Friday, October 17, 2008

Cyber Law Update October 2008 - Issue no. 10

Cyber Law Update October 2008 - Issue no. 10

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CYBER LAW NEWS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Estonia’s Cyber Security Policy

A year-and-a-half after the coordinated denial-of-service attacks against its government and commercial computer systems, Estonia has released a national cyber security strategy that includes details about the attacks and offers recommendations for preventing attacks in the future and for a global stance toward cyber security. The report identifies four “policy fronts”:
1) application of a graduated system of security measures in Estonia;
2) development of Estonia’s expertise in and high awareness of information security to the highest standard of excellence;
3) development of an appropriate regulatory and legal framework to support the secure and seamless operability of information systems;
4) and promoting international cooperation aimed at strengthening global cyber security.
If you are interested in reading the detail then Estonia’s cyber security policy can be found at the following URL
http://www.mod.gov.ee/static/sisu/files/Estonian_Cyber_Security_Strategy.pdf
Published in Oliver

How to prevent cyber terrorism?

Polish law needs changes to accommodate prevention of new threats such as cyber terrorism, say MPs belonging to a parliamentary commission following their talks with heads of special services in Poland. Published in Polish Radio


World Bank Under Cyber Siege in 'Unprecedented Crisis'

The World Bank Group's computer network — one of the largest repositories of sensitive data about the economies of every nation — has been raided repeatedly by outsiders for more than a year, FOX News has learned.

It is still not known how much information was stolen. But sources inside the bank confirm that servers in the institution's highly-restricted treasury unit were deeply penetrated with spy software last April. Invaders also had full access to the rest of the bank's network for nearly a month in June and July.

In total, at least six major intrusions — two of them using the same group of IP addresses originating from China — have been detected at the World Bank since the summer of 2007, with the most recent breach occurring just last month. Published in FoxNews

'Satyam banned from World Bank'


NEW YORK: Software major Satyam Computer Services has reportedly been banned from doing any off-shore work with the World Bank after forensic experts and bank investigators discovered that spy software was covertly installed on workstations inside the bank's Washington headquarters, allegedly by one or more contractors from Satyam Computer Services.
According to a FOX News report, apart from Satyam, two IP intrusions have been reported from China, and there have been six intrusions in all.
Investigators say that the software, which operates through a method known as keystroke logging, enabled every character typed on a keyboard to be transmitted to a still-unknown location via the Internet. Published in Indiatimes

Satyam refutes reports on World Bank bar


Hyderabad, Oct. 11 Satyam Computer Services has refuted reports in the international media that World Bank has barred it from doing offshore work. The reports said the bank had taken this decision after noticing reported intrusions into systems. “The story has no validity,” a Satyam spokesperson said.

Incidentally, a five-year contract between the bank and Satyam lapsed in September. The fourth largest IT services provider from India had bagged the contract in 2003 to implement Enterprise Resource Planning solution, extend document management and integrated messaging system.

Quoting from a World Bank statement that was issued to the agencies that ran the story, the spokesperson said here on Saturday that the story was wrong and was riddled with falsehoods and errors. “The story cites misinformation from unattributed sources and leaked e-mails that are taken out of context,” the statement said. Reported in Hindu

Electoral Rolls in Delhi Hacked!


It is reported that the Delhi Electoral rolls have been found to have been deliberately tampered with by the officials of an IT Company Webel Technology Limited. This would amount to Section 66 offence under ITA 2000 and the Company and its officials are in serious danger of being hauled up to the Courts and probably to the jails as well. Again this boils down to what "Due Diligence" the Company's top management had taken to ensure against any of its lower rank employees playing mischief. Reported in Naavi.org

Men indicted over cyber attacks


Two Europeans were indicted for allegedly launching internet attacks to shut down two retail websites in the US. Published in the Press Association

US patent office’s notice floors legal outsourcing

NEW DELHI: The US slowdown has kicked off a heated debate in the US legal circles. At the heart of debate is a recent notice by the United States Patent and Trademark Office (USPTO) barring companies who send information overseas regarding inventions and patents without government clearance. While some believe offshoring is good as it cut costs for legal firms, lawyer groups in the US are against it. Published in Economic Times

Cyber Intelligence-led Security - Reshaping the Role of Today’s CIO

Today, an increasing number of CIOs are embracing a new paradigm in the way they approach enterprise security. Previously, a significant amount of security resources were focused on protecting the perimeter. Now, however, a new, more dynamic and proactive approach is emerging as traditional reactive measures are no longer sufficient. Published in CIO


Cyber threats on the rise, FBI official says

Malicious cyber activity has grown more prevalent and sophisticated during the past year and threats come from organized crime groups, terrorist organizations and foreign governments, according to a senior FBI official. Published in FCW

Straightening the Tangle


The growing broadband adoption in India is encouraging, however, it has also opened a plethora of security concerns among enterprises

As the call for high-speed Internet and broadband is making waves among enterprises, hackers and fraudsters are having a ball of a time finding exciting opportunities to access vital documents in bandwidth-intensive unprotected networks of organizations. The network, according to experts is no longer delineating a physical network perimeter, people using the system-employees, customers, and partners constitute the new boundaries. … Experts also believe that India's unsafe security environment could be costing its BPO industry an estimated $500 mn annually. Published in VoiceNData

Outsourced--And Out Of Control


As the economy sinks and budgets are squeezed, outsourcing looks more and more like a thrifty necessity. But when it comes to the data security of those far-flung offices, businesses may find they get what they pay for.
A study released Tuesday, compiled from surveys of information technology managers and users in 10 countries, reveals an alarming gap between the information-security practices of developed countries and those of emerging markets like China, Brazil and, to a lesser degree, India. Published in Forbes

U.S. IT Security Better Than Rest of the World?


While there are some problems with IT security in the U.S., Americans in general have better security behavior to prevent data loss than other parts of the world. That's a general finding in a new report sponsored by Cisco that asked 2,000 globally dispersed professionals about their views on behaviors that could lead to data leakage.
….So what are some of the better IT behaviors?
One of them is using corporate-owned assets to communicate with personal e-mail. In the U.S., 39 percent of respondents admitted to using their company owned computer for personal e-mail while in Germany the figure was 47 percent, India 58 percent and in China a whopping 61 percent. Published in Internet news.com

Cyber Security Study: Many consumers less secure than they think


In our latest report on staying safe in cyberspace, 7 online blunders, the top mistake we warn about is assuming your security software is protecting you.
Now, a study just released by the National Cyber Security Alliance, underscores our advice by suggesting that many online consumers think their computers are more secure than they really are. Published in Consumer Report Electronics

Americans Still Somewhat Befuddled by Cyber Security


Users continue not to install antivirus software, believe they have protections they don't.

Every year there's a kickoff for a campaign on cyber-security awareness in the form of National Cyber Security Awareness Month. The campaign looks to better inform people on the hazards that may await them online. Each year, Symantec and the National Cyber Security Alliance perform some basic assessments of users' internet behaviors and each year they get a disappointing confirmation that many Americans still just don't get some important concepts cyber security. Published in DailyTech

Warning! You Might Be Fooled Into Clicking This Pop-Up


Have you ever been clicking your way through cyberspace, when suddenly, a very important-looking window pops up? It usually looks like it’s part of Microsoft Windows, and it says something like, “Warning! Your computer is at risk! Click ‘OK’!” Do you click on it? Is your computer really at risk? Is Windows trying to tell you something?
By now, you’ve probably figured out where this is going: that pop-up is a scam, something known as “scareware.” Published in Privacy Council

Uganda cyber laws going to Parliament
Uganda's draft electronic laws have been approved by Cabinet and are set to be debated before they are passed into law by Parliament.
The Ministry of ICT hopes to enact the draft laws -- the Computer Misuse Bill, Electronic Signatures Bill and Electronic Transactions Bill -- during this financial year, according to ICT Minister Ham Mukasa Mulira. Published in Network World

Copyright (New Technologies) Amendment comes into force in New Zeeland


Associate Commerce Minister Judith Tizard has announced that recent amendments to copyright legislation will soon come into force. The amendments update New Zealand's copyright law to reflect current advances in digital technology.
"The Copyright (New Technologies) Amendment Act 2008 will ensure our copyright laws keep up to speed with the dynamic nature of digital technology," Judith Tizard said. Reported in Behive.govt.nz

Spies Launch 'Cyber-Behavior' Investigation

A while back, the Office of the Director of National Intelligence (ODNI) said it wanted to start reviewing wannabe spies' "cyber behavior," before they handed the spooks security clearances. Suspect activities might include "social network usage," "compulsive internet use," "distribution of pirated materials," and "online contact with foreign nationals," the ODNI said. Published in Wired News

Scrabulous makers score a mixed ruling

Rajat and Jayant Agarwalla, the Indian brothers who came up with the Scrabble-style word game for Facebook called Scrabulous, told fans that their country's courts ruled that their game did not violate Mattel Inc.'s copyrights.It did, however, consider the name Scrabulous a trademark violation and ordered the Agarwallas to stop using the word, the brothers said. Published in LA Times

Banks Team Up for Cyber Security Awareness Month to Help Canadians Avoid Online Threats From Social Networking and File Sharing Sites

The Internet has made it easier than ever to bank, shop, communicate with others and find information about almost anything at any time. But as Internet use among Canadians continues to rise, so too does the number of criminals who commit identity theft and fraud using information they've found online. Published in Market Watch

Corporate, Government and Academic Leaders Unite to Fight Cyber Crime, Identity Theft and other Identity Management Challenges


An unprecedented coalition of leading corporate, government and academic institutions today announced the formation of the Center for Applied Identity Management Research (CAIMR). CAIMR is focused on developing research and solutions for society's most daunting identity management challenges such as cyber crime, terrorism, financial crimes, identity theft and fraud, weapons of mass destruction, and narcotics and human trafficking. The Center is the first of its kind to bring cross-disciplinary experts in criminal justice, financial crime, biometrics, cyber crime and cyber defense, data protection, homeland security and national defense to address identity management challenges that impact individuals, public safety, commerce, government programs and national security. Published in Market Watch

Cyber Crime Cell arrest one for extortion over web

Chandigarh, October 12 Cyber Crime Investigation Cell of the Chandigarh Police today arrested one Puja Negi, for involvement in an “extortion through the Web” racket. Published in Newsline

IB to go hi-tech, get more manpower to fight terror

NEW DELHI: Intelligence Bureau — which has come under flak for its failure to keep tabs on tech savvy jihadis — is set for major revamp with the government recruiting 6,000 more spies to strengthen its existing cadre of nearly 25,000 personnel. The IB will also get modern gadgets to monitor cyber communication. Published in Times of India

Fed Blotter: New Charges Filed Against Alleged Cyber Peeping Tom

Federal prosecutors are going after a Florida college student who allegedly installed spyware on a woman's laptop to covertly snap nude photos of her through her webcam.
Published in Wired News

Compulsory registration for cyber cafes in MP town

In view of spiralling cyber crimes in the financial capital of Madhya Pradesh, it was made mandatory for the cyber cafe owners to register themselves at the Indore Police's web portal. Published in Central Chronicle

Average privacy policy takes 10 minutes to read, research finds


Website privacy policies take on average 10 minutes to read and sometimes run into thousands of words, researchers have found. While some are short, others would take over half an hour to read, researchers said.
Published in out-law.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

PRODUCTS AND SERVICES

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Cyber Law College has been the pioneer in Cyber Law education in India. It provides various courses and trainings on Cyber Law for E-Commerce Professionals, Law Students, Business Management Students, Engineers, Company Secretaries and Chartered Accountants and Legal professionals who would like to specialize in Cyber Laws. For more details email at cyberlawcollege@gmail.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

iPro, a unique software to comply with the MCA-21 e-filing & Company Law requirements.

It enables an easy & secure access and also e-filing and compliance to MCA services. MCA 21 Project facilitates e-Filing of various forms & applications under the Company Act, 1956. It is fully compatible with the MCA21 Project. In addition to these there are various other utilities of the package.
Salient Features of iPro:
 New format of e-forms – as and when updated / revised
 Efilling of Forms
 Annual Return as per Schedule 5
 All major e-Forms like- 1, 1A, 2, 5, 8, 17, 18, 20B, 23, 23AC, 23ACA, 32, 32AD, 62, 66, DIN 2, DIN 3, etc.
 Minutes book with 500+ resolutions in-built plus user editing option
 Compliance Certificate
 Combined Company Registers
 Allotment, Transfer, Consolidation, Split, Transmission, Forfeiture, Cancellation of shares
 Fixed Asset Registers & Reports
 Charges and Notice
 Certificate Printing
 Director Details Entry
 Attachment in PDF format.
For more details of the above software email at digitalsigncert@gmail.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For TCS Class 2 Digital Signature with Cryptographic FIPS Certified USB Token email at digitalsigncert@gmail.com


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For posting your products and services, please email details at dipak00001@gmail.com with subject line “Product”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

JOBS/ FREELANCE MARKETS

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Coming soon….

For posting cyber law or IS related jobs or assignments, please email details at dipak00001@gmail.com with subject line “Job”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

CYBER LAW/IS EVENTS

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Coming soon….

For posting cyber law or IS event, please email details at mailto:dipak@lawyer.comwith subject line “Events”
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

BUSINESS STUFF

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Advertise with Cyber Law Update!!!
For more details email at mailto:dipak@lawyer.com with subject line “Advertise”

Monday, September 29, 2008

Cyber Law Update September 2008 - Issue no. 9

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CYBER LAW NEWS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Perils of wireless Internet

Recent blasts expose the safety gaps in cyberspace and underscore the need for smart vigilance.

R.K.Raghavan

It is the same old story again. As in the case of a few past blasts, such as the series of UP explosions (November 2007) and Ahmedabad (August 2008), terrorists involved in the five explosions of Delhi on September 13 sent e-mails to the media just a few minutes before the bombs took off, warning the authorities of their action. There are, however, several unexplained issues here. Published in The Hindu Businessline

Centre to issue guidelines to internet service providers (Article published in Hindu)

The Winds of Cyber War


The computer attacks Russia allegedly orchestrated against Georgia in August have raised the cyber warfare bar to a new threat level. The cyber assault that accompanied Russia's armed maneuver into its former territory of Georgia escalated to an international event.
The concept of hurting a nation's technological infrastructure as part of a wider conflict is not new. The extent to which the digital warfare was waged, however, clearly added to a growing concern that has already led U.S. officials to prepare for the next wave of computer warfare. Published in TechNewWorld

Homeland Security found to be unprepared for 'cyber' threats

WASHINGTON--When politicians got together six years ago and decided to glue together a medley of federal agencies to create the U.S. Department of Homeland Security, one of the justifications was a better focus on cybersecurity.

….Now, Homeland Security is weathering a deluge of criticism of its lackluster cybersecurity efforts on grounds that they have proven to be inefficient, bureaucratic, and not even able to do a decent job of monitoring federal computer networks. Published in CNET News

Experts call for united global action against cyber attacks


The world has to unite against the growing menace of cyber terrorism, IT experts said Thursday, evoking a recent "cyber war" against Georgia as the latest example of the threat.
"The world has finally woken up and understood that cyber security needs a global approach and is a very serious matter," Estonian politician Mart Laar told a cyber security forum in the Estonian capital Tallinn. Published in Pak Tribune

Cyber-crooks sting South Africa for A$26m

A cyber-crime syndicate is believed to have defrauded the South African government of more than £12.8m (A$26m) in a series of spyware frauds. Published in Secure Computing

Cyber-Ark Highlights the Seriousness of Data Security

Security firm Cyber-Ark has slammed a data breach in the UK that has seen the personal details of 5,000 Ministry of Justice staff go missing, saying that the situation highlights the need for EU controls on data security. Published in IDM

Cyber attack launched on Shiite websites: Iran report


Sunni Muslim computer hackers have attacked hundreds of Shiite websites including Shia Islam's most popular site linked to the community's leader in Iraq, Iran's Fars news agency reported on Friday (19 September 2008). Published in AFP

Anti cyber crime measures are 'a threat to privacy'


The world's leading international telecommunications organisation thas been slammed by privacy advocates for trying to stem the number of DoS attacks by limiting the amount of anonymity on the web. Published in ComputerWorldUK


Cyber attacks cripple opposition Myanmar media

The Internet sites of three Myanmar opposition media groups in exile suffered widespread cyber attacks, the anniversary of last year's failed uprising against the Southeast Asia country's military dictatorship. Published in eTaiwan

Cyber Attack Data Sharing Is Lacking, Congress Told

U.S. intelligence agencies are unable to share information about foreign cyber attacks against companies for fear of jeopardizing intelligence-gathering sources and methods, cyber security expert Paul B. Kurtz told lawmakers yesterday. Published in Washington Post

The Generals Go Cyber?


