Create an Account
username: password:
 
  MemeStreams Logo

Spontaneous Sociability and The Enthymeme

search

Rattle
Picture of Rattle
Rattle's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Rattle's topics
Arts
  Literature
   Sci-Fi/Fantasy Literature
  Movies
  Music
Business
  Tech Industry
  Telecom Industry
Games
Health and Wellness
Holidays
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
Recreation
  Travel
Local Information
  SF Bay Area
   SF Bay Area News
Science
  Biology
  History
  Nano Tech
  Physics
  Space
Society
  Economics
  Futurism
  International Relations
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Security
Sports
Technology
  Biotechnology
  Computers
   (Computer Security)
    Cryptography
   Cyber-Culture
   PC Hardware
   Computer Networking
   Macintosh
   Linux
   Software Development
    Open Source Development
    Perl Programming
    PHP Programming
   Spam
   Web Design
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Computer Security

Breach case could curtail Web flaw finders
Topic: Computer Security 8:19 pm EDT, May  1, 2006

Security researchers and legal experts have voiced concern this week over the prosecution of an information-technology professional for computer intrusion after he allegedly breached a university's online application system while researching a flaw without the school's permission.

Find a bug. Report it. Have the U.S. Attorney claim in court that you are liable for the costs associated with fixing the bug. Go to Jail. Dave Aitel has it right... Retarded...

Breach case could curtail Web flaw finders


Forensic felonies - continued
Topic: Computer Security 10:44 pm EDT, Apr 27, 2006

dc0de has posted a what-if scenario which may pose a very serious problem with this bill. Are there any lawyers paying attention who can comment on this?

Here's a what if scenario if the GA HR 1259 get's passed...

1. I am asked to go to a friends house to look at something odd on his VPN connnection.

2. I discover that he is witnessing someone steal Intellectual property from the company HE works for.

3. He turns the thief into the his company, and explains that I identified the network traffic that brought this to their attention.

4. They take the thief to court, and I am called as a witness.

5. I am asked what I did to identify the traffic, and at this point, I'm in a Catch22.

Do I explain what I did and risk being charged with a FELONY as having performing forensics without a P.I. license?

-Or-

Do I plead the 5th Ammendment, and allow the thief to go free?

Also, what if I am "compelled" to give my testimony? What if the company makes a sworn statement that I was the one that helped identify the thief? Wouldn't I still be liable for performing forensics without a license?

Wow...I can't even HELP people anymore?

Now that's messed up.

Forensic felonies - continued


Forensic felonies
Topic: Computer Security 4:32 am EDT, Apr 27, 2006

A new law in Georgia on private investigators now extends to computer forensics and computer incident response, meaning that forensics experts who testify in court without a PI license may be committing a felony.

Coverage at Security Focus.

Forensic felonies


CNN.com - N.Y. county mandates wireless security - Apr 21, 2006
Topic: Computer Security 4:07 am EDT, Apr 24, 2006

New York's Westchester County has enacted a law designed to limit identity theft by forcing local businesses to install basic security measures for any wireless network that stores customers' credit card numbers or other financial information.

The law also requires that businesses offering Internet access -- coffeehouses and hotels, for example -- post signs warning that users should have firewalls or other security measures.

As he signed the bill, County Executive Andrew Spano said the county had been unable to find any law like it in the country and had received inquiries about the legislation from other states and from Great Britain, South Korea and the Czech Republic.

CNN.com - N.Y. county mandates wireless security - Apr 21, 2006


Georgia Law to put Computer Forensics experts in Jail -- HB 1259
Topic: Computer Security 12:02 am EDT, Apr 23, 2006

dc0de wrote:

For those of you who care about Computer Forensics, please see the current situation in Georgia.

There is a bill before the GA Legislature -- HB 1259

If passed, it will make it a Felony to perform and testify in a State Court about any computer forensics performed, unless you are a licensed Private Investigator.

This law will put honest, local companies out of business, unless they go and get licensed. Note, the GA requirements for a Private Investigator have NO REQUIREMENTS to have ANY computer forensics expertise, nor is there any training regarding how to collect the evidence.

Several other states already have these laws, which only allows Licensed private investigative services company to perform and testify to any computer forensics related evidence. (Note, this would also include any IT Audit records, not specifically limited in any way to performing "Encase" like hard drive forensics.)

If you live in GA, please contact the Govenor and ask that he VETO HB1259.

I have not been following this issue or had a chance to look into it in any depth.. I look forward to more information getting posted. This is something computer security professionals should pay attention to.

Update: Here is some more information. dc0de posted up an email he got from John Roberson of The Georgia Association of Professional Private Investigators, Inc. (GAPPI) (BYLAWS) (BoD) (CoE)

dc0de makes two observations which I find to be very accurate:

1. The fact that I have this email shows how little these people know about computer security and forensics.

2. The fact that they use a "secure" Yahoo Group to keep their members up to date, makes me chuckle as to what LITTLE prowess they have on the entire topic of Computer Security.

Again, I have not looked into this subject any length, so I can play the open minded guy, even though I'm pretty much positive which way this one is going to go. I see an attempted power grab taking place by some folks not worthy of that power. Locking the people who understand computer security out of the court system is not going to play over well with anyone who is has the ability to take a top down look at the situation from the perspective of global, national, state, or corporate security.

Update2: Read this about becoming a private investigator in Georgia, as compared to getting certified CISSP or EnCE. Ask yourself what is more relevant in a court situation, as it is the discourse which should be taking place.

Georgia Law to put Computer Forensics experts in Jail -- HB 1259


Wired News: Bug Bounties Exterminate Holes
Topic: Computer Security 2:05 pm EDT, Apr 17, 2006

Brokers that disclose bugs to their selected list of subscribers are necessarily withholding important information from the rest of the public. Brokers may eventually issue public advisories, but in the meantime, only the vendor and subscribers know about the problem.

An interesting discussion of bug brokers.

Wired News: Bug Bounties Exterminate Holes


InformationWeek | Security | The Fear Industry | April 17, 2006
Topic: Computer Security 2:03 pm EDT, Apr 17, 2006

In January, a vulnerability in WMF surfaced that let attackers use the Windows' graphics rendering engine that handles WMF images to launch malicious code on users' computers via these images. A number of security researchers posted information about the vulnerability to their mailing lists. Within a few hours, researcher H.D. Moore posted a working example of a WMF exploit--a piece of code written to take advantage of a software flaw--on his Metasploit Web site. Some defended the action, saying it offered insight into the rules security pros needed to put on intrusion-detection systems to avoid getting hit. Others argued that what Moore did enabled the average hacker to more easily exploit the flaw.

Information Week published a long, sensational, and patently dishonest article on security research today. This text makes it seem as if malware authors used the information H.D. Moore published. The fact is that this vulnerability was being exploited by criminal organizations in the wild before anyone in the security research community knew about it. The article fails to make this fact clear because it doesn't fit into the narrative that the reporter is aiming for and undermines the questions the reporter is raising. Would any major news media organization be interesting in a peice that discusses whether intentially dishonest reporting is good or bad for society?

InformationWeek | Security | The Fear Industry | April 17, 2006


Microsoft Opens IE Bug Database!!!
Topic: Computer Security 11:05 am EST, Mar 28, 2006

You know that scene in Die Hard when Alan Rickman and crew finally gets the vault open? Remember how Fur Elise starts playing and the robbers see stacks and stacks of bearer bonds? This is totally like that.

Microsoft Opens IE Bug Database

Users will be able to report bugs found in the Web browser.

To post or view bugs, users must sign up for a Passport account on the Microsoft Connect Web site.

"Many customers have asked us about having a better way to enter IE bugs. It is asked, "Why don't you have Bugzilla like Firefox or other groups do?" said the Microsoft blog post.

Microsoft is only accepting bug posts for Internet Explorer 7 and future versions.

This is interesting. IE 7 is a 1.0 product in a 7.0 wrapper. There are going to be lots of bugs MS's QA department just didn't get to. More importantly, there will be more bugs than they can fix. There will be a backlog that is ripe for 0day.

This will make for interesting things in the Layer 7 world.

Microsoft Opens IE Bug Database!!!


RFID Viruses: Is your cat infected with a computer virus?
Topic: Computer Security 6:56 pm EST, Mar 15, 2006

The prankster decides to unwittingly enlist his cat in the fun. The cat has a subdermal pet ID tag, which the attacker rewrites with a virus using commercially available equipment. He then goes to a veterinarian (or the ASPCA), claims it is stray cat and asks for a cat scan. Bingo! The database is infected. Since the vet (or ASPCA) uses this database when creating tags for newly-tagged animals, these new tags can also be infected. When they are later scanned for whatever reason, that database is infected, and so on. Unlike a biological virus, which jumps from animal to animal, an RFID virus spread this way jumps from animal to database to animal.

I ignored this article this morning but its actually pretty cool. SQL injection, CSS, and buffer overflows from data stored in RFIDs is a vector that few people have really looked at. I wonder if the new U.S. Passports are vulnerable?

RFID Viruses: Is your cat infected with a computer virus?


Slashdot | Interview With Cryptographer Elonka Dunin
Topic: Computer Security 8:19 pm EST, Mar 14, 2006

"Whitedust is running a very interesting article with the DEF CON speaker and cryptographer Elonka Dunin. The article covers her career and specifically her involvement with the CIA and other US Military agencies."

Elonka continues to prove why she is the most famous user on MemeStreams. Rumor also has it she has been accepted into the Industrial Memetics Institute...

Go Elonka! I truly cannot wait till I have a copy of her upcoming book. I expect it to be very well recieved by a very wide audience. I think the result will be suprising...

Elonka should wind up on the talk show circut. We need to get Elonka on Oprah after her book comes out! It's imperative.

Slashdot | Interview With Cryptographer Elonka Dunin


(Last) Newer << 8 - 9 - 10 - 11 - 12 - 13 - 14 - 15 - 16 - 17 ++ 27 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0