m-o-o-t
m-o-o-t is an open-design, open-source cryptography project begun to defeat RIPAPart3 and make it look silly, and to allow UK citizens to communicate and to store information without worrying about it. It will also defeat Carnivore and the Australian and proposed NZ and Council of Europe laws.
Friday, December 08, 2000
U.S. finds link between bin Laden and Cole bombing
U.S. officials said Thursday there is evidence linking suspects in the October 12 bombing of the USS Cole in Yemen with known operatives of accused terrorist Osama bin Laden's organization.
U.S. officials said Thursday there is evidence linking suspects in the October 12 bombing of the USS Cole in Yemen with known operatives of accused terrorist Osama bin Laden's organization.
Pardon recommended for jailed U.S. 'spy'
A Russian presidential commission has recommended convicted U.S. spy Edmond Pope be given a pardon.
A Russian presidential commission has recommended convicted U.S. spy Edmond Pope be given a pardon.
Thursday, December 07, 2000
Spy School
Spying seems to have existed since humans could look across at their neighbors and wonder what they were up to. Here's your chance to find out about the shadowy world of what's been called the "second-oldest profession." But be careful, someone may be watching.
Spying seems to have existed since humans could look across at their neighbors and wonder what they were up to. Here's your chance to find out about the shadowy world of what's been called the "second-oldest profession." But be careful, someone may be watching.
2,619 CIA Sources: The Crowley Files
Robert Trumbull Crowley died in a Washington DC hospital on October 8, 2000. He was a senior Central Intelligence Agency officer from 1948 until the mid-1980s. During his tenure with the CIA, Crowley became Assistant Deputy Director for Operations and the second-in-command of the clandestine Directorate of Operations. He wrote a book entitled The New KGB: Engine of Soviet Power that was published in 1985 by William Morrow. In 1996, prior to what Crowley felt might be a fatal major surgery for suspected lung cancer, he gave a number of historical documents from his extensive personal files to an American journalist with whom he had been working.
Robert Trumbull Crowley died in a Washington DC hospital on October 8, 2000. He was a senior Central Intelligence Agency officer from 1948 until the mid-1980s. During his tenure with the CIA, Crowley became Assistant Deputy Director for Operations and the second-in-command of the clandestine Directorate of Operations. He wrote a book entitled The New KGB: Engine of Soviet Power that was published in 1985 by William Morrow. In 1996, prior to what Crowley felt might be a fatal major surgery for suspected lung cancer, he gave a number of historical documents from his extensive personal files to an American journalist with whom he had been working.
VULN-DEV
The VULN-DEV list exists to allow people to report potential or undeveloped holes. The idea is to help people who lack expertise, time, or information about how to research a hole do so.
The VULN-DEV list exists to allow people to report potential or undeveloped holes. The idea is to help people who lack expertise, time, or information about how to research a hole do so.
OpenBSD
Three years without a remote hole in the default install!
The OpenBSD project produces a FREE, multi-platform 4.4BSD-based UNIX-like operating system. Our efforts emphasize portability, standardization, correctness, proactive security and integrated cryptography.
Three years without a remote hole in the default install!
The OpenBSD project produces a FREE, multi-platform 4.4BSD-based UNIX-like operating system. Our efforts emphasize portability, standardization, correctness, proactive security and integrated cryptography.
The Nessus Project
The "Nessus" Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner.
A security scanner is a software which will audit remotely a given network and determine whether bad guys (aka 'crackers') may break into it, or misuse it in some way.
The "Nessus" Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner.
A security scanner is a software which will audit remotely a given network and determine whether bad guys (aka 'crackers') may break into it, or misuse it in some way.
Madison Gurkha
Former hackers start a company: We are proud to announce the establishment of Madison Gurkha B.V. Madison Gurkha will focus on the Design, Implementation and Audit of Security and Open Source IT infrastructures.
Former hackers start a company: We are proud to announce the establishment of Madison Gurkha B.V. Madison Gurkha will focus on the Design, Implementation and Audit of Security and Open Source IT infrastructures.
Wednesday, December 06, 2000
STASI
For 30 years, East German spies sought Britain's secrets. Who helped them? A six-month search by Stephen Grey and John Goetz has uncovered details of a large espionage ring. But it would have remained unknown without the skills of a former East German dissident
For 30 years, East German spies sought Britain's secrets. Who helped them? A six-month search by Stephen Grey and John Goetz has uncovered details of a large espionage ring. But it would have remained unknown without the skills of a former East German dissident
Feature Stories
The awesome satellite espionage series is now published here on the Web! You will find the true stories about the satellite signal reception of hidden signals, such as secret services and governments
The awesome satellite espionage series is now published here on the Web! You will find the true stories about the satellite signal reception of hidden signals, such as secret services and governments
THE FIFTH BOMB: DID PUTIN’S SECRET POLICE BOMB MOSCOW IN A DEADLY BLACK OPERATION?
