[iwar] [fc:Hackers.face.backlash]

From: Fred Cohen (fc@all.net)
Date: 2001-10-10 09:02:36


Return-Path: <sentto-279987-2845-1002729584-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 10 Oct 2001 09:04:08 -0700 (PDT)
Received: (qmail 17101 invoked by uid 510); 10 Oct 2001 16:02:29 -0000
Received: from n34.groups.yahoo.com (216.115.96.84) by 204.181.12.215 with SMTP; 10 Oct 2001 16:02:29 -0000
X-eGroups-Return: sentto-279987-2845-1002729584-fc=all.net@returns.onelist.com
Received: from [10.1.1.224] by n34.groups.yahoo.com with NNFMP; 10 Oct 2001 16:02:37 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_4_1); 10 Oct 2001 15:59:44 -0000
Received: (qmail 6496 invoked from network); 10 Oct 2001 15:59:44 -0000
Received: from unknown (10.1.10.26) by 10.1.1.224 with QMQP; 10 Oct 2001 15:59:44 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 10 Oct 2001 16:02:36 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id JAA04755 for iwar@onelist.com; Wed, 10 Oct 2001 09:02:36 -0700
Message-Id: <200110101602.JAA04755@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 10 Oct 2001 09:02:36 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Hackers.face.backlash]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Hackers face backlash 
Madeline Bennett, IT Week, 10/10/2001
<a href="http://www.infoworld.com/articles/hn/xml/01/10/09/011009hnsurvey.xml">http://www.infoworld.com/articles/hn/xml/01/10/09/011009hnsurvey.xml>

As the US considers new anti-hacking laws, security experts say the
measures are in line with the real threat of online terrorism

New anti-hacking laws are being proposed in the US to prevent terrorism,
and UK security experts are calling for similar measures to be adopted
globally. 

The US attorney general John Ashcroft has proposed that the offence of
hacking should be covered by the US Anti-Terrorism Act.  This could lead
to penalties of life imprisonment for hacking offences, and broader
powers for law enforcement agencies. 

Civil liberties groups are concerned the proposals will infringe
personal freedom, but Aled Miles, vice president and managing director
for northern Europe at security firm Symantec, said such regulations are
needed to combat the threat of online terrorism, which is already taking
place.  For the measures to be really effective, the deterrents should
be enforced on a global basis, he added. 

Hacking and denial-of-service attacks are already covered in the UK
under the Terrorism Act 2000, which covers strikes on computer systems
designed to seriously disrupt or interfere with electronic services. 

Joanne Brook, a solicitor at the IT specialist law firm Sprecher Grier
Halberstam, said the UK government would be forced to prosecute hackers
and online terrorists given current security concerns.  Although the UK
law has been in place for 18 months, it has so far seen little use, she
added. 

The US proposals could lead to a more co-ordinated fight against online
terrorism if an attack on the US begins in the UK, said Brook.  "The
offender would be dealt with under UK law, but with co-operation from
the US," she said.  Under a separate bill, the US is pushing for
stricter controls on encryption software.  US senator Judd Gregg is
reportedly drafting an encryption bill, which could lead to users being
required to store encryption keys in a central database, and security
software requiring back-door access.  However, it is uncertain whether
Gregg will gain support for his proposals.  Some security experts argued
such measures could actually increase opportunities for online
terrorism.  John Alcock, principal consultant for security at IT
services firm ICL, said restricting the use of encryption could make
companies vulnerable to information warfare. 


------------------------ Yahoo! Groups Sponsor ---------------------~-->
Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide!
http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:54 PST