[iwar] news


From: Fred Cohen
To: Information Warfare Mailing List
From: fc@all.net
To: iwar@onelist.com

Thu, 8 Mar 2001 21:00:37 -0800 (PST)


fc  Thu Mar  8 21:02:36 2001
Return-Path: 
Delivered-To: fc@all.net
Received: from 204.181.12.215
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Thu, 08 Mar 2001 21:02:36 -0800 (PST)
Received: (qmail 13385 invoked by uid 510); 9 Mar 2001 04:59:22 -0000
Received: from fk.egroups.com (64.211.240.232)
  by 204.181.12.215 with SMTP; 9 Mar 2001 04:59:22 -0000
X-eGroups-Return: sentto-279987-1020-984114040-fc=all.net@returns.onelist.com
Received: from [10.1.4.56] by fk.egroups.com with NNFMP; 09 Mar 2001 05:00:40 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_0_4); 9 Mar 2001 05:00:39 -0000
Received: (qmail 60520 invoked from network); 9 Mar 2001 05:00:39 -0000
Received: from unknown (10.1.10.27) by l10.egroups.com with QMQP; 9 Mar 2001 05:00:39 -0000
Received: from unknown (HELO all.net) (65.0.156.78) by mta2 with SMTP; 9 Mar 2001 05:00:38 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id VAA22336 for iwar@onelist.com; Thu, 8 Mar 2001 21:00:37 -0800
Message-Id: <200103090500.VAA22336@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Thu, 8 Mar 2001 21:00:37 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Pentagon finds holes in DMS
The Pentagon=92s latest operational test and
evaluation report found substantial shortfalls
with some of the Defense Department=92s biggest
information technology systems, including
security holes in the Defense Message System.
The annual report of the Director, Operational
Test and Evaluation, was delivered to Congress
in February and made public in early March.
The report includes the Pentagon=92s assessment
of all major systems tested and evaluated in
2000 as part of the acquisition process. Among
other things, the report found that DMS is not
fully secure. Testers were able to penetrate
the system several times, including the five
DMS test sites, its infrastructure nodes, and
the Regional Node and Operations Security Center.
http://www.fcw.com/fcw/articles/2001/0305/web-eval-03-07-01.asp

NIAP offering security forum
The National Information Assurance Partnership
is offering agencies and industry a forum to
determine how to build security requirements
into the development cycle of commercial
products, something that would make it easier
to secure an organization=92s systems enterprise
wide. In the current information technology
environment, agencies trying to secure networks
made up of commercial off-the-shelf hardware
and software must purchase add-on products or
customize the COTS products.
http://www.fcw.com/fcw/articles/2001/0305/web-niap-03-08-01.asp

Lawmakers Cringe At Prospect Of Adopting EU Privacy Laws
House lawmakers lashed out at European privacy
regulators today, saying an agreement that soon
will govern personal data flowing from Europe
to the US threatens to undermine US sovereignty,
and industry-led privacy self-regulation. "I have
serious reservations about the real impact of the
EU Privacy Directive on commerce and trade," said
House Energy and Commerce Committee Chairman W. J.
"Billy" Tauzin, R-La., at a hearing today. "It
certainly provides for extraterritorial enforcement
of EU principles on Americans and American companies."
The EU Privacy Directive is an agreement among 15
European Union nations dictating how businesses may
collect, use or transfer personal information.
http://www.newsbytes.com/news/01/162907.html

'Three strikes and you're out' for domain name hijackers
Companies that abuse their trademark rights in
attempts to grab .uk domain names -- a practice
known as reverse hijacking -- will be subject
to a 'three strikes and you're out' rule from
this autumn. The new rules were published last
week in a discussion paper by Nominet, the
company that manages the .uk domain. Speaking
at a conference in London on Wednesday, Nominet
solicitor Emily Taylor said the rules are
designed to help protect individuals from
powerful companies that throw their weight
around, as well as to speed the process for
companies and famous personalities to recover
domain names where they have a legitimate right
to them.
http://www.zdnet.co.uk/news/2001/9/ns-21445.html

