Return-Path: <sentto-279987-3169-1003586327-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sat, 20 Oct 2001 07:00:07 -0700 (PDT) Received: (qmail 19296 invoked by uid 510); 20 Oct 2001 13:58:22 -0000 Received: from n3.groups.yahoo.com (216.115.96.53) by 204.181.12.215 with SMTP; 20 Oct 2001 13:58:22 -0000 X-eGroups-Return: sentto-279987-3169-1003586327-fc=all.net@returns.onelist.com Received: from [10.1.4.56] by n3.groups.yahoo.com with NNFMP; 20 Oct 2001 13:58:47 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 20 Oct 2001 13:58:46 -0000 Received: (qmail 20967 invoked from network); 20 Oct 2001 13:58:46 -0000 Received: from unknown (10.1.10.27) by l10.egroups.com with QMQP; 20 Oct 2001 13:58:46 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta2 with SMTP; 20 Oct 2001 13:58:46 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id f9KDwnY13283 for iwar@onelist.com; Sat, 20 Oct 2001 06:58:49 -0700 Message-Id: <200110201358.f9KDwnY13283@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sat, 20 Oct 2001 06:58:49 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [NewsBits] NewsBits - 10/19/01 (fwd) Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit October 19, 2001 Barclaycard =A325m blackmail crypto case cloaked in secrecy. The veil of secrecy has been thrown over the trial of a former encryption expert at Barclays charged with blackmailing Barclaycard, the credit card issuer. Pre-trial hearings behind closed doors, or in camera, have already taken place in the case of Graham Browne, today's Guardian has reported. But it's unclear what procedures will be followed during a trial expected to start at the end of the month. http://www.theregister.co.uk/content/7/22375.html DMCA Protester Cracks Microsoft's Copyright Protection Code A programmer claiming to be "mad as hell" about the Digital Millennium Copyright Act (DMCA) has apparently cracked a recent version of Microsoft Corp.'s digital rights management technology. http://www.newsbytes.com/news/01/171331.html http://www.theregister.co.uk/content/4/22354.html Red Cross Warns Of Fraudulent Trojan Program The American Red Cross is warning Internet users to beware a credit-card-stealing Trojan horse program, delivered in an e-mail that is made to look as though it comes from the disaster relief organization. http://www.newsbytes.com/news/01/171321.html Congress agrees on expansion of police powers House and Senate negotiators announced Thursday that they had reached agreement on the final terms of legislation to give federal officials broad new powers to pursue anti-terrorism. The bill could reach President Bush as early as next week. The legislation would give the government more authority to trace cell-phone calls, make unannounced property searches and share information between intelligence agents and law enforcement officers. The negotiators predicted that the bill would receive final approval next week. Bush is expected to sign the legislation. http://www.siliconvalley.com/docs/news/depth/cong101901.htm What the Anti-Terrorism Bill Means for Hacking The Senate's anti-terrorism bill, the USA Act, includes computer crimes as terrorist offenses. However, the range of computer crimes defined as terrorism is much narrower than Attorney General John Ashcroft wanted. http://www.techtv.com/screensavers/showtell/story/0,24330,3354962,00.html U.S. plan for a secure Net is 'flawed' Security experts have warned that the secure computer network planned by the US Government could be undermined by careless users. The Bush administration, newly focused on security since the 11 September attacks, wants to create a network, called Govnet, to provide protected data and voice communications. Richard Clarke, recently named special advisor to the president for cyberspace security, is behind the new initiative and believes it to be vital to future, critical, government operations. http://news.bbc.co.uk/hi/english/sci/tech/newsid_1601000/1601823.stm Is the Internet too open to be secure? http://www.zdnet.com/zdnn/stories/comment/0,5859,2819021,00.html Terror bill could hit e-commerce http://news.zdnet.co.uk/story/0,,t269-s2097720,00.html Tech Groups Pledge to Share Info Technology groups are rallying behind a proposal in Congress that would increase information sharing with the government in the hope of enhancing computer security. During a conference on Thursday at the Center for Strategic and International Studies, Sen. Robert Bennett asked for support for his Critical Infrastructure Information Security Act, saying it would preserve the confidentiality of information that firms provide to federal agencies. http://www.wired.com/news/conflict/0,2100,47704,00.html Canada Works on Terror Bill, Too The Canadian government capped a week of anti- terrorist measures Friday with