[iwar] News


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Wed, 9 Aug 2000 18:56:45 -0700 (PDT)


fc  Wed Aug  9 18:58:16 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Wed, 09 Aug 2000 18:58:16 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Thu Aug 10 01:58:10 2000)
X-From_: sentto-279987-476-965872610-fc=all.net@returns.onelist.com  Wed Aug  9 20:57:14 2000
Received: from f19.egroups.com (f19.egroups.com [208.50.99.238]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id UAA22198 for ; Wed, 9 Aug 2000 20:57:14 -0500
X-eGroups-Return: sentto-279987-476-965872610-fc=all.net@returns.onelist.com
Received: from [10.1.10.36] by f19.egroups.com with NNFMP; 10 Aug 2000 01:56:50 -0000
Received: (qmail 21105 invoked from network); 10 Aug 2000 01:56:49 -0000
Received: from unknown (10.1.10.27) by m2.onelist.org with QMQP; 10 Aug 2000 01:56:49 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta1 with SMTP; 10 Aug 2000 01:56:46 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id SAA21313 for iwar@onelist.com; Wed, 9 Aug 2000 18:56:45 -0700
Message-Id: <200008100156.SAA21313@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Wed, 9 Aug 2000 18:56:45 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] News
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

U.S. brings charges against Net drug operation
Four individuals and a Miami-based pharmaceutical supply
company have been charged with conspiring to illegally
sell prescription drugs over the Internet, U.S. authorities
said today. Officials from the Justice Department and the
Food and Drug Administration said the defendants were
indicted for conspiring to sell drugs such as Viagra,
Xenical, Celebrex, Propecia and Claritin-D to consumers
who did not have valid prescriptions.
http://news.cnet.com/news/0-1007-200-2458607.html

Pentagon still under assault from hackers
Defense Department pleas to computer hackers to quit
mischief-making appear to be falling largely on deaf
ears, making spotting potential national security
threats more difficult, a top Pentagon expert said on
Tuesday. Despite recent appeals, ``we're not seeing
any diminishing'' of the pace of attacks on Defense
Department systems, said Richard Schaeffer, who heads
the cyber-security office in the Pentagon arm
responsible for command, control, communications and
intelligence.
http://www.mercurycenter.com/svtech/news/breaking/internet/docs/287183l.htm

China closes dissident Web site
The first dissident Web site in China has been shut
down and police are hunting for its organizers, a human
rights group and the firm that hosted the site said
Tuesday. Officials said the site, called the New Culture
Forum, posted ``counterrevolutionary content,'' according
to the New York-based group, Human Rights in China. The
group described the site, which it said was run by veteran
pro-democracy activists, as the first of its kind in China.
Other dissident Web sites are based abroad, often in the
United States.
http://www.mercurycenter.com/svtech/news/breaking/ap/docs/285219l.htm

NZ Cops Stalk Mob -- Virtually
They're not just the thin, blue line against organized
crime: In a small corner of New Zealand, the police are
also the thin, blue URL. In a suburb of New Zealand's
capital city of Wellington, the Mongrel Mob rules the
criminal roost. But tougher laws and a campaign of
information about the gang are helping cut the serious
crime they commit. A website, the police in the Wellington
suburb of Porirua decided, would be one way to undermine
one of the Mongrel Mob gang's key ways of maintaining
criminal supremacy: intimidation.
http://www.wired.com/news/culture/0,1284,37820,00.html

Rep. Kolbe Renews Call for Killing FBI's 'Carnivore'
Arizona Congressman Rep. Jim Kolbe, R, held a rally at a
local Internet service provider in his home town today to
voice his concern over the FBI's e-mail surveillance
system, known as "Carnivore." Kolbe visited employees at
The-River, Tucson's 2nd largest ISP after America Online,
to voice his opposition to the FBI's use of the e-mail
snooping device. Kolbe told The-River employees that he
had nothing against law enforcement's use of traditional
wiretaps, but that Carnivore cast such a wide net that it
could endanger the privacy of ordinary, innocent citizens.
http://www.newsbytes.com/pubNews/00/153366.html

Free software would block FBI's Carnivore
A Charlottesville, Va., company is trying to take the
teeth out of the FBI's "Carnivore" software with a free
encryption program, nicknamed "Antivore." Privacy advocates
and members of Congress in recent weeks have criticized
the FBI computer program, saying it can be used to scan
private citizens' e-mail without restrictions. The chief
executive officer of ChainMail, maker of Antivore, said
his firm's technology will protect individuals from
irresponsible probes.
http://www.washtimes.com/business/default-200088221151.htm

