1996-09-23 - Re: Go away CIA

Header Data

From: Wearen Life <runnerfx@octet.com>
To: Shane Brath <sbrath@froglit.scitele.com>
Message Hash: d745951a9f347f953c5d88bd37cf9f4d66b712793da89930eecdfdf90bb53893
Message ID: <Pine.BSF.3.95.960923084413.3884C-100000@iron.octet.com>
Reply To: <Pine.BSD/.3.91.960922192936.9708B-100000@froglit.scitele.com>
UTC Datetime: 1996-09-23 17:13:42 UTC
Raw Date: Tue, 24 Sep 1996 01:13:42 +0800

Raw message

From: Wearen Life <runnerfx@octet.com>
Date: Tue, 24 Sep 1996 01:13:42 +0800
To: Shane Brath <sbrath@froglit.scitele.com>
Subject: Re: Go away CIA
In-Reply-To: <Pine.BSD/.3.91.960922192936.9708B-100000@froglit.scitele.com>
Message-ID: <Pine.BSF.3.95.960923084413.3884C-100000@iron.octet.com>
MIME-Version: 1.0
Content-Type: text/plain


The CIA has many powers both great and small. If the can cover up findings
of UFO's  and Murders I am pretty sure they can watch some puny web
server.

On Sun, 22 Sep 1996, Shane Brath wrote:

> 
> 
> On Sat, 21 Sep 1996, Wearen Life wrote:
> 
> > I wont be suprised if they where ALSO watching who was visting your page.
> > I think now is the time to start looking in your hard drive or floppy
> > disk for anything that my incrimanate you. (did i spell that right)?
> 
> My 2 cents. 
> 
> But how would they go about globaly watching who goes to your URL, unless 
> they hack into your server and look at the log, or have a network sniffer 
> at a access point feeding you?
> 
> > > Well well...
> > > 
> > > After putting up the CIA hack mirror page on http://www.skeeve.net/cia/
> > > I learnt a few things.
> > > 
> > > o it got 50,000 hits in 1 day
> > > o everyone from the cia, senate, fbi, nsa (ncsc) and every other bloody US gov
> > >   department looked at it masses of times. The CIA looked at it every 10-15
> > >   minutes.
> > > zztop{root}:15: cat skeeve.net-access_log | grep ucia.gov | wc -l
> > >     281
> > > 
> > > o Even the CIA tries to hack you.  
> > > 
> > > relay1-ext.ucia.gov unknown - [21/Sep/1996:01:56:44 +1000] "GET /cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd HTTP/1.0" 404 1180
> > > 
> > > o Dozens of in.fingerd/in.telnetd attempts from ucia.gov, some mil sites and
> > >   ncsc.mil sites.
> [ rest of text snipped ]
> 






Thread