[iwar] [NewsBits] NewsBits - 01/02/02 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2002-01-03 06:46:17


Return-Path: <sentto-279987-4190-1010069169-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 03 Jan 2002 06:47:07 -0800 (PST)
Received: (qmail 14704 invoked by uid 510); 3 Jan 2002 14:46:30 -0000
Received: from n34.groups.yahoo.com (216.115.96.84) by all.net with SMTP; 3 Jan 2002 14:46:30 -0000
X-eGroups-Return: sentto-279987-4190-1010069169-fc=all.net@returns.groups.yahoo.com
Received: from [216.115.97.166] by n34.groups.yahoo.com with NNFMP; 03 Jan 2002 14:46:09 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_1_3); 3 Jan 2002 14:46:08 -0000
Received: (qmail 73861 invoked from network); 3 Jan 2002 14:46:08 -0000
Received: from unknown (216.115.97.171) by m12.grp.snv.yahoo.com with QMQP; 3 Jan 2002 14:46:08 -0000
Received: from unknown (HELO red.all.net) (12.232.125.69) by mta3.grp.snv.yahoo.com with SMTP; 3 Jan 2002 14:46:08 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g03EkHh21002 for iwar@onelist.com; Thu, 3 Jan 2002 06:46:17 -0800
Message-Id: <200201031446.g03EkHh21002@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 3 Jan 2002 06:46:17 -0800 (PST)
Subject: [iwar] [NewsBits] NewsBits - 01/02/02 (fwd)
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

January 2, 2002

New York strengthens Internet privacy New York Gov.  George E.  Pataki
signed into law a bill that requires state agencies to develop policies
to enhance online privacy.  The Internet Privacy Policy Act requires the
state=92s Office for Technology to develop a model online privacy notice
for state Web sites.  The legislation bars state agencies from
collecting or disclosing users=92 personal information without their
consent.  http://www.gcn.com/vol1_no1/daily-updates/17664-1.html

Bush lifts speed limits on computer exports President Bush on Wednesday
allowed U.S.  technology firms to sell high-speed computers to Russia,
China, India and countries in the Middle East, easing a Cold War-era ban
designed to halt the spread of nuclear arms.  Computer manufacturers may
now export computers capable of complex three-dimensional modeling,
calculating fluid dynamics, and other advanced applications to Pakistan,
Vietnam and other so-called ``Tier 3'' countries without specific
permission from the government. 
http://www.siliconvalley.com/docs/news/reuters_wire/1720700l.htm

'Storm Chasers' Collide In Domain-Name Dispute A speedy arbitration
process to settle disputes over the ownership of Internet domain names
isn't the kind of whirlwind Warren Faidley is used to.  But the Tucson,
Ariz., photographer known for his dramatic images of bad weather has
wrested the address WarrenFaidley.com from a fellow "storm chaser" who
became a cybersquatter.  http://www.newsbytes.com/news/01/173300.html

Tech companies develop innovative security solutions Computer whizzes at
a small Eagan firm say their cutting-edge software can identify a person
within seconds of retrieving data from a finger scan.  In the frenzied
search for new ways to combat terrorism, BIO-key International's system
has captured the imagination of federal agencies - and even a former
Israeli prime minister. 
http://www.nandotimes.com/technology/story/208401p-2010006c.html

CIA-backed software looks for terror connections Data analysis software
backed by the CIA and used by some casinos to catch gambling cheats is
now being tested for its potential to detect suspected terrorists and
their associates when they make airline, hotel or rental-car
reservations.  http://www.usatoday.com/life/cyber/tech/cw2.htm

Scientists: Liars betrayed by their faces A heat-sensing camera trained
on people's faces was able to detect liars in a study that hints at a
way of spotting terrorists at airports.  In six of eight people who
lied, the high-resolution thermal imaging camera detected a faint
blushing around their eyes that Mayo Clinic researchers said is evidence
of deception. 
http://www.cnn.com/2002/TECH/science/01/02/liars.faces.ap/index.html
http://www.nandotimes.com/technology/story/209357p-2020364c.html

'Win-XP hole' mis-represented by FBI, press, Gibson Everyone from the
FBI to the LA Times has something scary to say about the new XP
vulnerability.  Here's why they all have it wrong.  The creation of
marketing niches from Microsoft technologies is a model of perpetual
motion.  Redmond develops the products, and we get paid to implement,
install, configure, customize, upgrade, secure, and to even break and
exploit them.  http://www.theregister.co.uk/content/4/23517.html

Cyber security In the real world, we worry about anthrax or smallpox. 
These bacteria and viruses potentially can kill millions of people and
it's difficult to defend against them.  In the cyberworld of computers
and the Internet, there also are infectious agents that can cause great
harm and that are difficult to defend against.  Last year, according to
a research firm in California, Computer Economics, worms and viruses
cost us more than $17 billion. 
http://www.nandotimes.com/technology/story/208112p-2007755c.html

Toward More Cybersecurity in 2002 Here's a list of resolutions that, if
put into action, would help make the Net a much safer place.  Call 2001
The Year of Living Dangerously.  Router attacks brought down major
Microsoft sites, followed by the Code Red worm over the summer.  Then
came the Nimda worm-virus in the fall.  A sinister-sounding program
called AirSnort allowed roaming cybersnoops to hack vulnerable wireless
networks using only a Linux laptop and some free software.  And Visa
U.S.A.  launched a policy mandating merchants that accept online credit
cards to take basic security steps or lose their charging privileges. 
http://www.securityfocus.com/news/302

Popular hangout for teens have recent problems with violence.  Cyber
cafes in this Orange County city are attracting an unruly crowd and city
officials are worried about the safety of children after a murder over
the weekend.  Cyber cafes are one of the fastest growing businesses in
Orange County, where teens and young adults frequently can be found
logging onto the Internet and playing video games.  Some locations stay
open as late as 4 a.m. 
http://www.siliconvalley.com/docs/news/tech/085372.htm


------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:02 PST