NewsBits for November 5, 2004 ************************************************************ Ex-Austin student indicted for data theft A federal grand jury on Wednesday indicted a former University of Texas at Austin student for breaking into the school's computers and stealing 37,000 names and social security numbers. The university estimated the data theft cost the school $167,000 to recover the system affected by the breach and warned people about potential identity theft. - - - - - - - - - - Bushkill Twp. man sentenced in Internet child porn case A Bushkill Township man who transmitted child pornography over the Internet received eight years' probation Wednesday. Geary A. Gum, 52, of Henry Road, declined to comment before Northampton County Judge Leonard Zito on Wednesday. Gum in August pleaded guilty to four counts of sexual abuse of children.,0,740403.story - - - - - - - - - - Pediatrician gets house arrest for child-porn In a show of leniency, a federal judge Wednesday sentenced a former pediatric physician to nine months of home confinement for possessing child pornography. Dr. Julius Goepp agreed to a sentence of up to 2 years and nine months under an agreement with prosecutors in which he pleaded guilty to possessing sexually explicit images of children on his home computer. He could have been sentenced to up to 10 years in prison under federal sentencing guidelines if convicted. - - - - - - - - - - Ex-weatherman to remain in jail, magistrate decides A U.S. magistrate denied an unshaven and shackled Bill Kamal bail Wednesday, deciding the former WSVN-Fox 7 meteorologist was a flight risk and a danger to society. Despite pleas from Kamal's attorney Jeffrey Voluck, Magistrate Frank J. Lynch denied bail for Kamal, who was arrested on the charge that he tried to lure a child into having sex with him. - - - - - - - - - - Suspect charged after seeking tryst with teen An alert, informed Rochester Hills mom is being credited in the arrest of a man who allegedly arranged a meeting for sex with her 14-year-old daughter via the Internet. Richard Max-Phillip Levitsky, 40, of Royal Oak was arraigned over the weekend on two felony counts, one each of child sexually abusive activity and communicating on the Internet with the intent to commit a crime. Each count carries a penalty of up to 20 years in prison. - - - - - - - - - - Two Suspects Arrrested In Internet Sex Cases Investigators arrest two men they say were looking for sex with underage girls. Investigators say James Easterling of Fairborn used a computer to go into an online chat room and solicited sex from who he thought was a 14-year-old girl. The girl turned out to be a police detective. Police arrested Easterling who they say was also sending sexual material over the internet. And Dayton police say they discovered Eric Brooker of Dayton doing the same thing. Both Easterling and Brooker faces charges of importuning and child pandering. This is Fairborn's 20th arrest involving people looking for sex on the internet. - - - - - - - - - - MI Attorney General Arrests Grand Rapids Child Predator Michigan Attorney General Mike Cox announced today the arrest of Allen Leroy Hoekstra, 50, of Grand Rapids, Mich., who used the Internet to send obscene images and arranged an encounter to take pictures of a 14-year-old girl persona that was actually an Attorney General Investigator. Hoekstra intended to capture images of the persona engaged in sexual acts with "sex toys." - - - - - - - - - - Alleged DDoS kingpin joins most wanted list The fugitive Massachusetts businessman charged in the first criminal case to arise from an alleged DDoS-for-hire scheme has appeared on an FBI most wanted list, while the five men accused of carrying out his will are headed for federal court. Jay Echouafni, 37, is a fugitive from a five-count federal indictment in Los Angeles charging him with aiding and abetting computer intrusion and with conspiracy. - - - - - - - - - - UNH Study Finds Internet Sex Offenders A Diverse Group A University of New Hampshire study says the profile of an Internet sex-offender isn't what you think it is. Janis Wolak is a researcher at the university's Crimes against Children Research Center and the study's lead author. She said Internet sex abusers usually are not the deceptive or violent predators often depicted in the media and the relationship between abusers and victims is more complicated than originally thought. - - - - - - - - - - Police crack down on web weapons A national police operation to clamp down on the purchase of prohibited weapons over the internet has resulted in a number of arrests in its first week. The operation involves nearly all of the 49 police forces in the UK, which are gathering intelligence from website monitoring, HM Customs and Excise and the National Criminal Intelligence Service. Police officers posed as online buyers to trap the suspects. - - - - - - - - - - Oslo cops shut down 'Kill Bush' website Norwegian police have