Return-Path: <sentto-279987-1109-986694382-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Sat, 07 Apr 2001 18:47:07 -0700 (PDT) Received: (qmail 21272 invoked by uid 510); 8 Apr 2001 00:47:32 -0000 Received: from hn.egroups.com (208.50.99.199) by 204.181.12.215 with SMTP; 8 Apr 2001 00:47:32 -0000 X-eGroups-Return: sentto-279987-1109-986694382-fc=all.net@returns.onelist.com Received: from [10.1.4.54] by hn.egroups.com with NNFMP; 08 Apr 2001 01:46:22 -0000 X-Sender: fc@all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_1_1); 8 Apr 2001 01:46:21 -0000 Received: (qmail 28195 invoked from network); 8 Apr 2001 01:46:21 -0000 Received: from unknown (10.1.10.26) by l8.egroups.com with QMQP; 8 Apr 2001 01:46:21 -0000 Received: from unknown (HELO all.net) (65.0.156.78) by mta1 with SMTP; 8 Apr 2001 01:46:21 -0000 Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id SAA29614 for iwar@onelist.com; Sat, 7 Apr 2001 18:46:20 -0700 Message-Id: <200104080146.SAA29614@all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sat, 7 Apr 2001 18:46:20 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] NEws Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Navy site hacked by China sympathizers The home page of a Navy Web site was hijacked Thursday, apparently by supporters or agents of the People=92s Republic of China, which holds the United States responsible for the recent collision of a surveillance plane with a Chinese F-8 fighter. The site, at www.peoarbs.navy.mil, was shut down immediately, and the Navy is reviewing the incident, Navy spokeswoman Lt. Jane Alexander confirmed. But she could not confirm suspicions that China was responsible or that critical messages blamed the crew of the Navy=92s EP-3E Aries II surveillance plane for the crash. http://www.gcn.com/vol1_no1/daily-updates/3941-1.html Hackers target Malaysian Web sites Malaysia has set up a special unit to counter teenage computer hackers who plague government Web sites, leaving behind calling cards like ''government servants are lazy,'' newspapers say. Samsudin Osman, the government's chief secretary, quoted by newspapers Friday, said that hackers had broken into 89 sites in the past two years. ``It appears that we have been complacent in addressing the issue,'' Samsudin said. The newspapers said eight sites were breached in one weekend alone last month. http://www.zdnet.com/zdnn/stories/newsbursts/0,7407,2705518,00.html UK lacks security experts Many security managers lack formal security qualifications UK business is suffering from a lack of security experts, according to the Communications Management Association (CMA). The warning came at the launch this week of the CMA's Institute for Communications, Arbitration and Forensics (Icaf), which will advise on preventing and detecting security breaches. In a survey of its members, the CMA found that 42 percent of firms have a dedicated security manager, but 35 percent of those managers have no formal security qualifications. To illustrate the shortage of IT security expertise in the UK, CMA pointed out that the National High-Tech Crime Unit, a Home Office funded body that tackles computer crime and offers security advice, was unable to train its recruits in the UK and had to send them to the US. http://www.zdnet.co.uk/news/2001/13/ns-22114.html Reno Warns of Cyberterrorism Threat The United States should not wait for an economic Pearl Harbor to occur before it cracks down harder on cybercrime, former U.S. Attorney General Janet Reno said Thursday. Speaking at Georgia Tech, she said the nation has been lucky that cyberterrorism and Internet security breaches haven't been crippling. "We have been too lucky so far," Reno said. "Our luck will run out." She urged businesses and the government to work harder to collar cybercriminals. She also called for more federal funding to fight cybercrime. According to estimates, such crime costs U.S. businesses $100 billion a year. http://63.108.181.201/2001/04/06/F/32619342-0144-Home.html Fed systems still too vulnerable Despite government mandates, agencies are still far too vulnerable to cyberattack, federal experts testified Thursday in the first of many hearings a House subcommittee promises to hold on the security of the federal government. The Federal Computer Incident Response Center, the organization tasked with coordinating civilian agencies=92 warnings and responses to cyberattacks, has tracked a clear increase in the number of incidents, rising from 376 in 1998 to 586 in 2000. But those numbers just skim the surface of the problem because about 80 percent of incidents are not reported - usually because the agencies involved don=92t know about them said Sallie McDonald, assistant commissioner for the Office of Information Assurance and Critical Infrastructure Protection at the General Services Administration, the parent agency for FedCIRC. http://www.fcw.com/fcw/articles/2001/0402/web-cyber-04-06-01.asp http://www.gcn.com/vol1_no1/daily-updates/3940-1.html Bush won=92t have privacy czar President Bush does not plan to name a privacy adviser, according to an official at the Office of Management and Budget where President Clinton=92s "chief counselor for privacy" resided. "The position has expired," said Lauren Steinfeld, a policy analyst in OMB=92s Office of Information and Regulatory Affairs. The counselor=92s responsibilities will be transferred to OIRA, she told an auditorium full of federal Internet workers gathered for a seminar on privacy. In March 1999, President Clinton named Ohio law professor Peter Swire as his chief adviser on privacy matters, particularly those involving the Internet and information held by the federal government. http://www.fcw.com/fcw/articles/2001/0402/web-swire-04-06-01.asp Distant Early Warning Keeping a pulse on national and international developments that impact computer security is like trying to catch a subway train just leaving the station. You do a lot of running, and maybe, you still miss the train. If your company does business across multiple political borders, strange questions may arise. What are the Net risks particular to China? With India being a software engineering center, are there unusual virus risks with software originating from that country? How do political and cultural differences in these countries enter into the computer security equation? These questions and many others arising from the global scale of computer enterprise may tax the resources of the computer security specialist. Reviewing numerous magazines and publications and websites for intelligence becomes a full time job in itself. And, with more tasks to do than hours in a week allow, intelligence gathering cannot always be a priority. http://securityportal.com/articles/earlywarning20010406.html ------------------------ Yahoo! Groups Sponsor ---------------------~-~> Secure your servers with 128-bit SSL encryption! Grab your copy of VeriSign's FREE Guide, "Securing Your Web site for Business." Get it now! http://us.click.yahoo.com/4cW4jC/e.WCAA/bT0EAA/kzAVlB/TM ---------------------------------------------------------------------_-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:07 PDT