Return-Path: <sentto-279987-2057-1000876786-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Tue, 18 Sep 2001 22:21:10 -0700 (PDT) Received: (qmail 31868 invoked by uid 510); 19 Sep 2001 05:20:11 -0000 Received: from n13.groups.yahoo.com (216.115.96.63) by 204.181.12.215 with SMTP; 19 Sep 2001 05:20:11 -0000 X-eGroups-Return: sentto-279987-2057-1000876786-fc=all.net@returns.onelist.com Received: from [10.1.4.54] by jj.egroups.com with NNFMP; 19 Sep 2001 05:19:46 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_3_2_2); 19 Sep 2001 05:19:45 -0000 Received: (qmail 13192 invoked from network); 19 Sep 2001 05:19:45 -0000 Received: from unknown (10.1.10.26) by l8.egroups.com with QMQP; 19 Sep 2001 05:19:45 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 19 Sep 2001 05:19:44 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id WAA20205 for iwar@onelist.com; Tue, 18 Sep 2001 22:19:44 -0700 Message-Id: <200109190519.WAA20205@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 18 Sep 2001 22:19:44 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [NewsBits] NewsBits - 09/18/01 (fwd) Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit September 18, 2001 FBI investigating new Internet worm Attorney General John Ashcroft Tuesday warned computer users about a new Internet threat that could slow the global network worse than the ``Code Red'' worm that struck earlier this summer. Ashcroft said the FBI and private firms are assessing the effects of the program, known as ``W32-Nimda,'' which has affected possibly tens of thousands of computers. As the program spreads, its activity can slow or shut down Internet service for regular users. http://www.siliconvalley.com/docs/news/tech/031251.htm Ashcroft: 'Nimda' Worm not linked to attacks http://www.siliconvalley.com/docs/news/reuters_wire/1497408l.htm http://www.newsbytes.com/news/01/170236.html New computer worm hits both servers and PCs http://www.siliconvalley.com/docs/news/reuters_wire/1497279l.htm http://news.zdnet.co.uk/story/0,,t269-s2095530,00.html http://abcnews.go.com/sections/scitech/DailyNews/nimbdaworm010918_wire.html http://www.ananova.com/news/story/sm_401976.html http://news.cnet.com/news/0-1003-200-7215349.html http://www.zdnet.com/zdnn/stories/news/0,4586,5097089,00.html Code Red-based email worm breaks out http://www.theregister.co.uk/content/56/21734.html Code Rainbow Loose In The Wild - Security Experts http://www.newsbytes.com/news/01/170225.html http://www.newsbytes.com/news/01/170234.html http://www.newsbytes.com/news/01/170231.html Worm's Data Traffic Hitting Hardest On Net Side Roads http://www.newsbytes.com/news/01/170243.html Terrorism-Related Site Hacks Could Slow Networks - FBI A concerted effort on the part of vigilante hackers to destroy Internet sites and computer networks run by terrorist and pro-terrorist organizations could damage networks unrelated to terrorist activity, the FBI warned today. http://www.newsbytes.com/news/01/170229.html Hacker Cracks Islamist Mailing List The anonymous hacker has published a list of hundreds of e-mail addresses, including that of a suspect in last week=92s World Trade Center attack. A hacker has cracked a German-based Islamist Web site, publishing on the Web hundreds of e-mail addresses of subscribers to its mailing list, including one of a suspect in last week's terrorist attack on the World Trade Center in New York. http://www.thestandard.com/article/0,1902,29008,00.html E-Mail Hackers in Switzerland Hackers have managed to gain access to the e-mail server of Swiss internet provider Swiss Online. They now have 250,000 e-mail addresses, along with passwords, at their disposal. Included in these addresses are those of various banks and embassies. The e-mail accounts of the embassies of France, Monaco and Israel, as well as that of UBS have been accessed. http://www.antionline.com/showthread.php?threadid=3D111994 FBI takes terrorist investigation online In the hours following attacks on the World Trade Center and the Pentagon Sept. 11, the FBI moved quickly to mount an investigation of unprecedented scale. One of its first steps was to generate tips from the public by establishing a toll-free, national telephone hot line. Then it looked for a Web site that could do the same thing. http://www.govexec.com/dailyfed/0901/091801h2.htm Militant terrorists used Internet communications in Germany An estimated 500 Internet users apparently frequented an online newsletter based in Germany on the activities of militant Islamists, a German website reported late Monday. "Spiegel Online" said an unknown hacker found the mailing list of the newsletter, which originated from a website named as www.qoqaz.de and which is now offline. http://www.antionline.com/showthread.php?threadid=3D111996 U.S. commission examines cyberterrorism As the U.S. government begins to formulate policy in response to the terrorist attacks last week, it is faced with trying to heighten national security and preparedness while preserving American citizens' civil liberties. http://www.cnn.com/2001/TECH/industry/09/18/cyberterrorism.idg/index.html 48 US Prosecutors Mobilized to Fight Cybercrime Security within the information technology sector is one of the most serious problems facing the US, said public prosecutor John Ashcroft on Friday. He added that the nine units to specialise in fighting IT pirating and infringements of copyright law are in the process of being set up. In total, 48 prosecutors have been approached. A PricewaterhouseCoopers report has found that business has spent $300 million so far to counter hackers and viruses. http://www.antionline.com/showthread.php?threadid=3D111995 