|
Thursday, September 5, 2002 |
Gut vier Monate nach den Hausdurchsuchungen bei zwei M...nnern, die mit manipulierten 0190-Dialern hunderte Internetsurfer betrogen haben sollen, ist noch immer kein Abschluss der Ermittlungen absehbar. "Wir stecken noch mitten in der Arbeit", erkl...rte heute ein Sprecher der federf[florin]hrenden Staatsanwaltschaft in Weiden/Oberpfalz gegen[florin]ber Dialerschutz.de. Auch sei es m[ring]glich, dass das Verfahren nach Chemnitz abgegeben werde, wo eine Schwerpunkt-Staatsanwaltschaft f[florin]r Datennetz-Kriminalit...t existiert. "Das wird sich aber erst in den n...chsten Wochen ergeben."
Die Betrugswelle hatte Anfang des Jahres hunderten Internetsurfern in ganz Deutschland Telefonrechnungen mit horrenden 0190-Geb[florin]hren beschert. Rechnungssteller und Betreiber der Nummer war in allen F...llen der Hamburger Carrier Hansenet. Als sich herausstellte, dass die Geb[florin]hren durch offenbar manipulierte 300-Euro-Dialer der Eops AG verursacht worden waren, schaltete sich das bayerische Landeskriminalamt ein. Zwei M...nner aus der N...he von Weiden und aus Potsdam gerieten unter den Verdacht, f[florin]r die manipulierten Einw...hlprogramme verantwortlich zu sein. Mitte Mai lie§ die "Ermittlungsgruppe Dialer" des bayerischen LKA f[florin]nf Wohnungen und B[florin]ros im Bundesgebiet durchsuchen und stellte diverse Beweismittel sicher (Dialerschutz.de berichtete exklusiv).
Dass sich die Ermittlungen nun schon so lange hinziehen, liegt nach Angaben der Staatsanwaltschaft Weiden an der Vielzahl der Betroffenen. Alleine beim bayerischen Landeskriminalamt l...gen mittlerweile 80 Strafanzeigen von Opfern vor. "Wir wollen die ganzen Ermittlungsverfahren, die an verschiedenen Orten gef[florin]hrt werden, zu einem Sammelverfahren zusammenf[florin]hren", so der zust...ndige Staatsanwalt. Dieser Vorgang sei in den kommenden Wochen abgeschlossen. Dann werde entschieden, bei welcher Ermittlungsbeh[ring]rde, also Weiden oder Chemnitz, das Verfahren zum Abschluss gebracht wird. Unklar sei bislang auch noch, ob neben dem urspr[florin]nglichen Vorwurf des Computerbetruges auch der Tatbestand des Betruges erf[florin]llt ist. Die beiden Tatverd...chtigen haben sich den Angaben zufolge noch nicht zu den Vorw[florin]rfen ge...u§ert. Ihre Anw...lte h...tten aber bereits angek[florin]ndigt, Erkl...rungen abzugeben, sobald sie Akteneinsicht bekommen haben.
Die Eops AG hatte nach dem Bekanntwerden des Ermittlungsverfahrens angek[florin]ndigt, die Eintreibung der noch ausstehenden Rechnungen selbst zu [florin]bernehmen. Gesch...digte der mutma§lichen Betr[florin]gereien w[florin]rden m[ring]glicherweise gezahlte Gelder zur[florin]ckerhalten. ãEtwaige Zahlungsanspr[florin]che von Endkunden werden wir unmittelbar von hier aus verhandeln und regulierenä, hie§ es in Schreiben, die damals an Betroffene versendet wurden. Passiert ist seitdem in den meisten F...llen nichts mehr. Auch wer f[florin]r die Kosten der Betroffenen aufkommt, die oftmals zahlreiche Briefwechsel oder Anwaltskosten zu bezahlen hatten, ist noch ungekl...rt.
21:10
#
G!
Translate
| |
Der Autor untersucht bekannte, bereits entschiedene Domain-Grabbing-Fälle daraufhin, wie die Rechtsprechung die in diesen Fällen üblichen Hinweise bewertet hat, dass sich ein bestimmtes - an sich erwartetes - Angebot nicht auf der Website befindet. [JurPC - Internet Zeitschrift f[florin]r Rechtsinformatik]
19:50
#
G!
| |
DefCon delegate demonstrates copyright-breaking tech -
Hackers are skating close to the edge of the law in protest over legislation such as the Digital Millennium Copyright Act (DMCA), which they claim is eroding their rights to make "fair use" copies of media.
Two weeks ago at the O'Reilly conference, open source expert Bruce Perens had his attempts to break the DMCA live on stage thwarted by employer Hewlett Packard (HP). But this did not stop a similar attempt by another hacker at the DefCon conference last week.
