NewsBits for February 27, 2003 sponsored by, Southeast Cybercrime Institute - ************************************************************ Hollywood, software firms aim at pirates Two major trade groups filed on Thursday a slew of civil lawsuits against people they claim were selling pirated copies of films and software via online auction sites. The Motion Picture Association of America (MPAA), Hollywood's chief trade association, brought 12 cases against individuals who were allegedly auctioning pirated editions of popular films including "Harry Potter and the Chamber of Secrets" and "Die Another Day." The Business Software Alliance (BSA), whose members include Adobe and Apple, filed a handful of similar cases against people it said were selling stolen or illegally copied pieces of software. - - - - - - - - - - Fines leveled in online privacy case Candy maker Hershey Foods Corp. and cookie baker Mrs. Fields Original Cookies Inc. agreed to pay $185,000 to settle charges that they collected personal information from children without their parents permission, U.S. regulators said Thursday. - - - - - - - - - - Mass. man pleads guilty to affair with Bayside teen A Massachusetts man charged with having sex with a 15-year-old Bayside boy he met on the Internet last summer has pleaded guilty and faces one to three years in prison when he is sentenced next month, Queens District Attorney Richard Brown said last week. Chun Ho, 29, of 121 Tremont St. in Brighton, Mass., pleaded guilty to charges of sodomy and endangering the welfare of a child, the DA said. The DA's office said Ho admitted to meeting the boy in April in an online chat room, communicating with him repeatedly on the computer and telephone before driving down to Queens for sexual encounters with him in May and June - - - - - - - - - - Juneau man pleads to federal child porn charges A Juneau man accused of using the Internet to attempt to lure a young boy into a sexual relationship has pleaded guilty to attempted possession of child pornography. Joseph L. Geist, 51, pleaded guilty Tuesday in federal court. A grand jury indicted Geist in November on charges of using electronic mail and a cell phone for attempted sexual abuse of a minor and possession of child pornography.,1413,113~26794~1207192,00.html - - - - - - - - - - Massive Attack star in child porn inquiry MASSIVE Attack's Australian tour may be in jeopardy after front man Robert Del Naja was arrested in a child pornography investigation. Although not charged, Del Naja -- known as 3D -- has been released on bail. It is common for bail agreements to prevent an accused from travelling overseas. Del Naja, 36, was arrested at his home in Bristol by police investigating an internet child porn racket. He is the second high-profile musician -- after Pete Townshend from The Who -- to be implicated in the Scotland Yard crackdown.,4459,6053363%255E7484%255E%255Enbv,00.html - - - - - - - - - - Pelham Middle School teacher charged in sex sting A 40-year-old schoolteacher and wrestling coach who thought he was engaging in sexually explicit online chats with a 14-year-old boy has been arrested by an undercover investigator who had posed as the teen, Westchester County District Attorney Jeanine Pirro announced yesterday. Spencer Glenn Davis, of 301 Post Road, North Salem, a sixth-grade teacher at Pelham Middle School since 1998 and the head wrestling coach at Woodlands High School in Greenburgh, became the 67th person charged in Pirro's Internet sex sting. - - - - - - - - - - Detective: Man tried to lure girl on Internet A Melbourne man who thought he was communicating online with a 14-year-old girl was arrested Tuesday in Boynton Beach after traveling to Palm Beach County to meet the teen for sex, police said. Thomas S. Tewell, 40, had corresponded by Internet chat more than a half-dozen times with a Boynton Beach police detective posing as a 14-year-old girl, according to court documents. Tewell wrote in the Internet chats that he wanted to have sex with the girl and wanted to meet her, his arrest report said.,0,5870875.story - - - - - - - - - - Sex-crime detective confident Sheriff's Detective Michael DiMatteo, who is under investigation for allegedly planting evidence, said Wednesday his name will be cleared once the inquiry is complete. DiMatteo is being sued by Gary Vertican II, a 34-year-old Crestline man who alleges the detective planted images of child pornography on CD-ROMs seized from Vertican's home. Vertican was convicted in November 2000 of attempted child molestation in a cybercrime case investigated by DiMatteo.,1413,208~12588~1207005,00.html - - - - - - - - - - Privacy again a hot-button issue for legislators Top federal and state privacy enforcement officials are promising aggressive action against companies that, through theft or accident, allow customer data to leak out. But there are divergent views on whether tougher privacy legislation is actually needed to protect customer data. U.S. Rep. Clifford Stearns (R-Fla.), the leading advocate of privacy legislation in the House of Representatives, said he plans to reintroduce within a few days privacy legislation that would set an "opt-out" standard for consumers.,10801,78887,00.html - - - - - - - - - - Finance sector to get terror legislation Treasury green paper to protect banking system from terrorists and viruses. The government is considering legislation to protect the banking system in the event of a major terrorist attack or computer virus outbreak. A green paper, The financial system and major operational disruption, published this week by the Treasury, warns that a major catastrophe could threaten the whole financial infrastructure of the UK. - - - - - - - - - - French legislators vote to ban spam France's National Assembly on Monday voted in favor of banning unsolicited e-mail sales messages, known as spam. The move, presented to the lower house of parliament in the form of government amendments to a law to "increase confidence in the digital economy," was approved by deputies at a first reading. Direct electronic marketing without prior consent would be allowed in certain circumstances where the parties involved were properly registered so as not to penalise e-business between companies. The law now goes up to the upper house, the Senate, for its approval. - - - - - - - - - - Your Child Could Be Internet Victim In Minutes It can be frightening how fast a teenager can fall victim to an Internet predator. It can happen in just minutes. But there are things parents can do to keep their teens safe. Amber Wynne is a typical 13-year-old. With her parents in the room, and under the supervision of Montgomery County detective Ray Kuter, Amber helped NBC 10 News demonstrate how quickly a child can become the victim of an Internet predator. Within 30 seconds, a 28-year-old man from California named Jake starts asking Amber personal questions, like her age, sex, and location. She tells him that she's 13, her name is "Brittney" and she lives in a Philadelphia suburb. Despite Amber's age, Jake asks her for a picture. It's now been seven minutes since she entered the chat room. - - - - - - - - - - DVD-copying upstart battles Hollywood 321 Studios is asking a judge to block Hollywood's attempts to stop it from shipping its DVD-copying products, claiming its software is protected free speech. The company has been sued by seven major movie studios, which claim 321's DVD X Copy and DVD Copy Plus programs are helping to promote movie piracy. The studios claim the company is violating the Digital Millennium Copyright Act (DMCA) by selling software that can bypass protections on DVDs to make near-perfect copies. - - - - - - - - - - warns of growing problem of ID theft Internet job board, acknowledging a growing problem for online career sites, is e-mailing millions of job seekers, warning that fake listings are being used to gather and steal personal information. An e-mail message from Monster, which arrived in many users' computer mailboxes Thursday, cautions that "regrettably, from time to time, false job postings are listed online and used to illegally collect personal information from unsuspecting job seekers." - - - - - - - - - - DOD releases second half of security policy The Pentagon released an information assurance policy today that sets specific controls and standards for how users should secure Defense Department networks. Directive 8500.2 is the second part of a strategy to address the changing security needs in the department. DOD issued the first part, 8500.1, last October. It supplied a framework for DOD to follow to protect its information systems, said Robert F. Lentz, director of information assurance for the Office of the Assistant Secretary of Defense for Command, Control, Communications and Intelligence. - - - - - - - - - - Internet sleuths: NCC course helps police, find cybercriminals A 14-year-old girl received an e-mail saying the sender would kill her if she didn't provide nude photos of herself. Upset that a neighbor's 9-year- old child wrote on his driveway with chalk, a man posted an explicit sex offer -- supposedly from the girl -- on the Internet along with her family's phone number. Michael Sullivan, a Naperville, Ill., police detective whose special technology-offense unit solved those crimes, yesterday used those experiences to help teach Norwalk Community College's new weeklong Computer Crime Investigator Course. - - - - - - - - - - Is vigilante hacking legal? Striking back at computers that are attacking a company or home network could be legal under federal nuisance laws, a technology-law expert said Thursday. Curtis Karnow, attorney for law firm Sonnenschein, Nath & Rosenthal, stressed during a speech at the Black Hat Security Briefings conference here that no court case has yet established precedent regarding the use of a limited counterstrike to stop Internet attackers, but that nuisance statutes appear to apply. - - - - - - - - - - Credit Card Cos. Watch Own Backs The credit card industry focuses too much on reducing its own fraud costs and not enough on protecting consumers. That's the central claim in a new report from research firm Gartner that slams credit card companies for failing to notify consumers when credit card records are compromised by malicious hackers. The report notes that while credit card companies' "zero-liability" policies protect card holders from paying for unauthorized or fraudulent charges, they do not protect consumers from identity theft and the credit report hell that can follow.,1848,57823,00.html - - - - - - - - - - White House Finds Homeland Security Jobs a Tough Sell Just two days before 22 federal agencies are set to move to the new Department of Homeland Security, the White House has yet to fill three top positions responsible for protecting the nation's physical and digital infrastructure and managing the department's intelligence-gathering activities. The vacant posts are in DHS's Directorate for Information Analysis and Infrastructure Protection (IAIP), a terrorist threat assessment and warning unit that includes five cybersecurity divisions previously scattered across other federal agencies. March 1 is the deadline for most federal agencies reassigned to DHS to have completed the move to the department. - - - - - - - - - - Finger-tapping to combat fraud Man entering PIN number at a cash machine. The way you tap in your PIN is unique Finger-tapping could become the latest weapon in the ongoing fight against debit card fraud. The way a person taps a number into a cash machine or mobile phone could be used as a means of identification according to scientists at the UK's university of Southampton. When a person taps on an object a unique set of waveforms are produced, which can be programmed and used to verify the person's identity. - - - - - - - - - - Spammers Hiding Behind Students "Paying students to spam is a relatively new phenomenon, so we don't know the extent of the problem," says Steve Worona, director of policy and network programs for EduCause, a group that promotes the use of IT in higher education. University networks already stressed by file- sharing programs, viruses and hackers now face a new threat: students who sublet their network access to spammers for as little as $20 per month. - - - - - - - - - - DOD spy database funding revealed The U.S. Defense Department has awarded millions of dollars to more than two-dozen research projects that involve a controversial data-mining project aimed at compiling electronic dossiers on Americans. NEARLY 200 CORPORATIONS and universities submitted proposals to the Defense Advanced Research Projects Agency, according to government documents brought to light by a privacy group Thursday. John Poindexter, who oversees the agencys Total Information Awareness (TIA) program, approved 26 of them last fall, including grants to the University of Southern California, the Palo Alto Research Center, and defense contractor Science Applications International.,2100,57830,00.html - - - - - - - - - - Security flaw exposes Windows ME Microsoft has issued a software patch for what it calls a critical security flaw in its Windows Millennium Edition operating system, according to the company's Web site. The security flaw is a "buffer run" vulnerability, which, if exploited, lets an attacker execute software programs on a victim's computer. The flaw could allow attackers to delete files, run software code and modify programs that appear to have originated locally on the victim's PC, according to the warning on Microsoft's Web site.,,t269-s2131178,00.html - - - - - - - - - - Vendors roll out new corporate spam-fighting tools Vendors continued to heed companies' calls for more spam- fighting tools this week, rolling out new enterprise products and services designed to can spam. Both e-mail security provider MX Logic Inc. and antispam software and service company Brightmail Inc. are unveiling new technologies that they say can significantly reduce the amount of spam flowing into companies' in-boxes.,10801,78879,00.html - - - - - - - - - - These Are Not Your Father's Wiretaps In the old days, tapping a phone was as easy as one- two-three. All calls ran over Ma Bell's copper wires. To listen in, law-enforcement agents simply requested that the phone company isolate the suspect's wire and record any calls made or received. One phone company. One network. One flip of a switch. That was eons ago by techno-standards, however. The new world of telecommunications has made it much harder for the FBI to thwart evildoers -- and for privacy advocates to ensure that the agency doesn't overstep its bounds. - - - - - - - - - - Fragmentation holds back IT security Many firms prevented from deploying essential security policies, warns analyst. Fragmentation of the information security services market is preventing many enterprise and public organisations from deploying essential security policies, industry experts have warned. In its latest report, The Shifting Landscape: US Information Security Services, 2002, analyst firm IDC said that the global IT security services market will be worth $23bn (PS15bn) annually by 2006, but is categorised by immaturity which leaves it fragmented and highly dynamic. - - - - - - - - - - Cyber-Blackbeards Beware Uncle Sam is getting serious about piracy. No, not the parrot-toting knaves of the high seas, but their modern- day broadband namesakes. The latest development: The Justice Department this week seized a domain name and Web site that traded tips and products about copyrighted movies and games. Officials are using the case to warn other potential pirates about the risks of swapping illegal files and copyrighted products on the Internet. - - - - - - - - - - Intrusion Prevention Systems: the Next Step in the Evolution of IDS You blended your IDS with my firewall! No, you blended your firewall with my IDS! Either way, when you combine the blocking capabilities of a firewall with the deep packet inspection of an IDS, you get the new kid on the block: intrusion prevention systems or IPS. - - - - - - - - - - War Protesters Are Taking to Information Superhighway Opponents of a U.S. invasion of Iraq flooded the nation's capital with phone calls, e-mails and faxes Wednesday in an organized protest with a technological twist. Organizers of the "virtual march on Washington" said that Senate offices and the White House were deluged with more than 1 million calls and faxes. "We are getting slammed by the virtual marchers," said an aide to Sen. Zell Miller (D-Ga.), who supports President Bush in the use of force, if necessary, to disarm the government of Saddam Hussein, with or without U.N. approval.,1,262154.story,1283,57824,00.html *********************************************************** Computer Forensics Training - Online. An intense, 150 hour, instructor lead program that teaches you computer forensics and helps prepare you for the Certified Computer Examiner exam. For more information see; *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2003,, Campbell, CA.