Updated: 24.11.2002; 17:45:30 Uhr.
disLEXia
lies, laws, legal research, crime and the internet
        

Monday, September 23, 2002

Talk on the french Yahoo!-Blocking Ruling

As you might remember a french judge forced yahoo to block french users from auctions selling nazi-stuff. This MP3 contains an expanation on the ruling and its circumstances in english. Just forward to 37 minutes, because there is a talk in german before the english talk.
20:40 # G!

Vorträge von der Informationsfreiheitskonferenz des CCC als MP3s

Vortr...ge von Alvar Freude(0:00), Meryem Marzouki(bei 36:50), Jens Ohlig/Pylon(bei 1:13:30), Harald Summa(bei 2:00:40) und Irini E. Vassilaki (bei 2:49:10) gibt es als ein riesiges MP3. Von Frau Vassilakis Vortrag gibt es auch noch einen zweiten und dritten Teil, in dem sie auch (bei 2:00) auf das griechische Spiele-Verbot eingeht, gefolgt von einer Abschlu§didkussion (bei 3:50).
20:26 # G! Translate

China Gives Falun Gong TV Hackers Up to 20 Years

China handed prison terms of between four and 20 years to 15 members of the banned Falun Gong ( news - web sites) spiritual movement Friday for commandeering state television broadcasts, the Xinhua ne... [Security News Portal]
7:47 # G!

Greek net cafes face ruin

Greek police have been accused of using "Taleban tactics" after a fresh wave of arrests under a controversial law banning all forms of computer games closed down internet cafes around the country. A judge in the city of Thessaloniki had earlier thrown out the first case brought under the gaming law but prosecutors have appealed against the decision and launched a new crackdown.

"The police are acting like the Taleban, closing down businesses, seizing property and stopping people enjoying themselves," one of the two owners awaiting a retrial, Christos Iordanidis, told the BBC.

Four arrests were made in the northern town of Serres, another in the central Greek city of Larissa and a sixth in Orestiada. In each case, computers were seized and impounded as evidence of criminal activity. More arrests are expected. [BBC News | TECHNOLOGY]
7:40 # G!

p0rnspam abuses MS(cottish)Ps e-mail address to send porn images

A SENIOR MSP has called in detectives after a computer hacker used her parliamentary e-mail address to send pornographic images over the internet. Fiona Hyslop, one of John Swinneyâs most senior aides within the party, and the SNPâs chief of policy, also found that a hacker had used her name to send junk e-mail offering internet users cheap loans. Hyslop said: "I was extremely concerned to discover my name and parliament e-mail had been used fraudulently. I have made sure that the details have been passed on to the relevant authorities.

One of the e-mails purporting to be from Hyslop asked recipients: "Got bad credit? Open a new credit file in 14 days." Others offered surfers the chance to access pornography. Hyslop only became aware of the problem when some e-mails which had been sent in her name were forwarded to her own e-mail account.

A Scottish parliament spokeswoman said Holyroodâs computer security was under review as a result of worries that MSPsâ e-mail addresses were being abused. She said: "Impersonating an MSP is a very series matter and something which the parliament strongly disapproves of. But it is helpful the matter has been raised with the authorities because it is so important that people are aware that simply because an e-mail purports to come from an MSP does not mean it is actually authentic.

Holyrood computer experts have been pondering methods to make MSPsâ e-mails more secure from hackers and also how to protect MSPs and their staff from Îspamâ or junk e-mail which floods computer usersâ e-mail boxes with unwanted offers or lobbying. Lobbyists make use of mass e-mailing as a means of targeting all MSPs with their messages. Large-scale bombarding of Holyrood has led to many MSPsâ e-mails being dealt with by their research staff.

Hyslopâs account is believed to have been attacked using a technique known as Îspoofingâ - whereby a hacker duplicates an e-mail address and then sends material which seems to come from that account. The technique is often used by web surfers who log on to pornographic sites who use the stolen e-mail addresses as a means of hiding their tracks. [Moreover - moreover...]
7:38 # G!

Another Article on the Cappato Report

What is the Borderline Between Criminality and Civil Disobedience in the Net? [The Hacktivist]
7:25 # G!

Chechen rebels hacking European Banks

Chechen rebels have made several attempts to hack into the computer networks of a number of European banks, claims the Russian daily Izvestiya. While it remains unclear whether the hackers have managed to access account information, what is apparent is that these breaches of information security are the work of highly proficient computer programmers. Russia's Federal Security Service is confident that the computer systems in operation at the country's key facilities are "impregnable", but, as the paper notes, such targets are under "constant attack". The following is the text of the report by Izvestiya on 18 September. Subheadings have been inserted editorially.

Hi-tech terrorism

Yesterday Russian Federal Security Service FSB employees told Izvestiya that, at the end of 2001, field commander Khattab's terrorist group tried to hack into the computer systems of major European banks. The list of affected credit and financial organizations is highly confidential and we do not know yet whether the gunmen were able to gain access to their accounts. But the very fact of the computer attack, which was evidently planned by top-class programmers, indicates that the terrorists are not confining themselves to military actions, but are switching in earnest to the use of high technology. "At the end of 2001, Khattab's gang launched a hack attack on the computer systems of 10 European banks," Vladimir Nepomnyashchiy, an expert at the FSB's computer and information security directorate, told Izvestiya. "E-mails containing commercial offers were sent out in the name of a major Irish bank. The messages were very skilfully written, using the proper banking vocabulary. But the letter contained a carefully concealed Back Orifice remote administration programme as an executable attachment. This enables the sender to gain unrestricted access to the recipient's computer systems."

