[iwar] [NewsBits] NewsBits - 06/06/02 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2002-06-08 07:17:27


Return-Path: <sentto-279987-4787-1023545658-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sat, 08 Jun 2002 07:18:07 -0700 (PDT)
Received: (qmail 10521 invoked by uid 510); 8 Jun 2002 14:14:38 -0000
Received: from n25.grp.scd.yahoo.com (66.218.66.81) by all.net with SMTP; 8 Jun 2002 14:14:38 -0000
X-eGroups-Return: sentto-279987-4787-1023545658-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.66.97] by n25.grp.scd.yahoo.com with NNFMP; 08 Jun 2002 14:14:18 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_3_2); 8 Jun 2002 14:14:17 -0000
Received: (qmail 96216 invoked from network); 8 Jun 2002 14:14:17 -0000
Received: from unknown (66.218.66.218) by m14.grp.scd.yahoo.com with QMQP; 8 Jun 2002 14:14:17 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 8 Jun 2002 14:14:16 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g58EHR120114 for iwar@onelist.com; Sat, 8 Jun 2002 07:17:27 -0700
Message-Id: <200206081417.g58EHR120114@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sat, 8 Jun 2002 07:17:27 -0700 (PDT)
Subject: [iwar] [NewsBits] NewsBits - 06/06/02 (fwd)
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=-5.0 required=5.0 tests=NEWSBITS,DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: 

June 6, 2002

Retiree Stuck in Netter's Prison A 70-year-old man has been in jail for
more than three months for refusing to delete from his website addresses
and other personal data of employees at the retirement home that evicted
him.  The jailing of Paul Trummel, a native of England who moved to the
United States in 1985, has drawn fire from national and international
writers' groups that support his First Amendment claims. 
http://www.wired.com/news/politics/0,1283,53021,00.html
http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3414542.htm

Hacker subpoena descends into farce New York Times cracker rejoices in
DoJ 'bungle' US prosecutors last month issued a subpoena demanding that
a reporter from the US MSNBC cable TV network hand over notes on a
hacker with whom he had contact, it emerged yesterday.  The subpoena,
which ordered Bob Sullivan to hand over all contact information on
Adrian Lamo, who claimed to have broken into the computer networks of
the New York Times, has since been withdrawn. 
http://www.vnunet.com/News/1132399

Hacker group defaces naval websites 'Infidelz' follows on from the
'Deceptive Duo'.  Navy and government administrators may have been able
to breathe more easily with hacker menace the Deceptive Duo out of the
way but, following an anonymous tip-off, it looks like others may have
taken up the cause.  An email received by vnunet.com this morning told
us to check out a Navy subdomain, tracker.hroc.navy.mil, which is
apparently used to track CVs and job applications. 
http://www.vnunet.com/News/1132407

Xbox hacked with $50-worth of hardware MIT student says it was 'easy'. 
A student at the Massachusetts Institute of Technology (MIT) has managed
to hack the security on Microsoft's Xbox, theoretically allowing him to
write his own code for the machine.  But because of copyright
restrictions he will not be able to share the full worth of his
discoveries.  http://www.vnunet.com/News/1132402

FBI wants to track your Web trail From the Bill Gates e-mails unveiled
during the Microsoft trial to the Enron debacle, the digital trails
people leave have provided stunning insight into their beliefs and
habits.  Now the FBI is hoping to capture and corral more of our digital
detritus in the name of fighting terrorism. 
http://zdnet.com.com/2100-1105-933202.html
http://news.com.com/2100-1023-933183.html
http://news.zdnet.co.uk/story/0,,t269-s2111486,00.html

Government e-snoop centre set to go live Criminals will just use
stronger encryption, warns expert.  The UK government's new internet
surveillance centre will become operational this summer, but it could
make it harder rather than easier to catch paedophiles and terrorists by
encouraging them to use stronger encryption.  The National Technical
Assistance Centre (NTAC), based at MI5 headquarters, will decrypt seized
computer data and intercepted internet and email traffic on behalf of
law enforcement, security and intelligence agencies. 
http://www.vnunet.com/News/1132384

