NewsBits for June 3, 2004 ************************************************************ Girl: Satomi was `nasty' to me An 11-year-old girl held in Tuesday's gruesome slaying of a classmate told police it was in revenge for ``nasty'' messages posted in an Internet chat room by the girl she once considered a good friend. The girl gave police a blood-curdling account of how she spent several days plotting the death of Satomi Mitarai, 12. ``She says she was sick of (Satomi) writing nasty things on the Internet,'' said the head of the child consultation office in Sasebo who met with the girl. http://www.asahi.com/english/nation/TKY200406040142.html - - - - - - - - - - Former producer sentenced to 15 years for child porn A former Christian radio producer who pleaded guilty in February to child pornography charges must serve 15 years in prison. Kerry Dwayne Stevens received the sentence yesterday in federal court. U-S District Judge Glen Davidson sentenced the 47-year-old Tupelo man on two counts of producing child pornography. Stevens is a former children's show producer for American Family Radio. He admitted photographing the genitalia of his daughter and one of her friends while they slept. Stevens was arrested in August after two men renting his home found computer discs with the photographs of the girls in the house. http://www.wmcstations.com/Global/story.asp?S=1914918 - - - - - - - - - - Baltimore Sex Sentence An Aberdeen man will serve two years in prison for child pornography. A US District Court judge handed down the sentence Thursday. Forty-three-year-old William Dale Piper pleaded guilty to charges of transporting and shipping child pornography in interstate and foreign commerce. According to court documents, an F-B-I special agent in New York downloaded several images from Piper on an American Online chat room. http://wjz.com/localstories/local_story_155181950.html - - - - - - - - - - Scottish police question dozens over child porn Scottish police say they are questioning dozens of suspects over Internet child pornography after raids across Scotland triggered by a tip-off from U.S. authorities. The Scottish Drug Enforcement Agency was also involved in the sweep. "After information was passed on from the United States ...Scottish police launched coordinated raids," a spokesman for the Association of Chief Police Officers in Scotland said on Thursday. More than 1,300 Britons have been convicted in a wider British crackdown against child pornography since 2002, dubbed "Operation Ore" and based partly on information from U.S. authorities. http://www.reuters.co.uk/newsPackageArticle.jhtml?type=topNews&storyID=522988SSion;=news - - - - - - - - - - Grove Computer Porn Two computers used by city employees are seized after allegations that one was used to access child pornography. According to Grove Oklahoma Police Chief Mark Wall, the computers were sent last week to the Oklahoma Bureau of Investigation. The computers were used in the Emergency Management Services Department and Grove Civic Center. One of the computers was allegdly used to view child pornography and the other had also accessed pornographic web sites. http://www.ksntv.com/news/default.asp?mode=shownews&id=2410 - - - - - - - - - - Child porn investigation Child pornography allegations brought against a 55-year-old Brookfield man Tuesday represent the "tip of the iceberg" of possible charges once investigators search his computer, a state prosecutor said. Richard S. Kusch appeared in Waukesha County Circuit Court on Wednesday where Assistant District Attorney Brad Schimel described some of the alleged child pornography, weapons and marijuana police seized Friday. "These images involved here ... were very vulgar," Schimel said. "These images are children being sexually exploited." http://www.gmtoday.com/news/local_stories/2004/June_04/06032004_02.asp - - - - - - - - - - Three Spanish arrested for selling child porn In Deya, Mayorka, Spanish police detained three men allegedly selling child porn, reports "El Pais" newspaper Monday. Two of the detainees are Russians 30 and 37 years old, the third is Briton. Besides trading child porn they offered minors' sexual services through the Internet. They are also suspected in laundering their criminal revenues. It is known that detainees, names are not revealed, were previously prosecuted. http://www.crime-research.org/news/03.06.2004/314 - - - - - - - - - - Police slap cuffs on Punk SMSer A tech worker was arrested yesterday after a text message he sent was intercepted and traced back to his phone. In a scene reminiscent of Neo's first escape from Agent Smith, Special Branch officers slapped the cuffs on Mike Devine at his office in Bristol yesterday, and took him away for questioning. Devine, who plays in a Clash tribute band in his spare time, had sent a message containing lyrics from The Clash's Tommy Gun to his lead singer who had forgotten the words to the song. http://www.theregister.co.uk/2004/06/03/text_punk/ - - - - - - - - - - Mutant son of MyDoom plans three-pronged attack Virus writers have used code from the infamous Mydoom worm to create a potentially dangerous new Internet worm which uses multiple methods to spread. Plexus-A spreads using three different methods: infected email attachments, file-sharing networks and Windows vulnerabilities (the LSASS vulnerability used by Sasser and the RPC DCOM flaw used by Blaster). The as yet unknown virus authors used MyDoom source code as the basis for creating Plexus, according to an analysis of the worm by Russian AV firm Kaspersky Labs. http://www.theregister.co.uk/2004/06/03/plexus_worm/ Harry Potter and the worm of doom http://zdnet.com.com/2100-1105_2-5225792.html - - - - - - - - - - Korgo raises zombie PC army Anti-virus firms have raised the peril index of the Korgo worm up a notch following the spread of several new variants this week. Korgo (aka Padobot) exploits the Microsoft Windows Local Security Authority Subsystem Service (LSASS) vulnerability to spread across vulnerable machines. The same flaw was infamously exploited by the Sasser worm and by a number of less prolific worms since. Kordo has some nasty tricks up its sleeve but the worm is far less prolific than Sasser. http://www.theregister.co.uk/2004/06/03/korgo_worm/ Korgo worm targets bank accounts http://www.theinquirer.net/?article=16341 Zombie PCs generate 80 per cent of spam http://www.vnunet.com/news/1155583 - - - - - - - - - - Security cert body gives lesson in insecurity Security certification and training body (ISC)2 has apologised for a serious security breach which saw the personal details of thousands of respondents to a survey posted onto an insecure server. Phone numbers, email and contact addresses for many of the estimated 20,000 respondents to (ISC)2 Constituent Survey were easily available on the site because of lax security for a short time towards the end of last week. http://www.theregister.co.uk/2004/06/03/isc2_survey_snafu/ - - - - - - - - - - Former senators offer harsh assessment of nation's security The next terrorist attack is coming and the United States is far from prepared, two former senators who are experts in the homeland security movement, said Thursday. "Myself, my hair is on fire," said former Sen. Gary Hart, borrowing a phrase recently popularized by former White House counter-terrorism chief Richard Clarke. http://www.govexec.com/dailyfed/0604/060304td1.htm OMB tweaks info security rules http://www.fcw.com/fcw/articles/2004/0531/web-omb-06-03-04.asp Expert calls for better security http://www.fcw.com/fcw/articles/2004/0531/web-secure-06-03-04.asp - - - - - - - - - - Can Utah's new anti-spyware law work? In March of this year, Utah became the first state to enact new legislation addressing certain types of "spyware" -- with its Spyware Control Act. (Spyware is software that tracks a consumer's online activities, and uses the data it collects to choose targeted pop-up advertisements and other promotional messages, which are then displayed to the user.) http://www.cnn.com/2004/LAW/06/03/ramasastry.spyware/index.html - - - - - - - - - - IT leaders warned of data scams The Office of the Information Commissioner has issued an urgent warning to alert IT managers to registration scams concerning compliance with data protection law. http://www.vnunet.com/news/1155599 - - - - - - - - - - Eastern mob hires hackers AUSTRALIANS are being targeted by Eastern European organised crime families using the internet to extort and steal far from home. Delegates at the annual AusCERT Asia Pacific Internet Security Conference on the Gold Coast were warned today that mobsters were hiring computer programmers to take their brand of criminal activity online. The deputy head of Britain's National Hi-Tech Crime Unit, Superintendent Mick Deats, said one Eastern European syndicate with interests in prostitution, drugs and gun smuggling was also earning money all over the world from internet credit card fraud, software piracy, child pornography and online extortion. http://news.com.au/common/story_page/0,4057,9667719%255E15306,00.html - - - - - - - - - - Internet Crimes Against Children Exploding Crime against children on the internet is growing fast; and yet, the problem is going largely unnoticed and underreported. Current statistics show that one in five children who use the Internet receive unwanted sexual solicitations. This might not seem like much stated that way, but, its more than five million children. While it is easy to dismiss this as a simple reality of the Internet it fails to knock home the more important reality that if a child is exposed to behavior they are not ready to handle it could have an overall negative impact on their entire life. This is the real issue. http://www.crime-research.org/news/03.06.2004/319 - - - - - - - - - - Nigeria may use software to nab 419 scammers Nigeria plans to launch software that would help catch fraudsters who send scam letters via email, known as the 419 advance fee fraud, a meeting on the sidelines of Africa's World Economic Forum has heard. The new technology, which would identify key words used in such letters, is likely to be made available to Internet service providers and government departments, Mustafa Bello, executive secretary of the Nigerian Investment Promotion Commission said. http://www.smh.com.au/articles/2004/06/04/1086203598788.html - - - - - - - - - - Police to become masters of cybercrime The police are to get new training, including a Masters degree, to help them tackle crimes involving computers. UK police forces are developing new training to help officers tackle crimes that either directly or indirectly involve a computer, including a Masters degree in cybercrime. The police force is often criticised for not being savvy enough to handle even unsophisticated computer related crimes. http://news.zdnet.co.uk/internet/security/0,39020375,39156636,00.htm - - - - - - - - - - Tests to uproot Windows passwords begin Microsoft and RSA Security on Wednesday started beta testing a product designed to phase out the use of traditional passwords and replace them with automatically generated passwords from a SecurID token. SecurID is one of the most popular two- factor authentication systems and is already used by many large enterprises. The token is about the size of a matchbox and generates a new six-digit code every minute. http://zdnet.com.com/2100-1105-5225434.html http://news.zdnet.co.uk/internet/security/0,39020375,39156548,00.htm Recognition keys access http://www.trnmag.com/Stories/2004/060204/Recognition_keys_access_060204.html - - - - - - - - - - Back to central patching? In a new study, officials at the General Accounting Office say the federal government must deal more aggressively with the growing volume of software security patches that overwhelms the ability of agencies to manage. A report on the study released this week describes uneven patch-management practices across the federal government and recommends two  changes in the status quo. http://www.fcw.com/fcw/articles/2004/0531/web-patch-06-03-04.asp - - - - - - - - - - For Mac security, communication is key When it comes to security, Apple Computer's report card reads like that of a gifted child: high marks for achievement, but needs to communicate better with others. In general, the Mac operating system has seen far fewer bugs than its Windows counterpart. But some say a recent vulnerability demonstrates that the notoriously tight-lipped company must communicate more openly on security issues and move more quickly when it comes to plugging holes. http://zdnet.com.com/2100-1105_2-5225115.html - - - - - - - - - - In the virtual stacks, pirated books find readers Early in his undergraduate years at Indiana University, Joseph Ruesewald said, he had trouble finding the required titles for a couple of his classes at the local bookstores. When he tried ordering the books online, he learned it would take too long for delivery. Having come of age in the era of Napster, Kazaa and other file-sharing networks infamous as bazaars for pirated music, he knew exactly how to obtain the books--if not in his hands, at least for his computer's hard drive. http://news.com.com/In+the+virtual+stacks%2C+pirated+books+find+readers/2100-1030_3-5226077.html - - - - - - - - - - Open source: Prepare for attack Do you need open-source legal protection any more than you need meteor insurance? Don't dismiss the idea. Most legal observers discount the legal claims by SCO as illegitimate. But there are bigger challenges to contemplate than those from SCO. In fact, users face a convergence of issues that may ultimately lead to other claims being brought against Linux and open-source software. http://zdnet.com.com/2100-1107_2-5225405.html - - - - - - - - - - Are developers stealing code? Many software developers regard 'code-borrowing'-- reusing existing software in their own work--as an acceptable practice, despite the legal minefield it could create for their employers, says research due to be published later this week. The anonymous online survey of more than 3,000 developers found that almost 70 percent of respondents keep a personal library of code that they freely carry between employers. Such code is generally used without the lawful owner's knowledge or permission, according to IT legal experts from out-law.com. http://zdnet.com.com/2100-1105-5225468.html Security starts with developers http://www.vnunet.com/news/1155593 Careless coders tempting legal troubles? http://news.com.com/Careless+coders+tempting+legal+troubles%3F/2100-1008_3-5226035.html - - - - - - - - - - Wireless Attacks and Penetration Testing (part 1 of 3) The very idea of a wireless network introduces multiple venues for attack and penetration that are either much more difficult or completely impossible to execute with a standard, wired network. Wireless networks only know the boundaries of their own signal: streets, parks, nearby buildings, and carsall offer a virtual "port" into your wireless network. This is the first of a three part series on penetration testing for wireless networks. http://www.securityfocus.com/infocus/1783 - - - - - - - - - - Fury at terror suspect's bail Australian police have objected to bail for suspected terrorist Bilal Khazal, 34, a former baggage handler for Qantas, on the grounds that he helped another accused terrorist, Saleh Jamal, escape to Beirut, Lebanon, after he posted bail. Mr. Khazal is charged with collecting or making documents likely to facilitate terrorism after he published an Arabic book online entitled "Provision in the Rules of Jihad - Short Wise Rules and Organisational Structures that Concern every Fighter and Mujahid Fighting against the Infidels". http://www.crime-research.org/news/03.06.2004/322 - - - - - - - - - - Software crash grounds UK air traffic Overnight testing of software management procedures has caused massive disruption to the UK National Air Traffic Control system and led to widespread delays at most of Britain's airports. A spokesman for the UK's National Air Traffic Services, the company that controls UK airspace, told ZDNet UK that the Flight Data Processing System (FDPS) at the West Drayton control centre crashed after overnight testing. http://zdnet.com.com/2100-1105_2-5225412.html *********************************************************** Search the NewsBits.net Archive at: http://www.newsbits.net/search.html *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits (www.newsbits.net) should be cited as the source of the information. Copyright 2000-2004, NewsBits.net, Campbell, CA.