December 6, 2002 San Diego Man Kills Girl He Met In Chat Room A San Diego man is suspected of murdering a 13-year- old Arkansas girl he met over the Internet. Kacie Rene Woody was found shot to death Wednesday night in the van of a 47-year-old man from the San Diego area, David Fuller, who police say then took his own life. Kacie had disappeared from her home in Holland, Ark., the night before. Conway police Lt. Chip Stokes said investigators believed Kacie and Fuller had communicated through Internet chat rooms for about a month. - - - - - - - - Man Guilty in Internet Sex Kidnapping A man was found guilty Friday of the sadomasochistic kidnapping and rape of a Massachusetts teenager he befriended via the Internet. The Nassau County Court jury convicted James Warren, 42, of Hampton Bays, on all but two counts in a 65-count indictment, including the top charge of kidnapping. He was cleared of attempted murder.,0,1033888.story - - - - - - - - Jurors deadlock in Net sex case A federal jury in Baltimore deadlocked yesterday in the case of a Navy physicist accused of using the Internet to try to seduce a teen-age girl, although most of the jurors rejected the defendant's claim that he was only engaged in an online sexual fantasy. Jurors hearing the case in U.S. District Court against Navy weapons designer George Paul Chambers split 9-3 in favor of conviction.,0,7635728.story - - - - - - - - It's a fair cop as Police admits 'spam attack' A UK police authority has been accused of breaching data protection laws by sending an unsolicitored email to over 4000 businesses. The Cambridgeshire Police Authority has held up its hands to a major email blunder which resulted in an unsolicited email being sent to around 4,000 businesses - with their email addresses contained in,,t269-s2127179,00.html - - - - - - - - Hotlink to Terror? Feds Raid Boston Area Computer Firm Suspected of Links to Al Qaeda. Federal agents have raided a Boston-area computer software firm looking for evidence that the company, which does business with key government agencies including the FBI, might have links to Osama bin Laden's terror network. The Quincy, Mass.-based firm, Ptech Inc., makes software and is allegedly secretly owned by Qassin al-Kadi, one of 12 Saudi businessmen accused of funneling millions of dollars to al Qaeda. - - - - - - - - Dmitri appears in court--on video The government wrapped up its case in the ElcomSoft criminal trial Thursday without calling a Russian programmer initially expected to be the prosecution's star witness. Instead of calling ElcomSoft programmer Dmitry Sklyarov to the stand in the courtroom here, government prosecutors played an hour-long video of the programmer's earlier deposition. Defense lawyers, after unsuccessfully trying to quash the video, said they intend to call Sklyarov to testify in person on Monday. ElcomSoft: software could be used for 'bad purposes',,t269-s2127148,00.html - - - - - - - - Beware the eBay identity thieves Fraudsters steal user passwords for bogus auctions. Criminals are tricking legitimate UK auction site users into handing over their user identities to set up bogus auction accounts for carrying out scams. The scammers rely on good ratings earned by the legitimate users to make their own, bogus auctions look respectable. They typically offer a limited number of high-priced consumer goods - such as notebook PCs and televisions - at 'bargain' prices. - - - - - - - - Final curtain for Aussie hacker site Perhaps the most recognised hacking group in the country, 2600 Australia, has wound up. For three- and-a-half years, 2600 Australia brought together people interested in electronics, hacking and privacy issues. The group shares its name with the US-based 2600, which publishes a quarterly hacker magazine. Last month, Grant Bayley, the group's front-man, sent an e-mail to the 2600 mailing lists announcing the decision. - - - - - - - - Feds Label Wi-Fi a Terrorist Tool Attention, Wi-Fi users: The Department of Homeland Security sees wireless networking technology as a terrorist threat. That was the message from experts who participated in working groups under federal cybersecurity czar Richard Clarke and shared what they learned at this week's 802.11 Planet conference. Wi-Fi manufacturers, as well as home and office users, face a clear choice, they said: Secure yourselves or be regulated.,1382,56742,00.html - - - - - - - - Council reviews improving telecom security A Federal Communications Commission council is reviewing about 300 "best practices" in several areas of security for communications and data networks in the post-Sept. 11 world, panel members said Friday. The sixth incarnation of the National Reliability and Interoperability Council will vote in a final set of recommendations by Dec. 20, said FCC Chairman Michael Powell. Previous councils dealt with issues such as the Year 2000 computer bug, he said. - - - - - - - - MS fixes 'moderate' IE bug experts say is serious Microsoft Corp. late Wednesday issued a patch to fix a flaw in Internet Explorer (IE) that it says poses only a "moderate" risk to users. Security experts, however, say the vulnerability is serious and could be exploited to take over a user's machine. The flaw affects IE 5.5 and IE 6.0 and lies in a feature meant to set up security boundaries between Web browser windows and the local system. Exploiting it could enable an attacker to read information on a user's computer and invoke programs already on the PC, according to Microsoft in security bulletin MS02-068.,,t269-s2127119,00.html - - - - - - - - Basic rules help kids stay safe online and off We call on crossing guards and police officers to help keep our kids safe on the streets, but our main line of defense is the family. Kids are taught to look both ways when they cross the street and to wear seat belts when riding in cars. Young children are not even allowed on the street unless we're holding their hand. Most of the time things work out for the best because we follow the basic rules of the road. The same is true when it comes to Internet safety. (NandoTimes article, free registration required) - - - - - - - - How to keep your online identity safe Proving your identity online matters, but few of us bother to do this, argues technology consultant Bill Thompson. We should feel sorry for Philip Nourse's girlfriend. She was two-timing him, so in a fit of jealousy he logged on to her FriendsReunited account and posted some rather personal pictures, before "borrowing" her e-mail account to inform her friends that they were there. - - - - - - - - Trouble With Trojans A security crisis is starting to emerge in the world of computing, writes Robin Bloor. The year 2002 will prove to be the worst year yet for hacking. The following year will probably be worse. The number of breaches of computer security and the money lost has been escalating rapidly ever since the Internet was born. If you characterise computer security as a battle between the forces of good and the forces of evil, then at the moment you have to conclude that the bad guys are winning. *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2002,, Campbell, CA.