_________________________________________________________________

                      London, Friday, June 14, 2002
    _________________________________________________________________

                                INFOCON News
    _________________________________________________________________

                            IWS - The Information Warfare Site
                                    http://www.iwar.org.uk

    _________________________________________________________________

                               IWS Sponsor

                  National Center for Manufacturing Sciences
                              http://www.ncms.org
                                 host of the
                 InfraGard Manufacturing Industry Association
                              http://trust.ncms.org
    _________________________________________________________________


          ----------------------------------------------------
                              [News Index]
          ----------------------------------------------------

Homeland Security

[1] Merging cultures of homeland security agencies will be big challenge
[2] House leaders agree on plan for homeland security process
[3] Homeland department likely to house cybersecurity office
[4] Senate in a hurry on homeland security bill
[5] Ridge meets with House members on homeland security proposal

Infocon

[6] Feds, industry battle the biggest network bug
[7] Developing an Effective Incident Cost Analysis Mechanism
[8] Assessing Internet Security Risk, Part One: What is Risk Assessment?
[9] First JPEG virus not a threat
[10] Biometrics, Surveillance, National ID Threats to Privacy

[11] Anti-open source 'whitepaper' devastated
[12] Jail time is not the answer to cybercrime
[13] Australian directors alerted to cybercrime threats
[14] UK businesses are failing to work online
[15] U.S. turns screw on ICANN

[16] Woman faces charges in hacking case
[17] VA urged to improve management of technology

    _________________________________________________________________

                                News
    _________________________________________________________________


[1] Merging cultures of homeland security agencies will be big challenge
By Louis Jacobson, National Journal

Creating a unified "corporate culture" is sure to be one of the toughest challenges 
facing a new
Department of Homeland Security, which will be cobbled together from 22 different 
federal entities,
each with their own historical role and professional expertise.

On the upside, the new department will have an important prerequisite for a 
establishing a strong
corporate culture-the clear and unassailable mission of preventing terrorist attacks 
on U.S. soil.
On the downside, it won't have the luxury of time to assimilate the cultures of its 
agencies.

Based on the experience of private sector mergers, "the new department will face 
enormous problems,"
says Ralph Biggadike, a professor of management at Columbia University. "To think that 
a structural
solution can bring about a major improvement in performance is a major mistake. Fixing 
the structure
alone isn't enough to get at the culture."

http://www.govexec.com/dailyfed/0602/061302lj1.htm

         ----------------------------------------------------

[2] House leaders agree on plan for homeland security process
By Charlie Mitchell and Mark Wegner, CongressDaily

Republican and Democratic leaders have agreed on a bipartisan plan to move President 
Bush's proposal
to create a new Homeland Security Department through the House on an expedited basis, 
Speaker Dennis
Hastert, R-Ill., and Minority Leader Dick Gephardt, D-Mo., announced Thursday.

Under the plan, the Government Reform Committee and other panels with jurisdiction 
over homeland
security issues will get first crack at the proposal, while a special, 
leadership-appointed "ad hoc
select" panel-expected to be led by Majority Leader Dick Armey, R-Texas,-will meld the 
committees'
handiwork into a single package.

Sources said the Government Reform Committee and the other panels would have three 
weeks to work on
the legislation, after which the select committee would work on the package for two 
weeks and then
send it directly to the floor, sources said. "There will be regular order for a short 
period of
time, with the committees reporting to an ad hoc committee that will rationalize all 
of these ideas
for leadership," said a GOP source, who added, "This gives the authorizers a bite at 
the apple and
it gives the leaders a chance to rationalize the whole thing."

http://www.govexec.com/dailyfed/0602/061302cdpm1.htm

         ----------------------------------------------------

[3] Homeland department likely to house cybersecurity office
By William New, National Journal's Technology Daily

The White House Office of Cyberspace Security would "change a bit" under a proposal to 
create a
Homeland Security Department but would retain its basic functions, the senior director 
of that
office said Thursday.

Paul Kurtz said that the position of Cybersecurity Director Richard Clarke "would 
likely remain the
same" and that Clarke would continue to report to the National Security Council (NSC), 
headed by
Condoleezza Rice, and to the new department head. He spoke on a panel at the TechNet 
International
conference of the Association for Communications, Electronics, Intelligence and 
Information Systems
Professionals.

Clarke currently reports to the council and the White House Homeland Security Office 
as chairman of
the Critical Infrastructure Protection Board. The position of Vice Chairman Howard 
Schmidt also
likely would remain, Kurtz said. He said the board membership might change as portions 
of agencies
are moved, but "we will have a coordinating mechanism on cybersecurity."

http://www.govexec.com/dailyfed/0602/061302td1.htm

         ----------------------------------------------------

[4] Senate in a hurry on homeland security bill
By Keith Koffler, Geoff Earle and Mark Wegner, CongressDaily

Senate Majority Leader Tom Daschle, D-S.D., and Minority Leader Trent Lott, R-Miss., 
are negotiating
a fast-paced schedule for creating a new Homeland Security Department under a 
procedure that will
give Senate Republicans and Democrats a chance to help shape the proposal.

After a White House meeting Wednesday, Senate Democratic leaders said they plan to 
debate the
measure in July.

"Hopefully-and I believe we can do it-[we will] get it passed in the Senate before we 
leave for the
August recess," said Senate Governmental Affairs Chairman Joseph Lieberman, D-Conn., 
who spoke at
the White House following a meeting between President Bush and 20 chairmen and ranking 
members of
House and Senate committees with jurisdiction over homeland security.

http://www.govexec.com/dailyfed/0602/061302cdam1.htm

         ----------------------------------------------------

[5] Ridge meets with House members on homeland security proposal
>From CongressDaily

Homeland Security Director Tom Ridge met with House members Wednesday on Bush's plan. 
He will hold a
similar meeting Thursday with senators.

"This is the beginning of the collaboration between the president and his 
administration and the
Congress of the United States," Ridge told reporters after the closed-door meeting on 
the House
floor.

Ridge said he had received a "very positive" reaction from lawmakers and said he would 
return to
Capitol Hill "sometime in the near future" to offer formal testimony.

http://www.govexec.com/dailyfed/0602/061302cdam2.htm

         ----------------------------------------------------

[6] Feds, industry battle the biggest network bug
By Kevin Poulsen, SecurityFocus Online
Posted: 12/06/2002 at 18:52 GMT

Four months after a public advisory warned of security vulnerabilities in a ubiquitous 
Internet
remote management protocol, there have been no widespread attacks exploiting the 
holes. But
technology companies and a special U.S. government panel are quietly evaluating the 
threat of
related vulnerabilities in some of America's most critical electronic infrastructures, 
including the
telephone network, the power grid, and the next generation of air traffic control 
systems.

http://www.theregister.co.uk/content/55/25693.html

         ----------------------------------------------------

[7] Developing an Effective Incident Cost Analysis Mechanism
by David A. Dittrich
last updated June 12, 2002

When it comes to calculating damages from computer security incidents, some in the 
media will tell
you that it is impossible to come up with a value. At the same time, others will tell 
you that the
Melissa Virus caused $80 million in damages to US businesses. Who is right? Can these 
damages be
calculated, and if so, how?

A project by representatives of the Big Ten Universities (plus a few others) in the 
late 90's
undertook to systematically examine the real costs of security incidents. The results 
of this
project were an incident cost model and examples of costs for typical security 
incidents at these
institutions. This model has been used successfully in computer intrusion cases 
involving federal
law enforcement, and by the Honeynet Project for comparison of entries in the Forensic 
Challenge. It
proves that fair and accurate damage estimates can be produced, and with very little 
work, provided
that those doing the work are disciplined and diligent in keeping track of time, at 
the time of
incident response. Unfortunately, this is where the system often breaks down. As we 
shall see, the
need for diligence in collecting time data for every security incident response calls 
for policies
and procedures to be set at the institutional level, and enforced as a regular part of 
incident
handling, in order to have meaningful figures on institutional losses due to security 
incidents.

http://online.securityfocus.com/infocus/1592

         ----------------------------------------------------

[8] Assessing Internet Security Risk, Part One: What is Risk Assessment?
by Charl Van der Walt
last updated June 11, 2002

The Internet, like the Wild West of old, is an uncharted new world, full of fresh and 
exciting
opportunities. However, like the Wild West, the Internet is also fraught with new 
threats and
obstacles; dangers the average businessman and home user hasn't even begun to 
understand. But I don'
t have to tell you this. You've heard that exact speech at just about every single 
security
conference or seminar you've ever attended, usually accompanied by a veritable array 
of slides and
graphs demonstrating exactly how serious the threat is and how many millions of 
dollars your company
stands to loose. The "death toll" statistic are then almost always followed by a sales 
pitch for
some or other product that's supposed to make it all go away. Yeah right.

Am I saying the threat isn't real? Am I saying the statistics aren't true? No. What 
I'm saying is
that many users fail to see what relevance any of this has to themselves and their 
company. Should
the fact that e-Bay supposedly spend $120,000 dollars recovering from Mafia Boy's DDoS 
attack really
have an impact on the reader's corporate IT policy? Perhaps not.

http://online.securityfocus.com/infocus/1591

         ----------------------------------------------------

[9] First JPEG virus not a threat
By ComputerWire
Posted: 06/14/2002 at 04:14 EST

Anti-virus firms have discovered a Windows virus that infects JPEG image files, though 
the chances
of it causing a major security risk any time soon are close to zero. W32/Perrun, as 
Networks
Associates Inc named the virus, was assessed as low risk, and has not been found in 
the wild.

"It is believed to be the first of its kind," said Vincent Gullotto. "It's no danger, 
but it shows
that virus writers are looking at other methods of infection." In the last year, virus 
writers have
started using other file types, such as PDFs and Flash animations, to spread 
themselves.

http://www.theregus.com/content/56/25238.html

http://www.wired.com/news/technology/0,1282,53196,00.html

         ----------------------------------------------------

[10] Biometrics, Surveillance, National ID Threats to Privacy

Electronic Frontier Foundation Releases Reports

For Immediate Release: Thursday, June 13, 2002

San Francisco - The Electronic Frontier Foundation (EFF) today released a series of 
reports on the
shortcomings of large-scale civilian biometrics systems, the invasive nature of public 
surveillance,
and the inherent dangers of a national identification system.

http://www.eff.org/Privacy/20020613_eff_privacy_pr.html

         ----------------------------------------------------

[11] Anti-open source 'whitepaper' devastated

By Thomas C Greene in Washington
Posted: 11/06/2002 at 02:16 GMT

Roaring Penguin's David Skoll has written a fine rebuttal to the ADTI whitepaper. With 
his
permission we're reproducing it whole and unedited:

The Alexis de Tocqueville Institution (AdTI) has finally published its white paper 
entitled "Opening
the Open Source Debate". My earlier comments were based on media reports and e-mail 
correspondence
with the paper's author. This document was written after I read the actual white 
paper. (The
original link seems not to work; I managed to grab a copy of the paper before AdTI 
pulled it. This
link may work.)

http://www.theregister.co.uk/content/55/25659.html

         ----------------------------------------------------

[12] Jail time is not the answer to cybercrime

By Robert Vamosi
AnchorDesk
March 6, 2002, 4:30 AM PT

Patriot Act of 2001, a sweeping law which, among other things, said those who break 
into other
peoples' computers could be considered terrorists, and prosecuted as such.

In the months since the act was signed, several lower-profile bills have been proposed 
in
Congress--all of which are either overreaching in scope or simply flawed. One of these 
is H.R. 3482,
the Cyber Security Enhancement Act of 2002 (CSEA).

http://zdnet.com.com/2100-1107-852767.html

         ----------------------------------------------------

[13] Australian directors alerted to cybercrime threats

By Vivienne Fisher, ZDNet Australia
07 June 2002

Australian company directors and officers are being warned of the damaging impact 
cybercrime can
have if they don't address risks effectively.
Leif Gamertsfelder, head of the e-security group at law firm Deacons, outlined the 
potential
pitfalls at an Australian Institute of Company Directors briefing yesterday.

Cybercrime has been garnering increased interest in Australia over the past week, with 
the Federal
Government announcing finalisations to a bundle of counter-terrorism bills on 
Wednesday. Federal
Attorney-General Daryl Williams has described the proposed legislation as a response 
to September
11.

http://www.zdnet.com.au/newstech/enterprise/story/0,2000025001,20265835,00.htm

         ----------------------------------------------------

[14] UK businesses are failing to work online

So the vendors say... but then they would wouldn't they...

Conducting your business electronically might be the best way to cut costs in these 
difficult times
but UK plc remains reluctant to get involved.
According to B2B vendor Ariba the level of business conducted electronically in the UK 
is falling
well short of a 20 per cent target set by analysts.

http://www.silicon.com/bin/bladerunner?30REQEVENT=&REQAUTH=21046&14001REQSUB=REQINT1=53932

         ----------------------------------------------------

[15] U.S. turns screw on ICANN

Reuters
June 13, 2002, 4:30 PM PT

U.S. lawmakers said on Wednesday that they would step up oversight of the nonprofit 
group that
oversees the Internet's domain-name system, but stopped short of saying the United 
States should run
the controversial body.
Several senators and a Bush administration official said the Internet Corporation for 
Assigned Names
and Numbers (ICANN) would have to change the way it operates if it wants to continue 
to oversee the
system that allows Internet users to navigate using easy-to-remember domain names.


         ----------------------------------------------------

[16] Woman faces charges in hacking case
By Globe Staff and Wire Services, 6/13/2002

BOSTON

A Middleton woman will face criminal charges after she allegedly hacked into her 
former boss's
computer and sent e-mail from his account, Attorney General Thomas F. Reilly said 
yesterday. Wendy
Sholds, 38, will face two counts of unauthorized access to a computer system after she 
allegedly
hacked into the e-mail account of her former boss - CEO of Middleton-based Business 
Travel
International - in February, and forwarded to two employees an e-mail between the CEO 
and a vice
president that allegedly contained discussion of the termination of those two 
employees, according
to Reilly's office. Sholds will be arraigned in Salem District Court July 1.

http://www.boston.com/dailyglobe2/164/metro/Woman_faces_charges_in_hacking_case+.shtml

         ----------------------------------------------------

[17] VA urged to improve management of technology
>From National Journal's Technology Daily

Despite its progress in raising corporate awareness of departmental information 
technology needs,
the Veterans Affairs Department has "significant work" to accomplish in order to use 
IT investments
to improve overall performance, according to a General Accounting Office report 
released Wednesday.

A GAO official testified before a House subcommittee in March on VA's IT successes and 
failures. The
GAO report, "Veterans Affairs: Sustained Management Attention is Key to Achieving 
Information
Technology Results" (GAO-02-703), recommends that the VA chief information officer:

http://www.govexec.com/dailyfed/0602/061302td2.htm

         ----------------------------------------------------



_____________________________________________________________________

The source material may be copyrighted and all rights are
retained by the original author/publisher.

Copyright 2002, IWS - The Information Warfare Site
_____________________________________________________________________

Wanja Eric Naef
Webmaster & Principal Researcher
IWS - The Information Warfare Site
<http://www.iwar.org.uk>

---------------------------------------------------------------------

To subscribe - send an email to "[EMAIL PROTECTED]" with "subscribe
infocon" in the body

To unsubscribe - send an email to "[EMAIL PROTECTED]" with "unsubscribe
infocon" in the body

---------------------------------------------------------------------




IWS INFOCON Mailing List
@ IWS - The Information Warfare Site
http://www.iwar.org.uk


Reply via email to