[iwar] [NewsBits] NewsBits - 10/19/01 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2001-10-20 06:58:49


Return-Path: <sentto-279987-3169-1003586327-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sat, 20 Oct 2001 07:00:07 -0700 (PDT)
Received: (qmail 19296 invoked by uid 510); 20 Oct 2001 13:58:22 -0000
Received: from n3.groups.yahoo.com (216.115.96.53) by 204.181.12.215 with SMTP; 20 Oct 2001 13:58:22 -0000
X-eGroups-Return: sentto-279987-3169-1003586327-fc=all.net@returns.onelist.com
Received: from [10.1.4.56] by n3.groups.yahoo.com with NNFMP; 20 Oct 2001 13:58:47 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 20 Oct 2001 13:58:46 -0000
Received: (qmail 20967 invoked from network); 20 Oct 2001 13:58:46 -0000
Received: from unknown (10.1.10.27) by l10.egroups.com with QMQP; 20 Oct 2001 13:58:46 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta2 with SMTP; 20 Oct 2001 13:58:46 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id f9KDwnY13283 for iwar@onelist.com; Sat, 20 Oct 2001 06:58:49 -0700
Message-Id: <200110201358.f9KDwnY13283@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sat, 20 Oct 2001 06:58:49 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [NewsBits] NewsBits - 10/19/01 (fwd)
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

October 19, 2001

Barclaycard =A325m blackmail crypto case cloaked in secrecy.  The veil
of secrecy has been thrown over the trial of a former encryption expert
at Barclays charged with blackmailing Barclaycard, the credit card
issuer.  Pre-trial hearings behind closed doors, or in camera, have
already taken place in the case of Graham Browne, today's Guardian has
reported.  But it's unclear what procedures will be followed during a
trial expected to start at the end of the month. 
http://www.theregister.co.uk/content/7/22375.html

DMCA Protester Cracks Microsoft's Copyright Protection Code A programmer
claiming to be "mad as hell" about the Digital Millennium Copyright Act
(DMCA) has apparently cracked a recent version of Microsoft Corp.'s
digital rights management technology. 
http://www.newsbytes.com/news/01/171331.html
http://www.theregister.co.uk/content/4/22354.html

Red Cross Warns Of Fraudulent Trojan Program The American Red Cross is
warning Internet users to beware a credit-card-stealing Trojan horse
program, delivered in an e-mail that is made to look as though it comes
from the disaster relief organization. 
http://www.newsbytes.com/news/01/171321.html

Congress agrees on expansion of police powers House and Senate
negotiators announced Thursday that they had reached agreement on the
final terms of legislation to give federal officials broad new powers to
pursue anti-terrorism.  The bill could reach President Bush as early as
next week.  The legislation would give the government more authority to
trace cell-phone calls, make unannounced property searches and share
information between intelligence agents and law enforcement officers. 
The negotiators predicted that the bill would receive final approval
next week.  Bush is expected to sign the legislation. 
http://www.siliconvalley.com/docs/news/depth/cong101901.htm

What the Anti-Terrorism Bill Means for Hacking The Senate's
anti-terrorism bill, the USA Act, includes computer crimes as terrorist
offenses.  However, the range of computer crimes defined as terrorism is
much narrower than Attorney General John Ashcroft wanted. 
http://www.techtv.com/screensavers/showtell/story/0,24330,3354962,00.html

U.S.  plan for a secure Net is 'flawed' Security experts have warned
that the secure computer network planned by the US Government could be
undermined by careless users.  The Bush administration, newly focused on
security since the 11 September attacks, wants to create a network,
called Govnet, to provide protected data and voice communications. 
Richard Clarke, recently named special advisor to the president for
cyberspace security, is behind the new initiative and believes it to be
vital to future, critical, government operations. 
http://news.bbc.co.uk/hi/english/sci/tech/newsid_1601000/1601823.stm

Is the Internet too open to be secure?
http://www.zdnet.com/zdnn/stories/comment/0,5859,2819021,00.html
Terror bill could hit e-commerce
http://news.zdnet.co.uk/story/0,,t269-s2097720,00.html

Tech Groups Pledge to Share Info Technology groups are rallying behind a
proposal in Congress that would increase information sharing with the
government in the hope of enhancing computer security.  During a
conference on Thursday at the Center for Strategic and International
Studies, Sen.  Robert Bennett asked for support for his Critical
Infrastructure Information Security Act, saying it would preserve the
confidentiality of information that firms provide to federal agencies. 
http://www.wired.com/news/conflict/0,2100,47704,00.html

