NewsBits for March 29, 2004 sponsored by, Southeast Cybercrime Institute - ************************************************************ SPECIAL ANNOUNCEMENT - Arnold Schwarzenegger's new Homeland Security Chief for California, Ron Iden, will be joining other dynamic presenters at this year's annual Silicon Valley Chapter training conference, May 11 - 13, 2004. Registration and blocked hotel room rates are limited. With less than six weeks left, organizers can not guarantee how long the availability will last. Those planning to attend should register on-line soon. On- line registration, conference and hotel information are all available at; ************************************************************ Ukrainian hacker has been extradited to U.S. Government A Ukrainian man wanted in the United States for alleged multimillion dollar computer crimes was moved to a detention center Thursday ahead of his extradition to California to face court proceedings, an official said. Maksym Kovalchuk of Ternopil, Ukraine, smiled at journalists as he was taken in a caged truck from Bangkok Remand Prison to the Special Branch Police Bureau near Thailand's international airport. - - - - - - - - - - Professor Pleads Guilty in Porn Case A 56-year-old UCLA professor faces time in Ventura County Jail after admitting he used the Internet to send pornographic images to a 13-year-old Simi Valley girl and made sexual advances, authorities said Friday. (LA Times article, free registration required),1,3748283.story - - - - - - - - - - Man gets probation in child porn case A Portage man accused of possessing child pornography was ordered to serve three years' probation after he pleaded no contest to the charge this week in Columbia County court. Kenneth W. Midstokke, 20, could face up to three years and six months in prison if he violates probation. Midstokke's attorney, Tim Henney, said prosecutors believed Midstokke's claim that he downloaded the child pornography to trade it for legal adult porn, and agreed supervision was an appropriate sentence. - - - - - - - - - - Foster dad faces 44 sex-crime charges A 41-year-old foster father accused of sexually abusing six young boys was charged Friday with 44 counts of first-degree child rape, first-degree child molestation and sexual exploitation of a minor. Prosecutors allege Ronald H. Young photographed the abuse and posted some of the photos to the Internet. The investigation began last fall after Tacoma police received tips relayed through the National Center for Missing and Exploited Children. A child pornography arrest in England involved images that originated in Pierce County. Another tip came from a pedophile watchdog group in Ireland. - - - - - - - - - - Teen girl charged with posting nude photos on Internet A 15-year-old girl has been arrested for taking nude photographs of her self and posting them on the Internet, police said. The girl, whose identity was withheld, was accused of sending out photographs of herself in various states of undress and performing a variety of sexual acts. She sent them to people she met in chat rooms on the Internet, police said. - - - - - - - - - - Chicago School Principal Charged With Child Porn A Chicago public school principal has been arrested on charges of possessing child pornography on his home computer and elsewhere in his residence, officials said Monday. Joseph Thomas Nurek, 54, was arrested Friday in his home by immigration and customs agents, federal officials said. They said they found about 100 images of child pornography on the computer and more on CD-ROMs, VHS videos, DVDs and floppy discs.,2933,115511,00.html - - - - - - - - - - Officer faces child porn charges A veteran patrolman with the Town of Hamburg Police Department was arrested Friday on felony charges of possessing and receiving Internet child pornography. Federal prosecutors said George Adymy, 45, was caught up in an international Internet child pornography investigation called Operation Predator. He is accused of using his home computer to download numerous images of children engaged in sexual activity. - - - - - - - - - - Internet porn case dropped against officer A SENIOR Solihull police officer accused of downloading child pornography from the internet walked free from court this week after the prosecution dropped the case against him. But he remains suspended from duty and his case could be reviewed. Inspector Simon Westwood had denied 14 charges of making indecent images of children under the age of 16 between April and December 2002. - - - - - - - - - - Livonia teacher is cleared of child porn charges A Livonia teacher charged with possessing child pornography was cleared of criminal charges Friday. A 35th District Court judge dismissed charges against Lary Howard, 56. The six felony charges of possessing sexually abusive material involving children carry a maximum sentence of 24 years in prison. The prosecutor's office was unable to determine that pornographic pictures found on Howard's computer were images of children. - - - - - - - - - - Romanian hacker is on trial Romania has enacted tough laws to protect its emerging reputation as a hub of skilled programmers for Western companies and erase any connection with cybercrime syndicates that law enforcement officials say are being run out of Eastern Europe. As the trial begins, the Ciobanu case has reignited an international debate on appropriate justice for cybercrimes, particularly one that until recently was dismissed as the handiwork of tech-savvy teenagers showing off. - - - - - - - - - - Israeli hackers attack Islamic portal A main Islamic Internet portal blamed Israeli hackers on Friday of an attack following its presentation of a file on slain Palestinian militant leader Sheikh Ahmed Yassin. "The attack by the Israeli hackers began after the presentation of interviews that we had done previously with Sheikh Yassin," Abdel Hadi Abu Taleb of said. - - - - - - - - - - NetSky-Q worm targets Kazaa and eDonkey NetSky-Q, the latest worm in the ever-expanding NetSky series, is programmed to launch a DDoS on sites run by popular file-sharing services such as KaZaA and eDonkey from infected Windows PCs.,10801,91751,00.html NetSky variant a greater threat than thought Witty Worm Broke Speed Records Heartless Bagle.U worm on the loose 5 years ago... US firms reel as Melissa virus spreads,39024655,39119623,00.htm - - - - - - - - - - Congress Moves to Criminalize P2P Congress appears to be preparing assaults against peer-to-peer technology on multiple