Burma's military junta has so successfully suppressed the media that Internet sites based outside the country are one of the few remaining sources of reliable news for Burmese people. Now it appears not even those sites are safe. Shortly before yesterday's anniversary of the 1988 pro-democracy uprising and last year's Buddhist-monk-led Saffron Revolution, the Web sites of my newspaper, The Irrawaddy, and other Burmese news portals came under cyber attack. I am not alone in believing that the junta is behind the attack, just as it was behind the shutdown of Internet access in Burma during last year's uprising. Published in Wall Street Journal

Hacker tool can watch you through webcam

Cover your webcams and unplug your microphones, because the latest freely-available hacker tools could use your own hardware against you without your knowledge.
Security specialist Prevx showed us some of the latest scary techniques being used to take unsuspecting web users' credit card details, passwords and personal information, as well as turn on your webcam and watch you. Published in TechRadar.com

Cops identify cyber cafe from where email threat to Advani was sent


Police have claimed to have identified the cyber cafe from which the email, purportedly sent by Indian Mujahideen terrorists, to eliminate BJP leader L K Advani during his Shillong visit on September 29, was sent. Published in Times of India


Teenage cyber terrorist sent to jail


Hammaad Munshi, from Dewsbury, West Yorkshire, England, was 15 when he was recruited into a worldwide plot to wipe out non-Muslims.
He was arrested in 2006 after police found material promoting "murder and destruction", including a guide to making napalm, on his computer and under his bed. Now 18, he has been convicted of making a record of information likely to be used for terrorist purposes. Published in Irish Independent

Senate moves to criminalise ATM, mobile phone, cyber offences


A bill for an Act to provide for the prohibition of electronic fraud in all electronic transactions in Nigeria and for other related matters

The bill, which is being sponsored by Senator Ayo Arise (PDP, Ekiti), has passed through first reading.
Violators of provisions of the law are liable on conviction, to jail terms ranging from five to 14 years. Published in The Punch

Cyber security top priority for UAE government

Dubai: Cyber security of the UAE government's information and ensuring that its own citizens protect it has become a priority, said Dubai eGovernment eServices Director Salem Al Shair…Published in Gulf News

Nigeria: EFCC Develops Software to Combat Cyber Crime

The Economic and Financial Crimes (EFCC) says it is developing computer softwares that would monitor internet services in the country as a way to combat cyber crimes.
Spokesman of the Commission, Mr. Femi Babafemi, who disclosed this to IT World, said the Commission is partnering with Information and Communication experts to develop the software. He said already, the report of the technical committee on the development of the software has been submitted to the chairman, adding that so far, over 136 cyber crime suspects have been arrested since Mrs. Farida Waziri took over as chairman of the Commission. Published in All Africa

Improved OnGuardOnline.gov Site Teaches Cyber-Safety to the Average Person

One of the better places for the average person to learn about the sometimes murky waters of the Internet is free and sponsored by the Federal Trade Commission. Although OnGuardOnline.gov and AlertaEnLinea.gov, its Spanish-language counterpart, have been around for awhile, some new and exciting improvements have been made to the site with a just released Web 2.0 redesign. Published in Blogcritics

Banking crisis: Cyber squatters cash in

It is not just hedge funds and short-sellers that are looking to cash-in on the global financial meltdown. Cyber-speculators have got in on the act too, snapping up online domain names in a game of guess the brand and the hope of selling their piece of internet property to the highest bidder.
Yesterday (September 16 2008) the rather long-winded domain name www.bankofamericamerrilllynch.com went up for sale on auction site eBay with an asking price of $1500 (£832). Published in Guardian

Cyber sleaze hits city’s top business family

A well-known builder’s family was hounded out of its wits recently when all its members, including four women, started receiving phone calls from unknown persons propositioning them to provide ‘female escorts’ as advertised in an internet-based agency. The ‘escort agency’ advertised Punjabi women available as escorts in Nagpur and listed the phone numbers of all the members of the family. Shocked by the flurry of calls, the angry and embarrassed family approached the cyber crime cell of crime branch in July. The cyber cell team, cracking the case, exposed the role of a disgruntled relative who wanted to avenge the fact that he was distanced from the family business as a sub-contractor around a year ago over a dispute. Published in Times of India

Comments: Disgruntled employees, friends and even lovers had restored to e-revenge in past. Hence, you are advise not to sharing your personal details and photo online.

OPINION: Cyber-Bullying - A Dark Side of the Internet

The Internet places a profound and staggering degree of information and knowledge at our fingertips. The Internet is the ultimate library and encyclopedia. It enables an army of telecommuting working men and women to work at home. It facilitates instant back and forth communication by e-mail. Online, we read newspapers and listen to music. The Internet is where we can advertise goods for sale on e-bay and purchase all sorts of items at retail stores. However, there is a dark aspect to the Internet. Published in Southern Maryland Online

Cyber sex can cause depression

People who frequently indulge in online sex, fetish and swinging sites have “alarmingly high” rates of depression, anxiety and stress, says a shocking new research. What’s more, people who seek out cyber sex typically devote hours a day to the covert activity, the study found. The Australian research also revealed that overwhelmingly male, well-educated, and aged anywhere from 18 to 80 indulge in such kind of ‘pleasure’. Published in Times of India

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

JOBS/ FREELANCE MARKETS

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Coming soon….

For posting cyber law or IS related jobs or assignments, please email details at dipak00001@gmail.com with subject line “Job”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

CYBER LAW OR IS EVENTS

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DIGITAL SOCIETY DAY 2008
Event in Bangalore on October 17, 2008
Sept 26: As in the previous years, Digital Society Foundation (Trust promoted by Naavi and others) will celebrate October 17, 2008 as the Digital Society Day of India in recognition of the fact that on October 17, 2000, ITA 2000 was given effect to bringing in the legal recognition for electronic documents for the first time in India. The theme for the current year is "Privacy and Data Protection in Cyber Space". The event will consist of a day long programme to be held at KLE Law College, Rajaji Nagar, Bangalore in association with KILPAR (Karnataka Institute of Legislative and Parliamentary Affairs) and KLE Society's Law College. The seminar will discuss the issues in balancing the demand for Privacy Rights Protection by Human Rights Activists with the Law Enforcement needs in the light of Cyber Terrorism and Cyber Wars. It is intended to collect the views of Legal Experts on the "Essential Features of a Suggested Data Protection Act of India" to be consolidated and presented to Nasscom and Ministry of Communications and Information Technology for further action.
(Law Students wishing to present a paper on the occasion may kindly submit the paper before October 10th to naavi , through e-mail (naavi@vsnl.com) and print copy. The best paper presenter may be invited to briefly present his views during the seminar)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For posting cyber law or IS event, please email details at mailto:dipak@lawyer.comwith subject line “Events”
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

BUSINESS STUFF

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Advertise with us!!!
For more details email at mailto:dipak@lawyer.com with subject line “Advertise”

Wednesday, September 24, 2008

Domain name fraud: Hoax email to solicit business from .com owners

If you recieve an email information you that someone had made application for registration of domain name similar to your .com domain name.

It is a hoax email to solicit more business for the owner of .com domain name. They want you to register under different domains such as .asia .in .org net. and so on.

Sample of hoax email

From: Dr. ABC
Date: 9/23/2008 9:29:19 AM
To:
Subject: XXX Enquiry

Dear XXX,

We are one of the Domain Name Dispute Resolution (DNDR) Committee members authorized by ANIC(Asia Internet Network Information Center).

Now we have something urgent on intellectual property need to confirm with your company.

On the Sep 22, 2008, we received an application from one person from China Intellectual Property Protection Agency (Taiwan) Corporation named “Roger L. Forbes” who wants to register the “XXX” as Internet Brand,TradeMark Domain and Asia Pacific domains. Considering these domains and internet brand would involve the intellectual property of your company’s name,patents,trademarks,and copyright, and in order to avoid confusion between them, so we inform you urgently. If you considered these domains and internet brand are important to you and there was necessary to protect them by registering them first, please let someone who is responsible for trademark or domain name contact me as soon as possible.

Thank you for you cooperation.

I am waiting for your urgent reply,
Kind Regards,
Dr. ABC
Chief Law Officer,Senior Consulting Director

Internet Brand Justice & Safety Dept.
ABC xxx xxx Ltd (Branch Office)
Help Dispute Tel: ..........(Mon–Fri,9am to 6:30pm,GMT+8)

Wednesday, September 17, 2008

Misuse of wireless network to send terror email

Terrorists had allegedly used unsecured wi-fi networks to send terror emails to media and remained anonymous till date. Earlier terrorists were using cyber cafes to send terror emails but now they are exploiting wi-fi and tomorrow some other technology. Similar trend is being witnessed in other areas of information security. As the world catches on to the dangers of opening unknown e-mail attachments and better spam filters are created, the focus of attacks is turning to the web itself.[1] Trend Micro Incorporated, a global leader in Internet content security, reported that cybercriminals are not only leveraging new technologies to propagate cybercrime, but are also reinventing forms of social engineering to cleverly ensnare both consumers and businesses, according to the "Trend Micro Threat Roundup and Forecast 1H 2008" report.[2]

Is wi-fi technology is safe?

“The vulnerability is more in the negligence of the users of wi-fi rather than the technology itself” says Na.Vijayashankar, better known as Naavi, the well known Cyber Law Consultant in India. He was the author of the first book on Cyber Laws in India and a pioneer in the spreading of Cyber Law Education in the country.

The users are not taking sufficient measures to secure their wi-fi nor the service providers are take necessary steps to educate them on same. It is easier for users to secure its wired network because it is visible to them. This advantage is not available to wi-fi users. Naavi says, “The invisibility of the network users induces complacency. Psychologically, it is difficult for ordinary users to visualize that a person from out of our physical boundary may also have access to the device.” If this vulnerability of wi-fi is not plugged then the same can be misused by terrorists to send terror emails and remain anonymous as reported in the above mentioned two incidences.

How wi-fi works?

Wi-fi uses radio signals to connect and communicate with a hotspot and a PC or a laptop situated in a short distance of 100 to 200 feet in an office building, a university or even at homes. You can move around in a campus of university or an office without losing net connectivity.

When the hotspot is in open mode, it sends broadcast a message “I am available” in a vicinity of 100 to 200 feet and a laptop or a PC equipped with a wireless network receiver in this vicinity able to connected to the particular wi-fi and connect to net. One can access wi-fi network even from 800 feet by using an antenna. So if your wi-fi network is not secured then it can be misused by not only by your neighbours residing in your and nearby buildings but also by a stranger few streets away from your office or home.

Whereas in closed mode, the user sends a message “I want to connect with XYZ wi-fi hotspot”, which is responded by the hotspot “I am XYZ”. You can have additional security login id and password for connecting to wi-fi.

Wi-fi software faults make interception easier. Security Consultant Chris O’Ferrell has been able to connect to wireless networks in Washington D. C. from outside a Senate office building, as reported in “High Wireless Acts” by Noguchi. Y in Washington Post dated 28 April, 2002. Back home. Asian School of Cyber Laws recently conducted experiments near several software parks. The finding of the same was very shocking and reveals lack of cyber security. “The wireless networks of a whopping 90% of the software companies were leaking out sensitive information. A malicious hacker could easily sit in a parked car with a laptop; run some sniffing software and access huge mounts of sensitive data including source codes!” For more details refer Cyber Crimes Hit List – 2006 issued by Asian School of Cyber Laws and available on their website www.asianlaws.org.

Precautions to be taken by users to secure their wi-fi:

Keep wi-fi in closed mode rather than open mode.
Use a log-in id and password to access wi-fi and periodically change your password.
Use wi-fi protected access2 (WPA2), which more secured than wired equivalent privacy (WEP)
When you are not using wi-fi, switch off the same.
Check the audit trails of net sessions to ensure that all logs are properly recorded and not misused by unauthorized user.

Naavi warns all wi-fi users, including potential users, to avoid wi-fi if you cannot adopt the requisite security.


Footnotes

[1] For more details read article on “The new multiple face of Internet threats” available at http://www.canada.com/calgaryherald/news/story.html?id=1e082603-ec50-4b79-af5d-9996d1d39732
[2] Source: Trend Micro Incorporated


*********

Today(17-09-2008), I had secured a wi-fi network of my business associate…I feel great…although it is a drop in the ocean (an initiative to secure wi-fi networks in Mumbai)
Perils of wireless Internet

Recent blasts expose the safety gaps in cyberspace and underscore the need for smart vigilance.

R.K.Raghavan

It is the same old story again. As in the case of a few past blasts, such as the series of UP explosions (November 2007) and Ahmedabad (August 2008), terrorists involved in the five explosions of Delhi on September 13 sent e-mails to the media just a few minutes before the bombs took off, warning the authorities of their action. There are, however, several unexplained issues here. Published in The Hindu Businessline

Centre to issue guidelines to internet service providers (Article published in Hindu)


Monday, September 15, 2008

Cyber Law Update September 2008 - Issue no. 8

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CYBER LAW NEWS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

LHC Web site defaced – was the particle detector really at risk?

The Telegraph is reporting that attackers have defaced a Web page on the Compact Muon Solenoid Experiment Monitoring (CMSMON) system that monitors the fallout from the big bang experiment presently taking place beneath CERN.
The question that should stand out is why this system was public faced. CERN scientists said the attackers were “one step” away from the control system that operates one of the huge magnets used in the gargantuan machine. Published in the Tech Herald

Cyber Crime: An Economic Problem

During ISOI 4 (hosted by Yahoo! in Sunnyvale, California) whenever someone made mention of RBN (the notoriously malicious and illegal bulletproof hosting operation, the Russian Business Network) folks would immediately point out that an operation just as bad was just "next door" (40 miles down the road?), working undisturbed for years. They spoke of Atrivo (also known as Intercage). The American RBN, if you like.

In fact, while many spam operations use botnets and operate all around the world, a lot of the big players own their own network space and operate hosting farms, which are constant and "legitimate", right in the US—for years now. Published in CircleID

U.S. takes a look at arming itself for cyber-warfare

Never let it be said that the U.S. government makes snappy decisions about arming itself for cyber-warfare. Julian Barnes at the Los Angeles Times reports that the military is currently debating whether or not to develop the ability for the U.S. government to go on the offensive during a potential cyber-attack rather than simply defend U.S. computer systems in case of cyber-warfare. Barnes' article points out that the recent cyber-attacks associated with the conflict in Georgia have escalated the debate, which "reflects a newfound uncertainty over the state of global cyber-warfare capabilities." Published in The Standard

Defense Ministry’s Cyber Network Is Hacker-Proof

A Defense Ministry spokesman assured Tuesday that the department's cyber-security system is ``hacker-proof," adding that its intra-net computer data network is detached from the external Internet.
Source: koreatimes.co.kr Published in Crime Research

Is the cyber terrorism threat exaggerated?

