Return-Path: <sentto-279987-4945-1025790853-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 04 Jul 2002 06:56:08 -0700 (PDT) Received: (qmail 27010 invoked by uid 510); 4 Jul 2002 13:53:54 -0000 Received: from n14.grp.scd.yahoo.com (66.218.66.69) by all.net with SMTP; 4 Jul 2002 13:53:54 -0000 X-eGroups-Return: sentto-279987-4945-1025790853-fc=all.net@returns.groups.yahoo.com Received: from [66.218.67.200] by n14.grp.scd.yahoo.com with NNFMP; 04 Jul 2002 13:54:13 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_7_4); 4 Jul 2002 13:54:03 -0000 Received: (qmail 29721 invoked from network); 4 Jul 2002 13:54:02 -0000 Received: from unknown (66.218.66.216) by m8.grp.scd.yahoo.com with QMQP; 4 Jul 2002 13:54:02 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.scd.yahoo.com with SMTP; 4 Jul 2002 13:54:02 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g64DsOv14247 for iwar@onelist.com; Thu, 4 Jul 2002 06:54:24 -0700 Message-Id: <200207041354.g64DsOv14247@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Thu, 4 Jul 2002 06:54:24 -0700 (PDT) Subject: [iwar] [NewsBits] NewsBits - 06/26/02 (fwd) Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=-4.9 required=5.0 tests=NEWSBITS,PORN_10,DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: June 26, 2002 U.S. finds clues to potential cyber-attack Dams, Utilities, 911 System Called Vulnerable Last fall, Mountain View police detective Chris Hsiung began investigating a pattern of surveillance against Silicon Valley computers. From the Middle East and South Asia, unknown browsers were exploring digital systems used to manage utilities and government offices. Hsiung, a high-tech crime specialist, alerted the FBI. http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3554402.htm http://online.securityfocus.com/news/502 http://www.washingtonpost.com/wp-dyn/articles/A50765-2002Jun26.html FBI raid sparks Akamai v. Speedera court battle Akamai Technologies Inc and Speedera Networks Inc took their increasingly bitter rivalry to court in San Francisco yesterday, with two lawsuits being filed after it emerged the FBI is investigating the alleged "hacking" of Akamai's confidential data by Speedera's CTO, Richard Day, Kevin Murphy. Speedera confirmed yesterday five FBI agents raided the company's offices in Santa Clara, California early Monday morning. Reports said Day's computers and data were seized, though Speedera would not confirm this. The FBI declined to confirm or deny the existence of an investigation. http://www.theregister.co.uk/content/6/25915.html http://zdnet.com.com/2100-1105-939728.html http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3549293.htm Yaha Worm Takes Out Pakistan Government's Site Virus uses victim computers as denial-of-service agents, and tries to recruit Indian hackers into a cross-border cyber war. The official Web site of the government of Pakistan is apparently the victim of a politically motivated attack launched by the latest version of an Internet worm. Virus experts said the Yaha.E worm, first identified on June 15, contains a payload designed in part to disrupt the home page of the Islamic Republic of Pakistan with a rudimentary denial of service attack. http://online.securityfocus.com/news/501 House bans "morphed" child pornography The U.S. House of Representatives voted overwhelmingly Tuesday to restrict computer- generated sex images of minors. The 413-to-8 vote aims to circumvent a recent Supreme Court decision that nixed an earlier ban on "morphed" child pornography. A similar proposal has been introduced in the Senate. With the enthusiastic backing of both Democrats and Republicans, final passage of a bill this year is all but certain. http://news.com.com/2100-1023-939407.html http://zdnet.com.com/2100-1104-939431.html Porn bill skirts Supreme Court http://www.washtimes.com/national/20020626-62122.htm House passes law enforcement information-sharing bill The House on Wednesday passed a bill that would permit federal law enforcement authorities to share information about potential terrorist attacks with state and local authorities. Passed by a vote of 422-2, the bill, H.R. 4598, would require the president to promulgate guidelines for sharing classified and sensitive intelligence information, as well as information obtained through wiretaps or grand-jury investigations. http://www.govexec.com/dailyfed/0602/062602td2.htm Bank crime data theft on the rise At state banking convention, frustration is