[iwar] News

From: Fred Cohen (fc@all.net)
Date: 2002-04-04 21:42:07


Return-Path: <sentto-279987-4609-1017985248-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 04 Apr 2002 21:50:08 -0800 (PST)
Received: (qmail 10353 invoked by uid 510); 5 Apr 2002 05:47:01 -0000
Received: from n15.grp.scd.yahoo.com (66.218.66.70) by all.net with SMTP; 5 Apr 2002 05:47:01 -0000
X-eGroups-Return: sentto-279987-4609-1017985248-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.196] by n15.grp.scd.yahoo.com with NNFMP; 05 Apr 2002 05:40:49 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_3_1); 5 Apr 2002 05:40:47 -0000
Received: (qmail 7990 invoked from network); 5 Apr 2002 05:40:47 -0000
Received: from unknown (66.218.66.216) by m3.grp.scd.yahoo.com with QMQP; 5 Apr 2002 05:40:47 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.scd.yahoo.com with SMTP; 5 Apr 2002 05:40:47 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g355g8A12125 for iwar@onelist.com; Thu, 4 Apr 2002 21:42:08 -0800
Message-Id: <200204050542.g355g8A12125@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 4 Apr 2002 21:42:07 -0800 (PST)
Subject: [iwar] News
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Terrorist Web Site Hosted by U.S.  Firm The political ideology of the
Hamas site, which refers to recent suicide attacks in Israel as the
'martyr brigade,' is not illegal, according to most analysts.  A Web
site glorifying recent suicide attacks in the Middle East that is hosted
by a U.S.  company is sparking legal and ethical questions about whether
Internet service providers and hosting companies should be held
accountable for content on their networks and Web pages. 
http://www.newsfactor.com/perl/story/17079.html

FBI will use 'electronic tripwires' to protect secrets Tighter security
against possible spies inside the FBI will require sophisticated
``electronic tripwires'' activated when employees try to review
off-limits secrets, says a former FBI and CIA director.  The tripwires
``will make it more difficult (for spies) in a deterrent sense --
knowing they'll be more apt to be observed,'' said William H.  Webster,
who led a commission of experts investigating security inside the FBI
after the February 2001 arrest of agent Robert Hanssen. 
http://www.siliconvalley.com/mld/siliconvalley/news/editorial/2990611.htm

Securing the cyber front Last year=92s spate of hacker attacks, viruses
and worms shed light on the nation=92s poor state of information
security--and the government=92s inability to shore it up.  After Sept. 
11, the state of the country=92s cyber security seemed even more
vulnerable to an even wider range of threats, and the White House
stepped forward with what seemed like a bright idea to secure the cyber
front.  http://www.govexec.com/dailyfed/0402/040202ti.htm

Clarke: IT security is 3 to 5 years away The president=92s proposed
fiscal 2003 budget puts much-needed money behind efforts to improve IT
security, presidential cybersecurity adviser Richard Clarke told
industry representatives at FOSE 2002.  =93The history of government
trying to achieve IT ecurity is a sad one,=94 Clarke said.  =93We have
to tart putting our money where our policy is.=94
http://gcn.com/21_7/news/18305-1.html

Army security expert emphasizes vigilance and training A computer
scientist from the National Infrastructure Protection Center yesterday
urged agency officials to return to the basics of security and guard
against cyberattacks by IT insiders.  Robert M.  Wright, on loan to
NIPC=92s Special Technology Application Unit from the Army, said
today=92s insiders are the people who are allowed onto an agency=92s
network.  Such insiders bring in tools ranging from hard drives the size
of key chains to anonymous remailers, steganography=97hiding messages
within digital images=97peer-to-peer applications, and infrared and
radio wireless devices. 
http://www.gcn.com/vol1_no1/daily-updates/18327-1.html

Better management key to fighting cyber attacks The greatest
technologies in the world will not shield federal agencies from cyber
attacks unless they require more involvement from their senior managers
and improve on educating their employees about computer security,
several high-ranking federal information technology officials said
Wednesday.  "IT security is really a question of accountability," said
Daryl White, the Interior Department's chief information officer, during
a conference sponsored by the National High Performance Computing and
Communications Council.  "You can't hold firewalls and intrusion
detection systems accountable.  You can only hold people accountable."
http://www.govexec.com/dailyfed/0402/040302njns.htm

Support For Government Surveillance Slips Support for expanded high-tech
government surveillance gradually has diminished during the six months
following the Sept.  11 terrorist attacks, new Harris Poll figures show. 
While a majority of Americans continue to favor expanded surveillance by
law agents in the war against terror, the poll shows that support has
declined modestly.  In one category =96 expanded government surveillance
of cell phone and e-mail traffic =96 supporters now are in the minority,
the poll indicates.  http://www.newsbytes.com/news/02/175641.html

Death to Old Software We all know that outdated network software is
security hazard.  The solution: hard-wired expiration codes that
self-destruct an ld program when it's past its prime.  Software lives
forever.  This is its blessing and its curse.  It's a blessing, of
course, because it's what separates software from automobiles, houses,
electron microscopes, and other marvels of engineering: no wind and rain
to make code rust, and software has no moving parts to wear out. 
http://online.securityfocus.com/columnists/72

--This communication is confidential to the parties it is intended to serve--
Fred Cohen		Fred Cohen & Associates.........tel/fax:925-454-0171
fc@all.net		The University of New Haven.....http://www.unhca.com/
http://all.net/		Sandia National Laboratories....tel:925-294-2087


------------------------ Yahoo! Groups Sponsor ---------------------~-->
SALE --> Wireless Video Cameras
for Home Surveillance! VERY TINY! PRICE BREAKTHROUGH - $79.99!
http://us.click.yahoo.com/W0toNC/7o6DAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:31 PDT