[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips June 20, 2002
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, CSSP <cssp@xxxxxxx>;, glee@xxxxxxxxxxxxx;, Charlie Oriez <coriez@xxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, computer_security_day@xxxxxxx;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;
- Subject: Clips June 20, 2002
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Thu, 20 Jun 2002 15:56:59 -0400
Clips June 20, 2002
ARTICLES
House Creates Panel (for Homeland Security Legislation)
Florida Police Bust Internet Prostitution Ring
Computer Co. Founder Pleads Guilty
Russian Mafia May Have Infiltrated Computers at Arizona State
Fears of Misuse of Encryption System Are Voiced
Music Labels Urged to Move Fast on Home Networks
The Librarian's Web Dilemma
Spammer attacks AOL Search
Taking Security Concerns Private: U.S. Appeals to IT Firms
Internet Providers Team Up to Lobby FCC
Firms Vie for Right to Operate '.org' Domain
New Security Software Gets Jump on Cyberattacks
El Paso rolling toward e-gov
Air Force lab opening info exchange
Fairfax offering electronic alerts
NMCI may be homeland model
Momentum building behind homeland
Two Army tech leaders retiring
E-Authentication RFI due this month
E-authentication team takes inventory
Troops in virtual combat (United Kingdom)
Put your mobile where your mouth is (United Kingdom)
Poor technology 'lets down' UK courts
Bush cybersecurity strategy to be a living document
Man's jailing over Web posting draws free speech advocates
China's First Genotype ID Card Comes Out in Wuhan
IT Widely Used in Chinese Military Schools
Uncle Sam to IT: Help fight cybercrime
Every dial you take
***********************
Roll Call
House Creates Panel
By Susan Crabtree
House leaders moved one step closer to creating a Department of Homeland
Security on Wednesday but have agreed to put off tackling nettlesome
committee turf wars until next year.
While Speaker Dennis Hastert (R-Ill.) and Minority Leader Richard Gephardt
(D-Mo.) hailed the bipartisan cooperation involved in Wednesday's easy
passage of a resolution to establish an ad hoc leadership committee that
will oversee the massive government reorganization, partisan seams were
already beginning to show.
The panel, chaired by Majority Leader Dick Armey (R-Texas), will consist of
a bipartisan group of nine House leaders with a one-seat GOP majority.
Majority Whip Tom DeLay (R-Texas), GOP Conference Chairman J.C. Watts
(Okla.), GOP Conference Vice Chairwoman Deborah Pryce (Ohio) and GOP
Leadership Chairman Rob Portman (Ohio) will make up one side of the
committee. The Democratic team will include Minority Whip Nancy Pelosi
(Calif.), Caucus Chairman Martin Frost (Texas), Caucus Vice Chairman Bob
Menendez (N.J.) and Rep. Rosa DeLauro (Conn.), assistant to the Minority
Leader.
Watts said leaders have agreed to allow the House Government Reform
Committee and all the panels who claim jurisdiction over some aspect of the
new department three weeks to review the issues that will arise in the
consolidation. After that time period, the chairmen will be asked to advise
the leadership committee on how best to proceed. But the ad hoc committee
will also begin to meet on its own - possibly as early as next week.
Armey, however, has indicated that the new committee will not be a forum to
settle long-term Congressional turf battles. He said a decision will be
deferred on whether to create a standing committee to oversee the new
department. For now, he wants to focus solely on building the legislative
structure for the agency with the goal of completing action by Sept. 11.
"There is no need and there's, frankly, little opportunity to restructure
our committee system this year," Armey said. "I don't think it's necessary
to do that."
Rep. Mike Oxley (R-Ohio), chairman of the Financial Services Committee,
wholeheartedly agreed.
"I don't think we want to look like a bunch of pygmies fighting amongst
ourselves when [Homeland Security Director] Tom Ridge and the president are
looking down waiting for us to get this done," he said. "We can worry about
the jurisdictional issues next year."
Armey got a taste of the intense nature of the jurisdictional battles ahead
at a meeting of committee chairmen Monday afternoon. During the gathering,
several angry chairmen lobbied hard to be included on the ad hoc panel to
no avail, according to knowledgeable GOP aides.
So far House GOP leaders are leaving their options open on just how they
plan to address jurisdictional issues when the time comes to do so. Staying
true to his anti-big government principles, Armey has argued against
establishing a permanent standing committee on homeland security.
But several key GOP lawmakers who privately advocate adding an additional
panel as the best way to solve the internal battles say no decision has
been made on that front.
Watts said he and the rest of the bipartisan group of leaders appointed to
the ad hoc panel are focused on getting the department up and running.
Watts said he did not want to create "headaches" for Hastert by lobbying
for another panel right now, but he indicated his support for adding a
standing committee as one way for solving the looming turf wars and noted
his credentials for serving as chairman of such a committee.
"I probably see us having a permanent committee," he said. "And we're
probably going to have to have another appropriations [subcommittee] to
figure out how this agency gets funded."
Later he said that he would leave any decision about who should chair such
a committee up to Hastert, but noted that he has "put as much work into
this issue as any other Member." Other GOPsources point to Portman as
another leading contender to chair any potential standing committee on
homeland security.
Hastert, meanwhile, was being inundated by requests as well while he
engaged in a slow-motion tug-of-war with Gephardt over the past few days
about the composition of the committee. The Speaker originally had called
for a six-five split on the committee, with a one-seat GOP advantage.
Gephardt argued for one less seat, realizing that it would be a political
nightmare to be forced to select one rank-and-file Member to join the four
top Democratic leaders on the panel. With Pelosi, Frost and Menendez all
angling for higher elected leadership office next year, it would be even
more difficult to include one of them without naming all three to the panel.
The decision to create a smaller ad hoc panel left no room on the GOP side
for Rules Chairman David Dreier (R-Calif.), who many Republicans expected
and Democrats feared would play a critical role in the process.
Even though Dreier is not an official Member of the ad hoc panel, House
Republican leadership aides believe the Rules Committee will play a key
role in shaping the homeland security legislation.
But Democrats are already trying to secure a commitment from House GOP
leaders to limit the role the Rules panel will play in the process. "The
Rules Committee is a tool to get 218 Republican votes," one Democratic aide
warned. "If we're not at the table, it's not bipartisan."
National Republican Congressional Committee Chairman Tom Davis (Va.) was
also disappointed about being excluded from the ad hoc panel, according to
GOP leadership aides. Davis has his sights set on the Government Reform
Committee gavel when he gives up the top spot on the campaign committee
after the November elections. In the past few weeks Davis unsuccessfully
lobbied Hastert to hand the homeland security issue over to the Government
Reform panel.
"There's just one problem in all of that," one GOP leadership aide said.
"It's called the November election."
Davis, however, claimed to have no hard feelings. "I support the Speaker's
decisions about this," he said.
******************
Reuters
Florida Police Bust Internet Prostitution Ring
Wed Jun 19,10:43 AM ET
TAMPA, Fla. (Reuters) - Police in Florida said on Wednesday they had broken
up an Internet prostitution ring that was operating in the United States,
Britain, Canada, France and Germany.
The Tampa-based Web site, bigdoggie.net, allowed prostitutes to advertise
and arrange dates with customers, the Hillsborough County Sheriff's Office
said in a statement. Some of the dates with adult movie star actresses cost
as much as $17,000 a night, the sheriff's office said.
As part of the two-year investigation, detectives posted a fictitious ad on
the Web site for "Lia Nice" using a photo of a bikini-clad female informant.
The ad, which offered the woman's services for $300 an hour, attracted
thousands of responses and six men were arrested for solicitation. They
agreed to cooperate in the investigation.
The sheriff's office said Charles Kelly, 51, of Tampa, Florida, and Steve
Lipson, 39, of Boca Raton, Florida, were arrested and charged with running
the service and 21 women in the Tampa area were arrested on prostitution
charges.
***********************
Associated Press
Computer Co. Founder Pleads Guilty
Wed Jun 19,10:26 PM ET
DALLAS (AP) - The owner of a Richardson computer company has pleaded guilty
to violating a federal order that prohibited him from exporting goods, the
U.S. Attorney's Office said Wednesday.
Ihsan Elashyi, 42, pleaded guilty this week to four counts of a 39-count
indictment returned in April, including charges of money laundering and
wire fraud.
Elashyi founded Tetrabal Corp., which sold and exported computer and
telecommunications equipment. Most of the customers were in the Middle East.
Elashyi previously worked for Infocom Corp., a company owned by his
brothers, prosecutors said. Infocom was the target of a three-day search by
a federal terrorism task force in September. An order freezing assets cited
a $250,000 investment by the wife of a political leader of the terrorist
group Hamas.
Federal Commerce Department ( news - web sites) officials had issued a
temporary denial order Sept. 6 to prevent Elashyi, his company and Infocom
from shipping goods overseas without authorization from the United States.
The order was issued because the government said Infocom had tried to ship
to Syria and Libya
In his plea, Elashyi admitted violating the temporary denial order by
trying to ship computers to Saudi Arabia on Sept. 22.
Prosecutors said Elashyi negotiated the sale of 119 computers to Saudi
Systems Inc. and accepted the company's wire transfer of $107,385 for the
computers. Authorities said Elashyi lied to Saudi Systems, telling the
company he could not return its money because his bank account had been
frozen by the United States.
Prosecutors said Elashyi also admitted he used other people's names to
obtain credit cards, which he then used for purchases and cash advances
totaling more than $750,000.
The money laundering count involves efforts to conceal the credit card scheme.
Elashyi could face a maximum of 50 years in prison and a fine of $1.25
million. His sentencing has been set for Sept. 9.
**********************
The Chronicle of Higher Education
Russian Mafia May Have Infiltrated Computers at Arizona State and Other
Colleges
By ANDREA L. FOSTER
Arizona state police officers seized two desktop computers and at least
five hard drives at Arizona State University earlier this month. The U.S.
Secret Service has warned that someone -- possibly the Russian mafia --
installed software in the computers that could record users' credit-card
numbers and other personal data. Computers at other colleges may be
involved as well.
Lt. John S. Sutton, a spokesman for the university police department, said
the state police had removed the equipment from three campus buildings.
Most of the affected equipment is in kiosks that anyone on the campus can
use, he said.
He said the Secret Service is taking the lead in investigating the case but
is receiving help from the state police.
The Secret Service declined to comment. "We have an ongoing investigation,"
said Mark Connolly, a spokesman for the agency.
The software installed on the computers captures keystrokes as they are
being typed and saves the data to a file, said John S. Babb, assistant vice
provost for information technology at the university.
"There seems to be a strong connection to the Russian mafia," he added. He
and Lieutenant Sutton declined to elaborate, saying the Secret Service had
asked them not to discuss the case.
Mr. Babb said the Secret Service is investigating whether the intruders had
also installed keystroke software in computers at colleges in Texas,
California, and Florida. He said he doesn't know which colleges are part of
the inquiry.
William E. Lewis, vice provost for information technology at Arizona State,
posted a message Wednesday to an e-mail discussion list for university
chief information officers. He provided details of keystroke-capturing
programs for which the administrators should be on the lookout on their own
computer systems.
The programs, Mr. Lewis wrote, include Starr Commander Pro, STARRCMD.EXE,
RADMIN, and ISPYNOW. "If unauthorized installations of the above files are
located or if log routers for authorized installs have been altered, please
contact your local Secret Service office," Mr. Lewis wrote.
Mr. Babb said the university did not know whether the suspected criminals
had obtained users' credit-card numbers or Social Security numbers.
Administrators are waiting for the Secret Service to tell them what, if
any, personal data were retrieved from the seized equipment.
The administration did not alert students about the incident after the hard
drives were confiscated, although most now know about it since it was
reported in the news media, said Mr. Babb.
"We wanted to warn students, but the Secret Service told us to wait."
Some students were upset that they were not notified immediately. "It's sad
there wasn't a warning issued, but I can understand that it would
jeopardize the investigation," said Erin Hawksworth, a junior at the
university who reported on the investigation for the student newspaper, the
State Press.
***********************
New York Times
Fears of Misuse of Encryption System Are Voiced
By JOHN MARKOFF
SAN FRANCISCO, June 19 - A leading European computer security and privacy
advocate is challenging an effort by the American computer industry to
create a standard to protect software and digital content, calling the plan
a smoke screen by established companies to protect their existing markets.
In a paper to be presented at a technical conference in Toulouse, France,
on Thursday, Ross Anderson, a University of Cambridge computer scientist,
attacks the Trusted Computing Platform Alliance, an organization formed in
October 1999 by Compaq Computer, Hewlett-Packard, I.B.M., Intel and
Microsoft. The companies say their intent is to provide a cryptographic
system that would ensure privacy and protect intellectual property.
The technology that the alliance has developed uses an encryption method
intended to identify computer hardware and operating system software and
determine that their configuration has not been altered. The companies say
it will help detect virus invasions and provide security for commercial
transactions like online purchases and banking.
But Dr. Anderson argues that the potential exists for the technology to be
used in a more sinister fashion: to create a new form of censorship based
on the ability to track and identify electronic information.
He compares the technology to a proposal by Intel in January 1999 to insert
a distinct serial number into each of its Pentium processors, an effort
that drew widespread consumer opposition after privacy advocates warned
that the technology could be used for surveillance purposes. The plan was
withdrawn.
Dr. Anderson also warns that widespread adoption of the standard from the
alliance, known as T.C.P.A., could put large United States computer
companies in a position to thwart competition by controlling who gets to
use the standard and on what computer platforms.
"The T.C.P.A. appears likely to change the ecology of information goods and
services markets so as to favor incumbents, penalize challengers and slow
down the pace of innovation and entrepreneurship," he wrote.
Spokesmen for Intel and for Microsoft said their companies had not been
able to review the paper and would not comment.
Dr. Anderson is a Cambridge computer scientist who is also chairman of the
Foundation for Information Policy Research, a British Internet policy
research group. In a telephone interview today from France, he said there
was growing concern within the European Union that the T.C.P.A. standard
could emerge into a competitor for so-called smart cards, used for
authentication, which are now the basis of a significant European industry.
"This is something that has potential macroeconomic effects, and it will
become the big new controversy over the next six months," he said.
Although encryption technologies have not been used widely in the personal
computer industry to protect intellectual property, they have become
standard in the video game market, where companies like Sony, Nintendo and
Microsoft use built-in encryption to protect against piracy and to force
software developers to pay royalties to write software for the game machines.
The T.C.P.A. standard would not directly control what software a user could
run on a personal computer. But according to several people who have
examined the specification, it could be used to make a catalog of software
on a machine available for action by a third party - barring, for example,
someone with decryption software from playing a copy-protected DVD.
That capability has touched off an internal debate within at least one
privacy rights group in the United States. The Electronic Frontier
Foundation has been discussing the implications of the technology this week
and is divided on the consequences.
"On the one hand some of our board members have argued that it might
effectively protect you from viruses," said Seth Schoen, the foundation's
staff technologist. "On the other hand some of our board members believe
that if any information is made available automatically to a third party
that is a privacy issue."
Among the board members who are potential defenders of the technology is
David Farber, a longtime computer industry technologist and a computer
scientist at the University of Pennsylvania. Dr. Farber said that he had
been on the alliance's advisory board for the last three years and more
recently had consulted with Intel and others about technical and social
issues related to the proposed standard.
"I was attracted to the T.C.P.A. effort due to its focus on providing
security and privacy in a dynamic, flexible way," he said. "It should be
capable of supporting a digital rights management regime that can be used
to both protect intellectual property and individual privacy and the
individual's fair use of the intellectual property."
The initiative, which would encrypt information while it was being
processed inside the computer, would also violate European Union directives
governing the transparency of computer data, Dr. Anderson said.
He said he was concerned as well that the advent of the standard would
permit the pursuit of previously impossible electronic censorship
campaigns, because the technology could make it possible to locate and
delete specific documents on any computer connected to the Internet.
"We could have a huge swing from the current situation where the Internet
can be used to distribute information to something at the other extreme,"
he said.
In May, with a fellow researcher, Dr. Anderson reported on a vulnerability
in the current generation of smart cards, which are used for identity and
financial transactions.
**********************
Reuters Internet Report
Music Labels Urged to Move Fast on Home Networks
Wed Jun 19, 1:15 PM ET
By Sue Zeidler
LOS ANGELES (Reuters) - With record labels suffering a downturn due largely
to piracy by unauthorized file-swapping on the Internet, a new report on
Wednesday urged the industry to move quickly on the next big digital thing
-- transferring songs from PCs to stereos.
"With each new digital technology that comes along, the music industry
seems to take a wait-and-see approach and as a result you end up with
situations like Napster ( news - web sites) when the industry is forced to
be reactionary and try to stuff the genie back in the bottle," said Joe
Laszlo, senior analyst with Jupiter Media Metrix.
"Sharing broadband connections between multiple PCs will drive early
adoption of home networks, but music will take it mainstream," he said.
In home networking, televisions, stereos and computers are connected,
allowing for the transfer, for example, of movies or music from one place
to another at high speeds, and also allowing Internet connections to be
shared.
In the new report, Jupiter Media Metrix said it expects about 23 million
U.S. households with online connections, or one-third of the total, will
have a PC-based home network by 2006, up from 6 million last year.
About 17 million of those homes have broadband connections, according to
the report, which will be presented at its Plug.In Forum July 8-9 in New York.
Jupiter sees two types of home networks emerging: one based on a PC and the
other on a TV-set-top box that would control stereos and TVs as well as
climate in the home.
Jupiter said it was advising equipment manufacturers, recording companies
and broadband Internet service providers to plan products based on the
emergence of these two home networks.
He said the music industry must try to shape consumer expectations by
designing devices that make both consumers and record companies happy.
Laszlo said products from Hewlett-Packard ( news - web sites) Co. ,
SONICblue Inc. and Simple Devices in San Mateo, California already provide
connectivity from a PC to a stereo.
"The recording industry needs to get its house in order and make a clear
statement like it wants to see strong digital rights management built into
these new devices," he said.
"Our companies support technology that offers the music consumer what they
want, where they want in a format that protects copyright," said a
spokeswoman for the Recording industry Association of America ( news - web
sites) (RIAA).
While Jupiter sees a strong consumer desire for a PC-based home network, it
cited several impediments, including high cost, complex set-up and
maintenance.
The forecast was based in part on a March 2002 random survey of 2,097
individuals via e-mail, Jupiter said.
**********************
New York Times
The Librarian's Web Dilemma
By JOHN SCHWARTZ
GREENVILLE, it seemed, was plagued with pornography. In the 12 public
libraries serving the city and its county in South Carolina, adults were
looking for pornographic images online and didn't care who saw them - and,
by some accounts, were showing the images to children passing by.
"We had parents say, `I'll never bring my child back to your library,' "
said J. David Sudduth, chairman of the Greenville County library system's
board. "It was a very unhealthy environment." After other measures proved
ineffective, the board decided to spend $2,500 a month on a filtering
service that blocks access to millions of Web pages with adult content. "It
just took that last step for us to get the kind of environment we want for
our library system," Mr. Sudduth said.
About 150 miles away, in the DeKalb County suburbs of Atlanta, another
library system tried a different tactic: shame. With its computers in plain
sight, it decided to have librarians enforce clearly posted rules against
downloading pornography with a firm tap-on-the-shoulder approach. "Handling
it the old-fashioned way, with people, has worked best for us," said Darro
Willey, the library director. "It's just a common-sense approach."
But in Virginia Beach, librarians decided that privacy, not policing, was
the most practical approach. Monitors of computers are recessed beneath the
surface of glass-topped desks, with a plastic hood further restricting the
view. Carolyn Caywood, a branch librarian, had concluded that urban areas
like Virginia Beach are not "villages" where shame might work magic.
"The larger the community, the more likely you are to get people who are
exhibitionists," upon whom embarrassment has no effect, she said.
Each library system says its approach is meeting its needs - and that,
librarians say, is the most important lesson of the pornography wars.
"Because libraries are so deeply rooted in their communities, librarians
have the best read on their communities and how to approach the issues
around Internet access," said John W. Berry, who stepped down this week as
president of the American Library Association.
And for now, at least, the decisions will continue to be made at the local
level. Three weeks ago, the latest Congressional effort to deal with the
issue, the Children's Internet Protection Act, was blocked by a three-judge
federal appellate panel in Philadelphia. While sympathetic to the goals of
the law, which required libraries to install Web filters or risk losing
federal funds for Internet access, the judges found the filters were too
crude to avoid blocking unobjectionable material that library patrons have
a right to see. The case is expected to go to the Supreme Court. Aside from
the federal effort, a growing number of state and local governments have
moved to require filters, a trend that librarians have joined forces to
combat.
"Libraries have always been about giving people choices, not restricting
them," said Maurice J. Freedman, the new president of the library
association and director of the Westchester County library system in New York.
The federal filtering law and other government attempts to limit Internet
access have failed so far because the Supreme Court has repeatedly ruled
that adults should not be limited to seeing only what is appropriate for
children if there are less restrictive alternatives.
In the ruling striking down the filtering law, Edward R. Becker, chief
judge of the Court of Appeals for the Third Circuit, wrote that technology
could not yet clear that constitutional hurdle in shielding children from
pornography. "Unfortunately, this outcome, devoutly to be wished, is not
available in this less than best of all possible worlds," he wrote.
So with the issue back where librarians say it should be - at the local
level - libraries face two issues: protecting children from stumbling onto
pornography while surfing the Web and dealing with adults who seek out
materials that are either blatantly obscene or at least inappropriate for
children.
Libraries tread cautiously in this area. Those that appear to do too little
risk coming under attack from anti-pornography groups and parents. Filter
too aggressively, however, and civil libertarians are likely to sue. When
the library board in Loudoun County in northern Virginia instituted a tough
Internet use policy that included a filtering requirement, civil liberties
groups sued, and in 1998 a federal judge declared the policy
unconstitutional. The library board voted not to appeal.
In Greenville, Mr. Sudduth said, groups had also threatened to sue the
library system if it imposed filtering, but no one actually did so after
the filters were adopted. "We worked hard on issues of censorship and
intellectual freedom," he said. The library system also ensured that there
was one unfiltered machine in each library - "kind of a relief valve," he
said, that could be used by people who had unsuccessfully tried to reach
legitimate sites on the filtered machines and brought the issue to librarians.
"We tried to put together a very reasonable policy that balanced the First
Amendment with protecting our community," Mr. Sudduth said.
The emerging standard for libraries - and an approach recommended in a
recent report from the National Research Council on protecting young people
online - is to give each user a choice of whether filters will be turned on
or off at any machine. That option is still a bit expensive and
technologically daunting for many libraries, but more and more are offering it.
At the regional libraries serving Fort Vancouver, Wash., the choice of
filtered or unfiltered Internet is tied to the user's library card number,
which is entered whenever an online session begins. Parents can specify
whether filters must be used with their child's account or can choose not
to allow Internet access at all, said Candace D. Morgan, the system's
associate director. She said that the system eliminated a problem faced by
patrons when the library has one bank of computers with filters and another
without. "You shouldn't have to declare to the world what you're doing by
what terminal you sit down at," she said.
But David Burt, a longtime anti-pornography campaigner and a spokesman for
N2H2, a company whose filtering systems are used in Greenville's libraries
and others, maintains that the Fort Vancouver solution is only a partial
one. "It does address the biggest concern most people have, which is to
protect their own children," he said, but "it doesn't do anything to
address people accessing child pornography" or trying to expose others to it.
"I hate to sound self-serving here, but I think filtering is the best
approach," Mr. Burt said. He compared unfiltered Internet access in
libraries to "having Hustler placed next to Highlights" on the shelf. "From
a common-sense approach, it makes more sense to deal with the pornography
problem before it comes into the libraries," he said.
The problem with exhibitionists, said Mr. Willey in Georgia, is that the
issue shifts from censorship to bad behavior. And while librarians debate
whether tap-on-the-shoulder enforcement of Internet use policies is an
invasion of the user's privacy, they all say that bad behavior predates the
Internet by generations, whether the problem is unwanted sexual advances,
drug abuse or consensual sex in the stacks.
"It is one of the safest public institutions, in my opinion, that you can
find - but it is still a public institution," said Judith F. Krug, the
director of the library association's Office for Intellectual Freedom.
"Sometimes bad people get in, and sometimes they do bad things." When that
happens, libraries have a range of responses, from asking the disruptive
person to leave to calling the police.
Ms. Krug, an opponent of the tap-on-the-shoulder method, suggested that
libraries set their browsers to return to the home page after a period of
inactivity to prevent the viewing of an objectionable image that someone
else has left on the screen.
Agnes Griffen, director of the Tucson-Pima Public Library in Arizona, said
that solutions - and public perceptions - needed to take into account the
libraries' resources and the realities of the setting.
Anti-pornography groups have tried to portray librarians as "people who
didn't care about little children," Ms. Griffen said. But the truth, she
said, is that librarians recognize that they can do only so much to protect
children. "We do care about children," she said, but added that "the myth,
the pleasant stereotype of the children's room, which we all love, isn't
there any more."
"We're not going to be able to sit behind the child and watch what the
child is looking at on the screen any more than we can follow them around
while they look at the books," Ms. Griffen said. "I'm very sympathetic, but
you can't expect the public library to do that job for you. We're here to
help, but we can't be the monitor or the censor or the nanny for children."
The question often comes down to an issue of limited resources, she said.
"We can barely keep our libraries open, much less hang over the back of a
kid looking at a PC," she said.
Ms. Griffen suggested that the battle over Internet use in libraries arose
in part from a deeper anger over broader changes in society. "Parents are
upset because they don't have enough time anymore to do the parenting they
wish they could do," she said. "They're unhappy about it and they take it
out on other people."
Mr. Freedman of the Westchester County libraries said that an anguished
mother had confronted him about her children's potential exposure to
pornography in the library. There are no filters on the library system's
computer network, he said, but one library, in Greenburgh, provides a
filter on a single machine in the children's section.
" `If you have cable,' I said to her, `your kid will be exposed to all
kinds of things,' " he said. "The parent has to take responsibility for
what the kid does at home, at other kids' homes, at the library or on the
street."
Ms. Krug of the library association said that in a world full of risks, the
library should be a place where young people can seek out information -
even information about sex - safely. "They can learn about it in the
library," she said, "or behind the library."
********************
News.com
Spammer attacks AOL Search
By Jim Hu
Staff Writer, CNET News.com
Search engines beware: Web spammers are becoming more sophisticated.
The latest case occurred Wednesday when America Online's AOL Search and its
technology partner Inktomi began displaying thousands of search results
that linked to a Web site based in Russia.
Web spamming, a term used to describe how sites trump legitimate search
results with their own pages, has been going on since the birth of search
engines. But this time, Web spammers have found a savvier technique.
Spammers copy a Web page and embed metatags into its source code with
instructions for a search engine's robots to revisit the duplicate every
day but withhold from caching it. The result is effective: False Web pages
disguised as legitimate sites appear high in a search engine's rankings.
"This is one way of spamming an engine," according to an Internet
consultant who discovered his site was mirrored but did not want his name
used. "It's actually brilliant."
AOL and Inktomi pulled the bogus results linking to the Russian site
Wednesday and downplayed the attack, saying the number of results was
miniscule compare to the billions of results served every day to Web users.
"This minor incident only affected a comparatively very small number of
available Web sites off of AOL and on the Internet," AOL spokesman Nicholas
Graham said.
Beyond its immediate affect, the attack represents the next step in an
evolution of the Web's greatest nuisance: spam. Internet users are all too
familiar with junk e-mail, incessant unsolicited marketing pitches that
flood people's in-boxes. In the same way, Web spam has become a tremendous
headache for search engines that are constantly trying to provide people
with the most relevant and unbiased results.
The battle has led to an arms race between spammers and search engines.
Several commercial software products have been developed to give sites the
tools to boost their placement on search engines, such as FirstPlace
Software's WebPosition Gold.
Well-known techniques include link spamming, in which hundreds or thousands
of bogus sites are created that all point to the same page. Such efforts
can fool search algorithms that count links as a measure of a site's
relevance. Spammers may also use so-called automated queries to constantly
check the status of their sites and test changes aimed at driving them up
the rankings.
In a sign that the problem is growing, Google in April shut down some 100
Comcast customers, citing violations of terms of service banning automated
queries on its database.
"The spammers out there are constantly trying to get into search engines,"
said Vishal Makhijani, general manager for Inktomi's Web search. "Cottage
industries have been built to help content providers to try to draw you to
their sites."
***********************
Washington Post
ICANN, Dotted With Doubts
Role as Domain-Name Manager In Danger as Criticism Grows
By David McGuire
washingtonpost.com
Thursday, June 20, 2002; Page E06
Questions about who should control the Internet's complex global addressing
system are mounting as the current governing body weighs whether to do away
with plans for international elections to is board.
The Internet Corporation for Assigned Names and Numbers, a 19-member
international standards-setting body that operates under the auspices of
the U.S. government, manages the address system.
ICANN makes decisions about who may distribute Internet addresses, how much
domain names cost, and what addressing suffixes (.com, .net, .org, .biz,
.info and others) are added to and removed from the system.
But while ICANN continues to make those decisions, it faces criticism from
public interest advocates and members of Congress who complain the group
has enacted too many key policies by fiat and has failed to includeenough
ordinary Internet users in its decision-making.
As an example, many critics cite that ICANN once gave representatives of
companies that were proposing new domain suffixes just three minutes each
during a hearing to defend their ideas before the board made its choices,
which were not subject to appeal.
The Commerce Department, which oversees ICANN, plans to decide in September
whether to renew the agreement under which ICANN manages the domain-name
system.
"Barring significant changes, we'll have to look at alternatives to ICANN,"
said Rep. John M. Shimkus (R-Ill.), a member of the House Energy and
Commerce Committee.
Another Commerce Committee member, Rep. Edward J. Markey (D-Mass.), was
more blunt: "Although ICANN is supposed to be a consensus-based
organization, the irony is that the only thing it has achieved global
consensus on is that it is a failure."
Few dispute that ICANN needs major repairs. ICANN President M. Stuart Lynn
said as much earlier this year.
Just weeks before ICANN was scheduled to vote on a proposal that would have
allowed Internet users to elect several members of ICANN's board of
directors, Lynn proposed that ICANN scrap elections altogether in favor of
developing a faster-acting decision-making body.
Lynn has proposed a structure under which an internally selected nominating
committee would choose much of ICANN's board. That committee would be
charged with ensuring that all its nominees were committed to upholding the
public interest, Lynn said. ICANN is scheduled to vote on the proposal at a
meeting in Bucharest, Romania, later this month.
Most of ICANN's 19 board members were appointed to their posts through an
internal nomination process. ICANN staged global elections over the
Internet in 2000, seating five members. But Lynn worries such elections are
too easy to corrupt by special interest groups attempting to capture board
seats. And he said too much public process can hamper ICANN's ability to
act expeditiously.
"Public participation is a broad and undefined term," Lynn said. "The
reason why we are a private organization is that government organizations
-- by their very nature -- tend to be deliberative and take a very long
time to make decisions, whereas ICANN needs to be agile and effective."
Some public interest groups have become so exasperated with ICANN's stance
on public involvement that they are calling on the Commerce Department to
force ICANN to compete for the right to operate the domain-name system.
"Requiring ICANN to compete against qualified bidders will provide a strong
incentive for ICANN to engage in a thorough housecleaning and become more
genuinely responsive to the comments of stakeholders," the groups wrote in
a letter to Nancy Victory, chief of the National Telecommunications and
Information Administration, the Commerce Department agency that directly
oversees ICANN.
The American Civil Liberties Union, Consumers Union, the Consumer
Federation of America, the Electronic Privacy Information Center and the
Electronic Frontier Foundation all signed the letter, which was organized
by the Washington-based Media Access Project.
The groups argued that ICANN has repeatedly refused to give the
international public any meaningful role in Internet governance.
Testifying before a Senate Commerce Committee subcommittee earlier this
month, Victory acknowledged many of the criticisms leveled at ICANN, but
recommended that the group be given the opportunity to initiate its own
reforms. She said the September deadline for renewing ICANN's agreements
would be a good time to gauge whether the organization is moving quickly
and in the right direction toward meaningful change.
Questioning the Process
ICANN was formed in 1998 as an alternative to U.S. hegemony over the
Internet. Until then, the Commerce Department directly managed the system.
Although incorporated in Marina del Rey, Calif., ICANN convened an
international board of directors intended to represent Internet
"stakeholders" from around the world. But it has long wrestled with the
question of how to get a broader cross-section of Internet users involved
in decision-making -- a key tenet of the entity's agreement with the
government.
Congress started taking a closer look at ICANN in 2001 after the
organization approved seven new Internet domains designed to boost
competition and ease crowding in the .com, .net and .org domains.
Responding to an ICANN request for proposals, nearly 50 organizations and
companies from around the world plunked down nonrefundable fees of $50,000
each as they submitted bids to operate new domains.
When ICANN rejected most of those proposals, several losing bidders took
issue with the process ICANN used to select new suffixes. Those complaints
sparked a contentious congressional hearing in February 2001.
At that hearing, Markey questioned ICANN Chairman Vinton G. Cerf on the
criteria the board used to choose the seven winning bids. Markey said he
was particularly concerned by the absence of an appeal process for losing
bidders.
"It was a very arbitrary process with no appeals, and ultimately it's the
antithesis of what the Internet is supposed to be, which is a democratizing
influence on the world," Markey said.
Some say the United States should tread carefully in trying to force
change, lest it provoke a backlash from the rest of the world.
"The expectation is that ICANN is a global organization with equal input,"
said Theresa Swinehart, ICANN's counsel for international legal affairs. If
the U.S. government throws its weight around too much, important
international participants in ICANN could turn their backs on the process,
she said.
For his part, Lynn said ICANN's critics focus too much on the way the group
does things and not enough on what it does.
"They're interested in process, not in substance," Lynn said. If ICANN
moves in the direction of expanding and lengthening its processes, rather
than streamlining them, "we may as well be a government organization," Lynn
said.
***********************
Washington Post
Taking Security Concerns Private: U.S. Appeals to IT Firms
By Michael Barbaro
Page E05
It is the common cry of the federal administrator sitting across the table
from the private entrepreneur: "I do not have the staff with the
technological experience to do what you do."
That was how Sallie McDonald, assistant commissioner of the General
Services Administration's Office of Information Assurance and Critical
Infrastructure, characterized efforts to protect federal information
technology systems and develop rapid national response mechanisms. And it
underscores a new consensus among many top technology advisers in
government that the only way to protect the nation's vital computer systems
is to reach deeper into the private sector, while making federal agencies
more accessible to innovative and little-known companies.
"Our mantra is that we do not have the answers," said Paul Kurtz, a member
of the President's Critical Infrastructure Protection Board and the
National Security Council. "Many of the answers lie outside the Beltway."
The federal government is now mining the IT industry to develop some of its
most ambitious security projects, from a national early warning system to a
comprehensive system of software to resist cyberterrorism.
"If you have a solution, you need to come to government," Kurtz told about
150 IT representatives yesterday at a panel sponsored by TechNews.com, a
division of washingtonpost.com.
Since Sept. 11, it has become clear that the federal government is not
equipped to shield national technology systems on its own. So it is turning
to, and at times pleading with, private industry to step into the breach.
That is expected to translate into higher investment in data-protection
technology, information-sharing systems and network-integration services,
IT marketers and executives said.
The shift to private industry for this kind of security is not entirely
new. In 2000, President Clinton signed the Government Information Security
Reform Act, known as GISRA, which requires agencies to integrate security
programs into their computer networks and capital investment plans. The
price of noncompliance is budget cuts, said Capt. J. Katharine Burton,
assistant deputy manager of the National Communications System, a group of
22 federal departments and agencies.
"Many agencies are afraid they will not get money and they are now doing
things they should have been doing long before," McDonald said.
Sept. 11 accelerated the IT security imperative, and so, too, has the
president's new emphasis on homeland security. The Bush administration has
proposed increasing spending on IT security for fiscal 2003 to $4.2 billion
from $2.7 billion for fiscal 2002.
IT firms from across the nation attended yesterday's panel for a few
minutes of face time with the administrators who route lucrative federal
contracts to government agencies. Sales director Michael Laracuente flew in
from California to hand out business cards for Captus Networks, a New
Jersey-based firm that develops software to protect Web pages against
predatory Internet use.
"Everyone wants to do business with the federal government," said Keith
Harris, founder of Virtual Universe of Gaithersburg, which wants to sell
"virtual offices" to the government. Virtual offices would allow agencies
to continue to operation if their offices and computer networks are
attacked. Harris's company is two years old, and he has no government
contracts.
************************
Washington Post
Internet Providers Team Up to Lobby FCC
BroadNet Alliance Says Agency's Plans Would Eliminate Access to Phone Networks
By Yuki Noguchi
More than 100 independent Internet service providers formed a new coalition
earlier this week to fight what they say are unfair policies that favor the
regional telephone giants and hurt the deployment of broadband.
The BroadNet Alliance, based in Washington, plans to lobby the Federal
Communications Commission to abandon proposals it says would threaten its
members' ability to provide Internet service because they would no longer
be able to access the regional phone companies' network.
Right now, ISPs depend on their ability to buy access to regional phone
companies' networks at wholesale rates, because it is economically
impossible to build new phone lines into every home in the United States,
said Maura Colleton, executive director of BroadNet. ISPs generally resell
that network connection to customers.
Three similar proposals before the FCC would take away that access,
according to Colleton.
Two of them would reclassify high-speed access as an information service,
which means it would not be subject to telecom regulations, and ISPs would
no longer be able to buy network access at wholesale rates. The third
proposal would change existing rules that dictate which parts of the
network regional carriers must share with their competitors -- a measure
that could potentially have the same effect as the other two proposals.
BroadNet, which is funded by $150,000 from ISPs that include EarthLink and
WorldCom Inc., is up against better-funded competition.
Regional phone giants such as Verizon Communications Inc. and SBC
Communications Inc. have made great strides, both in the market and with
regulators and Congress. They have argued that requirements to share their
infrastructure -- especially the newer souped-up networks that deliver
high-speed Internet access -- with upstart competitors have hurt them
financially and discourage broader investment in networks around the country.
"Right now the rules don't work because there are disincentives to
investment because we have to open up our networks to competitors," said
Allison Remsen, a spokeswoman for the Washington-based U.S. Telecom
Association, a group that represents the interests of the regional phone
companies. "There's a lot of risk in making these investments," and the
current rules give little incentive to competitors to build their own
networks if they can get it at below cost, she said.
The FCC is expected to rule on these matters later this year. The final
rules may be pushed into next year because the commission has extended its
deadlines for public comment, because of recent court decisions challenging
some of the commission's rules.
"These are pending items, so the commission cannot comment," said Michael
Balmoris, a spokesman for the FCC's wire-line competition bureau.
More stories in TELECOM online at washingtonpost.com/technology.
***********************
Washington Post
Firms Vie for Right to Operate '.org' Domain
By David McGuire
Page E05
The battle for the right to operate the Internet's fifth-largest addressing
suffix began in earnest Tuesday, as three Washington area groups joined
others from around the world in a race to become the next operator of ".org."
Created alongside .com and .net more than a decade ago, .org is the online
home to many of the world's political, nonprofit and philanthropic groups.
With Internet addressing giant VeriSign Inc. slated to relinquish its hold
on .org in December, Internet authorities are searching the globe to find a
new home for the popular domain.
Public interest advocates are closely following that search.
The .org domain suffix "is a space that has a special role, particularly
for noncommercial and political organizations that don't necessarily have a
home in .com," said Alan Davidson, associate director of the Center for
Democracy and Technology. That community wants to make sure that the next
.org operator preserves the domain as a haven for noncommercial speech,
Davidson said.
On Tuesday, the Internet Corporation for Assigned Names and Numbers (ICANN)
announced that 11 companies and organizations from around the world had
applied to operate the domain. Washington-based Internet addressing firm
NeuStar Inc., the newly formed DotOrg Foundation, and the Reston-based
Internet Society are the three local applicants.
ICANN, which oversees the Internet's global addressing system, will appoint
one bidder as the new .org operator in August.
Although traditionally thought of as a home for nonprofit organizations,
.org is, and will remain, open to all registrants. ICANN accepted bids to
operate the domain from companies and noncommercial groups alike. ICANN
Vice President and General Counsel Louis Touton said that while some of the
criteria may favor noncommercial bidders, ICANN's primary goal is to find a
secure and stable home for .org.
One of the companies seeking to operate the domain, NeuStar, already runs
the ".biz" domain and America's sovereign ".us" suffix.
The nonprofit Internet Society is another bidder likely to garner attention
from the noncommercial community. Founded in 1991 with the broad goal of
fostering international cooperation and participation in Internet
development, the society has members in 100 countries.
Rounding out the Washington area applicants is the nonprofit DotOrg
Foundation, which was founded for the sole purpose of applying to operate
the .org domain.
ICANN charged each applicant that submitted a .org bid a $35,000 processing
fee.
************************
Washington Post
New Security Software Gets Jump on Cyberattacks
Joab Jackson
Wednesday, June 19, 2002; 4:45 PM
In 2001, the Federal Computer Incident Response Center was notified of
6,683 attacks, ranging from defacing Web sites to break-ins of an agency's
central "root" servers. In 2000, the agency that monitors malicious attacks
on federal systems was notified of only 586; in 1999, that number was 580.
These numbers have many industry and government officials worried whether
agencies have enough manpower to keep up with the increasing number of
attacks on their computer systems.
Although the federal government has increased spending on information
security - from $1 billion in 2001 to $2.7 billion in 2002, according to
market research firm Input Inc. of Chantilly, Va. - the amount of
information passing through government systems and the evermore complex
nature of security threats guarantee that even these additional dollars
will be spread thin.
Addressing this problem are software companies that have produced solutions
that attempt to foresee threats sooner and simplify the workload for
administrators.
"Traditionally, many of the technologies are reactive in nature. We have
more of a proactive solution," said Dave Hammond, director of marketing at
Okena Inc., a Waltham, Mass., firm that sells about 50 percent of its
security software to government agencies.
Industry observers are seeing pressure on systems administrators from two
areas: increasing network capacities and more complex threats, both of
which strain traditional security components.
"Government agencies are requiring one gigabit networks, whereas 100
megabits were adequate two years ago," said Randy Richmond, group manager
within the federal network systems unit of Verizon Communications Inc., New
York, which provides managed network services.
As network throughput grows, Richmond said, firewalls and intrusion
detection systems struggle with an increasing number of data packets.
Add to this the changing nature of the threat. According to David von
Vistauxx, managing director of a Silver Spring, Md.-based security
practices coalition called the Organization for Infrastructure Security,
agencies may be more "prepared to fight the last attack, not the current
one," he said.
For example, a June 10 General Accounting Office report criticized the Army
Corps of Engineers for not adequately securing its financial management
system, even though the corps had addressed many problems called to its
attention by an earlier GAO audit. Among the new problems identified was
the corps' failure to correct "continuing and newly identified
vulnerabilities," the report said.
Increasingly, security software providers are gearing their solutions
toward anticipating future threats, ones whose methods of attack may be
new, rather than just guarding against the kinds of attacks that have
already occurred.
Okena, for instance, sells software called StormWatch that monitors
computer applications to ensure they don't perform any activities outside
their boundaries.
"We're defining policies for appropriate application behavior," Hammond said.
Network Associates Inc., Santa Clara, Calif., also has developed a
proactive approach through the release of its McAfee ThreatScan software.
Brian McGee, group product marketing manager for Network Associates, said
this product is "designed to help a security administrator find
vulnerabilities in the network that might be attacked by viruses or other
malicious code."
"It is specifically targeted at the vulnerabilities that get exploited by
viruses," McGee said, in contrast to virus protection software that checks
for the presence of malicious programs themselves.
In May, NFR Security Inc., Rockville, Md., released a version of its
intrusion management system that includes a forensic analysis tool that
mines security data for pertinent characteristics that could be used to
guard against future attacks.
"Security must be considered a process rather than a single technology,"
said Jack Reis, chief executive officer of NFR Security.
Advanced detection systems such as these can be valuable tools, but
agencies need knowledgeable systems administrators who know how to use
them, said Ira Winkler, chief security strategist for Hewlett-Packard
Consulting, a unit of Hewlett-Packard Co., Palo Alto, Calif., during a June
6 Washington Technology conference on information assurance. Otherwise, the
data about possible break-ins will just go unused.
And this is where administrators need the most help, officials said.
"There's a ton of data out there. You look at those logs from intrusion
detection systems and firewalls that are millions of lines long. No one has
time to look through all of them," said Albert Turner Jr., a senior vice
president for SilentRunner Inc., a subsidiary of Raytheon Co., Lexington,
Mass.
Raytheon spun off this business unit to address the growing customer base
for more visually oriented tools to help system administrators track
threatening behavior. In May, the company released a new version of its
analysis tools.
"SilentRunner's customers have the power to [expedite] network security
decision-making efforts," said Jeff Waxman, chief executive officer of the
company.
Also looking to lighten the administrator's load is Symantec Corp.,
Cupertino, Calif. In April, the company signed an agreement with Defense
Information Systems Agency, which oversees the Defense Department's
cyberinfrastructure, to supply personnel onsite to help install and manage
Symantec's Internet security solutions.
Staff Writer Joab Jackson can be reached at jjackson@xxxxxxxxxxxxxxxxxxxxx
********************
Washington Post
Citizen Tips on Terrorists: Leads or Liabilities?
Government Investigators Say Sorting Through Reports From the Public Is
Proving Difficult
By Ariana Eunjung Cha
Washington Post Staff Writer
Wednesday, June 19, 2002; Page A08
The young hacker sounded frantic. He said he had been on the digital trail
of some people he believed were involved in the Sept. 11 attacks and
overheard them plotting a new one. This time the target would be "Brine,"
an apparent code name that seemed to refer to Salt Lake City.
It was Feb. 8, just hours before the opening ceremony of the Winter Olympics.
Travis Bernard Wright, 20, a computer consultant, was on the phone with the
FBI. He told the government agents he had broken into a private Yahoo chat
room and intercepted messages that showed someone was preparing to launch a
missile at the area.
America's anti-terrorism forces responded: Warnings went out to the local
police and the Olympics organizers, radar images were scrutinized. The new
intelligence data were forwarded to high-ranking officials in the Bush
administration.
But the weeks passed without incident, and now irate federal officials
contend that Wright made up the whole thing. The government charged the
Houston man with two counts of making false statements to federal
authorities, an accusation he denies.
His case, scheduled to go to trial Aug. 5 in U.S. District Court for
Southern Texas, demonstrates how complicated it has become since Sept. 11
for the government to sort through the many tips from vigilantes,
do-gooders, tattlers and the like.
"He certainly came in with detailed information. Frankly, it was clear this
was more than 'I heard that he said, she said' kind of thing, so we took it
quite seriously," FBI agent Bob Doguim said.
Wright pleaded not guilty. He said the messages he discovered were genuine
and that he made his report only because he was trying to help.
If convicted, he could be sentenced to 10 years in prison and be fined
$500,000. He's among the first of what the government says will be dozens
of people to be charged with making false statements to federal law
enforcement officials in the aftermath of the Sept. 11 attacks.
Many of those allegedly erroneous reports were offered after the government
urged the public to relay tips and get involved in homeland security. The
FBI alone has received more than 435,000 calls on a telephone line it set
up to field reports.
The FBI has since disconnected the telephone line, and some now wonder
whether encouraging ordinary citizens to come forward on such a grand scale
did more harm than good.
"There have been thousands of cases where tips have wasted police
resources, sent them on wild-goose chases and caused people tremendous
anguish," said James Alan Fox, a professor of criminal justice at
Northeastern University in Boston. While the nation's anti-terrorism forces
were responding to false alarms, "a real fire may have been burning out of
control."
Rep. Jane Harman (D-Calif.), the ranking member of the House Intelligence
Committee's subcommittee on terrorism and homeland security, said she would
not want to discourage people who think they have information from coming
forward. But she said the FBI needs better technology to sort through the
reports.
"Enlisting the public's help to garner clues of future attacks is not only
prudent, but necessary to ensure our homeland security. But the current
system needs improvement," Harman said.
Representatives of both federal and local law enforcement
teamscharacterizethe unsolicited tips that have come in as helpful and said
it is law enforcement's duty to pursue every report, even those that are
almost certainly the product of urban legends, rumor, hearsay or pranks.
"The primary goal is to preserve the safety of citizens and the protection
of property. To that goal, I think the public expects us to treat every one
of these cases as if it's real," said Abran "Abe" Martinez, an assistant
U.S. attorney in Houston andthat region's anti-terrorism task force
coordinator.
Nonetheless, federal and local law enforcement officials acknowledge that
they have been rethinking their strategy. The FBI now refers tipsters to
field offices, which are more difficult to get through to, weeding out the
lazy pranksters. They also have begun to crack down aggressively on sources
they believe are lying.
In addition to Wright, at least two others in Houston alone have been
charged since January with making false reports.
WhenSol Villegas called a tip line on Dec. 18to say she had learned that a
known terrorist was planning to contaminate a water treatment plant with
cyanide, the FBI dispatched a team of chemists and other specialists to the
Houston site and field agents to the suspect's home. The plot turned out to
be fiction and the woman, who was in the United States illegally, is likely
to be deported.
In another case, a woman told the FBI shortly after Sept. 11that her
husband had been in contact with two of the hijackers who flew planes into
the World Trade Center and the Pentagon. Shahlah Jaffer Hussain said her
husband received a coded e-mail message that depicted a bomb, an airplane,
a skull, a jihad symbol and the buildings of the World Trade Center.
Hussain later admitted that she had lied. She is scheduled to be sentenced
next month.
Law enforcement officials said they focus their prosecution efforts on
people who knowingly offer false leads. "I'd forgive a 5-year-old calling
911 and saying there is a monster out there," said Kenneth Bryan, a D.C.
police spokesman.
Travis Wright's tip came as the nation was still in a hair-trigger state,
when even a single report by a single young man could set off a chain of
events.
Tom Moran, Wright's lawyer, said the young man began to spend much of his
free time after Sept. 11 searching the Internet for clues about the
attackers. Wright, who is self-employed and has worked in systems
administration for various businesses in Houston, including KPRC-Channel 2,
owned by The Washington Post Co., had been reading e-mail in some online
newsgroups when he came across something unsettling: a user who was
celebrating the attacks.
Moran said Wright began to shadow the suspicious online correspondent,
working up elaborate software programs to monitor the person's every move.
He said he had traced the person's Internet connection to an address that
belonged to an acquaintance of one of the Sept. 11 hijackers.
He told his mother, friends, co-workers and the press, including a reporter
for The Washington Post, about his findings; all of them advised him to go
to the authorities.
When the FBI first heard from Wright about the alleged threat to Salt Lake
City, they were so alarmed that they invited him to their offices in Houston.
He arrived loaded down with what he said were transcripts of online
conversations between the suspects and a technical description of the
software program he used to spy on the apparent conspirator and some of
those he came into contact with.
The Houston agents roused Christopher S. Merriam, a Justice Department
lawyer in the District. Merriam spoke to Wright on the phone and asked him
to e-mail the messages he captured on the Internet. The cryptic notes that
Wright provided made references to missiles and were so convincing that
government officials contacted the security detail at the Winter Olympics
in Salt Lake City and anti-terrorism specialists around the country.
But soon the officials became suspicious. How did Wright break into chat
rooms? Why couldn't Wright reproduce the program he said he had used to
capture the alleged suspects' conversation? And why did Yahoo's logs show
that the accounts of the people Wright was supposedly tracking did not
exist at the time he allegedly captured their conversations?
The final straw came when Wright, according to law enforcement authorities
and his attorney, failed a polygraph test.
Wright, arrested on April 3, is now free on a $100,000 bond. He is
prohibited from accessing the Internet, and police took away his computers.
Moran said that while Wright may not have discovered a new terrorist plan,
he was honest about what he found and had the best of intentions when he
went to the FBI.
"The kid's a computer whiz, and he came up with a program that found
something bad might happen," Moran said. "And, like a good citizen, he
called the authorities."
Wright has said that he did indeed breach Yahoo's security system and that
he wasn't able to use the software he developed to spy on other users
because it was written for a certain chat room with certain users, all of
which disappeared after the "Brine" conversation.
His attorney characterized the case as the type of misunderstanding that
results from chaotic circumstances, analogous to what happened to security
guard Richard Jewell at the 1996 Olympic Games in Atlanta.
Several news organizations reported that Jewell was suspected of setting
off a pipe bomb; he was later cleared.
Wright's mother, Nancy, 49, said the past few weeks have been filled with
anxiety and confusion that Jewell must have felt before his innocence
became clear.
"Travis," she sighed, "is getting gray hairs."
************************
Washington Post
New technique promises smaller, faster chips
SAN JOSE, Calif. (AP) - A technique that molds patterns into silicon could
promise smaller, faster and cheaper computer chips that also are
environmentally friendly to make, researchers say.
The process, reported in Thursday's edition of the journal Nature, involves
embossing molten silicon with a quartz mold. The current technique involves
etching features into a silicon wafer with a combination of light and
caustic chemicals.
"The advantage of our approach is a feature size that can be 10 times
smaller," said Stephen Y. Chou, the lead researcher and an electrical
engineering professor at Princeton University.
The process, if further studies prove its validity, could help drive future
innovation in the semiconductor industry.
For nearly 40 years, progress has been the result of squeezing more
transistors onto chips. Intel co-founder Gordon Moore predicted in 1965
that transistors on a given chip would double about every 18 months.
Moore's Law, as his observation is now known, has held true, though some
believe a physical barrier will ultimately thwart further shrinkage.
One such dead end may be in manufacturing. The current process involves
shining light through lenses and a mask onto a wafer of silicon covered
with chemicals that react to the light. After a wash, the process is
repeated four to 30 times until the complete chip is finished.
As transistors shrink, the equipment grows more expensive - as much as $10
million today but expected to rise to $20 million. Light waves themselves
might be too large to etch the smallest future transistors.
The industry is working to further extend Moore's Law by shifting to higher
and higher frequencies of light, such as extreme ultraviolet.
"If progress falters, Moore's Law will fail and this could be disastrous
for the semiconductor industry," said R. Fabian Pease, a Stanford
University electrical engineering professor, in a commentary on Chou's
research published in Nature.
Chou's technique has its roots in mechanical printing. A mold of quartz is
etched out with features and is placed against the silicon wafer. A blast
of laser light melts the silicon, which then takes on the features of the
quartz mold.
Chou's team created features of about 140 nanometers but report details at
about 10 nanometers, or billionths of a meter. By comparison, tests of the
latest lithography techniques can create features of about 30 to 70 nanometers.
Traditional etching also can take up to 20 minutes to make a single chip.
Chou's team could do the same in a quarter of a millionth of a second.
The technique would eliminate the need for some of the more expensive
optical equipment used in traditional chip making.
"It's a simple physical process," he said. "It's low cost, fast and it's
environmentally clean."
Similar techniques were tried by the semiconductor industry in the 1960s
but were dropped because of persistent defects, Pease said.
"But in the decades since, there have been tremendous advances in managing
defects," he said.
***********************
Federal Computer Week
El Paso rolling toward e-gov
If everything goes as planned, El Paso, Texas, will have around-the-clock
e-government running by the end of July, a pretty big advance given that
many city employees didn't even have Internet access a year ago.
When Jim Pulliam arrived at that time as El Paso's director of information
technology, information technology was still pretty new to the city. The
city Web site was not a good one, three different word processors were used
throughout the government, files could not be sent from one incompatible
system to another and a help desk wasn't even available to sort out
problems, he said.
On the plus side, there was a fiber network with a huge amount of available
bandwidth, but it wasn't being utilized and none of the city's departments
were using the Internet.
"However, from my point of view, this turned out to be a good thing because
I could build [the IT infrastructure] almost as new and not have to mess
around with things that were already in place," Pulliam said.
The city has relied primarily on Computer Associates International Inc.
technology to centralize network management throughout the government and
build e-mail service for internal use among employees and for
government-to-citizen connections. The company's CleverPath Portal will be
used to provide Web-based services for citizens as well as global access
for employees to internal government functions.
The IT construction process has moved into its third and final phase to
install such things as network security and a PeopleSoft Inc. financial
backend system. One of the final elements will be installation of the
network operating center that will oversee daily management of the whole
enterprise.
With about 65 percent of city employees now using the Web, Pulliam said the
next thing is to move online government into the community, with access
points in places such as libraries, senior centers and recreation centers,
and at kiosks in hardware stores.
"The idea is to build these cybercenters so that no matter where people go
in the city, they will be able to do city business online," he said.
*******************
Federal Computer Week
Air Force lab opening info exchange
The Air Force Research Laboratory (AFRL) soon will use a new system that
enables its many technology directorates to exchange business information
with each other and submit it to headquarters with the click of a button.
The AFRL, which develops technology for information warfare tools, air and
space vehicles, sensors, and munitions, recently completed a prototype
project to streamline information exchange among its 10 technology
stakeholders using an integration platform from webMethods Inc.
The purpose of this project is to demonstrate the possibility of tying
"separate and distinct [legacy] information systems via technology that
allows you to transfer the data automatically," said Ricardo Negron, chief
of the AFRL's technology transfer branch.
In the prototype, Booz Allen Hamilton served as the system integrator of
webMethods' software, enabling direct connection between the legacy systems
of the AFRL's Directed Energy Directorate - the Defense Department's center
of expertise for lasers and other directed energy technologies - and the
Space Vehicles Directorate, which is the Air Force's center of excellence
for space research and development.
The webMethods integration platform enables the AFRL to consolidate program
information from its nine technology directorates and the Air Force Office
of Scientific Research, and centralize data in the Programming, Planning
and Budgeting System.
The prototype system, valued in the "hundreds of thousands" of dollars, was
begun in February and was completed April 15, Negron said. It is being used
with test data, but Negron said it would begin using the directorates'
official information beginning next month.
AFRL headquarters, located at Wright-Patterson Air Force Base, Ohio,
communicates the details of warfighting technology projects to the
service's major commands and main headquarters, as well as to DOD.
Currently, each technology directorate maintains and manages project
information in customized formats, which involves manual processes for
translating, validating and transmitting information. For example, one
project took two people about a month to sift through data checking for
errors, and now, that is basically done in real-time, Negron said.
Using the webMethods software, AFRL can securely access validated data, in
real-time, in a variety of formats from the directorates, said Len Pomata,
president of webMethods' federal business unit. He likened the company's
integration platform to an "information bus" that helps connect
applications and databases.
"That's difficult to do and usually takes custom codes," which is what AFRL
had to do in the past, Pomata said. "WebMethods' technology can connect
those with very little effort."
Security, namely 128-bit encryption, is also built into the webMethods
platform, an Air Force and federal government requirement, he said.
The prototype system helped to demonstrate that the data integration could
be successful on a larger scale, Negron said. As a result, AFRL recently
completed the request for proposals and is currently gearing up to
implement a multimillion-dollar Enterprise Business System (EBS), which
will link all 10 directorates nationwide.
****************
Federal Computer Week
Fairfax offering electronic alerts
A Northern Virginia city has implemented a messaging system that provides
residents and employees with real-time electronic alerts during emergencies
as well as offers reminders and notifications.
To subscribe to the free service, Fairfax residents must provide their
name, address and phone numbers (www.ci.fairfax.va.us/emas) to receive a
log-in and password. Users can then choose from 24 categories - including
weather alerts, road closures, school closings, bid notifications and even
dog tag reminders - and receive e-mails or text messages on cell phones or
pagers.
Gail Bohan, the city's information technology director, said 150 people
have already signed up for the system, which was unveiled June 11. She said
the need for such a system was precipitated by the Sept. 11 attacks and the
communication problems that resulted in New York City.
An example of its use could be if a snowstorm blacked out the telephone
lines in the city, then residents and employees could be alerted through
alternative means, she said. The system could be used to alert parents to
early school closings or to inform motorists about traffic jams. She said
city department heads and supervisors could use it to contact their employees.
Shortly after Sept. 11, she said Dave Balroop, director of Fairfax-based
Advanced Software Systems Inc.'s wireless mobile commerce division,
contacted her about the company's newly developed Electronic Message Alert
System (eMAS). All city departments were involved in the planning process,
said Bohan, adding that some departments are responsible for alerts to
certain groups, while the community relations department provides most
other alerts.
By the end of the year, the country will have 150 million cell phone users,
Balroop said. Although most people use them for voice rather than text
messaging, 95 percent of cell phones can send and receive text messages, he
said.
Balroop said eMAS is device-, carrier- and geography-independent, meaning
messages can be sent to anywhere in the country. It can work with wireless
pocket PCs, and voice messages can be sent to landline phones if a
municipality has that module. The system also provides an audit trail,
tracking every message sent out and to whom, he added.
To implement the system, all a municipality needs is Internet and e-mail
access. "If you have these two ingredients, you're set to go," Balroop
said. The system puts "all aspects of technology into one big basket."
Balroop said several other municipalities in the Northern Virginia area are
interested in the service as well as a few federal agencies. The initial
cost is $34,500, with an additional cost of $14,500 to customize the
system. There is a yearly maintenance fee of $2,500, which includes
upgrades, he said.
***********************
Federal Computer Week
NMCI may be homeland model
The Navy's massive effort to outsource its shore-based network
infrastructure is a concept that many agencies will use as a model, a
former Navy captain said, and the proposed Homeland Security Department
could be an early organization to step up to the plate.
The new department will face the yeoman task of bringing together agencies
as well as creating a way to collect information from other agencies across
the government, said John Higbee, a professor of program management at the
Defense Acquisition University. Therefore, that organization will require
communication links to extended partners.
"I think it will be the single biggest information technology initiatives
that have come out of the federal government ever," Higbee said June 18 at
the Fortune One Business conference in Falls Church, Va. Federal Computer
Week is a co-sponsor of the conference.
"We need to come up with a way [to] sift through the haystack and find the
needles," Higbee said.
Many agencies will increasingly turn toward enterprise infrastructures that
improve security and interoperability, he said. Higbee, during his tenure
as deputy to the deputy assistant secretary of the Navy, was a key player
who spearheaded the Navy Marine Corps Intranet, the Navy's $6.9 billion
initiative to create a single network for the service's more than 400,000
shore-based seats.
Higbee acknowledged that NMCI will not be the exact model that everybody
uses, but the overall concept - creating an enterprise infrastructure - is
a strong trend.
"Enterprise provision of services adjusted to the needs of the organization
is going to be more in vogue," he said. Those initiatives will not
replicate NMCI, he said, but they will incorporate the ideas that drove the
Navy toward that project.
**********************
Federal Computer Week
Momentum building behind homeland
Two members of Congress said June 18 that it would take years before the
Homeland Security Department is fully operating, but with any luck, the
money will begin flowing to enhance U.S. security in the next six months.
Reps. Tom Davis (R-Va.) and Jim Moran (D-Va.) said Congress is moving
swiftly to approve the new agency that would be responsible for securing
the home front. But in the meantime, lawmakers must continue to provide the
money for agency-by-agency security systems.
"There's going to be a little hesitancy to move ahead right now. We're in a
period where we're going to be appropriating the money, and the agencies
are not ready to give it out," said Davis at the Fortune One Conference in
Falls Church, Va. (Federal Computer Week is a co-sponsor of the event).
Although the urgency to secure vulnerable systems is extensive, Moran said,
it would take at least six months to get things moving and it's "going to
take years to get individual components working together."
And the threats persist, he said. "We're not even adequately checking the
hold of a plane.... There are many ways you could attack the United States."
Meanwhile, President Bush's homeland security adviser, Tom Ridge, was
presenting a hastily constructed legislative blueprint June 18 for creating
the domestic security agency. The new agency would absorb the Secret
Service, the Coast Guard, the Immigration and Naturalization Service and
the Customs Service, but not the FBI or the CIA. Lawmakers vowed to hold
prompt hearings on the legislation.
**********************
Federal Computer Week
Two Army tech leaders retiring
A pair of the Army's technology leaders will retire this summer, after
helping to establish its knowledge management vision and the Army Knowledge
Online (AKO) portal.
Miriam Browning, the Army's director of enterprise integration, and Col.
Robert Coxe, the service's chief technology officer, both will retire in
August. The duo, along with Lt. Gen. Peter Cuviello, the Army's chief
information officer, are responsible for the ongoing evolution of the
service's Army Knowledge Management goals, including the development of the
AKO portal.
The Army's knowledge management goals aim to improve the management and
availability of information throughout the service. The AKO portal provides
Army news, distance-learning opportunities, e-mail accounts, a search
engine and a chat room. By July, officials plan to use it for most of the
service's internal business.
Browning has been in current position since last August. In an interview
earlier this year, she said she was pleased with the Army's knowledge
management progress, especially her success in garnering support from
management and breaking down cultural obstacles, but she admitted there was
still much to do.
"Changing the hearts and minds of the Army that the [command, control,
communications, computers and information technology] world is in
everyone's best interest - that's a major cultural win," Browning said. "We
have changed the way the Army does IT."
Coxe, who took over as CTO in July 2000, said he considered retiring then,
but decided to stay so he could pay back the Army for the 27 years of
experiences it has given him. Helping to establish AKO, a universal Army
tool, let him to do that, he said.
After his Aug. 22 retirement, Coxe said he would like to explore a CIO or
CTO position with a Fortune 500 company.
*********************
Federal Computer Week
E-Authentication RFI due this month
By the end of the month, the General Services Administration will release
its formal call to industry for ideas on how to proceed toward a single
authentication infrastructure for all e-government services.
The GSA-led e-Authentication team plans to release a request for
information within the next two weeks for the gateway, which is intended to
validate users for the other e-government initiative applications, Steve
Timchak, GSA's e-Authentication program manager, said June 18 at the
Industry Day Conference at the Commerce Department.
The gateway would consolidate the validation of multiple levels of
authentication, such as a password or a digital certificate, through a
single interface.
The Bush administration's entire E-Government Strategy is built on the
concept of eliminating redundant services and investments. The
e-Authentication initiative is intended to be an enabler for the e-gov
initiatives that are focused on specific services with longstanding legacy
applications in multiple agencies.
E-Authentication also has a group of legacy applications that it must
overcome, said Mark Forman, associate director for information technology
and e-government at the Office of Management and Budget, which oversees the
E-Government Strategy.
Dozens of unique, redundant authentication systems exist throughout the
federal government, he said. Many agencies have signed contracts to stand
up additional public-key infrastructure certificate authorities, which
issue some of the highest levels of digital credentials, in the past few
months, he said.
"We have e-authentication today; it's just not smartly architectured," he
said. "There's got to be some consistency, and it has to be citizen-focused."
Beyond the gateway, the e-Authentication initiative will not lead to
something that just sits on top of the existing, redundant solutions,
Forman said. "We will have to retool the investments different agencies are
making," he said.
***********************
Government Computer News
E-authentication team takes inventory
By Dipka Bhambhani
As early as next week, the General Services Administration's Office of
Electronic Government will release a draft of its E-Authentication
Inventory Template, a table that will list every federal agency's progress
toward building a security architecture.
Workers developing the E-Authentication project, an effort led by GSA to
set up a system that confirms the identities of federal systems users, will
have access to the template.
The template will appear on GSA's Public-Key Infrastructure Steering
Committee Web site. It will present a matrix that indexes factors such as
agencies' policy development, and use of hardware and software.
GSA will use the template as "a basis for current technologies and
platforms they can leverage in developing the E-Authentication gateway,"
said Rodney Miller, a research analyst in the Office of Electronic Government.
Knowing how each agency is progressing toward secure transactions will help
GSA bring agencies' resources and expertise together on E-Authentication,
Miller said.
So far agencies are sending GSA their progress reports via e-mail or postal
mail. No completion date is set for the template.
************************
BBC
Troops in virtual combat
The British Army is using a specially developed version of the celebrated
computer game Half-Life to train its troops.
With the first-person shoot-em-up soldiers can try out new weapons and new
tactics without encountering real bullets and bombs.
The Ministry of Defence hopes the system may help reinforce some of the
lessons learned on more traditional training exercises.
Like the popular modification, or mod, of Half-Life known as Counterstrike,
the army version allows up to eight soldiers to go into virtual combat at
any one time.
The troops work as a unit, moving about a simulated environment to track
down and confront an enemy.
Similarly, a typical Counterstrike game pits two teams of four players
against each other, with one side playing terrorists and the others the
counter-insurgent troops.
Serious stuff
Using a mouse and keyboard, the soldiers can fire their guns, throw
grenades and even plant plastic explosives.
According to Major Bruce Pennell, of the army's Logistics Corps, the system
has worked well so far.
"One of the difficult things is how to measure the level of immersion," he
said.
"It's clear to us - particularly me as a military observer - that these
guys are really engaged in what they are doing; it is not just a game
played across a keyboard and a mouse. They want to succeed just as they
want to in real training."
He added: "Obviously, being killed in the virtual world isn't quite so
serious. We don't have virtual officers writing letters to the dead
soldiers' virtual parents, but we'd hope the games are authentic enough to
reinforce good teaching."
Unreal doors
Chris Morris, from the technology firm QinetiQ, which is helping to develop
the computer system, said some of the fantasy found in commercial games has
had to be removed to drive home the consequences of making a mistake in
real combat.
"In a standard shoot-em-up game, every time you get shot your health goes
down by a few percent," he said. "The more that happens, the less healthy
you become. Here, of course, one bullet and you're out of the game."
The MoD is currently evaluating the system. One possible application would
be to allow troops to practise their missions before they went on them for
real.
But, Major Pennell conceded, there were potential dangers in doing this.
"You would have to make sure the environment you are modelling is as
accurate as possible. What you don't want to happen is for a soldier in a
real situation to run around a corner to find the door that existed in the
virtual environment, only to find in the real world the door is not there."
**************************
BBC
Put your mobile where your mouth is
Soon you could be swapping your mobile phone for a molar phone.
Royal College of Art students in London have developed a phone that fits
inside a tooth.
The concept device picks up signals with a radio receiver and uses a tiny
vibrating plate to convey them as sound along the jawbone to a person's ear.
The designers said the mini-molar phone could be implanted in a tooth
during routine dental surgery.
The prototype phone is the work of graduates James Auger and Jimmy Loizeau
and forms part of the Royal College of Art's annual summer exhibition.
Known as The Show, this exhibition shows off the best ideas of the current
crop of RCA designers and students.
Bits and bites
Currently, the tooth phone is only a mock-up and lacks the communications
chip to actually turn it into a functioning device.
Mr Auger said the technology to turn it into a working device already
existed and it would be a simple matter to build the relevant chips into
the gadget.
The designers speculate that, if the tooth phone becomes a working device,
it could be used by stock traders to receive up-to-the-moment information
about share prices or to help football managers communicate quickly with
players during key matches.
However, the existing design is only supposed to help stimulate debate
about future wearable computing devices and to help explore the social and
cultural ramifications of in-body technology.
The tooth phone is on show at the Science Museum in London from the 21 June
to November.
Development of the device was funded by the National Endowment for Science,
Technology & the Arts as part of a collaboration between the Science Museum
and the Royal College of Art.
********************
BBC
Poor technology 'lets down' UK courts
A senior judge has blamed poor technology systems for miscarriages of
justice and delays in the British judicial system.
Lord Justice Brooke warned that the justice system is in danger of
disintegrating if an investment of at least £500m is not made.
"Information technology systems have been lousy, leading to serious delays
and in some cases serious miscarriages of justice," he told the technology
news magazine Computing.
Lord Justice Brooke, who is chairman of the Judges' Standing Committee on
IT, said the system was suffering from 15 years of neglect.
Cutting red tape
According to an Audit Commission report, problems with IT systems have cost
the criminal justice system an estimated £80m a year.
It said that vital information held on the police national computer is
often out of date and called for an integrated computer system to allow the
police and the Crown Prosecution Service to communicate more effectively.
Six months ago the government set up the Criminal Justice Information
Technology unit to implement an IT strategy across police forces, courts
and the probation service.
Running alongside that the government is looking at reducing the amount of
paperwork in the police force. The Home Office Policing Bureaucracy
Taskforce is due to report in July on ways of cutting red tape.
Joining the dots
Part of its remit was to look at the part technology could play, said
Superintendent Neil Grant-Salmon, who is on the committee.
"The police force is not joined-up in terms of information," he said.
"The personal details of a suspect can be entered in systems up to 18 times
from arrest to going to court."
Wiltshire police force is leading the way in e-policing. It is planning to
equip its officers with handheld computers to allow them to log in to
information remotely.
The force is also working on joining up all the computer systems across the
county and allowing other forces access to the information.
*********************
Computerworld
Bush cybersecurity strategy to be a living document
By DAN VERTON
Howard Schmidt, vice chairman of the president's Critical Infrastructure
Protection Board, attended the fourth and final White House-sponsored "town
hall meeting" on cybersecurity last night in Atlanta before the release in
September of the next version of the National Strategy to Secure Cyberspace.
During his presentation to a packed auditorium of local Atlanta security
administrators, CIOs, educators and legal professionals, Schmidt described
what he characterized as the unique aspects of the Bush plan. Unlike other
government planning documents, including a previous version of the national
cybersecurity strategy released in 2000 by the Clinton administration, the
Bush plan "is intended to be an online version," said Schmidt.
"It's designed to be a plug-and-play type document," he said. "If we make
mistakes, we can pull that piece out and replace it in Internet time."
In addition, the Bush strategy will be to reach beyond corporate and
government users to include home users. Responding to questions from the
audience, Schmidt said that home users will be able to tap into the flow of
information about IT vulnerabilities. The document will also include
specific sections by experts from various critical sectors of the economy,
such as banking and finance, electric power, telecommunications and
emergency services.
Tom Noonan, CEO of Internet Security Systems Inc. and a panel member at the
town hall meeting, said the session lasted well beyond the two hours
originally scheduled. He noted a "genuine, albeit skeptical, interest in
participating in a public/private partnership."
Noonan said legal issues surrounding the Freedom of Information Act and the
threat of inadvertent disclosure of proprietary information remains a major
obstacle to getting most companies to work with the government. "That's a
structural issue we have to address," said Noonan. "The law has to be
fundamentally rethought. And that doesn't happen in Washington overnight."
"This goes beyond a department of defense issue or an FBI issue," Schmidt
said last night. "We've seen an ever-increasing number of attacks on our
critical infrastructure." If the national strategy is to succeed, "it will
take the coordinated efforts of [government, military and private-sector
companies], as well as the state and local [agencies]," he said.
Schmidt reiterated what Richard Clarke, chairman of the Critical
Infrastructure Protection Board, has said repeatedly: that the
administration does not plan to impose more regulations on companies to
improve Internet security. "We believe the market will drive itself," said
Schmidt.
Mary Guzman, senior vice president and regional e-business practice manager
at Marsh Inc., a New York-based insurance firm, attended the meeting and
pointed to drawbacks with the administration's approach to the industry.
"The federal government is trying very hard not to regulate anything,"
Guzman said. "They want the market to drive the process. But there are
inherent problems with that. There still seems to be an unwillingness in
industry to put your money where your mouth is.
"The only thing that is going to change that is when there is some pain in
the pocketbook from liability lawsuits," she said. However, "it's hard to
hold somebody liable for not meeting a standard when there is no standard."
Although the Bush administration is encouraging the private sector to allow
market forces to drive better security practices, Guzman said only the
health care and financial services industries have so far shown a
willingness to spend more on security and purchasing cyber insurance.
"And, interestingly enough, those two industries are regulated," she said.
However, Harris Miller, president of the Arlington, Va.-based Information
Technology Association of America, said the Defense Department is a good
example of how an influential user can force software and hardware vendors
to deliver more secure products.
Next month, the Pentagon will put a new policy into effect requiring all IT
products to be tested by an independent third party for security, said
Miller. "That will change the marketplace," he said.
*************************
CNN
Man's jailing over Web posting draws free speech advocates
SEATTLE (AP) -- Soon after moving into a retirement home, Paul Trummel
began complaining that his neighbors fell asleep with their TVs blaring or
flushed their toilets during quiet hours. Then he really turned up the heat
by starting a Web site accusing tenants and staff members of housing-law
violations and conspiracies.
The Web site landed him in jail for 3 1/2 months and made the 68-year-old
an unlikely hero to free-speech advocates in a positively bizarre First
Amendment case.
Trummel was locked up February 27 by Superior Court Judge James Doerty
after refusing to remove from his Web site the phone numbers and addresses
of Council House administrators. The judge had said that Trummel's posting
of the information was harassment.
The judge released Trummel on Monday but gave him a new Friday deadline for
taking down the addresses and phone numbers. Trummel said he has not
decided whether to comply.
"This is a dangerous order from a dangerous judge," said Sandra Baron,
executive director of the Libel Defense Resource Center in New York. "All
he's alleged to have done is publish names and phone numbers on the
Internet. It's not against the law to do so."
Trummel moved into the federally subsidized retirement home in 1998 and was
evicted in April 2001 because of the dispute. Others at Council House
consider him a crank.
Trummel, citing what he describes only as "sources," has claimed in his Web
postings that the home's board of directors conspired to exclude blacks in
appointing a new administrator. Trummel is white. He has also asserted that
building administrator Steve Mitchell sympathizes with Muslim terrorists,
has a "sexual dysfunction" -- homosexuality -- and intimidated tenants into
testifying against Trummel in the case.
Mitchell has denied Trummel's assertions, saying: "I'm a healthy,
37-year-old male. I can handle the stress of having him say I'm a Muslim
terrorist sympathizer. But to a 93-year-old woman, losing sleep because of
stress is hazardous. People are terrified of him."
Nathaniel Stahl, a 59-year-old tenant, said, "It's been horribly scary."
The Department of Housing and Urban Development found Trummel's claims
baseless, a spokesman said.
"Factually, the case is about a mean old man who becomes angry and vicious
when he doesn't get his own way," the judge said.
Baron, the libel expert, said that unless there are threats, it is rare for
speech alone to be deemed harassment. She said that if Trummel has defamed
the retirement home, it can sue him. Council House managers said they do
not want to sue Trummel because he is broke.
Trummel claims to be a reporter and is a member of the National Writer's
Union, though he has never been employed as a journalist.
He claims to have been director of the University Press at the University
of Massachusetts in Boston; the school said he merely advised a
short-lived, student-run project there. Until reminded otherwise, he also
claims to hold two doctorates -- from the University of Washington and
Rensselaer Polytechnic Institute in New York.
He was kicked out of a UW master's program because he did not take the
proper courses, prompting him to barrage the faculty and staff with
e-mails. At RPI, he was only a graduate student, and he was fired from an
assistant professorship at Fitchburg State College in Massachusetts, the
Seattle Post-Intelligencer reported.
As for whether he will take down the offending material, Trummel said: "I
had an accused murderer in the cell on one side of me and an accused rapist
on the other. I don't want to be back in that situation. But I stood my
ground for 111 days so far on an ethical principle. This might be my swan
song."
************************
People Daily
China's First Genotype ID Card Comes Out in Wuhan
Hubei Province's first "genotype ID card" was born recently in the Zhongnan
(Central-south) Hospital Gene Diagnostic Center under Wuhan University.
This ID card, which can distinguish the certificate-holder from the world's
other 6 billion people, is so far China's first genotype ID card with 18
genetic locus.
Hubei Province's first "genotype ID card" was born recently in the Zhongnan
(Central-south) Hospital Gene Diagnostic Center under Wuhan University.
This ID card, which can distinguish the certificate-holder from the world's
other 6 billion people, is so far China's first genotype ID card with 18
genetic locus.
This color genotype ID card, about twice the size of ordinary ID card, has
on it data such as photo, birth date, nationality and gender. In particular
it is marked with 18 internationally used genetic locus which are chosen
from the long chain of human cytogenetic information carrier DNA molecules.
In the combination of the 18 genetic locus, with the exception of one egg
giving birth to twins, it is difficult for one to find out such a
circumstance wherein two persons out of 10 billion people are completely
the same.
Professor Zhou Xin, director of the genetic diagnostic center, said that
among the world's 6 billion people, there possibly exist persons who are
identical with you in birthday and name, similar in looks and same in
voice, but only gene is the immutable indication representing your own
hereditary feature.
It is reported that the genotype ID card is divided into two categories:
infantile type and adult type. On it are the certificate-holder's photo,
name, gender, birth date, nationality and the names of his or her parents,
the 18 STR locus gene somatotype (includes sex gene) and blood group.
However, the gene somatotype is not the same thing as what is currently
called human genetic engineering, it contains only individual discerning
function and has not much to do with the worries about disease and the
"exposure of genetic defect". The test data for handling genotype ID card
can be any human body's histocyte, such as blood (needing only one drop),
hair (with ball top), skeleton, tooth, muscle and skin.
As regards the role of this kind of ID card, it is still hard for experts
to predict, but under certain circumstances, it is the most authoritative
basis for using it for individual discernment and parent-offspring
identification, its rate of accuracy reaches 99.996 percent and beyond,
obviously, it can play an irreplaceable role.
By People's Daily Online
************************
Peoples Daily
IT Widely Used in Chinese Military Schools
Information technologies have been extensively used in Chinese army and
helped to modernize the country's armed forces, according to sources at a
meeting in Nanjing, capital of east China's Jiangsu Province.
Information technologies have been extensively used in Chinese army and
helped to modernize the country's armed forces, according to sources at a
meeting in Nanjing, capital of east China's Jiangsu Province.
At present, over 1,000 multi-media labs have been constructed in China's
military schools and a web site on military training isaccessible to all
army schools.
A remote education platform has also been established for incumbent
soldiers and officers to receive higher education without putting aside
their army obligations.
New education methods have also been adopted in military training and help
to educate many military professionals equipped with both modern
information technologies and strong innovation awareness.
***********************
ZDNET
Uncle Sam to IT: Help fight cybercrime
By Lisa M. Bowman, Special to ZDNet
June 19, 2002 11:24 AM PT
SAN FRANCISCO--Hoping to appeal to a post-Sept. 11 sense of patriotism, the
Secret Service is imploring corporate America to help it nab cybercriminals.
John Frazzini, a special agent with the Electronic Crimes Branch of the
Secret Service, told attendees of the NETSEC 2002 conference here that an
attack on the nation's electronic payment systems could damage faith in the
U.S. economy.
He said companies must band together in a national neighborhood watch to
protect the country's networks from terrorists who hope to hobble them.
Frazzini also attacked hackers, accusing them of threatening the nation's
faith in its networks.
"If you're a U.S. citizen and you're breaking into computer networks, not
only are you criminal but I think you're unpatriotic," he said.
"We should be working together to address this problem," Frazzini added.
"Law enforcement alone cannot solve this problem."
Frazzini noted that the private sector controls most of the nation's IT
resources, making its cooperation essential in stopping Net criminals.
U.S. officials have stepped up efforts to fight cybercrime in recent
months, including moving the Secret Service and organizations designed to
protect national infrastructure under the auspices of a new Homeland
Security Agency.
In addition, the terrorist attacks accelerated the development of
Electronic Crime Task Forces in major cities across the country. The FBI
also announced plans to assign more agents to Internet-based activities
during its restructuring.
Tech companies have long had a strained relationship with law enforcement,
mainly because they're sometimes placed in the awkward position of turning
over private customer information to the police. For example, law
enforcement began asking Internet service providers for a vastly greater
amount of data about terrorist suspects following Sept. 11, forcing the
companies to divert resources from their core businesses to handle the
request load.
Corporate America also has been notoriously lax in contacting law
enforcement following computer break-ins, partly because of a fear that a
publicity nightmare will adversely affect their bottom line. Robert
Rodriguez, the special agent in charge of San Francisco's field office who
accompanied Frazzini, said a 1997 survey showed that 80 percent of
companies failed to call the police following a cyberattack, although more
are cooperating these days.
"The government cannot do it alone anymore," Rodriguez said. "The
importance of partnership cannot be understated."
Some in the NETSEC audience wanted to know why they should work with law
enforcement if it would only lead to bad publicity. But the agents assured
attendees that the Secret Service is charged with keeping all types of
information under wraps, including the private conversations of the U.S.
president.
Others quibbled with the agent's comparison of a computer break-in or virus
with the tragedy of Sept. 11. Frazzini acknowledged that "cyberterrorism is
more economic- than violence-based." But he warned that a cyber break-in
still could have grave consequences for U.S. citizens, either by ruining
the economy or allowing hackers access to sensitive information that could
threaten national security.
Frazzini played the patriotism card by including in his slide presentation
a quote attributed to Osama bin Laden in December, roughly translated as:
"It is very important to concentrate on hitting the U.S. economy through
all possible means...look for key pillars of the U.S. economy. The key
pillars of the enemy should be struck."
Frazzini then told the audience, "When you look at this slide, it should
piss you off."
What can you do for your country that you're not already doing for your
company? TalkBack below or e-mail us with your thoughts.
**************************
Salon.com
Every dial you take
Federal Communications Commission ordered the telecom industry to upgrade
their systems to meet a list of FBI specifications by June 30. The upgrades
give the FBI expanded wiretapping capabilities, including the ability to
extract specific information about phone calls without a warrant. Full
story http://salon.com/tech/feature/2002/06/18/wiretap/index.html
***********************
Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 510
2120 L Street, NW
Washington, D.C. 20037
202-478-6124
lillie.coney@xxxxxxx