NewsBits for February 28, 2003 sponsored by, Southeast Cybercrime Institute - ************************************************************ Norwegian teen faces retrial for DVD-piracy technology A Norwegian teenager cleared of cyber piracy charges in a landmark ruling is to be tried again in an appeals court, his lawyer said on Friday. Jon Johansen, aged 19 and dubbed "DVD Jon", was acquitted by an Oslo court in January of charges of theft after he developed a computer program to copy DVD movies which has been outlawed in the United States. - - - - - - - - - - MASSIVE ATTACK'S 3D: I'M NO PERVERT MASSIVE Attack star 3D yesterday hit out against child abuse hours after his arrest by police investigating internet child porn. The millionaire rapper said: "I abhor child pornography and child abuse in all its forms." The 36-year-old - real name Robert Del Naja - vowed to clear his own name after police had detained him for six hours. Yesterday he removed his name from the front door of his Victorian town house in St Andrews, Bristol, amid fears of an anti-paedophile vigilante attack. Police, acting on a tip-off, arrested Del Naja in the city on Tuesday. They also seized computer equipment and drugs believed to be ecstasy. - - - - - - - - - - Man Met Teen on Net, Faces Six Sex Charges Federal prosecutors have indicted a New Jersey man whom they say illegally traveled to Utah several times to have sex with a 15-year-old girl in foster care. They met on the Internet. The last time Frantz Dieudonne, 33, traveled to Utah, last May, he allegedly took the Kearns girl with him, but was arrested in Illinois after a state trooper saw the girl driving the car, prosecutors said. On Wednesday, Dieudonne was charged in U.S. District Court in Salt Lake City with six counts of interstate travel with intent to engage in sex with a juvenile. Each charge carries a possible sentence of 20 years in federal prison. - - - - - - - - - - Lafayette man charged with molestation, child porn Police officers discovered pornographic images of children in a Lafayette mans home Wednesday, said Lafayette Police Department Cpl. Mark Francis. More than 10,000 images of child pornography were found in the home of Paul E. Tyler, 52, of the 100 block of Washitta Road, Francis said. Police found the evidence after arresting Tyler on Wednesday afternoon on molestation charges. By 7 p.m., he was booked on the pornography charges. - - - - - - - - - - Boeing security worker charged with downloading child porn Snohomish County prosecutors filed charges yesterday against a oeing Co. security worker who is accused of downloading about 1,000 images of child pornography on his work computer. For more than a year, according to prosecutors, Jonathan Lymburn, 44, of Bellevue had been accessing child pornography, rape and incest Web sites before a co-worker reported his activity to their superiors. - - - - - - - - - - The Great Year 2003 Bug A chain letter being distributed via email today bizarrely predicts that the Internet will stop working on Monday. The email claims that the so-called "Year 2003 Bug" was discovered on 23 February, and that essential Internet equipment will be triggered to stop working on the 030303 date. According to the chain letter "No one can predict how much and how long the outage could be for. Even the experts have disagreed on the time length, some saying 24 hours, others suggesting it could be until network administrators patch the firmware." - - - - - - - - - - Klez-H tops monthly virus charts. Again The infamous Klez-H was the most common virus circulating on the Internet this month. Again. Monthly stats from managed services firm MessageLabs show it blocked 366,393 copies of Klez-H over the last four weeks. Virus infection rates are running at around one per 350 emails, compared to one in 30 infected emails at the heights of the Goner and Love Bug epidemics, MessageLabs reports. - - - - - - - - - - EU sets jail terms for hackers Computer hackers and virus spreaders could be jailed for five years in serious cases under new laws approved by European Union justice ministers Friday. Authorities worldwide have woken up to the dangers of network failures in key installations such as electricity and water supply. Since the Sept. 11, 2001, attacks in the United States, concerns have also grown about hackers gaining access to security information. "There will be common definitions...and sanctions for a number of online criminal activities," said European Commissioner for Justice and Home Affairs Antonio Vitorino. - - - - - - - - - - Hunt for Worms Shifts to LAN Traffic Most organizations today deploy what's known as "passive intrusion-detection systems" that monitor and report suspicious activity but do not block it. Some makers of intrusion-prevention systems designed to actively block harmful traffic such as last month's MS-SQL Slammer worm are arguing that strategies should shift from guarding the corporate Internet perimeter to setting up IPS appliances deep within the LAN. By deploying an IPS internally, a company can detect and automatically block any worm outbreak that might occur across the LAN if employees or business partners with internal access introduce one into the system. - - - - - - - - - - When ID theft hits: What to do Maybe its a call from your credit card company alerting you to a flurry of unusual charges. Or a denied car loan application. Perhaps you suddenly start getting phone calls from a collection agency. Or the motor vehicle department sends you a notice saying your license has been revoked. Theres any number of ways you can discover the bad news: Youre a victim of identity theft. Now what? - - - - - - - - - - Net Gurus Rally Anti-Spam Forces Like Greek gods high atop Mount Olympus, the masters of the Internet have long been watching the spam wars. But this week they decided to step in and settle the fight -- once and for all. The Internet Research Task Force, the closest thing the Internet has to a governing body for all matters technical, inaugurated the Anti-Spam Research Group this week to develop "a taxonomy of the (spam) problem and the proposed solutions.",1377,57868,00.html - - - - - - - - - - Router holes threaten Net The border gateway protocol, a widely used technology for efficiently routing data through the Internet, is rife with security holes and needs to be replaced, a security consultant warned. However, a technological chicken-and-egg problem has stymied the development of a secure replacement for BGP, said Stephen Dugan, speaking at the Black Hat Security Briefings here on Thursday. There'll only be an improvement if the majority of routers use a secure protocol--but the high cost of implementing Secure BGP means that few companies will adopt it. - - - - - - - - - - Google in paedo censorship debacle Google has found itself at the centre of a censorship row after it removed a link to a "sickening paedophile site" after pressure from councillors in the lovely UK city of Chester and frothing lead stories in local newspaper The Chester Chronicle. The site in question is far from a paedophile site however, as was made clear to Chester City Council by the police when it contacted them with the aim of getting it shut down. Instead, "Chester's guide to: Picking up little girls" is an article intended to be humorous. Puerile and in poor taste it may be, but illegal it isn't. - - - - - - - - - - Taming the Net A new sheriff is aiming to clean up the wild, wild Internet: the U.S. Justice Department. The Justice Department has adopted a new crime-fighting tactic: seizing control of domain names for Web sites that allegedly violate the law. The Justice Department took over the domain, whose owner pleaded guilty to using his site to sell "mod" chips that let Microsoft Xbox and Sony PlayStation owners modify their devices so that they could use them to play illegally copied games, or "warez." - - - - - - - - - - Total Poindexter Awareness tech spooks - a Who's Who One of the great post-War technology trends has been reversed since 9/11, almost without any noticing. For many years now technology that was developed for military use, or using military funding has found a commercial civilian use. Think of the Internet, or CDMA. But what we're seeing now - and this mirrors the militarization of so much of civilian life - is the reverse. Ostensibly civilian technologies such as Groove's Peer to Peer system, or are being repurposed as surveillance technologies. And as the spooks welcome the technology companies, the technology companies reciprocate: welcoming them onto their boards. Pentagon database to spy on Americans,,t269-s2131231,00.html - - - - - - - - - - New group to address 'disconnect' in security market A "tremendous disconnect" exists between federal, state and local government agencies and small- and medium-sized businesses looking to enter the counterterrorism market, the founders of a new homeland security organization said on Friday. "We sort of sit between the government, industry and the small-business community so we can become a repository of information and ... disseminate that information back out," Preston McGee, a board member of the not-for-profit Homeland Security Leadership Alliance (HSLA), said during an introductory meeting. - - - - - - - - - - Database check of all fliers worries liberties groups Civil liberties groups are objecting to a government plan for a new system that would check background information and assign a threat level to everyone who buys a ticket for a commercial flight. Activists see the potential for unconstitutional invasions of privacy and for database mix-ups that could lead to innocent people being branded security risks. *********************************************************** Computer Forensics Training - Online. An intense, 150 hour, instructor lead program that teaches you computer forensics and helps prepare you for the Certified Computer Examiner exam. For more information see; *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2003,, Campbell, CA.