[iwar] Historical posting


From: Fred Cohen
From: fc@all.net
To: iwar@onelist.com

Mon, Jan 1, 1999


fc  Mon Jan 1, 1999
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA15269 for iwar@onelist.com; Tue, 18 Apr 2000 05:21:43 -0700
To: iwar@onelist.com
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, Jan 1, 1999
From: Fred Cohen 
Reply-To: iwar@egroups.com
Subject: [iwar] Historical posting

          

SANS: Cybersecurity risks real
On behalf of IT managers whose bosses may be skeptical about
security risks, the SANS Institute offered a briefing last week
that took participants on four virtual "field trips" to the sites
of cyberattacks. The Washington-based cooperative research and
education organization, which distributes information on computer
security issues, held the briefing at MITRE Corp.
http://www.computerworld.com/home/news.nsf/all/9910181sans

GAO: IT security law needed
Law would help direct disparate security policies
Agencies have improved the security of many information systems,
but the lack of clearly defined roles among agencies coordinating
security has hindered federal security experts' ability to protect
systems from intrusion, according to the General Accounting Office.
Agencies have spent the past two years plugging security holes in
computer systems, but it has been such an ad hoc effort that federal
security managers have been left without any coordinated guidance on
developing a fully secure government, GAO officials told the Senate
Judiciary Technology, Terrorism and Government Information
Subcommittee this month.
http://www.fcw.com/pubs/fcw/1999/1018/fcw-pollaw-10-18-99.html

BLOWN TO BITS: Cyberwarfare Breaks the Rules of Military Engagement
Sixteen years ago, in the movie "WarGames," Matthew Broderick
played a computer hacker who electronically ferrets his way into
the Pentagon's Norad early warning system inside Cheyenne Mountain,
Colo., and almost starts World War III by accident. Last week the
military finally struck back. The Pentagon created a new military
center to harness the nation's disparate cyberwarfare forces under
the Air Force Space Command at Peterson Air Force Base in Colorado
Springs. That followed the public acknowledgment by Gen. Henry H.
Shelton, chairman of the Joint Chiefs of Staff, that the United
States played hacker itself earlier this year -- waging a keyboard
war against Serbian computer networks.
http://www.nytimes.com/library/review/101799cyberwarfare-review.html

Spy in the sky? That could be Echelon Some fear snoops target e-mail,
calls Is the government listening in on your phone calls? Reading your
e-mail for words like "plutonium," "Clinton" or "terrorism"? Rep. Bob
Barr, R.-Ga., a former CIA analyst, worries it might be. The European
Parliament is concerned, too. So is a small group of computer users who
call themselves "hacktivists." They're so convinced we're all being
spied on that Thursday they're planning what may be the first mass
protest using electronic mail as a weapon.
http://www.uniontribune.com/news/uniontrib/sun/news/news_1n17spy.html

The the Ministry of Information Industry, Ministry of Public Security,
and Ministry of State Security in Hong Kong issued a joint memorandum
urging all state and private organizations to not connect internal
computer systems to the world wide internet. This is in direct response
to the threat of cyber attack from Taiwanese intruders. The Ministry of
Information and Industry have also established the China Computer
Network Security Management Center. Fearing that imported computers and
software may contain security holes, Trojan Horses, or Backdoors the
ministry is also asking that the development of domestically-made
computers and software systems be increased.

FC