[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips May 13, 2002
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, CSSP <cssp@xxxxxxx>;, glee@xxxxxxxxxxxxx;, Charlie Oriez <coriez@xxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, computer_security_day@xxxxxxx;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;;
- Subject: Clips May 13, 2002
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Mon, 13 May 2002 10:18:30 -0400
- Cc: lillie@xxxxxxx
Clips May 13, 2002
ARTICLES
Credit Card Theft Thrives Online as Global Market Losses Grow
Rambus faces antitrust lawsuit
Pentagon alienating elite science advisers
Voinovich bill would create a post to manage work force shrinkage
Kansas Teen Sentenced After Hackings
LSU Sues Law Student Over Web Site
A New Direction for Intellectual Property
Spam, efforts to fight it, both on the rise
Pope Gives Internet His Blessing
What Does Google Say About You?
With '.pro' Comes a Certifiable Snub
Wireless Outlets
Bill Would Let Firms Share Customer Data
Biotech firms figure into homeland security
State's 'Tracker' system follows weapons trail
Vulnerability Is Discovered in Security for Smart Cards
The Yahoo Privacy Storm That Wasn't
For Old Parts, NASA Boldly Goes . . . on eBay
More Data on Doctors Backed
Teaching goes virtual in Pakistan
Getting tough on spam
In Free-Music Software, Technology Is Double-Edged
11 courts put criminal case files online
Microsoft pitches schools new licensing option
ID thieves mine for gold on jail sites
Outage dumps Microsoft MSN users
A cookieless Web monitor?
Mushrooming homeland security budgets face Hill scrutiny
Federal, state and local agencies on a quest to secure America's borders
'Operation Web Sweep' targets porn
U.S. to develop portal for comment on pending regulations
******************
New York Times
Credit Card Theft Thrives Online as Global Market Losses Grow
By MATT RICHTEL
Tens of thousands of stolen credit-card numbers are being offered for sale
each week on the Internet in a handful of thriving, membership-only
cyberbazaars, operated largely by residents of the former Soviet Union, who
have become central players in credit-card and identity theft.
The marketplaces where credit card prices fluctuate with supply and demand
in a sort of black stock market offer a window into a crime that costs the
financial system $1 billion or more a year. They also show how readily
personal information is being stolen and traded in the computer age.
But the same Internet technology that has enabled the theft and sale of
credit cards also provides a veritable transcript of the criminal activity,
and a real-time peephole into the attitudes, ethic and sometimes
honor among the thieves. The chat forums indicate as well that several
dozen of the top participants recently have discussed gathering at a
credit-card reseller's conference in Odessa, Ukraine, at the end of this month.
"It's straight out of Capitalism 101 it's become a big industry," said one
high-technology executive who surreptitiously monitors the Internet card
markets, and who noted that the market price of credit cards fluctuates
daily based on supply which, he said, is copious. "There appears to be an
endless supply of cards out there," he said.
In recent days, the cost of a single credit card has been between 40 cents
and $5 depending on the level of authenticating information provided. But
the credit-card numbers typically are offered in bulk, costing, for
example, $100 for 250 cards, to $1,000 for 5,000 cards, with the sellers
offering guarantees that the credit-card numbers are valid.
Security experts say the buyers of the card numbers in these forums are all
over the world, but often come from the former Soviet Union, Eastern Europe
and Asia, specifically Malaysia. The buyers use the numbers in a variety of
frauds, including making purchases over the Internet, having them fenced in
the West, or even extracting cash advances directly from the credit-card
accounts.
Security experts say the people living in the former Soviet Union often in
Russia and Ukraine who are operating the marketplaces are typically buying
the card numbers from so-called black-hat computer hackers. These hackers
obtain the card numbers by breaking into computer systems of online
merchants and getting access to thousands of credit-card records at a time.
"This is highlighting a tremendous lack of security," said Richard Power,
editorial director of the Computer Security Institute, an association of
computer security professionals that recently published a report with the
Federal Bureau of Investigation on computer crime. "In the old days, people
robbed stagecoaches and knocked off armored trucks. Now they're knocking
off servers."
The ultimate cost of this is hard to estimate, according to financial
analysts, though they say it is a fraction of the total size of the
credit-card industry. A recent survey from Celent Communications, a market
research firm, found that credit-card payment fraud will cost online
merchants a minimum of $1 billion a year, which is not insignificant,
though it pales in comparison to the more than $900 billion that Visa alone
processes annually.
The cost to individual businesses, however, can be dramatic. In January
2000, an extortionist based in Russia demanded $100,000 from an Internet
music retailer, CD Universe, by posting credit-card numbers stolen from the
company's database to a Web site, which was subsequently shut down by the
F.B.I. Last year, people close to Flooz.com, a bankrupt purveyor of
certificates used for online purchases, said one reason the company failed
was that it had unknowingly sold $300,000 of its currency to credit-card
thieves in Russia and the Philippines.
Generally speaking, the Celent report found that the fraud rate on the
Internet is 0.25 percent for Visa and MasterCard transactions,
significantly higher than the 0.08 percent for Visa and 0.09 percent for
MasterCard in the offline world. The typical consumer is generally
protected from these costs, since consumers are not held liable for most
fraudulent charges, but credit-card interest rates can rise because of
crime, and consumers may have to deal with the aggravation of removing
charges they did not make.
Mr. Power, from the Computer Security Institute, said: "You don't want to
be an alarmist and say, `The sky is falling, and Visa is going to crumble.'
But the financial losses involved in this kind of theft are underestimated,
underreported and underacknowledged," estimating the worldwide cost is in
the "double-digit billions."
"There's a lot more hemorrhaging going on than some people believe," he said.
The Internet sites of the online marketplaces are mostly known only to
their participants though that number can run as high as 2,000 registered
users. The site operators change their online addresses frequently to
prevent monitoring by law enforcement. In the past, credit-card traffickers
did business in private chat rooms on the Internet Relay Chat, a
communication network, and now they also use the World Wide Web, where it
is easy to start and shut down sites to avoid detection.
But there are security professionals who surreptitiously listen in,
tracking the supply of card numbers and prices.
John Shaughnessy, senior vice president for risk management and fraud
control at Visa USA, said the company was aware of online marketplaces and
sought to monitor them, when it could find them. He said it appeared that
many of the buyers and sellers of cards were in Asian countries and the
former Soviet Union. Some people familiar with the trend have also said
that stolen credit cards were being purchased by people in Saudi Arabia and
Dubai, United Arab Emirates.
Mr. Shaughnessy said Visa had worked closely with the F.B.I. on these
issues. Officials at the F.B.I. did not return calls for comment.
Even though the activities of the marketplace can be monitored, this does
not mean participants can be easily caught, since they do not use their
real names or give their whereabouts, and they make their payments through
secure money transfers over the Internet that are not easily traced. But
the Web sites offer a profile of the typical participant and of the way
they do business.
A security expert who monitors several of the bazaars said one of the most
active was run by a Ukrainian 18 or 19 years old who went by the name
"Script." The operator lives in Odessa. He is among about nine members of a
clique, whose members call it "the family," and who are considered the most
powerful and reliable of the middlemen.
In a recent transcript, the dealer who operates the forum posted in a
typical note: "I am selling Visa and MC (American cards)." He added, "The
minimal deal size is 40$."
He also listed a higher price if the deal included the card's CVV2 code, a
printed security code that appears on credit cards and is supposed to
prevent fraud. Merchants are not supposed to record the code in their
databases, but they sometimes do, which means that hackers can get access
to this higher level of information. On the online forum, the seller noted
that 100 cards with the CVV2 code cost $300.
A discussion then ensued involving his former buyers, attesting to the
seller's reliability. One buyer wrote, "This guy's always slightly more
expensive, but his stuff is good." Another wrote: "This guy is awesome. He
always gave me three times the number of cards I paid for."
The endorsements are a somewhat surreal reproduction of the rankings given
to sellers on legitimate e-commerce sites, like the auction site eBay, or
to authors by readers on Amazon.com. The feel of the site is one of pure
capitalism, replete with marketing. The seller who operates the site
sometimes posts online banner advertisements for his service.
The sellers usually ask for payment to be made through online accounts,
like www.WebMoney.ru, where money can be electronically deposited, wired,
then transferred to a bank account.
The discussions on the forum have a definite anti-Western bent,
particularly anti-American. They are critical of American foreign policy.
Some of the members of the forum also express anti-Semitic views.
There is not much social interaction, but it is not unheard of. The
participants will brag about using their spoils to take vacations, for
instance, to Bulgaria or Dubai.
Recently, there was a discussion that nearly 40 members of the group would
meet in Odessa on May 31, at the first "World Carders" conference, though
the organizers appear to have moved the talk to a more private setting.
*******************
USA Today
Rambus faces antitrust lawsuit
By Jayne O'Donnell, USA TODAY
The Federal Trade Commission is preparing an antitrust lawsuit against
once-highflying computer-chip maker Rambus, people familiar with the case say.
The FTC lawsuit would charge that Rambus worked with the computer industry
to adopt a memory-chip standard while quietly applying for patent rights to it.
Chipmakers could pay Rambus $1 billion in royalties before the case is won
or they figure out how to design around the patent.
FTC officials wouldn't comment.
Rambus general counsel John Danforth says the written rules governing the
semiconductor trade group that worked on the standards require companies to
disclose approved patents, not pending patents. But John Desmarais, who
represents chipmaker Infineon, which won a case against Rambus that is on
appeal, says the trade group's manual requires all patent applications to
be disclosed.
A few years ago, Rambus was the darling of the tech world because it was
reinventing computer memory. Big PC makers continue to sell computers with
Rambus' technology and consumers are paying extra to get it because it is
faster. Intel's next-generation network processor and Sony PlayStation 2
use Rambus' memory.
The FTC lawsuit would seek to prevent Rambus from collecting royalties on
its SDRAM memory and possibly its more advanced DDR memory, according to
lawyers familiar with the FTC probe.
Rambus is expected to fight the FTC in court. Danforth would not comment on
the company's plans.
Companies often work together to develop industrywide standards for
products so that equipment made by different manufacturers can be used
interchangeably. For instance, a standard for VHS videotape makes it usable
in all VHS videocassette recorders.
The FTC watches for patent violations during this process because
competition can be hurt if companies are forced by the standards to use a
patented product.
The FTC also is investigating whether energy company Unocal patented
clean-fuel formulations while helping draft a standard that oil companies
say mandates Unocal's process. Unocal has said its process is not the only
way to make gas meeting the standard.
The FTC has closed a probe into whether Sun Microsystems failed to disclose
patents while helping draft an industry standard for computer memory modules.
*******************
Mercury News
Pentagon alienating elite science advisers
WASHINGTON - For more than 40 years, an elite group of academic scientists
has provided the federal government with largely classified advice on the
most vital issues of national security. Every summer they have met behind
closed doors for almost two months near San Diego, emerging with judgments
that have helped shape the nation's policies -- from ending nuclear testing
to preparing for the danger of bioterrorism.
But when the Pentagon tried to redirect the group, known simply as
``Jason,'' toward information technology and force it to accept Silicon
Valley executives in its ranks, the scientists balked. And now this highly
secret group of advisers and the independent science-based analysis it
provides may be in jeopardy.
Many in the scientific community say the federal government still
desperately needs such unbiased assessments, especially in a time of war.
Some have criticized the Bush administration for endangering this unique
source of analysis for classified national security projects. Some of the
group's findings are at odds with the administration on two key issues: the
feasibility of a national missile-defense system and the potential need to
resume nuclear testing to ensure the weapons stockpile remains usable.
``The Jasons are a national resource. Republican and Democratic presidents
have found their advice invaluable. It's a real shame,'' said Joseph
Cirincione, a senior associate at the Carnegie Endowment for International
Peace, a Washington think tank. ``These are not defense critics, these are
technical experts who are providing their technical assessment of things
ranging from `star wars' weaponry to designs for defensive armor.''
Source of dispute
The dispute, according to members of Jason, stems from an attempt by the
director of the Defense Advanced Research Projects Agency, known as DARPA,
to force the traditionally self-selecting group to accept three members.
Among the three are two executives from Silicon Valley, one from an
Internet-related company and another from a computer firm, said one member
of the group, who, like other Jason members, declined to name the
individuals. The third person is an engineer from the Washington, D.C., area.
The Jasons, named after the mythical Jason and the Argonauts, said the
three did not meet the group's rigid standards, which include having
significant research accomplishments, being a tenured professor at a
research university and being willing to commit to a lengthy annual summer
research session. When the group refused to accept the three earlier this
year, DARPA revoked its $1.5 million annual funding, Jason members said.
The loss of the main source of money for Jason has put the group's future
in jeopardy. Members say they are close to securing a new main sponsor at
the Pentagon, but no agreement has been reached. Even if a deal can be
worked out, the funding problems already have delayed important research,
according to Jason.
``The Jasons are a very active and patriotic lot and would like to continue
their work,'' said Steven Block, a member of Jason and a professor of
applied physics and biological sciences at Stanford University. ``It's
really quite a pity that what I believe is political influence is having
such a deleterious effect at a time when our nation should be pulling
together, and not apart, to deal with issues of international terrorism.''
DARPA Director Tony Tether declined to comment on the dispute. Agency media
officer Jan Walker also would not comment on the accusations that Tether
tried to force members into Jason. She said the reason DARPA ended its
financial support for the group was because Jason failed to adapt to the times.
``The Jasons were very valuable during the Cold War. They looked at things
such as submarine detection, things that were highly physics-oriented,''
Walker said. ``After the Cold War ended, a lot of the technology
development moved toward information technology, and the Jasons chose not
to lose their physics orientation to focus on DARPA's current needs.''
Jason members say that assertion is wrong, noting that nearly 40 percent of
its scientists have doctoral degrees from fields other than physics. Among
those fields are computer science, biology and chemical engineering, Block
said. Jason produced 10 reports on biological issues alone between 1997 and
2001.
``To suggest that somehow Jason is a group of aging Cold Warriors that are
increasingly irrelevant flies in the face of the known expertise of Jason,
the known makeup of Jason and the recent product of the group,'' Block said.
DARPA, the Pentagon's risk-taking research arm that created the Internet,
for decades has been the main sponsor of Jason, which was founded in 1959.
The ad hoc group's roughly 40 members work part time for the government,
taking leaves from their universities to work on projects, mostly during a
six- to eight-week session each summer in La Jolla, the beach community
north of San Diego.
Jason keeps an intentionally low profile, largely because of its classified
work. There is no comprehensive list of members, and professors who are
Jasons rarely mention the job on their résumés. Started by midcareer
scientists who felt it was time for a new generation to become involved in
national security issues, Jason tries to remain young. New scientists are
routinely rotated in and older members become less-active senior advisers
when they turn 65.
Originally all male because of the era in which it was formed and the heavy
emphasis on the male-dominated field of physics, Jason has branched out
into other fields, and about 10 percent of its members are women.
The vast majority of Jason's 20 to 30 annual studies remain classified,
making its impact hard to gauge. But shortly after the group's partially
declassified 1995 report that low-yield nuclear tests were not necessary to
maintain the nation's weapons stockpile, former President Bill Clinton
declared his support for a comprehensive nuclear test ban treaty. After a
1997 Jason report that questioned whether the government would be able to
map the human genome by its 2005 deadline, the pace of the program greatly
accelerated.
Jason has been scrambling to replace DARPA's sponsorship in time to save
this summer's session, set to begin in mid-June. The chair of the group's
steering committee, Steven Koonin, said Jason is close to an agreement with
the Defense Research and Engineering agency, the arm of the Pentagon that,
ironically, oversees DARPA.
Delay on key projects
As it is, the funding problems have already delayed work on projects
important to national security, said Koonin, a professor of theoretical
physics at the California Institute of Technology who also is the Pasadena
college's provost.
``Some are relevant to counterterrorism,'' Koonin said. ``They're important
in both short and long term, and we are frankly pretty frustrated.''
Among those preaching the value of the group's continued existence is John
Marburger, director of the White House Office of Science and Technology Policy.
``This is a group of scientists who are among the most talented and
experienced in the nation, and the scientific standards that they maintain
are very high. And you would always want to have a group like that
available to advise the government on issues that may arise that require
that type of analysis,'' Marburger said.
Koonin said the group does not take policy positions in its research but
simply makes scientific assessments of government projects.
``We still write reports that have equations in them. I don't think there's
any other group that does that,'' said Koonin, who has been a Jason for
about 15 years. ``Our job is to provide honest, technical advice, and we're
not going to shrink from doing that.''
*********************
Government Computer News
Voinovich bill would create a post to manage work force shrinkage
By Dipka Bhambhani
Congress may consider a bill that would call for federal agencies to
appoint a chief human capital officer to address the problems of a
dwindling federal IT work force.
Republican Sen. George V. Voinovich of Ohio plans to sponsor a bill
establishing the post and giving agencies funds to offer recruitment and
retention incentives.
The human capital managers would make up a new CHCO Council led by Office
of Personnel Management director Kay Cole James, said a staff member for
the Senate Governmental Affairs Committee.
"With initiatives included in my bill to recruit and retain qualified
employees, it is my hope that we can convince more IT professionals that
the federal government is a great place to pursue a career," Voinovich said.
*********************
Reuters News Service
U.S. Adopts New Internet System on Student Visas
Fri May 10, 4:58 PM ET
By James Vicini
WASHINGTON (Reuters) - Facing criticism over how easily some of the Sept.
11 hijackers entered and moved about the United States, Attorney General
John Ashcroft (news - web sites) said on Friday a new Internet-based system
will start in July to better track the 1 million foreign students in this
nation.
Colleges, universities and trade schools will have to collect and report
information to the U.S. Immigration and Naturalization Service (INS) under
the system, initially voluntary but later mandatory, he told a news
conference.
"For too long our student visa system has been a slow, antiquated,
paper-driven reporting system incapable of ensuring that those who enter
the United States as students are in fact attending our educational
institutions," Ashcroft said.
The system will make the student information available centrally to the INS
in a database and will allow the schools to transmit it electronically via
the Internet, he said.
The system has been under development by the INS for years under a law
adopted by Congress in the mid-1990s. The data that must be reported
includes a student's failure to enroll and whether the student dropped out
or was expelled.
Ashcroft said schools may voluntarily participate on July 1, though under
the proposed rule, they must participate by Jan. 30 of next year.
The INS has come under increased scrutiny in the wake of the Sept. 11
attacks on the World Trade Center and the Pentagon (news - web sites). All
19 suspected hijackers who carried out the attacks entered the country
legally, although three had overstayed their visas.
INCREASED SCRUTINY
The INS was embarrassed in March, exactly six months after the attacks,
when a Florida flight school received notification from the INS that
student visas had been approved for two suspected hijackers, Mohamed Atta
and Marwan Al-Shehhi.
One of the hijackers, Hani Hanjour, used a student visa to enter the United
States, saying he wanted to study English, but he never showed up at the
school.
Ashcroft made the announcement before the release, expected later this
month, of a critical report by the Justice Department (news - web sites)'s
inspector general.
"Schools will be accountable for confirming the status of student visa
holders. The Immigration and Naturalization Service will be accountable for
enforcing violations of that status," he said.
"Rapid access to current, complete information on foreign students will
improve dramatically the INS's capability to enforce immigration laws and
keep track of this group of noncitizens in the United States," he said.
Ashcroft said the new system will reduce the time lag on when the INS
receives information. He said it was developed "in consultation" with
representatives of U.S. colleges and universities.
Terry Hartle, senior vice president of the American Council on Education, a
trade association representing 1,800 colleges and universities, said: "The
bottom line here is this is what INS should be doing and we're fully
supportive."
He called it a "huge undertaking" under a very ambitious timetable, saying
the system linking up as many as 70,000 schools "dwarfs anything INS has
ever done before."
***************************
Government Executive
Tracking device in passports could help locate terrorists
By Siobhan Gorman, National Journal
Each year, about 100,000 U.S. passports are reported lost or stolen. And an
estimated 100,000 passports issued by countries whose citizens don't need a
visa to visit the United States have also been stolen in recent years.
The problem isn't a minor one. At least one of the September 11 hijackers
is believed to have entered the United States with a stolen passport. Three
of the terrorists had reported their passports stolen so they could get
clean ones that didn't show their travel histories. Last fall, two of the
killers of Afghan opposition leader Ahmed Shah Massoud were holding stolen
Belgian passports. And during the ongoing war in Afghanistan, abandoned
caves have been found littered with blank U.S. and European passports. So,
what if stolen passports could notify their home country of their exact
location?
They could if they were equipped with a radio-frequency identification tag
about the size of a large paper clip. The tag could be embedded in a
passport and loaded with information that could confirm the identity of the
holder. It would be tough to counterfeit, too.
Such tags were originally designed to help grocery stores manage their
stock and to help Gillette combat the burgeoning black market for its
stolen razors. Commercially, they're thought of as the successor to the bar
code.
In the security world, some researchers suggest that the tags could be
coupled with biometric technology that would allow a passport to be used
only if the holder's fingerprint matched the information embedded in the
passport. Jeffrey Jacobsen, president of Morgan Hill, Calif.-based Alien
Technology, one of the leading manufacturers of the technology, estimates
that the tags will be on the market by 2003 for about $10 each, but
manufacturers say that with enough demand, the price could come down
significantlyto, say, $2 to $3.
"They have huge potential here," said Paul Saffo, a director at the
Institute for the Future, a research firm in Menlo Park, Calif. "It's not a
silver bullet, but it's a powerful tool."
Powerful indeed. Border agencies could get a daily e-mail listing the
locations of all the passports belonging to people whose visas have expired
but who are still in the country. The FBI could affix the devices to the
belongings of someone they are trying to follow. An investigator suspicious
that a terrorist plot is being hatched in a particular location could use a
computer to call up all the passports in that area.
One of the most intriguing possibilities is the idea of combining the tags
with what Alien Technology calls NanoBlocks, which are sensors to detect
biological and environmental changes. Developed initially by military
researchers to detect spoiled food, these sensors could eventually be
programmed to identify all kinds of harmful substancesanthrax, for
exampleand e-mail the appropriate person if something is detected.
These sensors, which Jacobsen said could cost as little as 1 to 5 cents
each, could be coupled with a radio-frequency tag and placed virtually
anywherein a building's ventilation system, in various locations in an
airplane, or in a reservoir. He said that sensors for different types of
chemical and biological hazards could be developed over the next 18 months
to five years. "You're talking about adding a few dollars to every plane
and knowing everything that's going on that might hurt you," Jacobsen says.
Until recently, radio-frequency identification technology was hampered by
an international turf war. Several different companies had developed their
own frequencies and their own way to read the frequencies, which made the
technology expensiveand not particularly useful. In January 2001, a group
of international companies got together to form the Auto-ID Center at the
Massachusetts Institute of Technology, and agreed to decide on a common
frequency. Since then, manufacturers such as Alien have been working to
reduce their production costs to bring prices down.
Of course, none of this technology would be used without a vigorous
civil-liberties debate. "There's this thing of mission creep or function
creep," worries Mihir Kshirsagar, a policy fellow at the Electronic Privacy
Information Center. "Would it be used for other documents? Would it be used
for other things? The idea is very similar, in some of its privacy
implications, to saying, `Why don't we put a chip on the person?' " And
Kshirsagar has a larger worry: If the U.S. government can pick up a
passport's signal from anywhere in the world, couldn't a well-heeled
terrorist group do the same?
Calling this technology "FedEx tracking on steroids," Deirdre K. Mulligan,
director of the law and technology clinic at the University of California
at Berkeley, cautions that any technology has limitations. "You can have
better technology to know moment by moment where [potentially dangerous
foreigners] are," she said. "But if [we] don't have enough people to round
them up, what good does it do?"
*************************
Newsbytes
Kansas Teen Sentenced After Hackings
A Kansas teenager has pleaded guilty to hacking the official Web site of
Stockton, Calif. and telling city officials he would secure it if they gave
him a laptop computer.
Matthew Kroeker, 18, was sentenced to serve two years probation and pay at
least $18,000 restitution, his attorney Kevin Moriarty told Newsbytes.
Kroeker pleaded guilty to four felony counts of computer crime in Johnson
County District Court last week.
Kroeker has learned a "valuable lesson" in the three years since the
episodes began, Moriarty said. He was charged in March with 11 felony
counts for allegedly defacing more than 50 sites during 2000 under the name
"Artech."
State prosecutors had intended to charge him as an adult under Kansas'
computer crime statutes.
Among Kroeker's targets was the Internet home page of the City of Stockton,
Calif., which was replaced in June 2000 with one that simply said "Tard."
Soon city webmaster Cathy Sloan received an e-mail signed "Matt," who took
credit for the defacement and offered to help secure the site in exchange
for a laptop computer.
She played along with Kroeker while Stockton technology staffers tried to
trace Kroeker's e-mail. The case was first given to the FBI because he was
suspected of defacing federal agency Web sites, but went back to local
authorities due to Kroeker's age.
Kroeker defaced the U.S. Department of Transportation's information
services Web site with the words, "Artech - America's biggest screw up!"
Reported by Newsbytes, http://www.newsbytes.com .
*********************
Newsbytes
LSU Sues Law Student Over Web Site
Douglas Dorhauer has a tiger by the tail. The second-year student at
Louisiana State University's law school is the target of a trademark
infringement lawsuit by the school because he operates a Web site called
LSULAW.com.
The school's lawsuit, which is documented on Dorhauer's site, alleges that
his use of the registered mark "LSU" creates a "mental association" with
the school.
LSU further contends that the LSULAW site is "confusingly similar" to the
school's site, which is at http://law.lsu.edu, and "has created actual
confusion in the minds of the public as to the source of the information
contained in the site."
The suit asks the U.S. District Court for the middle district of Louisiana
to bar Dorhauer from using the LSU name, logos and symbols.
Dorhauer insists the site is for his personal use, is noncommercial and
therefore does not violate trademark laws. He said he bought the domain
name in March 2000 when he was accepted to the Paul M. Hebert Law Center at
Louisiana State University - the official name of LSU's law school.
"I started using it for the e-mail address, then I used it to create a
calendar for important dates," said Dorhauer. "The official site had
information all over the place, so I put things that I needed in a place I
could get to with one click."
In October 2001, two vice chancellors at the law school asked Dorhauer to
give up the domain name. "I refused because it's my property," he said.
"One vice chancellor cursed me out and called me a cybersquatter. I've
dealt with their lawyers since then."
Dorhauer has posted copies of the correspondence between he and the
school's attorney, Marc Whitfield, on his site.
On Nov. 30, 2001, Whitfield wrote Dorhauer asking him to cease and desist
his "unauthorized use of the mark 'LSU'" in the domain name and title of
his site. Whitfield said the school had reported incidents of confusion by
students "who did not realize that your LSULAW.com site was not an official
or affiliated Web site of the LSU Law Center."
Whitfield asked Dorhauer to delete "LSU" from the domain name and title of
the Web site; post a prominent disclaimer on the home page stating no
affiliation, approval, sponsorship or relationship with the LSU Law Center
and LSU or both; delete a designation as the "official site of LSULAW.com";
and remove all hyperlinks to the official law school Web site.
In Dorhauer's Dec. 19, 2001, response, he asserted his site was
noncommercial. He stated that he did not hope to sell the site and the
domain name, nor did he intend to make a profit from visitors to the site.
"If there is any particular feature of my LSULAW.com Web site which denotes
commercial activity, please let me know, and I will immediately make all
necessary changes," he wrote in the letter.
According to Dorhauer, his legal research found the trademark statutes
cited by Whitfield apply only if Dorhauer's site used the mark "LSU" for
any commercial purpose.
"In short, nothing in the selection of laws you cite is in any way
applicable to the present matter," he wrote.
Dorhauer refused to abandon the LSULAW domain name, nor would he agree to
place a prominent disclaimer on his home page or remove all links to LSU.
He agreed only to change the title of the pages of his site from "The
Official Site of LSULAW.com" to "LSULAW.com."
When Dorhauer did not receive a response to his Dec. 19, 2001, letter, he
wrote a second letter on Feb. 8, 2002, asking for an update on the status
of the matter. Whitfield responded three days later with a threat of a
lawsuit.
"We have reviewed your opinions and analysis of our claims and respectfully
disagree with the conclusions you reach. We also respectfully acknowledge
your status as a law student and therefore we do not expect that we can
convince you of our legal position," Whitfield wrote.
"Therefore, it appears that litigation is the only remaining alternative to
resolution of these legal issues and I expect that we will be filing suit
shortly," he added.
On March 4, Dorhauer wrote Whitfield asking that the matter be resolved
without litigation. On April 20, Dorhauer received the lawsuit in his mailbox.
"I got the lawsuit 12 hours before my final exam," said Dorhauer. "I might
think that was a coincidence, but the cease and desist letter came during
finals, also."
Dorhauer's response is due June 23. Classes are over for the summer, and he
is working as a clerk in a Baton Rouge law firm while he contemplates his
counterclaim options.
"I think there are emotional distress issues," he said. "Almost all judges
were law students, so they can appreciate the distress of being sued while
in law school. Especially with a pattern of doing these things around final
exam time," he added.
Two legal experts contacted by Newsbytes who are not involved in this
dispute said Dorhauer has some good points, but probably will lose his case.
Joan Long, a trademark attorney in Chicago said one problem for Dorhauer is
his site is too well done.
"At first blush, this case is a First Amendment issue over the right to
make critical comments about the school," said Long. "But the real issue
is, might his site be confusing?"
Long said the "Ballysucks.com" case was the first case to test the use of a
trademarked name in a domain name - as LSULAW.com does. She said the
precedent set in the Ballysucks case was there clearly was no endorsement
of the site by Bally because of the name.
"Trademark infringement exists only if there is a likelihood of confusion,"
she said. "His site does almost look official because it adopts the school
colors and it has a calendar and other things you would expect on an
official site.
"It pushes the envelope," she added.
Blaney Harper, a Washington, D.C.-based patent attorney with experience in
domain-name disputes, agreed with Long that Dorhauer's site looked like it
could be an official site, and therefore could cause a problem.
"Trademark law is all about consumer confusion, and if someone looking for
information about LSU's law school typed in LSULAW.com and this site came
up, there might be confusion. Especially because it has the same colors
(purple and gold)," Harper said.
Dorhauer has a "disclaimer" on his site stating there is no connection
between LSULAW.com and the school he attends. However, Long pointed out
that a visitor would have to click on a link marked "notice" to reach the
disclaimer.
She also said she did not see a small notation on the home page that read,
"Not affiliated with the Paul M. Hebert Law Center" until it was pointed
out to her.
"If I was unfamiliar with the school, I might not even know the official
name, so that might not mean anything to me, anyway" said Long. "If he had
something across his page in a large font that said, 'Not the official
site' or 'Not LSU Law School,' that might be different. But not this tiny
disclaimer."
Harper said the size of the disclaimer is not an important issue, because
someone surfing the Web has to come to Dorhauer's page first to see it.
"There is lots of case law on using well-known trademarks in domain names.
Several years ago, people registered names like Cocacola.com and tried to
hold up the owners of the trademarks. The courts have been killing these
people the last two years."
"This guy says he is not trying to hold LSU up, but he still is using a
trademarked name," Harper continued. "The fact that his site is not
commercial is helpful, but I'd rather have the school's argument than his."
Harper said because Dorhauer is a student at LSU's law school, he is
"close" to the school.
"It's not like he is a foreign student with a coincidental domain name
spelling like 'Liechtenstein State University,'" he said.
Dorhauer said many of the issues raised by Long and Harper concerning the
colors and the layout of his site "could have and should have" been
addressed by the school before they filed a lawsuit.
"I have been willing to change the colors, but they didn't even have the
courtesy to pick up the phone and call me," he said. "I'm going to stick
with the colors because I think I have a right to use them."
As for the issue of consumer confusion, Dorhauer said the intellectual
property attorneys he has spoken with told him visitors to his site are not
"consumers."
"If I was selling LSU mufflers, for example, then there might be
confusion," he said. "But I have kept commercial elements off my site.
There is no trade, and trade is a part of trademark."
The school's attorney did not return phone calls requesting comment on this
story.
Dorhauer's site is at http://www.lsulaw.com .
The LSU law school is at http://law.lsu.edu .
Reported by Newsbytes.com, http://www.newsbytes.com
*****************
New York Times
A New Direction for Intellectual Property
Perceiving an overly zealous culture of copyright protection, a group of
law and technology scholars are setting up Creative Commons, a nonprofit
company that will develop ways for artists, writers and others to easily
designate their work as freely shareable.
Creative Commons, which is to be officially announced this week at a
technology conference in Santa Clara, Calif., has nearly a million dollars
in start-up money. The firm's founders argue that the expansion of legal
protection for intellectual property, like a 1998 law extending the term of
copyright by 20 years, could inhibit creativity and innovation. But the
main focus of Creative Commons will be on clearly identifying the material
that is meant to be shared. The idea is that making it easier to place
material in the public domain will in itself encourage more people to do so.
The firm's first project is to design a set of licenses stating the terms
under which a given work can be copied and used by others. Musicians who
want to build an audience, for instance, might permit people to copy songs
for noncommercial use. Graphic designers might allow unlimited copying of
certain work as long as it is credited.
The goal is to make such licenses machine-readable, so that anyone could go
to an Internet search engine and seek images or a genre of music, for
example, that could be copied without legal entanglements.
"It's a way to mark the spaces people are allowed to walk on," said
Lawrence Lessig, a leading intellectual property expert who will take a
partial leave from Stanford Law School for the next three years to serve as
the chairman of Creative Commons.
Inspired in part by the free-software movement, which has attracted
thousands of computer programmers to contribute their work to the public
domain, Creative Commons ultimately plans to create a "conservancy" for
donations of valuable intellectual property whose owners might opt for a
tax break rather than selling it into private hands.
The firm's board of directors includes James Boyle, an intellectual
property professor at Duke Law School; Hal Abelson, a computer science
professor at the Massachusetts Institute of Technology; and Eric Saltzman,
executive director of the Berkman Center for Internet and Society at
Harvard Law School.
*****************
Computerworld
Spam, efforts to fight it, both on the rise
The increasing pain of dealing with unsolicited bulk commercial e-mail,
commonly known as spam, is prompting new moves to stamp out the unwanted
messages. But industry experts warned this week that proposed legislative
approaches to the spam problem won't likely succeed without the aid of
corporate users.
Some service providers have had enough. For example, Fairport, N.Y.-based
PaeTec Communications Inc. last week said it had disconnected a direct
e-mail marketing company from its broadband network after a New York
appeals court overturned an injunction that had prevented it from doing so.
And late last month, San Mateo, Calif.-based UltraDNS Corp., which manages
Internet domains and directories for companies, called for the creation of
an industry consortium to lobby for the passage of antispam legislation.
But until businesses spell out out the true costs of the spam that bombards
their internal networks, it will be difficult, if not impossible, to craft
useful legislation, said Ray Everett-Church, co-founder and counsel of the
Coalition Against Unsolicited Commercial Email.
"The largest challenge in fighting for sound antispam legislation is
getting the involvement of major corporations," said Everett-Church, whose
organization advocates for such measures.
Most companies don't want to disclose what spam costs them on the receiving
end, said Michele Rubenstein, a board member of the EMA Forum within The
Open Group consortium in San Francisco. The EMA Forum is a group of users
and vendors that addresses messaging technology issues.
"A lot of people are reluctant to admit that kind of information,"
Rubenstein said. "It's kind of like admitting your network has been hacked."
Raymond Huff, president of Trans Pacific Stores Ltd. in Lakewood, Colo.,
said he was able to stem the influx of spam three months ago by limiting
the publication of employees' e-mail addresses on the Internet. But since
then, the spam problem has gotten "five times worse" for the convenience
store operator, he said.
The incidence of spam is doubling every six months, according to David
Ferris, an analyst at Ferris Research Inc. in San Francisco.
Data from Brightmail Inc. backs up that claim: the San Francisco-based
company said its antispam software measured 4.3 million spam blasts last
month, up from 1.7 million in October.
UltraDNS CEO Ben Petro said the removal of spam from its network cost more
than $300,000 in lost revenue last month, because some customers were
blocked from sending mail to some domains. Petro said UltraDNS is targeting
California and Delaware for possible state-level laws against spam, since
so many companies are incorporated in those states.
Two bills that would set federal antispam provisions have already been
introduced in the U.S. Senate this year. But Everett-Church said those
measures could actually "legitimize some of the most egregious spam being
sent."
Any legislation that gives individuals and companies the ability to fight
the onslaught of spam "would be very welcome," said a spokesman for Kmart
Corp. in Troy, Mich. "Even if it scares off 10% of the [spammers], that
would help."
Kmart, which acts as an Internet service provider through its BlueLight.com
LLC unit in San Francisco, takes "extensive steps" to avoid spamming
customers, the spokesman said. But the spam that they receive from other
sources "dilutes our message," he said. "At the end of the day, it hurts
our bottom line."
*********************
Reuters Internet Report
Pope Gives Internet His Blessing
Sun May 12, 9:35 AM ET
By Luke Baker
VATICAN CITY (Reuters) - Pope John Paul (news - web sites) is putting his
faith in the Internet.
In his weekly address at St. Peter's Square Sunday, the 81-year-old Pontiff
said: "I've decided, therefore, to propose a big new theme for this year:
'The Internet -- a new forum for proclaiming the Gospel."'
The leader of the world's Roman Catholics didn't say how much he practices
what he preaches -- for instance, whether he surfs the World Wide Web. He
doesn't have his own e-mail address.
But the Vatican (news - web sites) does have an active Web site
(www.vatican.va), the pope sent his first message over the Internet last
year, and there's talk he is searching for a patron saint for Internet users.
"Recent progress in communications and information have presented the
church with unheard-of possibilities for evangelism," he said.
"We shouldn't be afraid to put to sea in the vast ocean of information," he
went on. "If we do so, the good news can reach the hearts of the men and
women of the new millennium."
In the past, the pope has said the Web should be regulated to stop
depravity in cyberspace. Sunday, he gave it his unwavering blessing.
"We have to become part of this modern and ever more finely woven web of
communication with realism and confidence, convinced that, if it is used
competently and with due responsibility, it can offer a sound opportunity
for the dissemination of the word of the Lord."
Taken together, the pope's latest thoughts were a big step forward from
January, when in his last comments on the Internet he emphasized its
potential for harm, going so far as to say it could demean human dignity.
"Despite its enormous potential for good, some of the degrading and
damaging ways the Internet can be used are already obvious to all," he said
at the time.
Those comments raised the hackles of Internet die-hards who are generally
against any form of censorship and any view that cyberspace should in any
way be policed for content.
The Roman Catholic Church has traditionally adapted to discoveries through
the ages, from the Renaissance to the invention of printing presses and the
Industrial Revolution.
The Vatican has extensive media interests, with its own publishing house, a
radio station, missionary news agency, television channel and newspaper.
****************
Washington Post
What Does Google Say About You?
By Rachel L. Dodes
W. Ashley Gum, a third-year student at the Georgetown University Law
Center, has achieved a modicum of success in his 26-year life, having
graduated with honors from Washington and Lee University, participated in
the Barristers' Council moot court team, and earned various and sundry
academic accolades.
Or so he said.
But according to the search engine Google, Gum has done a lot less. A
search for "W. Ashley Gum" produced no hits at all. A query on "Ashley Gum"
barely managed to confirm Gum's existence, revealing only that he was a
Herndon High School wrestler who lost a match in 1991.
Was this man lying about his credentials, or has he managed to drift
through the past decade without getting mentioned online?
Gum was not lying. He was just un-Googleable. "I feel as though I am a
nonentity," Gum said.
Since "Googling" -- looking up a new acquaintance on Google before going
out on a date -- has become a popular research tool, this could become a
real liability.
It happens sometimes, said Google software engineer Matt Cutts. Your Web
presence depends on things that you can't always control -- "how long
you've been on the Internet, whether you have a home page, how actively you
seek out social contacts online," he said.
Some people may be rendered Google-proof because they have a common name,
such as Jason Smith (46,700 hits), or share a famous person's name, such as
Will Smith (234,000 hits). Others, like Mr. Gum, just haven't had their
accomplishments touted online -- yet. Either way, Cutts said there's
nothing to be ashamed of.
Then again, he has nothing to worry about: His name yields 562 Google hits.
On the other hand, a healthy online presence can mean being besieged by
stalkers and spammers.
Finding the right balance between recognition and privacy is difficult.
Chris Hoofnagle, legislative counsel at the Electronic Privacy Information
Center, a Washington-based nonprofit, outlined a few options for people
seeking to control their own Google identity.
First, avoid participating in online discussion forums. For many people,
that's too late: The Google Groups archive of newsgroup discussions
contains messages dating as far back as 1979. "You could have a 10-year-old
posting saying that you are a socialist," Hoofnagle said. If you find the
urge to hold forth irresistible, the best way to protect yourself from
leaving a search-engine trace is to assume a fake identity.
Don't post your regular e-mail address unless you can deal with the junk
e-mail sent by spammers who use Web-crawling programs to harvest address
data. Instead, post a throwaway address, or, if you must list your real
account, write it out in word format ("JohnDoe at blank dot-com" instead of
"johndoe@xxxxxxxxxx")
If your company creates a Web site about you, don't put your personal
information on it. Nobody needs to know you're a Trekkie and an avid Rush
Limbaugh listener.
But some personal data has a way of leaking onto the Web in ways you'd
least expect.
Gerald Lundgren, an associate analyst at Sandler O'Neill, a New York
investment-banking firm, said he would gladly trade online anonymity for
his current situation: Lundgren was "horrified," he said, to find that his
34:45 running time for a four-mile race appeared on Google when he ran a
search on his own name.
Lundgren insisted that he normally can run four miles in under 30 minutes.
A personal home page, which most search engines should flag as a
high-priority link, may be the best defense against a bad rap online -- or
no rap at all. Lundgren joked that he was going to create a Web site for
himself at incaseyouregooglingme.com, on which he will post flattering
photos of himself.
As for Gum, he would still like to be known online for something other than
an 11-year-old wrestling match. At the end of an interview, he asked, "So,
this is going to be on washingtonpost.com, right?"
********************
Washington Post
With '.pro' Comes a Certifiable Snub
New Domain for Professionals Draws Ire of the Ineligible
By Shannon Henry
Washington Post Staff Writer
Saturday, May 11, 2002; Page A01
Doctors, lawyers and certified public accountants are welcome to apply.
Hairdressers, plumbers and real estate agents are maybes. Don't even bother
if you're an athlete, photographer or musician.
The approval earlier this week of a new Internet domain address -- .pro,
for professionals -- is dredging up an old question about the status of
one's life work. Which careers are considered "professional," and which are
not?
In the latest example of how the Internet imitates the real world, complete
with professional snobbery, the .pro domain name will be available only to
"certified" members of the medical, legal and accounting professions,
although anyone can visit its sites. Other occupations that certify their
members will be able to buy similar addresses eventually, but exactly who
will be eligible and what proof of their credentials will be acceptable is
still to be determined.
"I find it very elitist and condescending to other professions who give as
much to our society as a doctor or lawyer," said Erinlynne Desel, a
licensed massage therapist and spa director at Aveda in Georgetown. "I
consider myself a professional."
Linda Cornfield, office manager of the 2,000-member Plumbers and
Pipefitters Union in Aurora, Ill., was dismayed by the concept and the
limitation to the three professions. She said plumbers would not like to be
excluded from the option of getting a .pro address.
"It's a class thing," Cornfield said. "You're on this list because you're
white collar and we're blue collar."
The .pro divide makes for some unusual contrasts: Dr. Dean Ornish from the
"Oprah" show could have a .pro address, but Winfrey herself probably
couldn't. Michael Jordan, or any other pro athlete, is a no but Jordan's
lawyer would be welcome. There won't be a YoYoMa.pro, but accountants from
Arthur Andersen LLP are perfectly fine candidates.
Sloan Gaon, chief executive of .pro overseer RegistryPro in New York, a
unit of Register.com, said that as a mere company executive he wouldn't be
eligible for what he calls the "gated community." But he happens to have a
law degree, too.
"We certainly need to draw the line," Gaon said, perfectly comfortable with
his role as career cop. "By opening it up to non-certifiable professions,
we'd lose the trust."
Gaon said it is vital to limit who gets a .pro address because many
professions don't have standard certifications, something his group will
check before anyone is granted a .pro address. Gaon is promising Web users
who communicate with .pro owners that they will have a secure dialogue with
a trustworthy professional.
After a person applies for the domain name, RegistryPro will use a
combination of public and private databases to delve into the applicant's
history and records. The point is that when Web users go to a .pro address,
they should feel confident that that person has been checked out, and that
he is the person he says he is, Gaon said. "It's an online diploma."
Whether people will actually want a .pro address remains to be seen.
Letting consumers know which tattooists are certified and which aren't is
attractive to Dennis Dwyer, who tattoos in Tucson. It would be helpful for
people to know which tattooists are correctly sterilizing needles and can
explain the procedure thoroughly, he said. "I'd be interested in being part
of that group," Dwyer said. But he also said it didn't surprise him that
tattooists didn't make the original list and he wouldn't be offended if
they never were invited.
"It's not equal to a doctor," he said. "I wouldn't put us in the same
category."
That's what Louis Touton, general counsel of the Internet Corporation for
Assigned Names and Numbers, said. ICANN is a nonprofit corporation in
Marina del Ray, Calif., that oversees the choices of domain-name
registrars. Touton said those ineligible for .pro are more than welcome to
go somewhere else in cyberspace. "There are certainly plenty of domain
names," he said.
Indeed there are. Fifteen top-level domain names such as .com, .org and
.museum are available, not to mention many more country codes such as .us,
.jp or .uk.
If .pro physicians, lawyers or CPAs are disbarred, found guilty of
malpractice or lose their professional licenses, they will also lose their
.pro addresses, Gaon said. Owners of .pro addresses will be rechecked by
RegistryPro once a year.
Jerry Phillips, who has been an innkeeper for 27 years and is executive
director of the Professional Association of Innkeepers International in
Santa Barbara, Calif., is in a profession that does not certify its
members. Phillips said he never thought a piece of paper meant as much as
the work itself. "Is it a degree, or is it I'm damn good at my job?" asked
Phillips.
The whole concept of .pro, Phillips continued, is just the opposite of what
the Web was originally all about -- a great equalizer where anyone and
everyone could have the same access and communicate with all kinds of people.
"When I think of the Web, I think of inclusivity rather than exclusivity,"
said Phillips. "The Web was supposed to be an open place."
*********************
Washington Post
Internet Governance Body Eases Off Government Involvement
By David McGuire
Washtech.com Staff Writer
Friday, May 10, 2002; 5:23 PM
The body that manages the Internet's addressing system appears to be
backing away - for now at least - from a proposal that would give world
governments greater direct control over the global Domain Name System (DNS).
The Internet Corporation for Assigned Names and Numbers (ICANN) yesterday
signaled its potential shift in the publication of a working paper
outlining proposed reforms.
At a meeting in Ghana earlier in March, ICANN voted to begin its own
restructuring, in the process abandoning plans to establish a global
mechanism that could have allowed ordinary Internet users to directly elect
some of ICANN's leaders.
Instead, the ICANN board of directors ordered an internal committee to
develop a plan to reform the organization, drawing on a proposal submitted
by ICANN President Stuart Lynn.
In its first official word on the subject, the reform committee this week
endorsed many of Lynn's proposals for revamping the organization, but took
a more ambivalent stance toward Lynn's proposal that world governments
choose some of ICANN's leaders.
Citing perceived difficulties associated with bringing governments on
board, the reform committee wrote, "we explore alternatives to direct
government involvement in board selection because of the practical
difficulties that have been expressed in implementing that idea in the near
future."
The committee did not, however, decry government involvement, which some
ICANN critics say would be an inadequate substitute for direct, public
ICANN board elections.
The committee said that Lynn's proposal regarding government involvement
had "significant merit."
"In particular, greater government involvement is one way to fill the vital
need to reflect the public interest on ICANN's board through mechanisms
that are practical, valid, affordable and not readily subject to capture."
The ICANN board, which has final say over all of the body's decisions,
currently includes five members (out of 19) who were elected by the
Internet public in a pilot election two years ago.
Lynn and other ICANN insiders have questioned the reliability of
large-scale online elections, saying that they are vulnerable to "capture"
by special interest groups. Lynn said that officials elected by world
governments would do a more comprehensive job of representing public
interests online.
Public interest groups and ICANN detractors have responded that public
elections are the only way to keep ICANN's internal bureaucracy in touch
with the needs of ordinary Internet users.
Karl Auerbach, a longtime ICANN critic who serves as one of the body's five
elected board members, accused the reform committee - which is chaired by
ICANN board member Alejandro Pisanty - of simply going along with Lynn's
vision of a reformed ICANN.
Despite some tweaks made by the reform committee to Lynn's proposal,
Auerbach called the committee's efforts "a rubber stamp of gargantuan
proportions."
"They don't even raise the issue of ? holding public elections," Auerbach said.
Lynn disputed Auerbach's assessment.
"I think Karl is completely off base when he makes that kind of a comment,"
Lynn said, citing the changes to his proposal that the reform committee
recommended.
While, the working paper appears to endorse Lynn's proposal that an
internally selected ICANN nominating committee should choose many of
ICANN's board members, the committee suggests significant changes to Lynn's
proposed structure.
Responding to criticisms about the "closed nature" of the nominating
committee approach, the working paper suggests bringing a more diverse
group of Internet stakeholders into the nominating committee structure.
Lynn said that the committee really didn't endorse or criticize any
proposals, but rather drew on public input to hone a more refined approach
to reform.
Pisanty was not immediately available for comment on this story.
*****************
Los Angeles Times
Wireless Outlets
Enticed by the potential for profit, carriers and media giants aim to offer
more audio and video content for cell phones
By RICHARD VERRIER
TIMES STAFF WRITER
May 13 2002
Spider-Man is coming to a phone near you. So are Tiger Woods, Smash Mouth,
Britney Spears and Mickey Mouse in a wave of mobile entertainment sweeping
across the wireless world.
In the months ahead, a growing number of cellular customers will be able to
download ring tones, color graphics, movie trailers and games based on
their favorite films, sports celebrities and recording artists.
The trend is being driven by a convergence of three forces. New technology
is giving cell phones ever-greater capabilities. Wireless companies that
have spent billions upgrading their networks are looking for ways to sell
more services through their expanded pipelines. And entertainment
conglomerates such as Walt Disney Co., Vivendi Universal and AOL Time
Warner Inc. have visions of wireless phones becoming hand-held
entertainment centers. Enticed by that prospect, global media giants and
cell phone carriers are scrambling to tie up relationships with one another.
Disney has lined up deals with carriers, including Sprint PCS and AT&T
Wireless, to provide Disney-themed games, graphics and ring tones to cell
phone users from the U.S. to Japan.
Sony Corp.'s Columbia Pictures has developed relationships with Cingular
Wireless and Sprint PCS to promote such movies as "Spider-Man" and "Men in
Black 2."
Vivendi, owner of the world's largest music company, recently scooped up
the nation's leading supplier of wireless ring tones based on popular
songs, ranging from Weezer's "Hash Pipe" to the Who's "Going Mobile."
"We're seeing a major push by the entertainment companies to take advantage
of the intersection between the ubiquity of cell phones and the digital
age," said P.J. McNealy, research director for GartnerG2, a technology and
business research firm in San Jose. "There's no doubt wireless could have
huge promotional opportunities for them."
Still, much of the excitement is over the potential applications--and
potential profit--for the cell phone, rather than what's currently being
realized.
Despite the hoopla and skyrocketing cell phone usage, no one can predict
whether Americans will pay to download music or watch movie clips on their
tiny screens.
"The wireless phone may be the next frontier for the marketing of
entertainment product in the U.S. But the market is fraught with unique
challenges," according to a recent issue of the Entertainment Marketing
Letter, an industry newsletter based in New York.
The use of ring tones, graphics and text messaging to promote entertainment
hasn't taken off in the U.S. as it has in Europe. There, cell phones are
more sophisticated and networks are equipped to handle the higher speeds
required for Internet-ready headsets.
Compounding these technical problems, few U.S. wireless carriers have
compatible systems, so a game developed for Sprint PCS' network can't be
played by AT&T Wireless or Cingular customers.
But conglomerates such as Vivendi, Disney and Sony can't afford to ignore
the possibilities of wireless, analysts said.
"Not only is it a new outlet, it's an outlet we are predicting will grow
extremely popular with the youth and teen market," said Knox Bricken, an
analyst with Boston-based technology research firm Yankee Group. "The
opportunities are huge."
Bricken forecasts that carriers will see a 430% growth in revenue from
these services over the next four years, from $215 million to $1.14 billion
by 2005.
Phone manufacturers, eager to boost sales of their hardware, will roll out
far more advanced handsets this summer, including such features as faster
Web browsing, larger and color screens and the ability to download music,
play more elaborate games and in some cases watch streaming video.
A new Nokia cell phone will come with a movie trailer for the upcoming Fox
Studios film "Minority Report" ready to play.
Carriers are spending billions of dollars this year to upgrade their
networks to carry more data at higher speeds. And they are hungry for new
content to fill their expanded pipelines, with services that generate more
subscription fees and minutes spent on their systems.
Some entertainment executives envision that within two or three years,
mainstream America will be checking movie listings over the phone,
downloading trailers, buying tickets and getting directions to the nearest
theater--all with a few taps on a phone pad.
For now, though, the ties between studios and carriers are more modest.
Consider "Spider-Man." For the last several months, Cingular has been
promoting the Columbia Pictures movie, which opened this month. Fans of the
comic book hero can indulge their passion by downloading Spider-Man
graphics, games and movie factoids on their mobile phones.
"It comes down to a desire to open our movies large," said Rio Caraeff,
vice president of wireless services for Sony Pictures Digital Entertainment.
All the major film studios now include wireless marketing as a component of
their movie advertising campaigns.
Sony Ericsson is introducing multimedia phones this year that will be used
as a platform to promote Sony properties, including both "Men in Black"
films and "Charlie's Angels" as well as games based on movies.
Sony also is developing wireless versions for its own software such as
PlayStation games. One new phone model even comes with a built-in joystick.
"We have very high expectations," Caraeff said. "Mobile gaming is a very
big business in Japan, Korea and most of Western Europe."
Universal Pictures signed a deal with Nokia this year to provide Nokia's
U.S. customers with logos and ring tones from Universal properties,
including upcoming movie releases such as "8 Mile," starring rap singer Eminem.
AOL also has been aggressive in the wireless arena. To help promote its
feature "Lord of the Rings," AOL's New Line Cinema sent out 20,000 text
message coupons to customers of VoiceStream. Fans could show theater
managers the coupon message on their mobile phones and receive free posters
from the movie.
For cell phone users, the onset of mobile entertainment is certain to
create some new, if strange, possibilities. Imagine Arnold Schwarzenegger
answering your voice with his signature "I'll be back."
A unit of Vivendi is busy buying the rights to digitally record the voices
of 100 top celebrities, which will then be offered as a service to wireless
carriers later this year. Celebrity voices also will be part of a $6 mobile
phone package to be offered by Vivendi for sale in grocery stores this summer.
Customers of AT&T Wireless can identify callers either by various Disney
characters that appear on the phones when a call comes in (one dwarf, say,
for each family member) or by ring tones from a catalog of popular Disney
songs such as "Zip-A-Dee-Doo-Dah" and "A Whole New World."
"We have high hopes for a big business," said Walt Disney Internet Group
President Steve Wadsworth. Disney also has a deal with Sprint PCS, which
will offer games based on the Disney features "Monsters, Inc.," "Atlantis"
and ESPN's 2-minute Drill.
"We feel that wireless gaming is the next step in the evolution of gaming,"
said Sprint PCS spokeswoman Stephanie Walsh.
One in six U.S. cell phone users, or 21.6 million people, will play games
on mobile phones this year, with the number increasing to 93 million in
2006, according to a forecast by research firm Datamonitor.
Disney's wireless push accelerated after its successful foray two years ago
into mobile-obsessed Japan, which offers a glimpse into what could
eventually come to the United States.
Through alliances with NTT DoCoMo and two other carriers, Disney said it
has built a profitable and expanding business in Japan. The company now
offers 13 subscription-based services to 2.5 million customers. Among the
services: a Disney fortunetelling service, Pooh screen savers, ring tones
and greeting cards, and virtual attraction games based on Tokyo Disney Resort.
Disney also operates a wireless fan magazine in Japan, which it used
recently to promote the opening of the Disney/Pixar Animation Studios hit
"Monsters, Inc."
"We see it as an opportunity to reach consumers any time, anywhere," said
Mark Handler, executive vice president of Disney's international Internet
operations.
But whether Disney's success in Japan will translate in America is
anybody's guess.
"It's too uncertain to say whether the DoCoMo model will be a big money
maker for the company," said Larry Shapiro, executive vice president for
business development and operations of Walt Disney Internet Group.
Though charges vary widely depending on the type of package the carrier
offers, customers pay an extra $1 to $5 a month for individual ring tones
and graphics, with entertainment companies getting about 10% of the revenue
as transaction or license fees.
But the industry is so new that no one is making money off mobile
entertainment, which faces a host of challenges. Among them are how to bill
and market services without offending wireless customers with unwanted
advertising.
Scores of telecom businesses that built their models around the
possibilities of delivering services through "third-generation" networks
have floundered because carriers have been slow to adopt new technology.
Vivendi has painfully learned that lesson with its multi-portal Vizzavi
Internet business in Europe.
The joint venture with the United Kingdom mobile operator Vodafone has
failed to live up to the promise of delivering news, sports, movies and
games through cell phones, personal digital assistants and personal computers.
"We were late in terms of developing the right devices for our customers,
who were not able to connect at the right speed and the right price," said
Philippe Germond, chief executive of Vivendi Universal Net.
Vivendi is taking a different tack in the U.S. The company is building
relationships with carriers through its new wireless-services subsidiary
rather than spending millions on launching a new portal.
Robin Richards, CEO of Vivendi Universal Net USA, has high hopes for
wireless in America.
"This is a business that three years from now is a $1-billion business for
Vivendi."
*
For related stories and photos, go to www.latimes.com/mobile tech.
********************
Los Angeles Times
Web Site Casts Ear on the Sky for Noisy Flights
Aviation: Residents near LAX can use the city-created system to identify
offending planes right down to their tail numbers and altitude.
By JENNIFER OLDHAM
TIMES STAFF WRITER
May 13 2002
Westchester resident Danny Schneider is used to a certain amount of airport
noise interrupting the early morning quiet. But when he stepped outside to
pick up his newspaper one day recently, a low-flying turboprop plane
overhead seemed even closer, and louder, than normal.
So Schneider did just what city officials and federal regulators hoped he
would do: He went inside and used his computer to find out exactly how low
the plane was flying, its tail number and which airline was operating it.
If it had been an egregious violation, which Schneider did not consider it
to be, he could have reported the offending flight. Schneider logged on to
a new Web site--LAX Internet Flight Tracks--that was created by the city
agency that operates Los Angeles International Airport so the 90,000 or so
people living under the flight path can better monitor aircraft noise.
Officials hope that residents will use the site to gather information about
wayward flights and report it directly to the airlines or the Federal
Aviation Administration, which determines flight paths into and out of LAX.
*
Web Site Averages 660 Visitors a Day
"If someone gets woken up at 3 a.m. because of an eastern departure, they
can go online, click and see who it was, and call the airline and ask what
they're doing," said Roger Johnson, deputy executive director of technology
and environmental affairs for the city's airport agency. "We hope this will
allow us to be responsive without being as labor intensive."
The airport's noise monitoring program lost employees and resources in the
budget crunch after the Sept. 11 terrorist attacks, forcing officials to
look for other ways to serve residents.
The flight tracking system--a year and $35,000 in the making--has logged
about 660 users a day on average since it debuted this month.
It determines a plane's location by listening in on communications between
an airplane's transponder--a device that sends a signal communicating
unique information about the craft--and the FAA radar system at LAX.
Many airlines and airports already use this software to keep track of
aircraft in the air and on the ground.
"This system allows a gate agent to tell people exactly when the aircraft
will come in, when it will be able to leave, and if it has been delayed,"
said Ron Dunsky, director of marketing for Megadata Corp., the Greenwich,
Conn., company that designed the Flight Tracks site for the city.
"The public doesn't have access to information at any other airports that
people are going to get from LAX," Dunsky said.
Visitors to the site can view arriving and departing flights, shown in blue
and green, respectively, and aircraft moving through the region, shown in
black. All of it appears on a 10-minute delay for security reasons.
Planes are superimposed on a map of the Los Angeles area. Users can zoom in
on neighborhoods, and view flight activity anywhere from six to 96 miles
from the facility. Clicking on an airplane icon provides additional data
including aircraft type, altitude and track identification number.
To get more information about a flight, surfers can wait an hour and use
the site's replay function, which provides the airline, the tail number,
the airport where the flight originated and its destination. The replay
feature archives data for three months.
The system has several quirks, including the propensity for an icon to
temporarily disappear from the screen when a flight passes directly over
the radar antenna on the airport's western edge, causing the device to lose
the transponder signal.
The site works best with a high-speed Internet connection and an updated
browser. It's slow to load on dial-up Internet connections.
Members of the LAX Community Noise Roundtable, a year-old organization
composed of representatives from 17 communities and agencies such as the
FAA, said the site gives residents the ability to assess for themselves
whether an aircraft has strayed from its flight path.
"A big 747-400 went right over the homes of people in Playa del Rey, and we
were able to look up and find out who the offending aircraft was," said
Westchester's Schneider, also a member of the Noise Roundtable.
"And then we could ask why did that plane do a go-around of their homes at
1,900 feet?" (A go-around is when an aircraft aborts a landing and flies
back around the airport to approach the runway again.)
The ability to provide an airline and flight number when reporting problems
has saved residents and airport officials time and headaches, Schneider said.
He added that in the past when residents called the airport about a flight,
officials often were unable to find it on their manifest.
*
Bay Area Uses Similar System
San Francisco aviation officials say a similar flight tracking system has
allowed them to better communicate with communities about noise issues
around San Francisco International Airport and San Jose and Oakland airports.
The year-old Bay Area site--live.airportnetwork.com/sfo/--is similar to the
LAX site. It provides residents with the altitude and air speed for
arriving and departing aircraft, but doesn't give the airline or tail number.
Residents can call the airport for this information, said Ron Wilson, a San
Francisco airport spokesman, adding that the site averages about 300 hits a
day. It doesn't have a replay feature.
"It has debunked the myth that the plane is really 500 feet over someone's
house," Wilson said. "It makes it easier for us to live with each other."
*
LAX Internet Flight Tracks is on the Web at
www.lawa.org/lax/htmlenv/flighttracks.html.
*****************************
Los Angeles Times
Bill Would Let Firms Share Customer Data
Several U.S. lawmakers introduced a long-awaited privacy bill last week
that would allow businesses to share information about customers who have
not explicitly forbidden them to do so.
More than a year in the making, the privacy bill unveiled in the House
differs from a competing bill making its way through the Senate that would
require businesses to get a person's explicit permission before sharing
sensitive information such as income level, religious affiliation or
political interests.
The bill by Rep. Cliff Stearns (R-Fla.) would instead leave companies free
to share customer profiles unless customers specifically forbade them. The
bill would cover transactions both on the Internet and in the offline world
and would override state laws that place more restrictions on commercial
use of personal information.
Consumers would have no right to sue if their privacy was violated.
Enforcement would be left in the hands of the Federal Trade Commission,
which usually does not impose fines on a first offense.
**************************
Federal Computer Week
Biotech firms figure into homeland security
Products target biodefense, health
Military and federal health officials, seeking cutting-edge technologies to
defend the country against bioterrorism and protect soldiers on the
battlefield, are turning to the biotechnology industry for help.
More than 300 biotech representatives packed a hotel conference room in
Washington, D.C., April 30 double the number that was anticipated to
attend the biotechnology industry's first-ever homeland security conference.
One representative at the conference called it a patriotic outpouring to
help in the war against terrorism. "I don't see a whole lot of difference
from what's going on in this room and the Manhattan Project," he said,
referring to the government's secret plan in the 1940s to develop an atomic
bomb.
By all accounts, biotech companies may become significant players for
federal agencies, including the Defense Department, which co-sponsored last
month's event with the Washington, D.C.-based Biotechnology Industry
Organization (BIO).
"We also concluded [that] in addition to solving the immediate problems of
biodefense and health, there are also significant opportunities to move
forward into additional areas such as materials science and logistics,
renewable energy sources [and] novel means of protecting servicemen and
servicewomen," said Col. Jerry Warner of DOD's Office of Net Assessment.
In the long term, biotechnology may not only address defense requirements,
Warner said, but may also "move the science into new areas, new thresholds,
spinning off both commercial products and services for the general American
public and economy." Such applications could mean using biomaterials for
camouflage, battlefield wound healing, polymers for protective clothing and
sleeping bags, innovative drug delivery systems, and DNA diagnostic and
detection technologies for rapid assessment of whether a biological attack
has occurred.
In addition, the technology may help lighten a 21st-century soldier's
burden. "Some of the applications of biologic technologies in computing
hold out the promise of reducing the weight that a combat soldier has to
deal with," said Douglas Bauer, director of counterterrorism coordination
at the National Academy of Sciences.
Carl Feldbaum, president of BIO, said DOD officials knew they couldn't
develop such technologies internally and had few dealings with biotech
companies. He said DOD's Office of Net Assessment approached BIO
(www.bio.org) to begin an interface even before Sept. 11.
Although "DOD had been able to integrate chemistry and physics and
engineering disciplines into the defense science base, they had not been
able to integrate biology particularly biotechnology recognizing that the
U.S. biotech industry is by far the largest and most advanced in
development in the world and therefore could convey a strategic advantage,"
said Feldbaum, who also recently met with Tom Ridge, director of the Office
of Homeland Security.
"It's new and emerging with a very different culture," he added. "The
biotech industry is not one that's used to government contracting. In fact,
only a handful of biotech companies have dealt with DOD in the past."
The conference was aimed at bridging the divide between the military and
the biotech industry. Throughout the conference, time was allotted for
companies to give 15-minute presentations of their products or emerging
technologies, which included vaccines, detection or diagnostic systems, and
drug delivery products.
Representatives from DOD and the Department of Health and Human Services
also discussed available grants and federal procurement requirements,
described the role and operations of different agencies and listed their
technology needs.
Biotech companies must learn how the federal government operates, several
people said, but the federal government must streamline its efforts to
better engage the industry.
"And it seems to me the government at a minimum has got to be a better
partner as we play this critical role in the days ahead," said Sen. Ron
Wyden (D-Ore.), who addressed the conference.
Wyden is co-sponsoring a bill with Sen. George Allen (R-Va.) that will
create a central clearinghouse for companies to present their new products
and for federal agencies to see how those products meet their needs,
establish a test bed facility to assess the products and better mobilize
the private sector following a terrorist attack or other emergency.
Feldbaum said the feedback and conference attendance was more than
expected. The biotech industry's involvement in homeland security is just
beginning, he said.
"After this is over, we're going to step back and figure out what to do
next, but there will be a 'next,' and it'll probably be in a bigger
facility," he said.
***********************
Federal Computer Week
State's 'Tracker' system follows weapons trail
Tom Clancy, hang up your hat. Members of the newest generation of spy
hunters don't wear trench coats or smoke fancy cigarettes. They don't
search for nuclear secrets in hollow tree stumps. And they don't whisper
secret codes when they meet undercover operatives.
Instead, the people seeking to prevent nuclear proliferation around the
world are using computer systems to track nuclear components and other
deadly materials in real time.
The latest of these systems, spearheaded by the State Department for about
$18 million and called Tracker, is now in place in nine countries not
including the United States to help detect the importation, exportation
and movement of material that could create a nuclear bomb, a dirty bomb or
another weapon of mass destruction.
"It tracks anything you could track toothbrushes with it, if you choose,"
said Steve Saboe, director of State's nonproliferation and disarmament fund.
Tracker was developed by FGM Inc. to keep data on the "cumulative buildup
of sensitive technologies," according to Todd Harbour, the company's
director of federal systems.
Tracker, a network application, uses Versant Corp. Inc.'s database
management system as the technology infrastructure to help State track the
near-real-time movement of strategic, dual-use and sensitive materials for
countries worldwide.
As of April, Tracker was deployed to nine nations, including the former
Soviet bloc countries of Hungary, Lithuania, Estonia, Latvia, Romania,
Slovakia, Bulgaria, Kazakhstan and Poland, where the transfer of technology
and nuclear materials remains a major concern for the United States.
Beginning next year, Austria and Switzerland will adopt the system. In
addition to the United States, Great Britain and Norway are helping to
finance the program.
"There are many pieces needed to stop people from doing something illegal,"
Saboe said. "Tracking exports is one of them."
Experts agree, saying that the need for better detection has only grown
since the Sept. 11 terrorist attacks. Law enforcement agencies in the
United States and around the world have repeatedly warned of possible
future terrorist attacks.
Although this type of tracking system does not deal with rogue nations such
as Iraq, Iran or Libya, anything is better than nothing, according to
Michael Levi, director of strategic security projects at the Federation of
American Scientists.
"A tool like this makes a lot of sense if you are looking for one person,"
Levi said. "It allows you to track smaller purchases rapidly." And it
enables investigators to examine a complete system instead of just pieces,
he added.
Although the United States is not using Tracker at its own borders, it has
scrambled to tighten security at airports, shipping ports and land entries
using other types of high-tech detection tools.
Like many of the systems rushed into service after Sept. 11, Tracker is
based on the idea that information can be catalogued quickly and trends
noted especially for ingredients that become lethal when combined.
The system will look at discrete pieces of data that are "innocuous [when
separate], but together set off an alarm," said Charles Wuischpard,
Versant's vice president of North American sales.
For example, the 1995 Oklahoma City bombing, which killed 168 people, was
the result of an explosive combination of fertilizer and ammonia. Now, if
someone wanted to import to a nation that uses Tracker a million cubic tons
of fertilizer one day and 100 million gallons of ammonia the next day, the
transaction could be spotted and halted.
The system has a disadvantage in that it relies on governments issuing
export licenses and putting the information into a computer. Each country
owns its information and is solely responsible for the accuracy of it.
Carol Kelly, vice president and service director for electronic government
strategies at the META Group Inc., said countries are more likely to fully
participate in the system because they want to maintain a good relationship
with the United States.
"Are the goods coming from a trusted port?" she asked. "Our allies, like
Canada and Germany, care very much.... Places like Singapore want to be
known as one of the trusted trading partners, and it becomes part of their
economic development."
***
Ready to roll
Tracker, developed by FGM Inc. for the State Department, is a
cross-platform export control and communication system. A three-tiered
network application designed to be easy to use with little training,
Tracker will help State and other governments track the movements and
locations of sensitive materials used to make weapons of mass destruction.
Tracker includes:
* An object-oriented workflow that automates system functions.
* A framework that permits real-time analysis and visualization of complex
relationships.
* An intuitive graphical user interface.
* A tool set that helps users develop new applications through ready-to-use
components.
**********************
New York Times
Vulnerability Is Discovered in Security for Smart Cards
By JOHN MARKOFF
AN FRANCISCO, May 12 Two University of Cambridge computer security
researchers plan to describe on Monday an ingenious and inexpensive attack
that employs a $30 camera flashgun and a microscope to extract secret
information contained in widely used smart cards.
The newly discovered vulnerability is reason for alarm, the researchers
said, because it could make it cost-effective for a criminal to steal
information from the cards.
Smart cards are used for dozens of different applications, including
electronic identity protection, credit and debit cards and cellular phone
payment and identity systems.
The Cambridge researchers said they had discussed their discovery with a
number of card manufacturers, and several had acknowledged the
vulnerability. One company reported that its security testing teams had
already considered types of attacks similar to the one mounted by the
Cambridge team and that they believed their products were not vulnerable.
The researchers said they had also proposed a potential design change to
the companies that would protect against the attack.
"This vulnerability may pose a big problem for the industry," they wrote in
their paper, "Optical Fault Induction Attacks." The researchers argued the
industry would need to add countermeasures to the cards to increase their
security.
The Cambridge group's discovery is one of two new smart card attacks that
will be introduced Monday evening in Oakland, Calif., at an Institute of
Electrical and Electronics Engineers symposium on security and privacy.
A team of researchers from I.B.M.'s Thomas J. Watson Laboratory in Yorktown
Heights, N.Y., said they would present a report at the conference based on
their discovery of a different vulnerability in subscriber identification
module, or S.I.M., cards. These are used in the type of digital cellphone
known as G.S.M., widely used in Europe and to a lesser extent here.
The vulnerability would make it possible for a criminal to find the secret
information stored in the card, steal the user's cellphone identity and
make free phone calls.
Smart cards are credit-card-like devices containing a microprocessor chip
and a small amount of computer memory for storing bits of electronic data
that represent money or other information that can be used to ensure
identity, like a code or a digitized retina scan or fingerprint.
More widely used in Europe than in the United States, the cards have long
been promoted as the key to a cashless society as well as for identity and
authorization applications. Some countries have begun using them for
national identity cards, and they have recently been discussed as a way of
confirming travelers' identities to speed airport security.
The Pentagon has armed soldiers with smart cards for online identity and
physical access, and the cards are in use in the United States in
commercial services like the American Express Blue credit card and the
Providian Smart Visa Card. Both cards are offered by their providers as a
convenient and safe way to make Internet purchases, although their actual
use for those purposes so far has been limited.
Some of the information stored in the card is in the form of a number
composed of ones and zeros that cryptographers refer to as a "private key."
That key is part of a two-key system that is used to encode and decode
information. The security of such systems is compromised if the private key
is revealed.
Typically, after the card holder authenticates the card by supplying a pin
number, the private key will then be used to encrypt any sort of
transaction using the card. For example, the card might be used to
authorize a purchase or a transfer of funds, make an e-mail message
private, log on to a computer network or enter a building.
The researchers from Britain, Sergei Skorobogatov and Ross Anderson, who
are based at the University of Cambridge Computer Laboratory, discovered
the flaw after Mr. Skorobogatov found that he could interrupt the operation
of the smart card's microprocessor simply by exposing it to an electronic
camera flashbulb.
They were able to expose the circuit to the light by scraping most of the
protective coating from the surface of the microprocessor circuit that is
embedded in each smart card.
With more study, the researchers were able to focus the flash on individual
transistors within the chip by beaming the flash through a standard
laboratory microscope.
"We used duct tape to fix the photoflash lamp on the video port of a
Wentworth Labs MP-901 manual probing station," they wrote in their paper.
By sequentially changing the values of the transistors used to store
information, they were able to "reverse engineer" the memory address map,
allowing them to extract the secret information contained in the smart card.
Mr. Skorobogatov is a Russian emigrant who was once employed in the former
Soviet Union's nuclear weapons program, where his job was to maintain bombs.
Mr. Anderson is a well-known computer security researcher whose work in
both computer security and cryptography is widely recognized.
The researchers said they had discussed their findings with a number of
companies that had acknowledged the vulnerability. However, at least one
manufacturer who had read the paper said it believed its products were not
vulnerable to the attack.
"This is a paper for an academic conference," said Alex Giakoumis, director
of product lines for the Atmel Corporation, a San Jose, Calif.-based maker
of smart cards. "We've already looked at this area."
He said his company had built defensive measures into its products that
would make them invulnerable to such an attack. However, he said he was
unwilling to be specific about the nature of the security system, because
such information would be valuable to someone who was attempting to break
the security of the Atmel smart cards.
The I.B.M. paper, which is titled "Partitioning Attacks: Or How to Rapidly
Clone Some G.S.M. Cards," was prepared by Josyula R. Rao, Pankaj Rohatgi,
Helmut Scherzer and Stefan Tinguely.
The researchers reported that they had dramatically shortened the time
needed to steal secret information from today's G.S.M. cellphones.
Their new approach can seize the information within minutes, they said,
making it a much more useful method than either breaking the cryptographic
algorithms used by the card or by intrusive attacks such as the Cambridge
approach. The I.B.M. researchers' report also offers advice to the smart
card industry on how to protect against vulnerabilities.
**********************
New York Times
The Yahoo Privacy Storm That Wasn't
nternet privacy is like the weather. Everyone complains about it, and no
one does anything about it.
The latest example involves users of Yahoo, the vast Internet portal that
set off howls of protest when it abruptly changed its marketing policy in
March. Suddenly, Yahoo granted itself the right to send advertising
messages to tens of millions of its users who had previously asked to
receive none. The blanket permission went beyond e-mail to include postal
mailings and telemarketing phone calls.
Immediately, privacy advocates reacted with criticism, and outraged
postings flooded message boards all over the Internet.
But for all the smoke, there was little fire of reaction, according to a
study conducted by comScore, a research firm that monitors the Web pages
viewed by more than a million Internet users.
Yahoo's changes did get some users' attention. In the four weeks from March
25 to April 21, nearly a million Internet users in the United States looked
at Yahoo's new privacy policy (privacy.yahoo.com/privacy/us/). That figure
represents 1 percent of Internet users in the United States and was up
sharply from the preceding four weeks, when only 0.3 percent of Yahoo users
read its privacy policy.
Slightly more people, 1.1 million, visited the page Yahoo had set up where
users could "opt out" by telling the site not to send e-mail or other
messages (subscribe.yahoo .com/showaccount). That page did not exist before
the portal's policy change.
But only 73,000 users, comScore projects, considered ending their
relationship with Yahoo by visiting the page (https://edit.yahoo.com
/config/delete-user) that actually cancels their Yahoo accounts, which can
include e-mail and other services. That was fewer, even, than the month
before, when 114,000 users went to the page. (ComScore is unable to tell if
the visitors to the page actually do push the button to close out their
Yahoo accounts.)
Srinija Srinivasan, Yahoo's editor in chief, confirmed that Yahoo's
marketing changes had led to action by a very small portion of its users.
"You will always have a few very vocal people," she said. "But in the end,
that a very small fraction of 1 percent of our users contacted us
underscores, as always, the scale on which we do business."
Still, Christopher M. Kelly, who was a privacy lawyer with the Internet
service Excite@Home, which is now defunct, says the seemingly low number of
users who actually read Yahoo's policy or considered changing their options
understated the effect on its reputation.
"People will keep their e-mail addresses at Yahoo," he said, "but they will
just stop using them if they feel Yahoo doesn't take their privacy
seriously and doesn't protect them from spam."
**********************
New York Times
For Old Parts, NASA Boldly Goes . . . on eBay
By WILLIAM J. BROAD
NASA needs parts no one makes anymore.
So to keep the shuttles flying, the space agency has begun trolling the
Internet including Yahoo and eBay to find replacement parts for
electronic gear that would strike a home computer user as primitive.
Officials say the agency recently bought a load of outdated medical
equipment so it could scavenge Intel 8086 chips a variant of those chips
powered I.B.M.'s first personal computer, in 1981.
When the first shuttle roared into space that year, the 8086 played a
critical role, at the heart of diagnostic equipment that made sure the
shuttle's twin booster rockets were safe for blastoff.
Today, more than two decades later, booster testing still uses 8086 chips,
which are increasingly scarce. NASA plans to create a $20 million automated
checking system, with all new hardware and software. In the meantime, it is
hoarding 8086's so that a failed one does not ground the nation's fleet of
aging spaceships.
The same is true of other obsolescent parts, dozens of them.
"It's like a scavenger hunt," said Jeff Carr, a spokesman for the United
Space Alliance, the Houston company that runs the shuttle fleet. "It takes
some degree of heroics."
Troves of old parts that NASA uncovers and buys, officials said, are used
not in the shuttles themselves but in flotillas of servicing and support
gear. Such equipment is found, and often repaired, at major shuttle
contractors around the nation, as well as at the Kennedy Space Center in
Florida, where the shuttles blast into orbit.
That old computer in your basement? NASA is not interested. The agency and
its contractors want stockpiles of old parts to buy in bulk for repairing
old machinery and building inventories of spare parts.
Recent acquisitions include outdated computer chips, circuit boards and
eight-inch floppy-disk drives. "One missing piece of hardware can ruin our
day," said Mike Renfroe, director of shuttle logistics planning for the
United Space Alliance at the Kennedy Space Center.
Recently, Mr. Renfroe said, his team swept the Internet to find an obsolete
circuit board used in testing the shuttle's master timing unit, which keeps
the spaceships' computers in sync. None could be found. A promising lead
turned false. Finally, a board was found. It cost $500.
"That's very inexpensive," Mr. Renfroe said. "To hire a design engineer for
even one week would cost more than that."
NASA's growing reliance on antiquated parts is in some ways a measure of
how far its star has fallen. In the early 1960's, the agency played a
leading role in founding the chip industry. Its mass purchase of the
world's first integrated circuits set the fledgling business on the road to
profitability.
In turn, the expensive chips let NASA achieve feats of miniaturization that
put advanced satellites into orbit and men on the moon. Thousands went into
the lunar lander, making its guidance computer "smaller, lighter, faster,
more power-efficient and more reliable than any other computer in
existence," as T. R. Reid wrote in "The Chip" (Simon & Schuster, 1984).
Today, NASA is increasingly a victim of its own success. Civilian
electronic markets now move so fast, and the shuttles are so old, that NASA
and its contractors must scramble to find substitutes.
In the past, NASA procurement experts would go through old catalogs and
call suppliers to try to find parts. Today, the hunt has become easier with
Internet search engines and sites like eBay, which auctions nearly everything.
Mr. Carr of the United Space Alliance said that when the government bought
complex systems like jet fighters, the contracts often had provisions that
called for routine upgrades and improvements as a way to limit
obsolescence. But the shuttles, with a design lifetime of a decade, never
had that kind of built-in refurbishment plan.
The winged spaceships are to fly until 2012. But NASA is researching
whether their retirement date can be pushed back to 2020.
For parts hunters, it could be a long haul. The shuttles, Mr. Renfroe of
the United Space Alliance noted in an awed tone, "could go for 40 or 50 years."
******************
Los Angeles Times
More Data on Doctors Backed
Health: Medical board approves a plan for posting malpractice settlements
on Internet. Legislature's OK needed.
By CHARLES ORNSTEIN
The Medical Board of California has voted to support public disclosure of
all medical malpractice settlements involving physicians, which would
significantly expand public access to information about doctors.
At a meeting Saturday in Newport Beach, the board voted unanimously to
distribute the information on its Web site, if the Legislature approves.
Two board members abstained from voting.
The medical board, which licenses, investigates and disciplines doctors,
currently does not disclose any information about malpractice settlements.
Its Web site provides information on California disciplinary actions
against doctors; malpractice verdicts or arbitration awards; felony
criminal convictions; major hospital disciplinary actions; and sanctions by
other states' medical boards.
Dr. Gary Gitnick, the board's new president, said his colleagues have "very
progressive ideas."
"It clearly is a board that realizes that its prime reason for existence is
public protection," said Gitnick, a UCLA gastroenterologist. "And one
element of public protection is making it possible for any member of the
public to learn as much as they can about their physicians, both good and bad."
If the board's recommendations are adopted by lawmakers, members said they
would like to release malpractice settlements dating back five years.
By proposing to make public malpractice settlements of any size, the board
went further than suggestions made by lawmakers earlier this month. On May
1, the Joint Legislative Sunset Review Committee supported disclosing
malpractice settlements above $150,000, as well as the names of doctors who
had three or more settlements above $30,000 in a 10-year period.
The legislative panel and the medical board agree on several other areas of
public disclosure. They include misdemeanor convictions related to
physicians' qualifications and functions, along with board referrals to the
state attorney general's office for disciplinary action.
The California Medical Assn. and malpractice insurance carriers have
strongly opposed release of settlement information. The liability insurers
obtained a temporary injunction this year barring the medical board from
releasing settlement information requested by the San Francisco Chronicle.
Leaders of the doctors group have said they fear that the public might
misinterpret the data.
"Disclosure of settlements will drive patients away from good doctors and
compound already severe health access problems in California," said Dr.
John Whitelaw, the association's president, at a May 1 legislative hearing.
"Furthermore, settlement disclosure is likely to drive up malpractice
premiums because physicians will more frequently refuse to settle, thus
increasing malpractice insurance costs and delaying resolution for all
concerned."
Board members said their Web site (www.medbd.ca.gov) will provide patients
with background to help them interpret information and place it in proper
context.
Incoming medical board Vice President Dr. Hazem Chehabi said the board was
uncomfortable setting a monetary threshold for disclosure of settlements,
which would have given the public an incomplete picture.
As it stands, state law requires malpractice carriers to report only
settlements above $30,000 to the board. If that law isn't changed, smaller
agreements would remain out of public view, even if the board's
recommendation is adopted by the Legislature.
"We wanted to send a message that we really wanted to disclose all
settlements," said Chehabi, president of the Newport Diagnostic Center. "We
are totally committed to new policies that would protect the consumers and
inform them so that they can make the best decisions regarding their own
health care."
*******************
BBC
Teaching goes virtual in Pakistan
Thousands of Pakistanis are being offered the chance to learn the skills
they need to thrive in the computer age thanks to a new virtual university.
The US$40m project is providing distance learning over the television and
internet so that anyone can take part in the classes, regardless of where
they live in Pakistan.
The aim is to create a generation of software programmers and computer
engineers who can rival the best in countries like the US.
Pakistan is eager to develop an information technology industry, much like
India has done. Experts estimate the country needs at least 60,000 computer
science graduates to achieve this aim.
"India is a very inspiring case. They got their act together very early,"
said Salman Ansari, adviser to Pakistan's Ministry of Science and Technology.
"We are leveraging technology to get to the level that we need to get to,"
he told the BBC programme Go Digital.
Exciting education
The Virtual University combines television, video-conferencing and the
internet to provide lessons, tutorials and guidance to students all over
Pakistan.
The lectures are produced in a professional studio, carefully put together
to ensure they are clear and accessible.
Students can log on to the university over the internet and discuss the
subject with a lecturer.
"The students feel empowered by sitting in front of a PC and being able to
shoot off questions or put their comments on a discussion board," said
Naveed Malik, the rector of the Virtual University.
"It's a very exciting experience. Students are realising that they are
having a better educational experience than most of our conventional
institutions."
Cheap and friendly
Currently around 500 people are taking part in a pilot project. The
organisers hope to have 5,000 students by September, rising to 25,000 by
the end of 2003.
One of the key aspects of the project is to ensure that anyone, regardless
of their income and where they live, can take part in the lessons.
"We have opened up access to the Virtual University to all segments of the
population by keeping the prices extremely low," said Mr Malik.
To this end, educational centres are being set up where students can view
the courses and access the internet.
The plan is to set up a high-speed computer network linking 60 universities
and 2,500 schools and colleges. A further 10,000 schools will be able to
access the lessons through the internet.
"We realised that we had to build up the internet in Pakistan very
rapidly," said Mr Ansari.
"So two years ago we had about 29 cities on the internet; today we have 580
online and it will be 1,000 by the end of the year."
The government has also worked to ensure that the cost of going online is
within reach of most.
"I could be sitting in the middle of nowhere, hundreds of miles from
anywhere, but when I log in, the cost would be six rupees (10 cents) an
hour," he said.
******************
BBC
Getting tough on spam
Last weekend more than 1m spam messages were sent to distribution network
Usenet, a level of abuse never seen before, according to UseNet member
David Ritz.
This prompted the issue of what is called a Usenet Death Penalty, which
would see any Telewest user banned from Usenet newsgroups unless the ISP
takes action to get rid of the spammers.
The problem is by no means limited to Telewest though. The bulk of last
weekend's junk email came via BTopenworld servers.
Widespread problem
"I've managed to get a few providers to take these things seriously but far
too many appear to be ready to ignore these problems," said Mr Rtiz.
"Telewest just happened to be one of the two unlucky providers which pushed
me over the edge this past week."
The second is Videotron, an ISP based in Canada.
Telewest says it is trying to bring the problem under control.
"As far as I'm aware a death penalty has not been issued, just a warning,"
said a Telewest spokesman.
"There has been a recent explosion of Open Relays [virtual servers which
allow spam to be multiplied through the network] and we are in the process
of contacting customers telling them to shut them down,"
"There is a small minority that is evasive but it is an ongoing issue for
all ISPs," he said.
Security issue
Spammers take advantage of open ports on proxy servers set up by ISPs to
make connections faster for customers. This hijacking of servers by
spammers could be the tip of the iceberg, said Mr Ritz.
"While spam is the visible element being addressed under this Usenet Death
Penalty, the underlying issue is of even greater concern, as it deals with
fundamental security issues being faced by users, providers and businesses
around the world," he said.
If e-mail has been the golden goose of the internet then spam is definitely
the unfriendly giant looming over it. In Europe alone millions of spam
e-mails are sent each day.
"The problem is a lot worse than consumers think. A lot of it is filtered
out before it reaches them," said Joe McNamee from Euro ISPA (Internet
Service Providers' Association).
The European Parliament is currently looking at ways of limiting the
activity of spammers and is due to vote on a ban at the end of this month.
No future
E-mail marketing is a new and powerful way for marketers to get in touch
with their customers. Many firms are increasing their digital marketing
spend to include e-mail campaigns.
Spam however is not acceptable, direct marketing guru Seth Godin told
delegates at a marketing event in London organised by DoubleClick.
"Spam is spam and none of it has a future," he said.
Instead digital marketers must carefully build relationships with customers
over time and make sure that any marketing done via e-mail has the
permission of the consumer.
"In the past marketers have been Neanderthals with a mentality of let's get
a gun and go and find us some strangers to sell to," he said.
"In the future they need to be more like farmers, building their assets
slowly over time."
For Mr Ritz the war against spammers cannot be won soon enough.
"When you begin to do the maths you'll see the enormous cost involved both
in terms of storage and the bandwidth required to transport this massive
quantity of what amounts to the same thing being said over a million
times," he said.
"If you say something once, it's speech. If you say the same thing a few
hundred times every day, it becomes nothing more than noise."
*****************
New York Times
In Free-Music Software, Technology Is Double-Edged
Imagine returning home with a bounty of pirate's booty. Upon reaching
shore, you're mugged and the treasure hoisted. You turn for relief to the
local constable, who gives you a swift kick in the shins and a public
reading of the definition of the word comeuppance.
The analogy is far from a perfect one for what's going on with Sharman
Networks, an Internet company with headquarters in Sydney, Australia. But
it does help suggest why a few people are giggling when Nikki Hemming, 35,
Sharman's chief executive, says she wishes that people would just leave her
alone to make an honest living.
Sharman Networks distributes a piece of software called Kazaa. As Napster
used to do, the Kazaa network lets people exchange music without charge
over the Internet, and they are exchanging it by the boatload. Some 64
million people have downloaded Kazaa within the last year, making it more
popular than a video of an Ozzy Osbourne family brunch.
For obvious reasons, the record industry despises Kazaa. All the major
record labels have sued Kazaa's creator, Fast Track, a Dutch company,
contending that the software is basically a tool used for wholesale piracy
of music, and the industry has explored whether to include Sharman in the
lawsuit, according to people familiar with the case.
But Ms. Hemming already has her hands full. She has been busy keeping
people from ripping off her own bounty.
It seems that while Sharman Networks gives away the Kazaa software, it is
hardly a nonprofit company. It insinuates advertising into the Kazaa
network, making money each time people download songs. Sharman does not
advocate that people download copyrighted files, but it says it doesn't
have the means to stop them.
But now some privateers have cut down Sharman's action by making and
distributing stripped-down copies of Kazaa. The software still allows users
to get on the Kazaa network and exchange free music. But the software
removes the ads, which means that Sharman isn't paid. "They are offering
Kazaa without the things that make Kazaa commercially viable for us," said
Kelly Larabee, a Sharman spokeswoman.
The people at Sharman have a powerful sense of indignity. But some people
may wonder if they've fallen a little short in the sense-of-consistency
department.
Then there is geography. In this case, as some pirate stories do, this tale
involves the high seas of the South Pacific.
Lawyers for Sharman have sent letters to people who they believe are
copying Kazaa, but those individuals have not been easy to find. One
copycat, who distributes "Kazaa Lite," obscured his identity by using a Web
site registered through Tokelau, a group of islands north of Western Samoa.
If you're guessing that the reason to register through Tokelau is not its
rich history of tech support, you'd be on the same page as Sharman's
lawyer, Judy Jennings. She said people who register domain names through
Tokelau are not required to give their names. "There is an implication
they're doing it on purpose so they would be hard to find," she said.
Ms. Hemming, however, has been easier to find at least for the last two
weeks. During that time, she held her first news conference. Before that, a
company publicist declined to provide any details about Sharman, like its
specific whereabouts.
But in her conference call with the news media, Ms. Hemming divulged that
the company is registered in Vanuatu. That's a group of South Pacific
islands, which, she said, offers favorable tax status. (Ms. Hemming keeps
Sharman's headquarters in Australia, which has favorable status in the
restaurant and standard-of-living area.)
In other words, Sharman thinks that the creators of Kazaa Lite are cravenly
hiding in Tokelau while Sharman itself operates in the open in Vanuatu.
Sharman doesn't like the suggestion that it has spent months being less
than candid about its whereabouts.
"It's not that we were hiding," Ms. Larabee said. "It's that we didn't
clarify." This distinction between hiding and not clarifying is important,
with broad implications. For instance, the accounting firm Arthur Andersen
might note that it didn't hide documents related to Enron, just that it
failed to clarify the documents would have to be viewed in very thin strips.
But as it pertains to the music issue, what Ms. Larabee and Sharman
Networks are getting at is something that many people may know already:
Vanuatu is no Tokelau.
Indeed, the people at Sharman see very few parallels between their
complaints over copying and those of the record industry. Ms. Hemming says
she just wants to make an honest living, and wishes that people would
please stop taking what is rightfully hers. She might also wish that people
would quit giggling.
*********************
Government Computer News
11 courts put criminal case files online
By Preeti Vasishtha
Eleven federal courts are letting the public access criminal case files
online.
The effort is part of a pilot program by the Judicial Conference of the
United States to study privacy and public access to electronic files in
criminal cases.
Users can access the files through the federal courts' Public Access to
Court Electronic Records system for seven cents per page, Judicial
Conference officials said.
Information about PACER and participating courts can be found at
pacer.psc.uscourts.gov/cgi-bin/links.pl.
Last September, the conference voted to make most civil and bankruptcy case
documents available over PACER to the same extent they are available at the
courts, officials said.
The conference approved the pilot program in March and will review the
findings in September 2003.
*******************
USA Today
Microsoft pitches schools new licensing option
By Byron Acohido, USA TODAY
Companies cringe at Microsoft licensing
SEATTLE Last month, 24 school districts in Washington and Oregon received
a sobering letter from Microsoft.
The software giant gave the districts 60 days to produce receipts
accounting for every copy of Microsoft software being used anywhere on
school property. But many school PCs are donated or have programs loaded by
students or teachers with no documentation.
In the same envelope came a sales brochure highlighting the merits of
signing up for a "volume license" similar to those in a new licensing
program for companies. Rather than endure an audit, the schools could pay
Microsoft an annual fee based on the number of computers capable of running
Microsoft software.
The districts scrambled to organize software audits and agonized over
whether to pay the annual fee, which could run $40 a PC, or, they say, risk
being fined for software piracy. "We thought it was very heavy-handed,"
says Steve Carlson, associate superintendent of information and technology
at Beaverton Schools in Oregon.
Microsoft has sent 500 audit notices with accompanying sales brochures to
500 school districts in 30 states. Its corporate clients have been feeling
similar heat. Some 6% of 1,400 businesses surveyed last month by
Information Technology Intelligence and Sunbelt Software said they had been
threatened with an audit if they didn't sign up for a new licensing
program; 26% said Microsoft alluded to the possibility of an audit.
"Microsoft is trying really hard to move from selling software in boxes to
selling software by subscription," says Stu Sjouwerman, Sunbelt Software
president. "It is the 800-pound gorilla flexing its muscles and everybody
better beware."
Sherri Bealkowski, general manager at Microsoft Education Solutions Group,
says, "We're trying to remind everybody that it's hard to stay compliant
and to make them aware of the different options they have." The audit
notices sent to the 500 school districts is "standard practice. We do it
all the time," she says.
One option schools have: Call Eric Harrison at the Multnomah Educational
Service District in Portland, Ore. Since 1997, Harrison has been developing
networks based on the free Linux operating system. His latest project links
40 older PCs to a single set of software applications running on a central
Linux server computer. The cost: $200 a seat vs. $1,500 a seat for PCs
running Microsoft, he says.
"My phone's been ringing off the hook," he says. "Schools are looking at
what Microsoft wants them to do, and it increases their cost significantly.
******************
MSNBC
ID thieves mine for gold on jail sites
Online public records give Social Security numbers and more
By Bob Sullivan
May 12 If keeping Social Security numbers off the Internet is a bit like
trying to plug holes in a leaky dam, the U.S. justice system has left a
floodgate open. Dozens of law enforcement Web pages list names, addresses,
dates of birth, Social Security numbers, heights and weights everything an
identity thief needs to impersonate a victim. Sometimes there's even a
photo. The dossiers belong to prison inmates and wanted criminals; the
sites that list them have become user-friendly shopping malls for identity
thieves.
A SOCIAL SECURITY NUMBER is the key to a person's financial
kingdom. In some cases, all you need to get a credit card or a car loan is
a Social Security number and a date of birth.
There's thousands of such matched pairs for the taking on the
Internet, thanks to efforts made by government agencies and the justice
system to publicize information about convicted criminals. Orange County,
Fla., for example, publishes the Social Security number of every inmate
only moments after her or she is jailed, some 57,000 people in the past
year. Indiana's Sex and Violent Offender Registry also offers up such data,
even including driver's license numbers. And the U.S. Marshals Service
"Most Wanted" Web site lists Social Security numbers along with
photographs. Prospective identity thieves using the site can be sure to
pick someone with similar looks.
But who would want to impersonate a jailed criminal? Or worse yet,
an alleged felon wanted by federal authorities?
Anyone who wants a disposable identity. As long as the thief is
reasonably sure a criminal background check won't be conducted immediately,
the risks are low, experts say.
"Basically they're offering up all the data you need to make a
driver license," said Rob Douglas, CEO of American Privacy Consultants. But
what about being mistaken for the real criminal? "That stuff doesn't really
matter. As a privacy thief, I'm just looking to create an ID to get a
credit card or pass myself off as somebody else for a while."
Meanwhile, the ID thief knows exactly how long it will be before
the victim is released from prison, and therefore how much time they have
before suspicious account behavior is likely to be recognized.
"If I wanted to become someone else, I'd probably look for some
middle-class white male arrested for narcotics, preferably with intent to
distribute," said John C. Hennessy, a programmer who alerted MSNBC.com to
the online prisoner databases.
PUBLIC RECORDS LAWS AT ISSUE
Assuming the identity of a wanted criminal apparently isn't as
crazy as it sounds.
"Identity theft, it actually is a problem for us," said Nikki
Credic, spokesperson for the U.S. Marshals Service. "People do go on our
Web site and they obtain information there and open up fraudulent accounts."
The problem is a Catch-22 for the U.S. Marshals, she said. One the
one hand, they want to publish any available information which could lead
to the capture of a fugitive. It's possible a Social Security number could
be recognized by a car dealership about to offer a car loan, for example.
On the other hand, identity thieves can actually obscure the hunt
for a criminal by creating a string of false leads.
"(U.S. Marshal officials) know it's a problem, but at this point
they have not made a decision about it," Credic said.
For agencies publishing inmate data, aggressive public records laws
are at the heart of the problem. Most agencies in Florida publish inmates'
Social Security numbers because they are required by law to do so, and
publication on the Internet simply magnifies an old problem. But that's
likely to change soon both houses of Florida's legislature recently passed
a law excluding Social Security numbers from public records, and the
governor is expected to sign the bill by a May 16 deadline.
Still, privacy experts are worried that criminals' financial
information will continue to leak out onto the Net, in part because it
won't arouse much public outrage or inspire quick calls to action. After
all, said Douglas, who would step forward to defend criminals' privacy rights?
"There is nobody who's going to be real sympathetic to the fact
that their information is out there," said Douglas. "So then the question
becomes, 'What's the purpose?' "
Richard Smith, former chief technology officer for the Privacy
Foundation, says there probably isn't a purpose some agencies are likely
publishing the data simply because they can.
"There probably is no reason to publish Social Security numbers. An
age would probably be more useful than a birth date," Smith said. "I
suspect that the states are simply copying data from someone's record
without thinking through all of the implications."
IT'S NOT JUST CRIMINALS
Convicted criminals who may leave jail only to suffer fallout from
identity theft might not evoke sympathy, but the problem of balancing open
public records with financial privacy is far more widespread. In fact,
court documents of every kind are among the most popular target for
identity thieves.
Hennessy said he can find the Social Security number of anyone who
has ever filed for bankruptcy using the Public Access to Court Electronic
Records system, also called PACER.
"The trend seems to be that many people aged 18 to 30 will file
bankruptcy at least once in those years," Hennessy said.
The Judicial Conference of the United States, which sets policies
for federal courts, has been trying to plug some some of the holes that
turn public records and specifically PACER into havens for identity
thieves. Until last year, personal financial data, including bank account
information, regularly made its way into the PACER system in documents that
are part of a variety of federal lawsuits.
Last year, the Judicial Conference recognized the problem and
instituted a policy that requires redaction of data such as Social Security
numbers. But the burden of removal lies with the parties involved, so the
data sometimes slips into the system anyway. And removing the information,
generally by obscuring part of the account numbers, is a time-consuming
process.
In fact, the burden is so high that when the Judicial Conference
asked for public comments on its plans, a bankruptcy court official in New
Mexico offered these alarming observations:
"Efforts to curb the publication of these numbers is futile. They
are too widespread, and too necessary to identification. ... Such proposals
would significantly increase processing time in every case."
Such efforts will become even more involved soon, as the Judicial
Conference last week agreed to begin a pilot program in 11 states that will
expand PACER to include federal criminal case records. Financial data is
supposed to be redacted from those files, also.
LEGISLATORS TRY TO PLUG HOLES
The Judicial Conference policy mimics sentiments expressed by
legislators in Florida, Nebraska, and even the U.S. Senate toward striking
Social Security numbers from public records. A federal law proposed by
Sens. Diane Feinstein, D-Calif., and Judd Gregg, R-N.H., would make display
of a Social Security number illegal. But even the bill's supporters concede
it would take two to three years to get government agencies to stop
publishing the data as part of public records, said Chris Hoofsnagle, an
attorney with the Electronic Privacy Information Center. And still, the
data would live in a mountain of documentation that's already public.
"There's no talk of going backwards," he said.
Even marriage licenses in some states are public, and can be mined
for Social Security numbers, Hoofsnagle said.
PUBLIC ACCESS ADVOCATES OBJECT
Not everyone is for striking the data. Information brokers,
journalists, and other researchers are worried any weakening of open
records laws would make their job much more difficult. Organizations like
EPIC, always a staunch supporter of open records laws, find themselves
straddling the fence on this topic.
"We strongly support public access to records. But we've argued there
should be use limitations, so the data is used consistently with their
purposes," Hoofsnagle said. "The problem you see between Pacer and other
public records sites is they are mined by commercial entities. The data can
be used for any purpose proper purposes and improper purposes."
But while government agencies and lawmakers labor over the fate of
the public record laws, identity thieves are having a field day browsing
through records provided today by Web sites like the Orange County
Government Services Online.
"As for risk, it's on the high end of the scale," Douglas said.
"It's ridiculous that (Social Security numbers) are out there. There is no
law enforcement or protection function served by putting all of that data
out there. It's just a red flag inviting abuse, whether that is vengeful
abuse or just run-of-the-mill identity theft."
********************
MSNBC
Outage dumps Microsoft MSN users
MSNBC.com, Newsweek.com sites also affected
By Joe Wilcox
May 12 Some Microsoft MSN Web sites collapsed Sunday, leaving many users
unable to access game, Web-based e-mail, chat and search features, among
others.
THE OUTAGE ALSO brought down for a while MSNBC.com and
Newsweek.com, which has a hosting arrangement with the Microsoft-NBC news
site. (MSNBC is a Microsoft-NBC joint venture.)
The outage is one in a series of recent glitches affecting MSN Web
sites or Passport online authentication. Users could not access Microsoft's
popular Game Zone Web site. Some Hotmail users also found they could not
access the Passport log-in page for accessing the Web site. The outage also
affected Internet Explorer 6 users, who discovered they could not search
the Web using the default setting. IE 6, which is integrated into Windows
XP, uses MSN for Web searches.
"This also affected people wishing to sign-out of their Passports
on the Zone.msn.com site, causing a potential security issue for that
segment of their passport access," said Shane Johnson, a network/messaging
consultant from Puyallup, Wash.
Users of services such as bCentral, Game Zone and Hotmail, all
Microsoft services requiring Passport authentication, typically need to log
out of the service to avoid exposure to a possible security problem. This
removes a cookie that if pilfered by a Web site or other program that could
allow a hacker to take control of the account. So not being able to log out
could be as much a problem as not being able to log in.
CNET News.com started receiving user complaints about the outage
around 9:15 a.m PDT Sunday and later confirmed through testing that some
kind of failure had occurred with a number of MSN Web sites or services.
Johnson was one of those users alerting CNET News.com to the
problem. He concluded that Microsoft had a problem with one of its primary
backbone routers.
Microsoft could not be reached for comment about the problems.
Microsoft's .Net Messenger service appeared unaffected by the
outage as well as the main MSN and Microsoft Web sites.
Sunday's outage follows a string of gaffes or security glitches
that continue to call Microsoft's .Net Web services strategy into question.
In court last week, testifying as part of Microsoft's antitrust
trial, Jim Allchin, the senior vice president responsible for Windows,
described .Net My Services as being "in a little bit of disarray."
In April, a server glitch locked many Hotmail users out of their
accounts. In January, a glitch with Passport authentication blocked some
users from accessing Microsoft's game site. This followed a more serious
December crisis, when Microsoft's switching users over to Passport
authentication prevented some users from logging onto the Web site.
On Wednesday, Microsoft warned of a critical security hole in MSN
Messenger's chat feature. In February, a fast-spreading worm exploited a
glitch in MSN Messenger, while another problem prevented some Windows
Messenger and MSN Messenger users from staying connected to the Internet. A
summer 2001 outage kept about 10 million Messenger users offline for about
a week.
Instant messaging is an important component of Microsoft's .Net My
Services strategy, the company's consumer Web services offering that is
under construction. Microsoft plans to use Windows Messenger, which is
integrated into Windows XP, and MSN Messenger as a back haul for the
company and third-party service providers to communicate with customers.
