NewsBits for May 5, 2003 sponsored by, Southeast Cybercrime Institute - ************************************************************ SCO Web site slammed by Net attack An avalanche of data blocked access to the SCO Group's Web site for several hours Friday, said the company, which has come under fire from Linux fans for an ongoing lawsuit against IBM. At 10:45 a.m., the Unix and Linux seller was hit by a distributed denial-of-service attack (DDoS) that hampered its Internet operations, said SCO spokesman Blake Stowell. In a DDoS attack, numerous computers simultaneously send so much data across a network that the targeted system slows to a crawl trying to keep up with the traffic it's receiving. - - - - - - - - - - AG cracks down on 'Net scams Stop Net scams Attorneys general in 28 states, including Idaho, are cracking down on Internet auction scams. Idaho Attorney General Lawrence Wasden says he's joined with the Federal Trade Commission investigation, called Operation Bidder Beware. Wasden said two Idaho residents allegedly participated in the scams. Authorities say Bradley Bottum of Hayden advertised digital cameras on e-Bay, an online auction site. Bottum allegedly accepted payment for the goods and then did not send the cameras. - - - - - - - - - - Air Force Sgt. sentenced to 10 months for child porn In an 11th Wing courtroom at Bolling April 15, Staff Sgt. Douglas Marcy was found guilty of possessing child pornography on his home personal computer and was sentenced under the Uniform Code of Military Justice to 10 months' confinement, a bad conduct discharge and a reduction in rank to E-1. In March, Marcy's girlfriend discovered images of child pornography on his computer. She copied some of these images to disk and delivered the evidence to the Fairfax County, Va., Police Department. Police obtained a search warrant and discovered hundreds of similar images on Marcy's computer. He was then arrested by Fairfax County Police. - - - - - - - - - - Child porn man jailed Fellow villagers of jailed pervert Peter Jones today said he deserved more than one year behind bars for downloading thousands of indecent images of children. The former Conservative district council candidate, who lived in Park Road, Spixworth, was snared in Operation Ore, an investigation involving UK police targeting users of pay per view websites from the United States. - - - - - - - - - - Mich. man pleads guilty to soliciting sex on Web A Muskegon, Mich., man will be sentenced in June after recently pleading guilty to charges that he used the Internet to solicit a minor. Joseph Perri, 25, pleaded guilty Monday to one count each of accosting children for immoral purposes and using a computer to commit a crime. Both charges are felonies. According to investigators, the sheriffs office had received a report of an online communication between a juvenile and a child-sex solicitor. Deputy Rick Richardson, who heads the departments Internet Crimes Unit, reviewed the electronic data that revealed that a 15-year-old male from Scipio Township allegedly had been solicited by Perri, who asked the boy to meet him. Authorities continued to monitor the conversation online, and when Perri arrived at the teens house March 23, police arrested him. - - - - - - - - - - Men Convicted On Porn Charges An Auckland man has been convicted on child pornography charges, involving pictures of young girls aged between four and 10. Earl William Duffell Internann, from Auckland's North Shore, pleaded guilty to trading and possessing the pictures. They showed the children in explicit poses and being abused by men. Internal Affairs says the case highlights the true nature of Internet child pornography. Internal Affairs spokesman Keith Manch says Intemann had been dealing in the images for about two months, and his offending was at the early end of the spectrum.,,3882-2340730,00.html - - - - - - - - - - Police say man had sex with boys A North Canton man is accused of having sex with several teen-age boys he met on the Internet. William C. Harris, 25, of North Main Street, was arraigned this week in Barberton Municipal Court on charges of unlawful sexual contact with a minor sexual imposition and possession of criminal tools. He was released after posting 10 percent of a $50,000 bond. Summit County sheriff's Capt. Larry Momchilov said Harris, a civil engineer, is accused of meeting at least three boys ages 12-17 on the Internet and arranging sexual encounters. One of the boy's parents contacted investigators last month after seeing an e-mail Harris allegedly sent to their son at their Green home. Harris and the boy had sex on three occasions, Momchilov said. - - - - - - - - - - Major child porn find Investigators are continuing to look into what one says is a sickening case of child pornography. James Richard Ayre, 35, Midland, was arraigned April 23 for the felony of possessing sexually abusive material involving children. Midland County Prosecutor Norm Donker said Ayre was found with a massive library of pornographic photographs involving children clearly under the age of 5. "They are the most vile images that you can possibly imagine," Donker said, adding detectives who are working to inventory the photographs can only work for about half an hour before becoming physically ill. The materials found include compact discs, each filled with photos, and computer equipment. Donker did not know how many photos there are. "How much can you put on a CD?" he asked. - - - - - - - - - - Trinity told to hand over records in porn case A judge ordered Trinity University officials Monday to turn over documents related to an internal investigation into allegations that one of its students had child pornography on his dorm computer. The order came after university officials declined to allow the school's dean of student affairs, David Tuttle, to respond to a grand jury subpoena. Assistant District Attorney Tony Reyes was hoping Tuttle would shed some light on the investigation he oversaw regarding the allegations. Prosecutors are presenting evidence to a grand jury in hopes of obtaining an indictment against the student. - - - - - - - - - - Apple Squashes E-Store ID Bug Apple Computer said it fixed a security flaw at its online store late last week that could have enabled attackers to hijack customers' accounts and place fraudulent orders. The flaw, discovered by an anonymous Canadian security researcher who uses the nickname "Null," potentially allowed malicious users to change Apple Store customers' passwords and gain control of the victims' account data. Information stored by Apple includes customers' names, mailing addresses, telephone numbers, order histories and credit card information.,1848,58718,00.html - - - - - - - - - - G8 countries 'need good co-ordination' to fight Internet child porn, The scourge of child pornography will continue unless countries work together to solve the problem, Solicitor General Wayne Easter said yesterday as he prepared to discuss the issue with security and justice ministers from other G8 nations. "We need good co-ordination if we're really going to attack the issue of child pornography," Mr. Easter said from Paris. "We have to have strategies in place to do it worldwide." Mr. Easter and Justice Minister Martin Cauchon are in France for today's meeting, which will also focus on the fight against terrorism and other international criminal justice matters. - - - - - - - - - - Making It Harder for Prying Eyes A bill in the California state legislature would protect the anonymity of Internet users by requiring Internet service providers to send customers copies of subpoenas seeking to learn their identities. If passed, California's Internet Communications Protection Act would become the second state law requiring that consumers be alerted when an ISP is issued a subpoena to find out an anonymous Internet user's true identity. Virginia passed a similar statute last year.,1283,58720,00.html - - - - - - - - - - Canadian Privacy Law Deadline Approaching U.S. companies must comply by first of the year The clock is winding down for U.S. companies that exchange data with other businesses and subsidiaries in Canada to comply with a law providing broad privacy protections for Canadian citizens. Beginning Jan. 1, 2004, all companies that collect, use or disclose personal information about Canadian citizens during the course of commercial activities will have to comply with Canada's Personal Information Protection and Electronic Documents Act.,10801,80949,00.html - - - - - - - - - - Terror attack mock-up has a cyber angle The Homeland Security Department and dozens of federal, state and local agencies will launch a simulated five-day terrorist attack on May 12 designed to include a small role for cyberwarfare, officials said this afternoon. The game will involve a hypothetical attack by a radiological "dirty bomb" in Seattle and a biological attack via infectious pneumonic plague in Chicago, officials said. HSD Secretary Tom Ridge announced the exercise today at a news conference with officials of the State Department, the two cities and HSD's Office of Domestic Preparedness. - - - - - - - - - - Software Bullet Is Sought to Kill Musical Piracy Some of the world's biggest record companies, facing rampant online piracy, are quietly financing the development and testing of software programs that would sabotage the computers and Internet connections of people who download pirated music, according to industry executives. The record companies are exploring options on new countermeasures, which some experts say have varying degrees of legality, to deter online theft: from attacking personal Internet connections so as to slow or halt downloads of pirated music to overwhelming the distribution networks with potentially malicious programs that masquerade as music files. The covert campaign, parts of which may never be carried out because they could be illegal under state and federal wiretap laws, is being developed and tested by a cadre of small technology companies, the executives said. (NY Times article, free registration required) Report: Labels back software sabotage Internet anti-piracy laws criticized as too broad - - - - - - - - - - The slow war against rogue Rx sites Online firms that fill prescriptions without exams targeted. Dr. Carlos Gustavo Levy practices osteopathic medicine in Sunrise, Fla., more than 3,000 miles away from California. But that didnt stop him writing some 1,570 prescriptions for Californians. He made his diagnoses via an online questionnaire, prescribing medicines without ever seeing his patients. - - - - - - - - - - Military battling rise in child-sex cybercrimes He molested his teenage stepdaughter and downloaded dozens of child-porn images to his computer. For his crimes, the Yokota airman in February earned five years in the brig. His wasnt the first nor is it the last child sexual-abuse case at Yokota. In fact, military prosecutors here say they are preparing more cases for court. But the problem isnt Yokotas alone: The Internet has spawned an onslaught of U.S. online- pedophilia and child pornography-possession cases. And military criminal investigators in Japan are battling a similar trend. We see it on a smaller scale because of our numbers, said Special Agent Brian Taylor, a computer crimes investigator for the Air Forces Office of Special Investigations, 62nd Field Investigations Squadron, Yokota Air Base. - - - - - - - - - - Voicemail hacking on the rise Voicemail can cost you. Just ask K.C. Hatcher, a San Francisco-based graphic artist. AT&T wants her to pay $12,000 in long-distance charges rung up by a hacker who apparently changed Hatcher's voicemail message to accept third-party billed calls to Saudi Arabia and the Philippines. ``I am totally obsessing about this,'' said Hatcher, whose normal long-distance bill runs $35 a month. ``I'm getting married in June. I want to buy a house, and I'm worried that this fraud is going to ruin my credit.'' - - - - - - - - - - Is spam behind a cell-phone virus? Some AT&T Wireless subscribers believe a text message masquerading as spam is on the loose and damaging cell phones in the United States. The subscribers reporting the problem each owned a Siemens S46 cell phone and said they received the e-mail this week. Even when they did not open the e-mail, which began "Need Help With International Dialing," what some say could be malicious software hidden inside wiped out the cell phones' address book and e-mail capabilities. - - - - - - - - - - Finding Solution to Secret World of Spam There probably isn't a "Wendy" behind the e-mail offering a way to "lose 30 pounds in 30 days." And it seems unlikely that the real vendor of the "Iraqi most-wanted playing cards" is really named "DocHoliday." Most unwanted bulk e-mail, or spam, is sent under forged names and addresses, making it hard to track down the real senders. At a three- day forum that just ended here on spam, sponsored by the Federal Trade Commission, there was a consensus that spam was increasing rapidly this year. But there was little certainty about who was behind it. (NY Times article, free registration required) Best way to stop spammers? Make them pay! I spent last week at the Federal Trade Commission's three-day spam summit, where hundreds of people, fed up with the skyrocketing amount of unsolicited bulk e-mail, gathered to figure out how to stop it. The suggestions were predictable: As they have each year since 1997, with nothing to show for it so far, members of Congress vowed to enact a law restricting spam. People selling spam blockers touted their products, and so-called e-mail marketers complained that their bulk messages were being unfairly tossed in the trash. Poor things. Internet service providers join forces against spam Congress moving to combat spam e-mail The Not-So-Peaceful Anti-Spam Crusade - - - - - - - - - - Scanning for security Allen Tien needed secure computers. The elderly patients in his company's research program had to fill out confidential surveys, and he wanted to keep them confidential. So the Towson medical software consultant turned to biometrics -- the science that identifies people by turning their physical characteristics into a unique set of numbers. - - - - - - - - - - Internet Explorer's dumbest bug ever revealed BORED OF CREATING buffer overflow possibilities and security gaps an electronic elephant could walk through, Microsoft's Internet Explorer development team has turned its attention to good old HTML. Thankfully, this bug just crashes IE. Embarrassingly for the Vole, it's done with just one malformed line of HTML. - - - - - - - - - - Windows Server 2003 Security: Jury's Still Out Security solution providers offered mixed reviews of the security of Microsoft's recently released Windows Server 2003. Microsoft has touted the security of the new software, which ships with more than 20 services turned off by default and includes other protective functions. Security has been Microsoft's mantra since it launched its Trustworthy Computing initiative nearly 18 months ago. - - - - - - - - - - Madonna's Borderline MP3 Tactics The material girl's foul-mouthed revenge on music traders could be interpreted as a deceptive trade practice, or even outright fraud. Virginia's new anti-spam law makes it a criminal offense to send e-mail with inaccurate and deceptive source or header information. The new PROTECT Act signed by President Bush similarly makes it a federal offense for online pornographers to obtain or use misleading domain names to induce individuals to surf unwittingly to porn sites. At the same time, the U.S. Federal Trade Commission filed a series of civil complaints against "porn-spammers" alleging that spoofed source information and misleading subject lines constitutes a deceptive trade practice. Can this mean that Madonna goes to jail? - - - - - - - - - - Auditing Web Site Authentication, Part Two Inadequate user security is a problem that Web developers must address. Perhaps it is lack of standards. Perhaps it is a lack of auditing. This is the second part of an article addressing both of those issues by establishing a standard audit procedure by which to measure your own security. Test this list of questions against your own Web site's authentication scheme and see how it stands. The first article focused on issues surrounding usernames and passwords. This article will explore issues surrounding user privacy, session authentication, user security, and cookies. Auditing Web Site Authentication, Part One - - - - - - - - - - 'Smart Park' Is Keeping Watch Surveillance cameras, infrared sensors and other high-tech gadgets help monitor facilities. To civic planners in Glendale, Palmer Park has everything a recreation area needs kiddie swings, walking trails and infrared sensors concealed in the shrubbery. If someone scales the fence after the park closes at 10 p.m., more than a dozen electronic sentries whirl into action. One foot on the manicured lawn triggers the sprinklers, while the sensors set off alarms at the park rangers' headquarters. (LA Times article, free registration required),1,5409626.story - - - - - - - - - - Report: Too Many Watch Lists Congressional investigators urge the government to combine twelve different surveillance databases into one. While errors in the Transportation Security Administration's "no-fly" list have famously raised the ire of innocent air travelers misidentified as terrorists, it's far from the only government watch list in use. In a report released this week, the General Accounting Office, Congress' investigative arm, counted no less than 12 different government databases cataloging purportedly dangerous people, maintained by nine different federal agencies and accessed by 50 others -- a tangled web of largely incompatible systems that the GAO would like to see merged into one. *********************************************************** Computer Forensics Training - Online. An intense, 150 hour, instructor lead program that teaches you computer forensics and helps prepare you for the Certified Computer Examiner exam. For more information see; *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2003,, Campbell, CA.