Return-Path: <sentto-279987-4609-1017985248-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 04 Apr 2002 21:50:08 -0800 (PST) Received: (qmail 10353 invoked by uid 510); 5 Apr 2002 05:47:01 -0000 Received: from n15.grp.scd.yahoo.com (66.218.66.70) by all.net with SMTP; 5 Apr 2002 05:47:01 -0000 X-eGroups-Return: sentto-279987-4609-1017985248-fc=all.net@returns.groups.yahoo.com Received: from [66.218.67.196] by n15.grp.scd.yahoo.com with NNFMP; 05 Apr 2002 05:40:49 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_3_1); 5 Apr 2002 05:40:47 -0000 Received: (qmail 7990 invoked from network); 5 Apr 2002 05:40:47 -0000 Received: from unknown (66.218.66.216) by m3.grp.scd.yahoo.com with QMQP; 5 Apr 2002 05:40:47 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.scd.yahoo.com with SMTP; 5 Apr 2002 05:40:47 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g355g8A12125 for iwar@onelist.com; Thu, 4 Apr 2002 21:42:08 -0800 Message-Id: <200204050542.g355g8A12125@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Thu, 4 Apr 2002 21:42:07 -0800 (PST) Subject: [iwar] News Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Terrorist Web Site Hosted by U.S. Firm The political ideology of the Hamas site, which refers to recent suicide attacks in Israel as the 'martyr brigade,' is not illegal, according to most analysts. A Web site glorifying recent suicide attacks in the Middle East that is hosted by a U.S. company is sparking legal and ethical questions about whether Internet service providers and hosting companies should be held accountable for content on their networks and Web pages. http://www.newsfactor.com/perl/story/17079.html FBI will use 'electronic tripwires' to protect secrets Tighter security against possible spies inside the FBI will require sophisticated ``electronic tripwires'' activated when employees try to review off-limits secrets, says a former FBI and CIA director. The tripwires ``will make it more difficult (for spies) in a deterrent sense -- knowing they'll be more apt to be observed,'' said William H. Webster, who led a commission of experts investigating security inside the FBI after the February 2001 arrest of agent Robert Hanssen. http://www.siliconvalley.com/mld/siliconvalley/news/editorial/2990611.htm Securing the cyber front Last year=92s spate of hacker attacks, viruses and worms shed light on the nation=92s poor state of information security--and the government=92s inability to shore it up. After Sept. 11, the state of the country=92s cyber security seemed even more vulnerable to an even wider range of threats, and the White House stepped forward with what seemed like a bright idea to secure the cyber front. http://www.govexec.com/dailyfed/0402/040202ti.htm Clarke: IT security is 3 to 5 years away The president=92s proposed fiscal 2003 budget puts much-needed money behind efforts to improve IT security, presidential cybersecurity adviser Richard Clarke told industry representatives at FOSE 2002. =93The history of government trying to achieve IT ecurity is a sad one,=94 Clarke said. =93We have to tart putting our money where our policy is.=94 http://gcn.com/21_7/news/18305-1.html Army security expert emphasizes vigilance and training A computer scientist from the National Infrastructure Protection Center yesterday urged agency officials to return to the basics of security and guard against cyberattacks by IT insiders. Robert M. Wright, on loan to NIPC=92s Special Technology Application Unit from the Army, said today=92s insiders are the people who are allowed onto an agency=92s network. Such insiders bring in tools ranging from hard drives the size of key chains to anonymous remailers, steganography=97hiding messages within digital images=97peer-to-peer applications, and infrared and radio wireless devices. http://www.gcn.com/vol1_no1/daily-updates/18327-1.html Better management key to fighting cyber attacks The greatest technologies in the world will not shield federal agencies from cyber attacks unless they require more involvement from their senior managers and improve on educating their employees about computer security, several high-ranking federal information technology officials said Wednesday. "IT security is really a question of accountability," said Daryl White, the Interior Department's chief information officer, during a conference sponsored by the National High Performance Computing and Communications Council. "You can't hold firewalls and intrusion detection systems accountable. You can only hold people accountable." http://www.govexec.com/dailyfed/0402/040302njns.htm Support For Government Surveillance Slips Support for expanded high-tech government surveillance gradually has diminished during the six months following the Sept. 11 terrorist attacks, new Harris Poll figures show. While a majority of Americans continue to favor expanded surveillance by law agents in the war against terror, the poll shows that support has declined modestly. In one category =96 expanded government surveillance of cell phone and e-mail traffic =96 supporters now are in the minority, the poll indicates. http://www.newsbytes.com/news/02/175641.html Death to Old Software We all know that outdated network software is security hazard. The solution: hard-wired expiration codes that self-destruct an ld program when it's past its prime. Software lives forever. This is its blessing and its curse. It's a blessing, of course, because it's what separates software from automobiles, houses, electron microscopes, and other marvels of engineering: no wind and rain to make code rust, and software has no moving parts to wear out. http://online.securityfocus.com/columnists/72 --This communication is confidential to the parties it is intended to serve-- Fred Cohen Fred Cohen & Associates.........tel/fax:925-454-0171 fc@all.net The University of New Haven.....http://www.unhca.com/ http://all.net/ Sandia National Laboratories....tel:925-294-2087 ------------------------ Yahoo! Groups Sponsor ---------------------~--> SALE --> Wireless Video Cameras for Home Surveillance! VERY TINY! PRICE BREAKTHROUGH - $79.99! http://us.click.yahoo.com/W0toNC/7o6DAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:31 PDT