NewsBits for April 27, 2005 ************************************************************ Bush signs law targeting P2P pirates File-swappers who distribute a single copy of a prerelease movie on the Internet can be imprisoned for up to three years, according to a bill that President Bush signed into law on Wednesday. The Family Entertainment and Copyright Act, approved by the House of Representatives last Tuesday, represents the entertainment industry's latest attempt to thwart rampant piracy on file-swapping networks. Movies such as "Star Wars: Episode II," "Tomb Raider" and "The Hulk," have been spotted online before their theatrical releases. Bush OKs Smut-Stripping Tech,1283,67367,00.html - - - - - - - - - - Hong Kong authorities charge BitTorrent user with piracy Hong Kong customs officials on Wednesday filed copyright violation charges against a 38-year- old man who allegedly uploaded three movies onto the Internet using the popular file-sharing program BitTorrent. The suspect, who has only been identified by his surname, Chan, faces three charges of attempting to distribute copies of copyrighted material without authorization, the government said in a statement. - - - - - - - - - - Man Accused Of Stalking Girl In Custody On Federal Charge A Blue Springs man accused of stalking a teenage girl is now in federal custody. Brian Gnavi, 36, was arrested this week on a child pornography charge. KMBC's Dan Weinbaum reported that federal agents had been waiting for a grand jury and possible indictment against Gnavi since December, when he allegedly ordered child pornography through the mail. - - - - - - - - - - Jupiter man downloads child porn with daughter's AOL account A Jupiter man who used his adult daughter's Internet account to download and transmit child pornography pleaded guilty to the crimes Tuesday. Jeffrey Salviola, 51, was sentenced to five years of sex-offender probation and six months in jail, which will be served on weekends.,0,7104745.story - - - - - - - - - - Hacker deletes own hard drive A CHAT CHANNEL spat ended when a wannabe hacker was duped into deleting his own hard drive. The 26 year-old German claimed he was the baddest hacker in town and threatened to attack a moderator on #stopHipHop's RC Channel because he thought he'd been thrown out. - - - - - - - - - - Students Accused of Piracy Won't Be ID'd A federal magistrate has ruled that two North Carolina universities do not have to reveal the identities of two students accused of sharing copyrighted music on the Internet. The music industry trade group, the Recording Industry Association of America, filed subpoenas in November 2003 asking for help identifying a North Carolina State University student who used the name "CadillacMan" and a University of North Carolina-Chapel Hill student who used the name "hulk." The students allegedly file-swapped songs using the universities' computer systems. - - - - - - - - - - Pirates: $1bn losses only to the US More than 1 million of pirated disks were seized during a raid in Moscow several days ago. This crackdown was not the first and not the last, though there were no results. Specialists are confident that it is pointless to carry on fight against illegal counterfeit audio and video industry while the price of licensed copies remains the same. Licensed goods cost 6-7 times more rather than their pirated copies. - - - - - - - - - - France Orders DVD Pulled A court rules copy prevention software on the David Lynch film violates privacy rights. A French court has ordered DVD vendors to pull copies of the David Lynch film "Mulholland Drive" off store shelves as part of an unprecedented ruling against copy prevention techniques. The appeals court ruled Friday that copy prevention software on the DVD violated privacy rights in the case of one consumer who had tried to transfer the film onto a videocassette for personal use.,1,7632229.story - - - - - - - - - - Group wants encryption bans overturned An international security consortium plans to push governments around the world to withdraw restrictions on the use of encryption. Countries including China, Israel, Russia and Saudi Arabia have strict rules governing the use of encryption tools, and in some cases they have banned these tools. - - - - - - - - - - Failing UK cyber defences need overhaul The UK's National Infrastructure Security Co-ordination Centre (NISCC) needs more powers to enforce security best practices in order to safeguard the nation's critical systems against cyber-attack, according to a former chairman of the Metropolitan Police Authority. Lord Toby Harris of Haringey called for the appointment of a government cyber security czar and legislation to change the role of the NISCC from providing information security advice to setting and enforcing information security standards. Cybercrime costs Europeans billions Mobility and security top European IT agenda Labour peer bangs cyberterrorism drum,39020375,39196485,00.htm - - - - - - - - - - Sifting Clues to an Unsmiling Girl Toronto police analyze child porn images to find victims, offenders across the continent. She is perhaps 12 now, her hair still light blond, but she doesn't smile anymore. Over the last three years, she has appeared in 200 explicit photos that have become highly coveted collectibles for pedophiles trolling the Internet. They have watched her grow up online the hair getting longer, the look in her eyes growing more distant. (LA Times article, free registration required),1,832786.story - - - - - - - - - - New Virus Count Nearly Triples The number of new viruses has almost tripled in the last six months, an anti-virus vendor said Tuesday, the spike fed by hackers releasing scads of variants to overwhelm defenses. According to Panda Software, which is headquartered in Spain but has U.S. offices in Glendale, Calif., the count of new viruses has increased 278 percent since the third quarter of 2004. - - - - - - - - - - Web Server Cracks And Defacements Increase Crackers increasingly focus on web servers, and sites belonging to govenments or the military were not immune. Attacks on web servers increased by over a third from 2004, according to information gathered by a cybercrime tracking group. Nearly 400,000 attacks were tracked worldwide by Zone-H. Some attacks were intended to gain control of the server for the criminal's use, while others were "tagged," or defaced. McAfee AVERT Reports on the Top Threats and Potentially Unwanted Programs for Q1 2005 - - - - - - - - - - Spyware, Phishers Play Off Misspelled domains have been used by the scabrous almost since URLs were created. Pornographers were among the first to adopt the tactic of registering domains that are slightly off legitimate sites' spelling, or play off confusion between. .com and .gov. Spyware authors and phishing scammers are using a technique almost as old as the Internet to draw unsuspecting users: Web sites purposefully designed to take advantage of typing errors. Finnish security firm F-Secure has discovered a site;j?articleID=161600745 - - - - - - - - - - Critical flaw reported in Netscape A "highly critical" unpatched vulnerability in the Netscape browser could potentially allow hackers to compromise Internet users' systems, according to an advisory from a Danish security firm. The buffer overflow vulnerability could cause the browser to crash. In addition, hackers could create Web sites to exploit the flaw, executing code of their choice on visitors' computers to gain access to users' systems, security company Secunia warned.,10801,101353,00.html,1759,1790314,00.asp?kc=EWRSS03129TX1K0000614 - - - - - - - - - - Child porn offenders shouldn't get house arrest, AG says Canadian law should be changed to prevent people convicted with child-pornography from serving their sentences under house arrest, Ontario Attorney General Michael Bryant said yesterday. "I do not believe that house arrest or conditional sentence for child porn crimes ought to be the law of Canada," Mr. Bryant told reporters at Queen's Park. "We need changes to the criminal code to do that." - - - - - - - - - - Banks weigh up biometrics Companies could soon have to use biometric technology to authorise major financial transactions, as part of banking industry measures to tackle internet fraud and money laundering. - - - - - - - - - - Plastic Money: IRCTC still vulnerable There have been as many as four cases of credit card frauds in the last couple of years where cheats have booked railway tickets online using a genuine persons credit card number. But, sadly the Indian Railway Catering and Tourism Corporation (IRCTC) still does not have a system in place to prevent these frauds. As a result, fraudsters stealing credit card numbers are having a field day. - - - - - - - - - - Security product outbreak hits InfoSec Europe Antispyware software, patch management tools and compliance monitors are just some of the new wares being shown off by vendors at the InfoSecurity Europe show in London this week, where an already crowded security market looked a little more crammed.,10801,101363,00.html - - - - - - - - - - 911 Rule Weighed for VOIP Providers Federal Communications Commission Chairman Kevin J. Martin said Tuesday that he would soon propose requiring Internet-based telephone providers to offer their customers emergency 911 dialing services. After hearing reports of consumers having trouble getting through to police when dialing from an Internet telephone which uses a technology known as voice over Internet protocol Martin said he wanted to address the problem quickly. (LA Times article, free registration required),1,648428.story - - - - - - - - - - IT security perimeters 'limiting growth' Companies losing out by hiding behind firewalls Business needs to move away from the conventional IT security wisdom of trying to fortify perimeters as this approach harms long-term commercial success, delegates at InfoSec were told today. Adrian Secombe, IT director at US pharmaceuticals firm Eli Lily, and a member of the Jericho Forum, which aims for secure information flows across organisations, said that companies are losing out by hiding behind firewalls and other defences. - - - - - - - - - - Busting 7 deadly security Hacker tools are growing more sophisticated and automated. Hackers can now quickly adapt to new security vulnerabilities as they are uncovered, and distribute the fruits of their exploits more widely with the help of automated toolkits. And they are using an ever-increasing range of methods to find individuals and companies private information and use it to their advantage. - - - - - - - - - - Book excerpt: File System Forensic Analysis This excerpt from Chapter 5 of File System Forensic Analysis is posted with permission from Addison-Wesley Professional. The last chapter provided an overview of volume analysis and why it's important. Now we're going to leave the abstract discussion of volumes and dive into the details of the partition systems used in personal computers. In this chapter, we will look at DOS partitions, Apple partitions, and removable media. For each system, we review how it works and look at its data structure.,10801,101359,00.html *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2005,, Campbell, CA.