Contents Material Is Now Being Brought On-Line by Will Tracz

Total Page:16

File Type:pdf, Size:1020Kb

Contents Material Is Now Being Brought On-Line by Will Tracz Illustrative Risks to the Public 1.37 Achieving Better System Development and Operation . 57 in the Use of Computer Systems 1.38 The Proper Role of Technology? . 58 and Related Technology Peter G. Neumann, Computer Science Laboratory, 2 Reference Materials 58 SRI International, Menlo Park CA 94025-3493 2.1 Books ............................... 58 Risks cases as of August 29, 2004 2.2 InsideRisksColumns . .. .. .. 58 Copyright 2004, Peter G. Neumann, SRI International EL243, Menlo Park CA 2.3 Pun-intended definitions . 60 94025-3493 (e-mail [email protected]; http://www.CSL.sri.com/neumann; This list summarizes items that have appeared in the Internet Risks Forum Digest telephone 1-650-859-2375; fax 1-650-859-2844): Editor, ACM SIGSOFT Software (RISKS) – which I moderate (comp.risks newsgroup) – and/or published ACM Engineering Notes, 1976–93, Assoc.Ed., 1994–; Chairman, ACM Committee on SIGSOFT Software Engineering Notes (SEN). In this collection of mostly Computers and Public Policy (CCPP); Moderator of the Risks Forum (comp.risks); one-liner summaries, (R i j) denotes RISKS volume i issue j; (S vol no:page) cofounder with Lauren Weinstein of People For Internet Responsibility denotes an issue of SEN, where there has been one volume per year, with vol 28 (http://www.pfir.org). being the year 2003; page numbers are given regularly from 1993 on; (SAC vol no) indicates an item in the quarterly SIGSAC Security and Control Review, where vol 16 is 1998, which was the final volume. The RISKS-relevant SEN material prior to 1995 is summarized in my Computer-Related Risks book (see below). SEN Contents material is now being brought on-line by Will Tracz: http://www.acm.org/sigsoft 1 Collected Items Listed by Categories 2 Some incidents are well documented, while others need further study. A few are of questionable authenticity, and are noted as such (“bogus???”). Please send me 1.1 Recent yet-to-be-merged items . 2 corrections and new cases, along with suitable references. This document is 1.2 Items Related to 11 Sep 2001 and Its Aftermath . 4 updated at least quarterly and is browsable on-line (ftp://ftp.CSL.sri.com/neumann/illustrative.html courtesy of 1.3 Space................................ 4 Otfried Cheong’s Hyperlatex). [Hyperlatex is wonderful Free Software: 1.4 Defense .............................. 6 http://www.cs.uul.nl/˜otfried/Hyperlatex).] This document is also printable in a two-column 8-point format (illustrative.pdf and illustrative.ps). 1.5 Military Aviation . 7 1.6 Commercial Aviation . 7 SEN regular issues, by year, volume&number 1.7 Rail, Bus, and Other Public Transit . 10 ..1976,vol 1: #1 = May; #2 = Oct ================================== 1.8 Automobiles ............................ 11 ..year 1977 78 79 80 81 82 83 84 85 1.9 Motor-Vehicle and Related Database Problems . 12 volume 2 3 4 5 6 7 8 910 --------------------------------- 1.10 Electrical Power (nuclear and other) and Energy . 12 Jan #1 1 1 1 1 1 1 1 1 1.11 Medical, Health, and Safety Risks . 14 Apr #3 2 2 2 2 2 2 2 2 Jul #4 3 3 3 3 3 3 4 3 1.12 Other Environmental Risks . 15 Oct #5 4 4 4 5 4 5 5 5 1.13 Robots and Artificial Intelligence . 15 ================================== ..year 1986 87 88 89 90 91 92 93 94 1.14 Other Control-System Problems . 16 volume 11 12 13 14 15 16 17 18 19 1.15 Other Computer-Aided-Design Problems . 16 --------------------------------- 1.16 Accidental Financial Losses, Errors, Outages . ..... 16 Jan #1 1 1 1 1 1 1 1 1 Apr #2 2 2 2 2 2 2 2 2 1.17 Financial Frauds and Intentionally Caused Losses . ..... 18 Jul #3 3 3 5 3 3 3 3 3 1.18 Stock-Market Phenomena . 