[iwar] [NewsBits] NewsBits - 10/23/01 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2001-10-24 05:45:06


Return-Path: <sentto-279987-3363-1003927483-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 24 Oct 2001 05:46:07 -0700 (PDT)
Received: (qmail 4138 invoked by uid 510); 24 Oct 2001 12:44:10 -0000
Received: from n7.groups.yahoo.com (216.115.96.57) by 204.181.12.215 with SMTP; 24 Oct 2001 12:44:10 -0000
X-eGroups-Return: sentto-279987-3363-1003927483-fc=all.net@returns.onelist.com
Received: from [10.1.4.54] by n7.groups.yahoo.com with NNFMP; 24 Oct 2001 12:44:43 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 24 Oct 2001 12:44:41 -0000
Received: (qmail 19979 invoked from network); 24 Oct 2001 12:44:41 -0000
Received: from unknown (10.1.10.142) by l8.egroups.com with QMQP; 24 Oct 2001 12:44:41 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta3 with SMTP; 24 Oct 2001 12:44:41 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id f9OCj7h06418 for iwar@onelist.com; Wed, 24 Oct 2001 05:45:07 -0700
Message-Id: <200110241245.f9OCj7h06418@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 24 Oct 2001 05:45:06 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [NewsBits] NewsBits - 10/23/01 (fwd)
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

October 23, 2001

Further security guidance given The Office of Management and Budget last
week released additional guidance on how agencies must comply with a new
law that pulls all of the federal information security mandates together
and calls for reports that the administration and Congress will review. 
Under the Government Information Security Reform Act of 2000, agencies
must undergo annual self-assessments and independent assessments of
their security practices and policies.  Agencies sent OMB the first set
of reports on the results in September. 
http://www.fcw.com/fcw/articles/2001/1022/web-gisra-10-23-01.asp

E-gov initiatives ready to roll The Bush administration's big push
toward e-government is ready to be released, but the initiatives cannot
succeed unless agencies overcome their resistance to sharing information
and resources with others across federal, state and local governments,
officials said Oct.  23. 
http://www.fcw.com/fcw/articles/2001/1022/web-egov-10-23-01.asp

Agencies urged to share intelligence data
http://www.govexec.com/dailyfed/1001/102301kp1.htm

Beyond Carnivore: FBI Eyes Packet Taps Expect the FBI to expand its
Internet wiretapping program, says a source familiar with the plan. 
Stewart Baker, a partner with law firm Steptoe & Johnson, is a former
general counsel to the National Security Agency.  He says the FBI has
spent the last two years developing a new surveillance architecture that
would concentrate Internet traffic in several key locations where all
packets, not just e-mail, could be wiretapped. 
http://www.interactiveweek.com/article/0,3658,s=605&a=16678,00.asp

Air security may require IT overhaul The U.S.  Department of
Transportation is considering recommendations that could impact
performance of the industry's aging mainframe systems and require a
costly overhaul.  Some of the DOT's recommendations call for the
airlines' IT systems to perform event based functions, like red-flagging
a suspected terrorist's name in a reservation system. 
http://www.cnn.com/2001/TECH/industry/10/23/airport.security.idg/index.html

Techs broadside anti-piracy plan Technology industry heavyweights are
trying to kill a Hollywood-backed plan heading for Congress that would
require anti-piracy protections in PCs, CD players and other consumer
electronics devices.  After weeks of conference calls and quiet rallying
of the troops, technology companies including Intel, IBM, Microsoft and
Compaq Computer held a coming-out press conference Monday to oppose a
broad copyright protection proposal being backed by Walt Disney and Sen. 
Ernest Hollings, D-S.C. 
http://www.zdnet.com/zdnn/stories/news/0,4586,5098618,00.html

EFF Lobbies Against New Zealand Copyright Law
http://www.newsbytes.com/news/01/171435.html

Spam Explosion in Anthrax Wake Hundreds of unused bulk-mail pitches sit
in a box under Joanne Urbanik's desk at Ultimate Software.  The anthrax
scare forced the Weston, Fla., company that specializes in payroll and
personnel programs to cancel a long-planned marketing campaign. 
Urbanik, the company's marketing director, is now looking to salvage
fourth-quarter sales by reviving the campaign on the Internet. 
http://www.wired.com/news/business/0,1367,47796,00.html

