Tangled Web : Tales of Digital Crime from the Shadows of Cyberspace

Total Page:16

File Type:pdf, Size:1020Kb

Tangled Web : Tales of Digital Crime from the Shadows of Cyberspace TANGLED WEB Tales of Digital Crime from the Shadows of Cyberspace RICHARD POWER A Division of Macmillan USA 201 West 103rd Street, Indianapolis, Indiana 46290 Tangled Web: Tales of Digital Crime Associate Publisher from the Shadows of Cyberspace Tracy Dunkelberger Copyright 2000 by Que Corporation Acquisitions Editor All rights reserved. No part of this book shall be reproduced, stored in a Kathryn Purdum retrieval system, or transmitted by any means, electronic, mechanical, pho- Development Editor tocopying, recording, or otherwise, without written permission from the Hugh Vandivier publisher. No patent liability is assumed with respect to the use of the infor- mation contained herein. Although every precaution has been taken in the Managing Editor preparation of this book, the publisher and author assume no responsibility Thomas Hayes for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein. Project Editor International Standard Book Number: 0-7897-2443-x Tonya Simpson Library of Congress Catalog Card Number: 00-106209 Copy Editor Printed in the United States of America Michael Dietsch First Printing: September 2000 Indexer 02 01 00 4 3 2 Erika Millen Trademarks Proofreader Benjamin Berg All terms mentioned in this book that are known to be trademarks or ser- vice marks have been appropriately capitalized. Que Corporation cannot Team Coordinator attest to the accuracy of this information. Use of a term in this book should Vicki Harding not be regarded as affecting the validity of any trademark or service mark. Design Manager Warning and Disclaimer Sandra Schroeder Every effort has been made to make this book as complete and as accurate Cover Designer as possible, but no warranty or fitness is implied. The information provided Anne Jones is on an “as is” basis. The author and the publisher shall have neither liabil- ity nor responsibility to any person or entity with respect to any loss or Interior Designer damages arising from the information contained in this book. Trina Wurst Product Marketing Manager Amy Neidlinger Publicity Gardi Ipema Wilks Layout Technicians Ayanna Lacey Heather Hiatt Miller Stacey Richwine-DeRome Contents at a Glance Foreword xi I Crime, War, and Terror in the Information Age 1 1 Welcome to the Shadow Side of Cyberspace 3 2 Inside the Mind of the Cybercriminal 9 3 Been Down So Long It Looks Like Up To Me: The Extent and Scope of the Cybercrime Problem 21 4 Let It Bleed: The Cost of Computer Crime and Related Security Breaches 39 II Hackers, Crackers, and Virus Writers 53 5 Did the 1990s Begin with a Big Lie? 55 6 Joy Riders: Mischief That Leads to Mayhem 65 7 Grand Theft Data: Crackers and Cyber Bank Robbers 87 8 Hacktivists and Cybervandals 115 9 The $80 Million Lap Dance and the $10 Billion Love Letter 141 III Spies and Saboteurs 157 10 Corporate Spies: Trade Secret Theft in Cyberspace 159 11 Insiders: The Wrath of the Disgruntled Employee 179 12 Infowar and Cyberterror: The Sky Is Not Falling, But… 191 IV Muggers and Molesters in Cyberspace 213 13 Identity Theft 215 14 Child Pornography on the Internet 223 V The Defense of Cyberspace 229 15 Inside Fortune 500 Corporations 231 16 Inside Global Law Enforcement 249 17 Inside the U.S. Federal Government 263 18 Countermeasures 279 Epilogue: The Human Factor 313 VI Appendixes 325 Glossary 327 A U.S. Laws and International Treaties 339 B Excerpt from Criminal Affidavit in the Ardita Case 369 C Resources and Publications 387 Index 403 Table of Contents I Crime, War, and Terror System Penetration from the Outside in the Information Age 47 1 Unauthorized Access from the Inside 1 Welcome to the Shadow Side of 47 Cyberspace 3 Sabotage of Data or Network Types of Cybercrime 4 Operations 48 Types of Cybercriminals 6 Malicious Code 48 2 Inside the Mind of the Don’t Underestimate “Soft Costs” Cybercriminal 9 48 “Stereotyping Can Be Dangerous” 10 If We Can Quantify Losses, We Can “Intense Personal Problems” Are the Key Calculate ROI 50 13 3 Been Down So Long It Looks Like II Hackers, Crackers, and Up To Me: The Extent and Scope of Virus Writers 53 the Cybercrime Problem 21 5 Did the 1990s Begin with a Big Lie? The CSI/FBI Computer Crime and 55 Security Survey 22 The First Serious Infrastructure Attack? Whom We Asked 24 55 Outlaw Blues 26 Public Cyberenemy No. 1? 57 Types of Cyberattack 28 The Worms Crawl In, the Worms Crawl Out… 60 To Report or Not to Report 28 What the Morris Worm Did to The Truth Is Out There 32 Systems 61 A Note on Methodology 32 What the Morris Worm Relevant Data from Other Sources 33 Demonstrated 63 CERT/CC Statistics 33 Conclusion 64 Dan Farmer’s Internet Security 6 Joy Riders: Mischief That Leads to Survey 35 Mayhem 65 WarRoom Research’s Information The Rome Labs Case: Datastream Security Survey 35 Cowboy and Kuji Mix It Up with the U.S. Conclusions 38 Air Force 66 4 Let It Bleed: The Cost of Computer Investigators Wrestle with Legal Crime and Related Security Issues and Technical Limitations 68 Breaches 39 Datastream Cowboy’s Biggest How Do You Quantify Financial Losses Mistake 69 Due to Info Security Breaches? 44 Scotland Yard Closes in on You Can’t Fully Quantify the Loss if Datastream Cowboy 71 You Haven’t Valued the Resource 44 Kuji Hacks into Goddard Space Flight Center 72 Kuji Attempts to Hack NATO HQ 72 From Russia With Love: The Sad Tale Scotland Yard Knocks on Datastream of Ekaterina and Evygeny 100 Cowboy’s Door 73 The Phonemasters Case 102 Kuji’s Identity Is Finally Revealed 74 How the Phonemasters Almost Who Can Find the Bottom Line? 75 Blunder into Discovering the FBI’s Surveillance 105 HotterthanMojaveinmyheart: The Case of Julio Cesar Ardita 76 A “Dream Wiretap” Results in an Enormous Challenge 105 How the Search for “El Griton” Began 77 Quantifying the Financial Losses Proved Essential in Court 107 Ardita’s Biggest Mistake 79 “The Number You Have Reached Has No Ordinary Wiretap 80 Been Disconnected…” 113 Debriefing “El Griton” 80 8 Hacktivists and Cybervandals 115 The Solar Sunrise Case: Mak, Stimpy, Hackers Run Amok in “Cesspool of and Analyzer Give the DoD a Run for Its Greed” 116 Money 81 Schanot Goes Underground 120 Conclusion 85 Schanot’s Indictment and Capture 7 Grand Theft Data: Crackers and 121 Cyber Bank Robbers 87 How Schanot Rang Southwestern’s The Case of Carlos “SMAK” Salgado 88 Bell 122 Diary of a Computer Crime Attack of the Zombies 124 Investigation 88 Once Upon A Time, An Eerie Calm Don’t Underestimate Internet-Based Descended on Cyberspace… 125 Credit Card Theft 91 Blow by Blow 126 The Crest of an Electronic Commerce Crime Wave? 91 How DDoS Works 127 Citibank 92 Who Launched the Attacks and Why 127 Where Did It All Begin? How Did It Happen? 93 Aftermath 129 Misconceptions Dispelled 93 Calculating the Financial Impact 132 What It Took To Take Levin Down 95 The Moral of the Tale 133 You Don’t Know How Lucky You Are, 9 The $80 Million Lap Dance and the Boys…Back in the USSR: $10 Billion Love Letter 141 Unanswered Questions About The $80 Million Lap Dance 143 Megazoid and the Russian Mafia 99 “My Baby, She Wrote Me a Letter…” 148 vi TANGLED WEB III Spies and Saboteurs V The Defense of 157 Cyberspace 229 10 Corporate Spies: Trade Secret Theft 15 Inside Fortune 500 Corporations in Cyberspace 159 231 The Corporate World’s Dirty, Little, How to Structure Your Information Secret War 160 Security Unit 232 Some Real-World Tales of Economic Where Should Your Information Security Espionage 166 Unit Report? 238 Tit for Tat? State-Sponsored Economic 16 Inside Global Law Enforcement Espionage 169 249 EEA Sinks Its Teeth In 173 National Infrastructure Protection Center (NIPC) 250 11 Insiders: The Wrath of the Disgruntled Employee 179 The Role of Computer Analysis Types of Cyberattack by Insiders 179 Response Team (CART) 252 Oracle Scorned: The Unauthorized “Isn’t It Good, Norwegian Wood…” Access of Adelyn Lee 181 255 Omega Man: The Implosion of Tim Case Study in the Struggle Over Lloyd 183 Subscriber Data 257 12 Infowar and Cyberterror: The Sky U.S. Law Versus Norwegian Law Is Not Falling, But… 191 259 Cyberwar in Kosovo? 196 Council of Europe Floats a China, U.S., and Taiwan: Has Code War Cybercrime Treaty 260 Replaced Cold War? 200 17 Inside the U.S. Federal Government Storming the Digital Bastille 203 263 Inside the Pentagon 265 Helter Skelter in Cyberspace 204 What’s Going On in the Murky Waters at Digital Dirty Tricks and Cyber Plumbers Foggy Bottom? 268 208 FAA Secured on a Wing and a Prayer? Defensive Information Warfare 209 270 IV Muggers and Molesters Lessons Learned from the NASA Probe in Cyberspace 213 272 Is Something Nasty Floating in Your 13 Identity Theft 215 Alphabet Soup? 273 14 Child Pornography on the Internet 223 Harold Nicholson, Traitor 273 Do You Have Your Priorities Straight? Douglas Groat, Would-Be Traitor 225 274 John Deutch: A Good Man Blunders 274 King and Lipka, Traitors 276 Conclusion 276 CONTENTS vii 18 Countermeasures 279 B Excerpt from Criminal Affidavit in Organizational Issues 279 the Ardita Case 369 Risk Analysis 280 Efforts to Identify and Localize the Intruder Within the FAS Harvard Host Baseline Controls Versus Risk 372 Analysis 283 Real-Time Monitoring of the Intruder’s Sound Practices 284 Activities in November and December, Sixteen Sound Practices Learned 1995 376 from Leading Organizations 284 Identification of “Griton,” the Intruder, Information Protection Assessment in Buenos Aires, Argentina 384 Kit (IPAK) 286 C Resources and Publications 387 Policies and Procedures 292 General Information 387 Net Abuse 292 U.S.
Recommended publications
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • Course Outline and Syllabus the Fab Four and the Stones: How America Surrendered to the Advance Guard of the British Invasion
    Course Outline and Syllabus The Fab Four and the Stones: How America surrendered to the advance guard of the British Invasion. This six-week course takes a closer look at the music that inspired these bands, their roots-based influences, and their output of inspired work that was created in the 1960’s. Topics include: The early days, 1960-62: London, Liverpool and Hamburg: Importing rhythm and blues and rockabilly from the States…real rock and roll bands—what a concept! Watch out, world! The heady days of 1963: Don’t look now, but these guys just might be more than great cover bands…and they are becoming very popular…Beatlemania takes off. We can write songs; 1964: the rock and roll band as a creative force. John and Paul, their yin and yang-like personal and musical differences fueling their creative tension, discover that two heads are better than one. The Stones, meanwhile, keep cranking out covers, and plot their conquest of America, one riff at a time. The middle periods, 1965-66: For the boys from Liverpool, waves of brilliant albums that will last forever—every cut a memorable, sing-along winner. While for the Londoners, an artistic breakthrough with their first all--original record. Mick and Keith’s tempestuous relationship pushes away band founder Brian Jones; the Stones are established as a force in the music world. Prisoners of their own success, 1967-68: How their popularity drove them to great heights—and lowered them to awful depths. It’s a long way from three chords and a cloud of dust.
    [Show full text]
  • Recent Developments in Cybersecurity Melanie J
    American University Business Law Review Volume 2 | Issue 2 Article 1 2013 Fiddling on the Roof: Recent Developments in Cybersecurity Melanie J. Teplinsky Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the Law Commons Recommended Citation Teplinsky, Melanie J. "Fiddling on the Roof: Recent Developments in Cybersecurity." American University Business Law Review 2, no. 2 (2013): 225-322. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. ARTICLES FIDDLING ON THE ROOF: RECENT DEVELOPMENTS IN CYBERSECURITY MELANIE J. TEPLINSKY* TABLE OF CONTENTS Introduction .......................................... ..... 227 I. The Promise and Peril of Cyberspace .............. ........ 227 II. Self-Regulation and the Challenge of Critical Infrastructure ......... 232 III. The Changing Face of Cybersecurity: Technology Trends ............ 233 A. Mobile Technology ......................... 233 B. Cloud Computing ........................... ...... 237 C. Social Networking ................................. 241 IV. The Changing Face of Cybersecurity: Cyberthreat Trends ............ 244 A. Cybercrime ................................. ..... 249 1. Costs of Cybercrime
    [Show full text]
  • Hacks, Cracks, and Crime: an Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Missouri, St. Louis University of Missouri, St. Louis IRL @ UMSL Dissertations UMSL Graduate Works 11-22-2005 Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St. Louis, [email protected] Follow this and additional works at: https://irl.umsl.edu/dissertation Part of the Criminology and Criminal Justice Commons Recommended Citation Holt, Thomas Jeffrey, "Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers" (2005). Dissertations. 616. https://irl.umsl.edu/dissertation/616 This Dissertation is brought to you for free and open access by the UMSL Graduate Works at IRL @ UMSL. It has been accepted for inclusion in Dissertations by an authorized administrator of IRL @ UMSL. For more information, please contact [email protected]. Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers by THOMAS J. HOLT M.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2003 B.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2000 A DISSERTATION Submitted to the Graduate School of the UNIVERSITY OF MISSOURI- ST. LOUIS In partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY in Criminology and Criminal Justice August, 2005 Advisory Committee Jody Miller, Ph. D. Chairperson Scott H. Decker, Ph. D. G. David Curry, Ph. D. Vicki Sauter, Ph. D. Copyright 2005 by Thomas Jeffrey Holt All Rights Reserved Holt, Thomas, 2005, UMSL, p.
    [Show full text]
  • Star Channels, May 20-26
    MAY 20 - 26, 2018 staradvertiser.com LEGAL EAGLES Sandra’s (Britt Robertson) confi dence is shaken when she defends a scientist accused of spying for the Chinese government in the season fi nale of For the People. Elsewhere, Adams (Jasmin Savoy Brown) receives a compelling offer. Chief Judge Nicholas Byrne (Vondie Curtis-Hall) presides over the Southern District of New York Federal Court in this legal drama, which wraps up a successful freshman season. Airing Tuesday, May 22, on ABC. WE’RE LOOKING FOR PEOPLE WHO HAVE SOMETHING TO SAY. Are you passionate about an issue? An event? A cause? ¶ũe^eh\Zga^eirhn[^a^Zk][r^fihp^kbg`rhnpbmama^mkZbgbg`%^jnbif^gm olelo.org Zg]Zbkmbf^rhng^^]mh`^mlmZkm^]'Begin now at olelo.org. ON THE COVER | FOR THE PEOPLE Case closed ABC’s ‘For the People’ wraps Deavere Smith (“The West Wing”) rounds example of how the show delves into both the out the cast as no-nonsense court clerk Tina professional and personal lives of the charac- rookie season Krissman. ters. It’s a formula familiar to fans of Shonda The cast of the ensemble drama is now part Rhimes, who’s an executive producer of “For By Kyla Brewer of the Shondaland dynasty, which includes hits the People,” along with Davies, Betsy Beers TV Media “Grey’s Anatomy,” “Scandal” and “How to Get (“Grey’s Anatomy”), Donald Todd (“This Is Us”) Away With Murder.” The distinction was not and Tom Verica (“How to Get Away With here’s something about courtroom lost on Rappaport, who spoke with Murder”).
    [Show full text]
  • Ethical Hacking
    International Journal of Scientific and Research Publications, Volume 5, Issue 6, June 2015 1 ISSN 2250-3153 Ethical Hacking Susidharthaka Satapathy , Dr.Rasmi Ranjan Patra CSA, CPGS, OUAT, Bhubaneswar, Odisha, India Abstract- In today's world where the information damaged the target system nor steal the information, they communication technique has brought the world together there is evaluate target system security and report back to the owner one of the increase growing areas is security of network ,which about the threats found. certainly generate discussion of ETHICAL HACKING . The main reason behind the discussion of ethical hacking is insecurity of the network i.e. hacking. The need of ethical hacking is to IV. FATHER OF HACKING protect the system from the damage caused by the hackers. The In 1971, John Draper , aka captain crunch, was one of the main reason behind the study of ethical hacking is to evaluate best known early phone hacker & one of the few who can be target system security & report back to owner. This paper helps called one of the father's of hacking. to generate a brief idea of ethical hacking & all its aspects. Index Terms- Hacker, security, firewall, automated, hacked, V. IS HACKING NECESSARY crackers Hacking is not what we think , It is an art of exploring the threats in a system . Today it sounds something with negative I. INTRODUCTION shade , but it is not exactly that many professionals hack system so as to learn the deficiencies in them and to overcome from it he increasingly growth of internet has given an entrance and try to improve the system security.
    [Show full text]
  • Research Paper
    Section 3 – Information Systems Security & Web Technologies and Security Social Engineering: A growing threat, with diverging directions J.V.Chelleth1, S.M.Furnell1, M.Papadaki2, G.Pinkney2 and P.S.Dowland1 1 Network Research Group, University of Plymouth, Plymouth, United Kingdom 2 Symantec, Hines Meadow, St Cloud Way, Maidenhead, Berkshire, United Kingdom e-mail: [email protected] Abstract The age old problem of social engineering is still a threat that does not receive due attention. Due to the advancements in information technology and the explosion of the Internet, attackers have many more avenues to pursue social engineering attacks. Inadequate efforts to educate employees and staff about social engineering and password management, inappropriate usage of messaging systems, poor implementation and awareness of security policies, all lead to people being exposed to potential incidents. This paper talks about social engineering and the new avenues that it has diverged into; and how social engineering plays a part in assisting other attack schemes. The paper first introduces the concept of social engineering. It then looks at different attack methods that have proliferated due to the help obtained by social engineering schemes. The paper establishes that, in addition to being a technique in its own right, social engineering can also be used to assist other types of attack, including viruses and worms, phishing, and identity theft. Keywords Social Engineering, Viruses, Worms, Identity theft, Phishing 1. Introduction Typically when security is spoken of in terms of information security, it is all about having secure systems and networks; anti-virus, firewalls, Intrusion Detection Systems (IDS), etc.
    [Show full text]
  • Strategies of Computer Worms
    304543_ch09.qxd 1/7/05 9:05 AM Page 313 CHAPTER 9 Strategies of Computer Worms “Worm: n., A self-replicating program able to propagate itself across network, typically having a detrimental effect.” —Concise Oxford English Dictionary, Revised Tenth Edition 313 304543_ch09.qxd 1/7/05 9:05 AM Page 314 Chapter 9—Strategies of Computer Worms 9.1 Introduction This chapter discusses the generic (or at least “typical”) structure of advanced computer worms and the common strategies that computer worms use to invade new target systems. Computer worms primarily replicate on networks, but they represent a subclass of computer viruses. Interestingly enough, even in security research communities, many people imply that computer worms are dramatically different from computer viruses. In fact, even within CARO (Computer Antivirus Researchers Organization), researchers do not share a common view about what exactly can be classified as a “worm.” We wish to share a common view, but well, at least a few of us agree that all computer worms are ultimately viruses1. Let me explain. The network-oriented infection strategy is indeed a primary difference between viruses and computer worms. Moreover, worms usually do not need to infect files but propagate as standalone programs. Additionally, several worms can take con- trol of remote systems without any help from the users, usually exploiting a vul- nerability or set of vulnerabilities. These usual characteristics of computer worms, however, do not always hold. Table 9.1 shows several well-known threats. Table
    [Show full text]
  • Paradise Lost , Book III, Line 18
    _Paradise Lost_, book III, line 18 %%%%%%%%%%%%%%%%%%%%%%%% ++++++++++Hacker's Encyclopedia++++++++ ===========by Logik Bomb (FOA)======== <http://www.xmission.com/~ryder/hack.html> ---------------(1997- Revised Second Edition)-------- ##################V2.5################## %%%%%%%%%%%%%%%%%%%%%%%% "[W]atch where you go once you have entered here, and to whom you turn! Do not be misled by that wide and easy passage!" And my Guide [said] to him: "That is not your concern; it is his fate to enter every door. This has been willed where what is willed must be, and is not yours to question. Say no more." -Dante Alighieri _The Inferno_, 1321 Translated by John Ciardi Acknowledgments ---------------------------- Dedicated to all those who disseminate information, forbidden or otherwise. Also, I should note that a few of these entries are taken from "A Complete List of Hacker Slang and Other Things," Version 1C, by Casual, Bloodwing and Crusader; this doc started out as an unofficial update. However, I've updated, altered, expanded, re-written and otherwise torn apart the original document, so I'd be surprised if you could find any vestiges of the original file left. I think the list is very informative; it came out in 1990, though, which makes it somewhat outdated. I also got a lot of information from the works listed in my bibliography, (it's at the end, after all the quotes) as well as many miscellaneous back issues of such e-zines as _Cheap Truth _, _40Hex_, the _LOD/H Technical Journals_ and _Phrack Magazine_; and print magazines such as _Internet Underground_, _Macworld_, _Mondo 2000_, _Newsweek_, _2600: The Hacker Quarterly_, _U.S. News & World Report_, _Time_, and _Wired_; in addition to various people I've consulted.
    [Show full text]
  • The Norman Book on Computer Viruses Ii Z the Norman Book on Computer Viruses
    The Norman Book on Computer Viruses ii z The Norman Book on Computer Viruses Norman ASA is not liable for any other form of loss or damage arising from use of the documentation or from errors or deficiencies therein, including but not limited to loss of earnings. In particular, and without the limitations imposed by the licensing agreement with regard to any special use or purpose, Norman ASA will in no event be liable for loss of profits or other commercial damage including but not limited to incidental or consequential damages. The information in this document as well as the functionality of the software is subject to change without notice. No part of this documentation may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording or information storage and retrieval systems, for any purpose other than the purchaser's personal use, without the explicit written permission of Norman ASA. Contributors to The Norman Book on Viruses: Snorre Fagerland, Sylvia Moon, Kenneth Walls, Carl Bretteville Edited by Camilla Jaquet and Yngve Ness The Norman logo is a registered trademark of Norman ASA. Names of products mentioned in this documentation are either trademarks or registered trademarks of their respective owners. They are mentioned for identification purposes only. Norman documentation is Copyright © 1990-2002 Norman ASA. All rights reserved. October 2001 Copyright © 1990-2002 Norman z iii Norman Offices Norman Data Defense Systems Pty Ltd 6 Sarton Road, Clayton, Victoria, 3168 Australia. Tel: +61 3 9562 7655 Fax: +61 3 9562 9663 E-mail: [email protected] Web: http://www.norman.com.au Norman Data Defense Systems A/S Dronningensgade 23, DK-5000 Odense C, Denmark Tel.