Canada Works on Terror Bill, Too The Canadian government capped a week
of anti- terrorist measures Friday with the announcement of a $47
million injection of technology funding for two of its security
agencies.  The funds for the Canadian Security Intelligence Service
(CSIS) and the Communications Security Establishment (CSE) will go
toward a wide array of technological upgrades. 
http://www.wired.com/news/politics/0,1283,47734,00.html

Probe into recording industry's online deals expanded The Recording
Industry Association of America which led a high-profile legal crusade
against the renegade music-swapping service, Napster finds itself under
scrutiny for allegedly inflating the prices for Internet radio licenses. 
The Justice Department has served the recording industry's trade
organization with subpoenas as part of a widening investigation into
alleged price-fixing and collusion in licensing online music. 
http://www.siliconvalley.com/docs/news/svfront/record101901.htm
http://www.zdnet.com/zdnn/stories/news/0,4586,5098534,00.html
http://www.wired.com/news/mp3/0,1285,47698,00.html

Rural police may get tech boost To give a needed boost to rural police
departments lagging in the Information Age, Sen.  John Rockefeller
(D-W.Va.) recently introduced a bill establishing a grant program to
equip agencies with computers and Internet access to fight crime (The
Networking Electronically to Connect Our Police Act of 2001, or the NET
COP Act as its termed in the bill). 
http://www.fcw.com/geb/articles/2001/1015/web-police-10-19-01.asp

Security hole leaves HP-UX wide open Hewlett-Packard has admitted that
an exploit in its implementation of telnet could allow an attacker to
gain remote root access.  A remotely exploitable buffer overflow has
been detected in HP-UX servers running the telnet remote access daemon,
which could crash the server or allow an intruder to gain root access. 
The security hole is unique to HP-UX releases 10.X. 
http://news.zdnet.co.uk/story/0,,t269-s2097708,00.html

Y2K prep helped terror response If the federal government had not
upgraded its critical systems for the Year 2000, the terrorist attacks
of Sept.  11 could have been far worse, Sen.  Robert Bennett (R-Utah)
told a gathering of experts Oct.  18.  Bennett said the work done to
eliminate Year 2000 date-change bugs and upgrade computer systems helped
make rescue efforts swift after the worst terrorist attacks in U.S. 
history.
http://www.fcw.com/fcw/articles/2001/1015/web-y2k-10-19-01.asp

Good security administration is crucial Firms should revamp their
security admin rather than just avoiding Microsoft products, warns
expert.  Firms are being advised to tighten up on security
administration rather than switch from Microsoft software to open source
operating systems, as fears over digital vulnerabilities mount. 
http://news.zdnet.co.uk/story/0,,t269-s2097683,00.html

Blacklisted Groups Visible on Web Earlier this month, the State
Department updated its list of foreign terrorist organizations, a
measure that it says "stigmatizes and isolates" such groups
internationally.  But isolating them may prove difficult: Many of the 28
blacklisted organizations operate websites where they issue press
releases, threaten their enemies, raise funds and even recruit members. 
Several of the sites are hosted in the United States. 
http://www.wired.com/news/politics/0,1283,47616,00.html

Tracking Foreign Students Electronically Amid fears that terrorists may
be exploiting the student visa program to sneak into the country, US
universities are turning to electronic databases to track foreign
students. 
http://www.techtv.com/news/culture/story/0,24195,3354843,00.html

Cyber warriors gun for bin Laden U.S.  armed forces are not the only
ones taking aim at Osama bin Laden.  The weird, wacky -- and tacky world
of the Internet has allowed surfers to join the chase for the world's
most wanted man. 
http://www.siliconvalley.com/docs/news/reuters_wire/1580777l.htm

Speed crucial in 'Information War' The U.S.  military is filling the
skies over Afghanistan with fighter jets, heavily armed commando
gunships and missile-firing reconnaissance drones in an attempt to do
something it has never done well: identify seemingly ambiguous targets
on the ground in a matter of minutes and give pilots permission to
attack them. 
http://www.usatoday.com/life/cyber/tech/2001/10/19/info-war.htm

Military Developing Tiny Spies Electronic communication systems are
pill-sized now, but scientists are aiming for smart dust.  Tiny
electronic spies the size of an aspirin could one day provide key
intelligence for troops in the field, scientists say.  Researchers at
the University of California, Berkeley have developed a complete
sensor-based communication system that can be integrated into a tiny
package. 
http://www.techtv.com/news/specialreport/wartech/story/0,24195,3355003,00.html


------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:56 PST