Return-Path: <fastflyermach1@worldnet.att.net> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Sat, 12 May 2001 22:11:07 -0700 (PDT) Received: (qmail 29791 invoked by uid 510); 13 May 2001 04:11:55 -0000 Received: from mtiwmhc23.worldnet.att.net (204.127.131.48) by 204.181.12.215 with SMTP; 13 May 2001 04:11:55 -0000 Received: from dhs96ndnozw22m ([12.78.116.21]) by mtiwmhc23.worldnet.att.net (InterMail vM.4.01.03.16 201-229-121-116-20010115) with SMTP id <20010513051022.VNTH8745.mtiwmhc23.worldnet.att.net@dhs96ndnozw22m> for <fc@all.net>; Sun, 13 May 2001 05:10:22 +0000 Message-ID: <001a01c0db6b$017b3810$15744e0c@dhs96ndnozw22m> From: "c.g. treadwell" <fastflyermach1@worldnet.att.net> To: <fc@all.net> Subject: Fw: [iwar] news Date: Sun, 13 May 2001 01:10:18 -0400 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2462.0000 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2462.0000 ----- Original Message ----- From: "c.g. treadwell" <fastflyermach1@worldnet.att.net> To: <iwar@yahoogroups.com> Sent: Sunday, May 13, 2001 1:07 AM Subject: Re: [iwar] news > > > Hi Fred: Interesting few messages. Dropping systems has become easy to do > and thus, pedestrian it would seem. Almost like a space shuttle launch > these days. The big difference is who is hit and who hit them. How > artfully it was does is a issue as well. I suppose this goes to both means > and motive. > > We will have to see the outcome of this round when it is all over, but if > you remember the foreign policy ploy of the Carter Admin, something called > the " China Card"-yes, I have written on this issue- it almost seems like we > are quickly headed toward needing a "Russian Card" to keep the Chinese from > causing trouble. How strange the world has gotten! > > > Lets see where we are tomorrow? > > > > ----- Original Message ----- > From: "Fred Cohen" <fc@all.net> > To: "Information Warfare Mailing List" <iwar@onelist.com> > Sent: Saturday, May 12, 2001 11:04 PM > Subject: [iwar] news > > > > Gateway drops its punter's pants in public A security gaffe by Gateway > > 2000 has resulted in the exposure of sensitive customer information on > > the PC vendor's web site. Up until late this afternoon searching for > > 'delivery cost'(hardly the strangest request) on Gateway's UK site > > returned two copies of an Excel spreadsheet containing order details, > > customer contacts and phone numbers. The spreadsheet didn't contain > > credit card details but had enough information, including the phone > > number of customer's banks, for con men to pose as Gateway reps or any > > number of frauds. The Excel file contained the details of 449 Gateway > > customers almost all of which seemed to be from The Netherlands. > > http://www.theregister.co.uk/content/8/18867.html > > > > Disney hit by Homepage virus SOURCES SAID that the Disney network was > > infected by the Homepage email virus, with practically every machine at > > the Orlando location down for two days. The virus hit the theme parks, > > the hotels and the cruise ship. That, said one wag, meant that the > > cruise ship "was totally dead in the water". A guest staying at the > > Disney Hotel said the machines were still affected by the virus, with IT > > staff racing to fix the damage. http://www.theinquirer.net/10050102.htm > > > > White House Prepares Cyber-Security Plan The White House today said it > > is kicking into high gear a new version of the National Plan for > > Cyberspace Security and Critical Infrastructure Protection, which it > > said will be ready for action later this year. The White House in a > > statement released today said that the Commerce Department's Critical > > Infrastructure Assurance Office now is coordinating several other > > federal departments and agencies on the plan, and that it has already > > held meetings with the banking and finance, electric power, rail > > transportation, oil and gas, state and local law enforcement, > > information technology and telecommunications industries. > > http://www.newsbytes.com/news/01/165519.html > > > > Arizona Governor Vetoes Cyber-Security Bill Arizona Gov. Jane Hull, R, > > Tuesday vetoed legislation approved by the state legislature that would > > have established a critical infrastructure protection plan for the > > state. Although the legislature approved the bill, a veto appeared all > > but certain once state Chief Information Officer Rick Zelznak signaled > > his opposition last week. Despite its good intentions, the legislation > > "sets up a command and control structure," that could cause more > > problems than it solves, Zelznak said in a recent interview with > > Newsbytes. > > http://www.newsbytes.com/news/01/165522.html > > > > House committee makes bid to derail anti-spam bill A bill designed to > > reduce unsolicited commercial e-mail ran into trouble in a House > > committee Thursday, as business leaders and lawmakers declared their > > opposition to the legislation. Almost every legislator and witness > > present for the House Judiciary Committee hearing said they had problems > > with the bill, which previously passed the House Energy and Commerce > > Committee. At Thursday's hearing, Rep. Bob Barr, R-Ga., urged the > > business leaders to work harder against the bill. ``I would suggest a > > full-court press,'' Barr said, calling the legislation ``broad and > > heavy-handed.'' > > http://www.siliconvalley.com/docs/news/tech/014194.htm > > > http://www.usatoday.com/life/cyber/tech/2001-05-10-anti-spam-opposition.htm > > http://www.siliconvalley.com/docs/news/reuters_wire/1180706l.htm > > > > Europeans Leave U.S. In Huff Over Spy Network Two prominent European > > Parliament officials are canceling the rest of their trip to Washington, > > D.C., and returning to Europe after the State and Commerce Departments, > > as well as the CIA and National Security Agency, rebuffed their efforts > > to learn more about the Echelon spy system. U.S. input will be > > lacking, therefore, in an upcoming report the European Parliament > > intends to release later this month regarding Echelon. The > > controversial intelligence network is capable of intercepting telephone > > and e-mail traffic across the world. > > http://www.newsbytes.com/news/01/165569.html > > > > Hacker tool lets freedom ping 'Peekabooty' set to circumvent > > state-sponsored censorship. Mix a rabid love of freedom with an intense > > dislike of corporate or state- sponsored censorship, fold in the wacky > > collective brilliance of a group of rogue coders, and what do you get? > > Tyranny's worst nightmare: an untraceable, globally distributed digital > > information network called Peekabooty. The denizens of the digital > > underground know it only as Project X, a closely held secret software > > application set to be unleashed on the world this July at an annual > > hacker blowout in Las Vegas known as DefCon by an equally infamous group > > known as the Cult of the Dead Cow, cDc for short. > > http://www.msnbc.com/news/571103.asp > > > > Threat management comes to the fore Touting a new way to look at > > enterprise security that involves intrusion detection and response > > technology, Recourse Technologies is preparing updates to its "threat > > management" products. The Redwood City, Calif., company is planning to > > release by the end of June an upgrade to its ManHunt software, which > > combines detection, analysis and response to numerous types of network > > attack strategies for enterprise networks, managed security providers > > and Internet service providers. > > http://www.zdnet.com/eweek/stories/general/0,11011,2717058,00.html > > > > > > ------------------ > > http://all.net/ > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > >
This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:13 PDT