Return-Path: <sentto-279987-2969-1003175040-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Mon, 15 Oct 2001 12:45:07 -0700 (PDT) Received: (qmail 20597 invoked by uid 510); 15 Oct 2001 19:43:46 -0000 Received: from n35.groups.yahoo.com (216.115.96.85) by 204.181.12.215 with SMTP; 15 Oct 2001 19:43:46 -0000 X-eGroups-Return: sentto-279987-2969-1003175040-fc=all.net@returns.onelist.com Received: from [10.1.4.55] by n35.groups.yahoo.com with NNFMP; 15 Oct 2001 19:44:03 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_4_1); 15 Oct 2001 19:44:00 -0000 Received: (qmail 14996 invoked from network); 15 Oct 2001 19:44:00 -0000 Received: from unknown (10.1.10.27) by l9.egroups.com with QMQP; 15 Oct 2001 19:44:00 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta2 with SMTP; 15 Oct 2001 19:44:00 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id MAA10289 for iwar@onelist.com; Mon, 15 Oct 2001 12:43:54 -0700 Message-Id: <200110151943.MAA10289@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Mon, 15 Oct 2001 12:43:54 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Former.Federal.Agent.Calls.Xp.a.Threat.to.National.Security] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 8bit Former Federal Agent Calls Xp a Threat to National Security John Fontana, Network World, Inc, 10/15/2001 <a href="http://www.antionline.com/showthread.php?threadid=119817">http://www.antionline.com/showthread.php?threadid=119817> A computer forensics expert and retired federal agent is trying to convince the U.S. government that Windows XP is a threat to national security and its distribution should be postponed. Michael Anderson, president of New Technologies, says data "scrubbing" features in Windows XP Professional will make it impossible for federal agents and law enforcement to find and reconstruct digital evidence buried on computers, particularly those seized from terrorists. While Anderson concedes that XP's data "scrubbing" and encrypted file system features are desired by law enforcement and others for keeping data secure, he says the timing of XP is bad. "This is an intelligence issue," says Anderson, who provides computer forensics training, software and consulting to military and law enforcement agencies. "The government and Microsoft need to think this thing through." Some security experts are unconvinced, however. "This may be going a little too far," says Charles Kolodgy, an analyst with market research firm IDC. "Do you ban shredding, burning of paper?" Kolodgy also says the argument is ironic given that Microsoft is often criticized for leaving so many security features disabled by default. Others say privacy is also an issue. But Anderson, who retired in 1996 from the U.S. Treasury, where he was a special agent, says the government should force Microsoft to postpone the release of the Professional version of XP in light of the Sept. 11 terrorist attacks. Windows XP launches Oct. 25, ironically, at an event in New York City. Anderson, whose business is based in Oregon, has detailed his concerns in letters to his state's congressional representatives in Washington, D.C. A spokesman for Sen. Ron Wyden (D-Ore.), a member of the Select Committee on Intelligence, says the senator was forwarding Anderson's letter to Attorney General John Ashcroft. "We are asking the Justice Department to take a look. We think it is their issue," the spokesman says. Chuck Guzis, president of Sydex, which develops data conversion and emulation software, also has written to Congress. "We just need to delay this software," he says. "We don't have the [forensics] tools or methodology in place to combat XP." Anderson's concerns stem from the fact that even when data is deleted from a computer it still resides on the hard drive for a period of time. This is known as ambient data. Experts can reconstruct ambient data to recover files and e-mails. Such work was done to produce evidence in the trial of Iran-Contra figure Gen. Oliver North and in the Monica Lewinsky scandal. Windows XP Professional has a feature called data recovery. By default, that mechanism is turned off, meaning that ambient data is "scrubbed" from the hard drive. Anderson says that means terrorists could use it to hide their digital tracks. "XP will slam the door on all that forensics work," Anderson says. But Microsoft says security in XP as in other Microsoft products isn't created in a vacuum. "We work with others in the industry and government agencies to develop security policies that take into account law enforcement concerns," says Jim Desler, the corporate spokesman for Microsoft. He acknowledges that savvy terrorists can use third-party tools, such as Evidence Eraser by Mad Hornet, to stifle forensics work but says Windows XP makes it available by default to anyone buying XP Professional. ©2001. All rights reserved. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more! http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:55 PST