19 Oct #5 5 4 6 5 4 4 4 4 ================================== 1.19 Telephone Frauds . 20 ..1995,vol20: #1=Jan; 2=Apr; 3=Jul; 5=Dec 1.20 Other Telephone and Communication Problems . 20 ..1996,vol21: #1=Jan; 2=Mar; 4=Jul; 5=Sep ..1997,vol22: #1=Jan; 2=Mar; 4=Jul; 5=Sep 1.21 ElectionProblems . 22 ..1998,vol23: #1=Jan; 3=May; 4=Jul; 5=Sep 1.22 InsuranceFrauds . .. .. .. 25 ..1999,vol24: #1=Jan; 3=May; 4=Jul ..2000,vol25: #1=Jan; 2=Mar; 3=May; 4=Jul 1.23 SecurityProblems . 25 ..2001,vol26: #1=Jan; 2=Mar; 4=Jul, 6=Nov 1.24Cryptography............................ 39 ..2002,vol27: #1=Jan; 2=Mar; 3=May, 5=Sep 1.25 April Foolery and Spoofs . 40 ..2003,vol28: #2=Mar; 3=May; 4=Jul, 6=Nov ..2004,vol29: #2=Mar; 3=May; 4=Jul, 1.26 PrivacyProblems. 40 1.27 Spamming, Junkmail, and Related Annoyances: . 45 Read the Risks Forum as comp.risks if you can, or send e-mail to 1.28 Other Unintentional Denials of Service: . 46 [email protected] for a subscription, single text line "subscribe" (append desired address only if not your From: address), or "info" for info. Send 1.29 Law Enforcement Abuses, False Arrests, etc.. 48 contributions to [email protected]. Archives are available at http://www.risks.org, 1.30 Identity Theft, Internet Fraud, Mistakes, Related Problems . 49 which redirects to Lindsay Marshall’s Web site at Newcastle http://catless.ncl.ac.uk/Risks/, including a nice search facility. Specific issues can 1.31 Other Legal Implications . 50 be read directly as http://catless.ncl.ac.uk/Risks/I.J.html 1.32 Other Aggravation . 50 [where I=volume#, J=issue#]. SRI’s archive is at ftp://ftp.sri.com/risks or by "ftp ftp.sri.com", "login anonymous", "cd 1.33 Calendar/Date/Clock Problems including Y2K . 53 risks" (which gets the "dir" for the current volume, and "cd i" then gets you into the 1.34 TheGameofChess: . .. .. .. 56 subdirectory for noncurrent volume i). An Australian mirror is at http://the.wiretapped.net/security/textfiles/risks-digest/. “Inside Risks” distills some 1.35 Miscellaneous Hardware/Software Problems . 56 of the discussion into a monthly inside-back-cover column in the Communications 1.36 Other Computer System Development Difficulties . 57 of the ACM. The list of columns to date is given at the end of this document. 1 My book (Peter G. Neumann, Computer-Related Risks, Addison-Wesley (ISBN V(m/f?) Canadian grocery chain Sobeys’ software crash lasts 5 days (R 21 22) 0-201-55805-X) and ACM Press (ACM Order 704943), 1995) summarizes many of Vf University of Washington server crash leaves thousands of students unable to these cases and provides additional analysis. (A few errata for the first three register for classes (R 22 38) printings are on my Web page, noted above.) Most of the (S vol no) items listed i Risks of not-quite-identical keyboard layouts (R 21 26) ¾¼ below for ÒÓ are discussed in the book; more recent items generally include $h United Airlines Web site for one hour accidentally offered SFO-Paris round trips the relevant on-line (R i j) references. If you cannot find the book in a bookstore, it for cost of taxes and fees only (roughly $30 instead of $300) (R 21 24-25) is on amazon.com, or call A-W within the U.S. at 1-800-822-6339 – or if you are f Japanese modem misdialing seemingly at random in pulse-dial mode (R 21 25) outside of the U.S., 1-617-944-3770 and ask for International Orders. The book is eh EoExchange shuts down free ad-supported services without warning; customer now also available in Japanese (ISBN 4-89471-141-9). Instead of trying to produce data lost (R 21 32) a second edition in the face of a massive influx of new RISKS cases, the fourth and i PC virtual-parrot squawks confuse firemen (S 26 6:10, R 21 46) fifth printings of the book gives the URL for the Addison-Wesley Web site mf Power outage