NewsBits for August 12, 2004 ************************************************************ Los Alamos and the missing discs that never were The hunt for a missing pair of computer discs said to contain classified information at a key US nuclear weapons research lab has turned into a near farce this week after it emerged the discs may never have existed. The discs' supposed disappearance resulted in an unprecedented shut-down of classified work at Los Alamos National Laboratory, New Mexico over the last four weeks. This shut down was supposed to facilitate an intensification of a search for what may turn out to be a mirage. - - - - - - - - - - Ex-Verizon Wireless employee charged with $20 million fraud A former Verizon Wireless employee was indicted by a federal grand jury Thursday on charges he stole more than $20 million from the company's prepaid cellular telephone service. Timothy Charles Mattos, 32, of Folsom, was indicted on 10 fraud and money laundering counts. A warrant has been issued for his arrest. - - - - - - - - - - Webmaster linked to Islamic militants denies wrongdoing A New Jersey man who operates a Web site that federal officials identified as aiding Islamic militants has issued a statement denying the accusations, according to a published report. "I do not support and I have never supported any action that harms innocent people," read a statement by Mazen Mokhtar, The Washington Post reported on Thursday. "I have never knowingly assisted any terrorist group." - - - - - - - - - - DVD Jon cracks Airport music streaming Norwegian programmer Jon Lech Johansen has decrypted and published the key that Apple's wireless hi-fi bridge, Airport Express, uses to protect music streams. He's also released the source code to a small Windows command-line tool he calls JustePort. In essence his crack opens the door for other applications to broadcast music to your hi-fi over a home WLAN network using Express, rather than just iTunes 4.6.,39020393,39163378,00.htm - - - - - - - - - - Name that antipiracy weasel, BSA asks kids US schoolchildren, already enrolled into classes on the evils of copyright violation next term, are to be invited to name the Business Software Alliance's new mascot. The BSA explains: "Elementary school students heading back to school in September will be invited to name the 'Play It Safe in Cyber Space' mascot, a 'copyright-crusading' ferret who teaches tech-savvy kids about cyber ethics." - - - - - - - - - - Charity forces closure of 'bully' website An Internet message board has been pulled amid allegations it was used by bullies to harass and victimise school children. The site - which claims to be the "largest online teen community" in North London and Hertfordshire - also contained death threats and racist comments, according to anti-bullying charity, Bullying Online. - - - - - - - - - - OECD unveils Spam Task Force The OECD (Organisation for Economic Co-operation and Development) has set up a task force to tackle spam. The group will look at a host of issues to tackle this global problem including co-ordinating international responses to fight spam and encourage "best practices" in industry and business. - - - - - - - - - - Biometric tech puts ID at your fingertips Stuffing something in a public locker usually isn't a memorable experience. You drop a coin, take the key and move on. But at the Statue of Liberty, recently reopened after a two-year closure, stashing a package offers a glimpse into the future. To rent, close and reopen lockers, visitors touch an electronic reader that scans fingerprints. "It's easy," Taiwanese visitor Yu-Sheng Lee, 26, said after stowing a bag. "I think it's good. I don't have to worry about a key or something like that." - - - - - - - - - - Microsoft's blast from the past A year ago, the author of the MSBlast computer worm taunted Microsoft with a message in the fast-spreading program: "billy gates why do you make this possible? Stop making money and fix your software!!" Bill Gates and company apparently took up the challenge. On Friday, Microsoft released to PC manufacturers Windows XP Service Pack 2, an update aimed at locking down customers' computers. SP2 took more than nine months to complete and contains significant security changes to the flagship operating system. Will SP2 actually make a difference? - - - - - - - - - - Microsoft touts 'Sender ID' to fight spam, scams Microsoft on Thursday is holding a summit with members of the E-Mail Service Provider Coalition to address the use of Sender ID technology as a standard to fight spam and phishing. The software giant said it would gather more than 80 members of the ESPC coalition at its Redmond, Wash., headquarters to discuss using Sender ID as a way to ensure that e-mail originates from the Internet domain it claims to come from. IronPort, others support Microsoft's Sender ID E-mail security company IronPort Systems Inc. said today that its products and services will support Microsoft Corp.'s Sender ID e-mail authentication standard. IronPort's C-Series security appliances will include Sender ID checks to help generate a score used to establish the reputation of e-mail senders. The company's Bonded Sender Program, which is used by e-mail marketers, will also use Sender ID data as part of its accreditation process for e-mail senders, the company said in a statement.,10801,95202,00.html - - - - - - - - - - Check Point blend ensures nodes meet security policies Check Point Software Technologies Ltd. has integrated its VPN software with tools that check remote computers to ensure they meet security policies, making it simpler to install endpoint security on computers accessing VPNs.,10801,95193,00.html - - - - - - - - - - Begging for trouble on security Let's face it, network security has turned into the black hole of the IT budget. Under constant pressure to, once and for all, make their networks secure, IT managers have set up an arsenal of internal and external defenses: firewalls that filter packets, intrusion detection systems that spot known attack signatures, virtual private networks that establish encrypted tunnels to trusted partners, and public-key infrastructures that authenticate partners in a transaction. Users unite to seek security standards *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2004,, Campbell, CA.