[iwar] [NewsBits] NewsBits - 09/25/01 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2001-09-25 21:19:45


Return-Path: <sentto-279987-2362-1001477987-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Tue, 25 Sep 2001 21:21:10 -0700 (PDT)
Received: (qmail 23066 invoked by uid 510); 26 Sep 2001 04:20:06 -0000
Received: from n30.groups.yahoo.com (216.115.96.80) by 204.181.12.215 with SMTP; 26 Sep 2001 04:20:06 -0000
X-eGroups-Return: sentto-279987-2362-1001477987-fc=all.net@returns.onelist.com
Received: from [10.1.4.55] by ho.egroups.com with NNFMP; 26 Sep 2001 04:19:47 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_3_2_2); 26 Sep 2001 04:19:46 -0000
Received: (qmail 73502 invoked from network); 26 Sep 2001 04:19:46 -0000
Received: from unknown (10.1.10.142) by l9.egroups.com with QMQP; 26 Sep 2001 04:19:46 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 26 Sep 2001 04:19:46 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id VAA08808 for iwar@onelist.com; Tue, 25 Sep 2001 21:19:45 -0700
Message-Id: <200109260419.VAA08808@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Tue, 25 Sep 2001 21:19:45 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [NewsBits] NewsBits - 09/25/01 (fwd)
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

September 25, 2001

Nimda Leads Fairfax To Unplug Web Site Fairfax County has fallen victim
to the worst computer virus in its history, forcing it to shut down its
Web site until each of the county's 9,000 computers and 300 servers has
been screened, officials said yesterday. 
http://www.newsbytes.com/news/01/170474.html

Virus exploits fears over war on terror A destructive virus, which tries
to exploit anxiety generated by approaching military action, has been
released on the Internet.  Vote, a mass mailing virus that affects only
Windows PCs, normally comes in an email with the subject line "Fwd:Peace
BeTween AmeriCa And IsLam !", inviting users to "vote" on peace by
clicking on an attachment, which in reality contains malicious code.  If
a user open the attachment (normally called WTC.EXE), the virus attempts
to delete files associated with the user's anti-virus program, overwrite
HTML files and download Trojan horse files from the Internet.  Worse
still, it attempts to format a user's hard disk when a user next tries
to reboot.  http://www.theregister.co.uk/content/6/21863.html

Bush defends expanded wiretap, detention powers.  President Bush
defended Tuesday his administration's request for expanded wiretap and
detention powers, saying they were vital to the war on terrorism.  Bush
used a brief appearance at FBI headquarters in Washington to lobby for
his proposed anti- terrorism package, which has run into opposition
among Democrats and Republicans on Capitol Hill who fear it would curb
U.S.  civil liberties. 
http://www.siliconvalley.com/docs/news/tech/083976.htm

Ashcroft Asks Senate For More Enforcement Powers Attorney General John
Ashcroft received a warmer reception today when he once again appeared
before a congressional panel in support of a broad anti- terrorism
proposal that would expand the surveillance powers of federal law
enforcers.  http://www.newsbytes.com/news/01/170484.html

Congress Weighs Anti-Terror Bill
http://www.wired.com/news/conflict/0,2100,47086,00.html Hackers face
life imprisonment under 'Anti-Terrorism' Act
http://www.securityfocus.com/news/257
http://www.theregister.co.uk/content/6/21854.html

Rep.  Smith Introduces Web Wiretap Bill House Judiciary Crime
Subcommittee Chairman Lamar Smith, R-Texas, introduced legislation last
Thursday that would make it easier for federal investigators to obtain
court approval for eaves- dropping on Internet communications. 
http://www.newsbytes.com/news/01/170489.html

Bill would boost info sharing Sen.  Robert Bennett (R-Utah) introduced
legislation Sept.  24 to allow the federal government and industry to
share information about potential threats to the nation's critical
infrastructure. 
http://www.fcw.com/fcw/articles/2001/0924/web-share-09-25-01.asp

Cyber Attacks To Government Computers Subject of Hearing The House
Government Reform Committee will hear from a large panel of witnesses
Wednesday to get a handle on the vulnerabilities of government computer
systems that could be subject to cyber attacks. 
http://www.antionline.com/showthread.php?threadid=114189

Cyber-terrorists can pose threat to U.S.  businesses Even before the
dust settled over the ruins of the World Trade Center, U.S.  authorities
warned the country to brace for further attacks -- including, possibly,
attacks launched from cyberspace. 
http://www.siliconvalley.com/docs/news/tech/017783.htm

Snooping Isn't E-Mail Delay Cause E-mail delivery has been particularly
sluggish during the past two weeks.  Messages have arrived at their
destinations hours after being sent, sparking speculation that new
surveillance programs by government intelligence agencies might be
responsible for the sudden slowdown. 
http://www.wired.com/news/culture/0,1284,47092,00.html

Education Department struggles to protect system.  Computer security
weaknesses continue to make the Education Department's main financial
management system vulnerable to misuse, despite recent improvements in
security, according to a new report from the General Accounting Office. 
http://www.govexec.com/dailyfed/0901/092501t1.htm