Cyber terrorism, a term coined by the media rather than security agencies, is one of the apocalyptic scenarios portrayed by fiction writers and movie producers on a regular basis. The story of a teenager bringing an entire nation to its knees with a computer and internet connection not only inflicts terror and awe in general public, it also fuels a lot of misapprehension feeding on the natural fear of unknown technology.

While it would not be advisable for any national security outlook to discount cyber terrorism completely, the threat must be kept in perspective. As communications technology becomes more pervasive and integrated into the national economy and infrastructure, providing security to it and preventing its abuse obviously becomes a national security concern. Published in India Post

‘Lack of Cyber laws makes it impossible to fight Net crimes’

KUWAIT CITY : Internet-related crimes are on the rise in Kuwait and the lack of Cyber laws makes it impossible to tackle such fraudulent practices, says a Kuwaiti lawyer. Speaking to the Arab Times on Wednesday, Labeed Abdal added that hackers are increasingly targeting Kuwait and many other countries, knowing full well that they can get away with their crimes. He went on to explain that some people send abusive emails to settle personal scores and that the law enforcement agencies are unable to act on such matters due to non-existence of Cyber laws, “which must be in tune with the latest changes in the Internet domain.” Published in Arab Times Online

Braga pushes passage of cyber crime bill

THE Davao City Council, through a resolution proposed by Councilor Pilar Braga, urged the House of Representatives to fast track the formulation of the final draft of the cyber crime bill.
"We push for a its speedy endorsement to the Senate because we urgently need of legislation. The longer it takes for the bill to become a law, the more daring cyber crimes are being committed," Braga said Wednesday. Published in Sun Star

Experts call for united global action against cyber attacks

TALLINN (AFP) — The world has to unite against the growing menace of cyber terrorism, IT experts said Thursday, evoking a recent "cyber war" against Georgia as the latest example of the threat.
"The world has finally woken up and understood that cyber security needs a global approach and is a very serious matter," Estonian politician Mart Laar told a cyber security forum in the Estonian capital Tallinn. Published in AFP

NASS, EFCC, ICPC, CBN to partner against cyber crime

National Assembly, the Economic and Financial Crimes Commission (EFCC), the Independent Corrupt Practices and Other Related Offences Commission (ICPC) and the Central Bank of Nigeria (CBN) have resolved to partner themselves in the fight against cyber crime and money laundering. Published in Tribune

NHRC asks for speedy inquiry in cyber fraud

KENDRAPARA: National Human Rights Commission (NHRC) has directed police here to speed up the inquiry and submit report on an alleged cyber fraud in which an Oriya engineer working in a Dubai company was cheated. Published in Economic Times

Cyber experts to help make WiFi networks more secure

In light of the recent controversy over wireless fidelity (WiFi) network connection, Maharashtra police have joined hands with the Federation of Indian Chambers of Commerce and Industry (FICCI) to secure the WiFi network across the state. Published in DNA India

‘Cyber Safe Thane’ Organised by Thane Police & NASSCOM

NASSCOM, the premier trade body and ‘voice’ of the Indian IT-BPO industry, today announced that it would be organising ‘Cyber Safe Thane’, a three day awareness campaign on Cyber safety and security issues for customers, industry, academia, and other stakeholders in Thane from September 18-20th, 2008. Prdomain Business Register (press release)

Stop taking Net for granted!

NEW DELHI: We live in an exciting world of technology which is changing every day. There's YouTube, Second Life, MySpace, iPhone.

You probably hadn't even heard of these a year ago, but today they dominate the discussions about societal trends and the future of communications and the Internet.

Once upon a time, e-commerce drove the Internet debate, but now it's clear we have entered a new era.

Today, consumers have ushered in the 'Any Era' demanding access to any information, from any device, any time and anywhere they want it. And they not only want access; they want the ability to contribute, personalise and socialise. Published in Indiatimes

House panel to banks: devise systems to thwart cyber crimes

The parliamentary standing committee on personnel, public grievances, law and justice on Wednesday asked public sector banks to devise a special monitoring system to check cyber crimes and strengthen the present vigilance system to curtail corruption. The committee observed that the present banking set up was not equipped to tackle cyber crimes, which are quite familiar at the international level. The committee was concerned about effects of cyber crimes on the Indian banking system. Published in Financial Express

Chennaiites lose Rs 1 cr to phishing this year

CHENNAI: Chennaiites have lost over Rs 1 crore to phishers in 2008 alone, thanks to fraudsters taking advantage of the increase in the number of people switching to net-banking. Complaints of phishing have been flooding the bank fraud wing of the central crime branch of city police. In spite of warnings by banks, educated customers are falling prey to online robbers. Police have identified as many as 21 types of phishing mails, most of them involving spoofing of the web pages of mainstream banks. Some other phishing mails exploit the tendency of people to fall for free money or gifts. Published in Times of India

Case registered against eight for cyber fraud

Acting on the directive of the National Human Rights Commission, the police have registered a criminal case against a 25-year-old net-savvy married woman and seven others on alleged cyber fraud charge. Published in Kalinga Times

Cyber cheat lived it up after Rs 20 lakh heist

AHMEDABAD: Ellisbridge police officials are now trying to connect the dots in the sensational Rs 20-lakh online heist of Sanjay Koliya, 20, of Rajkot.

As Ellisbridge police grilled him, Sanjay gave details of his life after he became rich overnight. The investigating officers are now probing how exactly and in what manner the young cyber cheat spent his ill-gotten wealth. Published in Times of India

Cyber Crimes: You Could Be the Next Victim

Welcome to the world of cyber crimes, welcome to the den of cyber-criminals.
Experts are of the opinion that cyber crime, which commonly refers to any illegal activity committed on the Internet, dates back to the 1980s. Because of declining economic standards in most developing countries, numerous jobless youths found earning a living increasingly difficult despite having relevant degrees and certifications. They decided to devise a means of survival. The result of their "ingenuity" is this pest threatening to inconvenience Internet users. Published in The Industry Standard

Teacher arrested in cyber-sex sting

A 46-year-old Paradise man, Butte County substitute teacher and father of two Paradise High School students was arrested Wednesday for soliciting sex over the Internet with someone he allegedly believed was a 13-year-old girl.

According to a Butte County Sheriff's Office press release, Gerald William Lemay was arrested for arranging a meeting with a minor for sexual purposes. Published in Paradise Post

Cyber Bullying: Responsibilities and Solutions

A Missouri woman is indicted on federal charges of causing the suicide death of a teenage girl who frequented the social networking site MySpace. An eighth grade student from Pelham Middle School, N.Y. is the recipient of insulting remarks posted on her MySpace page by a classmate. Another eighth grader receives embarrassing comments as she instant messages with friends. A 13-year-old Vermont boy was bullied for months online. He eventually committed suicide. These are but four examples of a problem known as cyber bullying. Published in Tech Learning

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Jobs/ Freelance Market
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Coming soon….

For posting cyber law or IS related jobs or assignments, please email details at dipak00001@gmail.com with subject line “Job”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Cyber Law or IS events
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Coming soon….

For posting cyber law or IS event, please email details at dipak00001@gmail.com with subject line “Events”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
BUSINESS STUFF
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Advertise with us!!!
For more details email at dipak00001@gmail.com with subject line “Advertise”


Tuesday, September 2, 2008

Cyber Law Update August 2008 - Issue no. 7

A classic cyber war?

It is again eventful times in cyberspace. It all started earlier this month with the entry of Russian troops into neighbouring Georgia’s South Ossetia, a region not reconciled to its present political status within Georgia, and with strong affinity for North Ossetia that is part of Russia. Reported in The Hindu Businessline

Public, private sectors at odds over cyber security

The government has largely argued that the private sector is better suited to tackle the problem. But big corporations say it's too big for them to handle.
By Joseph Menn, Los Angeles Times Staff Writer
Three very big and very different computer security breaches that have dominated recent headlines did more than show how badly the Internet needs major repairs. They also exposed the huge rift between corporate America and the federal government over who should fix it, cyber-security experts say. Reported in La Times

Thousands of cyber attacks each day on key utilities Jonathan Richards

Computer networks controlling electricity supplies, telecommunications and banking are being attacked thousands of times a day in a new cyberwar against Britain waged by criminals and terrorists — some of them backed by foreign states — the Government has said. Reported in Times Online

Hacker gets into Federal Emergency Management Agency's phone system

The FBI is investigating more than $12,000 in calls made when a hacker broke into the Federal Emergency Management Agency's phone system.
Source: newschannel5 Reported in Crime-Research

Hackers attack Iraq's vulnerable computers

Ahmed Khathem, the head of Iraq's newly formed cybercrimes division, sits in a borrowed office, at a borrowed desk, working on a laptop borrowed from one of his subordinates.
It is his unit's lone computer, highlighting the country's vulnerability to a community of Iraqi hackers defacing websites and attempting to hack into sensitive internal networks.
Source: USAtoday.com Reported in Crime Research

Indian hacker alleged brain behind biggest cyber-heist

LONDON: An unknown Indian hacker is being charged with the greatest cyber-heist in history for allegedly helping a criminal gang steal identities of an estimated eight million people in a hacking raid that could ultimately net more than 2.8 billion pounds in illegal funds. Reported in Economic Times

Survey: IT staff would steal secrets if laid off

Computerworld UK — Most IT staff would steal sensitive company information, including CEO's passwords and customer details, if they were laid off, according to a new survey from Cyber-Ark.
A staggering 88 percent of IT administrators admitted they would take corporate secrets, if they were suddenly made redundant. The target information included CEO passwords, customer database, research and development plans, financial reports, M&A plans and the company's list of privileged passwords. Reported in IT World

Cyber-threat environment becoming increasingly severe

Today's cyber-threat environment is increasingly severe, compounded by the emergence of new types of attacks.
This is according to TippingPoint, an intrusion prevention company which also provides IPS-secured (intrusion prevention system) network. They say the situation is worsened by the shrinking time between the discovery of vulnerabilities and the development of ways to exploit them, plus the dissolving network perimeter. Reported in Network World

The new multiple face of Internet threats

E-mail viruses are so yesterday. These days, it's your browser that has online criminals salivating.
Network worms and viruses spread by mass e-mails are unlikely to ever become extinct, but they are no longer the primary weapon used by the bad guys of the virtual world to steal your identity or life's savings. Reported in Canada.com

Hard disks seized from 3 cyber cafes

21 Aug 2008, Ahmedabad/Vadodara: Three cyber cafes in Vadodara's old city area were searched by the Ahmedabad Crime Branch and local Special Operation Group (SOG) officials in connection with Ahmedabad blasts late on Wednesday after information that those behind the blasts, including computer expert Abdul Subhan alias Taufique Bilal from Mumbai, visited these cafes. The investigating team seized 28 hard disks from all three cafes and sent it to Forensic Science Laboratory (FSL) tests. Reported in Times of India

Dalhousie to help U.S. catch cyber terrorists

A major software project is underway by the U.S. Department of Homeland Security to monitor levels of Internet traffic and detect possible security breaches — and Dalhousie University is going to help build it. Reported in The Chronicle Herald

More tools developed to crack cyber crimes

THIRUVANANTHAPURAM: Law enforcing agencies are now armed with more software tools to fight cyber crimes with a premier centre claiming to have developed them.
Emailtracer, CyberCheck, Siman and Calltrack are some of the softwares (sic) developed indigenously by the Resource Centre for Cyber Forensic (RCCF) here. Reported in Economic Times

Cyber forensic tools will soon be considered as evidence

THIRUVANANTHAPURAM: Evidence gathered using various cyber forensics tools developed by the Centre for Development of Advanced Computing (CDAC) would soon be considered as evidence in cyber crimes.
Necessary amendments in this regard would be made in the IT Act, said Communication and Information Technology Minister A Raja. He was speaking at a function organised in connection with the dedication of the Resource Centre for Cyber Forensics (RCCF) at CDAC here to the nation on Saturday. Reported in NewIndPress

City turning a hackers' den

HYDERABAD: The source code theft involving a senior techie could be a highend cyber crime but the city's netizens have been witness to a range of cyber concerns from hacked email accounts, credit card frauds to the most common crime of posting pornographic material on the profiles of social networking site members.
And this has made internet security experts brand Hyderabad as a hackers' den. They say the city has become a haven for cyber crimes, and that among the southern Indian cities Hyderabad perhaps also ranks the highest on the cyber crime radar with city internet security firms receiving cases of corporate data theft, email frauds and impersonations and mobile phone related crimes. Reported in Times of India

Covering Cyber Threats

Companies spent more than $6.3 million on data breaches in 2007
By Greg Bordonaro
As companies face a host of new risks associated with their digital data, insurers are scrambling to create a whole new field of coverage: cyber liability.
Costly and legally troublesome problems ranging from data breaches to infringement cases are on the rise, and 43 states, including Connecticut, have passed laws spelling out rules for companies that experience them. Reported in Hartford Business
Technorati Profile

Thursday, August 21, 2008

Cyber Law Update August 2008 - Issue no. 6

Cyber warfare is a military twilight zone

Before Georgia and Russia started shooting at each other, they were already fighting on the Internet. Georgian government and media websites had been almost paralysed by hackers following the so-called 'Distributed Denial of Service' attacks that began weeks before. Such cyber war techniques constitute an increasing threat, one that's now being taken seriously by the military. Reported in Radio Netherlands

Tracking a Cyber Attack

The conflict between Russia and the former Soviet Republic of Georgia has underscored the relative anonymity of cyberattackers. During the conflict, attacks were launched against Georgia’s Internet infrastructure, and a debate continues over who might be responsible.

With that debate likely to continue indefinitely, policy-makers are realizing that in cyberspace, ascribing blame might be nearly impossible.

Although the Russian government has denied involvement, it is still under suspicion, along with organized crime groups and garden-variety hackers. Reported in FCW

Malaysia Should Be Ready To Face Cyber Threats

SHAH ALAM, Aug 15 (Bernama) -- Malaysia, which appears safe from cyber attacks like those experienced in other parts of the world, should brace itself for such a threat.

Energy, Water and Communications Minister Datuk Shaziman Abu Mansor wants the country to prepare itself for the threat which could affect individuals, corporation and the government. Reported in Bernama

Black Ice: Cyber-terrorism and the Private Sector

Corporate America is still in denial about the threat of cyber-terrorist attacks against critical facilities in the energy, telecommunications and financial industries. Reported in Computer World

Terrorism cyber-recruiter jailed

LONDON (Reuters) - A man described by prosecutors as a terrorism "Mr Fix-it" who recruited young people to al Qaeda's ideology over the Internet, was jailed for 12 years on Tuesday while one of his accomplices received a 10 year term. Reported in Reuters

NCC Wants Checks on Cyber Criminals

The Nigerian Computer Society (NCS) has called on the Federal Government to pay particular attention to the devastating impact of cyber criminality and terrorism in the e-commerce and electronic fund transfer landscape. Reported in This Day Online

Microsoft, Google and Yahoo sued by the Indian Government

Microsoft, Google and Yahoo were issued notices by India's Supreme Court on Wednesday, following a complaint that they were promoting techniques and products for the selection of an unborn child's sex through advertising and links on their search engines. Posted on Blogging Madeeasy

Chandigarh police get hi-tech gadgets to combat cyber crime

Chandigarh, Aug 17 (IANS) A machine to recover deleted SMSes and another to scan through any suspected hard disk, these are among the latest gadgets acquired by the Chandigarh police to tackle cyber crime. Reported in Sindh Today

Start of school means kids need to be cyber-savvy
Tech group gives tips for back to school

WASHINGTON — Americans for Technology Leadership, a coalition of technology and consumer groups, recently launched its monthlong campaign to help educate parents on ways to make sure their kids stay safe online when they head back to school.

Children face an enormous number of possible roadblocks to their Internet safety, including cyber-bullying threats, cyber security issues such as spam, computer viruses, identity theft, spyware, phishing scams and Internet predators. Reported in Sea Coast Online

India figures in top 10 spammers' list

NEW DELHI: India figures among the top 10 spam sending countries, accounting for nearly 3% of spam sent globally in the second quarter of 2008, according to enterprise security firm Secure Computing’s Internet Threats report. Spam or unsolicited e-mails sent from emerging markets is expected to grow as internet infrastructure improves. Reported in Economic Times

Hackers too playing games at Olympics

NEW DELHI: Olympic buffs, beware! Internet hackers are trying their best to steal data from your system and corrupt it. Hackers send mails related to Olympic events with interesting subject lines and then trap surfers in their net. Internet users in India have been found more vulnerable as people are overenthusiastic over the prospect of getting two individual medals for the first time in the history of the games. Reported in Economic Times

Technorati Profile

Thursday, August 14, 2008

Cyber Law Update August 2008 - Issue no. 5

Pakistan intensifies Cyber War propaganda against India

Washington, Aug.11 (ANI): Pakistan is taking steps to intensify its cyber war propaganda against India with the help of its intelligence outfit, the Inter-Services Intelligence (ISI) by carrying reports of alleged communal fissures taking place on the Indian side of Kashmir.

Since the Amarnath land transfer controversy began, Pakistan Televisions (PTV) focus has been on the alleged human rights violations in Jammu and Kashmir.

On an average, PTV is beaming two hours of daily anti-India propaganda as compared to an hour a day that was the norm earlier. It is apparent that PTV is heavily focusing on promoting the communal divide between Hindu-dominant Jammu and the Muslim-dominant Kashmir Valley with the objective of pushing forward the two-nation theory.
The ISI is also setting up a TV channel in Bangladesh as a part of its war over airwaves in the region, says the US based Global Geopolitics Network. Reported in Thaindia

New cell phone connection may be required two guarantors

NEW DELHI, AUG 10 (PTI): In its efforts to check the use of mobile phones in terror activities, the Ministry of Home Affairs is likely to advice the Department of Telecommunication to direct all mobile phone operators to get two existing cellular customers as guarantors before issuing SIM card to new customers. Reported in Outlook India

Cyber Thugs March Through Georgia

August 13, 2008: Georgia is not just being invaded by Russian troops, it is also being hammered on the Internet, with the same Cyber War techniques Russia used against Estonia last year. Russia was accused of causing great financial harm to Estonia via Cyber War attacks, and Estonia wants this sort of thing declared terrorism, and dealt with. NATO agreed to discuss the issue, but never took any action against Russia. But as a result of that incident, NATO established a Cyber Defense Center in Estonia three months ago. Reported in Strategy Page

Britain under attack from cyber foreign security terrorists, report warns

"E-espionage" was identified by the Government as one of the two most likely risks facing the UK, the other being terror attacks on the transport network. Reported in MarketWatch

Feds crack largest U.S. identity theft

Federal authorities said yesterday that they had cracked the largest identity theft case in U.S. history, charging 11 people in the theft of more than 40 million credit and debit card account numbers from computer systems at major retailers such as T.J. Maxx and Barnes & Noble. Reported in Hindu

U.S. Warns Of Chinese Cyber-Spies

Overseas Travelers Warned That Personal Information Can Be Stolen; No Device Safe
(CBS) U.S. intelligence officials issued a strong warning Thursday that Americans traveling overseas, particularly visitors to the Olympics in China, face a serious risk of having sensitive information stolen, reports CBS News correspondent Bob Orr. Reported in CBS News

Cyber-security experts warn of Olympics spam

Singapore: Cyber-security experts warned Internet users of a deluge of viruses and spam during the Beijing Olympic Games, with those reading Chinese at a higher risk, news reports said Friday.
E-mail messages with headers such as "Beijing Olympics Cancelled" or "Beijing Olympics 2008 Lottery Promotion" should not be opened, the experts told The Straits Times. Reported in Bangkokpost

Beckstrom on cybersecurity

LAS VEGAS — Cybersecurity is hampered by a lack of understanding about the physics and economics of the networks we are trying to defend, according to Rod Beckstrom, director of the Homeland Security Department’s National Cyber Security Center, said Thursday at the Black Hat Briefings.

Risk management is a process of balancing security efforts against an acceptable level of risk because absolute security is not possible. But Beckstrom, speaking at the Black Hat Briefings yesterday, said we have no method for valuing our networks or measuring the effectiveness of our security. Reported in GCN

Google in a legal spot over blog post

MUMBAI: Google India, the domestic subsidiary of the high-profile Silicon Valley web search company, is facing defamation charges from a Mumbai-based firm, Gremach Infrastructure Equipments & Projects.

The company has filed a lawsuit against Google for hosting a series of articles on its blogging site, campaigning against its mines in Mozambique. In an interim order, the Bombay High Court has asked Google India to furnish information about the blogger. The case’s outcome will have far-reaching implications for the development of cyber law in India. Reported in Economic Times

Egypt demanding data from cyber cafés users: NGO

CAIRO (AFP) — An Egyptian NGO on Saturday accused the Egyptian authorities of forcing cyber cafés to gather personal information on Internet users, saying the measure was a violation of privacy.

"The Egyptian government imposed a new measure which increases the extent of censorship on Internet users and violates their right to privacy," the Arabic Network for Human Rights Information said in a statement. Reported in AFP.Google

Funcom employee axed over cyber-sex

Age of Conan developer Funcom have sacked a moderator this week, after the employee was caught engaging in online naughtiness. Reported in Play.TM

Ex-convict indicted in cyber stalking case against woman

A former Des Plaines man has been indicted by a Cook County grand jury on charges he sent threatening e-mails to a woman whom he allegedly has pursued since 2000, prosecutors said Friday. Reported in ChicagoTribune

Man held for cyber crime; sells ex as call girl on website

CHENNAI: The cyber crime cell of the Central Crime Branch picked up a database manager of a private firm for posting a girl's photograph and mobile number on a networking site and describing her as a call girl available for service. Reported in Time of India

Cyber crime on rise; public warned on posting pics

CHENNAI: Do you share photographs with friends on social networking sites? Then beware, for chances are high that your morphed picture, obscene of course, will be doing the rounds in cyberspace. Worse, your cell will never stop ringing with calls from strangers who want sexual favours. Reported in Times of India

The Cyber Highway to Dubai

While Dubai is undergoing significant growth and business expansion, its Internet sophistication remains behind the curve, writes branding expert Naseem Javed. Companies in Dubai must harness the power of online resources to maximize their potential, he writes. Reported in E-commerce Times

Friday, August 8, 2008

Cyber Law Update August 2008 - Issue no. 4

India

Tech-savvy cyber crooks could steal your Net identity
Technology exists to prove a malicious e-mail did not originate from your PC

When several television channels received e-mails last week claiming credit for the bomb blasts in Ahmedabad on behalf of an outfit that called itself the Indian Mujahideen, the police traced the mail through an IP, or Internet Protocol, address to the e-mail account of a Navi Mumbai resident. Many of the same channels wasted no time to flash headlines that suggested that an American national was somehow involved in the “terror mail.” Reported in Hindu

Use of e-mails for cyber-crimes and terrorism

The technical aspects of cyber-law are a headache for the law enforcement agencies and judicial system in India. Very few law enforcement officers, public prosecutors and judges are aware about the technical aspects of ICT and its uses and abuses. Reported in MeriNews

Terror mail: BMC to take precaution for its WiFi project

The Ahmedabad terror e-mail, which was sent by hacking into the Internet Protocol address of a US national living in Navi Mumbai, has prompted the Brihanmumbai Municipal Corporation to take precautionary measures before it launches its ambitious WiFi project next year. The police cyber crime cell has also asked the civic body to take help from its experts and adequate measures before launching the project. Reported in Express India

Cyber cafe owner taken in police custody

A local court today remanded a cyber cafe owner in 14 days police custody for creating city-wide panic by sending an e-mail threatening bomb explosions.Kaushik Basu, the cyber cafe owner and a resident of Salt Lake, was arrested last night and charged with waging war against the country, threat to cause death or grievous hurt and criminal intimidation by anonymous communication which, according to the police, is serious offence. Reported in SaharaSamay

