NewsBits for March 24, 2005 ************************************************************ Computer hacker sentenced to nearly four years A man who pleaded guilty to hacking into an Arkansas data company's computer system and stealing personal identification files was sentenced Wednesday to nearly four years in federal prison. Daniel J. Baas, 26, of suburban Milford, entered his plea in December 2003, after being indicted that August. - - - - - - - - - - Hacker Intrusions into Government Computers The United States Attorney's Office for the Northern District of California announced that Robert Lyttle, 21, of Pleasant Hill, California, pleaded guilty in federal court in Oakland to hacking into government computers and then defacing government websites with material illegally obtained from those intrusions. - - - - - - - - - - Signs of Danger Were Missed in a Troubled Teenager's Life Looking back at all the pieces, some who knew Jeff Weise say they wonder why someone did not see his eruption coming months, or even years, ago. There was the threat Mr. Weise, 16, once made on his own life, sending him away from his home on the Red Lake Indian Reservation for psychiatric treatment. There were the pictures of bloodied bodies and guns he drew and shared freely with classmates. Behind the Why of a Rampage, Loner With a Taste for Nazism Shooter in Minn. school case chatted, blogged frequently - - - - - - - - - - Jackson judge bars erotic computer evidence The judge in the Michael Jackson child molestation trial Wednesday refused to allow prosecutors to introduce as evidence electronic erotic material found on computer hard drives seized at the singer's home. The ruling, which covers hundreds of erotic images, including images of teenagers, was a victory for the Jackson defense. - - - - - - - - - - Internet sex stings at issue in Nevada case A Reno judge will review a court decision that could end Internet sting operations designed to protect children from cyberspace predators. Washoe District Judge James Hardesty ruled in December that the way the law is written, the person being lured must be underage -- and not an undercover officer. - - - - - - - - - - Block Porn or Pay the Price Internet service providers operating in Utah must offer customers a way to block porn sites under a law signed this week. ISPs complained that the law adds nothing to the fight against pornography, and said a legal challenge is likely. The law requires ISPs to offer customers free software for blocking porn sites on a list maintained by the attorney general.,1367,67005,00.html - - - - - - - - - - Court orders blogger to stop posting Kaiser patient data The woman had already promised not to do so. An Alameda County Superior Court judge yesterday ordered Elisa Cooper, a former Web coordinator at Kaiser Permanente, to stop posting and distributing the confidential information of 140 of its patients over the Internet.,10801,100615,00.html - - - - - - - - - - Firms facing file sharing probes The FBI is investigating illegal file-sharing activity in companies, according to Energis. Employers whose staff run peer-to-peer applications over their corporate networks could soon face investigation by legal authorities looking for illegal file sharers in UK companies, according to IT services and telecommunications firm Energis.,39020330,39192583,00.htm Some indie artists at odds with industry's attack on file sharing Recording industry executive Andy Gershon sees opportunity in the online file-sharing networks that most of his rivals decry as havens for music pirates. As president of V2 Records, home to such established acts as The White Stripes and Moby, Gershon mines such Internet distribution channels for new fans and revenues. Legal music download sites flourishing - - - - - - - - - - Apple Settles With Engineer Who Leaked Mac Software Apple Computer Inc. reached a settlement Wednesday with a North Carolina man who leaked a copy of the next-generation Mac operating system onto the Internet. The computer maker sued Doug Steigerwald, 22, and two others for copyright infringement and trade secret misappropriation.,1,1685541.story - - - - - - - - - - Banking Rules Address Theft Of Customers' Private Data Banks and some other financial institutions will be required to tell customers if their private information has been obtained by hackers or identity thieves and is likely to be misused, under rules approved this week and announced yesterday. Banks ordered to tell customers about breaches,10801,100614,00.html Linux touted as the solution to online-banking problems,39020390,39192580,00.htm - - - - - - - - - - Aussies chew over enforced Net filters Lawmakers down under are considering making it compulsory for ISPs to filter out unwanted XXX content. The measure is just one proposal currently being tossed around following the publication of a report by the Australia Institute research group, which claimed that Australia's anti-porn legislation simply wasn't working. - - - - - - - - - - Phishers target Yahoo Messenger Yahoo's free instant-messaging service is being targeted by phishers attempting to steal usernames, passwords and other personal information. Yahoo confirmed Thursday that its service, Yahoo Messenger, was being targeted by a scam. According to the company, attackers are sending members a message containing a link to a fake Web site. The fake site looks like an official Yahoo site and asks the user to log in by entering a Yahoo ID and password.,39020375,39192578,00.htm - - - - - - - - - - Mozilla patches Firefox flaw A patch has been issued for a serious flaw in the open source browser's legacy Netscape code relating to animating GIF files, and all users are advised to upgrade. The Mozilla Foundation issued a patch for a major security flaw in its Firefox browser on Wednesday and advised people to update their software.,39020384,39192573,00.htm - - - - - - - - - - Politicans form transatlantic spam alliance Derek Wyatt's All Party Parliamentary Internet Group is teaming up with members of the US Congress in its fight against spam. The All Party Parliamentary Internet Group (APIG) has partnered with the Internet Caucus, its counterpart at the US Congress, in a bid to tackle spammers.,39020369,39192665,00.htm - - - - - - - - - - Feds tells companies: Report those intrusions 'If someone has penetrated your network ... you should call us,' says an agent. Corporate executives are often reluctant to report network intrusions for fear of having those security breaches made public and drag down stock prices. But state and federal law enforcement officials who spoke on an information security panel here yesterday said such reports can sometimes provide an important missing link in larger cybersecurity investigations.,10801,100598,00.html - - - - - - - - - - UK wide open to identity theft A survey of Londoners has found that 92 per cent of them will give a stranger all the information required to steal their identity. Researchers offering the chance to win theatre tickets questioned over 200 people. Over the course of a three-minute interview the researchers asked a series of questions about theatre habits but also extracted names, addresses, school history and the names of parents and siblings. - - - - - - - - - - Feds get set for Net rules The Federal Election Commission has begun the perilous process of including political blogs and Web sites in campaign finance rules that were created long before the Internet became such a powerful political tool. FEC commissioners voted 5-1 on Thursday to approve a procedure that is expected to end with a final set of Internet rules--governing everything from whether bloggers are journalists to bulk political e-mail--in place by the end of the year. Bloggers narrowly dodge federal crackdown Bloggers have rights too - - - - - - - - - - Music pirates choose iPods over P2P As legal music downloading takes off as never before, music pirates are shunning peer-to-peer services in favor of using iPods to swap music. According to a report from the Pew Internet & American Life Project, the number of music downloaders using peer-to-peer networks has dropped in recent months. Currently, 21 percent of downloaders use networks such as Kazaa or Grokster for music or video, compared with the 58 percent who downloaded music from file-sharing networks in February 2004. Fewer Admit to P2P File Sharing - - - - - - - - - - Device simplifies data encryption Security specialist Data Encryption Systems (DES) has introduced a new version of its DES- lock+ tool that secures files and other data stored on PC hard drives through an encryption process that is transparent to users. The tool is primarily aimed at laptop users, but also runs on desktops. - - - - - - - - - - Owning A New Phone Recent mobile phone and Bluetooth hacks, and the public's response to them, show us how the average person really looks at security. It pains me to give this woman any more publicity, but Paris Hilton and her cracked cell phone, the Sidekick II, really woke a lot of people up. For those of you who recently returned from a stay in a monastary somewhere high up in the Himalayas, last month Paris Hilton had her Sidekick II hacked and the contents spread all over the Internet. - - - - - - - - - - Can computers survive cross-examination? Evidence is a slippery commodity, especially when it comes in digital form. Evidence literally means "that which can be seen" and the criminal courts recognize a wide variety of different forms. First of all, it can be direct or it can be circumstantial, meaning it either establishes a particular point or it establishes a circumstance from which the point might be inferred. - - - - - - - - - - RFID companies broaden legal dispute A skirmish over patents between suppliers of gear that uses radio signals instead of bar codes to identify commercial goods expanded Thursday into a much broader legal battle. Intermec Technologies, a subsidiary of Unova, said it had filed claims that Symbol Technologies was infringing on six major Intermec patents covering technologies used in wireless communications products that Symbol sells. - - - - - - - - - - 'Doomsday nerds' defend cyberspace From the outside it looks like a home for a Hobbit or two, but inside are analysts monitoring banks of screens feeding security alerts from monitored components of its clients' networks. Welcome to Symantec's European centre of operations, housed in a former nuclear shelter in rural Hampshire. - - - - - - - - - - Report: U.S. Visit needs database integration to succeed The Homeland Security Department is hampered in its efforts to verify the identities of visitors at U.S. borders by the need to check multiple databases, inspector general Richard Skinner says in a new report. *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2005,, Campbell, CA.