[iwar] news


From: Fred Cohen
To: Information Warfare Mailing List
From: fc@all.net
To: iwar@onelist.com

Thu, 8 Mar 2001 07:52:10 -0800 (PST)


fc  Thu Mar  8 07:57:33 2001
Return-Path: 
Delivered-To: fc@all.net
Received: from 204.181.12.215
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Thu, 08 Mar 2001 07:57:33 -0800 (PST)
Received: (qmail 19214 invoked by uid 510); 8 Mar 2001 15:51:01 -0000
Received: from hp.egroups.com (208.50.99.201)
  by 204.181.12.215 with SMTP; 8 Mar 2001 15:51:01 -0000
X-eGroups-Return: sentto-279987-1015-984066735-fc=all.net@returns.onelist.com
Received: from [10.1.4.53] by hp.egroups.com with NNFMP; 08 Mar 2001 15:52:15 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_0_4); 8 Mar 2001 15:52:14 -0000
Received: (qmail 23828 invoked from network); 8 Mar 2001 15:52:11 -0000
Received: from unknown (10.1.10.26) by l7.egroups.com with QMQP; 8 Mar 2001 15:52:11 -0000
Received: from unknown (HELO all.net) (65.0.156.78) by mta1 with SMTP; 8 Mar 2001 15:52:11 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id HAA15827 for iwar@onelist.com; Thu, 8 Mar 2001 07:52:10 -0800
Message-Id: <200103081552.HAA15827@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Thu, 8 Mar 2001 07:52:10 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Spy Case Prompts Computer Search
Experts are combing government computer systems to
try to ensure that Robert P. Hanssen, the veteran FBI
agent accused of spying for Moscow, did not sabotage
them or create software vulnerabilities that could
allow Russian intelligence agencies to steal
information while Hanssen is in jail, senior U.S.
officials said. Because Hanssen is a "highly skilled"
computer programmer, the officials said, government
experts are checking all the systems to which he had
access at the FBI and State Department. These include
classified and unclassified computers.
http://www.newsbytes.com/news/01/162688.html

Hacker attacks Government web site in Malaysia
A hacker has attacked a web site belonging to Malaysia's
Road Transport Department. He warned that other web sites
will be hit if administrators are "too lazy to do their
jobs". The attack has come nearly two months after similar
attacks on web sites of the Malaysian Parliament and
Malaysia's University of Technology. The hacker, who
called himself send-x', left graffiti on the web site he
attacked which read: "This defacement has one reason: to
prove that the security of Malaysian computer systems has
still not changed.
http://www.ananova.com/news/story/sm_227241.html

Experts debate U.S. power grid's vulnerabilities to hackers
Nationwide rolling blackouts could have a devastating
impact on the economy, but experts also fear that the
stress being placed on the nation's power grid could
make it more susceptible to disruptions from hackers.
In California's Silicon Valley, large Internet data
centers have been blamed for stressing the region's
power grid beyond what its Korean War-era design can
handle. Now, other states, including Oregon, Utah and
Washington, are preparing for possible rolling blackouts.
"From a cybersecurity perspective, the electric power
grids in the West are now more fragile, [and] margins
for error are significantly less," said Tim Bass, a
longtime information security consultant for the U.S.
Air Force and now CEO of The Silk Road Group Ltd.,
a network security consulting firm in Centerville, Va.
"With diminishing margins and power reserves, the
probability for cascading catastrophic effects are
higher."
http://www.computerworld.com/cwi/stories/0,1199,NAV47-68-84-88_STO58300,00.html

US snoops on European encryption
Cipher expert claims US has broad access to encoded
European correspondences European officials on Monday
played down comments from a British communications
expert suggesting that the US intelligence service
has been spying on the European Commission -- Europe's
government body. Details of a statement from Desmond
Perkins, a senior official for the commission's cipher
unit, were revealed in the French news paper Liberation
Friday. In a hearing held in February, Perkins is
reported to have revealed that the US has access
to encrypted European Union communications.
http://www.zdnet.co.uk/news/2001/9/ns-21360.html
http://www.zdnet.co.uk/news/2001/9/ns-21362.html

Reversal of fortune--tracking Web trackers
A handful of companies are arming Web surfers with
tools for finding and repelling so-called Web bugs
--invisible pieces of code that can be used for
everything from secretly tracking people's Web
travels to pilfering computer files. Many site
operators and Net advertising companies place Web
bugs on their pages to collect information, such
as which pages are being read most often. Too small
for readers to see, the bugs also can be used in
more invasive ways, capturing a visitor's Internet
Protocol address or installing pernicious files,
for example. The bugs can also be matched with
"cookies," the electronic files that are stored on
a PC and can contain personal information such as
name and e-mail address.
http://www.zdnet.com/zdnn/stories/news/0,4586,2692472,00.html

Securing Privacy
What happens when you ask the CIO at the U.S. State
Department, the chief privacy officer at the U.S.
Postal Service and a room full of security experts,
lawyers and thought leaders to talk about privacy?
You get a roller-coaster ride through one of the
fastest-moving emotional landscapes in e-commerce
today. You get a bit dizzy from the sheer number
of political, legal, moral and cultural issues
that go whizzing by. And you end up landing right
at the heart of the complex human relationship with
information technology.
http://www.computerworld.com/cwi/story/0,1199,NAV47_STO58242,00.html

Survey: Breaches Drive Security Upgrades
A major security breach within a company is the single
greatest catalyst for effecting increased security
measures across that organization, according to the
results of a recently released survey from IDC in
Framingham, Mass. Other big drivers of increased
security measures include the growth in Internet
usage and the trend toward mobile computing,
according to IDC. A majority of the 1,000 companies
that responded to the survey identified viruses as
the most common security problem, with 90% saying
they had been hit by a virus. The other most common
security problem was unauthorized use of system
resources and data.
http://www.computerworld.com/cwi/stories/0,1199,NAV47-68-84-88_STO58255,00.html

------------------------ Yahoo! Groups Sponsor ---------------------~-~>
Find software faster. Search more than 20,000
software solutions on KnowledgeStorm. Register
now and get started.
http://us.click.yahoo.com/ncHzAA/yMSCAA/7f4EAA/kzAVlB/TM
---------------------------------------------------------------------_->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/