From: Mark Neely <[EMAIL PROTECTED]>


- - - - - - - - - - - - - - - - - - - -

Net-Alert
20 September, 1999

If you have any questions, comments or other feedback concerning
Net-Alert articles, contact the Editor at <mailto:[EMAIL PROTECTED]>

Previous editions of Net-Alert are available at
http://www.onelist.com/arcindex.cgi?listname=net-alert

Subscription and unsubscription details are available at the end of this
newsletter.
____________________

Contents:

##     Cholera the next viral outbreak
##     Reach out and bug someone
##     Windows backdoors and the NSA
##     HERF guns: fact or fiction?
##     When Harry allegedly met Sally
##     Cyberstalking no laughing matter
##     Data loss in perspective
##     More Microsoft hoaxes
##     Send a copy of Net-Alert to a friend.

____________________
Cholera the next viral outbreak

Following in the footsteps of the Melissa macro virus is the
Cholera virus. Although, unlike Melissa, it relies on an
executable program ("setup.exe") to cause infections, it
propagates in much the same way. Once your system is infected,
the virus scans your hard disk for email addresses that it can
send copies of itself to. The unsuspecting recipient receives a
short email containing only a smiley face ":)" with an attachment
(setup.exe).

____________________
Reach out and bug someone

Mobile phones are becoming such an essential business - and
lifestyle - tool that they rarely register on our reality
perceptors. Like traditional telephones, mobile phones are
practically ubiquitous and no one would question their presence
in an office or business environment.

But that may soon change.

Newer models now incorporate several interesting features that
can be put to uses unanticipated by their inventors.

For instance, many models now offer a completely silent mode of
operation - no beeping or ringing when there is an incoming call
or message. Others can be configured to automatically answer
incoming calls - handy for taking hands-free calls while driving.

But the combination of these features can transform the humble
mobile telephone into a remote-controlled bugging device.

Want to know what your colleagues talk about when you leave a
meeting to make some photocopies? Leave your mobile phone behind
and call it from reception. When it automatically and silently
answers the call, it will broadcast the conversation in the
meeting room back to you. Thanks to increasingly longer standby
battery life, you could even discretely place the mobile phone in
a meeting room days or hours before it is scheduled to take
place.

If this worries you, then you probably don't want to know how
mobile phones could also be used to track someone's location
(while, of course, bugging them).

Lauren Weinstein, moderator of the Privacy Forum, covered these
risks and others in a recent article.

URLs:

Privacy Forum Web site
   http://www.vortex.com/privacy

Article - Cell Phones Become Instant Bugs!
   http://www.vortex.com/privacy/priv.08.11

____________________
Windows backdoors and the NSA

There has been considerable news coverage recently concerning
allegations that Microsoft Corp. deliberately inserted code into
their Windows 2000 operating system that would allow the US
National Security Agency (NSA) unregulated access to computers
using that operating system.

While such allegations make for interesting stories, to date no
conclusive proof has been offered that such a backdoor(s) exist.
However, you can bet that a number of researchers are now
looking.

____________________
HERF guns: fact or fiction?

HERF (High Energy Radio Frequency) guns - weapons that use radio
frequencies to "kill" computer systems by disrupting their
internal hardware components - have been well documented, in
conceptual terms at least, for some time.

In the battlefield of the future, computer systems, not soldiers
or weaponry, are likely to be the deciding factor in victory.
Computer systems will aid battlefield communications and
logistics, suggest tactics and keep track of friends and foe.

This has led many strategists to speculate that the next arms
race won't involve building nuclear or biological missiles, but
rather designing weaponry that can "nuke" computer systems.

Why send in troops to take over and then disable an enemy's
telecommunications infrastructure, for example, if you can stay
at home and simply lob a missile that will do the same thing?

It appears that the race has well and truly begun.

David Schriner, an ex- US Navy engineer, successfully
demonstrated a machine that crashed two computers at a recent
InfowarCon '99 conference.

URL:

ZD Net article
   http://www.zdnet.com/zdnn/stories/news/0,4586,2331772,00.html

____________________
When Harry allegedly met Sally

Computer mediated communications, such as IRC and Web-based
chats, offer participants the chance to escape from the mundane
reality of their daily lives and enter the realm of fiction and
facade.

Ordinarily this is harmless fun, but sometimes it can lead to
embarrassing encounters (or worse).

Researchers at the Georgia Institute of Technology have developed
The Turing Game, based on the principles of the Imitation Game,
developed by the brillient British mathematician, Alan Turing.

They claim that the game can unmask imposters - people who
pretend to be a different race or gender.

Participants in the game are assembled into panels. They are then
asked to pretend to be a member of some group, such as women.
Some will be women, others will be men. All will try to "prove"
that they are women.

The remaining game participants form the audience, who are given
the chance to ask the panel questions, the answers to which are
analysed for signs of race, gender and cultural markers.

URL:

The Turing Game
   http://www.cc.gatech.edu/elc/turing/

____________________
Cyberstalking no laughing matter

US Vice President Al Gore released a report, prepared by the US
Justice Department, criticising US law enforcement agencies for
underestimating the magnitude and severity of online stalking.

