1996-11-29 - denial of service and government rights

Header Data

From: attila@primenet.com
To: cypherpunks <cypherpunks@toad.com>
Message Hash: c7dc38029513a0e753de8cc1456053feadd7fe80bbfd1e81667eb78263db4c37
Message ID: <199611291933.MAA05426@infowest.com>
Reply To: N/A
UTC Datetime: 1996-11-29 19:33:02 UTC
Raw Date: Fri, 29 Nov 1996 11:33:02 -0800 (PST)

Raw message

From: attila@primenet.com
Date: Fri, 29 Nov 1996 11:33:02 -0800 (PST)
To: cypherpunks <cypherpunks@toad.com>
Subject: denial of service and government rights
Message-ID: <199611291933.MAA05426@infowest.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----


- ----------------------------------------------------------------------


        read the last line. the usual rules of evidence which give
    the feds the right to anything they well please --constitutional
    or not!  if seizure of a victims property can by obtained a 
    search and sieze warrant for the victimized "object,"  a whole
    new mode of regulation has begun.

        all the government will do to suppress sites as they please,
    is to initiate a few attacks themselves --and they will.

        I got tired of paying Lexus $150 for idle months after dumping
    West for almost $500/month --otherwise I would run down the Feds
    kangaroo ruling which seems to grant them this absurd right. 
    Several on the list are still maintaining accounts...  ?

        ====== begin forwarded text ======

Computer Attacks Show New Patterns

The major trends in computer break-ins involve denial of service 
and data-driven attacks, says a Department of Justice lawyer.  
Denial of service occurs when an attacker "bombs" an Internet 
service provider with so many e-mail messages that the server 
becomes overloaded and shuts down. Data-driven attacks occur when 
a virus program is disguised as a data-only file.  The file can be 
hidden in a Java program on a Web page, and when a visitor clicks 
on the site, he or she unwittingly downloads the virus.  A computer 
crime consultant with SAIC warns that these attacks can be launched 
on an innocent party's Web server, but once that happens, the server 
can become the subject of a wiretap and a search warrant.  "The title 
of your computer vests with the government as soon as a hacker uses 
it to commit a crime," he says.  

[BNA Daily Report for Executives 25 Nov 96 A20]

    ====== end forwarded text ======

- --
 "In nature, stupidity gets you killed.
   In the workplace, it gets you promoted.
    In politics, it gets you re-elected."
        --attila


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: Encrypted with 2.6.3i. Requires 2.6 or later.

iQCVAwUBMp83lr04kQrCC2kFAQFYuAP/bLbraU6rFFLQZpFfsvxiGrbm7W26p3t9
GffgoN/LA6OBqIEUpAdPxGoVqco7RDpHHprhObEV4MorR3BsK6pl5EVNbc3Xp7OC
pxFThx0O08bscdmVBSYAUsU2hXMuW2AiuAkxBwCRdaG0bxswr97JQI9ye+pjKTPw
cARrd7QLmz4=
=vUe3
-----END PGP SIGNATURE-----







Thread