Internet Security Systems Moves to Parry Drive-by Hackers
Atlanta-based Internet Security Systems Inc. (ISS) has long had this concern about
drive by hackers. That's right -- drive-by hackers.
Consumer Groups Rally to Decry Spam Before Senate Meeting
Several consumer groups who have written Congress to ask the body to quash spam will air an audio conference before the Senate meets Thursday to discuss bills addressing the unsolicited e-mail dilemma.
A letter written by JunkBusters.com President Chief Executive Officer Jason Catlett outlined the concerns of the groups and provided some interesting scenarios of how they would like to see bills currently before the Senate Commerce Committee's Communications Subcommittee, dubbed S. 630 and H.R. 718, altered to create an opt-in policy and a private right of action.
Microsoft Sued Over Digital Rights Patent
Long a proponent and activist in the digital rights management and antipiracy
movement, Microsoft finds itself sued by a newcomer to the field.
Microsoft Gives A Virus to its Support Customers
Despite the best possible security precautions, Microsoft was hit by a
virus that contaminated one of its Web servers.
Microsoft Says IIS 5.0 Web Servers Vulnerable to Attack
The software giant revealed that a serious security flaw exists within
Windows 2000 Server which makes machines running the software
vulnerable to remote attackers.
Government Warns of Possible Chinese Hacker Attacks
The National Infrastructure Protection Center warned that Chinese
hackers may escalate defacement and denial-of-service attacks between
April 30 and May 7.
Zone Labs Upgrades Security Software
Those who have come to rely on Windows need to rely on security for the ubiquitous
OS as well; Zone Labs hopes to provide it with revamped applications.
Pop-up Internet Ads: More Eyeballs -- and More Frowns
New How People Use™ study sheds light on do's, don'ts of Web marketing
Westfield, New Jersey, May 3, 2001: How People Use ™ the Internet 2001 -- a new report from
Statistical Research, Inc. (SRI) -- shows that pop-up Internet advertisements are 50% more likely to be noticed than banner ads, but also that they are 100% more likely to be considered intrusive.
Nearly half (49%) of active Internet users "agreed strongly" that pop-up ads get noticed (versus 33% for banner ads); but 62% felt strongly that pop-ups interfere with their reading or use of a Web page (compared to 31% for banners).
Worm Turns Sun Against Microsoft
Sun and Microsoft may compete bitterly in the Internet server marketplace, but to eradicate a new and rapidly spreading malicious worm, Sun Solaris and Microsoft IIS administrators will have to cooperate closely, security experts said Tuesday.
Hackers Deface Web Sites; FBI Issues DDoS Warning
Web page defacement attacks by hackers have escalated dramatically in the last 24 hours, with technology news site CNET, Webex and game developer Blizzard.com among those hit this
Security Expert's Site Knocked Offline By Attack
Victims of distributed denial-of-service attacks are usually reluctant to admit they've been hit, let alone provide specific technical details about the attacks. But Gibson Research Corporation president Steve Gibson said Monday that he intends to turn some weekend lemons into lemonade.
Home Page Virus
Another e-mail virus is taking the industry by storm. This one, called Homepage,
is patterned after the Kournikova worm that hit a few months ago.
The e-mail spreading the worm says that it has a link to a website guaranteed
to become the next Internet craze. The subject line is "Homepage" and the
message is "Hi! You've got to see this page. It's really cool ;o)."
Password Glitch Exposes DSL Subscribers
Cayman Systems confirmed Wednesday that a potentially serious security vulnerability exists in the DSL equipment it supplies to many leading providers, including SBC Communication's numerous subsidiaries such as Pacific Bell and Southwestern Bell, as well as to Verizon and Nortel Networks.
NIPC Gets Failing Grade in Warning of Hacker Attacks
Congress' investigative arm, the General Accounting Office (GAO), has given the Federal Bureau of Investigation's National Infrastructure Protection Center (NIPC) a failing grade when it comes to issuing warnings about electronic attacks.
Researchers Say DoS Attacks Average 4,000 a Week
[Johannesburg, SOUTH AFRICA] Research conducted by the University of California at San
Diego has revealed that more than 4,000 denial-of-service attacks are launched every week.
By 'listening' to a large segment of the Internet -- known as an A-class network, UCSD researchers were able to discern traces of "scattered responses," typical indicators of DoS attacks. During three weeks of observation the team discerned an average of 4,000 attacks per week -- half of which lasted less than 10 minutes.
