Return-Path: <sentto-279987-2100-1000959558-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 19 Sep 2001 21:21:10 -0700 (PDT) Received: (qmail 29599 invoked by uid 510); 20 Sep 2001 04:20:03 -0000 Received: from n15.groups.yahoo.com (216.115.96.65) by 204.181.12.215 with SMTP; 20 Sep 2001 04:20:03 -0000 X-eGroups-Return: sentto-279987-2100-1000959558-fc=all.net@returns.onelist.com Received: from [10.1.1.220] by ml.egroups.com with NNFMP; 20 Sep 2001 04:19:36 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_3_2_2); 20 Sep 2001 04:19:18 -0000 Received: (qmail 68718 invoked from network); 20 Sep 2001 04:19:17 -0000 Received: from unknown (10.1.10.26) by 10.1.1.220 with QMQP; 20 Sep 2001 04:19:17 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 20 Sep 2001 04:19:34 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id VAA12895 for iwar@onelist.com; Wed, 19 Sep 2001 21:19:33 -0700 Message-Id: <200109200419.VAA12895@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Wed, 19 Sep 2001 21:19:33 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Newsbytes] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 8bit September 18, 2001 FBI investigating new Internet worm Attorney General John Ashcroft Tuesday warned computer users about a new Internet threat that could slow the global network worse than the ``Code Red'' worm that struck earlier this summer. Ashcroft said the FBI and private firms are assessing the effects of the program, known as ``W32-Nimda,'' which has affected possibly tens of thousands of computers. As the program spreads, its activity can slow or shut down Internet service for regular users. <a href="http://www.siliconvalley.com/docs/news/tech/031251.htm">http://www.siliconvalley.com/docs/news/tech/031251.htm> Ashcroft: 'Nimda' Worm not linked to attacks <a href="http://www.siliconvalley.com/docs/news/reuters_wire/1497408l.htm">http://www.siliconvalley.com/docs/news/reuters_wire/1497408l.htm> <a href="http://www.newsbytes.com/news/01/170236.html">http://www.newsbytes.com/news/01/170236.html> New computer worm hits both servers and PCs <a href="http://www.siliconvalley.com/docs/news/reuters_wire/1497279l.htm">http://www.siliconvalley.com/docs/news/reuters_wire/1497279l.htm> <a href="http://news.zdnet.co.uk/story/0,,t269-s2095530,00.html">http://news.zdnet.co.uk/story/0,,t269-s2095530,00.html> <a href="http://abcnews.go.com/sections/scitech/DailyNews/nimbdaworm010918_wire.html">http://abcnews.go.com/sections/scitech/DailyNews/nimbdaworm010918_wire.html> <a href="http://www.ananova.com/news/story/sm_401976.html">http://www.ananova.com/news/story/sm_401976.html> <a href="http://news.cnet.com/news/0-1003-200-7215349.html">http://news.cnet.com/news/0-1003-200-7215349.html> <a href="http://www.zdnet.com/zdnn/stories/news/0,4586,5097089,00.html">http://www.zdnet.com/zdnn/stories/news/0,4586,5097089,00.html> Code Red-based email worm breaks out <a href="http://www.theregister.co.uk/content/56/21734.html">http://www.theregister.co.uk/content/56/21734.html> Code Rainbow Loose In The Wild - Security Experts <a href="http://www.newsbytes.com/news/01/170225.html">http://www.newsbytes.com/news/01/170225.html> <a href="http://www.newsbytes.com/news/01/170234.html">http://www.newsbytes.com/news/01/170234.html> <a href="http://www.newsbytes.com/news/01/170231.html">http://www.newsbytes.com/news/01/170231.html> Worm's Data Traffic Hitting Hardest On Net Side Roads <a href="http://www.newsbytes.com/news/01/170243.html">http://www.newsbytes.com/news/01/170243.html> Hackers lash out at Islamic sites Hackers have begun attacking Web sites connected to Afghanistan's Taliban rulers and to other Islamic nations including Iran, prompting the FBI to issue warnings to system administrators everywhere to tighten up their security. <a href="http://www.zdnet.com/zdnn/stories/news/0,4586,2813055,00.html">http://www.zdnet.com/zdnn/stories/news/0,4586,2813055,00.html> Terrorism-Related Site Hacks Could Slow Networks - FBI A concerted effort on the part of vigilante hackers to destroy Internet sites and computer networks run by terrorist and pro-terrorist organizations could damage networks unrelated to terrorist activity, the FBI warned today. <a href="http://www.newsbytes.com/news/01/170229.html">http://www.newsbytes.com/news/01/170229.html> E-Mail Hackers in Switzerland Hackers have managed to gain access to the e-mail server of Swiss internet provider Swiss Online. They now have 250,000 e-mail addresses, along with passwords, at their disposal. Included in these addresses are those of various banks and embassies. The e-mail accounts of the embassies of France, Monaco and Israel, as well as that of UBS have been accessed. <a href="http://www.antionline.com/showthread.php?threadid=111994">http://www.antionline.com/showthread.php?threadid=111994> FBI takes terrorist investigation online In the hours following attacks on the World Trade Center and the Pentagon Sept. 11, the FBI moved quickly to mount an investigation of unprecedented scale. One of its first steps was to generate tips from the public by establishing a toll-free, national telephone hot line. Then it looked for a Web site that could do the same thing. <a href="http://www.govexec.com/dailyfed/0901/091801h2.htm">http://www.govexec.com/dailyfed/0901/091801h2.htm> Militant terrorists used Internet communications in Germany An estimated 500 Internet users apparently frequented an online newsletter based in Germany on the activities of militant Islamists, a German website reported late Monday. "Spiegel Online" said an unknown hacker found the mailing list of the newsletter, which originated from a website named as www.qoqaz.de and which is now offline. <a href="http://www.antionline.com/showthread.php?threadid=111996">http://www.antionline.com/showthread.php?threadid=111996> U.S. commission examines cyberterrorism As the