Links | Books
Are these lawyers really that stupid
The FBI doesn't want to disclose its key-logging methods. The lawyers are up in arms. Who hasn't had a key-logger set off their anti-virus software? Maybe that's why the feds want to keep it secret. Who wants to have to go and build a new or better one that standard utilities from Norton and McAfee won't pick up?
Russian Hackers fall for an old trick
The FBI pulled another fast one on a pair of foreign criminals. This time luring them out of Russia with a fake job offer. A lot less extravegant than luring someone out on a boat, but a lot easier to deal with.
FBI to polygraph sys admins
While we can certainly understand the reluctance of IT types to subject themselves to polygraphs, why hasn't this been required before? Anyone who has browsed around on networks knows that these guys often hold the keys to the castle.
When will someone besides the GAO take security seriously
Once again the GAO has found a number of ways to penetrate a government agency. This time it is the IRS. While this isn't surprising, the fact that there is seemingly no way for the GAO to force the IRS to do anything is.
Read more....
New IDS/Network Forensic tool
SilentRunner from Raytheon is slowing becoming public. All reviews I've heard are that the product is great. Now to get one's hands on it.
Are federal agencies violating the law
Congress is starting to apply pressure on the GAO and federal agencies to see if they are properly securing their systems. So they are going to conduct penetration tests. Anyone want to start placing bets on what the results will be?
People say the internet has hole
Earth-shattering development. Internet has security holes
More reasons to hate HTML mail
As if receiving mail encoded with HTML isn't annoying enough in a text based system. And those stupid fonts that are all over various spam messages don't make it more appealing. Now people can drop stuff into your html messages....And guess whose software is most commonly vulnerable?
Microsoft decides to implement backup DNS servers
In one of the most recent large blunders by the giant MS, they have finally decided that it might be a good idea to introduce geographically separate DNS servers. I guess they finally read the FAQ.
New sources for Free Food
Just walk yourself into a .com and eat some free snacks for a few weeks
Security talent shortage
In what will probably be the first of many articles: Like the rest of the IT industry, there is predicted to be a shortage of InfoSec talent (especially given the lack of school programs...not that anything of use is ever learned in school)
US to come under attack because of trouble in Mid-East
It's no secret that the U.S. is a big supporter of Israel. It seems to be something of a secret that the U.S. has also given a lot of aid to the Palestinians. In any event, for future and past misdeeds, activists seem determined that U.S. targets will be high on the list in the online battle in the Mid-East.
Read more..
Do as we SAY, not as we DO!
Microsoft is once again the victim of a hacker attack. This time by a vulnerability that was released as a patch back in August
Will the latest MS crackers get caught...not likely
With the U.S. government's stellar record of catching computer criminals and successfully prosecuting them, chances are slim, given that those who did it aren't out boasting on IRC boards, that anyone will ever be fingered
MicroSoft Gets Broken into
Source code and versions of the next office and windows versions
Voicemail Hacker gets 3 years
In what reads to be a very funny article about the exploits of a Canadian criminal, detective's voicemail boxes were cracked.
MI-6 Hit by Missle
Even though small arms are illegal to carry in the UK. It appears that people can sneak off a rocket launcher without a problem
U.S. Gov't Computer Security Hit with Low Grade
Those that made the article were wallowing in the D range. Unsurprisingly U.S. Gov't agencies have been hit with a low grade. One would think that the years of negative press and occurances of breakins might spur some initiative to fix something. However, in trying to prove the gov't worker stereotype true they've decided to do nothing.
Someone at our company would never do anything illegal...
In an attempt to cover his losses (and boy did he cover them) a former employee of Internet Wire is charged with submitting a false press release on Emulex to make up for his shortfall when shorting the stock. The last case of insider (or formerly insider) theft? Yea, right.
PWC/Information Week Security Survey shows things haven't changed
Perhaps they didn't even bother to send out surveys this year, but while that is rather unlikely, it seems that the respondants to the surveys kept their answers pretty much the same as last years.
Security Watch Authors bruise knees on table
In a bit more of a knee-jerk reaction to Carnivore, the Security Watch authors go on to complain about Carnivore, the FBI's by now way overhyped internet filtering tool. Oh well
FAA to develop security certification
The FAA in conjuction with ISC2 is to develop a security certification program for FAA systems security workers. Now workers in the FAA can have a resume building acronym as well.
Two arrested in Bloomberg extortion case
Two from Kazakhstan, have been arrested by the FBI for trying to blackmail Bloomberg based on supposed security findings
Alternate article
University to be selected to review Carnivore
A university should be selected in the next day or two to review the Carnivore system from the FBI. The results will then be released for public comment.
Think SSL makes your server protected?
Chris and Saumil beg to differ (as does a good portion of the security industry (at least that part that knows what it is doing)). The article walks you though how easy it is to go after vulnerabilities existing behind an SSL server.
Read more..
How to handle your servers securely
A high-level view on how to go about distributing files and configurations to your server environment securely.
Would you hire a Mitnick?
Tales and legends of hiring ex-hackers and some reasons why companies won't.
Inflating numbers?
PWC's Fred Rica does his part to inflate numbers, both of security's costs and number of "hackers" in his firm. 700, that includes quite a large number of others.
Read more
Too many middle agers
The NSA, one of the agencies with the biggest need to hire young computer talent is finding it difficult to find open hiring slots (and budget) to competitively hire the new guard.
Loose lips help foreign spies get into our business
Nothing that is new, but more stories of how loose lips have led foreigners to underbid and win contracts thanks to some well timed and placed ears.
Allegations CIA endorsed 70's Italy Bombings
An ex-Italian secret service general who is in self imposed exile claims that the CIA endorsed bombings in Italy. A little more reading into the article shows a lot less blame on the CIA.
Hacker Convention
In what was probably one of the bigger wastes of time. An article on DefCon
<Read more... Three Security Startups look to fill the void
An introduction to 3 security startups, @Stake, Counterpane and Foundstone and the areas that they are trying to fill.
Perfect time to lose your keys
The U.K. is trying to pass a bill that would require companies or individuals to turn over their keys used to encrypt/decrypt email. Ooops, I don't know where I left them...
Teens arrested for hacking NASA
In what basically can be described as a show of stupidity some teens have been arrested for hacking into NASA computers. They did such smart things as run an IRC server and basically made it easy for the feds to close in on them.
FBI e-mail snooping device attacked
A new black box from the FBI that snoops on all email at an ISP is coming under attack. Under normal wiretaps, the phone company controls the tap. The ability for the FBI to abuse this system is huge. And there is no one who can provide any oversight on it since the FBI controls the box.
Scanning the Internet
A stealth mode company is scanning the entire Internet (minus Gov't sites) for an unexplained reason. They are nice enough to set off firewalls and IDS systems at various hours of the night, but they aren't violating their AUP with Exodus.
China choosed Linux, fearing holes in Microsoft products
Fearing unknown security holes and backdoors in Microsoft products China has decided to standardize on Linux. Initial ramifications include a dramatic drop in software piracy (since Linux is free anyway) and probably higher unemployment for those in the piracy field.
The Real ISS
After a good attempt at writing a truthful article on ISS and Chris Klaus the author got a bit of feedback. Here is his followup article accompanied by a bit more research.
Industrial espionage goes high-tech
In a summary of a number of recent events, many high tech companies are sliding into the grey area on the legal vs. illegal ways of obtaining information on their competitors.
EU to investigate U.S. Spy System
The EU, fearing that they lost business to U.S. and U.K. spying plans to investigate. I guess what's good for the goose isn't good for the gander.
U.S. Critics of Echelon Cheer
Sue Nike?
In a feeble attempt to make money, the owner of the ISP that Nike's redirected traffic went through is trying to sue Nike for negligence. Note that this guy previously was sued by Amazon himself.
Attacks Welcome
A startup in combination with EWeek magazine have opened something of a hacking challenge. As if this hasn't been done before. Amazing what VC money will get people to do.
If you don't share, you won't be allowed to play
IS security execs are doubting the ability of the NIPC to work as planned based on the FBI's lack of desire to share data with other members.
Survey says, most hacks aren't that complicated
A study taken in part by SecurityFocus setting up honeypots on the net show just how random and easy most hacking attacks are.
Scanner Security Checks DOS Cisco's
In a case of this won't be the first time and it won't be the last time. An unidentified security scanner can DOS a Cisco router when checking for unrelated UNIX vulnerabilities.
Canadian Encryption Experts get NSA Approval
Canadian encryption experts Kasten-Chase have been granted approval by the NSA to encrypt data on the hard drives of sensitive computers. This would have rendered the disks believed stolen at Los Alamos useless unless the posessed the correct key
NY Times leaks Spies Names
The NY Times inadvertantly released a photo that listed names of Iranians who assisted the CIA in the overthrow of the Shah.
Anyone got a generator?
As the heat wave showed a week or so ago, Northern California's power grid is especially weak and unable to handle demand. While new power generators have been approved, it seems that if you're running a data-center or an office building you better make sure your generators are working. (This of course helps the "Save the Air" campaign.
Nike.Com domain hijacked
Earlier today (6/21) the Nike.Com domain was hijacked and pointed to
Offsite email virus scanning
Network Associates is offering an email virus scanning service and is about to announce a 30k seat contract.
NATO hit by computer virus
...released by NATO. In trying to protect their machines from virii, they released a virus that they developed on themselves. Oh well. Maybe someday they'll learn to work and play on separate networks.
Americans worried about hackers
Too bad none work in the C*O's office. A recent poll shows that a number of Americans are worried about the threats brought on by hackers.
The experts point the finger at other places
At NetSec2000 in San Francisco a panel of security experts were queried with pointing the finger at whom was to blame for the horrible state of computer security. Don't worry, even you didn't escape blame.
A case for less H1-B Visas
In a report about numerous security gaffes at the FAA, the GAO's biggest complaint is the lack of background checks and the number of foreigners who had access to sensitive computers who had no checks.
Service Based Security
With a total of somewhere way south of 10 customers Ernst and Young are heavily promoting their site. Another company (where else but on Long Island) is starting similar services. Will they eventually get customers for a service that consists of reading mailing lists and formatting that info onto a web page?
Retired U.S. Officer Charged with Spying for USSR
Recruited by a childhood friend, a former Colonel was arrested in Tampa for allegedly spying for the USSR from 1969 to 1994. Previously arrested in Germany, but let go because the statute of limitations had run out in Germany, he now faces charges in the U.S. where there are no limitations on prosecution for espionage.
How To Hire a Hacker
Say you're a small business, say you've been hacked, say you don't have enough desire to go to one of the big consulting shops. Here's an article about someone who went to hired guns to figure out how he was broken into.
Hard drives missing at Los Alamos
Seems like in the clearing out for the fires, some very important hard drives (with data like how-to's for disarming nuclear missles) have gone missing. Now, the big search.
Read more..
Security Job Marketplace Hot
Well, thank heavens. The security job marketplace is expected to be hot with the help of growing budgets for the next 3-5 years easy. Does your background lend you towards this profession?
Movie Trojan Virus
In what appears to be gaining national headlines, but no informative details, Network Security Technologies has found something. But it hasn't been sent through the normal channels and details are extremely limited.
More people pissed at this PR stunt
Read the initial article
NETSEC Advisory
Security Experts Downplay Trojan
CDUniverse evidence corrupted
In a case of failing Computer Forensics 101, someone from the group handling the data collected from the CDUniverse Credit Card scandal has corrupted the data by working on the only copy, rather that creating an image. Is this a case of too many cooks, or too many interns?
Canadian Mounties don't always get their man (or funding)
In another case of "If you aren't going to fund this work, I'll go elsewhere" is a story of a now former Mountie who left after 15 years on the force to join KPMG and lead their computer forensics practice. Not the first time this story will be told.
EU pushes U.S. hand to ease encryption restrictions
In the slow moving push towards easing U.S. encryption standards, it appears that the U.S. will relax theirs following the offical relaxation by the EU. What specifically this means is anyone's guess.
Mafiaboy being hit with more charges
Seems that the Fed's have more evidence tying Mafiaboy to other online attacks. This time CNN's
Host your web server and grow really big tomatoes
Looking for that place to host your web server that is secure from bombs, has a large back-up power supply and has an environment suited to growing large vegetables? House it in a former Brittish nuclear bunker.
Top 10 Security Holes
SANS released their top-10 list of security vulnerabilities found in the IT world. While I have to agree with the list. It is still scary in retrospect how many companies and agencies still fail a large number of these.
Toothless Privacy Deal between U.S. and E.U. near
A deal that leaves E.U. members' personal data open to misuse and has no provisions for the financial services sector is getting approval from E.U. bodies. Those against the campaign hope that the Americans will wake up and demand sticter privacy standards.
Albright says no
A report issued by Congress recommended a broader role for the CIA and military within the U.S. and sanctions against Greece and Pakistan if they continue to support terrorism. Albright says no to the sanctions, and the American-Arab Anti-discrimination Committee is feeling a little guilty, thinking the the monitoring of all foreign students in the US is pointing the finger at them.
