Legal & Security

18 October 2008

Link between child porn and Muslim terrorists discovered in police raids The Times

A link between terrorism plots and hardcore child pornography is becoming clear after a string of police raids in Britain and across the Continent, an investigation by The Times has discovered. Images of child abuse have been found during Scotland Yard antiterrorism swoops and in big inquiries in Italy and Spain.

Read full article

Dangerous and depraved: paedophiles unite with terrorists online The Times

For some, the internet is merely a hiding place -- a web of secret corridors where all manner of shameful deeds unfold. But the police never expected that it might become a strategic platform where two groups of society's outcasts, terrorists and child sex abusers, could meet to exchange operational secrets.

Read full article

FBI says Dark Market sting netted 56 arrests Network World

A two-year undercover FBI sting operation targeting online fraudsters has netted 56 arrests and prevented millions of dollars in economic losses, the FBI said Thursday.

Read full article

17 October 2008

Internet phone calls are crippling fight against terrorism The Times

The huge growth in internet telephone traffic is jeopardising the capability of police to investigate almost every type of crime, senior sources have told The Times.

Read full article

New powers for UK state snoopers on the net The Guardian

The British government is drawing up plans to give sweeping new powers to the security and intelligence agencies, and other public bodies, allowing them to access personal data using a wide range of internet sites, including social and gaming networks, Jacqui Smith, the home secretary, signalled yesterday.

Read full article

uk: Big Brother database: the revolt grows The Independent

Jacqui Smith faces a parliamentary backlash over "Orwellian" plans to intercept details of email, internet, telephone and other data records of every person in Britain. Labour MPs joined opposition parties in expressing doubts about plans announced by the Home Secretary which could lead to a vast database of information about Britons' calls and internet habits.

Read full article

FBI: Several nations eye U.S. cybertargets Computerworld

About two-dozen nations have developed cyberattack capabilities and have their eyes on targets inside U.S. businesses and government agencies, the top cybercrime law enforcement official in the U.S. said today.

Read full article

Cyber security threats grow in sophistication, subtlety and power Network World

The annual report from Georgia Tech Information Security Center identifies five evolving cyber security threats, and the news is not good.

Read full article

16 October 2008

Hackers could target mobile phones, security experts warn Daily Telegraph

Internet hackers are moving their attention to mobile phones and could harness thousands of devices to dial up premium rate numbers, security researchers have warned.

Read full article

UK security services want personal data from sites like Facebook The Guardian

The British government is drawing up plans to give the police and security and intelligence agencies new powers to access personal data held by internet services, including social network sites such as Facebook and Bebo and gaming networks.

Read full article

Storm over UK's Big Brother database The Independent

Early plans to create a giant "Big Brother" database holding information about every phone call, email and internet visit made in the UK were last night condemned by the Government's own terrorism watchdog.

Read full article

15 October 2008

Storm Botnet May Finally Be Over Dark Reading

The infamous botnet has been inactive for nearly a month, which researchers say may signal the demise of Storm as we know it - as well as that of the super-sized botnet

Read full article

German court: Google Image thumbnails infringe on copyright ars technica

As much as people complain about the challenges of balancing copyrights and fair use in the US, overseas courts have been happy to provide examples that remind us that some aspects of US copyright law are actually fairly liberal. The latest such reminder comes courtesy of a case in Germany that revisits an issue that appears settled in the US: the right of image search services to create thumbnails from copyrighted works to display with the search results. The German courts have now determined that this is not OK in Germany, where Google has just lost two copyright suits over image thumbnails.

Read full article

14 October 2008

Exclusive: Inside Account of U.S. Eavesdropping on Americans ABC News

Despite pledges by President George W. Bush and American intelligence officials to the contrary, hundreds of US citizens overseas have been eavesdropped on as they called friends and family back home, according to two former military intercept operators who worked at the giant National Security Agency (NSA) center in Fort Gordon, Georgia.

Read full article

11 October 2008

Cyberscams exploit consumers' financial unease USA Today

The rippling financial crisis has sent consumers scurrying to the Internet for answers and advice. Online fraudsters are right behind, devising ways to steal personal information.

Read full article

US Air Force to place cyber operations under Space Command NextGov

The Air Force says it will back off its ambitious plan to set up a separate command for cyber space and has opted to place those operations within an existing organization.

Read full article

10 October 2008

US Air Force pursues Cyber Command again NextGov

Top Air Force leadership has decided to pursue forming Cyber Command to defend Defense Department networks and to launch cyberattacks against foes after putting the project on hold in August.

Read full article

Cybercrime: An online game of cat and mouse Sydney Morning Herald

Fraudsters require anonymity to stay out of jail, but in the cat-and-mouse world of financial security the good guys often live in the shadows too.

Read full article

Hacker's list of online accounts spooks users Sydney Morning Herald

When Australian web users learned from the Herald that details of their online accounts had been posted on a hacker's website for all to see, they were suspicious, then alarmed, then furious at the hacker who compromised their identities.

Read full article

Inside the hackers' den Sydney Morning Herald

Hunched over a computer terminal in his pyjamas, "Frank" makes more money than a small-time drug dealer without ever having to worry about being caught or even leaving the house.

Read full article

IBM, Secret Service, others study identity/cybercrime issues Computerworld

Center for Applied Identity Management Research organization teams experts in criminal justice, financial crime, biometrics, cybercrime and cyberdefense, data protection, homeland security and national defense.

Read full article

Security matters: Cybercrime will need company co-operation Financial Times

March was a worrying month for Dan Kaminsky. The security researcher suddenly realised the internet was inherently broken. It wasn't just slightly wonky, or coming loose at the hinges. The underlying design was kaput and if he didn't get it fixed quickly and quietly, no one would be able to rely on it any more.

Read full article

09 October 2008

uk: Lords to debate gov't progress on internet security ZDNet

The House of Lords will debate personal internet security on Friday, with the aim of assessing the progress the government has made on protecting the public.

Read full article

Clickjacking: Net game turns PC into undercover surveillance zombie The Register

Underscoring the severity of a new class of vulnerability known as clickjacking, a blogger has created a proof-of-concept game that uses a PC's video cam and microphone to secretly spy on the player.

Read full article

08 October 2008

Facebook, MySpace and LinkedIn new spam sources The Age

Facebook, MySpace and LinkedIn are being blamed for a boom in sophisticated email scams in which criminals mining the information on social networking sites to create personalised attacks.

Read full article

Registrar Solutions