[iwar] Historical posting


From: Fred Cohen
From: fc@all.net
To: iwar@onelist.com

Mon, Jan 1, 1999


fc  Mon Jan 1, 1999
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA15269 for iwar@onelist.com; Tue, 18 Apr 2000 05:21:43 -0700
To: iwar@onelist.com
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, Jan 1, 1999
From: Fred Cohen 
Reply-To: iwar@egroups.com
Subject: [iwar] Historical posting

          

'Hactivists' plan DDoS Web attack
Electrohippies' software could be as effective as distributed
denial of service tools used in last month's Web attacks.
Borrowing a page from the headline-grabbing Web attacks last
month, a group of Internet activists is set to release its
own software tool designed to cripple Web sites. The
distributed denial of service attack tool to be released by
the "Electrohippies" group will allow thousands of protesters
to aim their computers at a single Web site, effectively
jamming a company's Internet presence. But the attacks will
be fundamentally different from last month's crippling of
Yahoo, eBay and other major sites. The victims will be warned
before the attacks, according to the tool's authors.
http://www.msnbc.com/news/380065.asp

Reno Urges New Laws, No Anonymity for Internet
A new government report says that some laws may need to be
revamped to deal with today's computer technology, and the
days of the Internet providing its users a cloak of anonymity
could be numbered. Those are some of the key conclusions
included in "The Electronic Frontier: The Challenge of Unlawful
Conduct Involving the Use of the Internet," which was released
today by Attorney General Janet Reno and prepared by a special
working group of high-ranking federal law enforcement officials,
as well as other government agencies.
http://www.apbnews.com/newscenter/internetcrime/2000/03/09/netreport0309_01.html
http://www.mercurycenter.com/svtech/news/breaking/ap/docs/300656l.htm
http://www.wired.com/news/business/0,1367,34874,00.html?&_ref=549091457
http://www.fcw.com/fcw/articles/2000/0306/web-6netcrime-03-08-00.asp
http://news.cnet.com/news/0-1005-200-1568285.html
[the other view]
http://www.zdnet.com/zdnn/stories/news/0,4586,2458291,00.html

Rep. Horn Calls For Cyber Security Czar
As the federal government spawns one initiative after another
to secure the nation's networks and critical infrastructure
from cyber attack, lawmakers and security experts are
suggesting the appointment of a "cyber security czar" to
coordinate the far-flung efforts, much like Y2K Czar John
Koskinen was to the nation's Y2K remediation efforts. In a
hearing before the House Subcommittee on Government Management,
Information and Technology, Chariman Stephen Horn, R-Calif.,
pointed to the government's many security management players
and asked whether there shouldn't be one entity coordinating
the government's efforts. "Y2K underscored the need for a
disciplined management approach to problem solving," Horn said.
"That type of commitment will be equally important as we turn
to the second technological challenge of the New Year -
computer security." Horn then turned to the witnesses, asking,
"Could the Koskinen model work here?"
http://www.newsbytes.com/pubNews/00/145383.html
http://www.govexec.com/dailyfed/0300/031000b4.htm

FC