The first service, .Net Alerts, delivers stock quotes, traffic reports and
other information through Microsoft's instant messenger.
Other security problems continue, despite Microsoft Chairman Bill
Gates' call that the company put more emphasis on making software secure
than adding new features.
In March, Microsoft issued a pair of patches for Internet Explorer
security holes. February and April security holes potentially opened Office
for the Mac to hackers. Also in April, Microsoft issued fixes for about 10
security holes affecting three versions of Internet Information Server.
***************
MSNBC
A cookieless Web monitor?
Researchers in Scotland working on undetectable software
By Gwendolyn Mariano
May 10 Researchers in Scotland are developing a new kind of Web monitoring
software that they claim can collect enormous amounts of data on Web
surfers while remaining nearly undetectable. The technology came to light
when it was chosen as one of 40 technologies funded this year by the
Scottish Enterprise, Scotland's economic development agency. The University
of Strathclyde received the award for an undisclosed sum Thursday.
DR. LYKOURGOS PETROPOULAKIS, who is heading the 18-month research
project, declined to comment on the technology, calling it "highly
classified" information.
Web surveillance software has drawn intense interest from consumer
advocates, who fear the interactive nature of the Internet can provide
unprecedented power for governments, corporations and individuals to
trample people's privacy. Several monitoring systems have been developed
for use by law enforcement agencies that remain cloaked in secrecy,
ostensibly due to security concerns.
The FBI has battled privacy groups seeking information on its
DCS1000 Web monitoring technology, also known as Carnivore, which is
installed on systems run by Internet service providers. The European Union,
meanwhile, has lobbed espionage charges at the U.S. government and some of
its allies over an alleged surveillance system known as Echelon, which
incorporates satellite and undersea cable wiretaps, according to an EU
investigation
"Technology like this, once it's spread around, means people can be
tracked from site to site," said Lee Tien, senior staff attorney for the
Electronic Frontier Foundation. "Whatever (the Scottish Enterprise) is
doing, this is part of a long-standing practice by governments to fund the
development of spying technology or, more generally, technology that
facilitates law enforcement and national security."
The Scottish Enterprise called the technology being developed by
Petropoulakis' team a "breakthrough," outpacing any other technology on the
market by allowing a more detailed profile of a Web user's activity.
TRACING VIA 'SENSORS'
According to a statement, the technology traces Internet use via
"sensors" rather than cookies, or bits of code that sit on computer hard
drives that have long been used by Web sites to monitor people's travels on
the Web. The technology can be operated on any Web server and can monitor
Internet use in real time. In addition, the software can block access to
sites, e-mails and documents.
The Scottish Enterprise added that the technology might find
legitimate uses from government, education and commercial organizations as
well as Web marketers. Possible uses under consideration, it said, include
monitoring of employee Web surfing in the workplace and monitoring of
children's Web use by parents.
"Technology like this, once it's spread around, means people can be
tracked from site to site," said Lee Tien, senior staff attorney for the
Electronic Frontier Foundation. "Whatever (the Scottish Enterprise) is
doing, this is part of a long-standing practice by governments to fund the
development of spying technology or, more generally, technology that
facilitates law enforcement and national security."
The Scottish Enterprise called the technology being developed by
Petropoulakis' team a "breakthrough," outpacing any other technology on the
market by allowing a more detailed profile of a Web user's activity.
TRACING VIA 'SENSORS'
According to a statement, the technology traces Internet use via
"sensors" rather than cookies, or bits of code that sit on computer hard
drives that have long been used by Web sites to monitor people's travels on
the Web. The technology can be operated on any Web server and can monitor
Internet use in real time. In addition, the software can block access to
sites, e-mails and documents.
The Scottish Enterprise added that the technology might find
legitimate uses from government, education and commercial organizations as
well as Web marketers. Possible uses under consideration, it said, include
monitoring of employee Web surfing in the workplace and monitoring of
children's Web use by parents.
****************************
Government Executive
Mushrooming homeland security budgets face Hill scrutiny
By William New, CongressDaily
Months after the Sept. 11 terrorist attacks, Congress remains eager to give
the Bush administration billions of extra dollars to make the nation more
secure within its borders. But some members are beginning to wonder how it
is being spent.
Shortly after the attacks, Congress approved a $40 billion emergency
supplemental for the war on terrorism and to quickly address homeland
defense gaps--paid out in three portions over several months. The
administration has returned to Congress in recent weeks to seek another $27
billion emergency supplemental for the current fiscal year. In addition,
the president has requested $38 billion in homeland defense spending for
fiscal 2003.
Yet in a Senate Appropriation Committee hearing earlier this week, Defense
Department Comptroller Dov Zakheim again said he could not identify how the
original $40 billion supplemental has been spent. Zakheim promised to offer
some numbers by the end of the week.
"I think the [Senate Appropriations Committee] scrutiny [of homeland
security spending] is self-evident," said a committee spokesman, noting the
recent string of hearings on the subject. "There have been some real
questions raised." Senate Appropriations Chairman Byrd has noted that the
Justice Department has not advertised the grants it was given to allocate
to local police. Also, 80 percent of local health departments have not
received their designated funding, he said.
The high-tech industry is watching to see how the new funding "trickles
down" to private sector opportunities, an industry source said. Homeland
security funding is more difficult to capture because it cuts
"horizontally" across so many agencies, he said.
Congress soon will begin work on the president's fiscal 2003 budget
request. Homeland security has caused several agency budget requests for
next year to swell.
Of the nearly $38 billion earmarked for homeland security in the FY03
request, the Defense Department would get 22 percent; Transportation
Department, 20 percent; Justice Department, 19 percent; HHS, 12 percent;
Federal Emergency Management Agency, 9 percent; Treasury Department, 8
percent; Energy Department, 3 percent, states and international, 2 percent;
Agriculture Department, 1 percent; and all others 4 percent, according to
the Government Electronics and Information Technology Association.
Some areas of homeland security spending, according to GEIA, would include
$362 million for an entry-exit visa system at the Immigration and
Naturalization Service, and, at the FBI, $21 million for the National
Infrastructure Protection and Computer Intrusion Program and $48 million
for the Information Assurance Program. Other programs include $744 million
for northern border security and $684 million for maritime security, both
at the Customs Service.
The Bush FY03 request also would provide $4.8 billion to the Transportation
Security Administration created in November, which focuses largely on
commercial aviation security, and $1.2 billion for U.S. Coast Guard ports,
waterways and coastal security. FEMA would receive $3.6 billion for state
and local "readiness and training."
Cybersecurity initiatives would include $30 million for a defense cyber
warning intelligence network, $5 million for General Services
Administration's government Intranet called GovNet, and $125 million for
the FBI National Infrastructure Protection Center.
At the Defense Department alone, the Bush budget is proposing $26.4 billion
for information technology and national security systems in FY03, including
$4.6 billion for development modernization and $13.3 billion to maintain
current services. That is a significant increase from the $23.7 billion for
IT and national security systems in the current fiscal year, including $3.7
billion for modernization and $11.9 billion to maintain current systems.
The fiscal 2002 emergency supplemental currently under debate in Congress
would boost the amount for homeland security to $5.8 billion, $522 million
above the president's request.
But the House Appropriations Committee--which took up the bill Thursday--is
proposing to cut the Transportation Security Administration's supplemental
appropriation by $550 million to $3.85 billion. The committee criticized
the new agency for failing to fully justify its budget request.
*******************
Government Executive
Federal, state and local agencies on a quest to secure America's borders
By Molly M. Peterson, CongressDaily
As the military wages a new kind of war abroad in response to the Sept. 11
terrorist attacks, members of Congress and Bush administration officials
are developing high-tech strategies for defending the nation's borders and
transportation systems.
But equipping a multitude of federal, state and local agencies to meet
those homeland security needs--while enabling them to share critical,
real-time information about terrorist threats and response
capabilities--has proven to be a complicated task.
"We are a mobile, open society of more than 286 million souls living within
7,000 miles of open land borders and 4,000 miles of unguarded coastline,"
Rep. Christopher Shays, R-Conn., chairman of the House Government Reform
National Security Subcommittee, said during a recent hearing. "Critical
transportation information systems are susceptible to disruption.
Intelligence sharing is stilted. Military capabilities have not yet been
transformed to meet asymmetrical threats. Where to begin?"
Modernizing antiquated information systems has emerged as a key starting
point for many agencies. "We will seek to tear down the information
stovepipes that stand in the way of information sharing and cooperation
within the government," White House Homeland Security Director Tom Ridge
said recently, noting that many federal, state and local databases
contained information about a number of the 19 hijackers long before they
were involved in the Sept. 11 attacks. The administration has called for a
technologically advanced "smart border" to monitor the arrival and
departure of the more than 300 million non-citizens each year. And several
lawmakers have introduced legislation that would use information technology
to tighten border security. For example, two bills, H.R. 3229 in the House
and S. 1627 in the Senate, would establish a single "lookout database"
designed to enable all immigration, customs, law enforcement and
intelligence agencies to identify inadmissible or deportable aliens.
Another bill, S. 1733, also aims to improve border security. It would
require the State Department, the Immigration and Naturalization Service,
the Treasury Department and the CIA to develop a unified electronic data
system to provide law enforcement and intelligence officials with real-time
information on non-citizens' eligibility to enter the United States.
Federal agencies also are taking steps under last year's anti-terrorism law
to improve border security. That law requires the FBI to share
non-citizens' criminal records with the INS and the State Department for
the purposes of adjudicating visa applications.
The Customs Service is playing a key role in homeland defense by monitoring
the millions of cargo containers shipped into the United States each year.
President Bush has proposed a $2.3 billion inspection budget for Customs in
fiscal 2003, which would be a $619 million--or 27 percent--increase over
fiscal 2002 spending. The new funds would be used to hire hundreds of
inspectors and purchase high-tech equipment to improve and expedite cargo
inspections.
Customs officials are considering the use of electronic seals to prevent
tampering of shipping containers, as well as radiation detectors and other
sensors to prevent weapons of mass destruction from being smuggled into
U.S. ports.
The Transportation Department recently created an interagency Container
Working Group, which is investigating ways to improve and expedite security
inspections of 6 million marine cargo containers, and the 11 million trucks
and rail containers, each year.
"Looking for a terrorist weapon in a container may appear to be like
looking for a needle in a haystack," Rep. Corrine Brown, D-Fla., said
during a recent House Transportation and Infrastructure subcommittee
hearing. "However, we must find that needle. To do this, we will need the
cooperation of our trading partners and those in the transportation industry."
Coast Guard officials also need better detection technology to inspect
sealed containers packed within foreign vessels, according to Capt. Anthony
Regalbuto, the Coast Guard's chief of port security. "Just imagine a bunch
of Legos and trying to get to the inner part of the Lego block," Regalbuto
told lawmakers during a March hearing. "It really creates some problems."
But an even greater problem involves the potential failure to detect a
terrorist weapon inside a container before it is loaded onto a truck or a
train, according to John Magaw, undersecretary of Transportation for
security. "Seaport containers that arrive today ... can be anywhere in the
United States tomorrow," Magaw recently told the Senate Transportation
Appropriations Subcommittee. "Security measures must be fully integrated in
all modes of transportation."
Sen. Patty Murray, D-Wash., who chairs the subcommittee, also cautioned
against focusing security efforts too heavily on air travel, the immediate
emphasis just after the Sept. 11 hijackings.
"Our security system is only as strong as its weakest link," she said. "As
we work to make aviation more secure, I want to make sure we're not leaving
other vulnerabilities open to those who would threaten us."
*********************
CNN
'Operation Web Sweep' targets porn
Authorities say they used an undercover Internet site
TRENTON, New Jersey (Reuters) --Federal and state officials said on
Wednesday that they were targeting up to 200 suspects in what they called
the first undercover computer sting operation to combat child pornography.
New Jersey Attorney General David Samson said officials in 29 U.S. states
and at least 15 other countries were looking to serve search warrants on
suspects' computers after authorities took over a child pornography Web
site and used it to set up an undercover site.
The warrants authorized the seizure of computers, computer systems,
programs, hardware and software that might contain evidence relating to the
possession or distribution of child pornography.
Officials said the warrants were under seal and that no charges would be
filed until the investigation was completed, but the potential charges were
possession, receipt and distribution of child pornography. They did not
identify the nationalities of the suspects outside the United States.
Operation Web Sweep'
Samson said the investigation began last December when Wyoming authorities
notified counterparts in New Jersey they had uncovered a New Jersey-based
Web site advertising and trading in child pornography.
He said he turned the investigation, dubbed "Operation Web Sweep," over to
New Jersey's new Computer Analysis and Technology Unit, which used advanced
computer-related investigative procedures to track the suspect Web site to
a New Jersey-based computer server.
With the cooperation of the server operator, investigators said they
determined the site contained images of "clearly prepubescent" boys along
with advertising describing the site's content and images. It charged a
membership fee of $19.99.
In February, authorities disabled the site and removed all child
pornography, then created a replacement at the same domain address.
The Web site, which contained no illegal content, was styled to resemble
the original. Previous subscribers were informed the site was rebuilding
its collection of images. Through an assigned user name and password,
subscribers could upload or transmit pictures to the site.
Samson said the investigation targeted those who logged on to download or
who provided images depicting child pornography to the undercover Web site.
Officials said that as the global scope of the investigation became clear,
New Jersey sought the help of federal officials and law enforcement
agencies from other countries, which joined the operation.
**********************
Computerworld
U.S. to develop portal for comment on pending regulations
The U.S. Office of Management and Budget wants to centralize federal
regulatory information into a single Web portal by the end of the year,
according to a statement (download PDF) by OMB Director Mitchell E. Daniels
Jr.
Daniels wrote that the move would unify what he called "fragmented efforts"
by a variety of federal agencies and fall in line with President Bush's
"Online Rule-Making Initiative."
The decision to unify is due to an increase in the amount of traffic to
federal Web sites, according to an OMB statement accompanying the memo.
"The Pew Foundation reports that 42 million Americans viewed federal
regulations through the Internet in 2001, with 23 million commenting on
proposed rules, regulations and policies," the statement reads. "According
to the National Archives, the public retrieved more than 65 million
documents from the online Federal Register in 2001."
With a single site, "the public will no longer need to navigate through a
sea of agency Web sites to comment on regulations that impact their lives,"
said Mark Forman, OMB associate director for information technology and
e-government.
Today, the public can comment on proposed regulations via the Web. Agencies
such as the Food and Drug Administration, the Department of Agriculture and
the Environmental Protection Agency gather public comments on proposals via
the Web.
According to the OMB, maintaining redundant rule-making Web sites across
the government will cost $70 million over the next 18 months. It can also
be confusing to the public, which has to know what agency is developing a
regulation in order to find and comment on it.
The initiative is broken into two parts. First, OMB staff will work with
various government agencies to inventory equipment and determine whether
any one agency could serve as a model of how a larger portal should run.
The Department of Transportation will be the lead partner with the OMB in
the investigation process. A specific Web address for the portal has not
been selected, and an agency has not been chosen to oversee the new portal.
Currently, the list of regulatory agencies can be accessed through
www.firstgov.com. But finding that link can be difficult, which is another
reason why the OMB wants to unify the information on a single portal.
*******************
Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 507
1100 Seventeenth Street, NW
Washington, D.C. 20036-4632
202-659-9711