[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips June 25, 2002
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, CSSP <cssp@xxxxxxx>;, glee@xxxxxxxxxxxxx;, Charlie Oriez <coriez@xxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, computer_security_day@xxxxxxx;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, akuadc@xxxxxxxxxxx;
- Subject: Clips June 25, 2002
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Tue, 25 Jun 2002 10:10:51 -0400
Clips June 25, 2002
ARTICLES
Sun Says Regulators Look at Layoff Bias Claim
Report: U.S. Vulnerable to Attack
Universities Expand Their Anti-Cyberterrorism Research
OMB moves forward with e-gov architecture
Egyptians Flock to New Net Plan
Internet Name Body Set for Landmark Vote This Week
Online Giants Offer Kid-Friendly Web Surfing
Microsoft planning ambitious data security feature
Arrest in ID Theft Scheme
Paying up for a spam seal of approval
Ariz. company floats idea for rural wireless
******************
Reuters
Sun Says Regulators Look at Layoff Bias Claim
Mon Jun 24, 8:27 PM ET
SAN FRANCISCO (Reuters) - Computer maker Sun Microsystems Inc. said on
Monday the U.S. government was looking into claims by a former employee
that Sun had discriminated against U.S. citizens in favor of foreign
workers on temporary visas when it cut jobs late last year.
Sun, which makes high-end computers that manage corporate and Internet
computers, had not considered visa status when making the roughly 3,900 job
cuts announced last year, spokeswoman Diane Carlini said.
The investigation by federal authorities followed a complaint by former Sun
engineer Guy Santiglia, who was laid off in November after four months on
the job, Carlini said.
Santiglia alleged that Sun favored foreign workers holding long-term H-1B
visas to save money, she said.
Neither Santiglia nor the Department of Justice ( news - web sites)
responded to requests for comment. The Department of Labor declined to
comment.
The U.S. Congress in 2000 temporarily raised the cap for H-1B visas,
offered to specialized workers, to 195,000 for 2001-2003 in a controversial
move hailed by Silicon Valley, which is desperate for engineers.
Sun said less than 5 percent of its employees were such visa holders,
recruited to fill crucial positions when U.S. candidates were scarce. Sun
last year began layoffs of 9 percent of its work force.
"We feel we have nothing to hide," said Carlini. The U.S. Justice and Labor
departments were looking into the matter to determine whether to launch a
formal hearing, as required by law, she said.
Carlini said the visa program was effective for Sun in attracting crucial
technical talent but that foreign workers were costly to support. She
declined to provide a comparison for U.S. and foreign workers' salaries.
"The salary is not based on employee status," she said. "The H-1Bs are
generally much more expensive than U.S. nationals," she said. "It is an
ongoing trail of paperwork."
"We use the program to fill critical jobs. We are looking for skills to
stay competitive, and if we find that employee and they require an H-1B
visa program, then we are set up to take care of that."
Santiglia had first made the claim of unfair treatment in an e-mail to
Chief Executive Scott McNealy and had since often come to the Sun campus in
Santa Clara, she said.
********************
Washington Post
Report: U.S. Vulnerable to Attack
Scientists Urge New Terrorism Research
By Guy Gugliotta
A team of the nation's leading scientists called yesterday for a
comprehensive rethinking of the nation's anti-terrorism infrastructure,
underscoring the need to quickly bring existing technologies into use,
accelerate new research and create a Homeland Security Institute to
evaluate counterterrorism strategies.
"The structure of federal agencies is . . . to a large extent the result of
[the] distinction between the responsibility for national security and the
responsibility for domestic policy," the report said. "Given this
compartmentalization, the federal government is not appropriately organized
to carry out a [science and technology] agenda for countering catastrophic
terrorism."
The report by the National Research Council gave a long list of
shortcomings in scientific preparedness, including lack of coordination in
research on nuclear or "dirty bomb" threats and "enormous vulnerabilities"
in the ability of the public health system to defend against biological
warfare.
The report detailed challenges in developing vaccines for airborne
pathogens, creating better sensors and filters for dangerous chemicals,
building a system to counter sabotage of the nation's food supply, finding
better methods to fend off attacks on nuclear reactors, the electrical
power grid and communications systems, and developing "defense in depth"
for airport and other transportation security.
Throughout the report, the researchers lamented a lack of coordination
among federal agencies and the absence of a "coherent overall strategy" to
"harness the strengths of the U.S. science and engineering communities, and
direct them most appropriately toward critical goals, both short-term and
long."
"Research performed but not exploited, and technologies invented but not
manufactured and deployed, do not help the nation protect itself," the
report said.
The National Research Council is the operating arm of three private,
nonprofit organizations of the nation's most prominent scientists and
engineers. The council developed the report, "Making the Nation Safer: The
Role of Science and Technology in Countering Terrorism," using its own funds.
Richard D. Klausner, co-chair of the committee that wrote the report, said
the intent of the 120 scientists who participated was "not to criticize the
government," but "to say that the current structure of government was not
optimized to deal with terrorism."
But in studying counterterrorism preparedness across agencies, the panel
found that "many of the required technologies" showed up repeatedly, which
is not surprising in government, said Harvard's Lewis Branscombe, an expert
in science and public policy and the report's co-chair. "We saw the need
for an approach that wasn't going to get trapped in a bunch of independent
stovepipes that don't relate to one another."
The report proposed creation of an independent, nonprofit Homeland Security
Institute to function as a think tank, analyzing and testing the
effectiveness of counterterrorism technologies for the White House Office
of Homeland Security or a future cabinet department.
"It would be a group of highly trained people in appropriate disciplines to
evaluate threats, test what's deployed and look at the real world to see
what's actually going on," Branscombe said. "You make a technological
analysis to determine the vulnerability you're trying to address and decide
why the technology is or is not working."
Although the report wasn't scheduled for official release until today,
early briefings on Capitol Hill elicited a favorable reception from House
Science Committee Chairman Sherwood L. Boehlert (R-N.Y.).
"I like what I see. It says we have to have a coordinated [research and
development] strategy," Boehlert said. "It says we have to have somebody in
charge, and I'm enamored with the idea of the institute. A lot of what I'm
reading falls under the heading of common sense."
Despite the big-picture proposals, Branscombe said the meat of the report
was in recommendations for change in several "domains," which included
nuclear security, communications and transportation.
Many shortcomings in the report were being addressed. The Department of
Health and Human Services has asked hospital systems to assess their
ability to cope with large numbers of casualties from an act of biological
warfare. Many cities and states are using federal funds to build mechanisms
so law enforcement and emergency responders can share information in a
timely fashion.
But the report also identified emerging needs for agencies. It noted that
the new Transportation Security Administration had taken on the task of
improving airport security, but suggested it needed "a systematic approach"
and a research and planning office so it would not be making decisions
haphazardly.
"Agencies like TSA have much less experience interacting with the science
community," Branscombe said. "These non-science agencies have to develop
the ability to identify technological needs and develop relationships with
the technologists who can fulfill them."
***************************
Chronicle of Higher Education
Universities Expand Their Anti-Cyberterrorism Research
By FLORENCE OLSEN
Carnegie Mellon University has created a multidisciplinary research center
to develop new technologies for combating cyberterrorism. The new Center
for Computer and Communications Security is one of several recently founded
university research centers in the nation for studying how to protect
information stored on computers and computer networks.
The research at Carnegie Mellon will focus on more than just computers,
says Pradeep K. Khosla, a professor of engineering and robotics at the
university who is director of the new center. Researchers also will study
ways to deploy surveillance robots that can communicate information across
the Internet and yet be immune to attack, he says. For example, teams of
tiny mobile and stationary robots with embedded sensors might be programmed
to collect visual and sensory information, and then to notify authorities
if something is amiss.
While much of the financing for such research comes from the U.S. Defense
Department, banks and insurance companies also have a keen interest in
securing electronic information, according to Mr. Khosla.
"Universities are beginning to see that there is a void here that they may
fill," says Thomas Talleur, a managing director at KPMG LLP, who
specializes in computer security. "With the influx of homeland security
money, educational institutions are now looking for people who can draw in
the money and build the programs ... that will enhance the financial
position of the university" and meet the needs of its students, he says.
Mr. Khosla says the new research center at Carnegie Mellon is different
from other such centers because of its relationship with CERT -- the
Computer Emergency Response Team, which the Defense Department sponsors at
the university to coordinate system managers' responses to Internet
security breaches nationwide. The group's researchers also study Internet
security vulnerabilities and publish security alerts.
Several CERT researchers are part of the new computer-security center, as
are faculty members from Carnegie Mellon's departments of computer science,
electrical and computer engineering, and engineering and public policy.
In the past couple of years, other centers for research on information
security have opened at Dartmouth College and the Johns Hopkins University.
The Dartmouth program focuses on potential threats to key information
systems and electronic communications in the United States, and on ways the
nation can respond and recover if its infrastructure is attacked. The
interdisciplinary program at Johns Hopkins focuses on ways to protect the
confidentiality of private electronic data and to secure business
transactions on the Internet.
Carnegie Mellon researchers will study how to make fiber-optic and wireless
networks more secure and how to build more secure disk drives, network
cards, and processors for computers. "Any device that has input/output
[functions], we want to put a security perimeter around it," Mr. Khosla
says. "Think of this computer or any system as a castle. As you breach the
first wall, there's an inner wall," he says, then another, and another.
Along with serving a need for more research and knowledge in those areas,
Mr. Khosla says that colleges also must create more degree programs for
teaching people how to protect electronic information. Beginning in the
fall, he says, Carnegie Mellon will offer a two-year master's-degree
program in information networking in collaboration with the Athens
Information Technology Institute, in Greece. He says 30 students have
enrolled in the program, which includes courses on information security.
*************************
Government Computer News
OMB moves forward with e-gov architecture
By Jason Miller
The Office of Management and Budget by October expects to issue the first
complete version of an enterprise architecture for its 24 e-government
projects.
Bob Haycock, new manager for OMB's federal enterprise architecture
initiative, said today that drafts of business, technical and application
capability reference models likely would be done by the fiscal year's end.
He spoke at an Oracle Corp. Government Executive Forum in Washington.
"Each model is more specific or granular," said Haycock, who is on a 90-day
detail at OMB from the Interior Department's Bureau of Reclamation. "The
technology will underpin the business process instead of the other way
around."
Haycock, who officially took over for Debra Stouffer June 17, said OMB is
putting the finishing touches on the second version of the business
reference model, which it expects to release in mid-July. Stouffer finished
the first version and in April sent it to agencies for comment.
Based on the responses, OMB simplified the model by combining some of the
more than 30 functions and 100 subfunctions that the model uses to outline
agencies' missions along lines of business.
The technical and application capability models are in the beginning stages
of development, he said.
Haycock also said OMB later this week will assign what it calls solution
architects to some e-government projects.
"The solution architect is someone who understands the broader implications
of the technology and project as it relates to all 24 projects," Haycock
said. "Their role is to facilitate the project, not oversee it."
He would not name the projects being assigned architects but indicated it
would be projects nearer completion.
*************************
Wired News
Egyptians Flock to New Net Plan
By Mats A. Palmgren
CAIRO -- Egyptians are spending more time on the Internet since the
Internet became free -- free of subscription fees that is, because users
are still paying the nominal cost of 20 cents per hour for their Internet
calls.
That's good news for the ISPs, which collect 70 percent of the call
revenues from the phone company.
The new agreement was brokered by the Ministry of Communication and
Information Technology (MCIT), which figured the state-owned operator,
Telecom Egypt (TE), ought to play a part in a national drive to increase
Egypt's online presence.
