[LINK] Computer Crimes...
Richard.Chirgwin at informa.com.au
Tue Jan 13 11:48:03 EST 2004
Urban myth development >as it happens< ... just how far have we got with
facial recognition systems?
> -----Original Message-----
> From: Andy Farkas [mailto:andyf at speednet.com.au]
> Sent: Tuesday, January 13, 2004 8:48 AM
> To: LINK
> Subject: [LINK] Computer Crimes...
> Interesting twist to what was on the servers stolen from
> Sydney airport...
> ----- Forwarded message -----
> *From ge at egotistical.reprehensible.net Tue Jan 13 08:42:32 2004
> *Date: Sat, 10 Jan 2004 20:06:59 -0800
> *From: Gadi Evron <ge at egotistical.reprehensible.net>
> *To: bugtraq at securityfocus.com
> *Cc: full-disclosure at lists.netsys.com
> *Subject: [Fwd: [TH-research] OT: Israeli Post Office break-in]
> I thought this story might interest some of you. See forwarded message
> Gadi Evron.
> *Date: Sat, 10 Jan 2004 19:23:15 -0800
> *From: Gadi Evron <ge at linuxbox.org>
> *To: th-research
> *Subject: [TH-research] OT: Israeli Post Office break-in
> Mail from Gadi Evron <ge at linuxbox.org>
> This is completely off-topic, but very interesting.
> Apparently there was a break-in in a branch of the Israeli
> Post Office.
> The offenders placed a wire-less gateway connected to a switch inside,
> and through it stole a few tens of thousands of Shekels in
> the few days
> they were in operation (the Israeli Post Office is a sort of
> a small bank).
> They only managed to run this operation for a few days.. I
> guess people
> noticed that contraption connected to their switch. Although it looks
> very much like a legit piece of hardware.
> Another option is that someone talked too much, or they were already
> under investigation.
> I find it hard to believe that they were located due to the
> break-in to
> the network itself, as crude as it was.
> Once again we get a glimpse into a far smarter world of
> computer related
> crime. Always makes me wonder about what *else* is out there,
> that we do
> not hear about.
> Last item I heard of was the theft of Face Recognition servers holding
> terrorism-related databases from an Australian airport. There was the
> Industrial Espionage bit using Trojan horses as well.
> TH-Research, the Trojan Horses Research mailing list.
> List home page: http://ecompute.org/th-list
> Gadi Evron,
> ge at linuxbox.org.
> The Trojan Horses Research mailing list - http://ecompute.org/th-list
> My resume (Hebrew) - http://www.math.org.il/resume.rtf
> PGP key for ge at linuxbox.org -
> Note: this key is used mainly for files and attachments, I sign email
> messages using:
> Link mailing list
> Link at mailman.anu.edu.au
More information about the Link