causes motorized-chair shopping carts to run amok; default state (http:www.awl.com/cseng/titles/ISBN-0-201-55805-X/), which includes the first brake off, in forward gear (R 21 50) chapter of the book and an extended preface. That Web site and my own contain m Brownout-lowered voltages take out computers in Livermore (R 21 51) further material that would otherwise have gone into the second edition. f Cable theft results in network congestion when Seti@Home screen savers are unable to access Seti servers (R 21 48,53) Henry Petroski (among others) has noted that we rarely learn from our successes, fe Carefully planned seamless British Telecom BT SurfTime upgrade seemed very and must learn more from our failures. The collection of cases cited here provides seamy, with premature cancellation of old service (R 21 44) rich opportunities for reflection that could help us to avoid similar problems in the hie Risks in MacOS 10.2.4 update and httpd.conf replacement (R 22 56) future. Unfortunately, it also demonstrates that the same types of mistakes tend to $fe UK magistrates courts staff upgrade failure requires two sets of systems instead of recur, over and over... one, and a huge windfall for the deficient contractor (R 21 59) SEN and RISKS also consider approaches for developing better computer systems, fe Adobe Acrobat 5.0 pdf upgrade not backward compatible (R 21 59) e.g., safer, more reliable, more secure, fewer cost and schedule overruns, etc. There e NASA data from 1970s lost due to “forgotten” file format (R 21 56) are many approaches to developing sound systems; none is guaranteed. Whereas f California DMV sorting machine sends licenses to wrong people; 8-year-old sorting the emphasis in the following list is on problems rather than on would-be solutions, machine blamed (R 21 39) the pervasive nature of the problems suggests that techniques for the effective * IBM auto dashboard system can shoot water at drivers not answering questions development and operation of computer-related systems are frequently ignored.
Recommended publications
  • For Immediate Release Crm Monday, November 23, 2009 (202) 514-2007 Tdd (202) 514-1888
    ___________________________________________________________________________ FOR IMMEDIATE RELEASE CRM MONDAY, NOVEMBER 23, 2009 (202) 514-2007 WWW.JUSTICE.GOV TDD (202) 514-1888 DETROIT SPAMMER AND THREE CO-CONSPIRATORS SENTENCED FOR MULTI-MILLION DOLLAR E-MAIL STOCK FRAUD SCHEME WASHINGTON – Four individuals were sentenced today by U.S. District Judge Marianne O. Battani in federal court in Detroit for their roles in a wide-ranging international stock fraud scheme involving the illegal use of bulk commercial e-mails, or “spamming,” announced Assistant Attorney General of the Criminal Division Lanny A. Breuer and U.S. Attorney for the Eastern District of Michigan Terrence Berg. Alan M. Ralsky, 64, of West Bloomfield, Mich., and Scott Bradley, 48, also of West Bloomfield, were sentenced to 51 months and 40 months in prison, respectively, for conspiring to commit wire fraud, mail fraud, and to violate the CAN-SPAM Act, and also for committing wire fraud, engaging in money laundering and violating the CAN-SPAM Act. Ralsky and Bradley were also each sentenced to five years of supervised release following their respective prison terms, and were each ordered to forfeit $250,000 that the United States seized in December 2007. How Wai John Hui, 51, a resident of Hong Kong and Canada, was sentenced to 51 months in prison for conspiring to commit wire fraud, mail fraud and to violate the CAN-SPAM Act, and also for committing wire fraud and engaging in money laundering. Hui was sentenced to three years of supervised release following his prison term, and agreed to forfeit $500,000 to the United States. John S.
    [Show full text]
  • February 2008
    U.S. Department of Justice Office of Intergovernmental and Public Liaison The Office of Intergovernmental and Public Liaison’s Department of Justice Newsletter Volume 2, Issue 1 February 2008 Attorney General Mukasey Announces $200 Million February Highlights: Initiative Targeted to Fight Violent Crime ♦ AG announces new initiative to Fight Violent Crime (p.1) In a speech before the U.S. Con- ference of Mayors on January 24th, ♦ Celebrating Martin Luther King 2008, Attorney General Michael B. Day (p.2) Mukasey announced the President is seeking $200 million in funding for a ♦ Recent Achievements by the Civil new Violent Crime Reduction Partner- Rights Division (p.2) ship Initiative for Fiscal Year 2009. The funding is part of the Depart- ♦ AG Visit to Mexico (p.3) ment’s strategy to support state and ♦ Criminal Division News (p.3) local law enforcement efforts in com- munities that are experiencing in- ♦ Defense Contractor and Former creases in violent crime and to keep Manager Charged (P.4) crime down in others. ♦ AG Addresses Executive Working “This initiative will help communi- Group (p.4) ties address their specific violent crime challenges, especially where ♦ Preserving Life and Liberty : multiple jurisdictions are involved,” Protect America Act (p.4) Attorney General Mukasey said. “We'll be able to send targeted resources where they are needed the most and where they show the most promise. Through close coordination, Newsletter from the Office of we also can avoid needless duplica- Intergovernmental and Public Liaison tion and free up resources to help U.S. Department of Justice more cities.” Office of Intergovernmental and Public Liaison RFK Main Justice Building, Room 1629 The Violent Crime Reduction Part- 950 Pennsylvania Avenue, NW nership Initiative will support multi- Washington, D.C.
    [Show full text]
  • Busting Blocks: Revisiting 47 U.S.C. §230 to Address the Lack of Effective Legal Recourse for Wrongful Inclusion in Spam Filters
    Digital Commons @ Touro Law Center Scholarly Works Faculty Scholarship 2011 Busting Blocks: Revisiting 47 U.S.C. §230 to Address the Lack of Effective Legal Recourse for Wrongful Inclusion in Spam Filters Jonathan I. Ezor Touro Law Center, [email protected] Follow this and additional works at: https://digitalcommons.tourolaw.edu/scholarlyworks Part of the Commercial Law Commons, Communications Law Commons, and the Science and Technology Law Commons Recommended Citation Jonathan I. Ezor, Busting Blocks: Revisiting 47 U.S.C. § 230 to Address the Lack of Effective Legal Recourse for Wrongful Inclusion in Spam Filters, XVII Rich. J.L. & Tech. 7 (2011), http://jolt.richmond.edu/ v17i2/article7.pdf. This Article is brought to you for free and open access by the Faculty Scholarship at Digital Commons @ Touro Law Center. It has been accepted for inclusion in Scholarly Works by an authorized administrator of Digital Commons @ Touro Law Center. For more information, please contact [email protected]. Richmond Journal of Law and Technology Vol. XVII, Issue 2 BUSTING BLOCKS: REVISITING 47 U.S.C. § 230 TO ADDRESS THE LACK OF EFFECTIVE LEGAL RECOURSE FOR WRONGFUL INCLUSION IN SPAM FILTERS By Jonathan I. Ezor∗ Cite as: Jonathan I. Ezor, Busting Blocks: Revisiting 47 U.S.C. § 230 to Address the Lack of Effective Legal Recourse for Wrongful Inclusion in Spam Filters, XVII Rich. J.L. & Tech. 7 (2011), http://jolt.richmond.edu/v17i2/article7.pdf. I. INTRODUCTION: E-MAIL, BLOCK LISTS, AND THE LAW [1] Consider a company that uses e-mail to conduct a majority of its business, including customer and vendor communication, marketing, and filing official documents.
    [Show full text]
  • MAR 2 4 Low V
    Timothy J. Walton (State Bar No. 184292) LAW OFFICES OF TIMOTHY WALTON 801 Woodside Road, Suite 11 Redwood City, CA 94061 Phone (650) 216-9800 Fax: (650) 618-8687 Daniel L. Balsam (State Bar No. 260423) THE LAW OFFICES OF DANIEL BALSAM 3145 Geary Blvd. #225 San Francisco, CA 94118 Court of Appeal-Fiffit-AppellateDistrict Phone: (415) 276-3067 FILED Fax: (415) 373-3783 MAR 2 4 lOW Attorneys for AppellantIPlaintiff (li§f1tl HIHb rt, Clork Daniel L. Balsam D~pyty OlefK COURT OF APPEAL OF THE STATE OF CALIFORNIA FIRST APPELLATE DISTRICT, DIVISION 3 DANIEL L. BALSAM, ) Case No.: A126680 ) Appellant and Plaintiff, ) APPELLANT'S SECOND ) MOTIONIREQUEST FOR v. ) JUDICIAL NOTICE TO ) SUPPLEMENT RECORD DSG DIRECT INC. et ai, ) ) Defendants, ) ) TROPICINKS LLC et ai, ) ) Respondents and Real ) ___P_art_ie_s_in_I_n_te~r..:....;es~t. ___ ) Appeal Filed: Oct. 9, 2009 1 ApPELLANT'S SECOND MOTIONIREQUEST FOR JUDICIAL NOTICE TO SUPPLEMENT RECORD I. INTRODUCTION Appellant/Plaintiff Daniel L. Balsam (“Balsam”) brings this Second Motion/Request for Judicial Notice pursuant to Evidence Code §§ 459(a) and 452(h) because the documents to be noticed – corporate filings by Judgment Debtors and reputation/habit evidence that one of their purported officers was one of the top spammers in the world in 2003-2005 – demonstrate that Respondents TropicInks LLC (“TropicInks”), Datastream Group (“Datastream”), and Leigh-Ann Colquhoun (“Colquhoun”) made make false claims to California courts and undermine Respondents’ arguments that the underlying judgment is invalid. The documents are relevant to Balsam’s claims and Respondents’ defenses. This Court should take judicial notice of the attached documents. II.
    [Show full text]
  • 2010 Threat Predictions by Mcafee Labs
    Report 2010 Threat Predictions By McAfee Labs Report 2010 Threat Predictions McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 we expect to see an increase in the effectiveness of law enforcement to fight back against cybercrime. • Social networking sites such as Facebook will face more sophisticated threats as the number of users grows. • The explosion of applications on Facebook and other services will be an ideal vector for cybercriminals, who will take advantage of friends trusting friends to click links they might otherwise treat cautiously. • HTML 5 will blur the line between desktop and online applications. This, along with the release of Google Chrome OS, will create another opportunity for malware writers to prey on users. • Email attachments have delivered malware for years, yet the increasing number of attacks targeted at corporations, journalists, and individual users often fool them into downloading Trojans and other malware. • Cybercriminals have long picked on Microsoft products due to their popularity. In 2010, we anticipate Adobe software, especially Acrobat Reader and Flash, will take the top spot. • Banking Trojans will become more clever, sometimes interrupting a legitimate transaction to make an unauthorized withdrawal. • Botnets are the leading infrastructure for cybercriminals, used for actions from spamming to identity theft. Recent successes in shutting down botnets will force their controllers to switch to alternate, less vulnerable methods of command, including peer-to-peer setups. • In spite of the worldwide scope of botnets, we anticipate even more successes in the fight against all forms of cybercrime in 2010.