The FSB computer security directorate employees who carried out the study established that an unknown hacker working for Khattab had managed to devise a very complex triple-layer pseudopolymorphic shell to conceal Back Orifice. This programme from the Trojan Horse stable is well known to specialists in the sphere of information security. But the method of concealment was deemed unique, which suggests that the writer of the code for the executable attachments was a programmer of the highest calibre.

The FSB received the report about the Khattab gang's hacking escapades from operational sources. They also provide examples of the e-mail. Having analysed its content, experts established that after one user has read the letter the organization's entire computer system is vulnerable to any virtual criminals. Hackers obtain the right to remote administration, that is, to destroy, block, modify, and copy official bank information. In other words, access to accounts, confidential data on clients, and the opportunity to deliberately disrupt the operation of the bank's systems.

"We call these actions by criminals attempted acts of cyberterrorism, since they involve the use of high technology and are directed against critically important elements of the infrastructure," Vladimir Nepomnyashchiy said. "We have sent warnings about 'letters from Khattab' to the law-enforcement agencies of those countries where the attacked banks are situated."

A serious threat

It is a serious blow to the image of any bank when outsiders break into its computer system, and it can result in catastrophic financial losses. Therefore victims may have decided to turn a blind eye to the possibility of stolen money, thus saving face as far as investors are concerned. The list of 10 European banks where the "mail bomb" may have gone off is highly confidential. But one foreign special service responded to the warnings sent out by the FSB. The gratitude received from it suggests that the letters from Khattab really were a serious threat.

Russia has encountered instances of cyberterrorism before. In January 1999 electronic messages threatening the use of nuclear weapons were sent from Russia to around 1,700, mainly government, sites in Western Europe and the USA. The content of the messages was approximately as follows: "We, officers of a Strategic Missile Troops military unit stationed in Kozelsk, Kaluga Region, are extremely unhappy both with our financial situation and with Russia's place in the world arena. We are threatening to launch strategic missiles with nuclear warheads without proper authorization." The "officers" were demanding 30,000 dollars to refrain from doing so.

An absurd threat that should be ignored, you might think. But, in the first place, there actually is a military unit of this kind in Kozelsk; second, the letter was very ably composed and details were provided indicating that the writer was in command of the situation. Despite the fact that the e-mails had been sent out with a mass of safeguards, the senders were arrested three days later in Kaluga. It turned out that two of the city's inhabitants, a certain Tikhomirov, born in 1948, with wisdom born of experience, and 17-year-old Mikhaylin, having acquired some information about the Kozelsk unit from friends, set about bombarding foreign countries. The upshot was a verdict of guilty. In April 2002 Tikhomirov was sentenced to one year in jail and Mikhaylin, who had frequented various courts, was also convicted, but he was amnestied as a minor.

Dispelling the myths

There are many legends about computer hackers breaking into military systems and virtually starting a nuclear war. These stories, intended to make ordinary people frightened of the mysterious hackers, are rather entertaining for information security specialists. But each report of this kind is closely studied by experts all over the world in order to establish whether there is a grain of truth in it.

Commenting on two such cases - an alleged attack on US airlines' computer systems before the 11 September terrorist attacks in the USA, and rumours of hackers getting control of a British military satellite - FSB experts claim that nothing like this could have happened. The satellite control system is a closed one, so it requires direct physical intervention to gain access to it. For example, by getting into the control centre. It is inaccessible via the Internet or other open systems. There is a similar situation with airports. According to Russian specialists, the traffic controllers had problems rapidly establishing the course of the hijacked aircraft only because the terrorists on board had switched off the secondary radar. It is not possible to hack into flight-control systems.

On the subject of the danger of computer systems belonging to vitally important Russian infrastructure facilities (nuclear power stations, airports, banks, transport and military organizations, and municipal services) being breached, FSB specialists say they are virtually impregnable. Primarily because they have no access to the outside - to the Internet. But accessible resources are under constant attack from hackers. In the first half of 2002 alone there were more than 400,000 (!) attempts to hack into the www.fsb.ru site. In a calendar year the Pentagon usually records more than 1.5m attempts to breach its systems.

Izvestiya, Moscow, in Russian [Security News Portal]
1:22 # G!

Bug Watch: The New Threat

During the last 12 months worms, Trojans and viruses have got nastier and more sophisticated. The growing complexity of corporate networks and the severe financial penalties of suffering a breach have also made the challenge of securing the network an ever-increasing headache. Yet security is critical to customer confidence and continued growth in the economy. [LinuxSecurity.com - Latest News]
1:07 # G!

Maximillian Dornseif, 2002.
 
September 2002
Sun Mon Tue Wed Thu Fri Sat
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30          
Aug   Oct

Search


Subsections of this WebLog


Subscribe to "disLEXia" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.