NewsBits for January 6, 2004 sponsored by, Southeast Cybercrime Institute - www.cybercrime.kennesaw.edu ************************************************************ Eighty suspects named in scam using identities of the dead Georgia investigators served 80 arrest warrants Tuesday in an alleged scam in which the identities of dead people in five states, including Virginia, were stolen to bolster the credit ratings of car buyers. A southwest Georgia woman would troll newspaper obituaries to get the names, then contacted an Internet search company that provides background checks to obtain the Social Security numbers, dates of birth and credit histories of the deceased, state investigators said. http://www.timesdispatch.com/servlet/Satellite?pagename=RTD%2FMGArticle%2FRTD_BasicArticle&c=MGArticle&cid=1031772953981 - - - - - - - - - - Fax.com fined $5.4 million for unsolicited ads Federal regulators approved a record $5.4 million fine against a company for faxing unsolicited advertisements to consumers. The Federal Communications Commission said the fine given to Fax.com, Inc. was the largest for violating do-not-fax rules that went into effect in 1992. The company sends faxes on behalf of clients that pay a fee. http://www.cnn.com/2004/TECH/biztech/01/06/fcc.donotfax.ap/index.html http://www.wired.com/news/politics/0,1283,61806,00.html - - - - - - - - - - 'Homeless hacker' lobbies for home detention The hacker accused of breaking into The New York Times' network is working on a deal with prosecutor. Adrian Lamo, the so-called homeless hacker accused of breaking into The New York Times' computer network, is planning to appear in court on Thursday to accept a plea bargain. http://news.zdnet.co.uk/internet/security/0,39020375,39118885,00.htm - - - - - - - - - - Two men arrested in Arkansas for soliciting child sex online North Little Rock police have arrested two men in the past 10 days for soliciting sex with minors, bringing the total to 35 arrests in the past three years for a special investigations unit. Members of the unit pose online as juveniles to lure those looking to have sex with minors. http://www.usatoday.com/tech/news/2004-01-06-two-arkansas-pervs_x.htm - - - - - - - - - - IBM Fires 3 Execs Indicted in South Korea IBM Corp. said it fired three executives indicted on bribery charges in South Korea. The dismissed workers were Jang Kyung Ho, a former executive director of IBM's Korea unit, and two of his subordinates, Lee Jeong Woo and Kim Ki Yong, said Edward Barbini, a spokesman at the Armonk, N.Y.-based company. (LA Times article, free registration required) http://www.latimes.com/technology/la-fi-rup6.10jan06,1,2040728.story IBM Korea 'used bribes since 1998' http://news.zdnet.co.uk/business/legal/0,39020651,39118890,00.htm - - - - - - - - - - Court bars Canadian domain slammer On December 23, The Federal Trade Commission (FTC) has requested that a federal district court instruct an Internet domain name reseller from making misrepresentations in the marketing of its domain name registration services. Domain Registry of America (DROA) told consumers that their domain registrations were expiring, leading many consumers to switch their domain name registrar. http://www.theregister.co.uk/content/6/34716.html - - - - - - - - - - Court ponders Web site-blocking law A federal judge in Philadelphia on Tuesday heard a challenge to a controversial state law that has led to more than 1 million innocuous Web sites being accidentally blocked. Although the law is only a Pennsylvania state statute, it has an international reach. When the Pennsylvania attorney general used it to force MCI to ban access to some sites with suspected child pornography, the company said it had no choice but to block those Internet addresses for all of its North American subscribers. http://zdnet.com.com/2100-1105_2-5135850.html Speech Group Opposes Pa. Child-Porn Law http://www.washingtonpost.com/wp-dyn/articles/A58862-2004Jan6.html - - - - - - - - - - Spam Is Still Flowing Into E-Mail Boxes Computer users hoping that a new federal law would help cut the spam flowing to their in-boxes so far have been disappointed. Since President Bush signed the new restrictions into law Dec.16 and they went into effect Jan. 1, spam-filtering companies and Internet providers report little change in spam patterns, which have relentlessly marched to higher levels over the past two years. http://www.washingtonpost.com/wp-dyn/articles/A57315-2004Jan5.html Spammers Top Microsoft Hit List http://www.wired.com/news/technology/0,1282,61742,00.html Man sues firm over deluge of unsolicited e-mails http://www.usatoday.com/tech/news/2004-01-05-spam-or-shakedown_x.htm - - - - - - - - - - AOL to Add Spyware Detection to Service America Online will give its customers built-in software to detect and remove "spyware," hidden tools that can monitor Web surfers' online habits for marketing purposes, company executives said yesterday. The AOL move, which is to be announced today, steps up a battle between consumers and makers of so-called adware and spyware, which have become increasingly popular marketing tools for advertisers seeking to reach Internet users in a variety of ways that many consider unduly intrusive. http://www.nytimes.com/2004/01/06/technology/06spy.html - - - - - - - - - - Netcraft crafts anti-phishing service Netcraft has introduced an early warning service to alert banks to phishing scams. The service aims to help customers identify fraudulent sites which pose as the real thing to hoodwink the unwary into handing over confidential financial information. Promoted through spam messages, these bogus sites are becoming increasingly common. http://www.theregister.co.uk/content/55/34711.html - - - - - - - - - - Cisco integrates security Enterprise network threats are escalating in both speed and magnitude, and IT staff, no matter how able they may be, cannot respond quickly enough to today's attacks. In response, Cisco Systems Inc. has developed a new program that the company says will protect computer networks from attacks better than point solutions like intrusion detection systems and firewalls. http://computerworld.com/securitytopics/security/story/0,10801,88785,00.html - - - - - - - - - - Linux hackers converge in Australia Developers are gearing up for a fiercely competitive hack-fest at a heavyweight Linux conference in Adelaide this month. The hack-fest is a feature of the Linux.conf.au conference, which touts itself as one of three international grassroots Linux conferences worldwide. The conference -- of which more than 450 delegates are believed to have confirmed their attendance -- is being held from 14-17 January at the University of Adelaide. http://news.zdnet.co.uk/software/linuxunix/0,39020390,39118889,00.htm - - - - - - - - - - It's a crime not to cooperate International crime syndicates are successful because the members work closely together. Defeating these syndicates requires countries to make best use of their pooled resources and to cooperate. Devastating attacks in the South in the past few days add strength to Thailand's case for more cooperation on law enforcement at a regional conference on transnational crime opening here tomorrow. http://www.bangkokpost.com/News/06Jan2004_news26.html - - - - - - - - - - Almost half of Kazaa downloads 'threaten security' Around 45 percent of files downloaded from Kazaa compromise security, according to the latest research. Even if you don't use Kazaa, you may not be safe. Free software and files downloaded from P2P network Kazaa will pose one of the most significant threats to corporate security in 2004, according to research from risk management specialist TruSecure. http://news.zdnet.co.uk/internet/security/0,39020375,39118915,00.htm - - - - - - - - - - Keeping alien code at bay Each week vnunet.com asks a different expert to give their views on recent virus and security issues, with advice, warnings and information on the latest threats. This week Jason Holloway, UK country manager for F-Secure, considers how a blockbuster movie can provide IT directors with valuable lessons for keeping networks free of malicious code. http://www.vnunet.com/News/1151836 - - - - - - - - - - How the Army used tech to nab Saddam When American troops conducted a night raid that led to the capture of Saddam Hussein in December, digital technology allowed Army commanders miles away to watch virtually every move. Some call the 4th Infantry Division the "digital division" because its vehicles are equipped with a system called "Force 21 Base and Command Brigade and Below," or FBCB2. http://www.cnn.com/2004/TECH/ptech/01/06/sprj.nirq.troop.tech/index.html - - - - - - - - - - Bush Grabs New Power for FBI While the nation was distracted last month by images of Saddam Hussein's spider hole and dental exam, President George W. Bush quietly signed into law a new bill that gives the FBI increased surveillance powers and dramatically expands the reach of the USA Patriot Act. http://www.wired.com/news/privacy/0,1848,61792,00.html - - - - - - - - - - Homeland data mining efforts will differ from Pentagon's The Homeland Security Advanced Research Projects Agency (HSARPA) is researching ways to mine large amounts of data, but its work will differ from that of a Defense Department agency that had one project killed because of privacy concerns, according to HSARPA's director. http://www.govexec.com/dailyfed/0104/010604td2.htm Homeland Security research agency has lofty vision http://www.govexec.com/dailyfed/0104/010604td1.htm - - - - - - - - - - Police-Seized Loot Is Online, and Yes, It's a Steal The police auction has always been a depressed and homely cousin of the chipper yard sale, a gray Saturday morning in a municipal back lot, grim strangers sifting through boxes full of other people's losses. Do I hear $2 for the boy's mountain bike? Very good, sir. What about $3? Those days are over in New York City, whose Police Department has joined some 300 others around the country in clearing out crowded property rooms online, unloading hundreds of television sets and car stereo speakers, leather coats and compact discs, cellphones and anything else that once belonged to someone else and is now just taking up space on a locked storeroom shelf. http://www.nytimes.com/2004/01/04/nyregion/04AUCT.html *********************************************************** Computer Forensics Training - Online. An intense, 150 hour, instructor lead program that teaches you computer forensics and helps prepare you for the Certified Computer Examiner exam. For more information see; www.cybercrime.kennesaw.edu *********************************************************** Search the NewsBits.net Archive at: http://www.newsbits.net/search.html *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits (www.newsbits.net) should be cited as the source of the information. Copyright 2000-2004, NewsBits.net, Campbell, CA.