Loading ...
Sorry, an error occurred while loading the content.


Expand Messages
  • Fred Cohen
    REUTERS LONDON, June 30 - Interpol is to provide intelligence to a private Website to help businesses defend themselves against global cyber-crime, the company
    Message 1 of 196 , Jul 2, 2000
    • 0 Attachment

      LONDON, June 30 - Interpol is to provide intelligence to a private
      Website to help businesses defend themselves against global cyber-crime,
      the company involved said.

      ATOMIC TANGERINE, an independent U.S. venture consulting firm, said
      the organization that groups 178 national police forces had agreed to
      pass on relevant information about hacking, stolen goods, fraud and
      other dangers to corporate health.

      It will be made available for free to any bona fide company.

      In return, Atomic Tangerine will pass on to Interpol information
      it gathers from extensive monitoring of the Internet by computers and
      its team of researchers.

      Chief Executive Jonathon Fornaci, keen to stress tip-offs would
      flow in both directions, said his Net Radar service had already tipped
      off authorities about a Pakistani Internet service provider that had
      been taken over by Western hackers, without being noticed, in order to
      launch Web attacks. Advertisement

      Fornaci, in London, told Reuters the idea began at an Internet
      Defence Summit, organized by Atomic Tangerine in California's Silicon
      Valley last month, where Interpol Secretary General Raymond Kendall
      pledged cooperation with major corporations.

      "The private sector must defend itself because government
      agencies do not have the technology to do the job," Kendall said.
    • Fred Cohen
      Terrorist Web Site Hosted by U.S. Firm The political ideology of the Hamas site, which refers to recent suicide attacks in Israel as the martyr brigade, is
      Message 196 of 196 , Apr 4, 2002
      • 0 Attachment
        Terrorist Web Site Hosted by U.S. Firm The political ideology of the
        Hamas site, which refers to recent suicide attacks in Israel as the
        'martyr brigade,' is not illegal, according to most analysts. A Web
        site glorifying recent suicide attacks in the Middle East that is hosted
        by a U.S. company is sparking legal and ethical questions about whether
        Internet service providers and hosting companies should be held
        accountable for content on their networks and Web pages.

        FBI will use 'electronic tripwires' to protect secrets Tighter security
        against possible spies inside the FBI will require sophisticated
        ``electronic tripwires'' activated when employees try to review
        off-limits secrets, says a former FBI and CIA director. The tripwires
        ``will make it more difficult (for spies) in a deterrent sense --
        knowing they'll be more apt to be observed,'' said William H. Webster,
        who led a commission of experts investigating security inside the FBI
        after the February 2001 arrest of agent Robert Hanssen.

        Securing the cyber front Last year=92s spate of hacker attacks, viruses
        and worms shed light on the nation=92s poor state of information
        security--and the government=92s inability to shore it up. After Sept.
        11, the state of the country=92s cyber security seemed even more
        vulnerable to an even wider range of threats, and the White House
        stepped forward with what seemed like a bright idea to secure the cyber
        front. http://www.govexec.com/dailyfed/0402/040202ti.htm

        Clarke: IT security is 3 to 5 years away The president=92s proposed
        fiscal 2003 budget puts much-needed money behind efforts to improve IT
        security, presidential cybersecurity adviser Richard Clarke told
        industry representatives at FOSE 2002. =93The history of government
        trying to achieve IT ecurity is a sad one,=94 Clarke said. =93We have
        to tart putting our money where our policy is.=94

        Army security expert emphasizes vigilance and training A computer
        scientist from the National Infrastructure Protection Center yesterday
        urged agency officials to return to the basics of security and guard
        against cyberattacks by IT insiders. Robert M. Wright, on loan to
        NIPC=92s Special Technology Application Unit from the Army, said
        today=92s insiders are the people who are allowed onto an agency=92s
        network. Such insiders bring in tools ranging from hard drives the size
        of key chains to anonymous remailers, steganography=97hiding messages
        within digital images=97peer-to-peer applications, and infrared and
        radio wireless devices.

        Better management key to fighting cyber attacks The greatest
        technologies in the world will not shield federal agencies from cyber
        attacks unless they require more involvement from their senior managers
        and improve on educating their employees about computer security,
        several high-ranking federal information technology officials said
        Wednesday. "IT security is really a question of accountability," said
        Daryl White, the Interior Department's chief information officer, during
        a conference sponsored by the National High Performance Computing and
        Communications Council. "You can't hold firewalls and intrusion
        detection systems accountable. You can only hold people accountable."

        Support For Government Surveillance Slips Support for expanded high-tech
        government surveillance gradually has diminished during the six months
        following the Sept. 11 terrorist attacks, new Harris Poll figures show.
        While a majority of Americans continue to favor expanded surveillance by
        law agents in the war against terror, the poll shows that support has
        declined modestly. In one category =96 expanded government surveillance
        of cell phone and e-mail traffic =96 supporters now are in the minority,
        the poll indicates. http://www.newsbytes.com/news/02/175641.html

        Death to Old Software We all know that outdated network software is
        security hazard. The solution: hard-wired expiration codes that
        self-destruct an ld program when it's past its prime. Software lives
        forever. This is its blessing and its curse. It's a blessing, of
        course, because it's what separates software from automobiles, houses,
        electron microscopes, and other marvels of engineering: no wind and rain
        to make code rust, and software has no moving parts to wear out.

        --This communication is confidential to the parties it is intended to serve--
        Fred Cohen Fred Cohen & Associates.........tel/fax:925-454-0171
        fc@... The University of New Haven.....http://www.unhca.com/
        http://all.net/ Sandia National Laboratories....tel:925-294-2087
      Your message has been successfully submitted and would be delivered to recipients shortly.