Penetration Testing mailing list archives
Re: Political Analysis of Security Products
From: Patrick Oonk <patrick () pine nl>
Date: Wed, 6 Feb 2002 10:50:41 +0100
On Tue, Feb 05, 2002 at 09:39:04PM +0000, Rainer Duffner wrote:
R. DuFresne writes:Marcus Ranum, if I recall correctly, has an outstanding reward for anyone with proof that fw-1 was ever backdoored by the Israeli's, it has never bee collected
Danger is not on this front. The soft- and hardware to control the suveillance of telephone-calls is partly built by companies that are either subcontractor of Mossad or are rumoured to be "controlled" by Mossad. TELCOs are concered by this, because, at least in Germany, every TELCO has to have a wiretap-mechanism in place for Secret Service or other Police-Forces. These wiretaps must be (qua definitionem) undetectable by the victim when used, and undetectable by the TELCO itself ! If one of these devices were backdoored (by an "enemy force"), the integrity of the whole telecommunication infrastructure would be, well, non-existant. Of couse, the TELCOs also (or mostly, let's be honest) the high costs associated with this system. I have no direct (English) link for this, just this one: http://www.heise.de/tp/deutsch/html/result.xhtml?url=/tp/deutsch/inhalt/te/9 395/1.html&words=Geheimdienst but surf around the Heise Telepolis site and get a feeling of just what is in stock for us... http://www.heise.de/tp/english/special/enfo/default.html
<helicopters type=black> An Israeli company (Comverse) has worked together with the Mossad to tap the US govt according to a Foxnews report. I have collected links to the coverage of this at http://www.security.nl/artikel.php3?id=2712. The article is in Dutch but the links lead to english articles. The strange thing was that no-one picked this news up, except for Foxnews. The coverage at Foxnews 'suddenly' disappeared. </helicopters> Patrick -- patrick oonk - pine internet - patrick () pine nl - www.pine.nl/~patrick T:+31-70-3111010 - F:+31-70-3111011 - Read news at http://security.nl PGPID 155C3934 fp DD29 1787 8F49 51B8 4FDF 2F64 A65C 42AE 155C 3934 Excuse of the day: Hard drive sleeping. Let it wake up on it's own... ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
Current thread:
- Political Analysis of Security Products pentestlist (Feb 05)
- Re: Political Analysis of Security Products William D. Colburn (aka Schlake) (Feb 05)
- Re: Political Analysis of Security Products R. DuFresne (Feb 05)
- Re: Political Analysis of Security Products ed (Feb 05)
- Re: Political Analysis of Security Products Kurt Seifried (Feb 05)
- Re: Political Analysis of Security Products E (Feb 06)
- Re: Political Analysis of Security Products Charles 'core' Stevenson (Feb 05)
- Re: Political Analysis of Security Products Rainer Duffner (Feb 05)
- Re: Political Analysis of Security Products Patrick Oonk (Feb 06)
- Re: Political Analysis of Security Products yossarian (Feb 05)
- <Possible follow-ups>
- RE: Political Analysis of Security Products Brass, Phil (ISS Atlanta) (Feb 05)
- RE: Political Analysis of Security Products Moonen, Ralph (Feb 06)