[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips July 9, 2002
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, CSSP <cssp@xxxxxxx>;, glee@xxxxxxxxxxxxx;, John White <white@xxxxxxxxxx>;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, computer_security_day@xxxxxxx;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, akuadc@xxxxxxxxxxx;
- Subject: Clips July 9, 2002
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Tue, 09 Jul 2002 10:44:55 -0400
Clips July 9, 2002
ARTICLES
FBI uneasy about plan to deregulate fast Net
Changing Federal Buying Habits
Telecom firm leaks student data to Web
Study: Israel, Hong Kong hotbeds for cyber attacks
The Code of the Cosmos
Web rebels profit from net controls
Workers sacked for surfing porn
Grocer's digital receipts pay off
Notorious Net thief pleads guilty
New worm eats into Kazaa
Internet privacy laws flagged
Net Guard shuts up shop after inquiry
New Technology Searches Internet in Chinese
Chinese to Check E-mails by Phone
Spam-Cramming Foils Vacationers
EU report calls for widespread open source adoption
Hacker to Apple: Watch those downloads
**************************
USA Today
FBI uneasy about plan to deregulate fast Net
By Paul Davidson, USA TODAY
A federal plan to deregulate high-speed Internet access might have an
unintended consequence: The FBI is worried it could hamper the fight
against terrorism.
The FBI and Justice Department are concerned that the Federal
Communications Commission's decision to classify broadband as an
"information" service could disrupt their ability to trace the e-mail and
Internet activity of terrorists and other criminals.
Only "telecommunications" services are required by law to design their
networks so that the government can easily tap into suspects' communications.
If phone company DSL and cable-modem providers read the law literally,
authorities "may be hobbled in their ability to enforce the laws and
protect national security," the FBI wrote to the FCC.
The agencies do not oppose the FCC proposal. They want the FCC to say that
electronic-surveillance access rules also apply to the broadband
information offerings of phone and cable companies.
The controversy centers on the collision of two ostensibly unrelated
federal laws. Earlier this year, the FCC tentatively concluded that DSL and
cable-modem services are information rather than telecommunications
services, because they mainly entail storing and generating data rather
than transmitting it.
As a result, analysts expect that the FCC will rule that they need not open
their networks to rivals. Consumer advocates say that will drive up prices.
The Telecommunications Act currently forces the regional Bells to open
their DSL networks to rivals; cable operators are under no such obligation.
The mandate on industry to design networks that can be wiretapped, however,
is in the Communications Assistance for Law Enforcement Act (CALEA).
Such a design can cost several hundred million dollars. Without it,
wiretaps are difficult, FBI officials say.
That law, however, applies only to telecommunications, not information
services. The FBI argues, however, that it includes "joint-use" services,
such as broadband, that have information and telecommunications pieces.
Critics of deregulation are skeptical. "They can't have their cake and eat
it, too," says Jonathan Askin, general counsel for the Association for
Local Telecommunications Services, which represent Bell rivals.
In other words, Askin believes that if the FCC upholds CALEA requirements
with regard to wiretaps, at least on DSL companies, that could give
open-access proponents such as his group ammunition for a possible court
battle on its issue.
CALEA now applies to DSL, but not cable-modem service, FCC officials say.
They would not comment on the FBI's petitions, which say CALEA covers both.
The United States Telecom Association, which represents Bells and other
local phone monopolies, would not comment.
Verizon Communications, the largest Bell, believes its DSL still would be
subject to CALEA, according to assistant general counsel John Goodman.
************************
New York Times
Changing Federal Buying Habits
By REBECCA FAIRLEY RANEY
IF you wanted to find out how much money the federal government was
spending to clean up toxic waste, you might run into difficulty. The
question is simple enough, but the answer could take months to find.
For one thing, half a dozen agencies handle toxic cleanup. But the greatest
problem is that those agencies' computers cannot communicate with one
another. Their reports cannot be scanned in a single search.
The problem is magnified by decades of uncoordinated computer purchases by
the government. Federal agencies have historically bought computers and
software on their own, producing a rat's nest of technology, from
mainframes to I.B.M. clones to Wang computers.
In an attempt to address the issue, the Senate passed a bill recently that
would require federal agencies to learn to speak the same language. The
E-Government Act, introduced by Senator Joseph I. Lieberman, Democrat of
Connecticut, would require the federal government to make information easy
for citizens to use.
"It's really a way of busting bureaucracy, which makes it very appealing,"
said Patricia McGinnis, president and chief executive of the Council for
Excellence in Government, a nonprofit group in Washington. "Basically, we
don't have a seamless system of data collection, analysis and use."
The bill would allocate $345 million over four years to establish a fund to
help federal agencies work together on projects to improve their online
services. It would also establish an Office of Electronic Government, which
would be part of the Office of Management and Budget, and its top
administrator would be appointed by the president.
Among other things, the bill would require federal agencies to set
standards for the use of electronic signatures, to seek public comment on
what information to post on the Internet and to assess how to protect
citizens' personal information from abuse.
The bill stretches the definition of e-government. Typically, the term has
referred to the practice of government agencies' placing information and
services within easy reach of the public on the Internet. The E-Government
Act would expand that definition to include how well agencies use
technology to improve the efficiency of government.
Kevin Landy, counsel on Senator Lieberman's staff, says that federal
agencies spend more than $1 billion a year on such e-government efforts and
that the new office would help them spend that money more efficiently.
Though the problem of diverse computer systems may never be solved
completely, government technologists see a partial solution in extensible
markup language, known as XML, a method of coding information so that it
can be transmitted on the Internet and read by different computer systems.
In theory, if agencies could translate their data into the same language,
they could read one another's documents.
"XML is a theoretical answer," said John de Ferrari, assistant director of
the information technology team at the General Accounting Office. "It
serves as an overlay that should allow you to get really precise searches."
As the accounting office pointed out in a report in April, however, XML
presents inherent problems as well. The language sets standards for tagging
information but does not dictate which commands should be used. For
example, agencies could choose to tag purchase orders in several ways: , , or .
As the agencies independently create tags for their documents, they could
make a bigger data mess.
"We could end up creating a Tower of Babel," Mr. de Ferrari said.
Though individual agencies are already working to develop standards for XML
codes, the E-Government Act would require that agencies centrally
coordinate the development of standards for XML.
But the very idea of developing standards creates its own issues. In the
past, the government's haphazard approach to computer purchasing may have
benefited a number of technology companies, but now that agencies have
started establishing standards to allow their systems to communicate, the
companies are worried that government programmers might create proprietary
software instead of using commercial products.
Jeanne Foust, director of governmental affairs for ESRI, a company in
Redlands, Calif., that makes computer mapping software, said it was pleased
that the E-Government Act was giving this area of computing a higher status
in Washington. But she said the company would like some clarification in
the bill on whether federal agencies would use commercial software to share
information among systems or create their own.
"The best way to go down that path is to let the commercial marketplace
develop those tools," Ms. Foust said. "We don't need the federal government
to develop interoperability."
David LeDuc, director of public policy for the Software and Information
Industry Association in Washington, added that although new standards can
present opportunities for software companies, they can also inadvertently
limit the advancement of technology. "Standards can inhibit growth in the
industry," he said. "The standards the government sets are big enough to
affect the industry."
Mr. de Ferrari of the General Accounting Office said that adhering to XML,
a nonproprietary technology, would open the market to many software vendors.
"That's the beauty of XML," he said. "It is an open standard. It's really
just saying, `We want software that has these capabilities.' It's not
locking into any particular product."
The plan to create common codes among federal agencies is a cost-cutting
move, he said.
"A concern that was raised when we did our study was, if the government
didn't get its act together, we would be playing up to the middleware
vendors when all these systems can't talk to each other," he said. "In
terms of translation, that could become very expensive."
Of course, the process of translation could take years.
Information officers at the Defense Department, Mr. de Ferrari said, are
now sorting out how to handle a single piece of information: the format for
names. The format is not consistent even within the department, and
information officers are deliberating over whether to spell names out, use
a middle initial or just list the first and last names. The process is
tedious, he said.
In the end, federal information officers hope to create a system that will
allow feats that sound simple but are now impractical. The Office of
Management and Budget wants, for example, to extract data from all federal
agencies to compare their budgets.
Such a system could leave agencies feeling exposed, of course.