the announcement of a $47 million injection of technology funding for two of its security agencies. The funds for the Canadian Security Intelligence Service (CSIS) and the Communications Security Establishment (CSE) will go toward a wide array of technological upgrades. http://www.wired.com/news/politics/0,1283,47734,00.html Probe into recording industry's online deals expanded The Recording Industry Association of America which led a high-profile legal crusade against the renegade music-swapping service, Napster finds itself under scrutiny for allegedly inflating the prices for Internet radio licenses. The Justice Department has served the recording industry's trade organization with subpoenas as part of a widening investigation into alleged price-fixing and collusion in licensing online music. http://www.siliconvalley.com/docs/news/svfront/record101901.htm http://www.zdnet.com/zdnn/stories/news/0,4586,5098534,00.html http://www.wired.com/news/mp3/0,1285,47698,00.html Rural police may get tech boost To give a needed boost to rural police departments lagging in the Information Age, Sen. John Rockefeller (D-W.Va.) recently introduced a bill establishing a grant program to equip agencies with computers and Internet access to fight crime (The Networking Electronically to Connect Our Police Act of 2001, or the NET COP Act as its termed in the bill). http://www.fcw.com/geb/articles/2001/1015/web-police-10-19-01.asp Security hole leaves HP-UX wide open Hewlett-Packard has admitted that an exploit in its implementation of telnet could allow an attacker to gain remote root access. A remotely exploitable buffer overflow has been detected in HP-UX servers running the telnet remote access daemon, which could crash the server or allow an intruder to gain root access. The security hole is unique to HP-UX releases 10.X. http://news.zdnet.co.uk/story/0,,t269-s2097708,00.html Y2K prep helped terror response If the federal government had not upgraded its critical systems for the Year 2000, the terrorist attacks of Sept. 11 could have been far worse, Sen. Robert Bennett (R-Utah) told a gathering of experts Oct. 18. Bennett said the work done to eliminate Year 2000 date-change bugs and upgrade computer systems helped make rescue efforts swift after the worst terrorist attacks in U.S. history. http://www.fcw.com/fcw/articles/2001/1015/web-y2k-10-19-01.asp Good security administration is crucial Firms should revamp their security admin rather than just avoiding Microsoft products, warns expert. Firms are being advised to tighten up on security administration rather than switch from Microsoft software to open source operating systems, as fears over digital vulnerabilities mount. http://news.zdnet.co.uk/story/0,,t269-s2097683,00.html Blacklisted Groups Visible on Web Earlier this month, the State Department updated its list of foreign terrorist organizations, a measure that it says "stigmatizes and isolates" such groups internationally. But isolating them may prove difficult: Many of the 28 blacklisted organizations operate websites where they issue press releases, threaten their enemies, raise funds and even recruit members. Several of the sites are hosted in the United States. http://www.wired.com/news/politics/0,1283,47616,00.html Tracking Foreign Students Electronically Amid fears that terrorists may be exploiting the student visa program to sneak into the country, US universities are turning to electronic databases to track foreign students. http://www.techtv.com/news/culture/story/0,24195,3354843,00.html Cyber warriors gun for bin Laden U.S. armed forces are not the only ones taking aim at Osama bin Laden. The weird, wacky -- and tacky world of the Internet has allowed surfers to join the chase for the world's most wanted man. http://www.siliconvalley.com/docs/news/reuters_wire/1580777l.htm Speed crucial in 'Information War' The U.S. military is filling the skies over Afghanistan with fighter jets, heavily armed commando gunships and missile-firing reconnaissance drones in an attempt to do something it has never done well: identify seemingly ambiguous targets on the ground in a matter of minutes and give pilots permission to attack them. http://www.usatoday.com/life/cyber/tech/2001/10/19/info-war.htm Military Developing Tiny Spies Electronic communication systems are pill-sized now, but scientists are aiming for smart dust. Tiny electronic spies the size of an aspirin could one day provide key intelligence for troops in the field, scientists say. Researchers at the University of California, Berkeley have developed a complete sensor-based communication system that can be integrated into a tiny package. http://www.techtv.com/news/specialreport/wartech/story/0,24195,3355003,00.html ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:56 PST