fronts. A draft bill recently circulated among members of the House Judiciary Committee would make it much easier for the Justice Department to pursue criminal prosecutions against file sharers by lowering the burden of proof. The bill, obtained Thursday by Wired News, also would seek penalties of fines and prison time of up to 10 years for file sharing.,1412,62830,00.html - - - - - - - - - - Powergen vs whistle-blower case adjourned A civil trial between Powergen and a customer who highlighted a serious breach in consumer security at the utility more than three years ago has been adjourned until 16 June. - - - - - - - - - - Voicenet Files Lawsuit You heard about it first on Action News last month. Our exclusive investigation revealed that law enforcement had raided a local Internet company looking for evidence of child pornography. Now, that company has filed a lawsuit in federal court against the Pennsylvania Attorney General, two local district attorneys and their investigators. - - - - - - - - - - UK is lousy at virus protection Britain is the worst country at updating virus software - or the most honest when talking to researchers. Only 39 per cent of British small businesses update virus protection once a week, compared with 51 per cent of German companies and 73 per cent of Spanish companies. Some 20 per cent of respondents did not know that a virus can forward itself via contacts in your address book and 48 per cent did not know that viruses can store pornographic content on your machine without your knowledge. Net Viruses Hobble Europe's Small Business Sector - - - - - - - - - - Security product flaws are magnet for attackers The software vulnerability exploited by last week's Witty worm is only the latest in a growing list of flaws being discovered in the very products users invest in to safeguard their systems. "This is a new realm of risk that users must confront: the security of security products," said Andrew Plato, president of Anitian Enterprise Security, a systems integration and consulting firm in the US. Code attacks Cisco vulnerabilities,10801,91748,00.html Extra headaches of securing XML - - - - - - - - - - Organized crime may be behind phishing Last year, EarthLink, the big Internet access provider, went hunting for phishers. It started a campaign to track down people who were sending e-mail messages that pretended to be from EarthLink, but were actually fraudulent attempts to steal customers' passwords, credit card numbers and other personal information. What it found was that of the dozen or so people it could clearly identify as engaged in the practice known as phishing, more than half were under 18. - - - - - - - - - - ICF to develop infrastructure plan ICF Consulting Group Inc., a management, technology and consulting firm, has been awarded a $2.7 million contract by the Homeland Security Department to help create a national critical infrastructure protection plan for assets, such as communications systems, power grids and transportation networks. Group aims to set data-sharing standard Group issues specs for secure data-sharing network GAO: Feds unprepared for calamity - - - - - - - - - - World Community Against Computer Crime and Cyber Terrorism The Third International Seminar "World Community Against Computer Crimes and Cyberterrorism" finished its work on March 26. Valeri Savin, Rector of the Zaporozhye State University, Professor, Doctor of physical and mathematical science, addressed to all participants of a seminar with a welcome speech. Cybersecurity may ensnare execs,39020375,39149958,00.htm,1848,62843,00.html Frontline Defenders,10801,91629,00.html - - - - - - - - - - How to hack a network in nine easy steps Grey hat hackers have released proof of concept code to exploit a wide variety of previously- announced security vulnerabilities to Cisco Systems' networking kit. - - - - - - - - - - Auditing the mind of a hacker Security consultants are teaming up with clinical psychologists - including behavioural scientists from the FBI - to gain a better understanding of what drives and motivates hackers. - - - - - - - - - - How E-Voting Threatens Democracy In January 2003, voting activist Bev Harris was holed up in the basement of her three-story house in Renton, Washington, searching the Internet for an electronic voting machine manual, when she made a startling discovery.,2645,62790,00.html - - - - - - - - - - Campaigners fight biometric passports Civil liberties and privacy groups have launched a campaign against airline industry plans to create a massive international database of passport holders tied together with "flawed" biometric technology. - - - - - - - - - - Database tools help lawyers track clients Lawyers in many states can now track down the names and addresses of prospective clients within hours of their legal entanglements with the help of electronic records and information vendors. - - - - - - - - - - Cops missing out on IP benefits With the growing use of Internet Protocol inside telephone networks, 911 operators could have life-saving information at their fingertips. But those gathered here for the Spring 2004 Voice on the Net Conference & Expo warn that the nation's 2,300 emergency call centers are missing out on a technological breakthrough touted as on par with the invention of police car radios. - - - - - - - - - - Beehive IDs Ease Sting of Thievery A flatbed truck drives down a dirt road that pierces a blossoming almond orchard. It stops suddenly in front of a cluster of unguarded white boxes propped on crates, home to hundreds of thousands of honeybees. It's the middle of the night, and the bees after a full day of pollinating the fields have settled into their hives. It's the perfect time to steal. (LA Times article, free registration required),1,5240541.story - - - - - - - - - - Mobe-deprived teen attacks mother with knife A crazed 14-year-old girl from Hong Kong had to be subdued by police with pepper spray, after she attacked her dear old ma with a knife and wooden pole and chased her around their flat. This must rate as the Godzilla of all teen strops. The mother had - clearly ill-advisedly - decided to confiscate her daughter's mobile phone. *********************************************************** Computer Forensics Training - Online. An intense, 150 hour, instructor lead program that teaches you computer forensics and helps prepare you for the Certified Computer Examiner exam. For more information see; *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2004,, Campbell, CA.