[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips June 24, 2002
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, CSSP <cssp@xxxxxxx>;, glee@xxxxxxxxxxxxx;, Charlie Oriez <coriez@xxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, computer_security_day@xxxxxxx;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, akuadc@xxxxxxxxxxx;
- Subject: Clips June 24, 2002
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Mon, 24 Jun 2002 14:54:20 -0400
Clips June 24, 2002
ARTICLES
Mixed Signals for European Wireless Telecom
2 software firms accused of violating antitrust law
FBI technology upgrade more than a year away
In Fights Over .Com Names, Trademark Owners Usually Win
Free Web-Mail Waning?
Cell phones costing universities cash
High-tech cars pose mechanical dilemma
Peruvian effort targets software conglomerates
Devices show what a tangled brain we weave (new lie detector)
Getting a Hand-Held on Fighting Crime
Shops try chips for tracking every move by client 'tribe'
Old net name to get new owner
Warning over password security
The fax machine uprising (forced a reversal in changing digital privacy rules)
One year and counting: Section 508
FEMA seeks wireless fix
Homeland department IT taking shape
Rule would stifle DOD service buys
Panel tackles airport security
Cargo security on agency hit lists
House lawmaker expects cybersecurity bill to pass before recess
DOD tests biometrics to secure its smart cards
Update: Microsoft plans security chip for next Windows
Surf's up on power lines (broadband access)
Fast modems a hacker's heaven
Cellphones could be jammed for G8 and Pope's visit
Fees on horizon for electronics recycling
*******************
Los Angeles Times
Mixed Signals for European Wireless Telecom
By PAUL MELLER
LONDON - Mobile phone operators are getting crossed signals from European
Union lawmakers.
There is plenty of political talk supporting the broad aims to digitize the
European Union economy, including development of Internet-based mobile
phone services. But at the same time new rules are being drafted that would
heap greater regulatory and financial pressures on wireless network
operators, as they struggle to switch to a new, third-generation mobile
phone technology.
As European Union heads of state agreed to an ambitious "eEurope" action
plan at a conference in Seville during the weekend, they and the European
Commission, whose job it is to build the regulatory framework for the
so-called information society, have been criticized for overlooking current
realities to set their sights on the long term.
"European lawmakers are acting with best intentions, but you have to ask
whether their policies are appropriate when the market place is in such a
parlous state," said Peter Alexiadis, a partner in the Brussels office of
the law firm Squire Sanders & Dempsey.
Shortly before the Seville conference, the European Commission announced
two mobile phone initiatives that marked an abrupt departure from a more
sympathetic approach to the industry that the commission expressed last year.
As beauty contests for so-called third-generation, or 3G, wireless licenses
turned ugly and telecommunications stocks plunged in in 2001, the
commission hinted that it could extend the lengths of the licenses to ease
the financial burden on the companies that had paid exorbitant amounts for
them.
But that approach has changed, even if the industry's fortunes have not.
The commission released a report on the 3G mobile phone market, which
proposed that there be no loosening of the licensing rules. The report
explained that "extending license duration appears to have comparatively
little impact on restoring the financial institutions' confidence in the
sector."
By the commission's calculations, telecommunications companies have spent
about 110 billion euros (about $107 billion), pushing them to spectacular
debt levels. Last month Vodafone, the world's biggest mobile operator,
announced a record loss of £13.5 billion ($20.2 billion). It alone spent
roughly that amount on acquiring 3G licenses in Germany and other European
Union markets, as well as Britain.
One way the companies are financing their investment in the next generation
of mobile phones is by charging customers an array of fees to use their
existing G.S.M. (for global system mobile) phones. A recent study by
Goldman, Sachs found that roaming fees and termination charges (which
companies assess for completing other carriers' calls) together accounted
for up to 40 percent of revenues of some European wireless operators.
In a separate move two weeks ago, the commission announced that it wanted
to clamp down on these fees, in the interests of consumers. "The commission
doesn't seem to realize that mobile-phone operators need these fees to
subsidize their investments in the new technologies," a person close to one
of the big European wireless companies said, insisting on anonymity.
The commission's change of attitude toward the mobile phone market reveals
an internal struggle of the competition commissioner, Mario Monti, with his
colleague in charge of forging Europe's new economy, Erkki Liikanen. Right
now, Mr. Monti seems to be prevailing.
"The approach of the commission to regulating the mobile-phone sector has
morphed from aiming at creating legal certainty with the emphasis on less
intervention, to one that grants maximum flexibility for competition
officials to police the market," Mr. Alexiadis said.
The commission justifies the new tougher approach to the industry by saying
that despite its perceived difficulties, the telecommunications industry
still out-performed the general economy in the European Union last year,
with revenue of 224 billion euros (about $218 billion) and market growth of
about 10 percent.
But Michael Bartholemew, an industry executive, said the wireless industry
was still suffering. "Europe used to have a two-year lead on the United
States in mobile phones, but that lead is being lessened largely because of
the severe debt companies fell into paying for their 3G licenses," said Mr.
Bartholemew, director of ETNO, an association of some of the biggest
telecom players in Europe.
"It is easy to blame the operators, but the governments that reaped the
rewards of the highly priced licenses are equally to blame," Mr.
Bartholemew said. "They were greedy, and they didn't consider the impact
such high license prices would have on the telecoms industry."
Before the Seville conference, ETNO wrote to all 15 heads of state of the
European Union, asking them to give the industry greater legal certainty
and a lighter regulatory touch, as companies grapple with converting their
wireless and land-line networks to high-speed, or broadband, technology.
"Until our members have certainty that broadband won't be over regulated
they won't make the necessary investments," Mr. Bartholemew said. "The
question of who is going to pay for broadband is missing from the debate."
The cost of switching to broadband, he said, will be "significantly higher"
than the 110 billion euros already paid for 3G licenses. "That's why
there's a bit of a pause in development now," he added.
Mr. Alexiadis said: "It would be better to focus on expanding the potential
for narrowband, especially since broadband content isn't developed yet. You
have to question whether the industry can absorb the costs of switching to
broadband in the short term."
The 15 heads of state who met in Seville were mainly occupied with broader,
longer-term issues. They agreed on setting a target date of 2005, by which
time all schools, hospitals and local government offices should have
broadband access to the Internet.
Meanwhile, the commission is preparing to play a more prominent role in
regulating the telecommunications market. Beginning in July 2003 it will be
able to veto decisions by national regulators.
"There is an onslaught from the commission at the moment and it is sending
a chill up the spines of many leading telecoms operators," Mr. Bartholemew
said. "We hope they don't choke off new investment with over regulation."
***********************
Washington Times
2 software firms accused of violating antitrust law
Jerry Seper
Published 6/22/2002
The Justice Department filed a civil antitrust lawsuit yesterday
against the MathWorks Inc. and Wind River Systems Inc., accusing the two
companies of entering an agreement that eliminated competition for a
software product.
The suit, filed in U.S. District Court in Alexandria, said an
agreement between the two companies eliminates important competition for
dynamic control-system software products that has led to technical
innovation and low price for consumers.
Department lawyers, in challenging the agreement between MathWorks
and Wind River, said the pact was a violation of the Sherman Anti-Trust Act.
"High-technology products like these work behind the scenes to help
build some of the most sophisticated products in our economy," said
Assistant Attorney General Charles A. James, who leads the department's
antitrust division.
"This agreement eliminates important competition that has driven
significant technical improvements and price reductions for consumers,
including major aerospace and automotive companies, engineering firms and
governmental entities," he said.
Justice Department officials said Wind River filed a proposed consent
decree that would settle the pending suit. The officials said that if the
department obtains a judgment that requires divesting the software at
issue, Wind River would cooperate.
They said that though Wind River is named a defendant in the suit, it
remains a party in the case for the sole purpose of aiding in any judgment
against MathWorks. The consent decree requires Wind River to cooperate in
the case.
Dynamic control-system-design software enables engineers to develop
the computerized control systems of sophisticated devices, such as
anti-lock brakes for cars, guidance and navigation control systems for
unmanned spacecraft, and flight-control systems for aircraft.
By automating the steps of modeling, analyzing, simulating, testing
and generating software code for these types of control systems, engineers
can develop them in a shorter time for a lower cost. MathWorks' dynamic
control-system software is the Simulink product group. Wind River's
competing product is Matrixx.
According to the suit, MathWorks and Wind River, which were direct
competitors for the software, entered an agreement last year that ended
their competition.
The agreement gave MathWorks the exclusive right to sell Wind River's
Matrixx products and required Wind River to stop its development and
marketing, department officials said.
The suit says the agreement with Wind River gave MathWorks control
over the prices, marketing, support and development of the Wind River
dynamic control-system-design tools. MathWorks says it will not further
develop the Wind River Matrixx products.
MathWorks is a Delaware corporation with its principal place of
business in Natick, Mass. It posted revenue of about $200 million in 2001.
In 2001, department officials said, sales of MathWorks' dynamic
control-system-design tools were more than $100 million.
Wind River is also a Delaware corporation, with its principal place
of business in Alameda, Calif. Wind River's principal products are embedded
operating systems and integrated-development environments.
The firm reported worldwide revenue of $438 million, including $13
million in sales of Wind River's dynamic control-system-design tools.
***********************
Wired News
Danish Deep-Link Decision Due
By Farhad Manjoo
If everything goes well for the Danish news service Newsbooster this week,
nothing will change: The Web will be the same freewheeling place it's
always been, with everyone allowed to link to everyone else.
But if a Danish court decides that Newsbooster's "deep links" to newspaper
sites violates the newspapers' intellectual property rights, the legal
landscape of the Web could be dramatically altered, with sites in Europe
and perhaps elsewhere getting new leeway to dictate the terms under which
other websites can link to them.
A "deep link" to a site points to a page within the site, bypassing its
front door. For example, a link to a specific story at The Washington
Post's website (rather than a link to washingtonpost.com) would be a deep
link.
Like most online news services, Newsbooster is built on deep links. When
news breaks on other sites, Newsbooster links to the stories, not to the
sites' front pages. But such links annoy the Danish Newspaper Publishers'
Association, as they let people bypass the sites' ad-heavy front pages.
The DNPA wants the court to recognize this as a violation of each paper's
copyright. This week, it's asking the court to prohibit Newsbooster from
deep linking to DNPA sites until the court makes its final decision on
copyright.
The court in Copenhagen could decide on that preliminary motion as early as
Monday or Tuesday, said Anders Lautrup-Larsen, Newsbooster's CEO. If the
court rules in the DNPA's favor, there's a possibility that the ruling
would apply to sites beyond Denmark, as the country's copyright act is
based on European Union law.
But Lautrup-Larsen said he sees little chance of that occurring. "We sleep
really well at night," he joked. He said that most of the people he's told
about the issue have sided with Newsbooster, and he thinks the judge will
give Newbooster the go-ahead to deep link.
Of course, Lautrup-Larsen added, "you don't know what kind of judge you're
to get, and what the exact ruling will be, but our argument is that we are
a search engine like everybody else. They say that they like search engines
like Google and Yahoo and Lycos, but they don't like us. So we believe this
is very silly."
The DNPA could not be reached for comment for this story, but in the past
it has said that it doesn't generally mind deep links, as long as they're
not "systematic." The DNPA has brought legal action against other Danish
sites, and in one case last summer a judge granted the kind of preliminary
injunction it now seeks against Newsbooster. That site went out of business
before the court could decide upon the legality of deep links.
Linking policies of the sort favored by the DNPA have been a controversial
idea throughout the short history of the Web, and the issue flared once
again last week when it was revealed that National Public Radio asks
webmasters to seek its permission if they want to link to NPR's site.
NPR was pilloried on several weblogs and discussion sites, and Jeffrey
Dvorkin, NPR's ombudsman, was swamped with mail. The backlash was so severe
that NPR reps now say that they're reconsidering the policy, and that they
will announce a change in a few days.
On Friday, NPR put up a note to explain its link policy: "The policy was
originally intended to maintain NPRÂ's commitment to independent,
noncommercial journalism," it said. "We have encountered instances where
companies and individuals constructed entire commercial Web 'radio' sites
based on links to NPR and similar audio. We have also encountered websites
of issue advocacy groups that have positioned the audio link to an NPR
story such that one cannot tell that NPR is not supporting their cause.
This is not acceptable to NPR as an organization dedicated to the highest
journalistic ethics, both in fact and appearance.
"However, NPR also recognizes that the majority of the linking on the Web
is not infringement. We are working on a solution that we believe will
better match the expectations of the Web community with the interests of
NPR. We will post revisions soon at www.npr.org."
Critics weren't at all satisfied with NPR's explanation of its policy.
"Nothing justifies it," said Cory Doctorow, the writer who first reported
the policy on his blog. A site built on links to NPR is not different from
"a site that recounts all the headlines in The New York Times this
morning," he said. "And would anyone say they have a problem with that,
with people recounting public fact?"
He added that if NPR was really all that concerned about it, it could just
take its content off the Web. Or, as Doctorow wrote in an open letter to
NPR's ombudsman, "you can trivially block off-site referrers with a few
lines of Web-server configuration. If it is cheaper for you to pay a policy
person to review requests for links from the 20,600 linkers that Google
reports (for NPR) than it is to pay a systems administrator to enter one
line in your Web-server's configuration file, then you are either
drastically underpaying your policy staffers or drastically overpaying your
systems administrators."
And it's not hard to guess that whatever happens in Denmark this week, the
anger with which people respond to NPR's policy could be instructive for
the DNPA. If the court does block Newsbooster from linking to DNPA sites,
the public outcry could be fierce, Lautrup-Larsen said.
"I never ever see anyone in forums or in debates saying that the publishers
are right in what they're doing," he said.
**************************
Government Executive
FBI technology upgrade more than a year away
By Brian Friel
bfriel@xxxxxxxxxxx
FBI agents won't have user-friendly, integrated computer programs to manage
their investigations until December 2003, FBI Director Robert Mueller said
Friday.
Mueller said the bureau will have the basic building blocks of a modern
technology system in place by the end of this year, when FBI offices
throughout the country should have new computers and monitors and can be
connected to each other by fast networks. It will take another year to
integrate and modernize the 36 software programs that FBI agents use to
conduct their investigationsincluding the automated case support system,
which is supposed to be a central system for managing cases but is so hard
to use that agents try to avoid it.
Technology specialists at the bureau have convinced Mueller that the
bureau's modernization project, nicknamed Trilogy, can't move any faster,
though they have acknowledged that most people have better computers at
home than FBI agents have at work. "I have to be a little more patient than
I normally am," Mueller told the House Appropriations Subcommittee on
Commerce, Justice and State.
Originally conceived as a three-year program to replace and upgrade aging
data networks, desktop computers and servers and to give agents access to
e-mail and the Internet, Trilogy is now expected to cost the bureau $379
million. The Sept. 11 attacks and subsequent revelations about the archaic
state of the FBI's technology prompted Mueller to try to speed up the
project, which was launched in May of last year.
The long timeline for modernization puts a damper on the bureau's ability
to connect its data to the data of other federal agencies, Mueller said,
telling members of Congress that the bureau must first get its data into
data warehouses that would allow for better information sharing. Mueller
said he has spent the past two months interviewing potential chief
information officers and has selected a CIO from the private sector who has
a strong vision for the FBI's technology infrastructure.
But Rep. Harold Rogers, R-Ky., said members of Congress are wary of the
FBI's ability to wisely spend money on technology modernization. He said
Congress has appropriated about $1.7 billion for technology modernization
since 1993. "I've heard director after director say to us, 'Give us that
money and we'll modernize this computer system,'" Rogers said.
Mueller noted that much of the money that the bureau has spent over the
past decade has led to systems that work well, such as the FBI's
fingerprinting system and its criminal information database. But he
acknowledged that the bureau has not managed technology well in the past
and emphasized his appreciation for computers as a reason he will be able
to turn technology management around. "I love computers," Mueller said. "My
wife wants me off the computer half of the time."
Mueller's comments about the bureau's technology plans came at a hearing
aimed at assessing the bureau's plans to reorganize and modernize. Former
Attorney General Richard Thornburgh, for whom Mueller worked during the
first Bush administration, headed up a National Academy of Public
Administration panel that assessed the bureau's plans.
Mueller announced plans on May 29 to devote more of the bureau's agents to
investigating terrorism, spend less time investigating drug trafficking and
create a new Office of Intelligence to analyze information about potential
terrorist attacks.
Thornburgh, who had only two weeks to assess the bureau's plans, said
Mueller is taking the bureau in the right direction. On the technology
issue, Thornburgh warned that the chain of command for information
technology is not clear. The chief information officer and the head of the
Trilogy project each report directly to the FBI director. The CIO has no
direct control over the bureau's technology budget, and systems are
operated by several different divisions.
"The panel is concerned with the apparent fragmentation of management
control over IT resources," Thornburgh said.
Thornburgh also noted that Mueller's proposed reorganization actually
affects less than 5 percent of the FBI's total resources and personnel. For
example, only 2,000 of the agency's 11,500 agents will be devoted to
counterterrorism full time, an increase of about 500 agents. Despite plans
to reduce the effort spent investigating drug-related crimes, 1,000 agents
will still be involved primarily in narcotics investigations, Thornburgh said.