Tools from the underground
Article pointing out a number of the most commonly used hacking and security audit tools with a little bio about their history. Not a bad read and some decent links in case you can't remember where to find them.
One weekend a month, 2 weeks a hack
About a year after a DOD request, the Senate is urging the Pentagon to study how it can use the Army National Guard to make up for the shortage of computer programmers and information security specialists. Probably a good idea, but what happens to their billing rates?
Don't knowingly pass on that virus in PA
A bill signed into law in PA on May 26 makes spreading a computer virus intentionally a seven-year sentence and a $15K fine as well as restitution for any damages caused by it (assuming conviction). Gee, this will keep all of those millionaires from writing viruses. How this will hold up to a federal challenge should be interesting.
Digex gets SAS70 Certification...
... and the world goes "So?". In what Digex is claiming is a first for and ASP is really a non-news item. Companies complete a SAS70. It isn't a security certification. It says that you do things the way you say you do. As long as you say you leave a huge back-door into your network (and actually do leave one) you can get your SAS70.
New type of airport search
I think I'm for this. I've been stopped enough because I'm carrying one of those new-fangled (yea right) laptop bags with (would you believe it Vern?) a laptop inside. Given this system wouldn't be perfect. It would seem great fot something like customs, as this checks for particles of drugs and explosives on your travel documents.
New Regulations prevent foreigners from working on space research
A shift in space research responsibility from the Commerce Department to the State Department is causing some rumblings from some research universities. Based on the recent and not so recent past, I can understand the reasoning behind it (even if it is ironic that it comes from the State Department).
U.S. DOD redefining ops
In an evolutionary change, the U.S. DOD is putting together an organized force to include cyber-forces for use in attacks against foreign countries. Contrary to other buzz-word catching articles, this one talks of how they are going to use it for more than just trying to "hack" into an enemy's infrastructure, but also using it for propoganda and deception attacks.
Yet another MS Outlook (potential) virus found
Shock upon shock. Another potential virus has been found in Outlook Express. And again M$ denies there is anything wrong.
Dark Side of the Internet
A mostly fluff piece going over topics that have been beaten like a dead horse. Once again someone saying that there are plenty of ways for your credit-card info to be used illegally without you ever touching the net.
INS official guilty of espionage
In a "shocking" decision (to maybe two people) the INS official accused of leaking secrets to Cuban officials was found guilty today. Finally a case with enough lack of interference that it was closed up within a year.
Can't we just bankrupt them like we did Russia
Waiting on an intelligence briefing, there is quite a cloud of dust being knocked up in the Washington area in regards to the missile defense initiative. On one side, is those who say it doesn't work, on the other, the defense contractors. On yet another side are those that believe if we build something that will "magically" knock out 100 missiles, China (our great adversary, who, if I'm not mistaken the U.S. just signed a landmark trade agreement with, and I can't think of any reason for a need to bomb them (other than population control)) will build 101 missiles so one gets through. And if China builds them India will (another target for population control) and therefore Pakistan (at least maybe they will tax the Pakistani defense contractors) will as well. Well, why don't we do it, hide our true capabilities, bankrupt China and India (Pakistan is pretty much there anyway) and solve it that way (total time, 50 years). Meanwhile our defense contractors will be healthily employed.
Crack the "numbers" stations
This is something that was carried on NPR. On shortwave there are a number of stations that can be picked up with a monotonous stream of numbers being read. This has been going on for over 30 years and some believe it is an intelligence sent source of information. Some have even made recordings of the numbers.
Philippine Hijacker found Dead
OK, this isn't really security related. But it is just so damn stupid it had to be included. A day or two ago an armed robbery was committed in mid-air. The guy then had the pilot depressurize the cabin and then jumped with a homemade parachute. He landed at an excessive velocity.
Poor poor FBI
If this bill passes, I feel real sorry for the FBI. They will be so overworked (to complement their already understaffed position). This bill plans to make a federal crime out of defacing websites (even a friend's) and sniffing traffic at work. Maybe it's a ploy to get the Israelies to stop.
