NewsBits for January 6, 2004 sponsored by,
Southeast Cybercrime Institute - www.cybercrime.kennesaw.edu
************************************************************
Eighty suspects named in scam using identities of the dead
Georgia investigators served 80 arrest warrants Tuesday
in an alleged scam in which the identities of dead people
in five states, including Virginia, were stolen to bolster
the credit ratings of car buyers. A southwest Georgia
woman would troll newspaper obituaries to get the names,
then contacted an Internet search company that provides
background checks to obtain the Social Security numbers,
dates of birth and credit histories of the deceased,
state investigators said.
http://www.timesdispatch.com/servlet/Satellite?pagename=RTD%2FMGArticle%2FRTD_BasicArticle&c=MGArticle&cid=1031772953981
- - - - - - - - - -
Fax.com fined $5.4 million for unsolicited ads
Federal regulators approved a record $5.4 million fine
against a company for faxing unsolicited advertisements
to consumers. The Federal Communications Commission
said the fine given to Fax.com, Inc. was the largest
for violating do-not-fax rules that went into effect
in 1992. The company sends faxes on behalf of clients
that pay a fee.
http://www.cnn.com/2004/TECH/biztech/01/06/fcc.donotfax.ap/index.html
http://www.wired.com/news/politics/0,1283,61806,00.html
- - - - - - - - - -
'Homeless hacker' lobbies for home detention
The hacker accused of breaking into The New York Times'
network is working on a deal with prosecutor. Adrian Lamo,
the so-called homeless hacker accused of breaking into
The New York Times' computer network, is planning to
appear in court on Thursday to accept a plea bargain.
http://news.zdnet.co.uk/internet/security/0,39020375,39118885,00.htm
- - - - - - - - - -
Two men arrested in Arkansas for soliciting child sex online
North Little Rock police have arrested two men in the
past 10 days for soliciting sex with minors, bringing
the total to 35 arrests in the past three years for
a special investigations unit. Members of the unit
pose online as juveniles to lure those looking to
have sex with minors.
http://www.usatoday.com/tech/news/2004-01-06-two-arkansas-pervs_x.htm
- - - - - - - - - -
IBM Fires 3 Execs Indicted in South Korea
IBM Corp. said it fired three executives indicted
on bribery charges in South Korea. The dismissed
workers were Jang Kyung Ho, a former executive
director of IBM's Korea unit, and two of his
subordinates, Lee Jeong Woo and Kim Ki Yong,
said Edward Barbini, a spokesman at the Armonk,
N.Y.-based company.
(LA Times article, free registration required)
http://www.latimes.com/technology/la-fi-rup6.10jan06,1,2040728.story
IBM Korea 'used bribes since 1998'
http://news.zdnet.co.uk/business/legal/0,39020651,39118890,00.htm
- - - - - - - - - -
Court bars Canadian domain slammer
On December 23, The Federal Trade Commission (FTC)
has requested that a federal district court instruct
an Internet domain name reseller from making
misrepresentations in the marketing of its domain
name registration services. Domain Registry of America
(DROA) told consumers that their domain registrations
were expiring, leading many consumers to switch their
domain name registrar.
http://www.theregister.co.uk/content/6/34716.html
- - - - - - - - - -
Court ponders Web site-blocking law
A federal judge in Philadelphia on Tuesday heard
a challenge to a controversial state law that has
led to more than 1 million innocuous Web sites being
accidentally blocked. Although the law is only
a Pennsylvania state statute, it has an international
reach. When the Pennsylvania attorney general used
it to force MCI to ban access to some sites with
suspected child pornography, the company said it
had no choice but to block those Internet addresses
for all of its North American subscribers.
http://zdnet.com.com/2100-1105_2-5135850.html
Speech Group Opposes Pa. Child-Porn Law
http://www.washingtonpost.com/wp-dyn/articles/A58862-2004Jan6.html
- - - - - - - - - -
Spam Is Still Flowing Into E-Mail Boxes
Computer users hoping that a new federal law
would help cut the spam flowing to their in-boxes
so far have been disappointed. Since President
Bush signed the new restrictions into law Dec.16
and they went into effect Jan. 1, spam-filtering
companies and Internet providers report little
change in spam patterns, which have relentlessly
marched to higher levels over the past two years.
http://www.washingtonpost.com/wp-dyn/articles/A57315-2004Jan5.html
Spammers Top Microsoft Hit List
http://www.wired.com/news/technology/0,1282,61742,00.html
Man sues firm over deluge of unsolicited e-mails
http://www.usatoday.com/tech/news/2004-01-05-spam-or-shakedown_x.htm
- - - - - - - - - -
AOL to Add Spyware Detection to Service
America Online will give its customers built-in
software to detect and remove "spyware," hidden
tools that can monitor Web surfers' online habits
for marketing purposes, company executives said
yesterday. The AOL move, which is to be announced
today, steps up a battle between consumers and
makers of so-called adware and spyware, which have
become increasingly popular marketing tools for
advertisers seeking to reach Internet users in
a variety of ways that many consider unduly
intrusive.
http://www.nytimes.com/2004/01/06/technology/06spy.html
- - - - - - - - - -
Netcraft crafts anti-phishing service
Netcraft has introduced an early warning service to
alert banks to phishing scams. The service aims to
help customers identify fraudulent sites which pose
as the real thing to hoodwink the unwary into handing
over confidential financial information. Promoted
through spam messages, these bogus sites are
becoming increasingly common.
http://www.theregister.co.uk/content/55/34711.html
- - - - - - - - - -
Cisco integrates security
Enterprise network threats are escalating in both
speed and magnitude, and IT staff, no matter how
able they may be, cannot respond quickly enough
to today's attacks. In response, Cisco Systems
Inc. has developed a new program that the company
says will protect computer networks from attacks
better than point solutions like intrusion
detection systems and firewalls.
http://computerworld.com/securitytopics/security/story/0,10801,88785,00.html
- - - - - - - - - -
Linux hackers converge in Australia
Developers are gearing up for a fiercely competitive
hack-fest at a heavyweight Linux conference in
Adelaide this month. The hack-fest is a feature of
the Linux.conf.au conference, which touts itself as
one of three international grassroots Linux conferences
worldwide. The conference -- of which more than 450
delegates are believed to have confirmed their attendance
-- is being held from 14-17 January at the University
of Adelaide.
http://news.zdnet.co.uk/software/linuxunix/0,39020390,39118889,00.htm
- - - - - - - - - -
It's a crime not to cooperate
International crime syndicates are successful
because the members work closely together. Defeating
these syndicates requires countries to make best use
of their pooled resources and to cooperate. Devastating
attacks in the South in the past few days add strength
to Thailand's case for more cooperation on law enforcement
at a regional conference on transnational crime opening
here tomorrow.
http://www.bangkokpost.com/News/06Jan2004_news26.html
- - - - - - - - - -
Almost half of Kazaa downloads 'threaten security'
Around 45 percent of files downloaded from Kazaa
compromise security, according to the latest research.
Even if you don't use Kazaa, you may not be safe.
Free software and files downloaded from P2P network
Kazaa will pose one of the most significant threats
to corporate security in 2004, according to research
from risk management specialist TruSecure.
http://news.zdnet.co.uk/internet/security/0,39020375,39118915,00.htm
- - - - - - - - - -
Keeping alien code at bay
Each week vnunet.com asks a different expert to
give their views on recent virus and security issues,
with advice, warnings and information on the latest
threats. This week Jason Holloway, UK country
manager for F-Secure, considers how a blockbuster
movie can provide IT directors with valuable lessons
for keeping networks free of malicious code.
http://www.vnunet.com/News/1151836
- - - - - - - - - -
How the Army used tech to nab Saddam
When American troops conducted a night raid that
led to the capture of Saddam Hussein in December,
digital technology allowed Army commanders miles
away to watch virtually every move. Some call the
4th Infantry Division the "digital division" because
its vehicles are equipped with a system called
"Force 21 Base and Command Brigade and Below,"
or FBCB2.
http://www.cnn.com/2004/TECH/ptech/01/06/sprj.nirq.troop.tech/index.html
- - - - - - - - - -
Bush Grabs New Power for FBI
While the nation was distracted last month by images
of Saddam Hussein's spider hole and dental exam,
President George W. Bush quietly signed into law
a new bill that gives the FBI increased surveillance
powers and dramatically expands the reach of the
USA Patriot Act.
http://www.wired.com/news/privacy/0,1848,61792,00.html
- - - - - - - - - -
Homeland data mining efforts will differ from Pentagon's
The Homeland Security Advanced Research Projects Agency
(HSARPA) is researching ways to mine large amounts of
data, but its work will differ from that of a Defense
Department agency that had one project killed because
of privacy concerns, according to HSARPA's director.
http://www.govexec.com/dailyfed/0104/010604td2.htm
Homeland Security research agency has lofty vision
http://www.govexec.com/dailyfed/0104/010604td1.htm
- - - - - - - - - -
Police-Seized Loot Is Online, and Yes, It's a Steal
The police auction has always been a depressed
and homely cousin of the chipper yard sale,
a gray Saturday morning in a municipal back
lot, grim strangers sifting through boxes full
of other people's losses. Do I hear $2 for the
boy's mountain bike? Very good, sir. What about
$3? Those days are over in New York City, whose
Police Department has joined some 300 others
around the country in clearing out crowded
property rooms online, unloading hundreds
of television sets and car stereo speakers,
leather coats and compact discs, cellphones
and anything else that once belonged to someone
else and is now just taking up space on a locked
storeroom shelf.
http://www.nytimes.com/2004/01/04/nyregion/04AUCT.html
***********************************************************
Computer Forensics Training - Online. An intense, 150 hour,
instructor lead program that teaches you computer forensics
and helps prepare you for the Certified Computer Examiner
exam. For more information see; www.cybercrime.kennesaw.edu
***********************************************************
Search the NewsBits.net Archive at:
http://www.newsbits.net/search.html
***********************************************************
The source material may be copyrighted and all rights are
retained by the original author/publisher. The information
is provided to you for non-profit research and educational
purposes. Reproduction of this text is encouraged; however
copies may not be sold, and NewsBits (www.newsbits.net)
should be cited as the source of the information.
Copyright 2000-2004, NewsBits.net, Campbell, CA.