[iwar] News to Use from Infowar.Com 01-16-02 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2002-01-16 13:14:48


Return-Path: <sentto-279987-4325-1011215617-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 16 Jan 2002 13:16:08 -0800 (PST)
Received: (qmail 14500 invoked by uid 510); 16 Jan 2002 21:13:44 -0000
Received: from n11.groups.yahoo.com (216.115.96.61) by all.net with SMTP; 16 Jan 2002 21:13:44 -0000
X-eGroups-Return: sentto-279987-4325-1011215617-fc=all.net@returns.groups.yahoo.com
Received: from [216.115.97.163] by n11.groups.yahoo.com with NNFMP; 16 Jan 2002 21:13:37 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_1_3); 16 Jan 2002 21:13:36 -0000
Received: (qmail 18777 invoked from network); 16 Jan 2002 21:13:36 -0000
Received: from unknown (216.115.97.172) by m9.grp.snv.yahoo.com with QMQP; 16 Jan 2002 21:13:36 -0000
Received: from unknown (HELO red.all.net) (12.232.72.98) by mta2.grp.snv.yahoo.com with SMTP; 16 Jan 2002 21:13:35 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g0GLEma10351 for iwar@onelist.com; Wed, 16 Jan 2002 13:14:48 -0800
Message-Id: <200201162114.g0GLEma10351@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 16 Jan 2002 13:14:48 -0800 (PST)
Subject: [iwar] News to Use from Infowar.Com 01-16-02 (fwd)
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

"News to Use from Infowar.Com" is a periodic output of information
relevant to computer security, information warfare, and related genres.
If you do not wish to receive this email, please feel free to
unsubscribe. Those directions are at the bottom of this email.
Infowar.Com PROTECTS your privacy. Your email address is never sold or
leased to outside parties. You have received this email because you
have JOINED the list, or someone has forwarded this to you.

"News to" Use is sponsored by VeriSign - The Value of Trust
============================================================
Protect your servers with 128-bit SSL encryption!                                                                              Get VeriSign's FREE guide, "Securing Your Web Site for Business." You will learn everything you need to know about using SSL to 

encrypt your e-commerce transactions for serious online security.  Click here!                                                                               
http://www.verisign.com/cgi-bin/go.cgi?a=n146574080057000

1. Education Challenges Hinder Future Tech Workforce - Study 
2. Feds Hope To Unplug Cybercrime In N. Va.
3. National Library of Medicine Opens Resource site for  biological warfare
4. Systems Fail to Deliver... the digital Pearl Harbor happened 0911
5. CFP: Journal of Information Warfare, Special Edition
6. Low-Tech Humans Subvert High-Tech Information Assurance
7. CERT Report: Computer Security Vulnerabilities Double In '01
8. NIPC published its 84-page year-end wrapup of bugs, exploits, viruses, etc.
9. Congress Takes Up Cybersecurity 
10. Homeland Defense:  New Rules of War

*Book Recommendation:  Wireless Security: Models, Threats, and Solutions by Randall K.L Nichols, Panos C. Lekkas
Paperback - 657 pages 1st edition (December 13, 2001) 
McGraw-Hill Professional Publishing; ISBN: 0071380388 
Randy did it again!  A MUST to add to your library.

==================================================================
1.  Education Challenges Hinder Future Tech Workforce - Study The
nation's public schools have more computers and are wired to the
Internet as never before, yet many teachers lack the basic training
needed to integrate the technology into their lesson plans, a report
issued today found. 

http://www.infowar.com/survey/02/survey_011502a_j.shtml
================================================================
2.  Feds Hope To Unplug Cybercrime In N. Va.

The FBI and U.S.  attorney's office in Alexandria, Va.  are launching
efforts to fight cybercrime, hoping to head off potential terrorism and
prosecute criminal attacks on Northern Virginia's Internet economy.  Six
prosecutors will work full time on computer crime, including software
piracy, economic espionage, online child pornography and terrorist
efforts to disrupt the electronic systems of banks, utilities and other
institutions. 

http://www.infowar.com/law/02/law_011502c_j.shtml 
===============================================================

=======================================================================
3. National Library of Medicine Opens Resource site for  biological warfare. Nice site, check it out!
 http://www.infowar.com/resource/02/resource_011402a_j.shtml
=======================================================================

4.  Systems Fail to Deliver The digital Pearl Harbor the technology
world fears already happened Sept.  11, when information technology
failed the intelligence community, according to a CIA official. 
http://www.fcw.com/fcw/articles/2002/0107/web-inqtel-01-11-02.asp
==================================================================

5.  Call for Papers Special Edition Cyber Terrorism Journal of
Information Warfare Should be emailed to the guest editor by the 31st
May, 2002. 

http://www.infowar.com/papers/02/paper_011102a_j.shtml
======================================================================
6. Low-Tech Humans Subvert High-Tech Information Assurance- Excellent article by By Col. Alan D. Campen, USAF (Ret.)
A worthwhile read!  
http://www.us.net/signal/CurrentIssue/Jan02/low-jan.html
=======================================================================
7. CERT Report: Computer Security Vulnerabilities Double In '01

Hackers and system administrators alike were busier than ever in 2001, a
year that brought a 200 percent increase in computer security incidents
and vulnerabilities, according to statistics published Thursday.  More
than 52,000 "incidents, including Web site attacks, malicious viruses
and network intrusions, were reported in 2001, according to the Computer
Emergency Response Team (CERT), the federally funded computer security
clearinghouse at Pittsburgh's Carnegie Mellon University.  The numbers
are up from 21,756 the previous year, CERT indicates.  To put the
figures into perspective, incidents reported last year accounted for
more than half of all attacks reported since 1988, the first year CERT
began keeping records.  The report is located at:
http://www.cert.org/stats/cert_stats.html
================================================================= 8. 
NIPC published its 84-page year-end wrapup of bugs, exploits, viruses,
trojans, etc.  at a quick glance, it appears reasonably complete and
useful.  Download at:
http://www.nipc.gov/cybernotes/2001/cyberissue2001-26.pdf
================================================================ 9. 
Congress Takes Up Cybersecurity

Lawmakers are moving to beef up the nation's information security with
legislation that would provide more than $870 million over five years
for a wide range of research and education grants. 
The Cybersecurity Research and Development Act, introduced Dec. 4 by
Rep. Sherwood Boehlert, R-N.Y., and five co-sponsors, would allocate
more than $560 million to the National Science Foundation. With the
funds, the foundation would administer grants for educational programs
and basic research on computer security techniques and technologies,
including authentication, encryption, intrusion detection, reliability,
privacy and confidentiality. (snip)
http://www.newsbytes.com/news/02/173655.html
=====================================================================

10. Homeland Defense:  New Rules of War-

THE WAR AGAINST terrorism is forcing government and business to forge
new alliances.  Federal government actions since Sept.  11, including
legislation enacted by Congress and policies issued by the White House,
aim to broaden cooperation between the private sector and law
enforcement officials charged with counter-terrorism efforts.  Those
actions include new ways companies can work with government using IT to
thwart conventional attacks, and there are more to come.  Every week
brings new government proposals to get companies more involved in
homeland defense. 

http://www.cio.com/archive/011502/defense.html

News to Use Jan. 16, 2002

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Sponsored by VeriSign - The Value of Trust
Secure all your Web servers now - with a proven 5-part
strategy. The FREE Server Security Guide shows you how.
http://us.click.yahoo.com/uCuuSA/VdiDAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:03 PST