NewsBits for March 27, 2006 sponsored by Digital Investigation - The International Journal of Digital Forensics & Incident Response - ************************************************************ Israeli Couple Jailed over Computer Virus An Israeli couple convicted of inventing a computer virus that set off a major industrial espionage investigation were sentenced to jail on Monday, court documents showed.,1759,1943123,00.asp - - - - - - - - - - Berkeley man pleads guilty to Internet fraud When an Internet site last year offered a luxury automobile for sale for $20,000, a Pennsylvania man forwarded a $2,500 down payment to the seller. The problem was, the seller, 29-year-old David M. Calabretta of Berkeley, didn't have the BMW to sell. So the purchaser never received it. - - - - - - - - - - Russian web site offered eBay account info for $5 EBay Inc. helped to shut down a Russian Web site this week that was offering to sell stolen customer account information for as little as $5 each. Armed with an eBay customer's log-in and password, a fraudster could post items for sale, collect payments and then never deliver the goods. The site was also offering to sell a handful of PayPal accounts.,10801,109881,00.html PayPal Security Flaw Makes eBay and PayPal Users Vulnerable to Phishers - - - - - - - - - - Terrorist 007, Exposed For almost two years, intelligence services around the world tried to uncover the identity of an Internet hacker who had become a key conduit for al-Qaeda. The savvy, English- speaking, presumably young webmaster taunted his pursuers, calling himself Irhabi -- Terrorist -- 007. He hacked into American university computers, propagandized for the Iraq insurgents led by Abu Musab al-Zarqawi and taught other online jihadists how to wield their computers for the cause. - - - - - - - - - - Four 419 scammers indicted, 800 to go A grand jury in New York has returned a 10-count indictment against three of Nigerian defendants recently arrested in Holland and an 11-count indictment against a fourth suspect. - - - - - - - - - - Dallas man receives five-year sentence A 50-year-old Dallas man received a five- year, three-month prison sentence this week on a child pornography charge. Paul Gillespie Greenlee pleaded guilty in September to one count of possession of child pornography in interstate commerce. - - - - - - - - - - Man Convicted Of Possessing Child Porn Gets 30 Days In Jail David Kindquist will only spend 30 days in jail for possessing child pornography. That's the ruling from a district court judge in Snow Hill. He also won't have to register as a sex offender. According to the state's attorney, that's because possession is not a sexual offense, but that doesn't mean there's no victim in this crime. - - - - - - - - - - Band director charged with sex crimes A longtime band director at Spring Lake Park High School was charged Friday with two counts of first-degree criminal sexual conduct and one count of solicitation of a child. Michael William Schleicher, 55, of Ham Lake had oral sex with a female student on school grounds beginning when she was 14, according to the criminal complaint filed Friday in Anoka County District Court. The girl is now 27. He also encouraged someone he thought was a child to engage in sexual conduct over the Internet, the complaint stated. The "child" was actually an adult man living in the Cayman Islands, who turned over information about Schleicher to police. Freelance Web cops chase child predators One was a Coast Guard seaman from Duluth who allegedly set out last month to meet someone he thought was a 13-year-old girl at the Mall of America. The other was a Spring Lake Park band director who was charged Friday in Anoka County with soliciting a child online and having oral sex with a student. In both cases, the men were "caught" by a citizen posing as a minor on the Internet. - - - - - - - - - - Royal sir had child filth A TEACHER at Princess Eugenies public school downloaded child porn on his computer, a court heard on Friday. Andrew Richards, a housemaster at posh PS23,000-a-year Marlborough College, Wilts, found pictures of naked boys on the internet. Prints of the vile images were found in his flat at the school.,,2-2006130912,00.html - - - - - - - - - - 'Computer infected with virus' A teacher accused of storing child porn on a computer claimed his PC had been infected with a virus which dialled porn websites, a jury heard. Pornographic material was found on a PC at a Conservative association which had been used by Robert Dockerill. - - - - - - - - - - Investigation turns up 8,000 child porn images Investigators have found 8,000 digital images of child pornography inside a two-family home in Allegan County. Three residents of the house have been charged. They include a 56-year-old man, his 26-year-old son and a 73-year-old man from another family. - - - - - - - - - - Child porn case leads to major grow op A child sexual assault investigation in Saanich has led police to the second largest marijuana grow operation ever found in Shawnigan Lake. The multi-million dollar operation was housed in an outbuilding on a large rural property on Renfrew Road. - - - - - - - - - - Police Use MySpace to ID Suspects Detectives used profiles posted on the MySpace social networking website to identify six suspects in a rape and robbery that began when a party turned violent, leaving blood in almost every room of the house, officials said. Six men were arrested in connection with the Feb. 23 rampage, and a seventh suspect was being sought, Detective Ali Bartley said Friday. The victim, whose name was withheld, became acquainted with the suspects through MySpace, authorities said. - - - - - - - - - - Registrar suffers attack Domain-name registrar acknowledged this weekend that distributed denial-of-service attacks had caused numerous problems for customers that use its domain-name service (DNS) servers to advertise the Internet addresses of their domains. - - - - - - - - - - UK users targeted by banking Trojan A Trojan designed to capture your online banking details and direct them to a third party has been found in the wild, and attacks have been reported across Western Europe Two Trojan horses with distinctive traits have been flagged by security researchers: one that hijacks one-time-use passwords, and another that hides behind a rootkit.,39020330,39259632,00.htm - - - - - - - - - - State lets out private data The state Employment Development Division confirmed Thursday that it sent out about 64,000 tax forms containing Social Security numbers and income information to the wrong addresses, potentially exposing those taxpayers to identity theft. The 1099 tax forms, which summarize annual benefit payouts, were sent to people who had changed addresses over the past 18 months and had received unemployment, paid family leave or disability payouts from the state. - - - - - - - - - - Offshore outsourcing cited in Florida data leak Florida state employees are being warned that their personal information may have been compromised after work on the state's People First payroll and human resources system was improperly subcontracted to a company in India.,10801,109938,00.html - - - - - - - - - - Justice Department responds to lawmakers' wiretapping probe Democrat John Conyers of Michigan dismissed as evasive and unresponsive the late Friday response from the Justice Department to a House Judiciary Committee inquiry into the National Security Agency program of wiretaps without warrants. - - - - - - - - - - House Panel Preps ID Theft Law Republicans and Democrats have reached a compromise on legislation mandating data brokers disclose to consumers certain unencrypted breaches of their personal information. The accord comes almost five months after a subcommittee of the panel approved the Data Accountability and Trust Act (DATA Act) over the strenuous objections of Democrats who argued the legislation lacked any real teeth. - - - - - - - - - - GAO: IRS security is weak Taxpayers financial and personal information remains at risk because the Internal Revenue Service has not yet strengthened its information security measures, according to a new Government Accountability Office report.,10801,109966,00.html Union decries IRS for security weaknesses IRS cracks down on phishers - - - - - - - - - - Microsoft tests fix for IE bug as exploits appear A recently identified security hole in the Internet Explorer browser is being exploited, and Microsoft Corp. hopes to include a fix for it in its April 11 patch or possibly sooner, according to a posting on a Microsoft blog. So far, attacks are limited in scope, Stephen Toulouse, head of Microsoft's Security Response Center, wrote on the center's blog Saturday.,10801,109943,00.html?source=x584 Email attachment vector for IE create TextRange() Remote Command Execution - - - - - - - - - - Microsoft creates public bug database for IE Microsoft is for the first time encouraging people to give public feedback on Internet Explorer, with the creation of a bug database for the next version of its browser, IE 7 beta.,39020384,39259531,00.htm - - - - - - - - - - Credit-monitoring agency beefing up online operations With more consumers monitoring their credit records online to fight fraud and protect themselves from identity theft, online credit- monitoring service TrueCredit has decided to ramp up its Web infrastructure to keep pace with demand.,10801,109969,00.html - - - - - - - - - - UK workers abuse net access Smut surfing - and worse - still rife. Staff misuse of internet access is still rife in the UK despite improvements over the last two years. Office workers frequently access inappropriate websites or goof about surfing the net instead of getting on with their work, according to findings from the 2006 Department of Trade and Industry's (DTI) biennial Information Security Breaches Survey. - - - - - - - - - - Portable Storage Devices Pose IT Security Risk Baptist Memorial Health Care Corp. in Memphis recently found itself dealing with a proliferation of user-owned plug-and-play USB port drives that posed a security risk to sensitive patient data.,10801,109911,00.html - - - - - - - - - - Thefts prompt products that do more to secure laptops The latest in computer security is a throwback to old-fashioned safety. Recent thefts of laptops with sensitive corporate data have prompted more companies and individuals to snap up everything from locks to tracking software to protect data from PC snatchers. Laptop Thefts Prompt New Security Tactics - - - - - - - - - - Cybersquatters Try New Tactics Cybersquatting the domain name of a celebrity and selling it for a king's ransom was one of the great get-rich-quick schemes of the early internet. But since courts now tend to favor the star over the squatter, a new kinder, gentler cybersquatting tactic has emerged.,70475-0.html - - - - - - - - - - Innovate IT to hold certified ethical hacker course Innovate IT is holding a Certified Ethical Hacker (CEH) course targeted towards IT professionals who want to defend their IT infrastructure from being trespassed. - - - - - - - - - - Neighborhood watch for phishing launches Whenever phishing e-mail came in, security professional Alex Eckelberry would check it out and often find that the fraudulent Web sites advertised in the spam were still online, waiting for victims. So, starting a few months ago, Eckelberry began taking some time out of his day to take action. He would analyze the phishing e-mail and contact the owner of the site hosting the scam, typically a hacked Web site on a server somewhere in the U.S. Phishers stick the boot into World Cup fans - - - - - - - - - - Researcher: DRM technology fails in practice Digital rights management (DRM) technology has deep flaws despite the hope of content providers that encrypted files will deter illegal file sharing, a computer security researcher said Monday.,10801,109947,00.html - - - - - - - - - - IBM service offers Billy Goat bait to hackers It worked in Jurassic Park, so why not on the Net? IBM's Business Consulting Services unit plans to start offering an intrusion-detection service that will masquerade as a group of servers on the network in order to trick hackers into revealing information about their attacks.,10801,109940,00.html - - - - - - - - - - Photos: Biometrics up close and personal Accenture believes biometrics are an 'intrinsic part of the future'. ZDNet UK visited the company's French labs to get a closer look at the identity technology,39020357,39259778,00.htm - - - - - - - - - - The most prevalent wireless threats With the prevalence of mobile devices and the increasing use of wireless-aware applications, enterprises need to continually track the threats that they face and take steps to mitigate them. Interesting trends about the nature of wireless threats are emerging, and the WVE database has revealed product defects, user and client behavior, and advancement in attacks and tools as the most prevalent types of submissions thus far. Mobile Madness: Securing the endpoint - - - - - - - - - - Secure Your Applications From The Start Information security in financial services is one of the highest priorities for C-level executives. CEOs don't want the bad press and liabilities associated with a security breach, and CIOs know that their phones will be the first to ring if data is compromised. Sidebar: Have a Key-Recovery Plan,10801,109829,00.html Sidebar: How Long will Today's Encrypted Data Be Safe?,10801,109827,00.html Encrypting Data at Rest,10801,109826,00.html Glossary of Terms: Storage Encryption,10801,109825,00.html - - - - - - - - - - What is Spyware Spyware and Adware viruses have rapidly become the number one threat to your computer with over 90% of computers already infected. These include Trojans, Web Bugs, Advertiser Software, Monitoring Software and more. Fortunately there are good spyware protection and adware spyware virus removal tools available. Sorting through them all to find the right one is a challenging task and an important decision to make. S'kiddies get into spyware for just $15 ************************************************************ Digital Investigation is the international journal of digital forensics and incident response. To apply for a free sample copy visit: *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2006,, Campbell, CA.