[iwar] [NewsBits] NewsBits - 06/19/02 (fwd)

From: L.C.J. Jacobson (jacobson@mitre.org)
Date: 2002-06-21 08:12:00


Return-Path: <sentto-279987-4865-1024672320-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Fri, 21 Jun 2002 08:15:08 -0700 (PDT)
Received: (qmail 11670 invoked by uid 510); 21 Jun 2002 15:12:00 -0000
Received: from n21.grp.scd.yahoo.com (66.218.66.77) by all.net with SMTP; 21 Jun 2002 15:12:00 -0000
X-eGroups-Return: sentto-279987-4865-1024672320-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.201] by n21.grp.scd.yahoo.com with NNFMP; 21 Jun 2002 15:12:01 -0000
X-Sender: jacobson@mitre.org
X-Apparently-To: iwar@yahoogroups.com
Received: (EGP: mail-8_0_3_2); 21 Jun 2002 15:11:59 -0000
Received: (qmail 6197 invoked from network); 21 Jun 2002 15:11:59 -0000
Received: from unknown (66.218.66.216) by m9.grp.scd.yahoo.com with QMQP; 21 Jun 2002 15:11:59 -0000
Received: from unknown (HELO smtpproxy2.mitre.org) (192.80.55.70) by mta1.grp.scd.yahoo.com with SMTP; 21 Jun 2002 15:12:00 -0000
Received: from avsrv2.mitre.org (avsrv2.mitre.org [128.29.154.4]) by smtpproxy2.mitre.org (8.11.3/8.11.3) with ESMTP id g5LFBxl27058 for <iwar@yahoogroups.com>; Fri, 21 Jun 2002 11:11:59 -0400 (EDT)
Received: from MAILHUB2 (mailhub2.mitre.org [129.83.221.18]) by smtpsrv2.mitre.org (8.11.3/8.11.3) with ESMTP id g5LFBwO05595 for <iwar@yahoogroups.com>; Fri, 21 Jun 2002 11:11:58 -0400 (EDT)
Received: from dezinformacija.mitre.org (128.29.163.24) by mailhub2.mitre.org with SMTP id 10615975; Fri, 21 Jun 2002 11:11:55 -0400
Message-ID: <3D134240.7020102@mitre.org>
Organization: The MITRE Corporation
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X; en-US; rv:1.0.0) Gecko/20020529
X-Accept-Language: en,ru,de,fr,bg,pl,pdf
To: iwar <iwar@yahoogroups.com>
From: "L.C.J. Jacobson" <jacobson@mitre.org>
X-Yahoo-Profile: lcj_jcbsn
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Fri, 21 Jun 2002 11:12:00 -0400
Subject: [iwar] [NewsBits] NewsBits - 06/19/02 (fwd)
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=-1.2 required=5.0 tests=NEWSBITS,TO_LOCALPART_EQ_REAL,RISK_FREE,FREE_MONEY version=2.20
X-Spam-Level: 

-------- Original Message --------
Subject: [iwar] [NewsBits] NewsBits - 06/19/02 (fwd)
Date: Thu, 20 Jun 2002 20:50:15 -0700 (PDT)
From: Fred Cohen <fc@all.net>

June 19, 2002

Seattle man faces jail over complaint Web site
Soon after moving into a retirement home, Paul
Trummel began complaining that his neighbors
fell asleep with their TVs blaring or flushed
their toilets during quiet hours. Then he
really turned up the heat by starting a Web
site accusing tenants and staff members of
housing-law violations and conspiracies. The
Web site landed him in jail for 3 months and
made the 68-year-old an unlikely hero to
free-speech advocates in a positively
bizarre First Amendment case.
http://www.nandotimes.com/technology/story/439858p-3520588c.html

Pro-Islamic hackers join forces
Tensions in Kashmir are mirrored on internet.
There is mounting evidence that individual
hacker groups connected by a pro-Islamic
agenda are working together to carry out
hack attacks, say experts. Security firm
mi2g says an alliance of anti-Israel,
anti-US and anti-India groups are
increasingly highlighting issues such
as the Middle East conflict, the war on
terrorism and the Kashmir stand-off as
part of their destructive digital attacks.
http://news.bbc.co.uk/hi/english/sci/tech/newsid_2052000/2052320.stm

U.S. Denies Data Retention Plans
The Justice Department refutes claims that
Internet service providers could be forced
to spy on their customers as part of the
U.S. strategy for securing cyberspace. An
early draft of the White House's National
Strategy to Secure Cyberspace envisions
the same kind of mandatory customer data
collection and retention by U.S. Internet
service providers as was recently enacted
in Europe, according to sources who have
reviewed portions of the plan.
http://online.securityfocus.com/news/489