    [Show full text]
  • Alan Ralsky - Wikipedia, the Free Encyclopedia Page 1 of 2
    Alan Ralsky - Wikipedia, the free encyclopedia Page 1 of 2 Alan Ralsky From Wikipedia, the free encyclopedia Alan Ralsky (born c. 1945) is an American convicted fraudster, most well-known for his activities as a spammer. Contents 1 Spamming 2 Legal 3 References 4 External links Spamming According to experts in the field, Ralsky is one of the most prolific sources of junk e-mail worldwide. Unlike most spammers, he has provided interviews to various newspapers, although he claimed to be a commercial e-mailer rather than a spammer. He stated that his was a legitimate business which complied with all laws.[1] (http://www.cmsconnect.com/News/CMSInPrint/DN-020804-pg2.htm) Ralsky apparently began his spamming career when his licenses to sell insurance were revoked in Michigan and Illinois in 1996.[2] (http://www.cmsconnect.com/News/CMSInPrint/DN-020804-pg2.htm) He gained much of his notoriety following a December 2002 interview with The Detroit News. The article was soon posted to Slashdot and the address of his newly built home was posted to Slashdot not long after that. Hundreds of Slashdot readers then searched the Internet for advertising mailing lists and free catalogs and signed him up for them. As a result, he was inundated with junk mail. In a Detroit Free Press article on December 6, 2002, he is quoted as saying "They've signed me up for every advertising campaign and mailing list there is … These people are out of their minds. They're harassing me". Legal In 1992 he served a fifty-day sentence for selling unregistered securities.[3] (http://www.freep.com/money/tech/mwend22_20021122.htm) On August 7, 1995, he pled guilty to felony bank fraud in Ohio.[4] (http://www.spamhaus.org/rokso/evidence.lasso? rokso_id=ROK5535).
    [Show full text]
  • Amending Can-Spam & Aiming Toward a Global Solution
    COPYRIGHT © 2004 TRUSTEES OF BOSTON UNIVERSITY. THIS VERSION DOES NOT CONTAIN PARAGRAPH/PAGE REFERENCES. PLEASE CONSULT THE PRINT OR ON- LINE DATABASE VERSIONS FOR PROPER CITATION INFORMATION NOTE SPAM IN A BOX: AMENDING CAN-SPAM & AIMING TOWARD A GLOBAL SOLUTION ∗ Erika Hallace KikuchiTP PT TABLE OF CONTENTS I. INTRODUCTION...................................................................................... 56 II. THE SPAM PROBLEM ............................................................................. 58 A. Spam Statistics............................................................................... 58 B. The Spam Monster......................................................................... 60 III. THE HISTORY OF ANTI-SPAM TACTICS ................................................. 62 A. Self-Regulation and Technical Tactics to Combat Spam............... 62 B. Various Legal Tactics Used to Combat Spam ............................... 63 C. Attempts at Federal Spam Legislation Prior to the 108th Congress........................................................................................ 67 IV. THE CURRENT FEDERAL LEGISLATION ................................................. 69 A. The 108th Congress....................................................................... 69 1. Bills Introduced, But Not Passed............................................. 69 2. The CAN-SPAM Act of 2003 ................................................. 71 3. The Selection of CAN-SPAM ................................................. 75 B. Problems
    [Show full text]
  • Opting out of Spam: a Domain Level Do-Not-Spam Registry
    Opting Out of Spam: A Domain Level Do-Not-Spam Registry Rebecca Bolint INTRODUCTION Spain, or unsolicited commercial email,' drastically lowers the costs of advertising directly to prospective consumers by exploiting open electronic mail protocols. And it has become an obnoxious big business. Markets, norms, and technological measures 2 have all failed to change sufficiently the economics of the spain business model. Spare is clogging businesses' servers and users' inboxes, and costing too much money and time in return for too little benefit. This Note argues that despite widespread criticism, current federal spain law has in fact effectively targeted the most egregious senders. But it has also created an entitlement to send spam--one free message-before a recipient's wish to avoid spain must be honored. This reverses the entitlement set in other media and ignores consumer demand for privacy and a Do-Not-Call Registry for email. Part I of this Note describes spain, its scale, and its costs and benefits. Part II analyzes attempts to use the market and state legislation to fix the problem. It explains why these efforts failed, and why federal legislation was required. Part III outlines the successes of CAN-SPAM, the groundbreaking federal spain law, as well as the interlocking set of state laws used to combat spainmers. Part IV compares spain law to policies addressing unsolicited commercial speech in other media and proposes a policy suggested in CAN-SPAM, but ultimately overlooked: a Do-Not-Call Registry for email. This Note concludes that a Do- Not-Spain Registry balances the easy detection of a strict liability rule with the t Yale Law School, J.D.
    [Show full text]
  • Principles of Cybercrime
    This page intentionally left blank PRINCIPLES OF CYBERCRIME PRINCIPLES OF CYBERCRIME JONATHAN CLOUGH Faculty of Law, Monash University CAMBRIDGE UNIVERSITY PRESS Cambridge, New York, Melbourne, Madrid, Cape Town, Singapore, São Paulo, Delhi, Dubai, Tokyo Cambridge University Press The Edinburgh Building, Cambridge CB2 8RU, UK Published in the United States of America by Cambridge University Press, New York www.cambridge.org Information on this title: www.cambridge.org/9780521899253 © Jonathan Clough 2010 This publication is in copyright. Subject to statutory exception and to the provision of relevant collective licensing agreements, no reproduction of any part may take place without the written permission of Cambridge University Press. First published in print format 2010 ISBN-13 978-0-511-72978-2 eBook (NetLibrary) ISBN-13 978-0-521-89925-3 Hardback ISBN-13 978-0-521-72812-6 Paperback Cambridge University Press has no responsibility for the persistence or accuracy of urls for external or third-party internet websites referred to in this publication, and does not guarantee that any content on such websites is, or will remain, accurate or appropriate. CONTENTS Preface ix Acknowledgements xi List of abbreviations xii Table of cases xiii Table of leg islation xxvii part i Introduction 1 1 Cybercrime 3 1. The evolution of cybercrime 3 2. The challenges of cybercrime 5 3. Defining cybercrime 8 4. Cyberterrorism 11 5. Thescaleoftheproblem 13 6. Online/offline consistency 15 7. Virtual crimes? 16 8. A global problem: the Convention on Cybercrime 21 part ii Computer as target 25 2 Computer as target 27 1. Introduction 27 2. Theprevalenceofcybercrime 39 3.
    [Show full text]
  • New York Stock Broker Sentenced to Prison in International Stock Fraud Scheme
    Sep 07, 2011 04:15 EDT New York Stock Broker Sentenced to Prison in International Stock Fraud Scheme Tuesday, September 6, 2011 WASHINGTON - A New York stock broker was sentenced today to 24 months in prison for his role in a wide-ranging international stock fraud scheme involving the illegal use of bulk commercial emails, or “spamming,” to promote thinly-traded Chinese penny stocks, announced A ssistant Attorney General Lanny A. Breuer of the Justice Department’s Criminal Division and U.S. Attorney Barbara McQuade for the Eastern District of Michigan. Gregg M. S. Berger, 47, of New York, N.Y., was ordered by U.S. District Judge Marianne O. Battani in Detroit to serve three years of supervised release following his prison term. Berger agreed to forfeit $600,000 to the United States. According to court documents, Berger conspired with Alan Ralsky, Francis Tribble, How Wai John Hui, Scott Bradley and others to carry out a sophisticated stock fraud scheme from January 2005 through December 2007. Ralsky, Tribble, Hui and Bradley have all been convicted and sentenced for their roles in the scheme. “Mr. Berger used his position as a stock broker to generate more than $30 million in illegal proceeds for his co-conspirators, and more than half a million dollars for himself,” said Assistant Attorney General Breuer. “Today’s sentence reflects our sustained commitment to ensuring the integrity of our financial markets, and to holding accountable those who try to manipulate them.” “Schemes that manipulate stock prices undermine public confidence in the stock market, and can have serious impact on our economy,” said U.S.