Plans to block email snoopers
Computer software that could make a mockery of
Government plans to snoop on e-mails goes on sale
this week - thanks to research partly funded by
the Department of Trade and Industry. The software
is designed to alert people if their e-mails have
been intercepted or tampered with by a third party.
The Government's controversial Regulation of
Investigatory Powers Bill gives the police and
security services the right to spy on every e-mail
sent in Britain.
http://www.thisismoney.com/20000806/nm18762.html

Intel, Panasonic take aim at online piracy
Intel and Panasonic said they will release new software
tomorrow intended to prevent online music piracy from
going mobile. The two companies said they have developed
a three-part plan for protecting copyright material on
personal computers and, more significantly, when it is
copied for use in portable music players.
http://news.cnet.com/news/0-1005-200-2458997.html

Bugs afflict Microsoft, Netscape, Sun
Microsoft, Sun Microsystems and Netscape Communications
have started off the week battling two different security
problems: one that exposes a computer's contents and another
that makes computers vulnerable to a complete takeover. The
latest security vulnerability to surface in Microsoft's
products could make an emailed Word attachment a potent
Trojan horse, an application that does something unexpected
and potentially malicious.
http://news.cnet.com/news/0-1005-200-2456818.html

Netscape bug affects almost 1,000
Security experts were warning Internet users Monday about
a security hole in Netscape's Web browser that has already
infected almost 1,000 computers. Once a computer is infected,
a hacker can click through the victim's computer and see,
run and delete files on the target computer.
http://www.mercurycenter.com/svtech/news/breaking/ap/docs/283815l.htm

Netscape to offer patch to shield users from glitch
Netscape Communications Corp., a unit of America Online
Inc., plans to make a patch available so that users can
protect themselves from a glitch found in Netscape's browser
software that can be used to let hackers view or retrieve
files on a computer or network.
http://www.mercurycenter.com/svtech/news/breaking/merc/docs/021953.htm

Cyber-Snooping Into A Cheating Heart
"I'm not doing anything wrong, believe me," she'd said
for weeks. But he didn't buy it. He'd read her e-mail,
listened in on her phone conversations. He wanted the
chats, too. Fifty bucks bought him software to slip into
the family computer and secretly record his wife's every
move, like a leprechaun crouching amid the circuit boards
with a tiny camera.
http://washingtonpost.com/wp-dyn/articles/A52154-2000Aug7.html

Germany battles neo-Nazis on Web
Germany moved Tuesday to block Nazi slogans as German
Web addresses after discovering someone had registered
www.heil-hitler.de. But officials worried about rising
neo-Nazi violence concede there's little they can do
about sites based elsewhere in cyberspace -- especially
the United States.
http://www.mercurycenter.com/svtech/news/breaking/merc/docs/017242.htm

E-Sign rules open for comment
The Office of Management and Budget is looking for
comments on draft guidance that will help agencies
understand and use the new electronic signature
legislation passed by Congress in June. In a memo
sent to agency chief information officers last week,
OMB asked for comments by Aug. 11 on the draft
guidelines developed for the Electronic Signatures
in National and Global Commerce Act. E-Sign provides
a legal basis for use of technology to sign contracts
and perform other electronic legal transactions.
http://www.fcw.com/fcw/articles/2000/0807/web-esign-08-08-00.asp

E-Privacy's Foggy Bottom
Disturbing behind-the-scenes activity at Toysrus.com
came to light last week: The company was whisking
shoppers' personal information down an unmarked Internet
side road to a little-known data-processing firm. As
customers browsed and shopped at the toy retailer,
third-party data-analysis firm Coremetrics was sucking
name, address, and shopping cart information into its
database.
http://wired.com/news/business/0,1367,38041,00.html

What you can do to protect your privacy online
Congress will soon begin debating the need for
legislation to protect consumer privacy on the
Internet. The chances of such legislation passing
quickly are small, given that the issues are
complicated, the economic and political stakes
are high and the technology is changing constantly.
In the meantime, consumers can take many steps to
protect themselves. Many of these measures will
prove useful to Internet shoppers even if consumer
privacy laws become a reality.
http://www.mercurycenter.com/svtech/news/breaking/merc/docs/046412.htm