In other developments at the hearing:
Mueller said the Bush administration is not planning to move the entire
National Infrastructure Protection Center out of the bureau and into the
new Department of Homeland Security, as was suggested in the
administration's original plan. Now one section, which handles computer
investigations and operations, will remain in the bureau, while the
sections on analysis and outreach will move to the new department.
Rep. David Obey, D-Wis., questioned Mueller about the National Domestic
Preparedness Office, which is slated to move from the FBI to the new
department. Mueller said that the number of people in the office now "may
well be zero," since the functions of the office were recently handed over
to the Federal Emergency Management Agency. The Clinton administration
created the office to help improve coordination among federal agencies that
deal with first responders to emergencies.
************************
Chronicle of Higher Education
International Consortium Readies Ambitious Distance-Education Effort
Universitas 21 seeks profits and a global reach, but faculty unions fear a
lack of quality
By MICHAEL ARNONE
The next year will see whether Universitas 21 -- a
high-profile international consortium of 17 universities from Asia,
Australia, Europe, and North America -- can sell online degrees worldwide.
Created in 1997, the consortium plans to offer its first product, a
master's degree, throughout Asia in early 2003.
Now that the courses are almost ready, Universitas 21's member institutions
-- including the University of Virginia in the United States -- are
starting to put more effort into their other emphasis: devising new ways of
academic cooperation.
But questions persist about whether the consortium's goals -- collaboration
and commerce -- truly complement each other. Can Universitas 21 and its
business partner successfully sell online degree programs and nondegree
certificates, as it hopes? Can the member institutions find ways to work
together on scholarly projects across a world of time zones?
Fearing for the academic reputations of the member universities, faculty
unions in five countries have protested their institutions' participation
in U21global, the company that the consortium co-owns with Thomson
Learning, a major academic publisher. The consortium hopes to reach into
developing markets through the for-profit venture, which it formed in 1999.
The faculty unions say professors from the partner institutions have been
given too limited a role in creating and teaching the courses. What's more,
the University of Michigan and the University of Toronto, once members of
the consortium, withdrew because they didn't feel confident associating
their names with the project. Meanwhile, the Asian market may prove more
difficult to penetrate than had been expected.
Despite those hurdles, both Universitas 21 and Thomson express optimism
about U21global's future. A recent study by Merrill Lynch found that the
higher-education market outside the United States is worth $111-billion a
year and has as many as 32 million potential students, says Robert C.
Cullen, president and chief executive officer of the international division
of Thomson, which joined the effort in 2001. The research predicts that
more than half the market, in terms of both students and money, is in China.
U21global won't offer its programs -- master's degrees in business
administration and information systems, and certificates in electronic
commerce and information systems -- in the United States and Europe. The
company will focus instead on booming markets in developing areas,
especially in Latin America and Asia. At first, the programs will be taught
in English; versions in Mandarin are due by 2005.
"We felt the best way to enter the market would be to get partners," Mr.
Cullen says.
So far, 16 of the 17 consortium members have signed up for U21global. One
of the Chinese members, Peking University, still needs permission from the
government to participate, says Alan D. Gilbert, vice chancellor of the
University of Melbourne, in Australia. Former chairman of Universitas 21,
he was a main force in creating it.
Mr. Cullen expects a few hundred enrollments next year and up to 60,000 by
2010. U21global needs about 10,000 students to break even, but he envisions
that hundreds of thousands of students will eventually enroll -- bringing
enormous profits, he says.
Thomson supplies U21global with technological expertise and administrative
support; it also contracts with professors to create the courses. The
participating universities lend their names and provide quality control for
the academic material. The consortium and Thomson Learning have promised to
provide up to $25-million each to the venture in its first round of financing.
U21global's M.B.A. program is scheduled to start in the first quarter of
2003. The master's degree in information systems and the certificates are
to be offered later in the year. Undergraduate courses are scheduled for
release by 2005.
The Right Markets
Peter J. Stokes, executive vice president of Eduventures, an
education-research company in Boston, says Thomson Learning and Universitas
21 are looking at the right markets, especially China. Postsecondary
education is "going to explode" in developing regions, he says, and
universities and companies alike are rushing to enter the same markets.
The consortium model of Universitas 21 has substantial potential for
profits and success, Mr. Stokes says, because it can bring credible
academic brand names into new markets. The geographic diversity of the
consortium should mean that U21global could reach more markets than any of
its partners could on their own, he says. Corporate and academic
competitors, he says, worry that it could quickly dominate for-profit
online education worldwide.
"It's no wonder that the consortium came about," says Pamela S. Pease,
president of Jones International University, a for-profit institution that
provides online degrees and has many students from outside the United
States. Her institution is looking to expand its operations and faces many
of the challenges that U21global does, but isn't considering joining a
consortium. No institution can do everything, and alliances between
corporate and academic partners can help institutions focus on their
specific missions, she explains.
Even so, she wonders what return the Universitas 21 members will get on
their investment. Thomson gets to borrow the universities' academic clout,
she says, but how will the universities benefit? Unless the company really
takes off, they won't make much money, because each institution would only
get a fraction of half the profits.
The institutions and Thomson Learning are willing to wait for profits, says
Sir Graeme Davies, vice chancellor of the University of Glasgow, who is
chairman of Universitas 21.
In the short term, the company is a way for the consortium's institutions
to achieve prominence in online education quickly and without risking a lot
of money, says Peter W. Low, a law professor at Virginia. He and John T.
Casteen III, president of the university, are its representatives to the
consortium. Virginia has put $1-million into the venture, and that's all it
can lose, Mr. Low says. The consortium also provides its members a chance
to learn from experts in online education and apply the knowledge on their
own campuses.
Ms. Pease, of Jones International, and Mr. Stokes, of Eduventures, say the
consortium's biggest challenge is how to organize U21global so that it
doesn't compete with its members' own offerings. Universitas 21 will have
to find ways to keep its members in the partnership and not release online
courses on their own, he says. For example, Michigan's business school was
working on its own distance-education programs, says Gary D. Krenz, special
counsel to the university's president, and so didn't see the need to invest
in U21global.
Another problem is overcoming concern about the quality of the courses,
which arises in part because the professors that Thomson retains to write
the courses will be from outside the consortium. Graduates will get their
degrees from Universitas 21, not from individual consortium members, but
their diplomas will feature the crests of all of the member institutions.
Faculty Fears
Faculty unions have no love lost for U21global's strategy, which limits the
role of instructors from the consortium's members -- and, in turn,
jeopardizes academic quality, says Jane L. Buck, president of the American
Association of University Professors. Her union and other unions in
Australia, Britain, Canada, and New Zealand, wrote a letter of protest last
year to Mr. Gilbert, who was Universitas 21 chairman at the time. In March,
the Association of University Teachers, in Britain, encouraged its 45,000
members to boycott participation in the consortium. The boycott never
materialized, says Sir Graeme, the Universitas 21 chairman.
Universitas 21 and U21global haven't been controversial at all at the
University of Virginia because faculty members have taken scant notice of
it, says Michael J. Smith, a professor of political science who is chairman
of the Faculty Senate. Cuts in the state budget have dominated professors'
attention, he says, so it's too early to say what faculty members think of
the consortium's for-profit activities. The senate has been briefed on the
consortium's activities and trusts Mr. Casteen and Mr. Low to uphold high
standards. The institution itself isn't unionized, but some of its
professors are AAUP members, he says.
The consortium partners and Thomson Learning hope that the controversy will
diminish when critics see the quality of the courses that U21global is
creating for the Asian market, where it is starting out.
A hurdle that Thomson has yet to overcome, Mr. Cullen acknowledges, is how
to deliver high-quality education online to hundreds of thousands, if not
millions, of students.
In response, Sir Graeme and the consortium have created U21pedagogica, a
company that will evaluate the rigor of the programs that Thomson creates.
The consortium is the sole owner of the company, to keep operations
separate from those of Thomson Learning. The University of Virginia plays a
major role in running U21pedagogica -- Mr. Low is chief executive officer
and Mr. Casteen chairman of the board -- but all members of the consortium
contribute to ensuring the quality of the courses.
"Our most important attribute is our reputation," says Sir Graeme. "We're
not going to jeopardize it."
Thomson has yet to submit any courses for evaluation. When it sends
material from the M.B.A. program next fall, Mr. Low says, consortium-member
deans and professors with expertise in the subject areas will evaluate
every course and instructor. An Academic Standards Council comprised of
U21pedagogica's board and five other professors will make the final
decision whether to use a course. The company will have U21pedagogica
review the courses every two years, as well as each time they are updated
or translated into another language.
Ms. Buck, of the AAUP, says such vetting doesn't allay her concerns.
Michigan's Mr. Krenz says his university had similar reservations before it
pulled out last January, without having participated in U21global. Michigan
was concerned that the academic partners didn't have enough control over
either the final product or the use of their names and logos, he says.
Sheldon Levy, the University of Toronto's vice president for government and
institutional relations, says its legal counsel warned that as a consortium
member, the university would share liability for any problems with
U21global even without participating in it. "We said, 'See you later.'"
Toronto left Universitas 21 in January 2001.
New York University, which joined the consortium with the University of
Virginia in May 2001, backed out just a few months later. Its
representative to the consortium, Robert Berne, senior vice president for
health, says NYU had only a "passive partnership" with Universitas 21, and
declines to elaborate.
The consortium must deal not only with internal pressures, but also with
commercial forces beyond its control. Breaking into the enormous Chinese
market, in particular, may be harder than Thomson Learning and the
consortium realize.
For example, the University of Michigan formed a partnership not long ago
with Shanghai Jiao Tong University to deliver a master's-degree program in
manufacturing engineering to Chinese students. But only a handful of
students were enrolled when classes started in March -- and an employee at
a multinational company had signed them up to keep the dean of the Shanghai
university's School of Mechanical Engineering, a friend, from losing face.
The dean, Lin Zhongqin, says the tuition, at $30,000, was too expensive.
And some students at Jiao Tong say many of their colleagues who want a
Western education prefer to travel for it.
The Right Price
Many Asian students prefer degrees from Western institutions, says Karla J.
Lacey, vice president for marketing at the Graduate Management Admission
Council, which administers the Graduate Management Admission Test, the
entry exam for American graduate schools of business. In the past several
years, those schools have seen a sharp increase in applications from China,
India, and other Asian countries, she says.
Sir Graeme, the consortium's chairman, says tuition for U21global programs,
which will be set in the fall, is expected to be competitive in the various
markets: "If we price ourselves out of the market, there is no market."
Mr. Gilbert, the former chairman, says a master's degree from U21global
should cost about $7,500 and take about 18 months to complete. That's
exorbitant compared to many such programs in China, according to Mr. Lin,
where the average cost of a master's degree in engineering is less than
$2,000. And many students there get full scholarships, he adds.
Ms. Lacey says an M.B.A. from U21global will be more affordable than many
traditional M.B.A. programs that Western institutions provide in Asia. But
any provider lusting for the huge Asian market should note that the number
of students with sufficient education, income, and language skills to
actually qualify for their programs is small, she says. "When you factor
those in, you realize their potential market is a lot smaller than what
they think it is."
Since 1997, Universitas 21 officials have devoted much of their energy to
getting U21global up and running. Now, with the courses nearly ready, the
partner institutions are turning their attention to cooperation on academic
and scholarly matters, Mr. Low says.
Consortium members are seeking new and closer collaborations in many areas,
says Michael Crommelin, dean of the law school at the University of
Melbourne. The universities hope to share professors, students, course
content, and expertise. Deans of engineering, medicine, and other
disciplines have met to discuss opportunities for research and exchange. To
involve as many people as possible in the planning, the consortium has set
up travel fellowships for students and professors and has met with student
unions and alumni groups. The institutions, which already are sharing
courses and technology through a communal online library, have agreed to
accept each other's courses to encourage student exchanges.
The universities in Universitas 21 aren't the only ones joining consortia
to expand the reach of their research or to get into online education. Five
American, six British, and two Chinese institutions have formed the
Worldwide Universities Network, which focuses on research collaborations.
The Global University Alliance, with nine members, from Australia, Europe,
and North America, sells its own online-education courses as well as those
of its members.
Universitas 21 has limited its membership to 25 institutions and is in no
rush to expand, says Mr. Low, the Virginia law professor. It wants to add
one or two more American institutions in the next 12 to 18 months, and
hopes to find new members in Africa, Eastern Europe, Japan, and South America.
But in academe and among the companies that serve it, there is skepticism
whether the consortium is going to work, says Mr. Stokes, of Eduventures.
And Mr. Low acknowledges that the member universities are still struggling
to work collegially and not just one-to-one. Melbourne's Mr. Crommelin
agrees. He adds, "That's a big step, if we can pull it off."
List of Schools: Fudan University, China, Lund University, Sweden, McGill
University, Canada, National University of Singapore, Peking University,
China, University of Auckland, New Zealand, University of Birmingham,
England, University of British Columbia, Canada, University of Edinburgh,
Scotland, University of Freiburg, Germany, University of Glasgow, Scotland,
University of Hong Kong, University of Melbourne, Australia, University of
New South Wales, Australia, University of Nottingham, England, University
of Queensland, Australia, University of Virginia, United States
************************
Reuters Internet Reports
Kremlin's New Web Site Stands Up to Hacker Threats
Fri Jun 21, 7:57 AM ET
MOSCOW (Reuters) - Almost 100 hackers have tried to break into Russian
President Vladimir Putin ( news - web sites)'s new Internet Web site in the
first 24 hours of its existence but none has yet succeeded, the Kremlin
said on Friday.
And after three months of checks by the Federal Agency for Government
Communications and Information, the presidential administration is certain
the www.president.kremlin.ru site, unveiled Thursday, is almost hacker-proof.
"Some 500,000 people have visited the site and there have so far been 96
attacks by hackers, but none of them has succeeded," a Kremlin spokesman said.
Hackers try to break into Web sites for a variety of reasons including
defacing content and cracking confidential financial information, but the
Kremlin did not know what motivated those who tried to penetrate the
presidential site.
"It could be anyone, in any country," the spokesman said.
AYAXI, the Moscow-based company which won a tender to build the site after
a contest last June, said the site took almost ten months to construct.
The page contains copies of Putin's speeches, new laws and tidbits of
presidential news, but visitors can also visit an intimate photoalbum that
includes shots of the president walking his dogs and the Putin family's
holiday snaps.
"Put in: Now anyone can penetrate the president's house," the mass
circulation daily Moskovsky Komsomolets said on Friday.
***********************
Mercury News
Study: DSL use changes habits
By Megh Duwadi
Cox News Service
WASHINGTON - For high-speed Internet users, a new lifestyle may be just a
few clicks away.
A study released today by the Pew Internet and American Life Project found
that people changed their activities both on and off the computer when they
acquired broadband service.
High-speed users go online more often than users of slower dial-up
connections, the study found, and they stay on longer.
They were much more likely to create content for the Web or share files,
telecommute, download music or game files, or enjoy streaming audio or video.
``When people get an always-on, high-speed connection, they treat the
Internet as a `go-to' tool for a wide range of information and
communication needs,'' said Lee Rainie, the project's director.
For the ``broadband elite'' -- users who perform at least 10 online tasks a
day -- unlimited Internet access encourages feats of multi-tasking.
``A member of the broadband elite might be instant messaging friends or
work colleagues, listening to a favorite radio station online, booking an
airline ticket, or scanning an online news site -- all at the same time,''
the study said.
Offline, the study found, broadband users spent less time shopping in
stores, working at their offices, watching television and reading
newspapers, partly because they transferred some of these activities to the
Internet.
The finding that there is a ``broadband effect'' on Internet use comes as
the tech industry is pressing the government to encourage a faster rollout
of the service, in hopes of providing lucrative new products.
While more than 90 percent of U.S. households have access to high-speed
Internet service via telephone lines, cable TV or satellite, only 7 percent
subscribed to them as of mid-2001, the Federal Communications Commission
reported in February.
One reason often cited for the low penetration of broadband services is
their high cost, typically about $50 a month.
``We don't have a broadband crisis in America,'' said Rep. Edward Markey,
D-Mass. ``The crisis is that the prices are so high that (consumers) don't
want to subscribe to it.''
One independent provider of DSL broadband access via telephone lines, Covad
Communications, last week lowered its consumer broadband fee to a price
that rivals dial-up rates.
The company's aim is to spur residential demand, said Covad's president,
Charles Hoffman.
``Covad's move to lower prices is proof that the '96 Telecommunications Act
is working,'' Hoffman said, referring to a 1996 law aimed at creating
competition in the communications industry.
However, President Bush indicated this month at a White House meeting of
tech industry executives that federal officials soon may try to stimulate
broadband use by restricting competition.
He hinted that the FCC may issue regulations that would free regional
telephone companies from sharing their high-speed Internet lines with
competitors on an equal basis.
Backers of a bill stalled in Congress with the same objective argue that
the current arrangement actually discourages the phone companies from
investing to install DSL lines in their regions.
***********************
Reuters Internet Report
Sex on the Office Computer? Big Brother Is Watching
Sat Jun 22,10:54 AM ET
By Andrea Orr
PALO ALTO (Reuters) - How much do you think your employer would pay to make
sure that you did not spend half your day browsing an online book store,
watching sports, or downloading music files -- and that you never spent
your working hours at a porn site?
Thousands of companies have invested in "employee Internet management"
software that lets them control how their workers are using the Web.
Since the software sells for as little as $15 per employee per year, it is
an expense they find easy to justify even in a sluggish economy: a way to
see if workers are wasting time, hogging limited bandwidth or breaking
company policies.
"There are more and more distractions on the Internet," explains John
Carrington, Chief Executive of Websense Inc , a small but rapidly growing
San Diego company that provides such employee management software to some
17,000 companies, including many Fortune 500 companies, around the world.
"You basically have a home entertainment center on every desktop,"
Carrington said. "We help manage that distraction."
Websense, which estimates that the majority of all companies that use
employee Internet management software use its product, recently reported a
small quarterly profit as its revenues surged 90 percent.
Analysts who follow the company are projecting its revenues this year will
grow to $61.7 million, from $35.9 million last year, according to Thomson
First Call.
Other companies selling similar products include SurfControl and Secure
Computing Corp .
If most workers equate this kind of monitoring with spying, and keeping
detailed records of every Web site ever visited by all employees, Websense
says the reality is not nearly so big brotherish.
Rather, Carrington says, the company's software is more preventative in
nature, blocking access to the objectionable sites in the first place, so a
company can prevent workers from going places that might be grounds for
dismissal -- a kindler gentler big brother, perhaps.
A BLACK HOLE OF PRODUCTIVITY
Websense provides software that lets companies decide how restrictive they
want their work place to be. It is the customers themselves that determine
which areas of the Web are off limits. Websense, which maintains an
ever-changing database of 3.5 million Web sites organized into 75 different
categories, says corporate policies vary significantly.
Some block nothing but "the sinful six" (a category covering, pornography,
militancy and extremism, hate sites, as well as illegal, tasteless and
violent topics), while others restrict employees from shopping, watching
sporting events, or viewing even short movie trailers.
Most fall somewhere in the middle. Websense says companies typically
tolerate limited amounts of online shopping, objecting only when reports
come back showing excessive amounts of time spent on such sites. Others
have no problem at all with employees watching sporting events, provided
they do so after hours, when there is more bandwidth available.
Of course, when companies purchase this kind of employee management
software, they do get back logs of all the different Web sites visited, so
individual employee moves may be closely watched.
Websense, which tries to present its product as a non-intrusive way to
police the workplace, however, maintains that most employers are interested
in the aggregate results from the whole office rather than individual workers.
"There is not much reason to look at reports on individual employees,"
argues Carrington. "It takes a phenomenal amount of time to look at all
that information."
Currently, Carrington says, companies seem more concerned with blocking
access to World Cup matches than to porn or gambling sites. A year ago a
Victoria's Secret fashion show that was Webcast was a major point of concern.
Ironically, Carrington said, it is the slow adoption of broadband Internet
access by consumers, that keeps his business thriving.
"One problem for companies is that the majority of homes that have Internet
access still have dial-up connections," he says. "When you have broadband
at work, there are a lot of distractions. There is sort of like this black
hole, that people get sucked into."
********************
MSNBC
Living life at high speed
Study: Vast divide between broadband, dial-up Internet users
By Jane Weaver
June 24 Americans who use a high-speed Internet connection at home tend to
go online more often, stay there longer and become actively involved in
creating their own content, a study of Internet users found.
THE STUDY, to be released Monday by the Pew Internet and American
Life Project, concludes that there really is a "broadband lifestyle." It
emerges when people connect to the Internet from home through a high-speed
network such as a cable modem, or digital subscriber line (DSL).
Television viewing declines, families and friends keep in closer
contact through frequent e-mailing or instant messaging and people claim
they spend less time stuck in traffic because of increased telecommuting.
"For [broadband] users, the Internet replaces multiple tools, such
as the telephone, TV, stereo, newspaper, fax machine, or pen, to carry out
tasks," the Pew study found. "Needs are met on a real-time basis."
A broadband connection is defined by the Federal Communications
Commission as a transmission speed exceeding 200 Kilobits per second both
upstream and downstream, or about four times the speed of a standard 56k
dial-up modem.
Not only do broadband users go online more often 82 percent of
high-speed users surf everyday compared to 58 percent of dial-up
customers they end up staying online longer. A typical day's worth of Web
surfing for a broadband user adds up to about 95 minutes compared to 83
minutes a day on average for someone with a slower connection, the Pew
researchers found.
TOTALITY OF EXPERIENCE PRIZED
In "The Broadband Difference," the Washington, D.C. research group
conducted phone interviews of more than 500 Internet users 18 years and
older who have broadband access in order to understand the impact the
"always-on" speedy connection has on people's behavior.
What they found was there is no single application or "killer app"
that appeals to the majority of broadband users, but instead a whole range
of activities and benefits such as listening to a favorite radio station or
booking an airline ticket that spur people to pay the higher price for the
faster access. The average fee for a broadband connection is about $50 a
month.
"For these people, it's the totality of what they can do in the
online world," said Lee Rainie, director of the Pew project. "It's not one
'oh wow' thing."
For Aaron Burgemeister, a 20 year-old college student from Idaho,
"having a fast connection is nice so that I can get on with life sooner."
Burgemeister has been using a home broadband connection for the last two
years. "Broadband does affect how much I am online. I would not be able to
get things done nearly as efficiently when I have a whim about some
project, if I wasn't connected 24/7."
Not surprisingly, e-mail is the most popular activity, with 67
percent of broadband users checking it every day.
Nearly half, or 46 percent of broadband users get news online
everyday, with 40 percent of them more likely to read online news than a
newspaper on an average day.
Other popular activities on any given day include:
68 percent do information searches
36 percent do job-related research
22 percent play a game online
14 percent buy a travel service
SLOW, BUT STEADY GROWTH
The mass consumer adoption of broadband is considered important to
the economic health of a number of major industries, including
telecommunciations, software, cable television and Internet media. But
there are widespread industry concerns that the growth of high-speed
Internet access has hit a wall in the tough economic climate. For example,
telephone carriers whose wireless divisions are mired in debt have pulled
back in deployment of broadband services.
As of May 2002, about 24 million, or 21 percent, of all Internet
users in America have broadband in the home, according to Pew researchers.
That puts it about par with the adoption of other, older, consumer
technologies. High-speed Internet took about four years to reach 10 percent
penetration, compared to 4.5 years for CD players and eight years for cell
phones to reach the same levels.
"For all the hand wringing about how slow it's deploying, there's
steady growth," said Rainie.
According to a prior Pew study, 40 percent of dial-up customers say
they would like to have a home broadband connection.
One of the more surprising aspects was how broadband-connected
users became involved in creating their own content for the Web, with 39
percent having built a Web site or posted their opinions or other
information on Web sites. Rainie draws a connection between broadband and
the popular explosion of writing online diaries or Weblogs. Weblogging, the
hottest trend on the Internet, involves posting a person's thoughts,
observations or links at personal Web sites.
About 60 percent say high-speed access in the home mean increased
telecommuting, sometimes as much as several times a week.
"A phenomenal number talked about how it had changed their work
lives, because they're doing their work at home and they felt more
productive," said Rainie.
For broadband users like Rob Wells of Fayetteville, Pa. a speedy
broadband connection allows him to indulge his new favorite past time.
"I really like to watch real-time video of the Space Shuttle when
it's aloft," said Wells, 38. "I sit in front of the computer for hours
watching the earth rotate underneath the Shuttle. It's fantastic."
************************
New York Times
In Fights Over .Com Names, Trademark Owners Usually Win
By SUSAN STELLIN
Researchers analyzing an arbitration system set up to resolve disputes over
Internet addresses have found that decisions made through the system have
substantially broadened the rights of trademark holders in cyberspace.
The study represents one of the first attempts to examine the circumstances
and outcome of more than 3,800 disputes handled by online arbitration
procedures established in 1999 by the private corporation that manages the
Internet's address system.
The goal of the arbitration system, known as the Uniform Domain Name
Dispute Resolution Policy, was to provide an efficient, low-cost
alternative to litigation for trademark holders who were trying to obtain
the .com equivalent of their trademarks in many cases, from speculators
hoping to sell those names at a profit to deep-pocketed corporations.
Although the researchers concluded that the system had been effective in
combating these so-called abusive domain-name registrations, they also
found that the system had "tipped the scales too far" in favor of trademark
interests.
Milton Mueller, an associate professor at Syracuse University who conducted
the study, said that in about 80 percent of the disputes examined, the
party that filed the complaint, generally a trademark holder, prevailed. In
more than half the cases, the party asked to defend a domain name
registration did not bother to respond to the complaint and therefore lost
the right to the name.
"That raises procedural and equity questions about the process," he said.
"If lots of domain holders feel intimidated or feel it's too expensive to
respond, the whole process becomes simply a way for trademark holders to
grab domain names."
Although anyone who registers an Internet address must agree to submit to
mandatory arbitration if a trademark holder files a complaint claiming its
right to the domain, most domain-name holders are unaware of the details of
this procedure. For roughly $1,500 to $3,000, a trademark holder can file a
complaint to a dispute-resolution provider approved by the organization
that manages the address system, the Internet Corporation for Assigned
Names and Numbers.
Upon notice of a complaint, the defendant must submit documentation
demonstrating legitimate use of the name.
Conversely, the party that filed the complaint must prove three factors:
that the domain name is identical or confusingly similar to a trademark or
service mark in which the complainant has rights; that the defendant has no
rights or legitimate interest in the name; and that the name has been
registered and is being used in bad faith.
The cases are heard by a panelist, often a trademark lawyer, who is
appointed by the chosen dispute-resolution provider. One of those providers
is the World Intellectual Property Organization, which played a significant
role drafting the arbitration procedures. (Defendants can elect to pay a
fee of $1,500 or more to have their case heard by three panelists, instead
of one.)
Dr. Mueller, who has served on the name-dispute panel, said that in
studying thousands of cases several disturbing patterns emerged. For
instance, "The notion of `confusing similarity' has been expanded to the
point where any character string that incorporates the trademark is
considered to be confusingly similar," he said, citing as an example
Hewlett-Packard complaints based on defendants' using the initials H.P. in
their Internet addresses.
At the same time, researchers found the arbitration system has narrowed the
definition of what qualifies as legitimate or noncommercial use of a
trademark. "We've discovered about 80 cases in which the registrant of the
name is trying to make a statement about something not always in a
critical way, it might be a fan site, or a site that provides news or
information," Dr. Mueller said.
"The panelists are giving some very strange rationalizations for taking
those names away with alarming frequency." (In cases where the defendant
was criticizing or providing commentary about a trademark holder,
researchers found, the defendant won less than a third of the time.)
Gorstew and Unique Vacations, owners of the Sandals and Beaches resorts,
are among the top filers of complaints. The two, which own sandals.com and
many other addresses, have filed at least 23 domain name challenges, in
many cases against companies that sell Sandals vacations, recovering names
like sandalstravel.com and sandalsvacation.com.
Concern about the impact of the dispute-resolution system on free speech
was one of the factors that led the Markle Foundation, a philanthropy
focused on emerging technology, to provide a grant to support Dr. Mueller's
research. Markle also gave a grant to support the development of a public
database containing details about the first 3,845 cases submitted for
arbitration. The two grants totaled $160,000.
"This is supposed to be a high-tech dispute-resolution system, but the
manner of making the decisions of arbitrators available is as low-tech as
one can be in this age," said Ethan Katsch, director of the Center for
Information Technology and Dispute Resolution at the University of
Massachusetts, who developed the database. He said it would be available by
the end of the summer at the Web site of the Cornell Legal Information
Institute (www.law.cornell- .edu).
Dr. Mueller said that he hoped the database addressed another problem the
study found: that arbitrators issued inconsistent decisions in similar
complaints.
"I think the danger is to assume that these sort of crude standards that
we've been using for the past two years are appropriate going forward," Dr.
Mueller said, noting that despite its faults, the arbitration system is
often cited as a model for resolving global disputes involving e-commerce.
"It was set up, is administered and is pretty much run by trademark
lawyers," he said. "But it is kind of evolving into a system of global
common law."
**********************
Washington Post
Free Web-Mail Waning?
By Mike Musgrove
A couple of years ago, I scooped up about a dozen extra e-mail addresses,
thanks to the proliferation of Web sites that figured giving users free
e-mail accounts was the way to draw in advertisers' dollars.
Today, nearly all of those e-mail addresses are gone. Just this month, one
of my old favorites, an Australian site called Start, stopped.
The universe of Web-mail sites remains vast; Andrew Goodman, an editor at
Traffick.com, a guide to Web portals and search engines, figures that there
are still "in the thousands to tens of thousands" of free e-mail services
on the Web. But people seem to be gravitating toward the biggest,
presumably safest, choices, something Goodman sees in his own inbox --
where most of the Web-mail messages come from Hotmail or Yahoo accounts.
According to the research firm ComScore Media Metrix, Microsoft's Hotmail
site (www.hotmail.com) drew about 40 million users in the United States
last month and Yahoo (mail.yahoo.com) had about 30 million. The next
contender, Netscape's Web-mail offering (webmail.netscape.com), had about 2
million users.
This popularity has yet to be affected by Hotmail and Yahoo's recent
cutbacks in their free services. Both sites have been slowly peeling away
free features, merging them into extra-cost premium service options.
Starting July 16, for example, Hotmail users will no longer be able to
check other mail accounts from the site unless they pay a $19.95 yearly
fee. In March, Yahoo began charging for the ability to read Yahoo mail with
standard e-mail software.
So far surfers aren't lining up to pay for these once-free features -- that
is, if they used them at all. Hotmail claims more than 110 million active
users worldwide, but only 300,000 customers have signed on for any Hotmail
or MSN extra-service options.
If you're torn between the big two, Hotmail's recent service cutbacks give
Yahoo the edge in a few important categories.
With Yahoo, for example, you get 4 megabytes of inbox capacity for your
e-mail, or 6 megs if you signed up with Yahoo before it shrank that
allotment last year. With Hotmail, you get 2. People can send attached
files as large as 1.5 megs from a Yahoo account, compared with half a meg
for Hotmail users. With a Hotmail account, users have to log in every 30
days or the account is shut down; Yahoo mail account users get four months.
The same goes for both services' for-pay upgrades -- with Hotmail, you can
upgrade to a 10-meg mailbox for $19.99 per year, a fee that also lets users
send larger attached files and fetch e-mail from regular Internet mail
accounts. To upgrade a Yahoo account to 10 megs of storage will only run
you $9.99 a year.
At some lesser-known Web-mail services, meanwhile, you can still get those
sorts of extras for free. Mail.com, for example, gives users numerous
addresses to choose from (options such as "@mindless.com" or
"@earthling.net") and a 10-meg inbox.
A little comparison shopping can pay off even if you're not paying
anything. The risk is that a smaller, more obscure service might eventually
go belly up. Is that something to worry about?
If you want to use a Web-mail account as your primary inbox, you'd better
choose carefully, and you might be best with a name-brand site, be it
Hotmail, Yahoo, Netscape or similarly well-established options such as
Lycos or Apple's new Mac.com. But if your Web-mail account will only be a
backup to your regular account -- or you're only looking for an address to
give out for software or Web-site registrations -- virtually any Web-mail
option will do.
In that case, you can get creative. Directories of free-mail sites (see,
for instance, www.emailaddresses.com and www.fepg.net) offer any number of
wacky e-mail addresses, yours with a few mouse clicks. You might want to
think twice about sending your next résumé from a "marijuana.com" address,
however.
**********************
USA Today
Cell phones costing universities cash
SACRAMENTO, Calif. (AP) Instead of paying 9 cents a minute through Sonoma
State University, 20-year-old Sadie Gardere pays a flat monthly rate of $45
for a nationwide long distance plan that covers her calls home to the Bay Area.
Savvy students like Gardere are saving money for themselves, but costing
cash-strapped public universities millions of dollars by not using the
school-provided telephone services in residence halls and dorm rooms.
Universities say it is only a matter of time before they will have to
consider raising student costs to make up the difference.
"I would imagine over time that if there continues to be a further and
further drop, it would be reasonable to expect that there would be (an
increase in tuition)," said Toni Beron, a spokeswoman for California State
University, Long Beach.
The Federal Communications Commission estimates that nationwide, 61% of 18-
to 24-year-olds carry cell phones.
Years ago, universities could make good money serving as mini phone
companies, said Sherry Manning, director and CEO of Educational
Communications and Consortia Incorporated, a national university telephone
billing service.
Universities became wholesalers, charging slightly more than they paid for
service but less than local carriers.
Eventually, however, students started using calling cards and long distance
dialing because the advertising was aimed at the youth population, Manning
said.
"And now, everyone is shocked that students use the Internet and cell
phones as much as they do," she said.
Travis Larson, a spokesman for the Cellular Telecommunications and Internet
Association, a Washington-based wireless trade group, said it's logical
students would use cell phones because in the span of four years, they
could live with a dozen different people and move four times.
"Just imagine the nightmare at the end of the month trying to divide up the
phone bill," Larson said.
Although many universities contract out phone services through their local
telephone provider, many, like the University of California, Davis, have
implemented their own switchboard. Either way, officials say, they are
still losing out.
"Schools are saying, I am an educator, not a telephone service," Manning said.
The University of California, Santa Barbara has lost $500,000 in the last
two years. Chico State has lost $400,000 in the last year. At the
University of Rhode Island, student telephone billing has dropped from
about $800,000 a year five years ago to just $100,000.
Some schools were hesitant to release figure numbers. Most campuses use the
money to offset housing and telephone service costs.
"Clearly it has been a problem," said Paul Valenzuela, associate director
of communications services at UCSB, which charges 10 cents a minute for
long distance calls through its own switchboard. "The last couple crops of
freshman have been more cell phone oriented. They are also using e-mail and
instant messenger technology more."
As a result, some college campuses are going all wireless, dropping
landline telephones and equipping students with cell phones and handheld
computers. Those campuses include Washington's American University and the
University of Southern Mississippi.
The FCC estimates that 3% to 5% of the country's population has dropped
standard telephone land lines for cell phone use only.
Greg Roberts, director of marketing and national promotions at Cingular
Wireless, said wireless providers are always trying to improve coverage,
and campuses that go wireless will have some unique advantages.
"Teachers could tell students class is canceled because of a snow day and
students could access homework information and sporting events," Roberts said.
Others, like the University of Wyoming, may invent their own calling cards
for students.
UC Davis, which reports a 12% drop in the number of students using its
phone service in the last three years, is lowering landline phone rates to
be competitive with wireless and telephone long distance companies.
UC Davis charges less than it did two years ago, and students can tap into
online Web services to subscribe for phone service when they enroll, said
Doug Hartline, director of communication resources.
But when cell phones can offer unlimited night and weekend minutes, as well
as free long distance, they seem like a much better choice, Sonoma State
student Gardere said.
"I am renting a house next year with some friends and unless I run into a
problem, I will just continue to use my cell phone then too," she said.
"It's just easier."
**********************
USA Today
High-tech cars pose mechanical dilemma
ARLINGTON, Va. (AP) At least a couple of times a week, mechanic Ernie
Pride tells customers at his independent repair shop he can't fix their
cars because he doesn't know what's wrong with them. Go to the dealer, he
advises.
He has the experience and knowledge to service vehicles but lacks the
closely guarded information needed to diagnose problems with today's
high-tech cars.
Automakers refuse to make much of it available to independent shops that
compete with higher-priced dealerships. The practice is raising hackles in
Congress and a vigorous defense by the industry.
Figuring out what's wrong with an automobile is no longer as simple as
poking around under the hood and examining parts. Computers control many
modern vehicle systems, including the engine, the air bags and the antilock
brakes. Mechanics now diagnose problems by connecting a handheld computer
to the vehicle.
The computer gives the mechanic a code of numbers or letters that designate
the source of a problem. Without the reference material to interpret the
code, a mechanic can't fix the car.
"We just say, 'We're sorry. You've got one option go to the dealer,"' said
Pride, manager of The Car Store outside Washington.
All repair shops must get some emission system codes because of the Clean
Air Act.
Some members of Congress worry that higher-priced dealer repair shops are
using the codes to corner the repair market. Lawmakers have introduced
legislation to require manufacturers to share diagnostic codes with car
owners and independent repair shops.
Also, the Environmental Protection Agency is developing a plan to require
that automakers publish online all the codes related to emission repairs.
Cars built since the 1996 model year must have computer-controlled emission
systems to meet clean air laws.
"Most vehicles out of warranty are serviced by independent repair shops,"
said EPA spokesman David Ryan. "And the sooner these shops catch emission
problems, the better it is for the environment."
A membership survey by the Automotive Service Association, which represents
15,000 independent repair shop owners, found that 10% of cars could not be
repaired because codes are not available. The number is expected to grow as
newer cars replace pre-1996 models.
The Alliance of Automobile Manufacturers says that requiring the codes'
disclosure would make proprietary information available to competitors and
subject to copying.
The group supports the EPA's proposal, and most of its members have signed
a letter of intent to make emissions diagnostic tools for 1996 and newer
cars available to independent shops by Jan. 1.
"It's in our interest to make sure" emissions systems are fixed quickly,
alliance spokeswoman Gloria Bergquist said.
Automobile dealers made a record $80 billion on service and parts in 2001,
an 8.5% increase over 2000. Dealer labor rates tend to run from $10 to $20
per hour higher than independent shops, according to AAA.
Dealers contend it is appropriate that they have access to sensitive
information while independent garages do not.
"Dealerships have a franchise relationship with the manufacturer, and the
manufacturer can terminate that relationship," said Doug Greenhaus,
director of environment, health and safety for the National Auto Dealers
Association. "They are under contract to keep that information
confidential, but there is no relationship like that with the vehicle
manufacturer and the aftermarket."
The emissions repair codes are linked to anti-theft devices, which is
causing the insurance industry to oppose the EPA proposal. Getting the
codes to more repair shops could make it easier for auto thieves to obtain
that information, insurers say.
"If you are a thief, the first thing you want to do is to get a one-week
apprenticeship at Joe's Garage," said Kim Hazelbaker of the industry-funded
Highway Loss Data Institute.
Aaron Lowe, vice president of government affairs for the Automotive
Aftermarket Industry Association, says a potential thief also could find
work at a dealership.
"We don't think their problems are real, and we think they all can be
resolved," Lowe said. "It will be a lot better for repair shops and
technicians to more efficiently repair cars, and that will ultimately
benefit the consumer."
EPA officials say they hope to resolve the insurance industry's misgivings
about the proposal.
*************************
USA Today
Peruvian effort targets software conglomerates
LIMA, Peru (AP) Computer software could make Bruno Crespo's job much
easier if only he had the cash.
Crespo, the chief administrator of Callao, the port city that abuts Lima,
has a long wish list: a new tax database, a computerized property registry
and modernized desktop programs for 200 PCs, half of which run on Windows 95.
But like all city governments in impoverished Peru, scarce revenues can
barely provide for basic public services, let alone computer programs for
municipal workers.
Crespo says he would need $120,000 just to pay licensing fees for 200
versions of the latest Windows office suite. That alone is about four times
Callao's annual computer budget.
If Congressman Edgar Villanueva gets his way, Crespo might have some more
maneuvering room. Swimming against the Microsoft tide, Villanueva is
pushing legislation to obligate all public institutions to convert
exclusively to open-source software.
Villanueva's office has also coordinated with similar legislative
initiatives in Argentina, Spain, France and Mexico, said Jesus Marquina, an
adviser to the congressman.
Open-source programs, embodied by the Linux operating system, have
underlying code available to anyone who wants to modify or customize it.
Such software, in unadorned form, can be downloaded from the Internet for
free. The value that developers add by customizing open-source software for
specific needs and supporting it generates income.
In proprietary software like Microsoft's, the source code is mostly secret.
Companies charge licensing fees. Users update it by buying a new version.
Villanueva's measure would apply to all software from server operating
systems to databases, word processors and e-mail. It allows for exceptions
only if no open-source solution exists.
If passed, the legislation could be the first of its kind in the world the
first government-authored legal restriction that takes aim at Microsoft's
dominant operating systems and the commercial software industry that has
grown around them.
Open-source still represents only a small share of the global software
market, but governments around the world have begun turning to it for
various reasons.
Federal agencies in major powers including France, Germany, China and the
United States have adopted Linux for servers, mainly because it's cheaper,
stable and deemed less susceptible to viruses and hacker attacks.
For poorer governments in Latin America and elsewhere, open-source would
mean big savings without losing functionality, proponents say.
"The basic issue, really, is that governments are paying a high price for
commodities," said Miguel de Icaza, chief technological officer at Ximian
software company in Boston. "A country shouldn't be paying between $200 and
$700 for each workstation to run word processors, spreadsheets, Web and
calendars, and e-mail."
De Icaza is a lead developer and promoter of open-source software,
including in his native Mexico. His company sells for $60 a Linux desktop
complete with a modified version of OpenOffice.org, the free, open-source
competitor to Microsoft's Office.
For Callao, open-source could take the expense out of software upgrades,
leaving Crespo to dedicate his computing budget to developing database systems.
Villanueva says the Peruvian state owes about $30 million in overdue
software license fees. A government study last year estimated Peru would
have to pay $18 million in licensing fees to cover the pirated software it
uses.
The same study painted a stark picture of Peru's overall IT situation. Many
government PCs still run Windows 95 and about a third still use the
outdated Pentium II processor or earlier versions.
Villanueva says budget savings is not the primary goal of his proposed law.
"Our philosophy is to try to give access to technology to the most people
possible, especially young people, and that the state should play a
fundamental role in that process," he said.
Villanueva hopes his measure triggers activity in Peru's software industry
by freeing programmers from the constraints of working with coding
controlled by a few large companies.
Microsoft officials contend the legislation is based on misconceptions and
unproven theories. Along with Peruvian software companies, Microsoft has
lobbied congressmen, government officials, academics and businesses with
that message.
The office of the chief of Peru's Cabinet has already voiced opposition to
the measure.
"There are several challenges that the government would face if it approves
that law," said Mauro Muratorio, Microsoft's corporate strategy director
for Latin America.
Muratorio said software comprises just 2% to 3% of an organization's
technology costs. More than 90% goes to services, such as technical
support, training and development, which could be even more costly with
open-source, he added.
Sales of Microsoft products mostly made through local
businesses encourage local growth, Muratorio argued.
Microsoft Peru expects $27 million in sales this year, which would generate
about $70 million for local businesses, Muratorio said.
Rolando Liendo, president of the Peruvian Association of Software
Developers, said the country's fledgling software industry which produces
$40 million a year in mostly proprietary software could be hit hard by
Villanueva's legislation. Roughly a quarter of its business goes to the
government, he said.
But Villanueva argues that the freedom created by his bill would far
outweigh any temporary losses.
With proprietary software, "a systems engineer graduate ends up being a
user. Call him 'programmer' in quotation marks, but in the end he's a user.
If he had access to source code, that engineer would have the possibility
to transform, to modify, to adapt to his needs, to create," Villanueva said.
"We're just giving them a legal tool so they can go forward. We'll see if
it happens."
********************
USA Today
Devices show what a tangled brain we weave
WASHINGTON (AP) The world is becoming a trickier place for people who tell
lies even little white ones.
From thermal-imaging cameras designed to read guilty eyes to brain-wave
scanners, which essentially watch a lie in motion, the technology of
truth-seeking is leaping forward.
At the same time, more people are finding their words put to the test,
especially those who work for the government.
FBI agents, themselves subjected to more polygraphs as a result of the
Robert Hanssen spy case, have been administering lie detection tests at
Fort Detrick, Md., and Dugway Proving Ground in Utah, bases with stores of
anthrax. Nuclear plant workers also are getting the tests in greater
numbers since Sept. 11.
"There has been a reawakening of our interest in being able to determine
the truth from each other," said sociologist Barbara Hetnick, who teaches a
course on lying at Wooster College. "As technology advances, we may have to
decide whether we want to let a machine decide guilt or innocence."
The new frontiers of lie detection claim to offer greater reliability than
the decades-old polygraph, which measures heart and respiratory rates as a
person answers questions.
They also pose new privacy problems, moral dilemmas and the possibility
that the average person will unwittingly face a test.
At the Mayo Clinic, researchers hope to perfect a heat-sensing camera that
could scan people's faces and find subtle changes associated with lying. In
a small study of 20 people, the high-resolution thermal imaging camera
detected a faint blushing around the eyes of those who lied.
The technique, still preliminary, could provide a simple and rapid way of
scanning people being questioned at airports or border crossings,
researchers say.
But would it be legal?
"As long as no one was being arrested or detained solely on the basis of
the test, there is no law against scanning someone's face with a device,"
said Justin Hammerstein, a civil liberties attorney in New York.
"You could use the device to subject someone to greater scrutiny in a
physical search or background check, and it would be hard to argue that it
is illegal."
Barry Steinhardt of the American Civil Liberties Union said any technology
that isn't 100% effective could lead unfairly to innocent travelers being
stranded at airports.
"You would be introducing chaos into the situation and inevitably focusing
on people who are innocent," Steinhardt said.
At the University of Pennsylvania, researcher Daniel Langleben is using a
magnetic resonance imaging machine, the device used to detect tumors, to
identify parts of the brain that people use when they lie.
"In the brain, you never get something for nothing," Langleben said. "The
process for telling a lie is more complicated than telling the truth,
resulting in more neuron activity."
Even for the smoothest-talker, lying is tough work for the brain.
First, the liar must hear the question and process it. Almost by instinct,
a liar will first think of the true answer before devising or speaking an
already devised false answer.
All that thinking adds up to a lot of electrical signals shooting back and
forth. Langleben says the extra thought makes some sections of the brain
light up like a bulb when viewed with an MRI.
MRI machines are bulky, but their potential as lie detectors could lead to
the invention of smaller, more specialized versions, Langleben said.
Other tests are on the market, although how well they perform is an open
question.
Handheld "voice stress" detectors already are being sold for $300 to $600
at some department stores and on the Internet.
Makers claim the devices show when a person's voice trembles under the
stress of a lie. Although skeptics say there is no proof they work, police
in Philadelphia, Los Angeles and Miami are using more advanced versions and
say they sometimes prompt confessions.
Also, the subject need not be present. Police can record a suspect's voice
and check it for stress later.
Not everyone is sold on it.
"Voices can shake because people are scared about being interrogated by
police," said Thomas Jakes, president of People for Civil Rights. "This
technology is nothing but a way to scare people."
Critics say failure on any lie detector test can have unfair consequences,
regardless of what the truth may be.
Mark Mallah says he was suspended and put under 24-hour surveillance after
failing a routine polygraph test in 1994, when he was an FBI
counterintelligence agent.
He was finally cleared and reinstated 19 months later. He quit.
"They never produced any evidence or came forward with anything, but the
polygraph still undermined my career," said Mallah, who practices law in
San Francisco.
In the CIA, routine polygraphs led to the suspicion of dozens of agents in
the 1980s. Many were kept in professional limbo for years, according to an
FBI report.
"We should try to avoid a society where suspicion is based on a machine and
not on evidence," said Dale Jenang, a sociologist and philosophy researcher
at the University of California, Berkeley. "Guilt and innocence are too
important to leave to a machine."
************************
Los Angeles Times
Getting a Hand-Held on Fighting Crime
Software: ImageWare Systems' Crime Web Lite lets officers use PDAs to check
suspects' identities.
By CHRISTINE FREY
TIMES STAFF WRITER
June 24 2002
Sgt. Larry Bryant has the suspects he wants in the palm of his hand.
Bryant, who oversees records for the Los Angeles County Sheriff's
Department, can use his hand-held organizer to instantly search more than a
million mug shots by such variables as eye color, height and even
distinctive tattoos.
So instead of driving back to the office to pull a file, Bryant can look up
a person's booking profile--including color photograph, address and
aliases--while out on the street. The software designed by San Diego-based
ImageWare Systems Inc. was introduced this year and is among the latest
technology focusing on local law enforcement.
Although many new high-tech security features introduced since Sept. 11
have been aimed at fighting terrorism, tools such as ImageWare's are
designed to take common criminals off the street. Unlike federal law
enforcement agencies, however, most local departments don't have
billion-dollar budgets.
At a time when police and sheriff's departments are facing budget cuts, law
enforcement officials say they are unlikely to get money for personal
digital assistants over patrol cars.
Several law enforcement agencies--including those in New York, San Antonio
and Las Vegas--already have adopted the PDA technology, said ImageWare
Chief Executive Jim Miller. Most departments, though, are using less glitzy
gadgets and installing the software on laptops in patrol cars.
The technology is used to help identify suspects giving false names and
those with outstanding warrants. When running an identity check, officers
can search a digital booking database for the person's name or physical
description and receive dozens of matching mug shots. Departments without a
wireless connection can search as many as 50,000 records stored on a hand-held.
"It was designed as a tool, not to say that's absolutely the person that
committed the crime but to help detectives narrow down the list of
suspects," Miller said.
In addition to law enforcement technology, ImageWare specializes in digital
photography and database management. Last month, the company posted a
first-quarter loss of $1.48 million, or 27 cents a share, on revenue of
$3.66 million, compared with a loss of $880,000, or 21 cents a share, on
revenue of $2.76 million a year earlier.
The Stanislaus County Sheriff's Department installed the software, called
Crime Web Lite, on laptops in patrol cars, giving officers wireless access
to three databases: its digital bookings, registrant database (which
consists of sex offenders, arsonists and narcotics offenders) and elderly
database (which includes the names and descriptions of local Alzheimer's
patients).
Since installing the software about two months ago, officers have been able
to run more identity checks from the field, said Gordon Brussow, senior
systems engineer for Stanislaus County.
"What we've found is that officers are saving time," Brussow said. "If we
were out in the outskirts of the county, we used to have to drive all the
way back to the office and have the clerk run and pull photos."
In Los Angeles County, where sheriff's deputies typically receive
confirmation of a suspect's identity from a radio operator or a text-based
computer, three patrol stations--West Hollywood, Pico Rivera and
Cerritos--have installed the software in patrol car laptops. The county is
testing the PDA application.
Despite the number of photographs in the system--Los Angeles County adds
about 1,000 mug shots a day, Bryant estimates--the technology's success
depends to some degree on law enforcement agencies sharing information.
"What we want to have is a federal repository for criminals and suspected
terrorists so we can check people quickly, and that's one thing ImageWare
could help do," said John Paulson, an analyst with Paulson Investment Co.
"Right now you have a lot of cities and some states that have repositories
and databanks that share information with each other, but criminals and
terrorists move around from state to state.... You really need a national
database."
ImageWare's digital booking database software--which allows officers to
access digital booking databases on a secure intranet--starts at around
$30,000 to $40,000, depending on the number of officers using the system.
PDA licensing fees are several hundred dollars per hand-held. The PDAs,
which must run the Pocket PC operating system, and wireless fees cost extra.
Because hand-helds are expensive, law enforcement officials say it is
unlikely that each officer would be equipped with one. Probably only those
without access to computers--detectives and officers on foot or bike
patrol, for instance--would carry them.
In the future, cameras could be added to PDAs so officers could take
photographs of suspects in the field. Those photographs could be run
against a facial-recognition system to identify suspects.
*************************
San Francisco Gate
Shops try chips for tracking every move by client 'tribe'
Monitoring systems note what catches customers' eyes
New York -- At Prada's flagship store in SoHo, Ellen Lindhart was checking
out a shimmery blue jacket with a flirty, low-hanging belt. As she pulled
it off the rack and headed to a dressing room, the haute couture was
checking her out, too.
A tiny silicon chip inside a black envelope attached by string to the
garment transmitted a signal to a computer in the store's back room that
logged the movement. The computer, in turn, sent a command to a flat-screen
monitor near where Lindhart was standing in the dressing room. The monitor
popped up an image of the jacket she was trying on, complete with details
about its cut, fabric and color.
"Hmm," Lindhart mumbled as she slipped her arms into the jacket -- puzzled,
she said later, about how the computer knew so much.
The Prada shop is wiring itself to be a virtual laboratory for studying
shoppers' psyches. It now knows the exact location of every outfit in the
store. Soon, for those who sign up for Prada's customer loyalty program,
the shop will keep track of what shoppers try on and what they buy.
Once, retailers who wanted to know what people thought about store displays
or shopping experiences would stop them on their way out or invite them to
focus groups. Now technology allows retailers to conduct "observational"
research -- clandestinely studying consumers in their habitat as they might
animals in the wild.
Prada is among hundreds of companies that have begun experimenting with new
technologies to peek in on consumers. "Gaze-tracking" systems monitor how
long a person stared at a particular part of a shelf, so displays that
don't seem to inspire shoppers can be quickly rearranged. Electronic
sensors count the number of shoppers in particular areas, helping stores
deploy staff better.
"Very often what people do is very different from what they say. By
observing them when they don't know you're observing them . . . you often
get a stronger idea of motivation," said Bill Abrams, founder of HouseCalls
Inc., a firm that specializes in what he calls "retail ethnography."
Paco Underhill, founder of behavior research firm Envirosell Inc., said
this kind of research is critically important today, as the average time
shoppers now spend in a store is down to its lowest point ever: 11.27
minutes for buyers and 2.36 minutes for nonbuyers. Given that 60 to 70
percent of purchases are impulse buys, Underhill said, it's crucial for
stores to watch customers to figure out what's capturing their attention.
Many projects are being done quietly, because retailers fear a backlash
from privacy-minded customers.
Among the most-popular systems are those that act as substitutes for store
greeters who click counters behind their backs as they say "Hello" to
customers. ShopperTrak RCT, a high-tech analysis company, has set up such
devices in more than 10,000 locations, including Eddie Bauer, Ikea, Sears
and Disney stores.
The wanderings of people's eyes -- what they pass over, where they linger --
have also become of great interest. Thomas Hutchinson, a professor at the
University of Virginia and Cambridge, said that while few companies have
deployed such technologies in stores, many are testing them in laboratories.
The technology with the greatest implications for retailing research may be
the e-tag chips attached to merchandise such as the clothes at Prada. Gap,
Toys R Us, Bloomingdale's and Hollywood Video are also testing the tags.
The size of a postage stamp, e-tag chips are capable of storing and sending
wireless signals with information such as the product name, when it was
manufactured, its location, directions for use and expiration date.
Most companies are using these systems for inventory control. At a Gap
store in suburban Atlanta, for instance, the company put e-tags on jeans
that could map their location in the store. Sales associates could
determine, say, whether they had run out of size 4s on the floor and needed
to grab extras from the back room, said Tres Wiley, a strategy manager for
Texas Instruments Inc., which provided the system. Wiley said the
technology significantly boosted sales. Gap representatives declined
comment on the three-month test.
Prada has a more ambitious vision for its e-tags. By tracking which items
customers tried on or bought, it hopes to better predict what they will want.
At the Prada store in New York, information has been collected without
identifying specific customers. Soon the company plans to introduce a
program that will link the data to customers who agree to participate.
Prada plans to issue them e-tags in the form of loyalty cards. Sales
associates will be able to scan shoppers' cards and access profiles that
list sizes, favorite colors and fabrics, previous purchases and credit
history.
Bruce Eckfeldt, a manager at IconNicholson, which designed the software for
the project, said Prada has informed customers of the tracking and has
collected personal information only from those who consent.
Prada shopper Lindhart said she didn't mind the surveillance if it means
better service. "Nowadays you can't do anything without being watched," she
said.
But another customer, Jennifer Yoder, said retailers should be required to
provide privacy policies outlining what information they collect and how
they use it.
*************************
BBC
Old net name to get new owner
The hunt for a new owner of the dot.org net domain has begun.
The net suffix needs a new owner because the existing overseer will give up
control over the domain by the end of this year.
In all, 11 organisations and groups have put in bids to run dot.org.
Dot.org is the electronic home of many non-profit groups, and many of the
bidding groups are planning to support this non-commercial ethic by
changing the way the suffix is managed.
Community centre
This week, the Internet Corporation for Assigned Names and Numbers (Icann),
the organisation that oversees the running of the net, revealed the list of
bidders for the dot.org domain.
The domain is being released as part of a deal that its former owner,
Verisign, struck with Icann.
By giving up control of the dot.org registry, Verisign got permission to
keep control over the lucrative dot.com domain past the previously
negotiated 2007 expiry date.
The deal was drawn up following US Government concern that Verisign was
gathering too much control over net domains.
Community ethic
The bidders keen to run dot.org have each paid Icann $35,000 to consider
their application.
Bids have come from a variety of groups, many of whom are already involved
in the running of generic domains, such as dot.name or dot.coop as well as
suffixes for individual nations.
Andrew Tsai, chief executive of the Global Name Registry, said change was
needed because currently dot.org owners had no way of influencing what
happened to their chosen domain and no central place to discuss community
issues.
He said GNR would use 5% of the money made from dot.org domain fees to
create a "community capital" that would dispense advice to new dot.org
owners and act as a debating chamber for all owners.
"The vision is about inclusion, education and how this diverse community
can shape the dot.org space together," he said.
The International Federation of the Red Cross is backing GNR's bid.
'Tried and tested'
Similar self-governance ideas were voiced by Malcolm Corbett, a spokesman
for Poptel which is part of the Unity Registry bid for dot.org.
He said if it was successful Unity would create a co-operative with dot.org
domain owners as members to drive development of the suffix.
"It's a tried and tested structure for giving people influence over top
level policies," he said.
Unity is planning to return 10% of the cash from domain fees to setting up
the co-operative and creating resources for members.
Icann is due to appoint a new dot.org owner by the end of August 2002.
**********************
BBC
Warning over password security
Computer users are being urged to change their passwords regularly to avoid
becoming a victim of internet fraud.
Experts say that passwords used to log on to the internet and access
confidential information such as bank details should be altered at least
once a month, both at home and at work.
The warning comes as a survey suggests more than half of computer users
never change their passwords, and many use words that can be easily guessed.
The study published by the British online bank Egg says users even leave
passwords written on Post-It notes attached to their computers.
The names of loved ones and relatives top the list of the most commonly
chosen passwords, according to the survey of 1,000 users.
The BBC's e-commerce reporter John Moylan says the rapid rise of the
internet has been mirrored by increased concerns about carrying out
transactions online.
'Simple steps'
He says the survey demonstrates that computer users' own behaviour presents
a major security risk.
The study recommends that as well as changing passwords regularly, users
should:
*Make passwords at least eight digits long
*Not write passwords down
*Use more than one password for different websites
*Avoid common themes.
Patrick Muir, director of marketing at Egg, said: "The internet is as safe
a place to shop or bank as the high street.
"However, there are a number of simple steps that consumers can take in
order to improve their personal security."
**********************
BBC
The fax machine uprising
How did a loose collective of internet users force a government U-turn on
controversial changes to digital privacy laws? The answer is that they did
it using simple technology to create a large-scale grassroots protest
campaign almost overnight.
If you think most internet geeks are a bunch of self-interested
games-addicted cynics with eyes for little else but their computer screens,
it's time to think again.
Last week, the UK online community scored a dramatic victory over
government plans to give all sorts of public bodies access to records of
everyone's e-mail and phone records.
And it all happened astonishingly fast. Within days of the alarm being
raised, Home Secretary David Blunkett publicly apologised for "getting it
wrong".
Cabinet ministers aren't in the habit of backing down on changes to the law
just because someone gripes about it. This campaign was different.
The story begins two years ago, when the Regulation of Investigatory Powers
(RIP) Act was passed, after much opposition from the online community.
RIP was designed to let the authorities demand private information about
people's habits on the internet and on their mobile phones from the
companies that provide internet and phone connections.
Originally, RIP's definition of "authorities" was limited to the police,
Customs, and the secret services. The limit was set because the powers
allowed under RIP did not need approval by a judge - a senior police
officer just had to sign a piece of paper saying the RIP powers were needed.
But suddenly earlier this month the Home Office announced that it wanted to
amend that list of "authorities". Now it would include local councils,
government departments, even the Royal Mail.
Privacy experts were horrified.
The story begins two years ago, when the Regulation of Investigatory Powers
(RIP) Act was passed, after much opposition from the online community.
RIP was designed to let the authorities demand private information about
people's habits on the internet and on their mobile phones from the
companies that provide internet and phone connections.
Originally, RIP's definition of "authorities" was limited to the police,
Customs, and the secret services. The limit was set because the powers
allowed under RIP did not need approval by a judge - a senior police
officer just had to sign a piece of paper saying the RIP powers were needed.
But suddenly earlier this month the Home Office announced that it wanted to
amend that list of "authorities". Now it would include local councils,
government departments, even the Royal Mail.
Privacy experts were horrified.
The fax campaign was possible thanks to a website called faxyourmp.com,
which itself was created in the aftermath of the first Stand campaign two
years ago.
Faxyourmp.com does exactly what it says it will. When users enter their
postcode, it tells them who their MP is, and then allows them to send a fax
explaining their case.
Hundreds of faxes were sent in just a few days, enough for an average of
two for every MP.
This got noticed in Westminster. MPs started responding directly, in some
cases contacting the faxers and asking them to explain more.
Many people sending faxes were among Stand's wide network of internet
friends, part of the UK's web development community. Others were spurred on
by further campaigning by the Foundation for Information Policy Research
(FIPR), a think-tank that shared Stand's objections to the Home Office plan.
Some even represented the organisations that were proposed to have access
to RIP powers - people concerned that their small departments would never
have the time or resources to effectively take on such a huge responsibility.
Media coverage
Not only did the fax campaign help, it did so in record time. Within days,
the government was talking about postponing the debate until July. A couple
of days later, it announced the plan had been shelved indefinitely.
Stand and its supporters celebrated, surprised - but nonetheless delighted
- with the success of the fax campaign and the amount of media coverage it
generated.
As another Stand team member, Danny O'Brien, says: "It was a good strategy,
and I'm glad we randomly stumbled upon it."
The campaign doesn't end there. Although officially postponed, the changes
to RIP may still re-emerge. Stand, the FIPR, and their supporters are
determined to be ready for it next time.
Ultimately, they see their success as a result of changing attitudes to the
internet.
As James Cronin says: "People's attitude towards the way the internet and
other communications technologies interact with their lives has changed
quite fundamentally since the first Stand campaign. People's digital lives
are now much more real to them."
**********************
Federal Computer Week
One year and counting: Section 508
Feds tout progress, but need more time on accessibility law
Today, blind U.S. Postal Service customers can buy stamps, check ZIP codes
and perform other transactions at an Internet site USPS calls its
"cyberspace post office that never closes."
But they can't download usable tax forms from the Internal Revenue Service.
Students seeking financial aid and school officials applying for grants
from the Education Department now can do so online despite
disabilities something they couldn't do a year ago. But vision-impaired
employees at Education can't process the applications because the
department's grants management system is not "accessible."
It has been a year since Section 508 of the Rehabilitation Act went into
effect, requiring federal agencies to make sure their Web sites and office
technology can be used, or "accessed," by people with a variety of
disabilities.
So far, progress toward implementing Section 508 has been inconsistent.
The White House, for example, has unveiled a new, largely accessible Web
site. And some agencies, such as the Federal Communications Commission, now
provide news and public notices in accessible formats.
But government employees eager for more education and the promotion
possibilities it might unlock are apt to be frustrated by agency-sponsored
online training courses that fail to include captions for the deaf or audio
narration and Braille course materials for the blind.
Inside some government agencies, efforts to achieve Section 508 compliance
have sometimes verged on dramatic, as when Education officials made a
software vendor fly a team of technicians to Washington, D.C., to fix
accessibility problems in an automated travel voucher application before
the agency would accept it.
"They sent guys here from California," a department employee marveled.
But instances of such vigorous enforcement appear to be the exception.
Advocates for those with disabilities say real progress at most federal
agencies remains painfully slow.
"The reports I get from our people are that not much has changed. It's kind
of discouraging," said Curtis Chong, director of technology at the National
Federation of the Blind.
Many agencies have focused on improving the accessibility of their Web
sites, which are highly visible to the public but represent only one of a
half-dozen categories of technology that Section 508 covers. And the
others, such as desktop software, telecommunications, office equipment and
information transaction machines, may have a far greater impact on
employees and their ability to do their jobs.
A Case in Point
For instance, Section 508 states that all training and informational video
and multimedia productions produced or bought by agencies must have
captions and audio narrations.
"But almost none of it is being done," said Larry Goldberg of the National
Center for Accessible Media. "It is so doable, the technology is almost
mundane," yet many agencies continue to make training tapes and online
instruction programs without captions and audio narration, he said.
Instructional material for employees may seem like an obscure sideline in
the federal government's use of information technology, but it is an
increasingly important one, according to Joy Relton of the American
Foundation for the Blind.
"Agencies are going more and more to distance learning and online
training," she said. It's inexpensive for the agencies and convenient for
employees. And training often is essential for those who need to keep up
with fast-changing technology.
But training courses continue to rely heavily on Flash a type of authoring
software that creates animated Web pages and PDF files. Neither can be
read by the screen readers that the blind and visually impaired use.
Flash maker Macromedia Inc. and PDF producer Adobe Systems Inc. are
developing more accessible versions of their products, but they are not
widely used. So for now, distance learning remains a distant hope for many
with disabilities.
But the problem hasn't gone unnoticed by federal officials, said Terry
Weaver, director of the Center for IT Accommodation at the General Services
Administration.
Accessible online training "is a big issue, one of the top issues" among
Section 508 coordinators, she said. The coordinators are senior officials
who oversee each agency's Section 508 implementation.
"We have gone to talk to the companies that develop these products," Weaver
said, but it will take more time for companies to learn to produce
accessible online training programs.
Asking for Time
"More time" may be the accessibility axiom at Section 508's first anniversary.
"Section 508's not an overnight silver bullet," said Laura Ruby, Microsoft
Corp.'s accessibility and disabilities program manager.
"We're one year into it now, but the product cycle is six to 24 months,"
she said, and that means products developed to be 508-compliant are just
now beginning to appear on the market. But that doesn't necessarily mean
agencies are ready to buy them.
The acquisition process takes time. Some agencies are just now receiving
products that were made two years ago.
"Many agencies are just going to [Microsoft] Windows 2000," Ruby said. It
is unlikely that those agencies will buy the next-generation operating
system, Windows XP, anytime soon. So "folks there may not be able to access
the operating system with the most accessible features" for years to come.
