[iwar] [NewsBits] NewsBits - 06/26/02 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2002-07-04 06:54:24


Return-Path: <sentto-279987-4945-1025790853-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 04 Jul 2002 06:56:08 -0700 (PDT)
Received: (qmail 27010 invoked by uid 510); 4 Jul 2002 13:53:54 -0000
Received: from n14.grp.scd.yahoo.com (66.218.66.69) by all.net with SMTP; 4 Jul 2002 13:53:54 -0000
X-eGroups-Return: sentto-279987-4945-1025790853-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.200] by n14.grp.scd.yahoo.com with NNFMP; 04 Jul 2002 13:54:13 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_7_4); 4 Jul 2002 13:54:03 -0000
Received: (qmail 29721 invoked from network); 4 Jul 2002 13:54:02 -0000
Received: from unknown (66.218.66.216) by m8.grp.scd.yahoo.com with QMQP; 4 Jul 2002 13:54:02 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.scd.yahoo.com with SMTP; 4 Jul 2002 13:54:02 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g64DsOv14247 for iwar@onelist.com; Thu, 4 Jul 2002 06:54:24 -0700
Message-Id: <200207041354.g64DsOv14247@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 4 Jul 2002 06:54:24 -0700 (PDT)
Subject: [iwar] [NewsBits] NewsBits - 06/26/02 (fwd)
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=-4.9 required=5.0 tests=NEWSBITS,PORN_10,DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: 

June 26, 2002

U.S. finds clues to potential cyber-attack
Dams, Utilities, 911 System Called Vulnerable
Last fall, Mountain View police detective
Chris Hsiung began investigating a pattern of
surveillance against Silicon Valley computers.
 From the Middle East and South Asia, unknown
browsers were exploring digital systems used
to manage utilities and government offices.
Hsiung, a high-tech crime specialist, alerted
the FBI.
http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3554402.htm
http://online.securityfocus.com/news/502
http://www.washingtonpost.com/wp-dyn/articles/A50765-2002Jun26.html

FBI raid sparks Akamai v. Speedera court battle
Akamai Technologies Inc and Speedera Networks
Inc took their increasingly bitter rivalry to
court in San Francisco yesterday, with two
lawsuits being filed after it emerged the FBI
is investigating the alleged "hacking" of
Akamai's confidential data by Speedera's CTO,
Richard Day, Kevin Murphy. Speedera confirmed
yesterday five FBI agents raided the company's
offices in Santa Clara, California early Monday
morning. Reports said Day's computers and data
were seized, though Speedera would not confirm
this. The FBI declined to confirm or deny the
existence of an investigation.
http://www.theregister.co.uk/content/6/25915.html
http://zdnet.com.com/2100-1105-939728.html
http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3549293.htm

Yaha Worm Takes Out Pakistan Government's Site
Virus uses victim computers as denial-of-service
agents, and tries to recruit Indian hackers into
a cross-border cyber war. The official Web site
of the government of Pakistan is apparently the
victim of a politically motivated attack launched
by the latest version of an Internet worm. Virus
experts said the Yaha.E worm, first identified
on June 15, contains a payload designed in part
to disrupt the home page of the Islamic Republic
of Pakistan with a rudimentary denial of service
attack.
http://online.securityfocus.com/news/501

House bans "morphed" child pornography
The U.S. House of Representatives voted
overwhelmingly Tuesday to restrict computer-
generated sex images of minors. The 413-to-8
vote aims to circumvent a recent Supreme Court
decision that nixed an earlier ban on "morphed"
child pornography. A similar proposal has been
introduced in the Senate. With the enthusiastic
backing of both Democrats and Republicans, final
passage of a bill this year is all but certain.
http://news.com.com/2100-1023-939407.html
http://zdnet.com.com/2100-1104-939431.html

Porn bill skirts Supreme Court
http://www.washtimes.com/national/20020626-62122.htm

House passes law enforcement information-sharing bill
The House on Wednesday passed a bill that would
permit federal law enforcement authorities to
share information about potential terrorist
attacks with state and local authorities.
Passed by a vote of 422-2, the bill, H.R.
4598, would require the president to promulgate
guidelines for sharing classified and sensitive
intelligence information, as well as information
obtained through wiretaps or grand-jury
investigations.
http://www.govexec.com/dailyfed/0602/062602td2.htm

