NewsBits for April 30, 2004 sponsored by, Southeast Cybercrime Institute - ************************************************************ Two Arrested in First Test of Anti-Spam Law Federal authorities said Thursday that they had arrested two e-mail marketers and were searching for two others in the government's first use of a new law designed to crack down on "spam" e-mail. A raid was conducted on a Detroit-area operation accused of sending out millions of e-mail advertisements for a fraudulent weight-loss patch, the Federal Trade Commission said.,1,5104872.story Survey: Spam will beat Bill Gates Spam Report Card: 2004 - - - - - - - - - - Senate Panel Moves on Movie Pirates The Senate Judiciary Committee on Thursday approved a bill to crack down on would-be movie pirates who use camcorders to record films in theaters or put copyrighted material on the Internet before its release date. "Online piracy of movies, software and music is a growing problem, which threatens the ability of artists to be compensated for their work," said Sen. Dianne Feinstein, D-Calif., who sponsored the bill along with Sen. John Cornyn, R-Texas. "This bill will help end the most egregious form of copyright piracy." File-Sharing Is, Like, Totally Uncool - - - - - - - - - - UK, US and Canada crack down on Net scams The UK, US and Canada are to work even closer together in a bid to tackle international scams - many of which are peddled via the Net. New intelligence-sharing arrangements with the Canadian Competition Bureau, the US Federal Trade Commission and the UK's Office of Fair Trading (OFT) should make it easier for law enforcers to nab villains. - - - - - - - - - - MPs urged to reform cybercrime laws UK computer crime law needs a root and branch reform to bring it into the Internet age. MPs holding a public inquiry to see if Britains key computer crime law - the Computer Misuse Act 1990 - were told the law had served us well but now needed to be updated. Industry representatives appearing before an All Party Parliamentary Internet Group (APIG) hearing on subject yesterday were split on whether significant amendments to existing laws or fresh legislation on computer crime was needed. - - - - - - - - - - Info Minister Issues Online Worm Warning The Ministry of Information and Communication (MIC) on Friday posted an alert about worms with a high potential to cause damage by spreading fast across the Internet.The ministry said it recently found a master server computer, which has spread ``Agobot'' and ``rbot'' worms to many personal computers. It has requested a police investigation. - - - - - - - - - - FBI steps up Web hate group surveillance The FBI has increased its monitoring of hate groups' websites since the conviction of a white supremacist on charges he sought to have a judge murdered, agency officials said. Agents also are providing protection to a man mistakenly identified on one website as being a witness in the case. - - - - - - - - - - Alarm growing over bot software While many network administrators worry about the next worm, security experts are warning that a quieter but equally damaging threat is slowly gaining control of large networks of computers. Known as bot software, the remote attack tools can seek out and place themselves on vulnerable computers, then run silently in the background, letting an attacker send commands to the system while its owner works away, oblivious. The latest versions of the software created by the security underground let attackers control compromised computers through chat servers and peer-to-peer networks, command the software to attack other computers and steal information from infected systems. House probes spyware - - - - - - - - - - Nasty Malware Fouls PCs With Porn Last Sunday, Maria DelGiorno gave up. She unplugged her laptop PC and carefully placed it underneath a statue of the Virgin Mary. "It was the only thing I could think of doing," said the 67-year-old great-grandmother. "The computer was filled with filthy things. It was embarrassing. My grandchildren kept asking me why I was looking at so much pornography.",1377,63280,00.html - - - - - - - - - - Experts warn of Bluetooth security hole Thieves have acquired new weapons to exploit Bluetooth-enabled phones and computers to steal valuable data, experts warn. Though Bluetooth integrates certain security measures, security expert Adam Laurie has shown reporters at the BBC how he can 'bluesnarf' into other Bluetooth- enabled devices without permission using some software and a Bluetooth-capable computer. - - - - - - - - - - Biometric IDs OK With U.K. About 80 percent of 1,000 British adults recently surveyed say they want a biometric identification card, citing concerns about illegal immigration and identity theft. The survey by Market & Opinion Research International for Detica, a U.K. computer- consulting company, also found that an equal number would be "happy to carry the card at all times," though half wouldn't pay for it.,1283,63282,00.html - - - - - - - - - - Links to Terrorism During their opening statement in Sami Al-Hussayen's trial at the federal courthouse in Boise, Idaho, prosecutors put a new spin on the slippery concept of "links to terrorism." The Idaho Statesman reports that they "displayed a chart" showing how a Web site that Al-Hussayen had helped maintain "could eventually access 20 other sites with ties to radical organizations." Talk about guilt by association. Given the interconnected nature of the World Wide Web (they don't call it a "web" for nothing), just about any site with hyperlinks "could eventually access" something sinister. - - - - - - - - - - Cyberterrorism - Terrorism and the Internet According to Daily Times, while the danger cyber- terrorism poses to the Internet is frequently debated, surprisingly little is known about the threat posed by terrorists use of the Internet. A recent six-year-long study shows that terrorist organisations and their supporters have been using all of the tools the Internet offers to recruit supporters, raise funds, and launch a worldwide campaign of fear. It is also clear that to combat terrorism effectively, mere suppression of their Internet tools is not enough. *********************************************************** Computer Forensics Training - Online. An intense, 150 hour, instructor lead program that teaches you computer forensics and helps prepare you for the Certified Computer Examiner exam. For more information see; *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2004,, Campbell, CA.