Analyst urges firms to abandon Microsoft IIS Server Companies hit by
recent hacker attacks against Microsoft's Web server software should
switch to a new product rather than continuing the battle to keep the
Microsoft product secure, an analyst with an influential high-tech
research firm said Monday.  John Pescatore, research director for
Internet security at Gartner Group, told The Associated Press Monday
that firms whose Web sites were shuttered by hacker attacks more than
once may not be able to keep their servers secure -- or safe -- from
future attacks.  http://www.siliconvalley.com/docs/news/tech/007017.htm
http://news.zdnet.co.uk/story/0,,t269-s2095952,00.html
http://www3.gartner.com/DisplayDocument?doc_cd=101034

National ID card idea kindles old debate Oracle Chief's Proposal Raises
Contitutional, Feasibility Issues.  Oracle CEO Larry Ellison's call this
weekend for a national ID card system has ignited a raging debate over
an issue that has simmered in the United States since the 1930s. 
http://www0.mercurycenter.com/premium/front/docs/idcards25.htm

National ID Card Push Roils Privacy Advocates
http://www.newsbytes.com/news/01/170488.html ID Cards Are de Rigueur
Worldwide http://www.wired.com/news/conflict/0,2100,47073,00.html

Anonymous surfing service exposed Users of SafeWeb's free Triangle Boy
service are accustomed to surfing the Web anonymously, but in the latest
flare-up between enterprises that want to limit users' access to online
content and advocates of an unrestricted Net, a Web filtering company
now claims it can disable Triangle Boy. 
http://www.zdnet.com/zdnn/stories/news/0,4586,2814675,00.html

Earthlink Suing Over Spam-Filled ISP Arteries Earthlink Inc.  is suing
two men it calls "Internet criminals." The Atlanta-based Internet
service provider alleges the two have disrupted the company's networks
by engaging in illegal e-mail campaigns with stolen credit cards and
passwords.  http://www.antionline.com/showthread.php?threadid=114185

Products to ensure e-mail security With the rise of e-business,
companies face an ever-increasing need to transmit confidential and
sensitive information via e-mail, but tools to provide encryption have
unfortunately been complex in implementation and use, inhibiting their
take-up. 
http://www.cnn.com/2001/TECH/internet/09/25/e.mail.security.idg/index.html

Attacks prompt hundreds of domain name registrations Hundreds of related
Internet domain names have been claimed since the Sept.  11 suicide
jetliner attacks -- some for tributes or relief efforts, others purely
for a quick buck. 
http://www.siliconvalley.com/docs/news/tech/081763.htm

New security technology could make air travel safer Getting on an
airplane could soon bring much more scrutiny than just a baggage X-ray
and a walk through a metal detector.  Passengers on future flights might
have their fingerprints read or their eyes and faces scanned with
devices that use precise biological measurements to verify a person's
identity. 
http://www.siliconvalley.com/docs/hottopics/attack/secur092501.htm

Technology needs to pinpoint calls for help Motivated by the Sept.  11
attacks on the World Trade Center, the Federal Communications Commission
was asked Tuesday to require that police and telecommunications carriers
be able to locate cell phone callers inside large structures, including
subway stations, office buildings or schools. 
http://www.zdnet.com/zdnn/stories/news/0,4586,5097434,00.html

SSL crypto coming to PCI cards PCI cards and other network devices will
have the SSL security standard embedded in them by Broadcom and nCipher. 
E-commerce and public key infrastructure (PKI) security specialist
nCipher will today announce a partnership with datacoms chip maker
Broadcom to embed the Secure Sockets Layer (SSL) internet security
standard in networking devices such as PCI cards, daughter boards,
routers and switches. 
http://news.zdnet.co.uk/story/0,,t269-s2095963,00.html

Stopping Bin Laden: How Much Surveillance Is Too Much? Alleged terrorism
mastermind Osama Bin Laden is as reliant on modern technology as were
the thousands of people killed Sept.  11 in deadly terrorist hijackings
in Shanksville, Pa., New York and Washington D.C., according to one
expert on cyber-security and encryption policy. 
http://www.newsbytes.com/news/01/170492.html

Terrorists and steganography Guess what? Osama Bin Ladin uses
steganography.  According to nameless "U.S.  officials and experts" and
"U.S.  and foreign officials," terrorist groups are "hiding maps and
photographs of terrorist targets and posting instructions for terrorist
activities on sports chat rooms, pornographic bulletin boards and other
Web sites."
http://www.zdnet.com/zdnn/stories/comment/0,5859,2814256,00.html

Privacy: Not so sacred anymore? Privacy isn't looking quite so sacred
anymore.  Gone are the good old days of worry over e-commerce customer
lists and fears of unauthorized FBI snooping into the lives of average
Americans.  From the ruins of the World Trade Center and the Pentagon, a
bitter new reality has emerged: Our very lives are at stake. 
http://www.zdnet.com/zdnn/stories/comment/0,5859,2814548,00.html

Is Your Data Safe from Disaster? Iron Mountain is a company that likes
to keep a low profile.  So it takes sharp eyes to locate one if its key
buildings in Burlington, Mass.  No name marks the one-story structure. 
No corporate slogan trumpets its mission.  Only a tiny street number --
21 -- lets visitors know they've arrived.  The proliferation of
surveillance cameras makes it clear they shouldn't try anything funny. 
Why all the secrecy and security? This is the off-site data-protection
division of Iron Mountain, a Boston-based company that guards back-up
copies of mission-critical corporate data, on paper or electronically. 
http://www.businessweek.com/bwdaily/dnflash/sep2001/nf20010924_6823.htm

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more!
http://us.click.yahoo.com/XrFcOC/m5_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:49 PDT