NewsBits for September 2, 2003 sponsored by, Southeast Cybercrime Institute - ************************************************************ FBI Says Teen Put Worm on Internet Government investigators yesterday arrested a Minnesota teenager on charges of unleashing a version of the "Blaster" worm that snarled Internet traffic and shut down computer systems from Maryland to Sweden earlier this month. FBI agents arrested Jeffrey Lee Parson, an 18-year-old high school senior, early yesterday at the home he shares with his parents in Hopkins, Minn. The U.S. attorney's office in Seattle, which is leading the case, charged Parson with intentionally damaging thousands of computers owned by Redmond, Wash.-based Microsoft Corp., other businesses and individuals. Cops take a bite, or maybe a nibble, out of cybercrime Score one for the cybercops. But the game is far from over. The arrest Friday of a Minnesota high school student, who authorities say wrote a variation of the Blaster worm that has wreaked havoc with thousands of Microsoft Windows users and caused millions of dollars in damage, was a partial but rare victory in the emerging world of cybersleuths. Worm suspect: Im not the one Cyberprints, police work led to arrest of suspected virus author Computer virus creators rarely face jail Should we lock up virus writers? FBI arrests 'stupid' Blaster.B suspect Parsons not dumbest virus writer ever, shock! Teen caught by own "Blaster" worm Blaster Suspect a Typical Teen?,1282,60263,00.html Digital Vandalism Spurs a Call for Oversight - - - - - - - - - - Former Iowa State University student gets prison for child porn A former Iowa State University student was sentenced Friday to more than four years in federal prison on child pornography charges. Jason Neal Lighthall, 21, of Altoona was sentenced to 50 months in federal prison and a three-year supervised release after his prison term. Lighthall was charged with 100 counts of child pornography possession and 60 felony counts of promoting materials depicting sex with minors in May 2002. He pleaded guilty to reduced charges. Campus police seized a computer and disks from Lighthall's dormitory room in March 2002. More computer equipment was taken from his parents" house. Lighthall was suspected of allowing others to copy the images through the Internet. - - - - - - - - - - Sex offender gets 4-year prison term A Morrow County man was sent to prison for four years and designated a sexual predator during his sentencing Wednesday for having sex with a Tuscarawas County teenager last year. David A. Gardner, 36, of Iberia was taken from the courtroom directly to jail at the direction of Tuscarawas County Common Pleas Court Judge Elizabeth Lehigh Thomakos. In June Gardner pleaded guilty to one count each of unlawful sexual conduct with a minor and importuning. The first count stems from a rendezvous he had with the 15-year-old boy on Aug. 20, 2002, and the second charge resulted from his Internet conversations with an undercover law enforcement officer posing as the teen last November. - - - - - - - - - - Man gets jail term for Internet fraud THE Court of First Instance in Dubai has sentenced a Pakistani aged 32 to a year's imprisonment to be followed by deportation. He was also sentenced to one more year's jail term in the second and third cases on charges of fraud and misuse of bank accounts. The accused had published an advertisement in the local media offering jobs to drivers. - - - - - - - - - - Sheriff's Department Hit by Computer Virus The San Diego County Sheriff's Department was hit by a computer virus that forced jail workers to manually book prisoners Saturday and disconnected employees from the Internet and e-mail. The virus, which struck early Friday, did not do any serious damage, said Lt. Don Crist. But jail workers could not operate the computer programs they usually use to fingerprint and book suspects, so they had to do the jobs manually, he said. (LA Times article, free registration required),1,3866619.story - - - - - - - - - - Sobig beats Blaster in Top of the Viral Pops Sobig eclipsed Blaster in the August viral charts. More than a third of support calls (37.6 per cent) logged by AV firm Sophos in August involved Sobig, twice as many (18.8 per cent) as that received about the prolific Blaster worm. Managed services firm MessageLabs has blocked more than 12.8 million Sobig- infected emails, since the appearance of Sobig-F on August 18. At the peak of infection, one in 17 emails MessageLabs scanned harboured the virus. IntY, which provides malicious code screening services for SMEs, reckons one in three emails in a sample of UK small businesses contained the virus at the peak of the outbreak. - - - - - - - - - - Email scam seeks to fleece bank customers Another round of spam purporting to be from Citibank attempts to con customers into revealing personal information. A new spoofed Citibank spam email is doing the rounds that attempts to part unwitting victims from their credit card details, PIN number and email account details.,39020375,39116065,00.htm Vendor sells Latin American citizen data to U.S.,39020375,39116065,00.htm Fake websites on the Increase Online retailers, security companies join to fight Web ID theft,10801,84556,00.html - - - - - - - - - - The war on worms inches forward As agencies sopped up the mess from recent rolling worm attacks, the FBI asked for help from the public in tracking down the creators of the virus-bearing bugs. We employ the latest technology and code analysis to direct us to potential sources, and I am confident that we will find the culprits, FBI director Robert S. Mueller III said last week. - - - - - - - - - - Hacking by subpoena ruled illegal Issuing an egregiously overbroad subpoena for stored e-mail qualifies as a computer intrusion in violation of anti-hacking laws, a federal appeals court ruled Thursday, deciding a case in which a litigant in a civil matter subpoenaed every single piece of e-mail his courtroom adversary sent or received. - - - - - - - - - - Viruses boost 'Big Brother' software It has never been easier for employers to monitor the e-mails and Internet activity of their staff. New anti-virus software easily enables companies to read e-mails, track Web surfing, and monitor content moving in and out of corporations. "Security software is a very competitive market and most vendors have now moved in to anti-spamming solutions and content filtering," Nancy Ho from security specialists Trend Micro told CNN. Big Brother: It's not government, but corporate America doing the spying - - - - - - - - - - Tone Deaf to a Moral Dilemma? Susan Philips has a conscience so sensitive to ethical failings that she feels guilty if she leaves her shopping cart adrift in the grocery store parking lot. Her influence is reflected in her elder daughter's career choice: Miriam Philips, 22, wants to be a rabbi. On at least one moral dilemma, though, mother and daughter are on opposite sides. To Susan, downloading music on the Internet without permission is wrong. To Miriam, it's just what you do when you go to college. (LA Times, free registration required),1,7836665.story Colleges warn students about file swapping Google sucked into RIAA/P2P fight - - - - - - - - - - Guarding against ID theft The Armchair Millionaire guide to keeping your good name from going bad. My sister was the victim of identity theft and went through months of hassle getting everything straightened out. What are your suggestions for safeguarding your identity? - - - - - - - - - - James Bond evicts cybersquatter James Bond actor Pierce Brosnan has won a legal battle to claim the Internet Web site bearing his name, international arbitrators ruled Monday. The Irish star brought the case against a company that was a front for the now infamous cybersquatter Jeff Burgar, who redirected to a commercial Web site. Burgar has been involved in several other disputes over celebrity Web sites and has lost cases against singer Celine Dion, rock group Pearl Jam and former Baywatch beauty Pamela Anderson. - - - - - - - - - - Surprising percentage of public fear cyberattacks About half of Americans fear terrorists will launch cyberattacks on the large networks that operate the banking, electrical transportation and water systems, disrupting everyday life and possibly crippling economic activity, according to a survey taken by Federal Computer Week and the Pew Internet & American Life Project. Some 49% of Americans surveyed said they were afraid of cyberassaults on key parts of the U.S. economy. A significant gender gap showed up in the data, as women were more likely to express fear. People in the Midwest were the most concerned about cyberterrorism.,0,4358947.story - - - - - - - - - - New Office locks down documents As digital media publishers scramble to devise a foolproof method of copy protection, Microsoft is ready to push digital rights management into a whole new arena--your desktop. Office 2003, the upcoming update of the company's market- dominating productivity package, for the first time will include tools for restricting access to documents created with the software. Office workers can specify who can read or alter a spreadsheet, block it from copying or printing, and set an expiration date. - - - - - - - - - - nCipher Aids PKI Portability Cryptographic hardware provider nCipher plc. is developing an application that promises to remove a major stumbling block for organizations looking to implement a PKI by automating the onerous process of moving encryption keys among devices. One drawback of public-key infrastructure cryptosystems, such as those used in e-commerce applications and other online transactions, has been that the keys used to encrypt messages or sign other keys are typically tied to specific devices. In many cases, the keys are generated and stored in hardware security modules designed to prevent people from removing them.,3959,1234621,00.asp - - - - - - - - - - Pocket-Sized Wireless Detection There you are: sitting in your favorite bookstore/cafe, sipping a caramel latte and casually leafing through the latest copy of Wired magazine when you are suddenly bombarded from almost every direction without warning and with no means to stop it. Fortunately, the storm you are caught in is made up of 802.11 packets which are traveling in the 2.4 or 5 gigahertz range and pose no real physical danger to you or those around you. A multi-layered approach to wireless security - - - - - - - - - - Tippingpoint gets security nod Tippingpoint Technologies Inc. recently earned a security stamp of approval that could make the company's intrusion prevention appliances more attractive to government agencies. After completing rigorous testing last month, the company's UnityOne high-speed intrusion prevention systems became the first products in this category to earn the highly- regarded Common Criteria security certification, according to TippingPoint officials. - - - - - - - - - - Digital Sandbox Recognizes Risks to Government Agencies In late 1998 Bryan S. Ware and Anthony F. Beverina thought they found a way to help federal and local government agencies analyze the risks to their infrastructure. The two, who were working for a government technology company at the time, proposed spinning off a new firm to pursue the idea. Their bosses' response, according to Ware: "Get back to work." They did get back to work, but at night they developed prototypes of the technology and floated the idea by every government official who would pick up the phone. - - - - - - - - - - Security Service of Ukraine declares the necessity of monitoring communications "Introduction of lawful telecommunications monitoring is necessary in connection with requirements of Cybercrime Conventions and the corresponding directive of the European Community", - Security Service of Ukraine (SSU) declares. According to SSU's press-service, the passing of bill "About monitoring communications " will allow to develop the legislative base for regulation the work of law enforcement bodies on getting the information through communications for prevention or disclosing cybercrime and cyberterrorism; it could also allow to realize effective cooperation with foreign law enforcement bodies on monitoring communications in fighting criminality. - - - - - - - - - - How many security vulnerabilities a month are acceptable? Reading through responses to an article I wrote about Mad Hatter and the broader subject of auto-immune code, and since I am working on a project for a client that involves Sun products in a security context, it begs me to ask the question - are twenty security vulnerabilities in one month an acceptable number for Sun customers? - - - - - - - - - - Editorial: Cyber Terrorism There is an assumption that the march of science and technology is taking humankind toward ever-dizzier heights of achievement. Yet those who feel disturbed about the loss of all the old-fashioned skills that are being replaced by technology must have felt a grim satisfaction recently. First there was the paralysis of the eastern states of North America in the biggest-ever power failure and now yet another computer virus has brought hundreds of thousands of computers around the world to a grinding halt.;=0&article=31196&d=1&m=9&y=2003 - - - - - - - - - - How some spammers get your e-mail Forget bad luck. Those annoying chain letters circulating the Internet could be cursing you with an inbox full of spam e-mail, computer experts warn. While not as efficient as "spiders" which automatically crawl the Web in search of addresses, computer experts warn that some spammers are using chain letters to collect e-mail usernames. A Support Group for Spammers,1284,60224,00.html - - - - - - - - - - Sex, lies and Data Protection Act leave SMEs in peril Firms trying to protect themselves against claims for sex discrimination by completing equal pay questionnaires submitted by employees risk falling foul of the Data Protection Act, legal experts have warned. UK commercial law practice Reynolds Porter Chamberlain (RPC) said the danger - which is most acute for small companies - centres on the fact that employees who suspect that they may have a claim under the Equal Pay Act 1970 are now allowed to submit a questionnaire to their employer requesting information on the pay of a comparable colleague, either by name or by job title. - - - - - - - - - - DHS expands information sharing The Homeland Security Department today unveiled a program that will increase its terrorist information sharing with state and local authorities, as part of a series of steps to reorganize security functions. During a speech this afternoon in Washington, department secretary Tom Ridge described the Strategic Communications Resources, or Secure, initiative. Ridge sees technology, agency restructuring bolstering homeland security,10801,84550,00.html GAO: Federal, local agencies do not effectively share terrorism intelligence - - - - - - - - - - Text-messaging drivers may go to jail Singaporeans who send text messages on their mobile phones while driving face a fine of up to 1,000 Singapore dollars (US $570) and six months in jail, police said Tuesday. Police issued a statement about text messaging behind the wheel after a letter appeared in the Straits Times newspaper asking whether it was legal for a bus driver to send messages with one hand while steering his vehicle with the other. - - - - - - - - - - GPS device thief caught by GPS To track down this alleged thief, all police had to do was flick on a computer. A 40-year-old man was arrested Wednesday and charged with stealing a computerized tracking device that uses a global positioning system to keep track of jail prisoners on home detention. *********************************************************** Computer Forensics Training - Online. An intense, 150 hour, instructor lead program that teaches you computer forensics and helps prepare you for the Certified Computer Examiner exam. For more information see; *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2003,, Campbell, CA.