NewsBits for December 30, 2003 sponsored by, Southeast Cybercrime Institute - ************************************************************ Saudis arrest 5 after seizing bomb-making CDs Saudi authorities, facing a wave of militant attacks, have arrested five people after raiding computer shops selling compact disks containing hidden bomb-making instructions, a local newspaper reported on Thursday. Police were questioning four owners of computer shops in the southern Jazan region and a fifth person believed to have supplied the CDs to the shops, Al-Watan newspaper said. - - - - - - - - - - FBI probes hack at e-voting software company The FBI is investigating an intrusion into a computer network at an e-vote software company, which suspects the hack was politically motivated. VoteHere, a 7- year-old company in Bellevue, Wash., on Tuesday confirmed reports that its network had been breached in October. The company identified a suspect and said it turned the case over to the FBI, the Secret Service and the U.S. Attorney's office for an investigation that is ongoing. - - - - - - - - - - Woman ticketed for appearing naked on Internet It wasn't the fact that Melissa J. Harrington appeared naked on the Internet that got her in trouble with police. It was where she got naked. The 21-year-old Web designer was busted for violating Lincoln's public nudity ordinance by posting pictures on her Web site that apparently showed her naked in a downtown bar. - - - - - - - - - - Hoaxes befall banks in England, Singapore Recent incidents involving The Bank of England and Singapore's DBS Bank point to continued security risks in the realm of Internet banking. The Bank of England said Tuesday that it had intercepted more than 100,000 fraudulent e-mails masquerading as computer security software issued by the central bank. - - - - - - - - - - Maine Computer Crimes Probes Face Backlog Investigators who check computers for evidence of child pornography, fraud, stalking and other crimes face a money shortage as a backlog of cases awaiting investigation approaches 80, officials with Maine's Computer Crimes Task Force said. "I could keep 10 more examiners busy full-time up here," said Sgt. Glenn Lang, the Maine State Police computer task force supervisor. - - - - - - - - - - New E-Mail Security Threat: Cyber Blackmail The blackmail con relies on the public's awareness that remote control of PCs is technologically possible. "End-users know that someone could break in and steal data or could plant incriminating stuff," says F-Secure research manager Mikko Hypponen. - - - - - - - - - - IRS sets timetable for encrypting tax returns The IRS will require professional tax preparers, software vendors and third-party transmitters to use approved encryption methods when sending individual and business tax return information over dedicated lines, beginning in 2005. - - - - - - - - - - Unrepentant spammer to carry on, within the law Alan Ralsky, according to experts in the field, has long been one of the most prolific senders of junk e-mail messages in the world. But he has not sent a single message over the Internet in the last few weeks. He stopped sending e-mail offers for everything from debt repayment schemes to time-share vacations even before President Bush, on Dec. 16, signed the new Can-Spam Act, a law meant to crack down on marketers like Ralsky. - - - - - - - - - - A year of spam, spyware and worms This is the year the Internet officially stopped being fun. The festering problems of spam, spyware, viruses, worms and pop-ups boiled over, making the online experience merely annoying at best, financially and emotionally destructive at worst. - - - - - - - - - - Mitnick offers cash for hacking tales Mitnick used e-mail messages to online security discussion groups and his Web page to issue a call to the hacking community for stories of online derring-do, promising an award of $500 for the "most provocative story," according to Mitnick.,10801,88647,00.html - - - - - - - - - - Checklist for Deploying an IDS Installing a Network IDS (NIDS) onto a network requires a significant amount of thought and planning. In addition to the technical issues and product selection there are resource issues, from product cost to manning the sensor feeds and supporting the infrastructure that must also be considered. - - - - - - - - - - Oh Dan Geer, where art thou? Remember Dan Geer-Dr. Dan Geer to you-who was fired from security firm @stake in late September for sounding off against Microsoft as a "national security threat" in the report "CyberSecurity: The Cost of Monopoly"? - - - - - - - - - - Ridge: Merged terrorist watch list due next year Homeland Security secretary Tom Ridge said the government will combine about a dozen terrorist watch lists into one next year. Ridge said that the interagency Terrorist Screening Center, run by the FBI, now is carrying out the watch list function. Officials from several agencies at the center check numerous databases to determine if an individual appears on a terrorist watch list. *********************************************************** Computer Forensics Training - Online. An intense, 150 hour, instructor lead program that teaches you computer forensics and helps prepare you for the Certified Computer Examiner exam. For more information see; *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2003,, Campbell, CA.