[iwar] news


From: Fred Cohen
To: Information Warfare Mailing List
From: fc@all.net
To: iwar@onelist.com

Fri, 2 Mar 2001 06:41:11 -0800 (PST)


fc  Fri Mar  2 06:45:30 2001
Return-Path: 
Delivered-To: fc@all.net
Received: from 204.181.12.215
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Fri, 02 Mar 2001 06:45:30 -0800 (PST)
Received: (qmail 10173 invoked by uid 510); 2 Mar 2001 14:40:10 -0000
Received: from ml.egroups.com (208.50.144.77)
  by 204.181.12.215 with SMTP; 2 Mar 2001 14:40:10 -0000
X-eGroups-Return: sentto-279987-1004-983544075-fc=all.net@returns.onelist.com
Received: from [10.1.4.55] by ml.egroups.com with NNFMP; 02 Mar 2001 14:41:15 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_0_4); 2 Mar 2001 14:41:13 -0000
Received: (qmail 33186 invoked from network); 2 Mar 2001 14:41:13 -0000
Received: from unknown (10.1.10.26) by l9.egroups.com with QMQP; 2 Mar 2001 14:41:13 -0000
Received: from unknown (HELO all.net) (65.0.156.78) by mta1 with SMTP; 2 Mar 2001 14:41:12 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id GAA20943 for iwar@onelist.com; Fri, 2 Mar 2001 06:41:11 -0800
Message-Id: <200103021441.GAA20943@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Fri, 2 Mar 2001 06:41:11 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

FBI official warns banks on computer security
A successful hacker attack against the banking
and financial system could cripple the United
States within three days, an FBI official warned
this week. We cannot afford to let our dependence
on automation become our Achilles heel," said
Alan B. Carroll, who supervises the analysis
and warning component at the FBI's National
Infrastructure Protection Center. Our challenge
is to button up the holes in our critical
infrastructure, and believe me, there are holes."
http://www.gcn.com/vol1_no1/daily-updates/3751-1.html

U.S. still far from cybersecurity
Thirty-three months after a presidential order
mandated that government agencies work to protect
the United States' critical infrastructure, most
have merely taken a few baby steps toward securing
the country's computers and networks, according to
a White House report. The report found that the
government has made progress in cementing industry
government partnerships around critical technologies,
securing Department of Defense networks, and forming
at least one education initiative for training
security personnel. But it noted that there is still
no way to locate and fix vulnerable critical systems
and no means of tracking the progress of the various
departments' pursuits of cybersecurity.
http://news.cnet.com/news/0-1003-201-4994624-0.html

Beating Cyber Crime
Michael Vatis Set Up America's First Computer
Investigation Unit And Was Soon Tracing the Hackers
Who Had Penetrated Government, Military And NASA Systems
[FC - hardly...]
February 1998 was a particularly stressful month
for Michael Vatis. The Harvard Law School graduate
and legal golden boy, whose curriculum vitae boasts
such weighty job titles as Associate Deputy Attorney
General and Deputy Director of the Executive Office
for National Security, had nearly reached his mid-30s
when he was confronted with what looked like one of
the world's first instances of information warfare.
http://www.telegraph.co.uk:80/et?ac=004461455044808&rtmo=gjw7gGVu&atmo=rrrrrrrq&pg=/et/01/3/1/ecfvatis01.html

Senate GOP Details High-Tech Priorities
Republican senators today unveiled their high-tech
agenda for the 107th Congress, offering a legislative
to-do list that focuses on protecting online privacy
and copyrighted digital works, promoting education
through technology, deploying broadband networks,
and fighting cyber-crime. Sen. George Allen, R-Va.,
the new chair of the group, told local technology
executives in attendance that the Senate High Tech
Task Force was "the gateway to the technology
industry in the Senate."
http://www.newsbytes.com/news/01/162613.html

Hearing Restarts Congressional Privacy Debate
Lawmakers may have gained more insight today
into the complexity surrounding the debate over
Internet privacy as a parade of witnesses urged a
congressional subcommittee to walk a narrow path
between regulating too much and regulating too
little. No legislative proposals were on the line
today as the House Commerce Committee's Trade and
Consumer Protection Subcommittee hosted an
"informational" hearing designed to help lawmakers
frame their stances in the privacy debate.
http://www.newsbytes.com/news/01/162614.html
http://news.cnet.com/news/0-1005-200-4995918.html

'Web Bugs' Make Cookies Look Good Enough To Eat
According to security experts, the next major
threat to consumer privacy online could be the
use of so-called "Web bugs," tiny nefarious
scripts that Web sites can use to surreptitiously
access a visitor's computer and install or copy
virtually any program. The conceptual program,
demonstrated at this year's first meeting of the
Congressional Privacy Caucus, can operate in
complete secrecy, evading virus detection software
and flying beneath most Internet and e-mail
firewalls, said Gary Clayton, CEO of the Privacy
Council.
http://www.newsbytes.com/news/01/162611.html

Help wanted: A CIO at NSA
It's no secret: The National Security Agency is
using newspaper advertisements, a first-ever job
fair and notices on 10 Web sites to search for a
chief information officer. NSA began its search
in earnest when former CIO Raymond Holter retired
in late January after 34 years of federal service.
Internal candidates can apply, but Air Force
Lt. Gen. Michael Hayden, NSA's director, has
announced that he plans to hire someone outside
the agency, according to the spokesperson.
http://www.fcw.com/fcw/articles/2001/0226/web-nsa-03-01-01.asp

In Search Of: 'Cybersquatter' John Zuccarini
On the Net, John Zuccarini seems to be everywhere -
especially if you're a clumsy typist. A slip of the
finger while typing a URL in your browser and you
could end up at Web sites behind hundreds of such
Zuccarini domains as OphraWinfrey.com,
GovermentGrants.com, or BlueMountianCards.com. And
at some destinations, you may find it difficult to
escape the ensuing barrage of pop-up windows festooned
with banner advertising and pitches for porn sites.
But lawyers working for clients who claim Zuccarini
is a cybersquatter find that, offline, the man who
usually is linked to an address in Andalusia, Penn.,
can be hard to find. Even after being summonsed in
federal-court lawsuits accusing him of trademark
infringement and cybersquatting, Zuccarini sometimes
is not heard from until after he has already lost
the case.
http://www.newsbytes.com/news/01/162617.html

Cisco visits top clients to warn of SNMP bugs
Cisco has publicly disclosed a number of
potentially devastating security vulnerabilities
affecting the operating system used by its
routers and switches. In the most serious case,
flaws in the way Cisco's Internetwork Operating
System (IOS) implements Simple Network Management
Protocol (SNMP), a standard for the remote
administration of network devices, could leave
the door open to fresh types of denial of service
attacks.
http://www.theregister.co.uk/content/8/17280.html

Too much security is holding back ecommerce
Excessive security is holding back ecommerce,
according to the security arm of a firm which
not so long ago became centre of a high profile
security breach itself. Evidian, a subsidiary
of Groupe Bull, has completed a survey of 40
blue chip companies and found that two in five
of them think complicated security is "the most
irritating aspect of conducting business online".
http://www.theregister.co.uk/content/8/17242.html

------------------------ Yahoo! Groups Sponsor ---------------------~-~>
Find software faster. Search more than 20,000
software solutions on KnowledgeStorm. Register
now and get started.
http://us.click.yahoo.com/ncHzAA/yMSCAA/7f4EAA/kzAVlB/TM
---------------------------------------------------------------------_->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/