[iwar] news


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Fri, 28 Jul 2000 05:53:32 -0700 (PDT)


fc  Fri Jul 28 05:54:16 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Fri, 28 Jul 2000 05:54:16 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Fri Jul 28 12:54:10 2000)
X-From_: sentto-279987-466-964788814-fc=all.net@returns.onelist.com  Fri Jul 28 07:54:01 2000
Received: from hj.egroups.com (hj.egroups.com [208.50.99.212]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id HAA09274 for ; Fri, 28 Jul 2000 07:54:01 -0500
X-eGroups-Return: sentto-279987-466-964788814-fc=all.net@returns.onelist.com
Received: from [10.1.10.35] by hj.egroups.com with NNFMP; 28 Jul 2000 12:53:36 -0000
Received: (qmail 6621 invoked from network); 28 Jul 2000 12:53:34 -0000
Received: from unknown (10.1.10.27) by m1.onelist.org with QMQP; 28 Jul 2000 12:53:34 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta1 with SMTP; 28 Jul 2000 12:53:33 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA26314 for iwar@onelist.com; Fri, 28 Jul 2000 05:53:32 -0700
Message-Id: <200007281253.FAA26314@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Fri, 28 Jul 2000 05:53:32 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Reno describes FBI Internet-wiretap system review
Attorney General Janet Reno described Thursday a two-step
process to review a new FBI Internet-wiretap system called
Carnivore that has raised privacy concerns. With lawmakers
and privacy advocates concerned the system allows for
widespread surveillance of e-mails, Reno said the first step
will be for a group of academic experts to conduct a detailed
review of the computer program's source code.
http://www.mercurycenter.com/svtech/news/breaking/merc/docs/055425.htm
http://news.cnet.com/news/0-1005-200-2362943.html
http://www.msnbc.com/news/438436.asp
House asks Reno to suspend Carnivore
http://www.msnbc.com/msn/438436.asp

Internet open to organized attack
The Internet's reliance on a few key nodes makes it especially
vulnerable to organized attacks by hackers and terrorists,
according to a new study on the structure of the worldwide
network. Like the airline hub system that falls apart when
weather shuts down airports in Chicago or Dallas, the Internet
could collapse if its major nodes were targeted in a malicious
attack, the researchers said.
http://www.mercurycenter.com/svtech/news/breaking/ap/docs/245468l.htm

International panel testifies on cyber attacks
An international panel of computer security officials
told a U.S. congressional committee Wednesday that a
quicker response to cyber attacks is needed both between
countries and between government and private industry.
Law enforcement officials from the Philippines, Israel,
Germany and Sweden provided the committee with details
on the international scope and challenges of coordinating
the sharing of information when a cyber attack occurs.
http://idg.net/ic_205203_1794_9-10000.html
http://www.fcw.com/fcw/articles/2000/0724/web-cyber-07-27-00.asp

House panel passes bill to protect agency computers
The House Science Committee approved bipartisan legislation
Wednesday to help federal agencies better protect their
electronic information systems. The bill, H.R. 2413, approved
by voice vote, would require the National Institute of Standards
and Technology to promote the use of commercially available
encryption products in order to reduce the costs and increase
the availability of data protection technologies for federal
agencies.
http://www.govexec.com/dailyfed/0700/072700td.htm

EC Adopts Data Privacy Plan Despite Concerns
The European Commission today announced that it has formally
settled on the so-called Safe Harbor data protection arrangement
that allows US companies to engage in e-commerce data transfers
with companies and individuals in the European Union (EU),
despite European Parliament concerns about the effectiveness
of the arrangement. The Safe Harbor will become effective in
90 days.
http://www.newsbytes.com/pubNews/00/152834.html

Microsoft wins cybersquatting case
U.S. software giant Microsoft Corp. will be allowed to evict
the holder of the Internet address microsof.com, the U.N.'s
anti-''cybersquatting'' board said on Thursday, its second
victory in such a case.
http://www.mercurycenter.com/svtech/news/breaking/merc/docs/069100.htm

USOC wins cyber dispute over name
A U.N. arbitrator has awarded the U.S. Olympic Committee
rights to two Internet sites whose names suggested they
were selling Olympic products. Arbitrator Richard G. Lyon
of the World Intellectual Property Organization ruled that
Tri B-U-N Eco. Project of Seattle had no right to the names
USAOlympicOnlineStore.com and OlympicOnlineStore.com.
http://www.mercurycenter.com/svtech/news/breaking/ap/docs/248172l.htm

Pop star Sting stung in cyberspace
British pop star Sting has lost a case at an international
panel to evict the holder of the Internet address sting.com,
becoming the first celebrity to suffer such a defeat, U.N.
arbitrators said Thursday. The British singer filed the case
in June at the Geneva-based World Intellectual Property
Organization (WIPO) against American Michael Urvan of
Marietta, Georgia, who had been the first to register the
address as an Internet domain.
http://www.mercurycenter.com/svtech/news/breaking/internet/docs/247328l.htm

Gartner Advises U.S. House of Representatives on Computer Security Threats
John Pescatore, vice president and research director of
network security, Gartner Group, Inc. this morning advised
the U.S. Subcommittee on Government Management, Information
and Technology to learn from private industry's success in
e-business. He also urged collaboration among government
agencies to step up Internet security measures.
http://gartner11.gartnerweb.com/public/static/aboutgg/pressrel/pr20000726a.html

Security education in crisis
The information technology industry has become saturated
with 20-something whiz kids who lack adequate training,
education and professional discipline, creating a significant
knowledge deficit when it comes to information security, a
panel of top educators warned.
http://www.fcw.com/fcw/articles/2000/0724/web-secrity-07-27-00.asp

Silence the best security policy
Should security holes be hushed up? Long controversial, the
policy of disclosing software vulnerabilities to the public
was subject to open attack in a Wednesday keynote at the Black
Hat Security Conference. Marcus Ranum, chief technology officer
for intrusion detection software maker Network Flight Recorder
Inc., used hard language to say that security can't be improved
unless "gray hat" hackers stop disclosing security holes to the
public and stop creating tools for so-called "script kiddies"
to exploit the holes.
http://www.zdnet.com/zdnn/stories/news/0,4586,2608077,00.html

---------------------------------------------------------------------

------------------
http://all.net/