New decryption code underscores DVD security weakness
MIT student Keith Winstein and alum Marc Horowitz
say they're out to prove a point: Publishing code
that decrypts and plays DVD movies is not a crime.
In their case, they assert it's about teaching
copyright issues and is thus protected under the
First Amendment. Last week, a Web site published
the pair's seven-line program, which unscrambles
the protection around a DVD so quickly that a
movie can play at the same time, although the
film appears choppy. It's the shortest program
to break DVD defenses to date.
http://news.cnet.com/news/0-1005-200-5058111.html

NSA, Carnivore, Others Win 'Anti-Awards'
The National Security Agency, the FBI's Carnivore
Internet surveillance system, ChoicePoint and the
city of Tampa today all received the dubious "Big
Brother" awards from Privacy International for
their Internet missteps in the eyes of online
privacy advocates. The National Security Agency
took top "honors" for the "lifetime menace award,"
despite Privacy International's David Banisar's
assertion that in the past five years "they've
gotten happy and friendly." He noted that this
latest trend of NSA user-friendliness has
amounted to a general attempt not to stop
invading citizen's privacy, but to focus
attention away from it.
http://www.newsbytes.com/news/01/162864.html

Net-connected gadgets can spy on you, privacy expert says
Popular electronic gadgets with links to the
Internet pose a mounting threat to consumer
privacy, Richard Smith, a leading computer
privacy expert, said in an interview
Wednesday. Smith, chief technology officer
for the Privacy Foundation, a Denver-based,
non-profit advocacy group, said a variety of
gadgets have come to market this past year
that pump consumer data directly back to
corporate marketing systems. Such everyday
``spy'' devices include fitness monitors that
track heart rates and pump out exercise-related
advertising, digital music players that track
listening habits, low-cost wristwatch and
wireless surveillance cameras, as well as
location-tracking mobile phones and other
monitoring devices.
http://www.siliconvalley.com/docs/news/tech/063471.htm
http://news.cnet.com/news/0-1005-200-5067281.html
http://www.zdnet.com/zdnn/stories/news/0,4586,2693860,00.html

Deactivators set up in both lower and upper houses
Fed up with the incessant ringing of mobile phones,
the leaders of India=92s parliament have installed
jamming devices to thwart lawmakers who refuse to
turn their phones off. The Hindustan Times said on
Thursday deactivators had been set up in both the
lower and upper houses after repeated requests to
deputies not to carry cellphones inside the building
- or at least to switch them off - went widely
unheeded. The paper said the last straw was when
President K.R. Narayanan=92s customary address to
a joint session of parliament last month was
punctuated by cellphones ringing at least half
a dozen times.
http://www.msnbc.com/news/541321.asp

Political hackers are modern freedom fighters,
Terrorists or political campaigners?
Hacktivists have officially moved from nerdish
extremists to become the political protest
visionaries of the digital age, a meeting at
the Institute of Contemporary Arts in London
will be told on Thursday. Paul Mobbs, an
experienced Internet activist and anti-capitalist
protestor, will tell attendees that the techniques
used by politically minded computer hackers --
from jamming corporate networks and sending email
viruses to defacing Web sites -- has moved into
the realm of political campaigning. Mobbs says
that the term "Hacktivism" has been adopted by so
many different groups, from peaceful Net campaigners
to Internet hate groups, that it is essentially
meaningless, but claims that Internet protest is
here to stay. "It has a place, whether people like
it or not," says Mobbs.
http://www.zdnet.co.uk/news/2001/9/ns-21446.html
http://www.guardianunlimited.co.uk/internetnews/story/0,7369,448417,00.html

------------------------ Yahoo! Groups Sponsor ---------------------~-~>
Find software faster. Search more than 20,000
software solutions on KnowledgeStorm. Register
now and get started.
http://us.click.yahoo.com/ncHzAA/yMSCAA/7f4EAA/kzAVlB/TM
---------------------------------------------------------------------_->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/