November 15, 2002 Child porn 'librarian' jailed for 2 years A computer clerk who ran an online library of child porn was jailed for two years at the Old Bailey this week. In a four-day period, almost 3,000 people visited the free website of 20-year old Londoner Darren Guest. He had collected more than 2,000 images, including children having sex with each other and penetrative sex with adults. Interestingly, Guest's house was raided by Greater Manchester's obscene publications unit after 'routine monitoring of the Internet'. - - - - - - - - BSA whacks two UK firms for piracy Web site tip-offs to the Business Software Alliance (BSA) have led to heavy software piracy fines for two UK companies. Liverpool IT outfit Amaze Ltd paid PS28,000 to the BSA after an investigation uncovered unlicensed copies of computer software on its corporate network. In addition to the fines, the company spent PS24,000 on the purchase of software licences to make sure it operated within the law. - - - - - - - - Dot-Mil Hacker's Download Mistake Gary McKinnon, the Briton indicted this week for hacking into scores of U.S. military computers, left behind few clues on the compromised systems of his victims. But download log files from a Wisconsin software firm may have led investigators straight to his London door. In an apparent effort to avoid detection, McKinnon, 36, installed copies of a commercial remote- access utility called RemotelyAnywhere on Navy and other military systems he allegedly hacked last year.,1282,56392,00.html - - - - - - - - Cadence, Avant settle trade-secret suit Chip-design software maker Cadence Design Systems agreed to settle its civil lawsuit against rival Avant for $265 million, closing the chapter on a long-running case that centered on stolen trade secrets. Under the terms of the settlement, the two companies and individuals named in the suit have agreed to dismiss all pending claims and counterclaims, which date back to 1994. - - - - - - - - Congress OKs cybersecurity R&D bill The House yesterday passed by voice vote the Senate-amended version of the Cyber Security Research and Development Act, clearing the bill for the presidents approval. The bill, HR 3394, and would authorize $903 million over five years for systems security research under the aegis of the National Science Foundation and the National Institute of Standards and Technology. - - - - - - - - Congress Creates Kids' Internet Area Congress approved legislation Friday to create a safe haven on the Internet for children, where parents can be assured Web sites are free of pornography and other material not suitable for youngsters. The measure would make a "" Internet domain that would be available within a year and monitored by a government contractor to ensure the material is appropriate for children under 13. - - - - - - - - U.S. won't support Net "hate speech" ban The Bush administration said on Friday that it will not support a proposed treaty to restrict "hate speech" on the Internet. Last week, the Council of Europe approved an addition to a controversial computer crime treaty that would make it illegal to distribute or publish anything online that "advocates, promotes or incites hatred (or) discrimination." - - - - - - - - Work begins on homeland security architecture An enterprise architecture model for federal homeland security efforts is under development, the infostructure director of the Office of Homeland Security said. Lee B. Holcomb, who recently ended a five-year turn as NASAs CIO to join the homeland security team, said his office is committed to rolling out the first piece of the architecture within 90 days. - - - - - - - - Officials defend data-mining as anti-terror tool Two top Justice Department officials Friday defended the need for government agencies to aggregate large amounts of personal information in computer databases for both law enforcement and national security purposes. Speaking on two separate panels about privacy and civil liberties at the Federalist Society, Assistant Attorney Generals Viet Dinh and Michael Chertoff both said information is a key weapon in combating terrorism. - - - - - - - - Privacy Groups Turn Screws on DOJ Privacy advocates want to know the how and why behind U.S. government surveillance done in the name of the USA Patriot Act. On Wednesday, the American Civil Liberties Union and the Electronic Privacy Information Center asked a federal court judge to force the Justice Department to respond to their Aug. 21 Freedom of Information Act request for documents related to the Patriot Act's surveillance provisions.,1283,56423,00.html - - - - - - - - WH may use procurement process to push computer security The nation's cyberspace chief on Friday told members of the Bush administration's National Infrastructure Advisory Council (NIAC) that the White House may wield the federal procurement process as a means to encourage greater computer security in the private sector. - - - - - - - - e-Authentication prototype awaits e-gov projects The federal government has an operational prototype of the e-Authentication gateway, one of the Office of Management and Budgets 25 Quicksilver e-government projects, that is managing access to two applications. Now, its up to the managers of the other 24 e-government projects to catch up and use the gateway, said David Temoshok, director for identity policy and management in the General Services Administrations Office of Governmentwide Policy. - - - - - - - - Consortium demos secure network A public/private consortium in Oregon is developing a secure information network that was created as a direct result of homeland security concerns. The consortium responsible for developing the Oregon Trial of Emergency and Security Technology (O-TEST) demonstrated the model in Washington, D.C., Nov. 13. "It is