[iwar] Historical posting


From: Fred Cohen
From: fc@all.net
To: iwar@onelist.com

Mon, Jan 1, 1999


fc  Mon Jan 1, 1999
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA15269 for iwar@onelist.com; Tue, 18 Apr 2000 05:21:43 -0700
To: iwar@onelist.com
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, Jan 1, 1999
From: Fred Cohen 
Reply-To: iwar@egroups.com
Subject: [iwar] Historical posting

          

10 January 2000 Taiwan Budgets for Information Warfare
The head of Taiwan's Defense Ministry's Information and Communications
Bureau says that the country is allocating more money for information
warfare. They have already catalogued over 1,000 viruses that could be
used in attacks.
http://news.bbc.co.uk/hi/english/world/asia-pacific/newsid_597000/597087.stm

7 January 2000 FBI Works to Avert Threats
The FBI says it has taken steps to avert cyberthreats, including threats
to blow up power plants, cyber intrusions, and detection of distributed
denial of service tools.
http://news.cnet.com/category/0-1009-200-1516401.html

7 January 2000 White House Cyber Security Plan
Because the private sector controls the vast majority of the nation's
critical infrastructure, the White House wants to form a
government/private partnership to address security issues.
http://www.computerworld.com/home/print.nsf/all/000107DB3A

7 January 2000 White House Plan for Cyber Security
The Clinton administration announced its $2 billion plan to protect the
nation's critical infrastructure against cyber attacks. The plan creates
a centralized government intrusion detection system to be administered
by the General Services Administration (GSA), establishes scholarships
to encourage computer security majors to join the government, and builds
a partnership with the private sector, which owns and operates 95% of
the nation's critical infrastructure.
http://www.msnbc.com/news/354722.asp
http://www.thestandard.com/article/display/0,1151,8661,00.html
http://dailynews.yahoo.com/h/ap/20000107/ts/clinton_cyber_terrorism_4.html

6 January 2000 FAA Computer Problem Grounds Flights
A data transfer problem between a peripheral device and a main computer
in a Federal Aviation Administration (FAA) air traffic control center
forced a switch to a slower back-up system, which resulted in grounded
flights at major airports in the Northeast. The problem was apparently
not Y2K-related. http://news.cnet.com/category/0-1005-200-1515688.html
http://www.computerworld.com/home/print.nsf/all/000106DA42
http://www.currents.net/newstoday/00/01/07/news1.html

5 January 2000 FAA Violated Security Policies, According to GAO Report
A report released by the General Accounting Office (GAO) suggests that
the Federal Aviation Administration (FAA), in violation of its own
security policy, did not investigate subcontractors hired to fix Y2K
computer problems, putting air traffic control systems at risk for
intrusions and attacks. Once the agency was informed of the problem,
they did perform the necessary checks.
http://www.computerworld.com/home/print.nsf/all/000105D9EA

5 January 2000 Judge Questions Army's Web Site Security Efforts
The judge presiding over the case of a cracker who has admitted defacing
the US Army's web site said that the amount of restitution the defendant
will pay may depend on the Army's effort to maintain the site's security.
http://dailynews.yahoo.com/h/ap/20000105/tc/army_web_site_1.html

5 January 2000 Pentagon's Information Attack Plan
The Pentagon is developing information attack procedures for approval
by the Secretary of Defense. The issue raises a number of legal and
policy questions: Do on-line attacks constitute an act of war? Who
should approve such attacks: the president, Congress, or the Pentagon?
http://www.wired.com/news/politics/0,1283,33443,00.html

5 January 2000 Intel Server Appliance Glitch
A back door in an Intel server appliance, designed to allow the
manufacturer remote access if the client is experiencing trouble, could
allow malicious crackers to delete files and gain control of customers'
e-mail functions. Intel will publish code to close the back door.
http://news.cnet.com/category/0-1003-200-1515150.html

FC