Return-Path: <sentto-279987-2473-1001703647-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Fri, 28 Sep 2001 12:03:08 -0700 (PDT) Received: (qmail 2428 invoked by uid 510); 28 Sep 2001 19:02:32 -0000 Received: from n1.groups.yahoo.com (216.115.96.51) by 204.181.12.215 with SMTP; 28 Sep 2001 19:02:32 -0000 X-eGroups-Return: sentto-279987-2473-1001703647-fc=all.net@returns.onelist.com Received: from [10.1.1.220] by hh.egroups.com with NNFMP; 28 Sep 2001 19:02:18 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_4_1); 28 Sep 2001 19:00:46 -0000 Received: (qmail 55445 invoked from network); 28 Sep 2001 19:00:45 -0000 Received: from unknown (10.1.10.27) by 10.1.1.220 with QMQP; 28 Sep 2001 19:00:45 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta2 with SMTP; 28 Sep 2001 19:02:16 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id MAA12163 for iwar@onelist.com; Fri, 28 Sep 2001 12:02:15 -0700 Message-Id: <200109281902.MAA12163@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Fri, 28 Sep 2001 12:02:15 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [NewsBits] NewsBits - 09/27/01 (fwd) Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Septermber 27, 2001 Sudan Bank Hacked, Bin Laden Info Found A group of U.K.-based hackers has cracked computers at the AlShamal Islamic Bank in Sudan and collected data on the accounts of the Al Qaeda terrorist organization and its leader Osama bin Laden, Kim Schmitz, a flamboyant German hacker/businessman, has claimed. http://www.newsbytes.com/news/01/170588.html Kournikova virus creator gets community sentence The Dutch creator of the ``Anna Kournikova'' virus, which infected computers worldwide, was sentenced Thursday to 150 hours' community service. The virus, disguised as a digital photo of the heartthrob Russian tennis star, e-mailed itself to millions of computers in February, slowing systems and shutting down some servers. http://www.siliconvalley.com/docs/news/tech/062511.htm http://www.wired.com/news/politics/0,1283,47153,00.html http://www.theregister.co.uk/content/56/21910.html 'Good Sam' Hacker 'Fesses Up It seemed like such a straightforward example of prosecutorial misconduct: An Oklahoma man was being investigated by the Justice Department for helping a newspaper fix a website security hole. The outcry among the geek community last month began with an uncritical story on LinuxFreak.org entitled "Cyber Citizen Lands Felony Charges?" Sites such as Slashdot soon picked up the sad tale of 24-year-old Brian K. West as evidence of out-of-control, tech-clueless government lawyers, and urged everyone to e-mail the U.S. Attorney in charge of the prosecution. http://www.wired.com/news/politics/0,1283,47146,00.html Nimda worm ready for return Researchers have discovered a third vector to the Nimda worm, which is set to propagate again through e-mail at 1:00 a.m. Eastern time Friday. "We rechecked the code base to Nimda, and we found a code set that is supposed to respread Nimda through e-mail systems starting 10 days after machines were first infected," said Oliver Friedrichs, director of engineering at the Attack Registry and Intelligence Service. http://www.usatoday.com/life/cyber/tech/cw2.htm http://www.zdnet.com/zdnn/stories/news/0,4586,5097528,00.html http://news.cnet.com/news/0-1003-200-7318967.html Nimda Still Active At AOL - Update http://www.newsbytes.com/news/01/170590.html Experts: Nimda Mass-Mailing To Resume Today http://www.newsbytes.com/news/01/170580.html Experts warn U.S. of more cyberattacks U.S. government and private-sector computer networks remain highly vulnerable to Internet- based attacks, experts said, incidents that will probably increase in the near future. http://www.zdnet.com/zdnn/stories/news/0,4586,5097523,00.html Transportation agencies called vulnerable to cyberattacks The Transportation Department and its operating agencies are vulnerable to computer attacks, according to a newly released report from the department's inspector general. "This report presents the first big picture on security at DOT," said David Barnes, spokesman for the IG's office. http://www.govexec.com/dailyfed/0901/092701j1.htm U.S. agencies beef up security for computer networks Worried that the U.S. government's computer systems could be a target of increasingly sophisticated terrorists, government agencies have been quietly beefing up security to protect their critical networks. While some improvements have been made, Congress' investigative arm and security experts agree that network security measures are still inadequate, and the issue has taken on new urgency since the Sept. 11 terrorism attacks. http://www.siliconvalley.com/docs/hottopics/attack/secur092701.htm http://www0.mercurycenter.com/premium/business/docs/govsecure27.htm Cerf asks hackers to be constructive As hackers around the world contemplate launching cyberwar in response to attacks on the World Trade Center and the Pentagon, one of the Internet's founding fathers is asking them to put their talents to better use. http://www.siliconvalley.com/docs/hottopics/attack/hack092701.htm http://www.usatoday.com/life/cyber/tech/2001/09/26/cerf-joins-anti-hacking-campaign.htm NIPC leads cyber sleuthing As a center of technical expertise within the FBI, the National Infrastructure Protection Center is leading the cyber aspects of the investigation into the Sept. 11 terrorist attacks, according to NIPC director Ronald