[iwar] news


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Tue, 13 Jun 2000 06:36:49 -0700 (PDT)


fc  Tue Jun 13 06:38:14 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Tue, 13 Jun 2000 06:38:14 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Tue Jun 13 13:38:07 2000)
X-From_: sentto-279987-405-960903457-fc=all.net@returns.onelist.com  Tue Jun 13 08:37:33 2000
Received: from ef.egroups.com (ef.egroups.com [207.138.41.172]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id IAA05534 for ; Tue, 13 Jun 2000 08:37:33 -0500
X-eGroups-Return: sentto-279987-405-960903457-fc=all.net@returns.onelist.com
Received: from [10.1.10.37] by ef.egroups.com with NNFMP; 13 Jun 2000 13:37:39 -0000
Received: (qmail 14642 invoked from network); 13 Jun 2000 13:36:51 -0000
Received: from unknown (10.1.10.26) by m3.onelist.org with QMQP; 13 Jun 2000 13:36:51 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta1 with SMTP; 13 Jun 2000 13:36:50 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id GAA32294 for iwar@onelist.com; Tue, 13 Jun 2000 06:36:50 -0700
Message-Id: <200006131336.GAA32294@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Tue, 13 Jun 2000 06:36:49 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Los Alamos lab says Nuclear weapons secrets missing
U.S. and Russian nuclear secrets stored on hard
drives at the Los Alamos National Laboratory are
missing from a vault there, the New York Times
said on Monday. Laboratory director John Browne
confirmed that electronic classified information
was missing but declined to give details. He said
that the FBI and investigators from the Department
of Energy, which operates the world-famous nuclear
facility with the university of California, were
hunting for it.
http://www.mercurycenter.com/svtech/news/breaking/reuters/docs/89253l.htm

Hacker defaces a HK Govt. Web site
A (Hong Kong) government Web site was shut down
Saturday after it was defaced by a hacker. A
government statement said the hacker left two
messages on the Web site of the Interactive
Government Services Directory, which provides
a investment guide and information about road
traffic. It did not say what the two messages
contained. Police were investigating the incident,
which did not affect the Web sites of other
government departments, the statement added.
http://www.mercurycenter.com/svtech/news/breaking/ap/docs/84333l.htm

Hackers invade Malaysia Websites
Hackers have broken into dozens of Malaysian
political Websites, leaving government officials
and opposition leaders fuming Sunday over images
of rotting skulls and obscene messages. One vandal,
calling himself ``Xenophoria,'' attacked 21
pro-government Websites, posting a list of demands
for greater press freedom and an end to corruption.
``Stop government intervention in media. Justice
for all,'' the hacker wrote.
http://www.mercurycenter.com/svtech/news/breaking/ap/docs/85565l.htm

Feds find dangerous cyberstalking hard to prevent
State and local governments are struggling to
contain a new, high-tech criminal: the cyberstalker.
Legislators across the country have enacted new
laws and updated old ones to prevent cyberstalking
-- the Information Age crime in which victims are
bombarded with threatening electronic messages
while the stalker hides behind the Internet's veil
of anonymity.
http://www.cnn.com/2000/TECH/computing/06/12/cyberstalkers.idg/index.html

White House says configuration mistake led to
loss of vice presidential e-mail
Backup copies of e-mail within the Office of the
Vice President were not made between March 1998
and early April 1999 because the technician who
set up a new operating system did not configure
the office's server to make such copies, the
Clinton administration said last week.
http://www.gcn.com/vol1_no1/daily-updates/2203-1.html

GSA fleshes out intrusion net plan
The General Services Administration is moving
forward with its plans to build a governmentwide
system to monitor agency networks for cyberattacks,
but it is taking a slightly different tack than
originally announced. GSA last week released the
draft request for proposals for the Federal
Intrusion Detection Network (FIDNet) but said
the document, while bringing it one big step closer
to an acquisition, has plenty of room for change.
http://www.fcw.com/fcw/articles/2000/0612/news-fidnet-06-12-00.asp

Training new cybersleuths
President Clinton's initiative to attract students
to work as federal information security experts in
exchange for tuition reimbursement is moving one
step closer to reality. The National Science
Foundation is preparing a virtual "call to arms"
for early August, when it will release a solicitation
to universities for the Federal Cyber Services
scholarship program.
http://www.infoworld.com/articles/es/xml/00/06/12/000612esdos.xml

Swedish Hacker-Tracker Is FBI And Media Darling
The FBI, desperate to track down the source of the
"Love Bug" computer virus last month, turned to a
shy 19-year-old Swedish student. Jonathan James
came under the media spotlight after he helped the
world's most famous crime-busting agency trace the
origins of the virus that caused billions of dollars
in damage to computers around the world. But right
now he is more interested in getting through his
school exams and enrolling in law school later
this year.
http://news.excite.com/news/r/000610/22/net-sweden-computer-dc?

Laptop PCs go missing in action
It started with a trickle, the small though
alarming revelation that an official from
Britain's spy service had lost a laptop computer
containing secret information. That was regarded
as extremely careless, a shocking lapse of
discipline which could have compromised the
nation. It led to one or two more confessions
of computers gone missing. But two months later,
further admissions and some digging by journalists
have led to this red-faced confession from the
government - that a total of 204 laptops have
been lost or stolen from various departments since
Labor took office in May 1997.
http://www.it.fairfax.com.au/industry/20000613/A54593-2000Jun10.html

MI5 gets codebreaking unit
They're still arguing about the RIP Bill
  -- today it begins its committee stage
in the House of Lords -- but MI5 is starting
to get its code-breakers in already. MI5
headquarters is about to be furnished with
a special codebreaking unit dedicated to
cracking encryption, according to Monday's
Times. The report says the new centre will
recruit members soon at a cost of around
=A325m over the next few years. It is, says
the report, one of the elements of the
government's Regulation of Investigatory
Powers (RIP) Bill.
http://www.zdnet.co.uk/news/2000/23/ns-15923.html

Report says snooping bill expensive and useless
The controversial Regulation of Investigatory
Powers (RIP) Bill will cost Britain a crippling
3,640 billion pounds over the next five years if made law,
according to a report published Monday. The
Economic Impact of The Regulation of Investigatory
Powers Bill, commissioned by the British Chamber
of Commerce(BCC) and produced by experts at the
London School of Economic(LSE), says that
government assurances about cost efficiency
are woefully off the mark.
http://www.zdnet.co.uk/news/2000/23/ns-15934.html
http://www.zdnet.co.uk/news/2000/23/ns-15911.html
Institute of Directors latest critic of RIP
http://www.zdnet.co.uk/news/2000/23/ns-15922.html
Father of the Web lambastes cyber snooping bill
http://www.zdnet.co.uk/news/2000/23/ns-15918.html
UK House Of Lords To Topple E-mail Snooping Bill
http://www.newsbytes.com/pubNews/00/150407.html

WebAgain Can Undo What Hackers Do
If you have a Web site, there are few things worse
than finding that it's the victim of a hacker attack.
LockStep Systems says it has the solution in WebAgain,
a utility that automatically detects any unauthorized
Web site changes and restores the site without user
intervention. Available as of Monday, WebAgain sells
for $499 and runs on Windows NT or 2000. It can run
on your own local server or at your Internet service
provider. WebAgain can also monitor your Web site
remotely using either a dial-up or broadband connection.
http://www.pcworld.com/pcwtoday/article/0,1510,17115,00.html

Intellectual rights may be Net casualty
In just 15 minutes, a ranking member of Canada's
geekdom demonstrated to me how the Internet is
eventually going to destroy much of the value of
intellectual property. He downloaded a pirated
copy of a feature-length film currently showing
in theatres around the world. I picked the film.
He got it for nothing. How was this obtained?
He speculated that a piece of technology was
attached by the pirate to a movie theatre's
projector and the film was simply copied.
http://www.canoe.ca/FP/francis.html

------------------------------------------------------------------------
IT Professionals: Match your unique skills with the best IT projects at
http://click.egroups.com/1/3381/7/_/595019/_/960903458/
------------------------------------------------------------------------

------------------
http://all.net/