[iwar] [NewsBits] NewsBits - 04/19/02 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2002-04-20 09:05:17


Return-Path: <sentto-279987-4624-1019318569-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sat, 20 Apr 2002 09:06:08 -0700 (PDT)
Received: (qmail 7563 invoked by uid 510); 20 Apr 2002 16:02:52 -0000
Received: from n16.grp.scd.yahoo.com (66.218.66.71) by all.net with SMTP; 20 Apr 2002 16:02:52 -0000
X-eGroups-Return: sentto-279987-4624-1019318569-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.201] by n16.grp.scd.yahoo.com with NNFMP; 20 Apr 2002 16:02:47 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_3_1); 20 Apr 2002 16:02:48 -0000
Received: (qmail 2877 invoked from network); 20 Apr 2002 16:02:45 -0000
Received: from unknown (66.218.66.216) by m9.grp.scd.yahoo.com with QMQP; 20 Apr 2002 16:02:45 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.scd.yahoo.com with SMTP; 20 Apr 2002 16:02:43 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g3KG5Hx04911 for iwar@onelist.com; Sat, 20 Apr 2002 09:05:17 -0700
Message-Id: <200204201605.g3KG5Hx04911@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sat, 20 Apr 2002 09:05:17 -0700 (PDT)
Subject: [iwar] [NewsBits] NewsBits - 04/19/02 (fwd)
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

April 19, 2002
IBM: We won't seek patent plan royalties
IBM on Thursday said it will not seek royalties on
patented technology that is part of an e-commerce
Web standard. At issue is a Web standard called
Electronic Business XML, or ebXML, which allows
companies in many industries to communicate over
the Web. It was a standard created by a United
Nations organization and by the Organization for
the Advancement of Structured Information Standards,
or OASIS, a consortium of tech companies that
includes IBM, Sun Microsystems, BEA Systems
and Hewlett-Packard.
http://zdnet.com.com/2100-1103-886829.html
http://news.zdnet.co.uk/story/0,,t269-s2108788,00.html
http://techupdate.zdnet.com/techupdate/stories/main/0,14179,2861528,00.html

White House cyber czar describes next phase of Internet plan
Speaking before a conference of hundreds of federal
technology personnel and industry officials Wednesday
morning, Richard Clarke, President Bush=92s point man
on national cybersecurity, outlined the next phase
in the controversial plan to build an impenetrable
information network for the federal government,
known as Govnet.
http://www.govexec.com/dailyfed/0402/041702h1.htm

Plans For Secure Federal Intranet Moving Forward
http://www.newsbytes.com/news/02/176029.html
Colleges Make Cyber Security Pledge
http://www.fcw.com/fcw/articles/2002/0415/web-cyber-04-19-02.asp

EU clamping down on cybercrime
Internet hackers and spreaders of computer
viruses could face four years in jail under
a draft =93cybercrime=94 law adopted by the European
Commission on Friday.  The European Union has
pledged to clamp down on so-called cybercrime,
aimed at destroying computer networks, which
has caused billions of dollars in damage
worldwide.
http://www.msnbc.com/news/740997.asp

A $1 billion, corporate-funded hack?
Lawsuit claims News Corp. division cheated Vivendi
pay-TV. It sounds like a script once rejected by
Hollywood. The plot revolves around two of the
world=92s biggest multinational corporations, locked
in an all-out war over the future of pay-TV, and
its promised billions. The competition is so
ruthless that eventually, someone cheats. One
company hires hackers to break the other=92s secret
codes, then publishes the secret on the Internet,
inviting piracy. Suddenly, the victim company=92s
pay-TV is free, and its only asset is worthless.
Too ruthless to be true? Not according to a
lawsuit filed in California last month.
http://www.msnbc.com/news/740634.asp

Technology being used to root out al-Qaeda
In the tiny towns that dot the Pakistani mountains
east of the Afghan border, small shops that seemingly
offer residents little more than dusty packs of
cigarettes and canned goods are stocked with one
more essential =97 computers with Internet access.
It is from this area, in northwest Pakistan, that
U.S. intelligence in recent weeks has picked up
on increased communications among al-Qaeda members,
according to U.S. officials.
http://www.usatoday.com/life/cyber/tech/2002/04/19/al-qaida-online.htm
http://www.nandotimes.com/technology/story/368741p-2974207c.html