Bush cybersecurity strategy to be a living document
Howard Schmidt, vice chairman of the president's
Critical Infrastructure Protection Board,
attended the fourth and final White House-
sponsored "town hall meeting" on cybersecurity
last night in Atlanta before the release in
September of the next version of the National
Strategy to Secure Cyberspace.
http://www.computerworld.com/securitytopics/security/story/0,10801,72108,00.html

Panelists warn of risks involved with logging on to the Internet
At a town hall meeting on cybersecurity,
experts warned that the risks of going
online have become especially prevalent
as hackers find new ways to poke holes
in Internet security systems. Tom Noonan,
chief executive officer for Internet
Security Systems, told the gathering
Tuesday that logging onto the Internet
is like entering a dangerous neighborhood.
Risks include identity fraud and intellectual
property and credit card theft.
http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3501396.htm
http://www.cnn.com/2002/TECH/industry/06/19/cyber.security.meeting.ap/index.html
http://www.usatoday.com/life/cyber/tech/2002/06/19/cybersecurity.htm
http://www.nandotimes.com/technology/story/439169p-3516401c.html

A Global Audience, a World of Worries?
Australian Court's Ruling in Libel Case
Could Have a Chilling Effect on Web
Publications. Web publishers around the
world are awaiting a decision in a libel
case before Australia's highest court
that could determine whether they will
be required to adhere to widely differing
foreign standards when stories are posted
on the Internet.
http://www.washingtonpost.com/wp-dyn/articles/A5695-2002Jun18.html

Microsoft's Global Insecurity Complex
Linux and other open-source security programs
are quickly gaining ground on Microsoft's
products. Can Redmond turn it around?
Historians tracing the tectonic movements
of Microsoft (MSFT) have at their disposal
a nifty shortcut: the company's habit of
outlining its future through memos.
http://www.business2.com/articles/web/0,1653,41447,FF.html

Report: Viruses spreading on the double
The first half of 2002 has seen worms infect
PCs at twice the rate they did last year,
says security company MessageLabs. And
they're more malicious too. Computer viruses
are proliferating faster than ever, according
to British security company MessageLabs,
which reported Tuesday that it caught as
many pests in the first half of 2002 as
it did in all of last year.
http://news.zdnet.co.uk/story/0,,t269-s2112071,00.html

Israel a global pacesetter in high-tech security
Prospects also good for biotechnology, life
sciences When Israel orbited its Ofeq 5 spy
satellite late last month, the payload's
origin was no surprise to people familiar
with the nation's technology scene. For Elop
Electro-Optics Industries, the company that
designed and made the sophisticated but
lightweight camera, it was business as usual.
http://www.siliconvalley.com/mld/siliconvalley/3497022.htm

The Internet Gets Serious
Maybe the Internet thrill isn't gone, but is
that it over there pulling on its jacket and
heading for the door?  The Net promised to
let consumers read everything, hear everything,
play anything. Any David with a computer could
elbow aside the most gargantuan Goliath. No
matter the question, the answer was yes, sure,
it's possible, do it. Today, the Internet is
messy, dangerous ground. Viruses and system
break-ins are on the rise, while vested
interests battle over what isn't allowed.
http://online.securityfocus.com/news/488

Hacking's not just for geeks
Blended security threats are increasing,
meaning that chief information officers
have more to worry about than just hackers.
As the term hacking has broadened to encompass
a wider group of people, chief information
officers will see more and more blended
security threats within the next couple of
years, according to one security researcher.
http://news.zdnet.co.uk/story/0,,t269-s2112082,00.html

Information Technology and the War on Terrorism
Join computer security, privacy and surveillance
expert Stewart Baker of the law firm Steptoe &
Johnson to find out how the government and the
private sector are using the Internet to fight
terrorism, and how they prevent the Internet
from being used as a weapon against themselves.
http://discuss.washingtonpost.com/wp-srv/zforum/02/technews_baker_061902.htm

Lech Walesa: Tech Freedom Fighter
When former Polish president Lech Walesa pops
into a chat room to discuss politics, people
have a hard time believing they're debating
issues with the man largely credited for the
downfall of communism in Eastern Europe. In
a telephone conversation from his home in
Gdansk, the former shipyard electrician
turned Nobel Peace Prize winner spoke about
government attempts to stifle technology or
to use it to spy on personal communication.
http://www.wired.com/news/politics/0,1283,53299,00.html



------------------------ Yahoo! Groups Sponsor ---------------------~-->
Free $5 Love Reading
Risk Free!
http://us.click.yahoo.com/3PCXaC/PfREAA/Ey.GAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT