[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips May 20, 2002
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, CSSP <cssp@xxxxxxx>;, glee@xxxxxxxxxxxxx;, Charlie Oriez <coriez@xxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, computer_security_day@xxxxxxx;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;;
- Subject: Clips May 20, 2002
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Mon, 20 May 2002 15:04:25 -0400
Clips May 20, 2002
ARTICLES
Sen. Drafts $32B Anti-Terror Plan
New TSP system set for September
Making a Digital Government
Report on Foreigners, Social Security
At I.B.M., a Tinier Transistor Outperforms Its Silicon Cousins
New Web File-Sharing System Launches
A Web of dreams unrealized: High-speed Net access slow to catch fire
Lawmakers Play Up 'Dot-Kids' Proposals
Law beefs up security at borders
Homeland strategy won't meet all concerns
Senate Panel Backs Computer Security Boost
Looking into disk mirroring
iSCSI may cut mirroring costs
Parenting suffers in e-mail overload
Mass arrests over online child porn
Virus outbreak hits file swappers
Tokyo smart cards challenge cash
Defense IT execs are honored by Women in Technology
File-sharing system gives artists some control
Internet pharmacies stress industry in Canada
Agencies find it's not getting the information, it's how you use it
Central e-learning site for federal workers takes shape
Sharp rise in computer crime in Australia
Hotmail bid to cash in on users
Protecting the extension of your personal space
Outlining Proper Uses Going Online
Radio ID Tags: Beyond Bar Codes
FBI wants to know who took 13,000 credit reports
***********************
Associated Press
Sen. Drafts $32B Anti-Terror Plan
Thu May 16,11:45 AM ET
By ALAN FRAM, Associated Press Writer
WASHINGTON (AP) - Sen. Robert Byrd (news, bio, voting record), chairman of
the Senate Appropriations Committee, is showing colleagues a tentative
anti-terrorism package that is billions costlier than a $29.4 billion
version a House panel has approved, Senate aides said Thursday.
Byrd's draft has a price tag surpassing $32 billion, one said, with
virtually all the extra money aimed at domestic security programs. His
package, described by aides speaking on condition of anonymity, also
exceeds the $27.1 billion that President Bush (news - web sites) requested
from Congress in March.
Aides said Byrd, D-W.Va., may alter his draft as he consults with
Republicans in hopes of gaining their support. But for now, its size is
certain to draw attacks from many congressional conservatives who want to
limit the measure's cost to Bush's proposal.
Even moderate Sen. Ted Stevens (news, bio, voting record) of Alaska, the
Appropriations Committee's top Republican, who normally crafts spending
bills arm-in-arm with Byrd, has told him he wants the package no bigger
than the House version.
Byrd's measure takes a shot at Homeland Security Director Tom Ridge by
making his position one that would require Senate confirmation. Byrd has
clashed with the White House over Ridge's refusal to formally testify
before congressional committees, which the administration justifies by
saying Ridge is an adviser to Bush who is not approved by the Senate.
Byrd's measure would provide $200 million in extra aid for Israel and $50
million for the Palestinians, which the House provided, though with
different terms. And it would provide $100 million to battle AIDS (news -
web sites) and other deadly diseases abroad, half the House proposal.
Byrd's committee could vote on the plan as early as next week.
On Wednesday, the House Appropriations Committee used a voice vote to
approve its version of the bill after handing Bush a victory in the fight
over his decision to withhold money provided last year for overseas family
planning efforts.
The House panel gave Bush another win as well, derailing language that
would have spared the planned Crusader artillery system from Defense
Secretary Donald H. Rumsfeld's budget ax.
Worried their amendment might fail, supporters of the $11 billion weapon
settled for a nonbinding provision telling Rumsfeld to "take no action that
would precipitously stop work" on the Crusader until Congress has voted on
the program's fate. That, in effect, postpones the fight until lawmakers
write the 2003 Pentagon (news - web sites) spending bill in a few months.
The full House should vote next week on the overall counterterror package,
which is the government's latest response to the Sept. 11 terror attacks.
The bill includes $15.8 billion for the Defense Department; $5.8 billion
for domestic security, mostly for aviation and airports; and $5.5 billion
to help New York recover from the Sept. 11 attacks.
It provides money for Pell grants for low-income students, overhaul of
election systems, veterans benefits and foreign aid, including funds for
Israel and the Palestinians.
By a near party-line 32-30 vote, the Appropriations panel approved a Tiahrt
provision giving Bush until July 31 to decide whether to spend any of the
$34 million for overseas family planning that lawmakers approved and Bush
signed into law last December.
Bush has refused to release the money to the U.N. Population Fund, which
runs family planning programs in 140 countries. In withholding the money,
the administration cited conservatives' accusations that the U.N. agency's
activities in China abet forced abortions and involuntary sterilizations.
U.N. officials and their supporters deny the charge, and the U.N. program
uses no U.S. funds in China. The Bush administration has sent a commission
to China to search for evidence of forced family planning and U.N. links to
it, and its report is expected soon after it returns in two weeks.
Wednesday's vote reversed a 32-31 tally by the committee last week
approving language requiring Bush to release the $34 million by July 10
unless U.N. complicity in coerced abortions and sterilizations was found.
*************************
Government Computer News
New TSP system set for September
By Brian Friel
bfriel@xxxxxxxxxxx
The $102 billion Thrift Savings Plan will have a new computer system in
September that will provide daily updates of the value of the 401k-style
retirement accounts held by federal workers and military personnel, the TSP
board announced Friday.
The TSP's 2.9 million participants will also be able to move their money
among investment options at any time under the new system.
The announcement marks the fourth time in three years that the TSP board
has promised to unveil the new system, which will make the TSP more like
private sector 401k systems. Such systems have long provided participants
with daily valuation and the ability to update accounts at any time.
After three delays in 2000 and 2001, the TSP board in July 2001 fired
Fairfax, Va.-based American Management Systems, the original contractor
overseeing the TSP's computer modernization. The board hired Alexandria,
Va.-based Materials, Communication & Computers Inc. (MATCOM), to take over
the contract. While MATCOM has been working on the contract, the Thrift
Savings Plan board and American Management Systems have been locked in a
legal battle over who is to blame for their failed contract.
TSP officials say MATCOM scrapped the work done by American Management
Systems and started over.
TSP board officials plan to close out the current computer system at the
end of August and bring the new system into operation on Sept. 16. There
will be some limits on participants' account transactions during the
transition.
The chart below shows the major changes that TSP participants will see if
the new system works as expected in September.
********************
Los Angeles Times
Making a Digital Government
Lawrence Brandt's latest job is to get federal agencies to share technology
and information.
By P.J. HUFFSTUTTER
Lawrence Brandt still remembers the day, nearly a decade ago, when he
approached a team of University of Illinois students who were working on a
software project called Mosaic. The technology offered a revolutionary idea
in networked computing--the ability to surf a collection of multimedia
images and text stored on remote computers.
Mosaic made the World Wide Web easy to use and ultimately drew millions of
people onto the Internet.
Brandt, then a manager with the National Science Foundation, understood
that government needed to get on board. Pulling together some grant money
for the young developers, Brandt helped coordinate a consortium of
government agencies to fund this and other projects evolving out of some of
the nation's super computer centers. Among the early recipients: Marc
Andreessen, who created Mosaic and later co-founded Netscape Communications
Inc.
"I funded Marc for $5 an hour," said Brandt, now the program director of
the Digital Government project, an NSF initiative to forge ties between
private research and public agencies. "I should have had him pay us in stock."
Brandt has a knack for spotting early-stage technologies that matter. Over
the years, the small cluster of grants funneled to computer researchers has
grown to a comfortable $10 million a year, all geared toward finding new
ways to bring government into the digital age.
This week, more than 200 information technology researchers and software
engineers involved in the program will gather in Redondo Beach to
demonstrate prototype systems that promise to streamline government processes.
Some will succeed. Others, acknowledged Brandt, will fail. Either way, the
dream of a truly electronic government has a long way to go.
"A failure means you learn you can't proceed in a certain direction,"
Brandt said. "In government, it's sometimes more important to avoid making
a mistake than it is to make a home run."
Question: Why has government been so slow to get on the high-tech bandwagon?
Answer: It's very careful and risk averse. In business, if you drop $500
million on a failed technology project, you don't hear about it. In
government, it lands you on the front page of the newspapers and launches
congressional hearings.
It's also a cultural thing. People in government want to make sure they do
the right thing for the public, but there's no clear bottom line. In
business, the goal is profitability. In government, you don't have that.
Part of the problem is there are so many pushes and pulls in government.
There's Congress looking over their shoulder and wanting one thing. Then,
citizens want another. Many citizens don't appreciate what government
agencies do. Most of what they do is invisible, and that's the way it
should be.
Q: What's the goal of the NSF's Digital Government initiative?
A: The NSF focuses on long-term research and education in all science and
engineering disciplines. The goal is to increase our understanding of
subjects, even if the research may seem archaic or "out there." Even if a
project fails, there is still some sense of success because others won't
follow the same path and make the same mistakes.
If a project is a success, it may not be clear why the research matters
right now. But it will. In many cases, the practical uses that result from
scientific understandings were not apparent at the time the work was being
done.
We focus on practical uses. We're funding the academic side of this thing,
so that the research community has a chance to work on projects and deal
with a scale and type of data they usually wouldn't have access to. These
are important problems, some that may not have occurred to them before. We
all need practical solutions.
Q: What are some of the key hurdles?
A: Privacy and confidentiality are very big issues that people in
government are talking about right now. For many agencies, there's an
inherent tension of the job between their mandate to collect data that is
considered confidential and their mandate to disseminate some--but not
all--of that data to researchers and the general public.
Right now, the way many of them try to maintain confidentiality is to
introduce fake data that shows the same statistical trends as the real
thing. Obviously, that drives researchers crazy.
We are funding a few Citizen Access projects to try to spark change. I have
a person on detail from the U.S. Census who was able to make a really good
connection with all the statistical agencies and figure out their needs.
One part of the project with the National Institute of Statistical Analysis
is to provide agencies with the tools to better monitor this tension.
Q: How can so many different agencies--both state and federal--have such
different goals and restrictions yet still use the same tools?
A: That's the joy of technology. If you're developing mathematical
algorithms, they can be applied anywhere. It just needs to be flexible
enough for the agencies to customize it to their needs.
We've got one project called Coplink, through the University of Arizona,
that's trying to help local law enforcement people share information
better. The result is a series of software programs that can be sold to
other police departments.
The person in charge of the project already had connections with local
agencies. We added base-level funding from the National Institute of
Justice. Now, the university and the program manager have created a venture
capital firm to spin off the product.
Q: Why wouldn't law enforcement share their information automatically? In
light of the Sept. 11 catastrophe, it seems to make sense.
A: The information you hold is your power base. You saw that with Sept. 11
and the FBI's problems. It took someone upstairs to rattle the cage, to
say, 'You will take down the barriers and share your information,' to get
anything done.
If you talk about sharing the data from Customs and the [Federal Aviation
Administration] and the FBI and local agencies, everyone would admit that
it was a good thing. Everyone should be able to see the full picture of the
elephant, not cling to their own little piece of it.
Part of the problem is that many agencies aren't allowed to share data
because of the law. It's the notion of Big Brother. That's obviously a
concern for many people. The idea of law enforcement having a unified,
composite file on a person's life is a powerful thing. For some people,
that's a horror.
On the commercial side, it's not a problem. It would be advertised as a
feature.
*********************
Associated Press
Charges Against Internet Pharmacy
Sun May 19, 3:41 PM ET
By TOM COHEN, Associated Press Writer
TORONTO (AP) - In recent years, busloads of Americans have crossed into
Canada to buy cheaper prescription drugs with help from Canadian doctors.
Now many of those customers, mostly senior citizens facing large medicine
bills, make that trip by the Internet, creating a growing industry that is
attracting the attention of regulators.
On May 14, the Ontario College of Pharmacists filed the province's first
charges against a Web site selling prescription drugs, accusing it of doing
so without a license.
It is the initial salvo in what could be a lengthy battle over how to
regulate the Internet prescription drug industry, raising questions about
whether technology has advanced faster than the governing laws and policies.
"This is the first time we've done this," Layne Verbeek, spokesman for the
Ontario college. "It's a new area."
Verbeek said a body of rulings and court decisions is needed to ascertain
if existing laws and regulations properly address the issues.
The charges were filed against The Canadian Drug Store Inc., one of its
directors, an Ontario pharmacist, an Ontario pharmacy, an Ontario physician
and a Canadian drug wholesaler.
Representatives of the Canadian Drug Store could not be reached for comment.
"There's always entrepreneurs wanting to find ways around the rules to make
money. There's nothing wrong with entrepreneurship, but we're really at the
beginning of this," Verbeek said. "These won't be the last charges we lay."
One of the most successful internet drug store entrepreneurs is Andrew
Strempler, whose Mediplan Health Consulting Inc. in Manitoba fills about
1,000 prescriptions each day for U.S. customers who place orders through
the Web sites RxNorth.com and Canadiandrugstore.com.
His operation, which employs more than 100 people including eight
pharmacists, only handles non-narcotic orders that have a prescription from
doctors licensed in Canada. The service includes having a Canadian-licensed
doctor co-sign prescriptions from U.S. doctors for American patients.
While Canadian regulatory bodies say doctors only should sign prescriptions
for patients they examine themselves, Strempler called that "kind of a dream."
"How many doctors have prescribed a drug based on another doctor's opinion?
That's the reality out there," he said. "The issue isn't whether the
patients are receiving proper care. The issue is we are doing something
new, and when you do something new, people are going to question it."
Cases like the Ontario charges give the entire industry a bad name, said
Strempler, who has a message on his Canadiandrugstore.com site noting it is
different from The Canadian Drug Store Inc. cited by Ontario regulators.
"We're fulfilling a need" for American senior citizens who cannot afford
the higher-priced medicine south of the border, he said. "There's nothing
scandalous in this industry. You'll always have one or two bad apples. We
really hope that doesn't ruin the reputation in this industry."
In the Ontario case, the College of Pharmacists filed 15 charges that
accuse The Canadian Drug Store Inc. of operating an unaccredited Internet
pharmacy without registered pharmacists from November 2001 to February
2002. It said the Toronto-based operation filled prescriptions written by
U.S. doctors for U.S. patients.
Along with lacking a license, such an operation violated policies for
physicians and pharmacists set by the Ontario College of Pharmacists and
the Ontario College of Physicians and Surgeons.
The pharmacists college requires prescriptions written by Canadian doctors,
while the physicians and surgeons college requires doctors to physically
examine a patient before signing a prescription.
Spokeswoman Kathryn Clarke of the physicians and surgeons college said the
policy adopted in November 2000 responded to the busloads of Americans that
pull up to walk-in clinics to get prescriptions from Canadian doctors. Now
the situation has evolved with the emergence of the Internet industry.
"It's increasing," Clarke said of Internet drug sales. "It's really a very
complex issue that involves both countries and is only happening because
the drug prices are different."
Drugs are often cheaper in Canada because the government funds the medical
system and approves the price of all patented medicines.
The cheaper prices have long attracted Americans on prescription
drug-buying sprees, especially in northern states that border Canada. Now
it happens on the Internet, with Strempler's sites warning of delays in
filling prescriptions due to high demand.
******************
Associated Press
Report on Foreigners, Social Security
Mon May 20, 6:23 AM ET
WASHINGTON (AP) - As many as one in 12 foreigners obtaining new Social
Security (news - web sites) numbers illegally use fake documents to get the
cards, a recently issued report says.
James Huse Jr., the inspector general of the Social Security Administration
(news - web sites), said that a preliminary investigation found that about
8 percent, or more than 100,000 of the 1.2 million original Social Security
numbers assigned to noncitizens in the year 2000, may have been obtained
with invalid immigration documents.
Fake or illegally obtained Social Security numbers are often the first step
in identity theft, obtaining loans or bank accounts illegally and other crimes.
Law enforcers also say the phony documents can be used to get credit cards
or to help land jobs that require security clearance at airports and other
sensitive locations.
Huse said that fake Social Security numbers can be gotten in many ways,
including using false documents in applications to the SSA, stealing
another person's number, using the number of someone who has died, or
simply making up a number.
"As we have learned through the terrorist investigation, even a legally
obtained SSN can be used to facilitate an unlawful act," he said in the
report dated May 9.
Some of the hijackers involved in the Sept. 11 terrorist attacks had
illegally obtained Social Security numbers and used them to get credit
cards and open bank accounts.
In his report, Huse said the administration is looking at ways to better
verify the information it receives from applicants, but because of problems
of coordinating efforts with the Immigration and Naturalization Service a
fix is still six months or more away.
*****************
New York Times
At I.B.M., a Tinier Transistor Outperforms Its Silicon Cousins
By BARNABY J. FEDER
.B.M. researchers have created carbon nanotube transistors that
substantially outperform models of even advanced silicon devices without
departing from the most common design of silicon chips.
The I.B.M. transistors also have a higher capacity for carrying electrical
current a measure related to transistor speed than previously designs
using nanotubes.
Nanotubes are tube-shaped molecules of carbon 50,000 times as thin as a
human hair. Although commercial products are probably years away, the
research provides the strongest indicator yet that carbon nanotubes could
be feasible successors to today's silicon devices when developers reach the
point where it is impossible to improve microchips by shrinking silicon
designs further, according to Dr. Phaedon Avouris, manager of nanoscale
science at I.B.M. Research in Yorktown Heights, N.Y.
The research results are being reported today in the Journal of Applied
Physics Letters.
Compared with previous designs for nanotube transistors, the I.B.M. models
use a more conventional arrangement of the various elements of the
transistor, like insulators and the gate that switches current on or off,
found in conventional silicon chips. Such arrangements are thought to be
well suited to combining many transistors into logic circuits and low power
consumption.
I.B.M. said that the nanotube transistors it built also carried two to four
times as much current as comparable silicon devices. The devices are
commonly called Mosfets (for metal-oxide semiconductor field-effect
transistors).
Dr. Avouris said that the nanotube's performance relative to silicon should
improve as more is learned about how to build nanotube structures. In
addition, I.B.M. expects to achieve big gains in nanotube performance
simply by shrinking their dimensions. Right now, several important elements
are currently 10 times the size of their counterparts in the silicon models.
"There are some obvious ways of improving the nanotubes," said Dr. Avouris.
For all the progress, he said it would be two to three more years before
I.B.M. was ready to work on prototypes of future nanotube chips and as many
as 10 years before they would be commercially available.
"I don't think we'll see a sharp transition from silicon to nanotubes,"
said Dr. Avouris. "We expect to move to hybrids first."
*****************
Government Computer News
Council seeks 32 e-gov fellows to learn about leadership
By Dipka Bhambhani
GCN Staff
The Council for Excellence in Government will choose 32 e-government
fellows from among federal IT managers, up from 25 last year.
The chosen fellows will get together for two to three days every four weeks
for a year beginning in September. They will debate topics such as
information assurance, e-commerce, multimedia and information presentation,
e-government, data integration, portals and accessibility technology.
Chosen vendors and representatives of the National Science Foundation
participate in the discussions. NSF assists the fellows in using learning
modules and online services.
"We review applications with an eye to finding people who understand that
learning about leadership isn't done in a classroom as much as it is by
experience," said Martha Johnson, vice president of leadership and
performance for the council, headquartered in Washington.
The nominations come from senior agency managers, who sponsor one or two
names. The council accepts 90 percent of those sponsored, but "we turn down
people who are clearly looking for a more structured, traditional program
that allows them to check off a box next to a list of things they need to
do to get promoted," Johnson said.
Applicants usually rank at the GS/GM-14 or -15 level or the equivalent in
military, state or other systems. Selected fellows will have worked in
various IT capacities, Johnson said. A fellow's agency pays $9,750 tuition
and $3,000 in travel costs for the year.
The council has awarded general fellowships for many years, but the
e-government fellows program is only in its second year.
********************
Associated Press
New Web File-Sharing System Launches
By ANICK JESDANUN, AP Internet Writer
NEW YORK (AP) - Ace Ha and Sammy Brazil of the emerging hip-hop group
MaddWest don't mind listeners passing around their music for free over the
Internet. All they want is a little control.
The Altnet file-sharing system launches Monday to give MaddWest and other
artists a greater role in the otherwise free-for-all world of peer-to-peer
networking.
Users could trade music, video and other files among themselves just as
they do with KaZaA, LimeWire and others. But with Alnet, songs will be
coded with digital rights management technology so artists can limit
distribution, or even collect fees before a song will play.
Ha said MaddWest will still give music away for free. But he believes
Altnet will take "the care and pains" to ensure available copies are "put
up in a way we would find satisfactory."
Some analysts wonder if Internet users will tolerate the added hurdles that
come with digital rights management. Users with no qualms about downloading
illegal files can already find everything from Britney Spears songs to the
latest "Star Wars" movie.
"There is clearly a demand for file swapping," said Matthew Berk, an
analyst at Jupiter Media Metrix. "Whether or not if you lay on top of it a
DRM system people will be keen on using it is another question."
Even so, Kevin Bermeister, president of the Brilliant Digital Entertainment
company behind Altnet, believes people will chose legal file swapping, even
for a fee, if it is available.
Beginning Monday, Altnet will distribute its search software with new
versions of KaZaA. Once installed, when an Internet user does a search on
KaZaA, the Altnet search tool will also check whether anything is available
through Altnet.
If an item is available, the user would download the file directly from the
content provider, such as a record label.
In July, Altnet will begin to ask KaZaA users to voluntarily lend their
spare disk space, and install a second piece of software to run the Altnet
sharing network. Music and other files from participating content providers
will then be saved on the volunteer computers.
The system will allow listeners to get a requested file directly from
volunteer computers. If unavailable there, the listener would got directly
to the content provider.
Altnet is hoping to initially get about 20,000 volunteer computers.
Computers will require a high-speed Internet connection, at least 400
Megahertz of processing power and five to 15 gigabytes of free disk space.
Participants will be rewarded based on how much their computers are used by
listeners obtaining files. Bermeister said the heaviest contributors may
get free hotel rooms, air fare and similar gifts. Occasional contributors
may get movie tickets or discounts on merchandise.
Though Altnet will initially work only with KaZaA, the company is exploring
partnerships with others.
Altnet is also developing a version for Linux (news - web sites) computers.
There are no plans for Apple's Macintosh (news - web sites) computers.
********************
Seattle Times
A Web of dreams unrealized: High-speed Net access slow to catch fire
By Jim Landers
The Dallas Morning News
WASHINGTON Federal Communications Commissioner Kathleen Abernathy didn't
think she needed a high-speed Internet connection.
"I'm doing messages at home. Why would I need to pay more for broadband?"
she asked.
But Abernathy's 6-year-old daughter showed her otherwise. A homework
assignment on American presidents, involving lots of color photos, pasting
and posters, required interminable waits for dial-up Internet downloads.
Value, however, was an issue. With broadband connections costing $50 or $60
a month, Abernathy wasn't completely satisfied with the return for her
investment.
"I should have gone to the library," she said.
She's not alone. More than 70 million homes are online, but only 15 percent
have high-speed Internet access, according to estimates from CyberAtlas.
Much of the telecommunications industry argues the lack of broadband use is
a result of regulations and other barriers that limit competition and supply.
But technology advisers in the Bush administration and in other parts of
the industry are beginning to look for answers on the demand side.
The President's Council of Advisors on Science and Technology held its
first meeting last month and made boosting broadband demand one of its four
priorities.
Bruce Mehlman, the Commerce Department's assistant secretary for technology
policy, said consumers and small businesses think broadband is too expensive.
"Many consumers fail to see the value proposition for investing in
broadband, considering it a luxury or not yet worth the investment," he said.
He said his office is concentrating on helping small businesses understand
how broadband could boost their productivity.
Need for 'killer application'
For most consumers, however, there is yet to be a "killer application" that
would drive broadband adoption. The typical high-speed user is a
telecommuter or a computer-games player. Movies-on-demand and other video
applications are off to a slow start because the costs of video streaming
increase with the number of viewers, and movie downloads introduce
difficult copyright issues.
Promising uses of broadband in education, health care and video
teleconferencing have not taken off.
Yet three-fourths of the companies offering high-speed Internet access
raised prices last year as they struggled to recover some of the tens of
billions of dollars invested to supply broadband.
Telephone companies offering DSL, or digital subscriber lines, increased
prices an average of 10 percent. Cable-modem Internet providers raised
prices 12 percent, and just last week, AT&T Broadband said it was raising
cable-modem rates about 15 percent, to $45.95 a month, next month.
Broadband suppliers say prices will fall once broadband access becomes
pervasive.
But the Information Technology Association of America (ITAA) released a
report in October calling into question this basic premise.
"The assumption: Build it and they will come," the report concluded, using
a line from "Field of Dreams," the baseball movie and novel. "This line of
thinking has truly proven to be a field of dreams. In this scenario,
unfortunately, Shoeless Joe becomes Clueless Joe and the fans stay away in
droves."
More than 70 percent of U.S. households had access to broadband last year,
and by 2005 the number will increase to 90 percent, the ITAA report found.
"If deployment were the only measure, broadband would be a significant
success story," the report found.
Hearing the phone companies
Those arguments outrage officials at companies such as SBC Communications
and Verizon Communications who are lobbying to improve the supply side of
the broadband equation.
ITAA's biggest member is AT&T, which is heavily invested in
cable-television networks that offer broadband access, which competes with
regional phone companies.
SBC and Verizon want Congress to free them of an obligation to provide
their Internet competitors access to their wires into the nation's homes
and shops. Cable firms don't have to provide competitors access to their
lines.
A bill freeing the regional phone companies to sell DSL service without
competitive piggybacking passed the House in March but faces a struggle in
the Senate.
Broadband is "fairly expensive," said Gary Shapiro, president of the
Consumer Electronics Association. "But that's because there's not enough
competition out there. You need a critical mass that will see prices drop.
"There's no question it's coming," he said. "The question is, are we going
to help the companies and the industries that rely on them deploy
broadband, or are we going to keep shackling those companies to their
competitors?"
The Bush administration and the FCC are listening. Broadband requires
attention on the supply and demand sides, Mehlman said.
Abernathy and her two fellow Republican commissioners agree. The commission
lacks jurisdiction to work on the demand side for broadband, she said. But
it needs to ensure that consumers aren't faced with a monopoly or even just
two choices for broadband supply.
"One or two suppliers doesn't give me what I want from the market," she
said. "I want three or four competitors. It's up to us to make sure the
access is there. Then it's up to the companies to market it."
Harris Miller of the ITAA argues competition won't benefit if regional
phone companies are given a monopoly on broadband wires leading into the home.
"There's just a fundamental schism between individuals who believe the
solution is to give the monopolists more monopoly power, and those such as
ITAA who feel that makes no sense."
******************
USA Today
Companies squander billions on tech
By Jim Hopkins and Michelle Kessler, USA TODAY
SAN FRANCISCO Productivity and economic growth soared in the 1990s as
companies poured billions into technology to power everything from
e-commerce to inventory management. Research now shows companies also waste
billions on tech.
Morgan Stanley estimates that U.S. companies threw away $130 billion in the
past two years on unneeded software and other technology, according to its
study of 25 years of tech spending. Worldwide, companies waste as much as
20% of the $2.7 trillion spent annually on tech, estimates research firm
Gartner, which is based in Stamford, Conn.
They do that because they stampede into the wrong technology, experts say.
They buy too much and don't implement new tech properly. They also
underestimate the time needed to make it work. And CEOs, especially during
the go-go years, often spent too quickly without clear goals.
"People kind of viewed it as black magic, so why understand it?" says
Charles Phillips, a tech analyst at Morgan Stanley.
It isn't just small companies that mess up. In recent years, big names such
as Nike, Kmart, Gateway and Hershey Foods have lost millions on failed
technology. More companies are likely feeling the pain.
Tech spending accounted for a record 4.7% of gross domestic product in
2000, at the height of the Internet boom. Now, tech spending has dropped to
4.2% of GDP.
The backlash has been enormous. As companies, burned by overspending, slash
tech budgets to the bone, they deprive the economy of fuel needed to
recover. Almost 80% of U.S. companies recently surveyed say they will spend
less or the same on technology this year compared with an already weak
2001, research firm In-Stat/MDR says.
The spending spree ended when the tech bubble burst. But a host of bad tech
investments had already been made, and continue to be made to some extent,
because of:
Fast buying. Corporations, especially during the Internet gold rush of the
late 1990s, pumped billions into e-commerce, Web sites and internal company
networks. A new breed of executive superhero was born: the chief
information officer, unleashed to hurl companies into the New Economy, in
which tech-driven efficiencies reigned supreme.
CEOs wrote blank checks to tech departments without asking basic questions,
Phillips says. During the boom, at least 85% of tech-buying decisions were
made by tech managers with little input from bean counters, estimates Frank
Britt, an IBM executive who frequently counsels companies on tech spending.
As a result, U.S. companies threw away more than $1 billion from 1998 to
2000 on Web-server software that did much more than their companies needed,
Gartner says.
PC maker Gateway made a different e-commerce mistake. Last year, it wrote
off $140 million from its failed effort to power an online store with
software from NECX, an e-commerce company it fully purchased in 2000.
NECX's software didn't work well with Gateway's existing system. The vision
never took off. The remnants of Gateway's online store now run on different
software.
Also a cause of panic buying: Y2K a potential computer glitch caused by
the 2000 date change. In advance of the new year, experts said computers
might falter. As a result, it was feared that electricity might stop
flowing, bank ATMs could fail and jets would fall from the sky. Little
happened except that corporations got stuck with big tech bills. "Y2K was
the biggest boondoggle," CIO magazine publisher Gary Beach says.
Choppy deployment. Many companies think they can install new systems fast
and reap immediate results touted by salespeople. But deployment of complex
systems can take years and so can benefits, says software analyst Bob
Austrian of Banc of America Securities.
Candymaker Hershey Foods provides an example. It finished installing three
software packages in the summer of 1999, just as retailers placed orders
for Halloween.
But the software, part of a $112 million system, proved incompatible with
earlier programs. The results were disastrous. Chocolate Kisses and other
treats piled up in warehouses because of missed or delayed deliveries.
Hershey lost about $120 million in sales. That cut third-quarter profit
almost 20%.
Kmart, to better compete with Wal-Mart, installed software to improve its
distribution system in 1997. Last September, it abruptly scrapped $130
million of the technology. The retailer said it would rebuild its
distribution system with new software it hoped would work better. It
didn't. Five months later, Kmart staggered into bankruptcy protection.
Nike CEO Phil Knight learned about tech failings, too. His company
installed software during the past five years to let retailers order direct
from Nike. Glitches in the software led to some shoes being overstocked,
while more popular ones were scarce contributing to a profit shortfall in
2000. The system was fixed, but not before Knight sniped, "This is what we
get for our $400 million?"
Getting stuck paying for unneeded tech. Hardware and software makers have
continually added features to products. That makes tech more complex and
raises costs. Companies often pay tech consultants $5 in support fees for
every $1 spent on software more than twice as much as they did years
before, Phillips says.
But companies don't always need what they get. "They overbuy and get more
features, more functions than they need," says analyst David Smith of Gartner.
Darlene Arden, a freelance writer in Framingham, Mass., grouses that tech
companies leave her no choice. The $1,600 laptop she bought in January has
a spreadsheet and games, none of which she needs. All she wants is a word
processor, but she could not find one so equipped. "If they're going to
charge me," she says, "I wish they'd ask me what I want."
Even tech consultants are frustrated. Minneapolis-based Caveo Technology,
which advises companies on tech use in health care and other sectors,
upgraded to Microsoft Office 2000 in the past year. The switch added more
features, but CEO George McNulty isn't convinced it's making his 10-person
staff more productive. He didn't see a choice.
"The market dictates it to you. If you want support from Microsoft, you
have to upgrade," McNulty says.
Governments sometimes buy too much, too. California taxpayers might be
stuck with a $41 million bill for Oracle database software that state
officials agreed to buy last year. The 270,000 software licenses would
outfit the entire state government far more than needed, the state's
auditor now says. California Gov. Gray Davis is trying to cancel the
contract, saying it is unnecessary.
A new dynamic
Experts say future corporate tech spending will be more focused on reaching
specific goals such as a 1% increase in revenue. Also, companies will
invest in smaller initiatives instead of companywide rollouts.
About 90% of companies planning tech investments in the second quarter are
trained on improving customer service, InformationWeek found in a recent
survey of 300 executives.
Ranking almost dead last: keeping up with the pace of change a factor many
companies cited as a force behind the "me-too" buying binge of the late 1990s.
Software deals now average about $1 million vs. the $50 million buys more
common in the late 1990s, Phillips estimates.
These changes reflect the new dynamic: Power has shifted to buyers, says
Stephanie Stahl, editor of InformationWeek.
Companies also are cleaning up messes.
St. Louis chemical company Solutia had more than 1,500 computer systems
after it was spun off from Monsanto five years ago. That's because each
Monsanto division made its own tech-buying decisions. The resulting
mishmash was confusing and costly, says Solutia CIO Johnnie Foster.
By this year, Solutia had slimmed to fewer than 300 systems, with help from
consulting firm EDS. One piece of software from SAP replaced dozens of others.
The trims let Solutia cut its tech budget by 4% since 1997.
Last summer, Pioneer Investments of Medford, Mass., saved $200,000 a year
by renegotiating licenses with Microsoft and other software makers. Before
using one reseller Corporate Software Pioneer had different offices make
their own deals, thereby missing out on bulk discounts. The company also
kept poor track of software and paid for copies that they didn't use. "In
the past, we didn't have as much discipline," CIO Carl Underhill says.
Underhill also cut $240,000 from the budget by reducing the number of
telephone and Internet service contracts to three from 15.
Tough customers
Tech suppliers, trying to boost sales, will have an especially hard time
selling to small enterprises. In a weakened economy, many small firms will
resume spending more slowly than will big corporations.
Many small businesses were already slow to embrace technology. About 37% of
small U.S. companies as many as 2 million don't have computers at all,
says the National Federation of Independent Business trade group.
Arden, the freelance writer, has two computers and a combination
fax-answering machine. She didn't get a cell phone until September, when
she wanted to feel safer while traveling alone. "I was thrilled not to have
one. I think we're overwhelmed by too much technology," she says.
Even so, reflecting the unease of many buyers, Arden is wary of personal
digital assistants and other newfangled technologies.
"One short-circuit, and you've lost all your information," she says of
tech. "Do I love it? Yes. Do I totally trust it? No."
********************
Washington Post
May 17, 2002
Lawmakers Play Up 'Dot-Kids' Proposals
By David McGuire
The push to create a kids-only Internet domain is gaining ground in
Congress, with House lawmakers scheduled to vote next week on a proposal
and a leading Democratic senator planning to introduce a similar measure.
Sen. Byron Dorgan (D-N.D.), a member of the Democratic leadership team, has
discussed introducing a companion to the House's "Dot-Kids Implementation
and Efficiency Act of 2002" with Nevada Republican Sen. John Ensign, said
Dorgan spokesman Barry Piatt.
The House bill, which sailed through the Energy and Commerce Committee and
was backed by a bipartisan cadre of lawmakers, would create a
child-oriented addressing space within America's sovereign "dot-us"
Internet domain.
Authored by Rep. John Shimkus (R-Ill.), the House bill represents a step
back from an earlier proposal that called for the creation of a stand-alone
"dot-kids" suffix to be included alongside dot-com, dot-net and dot-org in
the Internet's Domain Name System (DNS).
The U.S. Commerce Department and the Internet Corporation for Assigned
Names and Numbers (ICANN) - the entities that share responsibility for the
DNS - balked at that proposal, prompting the proposed compromise.
Because of the Internet's hierarchical nature, any domain name owner can
create a virtually infinite number of "second-level" domains within a
single Internet address. If the U.S. government reserves rights to the
address "kids.us," it could assign second-level addresses using the
top-level address as a domain (for example, address.kids.us).
Under the Shimkus proposal, Washington D.C.-based NeuStar, which last year
won the government contract to operate the dot-us country-code domain,
would be responsible for operating the dot-kids second-level domain within
dot-us.
Under the pending House language, no Web site with a kids.us address would
be permitted to post hyperlinks to locations outside of the kids.us domain.
The legislation also now prohibits chat and instant messaging features,
except in cases where a site operator can guarantee the features adhere to
kid-friendly standards developed for the domain.
********************
USA Today
Senate Panel OKs More Cybercrime Dollars
By Brian Krebs
Washtech.com Staff Writer
Friday, May 17, 2002; 5:16 PM
The Senate Commerce Committee today voted to increase funding for
anti-cybercrime programs, despite claims from software and high-tech groups
that last-minute changes to the bill could stifle innovation.
The "Cyber Security Research and Development Act," sponsored by Sen. Ron
Wyden (D-Ore.), would give $970 million over five years to the National
Science Foundation and National Institute of Standards and Technology to
improve government computer and network security.
The technology industry supports the bill, but many businesses dislike
changes made by co-sponsor Sen. John Edwards (D-N.C.) that direct NIST to
set guidelines for security settings on many common software products used
by the federal government.
They argue that such language would put Uncle Sam in the role of setting
standards for computer security technologies, and would gut the
public-sector market for new security products.
"The establishment of such technological standards would create a ceiling,
rather than a floor, for federal government cybersecurity," said Robert
Holleyman, president and CEO of the Business Software Alliance.
The Information Technology Association of America also spoke against the
changes.
Edwards spokesman Michael Briggs said the language makes no mandate on the
private sector.
"The idea was that if enough government agencies had to adopt these
practices they would filter down to the private sector once the virtue of
these practices is demonstrated," Briggs said.
At today's markup, Wyden promised to work with Sen. George Allen (R-Va.)
and other lawmakers sympathetic to the tech community's concerns.
The cybersecurity bill mirrors a similar measure passed in the House of
Representatives earlier this year.
The committee also passed another Wyden bill that calls for volunteers from
the high-tech community to respond - on the government's behalf - to
attacks and other disasters that threaten the nation's technological
infrastructure.
The legislation would establish a clearinghouse for evaluating private
sector technology proposals designed to combat terrorism.
The version approved by the panel today incorporates several changes sought
by the Bush administration, including language that would allow the White
House to decide which agency should run the clearinghouse.
The committee also approved a bill that would grant new life to the
Commerce Department's Technology Opportunities Program, designed to bring
advanced telecommunications and other technologies to rural and poor
regions of the country.
The administration's 2003 budget request kills the program.
*******************
USA Today
Senate Panel Votes To Can Spam
Brian Krebs
Washtech.com Staff Writer
Friday, May 17, 2002; 3:07 PM
Consumers would gain more power to keep junk e-mail out of their inboxes
under legislation approved by a Senate committee today.
The bill, passed by the Senate Commerce Committee, requires that
unsolicited e-mails, also known as "spam," contain valid return addresses
that recipients can use to opt out of receiving more unwanted e-mail.
The "CAN SPAM" act, sponsored by Sens. Conrad Burns (R-Mont.), Ron Wyden
(D-Ore.) and Ted Stevens, (R-Alaska), would impose fines and jail terms
against spammers who fake their e-mail or physical addresses.
The legislation also would allow state attorneys general to sue on behalf
of residents who are continually besieged by unwanted spam. Spammers who
willfully violate the provisions of the law could be fined as much as $1.5
million.
"My bill strangles out spam e-mail by imposing steep fines and empowering
consumers with the choice to close their doors to hyper-marketing once and
for all," Burns said in a statement.
Under pressure from business and financial services groups concerned that
the bill would outlaw legitimate communications between companies and their
customers, Burns included provisions that would exempt companies that show
they have a "preexisting relationship" with the recipient.
A preexisting relationship would constitute any transaction or electronic
correspondence initiated by the consumer within the past three years.
The committee also approved an amendment from Sen. Barbara Boxer (D-Calif.)
that would make it illegal to send spam to an e-mail address that was
harvested from another Web site.
That provision was included at the behest of Ebay, which is frequently
targeted by e-mail harvesters because it posts bidders' e-mail addresses on
its live auction pages, source said.
Rep. Bob Goodlatte (R-Va.) has offered a more industry-friendly bill in the
House of Representatives, which would make it illegal for spammers to
"spoof" or fake their return e-mail addresses.
The Senate Commerce Committee also approved a controversial privacy bill
that would allow consumers to sue Internet companies that mishandle their
personal information.
Despite staunch opposition from Republicans and business groups, the
committee approved the measure on Thursday by a vote of 15-8. But Senate
lawmakers were prevented from voting to send the bill on to the Senate
floor yesterday after Senate Minority Leader Trent Lott (R-Miss.) invoked a
procedural move to halt committee action.
The privacy bill, offered by committee Chairman Ernest "Fritz" Hollings
(D-S.C.), would require companies ask consumers' permission before
collecting or sharing sensitive information such as medical records,
financial data or religious affiliation.
The legislation also would preempt state privacy laws and allow consumers
to sue companies that mishandle their personal data.
******************
Los Angeles Times
Minnesota Governor Weighs Internet Controls
Associated Press
May 20 2002
Minnesota's Senate and House overwhelmingly approved a bill that backers
say would make the state the first to give Internet users control over
whether service providers disclose their personal information.
Gov. Jesse Ventura will decide its fate. He has not indicated a position on
the bill.
Under the bill, ISPs would have to tell Minnesota consumers whenever they
plan to disclose such personal information about them as which Web sites
they've visited, their e-mail or home addresses or telephone numbers. They
also would have to say how the information would be used. The bill would
allow consumers to sue businesses that violate the law, with exceptions for
giving information to law enforcement.
Lobbyists from America Online and other Internet giants fought the bill,
saying state-by-state regulation of the Internet is unwieldy. The bill
wouldn't take effect until March 2003, and any federal law would supersede it.
*******************
Federal Computer Week
Law beefs up security at borders
President Bush signed a border security bill May 14 that requires foreign
visitors to carry high-tech visas and passports, mandates computer tracking
of visiting students and improves access to electronic databases in U.S.
consular offices overseas.
The Enhanced Border Security and Visa Entry Reform Act would make $150
million each available to the Immigration and Naturalization Service and
Customs Service to improve technology for protecting U.S. borders.
"We can do a better job of making our borders more secure, and make our
borders smart," Bush said. "We must use technology and be wise about how we
use technology, to speed the flow of commerce across our borders and to
identify frequent travelers who pose no risk."
The bill passed without controversy in both the Senate and the House.
Lawmakers pushed it as a way to improve national security and fight
terrorism. Its provisions include machine-readable visas, a sophisticated
name-matching system to identify and bar possible terrorists and the hiring
of 2,000 additional immigration and customs officers (see box).
Sen. Dianne Feinstein (D-Calif.), one of the bill's sponsors, said the
Sept. 11 terrorist attacks made clear some of the shortcomings of the U.S.
immigration and visa system. "This bill is an important and strong first
step toward fixing that system," she said.
The law should help make the U.S. immigration system less vulnerable to
exploitation "by aliens who wish to harm Americans," said Rep. F. James
Sensenbrenner Jr. (R-Wis.), the chief House sponsor.
Even though congressional appropriators haven't weighed in on the programs
authorized by the border security bill, funding for them appears likely.
"Congress seems to want to throw more money at security, so I would expect
there will be money available for this and other projects," said Bruce
McConnell, a former top official with the Office of Management and Budget
and president of McConnell International LLC, a marketing and consulting firm.
Olga Grkavac, executive vice president of the Enterprise Solutions Division
at the Information Technology Association of America, said federal money
was getting tight, but there was so much congressional support for the
legislation that she didn't expect funding problems.
"They are going to find the money," Grkavac said. "Whether or not it's the
full amount, it will be close to it. When Congress decides to do something,
it's remarkable how quickly they can act."
Although funding isn't likely to be a problem, INS' organizational
difficulties could delay the implementation of all but one of the border
security programs, industry observers say. The House voted April 25 to
split INS into two agencies, although one key technology project also
envisioned by the border security bill a system for tracking foreign
students is so close to start-up that it is likely to proceed unaffected.
"INS and Customs each were authorized $150 million to upgrade the
technology at their inspection facilities, but INS has no clue on how to do
that. They need to re-organize first," said Doug Doan, senior vice
president of New Technology Management Inc., which is designing and
installing several IT systems for Customs along both the Canadian and
Mexican borders.
"INS has much bigger issues than how to spend $150 million," McConnell
said. "Things there are in somewhat of a holding pattern, so I wouldn't
expect the money to be spent right away."
***
Tightening the borders
The Enhanced Border Security and Visa Entry Reform Act would make $150
million each available to the Immigration and Naturalization Service and
the Customs Service.
Among the bill's provisions are:
* Requiring that, by 2004, the State Department issue only tamper-
resistant visas and other travel documents with machine-readable biometric
identifiers. To read the documents, INS will have to install special
scanners able to read the documents.
* Supplying electronic data systems to State consular offices that provide
instant access to databases of U.S. law enforcement and intelligence
agencies. This would be used to block visas from being issued to known and
suspected terrorists.
* Creation of a foreign student-tracking system by INS, which announced
this month that it would begin operating a Student Exchange and Visitor
Information System July 1. This will enable universities and other schools
to file electronic reports to INS about student arrivals, changes of
address, courses of study and other information. Schools would also be
required to notify the government if a foreign student fails to report for
classes.
* Requiring all commercial passenger ships and airplanes entering the
United States to provide a list of passengers and crew before arrival. This
way, border authorities can check their databases to determine if a
potential terrorist or other suspect is on board. The bill also provides
for the hiring of 2,000 additional immigration inspectors and investigators.
********************
Federal Computer News
Homeland strategy won't meet all concerns
A long-awaited strategy outlining how the Office of Homeland Security
expects to use information technology to help secure the nation from
terrorist attacks most likely will not address all the concerns of federal
agencies and state and local governments, a senior administration official
said earlier this month.
The Homeland Security Office's national strategy, due to President Bush in
June, should be considered an enterprise architecture for homeland
security, which meets the priorities set out in Bush's fiscal 2003 budget
request, said the official, who agreed to speak on the condition of
anonymity. Those priorities include a description of the current homeland
security status, the goal of where the government needs to be and the
migration strategy, or "road map," to get there.
In the budget, the administration set four homeland security
goals tightening border security, supporting first responders, fighting
bioterrorism and using information technology as an enabler. However, many
in Congress and elsewhere have criticized the White House for not releasing
a strategy along with the budget.
The outline in the budget for the strategy itself set several far-reaching
goals (see box below). But the official said because of the short time
frame in which the office had to craft the plan, the strategy will be a
first version, open to revisions. The first release "serves a slightly
different purpose than we'd like it to serve," the official said. "It's not
going to satisfy all of the requests for participation at this time."
That is exactly what state and local IT officials have feared, even though
they understand the deadline pressures under which the office is working,
said Robert Greeves, policy adviser for the Justice Department's Office of
Justice Programs, which assists state and local law enforcement agencies.
Those agencies are also concerned that most of the funding requested for
the Federal Emergency Management Agency to increase first responders'
capabilities is not focused on cyber needs, such as information sharing and
communications interoperability, Greeves said.
Integrating all of the stand-alone systems at each level of government, or
at least making it possible to access the information within those systems,
is a top priority for state and local officials one they are concerned
will not be part of this version of the strategy, said Dan Jarvis, chief
information officer for Denver.
***
Homeland security goals
Some of the goals set for the homeland security national strategy in the
fiscal 2003 budget include:
* Focusing on the long term and not seeking to achieve all goals at once
but introducing needed reforms and innovations in stages, according to
their importance.
* Making a national plan, not just a federal government strategy, and
basing it on the principle of partnership with state and local governments,
the private sector and citizens.
* Encompassing the full range of homeland security activities and setting
priorities among them.
* Taking into account the existing government institutions and systems for
providing homeland security, building those that work well and are sensibly
organized, but also planning to improve or reorganize when necessary.
*****************
New York Times
Senate Panel Backs Computer Security Boost
By REUTERS
WASHINGTON (Reuters) - Legislation that would vastly increase federal
spending on computer security in the wake of the Sept. 11 attacks on the
U.S. came closer to becoming law on Friday when a key Senate committee
approved it.
The bill, sponsored by Sen. Ron Wyden, an Oregon Democrat, and Sen. George
Allen, a Virginia Republican, would authorize $875 million in grant funds
for research and education to deal with potential threats to technology.
The measure, approved on a voice vote of the Senate Commerce Committee, is
expected to win easy passage in the full Senate. Similar legislation passed
the U.S. House of Representatives overwhelmingly in February.
The hijack attacks of Sept. 11 heightened concerns about the vulnerability
of the nation's telecommunications, Internet and other vital networks to
computer-based attack.
In several hearings last fall, experts told Congress the nation needed to
spend more money to encourage long-term academic research in cybersecurity
to supplement efforts by commercial software companies.
The new funds would come on top of roughly $60 million the federal
government currently devotes to network security.
Business groups have praised the measure, noting that cybersecurity attacks
have increased dramatically in the past several years.
The National Science Foundation and the National Institute for Standards
and Technology would hand out the money in the form of research grants,
fellowships and internships for students, and funds to improve
undergraduate and master's degree programs in network security.
The committee also approved and sent to the floor another bill co-sponsored
by Wyden and Allen to provide an organizational structure to quickly locate
and mobilize science and technology expertise in times of crisis. It does
not yet have a House companion.
*************************
Federal Computer Week
Looking into disk mirroring
Feds weigh options for data protection
It's a classic double whammy. Not only do information technology managers
oversee more data than ever before, they also face more threats to this
data than ever before. Fires and natural disasters such as floods have long
been data center worries. Now add to this list post-Sept. 11 terrorism
concerns and the specter of both physical and electronic attacks.
The situation has compelled government agencies to revisit their data
protection plans. The time-tested practice of tape-based backup is among
the items under evaluation. For many organizations, tape is the main
insurance policy against data loss, but restoring data from tape can be
time-consuming. Tapes must be retrieved from the backup facility and the
data then loaded on disk arrays at the production site, a process that can
take days.
This lengthy process has prompted some data center managers to examine an
alternative method: disk mirroring. With disk mirroring, an organization
continuously replicates selected data from one disk array to another.
Replication can be local, within a data center, or remote, to a distant
data center.
The key advantage of disk mirroring is speed. Recovery may take just a few
minutes, particularly if the system is set to automatically connect to the
backup system. Timeliness of data is another plus. Disk mirroring provides
a more up-to-date copy of data than tape backup does. Data stored on tape
is only as current as the latest backup session, and sessions are typically
scheduled 12 or more hours apart.
But disk mirroring, which has been around for years, is no miracle
data-protection cure. One drawback is the cost. The price per megabyte of
storage is still cheaper for tape than disk, although the gap is narrowing.
Disk mirroring may also involve higher network infrastructure costs,
because high-bandwidth links may be required between backup and production
sites.
Organizations considering disk mirroring must also weigh the different
deployment approaches, each of which has its pros and cons.
Still, the attraction of increased data availability has prompted many
commercial entities in areas such as financial services to adopt disk
mirroring. More federal agencies are also beginning to investigate the
approach.
"We're seeing a lot of interest," said Robert Manchise, chief technology
officer at Anteon Corp., a Fairfax, Va., government integrator. Government
agencies "are following the commercial marketplace."
For example, the Federal Emergency Management Agency knows "the importance
of having synchronized data, [in] real time and up to the minute," he said.
Mirroring Issues
Cost tends to be the first issue organizations confront when considering
mirroring. Managers who want to mirror to the same brand and model of
storage subsystem used in the production facility will pay a price for this
duplication. The cost, however, can be reduced if an organization opts for
heterogeneous mirroring using less expensive disk arrays at the backup site
(see "SANs take on mirroring," Page 34).
Network investment is another factor. Today, mirroring generally requires a
separate network infrastructure, distinct from IP traffic. Typically, this
means employing Fibre Channel technology. An organization could use Dense
Wavelength Division Multiplexing a technology that transmits light signals
simultaneously via a single optical fiber to merge data mirroring and
voice traffic over IP, but experts say this is an expensive choice.
IP-based storage solutions are beginning to surface, however. In addition,
the emerging SCSI over IP, or iSCSI, promises to enable organizations to
run storage traffic on existing IP networks (see "iSCSI may cut mirroring
costs," Page 33).
Given the expense, technology managers tend to use disk mirroring only for
mission-critical datasets.
Mirroring "gets expensive if you have a lot of data," said Bill Swartz,
manager of infrastructure computing services at Sandia National
Laboratories in Albuquerque, N.M. Accordingly, mirroring is done sparingly
in high-performance computing environments, he said.
Michelle Butler, technical program manager for the storage-enabling
technologies group at the National Center for Supercomputing Applications,
said the center is not mirroring all of its data.
"We are mirroring critical system- dependent file systems," she said. "We
are not opposed to tape and still use it. But for disaster recovery, disk
is much faster."
Paths to Mirroring
Once a decision is made on which data to mirror, the next step is to
determine what mirroring approach to take. The two main paths are
synchronous and asynchronous.
In synchronous mirroring, data isn't committed to storage in the production
facility until a copy of that data is delivered to the target storage
subsystem, which is the mirrored site. When the data is successfully
mirrored, the target subsystem acknowledges the receipt to the production
facility, which then completes the storage transaction.
This way, if the input/output request fails on the target side, it is not
recorded on the production side. Both sides of the storage equation are
kept in balance, up to the last completed transaction.
The main drawback of synchronous mirroring is latency. Data has to travel
from primary to target storage and back again. The delay may cause
applications to time out. Latency is not an issue if the primary and target
storage sites are nearby. But to guard against site failure, an
organization may locate a backup site miles from its production facility.
Storage experts say that if the distance is more than 62 miles, latency
will affect application performance.
Asynchronous mirroring, however, may be the solution for mirroring data
over great distances. In this approach, the local storage device does not
wait for acknowledgment from the remote system before storing data, thus
overcoming the latency problem.
But there is a downside. Data inconsistency may occur in the event of a
failure, because the asynchronous approach does not wait for the remote
storage device to confirm the receipt of data.
"A small number of input/outputs can be lost," said John Selep, product
marketing manager for storage solutions at Hewlett-Packard Co. But
asynchronous mirroring, he continued, "allows those willing to lose a small
number of input/outputs to do continental-level mirroring."
Jay Desai, manager of data protection solutions at Network Appliance Inc.,
which produces SnapMirror software, said asynchronous mirroring works well
except for those applications requiring "100 percent data concurrency."
"Not everyone needs synchronous," mirroring, said Bob Guilbert, vice
president of marketing and business development at NSI Software, which
markets DoubleTake, a mirroring product.
Still, federal customers and integrators say that the synchronous mirroring
approach is the way to go for an agency's most important data. "We see
synchronous being more important...for mission-critical" data, said
Anteon's Manchise.
"Asynchronous mirroring isn't real-time enough for most enterprise
applications and loses transactions during failover," said Dave Puzycki, a
senior research scientist with Pacific Northwest National Laboratory's IT
infrastructure group. The lab is deploying storage-area network (SAN)
architecture and looking into disk mirroring. But it is doing so with
deliberation.
"One disadvantage of using disk mirroring is that database corruption can
also be mirrored, reducing the possibility of error-free database
recovery," Puzycki said.
To compensate, the lab is exploring SAN software technology that can take
snapshots, or copies, of a database. "Snapshots can be instantly created
and take [up] little space, therefore making it much easier to fall back to
a known good state," Puzycki said.
The intricacies of disk mirroring call for cautious steps. But for agencies
with sensitive data to protect, mirroring may be worth looking into.
Moore is a freelance writer based in Chantilly, Va.
********************
Federal Computer Week
iSCSI may cut mirroring costs
Disk mirroring could become cheaper.
The emerging SCSI over IP, or iSCSI, is a promising solution for running
storage traffic over ubiquitous IP networks. This could reduce the network
infrastructure cost of data mirroring, which now tends to involve dedicated
network resources. With iSCSI, organizations don't need "a separate
communications infrastructure for disk mirroring," said John Selep, product
marketing manager for storage solutions at Hewlett-Packard Co.
"We're waiting for the standard to get completed so multiple vendors will
have something to sink their teeth into," said Ken Steinhardt, director of
technology analysis at EMC Corp.
Robert Manchise, chief technology officer at Anteon Corp., said that he
hoped iSCSI would lower the cost of ownership. But he has not introduced
the technology to any customers yet, because a definitive standard is still
lacking. Most observers believe the iSCSI standard and supporting
technology is still months away.
*******************
BBC
Parenting suffers in e-mail overload
Employees in the UK spend more time wading through their messages than
playing with their children, according to a government study.
The report by the Department of Trade and Industry found that workers take
an average of 49 minutes a day to sort out their inboxes.
By comparison, working parents play with their children for just 25 minutes
a day.
Messaging stress
Keeping up with office e-mails can not only be a logistical nightmare, it
is also seen as one of the worst causes of stress in the workplace.
Everybody can benefit from a better work-life balance
DTI spokesman
And the messages also contribute to what are thought to be the top two
causes of stress at work: constant interruptions and deadline pressures.
According to the DTI, sick days as a result of stress cost business £7.11m
a week.
Click here to tell us how you cope with a bursting inbox
With many employees suffering from e-mail overload, some companies are now
sending executives on courses to teach them how to communicate more
effectively through e-mail without adding to the already bursting inboxes
of their staff.
Short lunches
The DTI study confirms that Britons are among the hardest workers in Europe.
It found that the average employee skips 24 minutes of their lunch break
every day and only takes the equivalent of approximately two weeks holiday
per year.
The DTI research was released to mark the relaunch of its work-life balance
website, which offers advice on how to juggle the competing demands of job
and home.
A DTI spokesman said: "Everybody can benefit from a better work-life balance.
"More flexible working boosts staff morale, improves employees' commitment
to their work, and benefits business through higher productivity."
Do you spend more time on office e-mails than with your children? How do
you cope with a bulging inbox? Tell us what you think.
Simple answer, I don't manage to deal with it! I even have clients overseas
who are e-mailing me whilst I am asleep. So when I come in I already have a
full inbox. I organise mine by putting my e-mails in the alphabetical order
of the senders. By the time I am down to reading S you can bet I will have
several new e-mails which have shuffled in above this. It's like painting
the Golden Gate bridge by the time you're finished you have to start again.
Irritating thing is, most of them are either advertising, junk mail or work
queries which don't even apply to me.
Bex, UK
E-mail's only stressful if you read it. I work on many projects at once.
Each e-mail that is project-related has the project code in the header. I
have a folder for each job number that I'm working on, as well as folders
for general admin, personal, humour etc. When I'm very busy, e-mails just
get dragged unread to the appropriate folder. Then at some point during the
day I will make time to read all e-mails related to each subject. This
method also ensures that I'm only thinking about the one job at a time. I
would recommend this approach to anyone who is stressed out by e-mail,
although this does require your company to have e-mail protocol which
includes useful subject headers.
Alison A, UK
I cope by deleting any e-mail that I have finished with or that has no
relevance. That said, the sooner society makes e-mail advertising (spam)
illegal, the better. Once my inbox gets over 50 e-mails, I make time to
narrow it down. Not having too many e-mails in there makes you feel less
stressed. Move e-mails you need to keep into another folder and keep your
inbox tidy. Works for me.
Boomer, UK
By using a facility like Outlook to manage your e-mail you can make
specific folders and have all items that you are a cc party auto deliver to
a separate folder, same with all your mates stuff, which you can read at
your leisure. This will leave just items work orientated and sent directly
to you to deal with.
Chris, Suffolk
Delete the lot and go to the pub.
Fred Ashley, UK
I basically scan through the sender and subject information, if I don't
recognise either then I delete it without thinking. I just don't have the
time to read all the spam offering me low rate mortgages or Viagra online!
Seth Black, UK
Juggling home and work commitments can be trying at the best of times but I
all too often only see my children first thing in the morning as they are
in bed by the time I get home. Fortunately my husband and I have good
nursery and after-school facilities available to us. It is a sad indictment
of modern living that children are often only able to see their children
for little more than an hour a day.
Sian, UK
What did we do before e-mails, SMS messages, faxes and mobiles? I remember
- life was a lot darn easier and less hetic.
David LJ, Isle of Man UK
I receive approximately two to three hundred e-mails a day. I cannot expect
to read every one I receive, so I will read what I can when I have the time
to do so, the rest I will never read. Any urgent matter should be dealt
with in the traditional method - the telephone! Junk and unwanted e-mails
are a pain, but you should configure your e-mail application to
automatically remove these.
James Sanders, UK
Whenever I am sent an e-mail with a question from a colleague who works in
the same office, I always give them the courtesy of a reply in person. I
find that we not only build up a better rapport but it saves the hassle of
three to four follow-up e-mails to 'clarify the point'. It also helps with
the exercise regime.
Rob, UK
Smart companies have e-mail etiquette! This reduces the number of e-mails
from colleagues who misguidedly feel you are interested in their updates,
supports use of meaningful subject headers and teaches everyone how to
communicate concisely! Lobby your IT team today
Max, N Ireland
I only read e-mail twice a day. Once at the start of the day, once at the
end. Anything else more urgent can be dealt with in person or by phone. I
also get to schedule work better rather than do what is most recent.
Tim, Cambridge
Employees in the UK spend more time wading through their messages than
playing with their children, according to a government study.
The report by the Department of Trade and Industry found that workers take
an average of 49 minutes a day to sort out their inboxes.
By comparison, working parents play with their children for just 25 minutes
a day.
Messaging stress
Keeping up with office e-mails can not only be a logistical nightmare, it
is also seen as one of the worst causes of stress in the workplace.
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
can benefit from a better work-life balance
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!
520125
5
55555211163555555540143555552111112555555210111233321111111423324110111111111111111111111110040000002701ffff030000000000
DTI spokesman
And the messages also contribute to what are thought to be the top two
causes of stress at work: constant interruptions and deadline pressures.
According to the DTI, sick days as a result of stress cost business £7.11m
a week.
Click here to tell us how you cope with a bursting inbox
With many employees suffering from e-mail overload, some companies are now
sending executives on courses to teach them how to communicate more
effectively through e-mail without adding to the already bursting inboxes
of their staff.
Short lunches
The DTI study confirms that Britons are among the hardest workers in Europe.
It found that the average employee skips 24 minutes of their lunch break
every day and only takes the equivalent of approximately two weeks holiday
per year.
The DTI research was released to mark the relaunch of its work-life balance
website, which offers advice on how to juggle the competing demands of job
and home.
A DTI spokesman said: "Everybody can benefit from a better work-life balance.
"More flexible working boosts staff morale, improves employees' commitment
to their work, and benefits business through higher productivity."
010009000003025b00000000e15a000000000400000003010800050000000b0200000000050000000c021b00ac00030000001e00e15a0000410b2000cc0030004201000000001a00ab0000000000280000004201000030000000010018000000000080b5000000000000000000000000000000000000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7e7e7e7dededed6d6d6d6d6d6d6d6d6dededeefefeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7ffffffffffffffffffffffffffffffffffffefefefd6d6d6cececebdbdbdadadad9c9c9c9494949494949494949494948c8c8c9c9c9cc6c6c6e7e7e7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe7e7e7d6d6d6bdbdbdadadad9c9c9c9c9c9ca5a5a5adadadb5b5b5bdbdbdb5b5b5adadad9c9c9c9c9c9cb5b5b5c6c6c6dededefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe7e7e7d6d6d6b5b5b59c9c9c9c9c9cadadadbdbdbdd6d6d6efefefffffffefefefd6d6d6bdbdbdbdbdbdc6c6c6dededeefefeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffff0000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7ffffffffffffffffffe7e7e7d6d6d6b5b5b5a5a5a5a5a5a5bdbdbdcececee7e7e7fffffffffffffffffff7f7f7bdbdbdbdbdbdc6c6c6dededeefefeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffffffffff!
ffffff
f
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7d6d6d6bdbdbdadadadc6c6c6d6d6d6ffffffffffffffffffffffffffffffefefefd6d6d6b5b5b5d6d6d6dededef7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffdededeadadadb5b5b5d6d6d6f7f7f7ffffffffffffffffffffffffffffffffffffe7e7e7c6c6c6bdbdbdd6d6d6f7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffbdbdbdbdbdbdd6d6d6ffffffffffffffffffffffffffffffffffffffffffffffffd6d6d6bdbdbdc6c6c6f7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7fffffff7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7f7f7f7f7f7f7fffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd6d6d6adadaddededef7f7f7f!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffd6d6d6b5b5b5dededefffffffffffffffffffffffff7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefefefefefefc6c6c6cececec6c6c6cecececececef7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7f7f7f7dededecececec6c6c6cececececececececee7e7e7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefefefc6c6c6c6c6c6dededef7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffd6d6d6c6c6c6ded!
edefff
f
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7ffffffffffffffffffffffffffffffffffffffffffe7e7e7dededebdbdbd9c9c9ca5a5a59c9c9c9c9c9cbdbdbdd6d6d6fffffff7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffdededebdbdbda5a5a5adadad9c9c9ca5a5a5bdbdbdd6d6d6efefeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7efefefdedededededec6c6c6b5b5b5adadadbdbdbde7e7e7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffbdbdbdadadadf7f7f7fffffffffffffffffffffffffffffffffffff7f7f7fffffffffff!
ffffff
f
fffffff7f7f7fffffffffffffffffffffffffffffffffffffffffffffffff7f7f7f7f7f7f7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7fffffffffffffffffff7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff9c9c9c181818292929101010212121101010393939949494bdbdbddededef7f7f7fffffffffffffffffffffffff7f7f7fffffff7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7fffffffffffff7f7f7fffffffffffffffffffffffff7f7f7fffffffffffffffffff7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7fffffff7f7f7f7f7f7f7f7f7fffffffffffffffffffffffffffffff7f7f7ffffffefefeff7f7f7fffffffffffff7f7f7ffffffffffffffffff848484292929181818101010181818101010292929949494adadade7e7e7f7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7efefefcececeb5b5b5a5a5a59494949c9c9c9c9c9c949494bdbdbdf7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd6d6d6949494949494adadadbdbdbdcececeefefefffffffffffffffffffe7e7e7e7e7e7e7e7e7e7e7e7e7e7e7efefeff7f7f7efefefefefefe7e7e7e7e7e7efefeff!
7f7f7e
7
e7e7e7e7e7d6d6d6d6d6d6dededeefefefe7e7e7e7e7e7e7e7e7efefefefefefffffffffffffffffffefefefe7e7e7e7e7e7e7e7e7dededef7f7f7fffffffffffffffffff7f7f7e7e7e7e7e7e7dedededededed6d6d6dededed6d6d6dededee7e7e7efefeff7f7f7f7f7f7ffffffffffffffffffffffff7b7b7b1818187373738484846363632121210000007b7b7ba5a5a5dededef7f7f7fffffffffffff7f7f7e7e7e7e7e7e7dedededededed6d6d6dedededededee7e7e7efefeffffffff7f7f7efefefe7e7e7e7e7e7dededededededededee7e7e7efefefe7e7e7efefefefefefe7e7e7e7e7e7dededee7e7e7efefefefefeff7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffefefefe7e7e7e7e7e7dedededededededededededededededededee7e7e7f7f7f7efefefdedededededee7e7e7d6d6d6dededededededededee7e7e7efefefefefef7b7b7b101010737373737373737373212121000000737373a5a5a5d6d6d6f7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffffffffffffffffffffff7f7f7fffffffffffffffffff7f7f7fffffffffffffffffffffffff7f7f7cececeadadad9c9c9ca5a5a5b5b5b5c6c6c6dededee7e7e7e7e7e7f7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc6c6c6b5b5b59c9c9c9494948484848c8c8c9c9c9cadadadbdbdbdd6d6d6d6d6d6c6c6c6bdbdbdbdbdbdbdbdbdc6c6c6bdbdbdc6c6c6bdbdbdbdbdbdadadadbdbdbdbdbdbdbdbdbdadadadadadadadadadadadadb5b5b5b5b5b5b5b5b5ada!
dadb5b
5
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!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe7e7e7b5b5b5adadadb5b5b5c6c6c6e7e7e7f7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefefefd6d6d6c6c6c6adadad9494948c8c8c9c9c9c6363637373735252526363636b6b6b8c8c8c7b7b7b7b7b7b7373736363636b6b6b7373737b7b7b5a5a5a3939394a4a4a3939394242425252525a5a5a5a5a5a636363737373636363b5b5b5dededeadadad8484846b6b6b6b6b6b7373736b6b6!
b73737
3
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!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe7e7e7bdbdbdadadadcececedededef7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefefefcececececece949494000000101010000000080808000000313131212121000000080808000000000000000000181818000000000000313131292929101010000000000000181818080808000000181818a5a5a59c9c9c212121000000080808000000080808080808000000636363b5b5b59c9c9c5a5a5a0808080000000000001818182!
929292
9
2929101010080808000000080808636363adadaddededef7f7f7ffffffffffffffffffcecece101010313131d6d6d6ffffffefefef5252520000005a5a5aa5a5a5adadad6b6b6b1818180000000808081818183131312121211010100000000000004242427b7b7b4a4a4a0000000000002929292929292121210000000000001010100808080808080000000000001010100000000000000000000000007b7b7bbdbdbdefefefffffffffffffffffffffffffffffff8484840808080000000808081010103131312121211010100000000000001818183131310000000000001818182121211818180808080000000808080808080808080000005a5a5a9c9c9c181818212121d6d6d6fffffff7f7f76363630000004a4a4a9c9c9cc6c6c6e7e7e7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffeff7efcececeadadadc6c6c6efefeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7dedede181818bdbdbde7e7e7c6c6c6292929393939101010636363cececededede8c8c8c080808000000424242bdbdbde7e7e7ffffffcecece7373738c8c8cdededec6c6c65a5a5a101010a5a5a57b7b7b000000525252cececed6d6d6cecece6363630808085252528c8c8c4a4a4a000000181818737373cececee7e7e7fffffff7f7f7efefefc6c6c66b6b6b101010525252a5adaddee7e7e7f!
7f7fff
f
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!
ffffff
f
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!
feff7e
f
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!
eadd6c
e
a5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6ce0000ffffffffffffffffffffffffffffffe7ffffb5ded6add6ce9ccec67b9c94849c94bdc6c6f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff000000ffffffffffffffffff2929292121211010106b6b6bffffffffffffa5a5a5000000313131ffffffffffffd6d6d65a5a5a313131636363dededeffffffffffff636363212121525252181818212121efefefffffffffffffffffffffffff424a4a101010212929080808949494f7f7f7ffffffe7e7e76b6b6b3939394242425a5a5a9c9c9ccec6ce21212129424263848484b5ad94cece94cec6a5d6cea5c6bd394a4a000000949494fffffffffffffffffff7fff784847b0000002129290000004a4a4ae7efefffffffdee7e77!
37b7b3
9
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!
cd6d69
c
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!
7e7fff
f
ffffffff636363000000000000636363ffffffffffffc6bdbd080808000000737373ffffffffffffa5a5a500000042525263847b7b9c9c8cb5b584b5ad8cbdb58cc6bda5d6ce42635a0018100000000808081810104239426b6363b5b5b5eff7f7ffffffefefef181818a5a5a5fffffff7fff76b736b0000000000004a4a4af7f7f7ffffffc6cece081010293131081008101810d6d6d6fffffff7f7f7f7f7efffffffe7e7e7101810081810425a5a6b8c847ba5a59cd6ce8ccec694d6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd!
6d69cc
e
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!
608080
8
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!
69cd6c
e
a5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce0000ffffffffffffffffffffffffffffffe7f7f78c9c9c8ca5a5deefefeffffff7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff080808efefeffffffff7f7f7292929101010101010636363fffffff7f7f7b5b5b5000000000000313131949494efefefffffffffffffffffffffffffffffffffffff636363000000000000424242ffffffffffffcecece0000007b7b7bffffffffffff636b6b000000293131e7e7e7fffffffffffffffffffffffffffffff7f7f7ffffffffffffffffff4242421021216b8c8c8cb5b58cbdbda5d6d68cb5ad102929000808bdc6c6ffffffffffff525a52424a42f7fff7ffffffadb5ad000000000000b5b5b5ffffffffffff8484840000002931310000004a4a4affffffffffffdedede080808000000e7e7e7ffffffffffff394242292929212129424242ffffffffffffc6c6ce0808080000006b6b6bffffffffffff9c9ca50000000810101829291!
831292
1
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!
ccece9
c
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!
ffffff
f
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!
6ce000
0
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!
17b737
3
5a5a5a3931392118184a4a4a9c9c9cffffffffffffb5b5b5080008080000848484ffffffffffffa5a5a5080808000000737373ffffffffffff9c9c9c0000082129296b848484a5a594c6c69cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d60000ffffffffffffffffffffffffc6c6c6c6c6c6fffffffffffff!
ffffff
f
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!
800001
8
1818e7dee7ffffffffffff525a5a000800081010293131ffffffffffffe7e7e71821210810107b949484a5a59cc6c69ccecea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce0000ffffffffffffffffffefefefb5b5b5fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
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!
494ced
6
d6b5bdbd424a4a1829318ca5ad94b5bd8cbdbd9ccece9ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce0000ffffffffffffffffffdededecec6c6fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7000000f7f7f7fffffff7f7f71818181010101010103131311818180000000000001818180000000000000000002121212929293939392121210808080808080000000000000000001818180808080000000000000808081818180808080000000000000008080000000000002129210008000008080008002121214242421818180808080808080808081010102121291821211829291029292131310818180008000000000000001010100808080808081010100000000808080000001010100000000810100810100810100008081818182931312121211010100008080000001818181010100000001010180000081010180000082931391829290000001021210000000008080000000008080010100010100000000008080000080000080810100008080010107b9494a5c6c6a5ceceadd6d6add6ce4a6b6b082929000808000808081818293939213131081818000810000808000008000808000808081818102121293939182929102121001010001010001010001010000000001010000000001008000000395a5a52737300080800080800080800101800080808292994b5b594c6c69ccece9cd6d69cd6d!
69cd6c
e
a5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6ce0000ffffffffffffffffffc6c6c6dededefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
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!
ccece9
c
d6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d60000ffffffffffffffffffadadadf7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
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!
6cea5d
6
d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce0000ffffffffffffffffffa5adadf7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000008484848484847b7b7b10101008080!
808080
8
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!
e9cd6c
e
9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce0000ffffffffffffffffffa5adadf7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7181818292929101010292929181818101010101010efefefefefef393939000000000000181818101010393939f!
fffff9
c
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!
5d6d69
c
d6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6ce0000fffffffffffff7ffffb5bdbddee7e7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd6d6d6dededee7e7e7e7e7e7dedede5a5a5a292929ffffffdedede0000002121212929292121211818184a4a4affffff8c8c8c101010ffffffc6c6c61010107b7b7bffffff6b6b6b000!
000000
0
00292929393939ffffffdededef7f7f7d6dede212929000808424a4a6b73735a6363101818d6dedee7efef101810313931f7ffffbdc6c6101810b5bdb5ffffff8484846b6b6bfff7fff7eff70000008c8c8cffffff848484424242424242d6d6d6f7f7f76b6b6b94948cf7f7efdee7de000808525a5a6b6b6b000000393939e7efef949494101818000000dededee7e7e7181818000000b5b5b5ffffff212129102121738c948cadada5ceceadd6d69ccece94cece94d6ce8cc6c69cd6d69cd6d69cd6d69cd6d6a5d6d69cceceaddede94cece9cd6d694cece9ccece94c6c69ccece94cece9cd6d69ccece9ccece94cece94cece94c6c69cd6d69cd6d69cd6d69cd6d69cd6d694cece9cd6d69cd6d694cece94cecea5dede94cecea5d6d69cd6d694cece94cecea5d6d69cd6d69ccecea5d6ce9ccec694c6c69cd6cea5d6cea5d6d694c6c694c6c694c6ce9ccece94c6c69cced694c6ce9cced694cece9ccece9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd!
6ce9cc
e
ce9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d60000ffffffffffffffffffbdc6bddee7deffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff6b6b6b212121fffffff7f7f7101010000000080808181818080808393939ffffff848484212121ffffffcecece000000393939dededeefefefb5b5b5c6c6c6949494424242ffffffb5b5b5424242ffffffadb5ad18212!
129312
9
8c9494636b63181818ced6ceffffffbdc6c6e7efefffffffa5adad000000737b7bf7f7f7a5a5a5a5a5a5ffffff9c9494080008adadadffffffefefeff7f7f78484847b7b7bf7f7efb5b5b5949494ffffff8484840808085a635a6363630008089ca59cffffffdee7e7a5adad424a4a737373ffffffc6c6c6bdbdbdffffffb5b5b50008082131318ca5a5a5bdbda5bdbdadceceadd6d6add6d6a5cece9cceceadd6d6add6d69cc6c6add6d6add6d6adcecea5ceceadd6d6add6d6b5ded6add6d6a5ceceb5d6d6b5dedea5c6c6b5dedeadceceadceceadceceadd6d6add6d6add6d6a5ceceadd6d6a5cecea5cecea5ceceadd6d6add6d6add6ce9cc6c6add6d6add6d6add6d6add6d6add6d6a5cecea5cecea5ceceadd6d6a5cec6b5d6d6adceceb5d6d6adcecea5c6c6adceceb5d6d6b5d6d6adced6adced6adced6a5cecea5ceceadceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d!
6a5cec
e
add6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5cece0000ffffffffffffffffffdededeb5bdbdf7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7737373080808bdbdbdffffff9c9c9c2121211818188c8c8c393939393939ffffff8c8c8c1010108484846363630000000808082929299c9c9cbdbdbdadadad424242393939ffffffadadad0000006b6b6b848c8c393939525252dedede848c8c181818dededee7e7e7636363bdbdbd949c9c1!
010100
8
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!
7fffff
f
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!
121292
9
291818182121212929291818180808080808080000000808081010107b7b7bf7f7f7bdbdbd000000424242f7f7f7a5a5a5000000181818080808080808000000080808000000181818636363d6d6d6fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffcececec6c6c6f7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd6d6d64242420000003939396363638484847b7b7b5a5a5a000000181818b5b5b56b6b6b181818bdbdbd9c9c9c1818185a5a5aadadadbdbdbdc6c6c6adadad525252393939adadad737373101010949494b5b5b5b5b5b5e7e7e7ffffff8c8c8c1818189494949c9c9c080808525252a5a5a5adadadf7f7f7e7e7e7c6c6c6c6c6c6bdbdbdbdbdbddededee7e7e7dededed6d6d6dededee7e7e7efefefcececec6c6c6c6c6c6c6c6c6c6c6c!
6d6d6d
6
f7f7f7ffffffe7e7e74242420808084a4a4a292929000000949494c6c6c6c6c6c6bdbdbdc6c6c6c6c6c6cececefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffbdbdbdc6c6c6ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd6d6d66363631818182121212929292929292121211818181010101010101818180000002121211010100808089c9c9cefefeff7f7f7fffffff7f7f7737373000000101010080808000000d6d6d6f7f7f7ffffffffffffffffff9494941818181818181010100808089c9c9cf7f7f7f7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffadadad5a5a5a4a4a4a5a5a5a6b6b6bd!
ededef
7
f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffdededeb5b5b5dededeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffcececeb5b5b5e7e7e7ffffffffffffffffffffffffefefeff7f7f7ffffffffffffffffffefefeffffffffffffffffffff7f7f7fffffffffffffffffff7f7f7fffffff7f7f7fffffffffffffffffffffffffffffffffffffffffff7f7f7fffffffffffff7f7f7fffffffffffff7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffff7f7f7ffffffffffffffffffffffffdededebdbdbddededeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffcececeb5b5b5dededefffffffffffffffffffffffffffffffffffffffffff7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffd6d6d6b5b5b5dededefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7cececeb5b5b5e7e7e7fffffffffffffffffffffffffffffffffffffffffff7f7f7fffffffffffffffffffffffffffffffffffffffffff7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7fffffffffffffffffffffffffffffffffffffffffff7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7fffffffffffffffffffffffffffffffffffff7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffff7f7f7ffffffffffffcececebdbdbdcececef7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc6c6c6adadade7e7e7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffe7e7e7bdbdbdbdbdbddededeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffdededeb5b5b5c6c6c6e7e7e7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
7f7f7d
6
d6d6c6c6c6c6c6c6e7e7e7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffdededebdbdbdb5b5b5dededefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe7e7e7cececebdbdbdbdbdbdf7f7f7fffffff7f7f7fff!
ffffff
f
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7efefefb5b5b5c6c6c6d6d6d6efefeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe7e7e7cececeadadadbdbdbddededef7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7efefefcececebdbdbda5a5a5d6d6d6e7e7e7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefefefdededec6c6c6b5b5b5b5b5b5c6c6c6dededef7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffefefefdededebdbdbdb5b5b5adadadc6c6c6dededefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7e7e7e7cececebdbdbdadadadb5b5b5b5b5b5bdbdbdc6c6c6d6d6d6d6d6d6e7e7e7e7e7e7e7e7e7dedededededecececec6c6c6bdbdbdb5b5b5adadadadadadbdbdbdd6d6d6efefeffffffffffffffffffffff!
ffffff
f
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7f7f7f7e7e7e7e7e7e7d6d6d6cececebdbdbdbdbdbdadadadadadadadadadb5b5b5b5b5b5c6c6c6cececededededededee7e7e7f7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000040000002701ffff030000000000
Do you spend more time on office e-mails than with your children? How do
you cope with a bulging inbox? Tell us what you think.
Simple answer, I don't manage to deal with it! I even have clients overseas
who are e-mailing me whilst I am asleep. So when I come in I already have a
full inbox. I organise mine by putting my e-mails in the alphabetical order
of the senders. By the time I am down to reading S you can bet I will have
several new e-mails which have shuffled in above this. It's like painting
the Golden Gate bridge by the time you're finished you have to start again.
Irritating thing is, most of them are either advertising, junk mail or work
queries which don't even apply to me.
Bex, UK
E-mail's only stressful if you read it. I work on many projects at once.
Each e-mail that is project-related has the project code in the header. I
have a folder for each job number that I'm working on, as well as folders
for general admin, personal, humour etc. When I'm very busy, e-mails just
get dragged unread to the appropriate folder. Then at some point during the
day I will make time to read all e-mails related to each subject. This
method also ensures that I'm only thinking about the one job at a time. I
would recommend this approach to anyone who is stressed out by e-mail,
although this does require your company to have e-mail protocol which
includes useful subject headers.
Alison A, UK
I cope by deleting any e-mail that I have finished with or that has no
relevance. That said, the sooner society makes e-mail advertising (spam)
illegal, the better. Once my inbox gets over 50 e-mails, I make time to
narrow it down. Not having too many e-mails in there makes you feel less
stressed. Move e-mails you need to keep into another folder and keep your
inbox tidy. Works for me.
Boomer, UK
By using a facility like Outlook to manage your e-mail you can make
specific folders and have all items that you are a cc party auto deliver to
a separate folder, same with all your mates stuff, which you can read at
your leisure. This will leave just items work orientated and sent directly
to you to deal with.
Chris, Suffolk
Delete the lot and go to the pub.
Fred Ashley, UK
I basically scan through the sender and subject information, if I don't
recognise either then I delete it without thinking. I just don't have the
time to read all the spam offering me low rate mortgages or Viagra online!
Seth Black, UK
Juggling home and work commitments can be trying at the best of times but I
all too often only see my children first thing in the morning as they are
in bed by the time I get home. Fortunately my husband and I have good
nursery and after-school facilities available to us. It is a sad indictment
of modern living that children are often only able to see their children
for little more than an hour a day.
Sian, UK
What did we do before e-mails, SMS messages, faxes and mobiles? I remember
- life was a lot darn easier and less hetic.
David LJ, Isle of Man UK
I receive approximately two to three hundred e-mails a day. I cannot expect
to read every one I receive, so I will read what I can when I have the time
to do so, the rest I will never read. Any urgent matter should be dealt
with in the traditional method - the telephone! Junk and unwanted e-mails
are a pain, but you should configure your e-mail application to
automatically remove these.
James Sanders, UK
Whenever I am sent an e-mail with a question from a colleague who works in
the same office, I always give them the courtesy of a reply in person. I
find that we not only build up a better rapport but it saves the hassle of
three to four follow-up e-mails to 'clarify the point'. It also helps with
the exercise regime.
Rob, UK
Smart companies have e-mail etiquette! This reduces the number of e-mails
from colleagues who misguidedly feel you are interested in their updates,
supports use of meaningful subject headers and teaches everyone how to
communicate concisely! Lobby your IT team today
Max, N Ireland
I only read e-mail twice a day. Once at the start of the day, once at the
end. Anything else more urgent can be dealt with in person or by phone. I
also get to schedule work better rather than do what is most recent.
Tim, Cambridge
Employees in the UK spend more time wading through their messages than
playing with their children, according to a government study.
The report by the Department of Trade and Industry found that workers take
an average of 49 minutes a day to sort out their inboxes.
By comparison, working parents play with their children for just 25 minutes
a day.
Messaging stress
Keeping up with office e-mails can not only be a logistical nightmare, it
is also seen as one of the worst causes of stress in the workplace.
And the messages also contribute to what are thought to be the top two
causes of stress at work: constant interruptions and deadline pressures.
According to the DTI, sick days as a result of stress cost business £7.11m
a week.
With many employees suffering from e-mail overload, some companies are now
sending executives on courses to teach them how to communicate more
effectively through e-mail without adding to the already bursting inboxes
of their staff.
Short lunches
The DTI study confirms that Britons are among the hardest workers in Europe.
It found that the average employee skips 24 minutes of their lunch break
every day and only takes the equivalent of approximately two weeks holiday
per year.
The DTI research was released to mark the relaunch of its work-life balance
website, which offers advice on how to juggle the competing demands of job
and home.
A DTI spokesman said: "Everybody can benefit from a better work-life balance.
"More flexible working boosts staff morale, improves employees' commitment
to their work, and benefits business through higher productivity."
Do you spend more time on office e-mails than with your children? How do
you cope with a bulging inbox? Tell us what you think.
Simple answer, I don't manage to deal with it! I even have clients overseas
who are e-mailing me whilst I am asleep. So when I come in I already have a
full inbox. I organise mine by putting my e-mails in the alphabetical order
of the senders. By the time I am down to reading S you can bet I will have
several new e-mails which have shuffled in above this. It's like painting
the Golden Gate bridge by the time you're finished you have to start again.
Irritating thing is, most of them are either advertising, junk mail or work
queries which don't even apply to me.
Bex, UK
E-mail's only stressful if you read it. I work on many projects at once.
Each e-mail that is project-related has the project code in the header. I
have a folder for each job number that I'm working on, as well as folders
for general admin, personal, humour etc. When I'm very busy, e-mails just
get dragged unread to the appropriate folder. Then at some point during the
day I will make time to read all e-mails related to each subject. This
method also ensures that I'm only thinking about the one job at a time. I
would recommend this approach to anyone who is stressed out by e-mail,
although this does require your company to have e-mail protocol which
includes useful subject headers.
Alison A, UK
I cope by deleting any e-mail that I have finished with or that has no
relevance. That said, the sooner society makes e-mail advertising (spam)
illegal, the better. Once my inbox gets over 50 e-mails, I make time to
narrow it down. Not having too many e-mails in there makes you feel less
stressed. Move e-mails you need to keep into another folder and keep your
inbox tidy. Works for me.
Boomer, UK
By using a facility like Outlook to manage your e-mail you can make
specific folders and have all items that you are a cc party auto deliver to
a separate folder, same with all your mates stuff, which you can read at
your leisure. This will leave just items work orientated and sent directly
to you to deal with.
Chris, Suffolk
Delete the lot and go to the pub.
Fred Ashley, UK
I basically scan through the sender and subject information, if I don't
recognise either then I delete it without thinking. I just don't have the
time to read all the spam offering me low rate mortgages or Viagra online!
Seth Black, UK
Juggling home and work commitments can be trying at the best of times but I
all too often only see my children first thing in the morning as they are
in bed by the time I get home. Fortunately my husband and I have good
nursery and after-school facilities available to us. It is a sad indictment
of modern living that children are often only able to see their children
for little more than an hour a day.
Sian, UK
What did we do before e-mails, SMS messages, faxes and mobiles? I remember
- life was a lot darn easier and less hetic.
David LJ, Isle of Man UK
I receive approximately two to three hundred e-mails a day. I cannot expect
to read every one I receive, so I will read what I can when I have the time
to do so, the rest I will never read. Any urgent matter should be dealt
with in the traditional method - the telephone! Junk and unwanted e-mails
are a pain, but you should configure your e-mail application to
automatically remove these.
James Sanders, UK
Whenever I am sent an e-mail with a question from a colleague who works in
the same office, I always give them the courtesy of a reply in person. I
find that we not only build up a better rapport but it saves the hassle of
three to four follow-up e-mails to 'clarify the point'. It also helps with
the exercise regime.
Rob, UK
Smart companies have e-mail etiquette! This reduces the number of e-mails
from colleagues who misguidedly feel you are interested in their updates,
supports use of meaningful subject headers and teaches everyone how to
communicate concisely! Lobby your IT team today
Max, N Ireland
I only read e-mail twice a day. Once at the start of the day, once at the
end. Anything else more urgent can be dealt with in person or by phone. I
also get to schedule work better rather than do what is most recent.
Tim, Cambridge
************************
BBC
Mass arrests over online child porn
Officers from 30 forces searched 43 homes and seized about 30 computers,
plus discs and videos.
Operation Ore targeted computer users suspected of accessing US-based
websites which sell images of children aged as young as five being sexually
abused.
US authorities gave the National Criminal Intelligence Service (NCIS)
details of the sites' subscribers between May 1999 and the summer of 2001.
Every image of a child being sexually abused is an image of a crime scene
and each photograph is that of a victim
NCIS UK Tactical Services director Vincent Harvey
The NCIS' Serious Sex Offenders Unit identified a "significant number" of
suspects, and Monday's operation was co-ordinated by the National Crime Squad.
Those arrested ranged in age from 24 to 65.
They include three men - aged 62, 54 and 35 - being held in Merseyside, a
32-year-old man arrested in Scunthorpe and another, 64, arrested in
Grimsby, North Lincolnshire,
Another man, aged 30, was arrested at an address in Normanton, near
Wakefield, West Yorkshire where two computers were seized for forensic
examinations.
Computer equipment was also seized from an address near Rossendale,
Lancashire, where a man, 42, was arrested.
Sexual abuse
In Cwmbran, south Wales, a man in his mid-fifties was arrested with another
man and both later released on police bail.
Another man, 28, was arrested in Farnham, Surrey.
Police in south west Surrey also arrested a man at his home in Godalming.
A man, 44, from the Sandbach, Cheshire has also been released on police
bail pending further inquiries.
This is the first time we have targeted people who use the internet to buy
images of children being sexually abused
Detective Superintendent Peter Spindler
In London, the Metropolitan Police Paedophile Unit also seized computer
equipment from two homes in Battersea and Camden.
A man has is also being questioned in Crawley, West Sussex.
Deputy Assistant Commissioner and Association of Chief Police Officers
(Acpo) spokeswoman on internet child abuse Carole Howlett said: "A
significant proportion of people involved in child abuse online are
themselves actual abusers."
NCIS UK Tactical Services director Vincent Harvey added: "Every image of a
child being sexually abused is an image of a crime scene and each
photograph is that of a victim.
"Using the sophisticated technology along with traditional detective and
analytical work we can now make sure there is no place for paedophiles
operating online to hide."
The government is determined to give the highest priority to protecting our
children, on and off-line
Home Office minister Beverley Hughes
The National Crime Squad's Detective Superintendent Peter Spindler said:
"This is an excellent example of all the UK policing agencies coming
together in a co-ordinated way to tackle a relatively new and growing problem.
"This is the first time we have targeted people who use the internet to buy
images of children being sexually abused.
"We will continue these operations to protect children and show paedophiles
that law enforcement agencies will find them regardless of which area of
the internet they use."
Home Office minister Beverley Hughes, who chairs the government's task
force on child protection on the internet, said the operation sent "a clear
signal to such criminals that they cannot hide".
Dangers
"People who access child pornography are fuelling the widespread and often
organised sexual abuse of children by paedophiles across the world."
"The government is determined to give the highest priority to protecting
our children, on and off-line, and to searching out and arresting those who
prey upon them.
"We will continue to work with law enforcement, industry, children's
charities and others to tackle the dangers posed by online paedophiles and
ensure the UK provides a safe environment for legitimate internet users."
*********************
BBC
Virus outbreak hits file swappers
A malicious computer program, dubbed Benjamin, has been found that spreads
by infecting the machines of people who use Kazaa.
Computers infected by Benjamin will find it increasingly difficult to swap
data and could find large parts of their hard disk taken up by copies of
the virus.
However, anti-virus companies say the program is not too malicious and many
have already produced cures for the infection.
Clogged disks
When it first infects a machine, Benjamin creates a directory and copies
lots, sometimes thousands, of versions of itself into it.
Even movies can be found on file-sharing networks
The versions have different names based on a list held by the virus.
The directory it creates is open to other Kazaa members and anyone who
downloads any of the disguised virus files will become infected.
As well as taking up lots of space on a hard disk, the virus also jams net
connections and gradually makes it impossible to swap files via Kazaa.
The malicious file was first discovered by anti-virus firm Kaspersky Labs
on 18 May.
Duping users
Kazaa, like Napster, lets members swap the music, image and video files on
their computers with other people on the system.
As a peer-to-peer system Kazaa does not have a central server that gives
out files to users. Instead the net links connections and machines of
people who participate form the network themselves.
According to Sharman networks, which owns Kazaa, the software to use the
swapping system has been downloaded more than 81 million times.
Kazaa is not the first peer-to-peer system to be hit by a virus.
In February a worm was discovered that tried to spread via the Gnutella
network.
Before now virus writers have tended to concentrate their efforts on e-mail
viruses that dupe people into opening them.
However, anti-virus companies say that any popular program is a tempting
target for virus writers.
*****************
BBC
Tokyo smart cards challenge cash
Japan's largest train company, Japan Rail East, has just completed the
Tokyo introduction of new smart cards to replace traditional commuter
passes and has high hopes that one day the cards will even replace the cash
in your wallet.
Since the company introduced its Suica smart cards based on integrated
circuit technology last November, take-up has been phenomenal.
After only six months, 3.6 million out of the 4.5 million Japanese who use
commuter passes on JR East's network are addicted to the smart cards.
By the end of this year, JR East confidently expects almost everyone to
have made the move from the old magnetic passes to the new cards.
No waiting
The cards, available upon paying a refundable deposit, work in the same way
as standard magnetic train passes.
The card that could replace cash
But the new technology has the added benefit that it can be charged with up
to 20,000 yen (£105).
This means a commuter does not have to stand in line to pay an excess fare.
Instead, the fare is automatically deducted when a holder waves their pass
over the smart card reader.
The non-contact reader renders the transaction completely invisible, save
for a display on the ticket gate that can be read on the way past.
"I like the new cards because I can just zoom through the ticket gates
without even having to pause, even if I have to pay an excess fee," said
38-year-old Sumie Kawakami.
For some commuters, the smart card has almost become an object of desire.
"I don't use JR network to get home, so I have to use a traditional pass.
Suica is so cool, I wish it was more widely available," said 19-year-old
Yoko Onodera.
Smart payments
JR East is the largest train company in Japan, carrying 16 million
passengers every day. Last year, its operating revenues rose to 2,546bn yen
(£13.4bn).
Its strategy has serious implications for how we might do business in the
future.
DoCoMo's successful i-mode business model using mobile phones has shown
over the last three years just how easy it is for companies to extract cash
from consumers in drips when a micropayment system is available.
Since an automated ticket gate can deduct the equivalent of 50 pence from
the Suica cards, the next step is to allow such transactions for
non-transport-related purchases.
Smart card readers in shops could perform the same function when buying
something as small as a newspaper or a pack of gum.
Although wide scale use of smart cards as cash is still some way off, even
in Japan, there are plans for several of the nation's ubiquitous
convenience store chains to introduce card readers in the near future.
********************
Government Computer News
Defense IT execs are honored by Women in Technology
By Vanessa Jo Roberts
The Army's Miriam F. Browning and the National Imagery and Mapping Agency's
Joan R. Vallancewhitacre received top government honors last week for their
contributions to computing from the Women in Technology organization.
Browning, the Army's director of information management, has spent more
than three decades in government service, most of it with the Army. Her
work at the service has spanned projects ranging from business process
re-engineering and year 2000 code rework to her current effort helping the
service establish an online knowledge management portal, known as Army
Knowledge Online.
Vallancewhitacre, executive officer of information services at NIMA, has
spent her career working in the government mapping community. She worked
with the Defense Mapping Agency before it combined with the government's
other intelligence mapping groups to form NIMA.
WIT also recognized six other government executives as finalists for
leadership awards. They were Anne A. Armstrong, president of Virginia's
Center for Innovative Technology; Mayi Canales, acting deputy secretary of
Treasury for information systems and CIO; Deborah Loudon, associate deputy
CIO of the National Reconnaissance Office; Air Force Lt. Col. Chris Reasner
of the Pentagon Communications Agency; Debra Stouffer, deputy CIO for IT
reform at the Housing and Urban Development Department; and Toni L.
Zimmerman, chief of IT services at the IRS.
This is the third year WIT has honored women in the IT community. Besides
Browning and Vallancewhitacre, whom WIT recognized for their government
work, the nonprofit organization also gave leadership awards to
entrepreneurial and corporate executives.
In the corporate category, the honorees were Linda Gooden, president of IT
for Lockheed Martin Corp., and Donna Morea, executive vice president for
the public sector at American Management Systems Inc. of Fairfax, Va. In
the entrepreneur category, the winners were Helena S. Wisniewski, chairman
and chief executive officer of Aurora Biometrics Inc. of Rockville, Md.,
and Corinna E. Latham, president and CEO of AnthroTronix Inc. of College
Park, Md.
WIT also gave a lifetime achievement award to Faith Driscoll, a patent
attorney with Bull HN Information Systems Inc. of Billerica, Mass.
********************
Government Computer News
Late changes to a security R&D bill call for NIST cybersecurity office
By Jason Miller
GCN Staff
The Senate Commerce, Science and Transportation Committee late last week
passed an IT security research bill that would create a cybersecurity
office at the National Institute of Standards and Technology. The bill, S
2182, now awaits a vote by the full Senate.
During markup, Sen. Ron Wyden (D-Ore.) amended the Cybersecurity R&D Act,
boosting proposed five-year funding from $875 million to $977 million, to
better focus government and industry efforts to improve network and
software security. Changes in the bill also would give more
responsibilities to the Commerce Department's NIST and the National Science
Foundation to promote cybersecurity research.
The creation of the NIST office, which would be called the Office for
Information Security Programs, was one of three provisions added to the
bill. The office would oversee the government's efforts to buttress
cybersecurity research, including a program to assist colleges and
universities in entering partnerships with companies and government
laboratories to conduct such research.
NIST also would have to develop benchmark security standards for agencies
to implement and draft security guidelines for common software used by
agencies.
The bill would require NSF to award grants for cybersecurity research to
colleges, universities and companies. The bill also would encourage
graduate students to teach cybersecurity in return for paying their college
loans.
**********************
USA Today
More firms replace operators with software
By Jon Swartz, USA TODAY
SAN FRANCISCO Consumers frustrated by touch-tone customer service are in
for more aggravation: Hundreds of companies are replacing some service reps
with voice software.
In April, AT&T replaced 200 operators with a voice-recognition system to
handle night and weekend toll-free directory assistance calls. Operators
are still reachable other times.
Qwest Communications is considering replacing operators with
voice-recognition systems for more services. It, BellSouth and Verizon
Communications already use voice software to solicit city and listing
during directory assistance calls. An operator often delivers the number.
A slew of companies, including United Airlines, Charles Schwab, E-Trade and
Amazon.com, have added voice systems to handle general calls. AirTran
Airways cut customer service costs by 20% by shifting some flight
information calls from operators to voice systems last year. It is
considering the system for reservations.
Most companies still use operators for complex tasks, such as correcting
financial information and retrieving passwords. Emergency services like 911
will continue to be handled by humans for at least another decade because
of their critical nature, speculates telecom analyst Jeff Kagan.
But companies will deploy voice systems to 32 million people this year up
60% from a year ago, estimates The Kelsey Group. One-fourth of the Fortune
500 invested in speech systems in 2001, says market researcher Datamonitor
Technology, up from 12% in 2000.
Voice systems don't always work. Some cannot understand heavy accents,
speech impediments or quiet voices. Databases, too, don't always recognize
names. And some make it hard to reach a human. Savvy callers have long
skipped touch-tone systems by punching "0" to get an operator. American
Airlines now requires callers to press "6" and say "operator." Sprint PCS
requires saying "live agent" twice.
"I'm afraid that in three or four years, I won't be able to talk to a human
operator," says Ira Gruber, 55, of Reno, who has a strong New York accent.
"What happens if there's an emergency and the speech-recognition system
doesn't understand me?"
Makers of voice-recognition software say it saves money and improves
service. "People are more comfortable with a human voice" than with
touch-tone, says Linda Smith, chief marketing officer of software maker
Nuance. Its surveys show most consumers prefer voice to touch-tone and
operators.
U.S. firms are sold. They'll spend $7.4 billion this year to improve voice
and touch-tone. A call handled by a worker costs, on average, $5.50 or 10
times as much as an automated call, says researcher Cahners In-Stat Group.
*********************
USA Today
File-sharing system gives artists some control
NEW YORK (AP) Ace Ha and Sammy Brazil of the emerging hip-hop group
MaddWest don't mind listeners passing around their music for free over the
Internet. All they want is a little control.
The Altnet file-sharing system launches Monday to give MaddWest and other
artists such control in the otherwise free-for-all world of peer-to-peer
networking.
Users can trade music, video and other files among themselves just as they
do with KaZaA, LimeWire and other peer-to-peer systems.
But with Altnet, songs are coded with digital rights management technology
so artists can limit distribution or even collect fees before a song will play.
Though MaddWest will give music away for free, Ha said Altnet will let his
band ensure that the copies that are available are of the highest quality.
With traditional file sharing, he said, "whoever is putting whatever out
there and maybe not labeling it right, not taking the care and pains to put
it up in a way we would find satisfactory."
But will Internet users tolerate the added hurdles that come with digital
rights management, or DRM?
After all, free, unprotected but often illegal copies are available
elsewhere everything from Britney Spears tunes to the latest Star Wars movie.
"There is clearly a demand for file swapping," said Matthew Berk, an
analyst at Jupiter Media Metrix. "Whether or not if you lay on top of it a
DRM system people will be keen on using it is another question."
Kevin Bermeister, president of Brilliant Digital Entertainment, the company
behind Altnet, is counting on humans' fundamental desire to be honest when
given the choice.
Beginning Monday, Altnet will distribute its search software with new
versions of KaZaA. Once installed, when a user does a search on KaZaA, the
Altnet search tool will also check whether anything is available through
Altnet.
If something is available, the user then can download the file directly
from the content provider, such as a record label.
In July, Altnet will begin asking KaZaA users to voluntarily lend their
spare disk space and install a second piece of software to run the Altnet
sharing network. Music and other files from participating content providers
will be saved on these volunteer computers.
So when listeners request a file, they can obtain it directly from the
volunteer computers. Only if the file isn't available there would the
listener go directly to the content provider.
Altnet took some heat earlier this year when Brilliant Digital said in a
regulatory filing that it would be installing its own software with KaZaA
to set up this network.
"I didn't expect anybody to read it," Bermeister said. "I didn't expect it
to be received and scrutinized the way it was."
Bermeister said the company has re-evaluated its software distribution
method and will no longer use an installer distributed with KaZaA since
February.
Now, users' permission will be sought before the new software is downloaded
and activated, he said.
Altnet is hoping to initially get about 20,000 volunteer computers.
Computers will require a high-speed Internet connection, at least 400
Megahertz of processing power and five to 15 gigabytes of free disk space.
Participants will be rewarded based on how much their computers are
accessed for files. Bermeister said the heaviest contributors may get free
hotel rooms, air fare and similar gifts, while occasional contributors may
get movie tickets or discounts on merchandise.
Though Altnet will initially work only with KaZaA, the company is exploring
partnerships with others.
Altnet is also developing a version Linux computers, but there are no plans
for Apple's Macintosh computers.
In about a year, Altnet also will launch a service for sharing spare
processing power similar to a popular program at University of
California-Berkeley for using millions of idle home computers to search for
extraterrestrial intelligence.
****************
MSNBC
The race to save the oldest writings
LOS ANGELES, May 17 Historians using the modern language of computers are
assembling a virtual library of the earliest known written documents: clay
tablets inscribed more than 4,000 years ago. Begun in 1998, the Cuneiform
Digital Library Initiative has taken on new urgency. Experts fear if the
texts aren't cataloged electronically, they could be lost forever.
ABOUT 120,000 cuneiform tablets from the third millennium B.C. are
scattered throughout the world. Thousands more are plundered each year in
Iraq and dumped on the world antiquities market. Tablets even show up on
Web auction site eBay, where bidding can start at $1.
"They are just so incredibly dispersed," said Robert Englund, a
professor of Near Eastern languages and cultures at the University of
California, Los Angeles, who spearheads the project. "It seems to us the
only way to get control of the texts is to collect them on the Internet."
Over the next year or two, Englund will try to finish gathering,
cataloging and photographing 120,000 tablets, which will then be posted on
the Web.
The tablets are the earliest known written documents and record how
people lived, labored, ruled and wrote for millennia in ancient
Mesopotamia. The library focuses on tablets created by scribes during
writing's first millennium, roughly 3300 B.C. to 2000 B.C. The writing
looks like a series of little wedges connected by lines; the term cuneiform
means "wedge-shaped."
About 60,000 texts are already online.
"It's like being able to walk into the tablet room of a museum and
pick up the actual tablets but this can be done from any corner of the
planet and by any number of individuals at one time," said Gene Gragg,
director of the University of Chicago's Oriental Institute.
Cuneiform collections in England, Germany, Norway, Russia and the
United States are still available for students to see.
"It's simply going to change the way we work because access to
these texts is slow and painful and can involve traveling thousands of
miles to see. That changing to just a click away is going to be huge," said
Steve Tinney of the University of Pennsylvania, which is compiling a
Web-based dictionary of Sumerian, the first written language.
The best-known cuneiform texts include the earliest known creation
myths, legal codes, medical prescriptions and recipes for beer. Most,
however, are more mundane and include ledgers, deeds, receipts and lists of
everything from types of birds to musical instruments and the woods used to
make them.
The detail they contain is unparalleled for any other period in
history until perhaps the rise of the Venetian empire in the 1200s.
Historians hope the library will prove a boon for economic historians and
others who, until now, have ignored cuneiform records.
"We are hoping to bring the richness of Mesopotamian culture to
anyone who works on anything. We have agriculture texts, magic texts and
medical, legal and religious texts. This is a treasure trove that has not
been exploited," Tinney said.
***********************
USA Today
Internet pharmacies stress industry in Canada
TORONTO (AP) In recent years, busloads of Americans have crossed into
Canada to buy cheaper prescription drugs with help from Canadian doctors.
Now many of those customers, mostly senior citizens facing large medicine
bills, make that trip by the Internet, creating a growing industry that is
attracting the attention of regulators.
On May 14, the Ontario College of Pharmacists filed the province's first
charges against a Web site selling prescription drugs, accusing it of doing
so without a license.
It is the initial salvo in what could be a lengthy battle over how to
regulate the Internet prescription drug industry, raising questions about
whether technology has advanced faster than laws and policies.
"This is the first time we've done this," Layne Verbeek, spokesman for the
Ontario college. "It's a new area."
Verbeek said a body of rulings and court decisions is needed to determine
whether existing laws and regulations properly address the issues.
The charges were filed against The Canadian Drug Store Inc., one of its
directors, an Ontario pharmacist, an Ontario pharmacy, an Ontario physician
and a Canadian drug wholesaler.
Representatives of The Canadian Drug Store could not be reached for comment.
"There's always entrepreneurs wanting to find ways around the rules to make
money. There's nothing wrong with entrepreneurship, but we're really at the
beginning of this," Verbeek said. "These won't be the last charges we lay."
One of the most successful Internet drug store entrepreneurs is Andrew
Strempler, whose Mediplan Health Consulting in Manitoba fills about 1,000
prescriptions each day for U.S. customers who place orders through the Web
sites RxNorth.com and Canadiandrugstore.com.
His operation, which employs more than 100 people including eight
pharmacists, handles only non-narcotic orders that have a prescription from
doctors licensed in Canada. The service includes having a Canadian-licensed
doctor co-sign prescriptions from U.S. doctors for American patients.
While Canadian regulatory bodies say doctors should sign prescriptions only
for patients they examine themselves, Strempler called that "kind of a dream."
"How many doctors have prescribed a drug based on another doctor's opinion?
That's the reality out there," he said. "The issue isn't whether the
patients are receiving proper care. The issue is we are doing something
new, and when you do something new, people are going to question it."
Cases like the Ontario charges give the entire industry a bad name, said
Strempler, who has a message on his Canadiandrugstore.com site noting it is
different from The Canadian Drug Store cited by Ontario regulators.
"We're fulfilling a need" for American senior citizens who cannot afford
the higher-priced medicine south of the border, he said. "There's nothing
scandalous in this industry. You'll always have one or two bad apples. We
really hope that doesn't ruin the reputation in this industry."
In the Ontario case, the College of Pharmacists filed 15 charges that
accuse The Canadian Drug Store of operating an unaccredited Internet
pharmacy without registered pharmacists from November 2001 to February
2002. It said the Toronto-based operation filled prescriptions written by
U.S. Doctors for U.S. patients.
Along with lacking a license, such an operation violated policies for
physicians and pharmacists set by the Ontario College of Pharmacists and
the Ontario College of Physicians and Surgeons.
The pharmacists college requires prescriptions written by Canadian doctors,
while the physicians and surgeons college requires doctors to physically
examine a patient before signing a prescription.
Spokeswoman Kathryn Clarke of the physicians and surgeons college said the
policy adopted in November 2000 responded to the busloads of Americans that
pull up to walk-in clinics to get prescriptions from Canadian doctors. Now
the situation has evolved with the emergence of the Internet industry.
"It's increasing," Clarke said of Internet drug sales. "It's really a very
complex issue that involves both countries and is only happening because
the drug prices are different."
Drugs are often cheaper in Canada because the government finances the
medical system and approves the price of all patented medicines.
The cheaper prices have long attracted Americans on prescription
drug-buying sprees, especially in northern states that border Canada. Now
it happens on the Internet, with Strempler's sites warning of delays in
filling prescriptions due to high demand.
********************
Government Computer News
Agencies find it's not getting the information, it's how you use it
By Sydney J. Freedberg Jr., National Journal
For more than 50 years, since the twin triumphs of World War II and the
Marshall Plan, nothing has summed up American power in the world so much as
piles of stuff.
Be it weapons or widgets, rockets or refrigerators, the United States
prevailed in war and peace because it could produce the most of the latest
stuff. It was global domination through mass production.
But like so much else, this supremacy by manufacture didn't save us on
September 11, 2001. Terrorists armed with nothing more sophisticated than
box cutters hijacked the high-tech, high-flying products of U.S. industrial
might--Boeing airliners--and flew them into the high-rise engineering
wonder of the world--the World Trade Center. And in an ironic twist, when
U.S. retaliation came, Special Forces soldiers had to ride, literally, to
victory on the backs of borrowed horses and on the lethality of air strikes
conducted by the oldest aircraft in the Pentagon's inventory--the
50-year-old B-52 bomber.
Certainly, both sides in this new kind of war used the heavy-metal gadgets
that have long defined the cutting edge, most obviously long-range jet
aircraft (whether owned or stolen) laden with explosive materials (whether
smart bombs or jet fuel). But such tangible uses of technology were just
the starting point, their availability almost taken for granted. The
critical margin of victory for both sides was something altogether more
ethereal: It was information.
It was the terrorists' understanding of air transportation, not their box
cutters, that was their deadliest weapon on September 11. Thanks to
21st-century information technology, everything they needed was readily
available: from manuals and simulators for their pilot training to flight
schedules on the Web. They also could glean from news articles that
standard procedure called for U.S. aircrews to collaborate with, not
confront, hijackers in order to save passengers' lives.
Likewise, it was information that enabled America's lightning campaign in
Afghanistan to work so well. Networking software allowed U.S. planners to
coordinate nearly nonstop missions over Afghan skies using planes from
Central Asian airstrips, aircraft carriers at sea, and bases in the United
States. Digital communications gear let Special Forces on the ground
transmit precise coordinates to the circling bombers. And an $18,000
upgrade kit let old-fashioned, free-falling bombs steer themselves to those
coordinates by tapping into Global Positioning System satellites in space.
New technology did make the crucial difference, but it was a new kind of
new technology: small, quiet, and relatively cheap computers that told all
the big, loud, and expensive machines exactly where to go for maximum
effect. Without the information systems, the U.S. military would have just
been blasting away at the landscape in a big, set-piece barrage right out
of World War II.
A crucial caveat: It was having the right information, in the hands of just
a few of the right people, that made the difference. It was not simply a
matter of having a lot of data. On 9/11, Mohamed Atta and a band of 18
disciplined and trained hijackers, armed with some key but easily available
information, wreaked great terror on America. Similarly, small Special
Forces teams made up of just six soldiers each helped destroy an entire
regime because of their precise knowledge of the enemy's location in
Afghanistan, and because of their ability to transmit that knowledge to the
bombers. Said Kenneth Watman, director of warfare analysis and research at
the Naval War College in Newport, R.I., "The real working end of this
problem is the information end, not the shooting end."
And it's not the quantity of information that counts, as anyone who has
used e-mail or searched the Web knows--it's how you use the masses of data
to achieve your goal. "Being submerged in data that way is not very
productive," said Watman. "You've got to have some sort of intelligent
scheme for putting things together."
And that's where government tends to fall down. A bureaucracy built for the
Industrial Age has real trouble adapting to an age of information. The
private sector is still struggling to master the e-economy, but
e-government lags far behind even these first steps. The White House's
six-month-old Office of Homeland Security has only just hired a chief
information officer to help manage the flood of e-mailed proposals from
would-be contractors.
It is not that government never gets the information flowing smoothly. The
FBI's National Crime Information Center can electronically alert almost
every police chief and sheriff in the country, and some jurisdictions have
computer terminals in every squad car. Other government and private
groups--from disaster planners to hospitals to medical associations--have
their own extensive networks, too. But each network is often too narrow to
catch anything unusual: It simply moves information up and down within one
organization, not side to side between them. Retired Navy Capt. John Gannon
(now with the consulting firm Intellibridge) recalls that in his former job
as director of the federal interagency National Intelligence Council, "I
had responsibility for coordinating 11 agencies of the U.S. government. I
could not communicate with those 11 agencies through one e-mail system."
The greatest tragedy to result from this information arteriosclerosis, of
course, was 9/11. "It was the biggest single failure of our federal
government," said Rep. Curt Weldon, R-Pa. "You had agencies that were
tracking individuals that other agencies weren't aware of, because there
was no cross-pollination of data sets." The State Department and the
Immigration and Naturalization Service, because they did not get a CIA
watch list until too late, let suspected terrorists into the country. A
warrant was issued for the arrest of the apparent ringleader, Mohamed Atta,
in April 2001 by Florida state police who had ticketed him for driving
without a license. But the Florida police had no access to federal
intelligence information.
So September 11 gave a new impetus to the long-running struggle to pool
information across government. The INS is now trying to merge its database
of offenders and fingerprints with the FBI's. A Customs Service pilot
project in Arizona automatically checks vehicles crossing the border
against both state and federal registers of licenses, and it even suggests
which ones have suspicious crossing histories. A follow-on experiment will
share the data with every government entity that works an Arizona border
post: Arizona agencies, Customs, the Transportation Department, and even
the Agriculture Department. Even more ambitious, the military's Special
Operations Command has taken over an experimental Army project to "fuse"
information from different Pentagon and civilian spy agencies' secret, and
currently separate, data systems.
Again, the objective is not simply to accumulate mounds of information. The
idea is to fuse together different kinds of data to get different
perspectives on a problem from many angles. The simplest example is what
the military calls "hyper-spectral" reconnaissance--looking at the same
thing with different kinds of sensors. To an infrared camera, a heated
metal plate looks like a running tank engine; to an optical camera, a
wooden mock-up looks like a real tank. But if both sensors can be pointed
at the same suspected target and compared, then the enemy is less likely to
fool U.S. targeters.
The idea goes well beyond combining different types of cameras. Disaster
planners now build electronic maps that, for example, can show how close
fire stations are to chemical plants, or which hospitals can handle an
overflow of casualties in a nearby mall's parking lot. Rep. Weldon proposes
a "National Operations and Analysis Hub" that can collate transcripts of
intercepted phone calls, spy camera imagery, agents' reports, and more into
a single coherent picture of the world.
It sounds like an impossible technical challenge. But in fact, large
private corporations have used the technology for years in data mining and
marketing, Weldon said. But getting the government to make use of the
technology, he said, "[has] been a battle with the agencies all along."
So what's the holdup? A big part of the problem is the resistance to
change. Even the most seemingly mundane uses of information technology
require some fundamental rethinking about how a bureaucracy does things. In
February, for example, Navy Secretary Gordon England griped to his staff
about the piles of paperwork on his desk and asked whether it could all be
computerized. By April, a "paperless" system was in place: Preliminary
estimates are that for each routine decision, processing time was cut by 78
percent, the number of staff to handle it by 71 percent, and the cost by 75
percent.
But those savings didn't result from simply speeding up the bureaucratic
rounds. In a traditional office, a physical piece of paper goes from
official to official to official, each one seeing the preceding handlers'
comments and making his or her own before passing the memorandum along. And
if one handler along the way really objected, he or she just sat on it. It
was what engineers call a linear or "serial" process, where one broken link
breaks the entire chain. With the new network, the originators of any
proposal post their draft document on an intranet, so anyone can review and
comment simultaneously without waiting. That's called a "parallel"
process--except that in geometry, parallel lines never intersect, and yet
in this network, everyone sees each other's comments and responds. It's all
about interaction and intersection. The end result is faster, more
flexible, more responsive to everyone's input--and distinctly unsettling to
traditional bureaucracies.
Now, this is what can happen inside just one small military secretariat. It
is fairly disruptive, but also more productive. Even more destabilizing,
and also more valuable, are those networks that link different agencies.
Knowledge is power, and is a jealously guarded bureaucratic commodity. But
when a new network fuses information from multiple organizations, it
creates new knowledge--new power--along the boundaries between them. In the
language of the Information Age apostles, power shifts from the center to
the edges.
Then those edges begin to blur. Eleven years ago, Desert Storm had an air
campaign and then a ground campaign, clearly distinct and elaborately
pre-planned; today in Afghanistan, aircraft and teams of ground troops work
together from minute to minute on their own initiative. For the wars of
tomorrow, the Pentagon's Joint Forces Command is experimenting with new
task force headquarters that would deploy only a minimum of staff to a war
zone. These headquarters would instead use networks to tap into centers of
specialized expertise--military and civilian--back home, much as a small
e-business start-up relies on contractors around the world. And a Chicago
think tank, the Emergency Response & Research Institute, has proposed
"virtual disaster networks" that can expand during a crisis to draw in
whatever resources are needed to confront a given fire, flood, earthquake,
or terrorist act. The local fire chief on the scene could link
electronically to neighboring counties, National Guard units, state
officials, the Federal Emergency Management Agency, and appropriate experts
anywhere on Earth--perhaps chemists for a Bhopal-style chemical leak or
nerve gas attack, or physicians at the Centers for Disease Control and
Prevention for an anthrax or smallpox outbreak.
What's the organizational diagram for this future? There isn't one.
Instead, there's an ad hocracy that pulls together everything it needs to
solve the current problem, then dissolves. "Maybe a better word than
`organization' would be `collaborative community,'" said Dave Ozolek, an
experimenter at Joint Forces Command.
In this dizzying future, "the technology [is] simply the enabler," Ozolek
added. "It's not just buying a commercially available product and getting
everybody up on the same screen: It also requires organizational change and
cultural change."
No wonder few want to do it. Change is just too hard. At least troops
fighting in Afghanistan have a strong incentive: If they can get the new
way to work, it will save lives, maybe their own. Back home in Washington,
the only certainty is that sticking to the old way will save your job.
So it should be no surprise that the history of government technology
projects is littered with overruns, delays, and projects killed outright
because different offices could not agree on what to do. And sometimes the
inherent flaws in some bureaucracies are so deep that a given agency has to
be brought up a level or two before extensive change can be contemplated.
Consider the Immigration and Naturalization Service contractors who issued
visas recently to two terrorists who had died six months earlier, on 9/11.
The problem there was not the lack of sophisticated network technology, it
was a failure by humans to connect the names in the newspaper to the names
on the visa applications. As tricky as the technical questions can be, said
a senior IT consultant to the federal government, "the big problem is the
lack of management skill in government."
With the rise of modern information technology, the tools exist to change
literally everything the government does, from counter-terrorism to office
management. The question is what government will do with them.
*********************
Government Executive
Central e-learning site for federal workers takes shape
By Brian Friel
bfriel@xxxxxxxxxxx
A Transportation Department Web site will be transformed into a one-stop
e-learning portal for workers throughout the federal government, according
to the Office of Personnel Management.
The Transportation Virtual University site will be recast as the National
Learning Center, and will offer a host of courses to federal workers. These
will include mandatory training in such areas as ethics and sexual
harassment; managerial training in such topics as interviewing techniques;
and computer courses in such areas as database management and Web development.
"You can call it a portal, a one-stop shop for online training," OPM Chief
Information Officer Janet Barnes told Government Executive.
The e-training site is one of 24 e-government projects that the Bush
administration is trying to complete by the end of 2003. Mark Forman,
associate director for information technology and e-government at the
Office of Management and Budget, is coordinating the projects, which also
include a federal electronic recruiting portal, a centralized online
rulemaking system and a one-stop federal grants site. The Chief Information
Officers Council is helping to coordinate the projects.
Transportation Virtual University is run by the agency's Administrative
Service Center. The center has pooled the services of about 60 e-learning
companies on the site, including Nashua, N.H.-based SkillSoft and
Naperville, Ill.-based NetG.
In addition to Transportation employees, employees from other agencies,
including the Housing and Urban Development, Commerce and Veterans Affairs
departments have taken courses at the Transportation Virtual University.
Several free courses are already available to employees across government
via the National Learning Center prototype site, including courses in
project management, Microsoft Office, sexual harassment and personal
development.
*********************
Euromedia.net UK
Wanadoo to offer online music subscription service
16/05/2002 Editor: Sean Cornwell
Wanadoo , the European internet services and directories company and a
subsidiary of France Telecom, has announced an agreement with On Demand
Distribution (OD2) , a European distributor of digital music, to offer an
online music subscription service to the 5.75 million customers of Wanadoo
in France and in the UK.
The new subscription services will launch on Freeserve in early summer and
to customers of Wanadoo in France later this year, with basic subscription
packages starting at 8 Euros (£5) per month.
The service, powered by OD2, will offer music from artists signed to some
of the world's leading music labels, including BMG, Warner Music, Mushroom,
Telstar, V2 and Ministry of Sound, along with tracks from many independent
record labels. More agreements with labels are expected.
Customers of Wanadoo in France and Freeserve in the UK will be offered a
choice of options to suit their music and subscription preferences,
including subscription by genre, a personal play list and permanent downloads.
Consumers of the new service in France and the UK will be offered the
Download Manager to automatically download music of their choice, and music
recordings will be encoded in the Microsoft Windows Media Audio format and
secured with Microsoft DRM technology.
The move is part of the Wanadoo Group's strategy to position music as one
of the pillars of its offering of high-speed access and premium content.
Wanadoo is rolling out high-speed broadband internet to consumers in both
France, the Netherlands, Spain, Belgium, and in the UK through Freeserve.
Nicolas Dufourcq, Chief Executive Officer of Wanadoo Group, said: "This
project..opens up the possibility of digital music distribution across a
variety of platforms, including broadband, with a true pan-European reach."
*******************
CNET
Rogues on the web
Alberta's plan to post photos of high-risk crooks blasted by rights group
By RAQUEL EXNER-- Sun Media
EDMONTON -- The province of Alberta is setting up a Web site that posts
photos and details of high-risk criminals, The Sun has learned - a plan
that has city cops and civil-rights groups fearing it will increase
vigilante action and drive more offenders underground.
There's no benefit to "branding" offenders, says Ed O'Neill, past-president
of the Criminal Trial Lawyers' Association.
"It would arguably impede their rehabilitation (and) it does drive
individuals underground," said O'Neill.
"People are reticent to obtain treatment.
"It's counter productive in many respects."
Police also worry the site will ruin the good rapport detectives have with
offenders, and trigger extra work and expenses, said spokesman Wes Bellmore.
"It will more than double the work our dangerous offender unit needs to
do," said Bellmore.
Any offender police issue a public warning about will be featured on the
site - due to be running by month's end - for one year.
Police are to re-evaluate the risk of each individual annually before
deciding if their mugs will remain on the site, which may also be
retroactive and feature offenders who've already been the subject of public
disclosures.
Bellmore said police currently have to give offenders notice when they
issue a public disclosure and that will have to be re-served and
re-assessed after a year - meaning a heavier workload for officers - if the
convict's mug goes on the site.
Officers also expect some of offenders will object to having their photos
on the Internet and that will mean more battles getting them to comply with
parole conditions, he said.
But the province insists the information posted is simply for the public
good and does not violate any privacy laws.
"The objective is to keep our community safe," said Jean Olynyk, spokesman
for the solicitor general.
"Any information that would go up would only be information that the police
have already made public."
Police have an obligation under Alberta's freedom of information and
protection of privacy law to release information on offenders who pose a
high risk to the public.
The law protects police from lawsuits as long as strict procedures are
followed: the police chief must approve each warning, the offender must be
notified and can object to the warning, and the offender can appeal the
decision to the office of Alberta's information and privacy commissioner.
City police always emphasize that vigilante action is not to be taken but
the last public disclosure issued in April for convicted sex offender James
Holowenko resulted in him being punched several times by a group of people
but not injured.
It was the first instance of a public disclosure that resulted in a
physical attack.
Stephen Jenuth, president of the Alberta Civil Liberties Association, also
fears the Web site will encourage more vigilantism but the biggest problem
is one of privacy.
"It's not really designed to help us or protect us, but really it's a
public policy type thing designed to help try to garner a few votes at the
expense of some people," said Jenuth, who's also worried it will discourage
offenders from becoming integrated into the community.
Police have kept tabs on more than 200 high-risk offenders since January
1997, and have done only 29 public disclosures during that period.
******************
Sydney Morning Herald
Sharp rise in computer crime in Australia
Sydney
May 20 2002
Computer crime in Australia has jumped sharply, despite record spending on
IT security, a survey has found.
The 2002 Australian Computer Crime and Security Survey found 67 per cent of
the 300 companies surveyed had fallen victim to computer crime this year,
twice the amount recorded in 1999.
Yet 70 per cent of those organisations had increased security spending.
The survey was jointly produced by Deloitte Touche Tohmatsu, it security
company AusCERT and the NSW police.
