From: skunk-works-digest-owner@mail.orst.edu To: skunk-works-digest@mail.orst.edu Subject: Skunk Works Digest V5 #576 Reply-To: skunk-works-digest@mail.orst.edu Errors-To: skunk-works-digest-owner@mail.orst.edu Precedence: bulk Skunk Works Digest Wednesday, 20 December 1995 Volume 05 : Number 576 In this issue: Grounding of SR-71 Wings TV Re: Grounding of SR-71 (Fwd) RISKS DIGEST 17.56 See the end of the digest for information on subscribing to the skunk-works or skunk-works-digest mailing lists and on how to retrieve back issues. ---------------------------------------------------------------------- From: celestine@cix.compulink.co.uk (Michael Stockton) Date: Tue, 19 Dec 95 19:03 GMT Subject: Grounding of SR-71 On 19-12-95 Brett remarked on I wonder now that with imminent return of Communist Government to the divided USSR ...when re-activation of recon flights will not seem so unlikely. The temperature will drop and we may see the ~freeze~ return and all the paraphernalia with it Grahame ~~~more-heart-less-head~~~ ------------------------------ From: BaDge Date: Tue, 19 Dec 1995 19:13:31 -0500 (EST) Subject: Wings TV Howdy, I don't know anything about this baby, (bait, bait), but it sure looks like it has a lot of Skunky potential: Wings [DISC 6-7pm ] [Document] "HE-111 -- The Secret Bomber". Ernst Heinkel designs the HE-111 bomber. Tomorrow, EST, 12/20. regards, ________ BaDge ------------------------------ From: sschaper@mo.net (Steve Schaper) Date: Tue, 19 Dec 1995 19:12:31 -0600 Subject: Re: Grounding of SR-71 So how long did it take them after the de-nuclearizing of Ukraina for the Communists to rise towards power again? ------------------------------ From: fmarkus@pipeline.com (Frank Markus) Date: Tue, 19 Dec 1995 22:55:52 -0500 Subject: (Fwd) RISKS DIGEST 17.56 This message is admittedly off-topic but I hope that it will be of general interest. >----- Forwarded message (RISKS List Owner ) -----< Date: Mon, 18 Dec 95 13:54:26 -0800 From: "Darrell D. E. Long" Subject: Navy hacked by Air Force http://www.telegraph.co.uk/et/ A few clicks and then the e-mail message entered the ship's control system... War of the microchips: the day a hacker seized control of a US battleship BY SIMPLY dialing the Internet and entering some well-judged keystrokes, a young US air force captain opened a potentially devastating new era in warfare in a secret experiment conducted late last September. His target was no less than gaining unauthorised control of the US Navy's Atlantic Fleet. Watching Pentagon VIPs were sceptical as the young officer attempted to do something that the old Soviet Union had long tried to do and failed. He was going to enter the very heart of the United States Navy's warships - their command and control systems. He was armed with nothing other than a shop-bought computer and modem. He had no special insider knowledge but was known to be a computer whizzkid, just like the people the Pentagon most want to keep out. As he connected with the local node of the Internet provider, the silence was tangible. The next few seconds would be vital. Would the world's most powerful navy be in a position to stop him? A few clicks and whirrs were the only signs of activity. And then a seemingly simple e-mail message entered the target ship's computer system. First there was jubilation, then horror, back on dry land in the control room at the Electronic Systems Centre at Hanscom Air Force Base in Massachusetts. Within a few seconds the computer screen announced "Control is complete." Out at sea, the Captain had no idea that command of his multi-million-dollar warship had passed to another. One by one, more targeted ships surrendered control as the codes buried in the e-mail message multiplied inside the ships' computers. A whole naval battle group was, in effect, being run down a phone-line. Fortunately, this invader was benevolent. But if he could do it ... Only very senior naval commanders were in the know as the "Joint Warrior" exercise, a number of experiments to test defence systems, unfolded between September 18-25. Taking over the warships was the swiftest and most alarming of the electronic "raids" - and a true shock for US military leaders. "This shows we have a long way to go in protecting our information systems," said a senior executive at the airbase where the experiment was conducted. The exact method of entry remains a classified secret. But the Pentagon wanted to the first to test the extent of their vulnerability to the new "cyberwarriors" - and had the confidence to admit it. Now they believe they know what they are dealing with and the defences are going up. ET | Front | News | World | Features | Sport | City | What's new | Help | ET search | Gazette | Back Reply to Electronic Telegraph - et@telegraph.co.uk Electronic Telegraph is a Registered Service Mark of The Telegraph plc ------------------------------ End of Skunk Works Digest V5 #576 ********************************* To subscribe to skunk-works-digest, send the command: subscribe skunk-works-digest in the body of a message to "majordomo@mail.orst.edu". If you want to subscribe something other than the account the mail is coming from, such as a local redistribution list, then append that address to the "subscribe" command; for example, to subscribe "local-skunk-works": subscribe skunk-works-digest local-skunk-works@your.domain.net To unsubscribe, send mail to the same address, with the command: unsubscribe skunk-works-digest in the body. Administrative requests, problems, and other non-list mail can be sent to either "skunk-works-digest-owner@mail.orst.edu" or, if you don't like to type a lot, "prm@mail.orst.edu A non-digest (direct mail) version of this list is also available; to subscribe to that instead, replace all instances of "skunk-works-digest" in the commands above with "skunk-works". Back issues are available for anonymous FTP from mail.orst.edu, in /pub/skunk-works/digest/vNN.nMMM (where "NN" is the volume number, and "MMM" is the issue number).