Police plans to check cyber cafes turning terror hubs

HYDERABAD: As terrorists are going hi-tech and giving advance information about their strike plan using the Internet, the Hyderabad police are seriously planning to formulate rules and regulations for cyber cafes. Reported in Times of India

Delhi Police gets first batch of cyber experts

Cyber crime increasing at the rate of 100% annuallyNew Delhi: With a whopping 100 per cent increase in cyber crimes annually, the Cyber Cell of Delhi Police will require more trained personnel to fight white collar crimes. In a first-of-its-kind effort, the first batch of 100 investigating officers of Delhi Police and two officers of Central Bureau of Investigation (CBI) were handed certificates in ‘Cyber Crime Investigation and Computer Forensics’ on Tuesday. Reported in MSN

International

Beijing Braces for Olympic Cyber-War

With the world’s eyes firmly focused on Beijing, officials and IT staff are bracing themselves for a flood of cyber-attacks … Reported in Byteandswitch

Max24.pl becomes the latest victim of cyber crime

A large Polish Internet store lost over zł.1 million in three days due to a hacker attack, and according to estimates, the European economy is losing euro 65 billion annually due to cyber-crime. Reported in WBJ
Source: Gazeta Wyborcza

International phishing gang busted

US authorities have charged 38 members of an international criminal gang that allegedly used spam e-mails to steal bank account details and passwords from thousands of customers. Reported in FINEXTRA

IBM X-Force Report: Cyber Threats Accelerate, Browser Vulnerabilities Proliferate in First Half of 2008

Mid-Year Report From IBM Internet Security Systems X-Force(R) Finds 94 Percent of Browser-Related Exploits Occurred Within 24 Hours of Vulnerability Disclosure. Published in CNN

US Senate polishes new teeth for cyber cops

The US Senate has passed a bill to strengthen the hands of federal prosecutors who fight computer crime by removing some of the more common hurdles in prosecuting online miscreants. Reported in the Register

New Guidelines Aim to Reduce Fraud

US: New guidelines for fighting fraud have been released jointly by three leading professional organizations. “Managing the Business Risk of Fraud: A Practical Guide” is sponsored by the Association of Certified Fraud Examiners (ACFE), the American Institute of Certified Public Accountants (AICPA), and The Institute of Internal Auditors (IIA). Principles for establishing effective fraud risk management, regardless of the type or size of an organization, are outlined in the guide.

“Managing the Business Risk of Fraud: A Practical Guide” can be downloaded for free from the sponsoring organizations’ Web sites at http://www.acfe.com/, http//www.aicpa.org/, and http://www.theiia.org/.

U.S. government cyber-security worse than previously thought

The latest report from ZATZ Publishing highlights a surprising lack of government record-keeping oversight, along with critical cyber-security gaps that without proper records management, America won't have critical records of the operation of their government. Reported in EchannlLine

Cyber-bully advice

In her new book 101 Facts about Bullying: What Everyone Should Know, author Meline Kevorkian offers suggestions for overcoming cyber-bullying. For tips for parents and kid read an article Published in Miami Herald

Saturday, July 26, 2008

Cyber Law Update July 2008 - Issue no. 3

San Francisco cyber attack a wake up call for Canadian IT managers
US: A disgruntled network administrator who locked up the multi-million dollar computer system for the city of San Francisco is now behind bars. But Canadian tech experts warn a cyber terrorist could do the same thing this side of the border if we don't take precautions.


A cyber attack that virtually hijacked the controls of more than 60 per cent of San Francisco's municipal network should serve as a wake up call for IT managers in Canadian government jurisdictions, say technology experts.


He was arrested for allegedly changing passwords to San Francisco's computer system and effectively "locking up" the city's multi-million dollar fibre WAN (wide area network) system that handles sensitive data, critical IT operations, and much of the municipality's network traffic. Reported in ITBusiness.ca

Once Henry Ford remarks “Failure is the opportunity to begin again more intelligently.” Why to wait for failure. Act now proactively for better tomorrow as suggested by Chanakya, Indian Politician, strategist and writer, 350-275 BC, “As soon as the fear (say fear of failure) approaches near, attack and destroy it.”

Lithuanian tax office website hit by cyber attack
US: Lithuania said it suffered another foreign cyber attack over the weekend when the state tax office's website was swamped with requests, but no damage was sustained. Reported in Guardian

Even website of Indian Income Tax needs to plug few vulnerablities as mentioned in my comments on “Are your online tax returns safe?” by Ashwin Mohan of CNBC-TV 18.

SMBs in denial about cyber crime: McAfee
McAfee discovered that a third (32 percent) of North America's small- and medium-sized businesses (SMBs) have been attacked more than four times by cybercriminals in the last three years. The impact was that a quarter of those attacked (26 percent) took an entire week to recover. Canadian businesses were most affected with a third (36 percent) taking a week to recover.


"SMBs are truly exposed to the same cyber threats as their enterprise counterparts," said Darrell Rodenbaugh, senior vice-president of the mid-market segment at McAfee. "In fact there are some experts that would say they are greater targets because it is popularly known [SMBs] don't have the same protection in place that their enterprise counterparts do."


He added the reality is IT managers in SMBs face a paradox. They understand that are at risk but they are faced with limited resources and a lack of time. Reported in eChannelLine

Cyber thieves can easily take advantage
US:
More than 75% of bank websites were flawed and could expose customers to cyber thieves eyeing their money or their identity, according to a survey by the University of Michigan. Reported in EconomicTimes. Similar article on FRAUD ALERT: Cyber-bank robbers hit online accounts published in CourierPostOnline

Cyber crime looms large over Middle East netizens

Dubai: Internet users in the Middle East are under increasing threat from cyber crimes, prompting large spending on web security, WAM reported Thursday quoting experts.


Web threats peaked in March to 50 million incidents of hacking from approximately 15 million in December 2007, a study by Internet security firm Trend Micro said.


Source: Indo-Asian News Service Reported in Computing

Man gets 41 years in prison for cyber fraud
Pak:
A court has sentenced a man to 41-year prison term for credit card fraud, the first time a person convicted for cyber crimes has been punished so severely in Pakistan. Reported in Time of India

Cyber relationships aren't 'harmless fun'
US: Cyber relationship are "harmless fun" but harmless and commonly leads to serious relationship problems.

It is actually dealing with a problem of an emotional cyber-affair. In these cases the spouse has found someone on the Internet with whom he or she has formed an emotional connection. Such a connection outside the marriage is always wrong and detrimental to that primary relationship. These "cyber-affairs" have become a source of marital problems and often lead to divorce. Reported in MyWestTexas

Teen Claims She Was Bullied In School & Online
US: A South Florida teenager has filed a lawsuit against her private, all-girls school in Miami after she became the victim of an alleged vicious bullying campaign that spread from the classroom to online social networks. Reported in CBS4


Parents must act now to control cyber culture among children

Kenya:The pendulum of opinion on the impact of computers and the Internet on children will always swing. Is the technology good or bad for our kids?

Should the State control access or should it be left to parental guidance and “filter” software? Reported in NationalMedia

Strict action to be taken against fake mobile SMS and petrol smuggling
Pak: FIA Cyber crime cell will take strict action against the elements involved in spreading the fake information through Mobile SMS regarding the down fall trend in Stalk Exchange. Such activity would be consider as cyber crime. Reported in OnlineNews.com

Cyber Defamation
Korea: Justice Minister Kim Kyung-han's plan to introduce a ``Cyber Defamation Law'' has sparked controversy over how to guarantee freedom of expression on the Internet. The plan is part of a series of government measures to crack down on distributors of fraudulent and slanderous information in cyberspace. Reported in KoreaTimes

Cyber cafes asked to maintain record of customers
India: In a bid to track cyber crimes, the District Magistrate ordered cyber cafes and mobile phone shops to maintain records of their customers. Reported in SaharaSamay