Return-Path: <sentto-279987-2320-1001381967-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Mon, 24 Sep 2001 18:40:16 -0700 (PDT) Received: (qmail 24457 invoked by uid 510); 25 Sep 2001 01:39:48 -0000 Received: from n34.groups.yahoo.com (216.115.96.84) by 204.181.12.215 with SMTP; 25 Sep 2001 01:39:48 -0000 X-eGroups-Return: sentto-279987-2320-1001381967-fc=all.net@returns.onelist.com Received: from [10.1.4.54] by mk.egroups.com with NNFMP; 25 Sep 2001 01:39:27 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_3_2_2); 25 Sep 2001 01:39:26 -0000 Received: (qmail 37857 invoked from network); 25 Sep 2001 01:39:15 -0000 Received: from unknown (10.1.10.26) by l8.egroups.com with QMQP; 25 Sep 2001 01:39:15 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 25 Sep 2001 01:39:14 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id SAA12949 for iwar@onelist.com; Mon, 24 Sep 2001 18:39:14 -0700 Message-Id: <200109250139.SAA12949@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Mon, 24 Sep 2001 18:39:14 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [NewsBits] NewsBits - 09/24/01 (fwd) Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit September 24, 2001 New 'war vote' Virus deletes Computer files Security experts on Monday warned of a brand new virus masquerading as a program that will allow people to vote whether the United States should go to war over the deadly Sept. 11 hijacker attacks, but which deletes computer files instead. http://www.siliconvalley.com/docs/news/reuters_wire/1513741l.htm http://news.cnet.com/news/0-1003-200-7285953.html http://www.zdnet.com/zdnn/stories/news/0,4586,5097375,00.html http://www.usatoday.com/life/cyber/tech/2001/09/24/war-vote-virus.htm Nimda worm keeps going and going=85 The multifaceted Nimda worm continued to spread over the weekend, hitting North America on average five times harder than any other region. Antivirus company Trend Micro's World Virus Tracking Center reported that 120,000 new infections were detected worldwide in a 24-hour period ending noon Monday PDT, bringing the total number of copies of the Nimda worm found by Trend Micro to 1.3 million. http://www.zdnet.com/zdnn/stories/news/0,4586,5097369,00.html Nimda still a global threat http://news.cnet.com/news/0-1003-200-7285499.html http://www.fcw.com/geb/articles/2001/0924/web-nimda-09-24-01.asp http://www.newsbytes.com/news/01/170438.html IT could play big at security office The Office for Homeland Security, which President Bush announced last week in his speech to a joint session of Congress, could rely heavily on information technology to maintain domestic security, according to federal IT experts. http://www.fcw.com/fcw/articles/2001/0924/news-home-09-24-01.asp Homeland security plan could resemble year 2000 effort. http://www.gcn.com/vol1_no1/daily-updates/17187-1.html Lawmakers Grill Justice Dept. On Anti-Terrorism Proposal The Chairman of the House Judiciary Committee today announced that he would postpone a planned vote on a sweeping new anti-terrorism proposal so that members of his committee could have more time to reconcile their concerns over the legislation, which would rewrite several federal rules governing electronic surveillance. http://www.newsbytes.com/news/01/170446.html Civil Libertarians Seek To Weaken 'Anti-Terrorism' Bill http://www.newsbytes.com/news/01/170435.html http://www.cnn.com/2001/TECH/industry/09/24/civil.liberties.idg/index.html Why Liberty Suffers in Wartime http://www.wired.com/news/politics/0,1283,47051,00.html Panel releases guidelines for battling terrorism A congressionally mandated panel that has the ear of the Bush administration and key lawmakers detailed its anti-terrorism recommendations on Monday, offering its thoughts on the use of the military in response to terrorist threats, border security, cybersecurity and the national health and medical networks. http://www.govexec.com/dailyfed/0901/092401td1.htm FBI Agents Ill-Equipped to Predict Terror Acts The FBI in the past decade has tripled its spending to stop terrorism, quintupled the number of intelligence gatherers and revamped its bureaucracy to share information about terrorists across the government. None of it was enough to stop the deadliest terrorist attack in U.S. history. http://www.washingtonpost.com/wp-dyn/articles/A14081-2001Sep23.html Terrorist Leader Encrypted Messages Osama bin Laden used encryption technology to thwart National Security Agency intelligence efforts, experts say. There was a time when the US government's National Security Agency could eavesdrop on Osama bin Laden's every word. But the agency's surveillance all but stopped a few years ago when the terrorist leader started communicating through encrypted emails. http://www.techtv.com/news/culture/story/0,24195,3349203,00.html