Return-Path: <sentto-279987-1428-995120506-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Sat, 14 Jul 2001 07:23:08 -0700 (PDT) Received: (qmail 2090 invoked by uid 510); 14 Jul 2001 13:24:23 -0000 Received: from n3.groups.yahoo.com (HELO hj.egroups.com) (216.115.96.53) by 204.181.12.215 with SMTP; 14 Jul 2001 13:24:23 -0000 X-eGroups-Return: sentto-279987-1428-995120506-fc=all.net@returns.onelist.com Received: from [10.1.4.56] by hj.egroups.com with NNFMP; 14 Jul 2001 14:21:46 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_2_0); 14 Jul 2001 14:21:46 -0000 Received: (qmail 88576 invoked from network); 14 Jul 2001 14:21:45 -0000 Received: from unknown (10.1.10.26) by l10.egroups.com with QMQP; 14 Jul 2001 14:21:45 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 14 Jul 2001 14:21:45 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id HAA04522 for iwar@onelist.com; Sat, 14 Jul 2001 07:21:45 -0700 Message-Id: <200107141421.HAA04522@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sat, 14 Jul 2001 07:21:45 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] news2 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Bush said to be planning cybersecurity board The Bush administration plans to create a board of senior national security officials to oversee the federal government's critical infrastructure protection efforts, effectively doing away with the idea of designating a single cybersecurity "czar," sources said. The move was said to have been agreed upon during a July 2 meeting with President Bush, who gave National Security Adviser Condoleeza Rice and other officials the green light to prepare a draft executive order setting up a Cybersecurity and Continuity of Operations Board. http://www.cnn.com/2001/TECH/internet/07/12/cybersecurity.board.idg/index.html Industry body slams new security bill The Computing Technology Industry Association (CTIA) has led a stinging attack on the UK Government's Private Security Issue Bill (PSIB), claiming that it is yet another burden on IT and network professionals. A spokesman for the CTIA said it would mean that security employees will have to obtain a licence from the Government in order to gain employment. The Bill faces stiff opposition from network professionals mainly because it refers to workers in physical security, but has left the definition open to include electronic security. http://www.vnunet.com/News/1123870 European Parliament restricts access to personal data Cappato report challenges plans to give law enforcement greater access to electronic communications. The European Parliament (EP) Civil Liberties Committee approved a report by the radical MEP Marco Cappato on Wednesday, in favour of a strict regulation of law enforcement authorities' access to personal data in the electronic communications sector. The decision complicates continuing efforts by the European Council to give individual countries the power to force telecoms and other communications providers to keep records of all voice and data communications of their citizens for up to seven years. http://news.zdnet.co.uk/story/0,,t269-s2091211,00.html Can Privacy Rights Survive? When it comes to privacy, ever more intrusive collection technologies are being rolled out, such as online tracking mechanisms, spyware, face recognition systems, location tracking devices and even thermal imaging, a Senate Commerce Committee panel was told today. And, Jason Catlett, president of Junkbusters.com and a visiting fellow at the Kennedy School of Government at Harvard, said in a written statement that "advances in 'cloaking' technologies are always outstripped by advances in collection technologies, both in capabilities and degree of adoption." http://www.internetnews.com/bus-news/article/0,,3_799411,00.html Hackers Launch New E-Mail List For Security Bugs Adding new fuel to an already fiery debate about the best way to publicize information about security holes in software, a new mailing list for hackers made its debut Wednesday at the Black Hat Briefings in Las Vegas. According to its founders, three high-profile computer security consultants and researchers, VulnWatch will steer clear of the commercialism and bureaucracy that they claim have degraded two of the most popular computer security lists: Bugtraq and NTBugtraq. http://www.newsbytes.com/news/01/167891.html Wireless networks lure hackers A new way to attack wireless networks underscores the lack of security for PC owners using the airwaves to connect their computers, said security experts speaking at the Black Hat Briefings conference. On Thursday, Tim Newsham, a researcher for security firm @Stake, presented the details of weaknesses in the password system of wireless networks that could lead to a break in security in less than 30 seconds. The flaw is the third to be uncovered in the so-called Wired Equivalent Privacy, or WEP, protocol that supposedly secures wireless networks. "WEP is inherently insecure," said Newsham. "So using WEP is essentially just throwing another barrier--and a small one--in front of the attacker." That barrier can be overcome in 5 to 30 seconds in certain cases, he said. http://www.zdnet.com/zdnn/stories/news/0,4586,5094057,00.html http://news.cnet.com/news/0-1003-200-6554365.html http://news.cnet.com/news/0-1003-201-6554634-0.html ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:37 PDT