[iwar] Historical posting


From: Fred Cohen
From: fc@all.net
To: iwar@onelist.com

Mon, Jan 1, 1999


fc  Mon Jan 1, 1999
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA15269 for iwar@onelist.com; Tue, 18 Apr 2000 05:21:43 -0700
To: iwar@onelist.com
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, Jan 1, 1999
From: Fred Cohen 
Reply-To: iwar@egroups.com
Subject: [iwar] Historical posting

          

FBI beefs up cyberagent squads nationwide
The FBI plans to reinforce its mission to counter cyberattacks
with the formation of new investigative teams specializing in
computer intrusions and attacks at all 56 of its field offices
around the country. The agency also plans to assign at least
one computer forensics examiner to each field office. The
National Plan for Information Systems Protection, released on
Jan. 12 by President Clinton, outlines plans for the FBI's
National Infrastructure Protection Center (NIPC) to establish
a National Infrastructure Protection and Computer Intrusion
Program in the agency's counterterrorism division. The NIPC
is charged with centrally managing the nation's defense of
telecommunications systems, railroads and electric power
systems against attacks. The plan calls for computer-intrusion
squads to conduct network intrusion detection, respond to
threats, collect intelligence and conduct counterintelligence
investigations.
http://www.fcw.com/fcw/articles/web-fbi-01-14-00.asp

Hacker Trackers Trace Online Blackmailer
Security info site tracks CD Universe credit-card
thief to a Latvian bank account. The founder of a
security information site said he knows who is
behind last month's credit-card heist and extortion
attempt at online music retailer CD Universe.
AntiOnline.com founder John Vranesevich said an
investigation by his staff has revealed that the
hacker, who goes by the handle Maxus, is a man named
Maxim Ivancov and is from either Latvia or Russia.
http://www.zdnet.com/zdtv/cybercrime/news/story/0,3700,2127897,00.html

World Cybercrime Treaty May Be Underway
Unconfirmed reports circulating on the Usenet suggest
that the US government is working with the European
Union (EU), Japan, Canada and other countries, including
South Africa, on a draft cybercrime treaty that would
try to ban hacking and Internet eavesdropping utilities.
The move, if true, would be the first time that
legislatures have started to tackle the issue of Internet
security since the Internet first was developed. While
individual governments, most notably the US, have striven
to introduce such legislation, the international nature
of the Internet has caused problems enforcing such laws,
Newsbytes notes. However, a treaty between the US, the
sprawling EU countries and others would make life a lot
easier for enforcers, especially since a sizable portion
of the Internet and its servers resides in the US and EU
territories.
http://www.newsbytes.com/pubNews/00/142185.html

Publish away! Ford Motor Company will not appeal a
ruling that lets a journalist publish the company's
top-secret business strategies and product plans on
the Internet. The site contains articles and use
data taken from confidential company documents.
http://www.freep.com/business/blue14_20000114.htm

Encrypted politics: The change in encryption regulations
announced by the Clinton administration earlier this week
makes for an interesting twist in the case of a graduate
student who previously could have faced felony charges for
posting a simple computer program to the sci.crypt Usenet
newsgroup. But the resolution of the case may not be as
clear-cut as it seems.
http://www.wired.com/news/politics/0,1283,33651,00.html

Crypto compromise a lawyer's delight
Even as industry celebrated the Clinton administration's
new, more liberal rules on export of encryption technology,
civil libertarians said Thursday that the new regulations
raise some of the same issues as the old ones. "These
regulations are preserving the ability of the government
to get in the way of the export and the use of strong
cryptography," said ACLU Associate Director Barry
Steinhardt. "They've been unwilling to simply deregulate,
I think, because of pressure from the NSA and the FBI,
who are unwilling to give up the ghost."
http://www3.zdnet.com/zdnn/stories/news/0,4586,2422348,00.html

National security plan calls for security standards
Federal agencies planning information technology procurements
will need to incorporate information assurance products,
systems and services into major purchases, according to a new
national computer security plan announced by President Clinton.
The National Plan for Information Systems Protection called for
incorporation of information assurance products into pending
procurements while a triad of agencies work to revise procurement
regulations to require incorporation of standard cyberprotection
products and services. The plan, released on Jan. 12, calls for
the General Services Administration, the Defense Department and
the Office of Management and Budget -- working in conjunction
with the National Institute of Standards and the National
Security Agency -- to develop the information assurance
standards and regulations.
http://www.fcw.com/fcw/articles/web-security-01-14-00.asp

Pentagon to launch high-assurance PKI test
The Defense Department this week selected General Dynamics
Communications Systems to conduct a one-year pilot program
that will evaluate the feasibility of outsourcing systems
that protect some of the department's most privileged
information. Under its public-key infrastructure (PKI)
roadmap -- the plan that assures that only authorized
people have access to the agency's electronic information
-- DOD already issues medium-assurance Class 3 certificates
to its employees and contractors. Digital certificates hold
encrypted information that often includes a user's identity
and a user's authorization for applications.
http://www.fcw.com/fcw/articles/web-pki-01-14-00.asp

Email Bombing
CNN continues its monitoring of the barbarians on the Web.
A recent headline was "eToys Attacks Show Need for Strong
Web Defenses." The report examined the recent Denial of
Service attacks on eToys's servers. Denial of Service (DoS)
attacks, strange variants in the computer crime arena, often
occur without clear economic motive. Usually, they arise
from anarchistic impulses within the computer underground.
And, email bombing is one of the easiest DoS attacks for the
Huns of the Internet to perfect.
http://securityportal.com/direct.cgi?/topnews/ebomb20000114.html

Russian Parliament Debates Net regulation
The Committee of Information Politics and Communications
of the State Duma (the lower house of Russian parliament)
has started public debates on a legislative initiative
regarding the Internet. One of the key issues of the bill
which is under development is electronic commerce, based
on up-to-date telecommunication technologies. Committee
Chairman O. A. Finko said that lack of legislation for
governing the Internet, as well as the inefficiency of
applying existing legislation and regulations to this
field, already plays a negative role in Internet
development in Russia. There is a lot of problems
requiring thorough investigation from a legislation
viewpoint. Among them, Mr. Finko quoted data security,
with special emphasis on security of personal data,
protection against information attacks to mailboxes,
security of economic transactions on the Internet, and
protection of intellectual property.
http://www.newsbytes.com/pubNews/00/142204.html

FC