Re: [iwar] news2/Politics and cyber protection

From: c.b r (fastflyer28@yahoo.com)
Date: 2001-07-14 16:26:29


Return-Path: <sentto-279987-1429-995153192-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Sat, 14 Jul 2001 16:27:08 -0700 (PDT)
Received: (qmail 25288 invoked by uid 510); 14 Jul 2001 22:29:08 -0000
Received: from n2.groups.yahoo.com (HELO hi.egroups.com) (216.115.96.52) by 204.181.12.215 with SMTP; 14 Jul 2001 22:29:08 -0000
X-eGroups-Return: sentto-279987-1429-995153192-fc=all.net@returns.onelist.com
Received: from [10.1.4.54] by hi.egroups.com with NNFMP; 14 Jul 2001 23:26:32 -0000
X-Sender: fastflyer28@yahoo.com
X-Apparently-To: iwar@yahoogroups.com
Received: (EGP: mail-7_2_0); 14 Jul 2001 23:26:31 -0000
Received: (qmail 35850 invoked from network); 14 Jul 2001 23:26:31 -0000
Received: from unknown (10.1.10.142) by l8.egroups.com with QMQP; 14 Jul 2001 23:26:31 -0000
Received: from unknown (HELO web14501.mail.yahoo.com) (216.136.224.64) by mta3 with SMTP; 14 Jul 2001 23:26:30 -0000
Message-ID: <20010714232629.23867.qmail@web14501.mail.yahoo.com>
Received: from [12.78.118.148] by web14501.mail.yahoo.com via HTTP; Sat, 14 Jul 2001 16:26:29 PDT
To: iwar@yahoogroups.com
In-Reply-To: <200107141421.HAA04522@big.all.net>
From: "c.b r" <fastflyer28@yahoo.com>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sat, 14 Jul 2001 16:26:29 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: Re: [iwar] news2/Politics and cyber protection
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

From Wash, DC:
The Cyber Protection Board may be planned, but don't
expect any funding behind it after the new push for
immediate NMD, multi type(land sea and air)basing came
out last week.  That should use nearly all of DOD
acquisition budget for the next several years due to
the "all-holy" Bush Tax Cut.  Actions speak a thousand
words.
And for anyone that thought Mr. Rumsfeld would be
consulting with the Joint Chiefs on any of his defense
review and reform ideas, to include cyber war, a NYT
article today should have cleared that up for you. 
The Chiefs has not be asked to assist, or aid in
nearly anything since SecDef Rumsfeld came on board.
CJC Gen. Hugh Shelton has gone on record, today-
publically-that MR. Rumsfeld is not getting the job
done and is leaving the military in the dust.  Even
the Chiefs are concerned that present cyberwar
programs are not nearly sufficient.  Everything else
is simply "eyewash" to make it appear the
Administration is on the job in protecting the
critical cyber infrastructure. Don't bet on it.
Unfortunatly, there are no senior political officials,
like Dr. John Hamre  during the Clinton
Administration, that are putting any of their
political throw weight behind cyber security.

--- Fred Cohen <fc@all.net> wrote:
> Bush said to be planning cybersecurity board
> The Bush administration plans to create a board of
> senior national security officials to oversee the
> federal government's critical infrastructure
> protection efforts, effectively doing away with
> the idea of designating a single cybersecurity
> "czar," sources said. The move was said to have
> been agreed upon during a July 2 meeting with
> President Bush, who gave National Security Adviser
> Condoleeza Rice and other officials the green light
> to prepare a draft executive order setting up a
> Cybersecurity and Continuity of Operations Board.
>
http://www.cnn.com/2001/TECH/internet/07/12/cybersecurity.board.idg/index.html
> 
> Industry body slams new security bill
> The Computing Technology Industry Association (CTIA)
> has led a stinging attack on the UK Government's
> Private Security Issue Bill (PSIB), claiming that
> it is yet another burden on IT and network
> professionals. A spokesman for the CTIA said it
> would mean that security employees will have to
> obtain a licence from the Government in order to
> gain employment. The Bill faces stiff opposition
> from network professionals mainly because it refers
> to workers in physical security, but has left the
> definition open to include electronic security.
> http://www.vnunet.com/News/1123870
> 
> European Parliament restricts access to personal
> data
> Cappato report challenges plans to give law
> enforcement
> greater access to electronic communications. The
> European Parliament (EP) Civil Liberties Committee
> approved a report by the radical MEP Marco Cappato
> on Wednesday, in favour of a strict regulation of
> law
> enforcement authorities' access to personal data in
> the electronic communications sector. The decision
> complicates continuing efforts by the European
> Council
> to give individual countries the power to force
> telecoms
> and other communications providers to keep records
> of
> all voice and data communications of their citizens
> for
> up to seven years.
>
http://news.zdnet.co.uk/story/0,,t269-s2091211,00.html
> 
> Can Privacy Rights Survive?
> When it comes to privacy, ever more intrusive
> collection technologies are being rolled out,
> such as online tracking mechanisms, spyware,
> face recognition systems, location tracking
> devices and even thermal imaging, a Senate
> Commerce Committee panel was told today. And,
> Jason Catlett, president of Junkbusters.com
> and a visiting fellow at the Kennedy School
> of Government at Harvard, said in a written
> statement that "advances in 'cloaking'
> technologies are always outstripped by advances
> in collection technologies, both in capabilities
> and degree of adoption."
>
http://www.internetnews.com/bus-news/article/0,,3_799411,00.html
> 
> Hackers Launch New E-Mail List For Security Bugs
> Adding new fuel to an already fiery debate about the
> best way to publicize information about security
> holes
> in software, a new mailing list for hackers made its
> debut Wednesday at the Black Hat Briefings in Las
> Vegas.
> According to its founders, three high-profile
> computer
> security consultants and researchers, VulnWatch will
> steer clear of the commercialism and bureaucracy
> that
> they claim have degraded two of the most popular
> computer security lists: Bugtraq and NTBugtraq.
> http://www.newsbytes.com/news/01/167891.html
> 
> Wireless networks lure hackers
> A new way to attack wireless networks underscores
> the
> lack of security for PC owners using the airwaves to
> connect their computers, said security experts
> speaking
> at the Black Hat Briefings conference. On Thursday,
> Tim
> Newsham, a researcher for security firm @Stake,
> presented
> the details of  weaknesses in the password system of
> wireless networks that could lead to a break in
> security
> in less than 30 seconds. The flaw is the third to be
> uncovered in the so-called Wired Equivalent Privacy,
> or
> WEP, protocol that supposedly secures wireless
> networks.
> "WEP is inherently insecure," said Newsham. "So
> using WEP
> is essentially just throwing another barrier--and a
> small
> one--in front of the attacker."  That barrier can be
> overcome in 5 to 30 seconds in certain cases, he
> said.
>
http://www.zdnet.com/zdnn/stories/news/0,4586,5094057,00.html
> http://news.cnet.com/news/0-1003-200-6554365.html
> http://news.cnet.com/news/0-1003-201-6554634-0.html
> 


__________________________________________________
Do You Yahoo!?
Get personalized email addresses from Yahoo! Mail
http://personal.mail.yahoo.com/

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:37 PDT