Subject: Infowar Digest 051399 Date: Thu, 13 May 1999 16:19:09 -0400 From: "Betty G.O'Hearn" To: infowar@infowar.com T H E I N F O W A R D I G E S T Brought to you by: Axent -http://www.axent.com Comsec Information Security - http://www.comsec.co.il Compu-lock - http://www.compu-lock.com Ensure Technologies - http://www.ensuretech.com Intermute Inc.- http://www.intermute.com/ Memco Software - http://www.memco.com Signal9 - http://www.signal9.com Trustech Ltd. - http://www.truster.com Tamos- http://www.tamos.com WinWhatWhere - http://www.winwhatwhere.com ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 1) Some interesting "What's New" 2) Warroom Research on the Gordon Liddy Show 3) Product info 4) New Book: "Cyberspace And The Use of Force" 5) Infowar wants your input on "Internet Crime Watch" 6) Contact Information: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 1) Some Interesting What's New" Echelon: Interception Capabilities 2000 http://www.infowar.com/class_2/99/class2_051199b_j.shtml Army to Offer Survival Training http://www.infowar.com/mil_c4i/99/mil_c4i_051099a_j.shtml Web Site Privacy Improves http://www.infowar.com/class_1/99/class1_051299b_j.shtml Get a Cable Modem - Go To Jail http://members.home.net/maycomp/cablemodem.htm Encryption Ruling http://www.info-sec.com/crypto/99/crypto_051299a_j.shtml Europarliment OK's Internet Tap Resolution http://www.infowar.com/class_1/99/class1_051099b_j.shtml NASA Centers Fail to Report Cyber Attacks http://www.infowar.com/hacker/99/hack_051099e_j.shtml The Case of the UnHappy Hacker http://www.infowar.com/hacker/99/hack_051099g_j.shtml Check out more "What's New" at: http://www.infowar.com/new_iwc/new_iwc.shtml ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2) From: "Mark Gembicki" To: Betty@infowar.com Subject: G.Gordon Liddy Show Date: Mon, 10 May 1999 11:08:55 -0400 Steve Shaker and I will be on the G. Gordon Liddy Show this Friday, from 12:15 to 1:00pm EST. The topics will center around The WarRoom Guide to Competitive Intelligence. The book is selling strong and has since soared to be the 587th most popular book sold on Amazon.com. Tune the radio dial to FM 106.7 or AM 1300 in the Washington-Baltimore area. National stations can be found at http://www.rtis.com/liddy/radio.htm. Take care, Mark MARK GEMBICKI, Chairman & Chief Technology Officer WarRoom Research Inc. 401 Defense Highway, Annapolis, Maryland 21401 USA http://www.warroomresearch.com tel 410.571.1080 fax 410.571.1081 NEWS: Computerworld places WarRoom on top 20 IT visionary list The WarRoom Guide to Competitive Intelligence in bookstores ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 3) Product Info At infowar we are approached to put things in the store that have not only value but are very "boutique" in their application. Working with different vendors, expecially smaller ones, who have the well rated undersold products due to the major software giants...we are trying to bring them out. We are not trying to sell you anything. All of the products work. We use them. Just take a look ! Between Us-- everybody is so paranoid that big brother is listening... every conversation is monitored in the Internet world. This product allows secure and encrypted communication between two or more parties. Smart Who Is- if your an e-comm business and have to research your customers-, or just finding out the "scoop" on someone, sometimes NS lookup is impossible to resolve. This product will do it! It should be a part of every toolkit of the cyber sleuth, e-comm merchent, etc. Intermute - is a quick product that makes the surfing experience a pleasure, quicker and less hostile. Compu-lock- a cheap way to minimize theft of your laptop using NoteSaver. Truster and Truster Pro--- will be THE product in the years to come. TrusterPro is being placed in one of the Fortune 10 companies that will be utilizing the product in their callcenters to decrease loss and increase deception detection. The product discerns deception. So the next time someone in collections calls you... remember that TrusterPro is around! XyLoc - guards your computer after logon with outstanding security and unparalleled convenience. Simply approach your computer, XyLoc recognizes you and logs you on to the PC and the network. Win-What-Where - Investigator's unique ability to invisibly monitor and record all keyboard activity in absolute stealth mode and email logs if that is the option you select. Last week we had someone buy the product to log his wife with her many "IRC" friends. ( LOL!!) That is all I will say on that one! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 4)CYBERSPACE AND THE USE OF FORCE by Walter Gary Sharp, Sr. CYBERSPACE AND THE USE OF FORCE focuses specifically on one of the most challenging, contentious, and important issues in international law: how to determine what constitutes a use of force between states in CyberSpace under the contemporary international law paradigm of conflict management defined by the Charter of the United Nations. This text provides a detailed analysis of existing international law and state practice that reveals which state activities in CyberSpace may constitute a use of force and an armed attack that invokes a state's right to use force in self-defense. Though referenced in detail for lawyers, this text provides the necessary legal background to make it a useful desk reference for government officials, military operators, students, and others who are interested in the application of international law in CyberSpace. More info: go to www.aegisresearch.com Now available in 6" x 9" soft cover format with 234 pages. Order from www.aegisresearch.com or call 703-847-6070. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 5) Internet Crime Watch We want your feedback. What do you think about an "Internet Crime Watch." This concept models the neighborhood crime watch. It would be interesting to see what comes from, fed, corporate, and the consumer victim base of the Internet. Every and anyone from Cyberspace "crime watchers" to whatever could use for example www.china.com as a reporting email mechanism that is for the most part anonymous. US has no jurisdiction or treaties where china.com is domiciled and therfore would allow the victims of the Internet to report as well as Infowar using its journalistic priviledge of keeping reports confidential. This would also give a second level of confidentiality. It is time for the abused, victims, and whistleblowers to finally have a voice. We need your help. What do you think? Reply to crimewatch@infowar.com. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 6) Contact Information Infowar.Com Ltd. 11125 Park Blvd. MS 104-215 Seminole, FL 33772 727-556-0833 voice 727-556-0834 fax Hacking News Tips: hacknews@infowar.com Technology Issues/Product Questions technology@infowar.com Security Issues/Security Advisor security@infowar.com Winn Schwartau winn@infowar.com Betty O'Hearn betty@infowar.com Roving Fed feur@infowar.com Complaints? Suggestions? infowar@infowar.com ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subscriptions or Changes to Your Subscription: DIRECT REQUESTS to: list@infowar.com with one-line in the BODY Subscribe infowar or Unsubscribe infowar Please DO NOT reply to this email to unsubscribe. ***************************************************** PERMISSION IS GIVEN TO DISTRIBUTE WIDELY ***************************************************** Infowar Digest 051399