Feeds

No Y2K cyberterror threats after all – FBI

Damn, how much did we spend preparing?

  • alert
  • submit to reddit

Remote control for virtualized desktops

The FBI's National Infrastructure Protection Center (NIPC) reports no unusual cyberterror activity under cover of the Y2K rollover, despite months of sensational warnings and apocalyptic predictions involving doomsday religious cults, white supremacists, conspiracy paranoiacs and hostile foreign powers. The level of physical threats and computer intrusions recorded from 31 December to 5 January "was not beyond the norm you would usually see in that number of days," NIPC's Michael Vatis conceded. Vatis has testified before Congress on the numerous opportunities for extra computer mayhem provided by the Millennium Bug. In November the FBI published a study called "Project Megiddo" warning of numerous Millennium-related threats by religious cults. The Bureau warned that Millennium Bug havoc could nourish existing fears among the unbalanced. "Megiddo" refers to a hill in Israel associated with the Apocalypse. During her weekly press availability, US Attorney General Janet Reno dodged the question of why, if the FBI was so concerned, the rollover actually yielded so little in the way of anarchy. "The nice answer would be that there was no threat. What we must all do, I think, is...take reasonable precautions...when we have specific information that can inform the American people, that we advise them," she warbled. The NIPC did release a tool for discovering whether or not a Solaris 2.5.1, 2.6 or Solaris 7 system is infected with any sort of distributed denial of service tool such as TRIN00 or Tribe Flood Network (or TFN & tnf2k), which has uncovered a smattering of intrusions now being investigated by the FBI. The download is available from NIPC's Web site.

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Big Content outs piracy hotbeds: São Paulo, Beijing ... TORONTO?
MPAA calls Canadians a bunch of bootlegging movie thieves
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Verizon bankrolls tech news site, bans tech's biggest stories
No agenda here. Just don't ever mention Net neutrality or spying, ok?
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.