December 30, 2002 Man arrested for arranging sex with girl through the Internet A New Jersey man who allegedly traveled to Massillon to have sex with a minor is behind bars. Kelly Jackson, 60, of Tabernacle, N.J., arrived just after 7 p.m. at a fast food restaurant in Massillon, where he allegedly planned to pick up a 12-year-old girl he met on the Internet and have sex with her, according to Massillon Police detective Bobby Grizzard. But instead he was met by law enforcement officers from a local task force whose goal is to nab pedophiles who meet their victims on the Internet. http://www.indeonline.com/left.php?ID=9745&r=0 - - - - - - - - GPS system used to stalk woman A man was charged Monday with stalking his former live-in girlfriend with help from a high-tech homing device placed under the hood of her car. Paul Seidler, 42, was arrested during the weekend. On Monday, he was charged with stalking, burglary, second-degree reckless endangerment and disorderly conduct, and ordered held on $50,000 bail. http://www.usatoday.com/tech/news/2002-12-30-gps-stalker_x.htm - - - - - - - - Killing prompts suit against Internet brokers In the days after his stepdaughter's murder, Tim Remsburg funneled his fury into phone calls to anyone he thought might help explain her death. "At 2 o'clock in the morning, I was trying to get President Clinton's number. I couldn't sleep. I just wanted to rattle everyone's cages and get some answers," he said. http://www.cnn.com/2002/TECH/internet/12/29/internet.murder.ap/index.html http://www.nandotimes.com/technology/story/694067p-5144187c.html http://www.usatoday.com/tech/news/2002-12-30-net-brokers_x.htm - - - - - - - - Security warning over lottery site Expert say New Jersey Web site poses identity theft risks. New Jersey Lottery players who sign up for a VIP service offering discounts, bonus games and daily e-mails of winning numbers are risking more than the price of a ticket, Internet security experts warn. http://www.msnbc.com/news/853088.asp http://www.nandotimes.com/technology/story/694805p-5149285c.html - - - - - - - - Cyberspace experts await full-scale attack The war on terrorism and the prospect of hostilities with Iraq have the sentinels of cyberspace bracing for trouble. Experts believe it is only a matter of time before someone mounts a concerted, politically motivated attack on the Internet or on a piece of computer-dependent infrastructure such as the electrical grid. Despite growing security awareness, especially in the wake of the Sept. 11, 2001, terrorist attacks on New York and Washington, many crucial systems remain open to intrusion and disruption, private- and public-sector officials agree. http://www.globetechnology.com/servlet/ArticleNews/gtnews/TGAM/20021227/UFILLM - - - - - - - - HUGE NEW WAR ON KIDDIE PORN PERVS THOUSANDS more British paedophiles face arrest in the New Year as police launch massive new internet child porn investigations, The People can reveal. Teachers, doctors, care workers and policemen are on two lists of perverts to be sent from America to Britain's National Criminal Intelligence Service. The paedophiles have been trapped by FBI investigators after using credit cards to subscribe to sick US websites. But the massive inquiry, expected to take three years, will stretch police resources to their limit. http://www.people.co.uk/homepage/news/page.cfm?objectid=12487386&method=thepeople_full&siteid=79490 - - - - - - - - Police use new law to pursue Internet predators Authorities in Missouri have found a useful tool in a four-month-old state law aimed at sexual predators who troll the Internet in search of children. The law, which took effect Aug. 28, creates a new felony crime of enticing a child over the Internet for sexual purposes. It applies even if the "minor" is an adult police officer posing as one. http://www.usatoday.com/tech/news/2002-12-30-net-predator_x.htm - - - - - - - - Internet name seller ordered to stop sales pitch Internet domain-name seller Register.com Inc said Monday that a U.S. court had stopped a rival from stealing thousands of customers through what it called deceptive marketing tactics. A federal judge in New York ordered Domain Registry of America Inc. to stop telling Register.com customers that the two companies were affiliated in an attempt to get their business, the New York City company said. http://www.siliconvalley.com/mld/siliconvalley/news/editorial/4841621.htm - - - - - - - - So Many Holes, So Few Hacks Experts who discover and report security holes seem to be far more industrious than the malicious hackers willing or able to exploit those holes. Despite the thousands of hackable holes that lurk in e-mail, on websites, in files and operating systems, most users' computers are never afflicted with more than the virtual version of a sniffle. http://www.wired.com/news/infostructure/0,1377,56955,00.html - - - - - - - - Spam-stuffed systems to rule in 2003 If you thought you got a lot of spam in 2002, just wait until you return to work to find your e-mail accounts stuffed with spam. And guess what? It's going to get worse. Spam will overhaul legitimate e-mail by July 2003, according to e-mail managed service provider MessageLabs, a situation highlighted when many workers returned to their computers post-Christmas to e-mail accounts stuffed with spam. http://news.zdnet.co.uk/story/0,,t269-s2128046,00.html http://www.theregister.co.uk/content/55/28698.html - - - - - - - - Riding the Disinformation Superhighway The Pew Internet & American Life Project found that just 2 percent of all Internet users are susceptible to blatantly false or misleading online information. But with about 110 million Americans now using the Web regularly, that still represents a tempting audience. http://www.newsfactor.com/perl/story/20332.html http://www.usatoday.com/tech/webguide/internetlife/2002-12-30-internet-study_x.htm http://www.nandotimes.com/technology/story/693406p-5141654c.html - - - - - - - - ComputracePlus deletes stolen data Theft happens. And in the case of notebook computers, it happens a lot. When preventive measures fail and a notebook is stolen, the focus then becomes recovery. One breed of recovery products tracks the machine via an agent that notifies a central command center every time the computer connects to the Internet. Then, with the aid of local law enforcement, the information can be used to pinpoint the physical location of the machine. http://www.fcw.com/fcw/articles/2002/1230/web-comp-12-30-02.asp - - - - - - - - Year in Privacy: Citizens Lose "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." Ben Franklin wrote those words over 200 years ago, and, as we reach the end of 2002, the state of important liberties around the world appears to be degenerating rapidly, particularly in the area of privacy concerns. http://www.wired.com/news/privacy/0,1848,56954,00.html - - - - - - - - What's your copy right? 2002 In Review: Hollywood and the PC industry lock horns; peer-to- peer loses in court. As the focus of the digital copyright wars shifted from courts to Congress in 2002, Hollywood took over the role of chief antagonist to file-swappers and other advocates of the rights of digital consumers. http://news.com.com/2009-1023-978401.html Copyright Concerns Lead the Year's Big Fusses and Flaps http://www.washingtonpost.com/wp-dyn/articles/A46079-2002Dec27.html High court steps into DVD fight http://www.msnbc.com/news/853154.asp http://www.usatoday.com/tech/news/techpolicy/2002-12-30-dvd-court_x.htm http://www.nandotimes.com/technology/story/695021p-5150170c.html RIAA invites comments http://www.theregister.co.uk/content/28/28702.html - - - - - - - - The Briscoe Syndrome Fear of terrorism and a desire to cooperate with law enforcement has lead many corporate insiders to pony up sensitive information on their customers to anyone with a badge... with no court order required. Watching the TV drama Law & Order, Detective Briscoe confronts the manager of a seedy Times Square hotel, demanding records of the suspect in room 206. The manager, behind a wall of bulletproof glass and wearing a stained T-shirt, tells the detective to "shove it." Briscoe then says something like, "I can get the health department down here to shut you down, " and the manager hastily turns over whatever records the detective demands. http://online.securityfocus.com/columnists/132 - - - - - - - - Taming the Task of Checking for Terrorists' Names When presented with a document like a passport or credit card, certain federal agencies and some private-sector companies, like airlines and insurance companies, are required by law to check whether the name on the document is also on watch lists of suspected terrorists and their supporters. It sounds pretty simple. But it can be perilously complicated. Take, for instance, the name "Abd al-Rahman," which can be a given name or a surname, depending on its culture of origin. (NY Times article, free registration required) http://www.nytimes.com/2002/12/30/technology/30LIST.html *********************************************************** Search the NewsBits.net Archive at: http://www.newsbits.net/search.html *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits (www.newsbits.net) should be cited as the source of the information. Copyright 2000-2002, NewsBits.net, Campbell, CA.