_________________________________________________________________

                      London, Thursday, October 31, 2002
    _________________________________________________________________

                                INFOCON News
    _________________________________________________________________

                            IWS - The Information Warfare Site
                                    http://www.iwar.org.uk

    _________________________________________________________________


---------------------------------------------------------------------

To subscribe - send an email to "[EMAIL PROTECTED]" with "subscribe
infocon" in the body

To unsubscribe - send an email to "[EMAIL PROTECTED]" with
"unsubscribe
infocon" in the body

---------------------------------------------------------------------

    _________________________________________________________________

    
          ----------------------------------------------------
                              [News Index]
          ----------------------------------------------------

[1] Businesses overlook intellectual property security, ASIS reports
[2] BCS presses Whitehall on new security rules
[3] Transformation driving DOD IT
[4] Was it hacking or public property?
[5] Islamic site's peaceful path  

[6] Country bodies threaten ICANN walkout
[7] Merkur Worm Hits File Swappers
[8] Digital copyright law on trial
[9] Australia is sure al-Qaida was in on Bali bombing
[10] 'Internal Look' to Test CENTCOM Command and Control Capabilities

[11] US may set up MI5-style spy agency in security shake-up
[12] Outlook bright for many e-tailers
[13] Kournikova author loses appeal
[14] Aust police, manufacturers in standoff over device security
[15] (ZA) Hacker continues trail of malice

[16] Verizon settles lawsuit against spammer
[17] MasterCard to send anti-skimming cards to Australia

    _________________________________________________________________

                                News
    _________________________________________________________________


[1] Businesses overlook intellectual property security, ASIS reports

Access Control & Security Systems, Oct 1, 2002  
   
Businesses must make information protection a higher priority, contends
a recent report by ASIS International, through its Council on
Safeguarding Proprietary Information.

The report includes a Proprietary Information Loss Survey conducted
among CEOs of Fortune 1,000 companies and of 600 small and mid-sized
companies that belong to the U.S. Chamber of Commerce. Responses suggest
proprietary information and intellectual property (IP) losses totalling
between $53 billion and $59 billion from July 1, 2000 to June 30, 2001.

http://www.industryclick.com/magazinearticle.asp?magazineid=119&releasei
d=10640&magazinearticleid=159088&siteid=2 

         ----------------------------------------------------

[2] BCS presses Whitehall on new security rules 

Thursday 31 October 2002  
 
The BCS is pressing the Government on legislation which could lead to
the regulation of the IT security sector, writes John Kavanagh.
 
The society is monitoring the working of the new Private Securities
Industries Act and the associated Security Industry Authority, which is
focusing initially on the activities of security firms, wheel clampers
and private detectives. The BCS wants to ensure that if the authority
turns its attention to IT security any regulation it sets in motion will
be appropriate.

The legislation has caused controversy by being unclear on whether it
covers IT security specialists, and whether IT security should be
regulated at all. Activities covered by the Act include security
consultancy - defined partly as advising on security precautions in
relation to any risk to property or person.

http://www.cw360.com/bin/bladerunner?REQUNIQ=1036073088&REQSESS=De57013&;
REQHOST=site1&2131REQEVENT=&CFLAV=1&CCAT=2&CCHAN=28&CARTI=117101 

         ----------------------------------------------------

[3] Transformation driving DOD IT
BY Dan Caterinicchia 
Oct. 31, 2002 

Driven by Secretary Donald Rumsfeld's vision of transformation, the
Defense Department's fiscal 2003 information technology budget is more
than $26 billion and should grow steadily at 5 percent for the next
decade, according to the Government Electronics and Information
Technology Association (GEIA).

DOD's transformation activities affect "every nook and cranny of the
services" and are the main driver of IT budget dollars, said Mike Kush,
director of public-sector marketing for Identix Inc. and GEIA's DOD IT
forecast chairman. He added that the DOD should be receiving an
increasing amount of IT funding in the future, "but the percentage is
not necessarily going up."

http://www.fcw.com/fcw/articles/2002/1028/web-budget-10-31-02.asp 

         ----------------------------------------------------

[4] Was it hacking or public property?
 
Reuters
October 29, 2002, 5:51 AM PT

A Swedish company has filed criminal charges against Reuters, claiming
that the news agency broke into its Web site to get access to an
earnings report. 
But Reuters that the information was publicly available on the company's
Web site, and said there was "no substance" to the charges.

Intentia International, which makes collaboration software, said Monday
that it has filed charges with Sweden's National Criminal Investigation
Department's computer crime division regarding the incident, which took
place earlier this month.

http://zdnet.com.com/2100-1105-963658.html 

         ----------------------------------------------------

[5] Islamic site's peaceful path  
Daniel J. Wakin The New York Times 
Wednesday, October 30, 2002  
  
CAIRO Inside a run-down building in a middle-class Cairo neighborhood, a
hybrid group of eager young dot-commers and idealistic religious
messengers gets together to produce www.islam-online.net, one of the
Islamic world's leading Web sites. At Islam Online, "We all consider
this an act of jihad, how to liberate people's minds from ignorance,"
said Ahmed Mohammed Sa'ad, using "jihad" in its sense of spiritual
struggle. Sa'ad is a recent religious school graduate and a
prize-winning reciter of the Koran who helps channel readers' requests
for religious rulings, or fatwas, to Islamic legal scholars around the
world.

Islam Online says it wants to present a positive view of the faith to
non-Muslims, to strengthen unity in the Muslim world and to uphold
principles of justice, freedom and human rights. Scholars say they see
the Web site as a leading example of efforts by moderate Muslims to push
for the Islamization of societies by nonviolent means.

http://www.iht.com/articles/74914.html 

Web Site
http://www.islamonline.net

IO article
http://www.islamonline.net/Arabic/Science/2001/06/article2-3.shtml 

         ----------------------------------------------------

[6] Country bodies threaten ICANN walkout
By ComputerWire
Posted: 31/10/2002 at 09:32 GMT

Spokespeople for the organizations that run country-code top-level
internet domains (ccTLDs) threatened this week that they could take
their leave of ICANN, the international body that has been trying to woo
them for four years, writes Kevin Murphy. 

According to reports from the floor of ICANN's quarterly meeting in
Shanghai this week, the ccTLDs formally folded the constituency of
ICANN's Domain Name Supporting Organization that represented them, and
said they are going to work on a proposal that could attempt to take
over some of ICANN's powers.

http://www.theregister.co.uk/content/6/27860.html 

         ----------------------------------------------------

[7] Merkur Worm Hits File Swappers

New Virus Spreads Via E-Mail and File-Sharing Networks

By Becky Worley, Tech Live

Oct. 30 - There's another new virus on the loose, only this one poses as
a fix for other viruses and spreads on popular peer-to-peer (P2P) file
sharing networks.  
  
The Merkur worm is a Visual Basic script that spreads through file
sharing networks such as KaZaA, Bearshare, and eDonkey, as well as
through mIRC, an Internet Relay Chat program.
It also sends itself out to contacts mined from Outlook address books
and targets computers running Windows 95, Windows 98, Windows NT,
Windows 2000, Windows XP, and Windows Me.

The computer worm does not delete information from a computer's hard
drive or have any other destructive "payload," say security experts.

http://abcnews.go.com/sections/scitech/TechTV/techtv_merkurworm021030.ht
ml

         ----------------------------------------------------

[8] Digital copyright law on trial
09:30 Thursday 31st October 2002
Declan McCullagh, CNET News.com   

A researcher argues that the DMCA will prevent him from carrying out
legally-protected studies of Internet filtering software. The case could
be the first to limit the controversial law's broad reach 
A security researcher asked a federal judge on Wednesday to let a
challenge to the Digital Millennium Copyright Act (DMCA) continue.

Attorneys for Ben Edelman, who specialises in investigating flaws in
Internet blocking software, filed a 26-page document arguing that his
work is imperilled by legal threats from N2H2, a filtering company based
in Seattle.

http://news.zdnet.co.uk/story/0,,t269-s2125060,00.html 

         ----------------------------------------------------

[9] Australia is sure al-Qaida was in on Bali bombing 

The head of Australia's intelligence service claims there is no doubt
al-Qaida was involved in the Bali bombing.

He also warned of more attacks despite international counter-terrorism
efforts.

The Director-General of the Australian Security Intelligence
Organisation made the statement at a rare public appearance to address a
homeland security conference in Canberra.

http://www.ananova.com/news/story/sm_700471.html?menu= 

         ----------------------------------------------------

[10] 'Internal Look' to Test CENTCOM Command and Control Capabilities

By Kathleen T. Rhem
American Forces Press Service

WASHINGTON, Oct. 29, 2002 -- A joint exercise in early December will
test U.S. Central Command's ability to provide command and control from
a forward-deployed location.

Army Gen. Tommy Franks, CENTCOM commander, described Exercise Internal
Look in a Pentagon media briefing today.

"Combatant commands in our country have not, by and large, had
deployable command and control capabilities like their smaller
formations have for a long, long time," Franks said.

In militarese, such deployable command and control elements are called
TOCs (pronounced "tocks"), short for tactical operations centers.
CENTCOM will deploy one such TOC from its headquarters in Tampa, Fla.,
to the small Persian Gulf nation of Qatar beginning in late November.

The general described the TOC as "containers of communications gear,
very large communications pipes that we're able to put in the back of
an airplane, fly it a long ways, land it on the ground and then set up
a command and control complex."

Franks said the actual exercise period would be for a week to 10 days
in early December. Add deployment and tear-down time and U.S. forces
will be involved in the exercise for a month to six weeks, he said.

The TOC will be set up in Qatar to test its communications capabilities
to all forces in the Central Command area of operations. Franks said it
is important to verify the capability to talk to air, land, maritime
and special operations components.

No decision has been made concerning the disposition of the TOC after
Internal Look is finished, Franks said. He described three
possibilities: "Pack it all up" and bring it back to Tampa; leave the
components in Qatar with staff officers to man them; or bring the staff
officers home and leave a caretaker detachment with the TOC elements in
Qatar.

"And actually, we haven't decided yet which of those courses to take,"
Franks said.