Source Address Spoofing, how to protect
Source address spoofing has long been the bane of the big back-bone network providers. Here is an article that explains some of the fixes that can be put in place. Some conversations with ISP don't agree with all of the author's points. Maybe not everyone has the same budget available as he does
Network Security - Even at home
While this article doesn't provide any earth-shattering news, it is a good reminder that home users need to be aware of security issues as well as DSL and cable modems proliferate. Some suppliers like Road Runner now ship their cable modems blocking the nefarious port 139, but DSL providers don't (yet anyway). One thing of note that the author doesn't cover. While sites like Yahoo may have been taken down by DDOS attacks, if you cobble together enough DSL and cable modem users you can launch quite a successful DDOS attack against anyone you wish (and fairly easily I might add).
GAO with fake badges obtained over the Internet "break-in" to numerous fed sights
In what had to have been a ton of fun for the GAO employees doing the work, with fake badges obtained over the Internet they managed to break into or bypass security at Reagan National Airport, FBI headquarters, the State Department and the Justice Department amongst others. Hey, government employees don't need to be searched for firearms. It's the better paid contractors that are ever so dangerous. At least a couple agencies faired a bit better than the others.
Congress Demands Tighter Federal Security
Reuters Coverage hit by denial of service attacks
OK, this one hurts. They are hitting the NHL website with DDOS attacks. Now from our point of view you can take out all the financial sites and who cares. It probably saves some day-traders money since they can't blow theirs on a dropping market. But for those of us who have all our savings under our mattresses or buried in the backyard for some y2k+1 disasters, all we have left is the NHL playoffs. And with Lindros coming back I can't even root for the Flyers anymore.
Hacking outage == Property Damage?
A BusinessWeek report shows examples of a number of companies trying to use the property damage portions of their insurance policies to cover hacking attacks. Guess what, it seems close to working.
LoveBug takes on new form as Porn Advertiser
In a humorous turn of events. The LoveBug virus is now being used as a way to market port sites. The new one ads a shortcut onto your desktop (after asking if it is OK) and then proceedes to mail your outlook mailbox.
Australian Parliament Laptops Stolen
In the continuing saga of stolen laptops, now the Australian authorities have issues to deal with. Five Parliament laptops were stolen and while password protected, they don't feel that will stop anyone from trying to use them to break into the Parliament's network.
Gauntlet "World's Most Secure Firewall" is broken into
Gauntlet firewall from Network Associates which touted itself as the most secure firewall has been found to have a serious vulnerability in its UNIX versions.
EU sets encryption free. US Protests
The EU has decided to drop all export restrictions on ecryption software to countries outside the EU. The move is in an effort to spur electronic commerce. The US is less than happy, as is to be expected. How much longer before the US faces the economic pressure to do the same.
More Spying at the White House
In the second tale in less than a month, reports are beginning to flow out that the Israel infiltrated Telrad, a Nortel subcontractor, to install chips which allowed them to tap into the data flow from the White House, including communications to the National Security Council.
Another stolen laptop
This time the laptop doesn't contain classified info, but once again a laptop was stolen at Paddington station that was supposed to be in the possession of an Naval officer. Is it long before they have recorded announcements over the PA to warn you to hold onto your laptop bags?
How to Hack a Bank
Not that this is earth-shattering news, or that it hasn't been covered before, or that it doesn't contain huge pieces of the methodolgies of most consulting companies (in condensed form). But Forbes' ASAP walks you through how to hack a bank. FWIW some of their assumptions are a little off base, personally I'd try it on a larger bank because it would be easier to hide.
New Love-Bug Variant more stealthy and more dangerous
A new variation of the "Love Bug" ASP script is making its rounds starting thursday night. This one changes its subject every time it gets resent.
Congressional report finds intelligence agencies inadequate
Not that eroding morale might not be a reason because of all of the Congressional "oversight." Congress is willing to give other reasons for the degredation of the U.S. Intelligence Services. Once upon a time politicians kept their mouths shut every now and then.
Microsoft's Clippy a security nightmare!
@Stake is reporting a security hole found in Microsoft Office's 'Clippy' helper application. Clippy is that annoying paper-clip thing that shows up when you first install word (and before you figure out how to turn it off quickly). Evidentally Clippy has a huge number of priviledges to do pretty much anything it wants to on your computer. And it can be activated by clicking on an email message attachment.
For more...
Law enfocement fears that cybersleuths may turn to vigilatism
As federal through local levels of law enforcement are finding that they are overworked and undertrained, they are increasinly turning to the private sector for help catching cyber-criminals. However, fears of these citizens' backgrounds has these officials worried that these individuals might take matters into their own hands.
