NewsBits for October 28, 2003 sponsored by, Southeast Cybercrime Institute - ************************************************************ Youth held over computer hacking A BRISBANE teenager has been arrested for allegedly hacking into the computer system of an Australian- based internet service provider (ISP). The arrest of the 17-year-old, who lives in west suburban Kenmore, was the first of its kind under the Criminal Code Act 1995. It followed a short investigation by the Australian High Tech Crime Centre (AHTCC) after it received a complaint on October 23 from an ISP that its computer system had been accessed without authority.,5744,7697294%255E1702,00.html - - - - - - - - - - Suspected paedophile cleared by computer forensics IT forensics firm Vogon has explained how its work helped clear a man accused of storing child pornography on his computer by proving his PC was contaminated by Trojan horse infection capable of downloading illicit images onto his machine. - - - - - - - - - - Ex-bus driver gets prison term A former substitute teacher and school bus driver in Morris and Sussex counties was sentenced to seven years in state prison for having and distributing child pornography. Newark resident Lawrence Fascia, 50, formerly of Stanhope, was sentenced in state Superior Court Friday to seven years for five counts of second-degree endangering the welfare of a minor by using a computer to distribute child pornography and giving child pornography to a minor under 16 years old.,52505, - - - - - - - - - - Adelaide man fined over child porn An Adelaide man has been fined $2,000 for possessing and dealing in child pornography over the Internet. The magistrate said the spread of such material was insidious and corrupted the children involved. Adam Nicholas Newton, 23, trading under the user name Radium XXX, was detected by Interpol on the March 20, 2001. He used the International Relay Chat to set up an "F" server to receive and distribute pornographic material, a large proportion of which was child pornography. - - - - - - - - - - Internet suspect nabbed A three-week undercover sting operation led to the arrest of George Ford, 28, who police say used the Internet to lure what he thought was a 14-year-old girl into a meeting. Ford actually had been corresponding with a state police agent via e-mail and arranged to meet her in the Clovis area, according to New Mexico State Police. When state police officers arrived at the site, Ford fled on foot but was apprehended after a short chase. - - - - - - - - - - Trail in Child Sex Video Led Halfway Around World It was nearly five years ago when a man recorded a video featuring two young girls, one 10 and the other 11, engaging in sexually explicit acts with him in his apartment on the first floor of a little yellow house here. This month, the local police, with a copy of the video that had been seized in Japan by federal investigators looking into child pornography, were able to trace the recording back to its origins. They arrested both the man suspected of producing the video and a mother who the police say prostituted her two girls to feed the man's obsession. (NY Times article, free registration required) - - - - - - - - - - Sober email worm gives Windows users the DTs A virus which poses as a security fix from an AV firm is the latest menace to assault Windows users. Sober typically spreads by email. The viral messages it generates have infectious attachment names such as typically anti_virusdoc.pif, check-patch.bat, playme.exe and variable English and German subject lines. A full list can be found in an advisory from Finnish AV firm F-Secure. Windows users foolish enough to open the infectious attachments get the pox. On infected machines, the worm makes certain registry changes and installs its own SMTP client to further its spread. Sober worm may be slow, but don't be complacent Firewalls for Safeguarding Windows Networks - - - - - - - - - - Privacy bill undercuts state law The U.S. Senate is about to take up a bill that would give consumers some additional safeguards. But if it passes, it could significantly undercut the landmark financial-privacy law enacted in California in August. The bill would override a provision of the California law that restricts financial institutions' ability to share customers' personal information with affiliated companies. - - - - - - - - - - National spam bill takes teeth out of tough state law After years of doing mostly nothing, Congress has finally decided to step in and do something about spam. Something stupid. A do-not-spam registry? You've got to be kidding. The Senate last week passed a bill that would establish the registry. It seems unlikely that the House will take up the measure before it recesses for the year in November, but it wouldn't matter if it passed the bill with flying colors. - - - - - - - - - - Hackers defence: the computer did it Prosecutors looking to throw the book at accused computer hackers have come across a legal defence expected to become even more widespread in an era of hijacked PCs and laptops that threatens to blur the lines of personal responsibility: the computer did it. In one case that was being watched as a bellwether by computer security experts, Aaron Caffrey, 19, was acquitted earlier this month by a London court on charges of hacking into the computer system of the Houston Pilots, an independent contractor for the Port of Houston, in September 2001. - - - - - - - - - - Companies warned over corporate identity theft Individuals have been warned about the threat of identity theft for years. Now it's the turn of businesses. Police say companies need to be more aware of the growing risk of corporate identity theft, following a recent spate of frauds that targeted customers of several high street banks.,39020375,39117444,00.htm - - - - - - - - - - Diebold issues threat to publishers of leaked documents Despite lawsuit threats from one of the nation's largest electronic voting machine suppliers, some activists are refusing to remove from Web sites internal company documents that they claim raise serious security questions. - - - - - - - - - - Justice renews Web use monitor The Justice Department will continue to monitor employee Internet use with Wavecrest Computing's Cyfin Reporter software. For the second year, DOJ officials will use the software to try to stop misuse of the Internet by the department's 100,000 users. Justice first purchased the software in 2002 through a General Services Administration schedule. The renewal cost the department $36,000, according to the company. - - - - - - - - - - IBM looks to secure online data IBM has partnered with Watchfire, a provider of online business management services, to help companies adhere to new privacy standards and data-handling regulations. With the arrangement, IBM said Monday that it will be able to help businesses protect customer privacy and shield themselves against liability. Big Blue will base the service on Watchfire's technology to automatically spot threats to identity information. - - - - - - - - - - ID management--simple, cheap security Safelite Glass had a common business problem: Its information systems were a morass of products from different manufacturers, requiring the company to employ nearly a dozen administrators for security alone. A glass-replacement services contractor for insurance companies, Safelite used Siebel Systems products to manage customer relations, Cognos technology to organize its data warehouse, Oracle systems to arrange its financial records and a half dozen other applications to run the business. - - - - - - - - - - Introduction to Nessus Nessus is a great tool designed to automate the testing and discovery of known security problems. Typically someone, a hacker group, a security company, or a researcher discovers a specific way to violate the security of a software product. The discovery may be accidental or through directed research; the vulnerability, in various levels of detail, is then released to the security community. Nessus is designed to help identify and solve these known problems, before a hacker takes advantage of them. Nessus is a great tool with lots of capabilities. - - - - - - - - - - Make sure your wireless network can't be sniffed, warns DataPro As wireless networks are becoming more popular, companies need to understand that they also need to be protected from intrusions because people with the right technology will be able to gain access to their networks, said Gary Sweidan, operations director of premier Internet service provider (ISP), DataPro. "One of the biggest problems," said Sweidan, "is the capability of the people with the right technology to detect, or 'sniff', a wireless network. Wireless LAN security: X marks the spot - - - - - - - - - - Spam Pitches Are Mutating Faster While Hormel's Spam never changes, e-mail spam mutates nearly every hour like a freakish germ. Spammers tout Vicodin when the Viagra market goes flaccid. They misspell the word "diploma" every way possible to get you to buy a master's. And they insert invisible HTML tags in between letters of words to sneak snake-oil penis-pill pitches past keyword filters.,1377,60941,00.html *********************************************************** Computer Forensics Training - Online. An intense, 150 hour, instructor lead program that teaches you computer forensics and helps prepare you for the Certified Computer Examiner exam. For more information see; *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2003,, Campbell, CA.