Return-Path: <sentto-279987-4624-1019318569-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sat, 20 Apr 2002 09:06:08 -0700 (PDT) Received: (qmail 7563 invoked by uid 510); 20 Apr 2002 16:02:52 -0000 Received: from n16.grp.scd.yahoo.com (66.218.66.71) by all.net with SMTP; 20 Apr 2002 16:02:52 -0000 X-eGroups-Return: sentto-279987-4624-1019318569-fc=all.net@returns.groups.yahoo.com Received: from [66.218.67.201] by n16.grp.scd.yahoo.com with NNFMP; 20 Apr 2002 16:02:47 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_3_1); 20 Apr 2002 16:02:48 -0000 Received: (qmail 2877 invoked from network); 20 Apr 2002 16:02:45 -0000 Received: from unknown (66.218.66.216) by m9.grp.scd.yahoo.com with QMQP; 20 Apr 2002 16:02:45 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.scd.yahoo.com with SMTP; 20 Apr 2002 16:02:43 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g3KG5Hx04911 for iwar@onelist.com; Sat, 20 Apr 2002 09:05:17 -0700 Message-Id: <200204201605.g3KG5Hx04911@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sat, 20 Apr 2002 09:05:17 -0700 (PDT) Subject: [iwar] [NewsBits] NewsBits - 04/19/02 (fwd) Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit April 19, 2002 IBM: We won't seek patent plan royalties IBM on Thursday said it will not seek royalties on patented technology that is part of an e-commerce Web standard. At issue is a Web standard called Electronic Business XML, or ebXML, which allows companies in many industries to communicate over the Web. It was a standard created by a United Nations organization and by the Organization for the Advancement of Structured Information Standards, or OASIS, a consortium of tech companies that includes IBM, Sun Microsystems, BEA Systems and Hewlett-Packard. http://zdnet.com.com/2100-1103-886829.html http://news.zdnet.co.uk/story/0,,t269-s2108788,00.html http://techupdate.zdnet.com/techupdate/stories/main/0,14179,2861528,00.html White House cyber czar describes next phase of Internet plan Speaking before a conference of hundreds of federal technology personnel and industry officials Wednesday morning, Richard Clarke, President Bush=92s point man on national cybersecurity, outlined the next phase in the controversial plan to build an impenetrable information network for the federal government, known as Govnet. http://www.govexec.com/dailyfed/0402/041702h1.htm Plans For Secure Federal Intranet Moving Forward http://www.newsbytes.com/news/02/176029.html Colleges Make Cyber Security Pledge http://www.fcw.com/fcw/articles/2002/0415/web-cyber-04-19-02.asp EU clamping down on cybercrime Internet hackers and spreaders of computer viruses could face four years in jail under a draft =93cybercrime=94 law adopted by the European Commission on Friday. The European Union has pledged to clamp down on so-called cybercrime, aimed at destroying computer networks, which has caused billions of dollars in damage worldwide. http://www.msnbc.com/news/740997.asp A $1 billion, corporate-funded hack? Lawsuit claims News Corp. division cheated Vivendi pay-TV. It sounds like a script once rejected by Hollywood. The plot revolves around two of the world=92s biggest multinational corporations, locked in an all-out war over the future of pay-TV, and its promised billions. The competition is so ruthless that eventually, someone cheats. One company hires hackers to break the other=92s secret codes, then publishes the secret on the Internet, inviting piracy. Suddenly, the victim company=92s pay-TV is free, and its only asset is worthless. Too ruthless to be true? Not according to a lawsuit filed in California last month. http://www.msnbc.com/news/740634.asp Technology being used to root out al-Qaeda In the tiny towns that dot the Pakistani mountains east of the Afghan border, small shops that seemingly offer residents little more than dusty packs of cigarettes and canned goods are stocked with one more essential =97 computers with Internet access. It is from this area, in northwest Pakistan, that U.S. intelligence in recent weeks has picked up on increased communications among al-Qaeda members, according to U.S. officials. http://www.usatoday.com/life/cyber/tech/2002/04/19/al-qaida-online.htm http://www.nandotimes.com/technology/story/368741p-2974207c.html Carnivore snooping system muzzled Digital rights management system to the rescue. A way to muzzle the