Return-Path: <sentto-279987-2037-1000830577-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Tue, 18 Sep 2001 09:32:09 -0700 (PDT) Received: (qmail 10486 invoked by uid 510); 18 Sep 2001 16:30:03 -0000 Received: from n12.groups.yahoo.com (216.115.96.62) by 204.181.12.215 with SMTP; 18 Sep 2001 16:30:03 -0000 X-eGroups-Return: sentto-279987-2037-1000830577-fc=all.net@returns.onelist.com Received: from [10.1.4.55] by n12.onelist.org with NNFMP; 18 Sep 2001 16:29:35 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_3_2_2); 18 Sep 2001 16:29:37 -0000 Received: (qmail 20214 invoked from network); 18 Sep 2001 16:29:36 -0000 Received: from unknown (10.1.10.26) by l9.egroups.com with QMQP; 18 Sep 2001 16:29:36 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 18 Sep 2001 16:29:36 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id JAA05996 for iwar@onelist.com; Tue, 18 Sep 2001 09:29:36 -0700 Message-Id: <200109181629.JAA05996@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 18 Sep 2001 09:29:36 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [NewsBits] NewsBits - 09/17/01 (fwd) Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Online Posters Can Stay Anonymous, California Court Rules: Scoring a victory for the protection of anonymous peech on the Internet, the Electronic Frontier Foundation (EFF) announced that a California state court has ruled in its favor and nullified a subpoena calling for disclosure of the names and identities of several anonymous Web users who wrote critical postings about a law firm on a Yahoo! message board. http://www.newsfactor.com/perl/story/12783.html Companies fear wave of cyberterrorism Corporations are taking steps to protect computer networks after this week's strikes on the Pentagon and World Trade Center, fearing that the next attacks might be launched online, experts said. Although many companies were in shock, some executives did not waste any time in preparing for possible cyber attacks, which often follow closely on the heels of international conflicts, experts said Friday. http://www.zdnet.com/zdnn/stories/news/0,4586,2812815,00.html Pentagon lost a comm link in crash The damage caused by the terrorist-commandeered jetliner that crashed into the Pentagon Tuesday will surely include lost data and impaired Defense systems, said John P. Stenbit, Defense Department CIO. "There are places here that don't exist anymore," Stenbit said during a press briefing in his office today. Some data is easily replaceable and some is not, he said, adding, "You can believe there are things that don't work." http://www.gcn.com/vol1_no1/daily-updates/17092-1.html Assessing Net's structural integrity In plans for next generation, key concern is infrastructure. Every day as the sun rises above the large cities of the world, a wave of Internet data traffic begins to build. In the United States, the traffic pattern builds first in the eastern part of the country and then moves steadily west as the rest of the country starts to wake up. Businesses and consumers collectively send billions of bits of data across this interconnected mesh of networks spanning the face of the planet. http://www.msnbc.com/news/625010.asp Encryption crackdown gets thumbs down Proposals by the US government for a global ban on sophisticated encryption tools, thought to have been used in the recent terrorist raids on the States, have been met with concern in Australia. As reported by ZDNet, US Senator Judd Gregg has proposed tighter restrictions on the use of encryption software, which scrambles electronic data and hinders its detection, and has called for international support. Reports since the Septermber 11 terrorist attacks say that the FBI believe such tools were used to orchestrate the event. http://www.zdnet.com.au/newstech/security/story/0,2000024985,20260497,00.htm Send in the online spooks? In the aftermath of terrorism, civil libertarians are running for cover. But are they protesting too much? This week, the FBI obtained a court order, citing the Foreign Intelligence Surveillance Act that demanded specific information concerning selected subscribers to America Online and EarthLink, the country's two largest Internet service providers. http://www.salon.com/tech/feature/2001/09/14/privacy/index.html Geeks Gather to Back Crypto Rob Carlson is worried about something that most Americans would consider entirely obscure: the future of encryption technology. Carlson, a 21-year-old programmer who typically sports a floppy, pin-studded safari hat, fears that the U.S. Congress, in the wake of last