[iwar] [NewsBits] NewsBits - 09/27/01 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2001-09-28 12:02:15


Return-Path: <sentto-279987-2473-1001703647-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Fri, 28 Sep 2001 12:03:08 -0700 (PDT)
Received: (qmail 2428 invoked by uid 510); 28 Sep 2001 19:02:32 -0000
Received: from n1.groups.yahoo.com (216.115.96.51) by 204.181.12.215 with SMTP; 28 Sep 2001 19:02:32 -0000
X-eGroups-Return: sentto-279987-2473-1001703647-fc=all.net@returns.onelist.com
Received: from [10.1.1.220] by hh.egroups.com with NNFMP; 28 Sep 2001 19:02:18 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_4_1); 28 Sep 2001 19:00:46 -0000
Received: (qmail 55445 invoked from network); 28 Sep 2001 19:00:45 -0000
Received: from unknown (10.1.10.27) by 10.1.1.220 with QMQP; 28 Sep 2001 19:00:45 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta2 with SMTP; 28 Sep 2001 19:02:16 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id MAA12163 for iwar@onelist.com; Fri, 28 Sep 2001 12:02:15 -0700
Message-Id: <200109281902.MAA12163@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Fri, 28 Sep 2001 12:02:15 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [NewsBits] NewsBits - 09/27/01 (fwd)
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Septermber 27, 2001

Sudan Bank Hacked, Bin Laden Info Found A group of U.K.-based hackers
has cracked computers at the AlShamal Islamic Bank in Sudan and
collected data on the accounts of the Al Qaeda terrorist organization
and its leader Osama bin Laden, Kim Schmitz, a flamboyant German
hacker/businessman, has claimed. 
http://www.newsbytes.com/news/01/170588.html

Kournikova virus creator gets community sentence The Dutch creator of
the ``Anna Kournikova'' virus, which infected computers worldwide, was
sentenced Thursday to 150 hours' community service.  The virus,
disguised as a digital photo of the heartthrob Russian tennis star,
e-mailed itself to millions of computers in February, slowing systems
and shutting down some servers. 
http://www.siliconvalley.com/docs/news/tech/062511.htm
http://www.wired.com/news/politics/0,1283,47153,00.html
http://www.theregister.co.uk/content/56/21910.html

'Good Sam' Hacker 'Fesses Up It seemed like such a straightforward
example of prosecutorial misconduct: An Oklahoma man was being
investigated by the Justice Department for helping a newspaper fix a
website security hole.  The outcry among the geek community last month
began with an uncritical story on LinuxFreak.org entitled "Cyber Citizen
Lands Felony Charges?" Sites such as Slashdot soon picked up the sad
tale of 24-year-old Brian K.  West as evidence of out-of-control,
tech-clueless government lawyers, and urged everyone to e-mail the U.S. 
Attorney in charge of the prosecution. 
http://www.wired.com/news/politics/0,1283,47146,00.html

Nimda worm ready for return Researchers have discovered a third vector
to the Nimda worm, which is set to propagate again through e-mail at
1:00 a.m.  Eastern time Friday.  "We rechecked the code base to Nimda,
and we found a code set that is supposed to respread Nimda through
e-mail systems starting 10 days after machines were first infected,"
said Oliver Friedrichs, director of engineering at the Attack Registry
and Intelligence Service. 
http://www.usatoday.com/life/cyber/tech/cw2.htm
http://www.zdnet.com/zdnn/stories/news/0,4586,5097528,00.html
http://news.cnet.com/news/0-1003-200-7318967.html

Nimda Still Active At AOL - Update
http://www.newsbytes.com/news/01/170590.html Experts: Nimda Mass-Mailing
To Resume Today http://www.newsbytes.com/news/01/170580.html

Experts warn U.S.  of more cyberattacks U.S.  government and
private-sector computer networks remain highly vulnerable to Internet-
based attacks, experts said, incidents that will probably increase in
the near future. 
http://www.zdnet.com/zdnn/stories/news/0,4586,5097523,00.html

Transportation agencies called vulnerable to cyberattacks The
Transportation Department and its operating agencies are vulnerable to
computer attacks, according to a newly released report from the
department's inspector general.  "This report presents the first big
picture on security at DOT," said David Barnes, spokesman for the IG's
office.  http://www.govexec.com/dailyfed/0901/092701j1.htm

U.S.  agencies beef up security for computer networks Worried that the
U.S.  government's computer systems could be a target of increasingly
sophisticated terrorists, government agencies have been quietly beefing
up security to protect their critical networks.  While some improvements
have been made, Congress' investigative arm and security experts agree
that network security measures are still inadequate, and the issue has
taken on new urgency since the Sept.  11 terrorism attacks. 
http://www.siliconvalley.com/docs/hottopics/attack/secur092701.htm
http://www0.mercurycenter.com/premium/business/docs/govsecure27.htm

Cerf asks hackers to be constructive As hackers around the world
contemplate launching cyberwar in response to attacks on the World Trade
Center and the Pentagon, one of the Internet's founding fathers is
asking them to put their talents to better use. 
http://www.siliconvalley.com/docs/hottopics/attack/hack092701.htm
http://www.usatoday.com/life/cyber/tech/2001/09/26/cerf-joins-anti-hacking-campaign.htm

