Udhay Shankar N (
Thu, 16 Dec 1999 16:26:59 -0800

So, is anybody here entering ?


The talk of distributed attack tools is causing quite a stir. Obviously we
are seeing just the tip of the iceberg with what is to come; attacks which
involve factors such as encryption, mobility, stealth, that are under
anonymous control, that update themselves, that use communication to
co-ordinate, that are controlled by hacktivists, cyberterrorists,
cybermilitia and, of course, governments. The Internet is truly becoming
the fourth battlefield, built on top of not just a civilian, but an
academic infrastructure. How do we defend our part of the Internet against
information warfare? Obviously there are more factors involved than just a
technical solution; we need to consider issues of policy, international
co-operation and co-ordination, and administration. But can we really wait
for governments and politicians to solve this problem when technology
increasingly outstrips policy? With this in mind, Packet Storm poses this

What pure or applied technical measures can be taken to protect the
Internet against future forms of attack?

The Kroll-O'Gara Information Security Group and Packet Storm will offer USD
$10,000 for the best technical white paper which defines the problem and
answers the above question. Competition Rules are outlined below. Winners
will be announced at RSA 2000 in January.

             Unimobile -  the world's first internet mobile
                                Now Live !