On Saturday afternoon, speaking at the legendary DefCon hacker conference in Las Vegas, Adam Bresson, owner of a network consultancy, gave a presentation on the identification and bypassing of common media protection systems.
His family were in the audience as his witnesses, and his talk was videotaped in case anyone pulled him up for breaking the DMCA
[vnunet Hacking]
15:52
#
G!
| |
UK - Sentencing guidelines for child pornography. (Guardian)
The Sentencing Advisory Panel has published a new "league table" of five classes of child porn offences, to help judges give appropriate sentences to paedophiles. The panel rejected significant toughening of punishments for child porn perverts, and said the 10-year maximum jail term should be reserved for "very serious examples". It also rejected the view - expressed by some who responded to a consultation exercise earlier this year - that offenders who view or collect child porn should always go to jail. The new sentencing system features a five-point sliding scale ranging from "nude or erotic posing" in level one to images of sadism or bestiality in level five. see UK - Offences Involving Child Pornography (Sentencing Advisory Panel) Advice to Court of Appeal. see also Child porn sentencing guide provokes concern (Guardian) and The Children's Charities' Coalition for Internet Safety (CHIS) Open letter to the Lord Chief Justice of England about sentencing in child pornography cases. [Quick Links Computercrime Cybercrime]
15:46
#
G!
| |
Montreux, Switzerland:
The Third FIAM Summit will tackle head on the thorny and complex issues
surrounding the Digital Divide, including, among others, Internet and
multimedia content development, ICT infrastructure in developing countries,
Internet governance, universal access to ICT, digital literacy and training,
and scientific and technological research. The Summit will attempt to
examine concrete public and private sector ICT efforts and initiatives
underway in different parts of the world. [Saver Internt - Events]
15:12
#
G!
| |
Angus Deayton phone tapper could be BT engineer
A 34 year-old Hertfordshire man has been arrested over allegations that he hacked into the phone line of television presenter Angus Deayton. The man is thought to be a BT engineer.
A number of recording devices were found in a junction box near the north London home which Deayton shares with Lise Meyer and their 18 month-old son.
The recorders were hooked up to Deayton's phone line and were thought to have been in place since the News of the World published its 'TV Deayton's drugs romp with vice girl' story.
[vnunet Hacking]
15:09
#
G!
| |
Copenhagen:
This year's IST event will focus on networking and will broaden its
scope to all European Information Society research, whether it be funded
at European, national or regional level - or even entirely within the
private sector. Participants will play a major role in defining the
event's content through an upcoming Call for Ideas. [Saver Internt - Events]
15:07
#
G!
| |
The Oxford Internet Institute is holding a conference to serve as a
neutral forum for academics, policymakers, corporate parties and citizens/consumers
to discuss the current state of Internet research and policy. There
will also be a choice of four parallel panels discussing different topics.
These will include subjects such as 'The State of Broadband' and 'Education
and the Net.' [Saver Internt - Events]
15:06
#
G!
| |
[ Trojaner-Info]: "Der 190er-Dialer Warner YAW liegt nun in Version 3.5 vor.
Seine Aufgabe besteht darin, den Internetnutzer vor sogenannten Mehrwertdialern zu sch[florin]tzen. Dahinter verbergen sich Programme, die einen Zugang zu bestimmten Internetinhalten [florin]ber eine Mehrwertverbindung (0190, 0900 usw.) anw...hlen. Das T[florin]ckische an diesen Dialern ist, dass sie sich mitunter g...nzlich unsichtbar im System einnisten und selbstst...ndig Mehrwertverbindungen w...hlen k[ring]nnen, so dass mitunter mehrere hundert Euro an Verbindungsendgelder verlangt werden. YAW erkennt solche Mehrwertdialer und hilft, sich effektiv vor ihnen zu sch[florin]tzen, bereits installierte Dialer auf dem eigenen System zu finden und zu vernichten sowie unbeabsichtigte Einwahlen und somit horrende Telefongeb[florin]hren zu vermeiden."
14:46
#
G!
| |
Dirty Laundry, Online for All to See. By posting court records on the Internet, the county clerk in Cincinnati is raising a Pandora's box of privacy issues. [New York Times: Technology]
14:43
#
G!
| |
|
Screen Capture has also been improved big
time in Jaguar. When you use the interactive version (command-shift-4),
the space bar will toggle between the regular marquee selection mode and
a new mode to capture just a single window, the Dock or the menu bar.
The cursor changes to a camera icon when you are in this new mode and
as you mouse over different areas of the screen the screen capture target
is highlighted for you.
And of course, there's more... Screen captures can be triggered from
the command line (and therefore AppleScript, perl, etc.) using the new
screencapture command found
in /usr/sbin/
usage: screencapture
[-icmwsWx] [file] [cursor]
-i
capture screen interactively, by selection or window
control key - causes screen shot to go to clipboard
space key - toggle between mouse selection and
window selection modes
escape key - cancels interactive screen shot
-c force screen capture to go to the clipboard
-m only capture the main monitor, undefined if -i is
set
-w only allow window selection mode
-s only allow mouse selection mode
-W start interaction in window selection mode
-x do not play sounds
file where to save the screen capture
|
[Ken Bereskin's Radio Weblog]
14:24
#
| |
A former BT engineer claims that phone hacking is a "disease" within BT and that the telco is failing to protect its customers from premium rate phone scams.
Whistlebower Bob Godsiff was featured earlier this week on a Meridian TV show Cheatlines, in which he claimed that BT was ignoring the growing problem of phone hacking.
He claimed BT's phone network was "easily accessible" for anyone with "basic electrical knowledge". And in a worrying revelation, he alleged that most of the calls - which are made to premium rate phone lines with the cost appearing on unsuspecting customers' bills - are made by BT engineers or contractors.
[The Register]
14:14
#
G!
| |
Adobe klagt laut einer eigenen Pressemitteilung in den USA gegen die International Typeface Corporation (ITC) und hat gleichzeitig in London ein Schlichtungsverfahren gegen Agfa Monotype Fonts eingeleitet. [intern.de]
13:00
#
G!
| |
The Secure Socket Layer is the protocol that gives e-commerce the confidence it needs to allow on-line banking and shopping. This is a paper discussiong the theory and practice of SSL. [Help Net Security - News]
12:57
#
G!
| |
Panhandlers hit the Web to raise money for their personal causes -- like paying off credit cards, leaving a spouse or making a movie. Unbelievably, it's working. By Amit Asaravala. [Wired News]
12:56
#
G!
| |
A new Greek law, intended to ban gambling, prohibits all forms of electronic and computer games. There are vague reports that prosecutions have already occurred, and a test case is due to take place next week. [ed: this is a few days old, I'd been searching for a more detailed report than the one at The Register ]
[ update : netcafe.gr has posted an English translation of the legislation ]
Law Number 3037, enacted at the end of July, explicitly forbids electronic... [bplog]
12:54
#
G!
| |
AP reports on the escalating arms race between internet censors and anti-censorship services. But lately, governments in such countries as Vietnam, China and Saudi Arabia have gotten smarter about blocking those proxies as well. And that's forcing technologists to devise new ways of evading the censors. "It's like a game," said Pham Ngoc, a Vietnamese expatriate who operates the Thong Luan site from San Jose, California. "If they discover this is a new... [bplog]
12:54
#
G!
| |
The FBI has responded to an earlier order (also here ) to explain why it was unable to uncover information about Zacarias Moussaoui's Hotmail email account. The explanation is a little confused - why does the "account user's identity" need to be verified in order to locate records about an email address?
[update : The full response answers my question: the FBI says it didn't learn the email address until July; until that point, the only way to... [bplog]
12:53
#
G!
| |
The Denver police spy files have been opened to the public - after some old-fashioned black marker censorship, of course. AP doesn't say what happened to the 22 files that the federal government contested . About 200 people crowded the lobby of Police Department headquarters Tuesday after officials opened 3,200 "spy files" on local activists and organizations. [...] Many who waited for up to an hour to see their file received papers that still smelled of... [bplog]
12:52
#
G!
| |
e-Cop.net Surveillance said that there has been a surge in cyber-attacks originating from Malaysia over the last quarter. According to data compiled by its regional Global Command Cent... [Security News Portal]
12:47
#
G!
| |
Companies are leaving themselves exposed to hackers because of a lack of awareness of the 'social engineering' techniques deployed by the most dangerous attackers, according to former hacker Kevin Mitnick [Security News Portal]
12:46
#
G!
| |
Da wandert man durchs 'Welten Weite Weben' auf der Suche nach Computerkriminalit...t und wo findet man sie? An der Eigenen Universit...t! Dr. R[florin]ther hat unter http://www.cyber-crime.info/ eine Recht umfangreiche Sammlung zur Computerkriminalit...t aufgebaut.
11:51
#
G!
Translate
| |
This manual is designed to combine an updated version of the Guidelinesâ advice on searching and seizing computers with guidance on the statutes that govern obtaining electronic evidence in cases involving computer networks and the Internet.
0:26
#
G!
| |
Maximillian Dornseif, 2002.
|
|
|