Denial-of-service attacks are attempts to overload or crash computers connected to the Internet by targeting them with so much data that they can no longer process legitimate requests. According to UCSD, most DoS attacks go unreported whilst only a small percentage make the media.
24 May 2001 Max Butler Jail Sentence
Max Butler - hacker and former FBI informant - has been sentenced to
18 months in prison for unleashing a worm in military and defense
computer networks three years ago. The worm had a benevolent intent -
it was designed to fix a vulnerability another worm was exploiting -
but it also left a backdoor in infected systems. Other hackers and
crackers have expressed concern that the government's treatment of Mr.
Butler might discourage others from aiding security efforts.
23 & 24 May 2001 CERT/CC Hit by DDoS Attack
The Computer Emergency Response Team Coordination Center (CERT/CC) web
site was the victim of a distributed denial of service (DDoS) attack.
The cyber assault lasted about 30 hours, and no data were compromised.
CERT/CC said it would still be able to issue security alerts if
necessary. One computer expert pointed out that the attack highlights
the risks inherent in centralizing computer alert teams.
25 May 2001 Shopping Cart Software Flaw Exposes Health Site Customer Information
A flaw in PDG shopping cart software exposed the names, addresses, e-
mail addresses and phone numbers of people who obtained free drug and
alcohol addiction pamphlets from Health.org. Although NIPC issued a
warning about the software problem in early April and the software
company has attempted to contact all of its customers, the technical
department director at the company that maintains the site for the
Department of Health and Human Services said he never received a
(Note: Hopefully, consumers are beginning to realize that even if they have end-to-end encryption of their data, it is not sufficient if the ends are not secure. ]
25 May 2001 Cyber Disaster Drills
Computer disaster drills are on the rise due to the increase in cyber
attacks and viruses, the threat of power outages, and the fact that
more and more data are being stored on networks that can be reached
from the Internet. The drills help workers identify security holes,
recognize security problems, and maintain their data recovery skills.
25 May 2001 Media Player Patch
Microsoft has issued a fix for two vulnerabilities in Media Player 6.4
and 7. A buffer overrun could allow a cracker to run hostile code on
someone else's machine. Another flaw that saves Internet shortcuts to
a temporary files folder could be exploited, with the help of HTML
code, to allow crackers to read files on the affected machine. Media
Player 6.4 users need to install the patch, while Media Player 7 users
should install Media Player 7.1 to fix the problems.
25 May 2001 Worm Aims to Combat Child Pornography
The Noped worm searches infected computers for certain image files
names and alerts government agencies if any are found. Noped uses
keyword and phrase identification rather than content analysis, which
could result in a large number of false alerts.
(Note: The ends do not justify the means. At the least it is rude, a privacy issue,
and may be criminal to attempt to run your code on another's machine
without their knowledge and consent. There is no motive so noble as
to justify this behavior. And if were allowed where (at what criminal behavior) would
it end? Software piracy, tax evasion ...)
24 May 2001 Trojans are Stealthy, Damaging and Tenacious
Trojan horse programs can be used by malicious hackers to spy on and
stalk people, manipulate data and computers, steal money from bank
accounts, and launch denial of service attacks. Trojans often slip
into a computer while hidden in screensavers, games, e-mail messages
or web pages, and they can be hard to detect and remove. The best
methods may be reverting to a clean back-up or re-installing clean
copies of software.
(Note: This is not news. It is included because it offers useful security awareness education material.)
23 May 2001 Social Security Numbers and Identity Theft
Social security numbers can be purchased on line and used to steal
people's identities and fraudulently obtain credit. Legislation has
been introduced which, if passed, would restrict requests for social
security numbers as identifiers and would ban their sale and display
on public documents. One legislator wants the government to issue all
citizens new social security numbers that will be kept secret.
22 & 23 May 2001 GAO Report on NIPC
A General Accounting Office (GAO) report says that the National
Infrastructure Protection Center (NIPC) lacks sufficient staffing and
fails to alert the public to virus threats in a timely manner. The
National Security Council wrote a letter to the GAO suggesting that
NIPC's responsibilities be distributed among several agencies. The
report does say that NIPC has helped cyber crime investigations.
22 & 23 May 2001 NSF Information Security Scholarships
The National Science Foundation's (NSF) Scholarship for Service
program will provide two years of tuition assistance and a paid summer
internship to students who agree to work for the government for two
years in information security and assurance positions. The NSF plans
to announce additional grants for faculty instruction development in
21 May 2001 The Security Manager's Journal: Testing Intrusionb Detection Systems
Security manager describes how he tested his network-based intrusion
detection system (IDS). Using a variety of attacks in a closed,
controlled environment, he gradually increased network traffic to find
out at what level the system began dropping packets.
21 May 2001 Invicta Takes New Approach to Security
A former CIA director and a former KGB agent have released Invicta, a
new security system that continuously changes network IP addresses,
thereby creating "moving targets" for crackers. One insurance company
is so convinced of Invicta's effectiveness that it plans to offer 10%
discounts to companies that use the product.
15 May 2001 Las Vegas Phone Crackers
Some purveyors of adult entertainment and bail bonds in Las Vegas are
convinced their phones are being hacked and their calls diverted to
competing businesses. Testing showed no irregularities, but a
convicted computer criminal says the Las Vegas network has security
holes that could allow such a scheme to work.
16, 17, & 18 May 2001 Cheese Worm Tries to Repair Lion Damage
The Cheese worm attempts to repair damage caused by the Lion worm.
While the Cheese worm may have good intentions, it nonetheless is an
intrusion, and could easily be tweaked to become malicious.
17 May 2001 Site Never Got Shopping Cart Software Flaw Notice
When a serious security vulnerability was found in PDG shopping cart
software last month, the company e-mailed all its customers informing
them of the problem and also issued a fix. A company that bought the
software from a reseller never received the warning, and many of its
customers have experienced the fraudulent charges made to their credit
(Note: This story raises a fundamental issue that may
ultimately lead to legislation. To what extent must software vendors
be held liable for verifiable notice and correction of critical
security vulnerabilities. Is a software package that puts patients at
risk in a hospital so different from a crib that puts children at risk
in their bedrooms? Why is the software industry allowed to deliver
provably unsafe systems when automobile manufacturers are not allowed
to deliver cars that are unsafe?)
14 May 2001 Testing Security
[email protected] Partner Technology editor David Raikow maintains that
conscientious testing is the best way to strengthen application and
operating system security. While so-called "hacker challenges" may
provide helpful ancillary tests, they are often little more than
15 & 16 May 2001 Microsoft Will Sign Safe Harbor Agreement
Microsoft has announced it will sign the US/EU safe harbor agreement
that requires adherence to strict data privacy standards. This is
especially significant because a large number of other US companies
have not signed the agreement.
22 May 2001 National Infrastructure Protection Center Criticized
Citing understaffing and lack of support, The US General Accounting
Office told Congress that the NIPC often fails to give timely warning
of attacks. Despite the problems, the GAO said some alerts had been
issued in time to avert damage.
18 May 2001 e-Commerce Security Problems
While the absence of privacy or security policies* should give online
shoppers pause, even sites that do post security policies can have
weaknesses. While data may be encrypted during transfer, sites may
not always store the data as securely. Additionally, third-party
contractors may be vulnerable to data theft. (*Me)
17 May 2001 Mawanella Worm
The Mawanella worm, which arrives as a .vbs attachment, displays a
political message after propagating itself via Outlook but does not
carry a destructive payload. The message will appear on infected
Windows 9X, NT, and 2000 machines even if they are not running
16 & 17 May 2001 Love Bug Variant Tries to Attract Echelon's Attention
The comments in the code of VBS/LoveLet-CL, a variant of the Love Bug
worm, are comprised of a string of terms apparently designed to alert
and overwhelm electronic communication monitoring software systems.
The journalist at The Register points out that the random
conglomeration of words probably would not trigger Echelon's
surveillance methods. The worm also overwrites certain files and can
replicate via Internet Relay Chat (IRC).
16 May 2001 Cracker Path Traced Through German University Computer
The crackers who stole US Navy satellite control software apparently
took control of a German University computer to commit the theft,
according to law enforcement and university officials.
16 May 2001 UK Conservative Party Web Vulnerabilities Exposed
A cracker's scan of the UK Conservative Party web site turned up a
number of vulnerabilities that revealed security patches had not been
applied for more than a year. The information was posted to a Usenet
forum and on the cracker's home page.
(Note: Bill Arbaugh's informative paper documents how most security
incidents resulted from exploiting known and un-patched security
15 May 2001 Worm Poses as Virus Warning
The [email protected] worm arrives in the guise of a virus alert from
Symantec. The worm, launched when users open a .vbs attachment,
changes the default web page to a phony virus information page,
propagates via Outlook, alters registry files, and displays a message
on November 24.
14 & 15 May 2001 Windows XP Build Downloaded
Due to a leaked tester logon, a small number of people were able to
download an interim build of Windows XP. Microsoft said the site
controls limit the number of downloads from one logon, and the
software can be used only for two weeks before it needs to be renewed
13 May 2001 Suspension for Hacking Has Tragic Results
A New Jersey teenager, suspended for hacking into his school
district's computer system, committed suicide, apparently believing he
would have gone to jail as punishment for his actions.
11 May 2001 Teen Charged with Hacking Emergency Radio System
A teenager who allegedly hacked into the Denver police emergency radio
system, concocted false emergencies, and interfered with real calls
has been charged with wire tapping, eavesdropping, and telecommunications fraud.
10 May 2001 Gateway Customer Information Exposed
A routine request on Gateway's UK site yielded an Excel spreadsheet
containing detailed information about the accounts of 449 customers.
Gateway has evidently disabled the search function that exposed the data.
11 May 2001 New Types of DDOoS Attacks Uncovered
Three new types of denial of service attacks are described by analysts
who monitored the Internet2 network for six months.
8 May 2001 DDoS Attacks Target Real and Phony White House Sites
www.Whitehouse.org, a presidential parody site, was the target of a
presumably misguided distributed denial of service (DDoS) attack. The
real site, www.Whitehouse.gov, was taken off line for a while after
suffering a similar attack. The FBI's National Infrastructure
Protection Center (NIPC) said several sites were attacked using
fragmented large UDP packets (see story below).
9 May 2001 NIPC DDoS Warning
The FBI's National Infrastructure Protection Center (NIPC) has issued
a warning that attackers are conducting distributed denial of service
(DDoS) attacks by sending large, fragmented User Datagram Protocol
(UDP) packets to port 80. Administrators are advised to check for
such packets at port 80; outbound packets directed at port 80 could
indicate that a machine has been infected with DDoS tools.
14 May 2001 FBI Security Review
In the wake of the Hanssen spy case, the FBI is conducting a review of
its computer security practices, policies, and procedures.
14 May 2001 2600's Domain Name Taken
A problem at the domain name registrar Network Solutions left
2600.com's domain registration bill unpaid, allowing the domain name
to be grabbed by someone else.(Note: They used a forged email)
11 May 2001 BGP Vulnerability
Cisco has issued a security advisory warning that a security weakness
in the Border Gateway Protocol (BGP) could be exploited to crash
routers. The vulnerability can be exploited only "in configurations
that include both BGP and inbound route filtering on affected software."
11 May 2001 Truce in China-US Hacking
A group of Chinese hackers responsible for a plethora of web site
attacks has released a statement claiming its goal of 1,000 attacked
sites has been met and has declared a truce. Hackers on both sides of
the cyber conflict have defaced numerous sites. There is concern that
the Lion worm, written by the founder of the Chinese hacking group,
has infiltrated systems and could be used to launch attacks at a later
11 May 2001 Visa Security Measures to Include Passwords
Visa U.S.A Inc. plans to implement "payer authentication applications"
which will require people shopping on-line with Visa cards to provide
passwords. Retailers will install the authentication service on their
servers, and the banks that issue the Visa cards will have to install
a database application for user passwords.
7 & 10 May 2001 Cyber Attacks on Pentagon: Still No Leads
Cyber intruders have infiltrated pentagon computer systems for more
than three years, leaving backdoors and rerouting traffic through
Russia, writes James Adams, National Security Agency (NSA) advisory
board member, in Foreign Affairs magazine. Despite evidence that the
attacks appear to originate from Russian addresses, Adams claims the
Russian government has been less than accommodating in the investigation.
7 May 2001 Exodus Security Site Breached
Exodus Communications, which hosts the likes of Yahoo.com and
eBay.com, acknowledged that attackers were able to view firewall logs.
The intruders also gained control of two employee computers and
posted several Exodus usernames and passwords in an Internet Relay
Chat (IRC) room.
7 May 2001 Interview With Virus Writer Expert
In an interview, an expert on virus writers discusses their
motivations and ethics. She says that the best way to deter virus
writers is not through legislation, but by making it "uncool" to write
1 May 2001 Internet Information Server (IIS) 5.0 Buffer Overflow Vulnerability
Microsoft warned of a security hole in machines running Windows 2000
with IIS 5.0. By sending the servers carefully crafted strings,
attackers could cause a buffer overflow that would allow them system
administrator level control of the machines. System administrators
can protect their systems by turning off the Internet printing
component. Microsoft has released a patch for the vulnerability, and
is delaying the release of Service Pack 2 until the patch is incorporated.
Microsoft security advisory and patch information
1 May 2001 FBI Data Gathering Methodology in Cracker Case Raises Concerns
Some cyber law experts have expressed concern that the FBI's method
used in gathering incriminating evidence in the case of two Russian
cyber criminals may invite indiscriminate international hacking. The
FBI, unable to gain Russian authorities' cooperation in gathering data
from the servers the crackers used, took it upon themselves to gather,
compress, and download 1.3 GB of data to agency computers without a
search warrant. They obtained a warrant before examining the files.
4 May 2001 White House Site DDoSed
Whitehouse.gov was the victim of a distributed denial-of-service
attack that lasted just over two hours. An Albuquerque-based Internet
service provider (ISP) discovered six of its servers had been planted
with DDoS tools and were sending data to Whitehouse.gov. The attack
was similar to one directed at the CIA earlier in the week.
1 & 2 May 2001 US Government Web Sites Attacked
A number of US government web sites came under attack last week,
possibly by crackers acting on threats to escalate cyber attacks
during the first week of May. Affected sites include the Department
of Transportation's Surface Transportation Board, the US Geological
Survey and the Federal Emergency Management Agency's (FEMA's)
Hurricane Liaison team. Security experts have focused on the fact
that many systems are unsecured.
4 May 2001 FBI Documents Detail Carnivore Use
FBI documents obtained under the Freedom of Information Act (FOIA)
show that the agency used Carnivore and a similar, commercially
available network monitoring device called Etherpeek 24 times between
October 1999 and August 2000. The tools were used in cases involving
hacking, extortion, intellectual property, and national security.
30 April and 3 & 4 May 2001 Chinese Hacking Threat Loses Steam
Despite threats of massive attacks on US computer networks, the
purported cyberwar between China and the US has largely deteriorated
into a rash of site defacements. Some experts have speculated that
the cyber attacks were largely fueled by the media.
3 May 2001 CERT Warns of ISN Vulnerability
The Computer Emergency Response Team (CERT/CC) has issued an advisory
regarding a vulnerability in the way initial sequence numbers (ISNs)
are generated for TCP use. TCP was built for reliability, not
security, and the predictability of ISNs could allow an attacker who
has deduced the correct ISN to access a victim's computer. A CERT/CC
Internet security analyst pointed out that exploiting the
vulnerability would require statistical analysis tools.
This is one more reason to move to IPv6.
2 May 2001 "Hacktivists" are Not Activists
The author of this opinion piece deplores the use of the word
"hacktivism," claiming the activity it describes is usually neither
hacking nor activism. While the perpetrators may not be activists in
the true sense of the word, they do serve to point out the lamentable
condition of Internet security; the author would like to see systems
administrators and software companies taken to task for poor security practices.
1 May 2001 Uncovering a Cracker's Footsteps
A systems administrator describes the process of figuring out how a
cracker broke into a Linux box and what the cracker did there. The
author also offers some advice on securing servers: keep current with
patches, turn off unnecessary services, download and install
portsentry, and familiarize yourself with security resources.
1 May 2001 W32/Hello Worm Spreads Via MSN Messenger
The Hello worm arrives as an executable file via MSN Messenger; if
activated, it sends itself on to the infected machine's MSN e-mail
contact list. The worm is unlikely to cause significant damage
because users must deliberately download and execute the file to
become infected. While Hello appears to be largely a proof of concept
worm, future variants could prove more harmful.
Advice for securing instant messaging services. (25 April 2001)
30 April 2001 Group to Release Filter-Foiling Tool
A hacker group plans to introduce a peer-to-peer censorship-thwarting tool at this year's Defcon in July. "Peekabooty" will be distributed between systems, and will allow people in countries that restrict Internet content to receive controversial web pages in a compacted,
encrypted form that will not be filtered out.
