[iwar] News


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Tue, 25 Jul 2000 05:25:50 -0700 (PDT)


fc  Tue Jul 25 05:26:19 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Tue, 25 Jul 2000 05:26:19 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Tue Jul 25 12:26:13 2000)
X-From_: sentto-279987-462-964527953-fc=all.net@returns.onelist.com  Tue Jul 25 07:25:48 2000
Received: from hl.egroups.com (hl.egroups.com [208.50.99.197]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id HAA17691 for ; Tue, 25 Jul 2000 07:25:48 -0500
X-eGroups-Return: sentto-279987-462-964527953-fc=all.net@returns.onelist.com
Received: from [10.1.10.38] by hl.egroups.com with NNFMP; 25 Jul 2000 12:25:53 -0000
Received: (qmail 13331 invoked from network); 25 Jul 2000 12:25:52 -0000
Received: from unknown (10.1.10.142) by m4.onelist.org with QMQP; 25 Jul 2000 12:25:52 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta1 with SMTP; 25 Jul 2000 12:25:51 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA04079 for iwar@onelist.com; Tue, 25 Jul 2000 05:25:50 -0700
Message-Id: <200007251225.FAA04079@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Tue, 25 Jul 2000 05:25:50 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] News
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Ex-broker convicted of bilking HP
A former computer broker was found guilty of bilking
computer giant Hewlett-Packard out of millions of dollars
through the use of closely guarded software. A federal
jury Friday convicted Richard Adamson, 35, of Newport Beach,
of fraud and money laundering in connection with his use of
a proprietary HP program called SS.Config. The jury found
that Adamson secretly obtained SS.Config in March 1997 and
used it to boost the performance of used HP servers.
http://www.sjmercury.com/premium/local/docs/software23.htm

Teen hacked into local server from abroad
AN INDONESIAN teenager hacked into a Singapore server
while studying in Australia and used it as a proxy
server, so he could disguise his identity while chatting
over the Internet. But the 15-year-old was caught out
when he came here to study and again hacked into the same
server, which belongs to a research institute here.
http://straitstimes.asia1.com.sg/singapore/sin3_0721.html

Congress isn't swallowing Carnivore
Officials from the FBI and the U.S. Department of Justice
faced a skeptical -- and at times downright hostile --
House Judiciary Committee on Monday during an oversight
hearing on the constitutional issues raised by the FBI's
Carnivore electronic monitoring program. Both Republicans
and Democrats raised repeated concerns about how the FBI's
e-mail surveillance software operates. Committee members
demanded to know why the FBI didn't inform Congress about
it sooner and how the agency planned to keep Carnivore from
eroding users' increasingly ill-protected online privacy.
http://www.zdnet.com/zdnn/stories/news/0,4586,2606899,00.html

Congress enters Internet wiretap debate
U.S. lawmakers Monday raised concerns about a new FBI Internet
wiretap system called Carnivore, as officials attempted to
minimize fears it could be used for widespread surveillance
of Americans' e-mail. The system allows U.S. law enforcement
agencies to find and follow the e-mails of a criminal suspect
among the flood of other data passing through an Internet
service provider.
http://www.mercurycenter.com/svtech/news/breaking/merc/docs/035173.htm

New laws needed to protect Net privacy?
Is the United States headed for another era of secret
snooping, =E0 la J. Edgar Hoover?  That was the implication
heard throughout four hours of testimony Monday before the
House Judiciary Committee about the FBI surveillance computer
system known as "Carnivore."
http://www.zdnet.com/zdnn/stories/news/0,4586,2606917,00.html

FBI=92s Carnivore a picky eater
For all the controversy over the FBI=92s e-mail surveillance
system, it turns out that Carnivore is a picky eater and not
a devourer of data, according to bureau officials. The system
was shown off at bureau headquarters in Washington, D.C.,
Friday, and bureau officials and others will testify about
Carnivore today before the House Judiciary Committee=92s
Constitution Subcommittee.
http://www.fcw.com/fcw/articles/2000/0724/web-fbi-07-24-00.asp
Other Carnivore stories:
http://www.gcn.com/vol1_no1/daily-updates/2489-1.html
http://www.govexec.com/dailyfed/0700/072500td.htm
http://www.newsbytes.com/pubNews/00/152623.html
http://www.cnn.com/2000/TECH/computing/07/24/fbi.carnivore.reut/index.html