Dick. http://www.fcw.com/fcw/articles/2001/0924/web-cip-09-27-01.asp Sen. Wyden Proposes Technology Defense Force Sen. Ron Wyden, D-Ore., Wednesday proposed the formation of a "National Emergency Technology Guard" that would function as a National Guard-style information-technology defense force, comprising the nation's technology workers, in the event of a national crisis. http://www.newsbytes.com/news/01/170581.html Is FBI asking for data overload? Bush administration request for sweeping law- enforcement powers begs question of how it would handle the information. The Bush administration is pressing Congress to approve the most sweeping expansion of federal law-enforcement authority since the Cold War. http://www.msnbc.com/news/634408.asp Instant Messages To Israel Warned Of WTC Attack Officials at instant-messaging firm Odigo confirmed today that two employees received text messages warning of an attack on the World Trade Center two hours before terrorists crashed planes into the New York landmarks. http://www.newsbytes.com/news/01/170583.html In Investigation, Internet Offers Clues and Static All investigations begin with a tip, a lead, a scrap of information as slight as the seat number passed along by a flight attendant aboard a doomed airliner on Sept.11. But what has changed in recent years is the speed at which that information can be acted and built upon across the nation or around the world. http://www.nytimes.com/2001/09/26/technology/ebusiness/26SCHW.html Identity theft easy for terrorists In 1995, a Saudi exchange student named Abdulaziz Alomari at the University of Colorado reported a common burglary. Thieves broke into his apartment and made off with Alomari's briefcase, his passport tucked inside. http://www.msnbc.com/news/634409.asp EFF: Bill treats hackers as terrorists A major anti-terrorism bill now being considered by the U.S. government has been criticized for disproportionately targeting low-level computer intruders, making small crimes punishable by a penalty of life in prison. http://www.zdnet.com/zdnn/stories/news/0,4586,2815197,00.html http://www.govexec.com/dailyfed/0901/092701td1.htm Privacy advocates warn that plans could harm free society. Some of the Bush administration's proposed rules of engagement for America's new war on terrorism could snare millions of unsuspecting Americans in an expanded surveillance net, electronic-privacy advocates said. http://www.siliconvalley.com/docs/news/svtop/priv092701.htm http://www0.mercurycenter.com/premium/front/docs/privacy27.htm White House Will Not Support Push For National ID Card Bush administration officials say the president will not support calls in Congress for a creating a national identification card to help combat terrorism. While some lawmakers in Congress have said they'd like to take a fresh look at the issue, White House spokesman Jimmy Orr said President Bush "is not even considering the idea." http://www.newsbytes.com/news/01/170596.html In Response To Attacks ICANN Eyes Security Matters The body that manages the Internet's worldwide addressing system will meet in November as planned, but will shuffle its agenda to address Internet "security and stability" issues as they relate to the global dangers highlighted by the Sept. 11 terrorist attacks in New York and Washington. http://www.newsbytes.com/news/01/170597.html http://www.usatoday.com/life/cyber/tech/2001/09/27/icann-net-security.htm VeriSign empire's new territory: Net IDs As giants of technology raise their bets in the battle over Internet identification technology, VeriSign may already hold the winning cards. In recent weeks, Microsoft and Sun Microsystems have boosted their efforts to become the leading provider of online identification services. http://news.cnet.com/news/0-1004-200-7319556.html Developer encrypts corporate IM A small Australian security software developer has found itself a niche in the instant messaging market dominated by big-guns Yahoo, MSN and AOL by encrypting a product for corporate use. http://www.zdnet.com/zdnn/stories/news/0,4586,2815191,00.html In the Next Chapter, Is Technology an Ally? Over the last two weeks, computer scientists and others who think about technology have wondered aloud about its likely role in countering terrorism -- or in carrying it out. Have the limitations and dangers of technology been overlooked? (NY Times article, free registration required) http://www.nytimes.com/2001/09/27/technology/circuits/27TECH.html Can facial recognition snag terrorists? Will face recognition be the Patriot missile of the domestic fight against terrorism--a technology that initially draws raves but ultimately doesn't work as well as billed? http://www.zdnet.com/zdnn/stories/news/0,4586,2815185,00.html http://www.theregister.co.uk/content/4/21916.html Liberte, Egalite ... E-Security? At any other time, a gathering of privacy mavens, policy-makers and legal experts in Paris might make for an interesting if laidback discussion on the ethical niceties of balancing national security and personal privacy. In the aftermath of the terrorist attacks on the United States, such debates have taken on an intensity and urgency that two weeks and 3,500 miles of ocean cannot diminish. http://www.wired.com/news/conflict/0,2100,47133,00.html ------------------------ Yahoo! Groups Sponsor ---------------------~--> Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide! http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:51 PDT