[iwar] [NewsBits] NewsBits - 07/10/02 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2002-07-14 19:10:38


Return-Path: <sentto-279987-4982-1026698969-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sun, 14 Jul 2002 19:16:11 -0700 (PDT)
Received: (qmail 10282 invoked by uid 510); 15 Jul 2002 02:08:51 -0000
Received: from n38.grp.scd.yahoo.com (66.218.66.106) by all.net with SMTP; 15 Jul 2002 02:08:51 -0000
X-eGroups-Return: sentto-279987-4982-1026698969-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.195] by n38.grp.scd.yahoo.com with NNFMP; 15 Jul 2002 02:09:30 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_7_4); 15 Jul 2002 02:09:29 -0000
Received: (qmail 8382 invoked from network); 15 Jul 2002 02:09:29 -0000
Received: from unknown (66.218.66.216) by m2.grp.scd.yahoo.com with QMQP; 15 Jul 2002 02:09:29 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.scd.yahoo.com with SMTP; 15 Jul 2002 02:09:29 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g6F2AeW30868 for iwar@onelist.com; Sun, 14 Jul 2002 19:10:40 -0700
Message-Id: <200207150210.g6F2AeW30868@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sun, 14 Jul 2002 19:10:38 -0700 (PDT)
Subject: [iwar] [NewsBits] NewsBits - 07/10/02 (fwd)
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=-5.0 required=5.0 tests=NEWSBITS,DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: 

July 10, 2002

al-Qaeda poised to strike hard via the Internet
Every few months some naive twinkie in the
mainstream press re-writes the government's
urban myth of terrorists slithering through
cyberspace, preparing to blow up a small city
with the awesome power of the computer mouse.
Lately the frequency of these press infomercials
has been increasing, most likely in response to
a Federal PR campaign supporting Dubya's sales
pitch for a new Department of Homeland Defence,
a piece of bureaucratic window-dressing
engineered to produce a nation-wide illusion
of safety.
http://www.theregister.co.uk/content/6/26134.html

Militants Wire Web with Links to Jihad Islamic Groups
Earlier this year, officials say, they found
nearly 2,300 encrypted messages and data files
in a password-protected section of an Islamic
Web site. One Web site urges Muslims to travel
to Pakistan to "slaughter American soldiers."
Another solicits donations to buy dynamite to
"blow up Israeli Jews." A third shows previously
unaired videotape of Osama bin Laden and promises
film clips of American casualties in Afghanistan.
http://www.newsfactor.com/perl/story/18535.html

Tech shores up Homeland Security
Computer security is becoming an increasingly
critical part of President Bush's proposal
for a homeland defense department. When Bush
formally proposed the department last month,
he predicted that the future agency would aid
in investigating Al Qaeda and thwarting disasters
similar to those of Sept. 11. In the televised
address, he never mentioned the Internet or
so-called cybersecurity. But as Capitol Hill
scrutinizes the proposal, politicians are
fretting about tech-savvy terrorists--and
insisting any new agency must shield the
United States from electronic attacks as well.
http://zdnet.com.com/2100-1105-942709.html

The tech side of homeland defense
http://news.com.com/2009-1023-942766.html
Homeland Security Department would face cybersecurity problems, GAO warns
http://www.gcn.com/vol1_no1/daily-updates/19256-1.html
Homeland Defense Focuses on High-Tech Threats
http://www.newsfactor.com/perl/story/18549.html

Bush security could get privacy czar
President Bush's proposed Department of Homeland
Security is likely to get its own privacy czar.
A panel in the House of Representatives is
scheduled to vote this week on a plan to add
a chief privacy officer to the planned agency.
A draft of the legislation seen by CNET News.com
states that the Secretary of Homeland Security
must appoint a privacy officer to ensure that
new technologies "sustain and do not erode"
privacy protections and to verify that the
agency's massive databases operate within
federal guidelines.
http://zdnet.com.com/2100-1105-942758.html

ISPs face data interception deadline
 From 1 August, ISPs in the UK will be required
to be able to intercept your data. Yet the Home
Office has failed to explain how they will be
reimbursed. And the rules mean that criminals
will easily be able to avoid interception. ISPs
across the UK will have to start intercepting
and storing electronic communications including
emails, faxes and Web surfing data from 1 August,
but there still appear to be glaring loopholes
in the legislation.
http://news.zdnet.co.uk/story/0,,t269-s2118894,00.html

Security flaw afflicts popular technology for encrypting e-mail
The world's most popular software for scrambling
sensitive e-mails suffers from a programming
flaw that could allow hackers to attack a user's
computer and, in some circumstances, unscramble
messages. The software, called Pretty Good Privacy,
or PGP, is the de facto standard for encrypting
e-mails and is widely used by corporate and
government offices, including some FBI agents
and U.S. intelligence agencies. The scrambling
technology is so powerful that until 1999 the
federal government sought to restrict its sale
out of fears that criminals, terrorists and
foreign nations might use it.
http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3638319.htm
http://www.nandotimes.com/technology/story/462401p-3698868c.html
http://www.msnbc.com/news/778746.asp

Cyberterrorists don't care about your PC
Hackers have broken into financial institutions'
computer systems, and put popular Web sites
temporarily out of business with distributed
denial-of-service attacks. But this is not the
sort of thing that keeps most security experts
up late at night. What keeps them awake is
worrying about the underlying systems that
control the local power grids, the local
drinking water treatment facilities, and
the gas that's used to heat our homes. These
resources are vulnerable, and a malicious user
anywhere in the world could someday bring your
day to a screaming halt--whether or not you
use a computer.
http://zdnet.com.com/2100-1107-942701.html

Steal This Software
In Asia, intellectual property rights are not held
in the same regard as in the United States and
other copyright-minded countries, according to
IDC's Dan Kusnetzky. The word "piracy" used to
conjure up images of marauders on the high seas,
with skull-and-crossbones flag flapping above
a battered -- yet potentially deadly -- vessel.
Today's pirates, on the other hand, tend to steal
software. They may not have knives in their teeth,
but there is ill-gotten booty in their holds
nonetheless.
http://www.newsfactor.com/perl/story/18531.html

Detecting and Containing IRC-Controlled Trojans:
When Firewalls, AV, and IDS Are Not Enough
This paper discusses IRC-based trojans as a
distinctly underestimated class of malicious
activity, and how real time security event
monitoring is the key to identifying and
containing similar compromises. It discusses
the general methodology used to discover,
track, and stop such malicious activity
by presenting a real-world case study.
http://online.securityfocus.com/infocus/1605

Is your storage encrypted?
You're exposing yourself to significant risk as
long as the data on your network (data in transit)
and in your storage (data at rest) is not encrypted.
That's what a paranoid security specialist will tell
you. Is it true? That depends on the sensitivity of
your data and on any government regulations that
require the data to be encrypted--in the healthcare
industry, for example.
http://techupdate.zdnet.com/techupdate/stories/main/0,14179,2873532,00.html

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Save on REALTOR Fees
http://us.click.yahoo.com/Xw80LD/h1ZEAA/Ey.GAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT