[iwar] [NewsBits] NewsBits - 11/15/01 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2001-11-16 06:03:55


Return-Path: <sentto-279987-3897-1005919387-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Fri, 16 Nov 2001 06:05:07 -0800 (PST)
Received: (qmail 24569 invoked by uid 510); 16 Nov 2001 14:01:53 -0000
Received: from n23.groups.yahoo.com (216.115.96.73) by all.net with SMTP; 16 Nov 2001 14:01:53 -0000
X-eGroups-Return: sentto-279987-3897-1005919387-fc=all.net@returns.groups.yahoo.com
Received: from [10.1.4.56] by n23.groups.yahoo.com with NNFMP; 16 Nov 2001 14:03:06 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 16 Nov 2001 14:03:07 -0000
Received: (qmail 58740 invoked from network); 16 Nov 2001 14:03:06 -0000
Received: from unknown (216.115.97.171) by m12.grp.snv.yahoo.com with QMQP; 16 Nov 2001 14:03:06 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta3.grp.snv.yahoo.com with SMTP; 16 Nov 2001 14:03:04 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fAGE3t930198 for iwar@onelist.com; Fri, 16 Nov 2001 06:03:55 -0800
Message-Id: <200111161403.fAGE3t930198@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Fri, 16 Nov 2001 06:03:55 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [NewsBits] NewsBits - 11/15/01 (fwd)
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

November 15, 2001

E-Mail Virus Slams Muslim Group Executives at the American Muslim
Council are mad as hell.  Last Friday, on the Muslim Sabbath and on the
cusp of the holy month of Ramadan, the council's e-mail list was
infected with the malicious "Snow White" virus.  The council, in a press
release, described the infection as a "criminal invasion" by "hackers"
in "a deliberate attempt to discredit and to disable e-mail
communications to our members."
http://www.wired.com/news/conflict/0,2100,48412,00.html

Top Internet weaknesses double to 20 on new list The National Institute
of Standards and Technology, working with the Sans Institute of
Bethesda, Md., has issued a new list of common Internet security
vulnerabilities that's twice the length of last year's.  The original
list of 10 came from Sans and the FBI's National Infrastructure
Protection Center. 
http://www.gcn.com/vol1_no1/daily-updates/17480-1.html

E-mail retraction tool breaking laws? A new e-mail tool that allows
Lotus Notes and Domino users to retract unread e-mails from a person's
inbox could be breaking surveillance and data protection laws within the
U.K.  The Office of the Information Commissioner has warned that the
Demailer tool, announced by IBM/Lotus on Wednesday, could conflict with
e-mail interception principles set out in the Regulation of
Investigatory Powers Act 2000 (RIPA). 
http://www.zdnet.com/zdnn/stories/newsbursts/0,7407,2825017,00.html
http://news.zdnet.co.uk/story/0,,t269-s2099331,00.html

Senate OKs Bill Containing Cyber-Security Funding The U.S.  Senate today
passed a spending bill containing funds for several cyber-security and
online crime-fighting initiatives.  The Senate voted 98-1 to approve the
$41.6 billion Commerce -Justice-State (CJS) appropriations bill, a 2002
spending package that includes funding for programs to fight
cyber-crime, child pornography, and intellectual property theft.  The
package also includes money for technology research programs. 
http://www.newsbytes.com/news/01/172189.html
http://www.newsbytes.com/news/01/172166.html

EU Parliament backs eavesdropping on Net The European Parliament voted
Tuesday to allow anti-terrorist investigators to eavesdrop on private
data on the Internet and endorsed improved police cooperation in hunting
down terrorists.  The vote was the first step in a long legislative
effort to unify and update data protection legislation in the 15-nation
European Union, including for commercial uses.  It was approved by 339
votes to 92, with 89 abstentions. 
http://www0.mercurycenter.com/premium/business/docs/worlddig14.htm

White House crafting cybersecurity plan White House cybersecurity
adviser Richard Clarke said Tuesday that the Bush administration
continues to work on a new national plan for cybersecurity, and is
planning to make it more "dynamic" with the input of high-tech CEOs.  He
said the Bush administration plan would be updated continuously to
reflect the advent of new technologies. 
http://www.govexec.com/dailyfed/1101/111501td1.htm

Companies reluctant to share cybersecurity info with feds While Richard
Clarke, the nation's chief cybersecurity adviser, is on a mission to
foster a partnership between government and the private sector to
prevent cyberattacks, Peter Tippett, the vice chairman and chief
technologist with TruSecure, is skeptical that a meaningful partnership
will develop soon.  Tippett, whose company helped the FBI track the
origins of the "Love Bug" virus in 2000, said the main obstacle to such
a relationship is the strong reluctance within the computer-security
industry to share information with the government. 
http://www.govexec.com/dailyfed/1101/111201td1.htm

Experts: Insiders Biggest Cyberterror Threat Although the terrorist
attacks of Sept.  11 have compelled businesses to better protect their
physical assets, a greater effort is still needed to shore up electronic
defenses beyond the entry points into corporate networks, according to
security managers and experts. 
http://www.internetweek.com/story/INW20011113S0007

U.S.  Official Says Govt Should Stay Out Of Internet Five years ago, the
United States government assumed disruption of the country's
communications infrastructure was beyond the capability of terrorists. 
The Sept.  11 attacks changed that, according to an official who works
in the nation's Critical Infrastructure Assurance Office (CIAO).  John
Tritak delivered the opening keynote address on the third day of the
annual meeting of the Internet Corporation for Assigned Names and
Numbers (ICANN) here.  http://www.newsbytes.com/news/01/172168.html

ICANN ponders DNS hack defence role The international body that oversees
the Internet's naming system struggled this week to find a role in the
war against terrorism by putting one of the Net's weakest links under a
microscope.  In the wake of the September 11 terrorist attacks the
Internet Corporation for Assigned Names and Numbers (ICANN) swept aside
most of its scheduled agenda to explore its options in shoring up the
security of the Internet's domain name system (DNS), the infrastructure
that invisibly translates domain names like www.securityfocus.com to
Internet IP addresses like 66.38.151.125. 
http://www.theregister.co.uk/content/6/22851.html

The FBI Spins Its Terrorism Web A Little-known Office Snares Thousands
of Potential Leads on the Internet.  Seconds after United Airlines
Flight 175 crashed into the second World Trade Center tower the morning
of Sept.  11, Timothy Healy raced 90 miles an hour down Interstate 79
towards his office.  He scanned channels on the car radio, searching for
news while beating back despair.  He called to check on his wife and six
children, then considered whether to send his staff home to their
families when he got to work. 
http://www.washingtonpost.com/wp-dyn/articles/A31607-2001Nov14.html

State CIOs to map info sharing Facing a rise in hacking and the fear of
more terrorist attacks, state chief information officers from across the
nation recently discussed how they can better share information, funnel
resources, and upgrade and protect their critical infrastructures
collectively. 
http://www.fcw.com/geb/articles/2001/1112/web-nascio-11-15-01.asp

Comdex: Virus numbers dwindle, but impact increases Although the overall
number of viruses being detected each month is falling, the severity of
the viruses that are being written is increasing, with this year's Code
Red and Nimda worms as perfect examples of this trend, according to
Vincent Gullotto, the senior director of McAfee Avert Labs, who spoke
here at Comdex Wednesday. 
http://www.infoworld.com/articles/hn/xml/01/11/14/011114hnvirusimpact.xml

FBI stands by fingerprinting Technology has produced cameras that can
recognize faces, scanners that identify individuals by their irises and
sensors that tie identity to the geometry of hands, but the FBI still
prefers the humble fingerprint. 
http://www.fcw.com/fcw/articles/2001/1112/web-fbi-11-15-01.asp

Pentagon Tests New Biometric Mouse
http://www.fcw.com/fcw/articles/2001/1112/web-mouse-11-15-01.asp Feds
Praise Law Enforcement Value Of Biometrics
http://www.newsbytes.com/news/01/172164.html

Face Recognition Lands in California Fresno, California, airport tests
system comparing faces of passengers to database of criminals. 
Passengers passing through the metal detectors at Fresno Yosemite
International Airport are making an additional stop these days to have
their picture taken, but not as a vacation memento. 
http://www.techtv.com/news/culture/story/0,24195,3360832,00.html

Technology offers a feeling of security As Americans search for a
renewed sense of security, some solutions being offered involve
technologies and devices that seem straight out of a science-fiction
novel =97 and to some may seem as disturbing as a strip search. 
http://www.usatoday.com/life/cyber/tech/2001/11/15/privacy-usat.htm

DES Final Death Knell? It's already on its way out, but last week's CCA
hack might be the last straw for the encryption standard.  Any company
still securing its systems with single Data Encryption Standard (DES)
encryption may want to rethink its security posture.  Last week,
Cambridge computing students Michael Bond and Richard Clayton devised a
hack that revealed weaknesses in the Common Cryptographic Architecture
API, used by an IBM 4758. 
http://www.informationweek.com/story/IWK20011114S0006

Justice Scalia is no fan of national ID card proposal.  Supreme Court
Justice Antonin Scalia said that if Americans were asked to vote on
creating a national identification card, he would probably cast his
ballot against the idea.  Scalia offered remarks after a speech at the
University of Missouri on Wednesday, expressing skepticism about an ID
card and humorously brushing aside a question about whether anthrax
jitters had reached the high court after spores were found in its
mailroom.  http://www.siliconvalley.com/docs/news/tech/082098.htm
http://www.wired.com/news/politics/0,1283,48419,00.html


------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:59 PST