Web porn case gets stranger
The sensational federal court battle over who owns
the popular Web name Sex.com the centerpiece of a
$250 million Internet porn network took yet another
unusual turn this week. With a decision expected any
day, Stephen Michael Cohen, who controls the Web name,
filed a motion to dismiss. He claims new information
indicates the case against him was built on doctored
evidence. ''This whole case reeks of fraud,'' Cohen
says. ''It is truly a Perry Mason twister.''
http://www.usatoday.com/life/cyber/tech/cti358.htm

Soccer agency wins Internet case
The marketing company for soccer's governing body won
the right Tuesday to use an Internet address that belonged
to an Englishman who had registered more than 100 names.
An arbitrator for the U.N. World Intellectual Property
Organization ordered that the address fifa-world-cup.com
be handed to ISL Marketing of Lucerne, Switzerland.
http://www.mercurycenter.com/svtech/news/breaking/ap/docs/286248l.htm

Harris drops lawsuit against AOL
Online market research firm Harris Interactive Inc. said
on Tuesday it dropped its lawsuit against America Online
Inc. after the top Internet services provider restored
Harris's ability to communicate with users who want to
participate in its surveys.
http://www.mercurycenter.com/svtech/news/breaking/internet/docs/287112l.htm

Antispam firm Brightmail to take on viruses too
Brightmail, a company that built its reputation on
software to screen out unsolicited email, is transforming
itself into an antivirus company as well. The company has
released a new software product that, when used in
conjunction with Symantec antivirus software, will catch
viruses before they arrive at corporate email systems.
The software, called the Brightmail Anti-Virus Solution,
is intended to head off at the pass inundations of email
borne viruses such as the "Love Bug," or the "I Love You"
virus. These programs generate thousands of redundant
emails that can paralyze email servers.
http://news.cnet.com/news/0-1003-200-2458650.html

Brutal games blamed for teenage violence
Violent video games may be directly responsible for
aggressive behaviour among teenagers, according to research
from Middlesex University Monday. The study research promises
to re-ignite a controversial debate over the relationship
between computer games and real violence. Previous research
has shown a correlation between violent computer games and
adolescent aggression but the new research, published by
Middlesex University lecturer in social psychology John
Colwell, indicates that aggression may stem from playing
computer games.
http://www.zdnet.co.uk/news/2000/31/ns-17165.html

The law of cybercrime
Hacking and viruses have made the headlines in recent
months. Some claim the February denial-of-service attacks
and the Love Bug virus have caused multiple billions of
dollars in damages. As cybercrime is becoming a real
threat to businesses and users, Upside Counsel takes an
in-depth look at the applicable laws. Computer crimes
started showing up on the radar screen in the '80s, and
in 1986 Congress enacted the Computer Fraud and Abuse Act
(18 USC 1030). The act, the primary prosecutorial weapon
against cybercrime, has been updated several times, and
was amended most recently in 1996.
http://www.upside.com/texis/mvm/story?id=398ae2bd0

HACKING IT
Insurers are racing to provide coverage for a range of
cyberrisks. But does the protection go far enough?
ECharge Corp. believes it has a great value proposition:
offer a secure way for online companies to accept payments
with absolutely no chance personal information can be
stolen or fraudulently used, and back it up with a
guarantee. But no matter how good a service might be,
guarantees entail some risk. "There's always the
possibility that some little thing could fall through
the cracks and cause a catastrophic event," concedes
Mark Tremont, CFO and chief operating officer at the
Seattle-based company. So eCharge did what lots of other
online companies are doing. It bought cyberinsurance.
http://www.cfonet.com/html/Articles/CFO/2000/00AUhack.html

A hacker crackdown?
As the long arm of the law reaches Napster and its
lookalikes, programmers could be held responsible for
what others do with their code. Shawn C. Reimerdes awoke
on July 26, confident that his own fate had nothing to
do with Napster's. He had just released Yo!NK, a file
sharing program that could be used to trade copyrighted
MP3s, but since the Yo!NK network consists of various
servers whose owners voluntarily host the program,
Reimerdes figured he was safe.
http://www.salon.com/tech/feature/2000/08/07/yoink_napster/index.html

Why Are Keys Certified?
Key certificates are an important element in the use
of public-key cryptography (PKC). Your browser, when
it visits a secure site, checks for a key certificate
from a small number of commercial certificate providers.
The instructions that came with PGP described how to
sign keys, and explained the importance of doing so.
The concept of a public-key infrastructure (PKI) refers
to what is essentially a way to facilitate key
certification, perhaps with government assistance. This
is because of what would otherwise be a fatal weakness
in public-key cryptography.
http://www.securityportal.com/topnews/keyscert20000808.html

---------------------------------------------------------------------

------------------
http://all.net/