    [Show full text]
  • Alternative View Year 2009 Date Source Cat
    Alternative View 2008 1 Alternative View Year 2009 Date Source Cat. Text 31.07.2005 BAZ 1 Big Brother’s Reign 10.01.2009 Guardian 1 [Caroline] Kennedy has come under considerable media criticism after stumbling through a series of interviews, including one in which she used the phrase "you know" 138 times {Caroline you know Kennedy} 10.01.2009 X 1 The Illinois House voted overwhelmingly to impeach Gov. Rod Blagojevich 12.01.2009 Independent 1 We've left our home. Like 60,000 other Gazans, we've taken our belongings and fled. Once again, we've become displaced people … what Israel has done in the past two weeks will keep the flames of this conflict alive for generations to come 13.01.2009 Blog 1 The best Congress money can buy 13.01.2009 BBC 1 visitors from countries that do not need visas will need to fill in an electronic form at least 72 hours before they travel. Those who have not registered risk being detained and sent back home. Solution: Don't travel to the USA until the tourism industry is screaming bloody murder and the country comes to its senses 23.01.2009 MM 1 President Obama began dismantling the Bush legacy, using his first full day to overturn an order that let ex-presidents seal their papers forever 24.01.2009 Blog 1 Seconds after [a] police officer shot and killed [handcuffed] Oscar Grant, police immediately began confiscating cell phones containing videos that have yet to see the light of day. In fact, the only videos that have been seen by the public were filmed by people who managed to leave the scene before police confronted them 28.01.2009 Al Arabiya 1 Obama: “You will be judged on what you've built, not what you've destroyed ..
    [Show full text]
  • News Letter V7
    Content Delivery Networking pg. 3 Inside SBC Privacy Manager . pg. 2 Data with David . pg. 3 Wi-Fi Update . pg. 4 GigaMAN Enhancements Launching This Quarter . pg. 4 SBC Aids Wildfire Fight . pg. 4 UPDATE DSL Data News . pg. 5 Selling Below Tariff with Custom Contracts . pg. 6 Solutions for Success SBC Dish Network to Debut. pg. 7 Webwatch . pg. 7 Consultant/Vendor Sales Group Watch Out for Social Engineering . pg. 8 November 2003 Spam – Friend or Foe? . pg. 10 Cingular Wireless News Section . pg. 11 SBC LD Introduces First Middle East Calling Plan . pg. 11 SBC California Unveils New Unlimited Calling Offer . pg. 11 The Importance of HIPAA. pg. 12 Robin MacGillivray, BCS President, SBC West Be Wary of Identity Theft . pg. 13 MPLS: A Business Perspective Technology Overview . pg. 14 Thrilled To Be Back! SBC Executive News. pg. 15 Top Communication Scams . pg. 16 The Best is Yet To Come... SBC Urges Customers to Maintain Corded Phone Line . pg. 17 I’m thrilled to be back at SBC West as President SBC Online Move Center . pg. 18 FCC & Number Portability . pg. 18 of Business Communications Services. I’ve met Sterling Earns World-Class Customer Support Certification . pg. 19 several of you in my previous jobs and know 1-800-CONFERENCE Travel Alternatives . pg. 20 how important it is for us to work closely with Telecom Consultants to help maximize the Vice President’s Corner efficiency and success of many businesses. Kari Aguinaldo Here are just a few of the ways we’re continually striving to exceed CVSG Vice President your expectations in this very challenging year: ͷ We’ve improved our market coverage this year by hiring over Timing Is Everything 460 new sales professionals.
    [Show full text]