"In general," Mr. de Ferrari said, "the idea of sharing your data is
threatening."
************************
News.com
Telecom firm leaks student data to Web
By Robert Lemos
Staff Writer, CNET News.com
A company that provides intra-campus telephone services to small colleges
inadvertently posted online the names, addresses and social security
numbers of thousands of its student customers, the firm acknowledged on
Monday.
In the latest of what has become a common Internet problem, the information
about more than 2,000 students whose schools use telecommunications
management firm Resicom may have leaked out from the company's Web site.
Database files containing students' personal information had the wrong
permission settings and could have been accessed using any Web browser as
late as Monday afternoon.
David Horn, the network and billing manager for the Doylestown, Penn.,
company was working to turn off access to the files Monday afternoon.
"This is a big deal for us; it has never happened before," he said. "It's
embarrassing, not to mention serious."
The company's customers include Texas A&M University, Ottawa University,
Indiana Wesleyan University and almost 70 other schools. In total, the firm
provides phone services for more than 100,000 students, though the problem
only affects a small fraction, said Horn.
Resicom provides its student customers with easy access to their records
via the Web. In this case, however, access may have been too easy.
A staff member first notified his school of the problem after a friend
searched for his name on the Internet and suddenly had access to a database
record that included the staff member's social security number, the person
said in an e-mail message to CNET News.com. On Saturday, the staff member,
who asked not to be identified, contacted the dean of the school and
attempted to reach the company, but to no avail.
Resicom didn't get the message until Monday, Horn said. "We first heard
about it this morning," he said. "We got an e-mail from a customer."
The company immediately contacted its Internet service provider and by the
afternoon had access to the files blocked. Horn said that the firm uses a
local Internet service provider to maintain much of its Web site including
the parts that had the permission problems. Horn suggested that the
arrangement may stop after this incident. He would not identify the
Internet service provider.
"It may change the way we handle online information," he said. "I handle
the in-house Web site, and we keep a pretty tight grip on that information."
*************************
USA Today
Study: Israel, Hong Kong hotbeds for cyber attacks
SAN FRANCISCO (Reuters) Which part of the world has the dubious
distinction of being the most active hotbed of computer hacking?
Among the most highly wired economies, more cyber attacks originate from
Israel and Hong Kong on a per-Internet-user basis than anywhere else, while
Kuwait and Iran top the list of the category of countries with fewer
Internet users, according to a study released Monday.
Overall, the United States generates by far the most cyber attacks,
followed by Germany, South Korea, China and France, according to a report
from Riptech, a managed security service provider based in Alexandria, Va.
The most likely corporate targets were power and energy companies, the
study said. Political analysts have expressed concern hackers target such
companies to try to maximize the impact of any attack.
The Riptech study was based on a minuscule sample compared to the number of
companies connected to the Internet, but because it was based on computer
logs of attacks, which are not widely tracked or aggregated, it provides
useful insight into global trends, industry analysts said.
Riptech declined to speculate on why some countries were more active as the
launchpads of computer attacks.
"We try not to speculate as to motive," said Elad Yoran, co-founder and
executive vice president of Riptech. "We want to keep the report as
objective as possible."
But he said, "it's interesting that countries that are less well-developed
attack at a 50% higher rate on a per-person basis." Cyber attacks, which
include everything from the spread of viruses to hacks used to cripple Web
sites, were 28% higher in the first half of the year than attacks recorded
during the second half of last year, a projected annual growth rate of 64%,
the study found.
Companies, on average, suffered 32 attacks per week, up from 25 attacks per
week during the second half of last year. Most attacks happened on
Wednesdays and Thursdays, the study said, without offering an explanation
as to why.
The report was based on data collected from computer logs at about 400
Riptech customers spread across more than 30 countries. Riptech monitors
customer logs and traces attacks back to their purported source.
Determining where attacks come from is complicated, said Tim Belcher, chief
technology officer at Riptech. While most attacks can be traced back to
what is believed to be the source country, it is possible for malicious
hackers to hide their exact location.
Still, 93% of the attackers monitored in the study were only active on one
day, leading the company to believe they were launching attacks directly
rather than going through another "zombie" system to hide their tracks,
Belcher said.
Forty percent of the attacks in the first half of this year appeared to
have come from the United States, followed by 7.6% from Germany, 7.4% from
South Korea and 6.9% from China.
Although the United States is the source of most of the attacks, it also
has the largest economy and a large share of Internet users. To get a more
fair representation, the study also looked at attacks based on population
of Internet users in each country, Belcher said.
Of countries with more than 1 million Internet users, Israel had about 33
attacks per 10,000 users, followed by Hong Kong with 22 attacks per 10,000
users.
Of countries with fewer than 1 million Internet users but more than
100,000, Kuwait had 50 attacks per 10,000 users, followed by Iran with 30
attacks per 10,000 users.
Attacks down in the USA
A second survey, also released Monday, showed reports of cyberattacks may
be waning in the United States.
Of the nearly 3,500 U.S. companies and security professionals polled for
the InformationWeek magazine survey, 44% said they experienced a virus,
worm or Trojan horse attack, in which malicious software masquerades as a
legitimate program, down from 70% a year ago.
Reports of denial of service attacks, another common attack method that is
the Internet equivalent to getting a busy signal from too many phone calls,
were also down slightly, the survey found.
"Although three in five firms report a security breach or espionage in the
last year, the frequency of security incidents in the United
States regardless of type is down in 2002," the InformationWeek survey said.
***********************
USA Today
Audio copy protection prevents 'ripping' of songs
By James Bickers, Gannett News Service
Last year, Music City Records released A Tribute to Jim Reeves, a CD from
country music legend Charley Pride.
The CD didn't look different from other CDs. But it was the first music CD
released worldwide that would not play in a PC.
The disc was manufactured using MediaCloQ, created by Phoenix-based
SunnComm. MediaCloQ is among the new technologies aiming to diminish
illegal music duplication.
The goal of audio copy protection is to prevent a user from copying or
"ripping" songs from the CD to his PC hard drive. Once songs are on the
hard drive, they can be shared via the Internet.
While technologies differ, they all try to trick the PC into thinking it is
looking at a CD-ROM, rather than a music CD.
CD-ROM devices are digital, so they scrutinize every single bit of data on
a disc. If something is not in the right place, it stops whatever the PC is
doing.
Regular CD players convert digital information into analog to play on the
speakers. Analog devices skip over small bits of garbage data, so the
players keep playing. Listeners never even hear small errors.
The result of the newest technology: a CD, peppered with small errors to
prevent copying. It plays fine in your stereo but won't work properly in PCs.
A handful of companies are working on digital audio copy protection.
Sony's proprietary format, called Key2audio, has been put in place on about
10 million discs worldwide, showing up on releases by Celine Dion, Shakira,
Destiny's Child and Jennifer Lopez.
Another product is SafeAudio, developed by TTR.
The side effects of copy protection are usually benign gibberish audio or
songs that can't be ripped but they can be more troublesome. Some
Macintosh users have said some protected discs freeze their machines.
The European edition of Dion's album, A New Day Has Come, was made using
Key2audio protection. The CD bore a warning label urging users not to
attempt to play the disc in their PC or MP3-compatible car stereo.
"That doesn't necessarily absolve the record label in the consumer's mind
of the responsibility for what might happen to their PCs or car stereos,"
said Aram Sinnreich, senior analyst at Jupiter Media Metrix.
Noam Zur, vice president of Midbar, estimates that more than 16 million
copy-protected CDs have been released worldwide.
Record labels, for now, seem to be betting that digital audio copy
protection is a viable way to curtail music piracy, which they blame, in
part, for declining record sales.
But even record industry executives acknowledge that consumers expect to be
able to play purchased CDs on a variety of devices. "We want to be
confident that any type of copy protection would allow the CD to be able to
be played on computers, DVD players, CD players, etc.," said Gary
Himelfarb, president of RAS Records and a board member of the Association
for Independent Music.
Himelfarb also said it is important that consumers be allowed to make legal
copies for their own use.
*************************
Los Angeles Times
The Code of the Cosmos
A genius to some, a crackpot to others, Stephen Wolfram says it's all very
simple: The universe can be reduced to a computer program.
By CHARLES PILLER
TIMES STAFF WRITER
July 9 2002
Stephen Wolfram was in his Caltech office more than 20 years ago, working
late on an autumn evening, when he saw something on his computer screen
that shocked and confused him.
The 21-year-old physicist, already a member of the Caltech faculty, had
been experimenting with elementary computer programs. He expected them to
generate simple, predictable patterns: checkerboards or nested triangles.
Instead, one of the programs spawned complex images that resembled the
veins in a leaf. Another filled the screen with what looked like the
elegant lace of snowflakes. A third spun out wave after wave of shapes that
grew increasingly intricate and varied. Wolfram had stumbled onto a few
lines of computer code that mimicked the ordered chaos of nature. Infinite
complexity seemed to arise from ultimate simplicity.
Two decades later, that revelation has blossomed into a grand theory that
has raised a furor in the scientific world and sparked a rush by laymen to
grasp Wolfram's audacious thesis: The universe is no more than a computer
playing out a program of stupefying simplicity.
"If things work out as I expect, there will come a day when one can hold
the lines of code that created the whole universe in one's hand," said
Wolfram, who revealed his big idea in a 1,200-page self-published opus
titled "A New Kind of Science."
Released in May, the tome has soared to the top of Amazon.com's bestseller
list, selling out its first printing of 50,000 at $44.95 each.
To Wolfram, a British-born prodigy who earned a doctorate in theoretical
physics at age 20 and won a MacArthur "genius" fellowship at 21, rules as
simple as tick-tack-toe are the driving force behind all of nature--from
single-cell amoebas to the Rev. Martin Luther King Jr.
The universe began, he maintains, with a few basic instructions that played
themselves out over billions of years to produce everything that exists
today. This simple code, he says, underlies consciousness itself, giving
rise to our every thought--from the sudden desire for a scoop of chocolate
ice cream to Wolfram's own theory.
Like a literary big bang, Wolfram's book has stimulated dozens of reviews
and articles in the general and scientific press and has lit up Internet
discussion groups. Much of the scientific world is howling in protest,
calling his theory the product of a monumental ego unleashed from reality.
For centuries, scientists have sought to explain the natural world--from
the rotations of galaxies to the spin of subatomic particles--with
mathematical equations. From Isaac Newton's epiphany about gravity and a
falling apple to the building of the atomic bomb, the arcane abstractions
of calculus have been the key to the universe.
But math falls short when it comes to describing the soft-edged diversity
of the natural world. Scientists could fill all the chalkboards in all the
universities in the world with equations and still fail to explain the
brilliant spots on tropical fish, the contours of wind-blown sand or the
shifting shape of a plume of cigar smoke. Mathematics is even more
inadequate when it comes to simulating intangibles such as the economy, let
alone the vagaries of human thought.
Wolfram, 42, says the answers lie not in the limited tools of old science
but in simple computer programs.
He does not pretend to know what lines of code would create a sausage, let
alone a solar system. His point is that the basic instructions that create
intricate patterns on a computer screen will help us understand what
creates similar patterns in nature.
His book is packed with images of Sumerian mosaics and strawberries,
earthquake fissures and leopard spots, thermonuclear mushroom clouds and
streams of clear water--all modeled with uncanny precision, he says, by
shimmering dot patterns generated on a computer screen by a few simple rules.
These pictures, Wolfram argues, reveal a pervasive truth that has been
hiding in plain sight.
In presenting this notion to the world, Wolfram has sidestepped
time-honored scientific procedures. Instead of submitting a paper to a
peer-reviewed scholarly journal and letting colleagues try to pick it
apart, he is making his case directly to a mass audience in simple,
nontechnical language. This fall, he plans a road show to proselytize about
his ideas.
"There just isn't a mechanism within the current structure of science to
present things as big as what I'm trying to do," he said.
Actually, "big" doesn't begin to capture it, Wolfram says. He describes his
theory as "one of the more important single discoveries in the whole
history of theoretical science," akin to those of Copernicus, who
overturned centuries of orthodoxy by proving in 1530 that the Earth was not
the center of the universe, and Charles Darwin, whose 1859 theory of
natural selection shattered religious dogma about creation.
A Leap of Faith?
Raymond Kurzweil, a celebrated inventor and expert in artificial
intelligence, has posted on his Web site a stinging 8,000-word critique
that faults Wolfram for an outrageous leap of faith--for concluding that
because simple rules can spin out beguiling complexity, they must be behind
the deepest mysteries of life.
Kurzweil finds elements of Wolfram's theory intriguing but says he fails to
prove that the unending variation of dots on a page explains higher orders
of complexity. "How do we get from these interesting but limited patterns,"
Kurzweil asks, "to those of insects or humans or Chopin preludes?"
Chris Adami, a Caltech theoretical physicist who is a leader in using
computers to model complex living systems, dismissed Wolfram's work as
"pathetic" and "exasperating."
"Wolfram's naivete about biological complexity is stunning," Adami said.
"We call this 'crackpot science.' "
But amid the criticism is a persistent murmur of curiosity from general
readers and scientists alike.
Wolfram's premise is particularly seductive for anyone who has ever
struggled in physics or math class. Instead of relying on impenetrable
equations to describe the universe, he sees the boundless complexity of the
natural world--from the coloration of seashells to worldwide weather
patterns--as the result of inherent rules simple enough for anyone to
understand.
Sequestered near Boston--his precise location kept secret to foil "the next
Unabomber"--he talked nonstop recently for nearly two hours, with the
unique confidence of a millionaire genius who has been building his case
for two decades.
"There will come a time when we can emulate the essence of human thinking
in machines," he said, characteristically racing ahead to the outer edge of
his idea. "What does that mean for the future of the human condition?"
Wolfram's theory traces its roots to a computer game created by Princeton
University mathematician John Conway more than 30 years ago. The game,
called simply Life, became a cult classic after it was reviewed in
Scientific American magazine.
Players begin by using their cursors to blacken selected squares on a grid.
Then they click on the "go" button and the game unfolds according to three
rules. Any blackened square with two or three blackened neighbors "lives."
Any square with four neighbors "dies"--that is, disappears from the screen.
An empty square bordered by three blackened squares gives birth to a new
blackened square.
The ensuing patterns, basic at first, soon develop mesmerizing complexity
as the game's logic plays itself out. As successive generations of
blackened squares breed and die, the computer screen becomes a roiling stew
of activity that looks like a petri dish of bacteria blooming at high speed.
Each game varies according to how many squares were darkened at the
beginning and in what pattern. Most starting points end up as static
patterns after bubbling through many generations. But others cause unending
growth and perpetual motion.
Initially, Wolfram had dismissed Life as a toy. Then he began to experiment
with his own simple computer programs, called "cellular automata" for their
property of automatically generating cells, or squares. By 1981, he came to
see Life as a validation of his budding theory.
The programs with which Wolfram was tinkering are slightly more complex
than Life, governed by eight rules, rather than Life's three, for
determining whether squares "live" or "die." These programs come in 256
variations. Wolfram began testing all 256 of them.
He discovered that some--such as Rule 30, on which many of his conclusions
are based--build infinitely varying patterns. He gradually came to believe
that the frenetic disorder generated by Rule 30 was as complex as anything
in the universe.
Credibility an Issue
Wolfram nurtured his obsession as he migrated from Caltech to Princeton's
Institute for Advanced Studies, where colleagues expected him to expand his
promising career in cosmology and particle physics. Instead, Wolfram
stubbornly pursued his research in the obscure field of automata, working
in an office upstairs from one Albert Einstein had occupied two generations
earlier.
His ideas would have been ignored as the ravings of a crank, were he not
Stephen Wolfram.
His staggering intellect had long set him apart. Aside from his early
theoretical achievements, at age 27 Wolfram created Mathematica, a software
program widely used to perform complex mathematical functions and analyze
and display data. It became the dominant software for math and physics and
made Wolfram rich.
With Mathematica, "Wolfram's already taken over a large part of how science
is done," said Mott Greene, another MacArthur fellow and a science
historian at the University of Puget Sound in Tacoma, Wash. "His influence
is felt everywhere."
Unshakable confidence and financial independence freed Wolfram to follow
his passion. For 10 years he became a recluse--a phantom whose occasional
appearances sparked the question: "What is Stephen Wolfram really up to?"