a protocol of communication that is IP-based and lives on top of a public network that provides a secure point-to-point data interchange," said Wyatt Starnes, president and chief executive officer of Tripwire Inc. and a member of the board of directors of RAINS the Oregon Regional Alliance for Information and Network Security. - - - - - - - - "Noisy light" is new key to encryption Scientists at Northwestern University say they have harnessed the properties of light to encrypt information into code that can be cracked only one way: by breaking the physical laws of nature. This high-speed quantum cryptography method allowed the scientists to send encrypted data over a fiber-optic line at 250mbps (megabits per second), which the researchers said was more than 1,000 times faster than what was achievable with existing quantum technology. - - - - - - - - Wi-Fi Encryption Fix Not Perfect The biggest security risk for "Wi-Fi" wireless Internet networks is that users sometimes fail to turn on their encryption software. But even the responsible ones who use the encryption program -- Wired Equivalent Privacy -- aren't immune to malicious attacks.,1367,56350,00.html - - - - - - - - Study: Linux' Security Problems Outstrip MS Even more security advisories will be released for open source products in the future, while the number of Microsoft security vulnerabilities will remain flat or decrease, Aberdeen's Eric Hemmendinger predicted. - - - - - - - - Security concerns hinder remote access Security concerns are hampering to roll- out of remote access, particularly to those working for smaller firms. A survey from In-Stat/MDR, released this week, which found companies are evenly split, more or less, between those who allow remote access to the corporate LAN and those that do not. In-Stat/MDR notes that larger companies more likely to allow remote access than smaller concerns. - - - - - - - - Life to hackers! Hackings, viruses and unwanted intrusions into your PC are illegal, right? Well, yes--and no. A last-minute addition to a proposal for a Department of Homeland Security would punish malicious hackers with life in prison. The U.S. House of Representatives approved the bill, which would reshape large portions of the federal bureaucracy into a new department. - - - - - - - - The government wants you -- to be a cyber-security soldier The Bush administration has re-energized its push for a Department of Homeland Security. In addition to ``traditional'' security measures, the proposed department would work to safeguard the Internet. The need for cyber-security was underscored last month by an attack on servers that maintain the directory of domain addresses on which the Internet depends. - - - - - - - - Security training for IT managers In my first column, I wrote about how IT managers must think intuitively about security in the enterprise. In the broadest sense, there are two ways that an IT manager can acquire this needed wisdom: through on-the- job training and through formal and informal learning.,10801,75940,00.html - - - - - - - - Hacking the Xserve Mac Observer editor Brian Chaffin said an administrator must know what he or she is doing because the default configuration renders the Xserve secure -- and effectively useless. Perhaps the only server impervious to hackers is the one still sealed in its packing box. Once a server is plugged into its grounding source and running on a network, it immediately becomes a target. - - - - - - - - P*orn Plague Have you looked at your e-mail in-box lately? If you don't have every filter set up right (or even if you do), you're likely faced with all kinds of appalling p*orn e-mail. Columnist John C. Dvorak is sick of it. And he's just this close to saying, "Freedom of speech be damned!" He doesn't say that, of course. But he thinks we need to take a closer look at what these freedoms really mean and find a way to stem the flow of garbage into our in-box. - - - - - - - - JFK first to use eye-scan technology on employees John F. Kennedy International Airport has become the first airport in the nation to use iris scanning technology to prevent employee security breaches. Kennedy has been testing the technology on about 300 employees working at Terminal 4 for two months, although the program is not mandatory for now. - - - - - - - - Cameras on cars can see things humans can't Cameras that see in the dark farther than the human eye are available on cars, and cameras that eliminate blind spots may not be far behind. - - - - - - - - FBI data management a tough case With snipers picking off people in the Washington, D.C., area in October and police pleading with the public for information, the FBI set up a phone center to receive tips and rolled out its Rapid Start Information Management System to help sort them. It sounds like an efficient, technology-driven process until described in more detail. - - - - - - - - Industrys emerging role in homeland defense Commercial technologyincluding Web portals and voice over IPwill play a key role in the Herculean task of smoothing the flow of information among federal, state and local agencies involved in homeland security, an Air Force IT leader said today. - - - - - - - - Internet blamed for marriage break ups More and more spouses are blaming the Internet for the break up of their marriages. Two-thirds of lawyers meeting at an annual conference in Chicago said the Internet has played a significant role in divorces they had handled during the past year. Meeting a new lover online and an "obsessive" interest in pornography were the top two problems cited in many Internet-related divorce cases. Other reasons that have led to the break down of marriages include excessive use of the Net and chat rooms. *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2002,, Campbell, CA.