NewsBits for March 30, 2004 sponsored by, Southeast Cybercrime Institute - ************************************************************ Net surrogate mum fleeced couples for PS2,500 A 33-year-old woman from West Yorkshire is up before the beak after she admitted taking money from two couples for her unborn baby. Moira Greenslade, 33, contacted the would-be parents via the Internet, eventually pocketing PS2,500 from surrogacy agreements, Bingley Magistrates Court heard. - - - - - - - - - - EBay scammer mixes baby formula scheme Of all the scoundrels on the Internet, few are lower than the baby formula scammer. Yes, baby formula scammer -- as in taking advantage of sleep-deprived parents and their hungry (and therefore cranky) infants. It happened to Rob Jaworski, who lives in San Jose's Cambrian Park neighborhood, and an army of others who discovered they could save a bundle by buying Enfamil online. - - - - - - - - - - Man pleads guilty to Internet sex crime in Norfolk A former city of Norfolk computer network engineer faces up to 10 years in prison for sex crimes with a child. Keith David Goodman pleaded guilty in Norfolk Circuit Court Monday to one count of carnal knowledge with a 14-year-old girl. He'll be sentenced in late May. Goodman was charged in 2003 on a host of charges, mostly in Suffolk. He would use Internet chat rooms to meet underage girls, set up meetings and have sexual encounters with them, sometimes at his home. Testimony showed he used the online names of Darkhat3 and Suffguy1. - - - - - - - - - - Lynn Township man admits sex with girl A Lynn Township man admitted Monday that he had sex with a 13-year-old girl he met in an Internet chat room. Mark W. Moyer, 19, of 8727 Cardinal Road, pleaded guilty to statutory sexual assault and unlawful contact or communications with a minor.,0,112734.story - - - - - - - - - - Int'l Child Porn Investigation Leads Police to Las Vegas A worldwide investigation into a child pornography enterprise has led federal agents to Las Vegas. Right now, they're following up on more than 300 leads linked to a company called "Regpay." Two people have already been arrested and many more could follow them to jail. This child porn operation was based in Eastern Europe. Predators here in the U.S. were accessing the material through the Internet. Federal agents were able to track many of them down by tracing computer activity and through credit cards. But, even with thousands of arrests, investigators believe they've only scratched the surface. - - - - - - - - - - Ex-fire marshal accused of having photos of girls on home computer McKinney's former fire marshal pleaded guilty Monday to a federal charge of keeping child pornography on his home computer. Less than two months after his felony indictment, Billy Bob Dunfield, 45, entered his plea before a federal magistrate in Sherman. He was accused of knowingly keeping eight photos of young girls engaged in sex, authorities said. Mr. Dunfield, a 19-year firefighter, was fired Jan. 20 when FBI agents notified McKinney officials that he was the target of a child pornography inquiry. - - - - - - - - - - Cisco menaced by Italian 'BlackAngels' A group of teenagers in Italy wrote the code that exploits nine vulnerabilities in a Cisco operating system. Cisco Systems issued a security warning this weekend to customers after new software code was published on the Internet that targeted certain vulnerabilities on several of its networking products.,39020375,39149998,00.htm Cisco warns of new hacking tool kit,10801,91748,00.html - - - - - - - - - - Viruses Tag Along If there's one thing that anti-virus software makers fear aside from a mass change of heart by the virus writers it's the creation of a virus-delivery mechanism that evades detection by their signature-based products. The development of detection files for every new virus is the meat and potatoes of what anti-virus vendors do.,4149,1554393,00.asp ISS slammed for 'selling' security patches,39020387,39150016,00.htm How to avoid opening a PC can of worms - - - - - - - - - - Web song-swappers face lawsuits The music industry, fighting an intense battle to stop a worldwide slide in sales, have unleashed its first wave of international lawsuits against Internet song-swappers. Writs are being issued against 247 individuals in Italy, Germany, Denmark and Canada. The industry vowed more countries will be added to the dragnet in coming weeks. French Hound Music Pirates,1412,62868,00.html Swapping doesn't hurt music sales - study,39020651,39150005,00.htm - - - - - - - - - - DHS says it can handle cyberattacks In the event of a cyberattack on the nation's infrastructure, the Homeland Security Department would have the authority and the wherewithal to coordinate an appropriate response, department officials told lawmakers today. - - - - - - - - - - Making One Spammer Pay It's a 2002 Porsche Boxster S that will be the grand prize in an America Online sweepstakes starting Tuesday. AOL obtained the car in settling a lawsuit against "a guy who by our estimates made more than a million dollars from spamming," said Randall Boe, AOL's executive vice president and general counsel.,10801,91776,00.html $pam, $pam, lovely $pam Pop-ups banned by German court - - - - - - - - - - VoIP provider to block eavesdroppers Net-phoning provider VoicePulse says it plans to use encryption to secure calls, part of an industry trend that could pull in business customers but raise problems for law enforcement wiretaps. The company announced the move on Tuesday at the Spring 2004 Voice on the Net Conference & Expo here, where industry executives spoke on the growing adoption of encryption security as an added service feature. - - - - - - - - - - Carders again The old and approved method of fighting carders is to record information on cards that were used in criminal activities or their owners in black lists. The list is the data base formed by payment system basing on heuristic analysis. Data on the client being authorized is compared to contents of the data base. Transaction is cancelled in case the client is in the blacklist. - - - - - - - - - - Hackers in demand! It is no crime to think like a hacker. In fact, the only way to stop a hacker is to think like one and then put preventive measures in place. It is time for network administrators to upgrade their skills and become Certified Ethical Hackers. According to technical director of EC Council, Haja Mohideen, it even raises your employment potential and consequent earnings. - - - - - - - - - - Software Emerges for Retaining System Log Data Until recently, there have been few options available for users looking for ways to store system log data to comply with laws on retaining records and controlling access to data. But that's starting to change.,10801,91705,00.html - - - - - - - - - - One billion people to get biometrics and RFID tracking by 2015 Civil liberties groups from both sides of the Atlantic have joined forces to oppose the proposed introduction and cross-border sharing of biometrics and RFID in more than one billion passports worldwide.,3800002220,39119660,00.htm Campaigners fear global biometric database - - - - - - - - - - Utah withdraws from anti-terrorism network Utah has joined a growing list of states that are abandoning an anti-terrorism information sharing system endorsed by the federal government. Utah Gov. Olene Walker said last week the state will not renew its participation in the Multistate Anti-terrorism Information Exchange, Matrix. - - - - - - - - - - Smart cameras to watch over London Tube London Underground is likely to deploy surveillance software that alerts operators to potential terrorist behaviour across its network of 6,000 CCTV cameras London Underground is set to roll out high-tech CCTV surveillance software that will automatically alert operators to suspicious behaviour, unattended packages and potential suicide attempts on the capital's Tube system.,39020384,39150004,00.htm *********************************************************** Computer Forensics Training - Online. An intense, 150 hour, instructor lead program that teaches you computer forensics and helps prepare you for the Certified Computer Examiner exam. For more information see; *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2004,, Campbell, CA.