NewsBits for June 11, 2003 sponsored by, Southeast Cybercrime Institute - ************************************************************ FBI: Cell phones found in Saudi probe rigged to trigger bombs Investigators looking into the recent terrorist bombing in Saudi Arabia found cell phones rigged to detonate explosives by remote control, the FBI said Wednesday, urging U.S. law enforcement officials to be on the lookout for similar devices. The modified cell phones turned up during searches following the May 12 bombing in Riyadh that killed 35 people, including nine Americans, according to a weekly FBI bulletin to 18,000 state and local law enforcement agencies. - - - - - - - - - - Virus attacked computer networks of the Ukrainian government The Ukrainian government has suffered from the new computer virus BugBear.B last week. In particular, State Office of Public Prosecutor and the Ministry for Foreign Affairs have officially confirmed that their computer networks have been attacked with a new virus. The computer network of the Ministry of Foreign Affairs of Ukraine has been disconnected for few days in connection with a threat of viruses. Similar problems have concerned the State Office of Public Prosecutor (SOPP), officials have found necessary to inform everyone who has e-communication with SOPP about a new virus. The virus sent to the State Office of Public Prosecutor on Thursday, has been automatically distributed to all addresses contained in a database. Now the consequences of virus are liquidated. - - - - - - - - - - Telewest hit by 'particularly large' DoS attack Telewest was hit by a "particularly large" DoS attack yesterday evening causing problems for thousands of users in the North of England, London and the South East. The cableco is still investigating the incident, which is believed to have affected a sizeable chunk of Telewest's 300,000 broadband punters, denying them access to their service from around 6.30pm to 11.00pm yesterday evening. It seems the attack originated from a number of different locations outside the UK. The cableco said it was unable to trace the source of the attack. - - - - - - - - - - Student hacks school, erases class files Highlighting the vulnerability of most computer networks, a 17-year-old student taking a networking course was arrested for hacking into his school's computers and erasing folders belonging to the junior class, New York State Police said Tuesday. - - - - - - - - - - Kiddie-porn smuggler leaves after Immigration issues deportation order A Filipino man has left Canada after pleading guilty to possession of child pornography and a charge under the Customs Act of smuggling prohibited goods. Victor Vesgara Arieta, 31, was a crew member on a Liberian cargo ship that arrived in Halifax on Saturday. During a routine search, Canada Customs and Revenue officers discovered a video disc containing pornographic films involving young children in Arietas belongings. As with all vessels that arrive in port, we make decisions about which ships to search and what areas of them well search, said Customs communications officer Roy Jamieson. Our targeters use a variety of criteria to make those decisions, but it is routine to search crewmembers lockers and belongings. Customs turned the evidence over to the Customs and Excise section of the RCMP and arrested Arieta. - - - - - - - - - - Utica Priest Formally Charged With Child Porn Prosecutors have formally charged a Utica priest with possessing child pornography on his laptop computer. The Rev. Timothy Szott (pictured, left) was pastor of one of the area's largest Catholic churches. He's currently on leave from St. Lawrence Church in Utica. Authorities said they found thousands of images of nude boys in sexual poses or situations on his computer and church server. - - - - - - - - - - Internet Sex Sting A local teacher is in jail, busted in an internet sting. Police say he was trying to arrange to have sex with a child. Lima police arrested Christopher Helle, 30, last night. Police say an officer posed as a 14-year-old girl on the web. They say Helle went to Lima to meet who he thought was the young girl and was arrested. Police say he is a teacher at Evergreen local schools and lives in Sylvania. He's expected to be arraigned this afternoon in Allen County. - - - - - - - - - - Alleged Hacker Had Child Porn On Computer Suspect Accused Of Trying To Hack Into Sheriff's Site. A Hamilton County grand jury has indicted a local man on six counts of unauthorized use of property. Jesse Tuttle, 26, is accused of trying to hack into the Hamilton County Sheriff's Department Web site, WLWT Eyewitness News 5 reported Wednesday. When Tuttle was arrested, officers said they found images of child pornography on his computer. Hamilton County Prosecutor Mike Allen said Tuttle's computer skills were well-known, according to WLWT. "This individual has a reputation in the community for being proficient at this type of thing," Allen said. "But the important thing to keep in mind is that he got caught and is now facing criminal charges." Tuttle also faces 10 charges involved with child pornography. He could get up to 80 years in prison if convicted on all charges. - - - - - - - - - - Judge turns up in court to face child porn charge A CIRCUIT Court judge yesterday avoided arrest by turning up in court to face a charge of possessing child pornography. Judge Brian Curtin, who had twice previously failed to appear before District Judge Humphrey Kelleher at Tralee Court, yesterday arrived at the courthouse with his solicitor, Robert Pierse, 25 minutes before the court started at 11am. Judge Curtin, 51, was returned for trial to the next sittings of the Circuit Criminal Court in Tralee, due to commence on July 22, on a charge of knowingly possessing child pornography, under the Child Trafficking and Pornography Act 1998, at his home, 24 Ard na Li, Tralee, on May 27 last year. His home was among more than 100 premises raided by gardai under Operation Amethyst in May 2002. The raids arose from an investigation into the downloading of child pornography from the internet. - - - - - - - - - - IT expert in job battle after child porn claims A COMPUTER expert claims he lost his job at a top hotel after accusing a colleague who allegedly accessed child porn on the internet. William Barrie, 32, of Kilmarnock, says he suffered stress and had no option but to quit as IT boss at the five-star Turnberry Hotel, Ayrshire after blowing the whistle on alleged surfing of sordid websites. He also claims that management tried to cover up the matter and a senior manager at SLC Turnberry Ltd misused the computer system. Mr Barrie is taking the hotel to an employment tribunal claiming constructive and unfair dismissal. He has also lodged a complaint under the Public Interest Disclosure Act. - - - - - - - - - - Web sites advising suicide becoming targets of law enforcement The instructions downloaded from the Internet were explicit, and, according to police, followed precisely by a 52-year-old St. Louis woman in taking her own life June 2. Printouts from the Web site left nearby described how to use helium to cause asphyxiation, exactly as she did. This is the Web site's recommended method. It is worrisome advice to a person on the edge, say people who study suicide and its causes. - - - - - - - - - - House Wants to Inhibit Offshore Internet Gambling The House on Tuesday approved legislation that targets unregulated offshore Internet gambling sites by prohibiting financial institutions and creditors from completing credit- card payments or wire transfers for funds owed by online losers. Because the government cannot regulate online casinos that are located beyond U.S. jurisdiction, the Unlawful Internet Gambling Funding Prohibition Act, which passed 319 to 104, would wage a war of attrition by closing the U.S. money pipeline. Rep. Spencer Bachus (R-Ala.), who sponsored the legislation, said that the bill was an attempt to curb betting, particularly by underage or chronic gamblers.,1,5862553.story House exempts U.S. operations from ban on credit card gambling The House voted Tuesday to exempt American gambling operations from legislation that would ban gamblers from using credit cards, checks or electronic fund transfers at illegal offshore Internet casinos. Some lawmakers said the exemption while aimed at protecting existing legal gambling operations like horse racing, lotteries, dog racing could expand American gambling operations to the World Wide Web. - - - - - - - - - - Staff monitoring must be transparent The UK Information Commissioner has clarified that to comply with the Data Protection Act, any monitoring should be done 'with the knowledge of the employee' Information Commissioner Richard Thomas today started his move to make companies' compliance with the Data Protection Act easier and simpler.,,t269-s2135870,00.html - - - - - - - - - - FTC seeks more authority to fight spam The Federal Trade Commission (FTC) asked Congress today for additional authority to fight unwanted Internet spam, which now accounts for up to half of all e-mail traffic. In testimony before the House of Representatives Energy and Commerce Committee, FTC commissioners said they need the ability to secretly investigate those who send deceptive e-mail as well as more leeway to go after spammers who send their messages across international borders.,10801,82016,00.html Spam will die out in three years - - - - - - - - - - Government surveillance centre goes live The UK government's new PS25m internet surveillance centre has become fully operational, Computing can reveal. The National Technical Assistance Centre (NTAC) acts as an intermediary between internet service providers (ISP) and law enforcement agencies for intercepting and reading emails and web traffic. - - - - - - - - - - Cybercorps grads aim to boost federal IT security IT security at federal agencies will get a boost this month from the first class of 46 students, mostly midcareer IT professionals, who have completed training under a federal scholarship-for-service program. Cybercorps, as the program is called, was created in 2000 to produce a pool of security-trained IT professionals obligated to work for the government. The program provides up to two years of scholarship funding for students studying information security in return for a commitment to work an equal amount of time for the federal government.,10801,82023,00.html - - - - - - - - - - Police warn of latest email fraud Watch out for generous offers when you're selling your car. The Metropolitan Police Fraud Squad is warning of a new twist to an old scam as crooks turn to the internet to help them con people out of thousands of pounds. Similar to the so-called 'Nigerian' or '419' emails cams, it starts off in the old-fashioned way via classifieds in UK newspapers. - - - - - - - - - - Text complaints on the up, up, up Complaints concerning premium rate email, SMS and fax services have gone through the roof in the last year as more and more people have been diddled by unscrupulous operators. The number of complaints about dodgy text message jumped eight-fold in 2002 to more than 1,200. And reports about spam scams - including ones tricking people into unknowingly activating a premium rate Internet dialer - also neared 1,200. - - - - - - - - - - Former officials assess security needs on cyber front A panel of former government experts in cybersecurity on Wednesday assessed the need to address that issue. At a Center for Strategic and International Studies conference, Ronald Dick, director of strategic initiatives on information assurance at Computer Sciences Corp., identified several drivers to improving cyber security and protecting critical infrastructures. Dick once headed the FBI's National Infrastructure Protection Center, whose functions were absorbed into the Homeland Security Department this year. - - - - - - - - - - Fighting Child Pornography in the Internet According to Law Enforcement Bodies of Russia 75 % of all child pornography is distributed in the Internet. According to experts, 70 % of Internet - payments in system B2C falls on payments for services of "xxx-sites". The words related to sex and pornography are contained in half of requests of search engines. It is easy to explain commercial success of such enterprises: amateurs of a child pornography have already got used to search for production not in illegal shops, but in police free virtual network. A subscriber gets an opportunity to have a good time with child porn in Internet for 15-20 dollars a month, knowing that these actions are not punishable in many countries, including the Soviet Union. - - - - - - - - - - Europe vs. Cyberterrorism The desire of Europe to go in own way and to be less dependent on U.S. is shown not only in a policy, but also in sphere of high technologies. After attacks of virus Slammer the European Community has decided to create the European Agency on Information and Computer Networks Security. The budget of agency will make 24 million euro for the first 5 years. The agency will begin work in January, 2004. The purpose of new structure is to fight computer piracy and fast information interchange between the countries of EU in cases of cyber threats. - - - - - - - - - - Retailers back online security scheme Good news for e-commerce as 4,000 European retailers join Verified by Visa initiative. Companies including HBOS, Lloyds TSB and Opodo have signed up for the Verified by Visa scheme, aimed at improving consumer confidence in online shopping. - - - - - - - - - - New WPA wireless security on its way Virtually no one has a kind word to say about Wired Equivalent Privacy (WEP), the standard for securing data transmissions on Wi-Fi networks, writes Anne Zieger. WEP, which relies on cryptography that can be cracked with a half-hour of laptop time, isn't well-defended, but until recently it's all Wi-Fi fans had. 802.11i Shores Up Wireless Security While WPA goes a long way toward addressing the shortcomings of WEP, not all users will be able to take advantage of it. Not all users can share the same security infrastructure. Some users will have a PDA and lack the processing resources of a PC. The inadequacy of the Wired Equivalent Privacy protocol has delayed widespread adoption of wireless LANs in many corporations. While most network administrators and end users understand the productivity benefits of cutting the Ethernet cord, most worry about the risk of doing so. - - - - - - - - - - WLAN alert! Get your helmets on Somerset County Council (SCC) has advised its employees not to install wireless networks in the county's schools and offices until it's carried out a full investigation into the safety of the technology. Details about the warning remain sketchy since Health and Safety officials at the council were reluctant to discuss the matter until the tests have been completed. However, in a statement the council told us: "Somerset County Council has a radiation working group looking into the risks of wireless network technology. - - - - - - - - - - Virus Protection Gets Better The latest addition to McAfee's line of corporate antivirus solutions, McAfee VirusScan Enterprise 7.0, gives companies strong virus protection with lower maintenance requirements. VirusScan runs only on Windows NT, 2000, and XP, but it performs double duty, replacing VirusScan 4.51 on desktops and NetShield 4.5 on file servers. The Achilles' heel in any enterprise's virus protection is end users who disable the software to save time. To help minimize this, McAfee has improved performance and given administrators better tools to make sure protection is on and up to date. For example, the new File Scan Caching technology improves performance over time by remembering scanned areas and not rescanning unmodified files in future passes.,4149,1116264,00.asp?kc=PCRSS02129TX1K0000530 - - - - - - - - - - Industrial Defender protects against digital attack Control-system specialist Verano has introduced a service and software package to help companies protect their critical infrastructure from digital attacks. The product, dubbed Industrial Defender, aims to close holes in the security surrounding control systems used by utility companies, manufacturers and other industries. Verano announced the first piece, a network monitoring appliance and service, on Tuesday. - - - - - - - - - - Temp workers the weakest link in security chain Short-term contracts, long-term headaches... Companies who employ high numbers of temporary staff are increasing their exposure to serious security attacks. Corporate compliance specialist PolicyMatter believes temp staff on short-term contracts represent the biggest danger to a company because they are often not made aware of security policies before being set loose on sensitive systems.,,t269-s2135890,00.html - - - - - - - - - - Privacy vs. Internet piracy Verizon and Earthlink have informed five Internet service customers that they can expect to be hearing from the record industry very, very soon. But the Recording Industry Association of America says it hasn't decided what to do with the names it won last week in a bitter court battle over Internet piracy. Verizon challenged a subpoena requested by the RIAA, refusing to turn over the identities of subscribers accused of trading copyrighted music online. An appeals court last week gave the company two weeks to comply. Verizon turned over the names of four subscribers, traced by the music industry through their numerical Internet Protocol (IP) addresses. - - - - - - - - - - Magazine, university draw ire of antivirus industry First the University of Calgary announced plans to offer a class in writing computer viruses and other destructive programs. Then Wired magazine published the code of a virus-like program that caused mass havoc on the Internet this year. Both developments infuriated virus-fighting companies and illustrated the high-stakes dilemma of computer security: Do you keep vulnerabilities secret or spread the knowledge so problems can be remedied faster? - - - - - - - - - - Cracking Down on Cyberspace Land Grabs The people who keep the Internet running are coming to terms with address space hijacking, an old scam that's turned suddenly nasty. Earlier this year an expanse of Internet address space belonging to the County of Los Angeles was put to some uses that had little to do with effective municipal governance. Some county addresses inexplicably began hosting porn websites, while others generated suspicious scanning activity that tripped intrusion detection systems around the net. - - - - - - - - - - Reality Check: How Safe Is Linux? Many of the programs included in Linux distros have programming errors that lead to things like privilege escalation, whereby a common user tricks a program into thinking it has more privileges than it does, says Guardian Digital CEO Dave Wreski. It is not enough for an operating system to be low cost, reliable and capable of handling mission-critical applications. At some point in every OS's cycle of life, the question comes down to security and safety. - - - - - - - - - - Effects of Worms on Internet Routing Stability The impact of worms on the Internet has increased significantly over the past five years. In particular worms such as CodeRed II, NIMDA, and the more recent SQL Slammer prove that the ability to effectively impact the Internet overall is here. This impact is not only felt at the connection endpoint where the worm takes residence and replicates itself but also on the infrastructure in-between. In the period of time that CodeRed II infection was at its most severe levels a unique effect began to be observed whereby global routing instability was detected throughout the Internet. - - - - - - - - - - Strategic security assessment can define what degree of risk is acceptable Many businesses respond to increased information security threats by shoring up their perimeter defences. Implementing tools that serve a very specific purpose is part of the solution, but smart organisations are waking up to the need toimplement a strategy that also includes security assessment. - - - - - - - - - - Government IT Review Lockheed vs. Boeing; General Dynamics Gets Bigger; High-Tech Warfare; Northrop's TRW Stomach Ache; and More News. The use and purchase of technology by governments has created a multi-billion-dollar sector, involving some of the world's biggest companies and scores of smaller companies serving niche markets. After Sept. 11, 2001, the so-called government IT sector attracted even more attention, as governments started spending more on security technology and as a battered tech sector reoriented itself to serve a growing and relatively more stable marketplace. *********************************************************** Computer Forensics Training - Online. An intense, 150 hour, instructor lead program that teaches you computer forensics and helps prepare you for the Certified Computer Examiner exam. For more information see; *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2003,, Campbell, CA.