_________________________________________________________________

                      London, Friday, August 16, 2002
    _________________________________________________________________

                                INFOCON News
    _________________________________________________________________

                            IWS - The Information Warfare Site
                                    http://www.iwar.org.uk

    _________________________________________________________________


InforwarCon 2002:

Homeland Defense and Cyber-Terrorism, Washington, DC September
4-5, 2002, optional workshops September 3 & 6. Presented by MIS Training
Institute and Interpact, Inc. Proven strategies for protecting against threats
to critical infrastructures and government systems. Go to:

http://www.misti.com/08/iw02nl27inf.html

    _________________________________________________________________


          ----------------------------------------------------
                              [News Index]
          ----------------------------------------------------

[1] FBI names cybercrime chief
[2] Sleuths Invade Military PCs With Ease
[3] FBI agent charged with hacking
[4] Intel case tests e-mail as free speech
[5] Antiterror Chief Quits F.B.I., Which Gets New Deputy

[6] Get security straight first at HQ
[7] Ad watchdog critical of Domain Registry of Europe
[8] Crypto lockdown secures lost laptop data
[9] Configuring IPsec/IKE on Solaris
[10] Senator asks OMB to tackle problem of missing government computers

[11] [UK] Tories add to calls for internet 'grooming' law
[12] Utah man sues Sprint over spam e-mail
[13] Windows Apache security bug revealed
[14] Library hacker gets jail time
[15] Post to Bugtraq -- Go to Jail

[16] Switch to Linux saved us millions, Amazon.com says
[17] Sex.com case turning dirty

    _________________________________________________________________

                                News
    _________________________________________________________________


[1] FBI names cybercrime chief
>From National Journal's Technology Daily

The FBI on Thursday named Keith Lourdeau as chief of the cybercrime section of
the FBI's cyber division.

Since Feb. 2001, Lourdeau was assistant special agent in charge of the FBI's St.
Louis division, where he was responsible for the daily operation of the
division's administration and operations.

Lourdeau joined the FBI in 1986 and has served in the Chicago, Little Rock,
Ark., and St. Louis field offices. While he was serving at the FBI's
headquarters, he was detailed to the CIA to assist in establishing a new
initiative targeting international organized crime groups.

On Thursday, the FBI also named Thomas Richardson assistant director of the
investigative technologies division.Most recently, Richardson, who joined the
FBI in 1975, was acting deputy assistant director of the criminal investigation
division's financial crimes, integrity in government and civil rights and
operational support unit.

http://www.govexec.com/dailyfed/0802/081502td1.htm

         ----------------------------------------------------

[2] Sleuths Invade Military PCs With Ease

By Robert O'Harrow Jr.
Washington Post Staff Writer
Friday, August 16, 2002; Page A01

SAN DIEGO, Aug. 15 -- Security consultants entered scores of confidential
military and government computers without approval this summer, exposing
vulnerabilities that specialists say open the networks to electronic attacks and
spying.

The consultants, inexperienced but armed with free, widely available software,
identified unprotected PCs and then roamed at will through sensitive files
containing military procedures, personnel records and financial data.

http://www.washingtonpost.com/wp-dyn/articles/A24191-2002Aug15.html

         ----------------------------------------------------

[3] FBI agent charged with hacking

Russia alleges agent broke law by downloading evidence

By Mike Brunker
MSNBC

Aug. 15 - In a first in the rapidly evolving field of cyberspace law, Russia's
counterintelligence service on Thursday filed criminal charges against an FBI
agent it says lured two Russian hackers to the United States, then illegally
seized evidence against them by downloading data from their computers in
Chelyabinsk, Russia.

http://www.msnbc.com/news/563379.asp

         ----------------------------------------------------

[4] Intel case tests e-mail as free speech

Former worker prosecuted for electronic trespassing

By Allyce Bess
THE WALL STREET JOURNAL

Aug. 14 - When Ken Hamidi was fired from Intel Corp. in 1995 after a long
workers' compensation battle, he didn't go quietly. Mr. Hamidi, 55 years old,
spent the next two years criticizing the company in e-mails sent to thousands of
co-workers. Convinced he was a victim of age discrimination, Mr. Hamidi even
publicized his campaign by dressing as a cowboy and going on horseback to
distribute printed versions of his messages to employees entering Intel's
Folsom, Calif., facility, where he once worked. Now, the California Supreme
Court will determine whether the former employee's e-mail is a form of
electronic trespassing, as Intel claims, or an expression of free speech.

http://www.msnbc.com/news/794127.asp

         ----------------------------------------------------

[5] Antiterror Chief Quits F.B.I., Which Gets New Deputy
By PHILIP SHENON

WASHINGTON, Aug. 15 - The F.B.I.'s counterterrorism chief, who has overseen the
investigations of the Sept. 11 terror attacks and last year's deadly anthrax
mailings, has decided to retire, with no replacement yet chosen, the bureau said
today.

Federal Bureau of Investigation officials said the departure of the official,
Dale L. Watson, would have no effect on the terrorism investigations, because
Mr. Watson would leave behind experienced deputies when he takes a job with Booz
Allen Hamilton, the business consulting firm.

http://www.nytimes.com/2002/08/16/national/16BURE.html?ex=1030499471&ei=1&en=891
fac781216d471

         ----------------------------------------------------

[6] Get security straight first at HQ

Thursday 15 August 2002

The concept of the "extended enterprise" - where your systems are connected to
suppliers, partners and distributors - is an Internet phenomenon, writes Ross
Bentley.

However, says John Frazier, director of infrastructure services at i2
Technologies, many of these e-business initiatives have stalled because of the
potential security threats these projects have created.

"Extending the enterprise is great for business but a nightmare to secure," he
says. "What companies should be doing is getting their own house in order before
they open up their systems to the outside world. You can extend the enterprise
easily but how do you control access once they are in? This is the biggest
hurdle for many companies."

http://www.cw360.com/bin/bladerunner?REQSESS=0Z5G811&2149REQEVENT=&CARTI=114948&;
CARTT=3&CCAT=1&CCHAN=13&CFLAV=1

         ----------------------------------------------------

[7] Ad watchdog critical of Domain Registry of Europe
By Tim Richardson
Posted: 16/08/2002 at 09:52 GMT

The Advertising watchdog has slammed Domain Registry of Europe (DRoE) for
misleading consumers over its mailshots that "look like bills".

Last month The Register reported how the Canada-based domain registration outfit
is currently targeting domain holders in the UK with unsolicited letters that
readers claim "look like bills".

http://www.theregister.co.uk/content/6/26705.html

         ----------------------------------------------------

[8] Crypto lockdown secures lost laptop data

17:06 15 August 02

NewScientist.com news service

Stolen or lost laptops can now automatically encrypt all their data, thanks to
new equipment that creates a wireless bond between the machine and its owner.
When its "master" is out of range, it locks down, keeping the data from falling
into the wrong hands.

http://www.newscientist.com/news/news.jsp?id=ns99992683


         ----------------------------------------------------

[9] Configuring IPsec/IKE on Solaris
by Ido Dubrawsky
last updated August 15, 2002

The IP Security Protocol (IPsec) and the Internet Key Exchange (IKE) protocol
are designed to permit system and network administrators the capability to
protect traffic between two systems. These systems can be network devices or
individual hosts. With the release of Solaris 8, Sun added the ability to
configure IPsec on Solaris hosts in order to construct a virtual private network
(VPN) between the systems or to secure the traffic destined for a system. This
article is the first of a three-part series that will examine IPsec and the key
management protocol, IKE, and provide readers with an introduction on how to
configure both protocols on a Solaris host.

http://online.securityfocus.com/infocus/1616

         ----------------------------------------------------

[10] Senator asks OMB to tackle problem of missing government computers

By Tanya N. Ballard
[EMAIL PROTECTED]

A lawmaker urged the Office of Management and Budget Thursday to tackle the
problem of missing computers at several federal agencies.

"I'm worried that just as dryers have the knack of making socks disappear, the
federal government has discovered a core competency of losing computers," Sen.
Charles Grassley, R-Iowa, wrote in an Aug. 15 letter to OMB Director Mitch
Daniels.

http://www.govexec.com/dailyfed/0802/081502t1.htm

         ----------------------------------------------------

[11] Tories add to calls for internet 'grooming' law

Matthew Tempest, political correspondent
Friday August 16, 2002

The Conservatives today called for an immediate criminal offence to target
paedophiles who "groom" children through internet chatrooms.
The demand came on the back of the disappearance of Cambridgeshire 10-year-olds
Jessica Chapman and Holly Wells, although the Tory shadow home secretary, Oliver
Letwin, admitted he did not know if the internet was a factor in this case.

http://society.guardian.co.uk/children/story/0,1074,775708,00.html

         ----------------------------------------------------

[12] Utah man sues Sprint over spam e-mail
By RICH VOSEPKA
Associated Press Writer

SALT LAKE CITY - In what's apparently the first use of Utah's new anti-spam law,
lawyers are seeking damages from Sprint Communications Co. for an unsolicited
advertisement e-mailed to a Utah man.

Sprint lawyers responded by asking Judge Denise Lindberg to force the plaintiff,
Terry Gillman, to hand over his hard drive to Sprint while the case is pending.
Sprint Communications is a subsidary of Overland Park, Kan.-based Sprint Corp.

The judge on Tuesday refused to order the hard drive to be turned over. She did
say Sprint and Gillman are prohibited from erasing anything from their computers
that could be relevant to the case, said attorney Denver Snuffer, who represents
Gillman.

http://www.siliconvalley.com/mld/siliconvalley/news/3780039.htm

         ----------------------------------------------------

[13] Windows Apache security bug revealed
By Thomas C Greene in Washington
Posted: 15/08/2002 at 02:11 GMT

Default installations of Apache on Windows are susceptible to a bug discovered
by Italian researcher Luigi Auriemma, Apache.org reports.

http://www.theregister.co.uk/content/55/26686.html

         ----------------------------------------------------

[14] Library hacker gets jail time

'Very serious offense' earns Philly man 1-3 years in state prison

By Jeffrey Blackwell
Democrat and Chronicle


(August 15, 2002) - Hacking into the Monroe County Library System's Web site has
earned a Philadelphia man 1-to-3-years in state prison.

Christopher J. Chinnici pleaded guilty in June to a felony charge of
second-degree computer tampering for breaking into the system in December 2001
and leaving behind an obscene image after one attack and an animated cartoon
after another.

http://www.democratandchronicle.com/news/0815story110800_news.shtml

         ----------------------------------------------------

[15] Post to Bugtraq -- Go to Jail

HP's ill-advised DMCA threat actually had a few legal teeth. Will federal
prosecutors soon start chomping at bug finders?
By Mark Rasch Aug 05, 2002

Imagine discovering a flaw in an operating system that would permit you to
obtain root privileges. Imagine then posting information about this
vulnerability to a message board dedicated to information security, along with a
link to an exploit that could be assembled to take advantage of the
vulnerability. Does the vendor of the OS congratulate you?

No. In the case of an engineer for SnoSoft who did precisely that last week,
both he and his employer were rewarded for their diligence by a threat, not only
of civil lawsuit by the vendor, but also of criminal prosecution under two
separate federal and several state statutes.

http://online.securityfocus.com/columnists/100

         ----------------------------------------------------

[16] Switch to Linux saved us millions, Amazon.com says

By Brier Dudley
Seattle Times technology reporter

SAN FRANCISCO - Amazon.com switched nearly its entire computer network to the
freely shared Linux operating system not because of politics but because it is
helping the company grow and cut costs, Amazon's engineering chief said
yesterday.

"We wanted the best tool for the task," said Jacob Levanon, director of systems
engineering at the Seattle-based Internet retailer.

Amazon has become a poster child for the progress Linux is making in
large-enterprise computing since the Web giant began using Linux to run 92
percent of its network computers last September.

http://seattletimes.nwsource.com/html/businesstechnology/134513573_linux15.html

         ----------------------------------------------------

[17] Sex.com case turning dirty
09:33 Wednesday 14th August 2002
Lisa M. Bowman, CNET News.com

An arcane domain name dispute also involves porn operators, a fugitive on the
run in Mexico, a forged letter and bounty hunters
Although it's an arcane case about property rights in the digital age, the
Sex.com saga has all the trappings of a juicy pulp fiction novel: a fugitive on
the lam in Mexico, would-be bounty hunters, and porn.

Now justices in the 9th Circuit Court of Appeals are hoping to sort out at least
one of the issues: whether domain name registrar VeriSign can be held
responsible for turning the Sex.com name over to someone who sent the company a
forged letter requesting the transfer.

http://news.zdnet.co.uk/story/0,,t269-s2120807,00.html

         ----------------------------------------------------

_____________________________________________________________________

The source material may be copyrighted and all rights are
retained by the original author/publisher.

Copyright 2002, IWS - The Information Warfare Site
_____________________________________________________________________

Wanja Eric Naef
Webmaster & Principal Researcher
IWS - The Information Warfare Site
<http://www.iwar.org.uk>

---------------------------------------------------------------------

To subscribe - send an email to "[EMAIL PROTECTED]" with "subscribe
infocon" in the body

To unsubscribe - send an email to "[EMAIL PROTECTED]" with "unsubscribe
infocon" in the body

---------------------------------------------------------------------




IWS INFOCON Mailing List
@ IWS - The Information Warfare Site
http://www.iwar.org.uk


Reply via email to