The critical evidence are these photographs of a detonator.
The photographs of a detonator, taken by a Russian bomb squad, and other fresh evidence point to a plot carried out by the FSB working to assist their old spymaster, Vladimir Putin, in his rise to control the world’s number two superpower and its nuclear arsenal.
The critical evidence are these photographs of a detonator.
The photographs of a detonator, taken by a Russian bomb squad, and other fresh evidence point to a plot carried out by the FSB working to assist their old spymaster, Vladimir Putin, in his rise to control the world’s number two superpower and its nuclear arsenal.
Electronic Evidence Gathering
The presentation: Electronic Evidence Gathering is designed to introduce the audiance to the discipline and detail exactly what can be discovered using various techniques and tools. The technical aspects, while important, do not constitute the entire presentation. Normal forensic investigative techniques must also be observed in order to produce usable results and therefore these will also be addressed in the context of the computing environment and in parallel with the tools and techniques.
The presentation: Electronic Evidence Gathering is designed to introduce the audiance to the discipline and detail exactly what can be discovered using various techniques and tools. The technical aspects, while important, do not constitute the entire presentation. Normal forensic investigative techniques must also be observed in order to produce usable results and therefore these will also be addressed in the context of the computing environment and in parallel with the tools and techniques.
Security Research Group
Welcome to the Security Research Group of the University of Otago's home page. Here we will bring you many links to our own research and work that is being done around the world in the realms of security and other related issues.
Welcome to the Security Research Group of the University of Otago's home page. Here we will bring you many links to our own research and work that is being done around the world in the realms of security and other related issues.
FBI Fakes Foreign Intelligence Surveillance Actions
Today in Washington there is a secret court that exists soley for something called FISA, the Foreign Intelligence Surveillance Act. It's a court where the FBI has regularly secured permission to wire tap, bug and search the homes of individuals the FBI suspects of committing espionage against the United States.
Today in Washington there is a secret court that exists soley for something called FISA, the Foreign Intelligence Surveillance Act. It's a court where the FBI has regularly secured permission to wire tap, bug and search the homes of individuals the FBI suspects of committing espionage against the United States.
Tuesday, December 05, 2000
Breaking the Windows Script Encoder
The Windows Script Encoder (screnc.exe) is a Microsoft tool that can be used to encode your scripts (i.e. JScript, ASP pages, VBScript). Yes: encode, not encrypt. The use of this tool is to be able to prevent people from looking at, or modifying, your scripts. Microsoft recommends using the Script Encoder to obfuscate your ASP pages, so in case your server is compromised the hacker would be unable to find out how your ASP applications work.
The Windows Script Encoder (screnc.exe) is a Microsoft tool that can be used to encode your scripts (i.e. JScript, ASP pages, VBScript). Yes: encode, not encrypt. The use of this tool is to be able to prevent people from looking at, or modifying, your scripts. Microsoft recommends using the Script Encoder to obfuscate your ASP pages, so in case your server is compromised the hacker would be unable to find out how your ASP applications work.
Convicted terrorist to face new trial in Jordan
Jordanian officials said Monday they will retry a U.S. citizen convicted and sentenced to death in connection with a terrorist plot against Israeli and American tourists in Jordan during New Year's celebrations.
Jordanian officials said Monday they will retry a U.S. citizen convicted and sentenced to death in connection with a terrorist plot against Israeli and American tourists in Jordan during New Year's celebrations.
Comments on the Carnivore System Technical Review
Although the IITRI study appears to represent a good-faith effort at independent review, the limited nature of the analysis described in the draft report simply cannot support a conclusion that Carnivore is correct, safe, or always consistent with legal limitations. Those who are concerned that the system produces correct evidence, represents no threat to the networks on which it is installed, or complies with the scope of court orders should not take much comfort from the analysis described in the report or its conclusions.
Although the IITRI study appears to represent a good-faith effort at independent review, the limited nature of the analysis described in the draft report simply cannot support a conclusion that Carnivore is correct, safe, or always consistent with legal limitations. Those who are concerned that the system produces correct evidence, represents no threat to the networks on which it is installed, or complies with the scope of court orders should not take much comfort from the analysis described in the report or its conclusions.
Subscribe to:
Posts (Atom)