Return-Path: <sentto-279987-4865-1024672320-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Fri, 21 Jun 2002 08:15:08 -0700 (PDT) Received: (qmail 11670 invoked by uid 510); 21 Jun 2002 15:12:00 -0000 Received: from n21.grp.scd.yahoo.com (66.218.66.77) by all.net with SMTP; 21 Jun 2002 15:12:00 -0000 X-eGroups-Return: sentto-279987-4865-1024672320-fc=all.net@returns.groups.yahoo.com Received: from [66.218.67.201] by n21.grp.scd.yahoo.com with NNFMP; 21 Jun 2002 15:12:01 -0000 X-Sender: jacobson@mitre.org X-Apparently-To: iwar@yahoogroups.com Received: (EGP: mail-8_0_3_2); 21 Jun 2002 15:11:59 -0000 Received: (qmail 6197 invoked from network); 21 Jun 2002 15:11:59 -0000 Received: from unknown (66.218.66.216) by m9.grp.scd.yahoo.com with QMQP; 21 Jun 2002 15:11:59 -0000 Received: from unknown (HELO smtpproxy2.mitre.org) (192.80.55.70) by mta1.grp.scd.yahoo.com with SMTP; 21 Jun 2002 15:12:00 -0000 Received: from avsrv2.mitre.org (avsrv2.mitre.org [128.29.154.4]) by smtpproxy2.mitre.org (8.11.3/8.11.3) with ESMTP id g5LFBxl27058 for <iwar@yahoogroups.com>; Fri, 21 Jun 2002 11:11:59 -0400 (EDT) Received: from MAILHUB2 (mailhub2.mitre.org [129.83.221.18]) by smtpsrv2.mitre.org (8.11.3/8.11.3) with ESMTP id g5LFBwO05595 for <iwar@yahoogroups.com>; Fri, 21 Jun 2002 11:11:58 -0400 (EDT) Received: from dezinformacija.mitre.org (128.29.163.24) by mailhub2.mitre.org with SMTP id 10615975; Fri, 21 Jun 2002 11:11:55 -0400 Message-ID: <3D134240.7020102@mitre.org> Organization: The MITRE Corporation User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X; en-US; rv:1.0.0) Gecko/20020529 X-Accept-Language: en,ru,de,fr,bg,pl,pdf To: iwar <iwar@yahoogroups.com> From: "L.C.J. Jacobson" <jacobson@mitre.org> X-Yahoo-Profile: lcj_jcbsn Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Fri, 21 Jun 2002 11:12:00 -0400 Subject: [iwar] [NewsBits] NewsBits - 06/19/02 (fwd) Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=-1.2 required=5.0 tests=NEWSBITS,TO_LOCALPART_EQ_REAL,RISK_FREE,FREE_MONEY version=2.20 X-Spam-Level: -------- Original Message -------- Subject: [iwar] [NewsBits] NewsBits - 06/19/02 (fwd) Date: Thu, 20 Jun 2002 20:50:15 -0700 (PDT) From: Fred Cohen <fc@all.net> June 19, 2002 Seattle man faces jail over complaint Web site Soon after moving into a retirement home, Paul Trummel began complaining that his neighbors fell asleep with their TVs blaring or flushed their toilets during quiet hours. Then he really turned up the heat by starting a Web site accusing tenants and staff members of housing-law violations and conspiracies. The Web site landed him in jail for 3 months and made the 68-year-old an unlikely hero to free-speech advocates in a positively bizarre First Amendment case. http://www.nandotimes.com/technology/story/439858p-3520588c.html Pro-Islamic hackers join forces Tensions in Kashmir are mirrored on internet. There is mounting evidence that individual hacker groups connected by a pro-Islamic agenda are working together to carry out hack attacks, say experts. Security firm mi2g says an alliance of anti-Israel, anti-US and anti-India groups are increasingly highlighting issues such as the Middle East conflict, the war on terrorism and the Kashmir stand-off as part of their destructive digital attacks. http://news.bbc.co.uk/hi/english/sci/tech/newsid_2052000/2052320.stm U.S. Denies Data Retention Plans The Justice Department refutes claims that Internet service providers could be forced to spy on their customers as part of the U.S. strategy for securing cyberspace. An early draft of the White House's National Strategy to Secure Cyberspace envisions the same kind of mandatory customer data collection and retention by U.S. Internet service providers as was recently enacted in Europe, according to sources who have reviewed portions of the plan. http://online.securityfocus.com/news/489 Bush cybersecurity strategy to be a living document Howard Schmidt, vice chairman of the president's Critical Infrastructure Protection Board, attended the fourth and final White House- sponsored "town hall meeting" on cybersecurity last night in Atlanta before the release in September of the next version of the National Strategy to Secure Cyberspace. http://www.computerworld.com/securitytopics/security/story/0,10801,72108,00.html Panelists warn of risks involved with logging on to the Internet At a town hall meeting on cybersecurity, experts warned that the risks of going online have become especially prevalent as hackers find new ways to poke holes in Internet security systems. Tom Noonan, chief executive officer for Internet Security Systems, told the gathering Tuesday that logging onto the Internet is like entering a dangerous neighborhood. Risks include identity fraud and intellectual property and credit card theft. http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3501396.htm http://www.cnn.com/2002/TECH/industry/06/19/cyber.security.meeting.ap/index.html http://www.usatoday.com/life/cyber/tech/2002/06/19/cybersecurity.htm http://www.nandotimes.com/technology/story/439169p-3516401c.html A Global Audience, a World of Worries? Australian Court's Ruling in Libel Case Could Have a Chilling Effect on Web Publications. Web publishers around the world are awaiting a decision in a libel case before Australia's highest court that could determine whether they will be required to adhere to widely differing foreign standards when stories are posted on the Internet. http://www.washingtonpost.com/wp-dyn/articles/A5695-2002Jun18.html Microsoft's Global Insecurity Complex Linux and other open-source security programs are quickly gaining ground on Microsoft's products. Can Redmond turn it around? Historians tracing the tectonic movements of Microsoft (MSFT) have at their disposal a nifty shortcut: the company's habit of outlining its future through memos. http://www.business2.com/articles/web/0,1653,41447,FF.html Report: Viruses spreading on the double The first half of 2002 has seen worms infect PCs at twice the rate they did last year, says security company MessageLabs. And they're more malicious too. Computer viruses are proliferating faster than ever, according to British security company MessageLabs, which reported Tuesday that it caught as many pests in the first half of 2002 as it did in all of last year. http://news.zdnet.co.uk/story/0,,t269-s2112071,00.html Israel a global pacesetter in high-tech security Prospects also good for biotechnology, life sciences When Israel orbited its Ofeq 5 spy satellite late last month, the payload's origin was no surprise to people familiar with the nation's technology scene. For Elop Electro-Optics Industries, the company that designed and made the sophisticated but lightweight camera, it was business as usual. http://www.siliconvalley.com/mld/siliconvalley/3497022.htm The Internet Gets Serious Maybe the Internet thrill isn't gone, but is that it over there pulling on its jacket and heading for the door? The Net promised to let consumers read everything, hear everything, play anything. Any David with a computer could elbow aside the most gargantuan Goliath. No matter the question, the answer was yes, sure, it's possible, do it. Today, the Internet is messy, dangerous ground. Viruses and system break-ins are on the rise, while vested interests battle over what isn't allowed. http://online.securityfocus.com/news/488 Hacking's not just for geeks Blended security threats are increasing, meaning that chief information officers have more to worry about than just hackers. As the term hacking has broadened to encompass a wider group of people, chief information officers will see more and more blended security threats within the next couple of years, according to one security researcher. http://news.zdnet.co.uk/story/0,,t269-s2112082,00.html Information Technology and the War on Terrorism Join computer security, privacy and surveillance expert Stewart Baker of the law firm Steptoe & Johnson to find out how the government and the private sector are using the Internet to fight terrorism, and how they prevent the Internet from being used as a weapon against themselves. http://discuss.washingtonpost.com/wp-srv/zforum/02/technews_baker_061902.htm Lech Walesa: Tech Freedom Fighter When former Polish president Lech Walesa pops into a chat room to discuss politics, people have a hard time believing they're debating issues with the man largely credited for the downfall of communism in Eastern Europe. In a telephone conversation from his home in Gdansk, the former shipyard electrician turned Nobel Peace Prize winner spoke about government attempts to stifle technology or to use it to spy on personal communication. http://www.wired.com/news/politics/0,1283,53299,00.html ------------------------ Yahoo! Groups Sponsor ---------------------~--> Free $5 Love Reading Risk Free! http://us.click.yahoo.com/3PCXaC/PfREAA/Ey.GAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT