[iwar] Historical posting


From: Fred Cohen
From: fc@all.net
To: iwar@onelist.com

Mon, Jan 1, 1999


fc  Mon Jan 1, 1999
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA15269 for iwar@onelist.com; Tue, 18 Apr 2000 05:21:43 -0700
To: iwar@onelist.com
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, Jan 1, 1999
From: Fred Cohen 
Reply-To: iwar@egroups.com
Subject: [iwar] Historical posting

          

[Obviously, the media has noticed the recent denial of service attacks
and that is dominating the news. There is also a lot of misinformation,
particularly on CNN, particularly from their supposed experts. I will
not include every story in this area I come across - only the really
interesting ones. Please feel free to post any that you find that you
think are worthy and that I have missed. - FC]

-- 4 February 2000 IETF Excludes Wiretapping
The Internet Engineering Task Force (IETF) has voted against incorporating
wiretapping capabilities into the next generation of Internet protocols.
The IETF says that because it is an international standards organization,
incorporating net wiretapping would subject the rest of the world to US
law. The IETF also expressed concerns that built-in net tapping
capabilities hold the potential for abuse.
http://www.wired.com/news/print/0,1294,34055,00.html
http://www.currents.net/newstoday/00/02/04/news4.html

-- 4 February 2000 The Human Element in Information Security
Both ex-CIA director John Deutch and Energy Department scientist Wen Ho
Lee placed classified information on unsecured computers. Government
officials say this is a human problem, not a technological problem.
http://www.wired.com/news/print/0,1294,34105,00.html
http://www.fcw.com/fcw/articles/2000/0131/web-security-02-04-00.asp

-- 3 February 2000 Activists Taking a New Tack in Patrolling the Web
Former cyber vigilantes bent on ridding the Internet of child pornography
have changed their tactics. Rather than engaging in illegal and
evidence-destroying activities, they are patrolling the Internet and
turning information over to law enforcement authorities. One of the
more thought-provoking elements of the story is that fewer than a dozen
of the 250 members stuck with the group when it went "legal."
http://www.wired.com/news/print/0,1294,33869,00.html

-- 3 February 2000 Cyber Threats
The US's reliance on information technology is both an asset and a
liability. The technology of information warfare can magnify the range
and effect of a single attacker, according to the directors of the CIA
and the DIA (Defense Intelligence Agency). Intelligence suggests that
Middle East terrorist groups are using computers and encryption. Most
adversaries, however, are not sophisticated enough to launch a
comprehensive information systems attack.
http://www.currents.net/newstoday/00/02/03/news19.html

-- 2 February 2000 Java Machine Hole
A security hole in Microsoft's Java virtual machine could allow attackers
to lift files from computers by inserting code into a Java applet and
them embedding it in a web page.
http://www.zdnet.com/zdnn/stories/news/0,4586,2431555,00.html

FC