[iwar] [fc:Newsbytes]

From: Fred Cohen (fc@all.net)
Date: 2001-09-19 21:19:33


Return-Path: <sentto-279987-2100-1000959558-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 19 Sep 2001 21:21:10 -0700 (PDT)
Received: (qmail 29599 invoked by uid 510); 20 Sep 2001 04:20:03 -0000
Received: from n15.groups.yahoo.com (216.115.96.65) by 204.181.12.215 with SMTP; 20 Sep 2001 04:20:03 -0000
X-eGroups-Return: sentto-279987-2100-1000959558-fc=all.net@returns.onelist.com
Received: from [10.1.1.220] by ml.egroups.com with NNFMP; 20 Sep 2001 04:19:36 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_3_2_2); 20 Sep 2001 04:19:18 -0000
Received: (qmail 68718 invoked from network); 20 Sep 2001 04:19:17 -0000
Received: from unknown (10.1.10.26) by 10.1.1.220 with QMQP; 20 Sep 2001 04:19:17 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 20 Sep 2001 04:19:34 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id VAA12895 for iwar@onelist.com; Wed, 19 Sep 2001 21:19:33 -0700
Message-Id: <200109200419.VAA12895@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 19 Sep 2001 21:19:33 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Newsbytes]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 8bit

September 18, 2001

FBI investigating new Internet worm Attorney General John Ashcroft
Tuesday warned computer users about a new Internet threat that could
slow the global network worse than the ``Code Red'' worm that struck
earlier this summer.  Ashcroft said the FBI and private firms are
assessing the effects of the program, known as ``W32-Nimda,'' which has
affected possibly tens of thousands of computers.  As the program
spreads, its activity can slow or shut down Internet service for regular
users.
<a href="http://www.siliconvalley.com/docs/news/tech/031251.htm">http://www.siliconvalley.com/docs/news/tech/031251.htm>

Ashcroft: 'Nimda' Worm not linked to attacks
<a href="http://www.siliconvalley.com/docs/news/reuters_wire/1497408l.htm">http://www.siliconvalley.com/docs/news/reuters_wire/1497408l.htm>
<a href="http://www.newsbytes.com/news/01/170236.html">http://www.newsbytes.com/news/01/170236.html>
New computer worm hits both servers and PCs
<a href="http://www.siliconvalley.com/docs/news/reuters_wire/1497279l.htm">http://www.siliconvalley.com/docs/news/reuters_wire/1497279l.htm>
<a href="http://news.zdnet.co.uk/story/0,,t269-s2095530,00.html">http://news.zdnet.co.uk/story/0,,t269-s2095530,00.html>
<a href="http://abcnews.go.com/sections/scitech/DailyNews/nimbdaworm010918_wire.html">http://abcnews.go.com/sections/scitech/DailyNews/nimbdaworm010918_wire.html>
<a href="http://www.ananova.com/news/story/sm_401976.html">http://www.ananova.com/news/story/sm_401976.html>
<a href="http://news.cnet.com/news/0-1003-200-7215349.html">http://news.cnet.com/news/0-1003-200-7215349.html>
<a href="http://www.zdnet.com/zdnn/stories/news/0,4586,5097089,00.html">http://www.zdnet.com/zdnn/stories/news/0,4586,5097089,00.html>
Code Red-based email worm breaks out
<a href="http://www.theregister.co.uk/content/56/21734.html">http://www.theregister.co.uk/content/56/21734.html>
Code Rainbow Loose In The Wild - Security Experts
<a href="http://www.newsbytes.com/news/01/170225.html">http://www.newsbytes.com/news/01/170225.html>
<a href="http://www.newsbytes.com/news/01/170234.html">http://www.newsbytes.com/news/01/170234.html>
<a href="http://www.newsbytes.com/news/01/170231.html">http://www.newsbytes.com/news/01/170231.html>
Worm's Data Traffic Hitting Hardest On Net Side Roads
<a href="http://www.newsbytes.com/news/01/170243.html">http://www.newsbytes.com/news/01/170243.html>