controversial Carnivore snooping system has been developed by graduate researchers at Dartmouth College in the US. Although it doesn't take all the bite out of Carnivore, the students' system goes some way to eliminating the abuse potential of the data snooper. http://www.vnunet.com/News/1131090 New tool camouflages hacker programs A new tool for manipulating packets of data that travel over the Internet could allow attackers to camouflage malicious programs just enough to bypass many intrusion-detection systems and firewalls. The tool, called Fragroute, performs several techniques to fool the signature-based recognition systems used by many intrusion- detection systems and firewalls. Many of these duping techniques were outlined in a research paper published four years ago. http://zdnet.com.com/2100-1105-887133.html http://news.com.com/2100-1001-887065.html Ashcroft, Ellison win Big Brother awards for privacy assaults U.S. Attorney General John Ashcroft and database billionaire Larry Ellison were named this year's most notorious American violators of personal privacy by leading advocacy groups Thursday. The annual ``Big Brother Awards'' are presented to government, corporations and private individuals who allegedly have done the most to threaten personal privacy. http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3097803.htm http://online.securityfocus.com/news/373 http://news.zdnet.co.uk/story/0,,t269-s2108752,00.html http://news.com.com/2100-1023-886878.html http://www.usatoday.com/life/cyber/tech/2002/04/19/big-brother.htm http://www.theregister.co.uk/content/6/24949.html Army hires Stat Scanner The Army this week awarded Harris Corp. a multi- million-dollar contract to protect its global networks from cyberthreats. The Melbourne, Fla., company will install its Stat Scanner vulnerability assessment software on more than 1.5 million Army systems and will provide maintenance for three years. Stat Scanner will search for vulnerabilities in strategic and tactical networks and the Army Tactical Internet at both active and reserve units. The software shows systems administrators a comprehensive analysis of vulnerabilities and risk levels. http://www.gcn.com/vol1_no1/daily-updates/18430-1.html Waging peace on the Internet Hacking is a contact sport. The more people who have contact with one another, the better. There's an international book burning in progress; the surveillance cameras are rolling; and the water canons are drowning freedom of assembly. But it's not occurring anywhere that television can broadcast to the world. It's happening in cyberspace. http://www.theregister.co.uk/content/6/24946.html Hacking Through the Wireless Jungle With a WLAN card and a sniffer, it is not difficult for a hacker to find a company's wireless network from a position outside the building. 'From there, it's possible to flood the network with traffic and create a denial of service,' AMR Research analyst Dennis Gaughan told Wireless NewsFactor. Each time technology advances, a new underworld of cyber criminals appears, looking to exploit the latest systems. As companies strive to give employees more mobility -- without sacrificing productivity -- hackers have begun to slither around the wireless landscape, readying new assaults. http://www.newsfactor.com/perl/story/17342.html Crime Seen Forensic science meets computer animation - in the courtroom. Crime-scene reconstruction will never be the same. It's 2:30 pm on the fourth day of Michael Serge's murder trial. In a wood-paneled room of the county court house in Scranton, Pennsylvania, Judge Terrance Nealon gives the jury a brief speech on the difference between art and fact, then motions for the prosecution to begin. At the back of the courtroom, a crowd of onlookers from the local legal community crane their necks as a technician cues up a 72-second video. It's an animated re-creation of Serge, a retired police detective, shooting and killing his wife of 35 years, Jennifer. The picture appears on a 5-foot screen positioned near the jury box. http://www.wired.com/wired/archive/10.05/forensics.html ------------------------ Yahoo! Groups Sponsor ---------------------~--> HOT! PRICE BREAKTHROUGH! SUPER Tiny Wireless Video Camera UNDER $80 BUCKS --> ORDER NOW! http://us.click.yahoo.com/y7toOC/8o6DAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:31 PDT