1
news true pinnacle of excellence,” it says. The strategy is one that frightens America because although they have impressive military capability, they feel vulnerable to information warfare. And they are not the only ones. Microsoft hack is threat to nations A report states that the October attack on Microsoft Corporation could “pose grave national-security- related concerns”. The report in question is the Cyber Threats and Information Security: Meeting of the 21st Century Challenge from the Center for Strategic and International Studies (CSIS). It warns that both the public and private sector should be wary of Microsoft’s products. “It is doubtful that the millions (sometimes billions) of lines of code required to power Microsoft’s products could readily be sanitized,” it states. The reliance of military and Government systems on these, and other off-the-shelf products is a concern to national security, say CSIS. Microsoft disagrees. A spokesperson said that the report, “Sensationalizes the inci- dent and mis-states the facts in a number of important ways.” They explain that, “There is no evidence…we have no reason to believe that the intruders were able to see Windows or Office source code, much less modify it. Microsoft’s current and future products remain intact and secure.” CSIS reported, “Whoever stole proprietary secrets at the heart of the ubiquitous Windows program can hack into the any PC in the world that uses it and is connected to the Internet.” Microsoft products will remain a powerful hacker magnet because of their continued popularity. If the report is indeed accurate, there will be serious international repercussions. IT giants team up to fight threat of 'cyber-terrorism' Big players Microsoft, Oracle, Intel, AT&T and 15 others have formed a cyber- terrorism fighting club. It is called the Information Technology Information Sharing and Analysis Center (IT-ISAC). The basic premise is that the large corporations will pool information on their hardware and software vulnerabilities, as well as sharing what they know about new hacking threats. All this is to be done for the greater good of E-commerce in a united stand against cyber-terrorists. Information will also be passed on the US Government. Mary-Ann Davidson from Oracle explained that, "No man is an island. And nowhere is this more apparent than in protecting the nation's infrastructure… Every one of us has been or will be attacked in cyberspace, a threat against one is truly a threat against all." The IT-ISAC is a not-for- profit organization which is run by the Internet Security Systems. It will disseminatein- formation to its members 24/7. Members paid $750 000 in total to join, and new recruits will be charged $5000. Although this seems to be a noble cause and a good idea in theory, there is cause to won- der whether, at the end of the day, Microsoft and Oracle, or example, will be able to live in harmony. They do not seem to be able to do this in the com- petitive environment, as proven by the incident where Oracle admitted to going through Microsoft's bins to try and uncover secrets. EU to fight spam Spam is one of the biggest problems on the Internet, and it was the focus of the European Union's first meet- ing to discuss privacy on the Net. At the moment, the onus is on self regulation, however, judging by the amount of unsolicited E-mails we all receive, this approach is not working. At a Federal Trade Commission (FTC) meeting in December there was much debate over whether disclosure of location information should be 'opt-in' — you must specify that you want the information to be given out — or 'opt-out' (data will we given out unless you say otherwise). A spokesman from privacy group, the Electronic Privacy Information Center said, "We seem to be moving toward an agreement...that the standard should be 'opt-in'." This seems to be in the pub- lic interest. The FTC agree that there should be some standard, but made it clear that they "are very big fans of self-regulation...it makes our lives easier," said Joel Winston from the FTC's consumer protection arm. Erkki Liikanen is the man in charge of 'information society initiatives' in the EU. He pro- poses to extend existing priva- cy legislation, from 1997, which applies to unsolicited phone calls, to cover spam. The problem with banning spam outright is that there are a number of worthy excep- tions. These include govern- ment run mailing lists in case of emergencies such as national safety or severe weather warnings and advice. It is good that the EU is fol- lowing the lead of the US in this matter. Clearly, self-regu- lation is proven to be ineffec- tive at preventing spam and therefore it is time for some- one to set some standards. eBay spams its customers Online auction site eBay will begin marketing to registered customers who have asked not to be. Some 6 million customers who registered last year between April and November will begin receiv- ing calls and mail from 23 January. The site has explained that although it conscientiously asked questions during 3 Privacy News

IT giants team up to fight threat of ‘cyber-terrorism’

  • View
    212

  • Download
    0

Embed Size (px)

Citation preview

Page 1: IT giants team up to fight threat of ‘cyber-terrorism’

news

true pinnacle of excellence,” itsays.

The strategy is one thatfrightens America becausealthough they have impressivemilitary capability, they feelvulnerable to informationwarfare. And they are not theonly ones.

Microsoft hack isthreat to nations

A report states that the October attack onMicrosoft Corporation could“pose grave national-security-related concerns”.

The report in question is theCyber Threats and InformationSecurity: Meeting of the 21stCentury Challenge from theCenter for Strategic andInternational Studies (CSIS).It warns that both the publicand private sector should bewary of Microsoft’s products.“It is doubtful that the millions (sometimes billions)of lines of code required topower Microsoft’s productscould readily be sanitized,” itstates.

The reliance of military andGovernment systems on these,and other off-the-shelf products is a concern tonational security, say CSIS.

Microsoft disagrees. Aspokesperson said that thereport, “Sensationalizes the inci-dent and mis-states the facts in anumber of important ways.”They explain that, “There is noevidence…we have no reason tobelieve that the intruders wereable to see Windows or Officesource code, much less modifyit. Microsoft’s current andfuture products remain intactand secure.”

CSIS reported, “Whoeverstole proprietary secrets at theheart of the ubiquitousWindows program can hackinto the any PC in the worldthat uses it and is connected tothe Internet.”

Microsoft products willremain a powerful hackermagnet because of their continued popularity. If thereport is indeed accurate, therewill be serious internationalrepercussions.

IT giants team upto fight threat of'cyber-terrorism'

Big players Microsoft, Oracle,Intel, AT&T and 15 othershave formed a cyber-terrorism fighting club.

It is called the InformationTechnology InformationSharing and Analysis Center(IT-ISAC).

The basic premise is that thelarge corporations will poolinformation on their hardwareand software vulnerabilities, aswell as sharing what theyknow about new hackingthreats.

All this is to be done for thegreater good of E-commercein a united stand againstcyber-terrorists. Informationwill also be passed on the USGovernment.

Mary-Ann Davidson fromOracle explained that, "Noman is an island. Andnowhere is this more apparentthan in protecting the nation'sinfrastructure… Every one ofus has been or will be attackedin cyberspace, a threat againstone is truly a threat againstall."

The IT-ISAC is a not-for-profit organization which isrun by the Internet SecuritySystems. It will disseminatein-formation to its members24/7. Members paid $750 000in total to join, and newrecruits will be charged$5000.

Although this seems to be anoble cause and a good idea intheory, there is cause to won-der whether, at the end of theday, Microsoft and Oracle, orexample, will be able to live inharmony. They do not seem tobe able to do this in the com-petitive environment, asproven by the incident whereOracle admitted to goingthrough Microsoft's bins totry and uncover secrets.

EU to fight spam

Spam is one of the biggestproblems on the Internet,and it was the focus of theEuropean Union's first meet-ing to discuss privacy on theNet.

At the moment, the onus ison self regulation, however,judging by the amount ofunsolicited E-mails we allreceive, this approach is notworking.

At a Federal TradeCommission (FTC) meeting inDecember there was muchdebate over whether disclosureof location information shouldbe 'opt-in' — you must specifythat you want the informationto be given out — or 'opt-out'(data will we given out unlessyou say otherwise).

A spokesman from privacygroup, the Electronic Privacy

Information Center said, "Weseem to be moving toward anagreement...that the standardshould be 'opt-in'."

This seems to be in the pub-lic interest. The FTC agreethat there should be somestandard, but made it clearthat they "are very big fans ofself-regulation...it makes ourlives easier," said Joel Winstonfrom the FTC's consumerprotection arm.

Erkki Liikanen is the man incharge of 'information societyinitiatives' in the EU. He pro-poses to extend existing priva-cy legislation, from 1997,which applies to unsolicitedphone calls, to cover spam.

The problem with banningspam outright is that there area number of worthy excep-tions. These include govern-ment run mailing lists in caseof emergencies such asnational safety or severeweather warnings and advice.

It is good that the EU is fol-lowing the lead of the US inthis matter. Clearly, self-regu-lation is proven to be ineffec-tive at preventing spam andtherefore it is time for some-one to set some standards.

eBay spams itscustomers

Online auction site eBay willbegin marketing to registeredcustomers who have askednot to be. Some 6 millioncustomers who registered lastyear between April andNovember will begin receiv-ing calls and mail from 23January.

The site has explained thatalthough it conscientiouslyasked questions during

3

Privacy News

feb2001.qxd 26/01/01 13:59 Page 3