obvious. Ski-mask wearing, gun-brandishing thieves dashing out of banks with cash-stuffed moneybags are good theater. But the truth is, bank robbers are a dying breed. Only 2 percent of mounting bank crime losses are now from physical robberies, according to the Oregon Bankers Association. Today=92s crooks now hide safely in another city, state, or halfway around the world while they commit their crimes. And often, it=92s not even the bank=92s money they want. http://www.msnbc.com/news/772723.asp Web site checks your credit card against stolen numbers An anti-fraud education group that tipped federal authorities to a major Internet credit card scheme has opened a Web site that will let Americans check to see if their card numbers are in the hands of thieves. The database of stolen credit card numbers, which became available on the Web late Tuesday, was created over the last seven weeks and has already identified nearly 100,000 credit card numbers, the group said. http://www.nandotimes.com/technology/story/447251p-3580050c.html http://www.usatoday.com/life/cyber/2002/06/26/identity-theft-site.htm http://www.newsfactor.com/perl/story/18405.html http://www.cnn.com/2002/TECH/internet/06/26/identity.theft.ap/index.html How the Secret Service became cybercops Trained in martial arts, sworn to secrecy, famous for high-tech earplugs and icy stares, the oldest law enforcement agency in the federal government --the U.S. Secret Service--is now protecting our national interests online. "Cybercrime today is the equivalent of counterfeiting in the 1860s," said special agent John Frazzini, speaking to security professionals at the NetSec 2002 conference in San Francisco last week. Frazzini related the simple rationale behind the decision to make the Secret Service, a law enforcement agency best known for protecting the U.S. president, our nation's elite cybercops: The country needed someone to protect the economy. http://zdnet.com.com/2100-1107-939425.html Hackers play with the Xbox The Xbox - entertaining inside and out Microsoft's Xbox console may not be overpopular with computer game players but it is rapidly winning fans in the hardware hacking world. Computer scientists, smart amateur engineers and others are taking the console apart and creating modification chips and software for the machine to make it do things Microsoft never intended it to. http://news.bbc.co.uk/hi/english/sci/tech/newsid_2067000/2067045.stm How to Disappear Your inbox is awash in spam, your boss is chuckling over your credit report, and you've got a sneaking suspicion that Uncle Sam counts how many L=F6wenbr=E4u you chug. Yes, your privacy's shot to hell, and you're tempted to shrug and settle for an open source life. But privacy isn't like virginity, forever lost after the first trespass. With some work, "reprivatization" is possible. Use this three-tiered guide to pick a level of solitude. But be warned: Going all the way off the grid is more Ted Kaczynski than Howard Hughes. http://www.wired.com/wired/archive/10.07/start.html?pg=3D14 Defending the PC invasions Once a haven for anonymous surfers, the Internet is more like a nudist colony--thanks to marketing tools such as tracking devices and hidden software that takes over your PC. Do we need regulations, live with it or find a way to strike back? http://zdnet.com.com/2251-1110-939057.html Manager of FBI computer overhaul resigns The executive in charge of overhauling the FBI's antiquated computer system has resigned. The FBI said Robert Chiaradio is leaving to take a job at financial consulting giant KPMG. He was elevated in December to one of the bureau's top four administrative positions. http://www.usatoday.com/life/cyber/tech/2002/06/26/fbi-computers.htm Vietnam seeks to monitor customers at Internet cafes Communist Vietnam plans to monitor customers at Internet cafes to prevent them from accessing politically and morally objectionable Web sites, state-controlled media reported Wednesday. Vietnam's government has recently sought to toughen its control over access to information, including foreign television broadcasts, as the country opens up economically to the outside world. http://www.cnn.com/2002/TECH/internet/06/26/vietnam.internet.ap/index.html ------------------------ Yahoo! Groups Sponsor ---------------------~--> Will You Find True Love? Will You Meet the One? Free Love Reading by phone! http://us.click.yahoo.com/ztNCyD/zDLEAA/Ey.GAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT