SlideShare a Scribd company logo
03/21/2006 09:18 AMAs Japanese Bring Work Home, Virus Hitches a Ride - Los Angeles Times
Page 1 of 2http://www.latimes.com/news/nationworld/world/la-fg-computer21mar21,0,5159274.story?track=tottext
WEATHER TRAFFICJOBS CARS REAL ESTATE APARTMENTS SHOPPING
A D V E R T I S E M E N T
search 6:17 AM PST, March 21, 2006
World News Print E -mail story Most e -mailed Change text size
As Japanese Bring Work Home, Virus Hitches a
Ride
By Bruce Wallace, Times Staff Writer
March 21, 2006
TOKYO — So far it has spilled military secrets and the private phone numbers of TV
stars, airport security access codes and elementary school children's grades.
And the dirty work of this computer virus may not be done.
With almost daily reports of more
private information being pumped
from personal computers and
splashed over the Internet, there is
a growing unease that Japan is
under insidious attack from within.
The culprit is a digital worm that
infects computers using the file-
sharing Winny software, a
Japanese computer program that,
like the infamous Napster, was
designed to allow people to easily
swap music and movie files.
Normally such leaks would mean
nothing more serious than acute
embarrassment to victims whose
personal photographs or private
video collection gets uploaded onto the Web for anyone to see. But the particular
danger of this virus, dubbed Antinny, stems from the fact that it has exploited what turns
out to be a bad Japanese habit.
This is a country where millions of people are taking their work home with them. On
personal computers.
Soldiers and securities traders, doctors and cops in Japan have become accustomed to
loading job-related data onto their personal computers to work after hours. But with
many of those computers also running Winny software, chunks of confidential data have
been surreptitiously leaked online, where they are extremely difficult to expunge.
The list of betrayed secrets is long and getting longer: personal details of 10,000
prisoners from a Kyoto prison officer's computer; information about crime victims,
informants and statements from suspects uploaded from a policeman's home computer;
access codes to 29 airports from an airline pilot's PC; and the details of surgical
procedures on 2,800 patients at a private hospital from the computer of a clerk. All
have found their way onto the Internet.
No one knows who developed the virus, though different versions of Antinny have been
attacking computers for at least two years.
"The issue is not the quality of the virus," says Takefumi Tanabe, a software advisor at
Japan's Ministry of Economy, Trade and Industry. "The issue is the quality of the
information being leaked."
Perhaps most embarrassing have been the leaks from Japan's Self-Defense Forces,
including data on surface-to-air missile tests and details of "Battle Scenario Training" for
a simulated crisis on a transparently code-named "K Peninsula."
The military reacted by ordering all personnel to remove Winny from their home
computers and to stop taking military data home with them. That widespread practice
within the military was caused by a shortage of computers, and defense officials said
they would immediately buy 56,000 computers to help separate work from home use.
MORE WORLD NEWS
- Attack of the Pandas
- Some U.S. Officials Fear Iran Is Helping Al Qaeda
- As Japanese Bring Work Home, Virus Hitches a
Ride
- Economic Ties to Top Agenda at Hu-Putin Talks
- Pressure Mounts on Thai Leader
MOST E-MAILED
- Exuberance of L.A. Marathon Tempered by
Runners' Deaths
- For Home Loan Broker, Troubles Come With
Creative Refinancing
- The healing canvas
E-MAIL: News sent directly to you.
RSS: Pick the topics, create your page.
WIRELESS: L.A. Times any time, anywhere on your
mobile device.
PODCASTS: Tune in to The Envelope.
A D V E R T I S E M E N T
HOME
Site Map
World
NEWS
California | Local
National
World
Entertainment News
Business
Sports
Politics
Opinion
Columnists
Print Edition
What is RSS?
Calendarlive
Travel
West Magazine
House & Home
Health
Food
Car Culture
Obituaries
Crossword, Sudoku
All Sections
Corrections
BUY, SELL & MORE
Jobs
Cars
Real Estate
Apartments
Personals
Deals at Local
Stores
Coupons
Newspaper Ads
PLACE AN AD
MEMBER SERVICES
Hi, Frank
Log Out
Help
Contact Us
L.A. Times Archives
Customized News
E -mail Newsletters
HOME DELIVERY
Customer Support
Subscribe to L.A.
Times
03/21/2006 09:18 AMAs Japanese Bring Work Home, Virus Hitches a Ride - Los Angeles Times
Page 2 of 2http://www.latimes.com/news/nationworld/world/la-fg-computer21mar21,0,5159274.story?track=tottext
The Winny software is not illegal to download and install. But if the music or video files
being shared are protected by copyright, users can be prosecuted.
In 2003, two users were jailed and prosecuted. Shortly thereafter, in May 2004, Kyoto
police arrested Isamu Kaneko, now 34, an assistant professor at the University of Tokyo
who had developed the peer-to-peer software two years earlier. He has been out on
bail since June 2004, and his trial is ongoing. Facing up to three years in prison, he has
become a martyr for advocates of an unfettered Internet.
Several technology companies have been developing anti-virus software for Winny, and
the government has set up a hotline with dozens of experts available to take questions
on how to rid PCs of it. But fears of more sensitive information flowing from home
computers to the Internet prompted Shinzo Abe, the chief Cabinet secretary and second
most powerful politician in government, to urge the Japanese public last week to stop
using Winny altogether.
"We won't be able to prevent information leaking unless every citizen is watchful and
takes appropriate measures," Abe said. "The surest measure is not to use Winny."
Among those taking note are Japanese police departments, which have been
embarrassed to admit that many of their officers stored police information on personal
computers running Winny.
"Winny is a software that has been charged with breaching copyright rules, and to install
that program into their own computers and use it means members of the police force
are lacking in understanding of their own roles," National Police Agency head Iwao
Urushima said at a news conference this month.
The agency ordered its officers to stop using their own computers for work. One local
police chief ordered his officers to sign a pledge that they wouldn't use Winny.
But Kaneko, Winny's developer, says he has the solution to everyone's problems: an
anti-virus patch that he claims to have developed and is trying to patent.
The only hitch: He is still in court, fighting his case.
"If I hadn't been arrested, I could have dealt with it," he said outside the Kyoto
courtroom this month. "And this problem wouldn't have happened."
Hisako Ueno of The Times' Tokyo Bureau contributed to this report.
MOST E-MAILED
- Exuberance of L.A. Marathon Tempered by
Runners' Deaths
- For Home Loan Broker, Troubles Come
With Creative Refinancing
- The healing canvas
MORE WORLD NEWS
- Attack of the Pandas
- Some U.S. Officials Fear Iran Is Helping
Al Qaeda
- As Japanese Bring Work Home, Virus
Hitches a Ride
Ads by Google
Japanese Singles
Many Hot Japanese Singles Listed Here. Find Your Right Match.
www.HeartDetectives.com
Japanese Brides
Beautiful Japanese ladies seek dating and marriage. Join free.
www.JapanCupid.com
GSM World Phone
International Service - $35/week 1st Week Free - Order Today!
WorldCell.com
Japanese Website
Free to Join. 1000's of pictures of Beautiful Japanese singles
www.AsianPeopleMeet.com
Tokyo cheap accommodation
Over 1000 furnished rooms from 35,000 yen / month in central Tokyo
www.sakura-house.com
PARTNERS: Copyright 2006 Los Angeles Times | Privacy Policy | Terms of Service | Advertise | Home Delivery | Permissions | Contact

More Related Content

What's hot

Cyber Crime Statistics and Trends in COVID-19 Pandemic and Post Pandemic
Cyber Crime Statistics and Trends in COVID-19 Pandemic and Post PandemicCyber Crime Statistics and Trends in COVID-19 Pandemic and Post Pandemic
Cyber Crime Statistics and Trends in COVID-19 Pandemic and Post Pandemic
Umang Singh
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
Callum Craigie
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
Sheher Bano
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
UltraUploader
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
Shumail Tariq
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
Instant Checkmate
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
Anchalanshri Dixit
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
Can R. PAHALI
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp update
yahooteacher
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
atifkhanniazi
 
The snooping dragon: social-malware surveillance of the Tibetan movement
The snooping dragon: social-malware surveillance  of the Tibetan movementThe snooping dragon: social-malware surveillance  of the Tibetan movement
The snooping dragon: social-malware surveillance of the Tibetan movement
guesta33b66
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
Murray Security Services
 
Facebook
FacebookFacebook
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
rinushalu
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
Jonathan Alley
 
Oni Iran 2009
Oni Iran 2009Oni Iran 2009
Oni Iran 2009
gueste19b2e7f
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
Microsoft Asia
 
Delincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésDelincuencia Cibernética- Inglés
Delincuencia Cibernética- Inglés
Gim Andrade Vidal
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
Karnika Seth
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
Beza Belayneh
 

What's hot (20)

Cyber Crime Statistics and Trends in COVID-19 Pandemic and Post Pandemic
Cyber Crime Statistics and Trends in COVID-19 Pandemic and Post PandemicCyber Crime Statistics and Trends in COVID-19 Pandemic and Post Pandemic
Cyber Crime Statistics and Trends in COVID-19 Pandemic and Post Pandemic
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp update
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
The snooping dragon: social-malware surveillance of the Tibetan movement
The snooping dragon: social-malware surveillance  of the Tibetan movementThe snooping dragon: social-malware surveillance  of the Tibetan movement
The snooping dragon: social-malware surveillance of the Tibetan movement
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
Facebook
FacebookFacebook
Facebook
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
 
Oni Iran 2009
Oni Iran 2009Oni Iran 2009
Oni Iran 2009
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 
Delincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésDelincuencia Cibernética- Inglés
Delincuencia Cibernética- Inglés
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
 

Similar to As japanese bring work home, virus hitches a ride

2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
Raj Goel
 
News letter aug 11
News letter aug 11News letter aug 11
News letter aug 11
captsbtyagi
 
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
smile790243
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
ericbrooks84875
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
cowinhelen
 
News bytes-July 2013
News bytes-July 2013News bytes-July 2013
News bytes-July 2013
n|u - The Open Security Community
 
Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question con
simba35
 
2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)
Felipe Prado
 
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
aesalem06
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
Kunihiro Maeda
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
Jody Sullivan
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
sunnysmith
 
Digital footprints (preview)
Digital footprints (preview)Digital footprints (preview)
Digital footprints (preview)
Neeraj Mahajan
 
2013 01-14
2013 01-142013 01-14
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docx
Amir Khan
 
Top 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowTop 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till now
Abdullah Khosa
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
Комсс Файквэе
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
FalconPeregrine1
 
Rfl dfn internetact2
Rfl dfn internetact2Rfl dfn internetact2
Rfl dfn internetact2
Lebowitzcomics
 
L Scope
L ScopeL Scope
L Scope
CTIN
 

Similar to As japanese bring work home, virus hitches a ride (20)

2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
News letter aug 11
News letter aug 11News letter aug 11
News letter aug 11
 
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
 
News bytes-July 2013
News bytes-July 2013News bytes-July 2013
News bytes-July 2013
 
Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question con
 
2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)
 
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Digital footprints (preview)
Digital footprints (preview)Digital footprints (preview)
Digital footprints (preview)
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docx
 
Top 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowTop 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till now
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 
Rfl dfn internetact2
Rfl dfn internetact2Rfl dfn internetact2
Rfl dfn internetact2
 
L Scope
L ScopeL Scope
L Scope
 

More from UltraUploader

01 le 10 regole dell'hacking
01   le 10 regole dell'hacking01   le 10 regole dell'hacking
01 le 10 regole dell'hackingUltraUploader
 
00 the big guide sz (by dr.to-d)
00   the big guide sz (by dr.to-d)00   the big guide sz (by dr.to-d)
00 the big guide sz (by dr.to-d)UltraUploader
 
[E book ita] php manual
[E book   ita] php manual[E book   ita] php manual
[E book ita] php manual
UltraUploader
 
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...UltraUploader
 
[Ebook ita - database] access 2000 manuale
[Ebook   ita - database] access 2000 manuale[Ebook   ita - database] access 2000 manuale
[Ebook ita - database] access 2000 manualeUltraUploader
 
(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)UltraUploader
 
(Ebook ita - inform - access) guida al database access (doc)
(Ebook   ita - inform - access) guida al database access (doc)(Ebook   ita - inform - access) guida al database access (doc)
(Ebook ita - inform - access) guida al database access (doc)UltraUploader
 
(Ebook computer - ita - pdf) fondamenti di informatica - teoria
(Ebook   computer - ita - pdf) fondamenti di informatica - teoria(Ebook   computer - ita - pdf) fondamenti di informatica - teoria
(Ebook computer - ita - pdf) fondamenti di informatica - teoriaUltraUploader
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitor
UltraUploader
 
Botnetsand applications
Botnetsand applicationsBotnetsand applications
Botnetsand applications
UltraUploader
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
UltraUploader
 
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
UltraUploader
 
Blast off!
Blast off!Blast off!
Blast off!
UltraUploader
 
Bird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassemblyBird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassembly
UltraUploader
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer viruses
UltraUploader
 
Biological versus computer viruses
Biological versus computer virusesBiological versus computer viruses
Biological versus computer viruses
UltraUploader
 
Biological aspects of computer virology
Biological aspects of computer virologyBiological aspects of computer virology
Biological aspects of computer virology
UltraUploader
 
Biological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksBiological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networks
UltraUploader
 

More from UltraUploader (20)

1 (1)
1 (1)1 (1)
1 (1)
 
01 intro
01 intro01 intro
01 intro
 
01 le 10 regole dell'hacking
01   le 10 regole dell'hacking01   le 10 regole dell'hacking
01 le 10 regole dell'hacking
 
00 the big guide sz (by dr.to-d)
00   the big guide sz (by dr.to-d)00   the big guide sz (by dr.to-d)
00 the big guide sz (by dr.to-d)
 
[E book ita] php manual
[E book   ita] php manual[E book   ita] php manual
[E book ita] php manual
 
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
 
[Ebook ita - database] access 2000 manuale
[Ebook   ita - database] access 2000 manuale[Ebook   ita - database] access 2000 manuale
[Ebook ita - database] access 2000 manuale
 
(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)
 
(Ebook ita - inform - access) guida al database access (doc)
(Ebook   ita - inform - access) guida al database access (doc)(Ebook   ita - inform - access) guida al database access (doc)
(Ebook ita - inform - access) guida al database access (doc)
 
(Ebook computer - ita - pdf) fondamenti di informatica - teoria
(Ebook   computer - ita - pdf) fondamenti di informatica - teoria(Ebook   computer - ita - pdf) fondamenti di informatica - teoria
(Ebook computer - ita - pdf) fondamenti di informatica - teoria
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitor
 
Botnetsand applications
Botnetsand applicationsBotnetsand applications
Botnetsand applications
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
 
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
 
Blast off!
Blast off!Blast off!
Blast off!
 
Bird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassemblyBird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassembly
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer viruses
 
Biological versus computer viruses
Biological versus computer virusesBiological versus computer viruses
Biological versus computer viruses
 
Biological aspects of computer virology
Biological aspects of computer virologyBiological aspects of computer virology
Biological aspects of computer virology
 
Biological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksBiological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networks
 

As japanese bring work home, virus hitches a ride

  • 1. 03/21/2006 09:18 AMAs Japanese Bring Work Home, Virus Hitches a Ride - Los Angeles Times Page 1 of 2http://www.latimes.com/news/nationworld/world/la-fg-computer21mar21,0,5159274.story?track=tottext WEATHER TRAFFICJOBS CARS REAL ESTATE APARTMENTS SHOPPING A D V E R T I S E M E N T search 6:17 AM PST, March 21, 2006 World News Print E -mail story Most e -mailed Change text size As Japanese Bring Work Home, Virus Hitches a Ride By Bruce Wallace, Times Staff Writer March 21, 2006 TOKYO — So far it has spilled military secrets and the private phone numbers of TV stars, airport security access codes and elementary school children's grades. And the dirty work of this computer virus may not be done. With almost daily reports of more private information being pumped from personal computers and splashed over the Internet, there is a growing unease that Japan is under insidious attack from within. The culprit is a digital worm that infects computers using the file- sharing Winny software, a Japanese computer program that, like the infamous Napster, was designed to allow people to easily swap music and movie files. Normally such leaks would mean nothing more serious than acute embarrassment to victims whose personal photographs or private video collection gets uploaded onto the Web for anyone to see. But the particular danger of this virus, dubbed Antinny, stems from the fact that it has exploited what turns out to be a bad Japanese habit. This is a country where millions of people are taking their work home with them. On personal computers. Soldiers and securities traders, doctors and cops in Japan have become accustomed to loading job-related data onto their personal computers to work after hours. But with many of those computers also running Winny software, chunks of confidential data have been surreptitiously leaked online, where they are extremely difficult to expunge. The list of betrayed secrets is long and getting longer: personal details of 10,000 prisoners from a Kyoto prison officer's computer; information about crime victims, informants and statements from suspects uploaded from a policeman's home computer; access codes to 29 airports from an airline pilot's PC; and the details of surgical procedures on 2,800 patients at a private hospital from the computer of a clerk. All have found their way onto the Internet. No one knows who developed the virus, though different versions of Antinny have been attacking computers for at least two years. "The issue is not the quality of the virus," says Takefumi Tanabe, a software advisor at Japan's Ministry of Economy, Trade and Industry. "The issue is the quality of the information being leaked." Perhaps most embarrassing have been the leaks from Japan's Self-Defense Forces, including data on surface-to-air missile tests and details of "Battle Scenario Training" for a simulated crisis on a transparently code-named "K Peninsula." The military reacted by ordering all personnel to remove Winny from their home computers and to stop taking military data home with them. That widespread practice within the military was caused by a shortage of computers, and defense officials said they would immediately buy 56,000 computers to help separate work from home use. MORE WORLD NEWS - Attack of the Pandas - Some U.S. Officials Fear Iran Is Helping Al Qaeda - As Japanese Bring Work Home, Virus Hitches a Ride - Economic Ties to Top Agenda at Hu-Putin Talks - Pressure Mounts on Thai Leader MOST E-MAILED - Exuberance of L.A. Marathon Tempered by Runners' Deaths - For Home Loan Broker, Troubles Come With Creative Refinancing - The healing canvas E-MAIL: News sent directly to you. RSS: Pick the topics, create your page. WIRELESS: L.A. Times any time, anywhere on your mobile device. PODCASTS: Tune in to The Envelope. A D V E R T I S E M E N T HOME Site Map World NEWS California | Local National World Entertainment News Business Sports Politics Opinion Columnists Print Edition What is RSS? Calendarlive Travel West Magazine House & Home Health Food Car Culture Obituaries Crossword, Sudoku All Sections Corrections BUY, SELL & MORE Jobs Cars Real Estate Apartments Personals Deals at Local Stores Coupons Newspaper Ads PLACE AN AD MEMBER SERVICES Hi, Frank Log Out Help Contact Us L.A. Times Archives Customized News E -mail Newsletters HOME DELIVERY Customer Support Subscribe to L.A. Times
  • 2. 03/21/2006 09:18 AMAs Japanese Bring Work Home, Virus Hitches a Ride - Los Angeles Times Page 2 of 2http://www.latimes.com/news/nationworld/world/la-fg-computer21mar21,0,5159274.story?track=tottext The Winny software is not illegal to download and install. But if the music or video files being shared are protected by copyright, users can be prosecuted. In 2003, two users were jailed and prosecuted. Shortly thereafter, in May 2004, Kyoto police arrested Isamu Kaneko, now 34, an assistant professor at the University of Tokyo who had developed the peer-to-peer software two years earlier. He has been out on bail since June 2004, and his trial is ongoing. Facing up to three years in prison, he has become a martyr for advocates of an unfettered Internet. Several technology companies have been developing anti-virus software for Winny, and the government has set up a hotline with dozens of experts available to take questions on how to rid PCs of it. But fears of more sensitive information flowing from home computers to the Internet prompted Shinzo Abe, the chief Cabinet secretary and second most powerful politician in government, to urge the Japanese public last week to stop using Winny altogether. "We won't be able to prevent information leaking unless every citizen is watchful and takes appropriate measures," Abe said. "The surest measure is not to use Winny." Among those taking note are Japanese police departments, which have been embarrassed to admit that many of their officers stored police information on personal computers running Winny. "Winny is a software that has been charged with breaching copyright rules, and to install that program into their own computers and use it means members of the police force are lacking in understanding of their own roles," National Police Agency head Iwao Urushima said at a news conference this month. The agency ordered its officers to stop using their own computers for work. One local police chief ordered his officers to sign a pledge that they wouldn't use Winny. But Kaneko, Winny's developer, says he has the solution to everyone's problems: an anti-virus patch that he claims to have developed and is trying to patent. The only hitch: He is still in court, fighting his case. "If I hadn't been arrested, I could have dealt with it," he said outside the Kyoto courtroom this month. "And this problem wouldn't have happened." Hisako Ueno of The Times' Tokyo Bureau contributed to this report. MOST E-MAILED - Exuberance of L.A. Marathon Tempered by Runners' Deaths - For Home Loan Broker, Troubles Come With Creative Refinancing - The healing canvas MORE WORLD NEWS - Attack of the Pandas - Some U.S. Officials Fear Iran Is Helping Al Qaeda - As Japanese Bring Work Home, Virus Hitches a Ride Ads by Google Japanese Singles Many Hot Japanese Singles Listed Here. Find Your Right Match. www.HeartDetectives.com Japanese Brides Beautiful Japanese ladies seek dating and marriage. Join free. www.JapanCupid.com GSM World Phone International Service - $35/week 1st Week Free - Order Today! WorldCell.com Japanese Website Free to Join. 1000's of pictures of Beautiful Japanese singles www.AsianPeopleMeet.com Tokyo cheap accommodation Over 1000 furnished rooms from 35,000 yen / month in central Tokyo www.sakura-house.com PARTNERS: Copyright 2006 Los Angeles Times | Privacy Policy | Terms of Service | Advertise | Home Delivery | Permissions | Contact