Taliban Threatens U.N. Techies The Taliban have threatened to execute any U.N. worker who uses computers and communications equipment in Afghanistan, forcing a near halt to the remaining relief work in the country, U.N. officials said Monday. The militia raided U.N. offices in Kabul, the capital, and Kandahar, where the Taliban leadership is based, during the weekend and sealed their satellite telephones, walkie-talkies, computers and vehicles to bar them from use, according to U.N. spokeswoman Stephanie Bunker. http://www.wired.com/news/politics/0,1283,47074,00.html Serbia: Law on Computer Crimes to Be Drafted The Federal Ministry of Internal Affairs has confirmed that petitions to punish those who have been abusing numbers of other people's credit cards and invading Western European and American web sites, considering it a patriotic act, have started to come from abroad. http://www.antionline.com/showthread.php?threadid=3D113823 Laid-off techies swiping goods on way out When a Cleveland-based business-to-business start-up failed several months ago, executives planned to follow a well-paved dot-com death pattern: Lay off workers, sell assets and reimburse creditors. Employees had a different plan. Between the layoffs and the asset auction, they stole $35,000 worth of laptops, handheld computers, monitors and laser printers. http://news.cnet.com/news/0-1007-200-7285664.html Linux Experts Wine Over Virus There was much mocking in the Linux camp this weekend when it was discovered that the Sir Cam virus will run under the Open Source operating system - but only under the Wine Windows emulator. Although Wine (Wine Is Not an Emulator) is not technically a Windows emulator for Linux, it is a compatibility layer allowing Windows binaries to run on the Linux OS. http://www.vnunet.com/News/1125594 Air Force techs acted fast to save systems The quick thinking of systems workers at the Air Force Pentagon Communications Agency=92s command and control directorate may have saved computers in the National Military Command Center from crashing following the terrorist attack Sept. 11. http://www.gcn.com/vol1_no1/daily-updates/17188-1.html IT replacement gear streams into Pentagon The Defense Department is continuing to assess and rebuild its information technology infrastructure following the Sept. 11 attack on the Pentagon. DOD officials ordered more than 1,000 proprietary Secured Desktop Gateway communications enclosures for immediate delivery from Holocom Networks. http://www.fcw.com/fcw/articles/2001/0924/news-pentagon-09-24-01.asp Brits want ID cards, not worried about privacy http://www.theregister.co.uk/content/55/21849.html Terrorist tracking center gets cracking The foreign terrorist asset tracking center at the Treasury Department is up and running, Treasury Secretary Paul O=92Neill said today. The center identifies and investigates the financial infrastructure of international terrorist networks. President George W. Bush today signed an executive order that freezes U.S. assets of 27 entities, including what he called terrorist organizations and individual terrorist leaders. http://www.gcn.com/vol1_no1/daily-updates/17189-1.html In terror war, high-tech military tools could hunt low-tech foes Spy satellites. Drones. Motion sensors. Smart bombs. These are some of the high-tech weapons the U.S. military may wield in the gathering campaign against terrorism. The shadowy National Security Agency is already believed to be directing spy satellites to photograph and listen to suspects' camps, while the agency's supercomputers search recordings for clues to militants' identities and whereabouts. http://www.siliconvalley.com/docs/news/tech/038656.htm Cyberterrorists: our invisible enemies As Attorney General John Ashcroft fielded reporters' questions last Tuesday about the attack on the World Trade Center and the Pentagon, one journalist asked if a new computer worm, discovered only hours earlier, was in any way related to the terrorist strikes. It was not, Ashcroft assured the nation --or at least, there was as yet no evidence linking it to Osama bin Laden and his ilk. http://www.zdnet.com/zdnn/stories/comment/0,5859,2814190,00.html Hacker's changes to Yahoo articles highlight quiet Web danger. The dangers of Internet worms and viruses are well known, but security experts are warning of a more pernicious and potentially more damaging kind of attack -- the manipulation of content on trusted Web sites. http://www.siliconvalley.com/docs/news/tech/070395.htm ------------------------ Yahoo! Groups Sponsor ---------------------~--> Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide! http://us.click.yahoo.com/JNm9_D/33_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:49 PDT