shut down the satirical anti-Bush website (Kill Him Now) by Norwegian rap trio Gatas Parlament, daily newspaper Aftenposten reports. The site urged Norwegians to put a bounty on the head of president Bush. Norwegian police removed the site's content and replaced it with a fax notification of the closure. Police attorney Pal-Fredrik Hjort Kraby says the content was removed because it violated Norwegian harassment laws. - - - - - - - - - - Bank accounts in online security scare British Internet bank Cahoot has plugged a flaw in its online security that could have enabled people to move freely in and out of other customers' accounts. Cahoot took the site down for 10 hours while it fixed the flaw, according to a representative for Abbey, Cahoot's parent financial institution. The problem was likely the result of an upgrade 12 days ago.,39020375,39172762,00.htm Cisco, Wells Fargo face new security breaches,10801,97279,00.html A new, more sneaky phishing attack - - - - - - - - - - Email worm poses as Osama videogram Emails claiming to contain video clips of terrorist mastermind Osama bin Laden are likely to be example of a new computer worm. The Famus-F worm normally arrives in the form of a bilingual English and Spanish email, with the subject line "More terrorism this year". The message body states: "Last speech from Bin Laden. Please forwards this video to everybody.",39020375,39172757,00.htm - - - - - - - - - - IE bug allows hackers to take over PCs Security watchdog the US Computer Emergency Readiness Team (US-Cert) has warned Internet Explorer (IE) users to update patches after it discovered a buffer overflow vulnerability that gives hackers local admin rights to execute arbitrary code on compromised PCs. - - - - - - - - - - Virus writers elude Microsoft's bounty hunt Virus writers have a price on their heads--but it's done little to discourage them. In the year since Microsoft kicked off its Anti-Virus Reward Program, it has tallied only a single success. The program has offered $1 million to informants who help close official investigations into four major viruses and worms, and has another $4 million earmarked for future rewards, but the deluge of online threats has continued to swell. - - - - - - - - - - barred from doing business in Idaho Idaho has won a court order permanently barring the advertising company from doing business within the state. The Aliso Viejo, Calif.-based company is believed to be the largest volume ``fax-spammer'' in the nation, Idaho Attorney General Lawrence Wasden said Friday. - - - - - - - - - - Hollywood heads to court over movie-swapping The film industry is set to follow in the litigious path laid by music companies and take on illegal file-swapping in the courts. Hollywood studios are about to take the long-anticipated step of firing a barrage of lawsuits at some of the most prolific Internet pirates, echoing the legal strategy that the recording industry already has used with limited success.,39020651,39172740,00.htm File-Sharing Thrives Under Radar,1412,65625,00.html - - - - - - - - - - Lawmaker: Beware of cyber-Pearl Harbor Future wide-scale terror attacks will be executed by a person sitting behind a computer, not necessarily by a suicide truck bomber or plane hijacker, a U.S. lawmaker predicted on Thursday. Counterterrorism agents are grappling with a new type of security threat--a malicious piece of computer code capable of disabling the world's critical infrastructure, from power grids to air traffic control networks. - - - - - - - - - - Ex-Bush aide: Countries spy through the Net The world's most advanced military powers are using the Internet to spy on their enemies and prepare digital attacks against rogue targets, a leading cybersecurity expert said on Friday. "When there's a major cyberincident, it's very difficult to prove most of the time who did it," said Richard Clarke, a former White House adviser on national security and cyberthreats. Cyberterrorism is a misleading term, says expert,39020375,39172764,00.htm 30,000 botnets march across the Internet,39020375,39172864,00.htm - - - - - - - - - - Software piracy whistle-blowers get bigger rewards The Business Software Alliance is doubling the maximum reward it will pay to individuals who report companies that are using pirated software. The BSA--a trade group supported by Microsoft, Adobe Systems and other major software makers to enforce software licenses and copyrights-- announced on Friday that it is raising the ceiling on payments to U.K. whistle-blowers to $37,000(20,000 pounds) for reports received during November and December this year.,39020651,39172761,00.htm - - - - - - - - - - Online fraud tutorials... from the Secret Service? Until Wednesday one of the best public sources of information on how to use a stolen credit card number, forge a drivers license, defeat a burglar alarm or silence a firearm was a website under the control of the U.S. Secret Service. As a jaunty flourish in its high-profile roundup of fraudsters and forgers last Thursday, the agency took over, a New Jersey-based online crime bazaar that sits at the center of the government's "Operation Firewall" investigation. - - - - - - - - - - Symantec adds threat data to managed security services The data will be posted using its Secure Internet Interface. In a bid to expand its services business, Symantec Corp. next week plans to start selling security intelligence data as an add-on to its Managed Security Services. Users who pay Symantec to manage their security infrastructures will now also be able to get extensive information on threats particular to their IT systems as well as global cyberthreats, said Dee Liebenstein, group product manager at Cupertino, Calif.-based Symantec.,10801,97292,00.html Symantec builds double-clad security service - - - - - - - - - - Microsoft to provide early warning of security flaws Criticized for a program that only provided some of its largest customers with warnings on security problems in its products, Microsoft Corp. now says it will give all computer users early word on such issues. Beginning this month, the Redmond software giant will make public in advance how many security fixes it plans to release in its regular monthly bulletin, how severe the problems are and what products are affected.,39024655,39125659,00.htm Microsoft: Security requires teamwork,39020369,39172758,00.htms - - - - - - - - - - SonicWall to bolster next OS with antivirus scanning Security vendor SonicWall is expected to formally announce on Monday a new operating system that includes the capability for scanning for viruses at the gateway. - - - - - - - - - - RSA sees looming identity crisis online RSA Conference: Businesses must shift their online customers towards a federated identity policy if e-commerce is to take off, says RSA's director of technology. The director of technology for RSA, Andrew Nash, said that businesses need to move their online customers towards a federated identity policy or security threats could bring people to lose confidence in trading.,39020330,39172722,00.htm - - - - - - - - - - DHS lays out five for '05 Continuing to build a common technology infrastructure for the Homeland Security Department's (DHS) 22 agencies and developing the workforce are two of the five priorities the department's chief information officers will focus on in 2005. - - - - - - - - - - Making Web data permanent U.S. government information is supposed to be permanent, but Web links can break. Now, a federal group says Uniform Resource Names (URNs) can solve the problem. Officials at the Categorization of Government Information Working Group issued draft recommendations on interoperable standards for searchable identifiers and a proposed definition of government information. Draft recommendations on open and interoperable standards for the categorization of government information are set to begin a public comment period Nov. 9. - - - - - - - - - - Activists Slam Homeless Tracking A government drive to use the latest in database technologies to track and count the homeless, in order to better tailor services at shelters and food banks, actually puts battered women at risk, women's rights advocates say. Frustrated with the current annual homeless census, the Department of Housing and Urban Development is now requiring that regional associations of agencies helping the homeless start collecting and locally sharing detailed personal information, including social security numbers and disability information, from the homeless.,1848,65614,00.html - - - - - - - - - - Avoiding downstream liability We've seen it before: innocent and unsuspecting organizations that have their networked computers hijacked for use as pawns in attacks against other companies' networks. But what about when such hijacking can be averted? Is it the middleman's responsibility to prevent further dispersal of attacks? When a hacker sends a virus and/or infiltrates a system and then uses that system to break into or infect other systems, does it result in potential liability for the victim?,,97174,00.html - - - - - - - - - - Linux 'putting more bobbies on the beat' A Scottish police force is expanding its use of the open-source operating system, and says that the systems are allowing it to put more officers on the streets. A Scottish police force is extending its commitment to open- source software by developing a Linux-based system for ensuring it complies with the impending Freedom of Information Act.,39020390,39172867,00.htm - - - - - - - - - - 419ers recruit asylum-seeking mortician Anyone who is currently reading El Reg in the rec room of an illegal immigrants' secure facility in the Home Counties in the hope that it might contain more useful pointers as to how to forge a UK ID card will certainly sympathise with the plight of poor old Liz Toon - Senegalese mortician on the edge: *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2004,, Campbell, CA.