Tuesday, March 08, 2005

eBay: Learning Center: Selling:

First time seller on eBay? The courses below will get you up and running in no time. You'll learn how to create a sellers account, list an item, accept online payments and keep track of all your selling activity on your own My eBay page.

28.02.2005 / Eugene Spafford, Purdue University:

Some experts including Bill Gates believe that spam can be eradicated in a couple of years. What are your thoughts?





Spafford: I think it can be reduced with some effort, but I do not see how it can be eliminated without also eliminating e-mail, or radically changing the way we run the Internet. Spam is, in part, subjective – what is spam to one person may be a great idea to another. Thus, there will always be some people who actually want some of it!





The biggest problem with spam right now is that the spammers refuse to abide by some procedure that will let users opt out of getting it. The fraud used in sending spam – both deceptive titles and hijack of machines – compounds the problem. If we can cut down on the fraudulent use of servers, and impose some really strong authentication on the advertisements that remain, then perhaps we can control spam ... but it is doubtful we will be able to eliminate it completely in only a few years.




This problem is so large and complex, it was named as one of the CRA Grand Challenges. Those four challenges are:




* Eliminate epidemic-style attacks – worms, viruses, spam, phishing and denial of service attacks.




* Discover how to design and build large-scale, distributed computing systems that must be highly reliable even in the face of probable attack. Examples include medical health records, law enforcement databases, and financial system computing.


* Develop quantitative cyber risk measurement techniques to a point at least the equal of current quantitative financial risk measurement techniques. This will allow us to compare security solutions, measure risk appropriately, and invest the right amounts into protection of our cyber assets.




* Develop mechanisms to allow computing users to set their own levels of data protection and privacy in understandable, repeatable, and reliable manners. Thus, we want each person to be able to interact with systems in a way that allows them to choose how much information to entrust to the systems, and at what level to protect it.

Those interfaces should be understandable and simple to use.

Cybercrime-Hacking

Title: Cyber-vigilantes go after scammers

Source: Silicon.com

Date Written: 2005-02-11

Date Collected: 2005-02-14

The 419 Flash Mob, an Internet vigilante group, started attacking fake banking websites February 9, 2005. A statement by Artists Against 419, who supports the 419 Flash Mob, said their aim was to shut down eight such websites within 48 hours using denial-of- service (DoS) attacks in celebration of the Chinese New Year. Many of the attacked websites were hosted by the same service provider in China, and included Abbey Trust & Offshore Bank, First Global Trust, Allied Trust Bank UK, Crystal Bonds & Securities, Allied Trust Bank UK, KASH BANK CORPORATION, and Liberty Stronghold Securities and Finance.


Title: Businesses targeted by ID "hijack" scam

Source: Silicon.com

Date Written: 2005-02-14

Date Collected: 2005-02-14

Online fraud prevention firm Early Warning has discovered a scam targeting British companies through the Companies House database. In this scam, an attacker changes the address of the registered office for a limited company--all that is needed is the current address and the business's registered company number, both of which can be found in an internet search. Once the address is changed, attackers can open trade accounts and order goods in the company's name. Businesses only discover the identity theft when debt collectors and lawsuits appear to recover fraudulently ordered goods. Companies House is working with the Home Office and the Metropolitan Police to address the emerging problem. In the meantime, companies can protect themselves by filing documents electronically through the Proof system, subscribing to the Companies House monitoring service, and periodically confirming registered details.

HOMELAND SECURITY POLICY INSTITUTE GROUP

The moderator of Tactical@yahoogroups.com recently posted an email alert to several egroups. This alert was an issued by the U.S. Attorney General’s Office. This email expressed a new level of concern re an impending al-Qaeda (aQ) attack between now and Inauguration Day. This email has been circulating for the last two weeks. Other intel sources have been quick to point out this alert is not based on any new info/intel. A recent report by Bill Gertz in the Washington Times has much the same information.


While this threat assessment is very real, these alerts never really say what we should be alert for. What are the potential targets in California? Are there any relationships to the Inland Empire? Who is the enemy and the ideology that drives it? How is the enemy organized and what are its operational tactics? What are activities and behaviors that might tip the existence of an aQ cell? Further the traditional law enforcement paradigm is ill-equipped to counter this new threat. We are the domestic boots on the ground.

Al-Qaeda seen planning for 'spectacular' attack




Become a member and help us get the word out

Jerusalem Post May 6, 2004

Virtual jihad

How serious is cyber-terror's threat, and what is the free world doing about it?


In-Depth Coverage


By Alan D. Abbey


Islamic terrorists are winning the on-line war against Western interests because of their virtually unchecked ability to use the Internet to plan, promote, and propagate both physical and cyber attacks.


Efforts to monitor, predict, and counter such attacks are only in the earliest stages. Technical, legal, privacy, and even political challenges are slowing down what could be called cyber counterterrorism in Israel and the US. Private groups have done much of what little successful monitoring has been done so far, as government efforts, particularly in the US, have been hampered by civil liberties concerns.

9-11 News and Legal Resources, Information and Related Services

Terrorism and Homeland Security


Compiled and Edited By: Sabrina I. Pacifici, Editor, Publisher, Web Manager, LLRX.com


See LLRX Newstand for additional daily news updates

Security Tightening Ahead of Eid in Malaysia, Indonesia

By Kazi Mahmood, IOL Southeast Asia Correspondent

Kuala Lumpur, November 24 (IslamOnline) - Security in several countries in South East Asia (SEA) is tightening ahead of the Eid el Fitri festivals that start at the end of the holy month of Ramadhan in December. Indonesia, Malaysia and Brunei have already stepped up routine patrols with more police forces on the streets than usual.

In Jakarta, the police are currently carrying out unusual raids in night spots and streets where foreigners would gather in a bid to deter night clubs, bars and other alcohol vendors to carry out their business during the month of Ramadhan.

Emergency Response Resource Directory:

This directory provides a comprehensive list of vendors, products and services to the emergency response community and is published directly to the following web sites.

High Tech "NewsBits"

UK Net pedo jailed for eight years A UK man, inappropriately named Lawrence Horn, has been jailed for eight years after trying to seduce a 14-year-old boy in an Internet chatroom. The 14-year-old was in fact detective Mark Bucci from Philadelphia in the States who was working under the pseudonymn Justin. Mr Horn, 35 from near Ashford in Kent, held numerous conversations with "Justin" which became increasingly sexually graphic. http://www.theregister.co.uk/content/6/22447.html


Taliban opposition site a casualty of war A Web site operated by opponents of Afghanistan's Taliban regime will likely remain offline for at least another month after hackers took it out of commission in an apparent case of mistaken identity. Visitors sent about 10,000 hate messages soon after the Sept. 11 terrorism strikes, and hackers brought down the ``AfghanGovernment.org'' site within days. http://www.siliconvalley.com/docs/news/tech/011931.htm

Hacking Incident Closes Security News Site The day before Marquis Grove decided to shutter his popular computer security news site, the operator of SecurityNewsPortal.com was brimming with energy about his labor of love. "I have a large viewership and I feel I owe them a responsibility to be there and keep slamming out the freshest news that I can to keep them amused and informed," said Grove in an e-mail interview Monday. http://www.newsbytes.com/news/01/171478.html


Bin Laden worm wriggling in South Korea A computer virus named after Osama bin Laden, the Saudi-born fugitive accused of masterminding the attacks on the United States, has surfaced in South Korea, a local antivirus software maker said Wednesday. "We received a report from a personal computer user who got an e-mail containing the virus, "Jin Yoon-jung of antivirus company Ahnlab told Reuters. "His computer was not infected, as he reported it to us without opening the e-mail.
http://news.cnet.com/news/0-1003-200-7641111.htmlRead More

UGN Security: Tech News

Google takes 'beta' off desktop search Spammers adopt slippery tactics to bypass ISP defences US Not Quite Ready for High Tech Cell Phones Antivirus Application Could Spread Viruses .US Domain Owners to Lose Anonymity Court Orders Microsoft Retrial – Waives Fine UK Police Want Special Internet Porn Unit Earthlink Announces Flash-Based Webmail Israeli Army Issues Video Screens to Troops New Online Magazine From al-Qaeda's Iraqi Wing Sony PSP to Top iPod as Must-Have in 2005 Judge dismisses spam conviction Sony offers pizza feature for hungry gamers Opera beefs up browser to thwart phishers Jef Raskin, Macintosh Creator, Died Sunday

Tech Law Journal Daily E-Mail Alert

Sen. John Edwards (D-NC), another member of the Subcommittee, also participated in the hearing. He is the sponsor of his own cyber security bills: S 1900, the Cyberterrorism Preparedness Act of 2002, and S 1901, the Cybersecurity Research and Education Act of 2002. S 1900 would authorize the appropriation of $70 Million in FY 2003 for grants to be administered by the National Institute of Standards and Technology (NIST) "to support the development of appropriate cyber security best practices, support long term cyber security research and development, and perform functions relating to such activities." S 1901 would authorize appropriations for a cyber security graduate fellowship program, and other educational programs.

Congressional Record: January 9, 2003 (Senate)

By Mr. DASCHLE (for himself, Mr. Leahy, Mr. Biden, Mr. Kennedy,
Mr. Schumer, Mr. Durbin, Mrs. Clinton, Mrs. Murray, Mr. Dayton,
Mr. Corzine, and Mr. Reed):

