[iwar] [fc:Former.Federal.Agent.Calls.Xp.a.Threat.to.National.Security]

From: Fred Cohen (fc@all.net)
Date: 2001-10-15 12:43:54


Return-Path: <sentto-279987-2969-1003175040-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Mon, 15 Oct 2001 12:45:07 -0700 (PDT)
Received: (qmail 20597 invoked by uid 510); 15 Oct 2001 19:43:46 -0000
Received: from n35.groups.yahoo.com (216.115.96.85) by 204.181.12.215 with SMTP; 15 Oct 2001 19:43:46 -0000
X-eGroups-Return: sentto-279987-2969-1003175040-fc=all.net@returns.onelist.com
Received: from [10.1.4.55] by n35.groups.yahoo.com with NNFMP; 15 Oct 2001 19:44:03 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_4_1); 15 Oct 2001 19:44:00 -0000
Received: (qmail 14996 invoked from network); 15 Oct 2001 19:44:00 -0000
Received: from unknown (10.1.10.27) by l9.egroups.com with QMQP; 15 Oct 2001 19:44:00 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta2 with SMTP; 15 Oct 2001 19:44:00 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id MAA10289 for iwar@onelist.com; Mon, 15 Oct 2001 12:43:54 -0700
Message-Id: <200110151943.MAA10289@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Mon, 15 Oct 2001 12:43:54 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Former.Federal.Agent.Calls.Xp.a.Threat.to.National.Security]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 8bit

Former Federal Agent Calls Xp a Threat to National Security 
John Fontana, Network World, Inc, 10/15/2001
<a href="http://www.antionline.com/showthread.php?threadid=119817">http://www.antionline.com/showthread.php?threadid=119817>

A computer forensics expert and retired federal agent is trying to
convince the U.S. government that Windows XP is a threat to national
security and its distribution should be postponed. 
Michael Anderson, president of New Technologies, says data "scrubbing"
features in Windows XP Professional will make it impossible for federal
agents and law enforcement to find and reconstruct digital evidence
buried on computers, particularly those seized from terrorists. 
While Anderson concedes that XP's data "scrubbing" and encrypted file
system features are desired by law enforcement and others for keeping
data secure, he says the timing of XP is bad. 
"This is an intelligence issue," says Anderson, who provides computer
forensics training, software and consulting to military and law
enforcement agencies. "The government and Microsoft need to think this
thing through." 
Some security experts are unconvinced, however. 
"This may be going a little too far," says Charles Kolodgy, an analyst
with market research firm IDC. "Do you ban shredding, burning of paper?"
Kolodgy also says the argument is ironic given that Microsoft is often
criticized for leaving so many security features disabled by default.
Others say privacy is also an issue. 
But Anderson, who retired in 1996 from the U.S. Treasury, where he was a
special agent, says the government should force Microsoft to postpone
the release of the Professional version of XP in light of the Sept. 11
terrorist attacks. Windows XP launches Oct. 25, ironically, at an event
in New York City. 
Anderson, whose business is based in Oregon, has detailed his concerns
in letters to his state's congressional representatives in Washington,
D.C. 
A spokesman for Sen. Ron Wyden (D-Ore.), a member of the Select
Committee on Intelligence, says the senator was forwarding Anderson's
letter to Attorney General John Ashcroft. "We are asking the Justice
Department to take a look. We think it is their issue," the spokesman
says. 
Chuck Guzis, president of Sydex, which develops data conversion and
emulation software, also has written to Congress. 
"We just need to delay this software," he says. "We don't have the
[forensics] tools or methodology in place to combat XP." 
Anderson's concerns stem from the fact that even when data is deleted
from a computer it still resides on the hard drive for a period of time.
This is known as ambient data. Experts can reconstruct ambient data to
recover files and e-mails. Such work was done to produce evidence in the
trial of Iran-Contra figure Gen. Oliver North and in the Monica Lewinsky
scandal. 
Windows XP Professional has a feature called data recovery. By default,
that mechanism is turned off, meaning that ambient data is "scrubbed"
from the hard drive. Anderson says that means terrorists could use it to
hide their digital tracks. 
"XP will slam the door on all that forensics work," Anderson says. But
Microsoft says security in XP as in other Microsoft products isn't
created in a vacuum. 
"We work with others in the industry and government agencies to develop
security policies that take into account law enforcement concerns," says
Jim Desler, the corporate spokesman for Microsoft. 
He acknowledges that savvy terrorists can use third-party tools, such as
Evidence Eraser by Mad Hornet, to stifle forensics work but says Windows
XP makes it available by default to anyone buying XP Professional. 
©2001. All rights reserved.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more!
http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:55 PST