NewsBits for November 20, 2003 sponsored by, Southeast Cybercrime Institute - ************************************************************ 125 Nabbed in U.S. Cybercrime Crackdown A federal crackdown on a wide range of Internet fraud schemes costing victims an estimated $100 million has resulted in the arrest or conviction of 125 individuals, law enforcement officials said Thursday. The investigation, dubbed "Operation Cyber Sweep," targets such crimes as stolen credit card numbers, software piracy and the sale of stolen goods over the Internet, said Attorney General John Ashcroft.,1367,61317,00.html,10801,87395,00.html - - - - - - - - - - Credit Card Scammers Attack East End It may be the worlds second oldest profession: Fraud. Yet, while scam artists have always been a nuisance, it seems that in the Internet age they have become more pervasive, successful, and costly. Enter The Elegant John, a bed and bath shop in East Hampton. Along with their storefront, they have an online store. Two and a half weeks ago they received an email from "Mr. Steve, An international businessman." Mr. Steve wanted some goods shipped to his client in Lagos, Nigeria. The total came to $7,500. As the final arrangements were being made, Mr. Steve had one more request. - - - - - - - - - - Court limits in-car FBI spying An appeals court this week put the brakes on an FBI surveillance technique that turns an automobile driver's on-board vehicle navigation system into a covert eavesdropping device, after finding that the spying effectively disables the system's emergency and assistance features.,39020651,39118019,00.htm - - - - - - - - - - Liability for intercepting e-communications depends upon intent Companies and individuals rightfully are worried about their potential Internet-related liabilities. As information technology is advancing at warp speed, and as the law is struggling to keep up with such advances, it is impossible to know for sure when and how liability can be triggered. - - - - - - - - - - EU Sets Up Internet Security Agency The European Union governments agreed Thursday to launch an agency to protect the Internet by alerting the public about computer viruses, identity theft and other crimes committed online. The European Network and Information Security Agency is to be operational in early 2004.,3605,1088437,00.html,10801,87394,00.html Telecoms ministers combat cyber crime - - - - - - - - - - US cybercrime push 'imperils personal security' of Americans White House plans to ratify a Council of Europe Cybercrime treaty will be a disaster for the privacy and security of Americans, Privacy International (PI), the human rights watchdog, claims.,39024677,39116980,00.htm - - - - - - - - - - Civil liberties groups demand halt to RFID A global alliance of opponents to the rollout of radio frequency identification tagging systems have demanded that companies stop deploying them until crucial issues are addressed. Over 30 civil liberties and privacy groups have demanded a suspension to the deployment of radio frequency identification (RFID) tagging systems until a number of issues surrounding the controversial technology have been addressed.,39020357,39118035,00.htm Moratorium on RFID chips urged - - - - - - - - - - Tool up for tomorrow's security threats, says Symantec chief Today's practice of applying security updates after a software vulnerability becomes known or after a virus has been reported will be ineffective in a world of super-fast spreading worms and viruses, warned Symantec chief executive officer John Thompson. A fresh approach and an armoury of security software and services are needed to combat "Warhol" threats, which spread across the internet and infect systems worldwide within 15 minutes, Thompson said in his keynote at Comdex in Las Vegas.,39020645,39118017,00.htm - - - - - - - - - - Gates Sets Schedule For Security Improvements Businesses should see a 180-degree improvement in the security of their Windows software environments within eight months, according to Microsoft's chairman and chief software architect, Bill Gates. Although Microsoft's Trustworthy Computing initiative is a multiyear effort, Gates says bug-weary customers will get relief in months, not years.,39024657,39116984,00.htm No gimmicks Microsoft--just take security seriously Bill Gates: At the crossroads - - - - - - - - - - A Patented Way To Preempt The Spammers Odd or surprising new solutions to the e-mail spam problem are always floating around the cyber-realm. But nothing quite prepared us for a jaw-dropper from AT&T Corp.: a patent that the company received this month on a system for defeating spam filters, those computer programs that help weed out spam before it gets to our e-mail boxes. - - - - - - - - - - Standard Bank falls in with SMS security Standard Bank has become the last major commercial bank to introduce SMS security for its Internet banking clients, although it was the first to upgrade security following the Absa hacker scare four months ago. All the other major commercial banks have introduced SMS security, in one form or another, over the past 18 months. Nedcor was the first, followed by First National Bank and then Absa, which introduced it as part of its Internet banking security upgrade after a Bellville man allegedly defrauded a number of its Internet banking clients. - - - - - - - - - - Sybari blocks IM viruses Addressing the inevitable threat of viruses that piggyback on instant messages, Sybari Software Inc. has announced Antigen 7.5 for IM at Comdex in Las Vegas. A two-license version of the program will cost about $28 per user, with no limitation on server installations. Antigen 7.5 for IM works with Microsoft Corp.'s Office Live Communications Server 2003, released this fall.,10801,87383,00.html - - - - - - - - - - BMC adds to ID management tools BMC Software plans to extend its identity management software with better management tools. BMC on Thursday said that it will incorporate technology developed by Business Layers, a Rochelle Park, N.J.-based company, into its existing Control-SA identity management software. Business Layers specializes in provisioning software, which is used to manage user accounts on computer networks. - - - - - - - - - - Firewall, security software giveaway vexes competitors Shares of Digital River Inc. fell as much as 7.4 percent Wednesday, amid concerns that a security- software giveaway by Computer Associates International Inc. will hurt Digital's largest customer, Symantec Corp. Eden Prairie-based Digital River manages Internet security provider Symantec's online store. In 2002, 23 percent of Digital River's revenue stemmed from Symantec, according to a filing with the Securities and Exchange Commission. - - - - - - - - - - Senior management 'slow to understand wireless risks' The proliferation of wireless networks throughout the enterprise means IT managers must implement proper security plans. But persuading the boss that it's worth the money could be a struggle. IT staff who want to invest to secure their Wi-Fi networks from security breaches may struggle to persuade senior management that the money would be well spent, according to a wireless security vendor.,39020348,39118028,00.htm,39024669,39116993,00.htm - - - - - - - - - - CodeFellas Smart mobs? Fuhgeddaboutit. Not till they hired me. Now they're getting a secure P2P bet-processing system. A mafia hacker tells his story to Wired. On a traffic- clogged street in midtown Manhattan - sandwiched among the bars, massage parlors, and cheap diners - there's a small glass door that leads to my office. The building has no doorman, no front desk, and no video surveillance cameras. We don't go in for that type of security. - - - - - - - - - - Cyberterrorism: a new reality According to information security experts the most vulnerable to cyberattacks countries are 6 states of the Middle East: Iran, Kuwait, United Arab Emirates, the Saudi Arabia, Egypt and Israel. USA is a "black-list" also. Thus, for the first half- year 2003 the quantity of hacker attacks against United Arab Emirates has increased in 3 times in comparison with the second half-year 2002. The country has incurred multi-billion losses. Only one incident resulted in long time deactivating servers of ATM Company has caused up to $3 billion losses. - - - - - - - - - - Honeypots: The sweet spot in network security The role of decoy-based intrusion-detection technology, or "honeypots," is evolving. Once used primarily by researchers as a way to attract hackers to a network system in order to study their movements and behavior, honeypots are now beginning to play an important part in enterprise security. Indeed, by providing early detection of unauthorized network activity, honeypots are proving more useful to IT security professionals than ever.,10801,87288,00.html - - - - - - - - - - I know! Let's have a hackers' union! A proposal to create an association to represent the interests of hackers and vulnerability researchers is gaining support, a security expert said yesterday. CNet reports that the group, which would be geared toward researchers and not software vendors, would provide guidelines on vulnerability disclosures and lobby against legislation that could stifle security researchers' ability to tinker with software. Around 36 people have pledged financial support to help get the group started, said Thor Larholm, senior security researcher for US-based PivX Solutions. - - - - - - - - - - Homeland Security network solicitation planned Homeland Security Department officials plan to release the department's solicitation for an enterprise data network by the end of the year. The Homeland Security Data Network (HSDN) will handle all data for the department. Given the many missions within the department -- including some that are not related to homeland security -- there will be subdomains, but the aim is to have everyone working on the same infrastructure as quickly as possible, Steve Cooper, chief information officer at the department, said today. - - - - - - - - - - FBI to give basic computer training to some Trilogy users The FBI is preparing its work force to use the Virtual Case File system it plans to field as part of its Trilogy modernization project by conducting computer literacy training for thousands of employees. Special agent Larry DePew, the project manager for VCF, said at a meeting of the Association for Federal Information Resource Management today that "about 3,000" FBI employees need the training. - - - - - - - - - - Police go high-tech in crackdown on stolen cars Mayor Francis Slay calls it merely coincidence: Wednesday's rollout of a beefed-up plan to address the rising number of car thefts comes just a week after someone stole his son's Jeep Cherokee from outside the politician's home. *********************************************************** Computer Forensics Training - Online. An intense, 150 hour, instructor lead program that teaches you computer forensics and helps prepare you for the Certified Computer Examiner exam. For more information see; *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2003,, Campbell, CA.