Return-Path: <sentto-279987-4982-1026698969-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sun, 14 Jul 2002 19:16:11 -0700 (PDT) Received: (qmail 10282 invoked by uid 510); 15 Jul 2002 02:08:51 -0000 Received: from n38.grp.scd.yahoo.com (66.218.66.106) by all.net with SMTP; 15 Jul 2002 02:08:51 -0000 X-eGroups-Return: sentto-279987-4982-1026698969-fc=all.net@returns.groups.yahoo.com Received: from [66.218.67.195] by n38.grp.scd.yahoo.com with NNFMP; 15 Jul 2002 02:09:30 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_7_4); 15 Jul 2002 02:09:29 -0000 Received: (qmail 8382 invoked from network); 15 Jul 2002 02:09:29 -0000 Received: from unknown (66.218.66.216) by m2.grp.scd.yahoo.com with QMQP; 15 Jul 2002 02:09:29 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.scd.yahoo.com with SMTP; 15 Jul 2002 02:09:29 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g6F2AeW30868 for iwar@onelist.com; Sun, 14 Jul 2002 19:10:40 -0700 Message-Id: <200207150210.g6F2AeW30868@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sun, 14 Jul 2002 19:10:38 -0700 (PDT) Subject: [iwar] [NewsBits] NewsBits - 07/10/02 (fwd) Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=-5.0 required=5.0 tests=NEWSBITS,DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: July 10, 2002 al-Qaeda poised to strike hard via the Internet Every few months some naive twinkie in the mainstream press re-writes the government's urban myth of terrorists slithering through cyberspace, preparing to blow up a small city with the awesome power of the computer mouse. Lately the frequency of these press infomercials has been increasing, most likely in response to a Federal PR campaign supporting Dubya's sales pitch for a new Department of Homeland Defence, a piece of bureaucratic window-dressing engineered to produce a nation-wide illusion of safety. http://www.theregister.co.uk/content/6/26134.html Militants Wire Web with Links to Jihad Islamic Groups Earlier this year, officials say, they found nearly 2,300 encrypted messages and data files in a password-protected section of an Islamic Web site. One Web site urges Muslims to travel to Pakistan to "slaughter American soldiers." Another solicits donations to buy dynamite to "blow up Israeli Jews." A third shows previously unaired videotape of Osama bin Laden and promises film clips of American casualties in Afghanistan. http://www.newsfactor.com/perl/story/18535.html Tech shores up Homeland Security Computer security is becoming an increasingly critical part of President Bush's proposal for a homeland defense department. When Bush formally proposed the department last month, he predicted that the future agency would aid in investigating Al Qaeda and thwarting disasters similar to those of Sept. 11. In the televised address, he never mentioned the Internet or so-called cybersecurity. But as Capitol Hill scrutinizes the proposal, politicians are fretting about tech-savvy terrorists--and insisting any new agency must shield the United States from electronic attacks as well. http://zdnet.com.com/2100-1105-942709.html The tech side of homeland defense http://news.com.com/2009-1023-942766.html Homeland Security Department would face cybersecurity problems, GAO warns http://www.gcn.com/vol1_no1/daily-updates/19256-1.html Homeland Defense Focuses on High-Tech Threats http://www.newsfactor.com/perl/story/18549.html Bush security could get privacy czar President Bush's proposed Department of Homeland Security is likely to get its own privacy czar. A panel in the House of Representatives is scheduled to vote this week on a plan to add a chief privacy officer to the planned agency. A draft of the legislation seen by CNET News.com states that the Secretary of Homeland Security must appoint a privacy officer to ensure that new technologies "sustain and do not erode" privacy protections and to verify that the agency's massive databases operate within federal guidelines. http://zdnet.com.com/2100-1105-942758.html ISPs face data interception deadline From 1 August, ISPs in the UK will be required to be able to intercept your data. Yet the Home Office has failed to explain how they will be reimbursed. And the rules mean that criminals will easily be able to avoid interception. ISPs across the UK will have to start intercepting and storing electronic communications including emails, faxes and Web surfing data from 1 August, but there still appear to be glaring loopholes in the legislation. http://news.zdnet.co.uk/story/0,,t269-s2118894,00.html Security flaw afflicts popular technology for encrypting e-mail The world's most popular software for scrambling sensitive e-mails suffers from a programming flaw that could allow hackers to attack a user's computer and, in some circumstances, unscramble messages. The software, called Pretty Good Privacy, or PGP, is the de facto standard for encrypting e-mails and is widely used by corporate and government offices, including some FBI agents and U.S. intelligence agencies. The scrambling technology is so powerful that until 1999 the federal government sought to restrict its sale out of fears that criminals, terrorists and foreign nations might use it. http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3638319.htm http://www.nandotimes.com/technology/story/462401p-3698868c.html http://www.msnbc.com/news/778746.asp Cyberterrorists don't care about your PC Hackers have broken into financial institutions' computer systems, and put popular Web sites temporarily out of business with distributed denial-of-service attacks. But this is not the sort of thing that keeps most security experts up late at night. What keeps them awake is worrying about the underlying systems that control the local power grids, the local drinking water treatment facilities, and the gas that's used to heat our homes. These resources are vulnerable, and a malicious user anywhere in the world could someday bring your day to a screaming halt--whether or not you use a computer. http://zdnet.com.com/2100-1107-942701.html Steal This Software In Asia, intellectual property rights are not held in the same regard as in the United States and other copyright-minded countries, according to IDC's Dan Kusnetzky. The word "piracy" used to conjure up images of marauders on the high seas, with skull-and-crossbones flag flapping above a battered -- yet potentially deadly -- vessel. Today's pirates, on the other hand, tend to steal software. They may not have knives in their teeth, but there is ill-gotten booty in their holds nonetheless. http://www.newsfactor.com/perl/story/18531.html Detecting and Containing IRC-Controlled Trojans: When Firewalls, AV, and IDS Are Not Enough This paper discusses IRC-based trojans as a distinctly underestimated class of malicious activity, and how real time security event monitoring is the key to identifying and containing similar compromises. It discusses the general methodology used to discover, track, and stop such malicious activity by presenting a real-world case study. http://online.securityfocus.com/infocus/1605 Is your storage encrypted? You're exposing yourself to significant risk as long as the data on your network (data in transit) and in your storage (data at rest) is not encrypted. That's what a paranoid security specialist will tell you. Is it true? That depends on the sensitivity of your data and on any government regulations that require the data to be encrypted--in the healthcare industry, for example. http://techupdate.zdnet.com/techupdate/stories/main/0,14179,2873532,00.html ------------------------ Yahoo! Groups Sponsor ---------------------~--> Save on REALTOR Fees http://us.click.yahoo.com/Xw80LD/h1ZEAA/Ey.GAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT