(Dallas Morning News, 29 March) American businesses are struggling to fill security positions because few IT workers have the skills needed to keep Web sites safe, experts say. Only a handful of universities offer courses or programs in the field. Many people who work in Internet security come from the military or other federal agencies that police cyberspace. Others have learned what they know on the job. And some companies hire "white-hat" hackers who break into systems not to do harm, but to reveal security vulnerabilities. Experts expect more people to enter the field this year, partly because security professionals' salaries are soaring. Many corporations are trying to retrain employees to learn security skills, and recruiting these professionals from the outside will remain hard and costly. (Hacker News Network, 29 March) "@tlana.com," a computer enthusiasts convention (also termed a "hacking/phreaking convention" by Hacker News), is being hosted by the South Eastern 2600 groups in Atlanta, Georgia. It will be held this Friday, Saturday, and Sunday at The Ramada Inn and Conference Center in Midtown Atlanta. It is described at its Web site as a place to learn more about alternative operating systems, a chance to show the public what true hacking is all about, and a place for recruiters and future employees to network. Additional information can be found at <www.atlantacon.org>. (Newsbytes, 29 March) With virtually every major federal agency receiving failing grades on computer security, the GAO on Wednesday became the latest voice calling for a single federal chief information officer (CIO) to oversee the maintenance of federal Web sites and computer networks. The GAO believes that other aspects of government computer systems - including general architecture concerns and information technology investment management - play just as important a role in ensuring network security. According to GAO, at present, no one is accountable for this, and it's not believed that repair of this computer security crisis will be seen until that occurs. (Wired News/ABC News, 29 March) According to multiple media sources, a 19-year-old Houston cracker has agreed to plead guilty to one count of conspiracy for teleconferencing fraud and computer cracking in one of the government's most notorious cyber crime cases, court documents show. Patrick W. Gregory, better known in Internet circles by his alias, MostHateD, is expected to plead guilty sometime next week in U.S. District Court for the Northern District of Texas for his role as a founding member of a hacking ring called globalHell. globalHell is said to have caused at least $1.5 million in damages to various U.S. corporations and government entities, including the White House and the U.S. Army. (FBIS, 29 March) South Korea supreme public prosecutor's office said Wednesday that it has launched an advisory committee to investigate cyber crimes. Commissioning 13 computer experts including Charles Ahn of Dr. Ahn's anti- virus laboratories as advisors, prosecutor General Park Soon-Yong stressed the importance of operation between prosecutors and experts. "Cooperation is important in preventing the growing number of cyber crimes that is causing disturbances in the intellectual and information society," Park said. The committee will provide consulting in mapping out policies related to training computer investigation officials and development of investigation methods, and strengthen cooperation among scholars, computer industry people and related agencies officials. (The Register UK, 30 March) London police are warning banks to look out for cyber terrorist when recruiting staff. Anarchist sympathizers may try to infiltrate companies and sabotage computer systems to help the anti-City protests expected in May, a senior crime prevention officer said. Job applicants who support aims of anarchist umbrella group People's Global Action might help demonstrators enter company building during the forthcoming Stop the City protests. Alternatively, they could insert viruses in computer files or leak passwords to let hackers penetrate computer systems. (Newsbytes, 31 March) F-Secure has issued a warning to its customers about two new wide spread worms, Irok and Kak, that could pose a danger to PC users around the world. The IT security firm said that the two new e-mail worms are currently spreading rapidly in several locations around the world. The Irok and Kak worms are problematic in that they spread via e-mail as electronic chain letters, much like the infamous Melissa virus did exactly a year ago. The worms operate in very different ways, F-Secure said, but both spread via Microsoft Outlook e-mail. The biggest difference to the end user, the firm said, is that Irok arrives in an attachment called IROK.EXE, while Kak arrives in a normal e-mail that apparently has no attachment at all. (Newsbytes, 31 March) A leading privacy advocate attacked the proposed plan of the Securities and Exchange Commission (SEC) to create an automated surveillance system to search Web sites and message boards for investment fraud. The plan announced by the SEC would involve the government agency scanning the Internet for content containing certain "red-flagged" key works or phrases. If found, members of the SEC's newly expanded "Cyberforce" would actually read the content to see if it contained, or led to, evidence of a violation of federal securities law. The technology that the SEC proposes to use is not new. It has been used for years by various clandestine agencies, such as the NSA to monitor international telephone, fax, and data traffic. However, it appears that the proposed use by the SEC of monitoring technology would be the first openly acknowledged use of surveillance directed against American citizens conduct occurring in this country. (FBIS, 30 March) A survey conducted by the Organizers of a Congress of Computer Hackers, which ended yesterday, revealed that 28 percent of Israeli Internet sites are vulnerable to hacking. The survey was carried out over all Israeli Internet addresses, including businesses, Internet providers, universities and others. Testers attempted to penetrate 25,560 Israeli sites, of which 7,519 sites were found to be vulnerable. IMPORTANT NOTICE: If you are not using HushMail, this message could have been read easily by the many people who have access to your open personal email messages. Get your FREE, totally secure email address at http://www.hushmail.com.