Hackers lash out at Islamic sites Hackers have begun attacking Web sites
connected to Afghanistan's Taliban rulers and to other Islamic nations
including Iran, prompting the FBI to issue warnings to system
administrators everywhere to tighten up their security.
<a href="http://www.zdnet.com/zdnn/stories/news/0,4586,2813055,00.html">http://www.zdnet.com/zdnn/stories/news/0,4586,2813055,00.html>

Terrorism-Related Site Hacks Could Slow Networks - FBI A concerted
effort on the part of vigilante hackers to destroy Internet sites and
computer networks run by terrorist and pro-terrorist organizations could
damage networks unrelated to terrorist activity, the FBI warned today. 
<a href="http://www.newsbytes.com/news/01/170229.html">http://www.newsbytes.com/news/01/170229.html>

E-Mail Hackers in Switzerland Hackers have managed to gain access to the
e-mail server of Swiss internet provider Swiss Online.  They now have
250,000 e-mail addresses, along with passwords, at their disposal. 
Included in these addresses are those of various banks and embassies. 
The e-mail accounts of the embassies of France, Monaco and Israel, as
well as that of UBS have been accessed.
<a href="http://www.antionline.com/showthread.php?threadid=111994">http://www.antionline.com/showthread.php?threadid=111994>

FBI takes terrorist investigation online In the hours following attacks
on the World Trade Center and the Pentagon Sept.  11, the FBI moved
quickly to mount an investigation of unprecedented scale.  One of its
first steps was to generate tips from the public by establishing a
toll-free, national telephone hot line.  Then it looked for a Web site
that could do the same thing.
<a href="http://www.govexec.com/dailyfed/0901/091801h2.htm">http://www.govexec.com/dailyfed/0901/091801h2.htm>

Militant terrorists used Internet communications in Germany An estimated
500 Internet users apparently frequented an online newsletter based in
Germany on the activities of militant Islamists, a German website
reported late Monday.  "Spiegel Online" said an unknown hacker found the
mailing list of the newsletter, which originated from a website named as
www.qoqaz.de and which is now offline.
<a href="http://www.antionline.com/showthread.php?threadid=111996">http://www.antionline.com/showthread.php?threadid=111996>

U.S.  commission examines cyberterrorism As the U.S.  government begins
to formulate policy in response to the terrorist attacks last week, it
is faced with trying to heighten national security and preparedness
while preserving American citizens' civil liberties.
<a href="http://www.cnn.com/2001/TECH/industry/09/18/cyberterrorism.idg/index.html">http://www.cnn.com/2001/TECH/industry/09/18/cyberterrorism.idg/index.html>

Cyber Corps tackles terrorism When last week's terrorist attack struck,
computer science professor Sujeet Shenoi was at a Department of Defense
meeting not far from the Pentagon to talk about a program aimed at
countering cyberterrorism.  "We wondered if they were going to take down
the telephone systems in New York and Washington," says Shenoi, of the
University of Tulsa.  "My fear is for the next time this happens."
Computer security experts have long warned that systems controlling
everything from the phones and air traffic to the Internet are
vulnerable — and that there are too few experts to deal with problems
should they occur.
<a href="http://www.usatoday.com/life/cyber/tech/2001/09/18/cyber-corps.htm">http://www.usatoday.com/life/cyber/tech/2001/09/18/cyber-corps.htm>

Info security speeding up Information security programs and systems at
agencies across government are going forward, in some cases faster than
before, in the wake of the Sept.  11 attacks on the World Trade Center
and the Pentagon. 
<a href="http://www.fcw.com/fcw/articles/2001/0917/web-secure-09-18-01.asp">http://www.fcw.com/fcw/articles/2001/0917/web-secure-09-18-01.asp>

