NewsBits for March 10, 2004 sponsored by, Southeast Cybercrime Institute - ************************************************************ Teen Pleads Guilty to Conspiracy, Bank Fraud A Mission Viejo teenager who gained notoriety two years ago as one of the nation's youngest suspected Internet con artists has pleaded guilty to federal conspiracy and bank fraud charges. Cole Bartiromo, 19, who in a January newspaper interview insisted he was innocent, pleaded guilty last week to bank fraud in a plot to defraud a Wells Fargo branch in Mission Viejo of $400,000.,1,5043919.story - - - - - - - - - - Israeli youth allegedly hacked into Pennsylvania police system An Israeli youth has been arrested at the request of the FBI for allegedly hacking into and damaging a police computer system in Pennsylvania, police said Wednesday. The 19-year-old suspect was released on bond after a hearing Wednesday in the southern city of Beersheba, said police spokesman Gil Kleiman. He would not give the youth's name. - - - - - - - - - - Internet companies launch major legal attack on spammers The nation's largest Internet service providers announced lawsuits against some of the biggest spammers Wednesday, saying they will use a new federal anti-spam law to put them out of business.,1367,62606,00.html - - - - - - - - - - Anti-piracy directive could expose consumers The Intellectual Property Rights Enforcement Directive, passed by the European Parliament on Tuesday, could mean significant legal changes for firms and individuals, say civil liberties groups.,39020330,39148212,00.htm Consumers challenge FCC antipiracy rules The rethinking of computer security Private Sector and Cybersecurity - - - - - - - - - - Hacking tools tipped to become weapons of the state Cyberspace will soon come under much greater legal control, according to one expert - who forecasts that denial of service attacks will eventually be ordered by courts of law against offenders. Governments could soon be using hacker tools for law enforcement and the pursuit of justice, according to an expert on IT and Internet law.,39020645,39148211,00.htm - - - - - - - - - - Identity breach risk accelerates Security breaches resulting from identity management flaws are rising and creating huge problems for businesses, research shows. Computer crime: information for consideration - - - - - - - - - - Extrusion: The story of 'trusted' digital insider theft "The risk of cyber attacks continues to be high. Even organizations that have deployed a wide range of security technologies fall victim to significant losses. ...The percentage of incidents that are reported to law enforcement agencies remains low ... Attackers may reasonably infer that the odds against heir being caught and prosecuted remain strongly in their favor.",10801,90952,00.html - - - - - - - - - - DHS cybercrime investigators to get counseling The Homeland Security Department plans to provide psychological counseling to cybercrime investigators who are constantly exposed to graphic images of child pornography and exploitation. - - - - - - - - - - Outlook flaw riskier than thought Microsoft has raised the severity rating of an Outlook flaw to "critical," the highest level, after its initial analysis was challenged by the researcher who found the security hole. The vulnerability in Outlook 2002, first publicized on Tuesday, when Microsoft released a patch, could allow an attacker to use a malicious Web site to cause an affected PC to download and execute a program. Microsoft issues March security bulletins Cisco slammed despite upgrades,39020345,39148206,00.htm - - - - - - - - - - Bypassing China's net firewall Numerous efforts are under way in the West to help Chinese web users get around China's censorship of the internet, reports technology correspondent Clark Boyd. Bill Xia left China for the US in the late 1990s. He keeps up with events in his homeland, mostly online. - - - - - - - - - - Resume fraud gets slicker and easier Simple misrepresentation of facts on a resume is passe. Lying convincingly is in. As companies, via background searches, try to call the bluff of less-than-honest job seekers, candidates are resorting to more complex, sometimes hi-tech means to hoodwink potential employers. - - - - - - - - - - Security product to strike back at hackers Symbiot, a Texas-based security company, plans to release a corporate defense system that fights back against distributed denial-of-service and hacker attacks by launching counterstrikes. Security experts are expressing alarm at the company's plans for the product, set for release at month's end. - - - - - - - - - - Apple OS X Server is most secure system An independent study by British cyber security firm, mi2g, has found Apple's OS X Server and the Berkely Software Distribution (BSD) open source systems on which it is based, to be the most secure online server operating systems in the world, according to a recent report published at - - - - - - - - - - The Digital Evidence in the Information Era The evidence is the foundation of any criminal case, including those involving cybercrimes. Searching, examining, collecting, and preserving evidence may differ from one law enforcement officer to another, however these procedures are governed by laws and legislations that should be followed. Errors in gathering, developing, or presenting evidence can have dire consequences on the trial. - - - - - - - - - - DHS plans for info sharing The Homeland Security Department's information analysis division's plan to improve intelligence sharing with state and local agencies includes training and new systems, the division's head testified before a House subcommittee today. DHS analysis chief wants better information sharing - - - - - - - - - - We must end data confusion Computing's Data Debate campaign starts from the belief that the creation of multiple overlapping and potentially contradictory government databases is a recipe for disaster. - - - - - - - - - - Computer voting snafus plague California Bizarre election results in California have been traced to an electronic touch-screen ballot system. But no one is quite sure what went wrong, and because there is no paper trail, no one is ever likely to get to the bottom of it. - - - - - - - - - - Rise of DVD players in cars leads to cases of drive-by porn Andrea Carlton hadn't planned on telling her daughter about the birds and bees until she was 8 or 9. But that changed the night 4-year-old Catherine spotted a porno movie flickering on a screen in a minivan nearby. *********************************************************** Computer Forensics Training - Online. An intense, 150 hour, instructor lead program that teaches you computer forensics and helps prepare you for the Certified Computer Examiner exam. For more information see; *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2004,, Campbell, CA.