[iwar] news


From: Fred Cohen
To: Information Warfare Mailing List
From: fc@all.net
To: iwar@onelist.com

Thu, 8 Mar 2001 08:00:41 -0800 (PST)


fc  Thu Mar  8 08:04:36 2001
Return-Path: 
Delivered-To: fc@all.net
Received: from 204.181.12.215
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Thu, 08 Mar 2001 08:04:36 -0800 (PST)
Received: (qmail 21458 invoked by uid 510); 8 Mar 2001 15:59:27 -0000
Received: from mv.egroups.com (208.50.144.81)
  by 204.181.12.215 with SMTP; 8 Mar 2001 15:59:27 -0000
X-eGroups-Return: sentto-279987-1017-984067243-fc=all.net@returns.onelist.com
Received: from [10.1.4.54] by mv.egroups.com with NNFMP; 08 Mar 2001 16:00:43 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_0_4); 8 Mar 2001 16:00:42 -0000
Received: (qmail 62852 invoked from network); 8 Mar 2001 16:00:41 -0000
Received: from unknown (10.1.10.142) by l8.egroups.com with QMQP; 8 Mar 2001 16:00:41 -0000
Received: from unknown (HELO all.net) (65.0.156.78) by mta3 with SMTP; 8 Mar 2001 17:01:45 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id IAA15893 for iwar@onelist.com; Thu, 8 Mar 2001 08:00:41 -0800
Message-Id: <200103081600.IAA15893@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Thu, 8 Mar 2001 08:00:41 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Crackers question moon landings
Attackers reopen debate over whether the moon
landings were faked A Web site belonging to
NASA -- the US space authority -- was attacked
by computer crackers on Wednesday, who replaced
the home page with the enigmatic question "Did
man really walk on the moon?" The site, belonging
to NASA's Geostationary Operational Environmental
Satellite (GOES) Project, was taken over by a
well-known group of Brazilian hackers known as
Prime Suspectz.
http://www.zdnet.co.uk/news/2001/9/ns-21426.html

Experts assess government role in online security
Government and private-sector experts in Internet
security on Tuesday gave their assessments of how
government should help guard against inevitable
cyber attacks from an array of likely foes. John
Tritak, director of the federal Critical
Infrastructure Assurance Office (CIAO), said
government must take a lead in the ensuring that
the nation's critical infrastructure is secure,
especially because government systems typically
are operated by private-sector entities. Tritak
called for leadership "from the White House down,"
in a coordinated approach, communicating a clear
message. Currently, he said, the system of
government still reflects its origins in the era
before the information age.
http://www.govexec.com/dailyfed/0301/030701td.htm

Pig Latin encoder tricks Napster
Programmers at the file-sharing firm Aimster
say they have found a disarmingly simple way
for Napster users to avoid recent restrictions
imposed on the service by a federal judge: an
encryption scheme based on Pig Latin. AIMSTER,
WHOSE software lets users trade files by
piggybacking on instant message networks,
released the free Aimster Pig Encoder program
Sunday on its Web site.
http://www.msnbc.com/news/540560.asp

'Aimster' thrives amid Napster woes
http://www.cnn.com/2001/TECH/internet/03/07/aimster.ap/index.html

Court says libraries can't be forced to limit Web access
In a key test of free speech rights in cyberspace,
a state appeals court on Tuesday found that parents
cannot force public libraries to limit Internet
access to prevent children from viewing pornography.
The 1st District Court of Appeal in San Francisco
rejected the legal claims of a conservative group
seeking to test whether local libraries could be
ordered to curtail Internet access, calling such
restrictions ``untenable'' under state and federal
law.
http://www.siliconvalley.com/docs/news/svfront/librar030701.htm

DSS adds content screening controls for email users
The UK's Department of Social Security (DSS) has
deployed content screening technology to protect
sensitive Government information. MailGuard SMTP,
from security firm NET-TEL, is being used by 'the
DSS to provide protection against a variety of
threats including accidental and malicious leakage
of sensitive material, virus attacks and exposure
to legal risks from misuse of email.
http://www.theregister.co.uk/content/8/17388.html

Anti-virus Company Blasts Industry, Media For Scare Tactics
On the day a potentially damaging Internet
worm was found loose in the wild, one
anti-virus company took its own industry,
as well as the news media, to task over the
myths and misperceptions the public has about
computer viruses. Susan Orbuch, spokesperson
for Trend Micro, told Newsbytes misinformation
about viruses is more dangerous than the bugs
themselves. "There is a vast body of knowledge
and folklore out there, much of which is
incorrect," said Orbuch. "The end user is
constantly exposed to misinformation and myths
by the media and by popular fiction such as
movies, TV and novels."
http://www.newsbytes.com/news/01/162786.html

Honeypots: Bait for the Cracker
Set up a server and fill it with tempting files.
Make it hard but not impossible to break into.
Then sit back and wait for the crackers to show
up. Observe them as they cavort around in the
server. Log their conversations with each other.
Study them like you'd watch insects under a
magnifying glass. That's the basic concept behind
honeypots and honeynets, systems that are set up
specifically so that security experts can secretly
observe crackers in their natural habitats. But
some say that honeynets and honeypots, single
servers used for cracker observation, are really
nothing more than electronic wiretapping and
entrapment and charge that the systems are
unethical and possibly illegal.
http://www.wired.com/news/culture/0,1284,42233,00.html

Commentary: Network security depends on you
The security of Air Force networks depends on you.
Without it, we can't leverage the immense power
of information to increase the lethality of our
warfighters. Throughout the year, the entire Air
Force is focusing on a unified campaign, "Global
Vigilance, Reach and Power: Information Assurance
in the 21st Century." This campaign is important
to our Air Force because the next "Pearl Harbor"
is likely to begin with a massive assault on our
information systems.
http://www.af.mil/news/Mar2001/n20010306_4013.shtml

------------------------ Yahoo! Groups Sponsor ---------------------~-~>
Find software faster. Search more than 20,000
software solutions on KnowledgeStorm. Register
now and get started.
http://us.click.yahoo.com/ncHzAA/yMSCAA/7f4EAA/kzAVlB/TM
---------------------------------------------------------------------_->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/