[iwar] news


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Tue, 5 Dec 2000 18:59:09 -0800 (PST)


fc  Tue Dec  5 19:00:08 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Tue, 05 Dec 2000 19:00:08 -0800 (PST)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Wed Dec  6 02:55:42 2000)
X-From_: fc@all.net  Tue Dec  5 20:54:59 2000
Received: from mw.egroups.com (mw.egroups.com [208.50.144.94]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id UAA31068 for ; Tue, 5 Dec 2000 20:54:57 -0600
X-eGroups-Return: sentto-279987-783-976071554-fc=all.net@returns.onelist.com
Received: from [10.1.4.52] by mw.egroups.com with NNFMP; 06 Dec 2000 02:59:21 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-6_3_1_3); 6 Dec 2000 02:59:13 -0000
Received: (qmail 18866 invoked from network); 6 Dec 2000 02:59:11 -0000
Received: from unknown (10.1.10.27) by m8.onelist.org with QMQP; 6 Dec 2000 02:59:11 -0000
Received: from unknown (HELO all.net) (65.0.156.78) by mta2 with SMTP; 6 Dec 2000 02:59:09 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id SAA09320 for iwar@onelist.com; Tue, 5 Dec 2000 18:59:09 -0800
Message-Id: <200012060259.SAA09320@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Tue, 5 Dec 2000 18:59:09 -0800 (PST)
Reply-To: iwar@egroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Top U.S. diplomat leaves amid security breach row
A top U.S. diplomat is retiring early after disciplinary
action was initiated against six members of his staff
over the disappearance of a laptop computer containing
secret data, State Department spokesman Richard Boucher
said on Tuesday. Boucher denied a Washington Post report
that Ambassador Stapleton Roy, one of America's most
respected Asia experts, was resigning in protest at
Secretary of State Madeleine Albright's approach to
dealing with the security lapse. The State Department
has offered a $25,000 reward for anyone who helps
recover the laptop, thought to hold data on nuclear
proliferation, which was reported missing in January
from the INR.
http://www.zdnet.com/zdnn/stories/newsbursts/0,7407,2661617,00.html

Overseas hackers strike again: Israel Land Administration
shuts down most of its web site
The Israel Land Administration (ILA) was forced to
close most of its Internet site last Fridey, due to
damage caused by hostile overseas hackers. From now
on and until further notice, there is therefore no
possibility of receiving the results of the ILA's
new or previous tenders dated after January 1998.
In contrast to the damage to tenders, other parts
of the site providing general information are still
operating.
http://new.globes.co.il/serveEN/globes/docView.asp?did=454769&fid=947

Computer Data Key to Racketeer Case
In a case that could test the limits of FBI
surveillance in the Information Age, an alleged
racketeer is going to trial on evidence gathered
by agents who rigged his computer and monitored
his every keystroke. Nicodemo S. Scarfo Jr., 35,
the son of the jailed former boss of the
Philadelphia mob, faces federal charges of running
a bookmaking and loansharking operation. According
to court documents, agents modified a computer
Scarfo used at his Essex County business so that
the FBI could monitor every keystroke, according
to court documents. Scarfo could become the first
defendant to challenge covert computer surveillance
by the FBI.
http://www0.mercurycenter.com/svtech/news/breaking/ap/docs/711072l.htm

Increase in hacker activity - FBI
The FBI has observed an increase in Hacker activity
specifically targeting U.S. systems associated with
e-commerce and other internet-hosted sites.  The
majority of the intrusions have occurred on Microsoft
Windows NT systems, although Unix based operating
systems have been victimized as well. The hackers are
exploiting at least three known system vulnerabilities
to gain unauthorized access and download propriety
information.  Although these vulnerabilities are not
new, this recent activity warrants additional
attention by system administrators.
http://www.nipc.gov/warnings/advisories/2000/00-060.htm

At the Local Level, A Losing War on Internet Crime
Gail Thackeray is Arizona's point woman in the
state's war on cybercrime, and she's about to be
overrun. Now, the state attorney general's special
counsel on cybercrime is demanding more help from
Arizona's law enforcement community - apparently
in vain. Local police force officials say they
lack the training, staffing and resources to deliver
much in the war against the burgeoning menace. But
Thackeray has a different take: She thinks local
police departments just don't get it. ``Police
departments are run by middle-aged, midcareer
people who didn't have computers when they were
young,'' Thackeray said. ``Management has simply
not provided the training.''
http://www.antionline.org/2000/12/05/cndin/0285-0132-pat_nytimes.html

Cybersquads to combat terrorism
The government plans to establish at government
entities within a year expert groups to cooperate
with the private sector in gathering information
on cyberterrorism in an attempt to prevent computer
attacks, government sources said Monday. According
to a draft action plan compiledby the government,
it also aims to promote legislation to crack down
on cyberterrorism that seriously affects the public.
The plan is expected to be finalized at a government
panel meeting to enhance information security that
will be held by the end of the year. Under the plan,
such industries as information and communications,
finance, aviation, electricity and gas, and
administrative services by central and local
governments will be designated "essential
infrastructure" in preparing for potential
cyberterrorist attacks.
http://www.japantimes.co.jp/cgi-bin/getarticle.pl5?nn20001205b1.htm

China to tighten Web regulation
In its latest effort to place restrictions on
Internet usage, China intends to tighten regulation
of online bulletin boards, Beijing's top
telecommunications official said Tuesday. Wu Jichuan,
head of the Ministry of Information Industry, said
the Chinese government was working on a ``better way''
to manage the Internet.
http://www0.mercurycenter.com/svtech/news/breaking/ap/docs/707489l.htm

Can hacker crack million-dollar dare?
With a 30-day deadline, the challenge to crack Secure
Systems' Silicon Data Vault technology will be issued
by December 15. "We don't believe any hacker at all
will get through the vault," Secure Systems CEO, Mike
Wynn, told ZDNet. A successful crack will see US$10,000
donated by Secure Systems to a charity of the hacker's
choice, otherwise if the technology isn't penetrated,
US$1 million will be donated to the 'Make a Wish
Foundation' when Secure Systems strikes a
commercialisation deal that takes the technology to
market.
http://www.zdnet.com.au/news/dailynews/story/0,2000011358,20107397-1,00.htm

Johns Hopkins to launch IT security center
JOHNS Hopkins University announced Monday that,
thanks to a $10 million gift from an anonymous
donor, it would open a center to study computer
and information security issues. Called the
Information Security Institute (ISI), the center
may open as early as the third quarter of 2001.
Located at the Baltimore-based university's
northern Baltimore campus, the institute will
examine the technological, legal, ethical, and
public policy issues raised by the drive to create
more secure computers and computer systems. Some
of the topics listed as areas of particular
interest may include the protection of intellectual
property online, securing e-business transactions,
privacy issues, and preventing computer crime. The
institute will also feature labs where products
will be tested for security vulnerabilities.
http://www.infoworld.com/articles/hn/xml/00/12/04/001204hnjohnshopkins.xml

Protecting Your Organization's Reputation in Cyberspace
The Internet offers organizations exciting
opportunities to find timely information and to
reach potential clients. This very power brings
with it risks of damaging corporate and professional
reputations. Non-technical problems in cyberspace
include relying on or propagating bad information,
violating the conventions of proper behavior
established by custom in cyberspace, and outright
fraud.
http://securityportal.com/articles/reputation20001205.html

-------------------------- eGroups Sponsor -------------------------~-~>
eLerts
It's Easy. It's Fun. Best of All, it's Free!
http://click.egroups.com/1/9699/1/_/595019/_/976071554/
---------------------------------------------------------------------_->

------------------
http://all.net/