[iwar] [NewsBits] NewsBits - 10/10/01 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2001-10-13 09:57:34


Return-Path: <sentto-279987-2904-1002992255-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Sat, 13 Oct 2001 09:58:08 -0700 (PDT)
Received: (qmail 672 invoked by uid 510); 13 Oct 2001 16:57:22 -0000
Received: from n5.groups.yahoo.com (216.115.96.55) by 204.181.12.215 with SMTP; 13 Oct 2001 16:57:22 -0000
X-eGroups-Return: sentto-279987-2904-1002992255-fc=all.net@returns.onelist.com
Received: from [10.1.4.56] by n5.groups.yahoo.com with NNFMP; 13 Oct 2001 16:57:36 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_4_1); 13 Oct 2001 16:57:35 -0000
Received: (qmail 66728 invoked from network); 13 Oct 2001 16:57:35 -0000
Received: from unknown (10.1.10.27) by l10.egroups.com with QMQP; 13 Oct 2001 16:57:35 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta2 with SMTP; 13 Oct 2001 16:57:35 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id JAA05398 for iwar@onelist.com; Sat, 13 Oct 2001 09:57:35 -0700
Message-Id: <200110131657.JAA05398@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sat, 13 Oct 2001 09:57:34 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [NewsBits] NewsBits - 10/10/01 (fwd)
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Alternative Anti-terror bill limits life sentence for hackers Bipartisan
proposal narrows the Bush Administration's definition of terrorism. 
Anti-terrorism legislation proposed by leaders of the House Judiciary
Committee this week omits a Justice Department plan to make computer
hacking a federal terrorism offense, punishable by life imprisonment
without the possibility of parole. 
http://www.securityfocus.com/news/260

Administration launches cybersecurity office The White House Tuesday
officially launched a new, separate office focusing on information
security and appointed of Richard Clarke as President Bush's special
adviser on cybersecurity issues.  Previously, cybersecurity was part of
the administration's general anti-terrorism efforts.  For that reason,
several high-tech industry officials said cybersecurity issues were not
getting necessary attention. 
http://www.govexec.com/dailyfed/1001/100901td1.htm

Terrorists May Have Used Hidden Messages to Plan Attacks Of all the
footprints terrorists left on their way to the Sept.  11 attacks in New
York and Washington, perhaps the hardest ones to detect are in imprinted
in cyberspace.  Investigators are trying to determine if associates of
suspected terrorism mastermind Osama bin Laden issued secret orders
online using a modern-day version of ancient communication method called
steganography.  http://www.antionline.com/showthread.php?threadid=118852

Software sought to expose terrorist cells Adapting fraud-detection
programs a concern to some privacy advocates.  In a move that has some
privacy rights advocates concerned, the Pentagon is hoping to track down
terrorists with the help of a growing battery of computer software
developed to combat consumer and business fraud. 
http://www0.mercurycenter.com/premium/front/docs/darpa10.htm

Anti-Secrecy Website Pulls Sensitive Information An institution
dedicated to blowing the lid off national security secrets has removed
about 200 pages worth of data from its Web site out of concern that the
information could compromise the safety of government buildings. 
http://www.newsbytes.com/news/01/171058.html

Davis vetoes bill requiring e-mail monitoring disclosure He signs
others, including a tax credit for buying alternative energy generators. 
For the third year in a row, Gov.  Gray Davis has vetoed a bill that
would have required employers to tell employees in writing if they
monitor their workers' e-mails. 
http://www0.mercurycenter.com/premium/local/docs/veto10tk.htm

ISP to banish virus spreaders British Internet users who fail to protect
their machines against virulent computer viruses such as Nimda could
have their Internet connections suspended by their Internet service
provider.  British ISP Telewest has been the first to take direct action
against customers who have refused to patch their computers against the
Nimda worm or have left infected PCs running. 
http://www.zdnet.com/zdnn/stories/news/0,4586,5098072,00.html
http://news.cnet.com/news/0-1003-200-7473401.html

Hackers increasingly female Computer security, networks pique curiosity. 
Say the word ``hacker,'' and most people still think of an anti-social
teenage boy running amok in government computer systems, concocting
nasty viruses and defacing Web sites.  But during the past few years, as
computers have become commonplace in conventional homes and businesses,
hackers have undergone a remarkable transformation.  Not only have
hackers become friendlier and more law-abiding, they are also more
frequently female. 
http://www0.mercurycenter.com/premium/business/docs/femhack10.htm
http://www.siliconvalley.com/docs/news/svfront/hack101001.htm

On the way--ATMs that recognize your face Biometric-enabled ATMs could
be doling out cash to Australian bank customers within a year following
the launch of technology that promises to reduce the expense of
converting existing ATM security infrastructure. 
http://www.zdnet.com/zdnn/stories/news/0,4586,2817152,00.html

Truth Could Be the Web's First Casualty Hackers have moved markets with
false reports.  In a time of war, we can't allow a tech-savvy foe to sow
chaos by tampering with news sites.  The U.S.  government threatening to
put to death a programmer accused of breaking copyright laws? Sure
sounds draconian, but that's what some visitors to Yahoo! News could
read on Sept.  18 if they searched through the archives for stories
about Dmitry Sklyarov.  http://www.securityfocus.com/news/263

The Value of Honeypots, Part One: Definitions and Values of Honeypots
Over the past several years there has been a growing interest in
honeypots and honeypot-related technologies.  Honeypots are not a new
technology, they were first explained in a couple of very good papers by
several icons in computer security: Cliff Stoll's book "The Cuckoo's
Egg", and Steve Bellovin and Bill Cheswick's "An Evening with Berferd."
This two-part series will attempt to take these works further and
discuss what honeypots are, how they can add value to an organization,
and several honeypot solutions. 
http://www.securityfocus.com/cgi-bin/infocus.pl?id=1492


------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:55 PST