December 30, 2002
Man arrested for arranging sex with girl through the Internet
A New Jersey man who allegedly traveled to
Massillon to have sex with a minor is behind
bars. Kelly Jackson, 60, of Tabernacle, N.J.,
arrived just after 7 p.m. at a fast food
restaurant in Massillon, where he allegedly
planned to pick up a 12-year-old girl he
met on the Internet and have sex with her,
according to Massillon Police detective
Bobby Grizzard. But instead he was met by
law enforcement officers from a local task
force whose goal is to nab pedophiles who
meet their victims on the Internet.
http://www.indeonline.com/left.php?ID=9745&r=0
- - - - - - - -
GPS system used to stalk woman
A man was charged Monday with stalking his
former live-in girlfriend with help from
a high-tech homing device placed under the
hood of her car. Paul Seidler, 42, was
arrested during the weekend. On Monday,
he was charged with stalking, burglary,
second-degree reckless endangerment and
disorderly conduct, and ordered held on
$50,000 bail.
http://www.usatoday.com/tech/news/2002-12-30-gps-stalker_x.htm
- - - - - - - -
Killing prompts suit against Internet brokers
In the days after his stepdaughter's murder,
Tim Remsburg funneled his fury into phone calls
to anyone he thought might help explain her death.
"At 2 o'clock in the morning, I was trying to get
President Clinton's number. I couldn't sleep. I
just wanted to rattle everyone's cages and get
some answers," he said.
http://www.cnn.com/2002/TECH/internet/12/29/internet.murder.ap/index.html
http://www.nandotimes.com/technology/story/694067p-5144187c.html
http://www.usatoday.com/tech/news/2002-12-30-net-brokers_x.htm
- - - - - - - -
Security warning over lottery site
Expert say New Jersey Web site poses identity
theft risks. New Jersey Lottery players who
sign up for a VIP service offering discounts,
bonus games and daily e-mails of winning
numbers are risking more than the price of
a ticket, Internet security experts warn.
http://www.msnbc.com/news/853088.asp
http://www.nandotimes.com/technology/story/694805p-5149285c.html
- - - - - - - -
Cyberspace experts await full-scale attack
The war on terrorism and the prospect of
hostilities with Iraq have the sentinels of
cyberspace bracing for trouble. Experts believe
it is only a matter of time before someone mounts
a concerted, politically motivated attack on
the Internet or on a piece of computer-dependent
infrastructure such as the electrical grid.
Despite growing security awareness, especially
in the wake of the Sept. 11, 2001, terrorist
attacks on New York and Washington, many crucial
systems remain open to intrusion and disruption,
private- and public-sector officials agree.
http://www.globetechnology.com/servlet/ArticleNews/gtnews/TGAM/20021227/UFILLM
- - - - - - - -
HUGE NEW WAR ON KIDDIE PORN PERVS
THOUSANDS more British paedophiles face arrest
in the New Year as police launch massive new
internet child porn investigations, The People
can reveal. Teachers, doctors, care workers and
policemen are on two lists of perverts to be
sent from America to Britain's National Criminal
Intelligence Service. The paedophiles have been
trapped by FBI investigators after using credit
cards to subscribe to sick US websites. But the
massive inquiry, expected to take three years,
will stretch police resources to their limit.
http://www.people.co.uk/homepage/news/page.cfm?objectid=12487386&method=thepeople_full&siteid=79490
- - - - - - - -
Police use new law to pursue Internet predators
Authorities in Missouri have found a useful tool
in a four-month-old state law aimed at sexual
predators who troll the Internet in search of
children. The law, which took effect Aug. 28,
creates a new felony crime of enticing a child
over the Internet for sexual purposes. It applies
even if the "minor" is an adult police officer
posing as one.
http://www.usatoday.com/tech/news/2002-12-30-net-predator_x.htm
- - - - - - - -
Internet name seller ordered to stop sales pitch
Internet domain-name seller Register.com Inc
said Monday that a U.S. court had stopped
a rival from stealing thousands of customers
through what it called deceptive marketing
tactics. A federal judge in New York ordered
Domain Registry of America Inc. to stop telling
Register.com customers that the two companies
were affiliated in an attempt to get their
business, the New York City company said.
http://www.siliconvalley.com/mld/siliconvalley/news/editorial/4841621.htm
- - - - - - - -
So Many Holes, So Few Hacks
Experts who discover and report security
holes seem to be far more industrious than
the malicious hackers willing or able to
exploit those holes. Despite the thousands
of hackable holes that lurk in e-mail, on
websites, in files and operating systems,
most users' computers are never afflicted
with more than the virtual version of a
sniffle.
http://www.wired.com/news/infostructure/0,1377,56955,00.html
- - - - - - - -
Spam-stuffed systems to rule in 2003
If you thought you got a lot of spam in 2002,
just wait until you return to work to find your
e-mail accounts stuffed with spam. And guess
what? It's going to get worse. Spam will overhaul
legitimate e-mail by July 2003, according to
e-mail managed service provider MessageLabs,
a situation highlighted when many workers
returned to their computers post-Christmas
to e-mail accounts stuffed with spam.
http://news.zdnet.co.uk/story/0,,t269-s2128046,00.html
http://www.theregister.co.uk/content/55/28698.html
- - - - - - - -
Riding the Disinformation Superhighway
The Pew Internet & American Life Project found
that just 2 percent of all Internet users are
susceptible to blatantly false or misleading
online information. But with about 110 million
Americans now using the Web regularly, that
still represents a tempting audience.
http://www.newsfactor.com/perl/story/20332.html
http://www.usatoday.com/tech/webguide/internetlife/2002-12-30-internet-study_x.htm
http://www.nandotimes.com/technology/story/693406p-5141654c.html
- - - - - - - -
ComputracePlus deletes stolen data
Theft happens. And in the case of notebook
computers, it happens a lot. When preventive
measures fail and a notebook is stolen, the
focus then becomes recovery. One breed of
recovery products tracks the machine via an
agent that notifies a central command center
every time the computer connects to the Internet.
Then, with the aid of local law enforcement,
the information can be used to pinpoint the
physical location of the machine.
http://www.fcw.com/fcw/articles/2002/1230/web-comp-12-30-02.asp
- - - - - - - -
Year in Privacy: Citizens Lose
"They that can give up essential liberty to obtain
a little temporary safety deserve neither liberty
nor safety." Ben Franklin wrote those words over
200 years ago, and, as we reach the end of 2002,
the state of important liberties around the world
appears to be degenerating rapidly, particularly
in the area of privacy concerns.
http://www.wired.com/news/privacy/0,1848,56954,00.html
- - - - - - - -
What's your copy right? 2002 In Review:
Hollywood and the PC industry lock horns; peer-to-
peer loses in court. As the focus of the digital
copyright wars shifted from courts to Congress
in 2002, Hollywood took over the role of chief
antagonist to file-swappers and other advocates
of the rights of digital consumers.
http://news.com.com/2009-1023-978401.html
Copyright Concerns Lead the Year's Big Fusses and Flaps
http://www.washingtonpost.com/wp-dyn/articles/A46079-2002Dec27.html
High court steps into DVD fight
http://www.msnbc.com/news/853154.asp
http://www.usatoday.com/tech/news/techpolicy/2002-12-30-dvd-court_x.htm
http://www.nandotimes.com/technology/story/695021p-5150170c.html
RIAA invites comments
http://www.theregister.co.uk/content/28/28702.html
- - - - - - - -
The Briscoe Syndrome
Fear of terrorism and a desire to cooperate with
law enforcement has lead many corporate insiders
to pony up sensitive information on their customers
to anyone with a badge... with no court order
required. Watching the TV drama Law & Order,
Detective Briscoe confronts the manager of a
seedy Times Square hotel, demanding records of
the suspect in room 206. The manager, behind
a wall of bulletproof glass and wearing a
stained T-shirt, tells the detective to "shove
it." Briscoe then says something like, "I can
get the health department down here to shut
you down, " and the manager hastily turns
over whatever records the detective demands.
http://online.securityfocus.com/columnists/132
- - - - - - - -
Taming the Task of Checking for Terrorists' Names
When presented with a document like a passport
or credit card, certain federal agencies and
some private-sector companies, like airlines
and insurance companies, are required by law
to check whether the name on the document is
also on watch lists of suspected terrorists
and their supporters. It sounds pretty simple.
But it can be perilously complicated. Take,
for instance, the name "Abd al-Rahman," which
can be a given name or a surname, depending
on its culture of origin.
(NY Times article, free registration required)
http://www.nytimes.com/2002/12/30/technology/30LIST.html
***********************************************************
Search the NewsBits.net Archive at:
http://www.newsbits.net/search.html
***********************************************************
The source material may be copyrighted and all rights are
retained by the original author/publisher. The information
is provided to you for non-profit research and educational
purposes. Reproduction of this text is encouraged; however
copies may not be sold, and NewsBits (www.newsbits.net)
should be cited as the source of the information.
Copyright 2000-2002, NewsBits.net, Campbell, CA.