         ----------------------------------------------------

[11] US may set up MI5-style spy agency in security shake-up
By Toby Harnden in Washington
(Filed: 31/10/2002) 


America is contemplating a radical overall of the FBI and the creation
of a domestic spying organisation modelled on Britain's MI5, according
to US intelligence sources.

Tom Ridge, President George W Bush's director of homeland security, will
hold talks in London next week focusing on the British experience of
combating the IRA over more than three decades.

http://www.telegraph.co.uk/news/main.jhtml;$sessionid$PYKEH33NMFIUPQFIQM
FCFF4AVCBQYIV0?xml=/news/2002/10/31/wfbi31.xml&sSheet=/news/2002/10/31/i
xworld.html

         ----------------------------------------------------

[12] Outlook bright for many e-tailers
10:30 Thursday 31st October 2002
Reuters    

Online retail stores look set to reap the rewards this holiday season
with sales looking brighter than ever 
The online retail industry has been under a cloud in recent years, with
scores of businesses folding as stubborn customers failed to embrace
what was to have been the sales channel of the future. 

Yet as holiday season 2002 approaches, several stores from Amazon.com to
Wal-Mart Stores' online division and a lot of smaller niche shops, are
looking forward to their brightest year ever. 

http://news.zdnet.co.uk/story/0,,t269-s2125065,00.html 

         ----------------------------------------------------

[13] Kournikova author loses appeal

According to media reports the author of the infamous Anna Kournikova
worm has lost an appeal against his sentence for writing and
distributing the virus in February 2001. The appeal took place at a
court in Leeuwarden at the beginning of this week.

Jan de Wit, aka OnTheFly, launched his appeal after being sentenced to
150 hours of community service by a Dutch district court last September.
It is reported that he contested the verdict due to fears that the
conviction would damage his career.

http://www.sophos.com/virusinfo/articles/kourappeal.html 

         ----------------------------------------------------

[14] Aust police, manufacturers in standoff over device security

By James Pearce, ZDNet Australia
30 October 2002

Australia's law enforcement agencies are refusing to disclose to
manufacturers when and how they breach the security systems of embedded
devices, to avoid changes being made to those systems, an Australian
Federal Police forensic specialist claims. 
Chris Buttner, a specialist with the AFP's Computer Crime Team, said
while most manufacturers of embedded devices are generally helpful when
asked how to extract information from their products to assist in a
case, cooperation in cracking the security features is less forthcoming.


http://www.zdnet.com.au/newstech/security/story/0,2000024985,20269472,00
.htm 

         ----------------------------------------------------

[15] Hacker continues trail of malice 
Author: Alastair Otter , ITWeb journalist

[ITWeb, 28 Oct 2002] A malicious hacker, going by the name r00t3rs,
continued to deface Web sites with a .co.za domain name last week. The
hacker has been linked to more than 30 Web site defacements over the
past two weeks.

The hacker tends to focus on Web sites hosted at hosting companies,
making it possible to compromise a much greater number of sites at a
time. So far he appears to have focused on two hosting companies, but
others may be targeted.

http://www.sundaytimes.co.za/business/technology/Tech2.asp

         ----------------------------------------------------

[16] Verizon settles lawsuit against spammer 

Thursday 31 October 2002  
 
The owner of a US commercial e-mail company has agreed to a permanent
injunction barring him from sending spam to customers of Verizon Online,
a unit of Verizon Communications.
 
Under the settlement, Alan Ralsky - whose company Additional Benefits is
thought to be one of the largest senders of bulk e-mail - will also have
to pay Verizon a monetary settlement. Bobbi Henson, a spokeswoman for
Verizon, declined to release financial details of the settlement. 

Henson said the injunction covers thousands of e-mail domain names owned
by Verizon, including verizon.net, verizon, and vzw.com. However, Henson
said the settlement does not include companies' Internet services that
are hosted by Verizon but who have their own domain names. 
 
http://www.cw360.com/bin/bladerunner?REQSESS=De57013&2149REQEVENT=&CARTI
=117084&CARTT=14&CCAT=2&CCHAN=28&CFLAV=1

         ----------------------------------------------------

[17] MasterCard to send anti-skimming cards to Australia

MasterCard International plans to make available to Australian banks in
the first or second quarter 2003 new technology designed to minimise a
type of credit card fraud known as card skimming, executives said this
week.

http://zdnet.com.com/2110-1106-963931.html 


         ----------------------------------------------------



_____________________________________________________________________

The source material may be copyrighted and all rights are
retained by the original author/publisher.

Copyright 2002, IWS - The Information Warfare Site
_____________________________________________________________________

Wanja Eric Naef
Webmaster & Principal Researcher
IWS - The Information Warfare Site
<http://www.iwar.org.uk>

---------------------------------------------------------------------

To subscribe - send an email to "[EMAIL PROTECTED]" with "subscribe
infocon" in the body

To unsubscribe - send an email to "[EMAIL PROTECTED]" with
"unsubscribe
infocon" in the body

---------------------------------------------------------------------




IWS INFOCON Mailing List
@ IWS - The Information Warfare Site
http://www.iwar.org.uk


Reply via email to