Bank crime data theft on the rise
At state banking convention, frustration is obvious.
Ski-mask wearing, gun-brandishing thieves dashing
out of banks with cash-stuffed moneybags are good
theater. But the truth is, bank robbers are a dying
breed. Only 2 percent of mounting bank crime losses
are now from physical robberies, according to the
Oregon Bankers Association. Today=92s crooks now hide
safely in another city, state, or halfway around
the world while they commit their crimes. And
often, it=92s not even the bank=92s money they want.
http://www.msnbc.com/news/772723.asp

Web site checks your credit card against stolen numbers
An anti-fraud education group that tipped federal
authorities to a major Internet credit card scheme
has opened a Web site that will let Americans
check to see if their card numbers are in the
hands of thieves. The database of stolen credit
card numbers, which became available on the Web
late Tuesday, was created over the last seven
weeks and has already identified nearly 100,000
credit card numbers, the group said.
http://www.nandotimes.com/technology/story/447251p-3580050c.html
http://www.usatoday.com/life/cyber/2002/06/26/identity-theft-site.htm
http://www.newsfactor.com/perl/story/18405.html
http://www.cnn.com/2002/TECH/internet/06/26/identity.theft.ap/index.html

How the Secret Service became cybercops
Trained in martial arts, sworn to secrecy, famous
for high-tech earplugs and icy stares, the oldest
law enforcement agency in the federal government
--the U.S. Secret Service--is now protecting our
national interests online. "Cybercrime today is
the equivalent of counterfeiting in the 1860s,"
said special agent John Frazzini, speaking to
security professionals at the NetSec 2002
conference in San Francisco last week. Frazzini
related the simple rationale behind the decision
to make the Secret Service, a law enforcement
agency best known for protecting the U.S.
president, our nation's elite cybercops: The
country needed someone to protect the economy.
http://zdnet.com.com/2100-1107-939425.html

Hackers play with the Xbox
The Xbox - entertaining inside and out Microsoft's
Xbox console may not be overpopular with computer
game players but it is rapidly winning fans in the
hardware hacking world. Computer scientists, smart
amateur engineers and others are taking the console
apart and creating modification chips and software
for the machine to make it do things Microsoft never
intended it to.
http://news.bbc.co.uk/hi/english/sci/tech/newsid_2067000/2067045.stm

How to Disappear
Your inbox is awash in spam, your boss is
chuckling over your credit report, and you've
got a sneaking suspicion that Uncle Sam counts
how many L=F6wenbr=E4u you chug. Yes, your privacy's
shot to hell, and you're tempted to shrug and
settle for an open source life. But privacy isn't
like virginity, forever lost after the first
trespass. With some work, "reprivatization" is
possible. Use this three-tiered guide to pick
a level of solitude. But be warned: Going all
the way off the grid is more Ted Kaczynski
than Howard Hughes.
http://www.wired.com/wired/archive/10.07/start.html?pg=3D14

Defending the PC invasions
Once a haven for anonymous surfers, the Internet
is more like a nudist colony--thanks to marketing
tools such as tracking devices and hidden software
that takes over your PC. Do we need regulations,
live with it or find a way to strike back?
http://zdnet.com.com/2251-1110-939057.html

Manager of FBI computer overhaul resigns
The executive in charge of overhauling the FBI's
antiquated computer system has resigned. The FBI
said Robert Chiaradio is leaving to take a job
at financial consulting giant KPMG. He was
elevated in December to one of the bureau's
top four administrative positions.
http://www.usatoday.com/life/cyber/tech/2002/06/26/fbi-computers.htm

Vietnam seeks to monitor customers at Internet cafes
Communist Vietnam plans to monitor customers
at Internet cafes to prevent them from accessing
politically and morally objectionable Web sites,
state-controlled media reported Wednesday.
Vietnam's government has recently sought to
toughen its control over access to information,
including foreign television broadcasts, as the
country opens up economically to the outside
world.
http://www.cnn.com/2002/TECH/internet/06/26/vietnam.internet.ap/index.html

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Will You Find True Love?
Will You Meet the One?
Free Love Reading by phone!
http://us.click.yahoo.com/ztNCyD/zDLEAA/Ey.GAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT