_________________________________________________________________

                      London, Thursday, September 12, 2002
    _________________________________________________________________

                                INFOCON News
    _________________________________________________________________

                            IWS - The Information Warfare Site
                                    http://www.iwar.org.uk

    _________________________________________________________________

                               IWS Sponsor

IQPC Defence Conference: Information Operations 2002 25-26/09/02

Information Operations 2002: Analysing development in defensive and
offensive information operations, critical infrastructure protection,
information assurance and perception management.

September 25 - 26, 2002. London, UK (Pre-Conference Masterclass:
24th September 2002)

Information Operations 2002 Conference Web Site
http://www.iqpc-defence.com/GB-1826

    _________________________________________________________________


          ----------------------------------------------------
                              [News Index]
          ----------------------------------------------------

[1] On Capitol Hill, homeland security agenda is crowded
[2] Cheap Thrills on the Cyberterror Beat
[3] (UK) Anti-email snooping proposals 'stupid'
[4] NCS working on pair of pilots
[5] Why gov't cybersecurity plan promises to disappoint

[6] Commercial sector shares threat information
[7] Interagency report details Bush IT research priorities
[8] Insecurity Plagues Emergency Alert System
[9] Sept. 11: A year later, online privacy and security still weak
[10] PGP creator joins UK privacy watchdog

[11] Win-XP Help Center request wipes your HD
[12] GOP senators seek liability exemption for tech contracters
[13] End sought in Internet music case
[14] US committee passes privacy protection bill
[15] Broken Sept 11 worm poses little risk

[16] Evaluating Network Intrusion Detection Signatures, Part 1
[17] Win2K First Responder's Guide

    _________________________________________________________________

                                News
    _________________________________________________________________


[1] On Capitol Hill, homeland security agenda is crowded
By Charlie Mitchell, CongressDaily

Familiar autumn rituals are unfolding on Capitol Hill, as appropriators struggle
to complete their 13 spending bills, leaders maneuver legislation into place for
the final weeks of the session-and the parties hustle toward the midterm
elections in November.

But this is not a typical September in Washington. On the first anniversary of
the Sept. 11, 2001 terrorist attacks against the United States, talk of war with
Iraq and a "Code Orange" terror alert hang over the Capitol. Meanwhile, the
legislative machinery is grinding through an assortment of bills that were not
on the agenda-or were cast in starkly different terms-one year ago.

Already, Congress has passed myriad bills to improve airport security and assist
the reeling airline industry, tighten U.S. borders and help the communities that
bore the brunt of the attacks. The Senate Budget Committee released a fact sheet
this week detailing "more than $75 billion in budget authority" that Congress
has approved in response to the attacks.

http://www.govexec.com/dailyfed/0902/091102cdam1.htm

         ----------------------------------------------------

[2] Cheap Thrills on the Cyberterror Beat
Are computer viruses really on the verge of becoming instruments of bloodshed,
or is the press just addicted to disaster journalism?

By George Smith Sep 03, 2002

Did you hear of the computer virus that could "attack the Pentagon's ability to
mobilize or communicate with its forces" and cripple all government services in
a city? I read about it in the Center for Defense Information's July Defense
Monitor newsletter. It would be part of an "electronic Waterloo," readers were
informed.

These days "electronic Pearl Harbor" and "digital Armageddon" are fit only for
the nitwit's book of cliches, but "e-Waterloo" is grossly underused. As such, I
recommend gnomic cyber-security gurus massage it into worldwide circulation
posthaste.

http://online.securityfocus.com/columnists/107

         ----------------------------------------------------

[3] Anti-email snooping proposals 'stupid'
By Tim Richardson
Posted: 12/09/2002 at 10:04 GMT

Bob Jones - the boss of email filtering and blocking outfit Equiinet - describes
proposed legislation to outlaw bosses snooping on employees' email as "stupid
and ill-considered".

Last week Tory MP Michael Fabricant announced he was looking to introduce a Bill
that would stop employers from snooping on employees' email.

http://www.theregister.co.uk/content/53/27087.html

         ----------------------------------------------------

[Great agency which has been around since the Cuban Missile Crisis.
People should have a look at their public-private partnership model
as it works so well. WEN]

[4] NCS working on pair of pilots
BY Dan Caterinicchia
Sept. 11, 2002

The National Communications System is in the early stages of two pilot projects
aimed at improving the reliability and speed of the telecommunications and
wireless systems for first responders and other key personnel during a national
crisis or disaster.

http://www.fcw.com/fcw/articles/2002/0909/web-ncs-09-11-02.asp

         ----------------------------------------------------

[The plan is supposed to be market driven which limits its impact. Also
it will include new elements (they might be chemical manufacturing, food
safety, ...) within the Critical Infrastructure. WEN]

[5] Why gov't cybersecurity plan promises to disappoint
Robert Vamosi,
Senior Associate Editor,
CNET/ZDNet Reviews
Thursday, September 12, 2002

On Wednesday, Sept. 18, presidential cybersecurity adviser Richard Clarke will
unveil the first draft of the long-awaited National Strategy for Securing
Cyberspace (NSSC). Loosely based on feedback from computer users and vendors to
53 questions posted on the White House Web site, the final NSSC report will
ultimately make recommendations for making home users, major enterprises, the
national infrastructure, and the global Internet more secure.

But don't expect the plan to resolve all our cybersecurity issues. Far from it.

http://www.zdnet.com/anchordesk/stories/story/0,10738,2879777,00.html

         ----------------------------------------------------

[6] Commercial sector shares threat information

By William Jackson
GCN Staff

The Information Sharing and Analysis Centers, established in key commercial
sectors to help protect the nation's critical infrastructure, have evolved over
the last year, developing a structure to share threat information among ISACs.

"Code Red was the turning point," said Pete Allor, operations director for the
IT ISAC. "We realized how useful we could be. That's also the first time we
reached out to government, and government reached back."

Allor, who also is manager of the threat intelligence service-the X Force-for
Internet Security Systems Inc. of Atlanta, spoke about the role of ISACs during
an interview yesterday at the Networld+Interop/Comdex trade show.

http://www.gcn.com/vol1_no1/daily-updates/19952-1.html

         ----------------------------------------------------

[7] Interagency report details Bush IT research priorities
By William New, National Journal's Technology Daily

A new interagency report details the Bush administration's fiscal 2003 budget
priorities for the research and development program of long-term networking and
information technology. The report shows an emphasis on high-end computing and
software development next year.

"This program has been in progress for over 10 years and continues to be
strongly supported by Congress and the current administration" said Cita
Furlani, director of the National Coordination Office for Information Technology
R&D. "It's really a big benefit to the nation because each agency leverages the
other agencies' resources and we get the best bang for the taxpayers' buck."

The program coordinates IT R&D efforts for more than a dozen agencies and
offices, such as the National Science Foundation and offices in the Commerce,
Energy and Defense departments, with the goal of leveraging resources. John
Marburger, director of the White House Office of Science and Technology Policy,
headed the task force that prepared the report. The so-called "Blue Book" is
required annually under the 1991 High-Performance Computing Act.

http://www.govexec.com/dailyfed/0902/091102td2.htm

         ----------------------------------------------------

[8] Insecurity Plagues Emergency Alert System

The FCC-mandated network that lets officials interrupt radio and television
broadcasts in an emergency is wide open to electronic tampering, and the
government has no plans to fix it.
By Kevin Poulsen, Sep 10 2002 6:19AM

A national alert system that gives the president the ability to take over the
U.S. airwaves during a national crisis may inadvertently extend hackers the same
courtesy, thanks to security holes that put radio stations, television
broadcasters and cable TV companies at risk of being commandeered by anyone with
a little technical know-how and some off-the-shelf electronic components.

http://online.securityfocus.com/news/613

         ----------------------------------------------------

[9] Sept. 11: A year later, online privacy and security still weak

By Andrew Brandt, PC World
SEPTEMBER 11, 2002

A year after the Sept. 11 terrorist attacks, average Americans are subject to
more surveillance when they go online, and their Internet-connected PCs may not
be any safer from intruders, some experts say.

On the other hand, some of the laws that opponents and privacy advocates claimed
would compromise privacy were quashed. For example, Congress rejected measures
restricting the distribution of encryption software and implementing federal
identification cards.

http://www.computerworld.com/securitytopics/security/privacy/story/0,10801,74146
,00.html

         ----------------------------------------------------


[10] PGP creator joins UK privacy watchdog
By John Leyden
Posted: 11/09/2002 at 16:18 GMT

Cyber rights luminary Phil Zimmermann has joined the advisory council of
influential UK privacy watchdogs the Foundation for Information Policy Research
(FIPR).

Zimmermann, best known as the creator of Pretty Good Privacy (PGP) who earned
widespread acclaim for facing downs threats from the Feds when he exported his
famous encryption program, said he was joining FIPR to further trans-Atlantic
co-operation on civil liberties.

http://www.theregister.co.uk/content/6/27078.html

         ----------------------------------------------------

[11] Win-XP Help Center request wipes your HD
By Thomas C Greene in Washington
Posted: 11/09/2002 at 13:15 GMT

A malicious Win-XP Help Center request can easily and silently delete the
contents of any directory on your Windows machine, we've learned. Worse, MS has
rolled the fix silently into SP1 without making a public announcement. A good
sketch of the problem in English, along with a harmless self-test, can be found
here, thanks to Mike at http://unity.skankhouse.org, who did some tinkering
after noticing a tip on a BBS.

http://www.theregister.co.uk/content/55/27074.html

         ----------------------------------------------------

[12] GOP senators seek liability exemption for tech contracters
By William New, National Journal's Technology Daily

An amendment to the Senate bill to create a Homeland Security Department
prepared by two key Republicans would require the White House to exempt
government contractors from liability for homeland security technologies and
services.

Sens. Fred Thompson, R-Tenn., and John Warner, R-Va., filed the amendment on
Tuesday. Thompson is the ranking Republican on the Senate Governmental Affairs
Committee, which passed the homeland security bill, S. 2452, now on the Senate
floor.

Warner, who drove the amendment's completion, took a personal interest in the
issue after learning of it, an industry source said.

http://www.govexec.com/dailyfed/0902/091102td1.htm

         ----------------------------------------------------

[13] End sought in Internet music case

LOS ANGELES (AP) - Entertainment industry groups have asked a federal court
judge to rule before a trial on their copyright infringement claims against
Internet file- swapping services KaZaA, Grokster and Morpheus.

Attorneys for StreamCast Networks, which distributes the peer-to-peer software
program Morpheus, have also asked the judge to rule that distribution of the
software does not violate copyright law.

http://www.siliconvalley.com/mld/siliconvalley/news/editorial/4046371.htm

         ----------------------------------------------------

[14] US committee passes privacy protection bill

Thursday 12 September 2002

A congressional committee has approved a bill that will require federal agencies
to consider the impact of the new regulations and policies enforced after 11
September on individuals' privacy.

The US House Judiciary Committee approved the Federal Agency Protection of
Privacy Act, clearing it for consideration by the full US House of
Representatives next month.

The bill would compel agencies to conduct a privacy impact analysis when
proposing new rules and publish it for public comment.

http://www.cw360.com/bin/bladerunner?REQSESS=eD463A1I&2149REQEVENT=&CARTI=115720
&CARTT=14&CCAT=2&CCHAN=22&CFLAV=1

         ----------------------------------------------------

[15] Broken Sept 11 worm poses little risk
By John Leyden
Posted: 11/09/2002 at 10:57 GMT

Virus writers have exploited interest in the anniversary of the September 11
terrorist attacks with their latest attempts to create a damaging email worm.

Fortunately due to bugs in the code of Chet-A it fails to work properly and is
considered a minimal threat.

http://www.theregister.co.uk/content/55/27070.html

         ----------------------------------------------------

[16] Evaluating Network Intrusion Detection Signatures, Part 1
by Karen Kent Frederick
last updated September 10, 2002

Over the past several years, a number of academic and commercial entities have
conducted evaluations of various network intrusion detection (NID) software, to
determine the overall effectiveness of each product and to compare the products
to each other. Many system administrators and security analysts are also
responsible for conducting their own evaluations of NID products, in order to
choose a solution for deployment in their environments. NID evaluations
typically include some rough indication of the relative quality of each
product's signatures. However, high signature quality is critical to achieving a
good NID solution, so the importance of accurately evaluating signature quality
cannot be stressed strongly enough.

In this series of articles, we will present recommendations that will help you
to evaluate NID signatures. As you shall see, properly testing NID signatures is
a surprisingly complex topic. We will begin by discussing some of the basics of
evaluating NID signature quality, and then look at issues relating to selecting
attacks to be used in testing. Although you may not necessarily perform hands-on
NID testing and evaluations, the information presented in this series of
articles will give you the knowledge and the facts to get the most out of
published reviews and comparisons of NID signatures. Note that we assume that
the reader is already familiar with the basic concepts and principles of network
intrusion detection.

http://online.securityfocus.com/infocus/1623

         ----------------------------------------------------

[17] Win2K First Responder's Guide
by H. Carvey
last updated September 5, 2002

Introduction

When it comes to handling computer security incidents, proper first response
handling of computer security incidents is second in importance only to incident
prevention. Improper handling or collection of available information can do
irreparable harm to an investigation. Investigators need to have a thorough
understanding of what information they intend to collect, as well as the tools
they can use and the effects those tools have on the system itself.

Investigators know that not every event reported will require a full
investigation or lead to prosecution. Obviously, each incident will make
different demands on investigators; however, incident handling personnel should
not deviate from best practices and assume that different procedures should be
used to handle an event. There are specific items of information that can be
collected and analyzed quickly in order to determine what follow-up steps need
to be taken. This article will offer a brief overview of some of the steps
security administrators and incident handlers should take as part of the first
response to security incidents. This article will focus on incidents in
Microsoft Windows 2000, due to its popularity in both the corporate and server
environments. Many of the general topics discussed in this article are
applicable across other platforms, and many of the specific techniques and tools
discussed can also be employed on NT and XP.

http://online.securityfocus.com/infocus/1624

         ----------------------------------------------------

_____________________________________________________________________

The source material may be copyrighted and all rights are
retained by the original author/publisher.

Copyright 2002, IWS - The Information Warfare Site
_____________________________________________________________________

Wanja Eric Naef
Webmaster & Principal Researcher
IWS - The Information Warfare Site
<http://www.iwar.org.uk>

---------------------------------------------------------------------

To subscribe - send an email to "[EMAIL PROTECTED]" with "subscribe
infocon" in the body

To unsubscribe - send an email to "[EMAIL PROTECTED]" with "unsubscribe
infocon" in the body

---------------------------------------------------------------------




IWS INFOCON Mailing List
@ IWS - The Information Warfare Site
http://www.iwar.org.uk


Reply via email to