U.S. government begins to formulate policy in response to the terrorist attacks last week, it is faced with trying to heighten national security and preparedness while preserving American citizens' civil liberties. <a href="http://www.cnn.com/2001/TECH/industry/09/18/cyberterrorism.idg/index.html">http://www.cnn.com/2001/TECH/industry/09/18/cyberterrorism.idg/index.html> Cyber Corps tackles terrorism When last week's terrorist attack struck, computer science professor Sujeet Shenoi was at a Department of Defense meeting not far from the Pentagon to talk about a program aimed at countering cyberterrorism. "We wondered if they were going to take down the telephone systems in New York and Washington," says Shenoi, of the University of Tulsa. "My fear is for the next time this happens." Computer security experts have long warned that systems controlling everything from the phones and air traffic to the Internet are vulnerable — and that there are too few experts to deal with problems should they occur. <a href="http://www.usatoday.com/life/cyber/tech/2001/09/18/cyber-corps.htm">http://www.usatoday.com/life/cyber/tech/2001/09/18/cyber-corps.htm> Info security speeding up Information security programs and systems at agencies across government are going forward, in some cases faster than before, in the wake of the Sept. 11 attacks on the World Trade Center and the Pentagon. <a href="http://www.fcw.com/fcw/articles/2001/0917/web-secure-09-18-01.asp">http://www.fcw.com/fcw/articles/2001/0917/web-secure-09-18-01.asp> U.S. citizens back encryption controls A poll in the United States has found widespread support for a ban on "uncrackable" encryption products, following proposals in Congress to tighten restrictions on software that scrambles electronic data. The survey found that 72 percent of Americans believe that anti-encryption laws would be "somewhat" or "very" helpful in preventing a repeat of last week's terrorist attacks on New York's World Trade Center and the Pentagon in Washington, D.C. <a href="http://news.cnet.com/news/0-1005-200-7215723.html">http://news.cnet.com/news/0-1005-200-7215723.html> Attacks put new light on Web services The terrorist disaster last week could prompt businesses to turn toward outsourcing more of their technology needs to ensure their information is safe, analysts say. Outsourced services, such as Web hosting, e-mail and Net infrastructure management, have seen a lack of demand in the past year as corporations spent more carefully amid the U.S. economic downturn. <a href="http://www.zdnet.com/zdnn/stories/news/0,4586,5097068,00.html">http://www.zdnet.com/zdnn/stories/news/0,4586,5097068,00.html> Terror attacks usher in copy controlled hardware Senator Hollings' SSSCA legislation - which makes copy-controlled hardware mandatory (and circumventing it illegal) - has received remarkably little attention since it was revealed ten days ago. No petitions, no EFF Alert (as yet), and very little public uproar. <a href="http://www.theregister.co.uk/content/54/21736.html">http://www.theregister.co.uk/content/54/21736.html> Technology's Role to Grow in a New World of Security Security experts are describing a new kind of country, where electronic identification might become the norm, immigrants might be tracked far more closely and the airspace over cities like New York and Washington might be off limits to all civilian aircraft. Yesterday, Attorney General John Ashcroft outlined several proposals, saying, "We should strengthen our laws to increase the ability of the Department of Justice and its component agencies to identify, prevent and punish terrorism." <a href="http://www.nytimes.com/2001/09/18/national/18RULE.html">http://www.nytimes.com/2001/09/18/national/18RULE.html> The National Academies put terrorism studies online The National Academies have put 23 of their reports on security and terrorism on their Web site. The four organizations that make up the academies- the National Academy of Sciences, National Academy of Engineering, Institute of Medicine and National Research Council-have issued reports on topics ranging from airline security to computer security to bioterrorism. <a href="http://www.gcn.com/vol1_no1/daily-updates/17126-1.html">http://www.gcn.com/vol1_no1/daily-updates/17126-1.html> Ban crypto, cripple commerce It's easy to list the tools that were used in horrific acts and to argue that depriving ourselves of those tools will prevent future similar incidents. It's easy, but it's wrong. Following last week's terrorist attacks on symbols of U.S. economic and military strength, the IT community needs to help the nation focus on mitigating future threats—not on closing the doors that the horse got through. Knee-jerk reactions, all too likely from historically ill- informed legislators, could easily cripple commercial and personal applications of encryption, wireless communications, digital cash and media technologies, with little inconvenience to criminals. <a href="http://www.zdnet.com/zdnn/stories/comment/0,5859,2812517,00.html">http://www.zdnet.com/zdnn/stories/comment/0,5859,2812517,00.html> Would more security make us more vulnerable? Much like the ripples that traverse the surface of a still lake after a large brick has been thrown into it, the secondary effects of last week's horrific terrorist attacks are becoming visible. The tertiary ones probably haven't even begun manifesting themselves. What is immediately apparent, however, is that the U.S. government considers this a good time to reiterate its long-standing desire to make computer security-- and most especially, strong cryptography-- something that ordinary people aren't supposed to have. <a href="http://www.zdnet.com/zdnn/stories/comment/0,5859,2812913,00.html">http://www.zdnet.com/zdnn/stories/comment/0,5859,2812913,00.html> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:46 PDT