September 5, 2002 Internet child porn king jailed for four years A man who ran an international child porn club and had the biggest collection of computer child porn images ever detected in Australia was jailed for four years today. Robert Stephen Keating, 43, a boilermaker, of Walkerston, 15km west of Mackay in northern Queensland, pleaded guilty in the Mackay District Court today to eight child pornography related counts. The court was told Keating had 226,500 porn images on his computer. More than 180,000 of those were child abuse material while the remainder was adult pornography. - - - - - - - - Klez set to return--but may backfire A minor variant of the Klez virus is set to go into action Friday, erasing a host of files on infected hard drives. But the attack may also wipe out the attacker. The 8-month-old mass- mailing computer virus called Klez.E triggers its payload on the sixth day of March, May, September and November, erasing 14 different types of files, including Word documents and HTML files. - - - - - - - - Domain Thief Struck Again The man who once claimed ownership of the domain name has failed to persuade a federal appeals court to reconsider his case. In an unpublished decision, the Ninth Circuit Court of Appeals in San Francisco curtly tossed out the appeal by Steven Michael Cohen, the former operator of the site, citing his decision to flee the country to avoid criminal prosecution.,1367,54962,00.html - - - - - - - - Teenangels make cybersafety a number one priority As if sexual predators and computer viruses weren't enough for the youngest set of Web surfers to worry about, they also have to be on the lookout for their peers. That's the view of one teenaged expert on security issues involving younger computer users. Hackers and predators are considered the biggest threats, but some dangers are to be found closer to home, this expert says. "Parents always think it's pornography. Actually it's other people," said 17-year-old Tyler of Hortonville, Wis., who asked that his last name not be used. - - - - - - - - Government pushes for tougher IT security A new set of guidelines aim to make businesses better defended against risks such as hackers and computer viruses. E-commerce minister Stephen Timms on Thursday launched tough new security guidelines, which the government claims could make businesses much more secure against computer viruses and malicious hackers.,,t269-s2121809,00.html - - - - - - - - Computer Security Standards Ready In a high-tech, high-powered version of a neighborhood watch, a group of government agencies and private businesses plan to announce today a common set of standards and software to fight computer hacking. The Pentagon, the National Security Agency, the National Institute of Standards and Technology, and other agencies are joining forces with such corporations as Intel Corp., Allstate Insurance Co., First Union Corp., Visa and Pacific Gas & Electric Co. to agree on technical actions to stem computer fraud and theft. - - - - - - - - BT slams 'scandalous' phone hacking claims A former BT engineer claims that phone hacking is a "disease" within BT and that the telco is failing to protect its customers from premium rate phone scams. Whistlebower Bob Godsiff was featured earlier this week on a Meridian TV show Cheatlines, in which he claimed that BT was ignoring the growing problem of phone hacking. - - - - - - - - Deadbeat bidders dog eBay sellers Auction winners who dont pay up are a growing trend. Its the quiet fear behind anyone whos ever sold anything on an auction Web site. What if the winning bidder doesnt pay? Sellers offering up pricey Cisco Systems hardware on eBay recently know what that feels like. Well over $1 million in Cisco auctions have been ruined by bidders who simply disappear after the auction has ended. Some say its an elaborate fraud orchestrated by the Cisco Raider. Others think its just vandalism. - - - - - - - - Anonymous $1m grant to test copyright laws An anonymous gift of $1 million to Duke University in the US will be used to finance a new centre conducting research into curtailing recent extensions of copyright law. James Boyle, a Duke law professor, said the centre is likely to take a close and critical look at laws like America's highly-controversial Digital Millennium Copyright Act (DMCA).,,t269-s2121817,00.html - - - - - - - - Americans back taking data off Net But study finds public evenly divided on e-mail monitoring. More than two-thirds of Americans say its OK for government agencies to remove public information from the Internet, even though many didnt believe it would make a difference in fighting terrorism, a new study finds. But Americans were evenly divided on whether governments should be able to monitor e-mail and Web activities, with 47 percent opposed and 45 percent in support. Internet suffers amid fewer freedoms, media rights group says Rights Group Decries Internet Guerilla Warfare - - - - - - - - Britain 'leads way' in eroding privacy INDIVIDUAL privacy is being eroded in Britain to a far greater extent than in other developed countries, according to an international study of state surveillance in the year since September 11. Many states have rushed through restrictive anti-terrorism and security laws in response to last years terrorist attacks, but the Blair Government is singled out for an anti-privacy pathology that the report claims is leading to mass surveillance of the population.,,3-404768,00.html - - - - - - - - Heard of drive-by hacking? Meet drive-by spamming 'Warspammers' are taking advantage of unprotected wireless LANs to send out millions of junk emails. The proliferation of insecure corporate wireless networks is fuelling the growth of drive-by spamming, a security expert warned on Thursday.,,t269-s2121857,00.html - - - - - - - - Windows flaw enables credit fraud Critical flaw could let hackers gain unauthorized access. Microsoft late Wednesday said that a flaw in its Windows operating system could allow hackers to gain unauthorized access to thousands of computers. Microsoft issued a security alert, calling the flaw critical. The flaw affects how more than a dozen Microsoft products, including programs for Windows and the Macintosh, handle digital certificates, which are used to certify the authenticity of a Web site or of software code. - - - - - - - - DNS vulnerability 'critical' Nominum Inc says a recently discovered flaw in the dominant domain name server on the internet is far more serious than originally thought, and could allow crackers to crash or even take control of any internet-connected application running on Unix, Kevin Murphy writes. "We know for sure we can use this bug to crash any application," said Richard Probst, VP of product management at Nominum, which has released a product that fixes the problem. "And we think we know how to use it to hijack any application, but we haven't seen an exploit yet." - - - - - - - - Windows 2000 hit by mysterious attacks Microsoft security experts floored. A rash of attacks on Windows 2000 servers has left Microsoft security experts baffled. The software giant issued a security warning about the attacks, which seem to be based around Trojan horse programs, but unusually the firm has yet to suggest any protective measures. But more recent missives on the firm's website seem to indicate that the attacks are more likely to be the work of hackers rather than passive worm attacks. MS patches bogus certificate hole on NT, XP - - - - - - - - Cisco Warns Its Popular VPNs At Risk Yankee Group analyst Matthew Kovar said the VPN series affected by these vulnerabilities is a popular one, used to provide remote access for a large number of enterprises. Networking giant Cisco has warned of several security holes in its VPN (virtual private network) 3000 series, which is widely deployed by corporations and telecommunications carriers. - - - - - - - - PBS purges Web content on Israeli disapproval The US Public Broadcasting Service (PBS) is airing a documentary film this week by affiliate WNET in New York, called "Caught in the Crossfire: Arab-Americans in Wartime," which considers the predicament of Arab-Americans since the 9/11 atrocity. In addition to the film is a companion Web site offering background material for curious viewers. - - - - - - - - U.S. privacy officer: Listen up! Over the summer, the Bush Administration revealed plans to appoint the first-ever U.S. chief privacy officer as part of the proposed Department of Homeland Security. This is significant because our government has generally resisted appointing a privacy officer. I am happy you're going to be on the job. The appointment of a national chief privacy officer makes public sense. But we need a system of checks and balances to ensure that issues of confidentiality, data collection and the secure handling of personal information always weigh heavily in the office's decision- making. Several elements will need to go into the creation of any effective policy. - - - - - - - - Taking Security Concerns Private: U.S. Appeals to IT Firms It is the common cry of the federal administrator sitting across the table from the private entrepreneur: "I do not have the staff with the technological experience to do what you do." That was how Sallie McDonald, assistant commissioner of the General Services Administration's Office of Information Assurance and Critical Infrastructure, characterized efforts to protect federal information technology systems and develop rapid national response mechanisms. - - - - - - - - Profile of the Perfect Security Guru Experts agree that penetration testing or vulnerability analysis are key to securing systems, but opinions differ on whether a background in hacking is necessary. They know how to set up and maintain firewall, antivirus and intrusion detection systems. They know how to scan the company network for holes. They are up to speed on the latest vulnerabilities -- and know whether or not software patches are available. They know what to do when the corporate servers get hacked, and they know how to stop the attack in its tracks. They also have the gumption to tell you when they cannot handle something, and they can recommend where to go for help. - - - - - - - - TSA piloting biometric lockers The Transportation Security Administration is piloting a program at Minneapolis-St. Paul International Airport that uses biometrics to secure public lockers. TSA shut down lockers inside airport security checkpoints after the Sept. 11 terrorist attacks. Now, aiming to restore the locker service, the agency is testing a computerized lock system provided by Smarte Carte Inc. that requires a fingerprint to store or retrieve items. The new lockers have touch screens that lead customers through the rental process. - - - - - - - - Homeland Security Requires Commitment to Research and Technology To win a protracted war on terrorism, we need to recognize the critical role of scientific research and technology development. As a result of the 9/11 attacks, the nation is debating how to best secure President George W. Bush has called for the equivalent of a world war against terrorists and the nations that support them. He has also developed a National Strategy for Homeland Security, which outlines a broad road map for government agencies, private enterprise, other public and not-for-profit organizations and citizens. Finally, the president has called for a new Department of Homeland Security, consolidating more than 20 federal agencies. - - - - - - - - U.S. Uses Internet/Satellite Images to State its Case Against Iraq The Bush Administration's attempt to build the case - at home and abroad - to oust Iraqi President Saddam Hussein includes the use of high-resolution satellite photos. An Internet web site run by the U.S. Department of State and established in the waning days of the Clinton Administration demonstrates how shot-from-space pictures are utilized to make the point that Hussein must be replaced. - - - - - - - - Patriot Act gag order gives libraries pause Colorado librarian Jamie LaRue jumped on the Internet on Sept. 11 when he heard that planes had hit the World Trade Center and the Pentagon. He wanted to know all he could learn about Osama bin Laden, even reading Web sites sympathetic to the apparent mastermind of the attacks. Only later did it occur to him that his research was building a record that might make him a suspect in the eyes of the government. "I just fit the profile, and all I was doing was exercising a basic American right to ask questions, to investigate, to try to understand," said LaRue, director of the Douglas Public Library District. - - - - - - - - Tech keeps track of parolees A Florida county sheriff's office has begun using a new electronic system that not only tracks a parolee's whereabouts, but also plots his or her location relative to crimes committed in an area during the previous 24 hours. The Seminole County Sheriff's Office began using VeriTracks, developed by Veridian Corp., about a month ago, the first agency in the nation to implement the cutting-edge system, company officials said. Veridian landed the $675,000, three-year contract following successful testing with the state's corrections and law enforcement departments and a dozen other local agencies late last year. *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2002,, Campbell, CA.