[iwar] Historical posting


From: Fred Cohen
From: fc@all.net
To: iwar@onelist.com

Mon, Jan 1, 1999


fc  Mon Jan 1, 1999
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA15269 for iwar@onelist.com; Tue, 18 Apr 2000 05:21:43 -0700
To: iwar@onelist.com
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, Jan 1, 1999
From: Fred Cohen 
Reply-To: iwar@egroups.com
Subject: [iwar] Historical posting

          

Clinton anti-hack plan attacked
A White House plan to protect telecommunications, energy and other key systems from cyberattacks relies too much on detecting intrusions and not enough on improving security, a report by Congress' investigative arm said Tuesday. President Clinton last month proposed spending $2 billion to eliminate computers' vulnerability to hackers and terrorists in key parts of government and private infrastructure. But in a report to Congress, the General Accounting Office complained that the Critical Infrastructure Protection Plan favored elaborate means of detecting improper computer intrusions over making key systems more secure. http://www.zdnet.com/zdnn/stories/news/0%2C4586%2C2431233%2C00.html http://www.infoworld.com/articles/en/xml/00/02/01/000201enprivate.xml

Senators call for larger DoD role in cyber-security In Congress's first examination of the Clinton administration's cyberterrorism plan, a Senate subcommittee cautioned Tuesday that the Defense Department and other national security agencies are not given a big enough role under the White House's proposal. During a hearing before the Senate Judiciary Committee's Technology and Terrorism Subcommittee, Sens. Jon Kyl, R-Ariz., chairman of the panel, and Robert Bennett, R-Utah, head of the Senate's Y2K committee, questioned why the FBI is playing the lead role in coordinating the administration's cyberterrorism activities when the Defense Department and National Security Agency have more experience in dealing with the issue. http://www.govexec.com/dailyfed/0200/020200b4.htm

Cyber Safe or Gov't Surveillance?
A government plan to monitor networks for intrusions goes too far and will lead to increased surveillance and privacy violations, a civil liberties group told a Senate panel on Tuesday. The Electronic Privacy Information Center said a memo it obtained last week shows that the Clinton administration's FIDNET proposal for "information systems protection" will result in unwarranted spying on Americans. Documents the group received through a Freedom of Information Act request indicate the administration is considering broad access to credit card and phone records of private citizens and monitoring of government workers' computers, EPIC director Marc Rotenberg told the Senate judiciary subcommittee on technology and terrorism. http://www.wired.com/news/politics/0,1283,34027,00.html

Security and privacy must go hand-in-hand
By securing its computer systems, the federal government is protecting citizens' privacy. But in doing so, the government must respect civil liberties, public- and private-sector officials said Tuesday at a hearing of the Senate Judiciary Subcommittee on Technology, Terrorism and Government Information. The hearing came less than a month after the Clinton administration released its National Plan for Information Systems Protection, the first version of a plan to protect U.S. computer systems. Sections of the plan have raised privacy and civil liberties concerns from Congress and public interest groups -- especially the Federal Intrusion Detection Network (FIDNet), a program intended to coordinate intrusion detection capabilities across civilian agencies. But that only means that the government must revise the plan, not scrap it, officials said. http://www.fcw.com/fcw/articles/2000/0131/web-privacy-02-02-00.asp

Tech Execs Want a National Security Czar and Protection Plan CIO Magazine Poll Reveals Security a Major Concern for Top Executives A new CIO KnowPulse(SM) poll, conducted by IDG's CIO magazine, reveals 62% of the nation's leading technology and business executives believe President Clinton should appoint a security czar (similar to John Koskinen's role as Y2K czar) to serve as a watchdog on technology related national security. The poll of 191 chief information officers (CIOs)-- the most technology-savvy individuals in the world -- was deployed January 31, 2000, at The CIO Enterprise Value Retreat. http://www.prnewswire.com/cgi-bin/stories.pl?ACCT=104&STORY=/www/story/02-02-2000/0001130104&EDATE=

FC