[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips July 2, 2002
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, CSSP <cssp@xxxxxxx>;, glee@xxxxxxxxxxxxx;, John White <white@xxxxxxxxxx>;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, computer_security_day@xxxxxxx;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, akuadc@xxxxxxxxxxx;
- Subject: Clips July 2, 2002
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Tue, 02 Jul 2002 14:30:56 -0400
Clips July 2, 2002
ARTICLES
Congress To Postpone Revamping Of FBI, CIA
White House crafting homeland security technology plan
FBI to valley: Tell us about attacks
Vote on NIST smart-card standards is set for next week
OMB models its site redesign on FirstGov portal
GAO gives White House passing grade on IT efforts
Tech firms seek separate cybersecurity agency
Cyberlaw: Cybersmart or cybersilly?
Swedish e-postal service delivers wherever you want
Foes vow to challenge Spanish Internet law
Suspected hi-tech pedophiles arrested
Modems in danger of hackers gaining entry
***************************
Washington Post
Congress To Postpone Revamping Of FBI, CIA
Homeland Security Agency Becomes Legislative Focus
By Walter Pincus
Congress will put off a reorganization of the FBI and CIA to improve the
performance of the intelligence community until it establishes a Department
of Homeland Security, according to Bush administration and congressional
sources.
The decision will delay any significant revamping of the nation's
intelligence system until at least next year, a marked shift in priorities
since the Sept. 11 attacks, which prompted members of Congress to identify
serious shortcomings in the FBI and CIA's performance that they said
required urgent attention.
In a move backed by the White House, Sen. Joseph I. Lieberman (D-Conn.),
chairman of the Senate Governmental Affairs Committee, which will produce
the legislation establishing a Department of Homeland Security, has now
agreed to put off tackling any changes to the CIA and FBI.
"I think that it's so controversial that it might delay and obstruct the
passage and creation of the new department," Lieberman said at a hearing
last week.
The delay underscored the increasing awareness on Capitol Hill that
reorganizing the CIA, FBI, National Security Agency and other intelligence
bodies is an extraordinarily complex undertaking about which there is
little agreement on what needs to be fixed or, indeed, whether any changes
are even required.
FBI Director Robert S. Mueller and CIA Director George J. Tenet have made
no secret of their opposition to any major intelligence overhaul, and the
joint House-Senate intelligence committee established this year to examine
the intelligence agencies' performance and recommend changes has been
struggling in its investigation.
The panel held two weeks of closed hearings but has now apparently delayed
until September its first public sessions, which were originally scheduled
for last month.
Reorganization of the intelligence agencies has been under discussion for
more than a year, but since Sept. 11 it has focused primarily on changes to
fight the war on terrorism. Among the proposals expected to be taken up by
the intelligence panel are combining the counterterrorism centers at the
CIA and FBI within the proposed Department of Homeland Security; creating
an internal security service that would absorb the FBI's counterterrorism
and counterintelligence functions; and giving the director of central
intelligence control over Pentagon technical collection agencies while
eliminating his direct control over the CIA.
One result of the decision to create the Homeland Security Department
before tackling the issue of restructuring the intelligence agencies is
that the new department will be dependent on the FBI and CIA for collecting
domestic intelligence. It also will put off any move to replace the FBI's
domestic intelligence-collection role with a new federal internal security
service. Both ideas have generated significant interest on Capitol Hill.
Lieberman said last week that one task facing his committee was deciding
"how to redress the awful lack of coordination and information-sharing
among key agencies, including the FBI and the CIA, that now appears to have
been the most glaring failure of our government leading up to September 11th."
But, he said, he saw the proposed Department of Homeland Security as
primarily an "aggressive, agile and demanding . . . consumer of
intelligence," but not one that would have "operational or collection
capability" that the FBI and CIA have. Lieberman will also write into the
legislation that the new department will have access to all raw
intelligence on terrorism and the authority to task the CIA, FBI and other
Pentagon intelligence agencies to collect specific information.
At a hearing last Thursday, Mueller opposed taking counterterrorism away
from the bureau. "Such a move at this critical moment would disrupt our
ongoing battle against terrorism," he said. Mueller said his FBI
reorganization plan, which adds agents and analysts to meet the challenge
posed by terrorism, was the answer.
Sen. Bob Graham (D-Fla.), chairman of the Senate Select Committee on
Intelligence, has said the joint House-Senate intelligence committee would
study whether a different domestic intelligence collection system is needed.
Graham said three questions still have to be determined if something
different from today's FBI approach to counterterrorism would be needed:
Who would be the targets of surveillance, what legal methods for collection
would be available and where within the federal government would it be housed?
Graham said these "may end up being some of the most contentious issues
that will have to be faced" either within the proposed department or
elsewhere in the intelligence system. "We'll have to come back and have the
national debate over domestic intelligence-gathering," Graham said.
Senior CIA and FBI officials have begun to question publicly whether
members of Congress and the Bush administration, pushed by what they
perceive as public pressure for more security, may be promising too much
and going too far in providing them tools to fight terrorism.
In a soon-to-be-published Georgetown University book, Paul R. Pillar,
formerly deputy chief of the CIA Counterterrorism Center and currently a
senior intelligence officer, writes that the pressure "to be seen doing
things in new and different ways . . . means that the challenge for U.S.
intelligence will be not only to do the best possible job of collecting and
analyzing information about terrorism but to respond to the demand for
change in ways that avoid doing more harm than good."
One important risk for CIA and the intelligence community, Pillar said, "is
the political risk of standing up to these short-term pressures in order
not to undermine long-term effectiveness."
One longtime FBI agent, who asked not to be identified, recently questioned
the new rules that have been established for agents in field offices to
initiate counterterrorism investigations without first obtaining approval
from headquarters.
"I'm worried about six or seven years from now when there are five or six
Arab-American members of Congress and they call me before some committee to
grill me on my actions against their people," the agent said.
Pillar said that if the United States is "successful enough and fortunate
enough to avoid another major terrorist attack, counterterrorism will no
longer be an overriding priority." Then, he asked, if attention is
refocused on human rights, privacy and the domestic intelligence
activities, what happens in the future to the intelligence officer "who
takes the risk [now] of making a recruitment that becomes controversial?"
************************
Government Executive
White House crafting homeland security technology plan
By Shane Harris
sharris@xxxxxxxxxxx
The White House is writing a massive blueprint, known as an information
technology architecture, to integrate the computer systems of all of the
agencies that would be moved into the new Homeland Security Department
under Bush administration plans.
The Office of Homeland Security, the Office of Management and Budget and
the agencies slated to move into the new department are preparing a
"communication document" to explain to federal, state and local officials,
as well as to private companies, how the plan will work, said Steve Cooper,
the chief information officer at the Office of Homeland Security, in an
interview with Government Executive.
The new department's architecture will mirror the overall federal
enterprise architecture, designed by the Chief Information Officers Council
in 1999 as "a road map for the federal government in achieving better
alignment of technology solutions with business mission needs."
That alignment has yet to occur. The General Accounting Office has reported
that most agencies trying to write their technology architectures haven't
moved beyond the planning stage. Norman Lorentz, a former technology
company executive, became OMB's chief technology officer in January and was
told to help agencies develop their architectures.
The Office of Homeland Security has established three working groups to
examine architectures in three of the four proposed divisions of the new
department: border and transportation security; emergency preparedness and
response; and chemical, biological, radiological and nuclear countermeasures.
Cooper said the Office of Homeland Security is "mapping and documenting the
business strategies" for the new department. Those strategies are designed
to mesh with the overall homeland security plan that Homeland Security
Director Tom Ridge was expected to announce in June. Cooper said that plan
would go to President Bush for his approval within the next two to three
months.
The national strategy will define the "vision" of what the department hopes
to achieve, and what homeland security means for federal, state and local
agencies, as well as the private sector, Cooper said.
Cooper described the Homeland Security Department's information
architecture as a pyramid, with this vision at the top. The next level down
will address "business processes"such as border security or biodefenseand
all their respective activities: clearing people in and out of the country
or inspecting shipping containers for explosives, for example.
The third level of the architecture consists of "information products"such
as terrorist watch lists and shipping manifeststhat are essential to
conducting the department's business, Cooper said.
The fourth and fifth levels cover the actual technologies that would be
employed at the new department. Ridge's Office of Homeland Security has
asked technology chiefs at the merging agencies to make a quick assessment
of the technology assetsincluding hardware, software applications and
databasesthat they think are relevant to the new department's mission,
Cooper said. These assets may or may not make their way into the department
if it is created. The inventory is "probably 60 percent complete."
CIOs commonly list accounting for technology assets among their most
difficult tasks. The arduous process of cataloging such assets often must
rely on inadequate or incomplete records of what has been purchased or
deployed in offices throughout the country. One CIO said recently that
finding all the technology assets in a particular agency is like "trying to
find all the fat marbled through a piece of steak."
Cooper acknowledged the technology inventory could show a gap between what
the vision calls for and what agencies already have. In that case, Cooper
said his team would develop a "migration strategy" that could involve both
buying new technology and upgrading existing systems.
The overall homeland security strategy, which is being written by a
separate team in the Office of Homeland Security, and the development of
the technology architecture are proceeding simultaneously. Cooper said that
wouldn't stop his team from moving forward with plans for the departmental
architectureeven though by design, the architecture can't be executed
without the top-level strategy in place.
Agencies involved in homeland security have already launched $6 billion to
$8 billion worth of technology modernization efforts, Cooper said. Despite
the fact that agencies might be buying and installing incompatible systems,
those initiatives haven't been stopped. Rather, Cooper's team is working to
coordinate them with the architecture.
Cooper said he hopes to have the inventory of border security and
transportation functions completed within the next 90 days. He didn't give
an estimated completion date for the entire architecture.
Cooper said whoever is named CIO of Homeland Security will inherit the
enterprise architecture and probably take over finishing the plan,
presuming the official is named before the entire architecture is complete.
***************************
MSNBC
FBI to valley: Tell us about attacks
By Andrew F. Hamm
SILICON VALLEY/SAN JOSE BUISNESS JOURNAL
July 1 Businesses have remained tight-lipped when it comes to reporting
cyberattacks or other breaches of their security for fear that the bad
publicity would also bombard their bottom lines. But the FBI has begun
offering them anonymity and critical information in exchange for their
much-needed cooperation in battling hackers and other terrorists.
THE NEW INFORMATION-SHARING initiative is an extension of
Infraguard, a 3-year-old program first put together to stem attacks on the
nation's economic infrastructure, including businesses, medical facilities,
financial institutions, and water, energy and transportation agencies, says
Peter Trahon, supervisory special agent at the FBI's Regional Computer
Intrusion Squad. The organization now has about 80 Bay Area companies involved.
According to a Bay Area-based survey funded in part by the FBI, 90
percent of survey respondents, primarily large corporations and government
agencies, reported computer security breaches in the past 12 months and 80
percent acknowledged financial losses. The most serious included the loss
of proprietary information and financial fraud, with 74 percent saying the
attack came via the Internet.
While companies have been eager to receive information on problems
other companies are having, they have been loathe to report their own, says
Rich Davies, executive director of the Western Disaster Center at Moffett
Field and a member of Infraguard's board of directors.
Mr. Trahon says the new program gives businesses a secure way to
circulate information through the FBI about any problems without fear that
the information will come back to bite them.
"I see the value of it. It helps me validate potential problems or
invalidate them, depending on what is out there," says Bob Landgraf,
program director for Hewlett-Packard Federal, a subsidiary of
Hewlett-Packard Co. and a member of Infraguard. "Many of the large
companies are well-prepared for these attacks," Mr. Landgraf says. "I would
say smaller companies and those in hot technologies are in the most
trouble. Large companies can sustain a $1 million loss ... but that could
put some smaller companies out of business."
Companies have been mum about security breaches because of fears of
giving competitors an advantage, reaction by investors, bad publicity and
simple egos, says Rich Jackson, executive director of Infraguard's San
Francisco Bay Area chapter.
"I think the FBI realizes they've had some bad relationships in the
past, Mr. Jackson says. "They are working very hard to gain the trust of
the [business community]."
And then there's the paperwork.
It can be onerous, Mr. Jackson admits, but is a necessary tool to
help find and punish the attackers.
"[The FBI] is trying to make it as easy as possible," Mr. Jackson
says. "But remember, a lot of court cases get thrown out on a technicality.
So you have to document carefully."
The FBI began pushing what it calls "secure" membership after the
number of companies attending quarterly Infraguard meetings tripled after
the Sept. 11 terrorist attacks.
"It became very obvious that we need the high-tech community talking to
each other in case of attack," says David Kovar, director of information
technology at the Western Disaster Center.
Participating in the secure membership allows companies to offer
sensitive information and receive information about ongoing FBI
investigations information not available to the general public or even
Infraguard members who don't have the "secure" membership, the FBI's Mr.
Trahon says.
"It's a subtle difference, but one that could make all the
difference," Mr. Trahon says.
Mr. Jackson says the FBI is still fine-tuning how and what
information is handed out and how to keep that information secure.
There also has been a growing realization that there are
industrywide concerns that only cooperation can overcome, Mr. Jackson says.
"The realization is that when the individual company suffers, the whole
industry suffers."
The fear of attack is very real, says Mr. Jackson, who demonstrated
that by asking that the Business Journal not reveal the name of the large
Bay Area company he works for.
"There are hackers out there who attack on the whim," Mr. Jackson
says. "Having my company's name exposed in the context of a story like this
could needlessly expose it to attack."
Sharing information is important because the attackers, whether
they be political, terrorist or economic in nature or just some bored
teen-ager somewhere constantly upgrade and change their mode of operation,
says Livio Ricciulli, chief technology officer for the Redwood City-based
Reactive Network Solutions, a computer security company.
"The problem is ... we're talking about a very dynamic situation,"
he says. "The attackers' behavior is always changing and up-to-date
information is critical." Mr. Ricciulli says Infraguard, while a good
start, should be more specialized to better meet members' needs. For
instance, financial institutions, software organizations and telecom
companies should have their own Infraguard-like organizations to share
information quicker.
The FBI has been looking into splitting up the Bay Area Infraguard
chapter into three chapters one each in Silicon Valley, San Francisco and
the East Bay or Oakland partly because of those areas' particular
specialties and partly because of volume.
"The bottom line is, the public sector can be our eyes and ears to
helping [the FBI] contain and find those who attack our country," Mr.
Trahon says.
Copyright 2002 American City Business Journals Inc.
***********************
Government Computer News
Vote on NIST smart-card standards is set for next week
By Dipka Bhambhani
The government's interagency smart-card group next week will vote on
whether to adopt newly released interoperability standards for smart-card
hardware and software.
The Government Smart Card Interoperability Committeewith representatives
from the Defense Department, General Services Administration and National
Institute of Standards and Technologyis expected to approve the GSC
Interoperability Specification Version 2.0. NIST last week released its
latest draft of the interoperability framework. It is posted online at
smartcard.nist.gov/GSCISV2-0.pdf.
The standards would require that products used for government smart-card
programs meet the GSC-IS Version 2.0 specification.
"I strongly believe that interoperability is the issue that will make or
break the smart-card market in the U.S.," said James Dray, NIST's principal
scientist for the GSC program.
**************************
Government Computer News
Navy opens third NMCI center in Hawaii
By Dawn S. Onley
GCN Staff
Today in Hawaii, the Navy is opening its third network operations center to
support the Navy-Marine Corps Intranet.
Seventy-five employees at the Hawaii NOC on Ford Island will manage network
traffic throughout the region and will monitor NMCI servers, routers and
networks. The center will also monitor intrusion attempts, Navy officials
said.
Navy projects that the Hawaii facility will eventually grow to more than
200 civilian, enlisted and contract workers.
The Navy also has opened NOCs in Norfolk, Va., and San Diego to support the
NMCI program.
So far, under the $6.9 billion contract, Electronic Data Systems Corp. has
cut over about 59,000 seats to the NMCI environment and has authority to
take over 90,000 more. Ultimately, NCMI is intended to link more than
400,000 desktop PCs across the United States, Puerto Rico, Iceland and Cuba.
****************************
Government Computer News
OMB models its site redesign on FirstGov portal
By Jason Miller
Keeping in line with the redesign of the FirstGov portal, the Office of
Management and Budget has revamped its Web site applying the same
three-clicks-to-service approach.
OMB yesterday launched its new site at www.omb.gov.
The sitealso modeled after the White House's home pageadded navigation
tools down the left side to ease and speed sifting through documents. Users
can browse through subject areas such as the president's 2003 budget
proposal and agency information directly instead of having to click through
several layers.
OMB also added features such as The Wastebasket, where visitors can e-mail
examples of mismanagement or government waste, and Feedback and Forth,
where the public can submit opinions directly to OMB.
The front page now offers the latest media advisories and administration
policy announcements, as well as links to information about the President's
Management Agenda and agencies' scorecards.
************************
Government Computer News
House makes resolutions in XML
By Susan M. Menke
The House of Representatives is pioneering its shift to Extensible Markup
Language with simple resolutions, which started in January.
"Our goal is to begin production of some introduced bills using XML by
January 2003," said Joe Carmel, chief of legislative computer systems.
Testing is now under way on XML output of new bills, he said.
The House last year completed more than 100 document type definitions
(DTDs) for its entire output of bills, resolutions, correspondence and
other production elements [see story at
www.gcn.com/20_25/inbrief/16922-1.html].
Current House output is searchable only by bill numbers or keywords, but in
XML it would be searchable by titles, names, tables, subheadings and other
components. A folder of XML documents essentially becomes a database
searchable by browser.
A sample of the XML coding for a House bill appears at
xml.house.gov/hr10.xml. It shows how each line, name and term has an
identifying tag, created by exporting the document from a word processor
such as Microsoft Word or Corel WordPerfect into a special XML template.
The tags automatically control typography and create entries for tables of
contents and indexes. They can serve for paper or electronic publication.
The House DTDs, which the Government Printing Office helped design, are in
the public domain.
************************
Government Computer News
GAO gives White House passing grade on IT efforts
By Jason Miller
The Executive Office of the President has advanced its handling of its
systems, but there's still room for improvement, the General Accounting
Office told lawmakers in an analysis released yesterday.
"EOP's efforts at this juncture should be viewed as work in progress, as
opposed to completed tasks. This means that the office's modernization
success largely depends on its ability and resolve in fulfilling its plans
and commitments," said the letter sent to Capitol Hill committees with
White House oversight.
The fiscal 2002 EOP Appropriations Act mandated that EOP submit a report to
the House and Senate Appropriations committees outlining its work in
developing four items:
An officewide architecture
A capital planning and investment control process
A capital investment plan
A human capital management plan.
Congress had limited EOP's spending on systems modernization until it
detailed its progress to lawmakers. The White House sent its report to
Congress in mid-April.
"EOP has made progress, and it has made plans and future commitments
relative to each of the four areas addressed in its report," said the
review signed by Randolph C. Hite, GAO's'director of IT architecture and
systems issues.
In response to a draft of the analysis, the associate counsel to the
president told GAO that the EOP's systems chief "was satisfied with the
substance of the report and that the White House had no substantive comments."
EOP has finished a business reference model that describes its
administrative processes and IT requirements, noted the review, Executive
Office of the President: Analysis of Mandated Report on Key IT Areas.
The model also outlines the White House's existing networks and
infrastructure. EOP still is working on an officewide architecture, which
will be used to modernize its operations, the GAO analysis said.
The CIO's office controls IT investments by requiring that project managers
submit a standard briefing each month, GAO said. The EOP briefing template
evaluates an initiative's progress against cost, schedule and performance
commitments.
EOP is focusing on low-risk and high-payoff projects such as a $5 million
redesign and relocation of its data center and a $1.5 million project to
replace desktop PCs and improve customer service, GAO said.
Finally, the audit team found the White House's IT team is assessing its
human resources needs against 14 core knowledge and skill areas it has
identified as crucial to support current and future operations. EOP has
begun training staff in some of the 14 areas and plans on hiring additional
staff, GAO said.
************************
Government Executive
Tech firms seek separate cybersecurity agency
From National Journal's Technology Daily
Lawmakers should include a cybersecurity agency within the plans for a new
Homeland Security Department, a trade association said last week.
In a letter to Virginia Republican Tom Davis, chairman of the House
Government Reform Technology and Procurement Policy Subcommittee, the
Business Software Alliance (BSA) touted the need for a special agency
focused on cyberterrorism.
"The unique nature of the cybersecurity challenge thus requires that a
separate coordinating body exist within the Department of Homeland
Security," BSA President and CEO Robert Holleyman wrote.
Davis' subcommittee is one of several panels reviewing the Bush
administration's request for the new department.
BSA also offered comments on competing homeland security proposals. And
Holleyman noted that guidelines for federal cybersecurity and provisions to
promote information sharing between the private sector and public agencies
should be included in such legislation.
**************************
MSNBC
Cyberlaw: Cybersmart or cybersilly?
Sketpics cast doubt on hot new legal field
By Lee Gomes
THE WALL STREET JOURNAL
July 1 Is there really a cyberspace full of "cybercitizens" who need only
be accountable to their own "cyberlaws"? A loose-knit group of law
professors is bucking one of the big fads in the legal field by calling
that whole idea "cybersilly."
LAW INVOLVING the online world is hot right now. Law schools trying
to stay current have courses in it, which tend to be popular with a
generation of law students reared on Wired magazine and Napster. Experts in
so-called cyberlaw typically have technology-friendly legal views, and are
thus frequent guests at the tech world's many conferences. They're also
quoted all the time in media accounts of online legal disputes.
There is, though, a much less well-known but equally determined
group of legal experts let's call them the "cyberskeptics" who are deeply
troubled by just about everything about this trend. The skeptics start by
questioning the very existence of cyberspace, which they say is no more
real than a "phone space" involving all the people on the telephone at a
given time. They go on to argue that something happening online shouldn't
be treated any differently by the law than if it occurred on Main Street.
You can usually find the skeptics in law journals rather than at
tech conferences. Orin S. Kerr, of George Washington University Law School,
for example, is wary of courts looking at Internet legal issues from the
perspective of users, who may indeed think of themselves as cavorting about
in cyberspace. A more productive approach, he says, might be to look at
what is happening in the real world, where one usually simply finds a group
of computers connected to each other and passing along data.
Timothy Wu, a professor at the University of Virginia School of
Law, writes that there is no single Internet, but instead, many different
Internet applications that all need to be discussed differently.
Jack Goldsmith, of the University of Chicago law school, defends a
decision two years ago by a French judge who said that Yahoo couldn't sell
Nazi memorabilia in France, which bans the material. Netizens pounced on
the ruling as an affront to their brave new digital world. But Prof.
Goldsmith says that Yahoo, since it has a subsidiary in France, should no
more be immune to French laws than General Motors is.
More importantly, he says, the French judge went through with the
ruling only after determining that it was feasible, through various
screening technologies, for Yahoo to prevent its French visitors from
seeing the ads but still display them to others.
'EXCEPTIONALISM' REJECTED
While the skeptics emphasize different points, they all have as a
core principle a rejection of the notion of "Internet exceptionalism," or
the idea that the Internet is a new, unique thing that requires its own
special laws. "The steam engine ... probably transformed American law, but
the 'law of the steam engine' never existed," writes Joseph H. Sommer,
counsel at the Federal Reserve Bank of New York, in a law review article
called "Against Cyberlaw." He also fretted that the cyberbuffs are
afflicted with "insufficient perspective, disdain for history, unnecessary
futurology and technophilia."
The skeptics have no particular beef with computer and Internet
technology. Most, in fact, are avid users. They just think that it
shouldn't be pandered to. And they certainly deride the ideas behind the
"Declaration of Independence of Cyberspace," which is posted on many Web
sites and poses a "hands off" challenge to government.
The dispute between the buffs and the skeptics doesn't have the
usual left-right overlay to it. The skeptics tend to be Republican but come
from both sides of the spectrum.
A better question, perhaps, involves the politics of the
cyberspacians not their defenders in law schools as much as the
cyberactivists themselves. Many observers assume them to be politically
progressive, beyond their obvious libertarianism.
But are they really? Prof. Wu thinks not, calling them deeply
technocratic and elitist despite their populist rhetoric. And most of the
activists continue to see the Internet as a utopian ideal despite the fact
that many progressives are beginning to worry that the Web is really just a
very efficient way for companies to move white-collar U.S. jobs overseas.
Prof. Goldsmith says that most law professors are becoming
increasingly wary of the legal claims being made for cyberspace. But what
about his students? Well, he concedes, they're another matter. Many of
them, with the passion of youth, are still enthralled with the whole idea
of a separate universe, one they can call their own.
Copyright © 2002 Dow Jones & Company, Inc. All Rights Reserved.
***********************
CNN
Swedish e-postal service delivers wherever you want
STOCKHOLM, Sweden (AP) -- Forget paper invoices, junk circulars and credit
card statements that pile up in the mailbox.
That's what Posten, Sweden's national post office, is encouraging with an
Internet mail delivery service that aims to make most physical mail go the
way of the typewriter.
"Our vision is that the hall carpet or mailbox will never be cluttered with
anything but the occasional love letter or invitation to a party," says
Posten spokeswoman Margareta Chowra.
Posten's ePostbox is cheap, environmentally friendly and lets recipients
pick up mail at any Internet-connected computer, anywhere in the world.
The Swedish post office is urging large-volume mail-senders like banks,
city governments and housing agencies to trade paper correspondence for its
Internet service.
To send mail through ePostbox, companies pay about 2 kronor (19 cents) per
item, some 25 percent less than it would cost to have the mail delivered by
carriers.
The service is free for mail recipients. Customers who register can choose
from which companies they want to receive mail electronically.
Posten, which launched the service in December and promotes it with TV and
Internet ads, hopes that what's good for its customers will be good for
itself.
Like many national postal services, 366-year-old Posten has seen its
revenues gouged by competition from private delivery services and
electronic messages sent on computers and phones, said Posten vice
president Boerge Oesterholm.
"When the market needs are changing, it's natural for us to give the market
what it wants," Chowra said.
A growing trend
The service is still in its infancy.
Posten signed up nearly 50 companies, but only 10 have started sending
through it. Chowra won't say how many customers have registered. For now,
only one bank allows customers to pay bills through ePostbox.
Reineke Reitsman, a technology and consumer behavior analyst at Forrester
Research, said the Internet makes sense for direct marketing, traditionally
a core business for post offices.
Companies using the service send digital versions of mail items to Posten.
Postal workers sort it for distribution to the registered customers'
ePostboxes via a secured internal mailing system.
Customers access their ePostboxes through Web browsers with 128-bit
encryption.
Canada Post has been offering a similar service since November 1999 and has
drawn some 200,000 customers and about 90 companies as users.
A Finnish equivalent, dubbed Netposti, started in January 2001 and has some
130,000 customers and 100 member companies. Spokesman Tom Sandman said the
service was not yet profitable.
In the United States, customers can receive and pay bills online through
the U.S. Postal Service. They can also send money from a bank account to
anyone with an e-mail address. Spokeswoman Sue Brennan would not release
usage figures.
The U.S. Postal Service is also testing a system that would allow companies
to prepare newsletters and other bulk items electronically that it would
then print and deliver to physical mailboxes. The service printed more than
2 million items in fiscal 2001.
But because of lack of interest, the Postal Service recently dropped
PosteCS, a system for delivering electronic documents with postmarks.
Chowra, who declined to say how much Posten has invested in ePostbox, said
Sweden's service is unique because mail will be delivered physically if it
doesn't match an electronic mailbox.
All aspects of Posten's system, from registration to usage and transmission
of messages, are secured. An electronic postmark tracks the date and time a
message is sent and opened. The postmark guarantees the mail has not been
tampered with during transmission.
"The messages never leave Posten's own system," Chowra said. "They are
handled within our 'fireproof doors' all the time."
Copyright 2002 The Associated Press. All rights reserved. This material may
not be published, broadcast, rewritten, or redistributed.
***************************
CNN
Foes vow to challenge Spanish Internet law
MADRID, Spain (AP) -- Opponents of a new e-commerce law -- which requires
Internet service providers to keep tabs on users -- have vowed to challenge
it in court as a violation of constitutional rights.
But the head of a national Internet users association applauded the
protections it offers for online consumers.
The Law on Services for the Information Society is one of the first to
comply with a European Union directive on regulating the Internet in the 15
member countries.
The law was adopted Thursday in the Congress of Deputies, the lower house
of Spain's parliament. It is expected to become law over the summer after
its publication in the Official State Gazette.
The law covers a broad range of Internet commerce issues. It prohibits
distribution of mass unsolicited e-mail and stipulates that Internet
transactions be considered judicially with the same validity as signed
paper agreements.
It will also require Internet service providers to retain records on users
and collaborate with law enforcement authorities by shutting down Web sites
involved in illegal activities. Providers must keep a one-year record of IP
addresses that can help police identify users who sent threatening e-mails
or published sites promoting racial hatred.
Failure to do comply with the law may result in fines of up to $595,000.
Javier Maestre, a lawyer who has led opposition to the bill in Spain, said
the law violates constitutional rights to privacy, freedom of expression
and the presumption of innocence.
"You can't have the presumption of innocence in the real world and be
treated by the police as a suspected criminal in the virtual world," he said.
Maestre and other opponents have started an online petition drive to
challenge the law before the Constitutional Court.
But Javier Sola, director of the Association of Internet Users, said the
law will be a boost for online shopping because businesses on the Web must
identify themselves with their tax identification numbers.
"Consumers want to deal with companies, not Web sites," he said. "If there
is a problem, you want to be able to file a claim against the company."
***********************
CNET
Suspected hi-tech pedophiles arrested
By SUE LEEMAN -- Associated Press
LONDON (AP) -- Police in seven countries on Tuesday arrested around 50
suspected members of a high-tech child abuse ring calling itself "Shadowz
Brotherhood" that made and distributed obscene images of children,
including babies, on the Internet, British authorities said.
Hundreds of police officers swooped on suspects' homes in synchronized
raids early Tuesday, seizing dozens of computers, videos and compact discs,
according to Britain's National High-tech Crime Unit, which coordinated the
operation with the European police organization Europol.
Police said 31 people were arrested in Germany and others were arrested in
Britain, but did not give the other five countries.
"This group were using highly sophisticated technical means to continue
their criminal activities and to avoid detection," said Detective Chief
Supt. Len Hynds, the unit's head. "It was a level of sophistication we have
not seen in law enforcement before."
"In terms of the kinds of material they are posting and allowing access to
it's the worst group I have encountered," Hynds added.
The ring used sophisticated encryption techniques, sometimes hiding
material in seemingly innocent picture files, and was structured in cells
whose members knew only each other for security, officials said.
Authorities say some members of the group sexually abused children and then
posted the images on their Web site, which also provided advice on how to
meet children in Internet chat rooms.
Police believe the group was set up around two years ago and had members in
Britain, the United States, Canada, Belgium, Denmark, Germany, Italy, the
Netherlands, Romania, Spain, Sweden and Switzerland.
Sixteen suspected members of the group were already in custody in several
countries; one suspect in the United States, an air force officer, has
committed suicide while in custody.
Hynds said the group had about 100 members, including 23 "systems
administrators" who ran the group's Web site and "monitored bulletin boards
and chat rooms ensuring people were using proper security measures and
excluded people from the site if they weren't."
Administrators also provided advice about police tactics and techniques so
they could avoid detection, he added.
Police said administrators operated a "star" system to rate members: after
initial vetting, new members received a one-star rating, allowing them to
enter certain chat rooms, newsgroups and bulletin boards.
To gain further stars they had to post images of child sex abuse on the
group's site; as they gained stars, they obtained greater access to
restricted sites containing the most graphic material.
*********************
Sydney Morning Herald
First Internet cafes to open in Kabul
Kabul
July 2 2002
After decades of near-total communications isolation, Afghans are about to
make a leap onto the World Wide Web with the opening of the country's first
Internet cafes.
"We plan to open up to three Internet cafes in Kabul within the next two to
three weeks," said Alex Grinling, managing director of the Afghan Wireless
Communication Company (AWCC) which will become the war-ravaged country's
first Internet service provider.
Afghanistan took a major step forward in the telecommunications field in
April when the state-affiliated AWCC company launched the first cellular
telephone network. President Hamid Karzai placed a call to an Afghan
refugee living in Germany, something nearly impossible through the old
telephone lines that served the hardline Islamic Taliban regime.
The nation's thirst for telecommunications became apparent during the loya
jirga, the grand council that met last month to choose a new national
leadership. All week, delegates chatting into cellular phones strolled the
sunny plaza outside the meeting hall, and were provided a temporary
Internet access in a nearby hotel.
Reliable telecommunications are considered critical to knitting back
together a nation long divided by a bitter civil war.
"We expect there will be a lot of interest for the Internet here,
especially among the people who know what Internet is - those Afghans who
have lived in exile and are now returning home," Grinling said.
He conceded that there may be some practical problems at the outset.
Few locals in the city of two million people know what the Internet is.
"Internet? What is that?" asked Mustafa Brahimi, 49, as he pushed through a
crowd in Kabul's dusty open-air Mandawy market.
When told about the network, his questions reflected other complications.
"It sounds great," he said. "But what about electricity? How will it work
without it?"
Kabul's infrastructure is in a shambles after two decades of neglect and
warfare. Power cuts are frequent, and most of the city's telephone lines
were destroyed by fighters digging trenches and eventually stripped for
copper by scavengers.
The capital's 7,000 working analog telephones can't connect with 5,000
phones on the two-year-old digital system installed under the Taliban.
There are just 12,000 functioning telephones in a city of nearly two
million people.
"Thus the Internet cafes," says Grinling, who heads operations in the
Western-run Afghan Wireless. "We'll install a wireless communication system
into the cafes for an easy link with the Internet. I'm sure it will become
a major hit among the Afghans."
Among those looking forward to the Internet cafes is Arif Amonullah, a
28-year-old engineer who returned to Kabul last month after eight years in
exile in Russia.
"I never dreamed that Afghanistan will ever have mobile phones, not to
speak about Internet," Amonullah said. "I have relatives in England and
can't wait to exchange a few e-mails with them. They won't believe that I'm
sending them from, imagine, a Kabul Internet cafe!"
*************************
Sydney Morning Herald
Intelligence for the open-source war
By Adam Turner
Depending on who you ask, the open-source movement is either a cancer
spreading through the IT world or a miracle cure to Microsoft domination.
Like most battles these days, the open-source war will be fought in the
courtroom as much as on the server or the desktop.
RedHat senior vice-president and chief legal counsel Mark Webbink, Samba
developer Andrew Tridgell and a gaggle of IT lawyers are among the guest
speakers in Brisbane tomorrow at a conference titled Legal Issues Relating
to Free and Open Source Software.
Such software is often covered by the GNU General Public License (GPL).
Often referred to as "copy-left" or open source, software covered by the
GNU GPL is free of charge to the general public. If a programmer develops
software containing code covered by the GNU GPL, that software also becomes
open source.
Run by Queensland University of Technology's School of Law, tomorrow's
conference grew from a series of intellectual property lectures delivered
in California by QUT's head of law, Professor Brian Fitzgerald.
Keynote addresses and panels will cover legal issues involved in using free
and open-source software in business, security aspects and integrating
proprietary and open-source models.
Tomorrow's conference is designed to counteract the campaign of fear,
uncertainty and doubt that has dogged the open-source movement, says the
organiser, QUT law researcher Graham Bassett.
"We're trying to combine the expertise of lawyers who are experts in this
software licensing area and the area of open source, with practitioners
creating large-scale projects."
Microsoft's new Software Assurance licensing system is encouraging
government and private sectors around the world to consider open-source
alternatives, says Bassett.
Other guest speakers at the conference include Sun Microsystems' Bill Lard
and independent developer Rhys Weatherley, who is an important contributor
to the GNU.NET project - and open-source competitor to Microsoft's .NET.
****************
New Zealand Herald
Modems in danger of hackers gaining entry
By ADAM GIFFORD
Owners of Jetstream modems are being urged to conduct basic checks to
ensure they are not vulnerable to hackers, who can use them as relays for
spam emails or to conceal where data is going.
"Strictly speaking they are not modems but routers connected to the
internet as long as they are plugged in and powered up," said Unitec
networking student Alan Birch.
His investigations into the configurations on his own Nokia ADSL
(asynchronous digital subscriber line) modem revealed it could be hacked
into from the outside.
Birch said he had assumed his modem was secure after asking his sister to
try to access it from outside by putting in its IP address - found using a
program called Samspade - into a browser.
"The problem was the IP address is dynamic, and the one I gave her had
expired when she put it in the browser ," Birch said.
"After I read the article in the Herald last week I thought I still might
not be safe, so I downloaded the administration manual from the Nokia
website and found I could access the modem's command line through
Hyperterminal.
"When I did that I saw there were no passwords in place - I just needed to
hit enter to get in."
Birch used Hyperterminal to create passwords for all the access levels.
Networking specialist Darren Clarke of Service Direct said most DSL modem
brands had the remote configuration features disabled by default, and could
be accessed only from inside the network.
"If remote management or external configuration options are required, the
customer needs to know and understand the risks, and the reseller must take
all necessary precautions to minimise this risk, such as changing default
passwords to secure password formats," Clarke said.
Clarke suggests DSL modem users download a port scanning tool such as
Shields Up - https://grc.com/x/ne.dll?bh0bkyd2 from the internet to test
their modem.
"It scans the different port numbers to see which are open.
"The two ports we are concerned about are port 80, which is the HTTP web
browser, and port 23, which is telnet.
"If either is available, it could allow someone to play around in your
configurations."
Clarke said people should also look for pinholes, ports which were open to
allow data to be redirected.
"If I want to have an email server in my organisation I would have to put
in a pinhole, which is port 25 for SMTP.
"Normally most environments don't need any ports open. If the mail just
goes to a POP mailbox, you don't need that port open."
Clarke said companies installing DSL modems should check the configurations
to ensure they were not vulnerable.
"There is also an opportunity for a smart web developer to create a site
which will check those two ports, 80 and 23," he said.
Clarke said if people were unsure of their vulnerability they should ask
their internet service provider or local modem service agent to help check it.
*************************
Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 510
2120 L Street, NW
Washington, D.C. 20037
202-478-6124
lillie.coney@xxxxxxx