week's bloody attacks, may vote for anti- terrorism legislation that also threatens privacy. "There's nothing as permanent as a temporary restriction," he says. http://www.wired.com/news/politics/0,1283,46900,00.html Security initiatives raise privacy concerns The debat over privacy and security concerns is sure to take a center role in the wake of the attacks in New York and Washington, as citizens, businesses, and lawmakers try to figure out how personal privacy and national security can coexist. "I think what you're going to see is an awful lot of pressure from the government to at least increase the ability of law enforcement to get access to private information," said Rob Enderle, an analyst at Giga Information Group, in San Jose, Calif. http://www.infoworld.com/articles/hn/xml/01/09/17/010917hnprivacy.xml Attacks silence privacy concerns http://www.zdnet.com/zdnn/stories/news/0,4586,2812863,00.htm Information security will be key with lawmakers http://www.cnn.com/2001/TECH/industry/09/17/information.security.idg/index.html Senate committee looks into IT vulnerabilities http://www.cnn.com/2001/TECH/internet/09/14/it.vulnerabilities.idg/index.html Terrorist threat shifts priorities in online rights debate http://news.cnet.com/news/0-1005-201-7149229-0.html Civil Liberties Under Law Enforcement Onslaught - EFF In the wake of last week's terrorist attacks in New York and Washington, civil libertarians nationwide are watching nervously as federal law enforcement officials prepare to mount a massive legislative push that could rewrite constitutional protections online. "We're extremely concerned with what's going on legislatively," Electronic Frontier Foundation (EFF) Executive Director Shari Steele said today. "I would caution Congress to slow down a bit." http://www.newsbytes.com/news/01/170180.html Firms Invest in a Feeling of Security Last week's terrorist attacks wreaked havoc on global commerce, but they could mean brisk business for at least one industry. Just days after the disaster, the Washington area's private security industry is scrambling to meet surging demand for its services. http://www.washtech.com/news/software/12514-1.html Disposable cell phones spur debates Hop-On Wireless Chief Executive Peter Michaels and the rest of the nascent disposable cell phone industry are scrambling to defend a product that hasn't made it into the United States yet, but is a target of the nation's top crime fighters as they crack down on terrorism. During the weekend, U.S. Attorney General John Ashcroft and FBI Director Robert Mueller indicated that disposable phones are one of the reasons they want to give the U.S. law enforcement community more legal power to fight terrorism, using techniques such as tapping phones. http://news.cnet.com/news/0-1004-200-7206084.html http://www.zdnet.com/zdnn/stories/news/0,4586,5097046,00.html Steganography used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their accomplices. In particular, images on the internet were mentioned as the communication medium. While the newspaper articles sounded very dire, none substantiated these rumors. http://www.citi.umich.edu/techreports/reports/citi-tr-01-11.pdf A new kind of combat Intelligence-sharing technology developed by the military may help intelligence agencies analyze information about the Sept. 11 terrorist attacks and possibly help prevent future attacks. The Defense Advanced Research Projects Agency has offered technology it developed under its Genoa project to the intelligence community. The sophisticated collaboration tools are being installed in some offices and may soon be used by the National Security Council in the White House situation room, according to sources close to the project. http://www.fcw.com/fcw/articles/2001/0917/news-genoa-09-17-01.asp Simulation-technology expected to play crucial role in war Last week, Ed Kulakowski was sipping a martini in the Windows on the World restaurant while marveling at the view from atop New York's World Trade Center. Today, the defense-training contractor is back in Orlando, pondering his industry's role in America's response to the terrorists who turned the world's largest commercial complex into a pile of rubble and dust. http://www.siliconvalley.com/docs/news/tech/073014.htm ------------------------ Yahoo! Groups Sponsor ---------------------~--> Get VeriSign's FREE GUIDE: "Securing Your Web Site for Business." Learn about using SSL for serious online security. Click Here! http://us.click.yahoo.com/LgMkJD/I56CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:45 PDT