May 13, 2002 Littleton man held in teen-age sex sting The owner of a Littleton gymnastics academy was arrested Friday after he allegedly paid an undercover detective $400 to arrange sex with two teen-age girls. Steven T. Siegel, 38, was being held in the El Paso County Jail on suspicion of soliciting for child prostitution, attempted sexual exploitation of a child and attempted sexual assault on a child.,1299,DRMN_15_1140674,00.html - - - - - - - - Former corrections officer sentenced for misusing FBI system Gary Piedmont of Reynoldsburg, Ohio, was sentenced to 30 days of community confinement, a $5,000 fine and a year of probation for using the FBIs National Crime Information Center system to check whether a warrant had been issued for a friend. - - - - - - - - Kansas Teen Sentenced After Hackings A Kansas teenager has pleaded guilty to hacking the official Web site of Stockton, Calif. and telling city officials he would secure it if they gave him a laptop computer. Matthew Kroeker, 18, was sentenced to serve two years probation and pay at least $18,000 restitution, his attorney Kevin Moriarty told Newsbytes. Kroeker pleaded guilty to four felony counts of computer crime in Johnson County District Court last week. - - - - - - - - Supreme Court partially upholds law to shield children from online smut The Supreme Court partly upheld a law intended to shield children from online pornography, but said on Monday that there are unresolved free speech questions that prevent the law from taking effect now. High court remands online porn case to appeals court Kid Smut Law Needs More Work,1283,52478,00.html Creating children's zone online easier said than done - - - - - - - - Argentine judges want law update after crackers walk free Argentina's top judges are calling for an update in the country's laws on computer crime after the collapse of a trial involving crackers who allegedly defaced the country's Supreme Court Web site. Last month, Argentine Federal Judge Sergio Torres threw out the case of a group of defacers, called the X-Team, who were suspected of altering the Web site as part of a protest over the 'cover-up' by judges of the murder of magazine journalist Jose Luis Cabezas. - - - - - - - - Does new Europe law mean slammer for DRM crackers? Forthcoming EU legislation could criminalise Europeans who circumvent copyright protection. Fears that the pending European Union Copyright Directive could lead to a European re-run of the Dmitri Sklyarov prosecution were much in evidence during the recent Campaign for Digital Rights mini-conference at London's City University. - - - - - - - - Credit Card Theft Thrives Online as Global Market Tens of thousands of stolen credit-card numbers are being offered for sale each week on the Internet in a handful of thriving, membership-only cyberbazaars, operated largely by residents of the former Soviet Union, who have become central players in credit- card and identity theft. The market-places where credit card prices fluctuate with supply and demand in a sort of black stock market offer a window into a crime that costs the financial system $1 billion or more a year. They also show how readily personal information is being stolen and traded in the computer age. (NY Times article, free registration required) Rampant trade of stolen credit-card numbers shows lack of security. - - - - - - - - ID thieves mine for gold on jail sites Online public records give Social Security numbers and more. If keeping Social Security numbers off the Internet is a bit like trying to plug holes in a leaky dam, the U.S. justice system has left a floodgate open. Dozens of law enforcement Web pages list names, addresses, dates of birth, Social Security numbers, heights and weights everything an identity thief needs to impersonate a victim. Sometimes theres even a photo. The dossiers belong to prison inmates and wanted criminals; the sites that list them have become user-friendly shopping malls for identity thieves. More Court Files Online - - - - - - - - Army layers security blankets to guard networks Shortly after a military surveillance plane collided with a Chinese fighter last April, a two-week 'cyberwar' began, and U.S. Army Web sites took numerous hits. More than 50 Web pages were defaced by an automated attack launched by supporters or agents of the PeopleOs Republic of China. The hackers placed anti-American sentiments in English and Chinese characters on some of the sites. But most of the attacks could have been prevented if published fixes, identified in Information Assurance Vulnerability Alerts, were in place on the hacked machines, said Lt. Col. John Quigg, chief of the ArmyOs network security improvement program in the service's chief information office. - - - - - - - - A New Direction for Intellectual Property Perceiving an overly zealous culture of copyright protection, a group of law and technology scholars are setting up Creative Commons, a nonprofit company that will develop ways for artists, writers and others to easily designate their work as freely shareable. Hollywood's Way Out New distribution platform is solution for copyright theft Public domain info under threat, say groups Homeland research may miss out - - - - - - - - The pen is mightier than copy-protection Controversial copy-protection mechanisms on CDs could be negated with something as simple as a marker pen. According to one German geek who sent the tip to technical magazine, a variety of copy-protection systems, including Cactus Data Shield and KeyAudio, which also stop music CDs being played in CDRom drives, can be circumvented with a felt-tip pen. - - - - - - - - The Yahoo Privacy Storm That Wasn't Internet privacy is like the weather. Everyone complains about it, and no one does anything about it. The latest example involves users of Yahoo, the vast Internet portal that set off howls of protest when it abruptly changed its marketing policy in March. Suddenly, Yahoo granted itself the right to send advertising messages to tens of millions of its users who had previously asked to receive none. The blanket permission went beyond e-mail to include postal mailings and telemarketing phone calls. Immediately, privacy advocates reacted with criticism, and outraged postings flooded message boards all over the Internet. Mistaken identities,14179,2864585,00.html - - - - - - - - Museum's Cyberpeeping Artwork Has Its Plug Pulled An Internet-based artwork in an exhibition at the New Museum of Contemporary Art was taken offline on Friday because the work was conducting surveillance of outside computers. It is not clear yet who is responsible for the blacking out the artists, the museum or its Internet service provider but the action illuminates the work's central theme: the tension between public and private control of the Internet. The shutdown also shows how cyberspace's gray areas can enshroud museums as they embrace the evolving medium. - - - - - - - - Cookieless Web monitoring tool 'nearly undetectable' Privacy advocates fear that a Web monitoring tool that is under development in Scotland may lead to more covert surveillance Researchers in Scotland are developing a new kind of Web monitoring software that they claim can collect enormous amounts of data on Web surfers while remaining nearly undetectable.,,t269-s2110028,00.html - - - - - - - - Pentagon alienating elite science advisers For more than 40 years, an elite group of academic scientists has provided the federal government with largely classified advice on the most vital issues of national security. Every summer they have met behind closed doors for almost two months near San Diego, emerging with judgments that have helped shape the nation's policies -- from ending nuclear testing to preparing for the danger of bioterrorism. Computer-based artificial societies may create real policy - - - - - - - - Businesses Able To Ward Off Virus Virus-scanning software, which is frequently updated, scans all incoming e-mail and attachments so that infected messages never reach an employee's computer. A pernicious computer virus has been proliferating throughout Pittsburgh and the world, though most area businesses say they've been able to ward off infection. The Klez virus arrives through an e-mail, copies the recipient's e-mail addresses, then makes a mass mailing of the computer's files to the e-mail addresses it copied from the computer. - - - - - - - - Slot Machine Justice for Melissa Author Under capricious computer crime sentencing rules, virus-writer David Smith managed to get the right prison term for all the wrong reasons. David Smith, the author of the "Melissa" virus, was sentenced recently in federal and New Jersey state courts to serve what amounts to 20 months of incarceration in a federal penitentiary. The government estimated that the Melissa virus caused more than $80 million in "loss" to computer users. The question then is, like that with Goldilocks and the three bears, is the sentence too little, too much, or juuuuuuust right? My answer is, that the sentence if probably just about right, but not for the reasons that it was actually imposed. - - - - - - - - Virus writers get behind Gigabyte Sharp author gets the plaudits. The virus-writing community made something of an about-turn last week as an increasing number of authors gave their support to female virus writer, Gigabyte. Previously the teenage coder had been lambasted by male members of the community for her creation of the Sharp virus that attacks Microsoft's .Net platform. - - - - - - - - Security trips up instant messaging Matt Conover worries that malicious Net users may know something about instant messaging that he doesn't. The hacker and security expert, who specializes in finding holes in instant messaging clients, publicized a flaw in AOL Time Warner's messaging application a week ago. Because he gave the company advance warning, AOL had fixed the problem and people remained secure. It's the bugs that AOL and its rivals don't know about that worry Conover. - - - - - - - - INDUSTRY MUST ACT TO AVOID SHORTAGE OF IT SECURITY WORKERS Few university computer science or information technology programs offer a concentration in security. A National Science Foundation program to train security workers is still small. Training people is up to enterprises, says Gartner. - - - - - - - - How secure is your password? BBC Go Digital's Jon Wurtzel casts a wry eye over developments in the world of technology. In order to access computer networks, online bank or e-mail accounts, we need a wide range of usernames and passwords. Constant attention is required to track what our name is in each virtual environment, and what password is needed at that moment to access personal information. - - - - - - - - Cop fined over wife's online strip Husband surprised by nude pics. A policeman's wife who posed nude on the internet landed her husband in trouble with his superiors. US news sources say that officer Daniel Lake was stripped of three days' pay when chiefs found out about the naughty pictures. His wife had apparently posted the nude photos online in a bid to spice up the couple's lovelife, but had not got around to telling her husband about it before downloaded copies appeared around the police station in Florida where he worked. *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2002,, Campbell, CA.