Europe moves in circles over spam laws The European Parliament reverts
to an earlier position on unsolicited email advertising, showing
evidence of a split in the ranks.  The European Parliament's Committee
on Citizens' Freedoms and Rights, Justice and Home Affairs has
reasserted its earlier position on email spam by voting in favour of the
Marco Cappato report on data protection. 
http://news.zdnet.co.uk/story/0,,t269-s2097850,00.html

Internet industry backs filtering system for Web sites.  The top three
Internet companies will start encouraging other firms Tuesday to adopt a
system that will allow parents to restrict access to Web sites they find
objectionable.  The companies hope the system will ward off the threat
of government regulation. 
http://www.siliconvalley.com/docs/news/tech/030845.htm
http://www.usatoday.com/life/cyber/tech/2001/10/23/net-filtering.htm
http://www.wired.com/news/business/0,1367,47798,00.html

Activists decry inaction on new Microsoft OS Consumer and privacy groups
criticized the U.S.  government on Tuesday for failing to limit certain
features on Microsoft Corp.  new Windows XP operating system that they
say compromise users' privacy.  Privacy groups, led by the Electronic
Privacy Information Center, said the Federal Trade Commission should
have taken action when they filed their first complaint this summer. 
http://www.siliconvalley.com/docs/news/reuters_wire/1590743l.htm
http://news.cnet.com/news/0-1003-200-7629414.html
http://www.newsbytes.com/news/01/171418.html

Virus writers are industrial terrorists - MS Virus writing is comparable
industrial terrorism, according to senior .Net developer evangelist
Michael Lane Thomas.  Writing about Microsoft's Strategic Technology
Protection Program, Michael Lane Thomas said that if people seek
alternatives to Microsoft's IIS because of security concerns (as Gartner
advocates) this "would only accomplish what the industrial terrorists
want".
http://www.theregister.co.uk/content/56/22423.html

Red Hat Denies Security Flaw in `Enigma' Red Hat downplayed a security
expert's report today of potential security problems with the latest
release of its popular operating system software.  The company confirmed
that two files distributed with Red Hat Linux 7.2 lack digital
signatures used for determining their authenticity. 
http://www.newsbytes.com/news/01/171431.html

Post-attack caution stanches online data flow Viisage Technology CEO Tom
Colatosti learned firsthand how tough it has become since Sept.  11 to
know what information should be disclosed to the public.  It happened
after he cut a deal with a major U.S.  airport.  It wanted the
Littleton, Mass.  based firm's face recognition equipment, which is used
by security personnel overseas and at casinos such as Las Vegas'
Stratosphere Tower, the Venetian and the Mirage. 
http://www.usatoday.com/life/cyber/tech/2001/10/23/info-lockdown.htm

Recognizing facial ID possibilities Step into a store a few years from
now, and a facial recognition camera will retrieve your dossier.  Up on
a screen pop your name and address, perhaps a list of recent purchases,
brand preferences and some credit information.  Current security worries
are generating widespread interest in facial-recognition technology for
law enforcement purposes, but it takes only a little imagination to see
the commercial potential of face-scanning cameras and related databases,
said Whitfield Diffie, a Sun Microsystems Inc.  engineer. 
http://www.fcw.com/fcw/articles/2001/1022/web-face-10-23-01.asp

Worth a Thousand Lies Digital photo editing is making it easy to create
naked pictures of models and actresses.  It's also making it easy to
change the news.  Photographs have been altered since the camera was
first invented.  Photographers have always been able to choose the
angle, the lighting, the exposure, the type and speed of film, and the
filter with which to take a picture. 
http://www.techtv.com/cybercrime/viceonline/story/0,23008,3355151,00.html
http://www.techtv.com/cybercrime/viceonline/story/0,23008,3355113,00.html


------------------------ Yahoo! Groups Sponsor ---------------------~-->
Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide!
http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:57 PST