Hollywood Net horror gets sequel After being closed down in Taiwan due
to goverment pressure, a follow-on from the Movie88 site has opened in
Iran, which does not recognise foreign copyright.  A video-on-demand
site that was shut down earlier this year with the help of Hollywood has
seemingly sprouted a new head in Iran, underscoring vexing problems of
Internet copyright enforcement for movie studios. 
http://news.zdnet.co.uk/story/0,,t269-s2111428,00.html

Open Source Software May Offer Target for Terrorists, According to Study
by Alexis de Tocqueville Institution's Committee for the Common Defense
Business Editors.  Terrorists trying to hack or disrupt U.S.  computer
networks might find it easier if the federal government attempts to
switch to "open source" as some groups propose.  "Opening the Open
Source Debate", a soon to be released white paper by Alexis de
Tocqueville Institution details the complex issues surrounding open
source, particularly if federal agencies such as the Department of
Defense or the Federal Aviation Administration use software that
inherently requires that its blueprints, source code and architecture is
made widely available to any person interested - without discretion. 
http://www.businesswire.com/cgi-bin/f_headline.cgi?bw.053002/221502375

Microsoft takes a swipe at passwords Microsoft is developing new
security software it hopes will make Web services and its entire product
lineup more appealing to big companies.  The software maker will
announced plans on Thursday for technology code-named TrustBridge that
will allow businesses to authenticate user identities between companies
and applications using Web services standards.  With TrustBridge-- which
will debut next year--Microsoft is attempting to solve a common problem
faced by workers in big companies: too many user identifications and
passwords, said Adam Sohn, a product manager at Microsoft. 
http://zdnet.com.com/2100-1104-933191.html
http://www.newsfactor.com/perl/story/18107.html
http://news.com.com/2100-1001-933297.html
http://zdnet.com.com/2100-1105-933312.html

Employee Revenge There was a time when vindictive former employees
sought revenge by taking a couple of office supplies or spreading rumors
about the boss.  But in today's computerized offices, angry workers and
disgruntled employees can access computer systems and destroy data with
a click of the mouse, causing millions of dollars in damage. 
http://www.techtv.com/cybercrime/features/story/0,23008,3386967,00.html

Security through obsolescence Here's an interesting way to secure an
Internet- connected computer against intruders: Make sure the operating
system and software it runs are so old that current hacking tools won't
work on it.  This was suggested by Brian Aker, one of the programmers
who works on Linux.com, NewsForge, Slashdot, and other OSDN sites; he
runs several servers of his own that host a number of small non-profit
sites in the Seattle area.  "I have one box still running a version of
Solaris that's so old none of the script kiddies can figure it out,"
Brian says.  http://www.theregister.co.uk/content/55/25608.html

Privacy vs.  Security: A Bogus Debate? David Brin is a privacy heretic. 
He doesn't agree with those in the intelligence and law enforcement
communities who argue that Americans have to surrender freedoms to make
their lives safe.  Nor does he agree with advocates who argue that it
makes sense to protect privacy at all costs -- certainly not if it means
living with added insecurity. 
http://www.businessweek.com/technology/content/jun2002/tc2002065_6863.htm

Tightening the Internet screws In a previous column, I discussed ways to
minimize exposure from e-mail-borne viruses and spurious browsing. 
Based on the feedback I received, I now believe that most CIOs doubt
that the company derives benefits from any Internet activity that can't
be directly related to an employee's job and, therefore, be managed or
controlled.In this column, I'll discuss some of the observations and
suggestions I've received for protecting the enterprise while maximizing
employees' usage of electronic mail to and from the Internet and
Internet browsing. 
http://www.techrepublic.com/article.jhtml?id=r00520020530lan01.htm

Get a secure grip on IM by downloading our list of IM services
http://www.techrepublic.com/article.jhtml?id=r00520020326wtn01.htm
Understanding and managing new corporate privacy risks
http://www.techrepublic.com/article.jhtml?id=r00520020328ern01.htm

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Tied to your PC? Cut Loose and
Stay connected with Yahoo! Mobile
http://us.click.yahoo.com/QBCcSD/o1CEAA/Zr0HAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT