Return-Path: <sentto-279987-1219-989377523-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Tue, 08 May 2001 20:06:08 -0700 (PDT) Received: (qmail 2493 invoked by uid 510); 9 May 2001 02:07:29 -0000 Received: from n1.groups.yahoo.com (HELO hh.egroups.com) (216.115.96.51) by 204.181.12.215 with SMTP; 9 May 2001 02:07:29 -0000 X-eGroups-Return: sentto-279987-1219-989377523-fc=all.net@returns.onelist.com Received: from [10.1.4.53] by hh.egroups.com with NNFMP; 09 May 2001 03:05:32 -0000 X-Sender: fc@all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_1_2); 9 May 2001 03:05:22 -0000 Received: (qmail 1951 invoked from network); 9 May 2001 03:04:33 -0000 Received: from unknown (10.1.10.26) by l7.egroups.com with QMQP; 9 May 2001 03:04:33 -0000 Received: from unknown (HELO all.net) (65.0.156.78) by mta1 with SMTP; 9 May 2001 03:04:33 -0000 Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id UAA27554 for iwar@onelist.com; Tue, 8 May 2001 20:04:33 -0700 Message-Id: <200105090304.UAA27554@all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 8 May 2001 20:04:33 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] news more news Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit China's Datang says it has not obtained Lucent data Datang Telecom Technology Co said in a statement on Tuesday it has not obtained sensitive computer data from Lucent Technologies Inc. The statement appeared after two Chinese nationals working as high-level scientists for Lucent and a third man, a U.S. citizen, were arrested and charged in the United States last week with stealing the trade secrets for transfer to a Chinese tech firm. The three are accused of conspiring to steal source code and software associated with Lucent's PathStar Access Server, which facilitates transmission of voice communication through the Internet while also providing call-waiting, speed dialing and other features. http://www.siliconvalley.com/docs/news/tech/005812.htm http://www.techtv.com/news/politicsandlaw/story/0,24195,3326426,00.html Bill backs FOIA exemption for cybersecurity information A leading cybersecurity lawmaker said Monday that he would introduce legislation to exempt from the Freedom of Information Act businesses that share information on computer intrusions with the government. Sen. Robert Bennett, R-Utah, said such a move is essential to help safeguard the Internet from hackers and cyber terrorists. The bill, which Bennett said he would introduce within the next 45 days, would draw upon his experiences as chairman of the Senate's now-disbanded Y2K Committee in fighting threats to keep America's computer networks open. Bennett's remarks came as he delivered the opening keynote speech at the Electronic Industries Alliance's conference in Washington. http://www.govexec.com/dailyfed/0501/050801td.htm Intelligence community welcomes data sharing Intelligence agencies are embracing secure data sharing and collaboration as a way to smooth processes and provide their users with one-stop shopping for services and communications, several officials said during the Defense Department's Secure E-Business Summit yesterday in Arlington, Va. Implementation of the Intelligence Community Systems Information Sharing (ICSIS) initiative is in Phase 1 and will likely take several years to complete, Defense Intelligence Agency systems architect Mike Swindle said. In July, management staff will be briefed on where the project stands, and they will then decide how to proceed, Swindle said. http://www.gcn.com/vol1_no1/daily-updates/4217-1.html The Cyber-Warriors Are Out To Get You Think your business is safe from a cyber- attack? Tell that to the Australian bank that found A $600 million (US$311 million) was slipping out via the computer system. They caught it in time. Or tell it to the water authority near Brisbane, Australia, where a vandal remotely unleashed sewage into a reservoir. It doesn't surprise Ajoy Ghosh, Unisys Australia IT security whiz, who found that Australian banks are among the Web sites most open to online attack. He reported findings of a Unisys survey to a media briefing on IT security issues. http://www.newsbytes.com/news/01/165415.html The Rise of Steganography The next major battle between hackers and the Corporate Republic will almost surely involve the relatively unknown fields of steganography and digital watermarking, otherwise known as Information Hiding, a scientific discipline to take very seriously. This is where the big three digital policy issues -- privacy, security and copyright -- all collide head-on with corporatism. If they hated Napster, they'll really go nuts over rapidly evolving research into how to hide data inside data. http://slashdot.org/features/01/05/03/2043244.shtml ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:12 PDT