NewsBits for November 7, 2003 sponsored by, Southeast Cybercrime Institute - ************************************************************ Canadian Net fraud suspect arrested A Canadian man has been arrested for advanced fee fraud following a sting operation instigated by a Connecticut woman fed up with receiving scam emails. Like many other people, Heide Evans was constantly barraged with dubious emails purporting to offer millions in exchange for helping to transfer vast funds from Africa. Instead of deleting these emails, she strung the fraudsters along. - - - - - - - - - - Hundreds Of Identities Stolen At N.J. Job Fair Hundreds of people looking for work at a state- organized job fair last month unknowingly provided personal financial information to a fraudulent company. The job applicants gave ELS Locators a $42 fee along with social security numbers, bank account numbers and credit card information. The three-day fair was organized by state Department of Labor officials after the company requested a list of all New Jersey residents who had filed for unemployment benefits, NewsChannel 4 reported on Thursday. Jersey City Police Chief Ronald Buonocore said he has since been notified by federal authorities that the company was part of a multistate scheme to steal personal information. - - - - - - - - - - Ex-Miracle batboy gets six years A man who was once a popular Fort Myers Miracle batboy was sentenced Thursday to nearly six years in prison on child pornography charges. Alan Robert Johnson, 24, of North Fort Myers - who was nicknamed "The A Train" as a batboy because of his size - was indicted by a federal grand jury in May after FBI agents connected him with a New York man he'd traded child pornography with over the Internet. Johnson pleaded guilty to possession of child pornography and transmitting it over the Internet, crimes that are punishable by up to 20 years in prison. - - - - - - - - - - Judge refuses to drop gun charge in child sex case A judge has refused to dismiss a secondary weapons count that could add five years to a man's prison term if he is convicted in a child sex case. Jonathan James Munro, 21, was arrested in Salt Lake City after allegedly arranging to meet a 13-year-old girl over the Internet for a sexual encounter. Prosecutors say the tryst was arranged late Sept. 10 in the parking lot of Lincoln Elementary School. However, the teenage girl chatting online as ''shantel3101'' turned out to be an agent with the Utah Internet Crimes Against Children Task Force, and Munro was arrested after agents posed a decoy in the parking lot. - - - - - - - - - - The Guardia di Finanza neutralized computer virus The author of a dangerous and unknown worm (Marque) was discovered and neutralized by Guardia di Finanza (Italian Economic Police). The worm used the popularity of a famous Italian TV show called Zelig to fraudulently alter the telephone connection of thousand of users. The police operation, distinguished by effective international cooperation with the United States Secret Service, lead to the arrest of a man, living between Venezuela and Italy. He was charged with spreading a virus and for IT fraud over 100,000 Euro in 3 days. The money obtained by the fraud was to be transferred first to New York and then to Aruba. - - - - - - - - - - Thwarted Linux backdoor hints at smarter hacks Software developers on Wednesday detected and thwarted a hacker's scheme to submerge a slick backdoor in the next version of the Linux kernel, but security experts say the abortive caper proves that extremely subtle source code tampering is more than just the stuff of paranoid speculation.,10801,86946,00.html Attacker attempts to plant Trojan in Linux,39020384,39117696,00.htm - - - - - - - - - - Kansas auditors crack 1,000 passwords The Kansas Health and Environment Department has serious IT security and disaster recovery problems, the states legislative auditor has found. The auditors said they used password-cracking software to decipher more than 1,000 of the departments passwordsincluding several administrative passwords or 60 percent of the total, in three minutes. The department began fixing the security weaknesses and other problems found in its systems as soon as it learned of them, department secretary Roderick L. Bremby said in response to the report. - - - - - - - - - - Ashcroft takes on foreign government hackers How seriously does the U.S. government take computer intrusion? Seriously enough for the threat of foreign hacking to take a prominent role in new rules governing the FBI's national security investigations issued by U.S. Attorney General John Ashcroft this week. - - - - - - - - - - White House rewriting core security policy document The Bush administration is rewriting the document that signaled the beginning of the federal government's efforts to deal with critical-infrastructure protection and cybersecurity to take into account post-Sept. 11 homeland security requirements.,10801,86956,00.html - - - - - - - - - - US-listed firms face IT security audits Companies publicly traded in the US would have to conduct annual computer security audits, according to a draft of forthcoming legislation. Publicly traded US corporations would have to certify that they have conducted an annual computer security audit, according to a draft of long-awaited legislation the US House of Representatives is preparing.,39020375,39117721,00.htm - - - - - - - - - - Cryptography takes a quantum leap Magiq Technologies' cryptography system is designed to provide a completely secure VPN. A four-year-old start-up has begun shipments of what it says are the world's first commercial data-scrambling devices that use the radically new technology of quantum encryption.,39020345,39117701,00.htm - - - - - - - - - - Military to use Alphatech to stop denial-of-service attack The Air Force awarded a $12.9 million contract to Alphatech Inc. to develop a quarantine defense for military networks against large-scale, denial-of- service attacks, a Defense Department contract statement said. - - - - - - - - - - Poor Wi-Fi passwords 'invite attack' Administrators must choose long, random passwords or risk their Wi-Fi connection being compromised. A security expert has warned users of the latest wireless network security standard, Wi-Fi Protected Access, to pick good passwords or risk being compromised.,39020336,39117697,00.htm - - - - - - - - - - Bad day for WLAN security Just when we all thought wireless security was getting more stable, up pop two old weaknesses in wireless security which could make WPA worse than WEP. With WPA on the way, as an interim to the IEEE's all-singing, all-dancing security update, 802.11i, the Wi-Fi industry is ready to settle back and worry about other things than security. However, two experts independently chose this week to remind us that old weaknesses can make the continued gaps in Wi-Fi security more serious than they might otherwise be. As security concerns ease, businesses warm to Wi-Fi Microsoft Offers XP Wireless Security Rollup - - - - - - - - - - At Microsoft, security flaws emerge as business shortcomings Microsoft Corp.'s offer this week of cash bounties for informants who help it collar virus-writers reflects more than just an escalation of the war on those who would exploit the dominant power in software. The campaign reveals just how much of a threat to Microsoft's bottom line security flaws now represent.,1282,61138,00.html Virus writers dismiss Microsoft's bounty AV vendors shun MS bounty hunters MS releases Office 2003 bug fix - - - - - - - - - - Oracle Row Level Security: Part 1 In this short paper I want to explore the rather interesting row level security feature added to Oracle 8i and above, starting with version 8.1.5. This functionality has been described as fine grained access control or row level security or virtual private databases but they all essentially mean the same thing. We will come back to this shortly but before we do that lets get to what this paper is about. - - - - - - - - - - DHS still working on info-sharing plans Homeland Security Department officials want local government to help form the information-sharing portions of the department's enterprise architecture, but they haven't figured out yet how to efficiently work with so many jurisdictions at once. - - - - - - - - - - Palm-Print ID System Lends Big Hand to Detectives A new L.A. County database, which includes fingerprints, gives law enforcement agencies a fast new tool to identify suspects. For decades, detectives have known that the answer to solving a crime can lie in the palm of someone's hand. Palm prints make up about one-third of all prints technicians lift from crime scenes, according to estimates. But until this year, unlike fingerprints, there was no easy way to compare them. (LA Times article, free registration required),1,4111694.story *********************************************************** Computer Forensics Training - Online. An intense, 150 hour, instructor lead program that teaches you computer forensics and helps prepare you for the Certified Computer Examiner exam. For more information see; *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2003,, Campbell, CA.