Carnivore snooping system muzzled
Digital rights management system to the rescue.
A way to muzzle the controversial Carnivore snooping
system has been developed by graduate researchers at
Dartmouth College in the US. Although it doesn't take
all the bite out of Carnivore, the students' system
goes some way to eliminating the abuse potential of
the data snooper.
http://www.vnunet.com/News/1131090

New tool camouflages hacker programs
A new tool for manipulating packets of data that
travel over the Internet could allow attackers
to camouflage malicious programs just enough
to bypass many intrusion-detection systems and
firewalls. The tool, called Fragroute, performs
several techniques to fool the signature-based
recognition systems used by many intrusion-
detection systems and firewalls. Many of these
duping techniques were outlined in a research
paper published four years ago.
http://zdnet.com.com/2100-1105-887133.html
http://news.com.com/2100-1001-887065.html

Ashcroft, Ellison win Big Brother awards for privacy assaults
U.S. Attorney General John Ashcroft and database
billionaire Larry Ellison were named this year's
most notorious American violators of personal
privacy by leading advocacy groups Thursday. The
annual ``Big Brother Awards'' are presented to
government, corporations and private individuals
who allegedly have done the most to threaten
personal privacy.
http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3097803.htm
http://online.securityfocus.com/news/373
http://news.zdnet.co.uk/story/0,,t269-s2108752,00.html
http://news.com.com/2100-1023-886878.html
http://www.usatoday.com/life/cyber/tech/2002/04/19/big-brother.htm
http://www.theregister.co.uk/content/6/24949.html

Army hires Stat Scanner
The Army this week awarded Harris Corp. a multi-
million-dollar contract to protect its global
networks from cyberthreats. The Melbourne, Fla.,
company will install its Stat Scanner vulnerability
assessment software on more than 1.5 million Army
systems and will provide maintenance for three
years. Stat Scanner will search for vulnerabilities
in strategic and tactical networks and the Army
Tactical Internet at both active and reserve
units. The software shows systems administrators
a comprehensive analysis of vulnerabilities and
risk levels.
http://www.gcn.com/vol1_no1/daily-updates/18430-1.html

Waging peace on the Internet
Hacking is a contact sport. The more people who
have contact with one another, the better. There's
an international book burning in progress; the
surveillance cameras are rolling; and the water
canons are drowning freedom of assembly. But
it's not occurring anywhere that television
can broadcast to the world. It's happening
in cyberspace.
http://www.theregister.co.uk/content/6/24946.html

Hacking Through the Wireless Jungle
With a WLAN card and a sniffer, it is not difficult
for a hacker to find a company's wireless network
from a position outside the building. 'From there,
it's possible to flood the network with traffic and
create a denial of service,' AMR Research analyst
Dennis Gaughan told Wireless NewsFactor. Each time
technology advances, a new underworld of cyber
criminals appears, looking to exploit the latest
systems. As companies strive to give employees
more mobility -- without sacrificing productivity --
hackers have begun to slither around the wireless
landscape, readying new assaults.
http://www.newsfactor.com/perl/story/17342.html

Crime Seen
Forensic science meets computer animation - in the
courtroom. Crime-scene reconstruction will never be
the same. It's 2:30 pm on the fourth day of Michael
Serge's murder trial. In a wood-paneled room of the
county court house in Scranton, Pennsylvania, Judge
Terrance Nealon gives the jury a brief speech on the
difference between art and fact, then motions for the
prosecution to begin. At the back of the courtroom,
a crowd of onlookers from the local legal community
crane their necks as a technician cues up a 72-second
video. It's an animated re-creation of Serge, a retired
police detective, shooting and killing his wife of 35
years, Jennifer. The picture appears on a 5-foot screen
positioned near the jury box.
http://www.wired.com/wired/archive/10.05/forensics.html

------------------------ Yahoo! Groups Sponsor ---------------------~-->
HOT! PRICE BREAKTHROUGH!
SUPER Tiny Wireless Video Camera UNDER $80 BUCKS --> ORDER NOW!
http://us.click.yahoo.com/y7toOC/8o6DAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:31 PDT