Return-Path: <sentto-279987-1429-995153192-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Sat, 14 Jul 2001 16:27:08 -0700 (PDT) Received: (qmail 25288 invoked by uid 510); 14 Jul 2001 22:29:08 -0000 Received: from n2.groups.yahoo.com (HELO hi.egroups.com) (216.115.96.52) by 204.181.12.215 with SMTP; 14 Jul 2001 22:29:08 -0000 X-eGroups-Return: sentto-279987-1429-995153192-fc=all.net@returns.onelist.com Received: from [10.1.4.54] by hi.egroups.com with NNFMP; 14 Jul 2001 23:26:32 -0000 X-Sender: fastflyer28@yahoo.com X-Apparently-To: iwar@yahoogroups.com Received: (EGP: mail-7_2_0); 14 Jul 2001 23:26:31 -0000 Received: (qmail 35850 invoked from network); 14 Jul 2001 23:26:31 -0000 Received: from unknown (10.1.10.142) by l8.egroups.com with QMQP; 14 Jul 2001 23:26:31 -0000 Received: from unknown (HELO web14501.mail.yahoo.com) (216.136.224.64) by mta3 with SMTP; 14 Jul 2001 23:26:30 -0000 Message-ID: <20010714232629.23867.qmail@web14501.mail.yahoo.com> Received: from [12.78.118.148] by web14501.mail.yahoo.com via HTTP; Sat, 14 Jul 2001 16:26:29 PDT To: iwar@yahoogroups.com In-Reply-To: <200107141421.HAA04522@big.all.net> From: "c.b r" <fastflyer28@yahoo.com> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sat, 14 Jul 2001 16:26:29 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: Re: [iwar] news2/Politics and cyber protection Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit From Wash, DC: The Cyber Protection Board may be planned, but don't expect any funding behind it after the new push for immediate NMD, multi type(land sea and air)basing came out last week. That should use nearly all of DOD acquisition budget for the next several years due to the "all-holy" Bush Tax Cut. Actions speak a thousand words. And for anyone that thought Mr. Rumsfeld would be consulting with the Joint Chiefs on any of his defense review and reform ideas, to include cyber war, a NYT article today should have cleared that up for you. The Chiefs has not be asked to assist, or aid in nearly anything since SecDef Rumsfeld came on board. CJC Gen. Hugh Shelton has gone on record, today- publically-that MR. Rumsfeld is not getting the job done and is leaving the military in the dust. Even the Chiefs are concerned that present cyberwar programs are not nearly sufficient. Everything else is simply "eyewash" to make it appear the Administration is on the job in protecting the critical cyber infrastructure. Don't bet on it. Unfortunatly, there are no senior political officials, like Dr. John Hamre during the Clinton Administration, that are putting any of their political throw weight behind cyber security. --- Fred Cohen <fc@all.net> wrote: > Bush said to be planning cybersecurity board > The Bush administration plans to create a board of > senior national security officials to oversee the > federal government's critical infrastructure > protection efforts, effectively doing away with > the idea of designating a single cybersecurity > "czar," sources said. The move was said to have > been agreed upon during a July 2 meeting with > President Bush, who gave National Security Adviser > Condoleeza Rice and other officials the green light > to prepare a draft executive order setting up a > Cybersecurity and Continuity of Operations Board. > http://www.cnn.com/2001/TECH/internet/07/12/cybersecurity.board.idg/index.html > > Industry body slams new security bill > The Computing Technology Industry Association (CTIA) > has led a stinging attack on the UK Government's > Private Security Issue Bill (PSIB), claiming that > it is yet another burden on IT and network > professionals. A spokesman for the CTIA said it > would mean that security employees will have to > obtain a licence from the Government in order to > gain employment. The Bill faces stiff opposition > from network professionals mainly because it refers > to workers in physical security, but has left the > definition open to include electronic security. > http://www.vnunet.com/News/1123870 > > European Parliament restricts access to personal > data > Cappato report challenges plans to give law > enforcement > greater access to electronic communications. The > European Parliament (EP) Civil Liberties Committee > approved a report by the radical MEP Marco Cappato > on Wednesday, in favour of a strict regulation of > law > enforcement authorities' access to personal data in > the electronic communications sector. The decision > complicates continuing efforts by the European > Council > to give individual countries the power to force > telecoms > and other communications providers to keep records > of > all voice and data communications of their citizens > for > up to seven years. > http://news.zdnet.co.uk/story/0,,t269-s2091211,00.html > > Can Privacy Rights Survive? > When it comes to privacy, ever more intrusive > collection technologies are being rolled out, > such as online tracking mechanisms, spyware, > face recognition systems, location tracking > devices and even thermal imaging, a Senate > Commerce Committee panel was told today. And, > Jason Catlett, president of Junkbusters.com > and a visiting fellow at the Kennedy School > of Government at Harvard, said in a written > statement that "advances in 'cloaking' > technologies are always outstripped by advances > in collection technologies, both in capabilities > and degree of adoption." > http://www.internetnews.com/bus-news/article/0,,3_799411,00.html > > Hackers Launch New E-Mail List For Security Bugs > Adding new fuel to an already fiery debate about the > best way to publicize information about security > holes > in software, a new mailing list for hackers made its > debut Wednesday at the Black Hat Briefings in Las > Vegas. > According to its founders, three high-profile > computer > security consultants and researchers, VulnWatch will > steer clear of the commercialism and bureaucracy > that > they claim have degraded two of the most popular > computer security lists: Bugtraq and NTBugtraq. > http://www.newsbytes.com/news/01/167891.html > > Wireless networks lure hackers > A new way to attack wireless networks underscores > the > lack of security for PC owners using the airwaves to > connect their computers, said security experts > speaking > at the Black Hat Briefings conference. On Thursday, > Tim > Newsham, a researcher for security firm @Stake, > presented > the details of weaknesses in the password system of > wireless networks that could lead to a break in > security > in less than 30 seconds. The flaw is the third to be > uncovered in the so-called Wired Equivalent Privacy, > or > WEP, protocol that supposedly secures wireless > networks. > "WEP is inherently insecure," said Newsham. "So > using WEP > is essentially just throwing another barrier--and a > small > one--in front of the attacker." That barrier can be > overcome in 5 to 30 seconds in certain cases, he > said. > http://www.zdnet.com/zdnn/stories/news/0,4586,5094057,00.html > http://news.cnet.com/news/0-1003-200-6554365.html > http://news.cnet.com/news/0-1003-201-6554634-0.html > __________________________________________________ Do You Yahoo!? Get personalized email addresses from Yahoo! Mail http://personal.mail.yahoo.com/ ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:37 PDT