NewsBits for July 14, 2003 sponsored by, Southeast Cybercrime Institute - ************************************************************ Cyber pirates hack into Barisal DC office Internet account Cyber pirates recently hacked into the Internet account of Barisal DC office marking the first cyber crime in the Barisal region. Sources said the computer hacking incident was revealed after the DC office received a heavily bloated Internet bill and lodged a complaint with the Bangladesh Telegraph and Telephone Board (BTTB), which is the internet service provider for the DC office. - - - - - - - - - - Missing in France: The 12-year-old girl who ran off with the US Marine she met online. Shevaun Pennington seemed to be the same as any normal 12-year-old experiencing growing pains. She listened to loud punk rock, surfed the Net for hours and talked endlessly of "her boyfriends" despite never having been on a proper date. No one could have guessed that the person she referred to as her "American boy- friend" was something other than the figment of an excitable school-girl's imagination. The "boy" in question was in fact Toby Studabaker, a 31-year-old American Marine who, two weeks ago, discharged himself from the US military to meet the child he had befriended in his e-mails. - - - - - - - - - - Hollywood actor busted in kiddie-sex sting A small-time screen actor who once appeared in a disaster movie with Charo was arrested yesterday in a pre-teen Internet sex sting. The California thespian was nabbed at an Essington hotel by a Delaware County anti-kiddie- porn task force. Actor Robert Courts, 68, was charged with criminal solicitation of rape and solicitation of sexual assault among other charges. In an unconnected incident, the sting also scored a Pittsburgh man who allegedly was seeking to meet two girls, 7 and 10 years of age. Jeffrey Therrien, 29, was charged with attempted rape, attempted involuntary deviate sexual intercourse and attempted corruption of minors. Officials said both men visited Delaware County after arranging on the Internet to have sex with pre-teen girls. - - - - - - - - - - Fayetteville Man Arrested On Child Porn Charges Police arrested a 27 year old Northwest Arkansas man on child pornography charges Friday. Fayetteville police say a co-worker of Mark Anthony Rayer of Fayetteville found child pornography on Rayer's computer at work. Investigators discovered Rayer had also deleted similar pictures from his home computer and they say he had an inappropriate internet relationship with a 14 year old Oklahoma girl. Rayer faces two counts of possessing computer child pornography and one count of sexual indecency with a child. - - - - - - - - - - Sailors Allegedly Exchanged Child Porn Images Via E-Mail A USS Constellation sailor accused of transmitting and receiving child pornography while aboard the ship in the Persian Gulf will remain in custody on $500,000 bail, a judge ruled. Wayne Craig, 22, is one of three people charged in the child porn ring and is also accused of having sex with at least one of the 15- and 16-year-old alleged victims. Prosecutor Jeff Dort said the sex acts depicted in the pornography occurred before the Constellation went to sea last November, then e-mails were allegedly exchanged between Craig and co-defendant Robert Quackenbush aboard the ship and the victims, KGTV reported. - - - - - - - - - - Internet Sex Arrests Coming Under Criticism Police investigations of potential sexual predators on the Internet are coming under fire from defense lawyers. Xenia police pioneered child exploitation investigations several years ago, but now arrests made by officers they helped train are being questioned. Xenia police have made more than 50 sex-related arrests in the last 3-4 years based on Internet investigations. - - - - - - - - - - Stealth program hijacks PCs to send porn ads Close to 2 000 Windows-based PCs with high-speed Internet connections have been hijacked by a stealth program and are being used to send ads for pornography, computer security experts said on Friday. It is unknown exactly how the so-called Trojan program is spreading to victim computers around the world, whose owners most likely have no idea what is happening, said Richard Smith, a security consultant in Boston. - - - - - - - - - - Lawmakers Drafting IT Security Requirements Lawmakers are getting less subtle with their demands that vendors and network operators do everything possible to make the nation's cyber-infrastructure secure. Even legislation dictating IT security requirementsregarded as a last resortis in the works and slated for introduction by year's end. Advising corporations to "get their house in order" and demonstrate that regulation is unnecessary, Rep. Adam Putnam, R-Fla., chairman of the subcommittee on technology and information policy, said last week that legislation is in development.,3959,1190708,00.asp Dire shortage of security experts spurs gov't to help IT training - - - - - - - - - - Planned Parenthood goes for anti-abortionist necks The Planned Parenthood Federation of America (PPFA) is going for several notorious anti-abortionists necks and a famous cybersquatter in a case it has brought over nine domains it claims infringe its trademarks. The federation, which provides teenagers with sexual health information and runs abortion clinics across America, has named four people in the court action over nine domains including (note the missing dot) and .org and, and and .biz. It owns the trademarks Planned Parenthood and Teenwire. - - - - - - - - - - Government to set out e-crime strategy The government is to work with law enforcement agencies and industry to produce its first strategy on tackling e-crime. The Home Office said that new communication technologies offer massive benefits but at the same time present new opportunities for criminals. - - - - - - - - - - Ukraine Police and Interpol declare war to child porn Three-day visit of the head of the Interpol to Ukraine has come to the end on July, 8. During visit the delegation of International organization of Criminal Police had official meetings with representatives of Ukraine's Law Enforcement Bodies. The 33-rd Regional European Conference with 46 countries - participants will take place in Kiev in 2004. - - - - - - - - - - Cyber crime is a national security threat The president of Ukraine Leonid Kuchma has signed the changes in the Concept of National Security of Ukraine (the Basis of a public policy). The related law on bases of national security of Ukraine has been passed by the Verhovna Rada on June, 19, 2003. The law will come into effect from the date of its publication. - - - - - - - - - - 'Open and helpful community' - of credit card thieves Credit card fraud "power users" with programming skills and no fear are making it easier for newbies to break into white collar crime, according to a report from the Honeynet Research Alliance this week. - - - - - - - - - - Hard for file swappers to hide identity People swapping material online can easily have their identity traced, leaving them vulnerable to threatened US legal action. File swappers hoping to share music and other works online without exposing their identity to the prying eyes of copyright enforcers face a tough choice.,,t269-s2137474,00.html - - - - - - - - - - Researchers ``privacy appliance'' seeks to harness government snooping The Pentagon's plan to sniff out terrorists from a sea of personal data collected by the government, banks, airlines, credit card companies and other sources has been criticized as the most sweeping invasion of privacy in history. But Teresa Lunt believes that the much-maligned Terrorism Information Awareness system can work without stomping on individual rights. The researcher has proposed -- and the government is funding -- the creation of a device that could watch and rein in the watchers. Funding for TIA All But Dead,1283,59606,00.html Pentagon Alters LifeLog Project,1283,59607,00.html - - - - - - - - - - Flaw leaves work PCs and Internet cafes open A researcher says PCs with restricted user accounts are vulnerable to 'shatter' attacks. A class of attacks that allows a user to take control of any PC or server could leave computer systems in corporations and Internet cafes vulnerable to attack, a researcher says.,,t269-s2137472,00.html - - - - - - - - - - Program focuses on security response The CERT Coordination Center, a security-incident clearinghouse, introduced on Monday a program to certify information technology professionals in incident handling and response. The certification program will train participants in how to react to security incidents and network intrusions. Those people who take five courses, including an elective, and pass a test administered by the Software Engineering Institute will be granted a Certified Computer Security Incident Handler Certification (CCSIHC). The Software Engineering Institute is part of Carnegie Mellon University and manages the CERT Coordination Center. - - - - - - - - - - The Persistence of Hoax is fading into the sunset, while the virus hoaxes it steadfastly debunked seem to live on forever. "I received the e-mail this morning from someone who got it from the governor's office," came the tired complaint. Somewhere in the world, government workers in high place had fallen for the "Teddy Bear" hoax, a.k.a. "jdbgmgr.exe." Lemmings were heading for the cliff to delete the "virus," obeying the e-mail suggestions of the joker who wrote the trick. - - - - - - - - - - CA details management and security plans On-demand, flexibility and management tools central themes of Computer Associates conference. On-demand computing, flexibility and management tools are central themes at this year's CA World conference in Las Vegas. Security alarm: Let's get physical - - - - - - - - - - Sophos Anti-Virus goes OS X Business anti-virus software maker Sophos Inc. announced Monday that it would introduce a Mac OS X (news - web sites)-native solution at Macworld CreativePro Conference & Expo. The expo kicks off today, and its main exhibit hall will be open from July 16-18, 2003. - - - - - - - - - - A Security State of Mind CIOs need to ensure that their enterprise has the right balance between security risks, dollars and defences. Decades ago, a reporter asked the notorious American bank robber Willie Sutton why he robbed banks. He replied: Because thats where the money is. Now the money (and valuable information) is in computers and computer networks. - - - - - - - - - - You've been hacked: What to do in the first hour What you do in the first hour after a hack attack can make a big difference to the ongoing security of your network - here are the most important steps to take. The hair stands up on the back of your neck, and you feel the first bead of sweat roll down the side of your face: You've been hacked. The adrenaline starts to flow and you're ready to jump into action. But what do you do first?,,t481-s2137487,00.html - - - - - - - - - - How Security Conscious Is Your Company? Are you wondering how thorough your company's security measures are? Whether they (or you!) are doing enough? Take our Security Quiz! The SANS Institute, in partnership with Computerworld, has identified four key levels of security awareness. Answer the following multiple-choice questions to find out which level your company most closely matches. - - - - - - - - - - Actual problems of fighting cybercrimes All of us are witnesses of a prompt development of information technologies. By 2005, about 1 billion computers will be connected to the Internet. At the same time several billions sites and images will be placed on the Net. In 2003 the Internet-economy worldwide accounts for about 5 % of a total product. - - - - - - - - - - Computer information has to be protected as a proprietary Very few things can be done without collecting, integrating, generating or having an access to information. M. Winner defined information as an indication of contents taken from the environment when adapting ourselves and our feelings to it. Obtaining and using information allows us live and survive in the surrounding world. - - - - - - - - - - Linux Firewall-related /proc Entries Most people, when creating a Linux firewall, concentrate soley on manipulating kernel network filters: the rulesets you create using userspace tools such as iptables (2.4 kernels,) ipchains (2.2 kernels,) or even ipfwadm (2.0 kernels). However there are kernel variables -- independent of any kernel filtering rules -- that affect how the kernel handles network packets. This article will discuss these variables and the effect they have on the network security of your Linux host or firewall. - - - - - - - - - - Firm hires former INS exec A former federal official has joined SI International to guide the company's homeland security efforts. Mike Becraft, former acting deputy commissioner of the former Immigration and Naturalization Service is now the information technology firm's senior vice president for homeland security. *********************************************************** Computer Forensics Training - Online. An intense, 150 hour, instructor lead program that teaches you computer forensics and helps prepare you for the Certified Computer Examiner exam. For more information see; *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2003,, Campbell, CA.