New Net snooping tools
FBI wants access to all forms of Internet traffic.  The
Federal Bureau of Investigation is developing a broad range
of Internet surveillance technologies capable of monitoring
any form of digital communication, including file transfers
and Internet-based telephone calls. The FBI revealed its
ambitious digital snooping development plans during a
congressional hearing on "Carnivore," the bureau=92s
controversial Internet wiretapping program.
http://www.msnbc.com/news/437190.asp

Denial-of-service threat gets IETF's attention
Remember the denial-of-service attacks that brought Amazon.com,
CNN.com, eBay and other popular Web sites to their knees in
February? The Internet engineering community is developing
technology that promises to minimize the damage these hacker
attacks cause by quickly identifying the computer systems
where they originate.
http://www.nwfusion.com/news/2000/0724itrace.html

E-Surveillance Intrudes on Crime
Electronic surveillance may eat away your privacy in the
digital era, but you'll get used to it. You have no choice.
Top lawyers told an Anglo-American law conference this week
that governments had no other way to fight organized crime
effectively in a digital age. "I am convinced that covert
surveillance is likely to prove the only effective answer
to increasingly sophisticated crime," said Lord Justice
Murray Stuart-Smith, the former overseer of MI5 and MI6,
Britain's security and intelligence agencies.
http://washingtonpost.com/wp-dyn/articles/A21044-2000Jul21.html

Hunting Phantoms
Millions of tax dollars are spent each year to combat
cyberterrorism. But where are the perpetrators?
On Feb. 4, 1999, FBI director Louis Freeh went before the
Senate Appropriations Committee's Subcommittee on the
Departments of Commerce, Justice and State, and testified
that since the 1993 World Trade Center bombing "no
significant act of foreign-directed terrorism has occurred
on American soil.
http://www.thestandard.com/article/display/0,1151,16974,00.html

Spying or Security?
Market Booms in E-Surveillance Software. Think twice before
you send raunchy letters from the office. Your boss=92s computer
may be searching for dirty words. If your boss isn=92t reading
your e-mail, your company=92s computers might be doing it for
him. The market for e-mail monitoring software, which lets
companies search for harassing letters or leaks of trade
secrets, will explode by 14 times over the next four years,
to $952 million, a new study from International Data Corp.
of Framingham, Mass., says.
http://abcnews.go.com/sections/tech/DailyNews/contentsecurity000721.html

Anti-Fraud That's Anti-Consumer
When Kendall Dawson heard about PayPal, a wildly popular
new service that lets surfers send money via email, he
thought it would be a great way to pay for items on eBay,
so he signed up. Or rather, tried to sign up. But each time
he typed his credit card number into PayPal's website, it
returned a message saying the card couldn't be confirmed
and to contact the credit card company. A check with the
card company showed no problem with the card.
http://www.wired.com/news/business/0,1367,37642,00.html

Yahoo! pleads its case over Nazi auctions
Yahoo! puts its case to the high court in Paris following
attempts from anti-racist groups to have its American auction
site blocked to French users. The case brought by the Union
of Jewish Students and the International League Against Racism
claims that Yahoo!'s auction site is an offence to the
collective memory of France because of the large collection of
Nazi memorabilia available -- 1163 items at last count. French
law prevents the sale of objects with racist overtones.
http://www.zdnet.com/zdnn/stories/news/0,4586,2606851,00.html

Anti-hacker system has bug: expert
A leading computer security system widely used by government
and business around the world to guard against hackers may
itself be vulnerable to attack, according to a software
expert. FireWall-1, made by Check Point Software Technologies
Ltd. of Tel Aviv, Israel, is one of the world's top-selling
computer security systems. Launched in 1993, the product is
designed to act as a fence around networks and Web sites,
controlling access and protecting against intrusion by
unauthorized visitors, such as hackers.
http://www.nationalpost.com/financialpost/story.html?f=3D/stories/20000724/351993.html

------------------------------------------------------------------------
Still looking for the complete Application Server solution?
Find answers and a $75 gift certificate at the Intraware App Server 
Webinar. Sign up at:
http://click.egroups.com/1/6756/14/_/595019/_/964527953/
------------------------------------------------------------------------

------------------
http://all.net/