[iwar] NEws

From: Fred Cohen (fc@all.net)
Date: 2001-04-07 18:46:20

Return-Path: <sentto-279987-1109-986694382-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Sat, 07 Apr 2001 18:47:07 -0700 (PDT)
Received: (qmail 21272 invoked by uid 510); 8 Apr 2001 00:47:32 -0000
Received: from hn.egroups.com ( by with SMTP; 8 Apr 2001 00:47:32 -0000
X-eGroups-Return: sentto-279987-1109-986694382-fc=all.net@returns.onelist.com
Received: from [] by hn.egroups.com with NNFMP; 08 Apr 2001 01:46:22 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_1_1); 8 Apr 2001 01:46:21 -0000
Received: (qmail 28195 invoked from network); 8 Apr 2001 01:46:21 -0000
Received: from unknown ( by l8.egroups.com with QMQP; 8 Apr 2001 01:46:21 -0000
Received: from unknown (HELO all.net) ( by mta1 with SMTP; 8 Apr 2001 01:46:21 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id SAA29614 for iwar@onelist.com; Sat, 7 Apr 2001 18:46:20 -0700
Message-Id: <200104080146.SAA29614@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sat, 7 Apr 2001 18:46:20 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] NEws
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Navy site hacked by China sympathizers The home page of a Navy Web site
was hijacked Thursday, apparently by supporters or agents of the
People=92s Republic of China, which holds the United States responsible
for the recent collision of a surveillance plane with a Chinese F-8
fighter.  The site, at www.peoarbs.navy.mil, was shut down immediately,
and the Navy is reviewing the incident, Navy spokeswoman Lt.  Jane
Alexander confirmed.  But she could not confirm suspicions that China
was responsible or that critical messages blamed the crew of the
Navy=92s EP-3E Aries II surveillance plane for the crash. 

Hackers target Malaysian Web sites Malaysia has set up a special unit to
counter teenage computer hackers who plague government Web sites,
leaving behind calling cards like ''government servants are lazy,''
newspapers say.  Samsudin Osman, the government's chief secretary,
quoted by newspapers Friday, said that hackers had broken into 89 sites
in the past two years.  ``It appears that we have been complacent in
addressing the issue,'' Samsudin said.  The newspapers said eight sites
were breached in one weekend alone last month. 

UK lacks security experts Many security managers lack formal security
qualifications UK business is suffering from a lack of security experts,
according to the Communications Management Association (CMA).  The
warning came at the launch this week of the CMA's Institute for
Communications, Arbitration and Forensics (Icaf), which will advise on
preventing and detecting security breaches.  In a survey of its members,
the CMA found that 42 percent of firms have a dedicated security
manager, but 35 percent of those managers have no formal security
qualifications.  To illustrate the shortage of IT security expertise in
the UK, CMA pointed out that the National High-Tech Crime Unit, a Home
Office funded body that tackles computer crime and offers security
advice, was unable to train its recruits in the UK and had to send them
to the US.

Reno Warns of Cyberterrorism Threat The United States should not wait
for an economic Pearl Harbor to occur before it cracks down harder on
cybercrime, former U.S.  Attorney General Janet Reno said Thursday. 
Speaking at Georgia Tech, she said the nation has been lucky that
cyberterrorism and Internet security breaches haven't been crippling. 
"We have been too lucky so far," Reno said.  "Our luck will run out."
She urged businesses and the government to work harder to collar
cybercriminals.  She also called for more federal funding to fight
cybercrime.  According to estimates, such crime costs U.S.  businesses
$100 billion a year.

Fed systems still too vulnerable Despite government mandates, agencies
are still far too vulnerable to cyberattack, federal experts testified
Thursday in the first of many hearings a House subcommittee promises to
hold on the security of the federal government.  The Federal Computer
Incident Response Center, the organization tasked with coordinating
civilian agencies=92 warnings and responses to cyberattacks, has tracked
a clear increase in the number of incidents, rising from 376 in 1998 to
586 in 2000.  But those numbers just skim the surface of the problem
because about 80 percent of incidents are not reported - usually because
the agencies involved don=92t know about them said Sallie McDonald,
assistant commissioner for the Office of Information Assurance and
Critical Infrastructure Protection at the General Services
Administration, the parent agency for FedCIRC. 

Bush won=92t have privacy czar President Bush does not plan to name a
privacy adviser, according to an official at the Office of Management
and Budget where President Clinton=92s "chief counselor for privacy"
resided.  "The position has expired," said Lauren Steinfeld, a policy
analyst in OMB=92s Office of Information and Regulatory Affairs.  The
counselor=92s responsibilities will be transferred to OIRA, she told an
auditorium full of federal Internet workers gathered for a seminar on
privacy.  In March 1999, President Clinton named Ohio law professor
Peter Swire as his chief adviser on privacy matters, particularly those
involving the Internet and information held by the federal government. 

Distant Early Warning Keeping a pulse on national and international
developments that impact computer security is like trying to catch a
subway train just leaving the station.  You do a lot of running, and
maybe, you still miss the train.  If your company does business across
multiple political borders, strange questions may arise.  What are the
Net risks particular to China? With India being a software engineering
center, are there unusual virus risks with software originating from
that country? How do political and cultural differences in these
countries enter into the computer security equation? These questions and
many others arising from the global scale of computer enterprise may tax
the resources of the computer security specialist.  Reviewing numerous
magazines and publications and websites for intelligence becomes a full
time job in itself.  And, with more tasks to do than hours in a week
allow, intelligence gathering cannot always be a priority. 

------------------------ Yahoo! Groups Sponsor ---------------------~-~>
Secure your servers with 128-bit SSL encryption!
Grab your copy of VeriSign's FREE Guide,
"Securing Your Web site for Business." Get it now!


Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 

This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:07 PDT