_________________________________________________________________

                      London, Tuesday, April 09, 2002
    _________________________________________________________________

                                INFOCON News
    _________________________________________________________________

                            IWS - The Information Warfare Site
                                    http://www.iwar.org.uk

    _________________________________________________________________

                               IWS Sponsor

                  National Center for Manufacturing Sciences
                              http://www.ncms.org
                                 host of the
                 InfraGard Manufacturing Industry Association
                              http://trust.ncms.org
    _________________________________________________________________


          ----------------------------------------------------
                              [News Index]
          ----------------------------------------------------

[1] Nuclear lab balances security and worker productivity
[2] FBI's new Cyber Division quietly ramps up
[3] Does your password let you down?
[4] New Win-NT, 2K, XP security holes
[5] ISS ranks Net vulnerabilities

[6] FBI valued career advancement over security, report says
[7] My Daily Virus
[8] Wired News: iPod Is A Hacker's Heaven
[9] Cracks in the Firewall
[10] Clinton backs tech war on terror

[11] (UK) Code of conduct for private data
[12] Microsoft Tries to Discredit Antitrust Testimony From SBC
[13] Dot-Com Job Cuts Rise In March
[14] On a Wing and a Prayer
[15] Check Point brings out budget VPN

[16] GAO urges government to adopt XML programming language
[17] Four arrested in plan to expose lax security at Camp Pendleton

    _________________________________________________________________

                                News
    _________________________________________________________________


[1] Nuclear lab balances security and worker productivity
By Molly M. Peterson, National Journal's Technology Daily

NEWPORT, R.I.-- Organizations can better protect their critical systems from
cyberattack without hindering worker productivity, an information security
official from Los Alamos National Laboratory said Thursday.

"Our goal is to make it easy and natural for employees to work securely,"
Chris Kemper, deputy director of Los Alamos' Computing, Communications and
Networks division, told technology specialists from the public and private
sectors during a conference sponsored by the National High Performance
Computing & Communications Council. "We're trying to avoid the trap of
having security overwhelm productivity."

Prompted in part by 1999 allegations that classified data was mishandled,
Los Alamos officials have spent the past three years upgrading security at
the 43-square mile site, which houses 15 nuclear facilities and employs
12,000 people.

http://www.govexec.com/dailyfed/0402/040502td2.htm

         ----------------------------------------------------

[2] FBI's new Cyber Division quietly ramps up
By Liza Porteus, National Journal's Technology Daily

To the surprise of many people in government and in the technology industry,
the FBI has been quietly forming its new Cyber Division.

The first formal announcement of the division indirectly was made Tuesday,
when FBI Director Robert Mueller announced the appointment of Larry Mefford
as assistant director of the division. Mefford is associate special agent in
charge of the San Francisco FBI field office.

The goal of the Cyber Division is to coordinate the various online
disciplines within the FBI and to investigate federal violations where there
are exploitations of computer systems, the Internet or networks. The move is
part of the FBI's recent overhaul efforts.

An FBI spokeswoman described the new division as "a work in progress," and
many members of the high-technology industry said they were unaware that the
division was solidifying.

A Justice Department spokeswoman said that DOJ's Computer Crimes and
Intellectual Property section has talked with Mefford in the past, but that
it is unclear on how the divisions will interact. "They anticipate sitting
down and working together," she said.

http://www.govexec.com/dailyfed/0402/040802td1.htm

         ----------------------------------------------------

[3] Does your password let you down?
April 8, 2002 Posted: 3:51 PM EDT (1951 GMT)

LONDON, England -- They may be random and private, but a lack of originality
by employees when choosing computer passwords is putting companies' secrets
at risk.

According to a study, employees fail abysmally when it comes to securing
confidential information.

In a survey carried out by an international online security company, 60
percent of employees knew little of security awareness, while 90 percent
admitting to opening or executing a "dangerous" e-mail attachment.

http://www.cnn.com/2002/TECH/internet/04/08/passwords.survey/index.html

         ----------------------------------------------------

[4] New Win-NT, 2K, XP security holes
By Thomas C Greene in Washington
Posted: 08/04/2002 at 08:51 GMT

First up, the MUP (Multiple UNC Provider) in Windows NT, 2K and XP contains
an unchecked buffer which can be exploited to escalate user privileges,
making it possible for an attacker to run arbitrary code at the OS level.

http://www.theregister.co.uk/content/55/24743.html

         ----------------------------------------------------

[5] ISS ranks Net vulnerabilities
By ComputerWire
Posted: 08/04/2002 at 07:37 GMT

Advanced worms, or so-called hybrid and blended threats like Nimda and Code
Red, continue to pose the greatest online risk according to investigations
carried out by Internet Security Systems Inc, but the company rates multiple
vulnerabilities uncovered in the SNMP v.1 Simple Network Management Protocol
"the largest multi-vendor security flaw ever discovered to date."

http://www.theregister.co.uk/content/55/24738.html

         ----------------------------------------------------

[6] FBI valued career advancement over security, report says
By Kellie Lunney

FBI management has fostered a culture in which agents view internal security
measures as bureaucratic and security investigation duties as a threat to
career advancement, a special commission set up in the wake of the Robert
Hanssen spying case said Friday.

Attorney General John Ashcroft created the commission to review the FBI's
security programs shortly after authorities arrested FBI agent Robert
Hanssen in February 2001 on espionage charges. William Webster, a former
director of the CIA and FBI, chaired the commission and will testify on its
findings before the Senate Judiciary Committee Tuesday.

"In the bureau, security is often viewed as an impediment to operations, and
security responsibilities are seen as an impediment to career advancement,"
the Webster Commission's 107-page report on the FBI's security programs
said. That attitude, and the agency's "pervasive inattention to security"
made it easy for veteran FBI agent and now convicted spy Hanssen to sell
secrets to Moscow for two decades, according to the report.

http://www.govexec.com/dailyfed/0402/040502m1.htm

         ----------------------------------------------------

[7] My Daily Virus
Why continue to run a "WildList" cataloging every virus in the world when
they all show up in our inboxes anyway?
By George Smith
Apr 8 2002 12:26AM PT

"I regarded viruses as only good for entertainment," said Guido Sanchez
about ten years ago. Sanchez ran Nun Beaters Anonymous, an underground
bulletin board system notable for its free viruses and dry wit, the latter a
scarce commodity in the world of hacker outlawry.

For the record, he also said: "I have nothing against nuns, nuns are great
people. I love nuns!"

However, nuns notwithstanding and with regard to viruses, Sanchez's words
are still right on. If you're going to hang around in the business for any
length of time, it helps to develop a sense of humor towards everything.

http://online.securityfocus.com/columnists/73

         ----------------------------------------------------

[8] Wired News: iPod Is A Hacker's Heaven
by Vern Seward

What's the hottest thing to hack these days? According to a Wired News
article titled IPod [sic]: Music to Hackers' Ears, the iPod gets the nod
from the hacking world. It seems that many coders like the iPod and want it
to do more than play music and list phone numbers. From the article:

http://www.macobserver.com/article/2002/04/08.5.shtml

         ----------------------------------------------------

[9] Cracks in the Firewall
Thanks to sophisticated new attack methods, computer security has to go
beyond the old standby of merely keeping intruders out

Is your firewall toast? A new report by Web security giant Internet Security
Systems (ISSX ) suggests it certainly could use a few upgrades and some
additional help.

The company combed through data collected from the logs of thousands of
security devices it monitors for businesses ranging from mom-and-pops to
multibillion-dollar global conglomerates. The conclusion: Perimeter defenses
such as firewalls are not enough to ward off increasingly sophisticated
worms and viruses.

http://www.businessweek.com/bwdaily/dnflash/apr2002/nf2002049_1803.htm

         ----------------------------------------------------

[10] Clinton backs tech war on terror

Clinton: Use of technology for defensive purposes

Bill Clinton has been outlining how technology can play a key role in
defeating the new brand of terrorism.
The former US president said that information management systems similar to
those used by the big mass mailing companies could provide an early warning
about suspicious behaviour.

"More than 95% of the people that are in the United States at any given time
are in the computers of companies that mail junk mail and you can look for
patterns there," he told BBC World's ClickOnline.

http://news.bbc.co.uk/hi/english/sci/tech/newsid_1912000/1912895.stm

         ----------------------------------------------------

[11] Code of conduct for private data

Alan Masson

THE long awaited first part of the Information Commissioner's Data
Protection Code has now been issued dealing specifically with recruitment
and selection. It is intended to help employers comply with the requirements
of the Data Protection Act and covers areas such as obtaining information
about workers, the retention of their records, access to their records and
their disclosure.

The act and the code deal with the handling of personal and sensitive data
regarding workers - including job applicants (regardless of whether or not
they are successful), employees, agency workers, casual workers and both
current and former contractual workers.

http://www.thescotsman.co.uk/business.cfm?id=376472002

         ----------------------------------------------------

[12] Microsoft Tries to Discredit Antitrust Testimony From SBC
By BLOOMBERG NEWS

ASHINGTON, April 8 (Bloomberg News) - The Microsoft Corporation (news/quote)
suggested in court today that SBC Communications (news/quote) was seeking
tough antitrust restrictions against it to cripple its ability to compete in
the telecommunications market.

http://www.nytimes.com/2002/04/09/technology/09SOFT.html?ex=1019016000&en=4d
89255e8fddf44a&ei=5040&partner=MOREOVER

         ----------------------------------------------------

[13] Dot-Com Job Cuts Rise In March

by Michael Bartlett

The number of dot-com job cuts jumped up in March after declining for four
straight months, according to the outplacement firm Challenger, Gray &
Christmas.

The Challenger firm, which releases monthly statistics on layoffs by
Internet companies, said the March total of 1,549 was up 131 percent from
the 670 job cuts it tallied in February.

http://www.bizreport.com/article.php?art_id=3221&PHPSESSID=e23848eb8dfe02d84
3649d54105c8406

         ----------------------------------------------------

[14] On a Wing and a Prayer

Travelers are turning to the Web to book trips. How can you protect yourself
when planning your dream vacation online? Hear online travel horror stories
and get tips Tuesday, 4/9 at 9 p.m. Eastern.

By Jack Karp
April 9, 2002

As travel websites proliferate on the Web, often promising lower airfares
and special deals, more consumers are turning to the Internet to make their
travel plans. But many of these consumers, including college student Monet
Solberg, don't wind up getting their dream vacations. This week on
'CyberCrime' we show you a vacation booked online, that didn't turn out as
planned.

http://www.techtv.com/cybercrime/internetfraud/story/0,23008,3324488,00.html

         ----------------------------------------------------

[15] Check Point brings out budget VPN
By ComputerWire
Posted: 09/04/2002 at 05:41 GMT

Check Point Software Technologies Ltd is targeting network administrators
with cheap-n-cheerful virtual private network software, VPN-1 Net, released
this week. The company has also rebranded its VPN-1 Gateway product as VPN-1
Pro, to reflect the feature differences of its product line.

http://www.theregister.co.uk/content/5/24764.html

         ----------------------------------------------------

[16] GAO urges government to adopt XML programming language
>From National Journal's Technology Daily

The General Accounting Office on Friday recommended that the director of the
Office of Management and Budget, in concert with the Federal CIO Council and
National Institute for Standards and Technology, take steps to expedite the
federal government's adoption of Extensible Markup Language (XML).

XML is a flexible, nonproprietary set of standards designed to facilitate
the exchange of information between disparate computer systems.

Requested by Sen. Joseph Lieberman, D-Conn., the report, "Electronic
Government: Challenges to Effective Adoption of the Extensible Markup
Language," (GAO-02-327) assessed the overall development of XML standards to
determine if they are ready for government-wide use.

http://www.govexec.com/dailyfed/0402/040502td1.htm

         ----------------------------------------------------

[17] Four arrested in plan to expose lax security at Camp Pendleton

By Pauline Repard
UNION-TRIBUNE STAFF WRITER

April 6, 2002

Four men who used expired military IDs to trespass into Camp Pendleton were
arrested after a late-night food fight Wednesday that destroyed more than
400 pounds of food.

They claimed they were trying to show how lax security is at the base and
planned to give the media a videotape of their exploits, said FBI
spokeswoman Jan Caldwell.

http://www.uniontribune.com/news/military/20020406-9999_1m6marine.html

         ----------------------------------------------------



_____________________________________________________________________

The source material may be copyrighted and all rights are
retained by the original author/publisher.

Copyright 2002, IWS - The Information Warfare Site
_____________________________________________________________________

Wanja Eric Naef
Webmaster & Principal Researcher
IWS - The Information Warfare Site
<http://www.iwar.org.uk>

---------------------------------------------------------------------

To subscribe - send an email to "[EMAIL PROTECTED]" with "subscribe
infocon" in the body

To unsubscribe - send an email to "[EMAIL PROTECTED]" with "unsubscribe
infocon" in the body

---------------------------------------------------------------------




IWS INFOCON Mailing List
@ IWS - The Information Warfare Site
http://www.iwar.org.uk


Reply via email to