November 1, 2002 Cactus teacher arraigned, faces charges related to child porn A 31-year-old Cactus Elementary School teacher on Wednesday was arraigned on five federal counts related to child pornography before U.S. Magistrate Clint Averitte in Amarillo. Charles Alan Snooks faces one count of producing child pornography, punishable by 10 to 20 years in prison; two counts of mailing and receiving child pornography, each count punishable by a maximum of 15 years and prison; possession of child pornography, punishable by a maximum of four years in prison; and a count seeking forfeiture, said Assistant U.S. Attorney Christy Drake. - - - - - - - - Ex-teacher pleads guilty in porn case A former elementary school teacher pleaded guilty Thursday to child pornography charges, a prosecutor said. James Robertson, 57, of Thousand Oaks, pleaded guilty to one count of sexual exploitation of a child and one count of possession of child pornography, Deputy District Attorney Howard Wise said. Robertson faces up to nine months in jail when he is sentenced Dec. 9.,1375,VCS_226_1517179,00.html - - - - - - - - Porn claim to be examined WorkCover has announced it will investigate allegations that an officer used his work laptop computer to view child pornography. WorkCover acting chief executive officer Greg Tweedly e-mailed all staff yesterday stating that Work-Cover would "conduct a thorough review and examine all available evidence". The e-mail reiterated a statement from WorkCover yesterday that management only learned of the allegations when The Age made inquiries recently. - - - - - - - - Court tells Aimster to stop illegal swaps A U.S. District Court judge has agreed to the terms of a preliminary injunction outlined by the recording industry to halt the swapping of music files on Aimster. The decision, announced Thursday, marked another legal victory for the Recording Industry Association of America (RIAA). The industry group has been waging a relentless battle against online person-to-person file-sharing networks--most notably Napster--that allow people to download copyrighted songs for free.,,t269-s2125121,00.html Madster file-sharing service ordered to keep track of songs - - - - - - - - Mississippi tops software piracy roll of shame Mississippi flouts software licensing regulations more than any other state in the Union. Almost half (48.7 per cent) of the business software used in the southern state is pirated, according to a state-by-state study commissioned by the Business Software Alliance and conducted last year. U.S. software-piracy rate rose slightly in 2001, study shows - - - - - - - - Merkur worm poses as anti-virus update An Internet worm, posing as an anti-virus update arriving in an email, is also using peer to peer (p2p) software to spread. The Merkur worm, aka W32.HLLW.Merkur@mm arrives in email form with the subject "Update your Anti-virus Software" and has an attachment named "Taskman.exe". The worm relies solely on the recipient being fooled into running the attachment to spread. Like similar worms that have used "social engineering" to lure in unsuspecting victims, the Merkur worm sends itself to everyone in the victims' address book when it is opened. - - - - - - - - Bugbear worst virus in October A variant of the Bugbear worm was the most wide-spread bit of malware in October, according to statistics released yesterday by Sophos Anti-Virus. Bugbear-A displaced Klez-H at the top of the virus list last month, although the latter is still causing serious problems. - - - - - - - - Police admit they can't keep up with cyber criminals Europe is losing out in its fight against cyber crime, a top law enforcement official said on Friday. ``With cyber crime, it's become so obvious that we've lost the battle even before we've begun to fight. We can't keep up,'' Rolf Hegel, head of Europol's serious crime department, told the Compsec 2002 computer security conference here.,,t269-s2125138,00.html - - - - - - - - FBI seeks help vs. cybercrime The FBI has dramatically stepped up its efforts to battle cybercrime, but it is not getting the help it needs from companies that are the cybercrime victims, FBI Director Robert Mueller told technology business executives Oct. 31. "We probably get one third of the reports we would like to get" from companies that have suffered cyberattacks, Mueller said. "You're not enabling us to do the job." In the year that Mueller has been director, the FBI has made fighting cybercrime a high priority, topped only by counterterrorism and counterintelligence. Agencies, companies urged to set guidelines for fighting cyberterrorism The war on cyberterrorism requires law enforcement agencies and the private sector to develop guidelines and protocols for sharing information about network vulnerabilities and cyber attacks, government and industry leaders said Thursday. "Face-to-face relationships are great, but we need to go beyond that," Chris Painter, deputy chief of the Justice Department's Computer Crime and Intellectual Property Section (CCIPS), said during a cyber-security forum at Computer Sciences Corp. headquarters in Falls Church, Va. - - - - - - - - IG: State Department flunks systems security The State Departments information system security remains weak a year after the