[iwar] News


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Fri, 28 Jul 2000 05:25:34 -0700 (PDT)


fc  Fri Jul 28 05:26:14 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Fri, 28 Jul 2000 05:26:14 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Fri Jul 28 12:26:08 2000)
X-From_: sentto-279987-465-964787137-fc=all.net@returns.onelist.com  Fri Jul 28 07:26:03 2000
Received: from hj.egroups.com (hj.egroups.com [208.50.99.212]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id HAA07692 for ; Fri, 28 Jul 2000 07:26:03 -0500
X-eGroups-Return: sentto-279987-465-964787137-fc=all.net@returns.onelist.com
Received: from [10.1.10.35] by hj.egroups.com with NNFMP; 28 Jul 2000 12:25:38 -0000
Received: (qmail 3511 invoked from network); 28 Jul 2000 12:25:36 -0000
Received: from unknown (10.1.10.27) by m1.onelist.org with QMQP; 28 Jul 2000 12:25:36 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta1 with SMTP; 28 Jul 2000 12:25:36 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA26073 for iwar@onelist.com; Fri, 28 Jul 2000 05:25:34 -0700
Message-Id: <200007281225.FAA26073@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Fri, 28 Jul 2000 05:25:34 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] News
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

International Cyber-Police Urge Increased Cooperation
As a growing arsenal of cyber-attacks make national
borders increasingly irrelevant to criminals and
electronic terrorists, international law enforcement
agencies must do a better job of communicating with one
another, a panel of US and foreign law enforcers told
a congressional subcommittee today. "The bulk of
cybercrime cases handled by (German investigators) have
an international component," Juergen Maurer, the detective
chief superintendent of the German Federal Police Office
said today.
http://www.newsbytes.com/pubNews/00/152762.html

FBI Gives a Little on Carnivore
The FBI says it will conduct a privacy audit of a
controversial surveillance system, but the agency
won't release key information about how Carnivore works.
On Monday, FBI officials told a congressional panel that
they hope to assuage the fears of civil libertarians
through "an independent verification and validation"
of the Carnivore eavesdropping system.
http://wired.com/news/politics/0,1283,37765,00.html
http://www.fcw.com/fcw/articles/2000/0724/web-fbi-07-26-00.asp

Bill To Curb Fake-ID Web Sites Introduced
Underage would-be bar hoppers and criminals may soon find
it more difficult to order fake ID cards off the Internet,
thanks in part to legislation proposed in the Senate today.
The Internet False Identification and Prevention Act of 2000,
introduced by Sen. Susan Collins, R-Maine, would make it
illegal to sell or distribute computer files or disks
containing fake ID's or instructions on creating false
identification cards.
http://www.newsbytes.com/pubNews/00/152775.html

UK expects E-Mail snooping bill to become law
The British government expects a bill to allow police and
security services to trawl private e-mails to become law
after it returns to the House of Commons Wednesday,
officials said. ``We are not expecting any trouble. It
should go through the Commons today and on to the statute
book,'' a Home Office source told Reuters.
http://www.mercurycenter.com/svtech/news/breaking/internet/docs/241061l.htm

FTC close to agreement on Internet profiling
The Federal Trade Commission may act very soon to endorse
a privacy agreement negotiated with an online advertising
industry group to protect Web surfers, sources familiar
with the situation said today. If the FTC commissioners do
act, they will also send a recommendation to Capitol Hill
for legislation to let them set rules on the "profiling"
of Net surfers. The idea is to give people notice and
choices about records being kept on their visits to Web
sites as well as the ads they see on those sites.
http://news.cnet.com/news/0-1005-200-2345297.html

Grey-hat hacking
Enterprises hiring reformed crackers to expose their soft
underbellies will only add to the more than $2.6 trillion
lost worldwide annually because of security intrusions,
warns professional services firm PricewaterhouseCoopers.
That's trillion -with a "T".
http://www.it.fairfax.com.au/industry/20000725/A26681-2000Jul24.html

Microsoft security executive promises improvements
The man who receives more complaints about the security of
Microsoft Corp.'s software than anyone on the planet vowed
here yesterday that the company's products are improving in
quality and will continue to become more secure.
http://www.computerworld.com/cwi/story/0,1199,NAV47_STO47494,00.html

1st National Campaign against computer viruses in Spain
The Spanish Ministry of Science and Technology, along with
Panda Software, and in collaboration with SEDISI, the
Association of Users of the Internet and the Association of
Internauts, have started a campaign against computer viruses.
The campaign intends to clean Spain of computer viruses. The
initiative will allow users to download from the official
website of the campaign the Panda Software anti-virus program
for the analysis and cleaning of their computers.
http://www.europemedia.com/content1/Spain/25_Jul_2000.shtml

Anonymous browser reveals its code
Anonymous Web browsing company Zero-Knowledge Systems
released the source code for its privacy-conscious Internet
browser "Freedom" Tuesday. The company claims that freeing
up the source code for the Linux version of its anonymous
browser will help people develop secure network solutions
using the application.
http://www.zdnet.co.uk/news/2000/29/ns-16899.html

Site tracks stolen mobiles
Mobile phone gone missing? Australian Web site
PhoneChoice.com.au is offering a service to match lost or
stolen phones with their rightful owners -- and will even
courier the handsets back, safe and sound. The service,
called Find A Phone's Net Check is an Australian first,
PhoneChoice's manager, Lisa Pennell told ZDNet Australia.
"There has never been a way to track lost or stolen mobile
phones and no way to get them back -- this is something that
the industry has been needing for a long time," Pennell said.
http://www.zdnet.com.au/equip/news/stories/au0004308.html

Analysis: The forensics of Internet security
If a picture is worth a thousand words, then an example
is worth a thousand pictures. This article describes the
actions taken to investigate an actual security breach. To
truly understand the technical details of an incident, it
is best to see the actual data. The tricky part is how to
present the data in a way that is understandable while
protecting the privacy of the parties involved.
http://www.cnn.com/2000/TECH/computing/07/26/detect.intruders.idg/index.html

Experts probe Net's natural defenses
System's structure explains its resilience and vulnerabilities
The Internet's organic structure explains why it's so resistant
to random failures, but researchers now say those same features
make it vulnerable to cyberattacks. The findings could help
security experts strengthen weak links in the Net's chain.
http://www.msnbc.com/news/437864.asp

---------------------------------------------------------------------

------------------
http://all.net/