[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips June 13, 2002
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, CSSP <cssp@xxxxxxx>;, glee@xxxxxxxxxxxxx;, Charlie Oriez <coriez@xxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, computer_security_day@xxxxxxx;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;
- Subject: Clips June 13, 2002
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Thu, 13 Jun 2002 15:54:23 -0400
Clips June 13, 2002
ARTICLES
High-Speed Internet Access Gets White House Spotlight
Outdated Systems Balk Terrorism Investigations
CIA vet heads new FBI intelligence office
Homeland cybersecurity plans hailed
Industry offers Homeland advice
DOD is on track to add biometrics to Common Access Card
Tech may plug cargo security
Senator Undecided On ICANN Reform
Labor Department Publishes Union Documents Online
Turkish Media Law Could Censor Net
Young, male, wired, music rippers
New Virus Can Infect Picture Files
Latest Spin on Online Music
Homeland connection a priority
General: Challenge is culture, not tech
Info urged to fill military gaps
DOT tests e-seals on shipments
DOT tests e-seals on shipments
Homeland formula for failure ID'd
Senators Say U.S. Should Keep Tabs on Internet Body
Cybersecurity plans will be part of Homeland Security Department
Rechargeable batteries are not keeping pace
TV signals may be used to handle cell phone calls
Most radar detectors can't beat police technology
Microsoft discloses Web software security flaw
Authorities crack $7M online software piracy ring
Habitat for Humanity adds PCs to homes
Online sales of nuke drugs skyrocket
U.S. spy imagery viewed by civilians
Senators decry spectrum policy, name defense as top priority
Defense bill would create tech center for 'first responders'
Scientists develop transistor the size of an atom
Govt department being investigated over spam
Dark side of the Net
Web design 'causes confusion'
The most wired nation on earth
Chief (in)security officer
ICANN comes under fire at Senate hearing
Web Standards Project aims to educate developers
*********************
Washington Post
High-Speed Internet Access Gets White House Spotlight
Bush to Discuss Plans to Promote Availability
By Mike Allen and Jonathan Krim
President Bush plans to tell technology executives today that his
administration will work to make high-speed Internet access available in
more areas, administration officials said. But the White House will not
take sides on contentious regulatory questions that are among the most
heavily lobbied issues in Washington.
Technology executives, many of them political centrists who are viewed as
crucial potential donors and supporters by both parties, have been
aggressively lobbying the White House for incentives encouraging high-speed
Internet service, known as broadband.
Administration officials said conflicting proposals on Capitol Hill have
led them to conclude that no major broadband program can be passed this
year. And the officials said the industry is bitterly divided about the
specifics of a national policy. The officials said Commerce Secretary
Donald L. Evans plans to tell the executives today that the administration
is committed to encouraging demand for high-speed access, and to helping
state and local governments that are having trouble setting up systems.
Senate Democrats are working to make broadband access one of their
signature issues. Senate Majority Leader Thomas A. Daschle (D-S.D.) and
Sen. Joseph I. Lieberman (D-Conn.) each sent Bush a letter encouraging him
to put broadband on the agenda for the White House session with the
executives, which the administration is calling a "21st Century High Tech
Forum."
Bruce P. Mehlman, assistant secretary of commerce for technology policy,
said the administration is already taking steps to promote deployment.
"Among other things, we plan to lead by example by better deploying
high-speed systems within the government," Mehlman said.
Senior administration officials said outreach to the technology community
is one of their priorities. "We have a common goal in promoting innovation,
competitiveness and service," said Lezlee Westine, Bush's director of
public liaison and former co-chief executive of TechNet, an industry
political group.
Some of the industry's biggest names -- including Steve Case, chairman of
AOL Time Warner Inc.; AT&T chief executive C. Michael Armstrong; and James
L. Barksdale, former chief executive of Netscape Communications Corp. --
will appear on panels with Cabinet secretaries and other administration
officials.
Major technology corporations such as Intel Corp., Dell Computer Corp. and
Microsoft Corp. have been urging the administration to set specific goals
for converting much of the nation to faster Internet access, which
companies see as an important catalyst for the economy and particularly the
struggling technology sector.
The regional telephone companies, or Baby Bells, argue that they have
little incentive to invest in broadband rollout if they are required to
share their lines with competitors providing Internet services. The Federal
Communications Commission under Chairman Michael K. Powell has been heading
down a deregulatory path that is likely to lift such requirements.
By contrast, long-distance companies and other Baby Bell competitors argue
that they should have access to the regional telephone lines in order to
sell broadband service.
*****************
Washington Post
Outdated Systems Balk Terrorism Investigations
FBI, for Example, Couldn't Track Flight School Data
When a Phoenix FBI agent became suspicious of Middle Eastern men training
at an Arizona flight school last summer, he wrote a now well-known memo
suggesting a canvass of all U.S. aviation schools. FBI headquarters staff
rejected the idea; the bureau didn't have the personnel to do it.
But agent Kenneth Williams and his FBI colleagues might have been able to
do some of the research on their own -- if their computers had been able to
tap into FBI databases for references to flight schools. The FBI's 56 field
offices don't have such technology.
"It would have been very nice if . . . you put into our computer system a
request for anything relating to flight schools, for instance, and have
every report in the last 10 years that . . . mentions flight schools or
flight training and the like kicked out," FBI Director Robert S. Mueller
III said.
"We do not have that capability now. We have to have that capability."
The FBI, notorious for its antiquated computer system, isn't the only
federal agency facing that problem. Most federal law enforcement databases
cannot communicate well with each other. Local and state databases can't
share information in a comprehensive way with federal agencies. Police
agencies across the nation have their individual computer systems, which,
for the most part, aren't linked.
The process of sifting crucial information from countless databases is
called "data mining," a practice used every day by some private-sector
companies but woefully lacking among government agencies. Fixing that
problem is a cornerstone of President Bush's proposal to create a new
Department of Homeland Security that he said "will review intelligence and
law enforcement information from all agencies of government and produce a
single daily picture of threats against our homeland."
Homeland Security Director Tom Ridge said that getting the databases to
communicate with one another and then analyzing the results is as crucial
as reforming the FBI and beefing up border protection -- and perhaps as a
big a task.
Getting the right details into the right hands is "at the heart of
everything we do," Ridge said in an interview. "It's not a matter of
getting more information. Right now we're not doing a good enough job of
processing the information that we have."
Designing or obtaining the right technology likely will prove a much easier
task than overcoming other barriers, such as cost, privacy concerns, legal
restrictions, access questions and summarizing classified information in a
way that protects secrets and sources, according to government officials
and outside specialists.
Sen. Charles E. Schumer (D-N.Y.), who has convened hearings on the issue,
said the problem represents "as serious a threat as a biological or
chemical agent."
During a Senate Judiciary Committee hearing Thursday, Schumer and others
lamented the inadequate technology that plagues the FBI in particular.
"Before 9/11, the FBI's computers were less sophisticated than the one I
bought for my son for $1,400," Schumer told Mueller.
Mueller has vowed to overhaul technology, but cautioned that it could be a
multiyear effort. "We've got something like 35 separate investigative
database applications that we use," Mueller said in an interview with
Washington Post editors and reporters last week. "For us to be able to do
the predictive, analytical work we need to do, we have to integrate the
information in a way that we have not in the past."
The FBI director spoke recently with Lawrence J. Ellison, chief executive
officer of Oracle Corp., about improving computer links within law enforcement.
Congressional investigators are attempting to determine whether better
technology might have enabled FBI agents in Minneapolis who arrested
Zacarias Moussaoui last August to have learned of the July memo written by
Phoenix FBI agent Williams. Moussaoui, who aroused suspicion at a Minnesota
flight school, has been charged as a conspirator in the Sept. 11 attacks,
but agents investigating him before the terror assault were unaware of
other clues, a point made repeatedly during Thursday's Senate hearing.
All told, the federal government has more than a dozen terrorist watch
lists, run by the FBI, the CIA, the Immigration and Naturalization Service
and other agencies. At least 55 databases contain watch-list information,
some of it classified, officials said.
Two of the Sept. 11 hijackers were on a CIA watch list, but commercial
airlines had no access to the government databases that would have alerted
them to the two men. Now, however, the FBI and CIA provide airlines with
"no-fly" lists of suspects.
Protecting the borders presents similar technological challenges involving
numerous players. Separate databases are maintained by the INS, the Customs
Service, the State Department and other government agencies. Ridge said
that one benefit of creating a new homeland security department that
includes those operations will be the chance to ensure that all government
systems are compatible.
Civil liberties groups are closely watching developments, concerned that
the government eventually will seek to routinely tap into private databases
containing credit data, health information, travel records and other
sensitive material, along with video from private security surveillance
systems. Those concerns have been magnified by recent changes in FBI
guidelines that loosen restrictions on using commercial databases to search
for anti-terror leads.
"You have to know precisely what they're proposing to share, and how
they're proposing to share it," said Barry S. Steinhardt, associate
director of the American Civil Liberties Union, adding that the ACLU and
other groups want to ensure that the government does not attempt to create
dossiers on ordinary citizens.
"It creates a specter of Big Brother government," said Jerry Berman,
executive director of the Center for Democracy and Technology, a civil
liberties group.
Numerous companies are promoting technological solutions to the problems
and hoping to tap a potentially lucrative market. The White House is
seeking $722 million in the 2003 budget for anti-terror technology, just
the start of a long-term funding effort.
Matt Malden, vice president and general manager of homeland security
programs at Siebel Systems Inc., a leader in the technology industry, said
the best systems will enable the government to track, prevent and address
terrorist activities.
Credit card companies and others in the financial industry have used
integrated databases for years, becoming extremely proficient in
data-mining techniques. Their software can assess credit risks, monitor
spending habits and market products. Siebel Systems, for example, contends
that its software could have helped authorities spot patterns in the
movements of the Sept. 11 hijackers by tracking their residences, credit
card purchases and communications.
A key difference for private industry, however, is that customers agree to
give up some privacy to financial institutions when they sign up for credit
cards.
The government would not have blanket access to such a volume of personal
spending information. But the same kind of technology could be used to
build and mine government databases, said Steven R. Perkins, a senior vice
president of Oracle Corp., a major federal contractor and the world's
largest database technology company.
"This is not [President John F.] Kennedy's challenge of putting a man on
the moon, where the technology doesn't exist to solve the problem," Perkins
said. "Is it complex? Absolutely. Is it expensive? Absolutely. But it can
be done."
Federal officials agree that the technology exists to create new databases
or tie existing ones together in ways that can be mindful of privacy and
constitutional concerns. But they haven't yet decided exactly what
information should be tagged for homeland security, or who would get access
to it.
Steven I. Cooper, Ridge's technology expert, has spent the past two months
identifying databases from dozens of federal departments and agencies to
determinewhich have information pertaining to areas such as border control,
bioterrorism prevention and emergency response, a starting point in a
comprehensive look at revamping systems.
"You're culling across a jillion-piece jigsaw puzzle," said Gary W. Strong,
a technology program director for the National Science Foundation, which is
funding research on ways to retrieve and analyze information. "The
knowledge [comes from] going piece by piece to see if it fits together."
****************
Government Executive
CIA vet heads new FBI intelligence office
By Shane Harris
sharris@xxxxxxxxxxx
The FBI has named Mark Miller, a 20-year CIA veteran and one of its top
analysts, to lead the bureau's new Office of Intelligence, according to a
CIA spokesman. Miller started working at the FBI May 27.
FBI Director Robert Mueller announced the creation of the office May 29,
when he outlined changes he wants to make in the way the FBI investigates
terrorist activities, as well as how it collects, shares and analyzes
intelligence. The new Office of Intelligence will sift through information
about terrorist activities in order to predict future attacks, Mueller said
at the time. Bureau officials declined to elaborate on how that would be
accomplished and how the new division would work with the CIA, given the
cultural and regulatory boundaries that have kept the two agencies apart
for decades.
"I think both agencies have a lot to learn from working together in ways
that we have not worked in the past," Mueller said in May. "And
consequently?the Office of Intelligence will be handled?by an individual
who is an experienced CIA intelligence officer."
An FBI spokeswoman wouldn't elaborate on what Miller's specific duties
would be as head of the new office. She said only that the division's
design is "a work in progress." Miller declined to comment.
Miller has spent most of his career studying Soviet and Russian
intelligence, the CIA spokesman said. Most recently, he led an interagency
task force that focused on mujaheddin and Islamic terrorist activities in
Bosnia. The task force was created in 1992 in response to growing political
and ethnic turmoil in the former Yugoslavia and includes representatives of
the CIA, the Defense Intelligence Agency, the National Security Agency and
the Joint Chiefs of Staff.
The CIA trained and financed mujaheddin fighters during Afghanistan's war
with the Soviet Union in the 1980s. After the Soviet pullout in 1989, many
mujaheddin disbanded and became mercenaries in the former Soviet republic
of Chechnya and also in Somalia and the Philippines. The Bush
administration has referred to some of them as terrorists.
Miller's work on the task force could serve as a primer for his new
assignment with the Office of Intelligence, which Mueller has said will
rely heavily on technology to analyze and distribute information on
terrorists. In a speech at a technology symposium in Virginia in March
1997, John Gannon, former deputy CIA director for intelligence, described
the task force as "a model in driving collection of information and serving
the range of key intelligence consumers" in the Balkans.
"On a typical day," Gannon said, "a [task force] analyst?might exchange
information with military personnel in Bosnia across a classified network.
The analysts would consult with analysts from other intelligence agencies
and policy counterparts over our classified e-mail and videoconferencing
systems?Their analytic papers and memoranda would be automatically routed,
archived and indexed for future reference."
Mueller has said the FBI must update its antiquated technology systems in
order to better share information within the bureau and among other
agencies. The FBI began a multi-million dollar upgrade of its information
systems more than a year ago, but the FBI inspector general has found that
the agency's technology is still woefully inadequate.
****************
Federal Computer Week
Homeland cybersecurity plans hailed
Cybersecurity officials praised the Bush administration's plans for the
Information Analysis and Infrastructure Protection Division in the proposed
Homeland Security Department, but warned that the details of fitting many
organizations together must be carefully considered.
Testifying before the House Government Reform Committee June 11, the
leaders of the Critical Infrastructure Assurance Office (CIAO) and members
of the FBI's Cyber Division said that bringing together the many
organizations involved in protection and analysis will strengthen the
cooperation that they had begun fostering during the past few years.
In fact, the Commerce Department, where the CIAO is located, was already
working with the White House to co-locate with the Office of Homeland
Security's cybersecurity organization, said John Tritak, director of the
CIAO. The CIAO provides outreach and oversight, along with a tool designed
to assess infrastructure vulnerabilities and prioritize protection plans.
The CIAO also would bring another important function to the new department,
Tritak said. The president's fiscal 2003 homeland security budget request
included $20 million to establish an Information Integration Program Office
within the CIAO to develop and implement an information architecture to
support information sharing and analysis across government.
Only a portion of the FBI's Cyber Division would be moving to the new
department under the administration's plan, said Larry Mefford, assistant
director of the division. The National Infrastructure Protection Center's
(NIPC) multiagency analysis and warning function, which already works
closely with the CIAO and other organizations, would be combined in the new
division.
However, the NIPC works closely with other parts of the FBI's Cyber
Division, and it will be important to figure out how the new department
will continue that relationship, Mefford said.
The General Services Administration's Federal Computer Incident Response
Center (FedCIRC) also is part of the new division in the White House plan,
but so far the agency has received no details about how the center would
contribute or how the transfer would take place, a GSA official who asked
not to be named told Federal Computer Week.
Earlier this year, the White House considered bringing FedCIRC into the
combined cybersecurity center with the CIAO, but the idea was rejected at
the time because of infrastructure investments made by FedCIRC to its
current offices. That issue must still be considered, the official said.
***************
Federal Computer Week
Homeland formula for failure ID'd
The ultimate success or failure of the Homeland Security Department will be
determined by the intelligence and information technology plan that's
proposed and the person selected to lead that effort, according to a
congressional fellow who advises the Executive Office of the President on
technology.
Speaking June 11 at the Armed Forces Communications and Electronics
Association's TechNet International 2002 in Washington, D.C., Eileen
Preisser, also director of the Defense Department's Homeland Defense
Technology Center, said the key will be getting the new department to
organize and share information horizontally, instead of vertically in the
usual stovepipes.
"The kicker that will determine if it succeeds or fails is the intelligence
and IT plan that's prepared," Preisser told Federal Computer Week. "There
has to be a [chief information officer or chief operating officer]-type
person to bring together all the disparate capabilities that exist and
create a new and exciting virtual information environment that will set the
pace for everything else in government.
"If you hire a 65-year-old to do it, it will fail. If you hire former
military, it will fail."
Preisser said the government should look to someone with experience in a
large industry enterprise effort who understands the mission and the roles
that the various agencies should play in the "big picture."
"I would like for that to happen, but I don't see that happening," she said.
Preisser said she fears that the new department will just add more
bureaucracy to a system already overloaded with red tape. She added that
agencies were just beginning to move "horizontally over the last nine
months, and forcing them to go back will be the hardest cultural shift."
An interagency organization can be successful as long as the various parts
are united by their mission and outfitted with the "same standard suitcase
and equipment, and put in the field together," she said, adding that the
interagency operational security (OPSEC) group is a prime example of one
that works.
However, the only way the proposed Homeland Security Department can break
agency stovepipes will be to cut off the individual budgets and fund
everything at the department level, Preisser said. And even with the right
IT and funding plan, the basic implementation will take anywhere from 15
years to 25 years, she said.
To get at least the basic foundation done faster than that, DOD officials
should be given a mentoring role. Preisser said DOD officials have the
necessary experience and should be "highly encouraged" to share what they know.
With that idea in mind, the Missile Defense Agency is developing an
architecture for "mission-critical test beds" that will produce a common
operational picture for itself and the other players involved in a
potential accident or strike involving missiles, such as state and local
first responders, utility companies and industry partners, Preisser said.
The test beds are designed to help DOD, aided by its partners, to identify
text, voice, video or audio data patterns over time that should not be
there. "That is the 'so what' of homeland security," she said, adding that
terabytes of data are useless if the user can't pinpoint what they need
quickly and act on it.
The architecture for this environment should be complete by July, when a
decision is made whether to proceed in Texas or Florida. After that,
partners will be selected based partly on geographical location, and by
September, sites will be configured to use the architecture, Preisser said.
******************************
Federal Computer Week
Industry offers Homeland advice
The recently announced Homeland Security Department should look to the
private sector for possible models on the massive enterprise integration
initiative it faces, according to a panel of industry experts.
Speaking June 11 at the Armed Forces Communications and Electronics
Association's TechNet International 2002 in Washington, D.C., Donald
Zimmerman, chief executive officer of Synergy Inc., said that he had
recently concluded a study of successful firms and identified some similar
characteristics in their enterprise implementation strategies.
Based on that information, Zimmerman said the Homeland Security Department
should:
* Be guided by a concept of operations.
* Be process-based.
* Have a standards-based architecture that is independent of any vendor.
* Maximize its use of commercial off-the-shelf products.
* Have a rapid acquisition cycle.
* Realize that competition is necessary. Don't have a single vendor, but
don't have 10 either.
* Exercise rapid prototyping and development that establishes pilots and
test beds in three months or less.
Alan Harbitter, chief technology officer at PEC Solutions Inc., said there
were some staple technologies that could make such things happen, including
enterprise application integration, biometric authentication and Web
services namely data standardization on Extensible Markup Language.
Ronald Richard, a member of the business advisory board and former chief
operating officer at In-Q-Tel, the CIA's venture capital arm, said that
there also was a need for better language machine translators, as well as
data mining and data linkage tools. He added that those technologies and
others already were helping personnel at FBI and CIA headquarters, but the
key would be getting them into the hands of people in the field at those
agencies and in the new Homeland Security Department.
To make that happen, information security and funding concerns must be
addressed, Harbitter said.
******************************
Government Computer News
DOD is on track to add biometrics to Common Access Card
The Defense Department is pursuing an aggressive timetable for
incorporating biometric identifiers in its Common Access smart card.
"We've got a road map, we're moving along it, and we're moving fast," Army
CIO Lt. Gen. Peter M. Cuviello said today at the AFCEA TechNet
International Conference in Washington. The Army is the lead service for
DOD's Biometrics Management Office.
The Common Access Card is the government's largest public-key
infrastructure deployment. Cards containing digital certificates are to be
issued to all active duty civilian and military personnel by the end of
next year. By January 2005 the department expects to be operating the
government's first enterprisewide biometrics program. A physical
identifier, such as a fingerprint, hand geometry or facial scan, will be
linked to the card to authenticate identity.
The timetable calls for BMO to complete a functional requirements analysis
and an approved products list by January, and to complete an architecture
design and begin a technology demonstration by May. A draft policy
framework on how to use biometrics will be ready by October, with initial
operational capability expected by January 2004. Full operational
capability will follow in a year.
The office already has conducted 12 biometric device field tests and
evaluated 56 commercial products.
********************
Federal Computer Week
Tech may plug cargo security
A top Customs Service official told Congress June 11 that the government
must push back the borders of the United States by using technology to
check high-risk cargo containers before they leave a foreign port.
At a hearing on President Bush's plan to create a Homeland Security
Department, Customs' Deputy Commissioner Douglas Browning said that
technology and information are essential for a successful container
security strategy one of the biggest security holes facing the United States.
"To put it simply, the more technology and information we have, and the
earlier in the supply chain we have them, the better," Browning told the
House Government Reform Committee's National Security, Veterans' Affairs
and International Relations Subcommittee. The panel listened to a day of
testimony about the prospect of putting multiple agencies, including
Customs, under one umbrella agency to fight terrorism.
Customs already has moved ahead in ratcheting up security checks for
containers one of the major shipping methods used worldwide. Last October,
authorities found a suspected al Qaeda operative living inside a shipping
container. He was heading for the Canadian port of Halifax, with airport
maps, security badges and an airport mechanic's credentials.
Customs is now checking at least 15 percent of all cargoes, according to
Browning. By January, every Customs inspector will have a pocket-size
device that can detect radiation. Customs officials have also worked out
deals with major shippers who will provide their own security systems and
guarantee them in exchange for swift passage across the borders. And June
5, Customs issued a request for information on embedding technology in
containers to detect chemical or radioactive devices.
"Ultimately, oceangoing cargo containers are susceptible to the terrorist
threat," Browning said. "We should not wait for such a scenario to occur.
As the primary agency for cargo security, U.S. Customs should know
everything there is to know about a container headed for this country
before it leaves Rotterdam or Singapore for America's ports," he said.
***************
Washington Post
Senator Undecided On ICANN Reform
By Robert MacMillan
A key federal lawmaker today said he will refrain - for now - from
introducing a bill to slash the power of the nonprofit group that controls
the administration of the Internet.
At a subcommittee hearing, Sen. Conrad Burns (R-Mont.) told reporters that
he needs more information before the Senate enters the fractious debate on
the future of the Internet Corporation for Assigned Names and Numbers (ICANN).
Critics charge that ICANN ignores the desires of the global Internet
community and exceeds the authority it was given by the U.S. Commerce
Department to tend to the technical side of running the Internet.
Burns' decision to hold off on introducing legislation comes as ICANN and
the Commerce Department prepare to renew the original agreement that cedes
the Internet's administration to ICANN. The deadline to extend the
agreement is Sept. 30.
"ICANN was initially created to address technological concerns, but it's
now a policymaking body without due process," Burns said. "Simply put,
ICANN was never meant to be a super-national regulatory body."
Burns, who has taken the Senate lead on ICANN issues with colleagues Ron
Wyden (D-Ore.) and George Allen (R-Va.), said the Commerce Department must
issue new reports about its monitoring of ICANN.
Commerce Undersecretary Nancy Victory, who oversees the National
Telecommunications and Information Administration, told the senators today
that the department has supervised ICANN in an informal capacity, and said
few of its discussions with the group's staff are documented in writing.
In a report issued today, the General Accounting Office criticized the
department's lack of record-keeping. The report also said that ICANN has
been slow to increase Internet stability and security, and slow to ensure
that private Internet users are represented in domain name policymaking.
Karl Auerbach, an ICANN board member who is critical of the organization,
cautioned senators and the Commerce Department not to grant ICANN
additional powers or new business layers.
"ICANN resists the public accountability and disregards public input," he
said. "Instead of being a body of limited powers, it's an ever-growing
bureaucracy."
ICANN President Stuart Lynn acknowledged that the organization needs
reform, but said that it has "made remarkable progress," including creating
competition in the domain name sales business and forming a domain name
dispute resolution policy.
Insisting that that ICANN "is open and transparent, Lynn nevertheless
conceded that all is not perfect with the organization ... but is
everything perfect? Of course not."
Lynn recently proposed changing ICANN's board structure to reflect voting
input from the governments of various countries. While he defends the plan
as a way to increase public participation, critics say it amounts to
government interference without adequate representation for individual
Internet users.
The plan is up for discussion when the 19-member board meets later this
month in Bucharest, Romania.
****************
Washington Post
Labor Department Publishes Union Documents Online
By Kirstin Downey Grimsley
The Labor Department has begun posting on its Web site internal financial
documents from hundreds of labor unions around the country, including
information on their net assets, officials' salaries, and how much they
spend on office expenses and professional fees.
Department spokeswoman Sue Hensley said the initiative to post
labor-management records, also known as LMs, reflects the department's
efforts to promote greater transparency and make more information available
to the public. Until now, people who wanted to know more about union
finances had to visit a Labor Department office to review the paperwork or
seek records from the unions themselves.
"We feel it's positive for union members and union democracy for people to
know how their funds are being spent," Hensley said.
But some labor unions aren't too happy about it, first because many would
have preferred not to see the information disclosed but also because the
department decided not to post the corresponding information from employers
on the Web as well. Employers are required to inform the department about
how much they pay labor organizations and management consultants that
provide expertise on how to handle labor-organizing efforts.
Union activists argue that the employers spend large amounts each year in
efforts to block workers' organizing efforts but that people who are
interested in seeing those financial statements still must go in person to
the Labor Department to retrieve them.
"It's very discriminatory," said Jon Hiatt, general counsel of the AFL-CIO.
"They are putting union LMs online, but not employer or management
consultant LMs online at the same time."
Even some groups that have pushed for greater union disclosure to the
public, and who say that unions have sought to block Web access to avoid
making disclosures, say it would have been more fair if the department had
posted both sets of documents at the same time.
"They should put as much up there as there is interest for," said Ken
Boehm, chairman of the National Legal and Policy Center, a nonprofit
organization that disseminates information about union corruption. He said
that current technology makes it easy to put even large documents on the Web.
Hensley said the department intends to place the management-related
information online at some time "in the near future" but lacks the
resources to do so at this time. She said it takes a while to get these
programs implemented, noting that the department first received a specific
appropriation for putting the records online in 1998.
"This train was down the track a long time ago," she said.
The International Brotherhood of Teamsters, the largest single affiliate
union to the AFL-CIO, said it had no objection to placing its information
on the Web because the union considers it public information anyway.
"The Teamsters are a democratic organization," said Bret Caldwell, a
spokesman for the Teamsters. "Our books are open. Our members are fully
aware of our financial status and our fiscal planning, so this doesn't
affect how we do business."
According to a Labor Department filing on the Teamsters, a 342-page
document, the union had $101 million in assets at the end of 2000 and $80.5
million in liabilities. It paid $2.7 million in taxes that year and spent
$5.8 million on educational and publicity expenses, $17.4 million in office
and administrative expenses, and $2.6 million on contributions, gifts and
grants.
With its budget of over $200,000 a year, the Teamsters file what is known
as an LM-2 form. Smaller unions file LM-3s and LM-4s.
The Newspaper Editors union in Random Lake, Wis., for example, which has 31
members, reported that it had a $5,751 in assets in 2000, according to the
Labor Department's Web site. The Licensed Practical Nurses Association of
Illinois, in Springfield, charges its 525 members dues of $80 per year,
according to its filing. Its seven officers received $155 in disbursements
for their expenses in 2000.
The LM records have been required of unions and managements since 1959 by
the Landrum-Griffin Act, which sought to find legislative remedies for a
host of union-and-management-related problems. It sought to ensure union
democracy and prevent self-dealing and to reveal the financial extent of
management efforts to block unions from forming. The National Legal and
Policy Center, which identifies itself as a conservative group, says the
law needs to be toughened because some unions are not disclosing as much
information as they should and alleges specifically that union money being
used for political causes is being misrepresented as general operating
expenses.
More than 90 percent of union political contributions go to Democratic
candidates.
****************
Government Executive
Patent Office suspends telecommuting program
By Tanya N. Ballard
tballard@xxxxxxxxxxx
Officials at the Patent and Trademark Office have put a popular
telecommuting program on hold while they negotiate the terms of a new
program with an employee union.
"We had a pilot program that was in effect until June 1. It has expired and
we have been in discussion with our union about establishing a new pilot
program," said PTO spokesman Richard Maulsby.
Leaders of the Patent Office Professional Association (POPA), which
represents about 3,600 PTO employees, say the agency's decision to halt the
program during negotiations is a "heavy-handed way of forcing changes in
the program."
Union officials say they oppose a request by PTO that the Patent Office
work-at-home program be renewed annually, requiring negotiations. The
agency also wants the ability to terminate the telecommuting program at any
time. POPA also opposes another proposal requiring employees to count as
personal time any work time lost due to glitches on PTO provided software.
PTO officials declined to comment on the specifics of the negotiations.
"Rather than allowing the program to continue while we negotiate new terms
in good faith, the agency issued an ultimatum and slammed the doors on
work-at-home when we didn't agree," said POPA President Ronald Stern. "Many
employees bought computers, office furniture, and rearranged their homes to
participate in this program. Even more importantly, many reorganized their
home lives and family schedules, and then were figuratively stranded by the
agency."
PTO has been a telecommuting leader among federal agencies since it
established a two-year pilot project in 1997, allowing 18 examining
attorneys to work from home. The measure began as a way to help retain
employees and relieve office overcrowding at the agency.
Last year the Metropolitan Washington Council of Governments awarded the
agency its 2001 Commuter Connections Employer Recognition Telework Award.
The award recognizes employers who initiate programs that encourage the use
of commuting alternatives.
"It is our intention to continue with the telecommuting program and we
simply need to come to an agreement with POPA," Maulsby said.
By law, federal agencies must establish policies allowing eligible
employees to telecommute. The fiscal 2001 Transportation Appropriations
bill set a goal of having 25 percent of the federal workforce participating
in telecommuting programs at least part of the time by April 2001. Just 4.2
percent of federal workers were telecommuting as of last November,
according to the Office of Personnel Management.
The telecommuting move comes at a time when PTO officials have announced
major changes in its patent review system, and has proposed to lay off up
to135 trademark examining attorneys by Sept. 30.
******************
Reuters
Turkish Media Law Could Censor Net
By BEN HOLLAND, Associated Press Writer
ISTANBUL, Turkey (AP) - Turkey's highest court declined to overturn a
controversial law that critics contend could lead to government media
censorship on Turkish Web sites.
After fiery protests including opposition from the European Union ( news -
web sites) the court on Wednesday suspended parts of the same broadcasting
law that would have let individuals own larger chunks of Turkey's news
media, a move critics feared would drive small newspapers and television
and radio stations out of business.
When parliament passed it a second time last month overriding a
presidential veto there were furious scenes, as opposition and government
lawmakers nearly came to blows.
Many Turkish Web sites blacked out their home pages in protest.
President Ahmet Necdet Sezer referred the law to the Constitutional Court
last month, hoping it would be overturned. He said it would curb freedom of
expression and open the way to media monopolies.
Criticism from the European Union, which Turkey wants to join, put added
pressure on the court.
The court voted to suspend implementation of some clauses of the law, while
it decides whether to annul those and other parts of the law. It could take
as long as a year to announce a final decision.
Among the articles the court suspended was a clause that would have
permitted more consolidation by Turkey's biggest media conglomerates. Four
media groups control 80 percent of the country's newspaper circulation and
television and also own banks, construction companies and mobile telephone
companies.
Opposition parties had charged that this measure, together with others
allowing media owners to bid for state contracts, was an attempt by the
government to buy the support of powerful media bosses.
Previously, there were some restrictions on media groups bidding for
lucrative government contracts.
The court did not suspend sections of the law that could extend tight
controls that are already applied to traditional media to Web sites.
Turkey's broadcasting watchdog regularly hands out fines or temporary
closures for broadcasts that offend the military, question Turkey's
treatment of its Kurdish minority or its strict secular policies, or offend
traditional values.
Information technology groups have expressed fears that the law will allow
broadcasting authorities to take similar action against Web sites stunting
the growth of the Internet in Turkey.
****************
MSNBC
Young, male, wired, music rippers
A digitized demographic that's turning the music industry on its head
By Jane Weaver
June 12 Just who is downloading all those songs that are supposedly
wrecking the music industry? Not surprisingly, it's young, American
males the core of the record buying population. More than 25 percent of
American men over the age of 12 years old have downloaded a song from one
of the Internet's popular file-swapping networks, according to a report
released Wedneday. The file-sharing phenomenon is behind new moves in the
music industry to adapt to the digital marketplace and protect its profits.
MORE THAN 40 million Americans have downloaded music from one of the
file-sharing services such as Kazaa or Morpheus, according to IPSOS-Reid, a
Minneapolis research firm that tracks consumer behavior. At least 41
percent of 12-through-17 year-olds claim to have downloaded music or an MP3
file from the file-sharing services and nearly half, or 45 percent, of
18-through-24 year-olds (considered the prime music buying demographic)
indicate they have downloaded songs from one of the networks like Audio
Galaxy or Grokster. Of Americans 35-to-54 years-old, 14 percent report
having downloaded music or an MP3 file from the Internet.
"The idea of file-sharing and peer-to-peer networks is becoming a
more general population phenonmenon," said Matt Kleinschmidt, senior
research manager at the research company.
In addition, one-quarter of Americans over 12 years old own a CD
burner, a device that allows people to "burn" or record music files from a
computer onto a blank CD, according to IPSOS-Reid's research. Some industry
experts estimate that the music revenues lost from people making their own
CDs dwarfs illegal downloads.
Young men are significantly more likely than women to swap files
over the Internet, with 25 percent of men over 12 years old claiming to
have downloaded music from a file-sharing network, compared to only 14
percent of American women.
These young males are the consumers who helped push sales of rap
artist Eminem's new album into the stratosphere, with 1.3 million copies
sold in the first week of its release last month.
But these young, male and wired fans are also the reason that
Eminem's record label Interscope Geffen, a division of Universal Music
Group, released "The Eminem Show" nine days ahead of schedule.
Pirated songs from the CD were being widely distributed online by
mid-May and soon after bootlegged copies of the entire CD were being sold
in the streets.
The Ipsos-Reid research comes on the heels of news that digital
piracy is costing the music industry billions of dollars in lost sales. In
its annual report released this week the International Federation of the
Phonographic Industry said that 40 percent of all CDs and cassettes sold
globally in 2001 were pirated copies. Moreover, 99 percent of all online
music files including songs and MP3s at any of the P2P networks are
illegal or unauthorized, according to the trade group.
Clearly, that's frightening, although hardly unexpected news for
the music industry which is in the midst of its first global sales decline
in a decade. In April, the IFPI reported that total music unit sales fell
by 6.5 percent in 2001 compared to the year before, while revenue from
sales fell 5 percent to $33.7 billion. Sales in North America, the market
where digital downloading is most popular, were hit hardest, declining by
4.7 percent to $14.1 billion.
In response, the major record labels finally launched two
competing, for-pay Web services late last year. The subscription services,
MusicNet and Pressplay, have been criticized for the limitations they
placed on how people listen to downloaded songs and for their high monthly
fees as much as $19 a month.
However, recent moves indicate the music industry is finally
adjusting to the new digital marketplace.
Later this summer Vivendi's Universal Music Group and Sony Music
Entertainment plans to lower the prices for single downloads and allow
users to "burn" or transfer the tunes onto blank CDsa significant change
from the record industry's prior restrictions that people can only listen
to downloaded songs on their computers.
Sony Music Entertainment has been offering single downloads
through its partnerships with RioPort, an distribution and delivery service
for online retailers such as MTV and Best Buy, but will now drop its prices
from $1.99 to $1.49.
Universal intends to release tens of thousands of songs for 99
cents each through a number of online retailers, including Amazon and Best
Buy, industry sources confirm. Full albums could be downloaded for $9.99.
Universal's pay-per-song deal would also be available at Pressplay,
the online music venture backed by Universal and Sony Music, according to
sources familiar with the company's plans.
Other music labels are expected to pursue the pay-per-download
model with CD-burning and reasonable pricing, industry analysts believe.
"Pay-per-download is the way to go," said P.J. McNealy, digital
music analyst with GartnerG2. "The record companies are heading slowly in
the right direction."
Universal's rival service MusicNet the joint venture backed by
Real Networks and AOLis planning a new version by the end of the year which
likely will include some kind of portability and single downloads,
according to company sources.
By the end of the year RioPort will have over 100,000 songs
possibly from all of the five major record companies AOL Time Warner, BMG,
EMI, Sony and Universalavailable for individual downloading, "all of them
burnable," said Jim Long, RioPort's chief executive.
Whether these gradual steps toward a digital music future can stem
the sales decline is uncertain. A turnaround is contingent on improvements
in the economy, "a stronger release schedule, controlling piracy, and the
continued rollout and enhancement of digital music services," UBS Warburg
analysts wrote in a report released Wednesday on the music industry.
But compared to even a few months ago, "it's a whole new world for
them," said RioPort's Long. "The record labels are finally making their
content available in a way that is natural for consumers. It's a huge
change for them."
****************
Washington Post
New Virus Can Infect Picture Files
By D. Ian Hopper
AP Technology Writer
WASHINGTON A new computer virus is the first ever to infect picture files,
an anti-virus firm reported Thursday, making sharing family photos on the
Internet a potentially dangerous activity.
The virus, dubbed Perrun, is not currently infecting computers but worries
anti-virus experts because it is the first to cross from program infection
into data files, long considered safe from malicious data.
"Our concern is more for what might be coming," said Vincent Gullotto, head
anti-virus researcher at McAfee Security. "Potentially, no file type could
be safe."
Until now, viruses infected program files files that can be run on their
own. Data files, like movies, music, text and pictures, were safe from
infection. While earlier viruses deleted or modified data files, Perrun is
the first to infect them.
Perrun still needs some tweaking to become dangerous. The virus arrives via
e-mail or a floppy disk as an executable file. Security experts always warn
against opening programs sent as e-mail attachments.
Once run, the file drops an "extractor" component onto the victim's hard
drive. When a computer user clicks on a picture file with the extension
.JPG a common picture file found on the Web it is infected before it
appears. Because the picture displays normally, Gullotto said, the victim
may not know there's anything wrong.
In its current form, an infected JPG file sent to a friend or placed on a
Web site isn't dangerous without the extractor file. But Gullotto said
there's no reason a virus writer couldn't stuff the entire virus code into
the JPG, making the picture file a virus itself.
That evolution should make computer users think twice about sending
pictures or any other media over the Internet, Gullotto said.
"I think there's a possibility that this could change the playing field,"
he said. "Going forward, we may have to rethink about distributing JPGs."
McAfee researchers received the virus from its creator. Gullotto declined
to identify the author, and McAfee anti-virus software can detect and
remove Perrun.
Perrun is known as a proof-of-concept virus, and does not cause damage.
Gullotto said he fears that virus writers may use Perrun as a template to
create a more destructive version.
***************
Los Angeles Times
Latest Spin on Online Music
Internet: Plans by Universal and Sony to cut download prices draw praise
from some artists, but fate of albums remains an issue.
By JON HEALEY, CHUCK PHILIPS and P.J. HUFFSTUTTER
With the decision to offer tens of thousands of songs online, the world's
two largest record companies have steered onto an unlit road with no clear
destination.
Universal Music Group and Sony Music Entertainment revealed plans this week
to make much of their catalogs available for download at a discount, going
far beyond the major labels' previous--and as yet unsuccessful--experiments
in online distribution.
Although the move drew praise from recording artists, retailers and
Internet music advocates, it also raised questions about the fate of
full-length albums and the companies' ability to succeed online in the face
of rampant Internet piracy. Those questions are difficult to answer, even
by industry executives involved in digital downloads for years.
The companies' plans came as the Department of Justice interviewed artists'
representatives as part of an antitrust investigation into the major record
companies' online ventures.
Sources said a team of federal officials looked for evidence of
anti-competitive practices in the way the companies distribute music
online--particularly through their own services.
The initiatives by Universal and Sony do not rely on the companies' jointly
owned online distribution service, Pressplay. Instead, they use independent
distributors Liquid Audio Inc. and RioPort Inc.
By making a large selection of songs available in a format that allows CD
burning, the two companies are trying to offer consumers something close to
what they've gotten free from such online file-sharing networks as Napster,
Kazaa and Morpheus.
"So now the major labels' message to the consumer is: 'Download from us so
that artists and songwriters get paid,' " said pop star Don Henley. "To me,
the issue is how much do they intend to pay the artists. I suspect very
little, if history is any gauge."
So far, artist representatives say, Universal labels are proposing fair
royalty fees to acts with music sold through the new system.
Under the proposal, an artist signed to a contract with an 18% royalty
would receive 18 cents on the dollar for every track downloaded--after
reimbursing the label for recording costs, sources said.
That's significantly higher than what an artist receives under the CD
model, which, after packaging and "free goods" deductions, would amount to
about 9 cents per $1 single.
Universal plans to make as much of its library of songs available for
downloading as possible, including new releases, starting later this summer.
The price is expected to be 99 cents per song and $9.99 per album, and
buyers will be able to burn the songs they download onto CD--a major shift
in the company's policy.
Sony said it will increase significantly the number of downloadable songs,
cut the price 25% and enable burning. By letting consumers buy individual
tracks, rather than bundling them all into albums, the companies could
create new problems for themselves.
The industry has used singles--and lately, individual songs released only
to radio stations--as a promotional tool to induce consumers to buy the
full album. Labels rely on the higher price tag of an album to recoup the
cost of promoting an artist and cover publishing fees, among other things.
Many consumers who use file-sharing networks say they have no other way to
acquire the songs they want without paying for the ones they don't. But if
the labels persuade those consumers to pay for downloadable tracks, they
could undermine the bundling that's key to their business models.
"When you punt the bundle, that's when the trouble starts," said Jim
Griffin, chief executive of Cherry Lane Digital, a Los Angeles media and
technology consulting firm. "You cannot price a single low enough to
attract fans to buy it, or high enough for the labels to cover the cost of
developing an artist."
Several artists and artist managers said they were not worried about the
effect downloaded singles might have on the album market. Survival in a
single-heavy sales world might push artists and companies to produce better
material, several managers said. It also could prove to be prudent for the
industry, allowing labels to return to signing acts to modest single deals
instead of costly long-term album agreements.
"I think it's a great exploratory step," said Scott Welch of Mosaic Media
Group, which represents Alanis Morissette, OutKast and the Goo Goo Dolls.
"It will force artists to create better songs and companies to sell better
content. The fact is if we don't start making some concrete changes to give
fans what they want, then all we're doing is rearranging the deck chairs on
the Titantic."
Executives at several independent labels and online services that offer
downloadable singles say there just isn't enough data to tell what effect
the moves by Universal and Sony will have on CD sales.
Matador Records, an independent label that already has made much of its
catalog available for downloading, said "it's really hard to quantify" the
effect of downloads on CD sales, if any.
The only approach that seems to have worked is EMusic's subscription
service, which lets users download an unlimited number of songs for a flat
fee, said Patrick Amory, Matador's general manager.
If nothing else, the new system will resolve several ethical issues
surrounding digital downloading, said artist manager Cliff Burnstein.
"One thing this will do is cut through the hypocrisy by giving people the
option of whether they want to buy or steal music," said Burnstein, who
along with Peter Mench runs Q-Prime, the agency that represents Metallica
and the Red Hot Chili Peppers.
"We won't have to listen to anymore of that b.s. like 'I was forced to
download the single because the album had only one good track on it,' " he
added. "Now that you can buy your favorite single for 99 cents, what's the
argument going to be? We'll get down to the truth, which is: 'I want it
free. I'm too cheap to pay 99 cents....Screw the artists.' "
*************************
Federal Computer Week
Homeland connection a priority
Exactly how the proposed Homeland Security Department would work with state
and local first responders is yet to be determined, but creating the
connection is a priority, experts told the House Government Reform
Committee June 11.
Part of the Bush administration's plan for the new department would bring
under one organization all agencies that provide grants, training and other
assistance to first responders. That would enable the administration to
exercise all its resources for communications, training and information
sharing, said Bruce Baughman, director of the Office of National
Preparedness at the Federal Emergency Management Agency.
FEMA, which would lead the emergency preparedness and response section of
the new department, already is developing a streamlined process to get
grant money to first responders and develop communications and training
programs, Baughman said.
Because all homeland security incidents will happen in some locality, a
priority for the department's funding should be placed on establishing the
structure and technology at the state and local levels to share information
and expertise, testified Rep. Jane Harman (D-Calif.), ranking member on the
Terrorism and Homeland Security Subcommittee of the House Permanent Select
Committee on Intelligence.
A single structure will make it much easier to coordinate the exchange,
whether it is investigative information coming into the new department or
warning information being sent to first responders, said Rep. Mac
Thornberry (R-Texas), co-sponsor of a House bill to create a Homeland
Security Department.
"You have one phone number to call, rather than a phone book," he said.
Harman said that any action taken by Congress likely will have to include a
mandate for information sharing between federal agencies and the state and
local responders because the administration's proposal does not include
realigning the major sources for information the FBI and the CIA.
************************
Federal Computer Week
General: Challenge is culture, not tech
Changing data into wisdom and then taking action is the greatest challenge
facing the nation's homeland security efforts and the Army's ongoing
transformation, said Gen. Paul Kern, commander of Army Materiel Command.
"The one thing I don't worry about is the technology," Kern said during his
June 11 opening address at the Armed Forces Communications and Electronics
Association' TechNet International 2002 in Washington, D.C. "What I'm
worried about is culture and changing the way we behave to use the
information you're producing."
Kern said the armed forces must move along a rapid continuum to make the
greatest use of information technology one that goes from data collection
to usable information to knowledge to wisdom and finally to taking action.
He added that conversing in a language that enables that process to happen
is "the root of that success."
"It's about creating an atmosphere where [people] want to exchange
information and take action...and accomplish something," but that's not
easy to do in Washington, D.C., where the people that hold the information
also have the power, he said.
Ronald Richard, a member of the business advisory board and former chief
operating officer at In-Q-Tel, the CIA's venture capital arm, agreed and
said, "Technology is very valuable tool for us, but only a tool."
"No technology is going to get soldiers to take a hill when bullets are
whizzing by their heads...and no technology is a substitute for the gut
[feeling] of CIA agents," Richard said, adding that those things can only
be accomplished through leadership and having the best and brightest people
doing those jobs.
Kern told Federal Computer Week that the Army has learned some valuable
lessons from last year's terrorist attacks that could help the recently
announced Homeland Security Department achieve its goals. As an example,
the commander at the Army's Rock Island, Ill., facility has his staff meet
with local law enforcement and the attorney general's office to exchange
information without violating any laws or individual privacy.
That same strategy can and should be used by the FBI and other agencies in
"opening up new avenues of communication" and realizing President Bush's
message in establishing the new department, Kern said.
"Without violating the rights of American citizens, [agencies] can still
exchange information much more effectively," he said. "The Army will be
able to help with lessons learned in the IT world, but also in the more
mundane cultural process issues to get people to work with one another."
****************
Federal Computer Week
Info urged to fill military gaps
Exactly nine months after the Sept. 11 terrorist attacks, the chairman of
the Joint Chiefs of Staff said that the U.S. military has done a good job
of shortening the sensor-to-shooter cycle in Afghanistan, but can do better
through enhanced information sharing.
Speaking June 11 at Armed Forces Communications and Electronics
Association's TechNet International 2002 in Washington, D.C., Air Force
Gen. Richard Myers said the military's observe, orient, decide and act
(OODA) loop is good at the individual service level, but joint warfighting
efforts need improvement.
The information that the four services have at the tactical command level
is "wildly different for a variety of reasons, and that's unacceptable," he
said.
Myers said that the United States and its coalition partners must be
adaptable and flexible because the enemy in the war on terrorism is
"relentless."
The United States is working with about 80 coalition partners in the
ongoing war, and Myers said he is "dismayed" that working with even the
closest U.S. allies is almost impossible because of America's technological
advantages. He added that he is encouraging American allies, particularly
in Europe, to invest in command, control, communications, computers,
intelligence, surveillance and reconnaissance (C4ISR) to bridge the gap.
During a panel discussion on network-centric warfare, Air Force Maj. Gen.
Charles Croom Jr., the service's director of communications infostructure
and deputy chief of staff for warfighting integration, said that the United
States does allow allies on its classified networks in different ways, but
none have complete access because U.S. secrets are housed on those systems.
He added that allied interoperability is the No. 1 priority of the Joint
Warrior Interoperability Demonstration program.
Another panelist, Army Maj. Gen. Steven Boutelle, director of information
operations, networks and space in the Army's Office of the Chief
Information Officer, said that coalition partners are not the same as
allies. With coalitions, the United States doesn't know who will be there
or leave at any point in time, and in those cases, there's little
technology can do. With allies, interoperability is easier to achieve but
will still take a long time, he said.
Along those lines, the greatest challenge facing the recently announced
Homeland Security Department will be integrating the different cultures,
Myers said.
"It's very difficult to get those cultures to think in a different way and
[without information technology] to back it all up, we're putting ourselves
at risk and that's unacceptable," he said.
***************
Federal Computer Week
DOT tests e-seals on shipments
The Transportation Department has completed a test of new technology
designed to assist in securing cargo containers at U.S. ports and border
crossings, the department announced last week.
The test, conducted in the Pacific Northwest through DOT's Intelligent
Transportation Systems (ITS) program, involved electronic seals, or
e-seals. An e-seal is a radio frequency device that transmits shipment data
as it passes a reader device and indicates whether the container it is
attached to has been tampered with.
The e-seals are about the size of a deck of playing cards and weigh a
little more than a pound each, said Chip Wood, DOT senior transportation
specialist for the Secretary's Office of Intermodalism.
"They consist of a bolt that both locks the container when inserted into
the seal body and serves as an antenna; a seal body that contains a
computer chip for encoding information; and a battery for transmitting that
information when queried by a reader," he said. "These disposable, passive
'read-only' devices cost as little as $10 per unit, which makes them far
less expensive than reusable seals that can cost well over $500 apiece."
The testing began in the summer of 2000. However, the prototype e-seal had
to be re-engineered to meet the requirements of the operational test. A
year later, the devices had to be refurbished again in order to ensure
reliable communication between the seals and the communication network.
By the fall of 2001, containers destined for Canada were regularly affixed
with e-seals at the ports of Tacoma, Wash., and Seattle. The Puget Sound
Regional Planning Commission, the Washington Trucking Association and the
ports of Tacoma and Seattle participated in the project. The Federal
Highway Administration's Office of Freight Management and Operations, the
Office of Intermodalism and the Washington State Transportation Department
provided funding for the tests.
"Through testing, we are learning to apply e-seals as part of a
multilayered approach to improve transportation security," Wood said. "We
are also learning how to integrate e-seals into the operations of federal
agencies and private industry."
Most of the testing has been a success, but e-seals have limited signal
strength and must be read at line-of-sight distances that do not exceed 70
feet. "This makes it difficult to read these particular seals in marine
terminals or the holds of ships where the containers are stacked in close
proximity where the signal may be blocked," Wood said.
DOT is likely to fund another round of e-seal tests that would build on the
findings and technology platforms identified during the Pacific Northwest
test, Wood said.
"We are still in the initial stages of testing e-seal components and how
they interface with other elements of communication networks and
transportation infrastructure," he said.
**************************
Federal Computer Week
Homeland formula for failure ID'd
The ultimate success or failure of the Homeland Security Department will be
determined by the intelligence and information technology plan that's
proposed and the person selected to lead that effort, according to a
congressional fellow who advises the Executive Office of the President on
technology.
Speaking June 11 at the Armed Forces Communications and Electronics
Association's TechNet International 2002 in Washington, D.C., Eileen
Preisser, also director of the Defense Department's Homeland Defense
Technology Center, said the key will be getting the new department to
organize and share information horizontally, instead of vertically in the
usual stovepipes.
"The kicker that will determine if it succeeds or fails is the intelligence
and IT plan that's prepared," Preisser told Federal Computer Week. "There
has to be a [chief information officer or chief operating officer]-type
person to bring together all the disparate capabilities that exist and
create a new and exciting virtual information environment that will set the
pace for everything else in government.
"If you hire a 65-year-old to do it, it will fail. If you hire former
military, it will fail."
Preisser said the government should look to someone with experience in a
large industry enterprise effort who understands the mission and the roles
that the various agencies should play in the "big picture."
"I would like for that to happen, but I don't see that happening," she said.
Preisser said she fears that the new department will just add more
bureaucracy to a system already overloaded with red tape. She added that
agencies were just beginning to move "horizontally over the last nine
months, and forcing them to go back will be the hardest cultural shift."
An interagency organization can be successful as long as the various parts
are united by their mission and outfitted with the "same standard suitcase
and equipment, and put in the field together," she said, adding that the
interagency operational security (OPSEC) group is a prime example of one
that works.
However, the only way the proposed Homeland Security Department can break
agency stovepipes will be to cut off the individual budgets and fund
everything at the department level, Preisser said. And even with the right
IT and funding plan, the basic implementation will take anywhere from 15
years to 25 years, she said.
To get at least the basic foundation done faster than that, DOD officials
should be given a mentoring role. Preisser said DOD officials have the
necessary experience and should be "highly encouraged" to share what they know.
With that idea in mind, the Missile Defense Agency is developing an
architecture for "mission-critical test beds" that will produce a common
operational picture for itself and the other players involved in a
potential accident or strike involving missiles, such as state and local
first responders, utility companies and industry partners, Preisser said.
The test beds are designed to help DOD, aided by its partners, to identify
text, voice, video or audio data patterns over time that should not be
there. "That is the 'so what' of homeland security," she said, adding that
terabytes of data are useless if the user can't pinpoint what they need
quickly and act on it.
The architecture for this environment should be complete by July, when a
decision is made whether to proceed in Texas or Florida. After that,
partners will be selected based partly on geographical location, and by
September, sites will be configured to use the architecture, Preisser said.
****************
New York Times
Senators Say U.S. Should Keep Tabs on Internet Body
By REUTERS
WASHINGTON (Reuters) - U.S. lawmakers said on Wednesday that they would
step up oversight of the nonprofit group that oversees the Internet's
domain-name system, but stopped short of saying the United States should
run the controversial body.
Several senators and a Bush administration official said the Internet
Corporation for Assigned Names and Numbers, or ICANN, would have to change
the way it operates if it wants to continue to oversee the system that
allows Internet users to navigate using easy-to-remember domain names like
''www.example.com.''
But Montana Republican Sen. Conrad Burns, who two days before called for
the United States to exert more direct control if ICANN did not clean up
its act, said the Department of Commerce should renew ICANN's contract when
it expires in September.
``My feeling right now is the (contract) should be extended,'' the Montana
Republican said. ``There are some things that we have to iron out.''
A Commerce Department official declined to say whether or not ICANN would
win a contract extension, but said she stood behind ICANN's approach.
Though reforms are needed, ``the department continues to be supportive of
the ICANN model,'' Assistant Secretary Nancy Victory told the Senate
science, technology and space subcommittee.
ICANN has been a magnet for controversy since it was created in 1998 to
assume control of the domain-name system from the U.S. government.
Domain-name businesses complain that ICANN moves too slowly and imposes too
many restrictions, while grass-roots ``cyber-citizens'' complain that their
voices are not heard. Charges that the nonprofit organization operates in
an opaque and arbitrary manner come from all quarters.
ICANN has not yet won full control of the domain-name system because it has
not met a number of requirements laid out in the original contract, such as
establishing formal agreements with volunteers who run much of the system.
A congressional investigator told the Senate that ICANN was unlikely to
meet those requirements any time soon, and said the Commerce Department
needed to assert a firmer hand.
Subcommittee Chairman Ron Wyden agreed with the assessment.
``If ICANN is going to reform itself, the Department of Commerce is going
to have to push that organization harder than they have done in the past,''
the Oregon Democrat said.
Commerce will issue a detailed report when it decides on ICANN's fate in
the fall, Victory told Reuters.
ICANN President M. Stuart Lynn touted the group's accomplishments, noting
that it has encouraged competition among domain-name sellers, bringing down
prices for a one-year registration from $50 to $10.
The group itself has recognized the need for reform, Lynn said, and will
take up a comprehensive restructuring proposal when it next meets in
Romania at the end of the month.
Critics told the committee that any reorganization should strictly limit
ICANN's capabilities so that it does not try to regulate Internet content,
or get into other areas such as consumer protection which it was not
designed to handle.
ICANN's decision to abandon direct elections will also mean that consumer
and users interests will not be represented, said Alan Davidson, an
associate director at the Center for Democracy and Technology.
Commerce's Victory told Reuters that while ICANN should represent the views
of its participants, board members chosen by nomination and not election
could fulfill that role.
While ICANN has its share of problems, any other group that springs up to
replace it would not necessarily fare any better, she said.
``Yes, it gets you a new bunch of people, yes it gets you a new company
with a new name, but you still encounter the same problems,'' Victory said.
*********************
Government Computer News
Cybersecurity plans will be part of Homeland Security Department
By William Jackson
The administration plans to release its strategy for securing the nation's
critical infrastructure in late summer, at the same time the proposed
Homeland Security Department is expected to be organized.
"The strategy is more or less on track," said Paul Kurtz, senior director
of the White House Office of Cyber Security. "We're very much pushing
toward getting everything together by July, so we can release it in August
or September."
President Bush hopes to have the new department established by Sept. 11.
The president's proposal last week to reorganize homeland security under a
single wide-ranging department may have pushed back the release of the
strategy, but "it's not a delay," Kurtz said. "It's a matter of what is the
most appropriate time to bring it out. We want to have a coordinated
approach."
Kurtz discussed plans for securing critical infrastructure at the AFCEA
TechNet International Conference in Washington. The national strategy is a
key objective of the administration, and it is being developed through
input from the private sector, which owns and operates the majority of the
nation's communications networks.
Kurtz said the new department would have only minor impact on the content
of the strategy. Membership of oversight boards could change to reflect
reorganization of some agencies, for instance. He called the department a
"step in the right direction," but said its creation is not a magic bullet.
"The reorganization is not the end. It's the beginning," he said.
**************************
Mercury News
Rechargeable batteries are not keeping pace
TRAVELERS WANT POWER LONGER FOR THEIR LAPTOPS, CELLS PHONES
By Jon Fortt
Traveling with technology can feel like a race against time.
Even if your laptop battery lasts the entire flight, you must hunt for a
socket to recharge it once you get off the plane. The same goes for the
cell phone. And if you forget to recharge the cell phone overnight, the
next day can be hit-or-miss outside the hotel room.
Laptop sales are up, wireless computing is hot, and cell phones and
handheld computers are becoming standard business travel equipment. As
these technologies become more powerful, they often thirst for more battery
power.
``Rechargeable batteries are not keeping up with the technology advancement
in the devices themselves,'' said Sara Bradford, analyst with Frost &
Sullivan, a market research firm in San Antonio.
The power problem is one that the PC industry has been slow to solve. It
has been easier for Intel, Dell and others to sell most people on a faster
processor than on longer battery life.
So what's a power-starved traveler to do?
Consider the N-Charge battery from Valence Technology. At two pounds and
roughly the size of a thick clipboard, the N-Charge is an external battery
that dispenses power when you're away from the plug.
Though expensive, it might be worth it for those who hate to worry about
running out of juice.
I tested a beta version of the 65 watt-hour N-Charge, which Austin-based
Valence sells on the Web for $350 (www.valence.com); the company also sells
a 130 watt-hour version for $500. I hooked it up to a trusty 1.2-gigahertz
IBM ThinkPad laptop, popped the movie ``Cast Away'' into the DVD drive,
cranked the volume all the way up and watched the battery level.
Even under this strain, the N-Charge performed well.
All the power left
When the 143-minute movie ended, the battery indicator on the laptop still
read 100 percent, and the N-Charge had a little less than 40 percent of its
power left, I think. Valence promises at least five hours of power, and the
N-Charge delivered closer to four; still, that's about three times what the
laptop could get on one internal battery.
Power sources such as the N-Charge -- or ``slice batteries'' as they're
often called -- are not new, but they are growing more sophisticated.
Manufacturers sometimes sell slice batteries with business-class laptops,
and companies including Electrovaya of Toronto have been selling them
separately for years.
There are three things that make the N-Charge different from other slice
batteries I've seen:
One, it can give and receive power at the same time. In other words, you
can plug your laptop into the N-Charge, and the N-Charge into the wall
socket, and charge both the laptop and the external battery at the same time.
Two, the N-Charge can charge two devices at once. You can plug a cell phone
and a laptop into it, and keep both devices alive on the road.
Three, Valence bills the new type of lithium-ion battery as safer for the
user and the environment. I wasn't aware of this, but evidently
short-circuiting within batteries is fairly common, and in some cases it
can cause batteries to heat up and catch fire. While such accidents are
rare, setting lithium on fire is not the best idea. (In the battery
industry, they call this ``having an event.'')
At what price?
Would I buy an N-Charge? Definitely, but not for $350. I would start
considering it at $250, especially if my employer would reimburse me.
Joe Lamoreux, vice president of system engineering at Valence, said he
expects the price will drop somewhat once Valence begins to sell versions
of it through partners including Hewlett-Packard and Acer. I would expect
to see prices drop early next year.
Meanwhile, there are other ways to get extra power. Many professional
laptops have an option for a second battery. And extra cell phone
batteries, while expensive, are available as well.
Then there's the distant possibility that power-saving laptops could go
mainstream. You might recall that a 500-megahertz laptop running Windows 98
was zippy for regular office tasks, and consumed less power. Do all of us
really need battery-guzzling Pentium 4 laptops to write documents, check
e-mail and surf the Web? Of course not.
Fujitsu this week announced the latest version of its P2000 LifeBook laptop
will come with a 867-MHz Crusoe TM5800 processor and claims it will get 14
hours of battery life with an optional extra battery, or 3.5 hours
standard. I'm guessing it will get more like 2.5 hours under the DVD test.
We'll see if technology leaders listen to power-starved road warriors and
start making computers that sip battery life rather than guzzle it. Until
then, good luck shopping for batteries, or hunting for sockets.
***********************
Mercury News
TV signals may be used to handle cell phone calls
MISSISSIPPI COMPANY DEVELOPING TECHNOLOGY TO REDUCE RECEPTION DEAD SPOTS
By Roy Furchgott
New York Times
Who says television is useless? Someday it may help eliminate the phrase
``Can you hear me now?'' from the cell phone lexicon.
A company in Ridgeland, Miss., is developing technology that would send and
receive cell phone calls on a little-used part of a broadcast television
signal. If used to augment current cell phone sites, it could mean fewer
dead spots in reception at a comparatively low cost. It might also help
usher countries without widespread cell networks into the wireless age.
The company, SIGFX, is testing a prototype phone system on an experimental
one-kilowatt station.
``I actually made a call and I was impressed,'' said Dan Modisett,
president and general manager of WLBT, the NBC affiliate in Jackson, Miss.,
who attended a demonstration. ``It was every bit comparable to a cell phone.''
Modisett and other broadcasters would like to see the technology succeed so
that stations could sell service to cell phone companies.
There is still a long way to go, though. In the tests, SIGFX has had some
problems handling more than one call at a time, and reception was not as
good as the company had hoped. The company says it has identified the
source of the difficulties and that they can be remedied.
To get even this far, the technology has had to overcome several major
obstacles. The biggest is the ``big signal, little signal'' problem.
Although a television station puts out a big signal, one that is easy for
the phone to receive, it is so big that it could overload the phone,
causing a call to fail. At the same time, a cell phone's signal is so weak
that a TV-station-based receiver might not be sensitive enough to separate
it from other signals.
The company's origins stretch back to 1996, when Jimmy Rogers, a former
insurance salesman who had the idea of sending cell phone signals to and
from TV towers, approached Dallas Nash, a communications consultant who
attended the same church. Rogers naively assumed that Nash would know how
to develop the idea because Nash had put together a multimedia presentation
for the church.
As it turned out, Nash was actually the right man for the job. He had been
a consultant to the Defense Department on signal processing projects.
Nash had his doubts about the viability of Rogers' concept but tested it
anyway. Using equipment he already owned, Nash constructed a test system
that included $250,000 worth of computers and signaling equipment in a van
that would act as a sophisticated mobile phone.
``It was sort of the world's most expensive cell phone,'' Nash said. ``And
it sort of worked. Not well, but I had to start eating some crow.''
There were problems to solve, the foremost being how to make an affordable
hand-held phone that could do the same thing as $250,000 of equipment that
filled a van.
Another problem, that of processing power, solved itself. As chips have
become faster and more powerful, SIGFX has been able to get four processors
into a unit the size of a brick. Those processors are needed to turn voice
into signals that could be sent and received on UHF or VHF and duplicate
any of several cell phone standards like TDMA, CDMA and GSM.
But those processors consume a lot of power. ``Mobile wasn't a problem
because you have a battery in a car or truck that could handle what we
need,'' Nash said. ``The problem was, with handheld, we didn't want a
30-pound battery you had to carry around.''
The answer may be a polymer lithium-ion battery that can be molded in the
shape of a handset case.
*************************
Mercury News
Most radar detectors can't beat police technology
By Doug Bedell
Dallas Morning News
When Craig Peterson lead-foots his way non-stop from Denver to Houston each
year, his high-performance sports car carries the most sophisticated
consumer radar detectors on the market.
His front grille and rear bumper are wired with elaborate sensors -- part
of a $1,600, professionally installed ``remote'' unit, the most expensive
available. Inside the cockpit, a special handheld scanner constantly
searches for police radio transmissions. His eye constantly scans a
blinking panel of lights designed to warn him if he's headed for a speeding
ticket.
He says he's had only one since 1992, but every year he feels more vulnerable.
And if Peterson -- one of the nation's foremost experts in police speed
detection technology -- feels that way, the average driver with a $100
radar detector should feel positively defenseless.
``It's not widely known, but there are only a couple in the $100 price
range that have the sensitivity to be a useful countermeasure,'' he says.
In recent years, the cat-and-mouse contest between ``Smokey'' and the
scofflaws has been gradually tilting toward law enforcement. Meanwhile, the
Consumer Electronics Association says between 10 million and 20 million
drivers traveling American roads today are packing some form of radar
detector, usually a low-priced unit that Peterson considers worthless.
The arms gap has widened as police nationwide have begun phasing out older
radar guns that operate on two frequencies, X-band and K-band. In their
place, lower-powered, digital Ka-band guns and even more stealthy
laser-based speed detectors are increasingly deployed.
Peterson's most recent 3,000-mile round trip from Denver to Houston
illustrates the problem faced by the modern-day road warrior. Of 11
encounters with radar, he reports, one was X-band, three were K-band and
seven were Ka-band units. That mirrors national trends, he says.
Of the estimated 100,000 radar guns now in service, only about 15,000 are
X-band, the most easily spotted by consumer dash-mounted detector units.
About half of the rest are K-band, and 35 percent operate with Ka-band,
Peterson estimates.
As lightning-quick Ka-band radar guns and lasers rapidly replace clunkier
technologies, Peterson and other experts say, the consumer technologies for
detection have fallen behind.
Peterson, the author of ``Fast Driving (Without Tickets),'' has conducted
more than 30 comparison tests on commercially available radar detectors,
which he posts at RadarTest.com. His advice often appears in Automobile
magazine, and he is often summoned as an expert witness in court cases
involving consumer radar detector technology.
But his findings and those of other experts in the field are still the
subject of heated debate among consumers and industry professionals. On
Internet news groups such as rec.
autos.driving, consumers are constantly discussing testing procedures and
sharing experiences with top brands.
Most users don't expect perfection. They know that radar units can track
them up to two miles away, although technically, officers must witness a
violation, visually estimate the target speed and, only then, activate
radar to confirm that estimate, Peterson says.
At best, dash-mounted detectors help spot troopers mechanically before the
driver can see them. Or the units bark warnings when nearby cars are being
tracked, allowing time to decrease speed. In general, though, if your car
is the first to be hit by a detecting device, the trooper can accurately
clock you before you can react, experts say.
Legal issues are fairly clear-cut. In most of the United States, except for
Washington, D.C., and Virginia, radar detectors are legal for everyone
except big-rig truckers and buses carrying more than 15 people. Maj. Coy
Clanton of the Texas Department of Public Safety says troopers are largely
indifferent about their use in passenger cars.
These days, even with older X-band radar, troopers can silence their
equipment until they are ready to fire at a suspected speeder.
``The operator can switch on the radar so instantaneously that there's no
chance to slow down,'' says Clanton.
Manufacturers, sensitive to limitations of their technologies and criticism
from police, have begun marketing their products as ``safety enhancement''
or ``highway information'' products that keep drivers alert to their
surroundings.
Others monitor emergency vehicle voice transmissions to warn of possible
accident activity. To differentiate between those warnings, many have added
digital read-outs that can be used instead of distracting beeps and chirps.
Testing of most consumer radar detector units has shown ``dismal'' results
in detecting Ka-band signals, says Peterson, a certified police radar
instructor. In fact, several didn't sound an alarm until test units were
parked right next to a Ka-band gun, he said.
***************************
USA Today
High-tech firms act to safeguard operations in India
By Jon Swartz, USA TODAY
SAN FRANCISCO Software companies with operations in India are scrambling
to protect the country's economic golden goose and to keep software flowing
to the world's biggest companies.
Tensions between India and Pakistan might be lifting, but the threat of a
clash or terrorist act has taken a toll on India's reputation as a safe
haven for business. That could cool its $7.8 billion software-export
business, which soared 700% the past five years.
Companies are beefing up plans to shift software engineers out of the
country to safer locations. They're strengthening operations worldwide. And
they are showing disaster plans to jittery customers.
It is crucial that India's software machine keeps humming. India has the
second biggest software industry worldwide after the USA's. More than 200
major U.S. corporations spent about $5 billion on India-made software in
the 12 months ending March 31, says India's National Association of
Software and Service Companies.
Hewlett-Packard, Oracle and Sun Microsystems have set up offices in India
to tap its pool of English-speaking software engineers and take advantage
of lower costs. Software accounts for one-sixth of India's exports.
"Top-tier companies have no choice but to be well prepared," says Stephanie
Moore, a Giga Information Group analyst.
What companies are doing:
Contingency plans. Infosys Technologies, India's largest publicly traded
software company, has 2,400 employees in India with work visas who can
transfer to the USA quickly. U.S.-based iGate needs just a day to shift
workers among four sites in India.
Reassuring customers. Infosys is showing customers its disaster recovery
plans. "We want them to know we have a ... plan if any facilities go down,"
says Phaneesh Murthy, head of worldwide sales.
Diversification. Companies have invested in operations outside of India,
satellite links and redundant data lines to minimize the risk of business
disruptions.
Most run communications links through hubs in North America and Europe.
Tata Consultancy Services, India's largest software exporter, opened a
development center in Uruguay this year. Megasoft, a U.S.-based
software-services company with 400 employees in India, has data backup
sites in the USA and has tightened security in several countries.
IGate employs one-third of its 4,000-person staff in India. It has a
data-backup system in Singapore.
Many small- and midsized companies that can't afford logistical changes are
sitting tight. "What can you do? Pack up everything, leave the country and
start from scratch?" says Reggie Aggarwal, CEO of Cvent, a software company
in Arlington, Va. It has a handful of employees in New Delhi, India.
Likewise, Oracle has no plans to evacuate workers in India, where it
employs 2,000. Business travel is restricted to the country.
H-P, which has 2,600 employees in six Indian cities, remains "very
committed to operations," but won't comment on whether it may shift work
out of the country.
************************
USA Today
Microsoft discloses Web software security flaw
WASHINGTON (AP) Microsoft acknowledged a serious flaw Wednesday in its
Internet server software that could allow sophisticated hackers to seize
control of Web sites, steal information and use vulnerable computers to
attack others online.
The software, which runs about one-third of the world's Web sites, is used
by millions of businesses and organizations but less commonly by home
users. Microsoft made available a free patch for customers using versions
of its Internet Information Server software with its Windows NT or Windows
2000 operating systems.
The server software included within Microsoft's newer Windows XP operating
system was not affected by the security flaw.
In a separate warning Wednesday, Microsoft said customers of its Windows
NT, Windows 2000 and Windows XP operating systems were vulnerable to an
unrelated problem affecting Microsoft's technology to connect to the
Internet over phone lines. Hackers trying to attack these computers must
already have permission to use them, limiting the risks.
A researcher with eEye Digital Security, Riley Hassell, found the Web
server flaw in mid-April during testing of eEye's own hacker-defense
software, but the discovery was kept closely guarded under an agreement
with Microsoft until Wednesday.
Microsoft described the risk to Web servers as "moderate." The company and
other top experts, including U.S. officials at the National Security
Agency, have for months recommended turning off the vulnerable feature
unless customers need it.
However, it was impossible to know how many customers followed that advice
and shut off the feature, which is turned on automatically the first time
the software is installed.
One consolation for Microsoft's customers was that the software flaw wasn't
easy to exploit by most hackers. "It does take a more sophisticated level
of skill," said David Gardner, a security program manager at Microsoft.
The latest vulnerability affects a function in the server software that
allows Web administrators to change passwords for an Internet site. Despite
the anticipated difficulty for hackers, the flaw was considered unusually
threatening because it is closely related to a similar Internet server
glitch disclosed by Microsoft on April 10.
Experts believe hackers already have been distributing customized attack
tools to exploit the April 10 flaw, and they fear these underground tools
could be updated readily to attack computers susceptible to the latest glitch.
A little-known Chinese hacking group has been distributing such tools on a
Web site for weeks, although these are limited to attacking computers
running Chinese-language versions of Microsoft's server software. Others
claim to have developed more reliable attack tools using the April 10 glitch.
The FBI had warned that the previous, similar flaw was "a significant
threat due to the magnitude and type of potential victim systems."
Marc Maiffret, the self-described "chief hacking officer" for eEye, said
malicious hackers will devise automated tools to scan the Internet and
attack vulnerable computers rather than targeting machines individually.
The same technique was used to spread the damaging "Code Red" and "Nimda"
worms across the Internet last year, which infected nearly 1 million servers.
"It could readily be exploited with a worm," Maiffret said. "It's kind of a
scary thing."
*****************************
USA Today
Authorities crack $7M online software piracy ring
LAS VEGAS (AP) Twenty-one people in 14 states and Canada are facing
federal charges in an Internet computer software, game and movie piracy
ring, authorities in Las Vegas announced Wednesday.
Assistant U.S. Attorney Steve Myhre, who outlined the so-called "Rogue
Warriorz" operation, said an indictment was filed Tuesday in US District
Court in Las Vegas.
Myhre said the 21 people have not been arrested, but would be summoned to
appear in federal court on charges of conspiracy to commit criminal
copyright infringement, a felony that could result in five years in prison
and a $250,000 fine.
Myhre said the case will be prosecuted in Las Vegas.
The indictment said that in the six months before the operation ended Dec.
11, the ring made available to undercover investigators 8,434 computer
applications and utility software programs, 356 movies and 432 computer games.
It put the combined value of the programs at more than $7 million.
**************************
USA Today
Lycos launches subscription music service
WALTHAM, Mass. (AP) Internet portal Lycos will launch a new paid
subscription music service offering access to 10,000 albums with 150,000 songs.
Lycos, a subsidiary of Spanish communications conglomerate Terra Networks,
is the largest Internet partner of Listen.com, the San Francisco-based
company that has agreements with four of the five major record labels to
provide "streamed" CD-quality sound.
The Lycos Rhapsody service will be offered free through this month. Then it
will offer three tiers of service: free radio service on 20 channels of
FM-quality sound; access to more than 50 commercial-free radio stations
with CD-quality sound for $4.95 per month; and unlimited streams of
individual songs plus access to the 50 stations for $9.95 per month.
Customers won't be able to save songs on their hard drives or record them
on compact discs.
Listen.com's deals with BMG, Sony Music Entertainment, EMI Recorded Music
and Warner Music Group would give Lycos users access to artists including
Christina Aguilera, Jennifer Lopez, Jay-Z, Lauryn Hill, Bruce Springsteen
and Simon and Garfunkel.
Industry-sponsored sites MusicNet and PressPlay limit how many songs can be
downloaded.
Terra Lycos, which is trying to draw more users to subscription-based
content, claims 115 million unique users per month. It has a presence in 43
countries.
***************************
USA Today
Habitat for Humanity adds PCs to homes
WINSTON-SALEM, N.C. (AP) The homes built by Habitat for Humanity do not
include dishwashers or garbage disposals. Those are considered luxuries.
But computers are a different matter.
The organization that builds affordable homes for the poor has launched a
$1 million pilot program with three technology companies to put free
computers and Internet access into all its homes in the Winston-Salem area.
It may eventually expand the effort nationwide.
"Habitat builds houses, but what we're really trying to do is change
lives," said Kay Lord, executive director of the Habitat affiliate in
Winston-Salem and surrounding Forsyth County. "A computer is a basic need,
just like a refrigerator, particularly if you're a young person going to
school."
HATCH, an early-childhood technology company based in Winston-Salem,
suggested two years ago that Habitat provide computers for the new homes
being built in Forsyth County. It has since provided 38 computers for the
homes and promised to supply more through the end of the program.
Habitat announced Wednesday that, in addition to those homes, the 100 homes
it built before 2000 also will receive computers and printers through
another company, which it did not name. AOL Time Warner will provide free
Internet access.
AOL Time Warner also will pay for a two-year study by Wake Forest
University to examine the computers' effect on poor families. If the
results are as positive as Habitat and the companies expect, the program
will probably be expanded nationwide.
"At the end of the day, this probably will be the most comprehensive look
at how to infuse the computer into low-income households," said B. Keith
Fulton, vice president of the AOL Time Warner Foundation. "We are confident
we will see tremendous educational and workforce gains."
The study will examine whether children's grades have improved and whether
their love of learning has increased, too.
The anecdotal evidence from children in the 38 homes that already have
computers is clear, said Sonja Murray, Habitat's director of development:
The children feel better about themselves.
"Now they're no different from anybody else in class," she said. "They not
only can turn in typed, not handwritten, papers, but they can include
computer-generated graphs and charts."
The state requires students to pass a computer literacy test to graduate
from high school.
"The education system expects students to have a computer," Murray said.
"The house levels the playing field for the homeowner, but the computer
levels the playing field for the children. They're not left out or left
behind."
Habitat also is providing computer training for the families. If the
program is expanded Habitat builds 5,000 to 6,000 new U.S. homes a
year it will probably stay true to Habitat's mission of being "a hand up,
not a handout" by arranging for families to pay something toward the
computers. Habitat families pay for their homes with small payments and by
putting several hundred hours of labor into building them.
Mary Brunson, who moved with her two teenage sons into a Habitat home in
1998, was the first of the pre-2000 Habitat homeowners to get a computer
Wednesday.
When she began Habitat's required computer classes, she did not even know
how to turn on a computer. Now, she said, she can use the mouse, go to the
pull-down menu and "click-click two times."
"Mom, that's double-click," Brunson's oldest son, Chris, 15, said with a
hint of embarrassment
Brunson, 47, who has a factory job with Sara Lee Hosiery, hopes to use the
computer to find a better job. Her sons look forward to not having to go to
the library or their neighbor's house to do homework. They also want to
create their own Web site, and Chris wants to talk to friends in chat rooms.
************************
MSNBC
Online sales of nuke drugs skyrocket
Potassium iodide sales up 1000-fold after 'dirty bomb' scare
By Jim Hu
June 13 Some Web retailers are discovering that fear sells. A smattering
of small businesses selling potassium iodide an FDA-approved drug that
mitigates potential effects from radiation exposure have witnessed sales
of the drug skyrocket over the past few days. News of the U.S. government
thwarting a terrorist plot to detonate a "dirty bomb," an explosive that
spreads radioactive material, has caused concerned individuals and
government agencies to purchase mass quantities of potassium iodide pills
off the Internet.
"SINCE MONDAY WHEN this dirty bomb scare came about, (sales)
increased almost 1000-fold," said Troy Jones, founder of NukePills.com,
based in Mooresville, N.C. "Heaven forbid if there's ever a real radiation
disaster in this country because one can only imagine a huge reaction to
this product."
With the spotlight on terrorism and the U.S. Department of
Justice's recent detainment of a suspected Al Qaeda operative who allegedly
planned to detonate a dirty bomb in a major city, a cottage industry has
formed around the morbid idea of protection against a radioactive attack.
Soon after the attacks of Sept. 11, questions over the security of the
nation's nuclear power plants also caused a brief surge in drug sales and
other equipment to protect against radiation attacks.
Potassium iodide is administered in the form of a pill. The
properties of the drug prevent the uptake of radioactive iodine, which
causes many forms of cancer, into the thyroid gland. Should the unthinkable
happen where a nuclear plant melts down or a nuclear device is detonated,
radioactive iodine has a long enough lifespan to spread hundreds of miles
in certain weather conditions.
Still, even though the drug helps protect against one form of
radiation, it by no means covers the wider spectrum of damage that arises
from a nuclear blast. Potassium iodide will not protect people from the
immediate dangers of gamma radiation, for instance.
The U.S. Nuclear Regulatory Commission in January 2001 required
states to consider issuing potassium iodide as a supplement to standard
sheltering and evacuation procedures for people within a 10-mile radius of
a nuclear power plant. To date, only 14 states out of the 34 states home to
nuclear power plants have responded, California being the most recent one.
Still, NukePills' Jones and other purveyors of the drug have seen
online sales mushroom in conjunction with breaking news about potential
terrorism attacks. Jones said that its online orders were coming in once
every 20 seconds for 20 hours a day since the news of the dirty bomb
surfaced Monday.
Many other small businesses specializing in post-radiological
attack products have seen their sales surge online as well.
Last spring Shane Connor, who operates KI4U.com, rented 12 tractor
trailers and hauled away 120,000 Geiger counters that had been shelved in a
federal depot in Ft. Worth, Texas. Geiger counters measure the amount of
radiation in the air.
Conner hired a few former technicians from the Federal Emergency
Management Agency to recalibrate and recertify the counters. Since Sept.
11, the bet has been paying off; online sales of the counters, among other
products on Conner's Web site, have taken off.
"I'm thrilled we're selling as much we're selling, but I've got
kids too," Conner said. "We hope it sits on their shelf gathering much dust
over the years."
Even fallout shelters, which seem like relics from the Cold War,
are making a comeback. Two Tigers Radiological of Wilmington, N.C., which
uses "Tools for Nuclear Emergencies" as its tagline, has seen sales of its
$3,200 fallout shelters reach five to seven units a week, an exponential
rise from pre-Sept. 11 levels.
Steven Aukstakalnis, founder of the company, said recent fears of
the dirty bomb attack caused a spike not only in sales, but also in traffic
to the general information pages throughout his site. Aukstakalnis has
turned the site into a full-fledged information hub to answer any questions
surrounding a nuclear or radiological attack. The home page features the
color-coded chart of the homeland Advisory Security System, domestic terror
alerts, and an information database about radiation and nuclear attacks.
The site even has a question and answer section about what to do
during a nuclear attack or meltdown. Some questions include, "What are the
Nuclear Blast and Thermal Pulse Effects?" and "So, how much blast or
overpressure is too much to survive?" Answers are accompanied with diagrams.
For entrepreneurs such as Aukstakalnis, current events are
bittersweet. On the one hand, business has never been better; but on the
other hand, the idea of selling products meant to protect against the
unthinkable has been an odd paradox.
"It's great on a personal level to have something successful, but
on the other side I hope to hell no one has to use the products that
they're buying," he said. "It's an odd state of mind to be in."
*************************
MSNBC
U.S. spy imagery viewed by civilians
British enthusiast downlinks spy plane images on satellite TV
NBC NEWS AND NEWS SERVICES
LONDON, June 13 Uncovering a potentially serious lapse in NATO security, a
British satellite TV enthusiast has discovered that unencrypted U.S. spy
plane transmissions used by the alliance can be downlinked on commercially
available satellite television. Video available includes images from
sensitive military locations such as the NATO mission in Kosovo.
SATELLITE ENTHUSIAST John Locker said that anyone can tune in live
to the U.S spy plane transmissions.
"I wasn't tapping into anything. The pictures were freely available
and anyone could see them," Locker told the BBC in an interview. "In fact
it was easier to see these pictures than pay-per-view films or even
Saturday sports," he said.
Viewers tuning into the satellite this week were able to watch a
security alert round the U.S. Army's headquarters at Camp Bondsteel in Kosovo.
Contacted by NBC News, U.S. officials offered little response to
the allegation on Thursday. The National Security Agency and CIA referred
questions to the Pentagon, where one official asked: "How do you know it's
real?"
But a a U.S. official who watched the video told NBC that the
material was real, and acknowledged that there are serious questions about
why the United States would potentially jeopardize security by not
encrypting the transmission. While not on a combat mission, the NATO forces
in the Balkans are in an area of al-Qaida activity, the official said on
condition of anonymity. There have been recent threats against the U.S.
Embassy in Sarajevo, and Islamic radicals have been known to operate in the
region.
Another U.S. official, asked about the broadcasts, said there were
plans now to encrypt the data.
INTERNET TRANSMISSION
The pictures, from manned spy aircraft and drones, have been
broadcast through a satellite over Brazil. The links, which are not
encrypted, have been transmitted also over the Internet.
"They were from a commercial satellite, sending pictures just as
any commercial satellite would," Locker said.
Locker said he had been trying for seven months to warn NATO and
the Americans about the broadcasts showing NATO surveillance operations
over the Balkans.
"They eventually told me it was a hardware constraint, they were
aware of it and they thanked me for my concern," he said.
"Obviously I'm not a military analyst and I'm not an expert in this
field but I am just amazed this type of material is going out free-to-air.
"They put up data quite often which identified vehicles and the
area to within two meters (yards). That to me is a risk."
U.S. officials told NBC that sending the video without encryption
would save both time and money. Military satellite channels have been
overbooked, so the Pentagon routinely uses commercial satellites. But since
1984 the Pentagon has required that satellite feeds be encrypted.
'PLANS TO ENCRYPT DATA'
Last week, the spy plane provided airborne cover for a heavily
protected patrol of the Macedonian-Kosovo border near Skopje.
Richard Perle, chairman of the Pentagon's Defense Policy Board,
told the BBC: "There are plans to encrypt this data."
"We have discovered in the period since September 11 how important
this sort of real-time intelligence is. Now we are making much better use
of this kind of information and it will make sense to encrypt it in the
future."
Locker, also interviewed by The Guardian newspaper, said: "I
thought that the U.S. had made a deadly error. My first thought was that
they were sending their spy plane pictures through the wrong satellite by
mistake and broadcasting secret information across Europe."
One U.S. military intelligence source told the paper: "We seem to
be transmitting this information potentially straight to our enemies...This
could let people see where our forces are and what they are doing. That's
putting our boys at risk."
There was no immediate comment from NATO in Brussels.
****************
Government Executive
Senators decry spectrum policy, name defense as top priority
By Teri Rucker, National Journal's Technology Daily
Senators leveled criticism at the nation's spectrum-management process
during a Tuesday hearing, calling the process everything from inefficient
and piecemeal to a tool used to fatten the treasury, but they agreed that
any changes must meet Defense Department needs.
"We do not have a spectrum policy," Senate Commerce Committee Chairman
Ernest (Fritz) Hollings, D-S.C., said in calling for a review of the way
the nation manages its airwaves. He noted that there is a need for
wireless-based high-speed connections to the Internet "but most importantly
a need for the Department of Defense."
Before the Sept. 11 terrorist attacks, Defense estimated that its spectrum
usage would grow by more than 90 percent by 2005, but that figure is
probably low given the need for enhanced security now, said Steven Price, a
deputy assistant secretary at the department.
"Defense must have top priority," Price said, reiterating that any attempts
to reallocate airwaves currently occupied by the department to new spectrum
to make room for commercial wireless services must be studied carefully to
prevent any disruption in national defense.
After calling for the United States to harmonize its commercial uses of
spectrum with policies in other nations and to ensure that companies can
deploy innovative services, Sen. George Allen, R-Va., conceded, "I don't
think any of this will ever occur if the Defense Department feels this is
harming" their ability to defend the nation.
The National Telecommunications and Information Administration (NTIA) plans
to release a report later this month on the feasibility of freeing prime
spectrum for advanced wireless uses, NTIA Director Nancy Victory said.
Tom Sugrue, chief of the Federal Communications Commission's Wireless
Telecommunications Bureau, noted that moving toward more flexible uses of
spectrum, including allowing carriers to change the types of services they
offer or to lease spectrum to others, would improve efficiency.
But Sen. Conrad Burns, R-Mont., questioned whether two agenciesthe FCC and
NTIAshould oversee spectrum and whether the auction process is wise. "I
fear the division leads to bureaucratic turf battles," Burns said, adding
that the auctions "create a win-at-all-costs mentality that inflates the
prices" and debt that cripples the winning bidders.
At the request of Burns, the General Accounting Office (GAO) released a
study on spectrum management that found the shared oversight of the FCC and
NTIA generally has worked well but is becoming more complex as technology
evolves.
While both agencies have policies to determine spectrum efficiency, a lack
of resources and staff have hindered the government's ability to assess its
spectrum use, GAO concluded. For example, one major agency has more than
1,000 frequency assignments that have not been reviewed in 10 years, said
Peter Guerrero, GAO's director of physical infrastructure issues.
The agencies also "have not gotten the support they need in the budget
process to purchase the equipment" that would make spectrum use more
efficient, he said.
************************
Government Executive
Defense bill would create tech center for 'first responders'
By William New, National Journal's Technology Daily
A House-passed bill to reauthorize Defense Department programs contains
various technology provisions, including a proposal to create a center for
the transfer of military technology to emergency "first responders."
Pennsylvania Republican Curt Weldon, chairman of the House Armed Services
Military Readiness Subcommittee, made the proposal. The House passed the
authorization bill, H.R. 4546, by a 359-58 vote on May 9.
"What the federal government has done, it has created cutting-edge
technology for the military that is important for handling all types of
emergencies," Weldon said in an interview with National Journal's
Technology Daily. The government has spent billions of dollars for military
technology, but it is not available to domestic responders, he said.
For instance, soldiers in Afghanistan have Global Positioning System (GPS)
transponders, but domestic first responders do not. If they had the GPS
units, he said, emergency responders would know the exact locations of
firefighters or others within a building, information that could lead to
their rescue.
The military also has sensors to monitor heart rates and bodily systems
from a distance to determine the health of soldiers, another technology
that could be applied locally, Weldon said. "There are scores of examples."
Eighty-five percent of "domestic defenders," as Weldon calls them, are
volunteers. About 100 per year die in action, more than the number of
soldiers lost each year, he said.
The provision in the Defense authorization bill specifies that the center
would be run by a nonprofit entity that has shown the ability to transfer
defense technologies, he said, noting that he has been working with
Battelle Memorial Institute in Columbus, Ohio. The center "would allow the
fire and [emergency medical services] community to understand what is being
developed and how to take advantage of it," Weldon said.
Weldon said Pete Aldridge, undersecretary of Defense for acquisition,
technology and logistics, supports the idea. The authorization bill does
not specify a dollar amount for the center, but Weldon said it is "not a
big ticket item," probably in the millions.
Weldon has taken the lead on other security-related bills. Four years ago,
for instance, he authored the law that created an anti-terrorism panel
often referred to as the Gilmore Commission because former Virginia Gov.
James Gilmore heads it.
Two years ago, a Weldon proposal established a grant program for first
responders to purchase technology. Congress appropriated $100 million in
the first year, but first responders submitted $3 billion in requests for
aid. This year, funding was increased to $500 million. In fiscal 2003,
President Bush has requested $3.5 billion.
Weldon also is focused on communication problems among first responders.
Different agencies and emergency services are unable to communicate because
their systems use different frequencies. Weldon said the concern could be
addressed through an integrated network.
****************************
Sydney Morning Herald
Scientists develop transistor the size of an atom
London
June 13 2002
Transistors have been shrunk to their smallest possible limit - the size of
a single atom, it was disclosed yesterday.
The breakthrough by US scientists could herald a new era of
ultra-miniaturised electronic devices.
Transistors, traditionally made from silicon, are components that regulate
the passage of electric current through them.
They form the basic building block of electronic circuits and can act as
amplifiers, oscillators, photocells or switches.
A long sought goal has been to make transistors as small as possible.
Scientists at Cornell University in New York have now managed to build the
ultimate in tiny transistors, in which electrons flow through a single atom.
The team implanted a "designer" molecule between two gold electrodes to
create a circuit.
At its heart was a cobalt atom surrounded by carbon and hydrogen atoms and
held in place by "handles" made of the benzene-like chemical pyridine.
When voltage was applied to the transistor, electrons passed from one side
to the other by "hopping on and off" the cobalt atom.
The research, led by Paul McEuen, professor of physics at Cornell, was
described yesterday in the journal Nature.
A former colleague of McEuen's at Harvard University, Massachusetts,
reported a similar result in the same journal using two atoms.
Hongkun Park's team made a molecule containing two atoms of the metal
vanadium which was placed between gold electrodes.
In both cases the scientists were able to start and stop the flow of
current by adjusting the voltage near the bridging molecule.
In an accompanying article, Silvano de Franceschi and Leo Kouwenhoven, from
Delft University of Technology in Holland, wrote: "Right now, these
single-molecule or single-atom transistors are no competition for silicon
transistors.
"But they will serve for studying electron motion through nanoscale
objects, and for the development of integrated electronic devices built on
single molecules."
***************
Sydney Morning Herald
Govt department being investigated over spam
Canberra
An Australian federal department is being investigated by the nation's
privacy watchdog over spam emails sent from a youth-orientated website.
Deputy federal privacy commissioner Timothy Pilgrim said he had sought a
please explain from the Family and Community Services Department over the
spam.
It follows the sending of multiple spam emails from the department's youth
website, The Source.
The emails advertised two competitions including one for free movie tickets.
But the department's own online privacy policy prevents email addresses
being added to mailing lists such as the competition spam.
Mr Pilgrim said he was determining if the department had breached its
privacy laws.
"I strongly urge federal government agencies that collect, store and use
personal information via websites ... ensure they protect the privacy of
their users," he said in a statement.
The department has 30 days in which to respond to the privacy commission's
request for information.
Opposition information technology spokeswoman Kate Lundy said the
government was failing to control the use of spam email by its own
departments.
Senator Lundy said instead of taking its own action, the government was
instead leaving the issue to be solved by the Privacy Commission.
She said watertight laws which ensured departments respected the privacy of
their users were vital.
"This incident shows that the coalition has no real commitment and no idea
about tackling junk email," she said in a statement.
"We know that the community wants to see a government committed to fighting
spam.
"The coalition has shown it is incapable of leading by example, it has no
credibility on this issue."
****************************
Sydney Morning Herald
Dark side of the Net
June 12 2002
Livewire
A multitude of companies may be spying on your computer - and you, writes
Nathan Taylor.
You may not know it, but you could be lending spare computer power to a new
software company in the United States. A viral program, Altnet (formerly
known as Brilliant Digital), is covertly installed with recent versions of
popular file sharing software KaZaA, along with several other file sharing
programs. Altnet uses the spare processing power of the host computer for
the company's own ends. That is, it can hijack a user's spare processing
power for use by the company, with the user being none the wiser.
It's not the first time that KaZaA has secretly installed unwanted
software. Late last year, the Australian-owned software company was
embroiled in a scandal in the Net community. As part of the install process
for KaZaA's eponymous file sharing software, an extra application called
ClickTillUWin was surreptitiously forced on to the user's computer.
Ostensibly, ClickTillUWin delivers advertising to a computer. KaZaA, which
gives away its software for free, uses revenue from the advertising (which
appears in a bar at the top of the application) to make ends meet.
But ClickTillUWin does not just deliver ads to users. It contains a virus
that reports back to its developers, Cydoor, which websites computer users
visit. This information is then used to deliver "targeted" advertising. So
if the program found you visited a lot of sports sites in a day, for
instance, it might deliver more ads for sporting goods to your system.
Then there's vx2, which came with another file-sharing tool, Audio Galaxy.
It monitors when a computer user fills in an online form. It takes the
information and sends it back to the developer. Even credit card
information may be sent back.
You might be excused for thinking that these are malicious programs
inserted by hackers. They're not. These are legitimate programs bundled
with commercial and free software, sometimes from major companies -- but
the companies are less than forthright about letting users know what is
being installed on their computer along with the software.
A number of software development/marketing houses in the United States and
elsewhere develop spyware. Most of them you would have never have heard of:
Cydoor, Brilliant Digital, Conducent and Radiate are some of the biggest.
These companies started on the premise of delivering ads with software that
can be downloaded for free (paying a chunk of the revenue to the developer
of the free software), but have morphed into something far more sinister.
"Businesses demanded information about behaviour that can be used to sell,"
said Nigel Waters of Pacific Privacy Consulting. With Net advertising
revenue so thin on the ground, struggling software providers sought a
competitive advantage. Many adware applications turned into spyware
applications. Adware programs are applications that foist advertisements
and links on the unsuspecting party. TopText, which comes with a number of
applications, is an example of this kind of stealth advertisement. It
parses Web pages that the user visits and inserts hypertext links on
keywords, linking to sponsor pages. These links look no different to the
links that would originally appear on the Web page. Other programs might
simply replace banner advertisements on Web pages visited with banner ads
provided by the software manufacturer, effectively stealing ad revenue.
While TopText is merely invasive, most others are much worse. Most
adware/spyware applications include additional tracking software, which
secretly reports a user's Internet movements back to the software
developer. In short, all those free programs that you installed could be
reporting your every move back to an unknown marketing or development
company. Ostensibly, this information is gathered for marketing purposes,
but in most cases the companies involved do not reveal what they are doing
with the information they gather.
According to Waters, the privacy implications of these programs are
"potentially devastating". "They threaten to breach fundamental principles
of fair collection and result in a range of organisations knowing more
about the users than the user wants," he says. What's more, there is not
nearly enough awareness of the phenomenon in Australia, but Waters says
"knowledge and resistance are growing fast".
As for the Spyware purveyors themselves, early indications are that the
strategy has been only marginally successful. Earlier this year, online ad
provider DoubleClick abandoned targeted advertising schemes, since the cost
of gathering and maintaining the information outweighed the premiums they
could charge for having it.
The biggest culprit when it comes to spyware is free software. Because
bundling spyware is an easy way to get revenue, huge numbers of free
applications now come bundled with at least one spyware package. If you're
a user of free software, particularly file-sharing, Napster-like tools such
as KaZaA, LimeWire, BearShare or Grokster, there's a pretty good chance
that you're running some spyware on your computer right now. They're not
the only culprits; the spyware Aureate (see the sidebar) alone comes with
no less than 490 different applications, including games, Net tools and
productivity software.
The host software vendors, of course, argue that the presence of
adware/spyware is the "price" for using their software: if you don't like
it, don't use their software. Fair enough, too, says Pacific Privacy's
Nigel Waters. "They're not inherently unethical," he says. "There can be
legitimate uses, but only if users are fully informed and have as much
choice as possible."
Electronic Frontiers Australia's executive director Irene Graham, holds a
similar position. For Graham, the issue is not the presence of the
software, but the fact that the spyware is so carefully hidden, and that so
few users know about its presence. ``We don't object, in principal, to the
software,'' she says. ``It's a fair position that you do not have to use
the software as long as the provider of the software gives clear and
explicit information about what is happening. As long as the user has
informed consent, it's OK. There needs to be, clear in advance, advice to
users of these programs that their movements are being tracked. Right now,
that's not happening.''
Purveyors of adware/spyware hit back at such criticisms by saying that they
do, in fact, warn users about the spyware as part of the license agreement
during the install process. For privacy groups, however, that's not nearly
enough. "The `click-wrap' model of user licenses is clearly not good
enough, because people don't read it," says Graham. "It doesn't usually
work because there is so much legal mumbo-jumbo that people skip though. To
put things about privacy in there just doesn't cut it. It needs to be
somewhere obvious. It needs to be somewhere that you can't just click past
it without making an informed decision. And there's also the other problem
that the only person who sees it is the person who installs the software."
Under the terms of the current Privacy Act, most of the spyware
applications would fall into an untested legal grey zone, according to the
EFA's Irene Graham. The law is only breached if the data collected is
associated with a specific individual, rather than used as bulk statistical
data. Most spyware applications do not record the name of the user,
although they may record the Internet address of the infected computer.
Whether on not the IP Address (a computer's unique address on the Internet)
constitutes individual identification has yet to be tested in court, says
Graham.
In any case, the law can only be applied to Australian companies or
companies within Australia. Unfortunately, most of the software infected
with spyware is downloaded from foreign companies over the Internet,
untouchable by Australian law.
Very few of the spyware applications are easy to remove. In nearly all
cases, the host software has to be uninstalled first, and then removing the
spyware may involve some serious computer voodoo, involving hacking the
Windows registry (a challenge well beyond most computer users) and the
tracking and deletion of specific files.
For those particularly worried about the invasion of their privacy, two
applications in particular are designed to detect and remove spyware,
although they frequently require the removal of the host program as well
(so users can't have it both ways). Lavasoft's Ad-aware and Gibson
Research's OptOut automate the detection and removal of most known spyware
products.
With their revenue sources being cut off, however, the free software
vendors are not at all happy with these applications. In true viral fashion
one of the spyware vendors, RadLight, has hit back, with RadLight's free
media player coming with a routine that actually turns the tables on
Ad-aware and removes it from the system. A small clause in the RadLight
license agreement states: "You are not allowed to use any third party
program (e.g. Ad-Aware) to uninstall applications bundled with RadLight."
Wherever this battle ends up, for the meantime it's worth reading the
license agreements of the software you install -- painful as that may be.
***************
BBC
Web design 'causes confusion'
A gap between how web designers and ordinary surfers think is causing
frustration on the net.
In a study at Kansas State University in the United States, surfers were
asked to look through a website and then draw a diagram of how the site was
organised.
Most of the resulting drawings were inaccurate, grouping together similar
bits of information rather than reflecting the real layout of the site.
Web design is of key importance, particularly to commercial sites trying to
persuade shoppers to spend time and money buying products over the net.
Different vision
"We had people drawing web pages on their diagrams that didn't even exist,"
said psychologist Keith Jones who led the team of researchers.
"People don't remember individual pages as much as they remember
categories. People don't remember websites the way web designers think
about it," he said.
Mr Jones believes designers should organise information on websites in
categories that are obvious to users.
"We argue that designers need to focus on how users mentally organise the
information that is displayed," he said.
"People have a certain idea of how certain pieces of information are
organised.
"You have to present the information in a way that is consistent with how
people think about how those things are grouped together," he said.
Keeping it simple
Other experts have questioned web design in the past.
Net guru Jakob Nielsen has repeatedly criticised sites for being too pretty
and clever for their own good.
He has championing the idea of web usability, making sites work for the
user by keeping them simple.
He believes designers can often take their work too seriously, with the
result that websites are less easy to use and ultimately less satisfying.
**************************
Taipei Times
The most wired nation on earth
GROWING IT: Sweden is among the world's leading IT nations in terms of per
capita computers, PCs, mobile (cellular) telephones, fixed phone lines and
Internet access
SWEDISH TRADE COUNCIL
Swedish industry, as well as the economy as a whole, has undergone a rapid
restructuring during the past decade. One aspect of the rapid structural
changes in industry is the fast growing information technology (IT) sector
and the impressive investments in IT, computers, use of the internet, said
Henrik Bystrom, representative of the Esportradet Taipei Swedish Trade
Council.
Few countries can also match the international success that Sweden and
Swedish companies have attained in the global economy. There are several
world-renowned Swedish companies that have expanded from a Swedish base to
become global players that signifies industrial tradition, know-how and an
infrastructure that has been adapted to the needs of international business
operations.
Having already boasted the highest per capita density of fixed telephone
lines and workplace computers during the 1980s, today Sweden is among the
world's leading IT nations in terms of per capita computers, PCs, mobile
(cellular) telephones, fixed phone lines and Internet access.
Sweden is today the most wired nation on earth. Almost 70 percent of
Swedish households have an advanced PC and more than 50 percent of all
Swedes aged 12 to 79 use the Internet. Moreover, at least every second
Swede now has a mobile phone.
R&D
Sweden is among the countries that spend the most on R&D. R&D investments
in industry increased by nearly 10 percent annually during the 1990s. About
half of industrial R&D spending occurs in 10 to 15 companies. The increase
in knowledge intensity is also reflected in Sweden's role as a leading IT
country, especially in terms of practical IT applications in households and
companies. Statistics indicated that Sweden's per capita information and
communications technology (ICT) investments (measured as expenditures) are
the highest in the world, equivalent to nearly 10 percent of GDP.
Biotech development
The Swedish science base is strong in many biotechnology fields and of good
quality, due to large investments in biotechnology research over the past
30 years. This has been especially important in ensuring the supply of
highly qualified personnel to biotechnology companies.
In proportion to population, the volume of Swedish biotechnology
publications was the largest in the world in neuroscience and immunology
during the period 1984-1998. Swedish publication volume was second to
Switzerland in molecular biology and genetics, microbiology, biochemistry
and biophysics and cell and developmental biology, and third after
Switzerland and Denmark in biotechnology and applied microbiology.
The Swedish pharmaceutical industry has grown rapidly during the past two
decades, thereby establishing itself as one of Sweden's two most important
growth industries.
During 2001, the industry employed over 18,000 people. More than 90 percent
of its sales were exported, for a total of nearly SEK 34 billion or 4.5
percent of Sweden's overall exports. This gave Sweden a positive trade
balance in pharmaceuticals amounting to SEK 24 billion.
Market opportunities
Sweden offers a wealth of market opportunities for foreign companies. It is
part of three distinct market areas: Scandinavia, The Baltic Sea Region and
the EU, with some 25,100 and 370 million consumers respectively, including
the emerging economies of eastern Europe, the total European market
comprises almost 700 million potential consumers. Establishing in Sweden
provides access to EU's Single Market.
Executives in Sweden particularly appreciate the low corporate taxation,
the strong industrial tradition, the competence of the workforce as well as
Sweden's advanced infrastructure, not least in the areas of information and
communications technology.
Bystrom remarked, "There is a good match in both the industries of Sweden
and Taiwan as they complement each other and can enter into joint
cooperation especially in areas like telecommunications and manufacturing.
Swedish companies can use Taiwan and connect to China and other Asian
markets while Taiwan can use Sweden as an ideal base location to penetrate
the northern European market." There are currently approximately 15
Taiwanese high-tech companies who have investments in the country. Swedish
companies established in Taiwan number about 40.
Foreign companies in Sweden can enjoy a sophisticated and extensive
logistics infrastructure, covering all modes of transport as well as
information and flow-of-funds. Long-term investments in roads, railways,
harbors and airports have created rapid and reliable links to all important
parts of the region. And further developments are underway.
Swedes are very fast to adopt latest products and trends from around the
globe. International corporations in a broad range of industries have
realized the advantages of using Sweden to try out new products, services,
strategies and techniques before launching them on a global scale.
Service sector
The Swedish service sector has expanded very rapidly in recent decades.
Having accounted for just over 40 percent of jobs in the late 1940s, today
its share has climbed to above 70 percent. Altogether, more than 3.1
million people work in services, including 1.3 million public sector
employees and nearly 1.8 million in private companies. Adding in all those
who provide services as part of the manufacturing and construction sectors,
service employees account for some 85 percent of total employment in
Sweden, or 3.6 million people.
Sweden's service sector is very heterogenous. It encompasses all types of
activities from self-employed hot dog vendors to major banks and hospitals.
One way of categorizing the various activities in the service sector is to
distinguish between those in "ordinary markets subject to competition -
that is, the private sector -- and those pursued and or financed by
government bodies -- the public sector (mainly health care, education and
social services).
Infrastructure
After a long slump that lasted almost throughout the 1990s, the Swedish
construction industry has recovered. Construction remains a key economic
sector, today employing about 230,000 people, including other sectors
dependent on the construction industry -- portions of the transportation,
building materials, and consulting sectors, for example -- it directly or
indirectly supports nearly 500,000 jobs, or roughly 10 percent of Sweden's
labor force.
Today, Swedish construction is well developed and, in international terms,
highly industrialized. To a large extend, the industry uses prefabricated
construction elements. Project management skills are advanced. The
construction work force, both blue- and white-collar, is generally well
educated and highly trained. Environmental aspects are increasingly
factored into the planning and construction process.
In recent decades, the major construction companies have been involved in
all types of projects: commercial and residential buildings, industrial
facilities, roads, rail systems, bridges, harbors, power-generators
facilities and so on.
Travel
For travelers, Sweden's magnificent countryside is always there for people
looking for excitement or relaxation. Summer and winter, spring and autumn.
Whatever the season, you can always enjoy its rich variety. Explore
Sweden's natural heritage -- the endless forests, the mountains of the
north and the island worlds of the archipelagos.
The Swedish Trade Council issued over 11,000 visas in 2001. The figure is
expected to increase as more tourists and businessmen from Taiwan travel to
Sweden.
****************
Computerworld
Chief (in)security officer
By DEBORAH RADCLIFF
JUN 10, 2002
The exodus began in December. Bruce Moulton, vice president of
infrastructure risk management at Fidelity Investments in Boston, was let
go. That same month, Steve Katz, chief security and privacy officer at
Merrill Lynch & Co. in New York, accepted a buyout. And in April, shortly
after his face appeared on the cover of CIO magazine, Michael Young, chief
information security officer and principal privacy officer at State Street
Global Advisors in Boston, lost his job in a company reshuffle.
The departure of these and other information security veterans from Fortune
500 companies reflects the beginning of turbulent times for chief security
officers (CSO). Since Sept. 11, CSOs have faced new pressures to prove the
value and effectiveness of their security measures, even as they struggle
politically for legitimacy within their corporations and for support from
the technology and business units they're trying to protect, say analysts.
"We're in a transition period, and the smart [CSOs] are getting out of the
way," says David Foote, president and chief research officer at Foote
Partners LLC, a management consultancy and IT job research firm in New
Canaan, Conn. "They see the risks in trying to build in the next phase of
security - moving from fragmented delivery of security technology to a
coordinated, aggressive, well-conceived security program.
"They understand how long it takes to build attention and change the
culture to make this next step, but they're not getting the support they
need to brand and build this next level of security," says Foote, who is
also a Computerworld columnist.
Uphill Battle
Corporate politics is the single biggest problem facing CSOs, according to
some who hold such positions and industry analysts. Even though CSOs have
attained a chief-level title, they report that they still generally lack
enough power to be truly effective. And there's growing friction between
the CSO, who usually has only a handful of people on staff, and the CIO,
who has hundreds or, in some cases, thousands of people on staff, says John
Pescatore, a security research analyst at Gartner Inc. in Stamford, Conn.
Because of these conflicts and the expanding role of information protection
to encompass privacy, regulatory compliance and disaster recovery, firms
genuinely don't know where to put the function of information security - if
they have a formal management function at all, says Tracy Lenzner, CEO of
executive security search firm Lenzner Group in Las Vegas. In fact, only
54% of 72 chief executives working for companies with at least $1 billion
in annual revenues said they have a CSO in place, according to a survey
released in January by technology and strategy consulting firm Booz Allen &
Hamilton Inc. in McLean, Va.
"Unfortunately, for many organizations I think that the executive-level
positioning of CSOs will be heightened only when we're hit with a
catastrophic event," Lenzner adds.
That's also the consensus among the unemployed and employed CSOs who were
interviewed for this story, all of whom say information protection has
always been an uphill battle because it's difficult to prove its value
unless a catastrophe occurs. As such, CSOs lack the power to do more than
set policies and put out fires, says a CSO from a Fortune 100 technology
equipment manufacturer who asked to remain anonymous.
"The greatest threat we face is the belief of senior management that there
is no threat. So we don't get funds, money or resources, and without those
things, you can never address security threats and risks," says another
security officer at a global financial firm who's planning his exit
strategy and starting a consulting practice.
Young says he believes some of these problems can be lessened if CSOs get
on board with business initiatives and competitive strategies more
consistently. "As a whole, CSOs still express security in technical terms
instead of business terms," he says.
Katz, Young and Moulton, however, all speak the language of business and
have driven information risk management throughout their former
organizations. (As for his business savvy, Moulton thinks he might have
worked himself out of a job by integrating security ownership into the
business units themselves.) Similarly, Katz looks at security from the
standpoint of business enablement, adding that risk management
methodologies are no different from other processes of building business
risk models for nontechnical offerings.
Another view of this upheaval in security leadership is that Katz, Young
and Moulton have completed their work of championing security. They have
laid the critical groundwork by building consensus; establishing best
practices and awareness; and preparing business and technology units for
compliance, liability, security audits and procedural forensics
investigations. Now Katz and Young are offering these start-up services to
smaller companies and home offices through consulting businesses, a path
Moulton says he might also take.
The next phase of information protection involves becoming more technical
in focus, say analysts.
"In the past, we measured our success by telling about the programs we put
in place and the policies we wrote. As we move forward, it's more about how
well those policies are being implemented, how secure the systems are and
what impact they're having," says Michael Ressler, director of security
services at New York-based IT consulting firm Predictive Systems Inc. "And
that means more technical background is needed for security management."
Booz Allen's survey cites three areas that chief executives are more
focused on since Sept. 11:
? 75% of respondents said they're more concerned with infrastructure
protection.
? 71% said they're more concerned with risk assessment.
? 69% said they're concerned about employee morale. At one Fortune 100
technology manufacturer, low morale is already translating into abuses by
employees, according to its CSO, who says pornography Web surfing at the
company is up 40%.
If Katz's replacement is any indication, some firms are already catching on
to this more technical focus. Merrill Lynch's new chief of security and
privacy, David Bauer, has a highly technical background, as he was in
charge of network management and engineering, including security
engineering, at Morgan Stanley Dean Witter & Co. and then at Deutsche Bank.
But even with the best technology project management and business skills,
these new technobusiness/ security hybrids will run into all the same
empowerment problems as their forerunners, says Thornton May, a senior
member of executive advisory firm Toffler Associates Inc. in Manchester,
Mass., and a Computerworld columnist. To survive this upheaval, security
executives must be strong in business and technology, he adds.
"Security professionals will need to understand the lingua franca of
business, which is accounting," he says. "They also have to be able to
understand how the network works, how the application works and how the
hardware works if they're to mobilize the security organization. Then they
need to align their security strategy to where the business is going and
tone their architecture and deployment to fit the financial plan of the
company."
*************************
Computerworld
ICANN comes under fire at Senate hearing
WASHINGTON -- A Bush administration official said today that reform efforts
by the organization charged with managing the Web's Domain Name System, the
Internet Corporation for Assigned Name and Numbers (ICANN), has shown
"great promise," but she warned that the private group's future is far from
assured.
The "next couple of months will be crucial" for ICANN, said Nancy J.
Victory, an assistant secretary for communications and information at the
U.S. Department of Commerce. Victory testified today before the U.S. Senate
Subcommittee on Science, Technology and Space.
ICANN was created by the U.S. to oversee the Domain Name System and
operates under an agreement with the Commerce Department. That agreement is
set to expire Sept. 30. The Bush administration hasn't decided whether to
extend the agreement, modify it or let it expire, said Victory, who
outlined a series of steps that Marina Del Rey, Calif.-based ICANN must
take to improve its operation.
Victory delivered her assessment before a panel that was largely critical
of the organization, which was created to introduce competition to the
Domain Name System as well as ensure its stability and security.
"Serious structural reform must be entertained," said Sen. Conrad Burns,
(R-Mont.), who said ICANN had morphed from a group charged with deciding
purely technical issues "into a policy-making body, however, with none of
the due process requirements placed on agencies given policy-making power."
The committee chairman, Sen. Ron Wyden, (D-Ore.), told ICANN officials, "I
just want to convey the depth of frustration out there in the Internet
community. E People don't feel they are being listened to."
Adding more ammunition to the criticism, the U.S. General Accounting
Office, in a report released today, said ICANN has made progress in
increasing competition in the domain name space, but not in improving
security.
The congressional watchdog agency faulted ICANN for being behind in
developing operational and security requirements for all the entities that
run the Domain Name System.
"Is everything perfect? Of course not," said Stuart Lynn, ICANN's
president. But Lynn defended his group's effort at reforming itself and
said venturing into policy areas wasn't something easily avoided. For
instance, in creating top-level domains, ICANN must consider what name and
under what conditions they are created, he said.
ICANN, for instance, faced intense criticism over its process for picking
seven new top-level domains two years ago, a process that resulted in the
rejection of many top-level domains proposed by companies and organizations
and that immediately created an army of critics. Its election process for
selecting board members has also been a sticking point.
"Bias and favoritism are woven deeply into ICANN's form," said ICANN board
member Karl Auerbach at the hearing. "ICANN resists public accountability."
He urged the Commerce Department to exercise "real oversight."
Among the steps the Bush administration wants ICANN to take, said Victory,
are reforms ensuring accountability, giving all Internet stakeholders a
fair hearing, developing an effective advisory role for governments and
ensuring that it has the money and staff to carry out its mission.
****************************
Computerworld
Web Standards Project aims to educate developers
Having declared a victory in the battle to make Web browsers more
inclusive, the Web Standards Project (WaSP) relaunched itself this week
with the new goal of educating Web developers about the benefits of
building sites that incorporate standards, saying that many developers
still use "old-school methods" that block millions of potential visitors to
their sites.
The project, founded in 1998 by a grassroots coalition of Web designers and
developers fighting for Web standards, said that Web developers' failure to
employ standards has led to lost revenue, ill will and potential litigation
from groups demanding accessibility.
Along with unveiling the new initiative, the group also announced a
relaunch of its Web site, which had been off-line since Jan. 1.
The relaunch comes after the group successfully lobbied to get browser
makers to employ standards that allow them to access most Web sites. WaSP
first began by waging what it called a "browser upgrade campaign,"
mobilizing users to pressure major browser makers to employ Web standards
enabling them to access more sites.
According to WaSP group leader Jeffrey Zeldman, makers of major browsers
such as Internet Explorer, Opera and Netscape responded to the pressure by
including more standards in their 6.0 versions.
"These results were at least partially brought about by public pressure
from our campaign," said Zeldman.
With the browser feather in its cap, the project has set its sights on
endorsing standards compliance and accessibility in professional design
tools. According to the group, accessibility is crucial if site owners want
to avoid losing customers, and by extension, revenue.
The group is endorsing structural language standards such as Extensible
Hypertext Markup Language 1.0 and XML 1.0 and presentation languages such
as Cascading Style Sheets 1, 2 and 3, Zeldman said.
Although Web standards seem prevalent, many developers who were trained in
the 1990s do not use them because at the time they were difficult to
employ, according to Zeldman.
WaSP has begun a learning section on its site that it hopes will help
developers come up to speed on Web standards. The group is also working
with companies such as San Francisco-based Macromedia Inc., which makes the
Dreamweaver Web authoring tool, to get Web design product makers to push
standards as well.
"Using standards is definitely in the best interest of the developers, the
clients and the people who use the sites," Zeldman said.
***************************
Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 510
2120 L Street, NW
Washington, D.C. 20037
202-478-6124
lillie.coney@xxxxxxx