Cyber Corps tackles terrorism When last week's terrorist attack struck, computer science professor Sujeet Shenoi was at a Department of Defense meeting not far from the Pentagon to talk about a program aimed at countering cyberterrorism. "We wondered if they were going to take down the telephone systems in New York and Washington," says Shenoi, of the University of Tulsa. "My fear is for the next time this happens." Computer security experts have long warned that systems controlling everything from the phones and air traffic to the Internet are vulnerable =97 and that there are too few experts to deal with problems should they occur. http://www.usatoday.com/life/cyber/tech/2001/09/18/cyber-corps.htm Info security speeding up Information security programs and systems at agencies across government are going forward, in some cases faster than before, in the wake of the Sept. 11 attacks on the World Trade Center and the Pentagon. http://www.fcw.com/fcw/articles/2001/0917/web-secure-09-18-01.asp U.S. citizens back encryption controls A poll in the United States has found widespread support for a ban on "uncrackable" encryption products, following proposals in Congress to tighten restrictions on software that scrambles electronic data. The survey found that 72 percent of Americans believe that anti-encryption laws would be "somewhat" or "very" helpful in preventing a repeat of last week's terrorist attacks on New York's World Trade Center and the Pentagon in Washington, D.C. http://news.cnet.com/news/0-1005-200-7215723.html Attacks put new light on Web services The terrorist disaster last week could prompt businesses to turn toward outsourcing more of their technology needs to ensure their information is safe, analysts say. Outsourced services, such as Web hosting, e-mail and Net infrastructure management, have seen a lack of demand in the past year as corporations spent more carefully amid the U.S. economic downturn. http://www.zdnet.com/zdnn/stories/news/0,4586,5097068,00.html Terror attacks usher in copy controlled hardware Senator Hollings' SSSCA legislation - which makes copy-controlled hardware mandatory (and circumventing it illegal) - has received remarkably little attention since it was revealed ten days ago. No petitions, no EFF Alert (as yet), and very little public uproar. http://www.theregister.co.uk/content/54/21736.html Technology's Role to Grow in a New World of Security Security experts are describing a new kind of country, where electronic identification might become the norm, immigrants might be tracked far more closely and the airspace over cities like New York and Washington might be off limits to all civilian aircraft. Yesterday, Attorney General John Ashcroft outlined several proposals, saying, "We should strengthen our laws to increase the ability of the Department of Justice and its component agencies to identify, prevent and punish terrorism." http://www.nytimes.com/2001/09/18/national/18RULE.html The National Academies put terrorism studies online The National Academies have put 23 of their reports on security and terrorism on their Web site. The four organizations that make up the academies- the National Academy of Sciences, National Academy of Engineering, Institute of Medicine and National Research Council-have issued reports on topics ranging from airline security to computer security to bioterrorism. http://www.gcn.com/vol1_no1/daily-updates/17126-1.html Hacktivism misses the target An unfortunate response to the tragic events of Sept. 11 is the pursuit of criminal activity in the name of patriotism. "Hacktivism" can hurt the United States as it tries to develop allies. For example, hacktivists may attack Islamic-related sites in Pakistan, a country that is helping the United States to address terrorism. The attacks could jeopardize Pakistani relations by promoting bad feeling against the United States in that country. http://news.cnet.com/news/0-1003-201-7214703-0.html Ban crypto, cripple commerce It's easy to list the tools that were used in horrific acts and to argue that depriving ourselves of those tools will prevent future similar incidents. It's easy, but it's wrong. Following last week's terrorist attacks on symbols of U.S. economic and military strength, the IT community needs to help the nation focus on mitigating future threats=97not on closing the doors that the horse got through. Knee-jerk reactions, all too likely from historically ill- informed legislators, could easily cripple commercial and personal applications of encryption, wireless communications, digital cash and media technologies, with little inconvenience to criminals. http://www.zdnet.com/zdnn/stories/comment/0,5859,2812517,00.html Would more security make us more vulnerable? Much like the ripples that traverse the surface of a still lake after a large brick has been thrown into it, the secondary effects of last week's horrific terrorist attacks are becoming visible. The tertiary ones probably haven't even begun manifesting themselves. What is immediately apparent, however, is that the U.S. government considers this a good time to reiterate its long-standing desire to make computer security-- and most especially, strong cryptography-- something that ordinary people aren't supposed to have. http://www.zdnet.com/zdnn/stories/comment/0,5859,2812913,00.html ------------------------ Yahoo! Groups Sponsor ---------------------~--> Secure your servers with 128-bit SSL encryption! Grab your copy of VeriSign's FREE Guide: "Securing Your Web Site for Business." Get it Now! http://us.click.yahoo.com/4mr93B/zhwCAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:45 PDT