Gore is expected to recommend sweeping changes to state laws, in
an effort to crack down on the use of the Internet to transmit
threatening or harrassing messages.

 From the Press Release:

   According to the Department of Justice, less than one third of
   the states have anti-stalking laws that explicitly cover
   stalking via the Internet, email, pagers, or other electronic
   communications.  While the general stalking statutes in some
   states may cover cyberstalking, the report calls on all states
   to review their laws to ensure they prohibit and punish
   stalking via the Internet and other electronic communications.
   The Los Angeles District Attorney's Office estimates that
   e-mail or other electronic communications were a factor in
   approximately 20% of the roughly 600 cases handled by its
   Stalking and Threat Assessment Unit. According to a 1998
   national DOJ survey of traditional (offline) stalking, one out
   of every 12 women (8.2 million) and one out of every 45 men (2
   million) have been stalked at some time in their lives.

URLs:

Dept. of Justice Report
   http://www.usdoj.gov/ag/cyberstalkingreport.htm

Press Release
   http://www.pub.whitehouse.gov/uri-res/I2R?urn:pdi://oma.eop.gov
   .us/1999/9/16/6.text.1

LA Times article
   http://www.latimes.com/HOME/BUSINESS/t000082754.html

____________________
Data loss in perspective

Net-Alert's primary focus is to warn users of threats posed to
them (and their computers) by "hackers", viruses, scams, hoaxes
and privacy abuses.

As you read the contents of Net-Alert from week to week, you
might be forgiven for thinking that even switching on your PC
constitutes a risk.

While computer criminals do pose a threat, and viruses are real,
recent studies have revealed that most instances of data loss
resulted not from virus infections or computer vandal attacks,
but from good old user error.

88% of the participants in one survey reported that accidental
deletions of computer files by users caused the most problems,
while only 3% considered viruses to be a major problem.

Interestingly, it seems that we humans are slow to learn from our
mistakes.

Another study revealed that a mere 29% of users learn from their
first mistake; the bulk of users (71%) are multiple offenders,
with as many as 24% reporting up to six accidental deletions

According to a press release on the topic:

   Compounding the problem, research indicates that anywhere from
   50 to 80 percent of data loss customers who regularly back-up
   their data find backups less than adequate at the critical
   moment. "Backup methods assume that the hardware and storage
   media are in working order, that the data is not corrupted, and
   that the backup is recent enough to provide full recovery,"
   says Daniel W. Oexeman, a spokesperson for Ontrack Data
   Recovery. "Unfortunately, this is all too often not the case."

   Making matters worse, human error is playing a growing role in
   backup shortcomings. 1-for-All Marketing found that 50 percent
   of these failures trace back to human error in either not
   backing up or restoring properly while a variety of media
   situations, on the other hand, accounted for only 26 percent.

The moral of this story? It may not be enough to perform daily
backups of essential data. Companies and individuals need to
reconsider their backup policies and implement strategies that
more accurately reflect their users' data access patterns and
general IT skills.

URLs:

InternetWire report
   http://game.internetwire.com/technews/tn/tn981250.htx

Chicago Tribune report
   http://www.chicago.tribune.com/tech/specialreport/article/0,266
   9,ART-34595,FF.html

____________________
More Microsoft hoaxes

Microsoft Corp. is warning customers about an email hoax
currently doing the rounds.

The message, purportedly from [EMAIL PROTECTED], contains an
trojan horse attachment that copies your password and login
details.

The full text of the hoax email is as follows:

   "From: [EMAIL PROTECTED]
   Subject: Microsoft Announcement
   Date: Tue, 14 Sep 1999 23:37:05 +0200

   To All Microsoft Users,

   We are excited to announce the Microsoft Year 2000 Counter.

   Start the countdown NOW.
   Let us all get in the 21 Century.
   Let us lead the way to the future and we will get YOU there
   FASTER and SAFER.
   Thank you,

   Microsoft Corporation"

As mentioned previously in Net-Alert, Microsoft does not
distribute software updates via email.

URL:

Microsoft announcement
   http://www.microsoft.com/y2k/hoax/hoax2.htm

____________________

Send a copy of Net-Alert to a friend.

Forwarding this newsletter to friends and colleagues is encouraged,
providing the message is forwarded in its entirety, including the copyright
notice.

____________________

If you received this copy of Net-Alert from a friend, you can subscribe
by visiting the following URL:

        http://www.onelist.com/subscribe/net-alert

or by sending a blank email to

        [EMAIL PROTECTED]

To UNSUBSCRIBE, send a blank email to

        [EMAIL PROTECTED]

____________________

Net-Alert is copyright (c) Mark Neely 1999.

Forwarding this message to friends and colleagues is encouraged,
providing the message is forwarded in its entirety, including this copyright
notice.

- - - - - - - - - - - - - - - - - - - -

--------------------------- ONElist Sponsor ----------------------------

Share your special moments with family and friends- send PHOTO Greetings
at Zing.com! Use your own photos or choose from a variety of funny,
                 cute, cool and animated cards.
   <a href=" http://clickme.onelist.com/ad/zing7 ">Click Here</a>

------------------------------------------------------------------------


Reply via email to