department was told of serious flaws, according to a recent report by the State inspector generals office. The IG reviewed system security in accordance with the Government Information Security Reform Act, which calls for annual reviews. Even though State made a plan for certifying and accrediting its systems, it has no timetable, according to the IG. - - - - - - - - E-card trickery now in spyware, too Fake greeting cards seem to be the ploy of choice lately. It looks like a romantic e-greeting card. Hi love. I was thinking of how to make your day happier so I found this on the Net, the card says, adorned with a fistful of electronic daisies. I cant wait to get home and give you a big strong KISS. ... Love, Brian. But even as the recipient reads those words, Brians e-card is secretly installing spy software on her computer. Using e-cards to sneak software onto someones computer seems to be the latest fad, and in this case, its the latest trick in the escalating world of spouse-spying software. - - - - - - - - Wi-Fi Alliance tries again on wireless security The Wi-Fi Alliance aims to make it easier to build robust security into wireless LANS with the announcement yesterday of a successor to the flawed WEP (Wired Equivalent Privacy) protocol. Wi-Fi Protected Access (WPA) uses a higher level of encryption and brings in dynamic key exchange functions absent with WEP. WPA is designed to work with existing products and is expected to first appear in Wi-Fi certified products during the first quarter of next year. T-Mobile flies Wi-Fi in airports - - - - - - - - Microsoft attacks spam in new Outlook Microsoft is taking spam fighting more seriously in the next version of its widely used Outlook e-mail and contact-management software. Outlook 11 will, by default, no longer grab data such as images from outside servers when previewing e-mail formatted like Web pages. The ability to send and receive e-mail formatted in Hypertext Markup Language (HTML) was at one time touted as a feature in Microsoft's e-mail programs.,,t269-s2125139,00.html - - - - - - - - The hidden gotcha of spam In the recent account of my struggle to employ wireless computing at a Florida technology conference, I described my attempt, when all else had failed, to use a Web-based POP3 e-mail account. That backup plan failed, too, but for reasons I never anticipated-- and there's a lesson here for all of us. The source of my woes? Spam.,14179,2896281,00.html - - - - - - - - Hacker reveals secrets of success In his mid-1990s flight from the law, uber-hacker Kevin D. Mitnick was accused of donning new names, disguises and addresses, all the while continuing a ''hacking spree'' to steal from top-flight computer, Internet and telephone systems. The first cyber thief to get his mug on a federal Most Wanted poster, Mitnick was his own worst enemy. After his 2000 release from prison, he now works only the legal side of the street as a security consultant and has authored a book of anecdotal escapades that will surprise and alarm many computer-reliant companies, as well as provide a certain amount of intrigue for individuals with an interest in computers. - - - - - - - - Personal data travels far Technology is making it much easier for government agencies to share information, so they are -- including details about your bank accounts, medical complaints and family lives. Personal information from an electronic application for a student loan, for example, may be transmitted to 10 other government agencies and private entities such as consumer reporting agencies, schools and lawyers. Financial details from a farm loan application sent to the Agriculture Department may be sent on to 13 other recipients. - - - - - - - - Agencies fail to comply with technology-transfer law Several federal agencies are not complying with a two-year-old law that aims to improve the transfer of technologies developed with federal funding to the commercial sector, according to a new General Accounting Office report. The 2000 statute requires agencies to submit, with their annual budget requests, reports to the Commerce Department and the Office of Management and Budget detailing their technology-transfer activities. - - - - - - - - Attention Londoners: Big Bobby is watching. That's the message of posters plastered along London's bus routes earlier this week to assuage riders' crime fears. But the posters are having the opposite effect on privacy advocates, who say the artwork is creepily reminiscent of the all-seeing authority described in George Orwell's 1984. The posters show a red double-decker bus crossing a bridge as four floating eyes stare down from the sky. The eyes' pupils are the symbol of Transport For London, the city's mass-transit provider.,1848,56152,00.html - - - - - - - - New police Web site featuring fugitives leads to arrests in Fremont Fremont police have launched a new Web page featuring the city's 10 most wanted fugitives. The site,, which includes the felons' mug shots and thumbnail explanations of their crimes, started two weeks ago. So far, the Web site has been credited with generating tips that resulted in seven arrests, said warrants officer Tim Hunt, who spearheaded the project. *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2002,, Campbell, CA.