[iwar] [fc:Hackers.face.backlash]

From: Fred Cohen (fc@all.net)
Date: 2001-10-09 21:08:54


Return-Path: <sentto-279987-2826-1002686934-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Tue, 09 Oct 2001 21:11:09 -0700 (PDT)
Received: (qmail 19979 invoked by uid 510); 10 Oct 2001 04:08:48 -0000
Received: from n8.groups.yahoo.com (216.115.96.58) by 204.181.12.215 with SMTP; 10 Oct 2001 04:08:48 -0000
X-eGroups-Return: sentto-279987-2826-1002686934-fc=all.net@returns.onelist.com
Received: from [10.1.1.222] by n8.groups.yahoo.com with NNFMP; 10 Oct 2001 04:08:55 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_4_1); 10 Oct 2001 04:08:54 -0000
Received: (qmail 42400 invoked from network); 10 Oct 2001 04:08:54 -0000
Received: from unknown (10.1.10.142) by 10.1.1.222 with QMQP; 10 Oct 2001 04:08:54 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 10 Oct 2001 04:08:54 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id VAA31189 for iwar@onelist.com; Tue, 9 Oct 2001 21:08:54 -0700
Message-Id: <200110100408.VAA31189@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Tue, 9 Oct 2001 21:08:54 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Hackers.face.backlash]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 8bit

Hackers face backlash
Madeline Bennett, IT Week 

As the US considers new anti-hacking laws, security experts say the
measures are in line with the real threat of online terrorism

New anti-hacking laws are being proposed in the US to prevent terrorism,
and UK security experts are calling for similar measures to be adopted
globally. 

The US attorney general John Ashcroft has proposed that the offence of
hacking should be covered by the US Anti-Terrorism Act.  This could lead
to penalties of life imprisonment for hacking offences, and broader
powers for law enforcement agencies. 

Civil liberties groups are concerned the proposals will infringe
personal freedom, but Aled Miles, vice president and managing director
for northern Europe at security firm Symantec, said such regulations are
needed to combat the threat of online terrorism, which is already taking
place.  For the measures to be really effective, the deterrents should
be enforced on a global basis, he added. 

Hacking and denial-of-service attacks are already covered in the UK
under the Terrorism Act 2000, which covers strikes on computer systems
designed to seriously disrupt or interfere with electronic services. 

Joanne Brook, a solicitor at the IT specialist law firm Sprecher Grier
Halberstam, said the UK government would be forced to prosecute hackers
and online terrorists given current security concerns.  Although the UK
law has been in place for 18 months, it has so far seen little use, she
added. 

The US proposals could lead to a more co-ordinated fight against online
terrorism if an attack on the US begins in the UK, said Brook.  "The
offender would be dealt with under UK law, but with co-operation from
the US," she said. 

Under a separate bill, the US is pushing for stricter controls on
encryption software.  US senator Judd Gregg is reportedly drafting an
encryption bill, which could lead to users being required to store
encryption keys in a central database, and security software requiring
back-door access.  However, it is uncertain whether Gregg will gain
support for his proposals.  Some security experts argued such measures
could actually increase opportunities for online terrorism.  John
Alcock, principal consultant for security at IT services firm ICL, said
restricting the use of encryption could make companies vulnerable to
information warfare. 

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide!
http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:54 PST