U.S.  citizens back encryption controls A poll in the United States has
found widespread support for a ban on "uncrackable" encryption products,
following proposals in Congress to tighten restrictions on software that
scrambles electronic data.  The survey found that 72 percent of
Americans believe that anti-encryption laws would be "somewhat" or
"very" helpful in preventing a repeat of last week's terrorist attacks
on New York's World Trade Center and the Pentagon in Washington, D.C. 
<a href="http://news.cnet.com/news/0-1005-200-7215723.html">http://news.cnet.com/news/0-1005-200-7215723.html>

Attacks put new light on Web services The terrorist disaster last week
could prompt businesses to turn toward outsourcing more of their
technology needs to ensure their information is safe, analysts say. 
Outsourced services, such as Web hosting, e-mail and Net infrastructure
management, have seen a lack of demand in the past year as corporations
spent more carefully amid the U.S.  economic downturn. 
<a href="http://www.zdnet.com/zdnn/stories/news/0,4586,5097068,00.html">http://www.zdnet.com/zdnn/stories/news/0,4586,5097068,00.html>

Terror attacks usher in copy controlled hardware Senator Hollings' SSSCA
legislation - which makes copy-controlled hardware mandatory (and
circumventing it illegal) - has received remarkably little attention
since it was revealed ten days ago.  No petitions, no EFF Alert (as
yet), and very little public uproar. 
<a href="http://www.theregister.co.uk/content/54/21736.html">http://www.theregister.co.uk/content/54/21736.html>

Technology's Role to Grow in a New World of Security Security experts
are describing a new kind of country, where electronic identification
might become the norm, immigrants might be tracked far more closely and
the airspace over cities like New York and Washington might be off
limits to all civilian aircraft.  Yesterday, Attorney General John
Ashcroft outlined several proposals, saying, "We should strengthen our
laws to increase the ability of the Department of Justice and its
component agencies to identify, prevent and punish terrorism."
<a href="http://www.nytimes.com/2001/09/18/national/18RULE.html">http://www.nytimes.com/2001/09/18/national/18RULE.html>

The National Academies put terrorism studies online The National
Academies have put 23 of their reports on security and terrorism on
their Web site.  The four organizations that make up the academies- the
National Academy of Sciences, National Academy of Engineering, Institute
of Medicine and National Research Council-have issued reports on topics
ranging from airline security to computer security to bioterrorism. 
<a href="http://www.gcn.com/vol1_no1/daily-updates/17126-1.html">http://www.gcn.com/vol1_no1/daily-updates/17126-1.html>

Ban crypto, cripple commerce It's easy to list the tools that were used
in horrific acts and to argue that depriving ourselves of those tools
will prevent future similar incidents.  It's easy, but it's wrong. 
Following last week's terrorist attacks on symbols of U.S.  economic and
military strength, the IT community needs to help the nation focus on
mitigating future threats—not on closing the doors that the horse got
through.  Knee-jerk reactions, all too likely from historically ill-
informed legislators, could easily cripple commercial and personal
applications of encryption, wireless communications, digital cash and
media technologies, with little inconvenience to criminals. 
<a href="http://www.zdnet.com/zdnn/stories/comment/0,5859,2812517,00.html">http://www.zdnet.com/zdnn/stories/comment/0,5859,2812517,00.html>

Would more security make us more vulnerable? Much like the ripples that
traverse the surface of a still lake after a large brick has been thrown
into it, the secondary effects of last week's horrific terrorist attacks
are becoming visible.  The tertiary ones probably haven't even begun
manifesting themselves.  What is immediately apparent, however, is that
the U.S.  government considers this a good time to reiterate its
long-standing desire to make computer security-- and most especially,
strong cryptography-- something that ordinary people aren't supposed to
have. 
<a href="http://www.zdnet.com/zdnn/stories/comment/0,5859,2812913,00.html">http://www.zdnet.com/zdnn/stories/comment/0,5859,2812913,00.html>

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:46 PDT