lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <BAY7-DAV30j9ynvZHfz00008b45@hotmail.com> From: rlanguy at hotmail.com (Lan Guy) Subject: Fwd: How to Steal a Mainframe It gets better: http://www.abc.net.au/pm/content/2003/s940224.htm The Customs and Immigration Authority chose to cover up about the theft until is was leaked: GAIL BATMAN: We did expect that perhaps immediately after the incident that it would have been in the press. When it didn't, I assumed. we all assumed that it wouldn't and if it hadn't been for this leak, I think it's not an appropriate matter to be canvassed in public. And then a customs minister taking about file servers: Senator Ellison stresses the computers did not have secrets stored on them. CHRIS ELLISON: As I understand it, these computer servers are not used for top secret information and have been to facilitate information and communication across the customs network. They did not store thousands of confidential files as has been stated. Lan Guy ----- Original Message ----- From: gregh To: full-disclosure@...ts.netsys.com Sent: Saturday, September 06, 2003 2:44 AM Subject: Re: [Full-Disclosure] Fwd: How to Steal a Mainframe > ----- Original Message ----- > From: Goncalo Costa > To: full-disclosure@...ts.netsys.com > Sent: Saturday, September 06, 2003 12:11 AM > Subject: [Full-Disclosure] Fwd: How to Steal a Mainframe > ---------- Forwarded Message ---------- > > > >Two unidentified unsubs posing as EDS contractors illegally gained access > >to sensitive computer equipment at Sydney International Airport and > >wheeled out a couple of IBM servers. These servers we are told contained > >confidential information and may even hold details of ongoing > >international investigations into terror acts. The data could reveal the > >identities and activities of undercover agents from Western governments. > > Worse than this, the Federal minister in charge of the Australian Federal Police and our spy agency ASIO said that there was no way in the world anyone could get anything at all off the hard disks as the files were routinely deleted. He said this AFTER the report that sensitive information between the two bodies passed through these servers. What gets me is only 2 servers were stolen and yet they were in there 2 hours "unhooking the computers" so it was said. Doesnt take that long just to "unhook". Seems to me someone has a lot of data they shouldnt have, now, using the stealing of the computers to mask whatever it was they really did. Given the media reports that the people who did it were likely to be terrorists and not thieves, you have to wonder what just happened in there. Greg. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030907/21a83fe8/attachment.html
Powered by blists - more mailing lists