    [Show full text]
  • UTTARAKHAND OPEN UNIVERSITY Teen Pani Bypass Road, Near Transport Nagar, Haldwani -263139 Phone No- 05946 - 261122, 261123 Toll Free No
    CYBER CRIMES AND CONSUMER PROTECTION IN CYBERSPACE CYL-104 [1] CYL- 104 Cyber Crimes And Consumer Protection in Cyber Space School of Law UTTARAKHAND OPEN UNIVERSITY Teen Pani Bypass Road, Near Transport Nagar, Haldwani -263139 Phone No- 05946 - 261122, 261123 Toll Free No. 18001804025 Fax No.- 05946-264232, Email- [email protected], http://uou.ac.in Uttarakhand Open University CYBER CRIMES AND CONSUMER PROTECTION IN CYBERSPACE CYL-104 [2] BOARD OF STUDIES Professor Girija Prasad Pande, Director, School of Law, Uttarakhand Open University, Haldwani, Nainital. Professor J.S.Bisht, Faculty of Law,S.S. Jeena Campus, Almora,Kumaun University, Nainital, Uttarakhand. Professor B.P. Maithani, Former RTI Advisor, Government of Uttarakhand Mr. Deepankur Joshi, Coordinator School of Law, Uttarakhand Open University, Haldwani, (Nainital). UNIT WRITING UNIT WRITERS UNIT [1] Dr. Razit Sharma, Assistant Professor, Unit- 1,2,3,4 Law College, Uttaranchal University, Dehradun Uttarakhand [2] Ms. Sapna Agarwal, Advocate High Court of Uttarakhand, Unit- 5,6,7 Nainital [3 Mr. Rajeev Bhatt, Advocate High Court of Uttarakhand, Ex. RTI Advisor Kumaun University Nainital, Ex. Assistant Professor Unity Unit- 8 ,9,10 Law College Rudrapur [4] Dr. Sushim Shukla, Assistant Professor, Unit- 11, 12, 13 Law College, Uttaranchal University, Dehradun Uttarakhand EDITOR Mr. Deepankur Joshi, Coordinator, School of Law, Uttarakhand Open University, Haldwani, (Nainital) Copyright © Uttarakhand Open University, Haldwani, Nainital Edition- 2018, Pre Publication copy for Limited Circulation ISBN- Publication- Directorate of Studies and Publication, Uttarakhand Open University, Haldwani, Nainital. E- Mail: [email protected] . Uttarakhand Open University CYBER CRIMES AND CONSUMER PROTECTION IN CYBERSPACE CYL-104 [3] POST GRADUATE DIPLOMA IN CYBER LAW CYL- 104 CYBERCRIMES AND CONSUMER PROTECTION IN CYBER SPACE INDEX S.
    [Show full text]
  • Copy 82 of DOC016
    .. The Where Fools Fear Techers Rush In ... CALIFORNIA To Tread!! Copyright 1970 by the Associated Students of the California Institute of Technology, Incorporated. Volume LXXI Pasadena, California, Thursday, April 23, 1970 Number 25 New Divorce Laws, Outside World Topics Low Pollution Car Project For YMCA Programs. Progressing Despite Strike by Emden Gansner Next week the Caltech YMCA is sponsoring two informative and Low Pollution Car Project leader using a catalytic reactor in the relevant talks and question sessions. Mike Lineberry announced that the exhaust stream and other smog One will concern the new divorce American Motors Hornet is ex­ cutting devices. laws, and the other, given by an pected to arrive as soon as the Two Engines, Too ex-Techer, will be abc what a wildcat truckers' strike is settled. The modifications of the engine Tech graduate can do vnce he The car, which will be converted to are being directed by Malllon enters into the real world. use compressed natural gas as a fuel Easterling, a JPL engineer, and Judge Lester Olson, continuing for the upcoming Urban Car James Henry, a student. They will the Y's "Crisis in Our Legal Competition, has been delayed have a duplicate engine set-up in the System" program, will give an Olive almost two weeks by the truckers' Engine Laboratory in the Spaulding Walk talk next Wednesday at 11 :45. POPULATION POLLUTION? This was the scene last Saturday morning as 1000 walkout. sub-basement. In this way, mod­ His talk will concern the develop­ high school students invaded Caltech for Students Day.
    [Show full text]