30 April 2001 Biometrics and Privacy
The Pentagon is considering using biometric technology for physical
facility and information network security. Some employees are
concerned that the stored biometric templates (constructed from the
initial scan of the person's fingerprint, iris, or face) could invade
their privacy. The director of the Pentagon's Biometrics Management
Office, suggested that the templates may be protected under section 6
of the Freedom of Information Act (FOIA) which prohibits agencies from
disclosing personal information that could be deemed an invasion of
An explanation of how biometrics works
26 & 27 April 2001 NIPC Warns of Potential for Increased Cyber Attacks
The National Infrastructure Protection Center (NIPC) warned US
businesses to prepare to defend against increased cyber attacks from
China during the first week of May which encompasses May Day, Youth
Day, and the anniversary of the accidental NATO bombing of the Chinese
embassy in Belgrade.
27 April 2001 Cyber Vigilantism May be on the Rise
A panel of security experts at the Infosecurity show warned that
companies' reluctance to call in law enforcement to deal with
cybercrime could lead to cyber vigilantism. One survey suggests that
70% of companies that have been victims of cyber attacks would employ
counter measures. The debate emphasized the need for firms to get
their security infrastructure robust enough to frustrate attackers in
the first place. Businesses that "take matters into their own hands"
run the risk of breaking laws and of striking back at the wrong target.
27 April 2001 Wireless (In)Security
Many wireless networks are apparently running no security, allowing
anyone with relatively inexpensive equipment to drive by and check out
network activity. Malicious eavesdroppers could steal passwords,
access servers, commandeer web sites or shut down networks altogether.
Virtual Private Network (VPN) software can secure wireless networks.
26 April 2001 SDMI Researchers Won't Present Paper
Bowing to legal threats from the Recording Industry Association of
America (RIAA) and two other groups, the team of researchers who
cracked a watermarking content protection system will not present a
paper detailing their methods.
27 April 2001 IBM Plans Intelligent Computer
IBM plans to build a computer that will never go down; Project eLiza
aims to create a computer that can correct system failures without the
help of technicians. The new system may also be able to help
automatically fend off hackers.
24 & 27 April 2001 Software Guards Against Mass E-Mailing Viruses
The Defence Evaluation and Research Agency (DERA), an agency of the
UK's Ministry of Defence (MoD), has developed behavior blocker
software called "::Mail" that alerts users when a virus is trying to
send out mass e-mailings and requires authorization before it
completes the task. Experts note that turning off Visual Basic
Scripting (VBS) would prevent many viruses from spreading. Critics
say that the software won't stop the newest batch of viruses, and that
users find the technique, which has been used before, to be a nuisance.
Note: You can get much more convenient protection from the "Just be
friends" tool http://www.cigital.com/jbf/ (Win2000/NT only)
24 & 25 April 2001 Global Internet Fraud Web Site
Thirteen countries, including the United States, the UK, Canada,
Mexico, and Sweden have consolidated their on-line consumer fraud
efforts in econsumer.gov. The web site will provide information about
consumer protection as well as a means for consumers to file
complaints to appropriate government officials in the country where
the offending business is located. The Federal Trade Commission will
maintain and control the site.
23 April 2001 NIST Security Grants
The National Institute of Standards and Technology (NIST) has $5
million to offer in grants to companies doing research and development
in areas of security that will help protect the nation's critical
infrastructure information systems. Proposals are due to NIST by June
23 April 2001 GAO Report Suggests Citizens' Privacy is at Risk from Data Sharing
A General Accounting Office (GAO) report says that information sharing
between agencies could threaten citizens' privacy as linking data sets
creates dossiers of information about private citizens, which could
easily be abused. The GAO offered several solutions, including
getting signed consent forms before joining citizens' data.
20 April 2001 BT Web Site Security Glitch
The British Telecommunications plc (BT) web site was taken down for
about two hours after the company became aware of a security problem
that allowed customers to see others' bills. One security analyst
said that anyone who had registered for the bill-viewing feature could
access others' bills if the appropriate customer reference numbers
were available, and that BT's system does not include proper authentication.
19 April 2001 Cyber Sabotage Verdict Set Aside
The government is fighting to have a guilty verdict reinstated against
a man prosecuted for computer sabotage. Tim Lloyd was found guilty of
planting a malicious software program in a file server at the company
where he worked; the program wreaked havoc, causing millions of
dollars in loses and many layoffs. The judge set aside the decision
after a juror said a TV news story might have affected her decision.
Mr. Lloyd maintains his innocence.