Return-Path: <sentto-279987-4847-1024493090-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 19 Jun 2002 06:26:08 -0700 (PDT) Received: (qmail 8866 invoked by uid 510); 19 Jun 2002 13:24:53 -0000 Received: from n2.grp.scd.yahoo.com (66.218.66.75) by all.net with SMTP; 19 Jun 2002 13:24:53 -0000 X-eGroups-Return: sentto-279987-4847-1024493090-fc=all.net@returns.groups.yahoo.com Received: from [66.218.66.98] by n2.grp.scd.yahoo.com with NNFMP; 19 Jun 2002 13:24:51 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_3_2); 19 Jun 2002 13:24:50 -0000 Received: (qmail 76486 invoked from network); 19 Jun 2002 13:24:50 -0000 Received: from unknown (66.218.66.216) by m15.grp.scd.yahoo.com with QMQP; 19 Jun 2002 13:24:50 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.scd.yahoo.com with SMTP; 19 Jun 2002 13:24:50 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g5JDPRB09054 for iwar@onelist.com; Wed, 19 Jun 2002 06:25:27 -0700 Message-Id: <200206191325.g5JDPRB09054@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Wed, 19 Jun 2002 06:25:27 -0700 (PDT) Subject: [iwar] [fc:Report:.LEA.Tools.for.Investigating.Cyber.Attacks:.A.National.Needs.Assessment] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=3.2 required=5.0 tests=RISK_FREE,FREE_MONEY,DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: *** Public release: Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A National Needs Assessment This email provides information on the public release of "Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A National Needs Assessment." This report has been prepared by the Institute for Security Technology Studies. As part of its counterterrorism and cyber security technology R&D mission, ISTS is committed to helping provide law enforcement with breakthrough technologies to assist in the investigation of cyber attacks. Accordingly, the goal of this needs assessment is to set forth in detail the technological impediments encountered by cyber-attack investigators, so that the research community can better understand what new technologies may be needed. Following the work of this assessment, the next step is to identify available technological solutions that address the requirements outlined in the report. If your organization has technology solutions that address the needs identified in this report, please use the submission form located on the Institute's web site. The third step will be to produce a gap analysis report identifying the critical areas where scientific research should be focused. The ultimate goal is a national agenda for research and development of law enforcement tools and technologies which scientists across the country can use as a guide for determining where to devote their research efforts. Electronic copies of this document are available at the Institute's web site <http://www.ists.dartmouth.edu. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Free $5 Love Reading Risk Free! http://us.click.yahoo.com/3PCXaC/PfREAA/Ey.GAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT