NewsBits for October 2, 2003 sponsored by, Southeast Cybercrime Institute - ************************************************************ Official: crackers have broken into GPRS billing Some time today, the GPRS world will reveal that it has a security vulnerability which has seen an undisclosed number of its customers ripped off. They've been trapped into connecting to malicious content servers, by hackers penetrating the billing system. The first international phone company to admit that they have installed a solution - one offered by Check Point - will be the German phone provider, E-Plus. - - - - - - - - - - ID theft undermining integrated terror watch lists Despite the government's recent efforts to integrate dozens of terrorist watch list databases, terrorists may still be slipping through major cracks in homeland defenses by stealing identities and using computers to create fraudulent travel documents, officials told Congress yesterday.,10801,85606,00.html - - - - - - - - - - Police crack pedophile's secret code Patient police work and a clever piece of computer programming have helped convict a pedophile who preyed upon his own daughter. The man, who cannot be identified to protect his young victim, was jailed for 6 1/2 years yesterday after a County Court jury convicted him last week of one count of incest and four counts of performing an indecent act with a child under 16. Police searched his home in August 2002 but were unable to find photographs or footage described by his daughter. Instead, they found a large encrypted file on the man's computer hard drive that could be opened only with a password. When the man refused to reveal the code, a police computer specialist set up a program to crack the password by cycling through endless combinations of letters. "After 19 weeks of continuous operation that password was found and access gained to the file," Judge Anderson said. - - - - - - - - - - Family man left child porn CD-ROM in car A DAD-OF-TWO employed as a manager at the top security mental hospital which houses Moors murderer Ian Brady has been convicted of downloading child porn images on his computer. Logistics manager Laurence Cassidy was found guilty of possessing 1,800 indecent images of children by a jury at Liverpool Crown Court. During his three-day trial, the jury, which took just one hour to reach their unanimous verdict, heard that Cassidy left a computer disc containing the images in a company car on January 8 last year. A colleague at the hospital found the CDROM, which had Cassidy's name on it and his codeword 'shod' for pornography. It was handed over to the computer department and Cassidy was arrested. - - - - - - - - - - Man faces child porn possession charges A 56-year-old registered sex offender was charged Wednesday with three counts of possessing child pornography that he allegedly downloaded from the Internet. Homer Daniel Hirst of Everett was being held in lieu of $50,000 bail. Snohomish County sheriff's detectives arrested him after he gave them permission to examine his computer and disks. - - - - - - - - - - Romeoville Man Accused Of Child Porn On Web Lake County sheriff's police arrested a Romeoville man on child pornography charges this week. Chad Arnold, 30, allegedly used the Internet to send pornographic pictures of underage girls, mostly teens, to undercover officers. Arnold was identified through his e-mail address. With a search warrant, police confiscated a computer, scanner, digital printer and scanner from Arnold's home. - - - - - - - - - - Lockheed Martin Employee Charged With Child Pornography A Lockheed Martin employee in Orlando, Fla., was arrested Thursday for allegedly possessing child pornography. Investigators said Johnny Oxendine, 54, brought his computer to work for repairs, but instead of finding problems, service technicians apparently found child pornography. Oxendine was later interviewed and confessed to the crime, according to authorities. - - - - - - - - - - Two admit roles in teen porn e-mailed to Navy ship A Navy man and his sister-in-law admitted yesterday they took part in a scheme to e-mail pornographic pictures of underage girls to the aircraft carrier Constellation. A third person, also a sailor on the carrier, rejected a proposed plea agreement and was ordered to stand trial on molestation and child pornography charges. All three are from El Cajon, as are the two high school girls who appear in the pornographic pictures. - - - - - - - - - - Man cleared of porn 'nightmare' A warehouse manager has been cleared of downloading child pornography from the internet. The prosecution dropped 13 charges of making an indecent photograph of a child against Arwel Jones, 31, from Llanfairfechan, Gwynedd, at Caernarfon Crown Court. Mr Jones said the images were already on the second-hand computer when he bought it. Andrew Jebb, prosecuting, said there was a fault with the computer's internal clock and it was impossible to prove when the images had been downloaded. - - - - - - - - - - Interpol fears child porn video boom on Web Internet paedophiles increasingly crave video images of children being abused and this could lead to live, pay-per-view child porn sessions using webcameras, a top Interpol officer said on Wednesday. In an interview with Reuters, the officer, Hamish McCulloch, also highlighted the rise of "virtual child pornography," using advanced computer graphics to create highly realistic electronic images, and urged countries to make it a crime. - - - - - - - - - - Mass. pair aids targets of music industry lawsuits Some of the people sued by the recording industry for downloading online music are again turning to the Web this time for help raising money to defend themselves or finance settlements. Two Worcester men have set up an online system called Downhill Battle that allows donors to contribute directly to those targeted in the suits. Music biz slams Oz Net piracy plea bargain - - - - - - - - - - Microsoft faces class action on security Microsoft faces a proposed class-action lawsuit in California based on the claim that market dominance and vulnerability to viruses in its software could lead to "massive, cascading failures" in global computer networks. The lawsuit, filed Tuesday in Los Angeles Superior Court, also claims that Microsoft's security warnings are too complex to be understood by the general public and serve instead to tip off "fast-moving" hackers on how to exploit flaws in its operating system.,10801,85631,00.html - - - - - - - - - - Reporters' Documents May be Subpoenaed in Hacker Case The FBI has notified 13 reporters that it might subpoena their records regarding a hacker charged with breaking into The New York Times' computer system. A Sept. 19 letter from the FBI directs Associated Press reporter Ted Bridis to preserve any documents pertaining to Adrian Lamo, stating that the request is in anticipation of an order requiring materials to be turned over to federal law enforcement authorities. The FBI said Wednesday that similar letters went to 12 other reporters or news organizations, which the agency did not identify. - - - - - - - - - - Hackers to Face Tougher Sentences Convicted hackers and virus writers soon will face significantly harsher penalties under new guidelines that dictate how the government punishes computer crimes. Starting in November, federal judges will begin handing out the expanded penalties, which were developed by the U.S. Sentencing Commission. Congress ordered the changes last year, saying that sentences for convicted computer criminals should reflect the seriousness of their crimes. - - - - - - - - - - Swen trumps Sobig to top virus league Security fears play into virus writers' hands. The most commonly received virus for September is a new entry the Swen worm, which fools users into opening an attachment by masquerading as a Microsoft security update email. Sobig worm September's worst virus Batten down the hatches, says Symantec Flaws quickly turn into attacks,39020375,39116849,00.htm Trojan program uses Internet Explorer hole to hijack browsers,10801,85630,00.html - - - - - - - - - - New Trojan may have VeriSign in crosshairs Sophos' anti-virus team has confirmed that it is in the preliminary stages of analysing a new Trojan that may be linked to an organised attack on VeriSign's domain name servers. Paul Ducklin, head of technology, Sophos Asia-Pacific, said the Trojan, dubbed Qhost1, seduces the user to go to a Web site that exploits a security vulnerability in Internet Explorer and inserts malicious code onto the victim's personal computer.,2000048600,20279284,00.htm - - - - - - - - - - Will California's tough anti-spam law fly? With the recall election in full-swing, and in perhaps one of his last acts as Governor, Gray Davis just signed into California law arguably the toughest anti-spam law in the United States. But will this new law work in combating spam, and will it pass constitutional muster? Only time will tell. Doubts raised over MPs' anti-spam crusade - - - - - - - - - - 'Unholy alliance' poses huge security threat An unholy alliance is developing between the peddlers of pornography and the hacking community that will pose the biggest threat to the security and integrity of the data held on this world's computer systems - large and small. Graham Vorster, chief technology officer at Duxbury Networking, takes a look at what awaits the world in the wake of the adult industry's liberalisation - and what information technology (IT) specialists can do to counter this growing threat. - - - - - - - - - - 'Smart' bank card scheme goes nationwide After a successful trial in Nottingham, smart-card banking is spreading to the rest of the UK. The national rollout of new 'smart' bank cards as part of a PS1.1bn scheme to cut the UK's PS424m annual fraud bill by over half is to begin this week.,39020354,39116861,00.htm - - - - - - - - - - Digital-rights group knocks 'trusted' PCs A high-profile digital civil liberties group is criticizing a component of the "trusted computing" technology promoted by Microsoft, IBM and other technology companies, calling the feature a threat to computer users. The paper, which was set to be released late Wednesday by the Electronic Frontier Foundation, analyzes the promised features of several different trusted computing initiatives. The efforts aim to develop next-generation hardware and software that can better protect data from attackers, viruses and digital pirates. OMB issues privacy guidance - - - - - - - - - - Cisco warns its WLAN security can be cracked The proprietary security system used by Cisco Systems Inc. to protect wireless LANs widely deployed by enterprises can be defeated by a "dictionary attack" designed to crack passwords. To counter the security threat, the company is warning customers to institute strong password policies.,10801,85637,00.html - - - - - - - - - - Linux vs. Windows Viruses To mess up a Linux box, you need to work at it; to mess up your Windows box, you just need to work on it. We've all heard it many times when a new Microsoft virus comes out. In fact, I've heard it a couple of times this week already. Someone on a mailing list or discussion forum complains about the latest in a long line of Microsoft email viruses or worms and recommends others consider Mac OS X or Linux as a somewhat safer computing platform. - - - - - - - - - - Fraud danger drives compliance investment Business intelligence and analytics set to benefit. The growing danger of fraud is driving up investment in compliance, risk management projects, analytics and business intelligence software in the finance sector, according to a new report. - - - - - - - - - - The New Security Risk of VoIP "This is the first time that a computer virus can stop your telephones from working," Mark Lobel, a senior manager at PricewaterhouseCoopers, told the E-Commerce Times. "There is a whole new class of attacks that can occur." - - - - - - - - - - Wireless Network Policy Development (Part Two) Part One of this article explained the need for wireless policy, some of the inherent threats of wireless networks, and covered some of the essential components of a wireless policy. This second and final article will continue to discuss essential components for policy development, as well as address other considerations that one should be aware of. Taken together, this series of articles on wireless policy development will help create a framework for an organization's wireless policy, its active enforcement, and will allow a wireless network to be both secure and operate with limited risk. Wireless Network Policy Development (Part One) - - - - - - - - - - A Suspect Computer Program A secret computer program detected something suspicious about the middle-aged passenger heading to Eugene, Ore. He traveled often, usually taking one-way flights on short notice. In the months following the Sept. 11 attacks, every time he tried to board a flight in Portland, he was pulled out of line and searched as a possible terrorist threat.,1,7687353.story - - - - - - - - - - Japanese city plans GPS tracking system for children Stunned by the kidnapping of a teenage girl, a rural Japanese city plans to use a satellite-linked tracking system to help parents find their children. The northern city of Murakami has asked two security companies to provide the service for the families of 2,700 elementary and junior high school students, said Kenkichi Kimura, an official on the city's Board of Education. *********************************************************** Computer Forensics Training - Online. An intense, 150 hour, instructor lead program that teaches you computer forensics and helps prepare you for the Certified Computer Examiner exam. For more information see; *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2003,, Campbell, CA.