[iwar] [NewsBits] NewsBits - 09/17/01 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2001-09-18 09:29:36


Return-Path: <sentto-279987-2037-1000830577-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Tue, 18 Sep 2001 09:32:09 -0700 (PDT)
Received: (qmail 10486 invoked by uid 510); 18 Sep 2001 16:30:03 -0000
Received: from n12.groups.yahoo.com (216.115.96.62) by 204.181.12.215 with SMTP; 18 Sep 2001 16:30:03 -0000
X-eGroups-Return: sentto-279987-2037-1000830577-fc=all.net@returns.onelist.com
Received: from [10.1.4.55] by n12.onelist.org with NNFMP; 18 Sep 2001 16:29:35 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_3_2_2); 18 Sep 2001 16:29:37 -0000
Received: (qmail 20214 invoked from network); 18 Sep 2001 16:29:36 -0000
Received: from unknown (10.1.10.26) by l9.egroups.com with QMQP; 18 Sep 2001 16:29:36 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 18 Sep 2001 16:29:36 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id JAA05996 for iwar@onelist.com; Tue, 18 Sep 2001 09:29:36 -0700
Message-Id: <200109181629.JAA05996@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Tue, 18 Sep 2001 09:29:36 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [NewsBits] NewsBits - 09/17/01 (fwd)
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Online Posters Can Stay Anonymous, California Court Rules: Scoring a
victory for the protection of anonymous peech on the Internet, the
Electronic Frontier Foundation (EFF) announced that a California state
court has ruled in its favor and nullified a subpoena calling for
disclosure of the names and identities of several anonymous Web users
who wrote critical postings about a law firm on a Yahoo! message board. 
http://www.newsfactor.com/perl/story/12783.html

Companies fear wave of cyberterrorism Corporations are taking steps to
protect computer networks after this week's strikes on the Pentagon and
World Trade Center, fearing that the next attacks might be launched
online, experts said.  Although many companies were in shock, some
executives did not waste any time in preparing for possible cyber
attacks, which often follow closely on the heels of international
conflicts, experts said Friday. 
http://www.zdnet.com/zdnn/stories/news/0,4586,2812815,00.html

Pentagon lost a comm link in crash The damage caused by the
terrorist-commandeered jetliner that crashed into the Pentagon Tuesday
will surely include lost data and impaired Defense systems, said John P. 
Stenbit, Defense Department CIO.  "There are places here that don't
exist anymore," Stenbit said during a press briefing in his office
today.  Some data is easily replaceable and some is not, he said,
adding, "You can believe there are things that don't work."
http://www.gcn.com/vol1_no1/daily-updates/17092-1.html

Assessing Net's structural integrity In plans for next generation, key
concern is infrastructure.  Every day as the sun rises above the large
cities of the world, a wave of Internet data traffic begins to build. 
In the United States, the traffic pattern builds first in the eastern
part of the country and then moves steadily west as the rest of the
country starts to wake up.  Businesses and consumers collectively send
billions of bits of data across this interconnected mesh of networks
spanning the face of the planet.
http://www.msnbc.com/news/625010.asp

Encryption crackdown gets thumbs down Proposals by the US government for
a global ban on sophisticated encryption tools, thought to have been
used in the recent terrorist raids on the States, have been met with
concern in Australia.  As reported by ZDNet, US Senator Judd Gregg has
proposed tighter restrictions on the use of encryption software, which
scrambles electronic data and hinders its detection, and has called for
international support.  Reports since the Septermber 11 terrorist
attacks say that the FBI believe such tools were used to orchestrate the
event. 
http://www.zdnet.com.au/newstech/security/story/0,2000024985,20260497,00.htm

Send in the online spooks? In the aftermath of terrorism, civil
libertarians are running for cover.  But are they protesting too much?
This week, the FBI obtained a court order, citing the Foreign
Intelligence Surveillance Act that demanded specific information
concerning selected subscribers to America Online and EarthLink, the
country's two largest Internet service providers. 
http://www.salon.com/tech/feature/2001/09/14/privacy/index.html

