturer of Electronic Surveillance, Bugging & Counter Measures Equipment. Including the JAMMER AND PARALYZER OF CELLULAR TELEPHONES (wow!).