Access is vital because only one million out of 69 million Egyptian
citizens use the Internet, and as a developing country, Egypt risks falling
further behind as the global economy becomes increasingly knowledge-based.
"The difference will not be between the rich and poor, but between the fast
and slow, those who are plugged in and those who are isolated," a speaker
from the World Bank said at a conference on the theme of the digital divide
in Cairo earlier this month.
In the old model, ISPs had a hard time making ends meet by selling monthly
subscriptions priced at $4 for unlimited hours. Since salaries are low, on
average $100 per month, many users were sharing one account.
Now, when users no longer take turns, traffic has increased. "We have
doubled the number of user hours and I know several other companies did the
same," says Khaled Bichara, CEO of Link.Net, the largest ISP.
"We call it the free Internet, but it's not free, it's the price of the
phone call," said Ahmed Nazif, minister of the MCIT. "It gives you wider
access possibilities because all telephone lines have Internet capability,
just by dialing a phone number, without having to go somewhere to get a
subscription."
Not all ISPs have enjoyed such a tremendous bump. "For the market at large
it is definitely an increase, but the new model did not create a boom as
many had expected," says Hossam Saleh, sales and marketing director at the
national operator's own ISP, TE Data.
Since users can connect without registering with the ISP, it is not known
if more Egyptians are online, "but of course there are more users also, I
cannot believe all our old clients have doubled their time online," Bichara
says.
The revenue-sharing model has enabled the ISPs to upgrade Egypt's Internet
infrastructure by placing their own equipment in the operator's exchanges.
Since the launch in January, the number of ISPs has almost doubled and is
now 106.
Like the world's largest Arabic newspaper, Al-Ahram, which turned itself
into Egypt's second-largest ISP by placing boxed ads with its dial-up
number frequently on the front-page, most new ISPs don't have their own
technology but rent access from an Internet wholesaler.
The MCIT envisions Egypt becoming an Internet hub in the Arab world, a
market with 290 million people with a common language, religion and
traditions, but other obstacles remain.
"Media hype might have raised awareness and increased the market, but the
main deterrents to growth are PC penetration, lack of local content and
computer illiteracy," says Magda Habib, marketing director at Raya Holding,
owner of ISP Starnet.
The MCIT is already cooperating with the private sector to provide computer
training on all levels to 100,000 students every year.
Starting this month, a joint government and private sector company will
manufacture low-cost PCs in Egypt that can be paid for in small
installments via the phone bill.
Revenue sharing might also fuel the production of local content, much
needed to make more Egyptians interested in the Internet, says Saleh.
"It is the beauty of it, we can make money from both traffic to the sites
and from the services on the sites," says Bichara.
Today, foreign news sites and chat rooms where people can meet without
social restrictions are highly popular.
So is pornography, but "it's changing from a high percentage to a medium
percentage of the total Web traffic," says Saleh. "The market is becoming
more sophisticated and there's other multimedia on the Net now for those
who just wanted to see something moving," he added.
Unlike the less-populated but richer countries Saudi Arabia and the United
Arab Emirates, which only last year overtook Egypt as having the largest
Arab Internet population, Egypt is not trying to restrict the Internet.
But security police are monitoring chat rooms and local sites deemed
immoral or damaging to the state or religion have been shut down. A few
people have been imprisoned for soliciting sex on the Net.
In most of these cases claims Saleh, it is the hosting company that made
the report to the police, since there is a social consensus and no business
wants to be associated with this kind of material.
**********************
Washington Post
Internet Name Body Set for Landmark Vote This Week
Reuters
LONDON, June 25The organization that oversees the Internet's vast
domain-name system is looking to face down grass-roots protesters at its
annual meeting in Bucharest this week as it tries to gain greater
government-level acceptance.
Starting on Wednesday in the Romanian capital, the Internet Corporation for
Assigned Names and Numbers (ICANN) will chart its future, one that could
see individual Net users getting squeezed out in favor of politicians and
businessmen.
The focus on ICANN, which decides how domain names such as www.reuters.com
get doled out to individuals and businesses, has grown immensely in the
past two years as the global Internet population has grown to more than 425
million by some estimates.
A controversial proposal floated by ICANN Chief Executive Stuart Lynn is
due for a vote on Thursday that could end the appointment of
representatives of technical and citizens groups to the ICANN board and
limit board members to representatives of business and government.
Lynn has said the inclusion of politicians could give the body more
authority with national governments and improve its ability to raise funds.
A separate, equally controversial, motion would impose a direct 25-cent tax
on all new domain-name registrations to fund the organisation.
CAUGHT IN A TUG-OF-WAR
Grass-roots activists argue that limiting the role of private users will
tilt an already lopsided balance of power that favors Western government
and business interests.
"I don't think governments are needed (in the ICANN process), nor at this
time are they organised in a manner that would make their representation
easy," said Michael Froomkin, an outspoken ICANN critic and professor at
the University of Miami School of Law.
"The officials who turn up to ICANN meetings are the ones who heard about
the Internet first, not necessarily the people who make, or should make,
Internet policy."
Politicians, particularly in Europe and South Africa, are clamouring for
more control of the body, suggesting they would be more fit to assign
domain names to individuals and businesses just as they did with telephone
numbers in days gone by.
Another source of pressure on ICANN is the U.S. Congress. U.S. lawmakers,
led by Senator Conrad Burns (R-Mont.), have promised heightened oversight
of the organisation before it decides on whether to give ICANN full control
of the Internet's domain-name system.
EU WEIGHS IN
One of ICANN's most vocal critics, the European Union, insists ICANN must
remain a technical, standards-setting body and keep out of public policy
issues regarding the Internet.
"Governments are responsible for public policy, not ICANN," the EU
Telecommunications Council said in a recent white paper.
EU officials also said they would prefer that the U.S. Department of
Commerce, the government body that spawned ICANN in 1998, relinquish
control of the root-server system, a master control database of Internet
sites that ensures Internet traffic gets to its intended destination.
The fear is that in the wrong hands the enormous database could be mined to
determine all comings and goings on the Internet.
Although there is no evidence that this has happened, the issue has
attracted added attention in recent months as law enforcement officials
seek to shore up defences against feared acts of cyber-terrorism.
IN NEED OF DOT-ORG-ANISATION
The wrangling over who will run ICANN is impeding progress with other vital
ongoing issues needed to make the Internet a truly global medium, critics say.
For years, ICANN has been grappling with how to institute official
standards for non-Arabic numbers and non-Latin letters to enable them to be
accessed by any type of browser. The failure to resolve the matter has
drawn further complaints that ICANN's cumbersome bureaucracy penalises its
under-served, non-Western constituents.
"I really think it's time to broaden the input of different stakeholders.
It's time to include other, non-Western parts of the world in the process,"
said Maurice Wessling, director of Dutch cyber advocacy group Bits of Freedom.
Also on the agenda this week is a competitive run-off for the right to
manage the global dot-org domains for non-commercial organisations.
Eleven companies, all from the U.S. and Europe, are vying for the lucrative
business, which currently involves oversight of a database for more than
2.5 million organisations.
"It is a profitable business," said Stuart Marsden, technical director of
Unity Registry, a Zurich-based bidder.
The European applicants are confident that ICANN, wishing to suppress
earlier criticisms that it is too U.S.-centric, will be more likely to
award a non-U.S. business the contract.
Andrew Tsai, chief executive officer of London-based Global Name Registry,
said the company would play up its international roots as well as its track
record in administering the dot-name global domain.
"There is a shift at ICANN towards true global representation. That's a
huge advantage for us," Tsai said.
ICANN is expected to award the contract at the end of August, officials said.
*********************
Washington Post
Online Giants Offer Kid-Friendly Web Surfing
By David McGuire
Three of the nation's largest Internet portals today will announce that
they have made good on a promise to promote more kid-friendly Web surfing.
America Online, Microsoft Corp.'s MSN service and Yahoo will report that
they have now tagged most of their online properties with electronic labels
designed to work with new filtering software being made available free of
charge to the public.
The three online media giants said they have labeled about 93 percent their
Web sites with electronic identifiers that work in conjunction with free
Internet filtering software developed by the Internet Content Rating
Association (ICRA).
Representatives for the companies will announce the fruits of their
labeling efforts at a press conference in San Jose later today where ICRA
will unveil it's free filtering tool.
Since the ICRA filter relies on Web site operators to label their sites,
ICRA North America President Mary Lou Kenny said the participation of the
"big three" Web portals has been invaluable.
"Since they are the most trafficked sites, anytime they show leadership in
an effort, it encourages others to participate," Kenny said. "When the
leaders in any segment label their sites and encourage others to do the
same, it begins a viral effect of labeling."
In addition to AOL, MSN and Yahoo, several smaller sites -- including adult
operators like Hustler.com -- have agreed to label their sites by ICRA
standards.
Unlike other content filters that block sites based on criteria developed
by filtering companies, ICRA's filter relies on content providers to
specify what sorts of words, images and content appear on their sites.
Because Web site operators that participate in ICRA go into substantial
detail about the nature of the content they host, users of the ICRA filter
can be very specific about the sorts of content they wish to filter, Kenny
said.
For instance, parents may set their filter preferences to allow their
children to view nudity that is presented in an artistic, medical or
educational context, but block such images when they are presented in an
adult entertainment context, Kenny said.
Filter users can also choose to block any Web sites that don't contain ICRA
labels.
AOL, MSN, and Yahoo agreed to adopt the ICRA labeling standards last year.
Although the companies' agreement only applies to the Web sites they
operate directly, Yahoo is urging the operators of sites it hosts to also
adopt the ICRA standards, Kenny said.
Some free speech advocates have criticized the ICRA rating system, saying
that it could pave the way to government censorship at some later date as
more and more Web sites electronically identify the nature of the content
they provide.
Starting Tuesday, the filter will be available for download from ICRA's Web
site -- www.icra.org.
************************
USA Today
Microsoft planning ambitious data security feature
WASHINGTON (AP) Microsoft has disclosed an ambitious new project to
improve security by creating within its Windows software a virtual "vault"
where customers would conduct electronic transactions and store sensitive
information.
The effort, called "Palladium," would require consumers to buy new
computers and other devices equipped with ultra-secure computer chips from
Intel and Advanced Micro Devices which already are involved in the
project or other companies.
The project's success also depends on broad consumer adoption of such
devices, since these highly secure computers could safely exchange
information only among themselves.
Microsoft said the technology, which stemmed from early work by its
engineers to deliver digital movies that couldn't be pirated, won't be
available for at least 18 months. Company officials have told other
executives in private briefings they do not expect to see mainstream
products for at least five years.
"We're so early in the process, we're really just drawing the road map,"
said Mario Juarez, who is running the project for Microsoft. "This won't
happen tomorrow or next year."
The project was first reported by Newsweek, although Microsoft officials
have discussed their efforts privately for months in meetings with
technology and civil liberties groups in Washington and elsewhere.
Supporters said the technology, to be offered as an option in an upcoming
version of Windows, would be able to distinguish safe software from data
containing viruses or other malicious computer code. The technology could
be turned on and turned off. Customers could store within this part of
Windows personal details, such as financial or medical records, that is
encrypted and otherwise inaccessible even from other software running on
the computer.
"Users can be assured that your intentions are properly carried out,"
Juarez said. "No one can masquerade as you. They're not on your computer."
Microsoft's efforts are similar to those of the Trusted Computing Platform
Alliance, an industry group also working on new hardware technology to let
computers distinguish "trustworthy" software. IBM has already shipped new
laptop computers featuring such security chips.
Under Palladium, Intel and AMD will redesign computer processors to include
cryptography features. Palladium also will require changes to video and
keyboard technologies to ensure that a customer's typed information is
displayed without changes on the screen. That would require billions of
dollars in new equipment upgrades by consumers, corporations and governments.
Further, since a consumer's personal information will be scrambled within a
vault and tied to a specific computer chip, that information could not
readily be stored elsewhere in case of disaster or if the computer fails.
Microsoft also acknowledged that it hasn't resolved sensitive issues of
permitting access by government with a court order to a person's encrypted
data. The FBI has indicated it rarely encounters scrambled information
during investigations, but making such technology as ubiquitous as Windows
could invite use by criminals or terrorists.
"We recognize that something like this needs to be done responsibly,"
Juarez said.
Microsoft's name for its efforts, Palladium, comes from the statue of
Pallas Athena, which was believed to protect the ancient city of Troy from
invaders. In modern parlance, a palladium is considered a guarantee of
integrity.
***********************
Los Angeles Times
Arrest in ID Theft Scheme
By STUART SILVERSTEIN
U.S. Secret Service agents are investigating a Russian immigrant suspected
of tampering with computers at Caltech and Pasadena City College to try to
steal credit card numbers and other personal information.
The suspect, Dimitri Sinilnikov, 48, was arrested by campus police at
Pasadena City College on May 24 and was to be returned to Florida. Although
authorities have not charged him in connection with the California
incidents, the arrest warrant cited Sinilnikov for violating his probation
on a previous conviction in Florida on identity fraud.
Security officials at Caltech and Pasadena City College said Sinilnikov
sought to install software in the schools' computer systems that could
record the keystrokes made by students and other computer users on campus.
They said the apparent aim was to record credit card numbers and possibly
other personal information. Secret Service officials initially tipped off
Caltech authorities May 24 that they had detected Sinilnikov through
electronic surveillance trying to tamper with a computer. After apparently
failing to break into the Caltech computer system, campus police said,
Sinilnikov crossed the street to Pasadena City College and started working
on a computer.
*************************
News.com
Paying up for a spam seal of approval
By Robert Lemos
An e-mail gateway start-up is pushing marketers to back a plan that would
let spam recipients charge companies for unwanted messages.
San Bruno, Calif.-based IronPort Systems plans to unveil Tuesday its
BondedSender program, aimed at giving legitimate bulk e-mail a seal of
credibility.
Participating companies would be asked to post a cash bond with a neutral
party against which recipients could charge a small fee if they were
improperly targeted with e-mail. A few such recipients wouldn't make much
difference to the bond, but thousands of charge-backs could make companies
reconsider sending the next mailing.
"These are messages with money behind them, so you can feel confident that
they are real mail," said Scott Weiss, CEO of IronPort. "There are a lot of
companies that you have never heard of, which need something like this. The
bond is the way for them to prove themselves credit worthy."
The benefit for bulk e-mail companies is more certain delivery. The program
could make companies and home users more likely to allow bonded e-mail
through their gateways.
In a way, it's the ultimate capitalist voting system, in which people vote
with, in this case, the sender's pocket book.
E-mail gateways--the hardware that sits between a company and the Internet
to route mail efficiently--would take care of tallying returned messages
and sending charges along to be deducted from the bond.
IronPort plans to build accounting features into its flagship gateways and
says it will offer plug-ins for the three open-source competitors:
Sendmail, Qmail and Postfix.
Weiss suggested that any money forfeited from a bond be donated to a
spam-prevention organization. "I think it is going to be like the Cold War:
Once the efficacy of the method is proven, spammers won't put up a bond,"
he said.
The plan is the latest trying to solve the problem of unsolicited e-mail.
Weiss hopes BondedSender will go a long way toward solving the problem for
marketers of overzealous e-mail filters.
"False positives are the biggest problem with anti-spam filters," Weiss
said. When a filter flags a legitimate e-mail message as spam, known as a
false positive, people could miss important messages.
This sometimes happens when the message contains words that frequently
appear in electronic mailings. In other cases, the Internet address from
which the mail has originated is known to be used by spammers.
However, companies that send mass mailings are sometimes flagged by filter
software as potential sources of spam, even if many of their recipients
want to receive the mail. Weiss pointed to online third-party payment
service PayPal as an example of a company that could get flagged by
filtering software.
"The PayPals of the world are trying to send out legitimate messages, and
they are being blocked," he said. "Customers are asking, 'Where is that
receipt confirmation?'"
Other companies high on the list of possible supporters include legitimate
pornography sites. In many cases, any e-mail from a porn site is filtered
out, even if it's a confirmation of payment, Weiss said.
However, the idea is still germinating, and the company hasn't cemented a
pricing plan.
"We are tuning it through our beta period, but we want (the price) to be as
low as possible without breaking the economic model," Weiss said.
*************************
Sunspot.net
Ariz. company floats idea for rural wireless
Space Data eyes balloons for seamless coverage
Associated Press
Originally published June 23, 2002
CHANDLER, Ariz. - Space Data Corp. isn't the first company to come up with
a pie-in-the-sky idea promising to bring seamless wireless service to rural
America.
Some have proposed filling the coverage gaps by launching communication
equipment on blimps, rockets and solar-powered gliders. As yet, for a slew
of financial and technological reasons, none have proven feasible.
But Space Data says its plan to create America's first floating wireless
network - by putting disposable transmitters on government weather balloons
- has already undergone successful testing and is economically viable.
A trial run with text-messaging service in the Phoenix area is scheduled
for this summer. The official launch of the messaging service would begin
next spring in Arizona, New Mexico, Texas and Oklahoma, extending
nationwide by the end of next year. Cellular phone service could be added a
year later if the company secures more funding.
For the past 60 years, the National Weather Service has launched 70
balloons across the country twice a day to collect temperature, humidity
and wind data. The balloons typically hover at about 100,000 feet for about
24 hours.
Because the balloons are launched every 12 hours, there would always be at
least one of Space Data's packages floating in the stratosphere above each
coverage zone, assuring uninterrupted service for all rural areas in the
continental United States, said Jerry Knoblach, Space Data's chairman and
chief executive.
Space Data, based in a Phoenix suburb, has raised $13.5 million from
private investors and has been discussing the idea with the weather service
since January last year, Knoblach said.
Knoblach hopes to arrange a barter deal: In exchange for letting the
company hitch a ride on the balloons, weather officials would use the
satellite-based tracking system on Space Data's network to gather wind and
other data more precisely.
"The goal is that no money actually changes hands," said Knoblach, who
described the weather service's response as positive.
Weather service spokesman John Leslie confirmed discussions with Space Data
have taken place but said they have not progressed to the level of
negotiations.
If the government doesn't approve Space Data's proposal, the company will
proceed with the endeavor by launching its own balloons, Knoblach said.
Space Data's service, known as the SkySite Network, would benefit roaming
customers and those who live in rural areas where wireless service isn't
available, he said.
The service would be sold to existing wireless companies who have gaps in
their network coverage.
"We would be the carrier's carrier," Knoblach said.
While nearly everyone in the country now has access to at least one
cellular service where they live, there are still huge swaths where there's
no wireless signal.
Wireless carriers are not rushing to fill such gaps because there isn't
enough business in sparsely populated areas to justify the hefty expense of
installing and operating a wireless tower.
"This is really a poor man's satellite," Knoblach said.
As he explains how the SkySite works, he admits the idea sounds far-fetched
at first.
Each of the weather balloons could provide service to an area of about
100,000 square miles. The resulting overlap in coverage between balloons
would make wireless service possible throughout the country, Knoblach said.
By contrast, the signal from a wireless tower typically covers from 100 to
150 square miles.
The company estimates its annual operating expenses at $35 million per
year. About half of that would go toward equipment: $300 worth for each of
the 50,000 or so balloons that would be launched over the course of a year.
*************************
Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 510
2120 L Street, NW
Washington, D.C. 20037
202-478-6124
lillie.coney@xxxxxxx