March 14, 2002 'Dear Abby' Letter Prompts Arrest A man who wrote to "Dear Abby" for advice on how to handle his fantasies about having sex with girls was charged Wednesday with possessing child pornography after the columnist turned him in, authorities say. Paul Weiser, 28, was charged with three counts of possession of child pornography. He was ordered release on $10,000 bail on the condition he avoid computers and contact with anyone under 18. Police said 40 pornographic photographs of children were found in his computer after his arrest Monday. - - - - - - - - Former cadet at VMI found guilty on charges for child pornography Cameron Russell Rex, 21, of Illinois faces up to 20 years. Former cadet at VMI found guilty on charges for child pornography. Rex had configured a computer to allow other computer users to upload pictures and movie files and download files as well. A former Virginia Military Institute cadet who used the college's computer network to trade child pornography is facing up to 20years in prison. Cameron Russell Rex, 21, of Evanston, Ill., was convicted Monday of two counts of possession of child pornography with intent to distribute. Each count carries a possible sentence of one to 10 years. Six other counts were not prosecuted. - - - - - - - - Japanese worm on Net rampage A fast-spreading e-mail worm, possibly from Japan, is encircling the globe and flooding e-mail servers with excessive messages. Fbound (w32.fbound.c@mm, also known as Zircon.C, DotJayPee, Fbound.b) is 12,288 bytes in length, and, unlike other recent worms, does not install itself on the infected machine but instead runs from memory. Mac and Linux users are not affected. Fbound is capable of sending large amounts of e-mail but does not damage or delete files on the infected computer. Because of the increasing reports of this worm around the world, Fbound currently ranks a 6 on the ZDNet Virus Meter. - - - - - - - - Hacker's evidence can be used in porn case The cyber-vigilante who stole child pornography from a Chesterfield County [Va.] man's computer acted on his own, and "the government is not required to look a gift horse in the mouth," a federal judge ruled yesterday. The ruling by U.S. District Judge Richard L. Williams means federal prosecutors can use the evidence, including more than 200 images, that they seized from William Adderson Jarrett's computer in the case against him. - - - - - - - - White-Collar Criminals -- Enough Is Enough They lie they cheat they steal and they've been getting away with it for too long. Arthur Levitt, the tough-talking former chairman of the Securities and Exchange Commission, spoke of a "multi-tude of villains." Red-faced Congressmen hurled insults, going so far as to compare the figures at the center of the Enron debacle unfavorably to carnival hucksters. The Treasury Secretary presided over a high-level working group aimed at punishing negligent CEOs and directors. Legislators from all but a handful of states threatened to sue the firm that bollixed up the auditing, Arthur Andersen. There was as much handwringing, proselytizing, and bloviating in front of the witness stand as there was shredding behind it. Schemers and Scams: A Brief History of Bad Business - - - - - - - - D.I.R.T. Spyware Exposed on Web Software marketed as a computer surveillance tool for law enforcement investigators has its secrets laid bare on an anonymous Web site. A closely-held software package designed to allow law enforcement agencies to secretly monitor a suspect's computer turned up on an anonymous Web site in the Netherlands Wednesday, along with user manuals, financial information, contracts and invoices apparently stolen from the company that makes the surveillance tool. Law-enforcement DIRT Trojan released - - - - - - - - Qwest CEO to head security group Joe Nacchio, chief executive of Qwest Communications International, was appointed chairman of President George W. Bush's National Security Telecommunications Advisory Committee (NSTAC), the company announced Wednesday. Nacchio was tapped in 2001 as vice chairman of NSTAC, which is a group of 30 telecom and technology CEOs that provides advice and analysis to the president and other government officials on matters of national security such as how to safeguard the nation's telecom infrastructure and protect critical information. - - - - - - - - Secret Service Combats Cybercrime The Secret Service was mandated by the USA Patriot Act to establish a nationwide network of Electronic Crimes Task Forces, modeled after the Secret Service's New York electronic crimes office. So far, eight have been implemented. The task forces mark a new direction for the Secret Service. That direction involves a more inclusive approach to crime fighting that invites industry and academia to join law enforcement in attacking cybercrime. The experts on these task forces have already worked on some high-profile cases.,24195,3376038,00.html - - - - - - - - Microsoft-DOJ: A crime-fighting team? Microsoft Chief Executive Steve Ballmer, whose company has been at odds with the U.S. government over antitrust violations, said on Thursday it was working closely with the Justice Department to fight cybercrime. "As we think about private and public partnerships, we have to say that this (partnership) is key," said Ballmer, as he outlined the dangers of cybercrime to the European Policy Center, a private think-tank. "We've worked very closely, for example, with the Department of Justice in the United States to get additional funding for FBI efforts to target cybercrime," he said. - - - - - - - - VA still struggling with security The Department of Veterans Affairs has taken major strides toward creating a modern infrastructure but still has a long way to go to protect its computer systems and sensitive data about veterans, according to a General Accounting Office report released March 13. Listing both the good marks and the failing ones, GAO said the agency has benefited from VA Secretary Anthony Principi's commitment to strengthening information technology. It has taken key steps to lay the groundwork for enterprise architecture a blueprint for its information systems and has worked hard to strengthen information security management."However, VA continues to report pervasive and serious information security weaknesses," the report said. - - - - - - - - Morpheus lures artists with no-copy plan StreamCast Networks, the creator of the popular Morpheus file-trading software, is set to unveil a plan Thursday that it hopes will help it become a more legitimate means of music distribution. The company is adding new digital rights management, or anti-copying technology, to its set of software and services. It's calling for independent artists to distribute their work through the Morpheus file trading network, using this technology to help solicit payment for their work and guard against piracy. - - - - - - - - Piracy, or Innovation? It's Hollywood vs. High Tech Leaders of two of the nation's most prominent industries, entertainment and technology, have begun publicly sniping at each other over how to stop consumers from illegally copying digital movies, music and television programs. The feud grows out of Hollywood's frustration with the illicit flow of copyrighted works over the Internet. Despite courtroom victories against Napster and others deemed to contribute to Internet piracy, millions of people continue to download free digital copies of everything from Jennifer Lopez's latest hit single to the Disney movie "Monsters, Inc." Senate Won't Act On Digital Content Bill - Lawmaker Tech execs lash into piracy proposals - - - - - - - - Microsoft's borrowed code may pose risk A security flaw in open-source software used by Linux and Unix systems for compression may affect some Microsoft products that also use the code. As reported earlier this week by CNET, a flaw in the zlib software-compression library could leave much of the systems based on the open-source operating system Linux open to attack. On Thursday, researchers reported that at least nine of Microsoft's major applications--including Microsoft Office, Internet Explorer, DirectX, Messenger and Front Page--appear to incorporate borrowed code from the compression library and could be vulnerable to a similar attack. - - - - - - - - Check Point launches firewall for PDAs Israeli Internet security company Check Point Software on Thursday launched a line of new products that will protect wireless Web surfing using handheld computers. The company said in a statement that it worked on its new line, which includes a personal firewall, with input from Microsoft, Intel, Hewlett-Packard, Compaq Computer and others. Check Point unveiled the line at the CeBit conference in Hannover, Germany. It said that the products provide security to personal digital assistants and handheld personal computers that are powered by Microsoft Windows. Initially, the products will support PDAs and handheld PCs made by Compaq and HP. - - - - - - - - Cable Modem Hacking Tricks Uncapped Online When his cable modem service seemed to slow almost to a crawl last spring, Matthew Hallacy did like most people and complained to technical support at his Internet service provider, AT&T Broadband. But after the sluggish performance persisted for weeks, Hallacy, a Minnesota-based software engineer and networking expert, decided to take matters into his own hands: he hacked his cable modem. - - - - - - - - Defending the Enterprise: The Antivirus War Companies increasingly are hedging their bets by using multiple virus scanners in an effort to be sure they are as thoroughly covered as possible. Over the past 18 months, enterprises have devoted more IT resources than ever before to antivirus protection in order to combat the blitz of viruses, worms and Trojan horses that terrorize their networks on a daily basis. - - - - - - - - With security, you get what you pay for When it comes to security, you get what you pay for. Most consumers won't purchase a $50 electronic device without looking for an Underwriter's Laboratory sticker, yet they purchase software at a thousand times the price that they use for running their enterprises, with no consideration of product security mechanisms. Everyone wants to use the Internet to securely connect partners and customers directly to their systems, but in this environment, it's not just the technical security measures that are important, it's the confidence you can place in those measures. - - - - - - - - Is Spam Choking E-Commerce? Financial institutions stand to gain or lose about $60 billion worth of business in the next two years based on privacy concerns, Forrester's Clemmer said. To most online consumers, receiving unwanted e-mail marketing messages is just part of being online. Like offline junk mail, it is something people do not like but have learned to live with. But analysts say there is a price to pay for too much spam, and e-commerce may have to foot some of the bill. "Privacy continues to be something that consumers say is holding them back," Forrester analyst Christopher Kelley told the E-Commerce Times. "It's always one of the first answers to the question of why more people aren't online." *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2002,, Campbell, CA.