Geeks Gather to Back Crypto Rob Carlson is worried about something that
most Americans would consider entirely obscure: the future of encryption
technology.  Carlson, a 21-year-old programmer who typically sports a
floppy, pin-studded safari hat, fears that the U.S.  Congress, in the
wake of last week's bloody attacks, may vote for anti- terrorism
legislation that also threatens privacy.  "There's nothing as permanent
as a temporary restriction," he says. 
http://www.wired.com/news/politics/0,1283,46900,00.html

Security initiatives raise privacy concerns The debat over privacy and
security concerns is sure to take a center role in the wake of the
attacks in New York and Washington, as citizens, businesses, and
lawmakers try to figure out how personal privacy and national security
can coexist.  "I think what you're going to see is an awful lot of
pressure from the government to at least increase the ability of law
enforcement to get access to private information," said Rob Enderle, an
analyst at Giga Information Group, in San Jose, Calif. 
http://www.infoworld.com/articles/hn/xml/01/09/17/010917hnprivacy.xml

Attacks silence privacy concerns
http://www.zdnet.com/zdnn/stories/news/0,4586,2812863,00.htm Information
security will be key with lawmakers
http://www.cnn.com/2001/TECH/industry/09/17/information.security.idg/index.html
Senate committee looks into IT vulnerabilities
http://www.cnn.com/2001/TECH/internet/09/14/it.vulnerabilities.idg/index.html
Terrorist threat shifts priorities in online rights debate
http://news.cnet.com/news/0-1005-201-7149229-0.html

Civil Liberties Under Law Enforcement Onslaught - EFF In the wake of
last week's terrorist attacks in New York and Washington, civil
libertarians nationwide are watching nervously as federal law
enforcement officials prepare to mount a massive legislative push that
could rewrite constitutional protections online.  "We're extremely
concerned with what's going on legislatively," Electronic Frontier
Foundation (EFF) Executive Director Shari Steele said today.  "I would
caution Congress to slow down a bit."
http://www.newsbytes.com/news/01/170180.html

Firms Invest in a Feeling of Security Last week's terrorist attacks
wreaked havoc on global commerce, but they could mean brisk business for
at least one industry.  Just days after the disaster, the Washington
area's private security industry is scrambling to meet surging demand
for its services.
http://www.washtech.com/news/software/12514-1.html

Disposable cell phones spur debates Hop-On Wireless Chief Executive
Peter Michaels and the rest of the nascent disposable cell phone
industry are scrambling to defend a product that hasn't made it into the
United States yet, but is a target of the nation's top crime fighters as
they crack down on terrorism.  During the weekend, U.S.  Attorney
General John Ashcroft and FBI Director Robert Mueller indicated that
disposable phones are one of the reasons they want to give the U.S.  law
enforcement community more legal power to fight terrorism, using
techniques such as tapping phones. 
http://news.cnet.com/news/0-1004-200-7206084.html
http://www.zdnet.com/zdnn/stories/news/0,4586,5097046,00.html

Steganography used to hide the occurrence of communication.  Recent
suggestions in US newspapers indicate that terrorists use steganography
to communicate in secret with their accomplices.  In particular, images
on the internet were mentioned as the communication medium.  While the
newspaper articles sounded very dire, none substantiated these rumors. 
http://www.citi.umich.edu/techreports/reports/citi-tr-01-11.pdf

A new kind of combat Intelligence-sharing technology developed by the
military may help intelligence agencies analyze information about the
Sept.  11 terrorist attacks and possibly help prevent future attacks. 
The Defense Advanced Research Projects Agency has offered technology it
developed under its Genoa project to the intelligence community.  The
sophisticated collaboration tools are being installed in some offices
and may soon be used by the National Security Council in the White House
situation room, according to sources close to the project. 
http://www.fcw.com/fcw/articles/2001/0917/news-genoa-09-17-01.asp

Simulation-technology expected to play crucial role in war Last week, Ed
Kulakowski was sipping a martini in the Windows on the World restaurant
while marveling at the view from atop New York's World Trade Center. 
Today, the defense-training contractor is back in Orlando, pondering his
industry's role in America's response to the terrorists who turned the
world's largest commercial complex into a pile of rubble and dust. 
http://www.siliconvalley.com/docs/news/tech/073014.htm

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Get VeriSign's FREE GUIDE: "Securing Your Web Site for Business." Learn about using SSL for serious online security. Click Here!
http://us.click.yahoo.com/LgMkJD/I56CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:45 PDT