[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Clips May 22, 2002



Clips May 22, 2002

ARTICLES

GSA seeks comments on .gov
DoubleClick able to settle privacy suits
Canada's '.Ca' Authority Holds Second Board Election
OMB anticipates next round of GPEA reports
House Passes Child-Sex Crime Wiretap Bill
Waging war on computer viruses
Turning pictures into passwords
Computer virus spoofs State Dept.'s e-mail address
Senate panel creates cybersecurity programs, standards
Israeli troops warned against accepting Internet pizza
Drug delivery by microchip may not be far off
EC and mobile industry meet to discuss 3G
New worm spreads via Microsoft SQL Servers
Australian billionaire aids revival of Computer for Every Child
Tech consortium created to improve software reliability
Nonprofit to wire up rural Asian schools



*******************
Federal Computer Week
GSA seeks comments on .gov

The General Services Administration is looking for public comment on plans to extend the .gov domain to non-federal entities such as state and local governments and federally recognized Indian tribes.

In a proposed rule in the Federal Register May 16, GSA also said is it considering charging a one-time fee for new registrations, which will range from $250 to $1,000, depending on the level of assistance provided by GSA, and a recurring annual charge in the range of $100 to $500 for all .gov domains.

Currently, GSA does not charge for registration but is allowed to start charging at any time. The fees are "based on anticipated costs for operating the registration service and are consistent with industry charges," GSA said in its notice.

GSA has managed the .gov and .fed.us top-level domains since 1997. Last month it announced that it also accepts .gov registrations for native sovereign nations.

Indian tribes interested in the .gov domain must first apply to the Interior Department's Office of the Assistant Secretary for Indian Affairs. The process includes making a letter application, a tribal resolution, or submitting minutes of the meeting giving authority to the person making the written request. Tribes also can apply online at www.gov-registration.gov.

The end result for an entity acquiring a domain name would look like "www.tribesname-nsn.gov," where nsn stands for "native sovereign nation." The department hopes the move will enable e-government among Indian tribes.
*******************
CNET
DoubleClick able to settle privacy suits
By Gwendolyn Mariano


DoubleClick on Tuesday received federal court approval to settle state and federal lawsuits that charged the Net advertising company with violating the privacy of Internet surfers.
The U.S. District Court for the Southern District of New York granted final approval of the class-action settlement agreement, which requires DoubleClick to provide consumers with a privacy policy that will clearly describe in "easy-to-read sentences" its online ad-serving service, use of cookies, as well as other services and technologies.


The settlement also requires the company to purge certain data files of personally identifiably information, including names, addresses, telephone numbers and e-mail addresses. Among other provisions, the settlement requires DoubleClick to obtain permission, or so-called opt-in agreements, from Internet surfers before it can tie personally identifiable information with Web surfing history.



In addition, DoubleClick must conduct a public information campaign consisting of 33 million banner ads that educate consumers on Internet privacy. Moreover, the company will retain an independent accounting firm that will conduct an annual review regarding DoubleClick's compliance of the settlement.

The suit follows a preliminary approval granted to DoubleClick two months ago. The suit clears up state class-action lawsuits filed from California, Texas and New York, which were consolidated last year.

Ira Rothken, one of the lead plaintiffs' settlement counsel, said the settlement is "reasonable" under the circumstances because the plaintiffs were given limited tools under the law to prosecute the case.

"I believe that we have a good result that will protect Internet users' privacy on the Internet," Rothken said. "I'm hopeful that the Internet advertising community as a whole will look at this settlement agreement for guidance on how to conduct their business online, and I'm also hopeful that Congress will provide legislation in the near future that will fill any voids that are left in the settlement agreement."

DoubleClick declined to comment on Tuesday's hearing. However, in a previous statement regarding the settlement, DoubleClick said it would continue to provide "the same full range of marketing solutions for its clients" alongside protections and controls to "safeguard consumer information."
********************
Chronicle of Higher Education
Scholars Rally Behind Online Publisher
By ANDREA L. FOSTER


A diverse group of professors and academic groups filed briefs with the Supreme Court on Monday in support of Eric Eldred, an online publisher who is challenging the constitutionality of the Sonny Bono Copyright Term Extension Act.

The briefs say the act gives copyright holders too much control over the dissemination of creative works, constraining the ability of scholars and teachers to discuss and study literature, art, and movies.

In his lawsuit, Eldred v. Ashcroft, Mr. Eldred says the law fails to protect free expression guaranteed under the First Amendment, and also violates the original intent of copyright law. As written in Article I, Section 8 of the Constitution, the purpose of copyright is to "promote the progress of science and useful arts."

The Copyright Term Extension Act safeguards the copyright of material for 70 years after its creator's death. Before the law was enacted in 1998, copyright was protected for 50 years after the creator's death.

Among those who filed papers in support of Mr. Eldred were 53 professors who teach intellectual-property law, constitutional-law professors, historians, several library groups, 17 economists, and college technology and art groups.

The prominent scholars supporting Mr. Eldred include Yochai Benkler, a professor at New York University School of Law; Jessica Litman, a law professor at Wayne State University who wrote Digital Copyright; and Milton Friedman, a Nobel Prize recipient who is a former economics professor at the University of Chicago.

Groups supporting Mr. Eldred include the Association of Research Libraries, the Digital Future Coalition, the College Art Association, the National Humanities Alliance, and the Consortium of College and University Media Centers.

The brief filed by library groups argues that the law "effectively prohibits non-copyright owners -- like librarians, curators, archivists, historians, and scholars -- from republishing and disseminating older works that may have no significant commercial value, but may be of strong historical or artistic interest."

But supporters of the law say it harmonizes U.S. copyright law with Europe's, encourages creation of new works, and is an appropriate response to longer human lifespans.

The Supreme Court has yet to schedule oral arguments in the case. But the arguments would be heard no sooner than October, when the court begins a new term.

Two lower courts, most recently the U.S. Court of Appeals for the District of Columbia Circuit, ruled against Mr. Eldred. The Supreme Court's decision to hear the case surprised many legal experts, because the justices usually intercede only when lower courts disagree.
******************
Canada's '.Ca' Authority Holds Second Board Election


While the powerful Internet Corporation for Assigned Names and Numbers (ICANN) rethinks the concept of democratic control over top-level domains like dot-com and dot-net, the Canadian agency in charge of that country's domain-name space is launching its second public election of board members.
The Canadian Internet Registration Authority (CIRA), which took control of the country-code top level domain (ccTLD) known as dot-ca in late 2000 and held its first election of board members one year ago, will collect votes for three board seats during the second week in June.


Initially installed as a group, the nine elected members of the 12-person board were posted in threes to terms ranging from one to three years so that CIRA could hold annual elections for a third of the board each year.

ICANN, whose board is made up of 19 directors, has just five elected members, chosen during a trial online vote nearly two years ago.

While CIRA may appear more democratic than ICANN, the composition of its board appears to be of less interest to even Canadian domain-name registrants.

The current campaign has attracted eight candidates, but six of them were recommended by the current CIRA board, with rank-and-file members drumming up the required 50 endorsements for just two additional nominees.

Nominated by members was Richard Anderson, a well-known political advisor and president of the Ottawa-area management consulting firm ASCI-Anderson, and March Jeftovik, president of outsourced domain-name services (DNS) company EasyDNS Technologies in Toronto.

Those nominated by CIRA included two existing board members: Internet law expert Michael Geist and Web development company president Denis Tanguay.

A third current director, Bruce Firestone, a founder of the NHL's Ottawa Senators hockey club, is not running again.

Also recommended for the campaign by the CIRA board were intellectual property lawyer Daniele Boutet, Web-hosting company executive Eleanor Jang, National Capital FreeNet (Ottawa) director Ian MacEachern and e-commerce consultant Ramesh Venkat.

The election campaign, which began Thursday, is being conducted largely on the CIRA Web site where candidates are fielding questions from members on an online bulletin board.

Eligible to vote, CIRA says, are he 140,000 holders of dot-ca domain names.

Voting begins online between noon EDT June 7 and ends at 8 p.m. June 13. CIRA said results should be posted on its Web site by June 20.

More information can be found here: http://www.cira.ca/en/elections-2002.html .

Reported by Newsbytes.com, http://www.newsbytes.com .
*********************
Government Computer News
OMB anticipates next round of GPEA reports
By Patricia Daukantas

With one year to go before the Government Paperwork Elimination Act kicks in, the Office of Management and Budget is expecting agencies to show substantial progress in automating transactions, two speakers said today at the annual FedWeb conference.

Agencies are supposed to move customer transactions online by October 2003, but "there is not enough money in the world to do that," said Richard Kellett, director of emerging IT policies for the General Services Administration's Governmentwide Policy Office.

OMB understands that agencies can't do it all but will want to know what they are going to do, Kellett said.

In June or July, OMB will issue its guidance for the next data call, said Nora Rice, the CIO Council's program manager. GPEA status reports will be due in late September.

OMB officials looked closely at the status reports that agencies submitted at the end of fiscal 2001 and they expect to see substantial progress one year before the GPEA deadline, Rice said.
*****************
Associated Press
Ind. State Puts Private Info Online
Tue May 21, 5:33 PM ET


Indiana State University accidentally posted personal information about 10,000 of its students including names and Social Security (news - web sites) numbers on the Internet for two weeks.


The information was available from April 30 to May 14 about ISU students enrolled in the 1996-97 school year, university spokeswoman Teresa Exline said.


Officials removed the information once they learned about the situation, and Exline said the university was in the process of notifying those students

"This is not a hacking incident. No one broke into our security," Exline said. "This is an incident that involves inadvertent exposure."

The university said the posting was an accident and no one will be disciplined, but it is reviewing procedures to make sure the problem does not occur again.
*******************
Associated Press
Bell to Study Research Allegations
Tue May 21, 4:16 PM ET
By LORI HINNANT, Associated Press Writer


TRENTON, N.J. (AP) - An independent panel that includes a Nobel Prize-winning physicist is examining accusations regarding the validity of impressive scientific achievements reported by Bell Labs.


The five-member panel was formed last week after an outside researcher contacted Lucent (news - web sites) Technologies with information that caused enough concern to warrant an external review of the experiments, a Lucent spokesman said. Bell Labs is the prestigious research arm of Lucent.


Lucent has contacted the journals that published the work in question, which included a claim last fall by a Bell Labs team that it had created a transistor from a single molecule.

Other scientists have been unable to reproduce the experiments and have questioned the research results. Such skepticism is not unusual, and Lucent scientists have said that the technique for growing crystals is not easily mastered.

The company declined to provide many details about the accusations or say who brought them to Lucent's attention. Spokesman Bill Price said the accusations focused on data published in five research papers involving molecular electronics, superconductivity and molecular crystals.

"Our initial concern is with the validity of this data," he said.

Science executive editor Monica Bradford said Lucent has been open about the inquiry and has promised to keep publications updated about its results.

"We're waiting to find out what the investigation shows," Bradford said. "It would be upsetting if this would turn out to be a false lead because I think everybody was excited about the findings."

In 2000, scientists led by Bertram Batlogg, director of solid state physics research at Bell Labs, began publishing a series of articles on how the lab grew crystals out of organic molecules and then varied their electronic properties by applying electric fields from transistors attached to the crystals.

The research was published in the journals Science, Nature and Applied Physics Letters.

Batlogg no longer works for Lucent and a phone listing for him could not immediately be found. The transistor work was led by J. Hendrik Shon, who declined comment.

The panel of inquiry will be led by Malcolm R. Beasley, professor of applied physics at Stanford and the former dean of its School of Humanities and Sciences.

The other members are Herbert Kroemer, winner of the Nobel Prize in Physics in 2000 and a professor of electrical and computer engineering at the University of California at Santa Barbara; Supriyo Datta, a professor of electrical and computer engineering at Purdue University; Herwig Kogelnik, a Bell Labs scientist; and Donald Monroe, a scientist at Agere Systems, Lucent's microelectronics business, which the parent company plans to spin off by June 1.
*******************
Washington Post
House Passes Child-Sex Crime Wiretap Bill
By Brian Krebs
May 21, 2002; 2:27 PM



The U.S. House of Representatives today approved legislation that would give law enforcement new powers to eavesdrop on the telephone conversations of suspected child-sex predators.


Supporters say that the "Child Sex Crimes Wiretapping Act of 2001" is needed to snare potential child molesters who search for children in Internet chat rooms.

"Our children need our protection and these conversations on the Internet that lure and entice them lead them to telephone conversations that set up meetings," bill sponsor Nancy Johnson (R-Conn.) said in a speech on the House floor today.

Johnson said her bill could have helped investigators prevent the death of a 13-year-old Danbury, Conn., girl who was found raped and murdered on Monday after a rendezvous with a man she met in an online chat room.

Opponents of the bill, led by Rep. Bobby Scott (D-Va.), say the measure amounts to an unnecessary expansion of federal wiretap authority.

Originally created as a tool to investigate organized crime syndicates, wiretaps can now be obtained in investigations of roughly 50 different specific crimes, Scott said.

"Wiretaps are becoming routine rather than an extraordinary procedure used as a means of last resort," he said.

Scott asked that the bill be reopened for possible changes, as the proposal was being considered under rules that barred amendments from being considered.

The House passed the bill, 396-11.
******************
Los Angeles Times
Army's New Message to Attract Recruits: Uncle 'Sim' Wants You
Technology: The service will unveil video games to woo a media-savvy generation with a simulation of military life.
By ALEX PHAM
TIMES STAFF WRITER


May 22 2002

America's youth would rather play video games than do push-ups in the mud--a reality the Army wants to harness to its advantage.

Eager to prove it's not your grandfather's military, the Army is developing video games to recruit and build awareness among Generation Y.

Today at the Electronic Entertainment Expo in Los Angeles, the Army will unveil two games designed to appeal to a media-saturated, tech-bombarded generation. One is a sanitized version of "Unreal Tournament," a classic first-person shooting game known for its graphic, nonstop killing. The other is a take on "The Sims," a popular game that mimics life itself. But instead of dismembering mutants or pursuing romance, players can work on their organizational skills, free hostages and rise to the rank of first sergeant. The games are part of the Army of One marketing campaign, which stresses professionalism and the importance of the individual, themes marketers say resonate with youths.

Though the military has long used realistic video games as training tools, this is the first time the Army has relied on games to reach out to the public. The intent of the free games--which will be distributed starting in July at recruiting stations and on the Army Web site--is to sell the soldiering life.

Although interest in military careers rose after the Sept. 11 terrorist attacks, enlistments have changed little in recent years. And it's getting tougher to attract and retain soldiers, in part because there are fewer veterans to regale potential recruits with tales of their military exploits.

"The goal was to give them a synthetic experience of being in the Army in game form," said Michael Zyda, director of the Naval Postgraduate School's Modeling, Virtual Environments and Simulation Institute in Monterey, which developed both games.

"When I registered for the draft during the Vietnam War, I asked veterans of the Korean War what it was like," he said. "They were easy to find. Today, the Army is much smaller. There aren't as many people around today to answer that question."

The game project started two years ago, when the economy was bursting at the seams and dot-coms beckoned young people with the promise of riches and freewheeling offices in which they could skateboard. The Army spent $5 million to develop video games to show Army life. Like unscripted TV shows, the games show mostly action, leaving out the boring parts.

"Soldiers," for example, takes gamers from basic training to career development. Spit-shining shoes and peeling potatoes are not among the list of activities. Players going through sniper training in the more action-oriented "Operations" game don't have to camp out for hours waiting for terrorists to show up.

The games depict an Army that is precise, organized and technically advanced. Tactical missions and advanced weaponry are the focus of the game's missions, not violence.

In a survey this year by Northwestern University of 1,000 college students, the No. 1 concern about joining the military was danger, said Charles Moskos, professor of sociology at Northwestern and an expert on public attitudes toward the military.

"It's something recruiters just don't talk about," Moskos said. "But being in the Army is as dangerous as being a taxicab driver, which is considered to be one of the most hazardous occupations."

Because of such concerns, the armed forces have a difficult time replenishing their ranks. The military spends twice as much recruiting each soldier today--about $10,000--as it did 10 years ago.

Although the Army met its recruitment targets in three of the last five years--about 80,000 a year--those goals are far lower than in the past, Moskos said.

Given the current global climate, America is "likely going to need more people in the armed forces in the coming years," he said. "That's when the recruitment shortfalls will come."

Although store shelves are bulging with video games that have military themes, some of which are so realistic they are used by the military to train soldiers, commercial games such as "Halo" lack the realism of being in the Army, Zyda said.

Technical realism, in fact, is one of the biggest selling points of the two new games.

To make "Operations," developers rode tanks and Blackhawk helicopters, parachuted from airplanes and shot rifles and machine guns. They brought in soldiers from the Army's Special Forces to critique scenes and levels. They scanned images of 12 weapons and programmed their recoils, accuracies and bullet speeds into the game. For "Soldiers," developers videotaped real soldiers and drill sergeants.

Will that be good enough?

"It can't hurt," Moskos said. "But a video game isn't going to be as good as real personal contact."

Or like doing push-ups in the mud.

More E3 coverage is at www.latimes.come3.
********************
Los Angeles Times
AT&T Spam Filter Blocks Its Notice of Rate Increase
From Associated Press

May 22 2002

SEATTLE -- AT&T Broadband offered high-speed Internet users an e-mail filter to block spam--unwanted mass e-mail solicitations--and then discovered it also blocked the company's notice of a rate increase.

Spokesman Steve Kipp acknowledged the problem Monday after hearing from customers who had read elsewhere that higher rates were on the way.

He said he didn't know how many customers were affected. "If there is a silver lining, it appears our spam filtering system works so well that it even deletes mass e-mails from our own company," Kipp said.

Last week the Seattle Post-Intelligencer and the Seattle Times reported that at least 64,000 Puget Sound-area customers with cable Internet links to AT&T Broadband's network would face rate increases of 8% to 15% in June.

The stories said customers were notified by e-mail, but some told the company they did not receive those notices.

The filtering problem was detected after some test e-mail messages were sent in a check of the system, and the notices will be re-sent once the glitch is fixed, Kipp said.
********************
BBC
Waging war on computer viruses


New net technologies present opportunities for more than just entrepreneurs and venture capitalists. Virus writers like them, too.
Almost every novel internet technology, from e-mail to peer-to-peer networks, has been exploited by virus writers and vandals keen to cause havoc.


Virus writers are locked in an endless struggle with anti-virus and security companies who are trying to guess which advance will be taken advantage of next.

Many anti-virus companies are adapting their tactics to protect customers and catch new viruses before they do too much damage.

Copycat killer

Whenever novel viruses appear, anti-virus companies work to produce a "pattern" file that tells their software how to spot and stop the malicious program.

One successful virus usually leads lots of other people to produce copycat programs that differ only slightly from the original.

Many anti-virus programs use rule-based techniques, called heuristics, to spot these variants.

Natasha Staley, a consultant at anti-virus firm Sophos, said these techniques helped limit the spread of the "H" version of the Klez e-mail worm.

This rule-based approach has also proved useful in combating the many e-mail viruses created after the Melissa outbreak in 1999.

"Melissa was one of the defining moments of virus writing," said Ms Staley.

Current figures show that 90% of all viruses in the wild are e-mail viruses that spread by using weaknesses in Microsoft mail programs.

But, said Ms Staley, if the rules used by anti-virus programs got too broad they would cause too many false alarms.

"There are an endless number of combinations available to virus writers," she said, "which is one of the reasons that heuristics are so difficult to do well."

Handy help

Andrew Armstrong, UK managing director of Trend Micro, said anti-virus companies were trying to break out of the infection-reaction cycle and help consumers and companies prevent virus infections spreading.

"The speed with which viruses are going around the world on the internet means that having a fix two hours later is a help, but it's too long," he said.

According to figures from the Cooperative Association for Internet Data Analysis, the Code Red worm was infecting more than 2,000 new computers per minute at its peak.

Companies like Trend Micro now tell companies how to avoid infection before the patch for anti-virus software is finished.

Mr Armstrong said this advice usually took minutes to draw up and distribute. He likened the difference between giving advice and producing a patch to that between using a mosquito net and producing a cure for malaria.

Trend Micro is also producing tools for customers that help them work out the extent of a virus outbreak and clean up all the machines that have been infected.

Unfortunately, one of the main allies that virus writers have in their bid to spread the malicious programs are computer users themselves.

Exposed again

Ms Staley from Sophos said viruses that were years old regularly re-appeared because users did not do enough to protect themselves.

Even boot sector viruses that travel by floppy disk still occasionally break out.

"The Kak worm appeared in 1999 but is still infecting people," she said. "That's pretty incredible because every anti-virus program detects it."

Although many companies were putting anti-virus programs on e-mail gateways, web servers and desktop machines, said Ms Staley, the malicious programs still occasionally slipped through.

She urged people to regard with suspicion e-mail messages from strangers bearing attachments or with odd subject lines.
*******************
BBC
Turning pictures into passwords


As we become ever more reliant on computers, remembering your passwords or coming up with one obscure enough to be secure can be a huge headache.
If your password is as simple as the word, password, then logging on via a picture might be the answer.


Microsoft is one of several firms working on image-based password systems.

One such system being developed at Microsoft's research lab in the US uses a single image on which the person makes a series of clicks. A painting with plenty of detail is the most suitable.

Researchers are also working on a system which uses a library of faces.

A person has to choose half a dozen in a particular order as their password.

Smart passwords

Microsoft researcher Michael Roe believes such systems could be useful for people who prefer pictures to text.

"People don't remember passwords but they are good at remembering faces," he said. But he is not convinced that it will be the way forward.

"It is interesting research but I'm not sure it will end up being deployed as a product," he said.

Instead a smart card system, in which users simply swipe a card at a reader attached to the computer, could be the way passwords go in future.

The big advantage is that it does not rely on human memory, although one drawback is that some people will inevitably lose their cards.

Microsoft is so keen on the idea that it has already moved half of its staff to smart card security cards.

Mr Roe believes many other firms will develop similar systems over the next five years or so.

"The problem is that PCs don't have readers at the moment. Organisations would also have to be able to issue such cards and have a system in place for loss or theft," he said.

Fingerprinting

However, experts still see potential uses for picture passwords.

Chief Technology Officer with anti-virus firm Cryptic Software, Dave Duke, believes picture-based passwords could play a part in everyday life, such as at ATM machines.

"It would be harder for people to steal a picture password," he said.

Although pictures might prove popular with users there would not be much advantage to having them online, he said.

"It is as easy for a hacker to take a picture off a machine as it is to take a text password," said Mr Duke.

He thinks the next stage for passwords will lie in identifying users by their fingerprints.

Such biometric systems have gained ground since 11 September and an increasing interest in security both off and online.

Computer chips that contain information about fingerprints, iris pattern, hand geometry or voice print could be fitted in passports within four years.

Text is best

But research fellow at the London School of Economics Peter Sommer questions whether biometrics are the way forward for password security.

"Large scale systems will have to cope with tens of millions of images and data. It is going to take up significant processing time," he said.

"It's not going to be that great if each recognition takes three minutes."

Despite the problems of coming up with a good password and remembering it, Mr Sommer thinks it will remain the predominant security method for the foreseeable future.

"The advantage of passwords is that you are completely reliant on yourself," he said.

For those that do not trust their memories, there is plenty of help at hand, he points out.

Free software is available on the internet to store passwords, though you still have to remember the password to open the programme.

Handheld computers can also be encrypted to store all passwords.
******************
BBC
May 17, 2002
Doubt cast on fingerprint security

The artificial fingers and prints were created with gelatine by Japanese researchers who used the digits to trick biometric systems into thinking they were seeing the real thing.

Not only was it possible to fool the security systems with casts of fingers, the researchers found they could make convincing fakes using fingerprints lifted from glass.

Experts say the experiments cast serious doubt on any claims that this type of biometric system can be made fully secure.

'Impressive work'

The work was done by engineering professor Tsutomu Matsumoto and his colleagues at the Graduate School of Environment and Information Sciences at the University of Yokohama.

The first set of experiments used fake fingers formed when gelatine was poured into a mould created by pushing a finger into a malleable plastic often used by model makers.

The fingers created this way fooled the fingerprint readers 80% of the time.

Making the fingers took only a few minutes and used raw materials that cost less than £10. The researchers also developed a way to create fake fingers using prints left on glass.

First, the latent print was hardened using glue that sticks to the ridges of bodily detritus, such as sweat and skin cells, left behind when a finger touches a hardened surface.

'Impressive' work

This improved print was photographed using a digital camera and was then enhanced using Adobe Photoshop software to emphasise the difference between its ridges and gaps.

The image was transferred to a photosensitive sheet, etched into copper to turn it from a flat image into a three-dimensional print, and then used to create another mould.

Again the fake fingers fooled the biometric readers 80% of the time.

Security expert Bruce Schneier wrote of Dr Matsumoto's work: "Impressive is an understatement."

He said the fact the systems were fooled using easily available ingredients should be enough to end the use of fingerprint-based security systems.

"If he could do this, then any semi-professional can almost certainly do much, much more," wrote Mr Schneier.

Dr Matsumoto and his colleagues first presented their work in January at the Electronic Imaging 2002 conference organised by the International Society for Optical Engineering.
**********************
USA Today
Source Associated Press
Computer virus spoofs State Dept.'s e-mail address


WASHINGTON (AP) The State Department's e-mail identity was forged by a computer virus that sent itself to law enforcement and media outlets across the country, a department official said Tuesday.

Variants of the virus, called Klez, have been spreading since the late 1990s and are transmitted through e-mails and attachments. Klez does not destroy computer files but can clog up mail systems and corporate networks.

Saturday, the virus sent hundreds of e-mails with the return address of the State Department's public affairs office, said a State Department official, speaking on the condition of anonymity.

A computer is infected with Klez the moment a computer user opens an e-mail attachment containing the virus.

Once loose, the virus seeks out and copies e-mail identities stored in the computer user's programs. The virus spreads by sending itself to the addresses contained on stolen "listservs," or electronic mailing lists.

The virus could have gained a copy of the State Department's listserv from any computer it infected on which a user had received an e-mail from the department. It may have infected a computer at the State Department, the State official said.

The process is called "spoofing" by Internet hackers.

"The virus would never had to have had access to a single State Department computer to have spoofed the address," said Steve Trilling, senior director of research at the Internet security firm Symantec. "It's like tacking on a false return address on a letter and sending it to someone who is used to receiving mail from that address. They are much more likely to open it than if it came from a stranger."

The State Department sent an apology to those who received the e-mail.
*******************
Government Executive
Senate panel creates cybersecurity programs, standards

By Molly M. Peterson, National Journal News Service


Legislation to create new cybersecurity research programs at the National Science Foundation and the National Institute of Science and Technology won quick approval Friday from the Senate Commerce, Science and Transportation Committee.



The Cyber Security Research and Development Act (S. 2182), which the panel approved by unanimous consent, aims to improve information sharing and collaboration among government, industry and academic cybersecurity researchers, while increasing the number of U.S. workers with expertise in that field.



Under a managers' amendment adopted by unanimous consent, the bill also would establish standards for cybersecurity technologies used by federal agencies. Technology industry representatives oppose the provision. They say federal standards would make it more difficult for government and industry to respond quickly to emerging cybersecurity threats.



"Such requirements are both inappropriate and unworkable, as cybersecurity threats are always changing and technologies must rapidly evolve to meet them," said Robert Holleyman, president and CEO of the Business Software Alliance, whose members include Microsoft, IBM, Intel and other high-profile technology companies.
*******************
MSNBC
Chat room rendezvous not so rare
13-year-old's death shines light on parents' problems with Net
By Bob Sullivan


May 21 It is every parent's nightmare. Your perfect, grade-A student, cheerleader child has a double-life in Internet chat rooms. She consents to meet one of her virtual pals; he ends up being a 25-year-old killer. The death of 13-year-old Christina Long this week, allegedly at the hands of an Internet lover, was perhaps the first child murder directly linked to a chat room meeting. But the conditions for her murder are far more common than most parents realize, experts say. One recent study says about 1 in 10 teens admit they've followed through on a rendezvous with someone they first met in a chat room.

LONG FIT THE classic profile for a child at risk. She lived with her aunt; she had been taken away from her parents due to their substance abuse problem. She lived in suburbia, in fact, in a relatively affluent neighborhood. She was between 11 and 15; old enough to know her way around the Internet, but not old enough to understand the real-world risks. She was a girl with self-esteem issues.
And she was crying out for attention. According to the News-Times of Dansbury, she had a Web site full of enticing language, even inviting sexual chatting.
Investigators believe she had other sexual rendezvous with men she had met online before her fateful meeting on Friday with Saul Dos Reis, according to Robert Paquette, police chief of Danbury, Conn.
But Long is hardly alone, nor is her case as extreme as it might initially appear. About 12 percent of teen-agers will admit meeting someone in the real world who they first met online, according to Parry Aftab, director of Wired Patrol. Wired Patrol was until recently known as CyberAngels, a global organization of volunteers who try to protect kids while they surf by looking for suspicious behavior online.
Despite a constant deluge of warnings from the parents, the media, and schools, kids frequently cross the line between the virtual and real world all the time.
"When parents aren't around they admit it. They do it all the time," Aftab said. A Wired Patrol study unearthed 11,000 teens who had done so most between 11.5 and 15 years old. About 55 percent were girls.
THOUSANDS OF CASES
Many of those rendezvous are harmless, with other kids looking for friendships, Aftab said. But many aren't. Thousands of kids each year agree to meet online friends they think are other children only to discover they are adults.
Others, like Long, knowingly agree to meet adults to experiment with sex.
Hard numbers are hard to come by, since authorities believe many incidents go unreported. But the hundreds of known incidents offer a chilling glimpse of what may really be going on.
The National Center for Missing and Exploited Kids has charted 5,700 reported cases of online enticement in the past four years, and those are only cases that were intercepted by parents. Meanwhile, the FBI's Innocent Images program open 540 cases last year, about a third of them involving "travelers" adults who arrange to meet with a child for sex, only to find an FBI agent waiting.
There's not yet any way to compile federal, state, and local cases involving sex, children, and the Internet, but Aftab said she suspected there were 4,000-5,000 each year.
"There are so many sex acts with young kids that are happening," she said. "I talk with schools all the time, and I have found so many victims."
Local newspapers are full of such stories like the tale of a 13-year-old girl from Pittsburgh found tied to 38-year-old Scott W. Tyree's bed in January, surrounding by sex toys, three days after she had gone missing. Tyree allegedly met the girl in a chat room, drove to Pittsburgh for her birthday, picked her up, then took her back to his Fairfax County, Va., apartment. On his Internet page, Tyree said he was "looking for young slavegirls to train in real life." The girl was safely returned to her parents.
"Like Long, she had her own Web site. She wanted to be a model," said Ruben Rodriguez, director of the Exploited Child Unit at the National Center for Missing and Exploited Children. The site came complete with photographs including provocative phrases and pictures.
"People need to know: Children on the Net have met people and then run away to meet them in real life," Ruben said. He wasn't sure how many current cases of missing children stem from an Internet introduction, but he said the figure was probably in the hundreds.


FIRST CHAT ROOM DEATH
But Long's death Friday raises the stakes another level. It may be the first child death that can be directly linked to a chat room. There have been murders of college-age adults where the Internet had a role: Amy Boyer's case is perhaps the most famous, often called the "Internet murder." The 20-year-old from New Hampshire was shot in 1999 after being tracked by a stalker through the Internet. Her eventual murderer had posted a Web site indicating his intentions to kill her. The next year, a 20-year-old Texas A&M sophomore was shot and killed by 31-year-old Kenny Wayne Lockwood, who had posed as a female law student online and arranged a meeting.
Then last year, a 16-year-old Israeli named Ofir Rahum was apparently the victim of a politically motivated murder last year, after being lured to a meeting in a Palestinian city by a person posting as a 20-year-old female tourist in a chat room.


WHO'S AT RISK MOST
But Long's story stands out not only because of her death, but also because she willingly consented to the meeting. Don't be surprised, said Peter A. Gulotta, who has been with the Innocent Images task force since it was opened in 1993.
"Our second case was about a girl in her middle teens and an individual who was an attorney for the government. ... after we talked to her a while, she admitted she had met this guy, went to a park, and talked about sex. He showed her pictures. She chose to not once but several times travel with this guy," he said. "It was really eye opening. I thought, 'Whoa, this girl actually got in a car with this guy. There are people out there who actually do this stuff.' "
Most at risk, said Aftab: kids who have just reached the age when they are allowed to leave the house for three hours at a time. Girls are slightly more at risk than boys, she said. And suburban kids, with perhaps less street smarts, are also at higher risk.
"That's because they believe in happily ever after," Aftab said. "Talk to inner city kids, they think that what these kids are doing is crazy. But suburban kids, they are in houses with burglar alarms, they [think they] are safe."
And girls in particular "believe that there's magic out there," Aftab said. They think "that the boy they meet in real life is going to be the one."
PEDOPHILES ARE PATIENT
Rob Douglas, CEO of American Privacy Consultants and expert in the Amy Boyer cases, said the Internet is a powerful tool for pedophiles because it allows them to slowly peck away at a child's natural defenses.
"The Internet provides a place where a pedophile can begin to entice the child. It allows a more extended period of time where the seduction can begin to take place," Douglas said. "Pedophiles are manipulative, patient people. ... The child and the pedophile could have extended discussion to where child's normal resistance could already be overcome by the time the first in person meeting takes place."
By the time a meeting takes place, the children may be confused, said Aftab. Many of the rendezvous cases are somewhat in between a clear-cut case of a teen expecting to meet another child only to be duped, and a teen who's actively looking for a sexual encounter with an adult.
"Many of the kids I talk to only describe the shoes of the person they meet," she said. "That's because they don't want to look them in the face. Sometimes, they want to still believe he's a teen-ager."


DETERMINED KIDS FIND A WAY
Authorities from the FBI, U.S. Customs, and private agencies all agree the problem of Internet-related pedophilia is getting worse, for no other reason than pure statistics. There are now 29 million children online, half above age 13, said Aftab. And it's nearly impossible to keep a determined child away from potential pedophiles.
Gulotta described a recent case where parents took away a child's keyboard to prevent her from engaging in chat with a suspicious person. She just went to a friend's house and continued the conversation, which eventually culminated in a rendezvous in an Albuquerque hotel.
It's impossible to guess how many such rendezvous occur each year that parents don't report; or that parents never discover. Christina Long had met with her alleged murder once prior to the night she died, investigators say, and apparently had other chat-room-initiated encounters with other adults.
In the wake of the Long case, local authorities offered up the same advice to parents they're been repeating since 1994, when the World Wide Web made the Internet a popular tool: Know where you kids spend their time online; keep the computer in a common room, where all surfing is relatively public; tell your kids never to give out personal information; and convince them never to cross virtual and real worlds, never to meet anyone you've only chatted with online.
But now the words have graver authority, spoken by a police chief investigating a murder.
"The story here is that the Internet is a fertile environment for children to get themselves in trouble," Paquette said. "She didn't deserve to end up at the bottom of a ravine"
**********************
Nando Times
Israeli troops warned against accepting Internet pizza


JERUSALEM (May 22, 2002 10:42 a.m. EDT) - The army has barred soldiers serving in the West Bank and Gaza Strip from accepting pizza deliveries they did not order themselves, for fear the packages might be booby-trapped, the army said Wednesday.

Last month, Israeli pizzerias began delivering to soldiers via an Internet site where people place the orders as gifts for soldiers.

More than 4,000 pizzas have been sent, said Shimon Aharon, a British-born Israeli reservist who created the Web site.

Ninety percent of the pizzas were sent by Americans, with the remainder coming from Europe, South America, Australia and New Zealand.

The site allows people to send "Pizza and Pepsi for a patrol" or order up to six pizzas to feed an entire platoon. Several restaurants in Jerusalem and Jewish settlements in the West Bank and Gaza deliver the pizzas to army bases, foot patrols and military checkpoints.

This week, however, military commanders decided to bar soldiers from accepting pizzas they did not order, "due to concern that hostile elements may exploit the pizza deliveries to soldiers," the army said in a statement.
*******************
Nando Times
Drug delivery by microchip may not be far off


CAMBRIDGE, Mass. (May 20, 2002 9:31 p.m. EDT) - John Santini is building implantable microchips that he hopes someday will replace needles and complicated drug regimens.

He isn't there yet, but three years after attracting attention by demonstrating an early version of the device in a laboratory beaker, he insists that his company, MicroCHIPS, is making progress and will have a product out in five years.

The company has made the device work in a lab rat, and because it's a device, not a drug, Santini says that means it would almost certainly work in a person as well.

The chip - fingernail-sized, attached to a battery and wrapped in titanium - would be inserted just under the skin, likely in the abdomen. It contains hundreds of tiny reservoirs which would be filled by a drug, or several drugs. Software would instruct the chip when and how much of each drug to release, automatically and precisely.

On Monday, the company plans to announce a second round of venture financing - $16 million Santini claims will carry it into clinical trials. The other good news: Santini, 29, has been named one of the top 100 innovators under 35 by the Massachusetts Institute of Technology's Technology Review magazine. The winner will be announced Thursday.

Santini's is a field that requires a mind for biochemistry, electronics and engineering. But for him, the inspiration also came partly from the heart.

Diagnosed at age 12 with lupus, an immune system disease, he spent several years in and out of hospitals. He's in remission now, but he learned that a patient's drug delivery can be as important as the drugs themselves.

"I learned early on that if you can find better ways to deliver these drugs, (reduce) these side effects, it improves quality of life," he said.

Before his senior year at the University of Michigan, Santini spent a summer at MIT and hooked up with nanotechnology and drug delivery experts Robert S. Langer and Michael Cima.

They wanted to build a microchip that could solve many of the problems of drug delivery. Their first attempt left room for improvement.

"It was a really ugly looking device," says Santini, sitting in his office surrounded by sports paraphernalia of his beloved Detroit teams. "It was a glass slide with holes drilled in it and lots of apoxy gooped on it. It didn't work, but it gave us a lot of confidence it could."

Santini came to MIT for graduate school, worked with Langer and Cima, and became president of MicroCHIPS. Now 21 employees are tweaking the device, preparing it for clinical trials in about two years.

The chip works like this: each of the tiny, drug-filled reservoirs is sealed with gold, which is virtually corrosion-proof.

But if surrounded by chloride - found in the body's natural saltiness - the gold dissolves when a single-volt current from the device's battery is run through it. The gold harmlessly slips into the body and the drug is released; by subbing a fluorescent die into the reservoirs one can watch the process through a microscope.

Santini says it will be safe; the chip faces backward in the body and about the only thing that could shatter it and release all the drugs would be a bullet.

The technology could make drugs not only easier to manage, but more effective. That's because research is veering toward smaller proteins that focus on particular tasks and draw less attention from the immune system. But those molecules are also more fragile.

"This stuff ... has to be the wave of the future," says Doug Munch, a pharmaceutical and drug delivery consultant in Basking Ridge, N.J., "because of the control that may be required for future high-tech drugs may exceed what you can achieve by giving these orally and having them chopped up in the GI (gastro-intestinal) tract."

Chips also have the advantage of what economists call a "precommitment device" - locking patients into a drug regimen they may be tempted to slip out of. That could be especially useful for a disease like Hepatitis C, where the symptoms can be less unpleasant than the toxic effects of the treatment.

Obvious candidates are patients suffering from diabetes, which can require daily injections, and HIV/AIDS, which requires a complicated daily regimen of several medications.

But uses for those diseases are far down the road, Santini says, because insulin and HIV drugs cannot yet be made in sufficient concentration to fit in the reservoirs. For now, the most likely early uses are for delivering steroids, hormones, cancer drugs and pain killers.

Santini said he isn't worried about rivals. MicroCHIPS has partnered with one pharmaceutical company, whom he declined to identify. There could be a threat if such companies decide to push their own research in the field. Last year, for instance, Johnson & Johnson merged with drug-delivery company ALZA.

Another company, ChipRX, is focusing on devices equipped with sensors that respond to the environment - sensing, for instance, a rise in blood sugar and triggering a release of insulin.

Some say pre-programming a drug release, like microCHIPS is doing, is useful, but creating a device that thinks for itself is moreso.

"There are two big problems out there, and if their stuff works, they'll have knocked off one of them," said Howard J. Chizeck, chairman of the electrical engineering department at the University of Washington in Seattle and an expert in the field. "The huge markets and the tremendous opportunities that are there, like diabetes, they need a sensor that can stay in the body."

Santini says the company plans eventually to work on incorporating sensors.

"The holy grail of drug delivery has been to integrate biosensors with drug delivery systems so they can respond automatically to changes in the body," he said. "We will definitely be heading that way."
************************
Euromedia.net
EC and mobile industry meet to discuss 3G
Editor: Sean Cornwell


The European Commission and GSM Europe, the regional interest group of the GSM Association, have held a high level roundtable discussion attended by CEO's of 18 of Europe's leading mobile network operators.

According to GSM Europe, discussions focused on crucial industry issues such as infrastructure sharing, spectrum management, licence conditions, network rollout , M-Commerce, new services and applications, and also on the ways in which the Commission can help support the industry to launch future 3G networks and services.

The meeting also addressed key aspects of the EU's eEurope Action Plan which recognises that 3G communications is essential in eEurope, in order to create a real and workable broadband information society with innovative services available for anyone, anywhere, anytime.

Commissioner Erkki Liikanen, responsible for Enterprise and Information Society stated: "I continue to believe that 3G is an essential building block of the broadband wireless Information Society and that its success is
essential to achieve the Commission policy objectives of an Information Society for all. A significant step in this direction was taken by the recent adoption of a lighter new regulatory regime. I welcome the roundtable initiative with GSM Europe and today's discussions, which have provided a solid basis for a successful launch of 3G services in the very near future."


He added that "it is particularly important to fully realise the benefits of the new communications regulatory package. This package has been designed to reduce red tape, it offers technology-neutrality, is flexible and will pave the way for a more level playing field for telecoms in Europe. In addition, other actions - such as pilots and R&D have been launched with the intention to stimulate the development of new services, applications and content."

GSM Europe is pressing for several legislative changes which it says are critical to the success of Europe's mobile services, and has warned against "the adverse risk of inappropriate regulation and its over-spill on to new and innovative services, including 3G," as well as "inappropriate financial regulation" for mobile commerce.
*******************
Sydney Morning Herald
New worm spreads via Microsoft SQL Servers


Internet Security Systems X-Force has learned of a worm that is spreading via Microsoft SQL servers. The Spida worm is responsible for large amounts of Internet traffic as well as millions of TCP/IP probes at the time of publication.

The worm attempts to locate and login to MS/SQL servers with the "sa" account and a blank password. Once a vulnerable computer is found, the worm will infect that target, send its configuration and password information to an external host, and begin scanning for new targets.

Although the Spida worm is not destructive to the infected host, it may generate a damaging level of network traffic when it scans for additional targets. The scanner bundled with the worm is multi-threaded and is capable of scanning with 100 threads. A large amount of network traffic is created by the worm, which scans both internal and external IP addresses for vulnerable servers.

The Spida worm propagates via Microsoft SQL installations with administrator accounts that have no passwords defined. Although Microsoft recommends that the "sa" account be set upon installation, many servers are not properly secured. If the worm finds a vulnerable server, it will attempt to execute its startup script by running the "xp_cmdshell" function, which is the SQL call used to execute system commands within SQL queries.

The main function of the Spida worm is to export an infected server's SAM password database and forward information about its network and database configuration.
********************
Jerusalem Post
Australian billionaire aids revival of Computer for Every Child
By GREER FAY CASHMAN


John Gandel, one of Australia's leading businessmen, has given US $1 million to the Computer for Every Child project to set the stage for the distribution of an additional 12,000 computers to children from low-income families. Gandel's is the largest cash donation since the project's initiation in 1997 by then Prime Minister Binyamin Netanyahu.

A long-range distribution target of 30,000 computers was set, and in the beginning, the project with which Netanyahu was strongly identified, got off to a roaring start. Netanyahu encouraged its progress and was frequently photographed at computer distribution ceremonies.

This did not sit well with his successor Ehud Barak, who during his term of office put the project on the back burner. Barak did not want to be associated with anything for which Netanyahu would reap a share of the credit.

Such considerations did not bother Ariel Sharon. Very soon after taking over from Barak, he revived the project. All in all, 10,000 computers have been distributed to needy children all over Israel, and a further 2,000 will go out over the next three months.

Companies such as Microsoft, Motorola, Intel, John Bryce and others have contributed software and training. All computers are distributed with Microsoft programs, the value of which to date is $3 million.

So enamored with the project is Gandel, that he has made several Australian government ministers aware of it. "I haven't pushed it in Australia yet" he said in a telephone interview from his Melbourne office, "I wanted to see the program running first."

Gandel believes that it would be "a creditable cause in Australia and an enormous asset to any society." The initial beneficiaries in Australia, he estimated would be Aboriginals and Vietnamese immigrants. But before any decisions would be made, the program would have to be thoroughly researched to determine criteria among the underprivileged sectors of society.

Through his Gandel Group, which develops multi-million dollars properties including $3 billion worth of shopping centers all over Australia, Gandel contributes generously to numerous causes in Australia and Israel. He's given what he terms "small amounts" to various universities in Israel, but he's given substantially to Keren Hayesod and the Jewish National Fund.

In fact, almost every major Israeli organization and institution represented in Australia has benefited from his largesse.

Gandel who heads one of the larger charitable groups in Australia and who has led several major philanthropic campaigns, decided a couple of years back that he wanted to be more personally involved in various Israel projects. A Jerusalem venture in which he invested a lot of time fell through, but this in no way dampened his enthusiasm.

"We're constantly looking for new interests in Israel," he said. Towards this end, he appointed an Israel representative 18 months ago. The representative recommended the Computer for Every Child project.

Coincidentally Motorola Israel's chairman Hanan Achsaf , and Gandel's good friend and Australia-Israel Chamber of Commerce colleague Leon Kempler also mentioned it to him.

Its appeal to him most is that it not only assists young people, but that it brings more technology to society in Israel. While the computers are given to one member of the family, every member of the family who so desires can learn to use it. "The spin-off is to the whole family, and that's what's of value," said Gandel.

Although he's personally computer-savvy, he admits that when he runs out of knowledge, it's his three and four-year old grandchildren who come to his rescue.

That's an experience that he wants to share with Israelis grandparents who don't have the wherewithal to purchase computers for their own grandchildren.

Causes with which Gandel is primarily associated in Australia come under the rubrics of health, education, culture and geriatrics in both the Jewish and non-Jewish communities.

"I see ourselves giving in these areas in Israel," he said, adding that it is very important now for Jews in the Diaspora to give additional support to Israel causes, and it is equally important that it be recognized that "Jews in the diaspora are not running away from their responsibility to Israel." It's easy to sit back and watch the news on television and take it for granted that Jews in Israel can look after themselves, said Gandel, but it doesn't work that way he observed, because Jews everywhere are affected by what happens to Jews in Israel.

For twenty years, Gandel was involved in a construction company in Israel, but the partnership split up and he was left without any investments here. But he wants the opportunity to remedy that situation. The problem is that everything in Australia is so fast-paced that he simply doesn't have the time to go out and explore the options.
*********************
Computerworld
Tech consortium created to improve software reliability


A group of 18 organizations from all sectors of the economy has teamed with Carnegie Mellon University in Pittsburgh to form a technology consortium dedicated to improving the reliability and security of commercial software.

Armed with $30 million in seed money from grants from private institutions, the new Sustainable Computing Consortium (SCC) announced this week will work to initiate public policy debates and create new standards and techniques for developing more reliable software.

In addition to the university, SCC founders include Microsoft Corp., Oracle Corp., American International Group Inc. (AIG), Cisco Systems Inc., Mellon Financial Corp. and NASA.

"Software systems have become the critical infrastructure of our nation and economy. Unreliable software has profound consequences," said William Guttman, director of the Pittsburgh-based SCC. He added that the loss of a single cellular telephone network node due to a software failure could cost a company $18,000 or more per minute.

In fact, statistics recently released by the Washington-based National Research Council show that U.S. companies spent $175 billion last year to repair damages caused by software defects and $12.3 billion to repair systems affected by computer viruses. SCC officials said those costs are likely to rise this year.

Taking Action

However, the software industry is still in its infancy when it comes to taking action on reliability and security issues, said Jim Morris, dean of the school of computer science at Carnegie Mellon.

Steve Perkins, senior vice president of Oracle's public-sector and homeland security division, agreed. "Software, as an industry, is pretty immature," Perkins said. "We lack the metrics, the standards and the discipline, [and] these kinds of capabilities cannot be architected [into software] after the fact."

"We now have all of the players who can address these problems," said Morris. He added that the SCC will be actively recruiting other companies to take part.

However, questions were raised during a press briefing regarding the incentives that exist for software vendors to improve the reliability and security of their systems. Many companies, such as Oracle, use the unique security features of their software as selling points and marketing tools against competitors.

Ty Sagalow, chief operating officer at New York-based AIG's eBusiness Risk Solutions group, one of the largest U.S. insurance companies that offers security risk insurance, said the insurance industry will play an important role in promoting "positive behaviors" in software developers.

However, Sagalow added, the SCC will be key in helping the industry quantify cyberrisks. "We must act now," he said. "There is a business need to create a cycle of risk management."

Guttman said the consortium hopes to define specific challenges and a plan for developing technological measurements within the next year. He declined to elaborate on specific deliverables and timetables.
***********************
CNET
Nonprofit to wire up rural Asian schools
By Rachel Konrad


Room to Read, a nonprofit start-up dedicated to improving literacy in developing nations, will launch a new division Wednesday to wire impoverished classrooms in Asia.
The San Francisco-based company, founded by a former Microsoft executive and funded largely by donations from technology workers and venture capitalists, developed its "Computer Room" project with cash from Microsoft, Global Catalyst Foundation and The Tibet Fund. Eleven classrooms in Nepal and Vietnam will be the first recipients of grants under the new program, which provides each school with four computers, one printer, all related hardware and software and a dedicated dial-up connection.


Room to Read founder John Wood said the group will be cautious when selecting the rural districts that receive computer grants; only those that already have strong teachers and established schools will receive computers. In addition, the communities that receive Room to Read computer grants must provide matching grants for teacher training and computer upgrades, repairs and maintenance.

"There are certain communities where doing this program would be putting cart before the horse. Some places don't even have electricity," Wood said Tuesday. "However, there are some communities where the education system is advanced enough. Computers are definitely not going to solve all these communities' problems on their own, but they could be part of a well-rounded curriculum in some areas."

Computer Room is the start-up's effort to close the digital divide and expand into computer literacy. Room to Read's primary goal is to improve overall literacy by building classrooms and libraries and providing scholarships in poor communities that have traditionally given short shrift to education. Room to Read also provides scholarships for girls, who have lower literacy rates throughout the developing world.

With only two full-time employees, Room to Read relies mainly on volunteers and donors at technology companies such as Microsoft, Sun Microsystems, Oracle and other tech employers, as well as Silicon Valley venture capitalists and philanthropists. The group has built 15 schools and 150 libraries, and it has donated 90,000 books to rural classrooms.

The 2-year-old nonprofit developed Computer Room based on the overwhelming demand of teachers and students in communities where it has already built schools, mainly Nepal, Cambodia and Vietnam. It received cash grants of $30,000 from Microsoft, $30,000 from venture capital firm Global Catalyst Foundation and $8,000 from The Tibet Fund.

Although $68,000 would be a negligible amount of cash for many San Francisco Bay Area technology start-ups, Wood emphasized that the money will stretch far in the developing world. The average computer room for a rural school costs about $4,000. He is also asking companies to donate software.

Wood dismissed concerns that Internet access would transform rural communities by exposing them to Western commercialism. He noted that Room to Read is encouraging donations of educational software and CD-ROMs to help children learn languages, advanced mathematics and physics--not just software that enables them to get into AOL chat groups to discuss American pop culture and trivia.

"The ultimate goal is to give them one more tool to improve their own lives," said the former Microsoft marketing executive, who was working in Microsoft's Hong Kong office when he quit to start the nonprofit company.

In the group's initial efforts at wiring classrooms, Wood said students and teachers are most impressed by e-mail. Although some schools in Katmandu and other tourist hubs use their connections to promote tourism and e-commerce, most people simply want to stay in touch with foreigners they've met over the years and family members who have emigrated.

"E-mail is such a popular application in these communities where people have been isolated for so many generations," said Wood, who travels to Asia frequently to supervise the building of Room to Read classrooms and installation of computers. "In Vietnam, many citizens grew up not able to communicate with the outside world freely or cheaply. Now they can keep in touch. They are amazed at the power of the Internet."
*******************





Lillie Coney Public Policy Coordinator U.S. Association for Computing Machinery Suite 507 1100 Seventeenth Street, NW Washington, D.C. 20036-4632 202-659-9711