For more...
French Minister urges compatibility in Cybercrime laws
French Interior Minister Jean-Pierre Chevenement addressed the G8, urging them towards uniform cybercrime laws in an attempt to weed out "Safe Havens" around the world for illegal hacking activities.
For more...
Spies pose as Journalists
In a stunning report (more so because it stunned Slick Willie and the State Department) the FBI has informed the House International Relations Committee that some foreign countries actually place spies in the U.S. posing as journalists. Now maybe all those non-fiction books and fictional movies are just something that I see and read, but the fact that this shocking to anyone in the Federal Government whose duty it is to protect U.S. secrets, bothers me. Did they just fall off the turnip truck?
For more...
The State Department trying to cover-up their stupidity
Encrypt your business phone calls
L-3 Communications now has a commercially available telephone encryption product that will use 168 bit 3DES encryption. Given that NSA has finally allowed this to be marketed to the private sector, it is possible that they have a way of breaking it. But, this product has to be putting a scare in some foreign governments who rely so heavily on intercepted information.
Privatel Product
Security Flaws at the State Department
A systematic failure to protect secrets at the State Department has the CIA witholding Top-Secret information.
AtomicTangerien Announces first spin-off
AtomicTangerine has spun of its portal SecurityPortal to be a full fledged security consulting practice with over 20 professionals.
AtomicTangerine Web Site
If M$ Splits, Viruses will be harder to detect
According to M$ Co-Founder Bill Gates, if Microsoft splits up, detecting viruses like 'Love Bug' and 'Melissa' will be harder to protect against. According to un-named experts, if everyone used the 'elm' mail reader, these viruses wouldn't be possible. How can Bill think a company split will increase the number of VBScript vulnerabilities?
Second State Department Laptop Missing
A second laptop has gone missing at the US State Department. This time it isn't supposed to have classified information on it.
For More...
`I Love You' Email Virus spreading
A Mellisa like virus made the rounds again, causing corporate email servers from big to small to be shut down. Boy Outlook and Exchange are wonderful! What might make this more interesting is all of the sites that are by way of expressing their past vulnerability, are indicating that they are using exchange and Outlook. Can more M$ lawsuits be far behind?
Now the FBI claims they have pinpointed the attacker (since Mafiaboy is in custody, we will assume it isn't a 15 year old Canadian from Montreal again). Security people, however, think that they could just be following false leads. Again?
Surprise surprise, they didn't have enough evidence to hold him
Philippine Couple Main Suspects
Law enforcement now appears to be sitting in some confusion
FBI track-down
Analysis of what to look for
New strains come out
Reuters- 'Love Bug' Sweeps World
F-Secure analysis
For more...
FBI investigates AboveNet Attack
As investigators try to determine the cause of the attack, another provider is hit by a different type of attack.
In some circles, the AboveNet attack is being blamed on bad passwords and sniffed passwords.
For more...
Telecommuters on Security Alert
As home users are increasingly scanned and probed, personal firewall devices are on the rise. Now to ease integration, companies are releasing "enterprise class" personal firewalls that let IT managers handle the security policies.
For more...
New Denial Of Service Software Found
Security experts are warning system administrators to be on the lookout for a newly discovered software hackers can deploy with plans to bring targeted Internet servers to their virtual knees.
For more...
In Depth Analysis on Mstream by those who found it
Britain to build Internet Surveillance Center
British government plans to build a $39.17 million Internet surveillance center.... The new center, which will be called the Government Technical Assistance Center, should be up and running by the end of the year and will be sited at the London headquarters of Britain's MI5 domestic security service.
For more...
South Asia a major terrorist hub
The State Department has for the first time identified South Asia as a major hub of international terrorism, accusing Pakistan and Afghanistan of providing safe haven and support to international terrorist groups.
For more...
Brazil To Open 'Condor' Files
Seeking to raise a longtime curtain of secrecy, Brazil's high court has ordered classified files opened to an Argentine judge investigating how the two countries cooperated in the past to eliminate political enemies.

Netscape Engineers Are Weenies
Some sifting through the source-code for MS Frontpage 98 found a backdoor putting down the creators of a competing browser
Read more

Puerto Ricans hold island hostage
In an effort to protect an island that has been a bombing range for god knows how log, 60 Puerto Rican's are protecting staging a sit-in on an island. Duck and Cover