Wednesday, June 27, 2001

Echelon Spy System
The Croatian NSEI System is Based on the American Spy System ‘Echelon’.

The Nacional Central Electronic Reconnaissance system (NSEI) is the most powerful and most secretive part of Croatia’s intelligence system. In the last ten years, massive financial resources have been invested in this system. As a specially organized unit of the Office for National Security (UNS), this system is responsible for monitoring all connections with countries outside of Croatia’s borders, as well as for monitoring all connections within Croatia which have any association with terrorist acts, intelligence or with directed attempts to destroy the constitutional system.
The monitoring system automatically turns itself on and records any telephone conversations when key words are mentioned, such as explosive, bomb, package, president, minister and others. The American system ‘Echelon’ operates in a similar, albeit much more complex and vast way throughout the world.
In-Q-Tel
In-Q-Tel is dedicated to developing information technology for the CIA that is commercially available, affordable, and supported. In-Q-Tel seeks technology that enables the gathering of accurate, comprehensive and timely foreign intelligence in the interest of national security.
Email snooping almost banned
A cluster of new laws will soon come into effect curbing companies' rights to snoop through workers' emails.
Workers sending personal email across the corporate pipeline will gain a little more protection than they have at present but privacy advocates warn that it won't be a lot.
WWW.huh?: You Are the First Line of Defense
Defense Department computer security systems and specialists foiled nearly 22,500 would-be intruders in 1999 and 24,500 in 2000. There's no let-up in sight.
Sigaba Updates Email Encryption Gateway
Sigaba announced the availability of the its Email Encryption Gateway (SEEG) version 2.0. Enhancements include compatibility with the proposed Advanced Encryption Standard (AES), expanded desktop email encryption support and interoperability with Sigaba Courier. Sigaba Courier is an HTML-based product for use with SEEG version 2.0 that allows users to open Sigaba encrypted email, without the need to download any additional software.
Hampton, New Hampshire Man Convicted and Sentenced for Hacking into Former Employer's Computer Server
McKenna, who was fired by Bricsnet on Friday, October 20, 2000, hacked into his former employer’s computer server on two occasions. The first time was the evening of Friday, October 20, 2000, the day he was fired. The second was the following morning, Saturday, October 21, 2000. McKenna remotely accessed the computer server of his former employer, via the Internet, without authorization and caused damage in four ways: 1) he deleted approximately 675 computer files; 2) he modified computer user access levels; 3) he altered billing records; and, 4) he transmitted E-mails, which purported to have originated from an authorized representative of the victim corporation, to over one hundred (100) clients. Those E-mails contained false statements about business activities of the corporation.
New Encryption and Decryption drafts
The W3C released initial drafts of XML Encryption Syntax and Processing and Decryption Transform for XML Signature.
Study: Interactive TV Could Be 'Spy in Your Home'

A new report from the Center for Digital Democracy (CDD) warns that the privacy concerns of the Internet will be magnified by interactive television (ITV), as technology makers and marketers turn the living room into a laboratory and track everything from income to favorite color.
San Angelo, Texas: Home of Spies
Thanks to neighboring Goodfellow Air Force Base, this isolated West Texas city of 87,000 may harbor more spies, ex-spies and future spies per capita than any place in America, save Washington, D.C.

Sunday, June 24, 2001

Statement for the Record for the Joint Economic Committee Cyber Threat Trends and US Network Security
In 2015 we anticipate that the world will almost certainly experience quantum leaps in information technology (IT) and in other areas of science and technology.  IT will be the major building block for international commerce and for empowering nonstate actors.  Most experts agree that the IT revolution represents the most significant global transformation since the Industrial Revolution beginning in the mid-eighteenth century.