S. 22. A bill to enhance domestic security, and for other purposes;
to the Committee on the Judiciary.
Mr. LEAHY. Mr. President, I am pleased today to join Senator Daschle
and other Democratic Senators in introducing the Justice Enhancement
and Domestic Security Act of 2003. This comprehensive crime bill builds
on prior Democratic crime initiatives, including the landmark Violent
Crime Control and Law Enforcement Act of 1994, that worked to bring the
crime rate down.
This year marked an unfortunate turn after a decade of remarkable
declines in the Nation's crime rate. The decade of progress we made
under the leadership of a Democratic President helped revitalize our
cities and restore a sense of security for millions of Americans.
According to the latest FBI report, however, the number of murders,
rapes, robberies, assaults, and property crimes is up across the United
States in all regions of the country except the Northeast, the first
year-to-year increase since 1991. This upswing has been fueled by the
faltering economy and high unemployment rates. The President's ill-
conceived tax cut in 2001, along with the new cuts he proposes now, are
likely to exacerbate these economic woes by plunging us deeper into
deficit spending.Read More

Homeland Security Information

Links to various homeland securty related web sites where the
latest news and information can be obtained. Many of the sites also have
further tips regarding how to prepare for disaster situations regarding
homeland security.

SatCom Systems - Government and Homeland Securty:

SatCom Systems develops and provides critical communication solutions for First Responders and Incident Command Operations in Homeland Defense - available today and ready for the future.


The borders the United States shares with Mexico and Canada are the longest undefended national boundaries in the world. Major portions of these boundaries pass through isolated terrain with, relatively, few ËmannedÓ border crossings. Homeland Defense requires a coordinated response across multi-agency and jurisdictional lines to properly maintain the safety of the citizens from unfriendly incursions across this vast area. Coordinated, interoperable voice and data communications are essential elements for effective protection, and certainly any response.


First Responder and Incident Command Operations in Homeland Defense demand the ability to transmit and receive voice and data anywhere within the ËoperationalÓ area set forth by an incident. This area is dynamically determined as the response to an incident occurs, without regard for geographic or jurisdictional boundaries. The fluid dynamics of rapidly unfolding events creates an interesting set of challenges for even the most experienced organizations. Effective voice and data communications vital to the incident should not be part of these challenges. more »

Monstrous Homeland Securty - Lawyer's Boon and Citizen's DOOM!

By Harsha Sankar


From: WETHEPEOPLE_UNITED@yahoogroups.com

Dear Citizen, December 2002



It is the utmost hope for the sake of next generations that Americans now realize their freedoms have irrevocably been harmed in 2002. Due to the passage of the monstrous Homeland Security Act, the average American can expect the following.


Every credit card purchase, every magazine subscription, every medical prescription, every visited Web site, every e-mail, every academic grade, every bank deposit,and even every booked trip Will Be Recorded. All these transactions and communications will go into a vast database of the Defense Department. This once far-fetched Orweillan scenario is now reality.


The Information Awareness Office will now have the data-mining power to "snoop" on all Americans.Two hundred million dollars have been appropriated to create computer dossiers on all citizens. This Act, along with the U.S.A. Patriotic Act, has officially marked the end of Constitution's 4th Amendment. Since all matters now filter through the judiciary, the official inauguration of the police state will be a boon to the bar associations cult.Read More

Homeland Securty abandons MS for Linux

The United States Department of Homeland Security ( www.dhs.gov )
changed its servers over to Oracle on Linux last week, after running
on Windows 2000 for several months. Experts say that it is unlikely the
change is a reaction to "Slammer," the MS SQL server worm that rocked
the Internet last week. "

Defense tech debated

BY Frank Tiboni

Published on March 04, 2005



Congress will scrutinize the Defense Department's $30.1 billion budget request for military information technology spending for fiscal 2006 by questioning redundancy in the services' warfighting IT systems.


DOD IT officials requested $7.4 billion for command, control, communications and computer systems next year — a $1 billion increase from what they received last year. Lawmakers think troops could better communicate and access intelligence in Iraq and Afghanistan if they consolidated them.

On Line for Independent Inventors (24FEB2005)

This is a transcript of the on-line chat held on Thursday, February 24, 2005.

This final version is an edited version of the actual transcript. Where you see “edited answer” below, the original on-line chat answer has been modified to ensure completeness and accuracy of the answers originally provided by USPTO staff.

As in our previous chats held so far, we received hundreds more questions then we had time to answer. We selected questions for posting which we believed would be of interest to others besides the author of the question. Once we selected the question, we developed the answer, and then posted the question and the answer for viewing by the public. During the actual chat, occasionally the answer was actually posted before the public saw the question. This edited transcript always has the question before the answer. In reviewing the transcript below, if you see the time of the answer before the time of the question, we originally posted them out of sequence. More Info

Trademark Applications and Registrations Retrieval (TARR)

Important Notice Concerning TARR:
TARR is intended for use by the general public. Due to limitations of equipment and bandwidth, TARR is not intended to be a source for bulk downloads of USPTO data. Bulk data may be purchased from USPTO at cost (see the USPTO Products and Services Catalog). Individuals, companies, IP addresses, or blocks of IP addresses who, in effect, deny service to the general public by generating unusually high numbers of daily TARR accesses (searches, pages, or hits), whether generated manually or in an automated fashion, may be denied access to these servers without notice. More Info