Deloitte's Head of IT Security Consulting Dean Kingsley said the survey
showed not only the growing extent of computer crime in Australia but how
the nature of the crimes had changed.
advertisement
advertisement
"Employees continue to represent a significant source of attack with 50 per
cent of companies reporting security breaches from within," Mr Kingsley said.
"However, with the increase in e-business and networking between
businesses, external attack is now for the first time the greatest threat,
affecting 87 per cent of companies reporting security breaches."
Mr Kingsley said although organisations found it difficult to estimate
financial loss because of cracking, it was evident computer crime was no
longer just a nuisance.
But the surveyed showed 61 per cent of organisations surveyed failed to
take legal action following a security breach.
NSW Commercial Crime Detective Superintendent Megan McGowan said the recent
strengthening of the NSW Crime Act gave police powers to prosecute hackers
simply for entering a company's computer system.
"They (companies) need to realise that what may appear to be benign is
often a pathway to something more sinister," she said.
"Companies for various reasons are still too reluctant to involve the
police but we can outsmart the hackers by working cooperatively."
********************
Sydney Morning Herald
Hotmail bid to cash in on users
Hotmail, the free e-mail service which was purchased by Microsoft some
years back and is now part of the MSN Internet Service, has changed its
users' "personal profile" settings by adding and pre-checking a new set of
option boxes, according to an article in the Eastside Journal.
These boxes make it appear that the users have allowed Hotmail to share
their email address, date of birth, occupation and other information with
Web sites run by Microsoft's partners.
The Eastside Journal said 14 Hotmail users had confirmed that Microsoft
made the switch at some point without getting their permission or giving
them any notice. The change allows any of Microsoft's partners to send
uncolicited commercial email, which is also known as spam, to people.
In March, Yahoo did the same thing after changing its members' preferences.
The resulting reaction led Yahoo to send out a notice about the changes.
MSN has not changed its privacy settings or its privacy policy to reflect
this change, according to the report. The statement of privacy says:
"Hotmail will not share your e-mail (sic) address with (Microsoft's)
business partners" and "none of your personally identifiable information is
shared with the third party Web sites."
Adding insult to injury as it were, Microsoft is trying to get Hotmail
users to pay $US19.95 a year for 10 MB of extra email storage. Hotmail is
used by over 115 million people.
This story was found at:
http://www.smh.com.au/articles/2002/05/17/1021544063692.html
*************************
Sydney Morning Herald
Protecting the extension of your personal space
By Andy Polaine
May 14 2002
Mobile phones are becoming increasingly personal devices, allowing
ever-higher degrees of customisation. The car is the only other technology
with which we have such an intimate relationship and a large part of this
rapport comes from these technologies being an extension of our personal
space. Unlike our televisions or PCs, which we turn off and walk away from,
we carry our phones everywhere, along with our car keys and wallet. They
contain our most intimate phone numbers and give others direct access to
us. They allow us to exchange messages via SMS and are a social, commercial
and, sometimes, emergency lifeline.
It is precisely because phones and PDAs are so personal that wireless spam
is so intrusive. Users tend to react quickly and extremely negatively to
marketing messages that are sent without permission. Recently in the UK,
supermarket giant Sainsbury's used an SMS to advertise 400 jobs at a store
it was opening. Sainsbury's had obtained the phone numbers from a direct
marketing agency and the message began "I wnt u, I need u, I cnt get enuff
of u" before going on to advertise the jobs along with the phone number of
a job centre to call. Although the ad was targeting a youth demographic,
the job centre was bombarded with complaints within minutes. The complaints
ranged from people concerned with where Sainsbury's obtained their numbers
to those whose partners suspected them of infidelity.
According to ZDNet UK, Sainsbury's media officer was less than repentant
saying, "It has been a success. We have had 80 inquiries in the two days
before the ad was withdrawn."
This suggests that it is OK to spam people if it gets results. Nikki
Murrell, wireless Internet analyst at Ovum, says that, with this approach,
everyone loses. "Operators risk increased churn," she says. "Vendors risk
losing brand equity and, if SMS spam is permitted to grow in the way that
e-mail spam has flourished, users are likely to dismiss all SMS-based
marketing material, even if they have asked to receive it."
On NTT DoCoMo's network in Japan the situation is further advanced, with
heavy spamming and viruses already a problem. Last year, phones on the
network were infected with a virus that randomly dialled the emergency
services. Some customers found themselves having to explain themselves to
the police - prank calls to emergency services are illegal. This forced NTT
DoCoMo into adopting anti-spam measures such as only allowing a fixed
number of domains to message the user's phone and incorporating anti-virus
software in future handsets.
Andrew Scott, a researcher in 3G networks at Telstra, says that, in
Australia, it still costs the sender something to send out an SMS, so it is
not yet attractive to spammers. However, as we move forward in IP-based
systems, this is set to change. "Spam becomes a huge issue," Scott says.
"DoCoMo has real problems."
NTT DoCoMo's network architecture is relatively open, allowing spammers to
use IP-based services to send out bulk text messages that cost nothing. The
problem is compounded by the fact that, on packet-based networks, the
customer is paying for all the data they receive, including spam. NTT
DoCoMo has resorted to crediting its customers with 400 packets of data a
month as a buffer to incoming spam and the associated cost.
I recently travelled through Singapore on my way to Europe and when I
turned my phone on in the airport I was immediately sent two text messages
from Optus/Sing-Tel. The messages welcomed me to Singapore and told me the
exchange rate. I found this novel and also useful but any more would have
been intrusive. But Ovum's Murrell points out that Japan already has shops
messaging adverts and vouchers to customers as they walk past. Future
developments look likely to focus on location-based marketing.
As a result, a market is opening up for intelligent agents that deal with
these messages on our behalf. Rocking Frog is a wireless data technology
business within BTexact Technologies' corporate incubator Brightstar in the
UK. Its aim is to enhance users' relationship with their devices and the
world around them by providing relevant, timely, personal and business
information appropriate to their location and profile. The user's profile
is created when an account is first established and can be modified via a
wired or wireless Web interface. The software then modifies the importance
of information it
offers based on usage. Immediate benefits are simply finding a service
(such as a restaurant) nearby, without having to surf the wireless Web.
Your profile already knows you like Italian and gives you the choice of the
three restaurants in walking distance.
Rocking Frog ensures the user is always in control, however, it envisages a
time when profiles may act on the user's behalf. "While shopping in a
department store, your profile communicates with the store's 'objectives'
and arrives at an agreement," suggests one of the designers. "New socks,
black, cotton, special offer - up one floor and turn left."
MIT and other institutions are researching Augmented Reality (AR), in which
information is displayed in the user's field of vision, either by
projecting on to special glasses or directly on to the retina. Applications
for AR range from military and medical to street directions and advertising.
To display information over the top of the real world, AR knows exactly
where you are and even in which direction you are looking, wirelessly.
There is potential to overlay virtual advertisements on your view of the
world, a technique used in televised sporting events where
computer-generated ads appear to be painted on to the pitch.
Although most governments are looking to legislation to outlaw spamming,
perhaps the winning combination will be the network whose software agents
are smart enough to tread the fine line between advertising and "timely
information". Certainly it seems there is potential for battle between
advertising or even security agents and those of the user. One thing is
certain: our digital assistants look set to become even more personal and
part of our intimate lives.
"The phone will be the most personal device someone owns, next to their
underpants," says the designer at Rocking Frog.
Andy Polaine is a Sydney-based interactive design consultant and writer.
************************
Peoples Daily
Outlining Proper Uses Going Online
Internet bars are a favourite gathering place among young people, but a new
regulation on these establishments now stipulates who and when they can go.
Internet bars are a favourite gathering place among young people, but a new
regulation on these establishments now stipulates who and when they can go.
Under the latest State regulation, young people under the age of 16 can
only go to Internet bars with their guardians. Minors can only stay in
Internet bars no longer than three hours, even on holidays.
The regulation comes after several cases where young people have suffered
abnormal behaviour as they become addicted to computer use at Internet bars.
Among the extremes is a 17-year old student in Nanchang in East China's
Jiangxi Province who died suddenly after playing Internet games for many
hours at an Internet bar.
In another case, a young student disappeared for more than 20 days. His
parents employed a private detective and found him at an Internet bar.
The aim of the regulation is understood, since minors cannot control their
behaviour and can get easily addicted to new fads.
Interference from regulators therefore, is necessary and even indispensable
for the youth.
But policy-makers may have gone awry by imposing such rigid restrictions on
young people.
The Internet provides a simple and low-cost channel for people to connect
to the outside world. It is invaluable for young people to choose to learn
what is happening on the other side of the globe instantly and conveniently.
It is a good learning tool, which the young can benefit much from.
Since not many Chinese families have purchased computers, many young people
resort to Internet bars.
Such rigid rules, however, lay obstacles to the convenient use of such an
educational tool.
To prevent young people from logging on to websites that have improper
content such as violence, sex and undesirous games, Internet bars should
install software that can block entry to such websites.
Bar owners who allow young people to play games for long periods of time
should also be punished.
*******************
Wired News
Radio ID Tags: Beyond Bar Codes
An emerging technology could usurp the ubiquitous bar code's
quarter-century of quiet domination.
Radio frequency identification (RFID) tags, which consist of silicon chips
and an antenna that can transmit data to a wireless receiver, could one day
be used to track everything from soda cans to cereal boxes.
Unlike bar codes, which need to be scanned manually and read individually
(you have to actually see a bar code in order to read it), radio ID tags do
not require line-of-site for reading. Within the field of a wireless
reading device, it is possible to automatically read hundreds of tags a
second.
Not only can these tags be read faster than bar codes, they also contain
more information, so they can recall items more efficiently.
"This is the basis of the next 50 years of computing," said Kevin Ashton,
executive director of MIT's Auto-ID Center. "The impact will be staggering."
The applications for this technology are seemingly endless. Radio ID tags
can be installed in clothing labels, books, packaging, or even implanted
beneath skin.
MIT's Auto-ID Center is developing ways to use the tags in consumer product
packages with blue chip companies such as Procter & Gamble, Wal-Mart,
Gillette, Unilever, Target, Pepsi and Coca-Cola.
Retailing behemoths such as Wal-Mart (WMT) and Home Depot (HD) are
investing heavily in Auto-ID's technology to improve supply-chain
efficiency and track products from the warehouse to the consumer's doorstep.
"The supply chain today is a black box," Ashton said. "There is very little
accurate data about where things are, what they are, how much there is."
"This technology won't just improve the supply chain -- it will
revolutionize it in ways we are only just beginning to understand," Ashton
said. "Computers are basically blind today. The technology we are
developing will enable them to see, for the first time ever."
RFID systems originated in the 1940s, when the U.S. government used
transponders to distinguish friendly aircraft from enemy aircraft. Through
the 1970s, the federal government primarily used the systems for projects
like tracking livestock and nuclear material.
Radio tags have been used commercially for delivering packages, handling
luggage, tracking food in supermarkets and monitoring highway tolls.
The airline industry, along with the FAA, has used RFID tags to route
baggage and increase air security. McDonald's and ExxonMobile are testing
RFID chips to allow customers to pay for food or gas.
The Auto-ID Center is in the final stages of developing a standard way for
RFID tags to communicate. The standard could be implemented in a mass
production tag that would cost about 5 cents.
Auto-ID researchers recommend placing a 64-bit (or 96-bit, depending on the
version) number called an electronic product code (EPC) on an RFID tag. The
EPC identifies every inventoried item with a unique serial number.
Approximately 20 companies are participating in what may be the largest
scale RFID test to date, prototyping tags based on the Auto-ID Center's
protocol.
"Basically, we are doing everything we can to make RFID a mass-production
technology," Ashton said.
According to researchers, companies will be able to use smart tags to
connect everyday objects to the Internet, potentially saving billions of
dollars in lost, stolen or wasted products.
For example, a smart-shelf could tell when a carton of milk or a box of
medicine has expired, alerting a store to restock in real time. This type
of system could prevent out-of-stock merchandise and reduce obsolete or
out-of-date products.
The success of RFID in the mass market ultimately depends upon tying the
technology to an open standard network like the Internet, according to
researchers.
"The Internet is absolutely crucial for all this," Ashton said. "(The
Internet) enables us to put all the data on the network, not the tag, and
that makes tags cheaper, better, faster. By the end of this decade, a
majority of the data moving across the Internet could well be EPC related."
"We can make the tags cheap by transmitting most of the information on the
Internet," agreed Auto-ID Center research director Sanjay Sarma.
According to an Auto-ID Center survey, approximately half of the center's
sponsors said they can imagine these tags making a significant impact on
their business in the next 2 to 3 years, and many anticipate needing
billions of EPC tags by the end of the decade.
Researchers believe that eventually the technology could be used to improve
health care, public safety and recycling.
"This isn't just a technology that can help save money," Ashton said. "Used
properly, it can help save lives, it can help save the environment."
Despite the promise of this technology, cost and lack of standards have
been a major barrier for widespread adoption.
Today, tags cost upwards of 50 cents each. Until the cost of RFID tags
drops to less than a nickel, it's unlikely that this technology will see
mass-consumer use, experts say.
Researchers believe that the goal of the five cents tag (PDF) is attainable.
"I have little doubt that a five-cent tag is achievable in the next few
years, if a market of the right size emerges," Ashton said. "We're probably
looking at five cents (tags) in 2005."
Some privacy advocates are concerned that organizations like insurance
companies will want to use collected information to track individual
consumers.
"Privacy is our biggest single research area," Ashton said. "We need to
make sure the technology is not a threat to anyone's privacy and we need to
make sure everyone is comfortable with that -- we can't just expect the
world to take our word for it."
The Auto-ID center has designed privacy protection measures into the ePC
system. The chips contain no useful data -- just a unique code number that
refers to information held remotely on the Internet. Access to this
information is restricted and controlled. The tags cannot be read through
walls or from more than about five feet away.
The Uniform Code Council, creator of the bar code, has endorsed the Auto-ID
Center's efforts.
Once costs come down, RFID could become as pervasive as bar codes are today.
"It will probably become more ubiquitous than bar codes, in decades to come
-- simply because it is the difference between being blind and being able
to see," Ashton said.
Insiders predict that it will take at least three years for smart tags to
become pervasive in businesses, and even longer for consumers to adopt the
technology at home.
"I wouldn't be at all surprised if there were still bar codes on things 30
years from now," Ashton said. "I also wouldn't be at all surprised if there
were ePCs on everything 30 years from now."
******************
Computerworld
FBI wants to know who took 13,000 credit reports
By BRIAN SULLIVAN
MAY 17, 2002
The FBI is investigating how someone made off with 13,000 credit reports
from a credit reporting agency, Experian Information Solutions Inc., during
a 10-month period by posing as a Ford Motor Credit Co. employee.
According to a letter and statement sent out by Dearborn, Mich.-based Ford
Motor Credit, someone collected private information, including the work and
home addresses, Social Security numbers, account numbers and credit history
of 13,000 people, mostly from affluent neighborhoods around the country.
Most of the people weren't Ford customers.
Ford spokesman Dan Jarvis said the company became aware of the breach in
March when it was contacted by Orange, Calif.-based Experian, a subsidiary
of London-based GUS PLC. Experian customers had complained that Ford Motor
Credit had conducted credit checks on them even though they hadn't had any
contact with the automaker.
Jarvis said the fraudulent credit checks were distinguished from the
legitimate Ford checks because the software the fraudster used was
different from Ford's. It isn't clear whether the theft came from a hacker
who broke into Ford's system and the company refuses to say how it believes
the breach occurred, Jarvis said.
"We're waiting for the FBI to tell us," he said.
Experian spokesman Don Girard said he is still not sure that a hacker was
responsible for the breach.
"One scenario could be that an access code was pilfered within Ford,"
Girard said. Experian gives large companies access codes with which they
can gather credit information on potential customers.
"Who we don't give access codes to is Joe Shmo who runs a pawn shop down
the street," Girard said.
Girard said no matter how the intruder got the information, Experian will
press for prosecution to the fullest extent of the law.
Chris Hoofnagle, legislative counsel for the Washington-based Electronic
Privacy Information Center (EPIC), said he wasn't surprised at the ease
with which someone made off with the information.
"There is not a lot of market incentive, aside from lawsuits, for the
credit agencies to be more responsible," Hoofnagle said. He said
credit-reporting agencies have "poor business practices" and don't place
thorough safeguards on consumers' private information. He said the agencies
should require greater authentication before sending out such information.
Both Hoofnagle and U.S. Federal Trade Commission spokeswoman Claudia Bourne
Farrell said the incident reinforces the need for consumers to get copies
of their credit reports annually to check for suspicious entries.
Farrell said tracking how many cases of identity theft happen each year is
hard to do because many different agencies gather such information. But in
2001, she said, the FTC received 86,182 complaints -- and the average time
between when a theft occurs and a consumer notices is 14 months.
Ford said consumers who discover any fraudulent entries should contact the
Detroit office of the FBI or call a Ford hotline: 888-838-8176, between 7
a.m. and 8 p.m. CDT, Monday through Saturday.
********************
CNET
Broadband hits a high note
By Margaret Kane
Staff Writer, CNET News.com
May 20, 2002, 11:25 AM PT
http://news.com.com/2100-1033-917952.html
Broadband usage continues to grow rapidly, with a more than 50 percent
increase in major cities, according to a new report.
Overall, more than 25.2 million consumers went online using cable modems,
digital subscriber lines, ISDN or local area networks in April, a 58
percent increase from the previous year, and a 7 percent increase from
March, according to a new report from market researcher Nielsen/NetRatings.
"While some barriers exist to broadband expansion such as increasing costs,
there is healthy room for additional growth and adoption of broadband,"
analyst TS Kelly said in a release. "The largest broadband cities continue
to grow."
Indeed, the top two broadband cities, New York and Los Angeles, saw the
number of subscribers grow more than 70 percent year over year. New York
now has 2.78 million high-speed Internet users, while Los Angeles has 1.76
million. The top five cities were rounded out by Boston, San Francisco and
Philadelphia.
The top cities seemed to defy the law of large numbers, with some of the
fastest-growing cities having the largest percentage increases year over
year. Among the 20 cities with the most broadband users, Orlando, Fla., saw
the most growth, with the number of broadband users rising 183 percent year
over year to 401,000 in April 2002.
***********************
Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 507
1100 Seventeenth Street, NW
Washington, D.C. 20036-4632
202-659-9711