The same product and purchasing cycles also affect the availability and
acquisition of accessible hardware, said Michael Takemura, an accessibility
specialist for Hewlett-Packard Co.
Computer manufacturers must wait for software producers to develop
accessible operating systems and applications before they can build fully
accessible computers. And then they can only sell when the government is
buying.
Typically, agencies upgrade their computers, printers and other office
equipment every "two years on the short side and four or five years on the
long side," Takemura said. So employees at agencies with relatively new
equipment and a long replacement cycle might not begin to see new, more
accessible technology until 2005 to 2006.
Such delays are frustrating for those with disabilities. They expected
faster relief when Congress passed and President Clinton signed Section 508
in 1998. But such delays were to be expected, said GSA's Weaver.
June 25, 2001, the day 508 took effect, "was a start date," she said.
"Procurements take time." Compliance with Section 508 "wasn't designed to
be immediate." And "the products have to be there before we can buy them."
No Quick Fix
Even when accessible products are available, accessibility isn't always as
simple as buying the products and plugging them in. The complexities of
operating systems, data systems and system architectures can make
integrating accessible technology a challenge, Weaver said.
How easily new systems will fit in and function with legacy systems varies
tremendously by agency, depending on factors as different as each agency's
number of data systems, branch offices and teleworkers, she said.
But the complexity of 508 compliance is having at least one positive side
effect, Weaver said a growing number of federal technology chiefs are
realizing that their agencies need better technology architectures, she said.
Some accessibility experts say understanding that is essential for success.
"We've tried to push enterprise-level accessibility," said Louis
Hutchinson, chief executive officer of Crunchy Technologies.
"Without that happening, you will see one segment of an agency become
absolutely accessible, and then go down the hallway and see another part
that isn't accessible at all." Or worse, the inaccessible branch will feed
information that is not in a 508-compliant format to the accessible branch,
gradually undermining its accessibility, he said.
For accessibility to prevail, strong requirements must become embedded
throughout agency processes, Hutchinson said. And for the most part, that's
not happening yet, he added.
Crunchy, which produces software tools for evaluating and improving the
accessibility of applications and Web pages, works for nearly two dozen
federal agencies, from NASA and the Army to the Small Business Administration.
During the past year, Hutchinson said, accessibility progress has been most
evident on agency Web sites, where there "are certain pockets that are
accessible and other pockets that are moving toward accessibility."
But often accessibility is only Web deep. "Most of the Web-based
applications in government are interfaces to legacy applications that are
not accessible," he said.
And even Web accessibility can be illusory.
Education Chief Information Officer Craig Luigart proclaimed his agency "in
very, very good shape on Web compliance." Luigart is also chairman of the
federal Section 508 Steering Committee.
"We have the vast preponderance of our Web material in compliance" with 508
standards, he said. "And each day, as older material is archived and new
material is developed," the degree of accessibility increases.
Gauging Progress
A test of Education's Web site using automated accessibility-checking
software by SSB Technologies Inc. yielded a compliance rating of 72 percent.
The accessibility checker, called Ask Alice, examined 408 randomly selected
Education Web pages and found 1,030 accessibility errors.
Many accessibility experts question the accuracy of Ask Alice and similar
compliance-checking tools. Automated tools can spot possible accessibility
problems, but to get a really accurate accessibility analysis, a human
being must check Web pages, said Michael Cooper of the Center for Applied
Special Technology.
Many of the page elements that automated checkers identify as noncompliant
actually are compliant, according to Cooper and other accessibility experts.
Luigart said a random sample of Education's Web pages does not provide a
true picture of the Web site's accessibility. The department has
concentrated on making the most-used of its 55,000 pages accessible, he
said. A random sample likely includes some pages that are six or seven
years old and rarely, if ever, used by the public.
Finding that a percentage of those pages are not 508-compliant would not be
surprising, he said but for practical purposes, those pages do not affect
the general accessibility of Education's Web site.
From his post at the head of the Section 508 Steering Committee, Luigart
said federal agencies "have moved aggressively" to implement Section 508.
But he acknowledged that the pace of real progress in accessibility might
best be described as "evolutionary."
Crunchy's Hutchinson has reached a similar conclusion. It is likely to take
two or three more years before accessibility begins to be the norm in
government agencies, he predicted. By then, much old equipment will have
been replaced, some legacy applications will have been abandoned or
modified, and new, accessible products will have been developed by industry
and bought by agencies.
But Hutchinson is convinced that, eventually, accessibility will become the
standard.
When that happens, products such as authoring tools will include wizards
that won't allow authors to produce inaccessible Web pages or multimedia
presentations, he said. And accessibility features will be built into most
operating systems, while desktop applications will cause products lacking
accessible features to seem so obviously deficient that they will be
modified or replaced, he said. Perhaps. But for Chong and other
accessibility advocates, progress made in the past year warrants only
modest optimism.
"The process is so slow and there's so much to be done," Chong said.
"There's lots of talk about 508 and lots of talk about accessibility, but
really, all the problems still exist."
David Greco, CEO of SSB Technologies, agrees. "Based on our research,
there's a long way to go," Greco said.
In addition to operating Ask Alice, SSB sells "accessibility solutions" to
a number of federal agencies, including the Defense Department, the Social
Security Administration and the Census Bureau. The company specializes in
finding and fixing accessibility problems in agency Web sites and office
applications.
"Our research shows a number of agencies are not very compliant at all,"
Greco said.
Ask Alice finds numerous accessibility defects in such heavily used
government Web sites as those run by the White House, FirstGov, Education,
the Transportation Department and others.
Despite its critics, Ask Alice "provides a reliable indication of a Web
site's overall accessibility," Greco said.
In addition to checking Web sites, SSB often is asked to check the
accessibility of agency software applications, and it frequently finds
"significant issues related to accessibility." Even software that seems to
meet Section 508 guidelines does not always work with specific assistive
technology, he said.
"Most agencies are struggling with how to integrate accessibility software
tools into their overall processes," he said. "But if you ask if 508 has
been successful, I would say yes. Section 508 has catalyzed a lot of effort."
"Awareness is very high, and that's an accomplishment," agreed Goldberg of
the National Center for Accessible Media. Before Section 508 took effect,
agencies and technology manufacturers "had no compelling reason to pay
attention to accessibility. Now they do."
Still, "there is a good deal of frustration" among people with disabilities
who see accessibility as slow in coming, he said.
Even if the pace picks up, achieving accessibility will be an incremental
process, Luigart said. "We will have solutions tomorrow that we do not have
today, and the day after that we will have problems with technology that we
do not have today," he said. But movement up "the learning ramp" is faster
than movement down "the problem ramp."
Achieving accessibility "will take time," Chong conceded. At the first
anniversary of Section 508, "we've seen the first baby steps taken. Let's
hope the honeymoon isn't over."
*******************
Federal Computer Week
FEMA seeks wireless fix
BY Megan Lisagor
In another case of homeland security housekeeping, the Office of Management
and Budget will soon mandate a reallocation of wireless efforts to one
e-government initiative, according to Ronald Miller, chief information
officer of the Federal Emergency Management Agency.
FEMA will organize the government's communications capabilities under
Project SafeCom to ensure that emergency workers are outfitted with
interoperable equipment.
The small agency recently took over the project from the Treasury
Department because of its emphasis on emergency preparedness and first
responders, Miller said at an Industry Advisory Council breakfast June 20.
"Our communications system in this country is a total, dismal failure,"
said Rep. Curt Weldon (R-Pa.).
FEMA officials plan to use bridging technologies to improve the situation
in the near future as the agency moves toward creating a national standard,
Miller said. "Technology is not the problem," he said. "Our job is to bring
this community together to find a coordinated solution."
Miller, Weldon and local officials recounted the breakdown in
communications after the Sept. 11 terrorist attacks. First responders
needed up-to-date information to direct rescues. But with telephone service
down in some areas, an overwhelming volume of calls clogging the wireless
phone system and fire departments transmitting radio messages on different
frequencies, rescuers struggled to communicate.
In the end, some were reduced to sending runners with handwritten notes.
In Miller's mind, a reserved radio spectrum for safety is the answer to the
communications problem, he said.
************************
Federal Computer Week
Homeland department IT taking shape
BY Diane Frank
Top Bush administration information technology managers have begun to
create an IT architecture for the proposed Homeland Security Department
while Congress still debates the legislation that will ultimately form the
department.
Chief information officers at the agencies designated to become part of the
Homeland Security Department and top IT policy-makers at the Office of
Management and Budget have begun drafting initial plans for the networking
needs of the agencies that will have to share information and
communications. The team is also working on merging the multibillion-dollar
IT investments many of these agencies already have under way.
Steve Cooper, senior director of information integration and CIO at the
Homeland Security Office, said his office, working with OMB, doesn't "want
to interfere or block" the IT initiatives under development, but wants "to
integrate and align them."
The Homeland Security Department will include organizations and the IT
networks that support them as diverse as the Coast Guard, the Federal
Emergency Management Agency and the new Transportation Security Administration.
Much of what the IT transition team is working on revolves around
collaboration tools, which can include everything from document management
to e-mail, Cooper said. Special working groups have been formed to hammer
out the details of collaboration tools and other technologies such as
wireless communications and geospatial information.
The administration plans to begin addressing many of the long-term
architecture issues next month when Congress is expected to pass a
supplemental appropriations bill that includes funding to create an
Information Integration Program Office, Cooper said. Officials have already
identified personnel to work in the office, and as soon as the money is
available, they will be sent to the Critical Infrastructure Assurance
Office, he said.
The team is relying on work done in recent years on enterprise
architectures within individual agencies, which includes a list of IT
equipment in place and a plan for future integration, Cooper said. OMB's
efforts during the past year to create a federal enterprise architecture
and align common IT investments across government also provides a road map.
The team has a good chance of achieving its goals, said Alan Balutis,
executive director of the Federation of Government Information Processing
Councils. However, quickly meeting the short-term needs of interoperability
while developing a long-term architecture will not be an easy task, he said.
"Many of the [existing] program and systems initiatives aren't aimed at the
homeland security arena. They were designed with other customer needs in
mind," Balutis said. "A transition of this size would be challenging in and
of itself, even at another time."
The team also has begun discussing interoperability of enterprise systems
and initiatives in development, which will be more difficult to integrate
into the department's single architecture. Modernization programs, such as
the Customs Service's Automated Commercial Environment, the Coast Guard's
Deepwater program and the Immigration and Naturalization Service's ATLAS
program, have some of the largest budgets of the efforts already under way.
Past criticism of these programs brought up concerns last week as the House
Government Reform and Senate Government Affairs committees considered the
administration's plan for the new department. Committee members Sen.
Richard Durbin (D-Ill.) and Rep. Ed Schrock (R-Va.) questioned whether the
department could create new information systems and simultaneously
integrate them when these systems already have development problems.
The management structure proposed in the White House bill should address
these problems, said Tom Ridge, director of the Homeland Security Office,
testifying at the House and Senate hearings. Ridge is also director of the
Transition Planning Office within OMB, which President Bush created by
executive order on June 20. The IT team led by Cooper will work with this
new office.
That structure includes an undersecretary for management, who would be
responsible for all management functions, including IT, personnel, budget
and procurement. The bill also creates a separate CIO and chief financial
officer.
The relatively undefined management structure the bill lays out some
positions and responsibilities clearly, but not others also has some
observers worried.
The proposal "appears to represent a more traditional, and somewhat
antiquated, management structure," a senior administration official said.
"I would explore giving the CIO direct responsibility and accountability
for information systems and information technology, including direct budget
authority," the official said. Without direct oversight of the IT functions
and budgets in every area of the department, "this just won't work."
***
The security players
Below are the information technology managers responsible for developing
the single IT architecture for the Homeland Security Department. The
architecture is intended to eliminate redundant investments and allow the
department to work in real time.
The homeland security IT team:
* Steve Cooper, senior director of information integration and chief
information officer, Homeland Security Office
* Mark Forman, associate director of information technology and
e-government, Office of Management and Budget
* Jim Flyzik, senior adviser for IT, Homeland Security Office
* Norman Lorentz, chief technology officer, OMB
The IT transition team that will work with the leaders is composed of
agency CIOs and other IT officials, including:
* Ron Miller, CIO, Federal Emergency Management Agency
* Pat Schambach, associate undersecretary for information and security
technology, Transportation Security Administration
* Scott Hastings, associate commissioner for the Information Resources
Management Office, Immigration and Naturalization Service
* Dan Chenok, director of the Office of Information and Regulatory Affairs'
information technology and policy branch, OMB
* Nathaniel Heiner, acting CIO, Coast Guard
************************
Federal Computer Week
Rule would stifle DOD service buys
BY Christopher J. Dorobek
In a move that could severely impact the General Services Administration's
schedule contracts, the Bush administration is expected to propose a
regulation that would severely restrict how the Defense Department buys
information technology services.
The White House wants to stop a long-standing DOD practice of hiring
outside contractors to supply IT services on a labor-hour basis. That type
of buying makes it difficult to conduct performance-based contracting,
which the administration wants to encourage, procurement experts say. The
new regulation would restrict DOD schedule service buys to firm,
fixed-price task orders.
The seemingly arcane rule has created a firestorm and could have
governmentwide ramifications because of how it would affect GSA's
multibillion-dollar schedule contract program.
DOD schedule buys represent 54 percent of all schedule sales, GSA officials
said. IT service purchases make up 57 percent of GSA Federal Supply Service
(FSS) schedule sales.
Much of the growth in IT service sales has not been in firm, fixed-price
purchases but instead in those typically classified as labor-hour, time and
materials task orders. Therefore, the proposed change would knock the feet
out from under the schedule contracts.
"This would have a devastating impact on the schedule program," said Steve
Kelman, a professor of public management at Harvard University's John F.
Kennedy School of Government and a former administrator of the Office of
Federal Procurement Policy (OFPP).
The Bush administration seeks to include the firm, fixed-price provision as
part of a rule designed to spur competition on multiple-award contracts.
That rule is required by Section 803 of the fiscal 2001 Defense
authorization bill. For task orders of $100,000 or more, Section 803
stipulates that DOD contracting officers must obtain three bids on a
multiple-award contract.
Many observers were also disturbed by the timing of the proposal just days
before the rule is expected to be made public June 26.
DOD officials said they first saw the terms June 16, when the Office of
Management and Budget sent DOD its version of the proposed rule.
And lawmakers were not even informed. "This is the first I've heard of it,"
Rep. Tom Davis (R-Va.), chairman of the House Government Reform Committee's
Technology and Procurement Policy Subcommittee, said June 20. "We've had
zero conversations."
Davis said the provision was "premature" and that OFPP leader Angela Styles
would meet resistance from lawmakers if OFPP attempted to impose the change.
The administration is considering issuing an interim Section 803 rule,
which would leave open an opportunity for comment on the provision limiting
schedule buys to firm, fixed prices.
Davis spokesman David Marin questioned whether this provision should be
included in the Section 803 rule. This was never the intent of Section 803,
he said.
Because the final version of the rule is under review, most officials would
not comment. Deidre Lee, director of Defense procurement, and Roger
Waldron, director of GSA FSS' acquisition management center, said they
could not discuss the issue. Styles also said she could not talk about the
rule.
Styles, however, suggested that the provision does not change the existing
Federal Acquisition Regulation, which limits schedule contract service buys
to firm, fixed prices.
But Chip Mather, senior vice president of Acquisition Solutions Inc. and a
former Air Force procurement executive, said labor-hour, time and material
task orders have become an "epidemic," and most agencies often use the
orders to augment existing staff.
"They're not doing anything but buying bodies," generally a poor
acquisition strategy, he said.
Others, however, said that the labor-hour, time and material task orders
offer agencies the flexibility to accomplish their mission. "They are
taking away major flexibility" from DOD just when it needs that flexibility
to meet its national security mission, said Larry Allen, executive director
of the Coalition for Government Procurement, an industry group.
************************
Federal Computer Week
Panel tackles airport security
San Jose report identifies technologies that could be applied nationwide
BY Dibya Sarkar
A task force charged with reviewing current and emerging technologies to
improve security at the San Jose, Calif., airport has released a report
that could have national implications.
The report, submitted June 17 to the city council and the federal
Transportation Security Administration (TSA), focused on promising
technologies that could address passenger convenience, security and cost,
said John Thompson, chairman and chief executive officer of Symantec Corp.
and chairman of the task force, which was convened by San Jose Mayor Ron
Gonzales and U.S. Rep. Mike Honda (D-Calif.).
Although the group's first objective was to improve security at the Norman
Y. Mineta San Jose International Airport named for the secretary of the
U.S. Transportation Department, who is from the area Thompson said local
officials want TSA to select the airport as one of 20 pilot program sites
to receive funding for such security measures. TSA officials have already
decided to study security procedures at about 15 airports.
The other 428 airports around the country also could adopt the
recommendations, Thompson said. "I think what's good about this report is
that it frames the problem and gives a prescription in application areas as
opposed to just running on about technology, retinal scanning, biometrics,
and on and on and on and on," he said.
"What we concluded was that technology certainly can be applied to the
issue of protecting the airports.... But it is [as] much about process as
it is technology," Thompson said. "How do you respond when there's an
incident? That's not technology. That's as much about having policies and
practices that are well articulated, well understood by everyone involved
and rigorously adhered to."
The report was divided into three broad areas, with technologies
highlighted for each area. The areas are:
n Creating a trusted or validated facility by applying technologies to
secure the perimeter of the airport, its buildings, and access in and out
of certain sections.
n Creating a trusted employee program using appropriate clearances and
authentication. Such a system also could be applied to a "validated
passenger" program, Thompson said.
n Creating a trusted network. "Airports today operate somewhat in isolation
and somewhat on open or unsecured networks," he said. "And so there's a
need to create a way to link airports and information about what's going on
in an airport onto a digitized network."
The task force looked at current technologies to help "mitigate or solve
the problem today as we know it," he said, "and then we looked at concepts
or technologies that are further out that require further exploration for
which someone might want to have an ongoing vigilant look."
To do this, the report recommended a research and development focus within
TSA, DOT or another appropriate agency "so systems don't become stale," he
said.
Cost is another critical issue, he added. "Much of what happens in an
airport is controlled and funded by the local authorities from a security
point of view," he said. "And so before we as a task force would mandate or
suggest [that] these technologies could work, somewhere along the way the
process needs to be made clear as to where the money's going to come from
to ensure that we do in fact improve the security of the airport."
Airport security has emerged as an important issue, not just for safety
reasons, but also for economic ones. Industry analysts predicted that
airlines would lose $6.5 billion in the 12-month period following the Sept.
11 terrorist attacks, according to the report. At San Jose's airport,
lucrative international routes were dropped, concession and parking
revenues fell, and security costs increased.
"If we address the security issue properly, it'll return the confidence of
the flying public," Honda said. "When people move back to air travel, it
will re-energize the economy."
TSA and other agencies involved with security will probably help cover the
costs of airport security, "but the government cannot carry all the costs
itself, and that's why public/private partnerships are going to be
critical," Honda added.
"If we can't figure out a way to get the flying public back in the San Jose
airport, it's going to have a huge, huge impact on the [local] economy,"
Thompson said. "We've lost a number of significant international flights as
the airlines have [cut] back. We know that every time we lose a flight to,
let's say, Taiwan from San Jose, it has an annualized impact of over $300
million, and so it has an economic issue to our community."
Task force members included executives from the technology and airline
industries as well as representatives from higher education, law
enforcement and the federal government. The task force held a public
hearing that drew about 75 participants and received proposals from more
than 40 companies.
***
Making Flying Safer
A task force convened by Mayor Ron Gonzales of San Jose, Calif., and U.S.
Rep. Mike Honda (D-Calif.) has recommended several technologies to improve
airport security.
For validated workforce security:
* Biometric authentication via an identification card and digital
certificate technology.
* Management software to automate scheduling, skills management and access
control.
For a validated facility:
* Digital video monitoring using a standard networking infrastructure so
images can be stored, accessed and shared in real time.
* Inspection certificates with Global Positioning System transponders on
all authorized vehicles so their movements can be tracked throughout the
facility.
* Biometric authentication system within aircraft limited to pilots, flight
attendants, maintenance workers and other authorized personnel
.
For a validated communications infrastructure:
* An integrated digital system for real-time communications, data sharing
and enhanced security among organizations.
* A virtual private network connecting all devices video cameras,
biometric scanning stations and baggage-scanning systems and encrypting
communications among them.
*************************
Federal Computer Week
Cargo security on agency hit lists
BY BY Judi Hasson and Matt Caterinicchia
A top U.S. Customs Service official told Congress this month that the
government must push back the borders of the United States by using
technology to check high-risk cargo containers before they leave a foreign
port.
At a hearing on President Bush's plan to create a Homeland Security
Department, Customs Deputy Commissioner Douglas Browning said that
technology and information are essential for a successful container
security strategy one of the biggest security holes facing the United States.
"To put it simply, the more technology and information we have, and the
earlier in the supply chain we have them, the better," Browning told the
House Government Reform Committee's National Security, Veterans Affairs and
International Relations Subcommittee.
Customs already has moved ahead in ratcheting up security checks for
containers, one of the major shipping methods used worldwide. Last October,
authorities found a suspected al Qaeda operative inside a shipping
container heading for the Canadian port of Halifax.
Customs is now checking at least 15 percent of all cargos, according to
Browning, and by January 2003, every customs inspector will have a
pocket-sized device that can detect radiation. Customs officials have also
worked out deals with major shippers who will provide their own security
systems and guarantee them in exchange for swift passage across the
borders. And June 5, Customs issued a request for information on embedding
technology in containers to detect chemical or radioactive devices.
"As the primary agency for cargo security, U.S. Customs should know
everything there is to know about a container headed for this country
before it leaves Rotterdam or Singapore for America's ports," Browning said.
George Weise, former Customs commissioner and now vice president of global
trade compliance at Vastera, a technology solutions company that helps
firms move goods across the borders, said 50,000 container cargos arrive at
U.S. ports daily. "They are taking the right approach introducing
technology and pushing the perimeter as far away as possible," Weise said.
"The idea is to get the containers inspected before they are loaded on
ships, X-ray them and see if there is tampering from the time the container
is packed onward."
Meanwhile, the Transportation Department recently finished testing
electronic seals, or e-seals, designed to help secure cargo containers at
U.S. ports and border crossings. An e-seal is a radio frequency device
about the size of a deck of cards that transmits shipment data as it passes
a reader device and indicates whether the container it is attached to has
been tampered with.
E-seals "consist of a bolt that both locks the container when inserted into
the seal body and serves as an antenna; a seal body that contains a
computer chip for encoding information; and a battery for transmitting that
information when queried by a reader," said Chip Wood, DOT senior
transportation specialist for the Secretary's Office of Intermodalism.
The test, conducted in the Pacific Northwest through DOT's Intelligent
Transportation Systems program, began in the summer of 2000. By the fall of
2001, containers destined for Canada were regularly affixed with e-seals at
the ports of Seattle and Tacoma, Wash.
Most of the testing has been a success, but e-seals have limited signal
strength and must be read at line-of-sight distances of less than 70 feet.
"This makes it difficult to read these particular seals in marine terminals
or the holds of ships where the containers are stacked in close proximity,
where the signal may be blocked," Wood said.
DOT is likely to fund another round of e-seal tests that would build on the
findings and technology platforms identified during the Pacific Northwest
test, Wood said.
"The concept of developing an electronic seal was great; however, it's
essential that we carry on research to better understand cost and service
benefits as well as interoperability," said Dan Murray, director of
research for the American Trucking Associations Foundation.
"Without this research, it would be chaotic in the marketplace," he added.
***
Battening down the hatches
Federal officials say the time has come to address a serious security risk:
cargo containers entering the country at ports and borders. Two government
agencies have initiatives under way to close this gap:
* The U.S. Customs Service is giving its inspectors pocket-sized devices
that can detect radiation. Customs also would like to embed technology in
the containers themselves to detect chemical or radioactive material.
* The Transportation Department recently tested electronic seals to secure
cargo containers. The seals include computer chips for encoding information
about container contents.
***********************
Government Executive
House lawmaker expects cybersecurity bill to pass before recess
By William New, National Journal's Technology Daily
The outlook for congressional passage of cybersecurity legislation looks
good this year, despite the short time remaining in the session, House
Science Committee Chairman Sherwood Boehlert, R-N.Y., said Thursday.
The New York Republican hopes final action on his House-passed bill, to
authorize research and development for computer and network security and
research fellowship programs, will occur by the August congressional recess.
The Senate Commerce, Science and Transportation Committee approved a
companion measure in May, and House and Senate staffers are discussing the
differences. The bill's proponents of the bill are trying to avoid a formal
negotiation on it by resolving differences privately and winning voice-vote
passage of a compromise in both chambers, according to a Senate aide.
The Senate committee added pieces of two separate bills, including a
provision requiring agencies to adopt "best practices" on cybersecurity.
The technology industry fears the language would dictate specific
technologies for agency securitythough a bill sponsor, Sen. John Edwards,
D-N.C., intended the language to be technology-neutral, sources said.
Boehlert also said it "shouldn't be a problem" to pass the so-called "tech
talent" bill before the recess. The legislation would establish a
competitive grant program administered by the National Science Foundation
to increase the number of U.S. students obtaining undergraduate degrees in
nonmedical science and technology.
The bill, approved by the Science Committee in May but still not scheduled
for a floor vote, has the support of the high-tech industry and top
university administrators, Boehlert said.
He also is reviewing legislation that would create a so-called NetGuard of
tech experts who could be called into action in case of disaster. That
bill's sponsor, Sen. Ron Wyden, D-Ore., came to Boehlert's office to pitch
it, but the measure currently would not be under the Science Committee's
jurisdiction, said Boehlert's chief of staff.
*******************
Government Computer News
DOD tests biometrics to secure its smart cards
By Dipka Bhambhani
The Defense Department's Biometrics Fusion Center soon will begin testing
software on four types of biometric devices for use on its Common Access
smart cards.
DOD's Biometrics Management Office last week awarded a $915,000 contract to
KPMG Consulting Inc. of McLean, Va., to conduct a 90-day test of biometric
identifiers that could authenticate smart-card holders for building and
network access.
"We want to spend three weeks for a product assessment," said Paul Howe,
director of the Biometrics Fusion Center in Bridgeport, W.Va. "We try to
stay ahead of the marketing curve." Howe said the center's mission is to
help DOD agencies become better buyers of biometrics. A separate facility
in Bridgeport will host the tests for the Common Access program.
KPMG's four subcontractors, known as the Smart Card Solution Team, will
visit the fusion center to train workers in the vendors' enrollment and
authentication applications with fingerprint readers as well as iris, voice
and facial recognition devices. The subcontractors will demonstrate how a
biometric identifier is stored and matched on a server, stored and matched
on PCs, stored on a smart card and matched on a server, or stored and
matched on smart cards.
The subcontractors are:
Biometric software provider SAFLink Corp. of Bellevue, Wash.
Public-key infrastructure middleware vendor Spyrus Corp. of San Jose, Calif.
Smart-card reader maker XTec Inc. of Olathe, Kansas
The three will demonstrate their applications with fingerprint readers from
Precise Biometrics of Sweden.
Because the companies want to show that fingerprints are not necessarily
the favored identifier, they also will demonstrate:
Facial recognition devices from Visionics Corp. of Jersey City, N. J.
Iris recognition technology from Iridian Technologies Inc. of Moorestown, N.J.
Voice recognition devices from Lernout & Hauspie, recently acquired by
ScanSoft Inc. of Peabody, Mass.
***********************
Computerworld
Update: Microsoft plans security chip for next Windows
By Peter Sayer, IDG News Service
Microsoft Corp. wants to change the fundamental architecture of the PC,
adding security hardware prior to a future release of its Windows operating
system, the company acknowledged today after a media report and an analyst
briefed by the company said as much.
The company wants future PCs to contain a security technology called
Palladium, and is in discussions with Intel Corp. and Sunnyvale,
Calif.-based Advanced Micro Devices Inc. to develop the chips, according to
a report in the July 1 issue of Newsweek magazine published Sunday on the
MSNBC Web site. Microsoft owns a stake in MSNBC.
Palladium "is really about security, privacy and system integrity," said
Mario Juarez, group product manager for the content security business unit
at Microsoft. "We're talking here about rearchitecting the PC platform."
The new architecture, as described by Juarez, would see a new security chip
used for encryption added to PCs, along with new APIs (Application-Program
Interfaces) created to allow programs to be written to take advantage of
Palladium, he said. Palladium may also cover chipsets, graphics processors
and USB (Universal Serial Bus) input/output systems, he said.
Though Intel and AMD have been involved in design discussions to ensure
that Palladium will work with existing processor architectures, it is too
early to say whether they will manufacture the encryption chip, Juarez
said. Other companies have also been involved in the design of the system
and will continue to be part of the process, he said.
Palladium will create a secure space within a PC in which users will be
able to run applications and store data, he said. The secure space will not
be accessible to the rest of the PC, meaning that a virus infecting the
non-Palladium part of the computer would not make its way into the secure
area, Juarez said.
The timeframe for Palladium's inclusion into Windows is uncertain for now,
as the initiative is only in its early stages, he said.
Among possible applications of the technology are authentication of
communications and code, data encryption, privacy control and digital
rights management (DRM), according to the Newsweek report. Microsoft was
awarded a U.S. patent on a "digital rights management operating system" in
December, though Juarez could not definitely say that that patent was
directly related to Palladium.
The system incorporates three components: an authentication system,
hardware chips and software, called the "nub," that handles the security
tasks, according to Martin Reynolds, an analyst at Gartner Inc. in
Stamford, Conn. Reynolds was briefed on Palladium by Microsoft.
The three components will work in parallel to the operating system, with
security tasks shunted from the operating system to the Palladium system,
rather than as an integrated part of it, he said. Palladium is a security
foundation upon which other security features can be built, more than a
system, he added.
As such, Palladium "is a very clever system," Reynolds said. "You can't
crack it in the conventional sense."
Conventional cracking of the technology would be difficult because when an
attacker tries to forge or attack the digital signatures used in the
authentication component, the nub loses its encryption keys, making the
system unable to communicate, he said.
"It's not impossible [to crack]," but it would likely have to be done one
machine at a time, and in hardware, rather than software, Reynolds said.
"Palladium does have the ability to give us truly secure PCs," he said. But
"once we have security, do we want it," he said, anticipating possible user
concerns about privacy and digital rights management.
Consumers will likely not be pleased about Palladium's DRM features, but
"if you're the Hollywood people, you're thrilled," Reynolds said.
While most talk of DRM revolves around music, Microsoft Chairman and Chief
Software Architect Bill Gates says it's more useful for controlling e-mail:
Palladium could be used to limit forwarding of messages, or to make them
unreadable after a certain time interval has elapsed, the Newsweek report
said.
The technology needs to be widespread in order to be useful: 100 million
devices will have to be shipped "before it really makes a difference," the
report quotes Microsoft Vice President Will Poole as saying.
Palladium grew out of a skunk-works project looking for ways to secure
information stored on machines running Windows. It became an official
Microsoft project last October, according to the report.
The first versions of Palladium "will be shipping with bugs," the report
quotes one of the project's co-founders, Paul England, as saying.
This could be a problem, however, said Reynolds.
"The whole thing has to work right, and if it doesn't work right, it
doesn't work at all," he said.
Microsoft's record on software security has been heavily criticized in the
past, and in January the company announced a new emphasis on trustworthy
computing in an effort to clean up its image (see story). This news was
soon followed by word that its software developers would stop writing new
code while they audited their existing code for security flaws.
Microsoft has long maintained that keeping its source code under wraps
makes its software more secure than open-source software such as rival
operating system Linux, where anyone can inspect the source code and see
its flaws. A recent report from a Microsoft-funded think tank, the Alexis
de Tocqueville Institution, claimed that government use of open-source
software represents a threat to national security.
Proponents of open-source software say this openness makes it more secure,
as there's a greater chance that flaws will be fixed and that users will be
more aware of the necessity of upgrading to a fixed version of the software.
Advocates of more open software development may be winning the argument.
According to the Newsweek report, Microsoft will publish the source code to
its Palladium system in an effort to be more transparent.
Publishing source code openly isn't the same as declaring it to be "open
source." According to the Open Software Initiative, open-source software
must be freely distributable by third parties, including as part of
derivative works, without restriction or payment.
Gartner's Reynolds backed this point, saying that "Microsoft is talking
about making it open source."
Microsoft's Juarez, however, didn't entirely agree with this assessment.
When asked whether users would be required to run Windows in order to take
advantage of Palladium's features, Juarez replied, "The short answer is
'yeah.'"
That doesn't mean that all other platforms will be excluded, he said.
"We understand the importance of being inclusive," he said. "We do not want
this to be seen as a Microsoft-only initiative."
"Our goal is to be as inclusive as possible," he said, adding that other
platforms would likely see some level of interoperability.
To facilitate that broader support, Microsoft will be working with other
companies, both in the hardware and software markets, as well as listening
to feedback from users, Juarez said.
"This is a collaborative industry initiative...[that] can only work if
every stakeholder has a voice and participates in the process," he said.
Juarez was unable to provide more specifics about how Microsoft would offer
that voice, but said that the company would be soliciting feedback from
users at some point.
Transparency will be key to the system's success, according to Ari
Schwartz, associate director of the Center for Democracy and Technology,
based in Washington, D.C.
"It's important that there is transparency in the process," he said. "If
they build it in a way that is seamless and intuitive, users will feel like
they have more control. If not, there could be a major user backlash.
"It's too early in the process and it's difficult to say which way it will
fall," he said.
"This system looks a lot like Hailstorm (a codename for an early version of
Microsoft's .Net Services) recreated," said Chris Hoofnagle, legislative
counsel for the Electronic Privacy Information Center, a non-profit
Internet user rights group based in Washington, D.C.
"It's not good for consumers. Anything with verification and DRM limits
consumers' ability to control their behavior," he said.
"One of the problems is that Microsoft will not be able to be transparent
in order to make this scheme work," he said. Microsoft has relied on making
security vulnerability information hard to discover, as opposed to fixing
security flaws, he said.
Scarlet Pruitt, of the IDG News Service, contributed to this report.
*************************
New Zealand Herald
Surf's up on power lines
25.06.2002
By RICHARD WOOD
UnitedNetworks has begun providing broadband internet access through power
lines in Auckland, and has identified 8000 houses in Auckland and
Wellington it can service.
The technology, known as power line communications (PLC), will put the
lines company in competition with Telecom as an alternative to its
Jetstream access in the main centres.
UnitedNetworks has home trials of PLC, due for completion by the end of
July, working near its offices on the North Shore.
Sean McDonald, communications division general manager, said the technology
was proven and had been used in Europe for 2 1/2 years.
He expected it to be ready for general use in New Zealand by the end of the
year.
McDonald would not identify the internet provider involved in the trial,
and said UnitedNetworks was working with a number of equipment suppliers.
But he acknowledged that lawyer and telecommunications businessman John
Rutherford was involved.
In March, Rutherford formed Christchurch-based Powerline Communications,
which involves specialists in PLC, telecommunications and satellite
communications.
McDonald said UnitedNetworks had half a dozen internet provider partners
who would sell the service and create their own charging plans.
"All we provide is the PLC technology connection, which is pretty simple."
He said there were no technical obstacles to using PLC.
He had pricing and cost models ready for evaluation which would be similar
to Telecom's Jetstream access technology in cost of modems and of data volume.
"The modem is the same size, it looks the same, it serves the same function.
"The only difference is you don't need another power phone outlet in your
home to deliver it. It just plugs into your normal three-pin power plug."
To make the service operational, UnitedNetworks installs a high capacity
modem at the transformer - the green boxes on the roadside that service
between 25 and 40 users each.
UnitedNetworks has identified 150 to 250 of these which are next to the
company's fibre-optic cables.
McDonald said New Zealand was well suited to PLC because of the high ratio
of transformers to homes served.
"Most of these homes are within 200m of the transformer so you get
extremely high bandwidth rates," he said.
Access speeds start at 2 megabits per second (Mbps) and can be as high as
30Mbps.
McDonald said PLC would provide serious competition for Telecom and add to
the mix of high-speed options available to consumers.
Taking into account the assets of other electricity lines companies, there
would be at least as many potential customers for PLC as there were for
Telecom's Jetstream.
McDonald said UnitedNetworks research indicated the typical home in New
Zealand would pay between $50 and $75 a month for high-speed access.
He said German company RWE, which was the first utility to introduce PLC,
now had 30,000 subscribers.
UnitedNetworks announced on June 13 that its assets - including its three
regional electricity distribution networks, gas distribution network, and
broadband telecommunications network - were for sale, either as a whole or
in parts.
************************
New Zealand Herald
Fast modems a hacker's heaven
25.06.2002
By ADAM GIFFORD
Thousands of broadband internet modems are being installed with default
passwords, making them vulnerable to hackers who can use them to surf the
net at the owners' expense.
But when Auckland computer programmer John Burns tried to warn people that
their modems were insecure, he was threatened with legal action.
Burns said he bought a Nokia M1122 modem/router a month ago when he
subscribed to Telecom Jetstream fast internet account.
"About a week after I started, I checked the logs on the modem and
discovered some configuration settings had been changed," Burns said.
Extra mapped ports or "pinholes" had been added, linking the router to
overseas servers.
"Someone was using my router as a stepping-stone for the transfer of data."
This could be the way a hacker was disguising where data was ending up. It
could also be used to disguise the origin of spam or unsolicited emails.
The documentation that came with the modem did not explain what had happened.
By doing a web search, Burns discovered he would need to access the modem
with a special cable or through a Telnet session to change the passwords.
He said the problem was not confined to Nokia modems and that many users
weren't aware that hackers could access "always on" broadband modems even
when the computer was switched off.
"Almost every modem you can buy comes with either no administration
password, or a default password set.
"In some cases the manuals do not tell you how to change the password, and
in other cases they do not tell you that there are many ways to access the
modem, with separate passwords for each method."
Almost all modems have a web-based configuration mode.
If not set up correctly, any external user can connect to the IP address,
which identifies where the modem or router is on the internet, and use a
default password to access the modem configuration, including user names,
passwords and logs.
Burns said he investigated how widespread the problem was by writing a
program that looked for New Zealand IP addresses connected to the internet
by DSL (digital subscriber line), and then tried to enter.
If it got through, the program harvested a login name and sent an email
warning the modem was insecure, and offering Burns' help, for a $45 fee, to
fix it.
"The fee was a mistake, but I thought it would help people take this
seriously," Burns said.
"Those people who got back to me, I said I would help them fix it for
nothing."
His program identified about 50,000 New Zealand-based IP addresses, of
which 5000 were active at the time they were polled and 496 were hackable.
One of those who received Burns' email was Chris Yannakakis.
"I turned on my computer in the morning and found I couldn't browse the
internet," Yannakakis said.
"Then I got this email from this guy saying he had hacked in and stolen my
logon details, and he wanted money to fix it."
Yannakakis said he was considering taking legal action for the theft of
personal information and the problems caused.
"It was a massive inconvenience. Because I do some work from home, I had to
explain to my manager some of our files may have been put in jeopardy," he
said.
Burns said Yannakakis' inability to connect to the internet was nothing to
do with his program.
"I got the same complaint from another Xtra customer, so I checked the Xtra
site that morning and there was a warning about intermittent connection
problems," he said.
"My program only read the login and backed out again, it didn't change any
settings."
But the Crimes Amendment Bill, now before Parliament, would make
unauthorised access of a computer system illegal.
Xtra spokesman Matt Bostwick said the onus was on modem suppliers and
manufacturers to ensure they were secure.
"What we would say to our customers is that it is important to check and
change all passwords to see they are secure," Bostwick said.
"Check the documents which come with the modem to find out how to reset them."
Bostwick said Burns' scanning program would probably be considered a
serious breach of netiquette.
Dick Smith Electronics buyer Chris Day said documents for modems sold by
the chain included information on changing passwords from the default
settings.
************************
New Zealand Herald
Cellphones could be jammed for G8 and Pope's visit
OTTAWA - People in the neighbourhood of the G8 summit in the Canadian
Rockies next week, or the Pope's visit to Toronto next month, might find
their cellphones jammed.
The Royal Canadian Mounted Police said on Friday that for the first time
they, and the Department of National Defence, have been authorised to jam
radio and cellphone signals if required to try to prevent attacks -- by a
remote-control bomb, for example.
"If there's a frequency that we detected, and someone's considering a
remote-control device, that frequency could be picked up and jammed,"
Mounties spokesman Mike Gaudet said.
President Bush, British Prime Minister Tony Blair and Russian President
Vladimir Putin are among the world leaders the Canadians will have to
protect as host at the Group of Eight summit at the resort of Kananaskis,
Alberta. Other G8 members are Canada, France, Germany, Italy and Japan.
The jamming authorisation runs from June 17-29 for Kananaskis and also
applies to the nearby city of Calgary, where the media and some of the
overflow diplomats will be based during the June 26-27 meeting.
It also runs from July 16-31 for the July 23-28 visit of the Pope to Canada.
Does that mean the average cellphone user won't be able to talk during that
time? Not at all, said Gaudet.
"On an ongoing way, there would be very little effect, but depending on
where signals are picked up and so on, it'll be part of the capability (of
the security forces)," he said.
************************
News.com
Fees on horizon for electronics recycling
By Jonathan Skillings
Staff Writer, CNET News.com
The debate over electronics recycling will grow a little more heated Monday
with meetings of a legislative committee in California and a
government-industry group in Minnesota.
The upshot for companies is that, sooner or later, consumers are likely to
bear some of the financial burden of cleaning up after their electronics
habits. What everyone's trying to figure out now is how and when.
The prospect of those charges has the electronics industry up in arms,
worried that extra dollars on the price tag of PCs, televisions and other
gadgets will spell fewer sales and therefore less revenue. But even as
computer makers and others lobby against what they see as unfair
impositions, many have been working at recycling schemes of their own.
Meanwhile, state and local governments--which have their own set of revenue
worries--are aghast at the amount of electronic waste heading their way. If
the industry won't pitch in with sufficient resources, they say, then
legislation might be the only alternative.
In California, the homeland of the U.S. high-tech industry, two bills on
Monday go before the state Assembly's Natural Resources Committee that
would impose a point-of-purchase fee of as much as $30 on each CRT (cathode
ray tube) monitor sold in the state. The money collected would go to
establishing a program to encourage recovery, reuse and recycling of the
devices when consumers are ready to toss them out.
And on the same day in Minnesota, participants in the National Electronics
Product Stewardship Initiative, or NEPSI, will be gathering for a key
meeting en route to what many hope will be a nationwide electronics
recycling system that has the support of both government and industry. The
group's last meeting two months ago produced a draft document proposing a
"front-end fee"--that is, a few more dollars on the price tag of a PC or
television set.
While it's not guaranteed that either measure will ultimately take effect,
both have momentum behind them. And they are a sign of things to come.
"Management of these products costs money," said Scott Cassel, director of
the Product Stewardship Institute at the University of Massachusetts at
Lowell. "You're either going to get it through increased taxes from
government programs, or end-of-life fees from consumers or front-end fees
from consumers."
The problem starts with the modern world's infatuation with all things
electronic. The buying binge of computers through the 1990s, for instance,
is contributing to an e-waste mess in the first decade of the 21st century.
Electronic goods including PCs and TVs are the fastest-growing portion of
the waste stream in the United States, accounting for 2 million tons of
trash annually, according to the U.S. Environmental Protection Agency.
Residents of California alone have stockpiled more than 6 million obsolete
monitors and TV sets in their homes, according to the state's Integrated
Waste Management Board. That agency also foresees a worrisome gap between
the volume of discarded CRT monitors and the state's capacity for
processing them.
E-waste has raised a red flag for public health officials because
electronic devices use a variety of potentially toxic materials such as
mercury, cadmium and especially lead, which they don't want to see leaching
into groundwater from landfills or getting airborne via incinerator
smokestacks. Environmentalists earlier this year called attention to what
they called the "high-tech trashing" of several Asian countries.
What price recycling?
The question of how to get more people to participate in electronics
recycling is at the heart of the debate over fees. Governments are looking
toward manufacturers, manufacturers are looking toward government, and both
have their eyes on consumers.
Electronics makers are in no hurry to see state governments tacking costs
onto the products they're trying to sell, and they're keeping an especially
close watch on the bills in California.
"Anything that creates a competitive disadvantage to the seller or
manufacturer is just not appropriate for the state to be advocating," said
Heather Bowman, director of environmental policy for the Electronic
Industries Alliance.
The EIA has been disparaging the legislation as a "tech tax" that would
discourage consumers from buying electronic goods and hurt the state's
economy.
California isn't alone in proposing legislation aimed at
electronics--especially at CRTs, each of which might contain as much as 8
pounds of lead. Similar bills are active in other states, including
Massachusetts, Minnesota, New Jersey and New York. Governmental action is
also afoot in Japan and the European Union.
Lawmakers have been getting involved because state and local revenue is
hard-pressed to cover the rising expense of handling cast-off electronic
devices. They're looking for a more equitable distribution of
responsibility, or at least less of a drain on their coffers.
"The costs are not necessarily being borne by those buying these systems,"
said Gina McCarthy, assistant secretary for environmental affairs in
Massachusetts. "The main cost of this is being borne by states and
increasingly by local communities."
"They can't keep going back to the taxpayers," said Scott Mouw, chief of
the recycling section in the North Carolina Division of Pollution
Prevention and Environmental Assistance. "Processors charge local
governments to take the materials, and that's a huge barrier."
It's cities and towns, after all, that by and large collect household trash
and administer landfills. Over the past three fiscal years, McCarthy said,
Massachusetts has spent about $1.67 million to encourage the start of CRT
collection programs among the state's municipalities. Florida has spent
almost as much--$1.17 million--over the same period in much the same
pursuit, with the money going mostly to counties with existing household
hazardous waste programs because they know how to work with the public.
"Reaching the population has not come cheap," McCarthy said.
Eye on NEPSI
The states are keeping a close watch on NEPSI and its "dialogue" among
various interested parties: state and federal agencies, PC and consumer
electronics manufacturers, and environmental groups. The meeting that
starts Monday is the penultimate; the group hopes to have the cornerstone
of a nationwide recycling system put in place by its final meeting in
September. An agreement reached through this process could knock the wind
out of legislative efforts.
"There's an interplay between the two," said North Carolina's Mouw. As
NEPSI develops its plan, he said, "we'll have to evaluate how well that
accomplishes our state goals when it comes to electronics. We're hoping
consumers and businesses find legitimate outlets for their materials and we
wouldn't need a state system."
That would be just fine with Hewlett-Packard.
"It seems like it's premature for states to be setting up state-specific
things before we see if the NEPSI process is working," said Renee St.
Denis, HP's environmental business unit manager. In addition, she said, the
California legislation has been "defocusing" the work they want to do
through the product stewardship group.
But others say NEPSI hasn't yet gone far enough.
"We keep inching forward on agreements, but we're not at something we can
say is an alternative to legislation," said Mark Kennedy, a technical
adviser to the California waste management board.
Not all of the legislation would prove as pricey as California's might turn
out to be. The North Carolina bill, for instance, would impose a flat fee
of $10--which it refers to as an "electronics recycling tax"--on each CRT
sold at retail. As with other bills, the money collected would go toward
educating the public, assisting local governments, and developing private
recycling businesses.
But many state officials, like their industry counterparts, argue that the
problem really is a national one, so for any program to be most effective,
it would have to apply equally across the country. A nationwide program,
they say, would share the responsibility among the greatest number of
parties, create greater efficiencies and avoid sticky issues such as
Internet sales.
No one, though, is in a hurry to advocate for federal legislation. That's
why the NEPSI process is seen as vital.
"Some progress has been made, and the industry does seem to be engaged,"
said McCarthy, the Massachusetts environmental officer. "The question is,
can we get something done, and done on a broad enough base nationally, to
basically convince the states and counties and municipalities that they
don't need to take action at those levels."
The electronics industry, including both manufacturers and retailers, has
been "engaged" in several ways.
HP, IBM, Sony and Best Buy have been running a variety of programs to
collect consumers' high-tech castoffs and either refurbish them for further
use or send them to recycling facilities to be mined for glass, plastics,
metals and other useful materials. Dell Computer recently announced it
would be setting up a similar mechanism this fall. Last fall, the EIA set
aside about $100,000 to fund a yearlong study involving a number of states
and companies about the best way to collect used household electronics.
Still, industry members say they need more time to assess the best ways to
get consumers to bring their CRTs and other devices in for recycling, and
then to transport and handle it all.
"We just don't have those answers yet," said the EIA's Bowman. "One
legislative session just doesn't do it."
Pay now or pay later
The debate in some ways comes down to a question of front end versus back
end, though in either case there's a fee involved.
The existing recycling programs are designed to handle the electronic
devices consumers already own. HP, for instance, charges between $13 and
$34 to take a PC off someone's hands, while IBM charges $29.99, and Dell
says people should expect to pay between $15 and $25. Consumers only pay,
of course, if they participate--if they haven't found some other way to get
rid of an older system, such as donating it to a charity.
The front-end fees would hit everyone who buys a computer, TV or other
designated device. In the case of the California bills, only people buying
electronic goods at brick-and-mortar stores in the state would be affected.
NEPSI's plan might end up imposing the surcharge across the country.
The EIA is staunchly opposed to front-end fees, which seem to have the
momentum behind them, but some electronics makers offer a more moderate
outlook.
"To the extent that we have to do something to regulate or legislate, a
front-end fee, if enacted fairly, is as good an option as any other one,"
said HP's St. Denis.
And others say those affected would have time to prepare for it.
"If a front-end fee ever gets established, it's going to be a few years
down the road," said Raoul Clarke, environmental administrator for special
waste projects in Florida's Department of Environmental Protection. "It's
not going to happen tomorrow. There's going to be time for it to come into
effect."
Coming into Monday's NEPSI meeting, with the California bills casting a
long shadow, the various sides have been staking out their ground--the
electronics industry looking for the states to back off, and the states and
environmentalists looking for companies to pony up.
"There's a great opportunity for government, industry and environmental
groups to reach a cooperative solution to a major environmental issue,"
said Cassel, of the Product Stewardship Institute. "But there's also the
potential for inaction to result in the need for government or the
environmental community to slip back into the same old regulatory
framework. The ball is in the industry's court as to whether they need
active legislation to be introduced all over the country before they
will...engage in a way which not only protects their own interests but
satisfies the interests of the other stakeholders."
***********************
Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 510
2120 L Street, NW
Washington, D.C. 20037
202-478-6124
lillie.coney@xxxxxxx