NIPC leads cyber sleuthing As a center of technical expertise within the
FBI, the National Infrastructure Protection Center is leading the cyber
aspects of the investigation into the Sept.  11 terrorist attacks,
according to NIPC director Ronald Dick. 
http://www.fcw.com/fcw/articles/2001/0924/web-cip-09-27-01.asp

Sen.  Wyden Proposes Technology Defense Force Sen.  Ron Wyden, D-Ore.,
Wednesday proposed the formation of a "National Emergency Technology
Guard" that would function as a National Guard-style
information-technology defense force, comprising the nation's technology
workers, in the event of a national crisis. 
http://www.newsbytes.com/news/01/170581.html

Is FBI asking for data overload? Bush administration request for
sweeping law- enforcement powers begs question of how it would handle
the information.  The Bush administration is pressing Congress to
approve the most sweeping expansion of federal law-enforcement authority
since the Cold War.  http://www.msnbc.com/news/634408.asp

Instant Messages To Israel Warned Of WTC Attack Officials at
instant-messaging firm Odigo confirmed today that two employees received
text messages warning of an attack on the World Trade Center two hours
before terrorists crashed planes into the New York landmarks. 
http://www.newsbytes.com/news/01/170583.html

In Investigation, Internet Offers Clues and Static All investigations
begin with a tip, a lead, a scrap of information as slight as the seat
number passed along by a flight attendant aboard a doomed airliner on
Sept.11.  But what has changed in recent years is the speed at which
that information can be acted and built upon across the nation or around
the world. 
http://www.nytimes.com/2001/09/26/technology/ebusiness/26SCHW.html

Identity theft easy for terrorists In 1995, a Saudi exchange student
named Abdulaziz Alomari at the University of Colorado reported a common
burglary.  Thieves broke into his apartment and made off with Alomari's
briefcase, his passport tucked inside. 
http://www.msnbc.com/news/634409.asp

EFF: Bill treats hackers as terrorists A major anti-terrorism bill now
being considered by the U.S.  government has been criticized for
disproportionately targeting low-level computer intruders, making small
crimes punishable by a penalty of life in prison. 
http://www.zdnet.com/zdnn/stories/news/0,4586,2815197,00.html
http://www.govexec.com/dailyfed/0901/092701td1.htm

Privacy advocates warn that plans could harm free society.  Some of the
Bush administration's proposed rules of engagement for America's new war
on terrorism could snare millions of unsuspecting Americans in an
expanded surveillance net, electronic-privacy advocates said. 
http://www.siliconvalley.com/docs/news/svtop/priv092701.htm
http://www0.mercurycenter.com/premium/front/docs/privacy27.htm

White House Will Not Support Push For National ID Card Bush
administration officials say the president will not support calls in
Congress for a creating a national identification card to help combat
terrorism.  While some lawmakers in Congress have said they'd like to
take a fresh look at the issue, White House spokesman Jimmy Orr said
President Bush "is not even considering the idea."
http://www.newsbytes.com/news/01/170596.html

In Response To Attacks ICANN Eyes Security Matters The body that manages
the Internet's worldwide addressing system will meet in November as
planned, but will shuffle its agenda to address Internet "security and
stability" issues as they relate to the global dangers highlighted by
the Sept.  11 terrorist attacks in New York and Washington. 
http://www.newsbytes.com/news/01/170597.html
http://www.usatoday.com/life/cyber/tech/2001/09/27/icann-net-security.htm

VeriSign empire's new territory: Net IDs As giants of technology raise
their bets in the battle over Internet identification technology,
VeriSign may already hold the winning cards.  In recent weeks, Microsoft
and Sun Microsystems have boosted their efforts to become the leading
provider of online identification services. 
http://news.cnet.com/news/0-1004-200-7319556.html

Developer encrypts corporate IM A small Australian security software
developer has found itself a niche in the instant messaging market
dominated by big-guns Yahoo, MSN and AOL by encrypting a product for
corporate use. 
http://www.zdnet.com/zdnn/stories/news/0,4586,2815191,00.html

In the Next Chapter, Is Technology an Ally? Over the last two weeks,
computer scientists and others who think about technology have wondered
aloud about its likely role in countering terrorism -- or in carrying it
out.  Have the limitations and dangers of technology been overlooked?
(NY Times article, free registration required)
http://www.nytimes.com/2001/09/27/technology/circuits/27TECH.html

Can facial recognition snag terrorists? Will face recognition be the
Patriot missile of the domestic fight against terrorism--a technology
that initially draws raves but ultimately doesn't work as well as
billed? http://www.zdnet.com/zdnn/stories/news/0,4586,2815185,00.html
http://www.theregister.co.uk/content/4/21916.html

Liberte, Egalite ...  E-Security? At any other time, a gathering of
privacy mavens, policy-makers and legal experts in Paris might make for
an interesting if laidback discussion on the ethical niceties of
balancing national security and personal privacy.  In the aftermath of
the terrorist attacks on the United States, such debates have taken on
an intensity and urgency that two weeks and 3,500 miles of ocean cannot
diminish.  http://www.wired.com/news/conflict/0,2100,47133,00.html


------------------------ Yahoo! Groups Sponsor ---------------------~-->
Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide!
http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:51 PDT