Return-Path: <sentto-279987-3363-1003927483-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 24 Oct 2001 05:46:07 -0700 (PDT) Received: (qmail 4138 invoked by uid 510); 24 Oct 2001 12:44:10 -0000 Received: from n7.groups.yahoo.com (216.115.96.57) by 204.181.12.215 with SMTP; 24 Oct 2001 12:44:10 -0000 X-eGroups-Return: sentto-279987-3363-1003927483-fc=all.net@returns.onelist.com Received: from [10.1.4.54] by n7.groups.yahoo.com with NNFMP; 24 Oct 2001 12:44:43 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 24 Oct 2001 12:44:41 -0000 Received: (qmail 19979 invoked from network); 24 Oct 2001 12:44:41 -0000 Received: from unknown (10.1.10.142) by l8.egroups.com with QMQP; 24 Oct 2001 12:44:41 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta3 with SMTP; 24 Oct 2001 12:44:41 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id f9OCj7h06418 for iwar@onelist.com; Wed, 24 Oct 2001 05:45:07 -0700 Message-Id: <200110241245.f9OCj7h06418@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Wed, 24 Oct 2001 05:45:06 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [NewsBits] NewsBits - 10/23/01 (fwd) Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit October 23, 2001 Further security guidance given The Office of Management and Budget last week released additional guidance on how agencies must comply with a new law that pulls all of the federal information security mandates together and calls for reports that the administration and Congress will review. Under the Government Information Security Reform Act of 2000, agencies must undergo annual self-assessments and independent assessments of their security practices and policies. Agencies sent OMB the first set of reports on the results in September. http://www.fcw.com/fcw/articles/2001/1022/web-gisra-10-23-01.asp E-gov initiatives ready to roll The Bush administration's big push toward e-government is ready to be released, but the initiatives cannot succeed unless agencies overcome their resistance to sharing information and resources with others across federal, state and local governments, officials said Oct. 23. http://www.fcw.com/fcw/articles/2001/1022/web-egov-10-23-01.asp Agencies urged to share intelligence data http://www.govexec.com/dailyfed/1001/102301kp1.htm Beyond Carnivore: FBI Eyes Packet Taps Expect the FBI to expand its Internet wiretapping program, says a source familiar with the plan. Stewart Baker, a partner with law firm Steptoe & Johnson, is a former general counsel to the National Security Agency. He says the FBI has spent the last two years developing a new surveillance architecture that would concentrate Internet traffic in several key locations where all packets, not just e-mail, could be wiretapped. http://www.interactiveweek.com/article/0,3658,s=605&a=16678,00.asp Air security may require IT overhaul The U.S. Department of Transportation is considering recommendations that could impact performance of the industry's aging mainframe systems and require a costly overhaul. Some of the DOT's recommendations call for the airlines' IT systems to perform event based functions, like red-flagging a suspected terrorist's name in a reservation system. http://www.cnn.com/2001/TECH/industry/10/23/airport.security.idg/index.html Techs broadside anti-piracy plan Technology industry heavyweights are trying to kill a Hollywood-backed plan heading for Congress that would require anti-piracy protections in PCs, CD players and other consumer electronics devices. After weeks of conference calls and quiet rallying of the troops, technology companies including Intel, IBM, Microsoft and Compaq Computer held a coming-out press conference Monday to oppose a broad copyright protection proposal being backed by Walt Disney and Sen. Ernest Hollings, D-S.C. http://www.zdnet.com/zdnn/stories/news/0,4586,5098618,00.html EFF Lobbies Against New Zealand Copyright Law http://www.newsbytes.com/news/01/171435.html Spam Explosion in Anthrax Wake Hundreds of unused bulk-mail pitches sit in a box under Joanne Urbanik's desk at Ultimate Software. The anthrax scare forced the Weston, Fla., company that specializes in payroll and personnel programs to cancel a long-planned marketing campaign. Urbanik, the company's marketing director, is now looking to salvage fourth-quarter sales by reviving the campaign on the Internet. http://www.wired.com/news/business/0,1367,47796,00.html Europe moves in circles over spam laws The European Parliament reverts to an earlier position on unsolicited email advertising, showing evidence of a split in the ranks. The European Parliament's Committee on Citizens' Freedoms and Rights, Justice and Home Affairs has reasserted its earlier position on email spam by voting in favour of the Marco Cappato report on data protection. http://news.zdnet.co.uk/story/0,,t269-s2097850,00.html Internet industry backs filtering system for Web sites. The top three Internet companies will start encouraging other firms Tuesday to adopt a system that will allow parents to restrict access to Web sites they find objectionable. The companies hope the system will ward off the threat of government regulation. http://www.siliconvalley.com/docs/news/tech/030845.htm http://www.usatoday.com/life/cyber/tech/2001/10/23/net-filtering.htm http://www.wired.com/news/business/0,1367,47798,00.html Activists decry inaction on new Microsoft OS Consumer and privacy groups criticized the U.S. government on Tuesday for failing to limit certain features on Microsoft Corp. new Windows XP operating system that they say compromise users' privacy. Privacy groups, led by the Electronic Privacy Information Center, said the Federal Trade Commission should have taken action when they filed their first complaint this summer. http://www.siliconvalley.com/docs/news/reuters_wire/1590743l.htm http://news.cnet.com/news/0-1003-200-7629414.html http://www.newsbytes.com/news/01/171418.html Virus writers are industrial terrorists - MS Virus writing is comparable industrial terrorism, according to senior .Net developer evangelist Michael Lane Thomas. Writing about Microsoft's Strategic Technology Protection Program, Michael Lane Thomas said that if people seek alternatives to Microsoft's IIS because of security concerns (as Gartner advocates) this "would only accomplish what the industrial terrorists want". http://www.theregister.co.uk/content/56/22423.html Red Hat Denies Security Flaw in `Enigma' Red Hat downplayed a security expert's report today of potential security problems with the latest release of its popular operating system software. The company confirmed that two files distributed with Red Hat Linux 7.2 lack digital signatures used for determining their authenticity. http://www.newsbytes.com/news/01/171431.html Post-attack caution stanches online data flow Viisage Technology CEO Tom Colatosti learned firsthand how tough it has become since Sept. 11 to know what information should be disclosed to the public. It happened after he cut a deal with a major U.S. airport. It wanted the Littleton, Mass. based firm's face recognition equipment, which is used by security personnel overseas and at casinos such as Las Vegas' Stratosphere Tower, the Venetian and the Mirage. http://www.usatoday.com/life/cyber/tech/2001/10/23/info-lockdown.htm Recognizing facial ID possibilities Step into a store a few years from now, and a facial recognition camera will retrieve your dossier. Up on a screen pop your name and address, perhaps a list of recent purchases, brand preferences and some credit information. Current security worries are generating widespread interest in facial-recognition technology for law enforcement purposes, but it takes only a little imagination to see the commercial potential of face-scanning cameras and related databases, said Whitfield Diffie, a Sun Microsystems Inc. engineer. http://www.fcw.com/fcw/articles/2001/1022/web-face-10-23-01.asp Worth a Thousand Lies Digital photo editing is making it easy to create naked pictures of models and actresses. It's also making it easy to change the news. Photographs have been altered since the camera was first invented. Photographers have always been able to choose the angle, the lighting, the exposure, the type and speed of film, and the filter with which to take a picture. http://www.techtv.com/cybercrime/viceonline/story/0,23008,3355151,00.html http://www.techtv.com/cybercrime/viceonline/story/0,23008,3355113,00.html ------------------------ Yahoo! Groups Sponsor ---------------------~--> Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide! http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:57 PST