On the first page of his long-awaited book, he answers:
"Three centuries ago, science was transformed by the dramatic new idea that
rules based on mathematical equations could be used to describe the natural
world. My purpose in this book is to initiate another such transformation,
and to introduce a new kind of science that is based on the much more
general types of rules that can be embodied in simple computer programs."
The first part of the book lays out how cellular automata model natural
phenomena, such as the shapes of snowflakes. Wolfram then extends the idea
to living or dynamic systems--from wasp nests to water jets--and argues
that these too can be simulated by simple computer programs.
Next, he moves on to human-designed systems and says that he was able to
mimic the gyrations of financial markets with a program that uses just four
rules for buying and selling securities.
The heart of his argument is that his computer patterns are as intricate as
any object in nature, and that, therefore, the screen images and the
objects in nature must have a common origin.
This idea finds its most ambitious expression as Wolfram's "principle of
computational equivalence." It holds that a leaf, a star, a human being and
one of Wolfram's cellular automata are all equivalent in that they arise
from the same kind of simple rules.
"If we compare ourselves with other systems in nature, we might ask,
'What's special about us?' " he said.
Wolfram believes his ideas will transform science and engineering and
influence philosophy, economics, even art.
"It seems so easy for nature to produce forms of great beauty," he writes.
"In the past, art has mostly just had to be content to imitate such forms."
But with his discoveries, he says, "extremely simple rules will often be
able to generate pictures that have striking aesthetic qualities--sometimes
reminiscent of nature, but often unlike anything ever seen before."
Simple programs, he says, may one day unlock problems too complex to solve
even with today's massive computer power, such as how traffic jams form and
how they can be unwound. Basic rules that model the growth of a tumor could
explain how to stop cancer. Programs that simulate neural pathways might
lead to super-intelligent machines.
"One can imagine building things that capture the essential purposes
achieved by natural systems," even the brain, Wolfram said, "but without
the extra baggage of, for example, having the actual hairy animal."
No leading scientist has endorsed Wolfram's theory wholesale, but many say
his ideas are provocative.
"The feeling is that this is written by a genius," said H. Eugene Stanley,
a physicist at Boston University. Maybe not all of nature is as described
by Wolfram, he said, "but at least a big part of it is."
Wolfram's "new kind of science" entices specialists frustrated with
mathematical formulas that explain hydrogen atoms or planetary orbits but
"fail miserably" in fields such as biology, where systems are much more
diverse, said Terry Sejnowski, director of the Computational Neurobiology
Laboratory at UC San Diego and a Wolfram confidant.
Raymond Jeanloz, a UC Berkeley geophysicist, says Wolfram's hypothesis has
revolutionary potential.
"The modern approach in much of science has been reductionist: You take a
complicated thing and split it up into units that are less complicated," he
said. "Wolfram's approach is the direct opposite: Start with simplicity
instead of complexity. If he's right, this could be a huge step forward in
the way we approach scientific problems--and maybe most complicated issues
in life as a whole."
Links to Chaos Theory
Other scholars regard many of Wolfram's "discoveries" as uncredited
borrowings. They note that physicist Richard Feynman and mathematician
Norbert Weiner described the universe as kind of a giant digital computer
decades ago, and that physicist Edward Fredkin explored biological
processes and consciousness through the framework of simple computer programs.
Some experts say Wolfram also borrows heavily from chaos theory--the study
of complex interactive systems.
Paradoxically, Wolfram's hypothesis also embraces one of humanity's
earliest attempts to comprehend the natural world--the pre-Christian creed
of animism, which considers living beings and inanimate objects equal in
that all possess a soul.
In Wolfram's "new science," a person, a dog and a rock all emerge from the
same kind of simple rules and therefore are, in an essential way, the same.
Wolfram's theory also could bolster the age-old belief in predestination.
The idea that God preordains all things is uncannily similar to simple
computer programs playing out in inevitable, though unpredictable, ways.
During a recent interview, Wolfram acknowledged that the implications of
his theory sometimes scare even him. He began to sputter, stumbling over
his words in an effort to explain. Gradually, he regained his footing. He
said he expects, before he dies, to discover the simple source code from
which all works of creation have flowed.
"Will that be fundamentally disappointing?" he asked softly. "That this is
all there is, a few lines of code?"
Then he fell silent.
**********************
BBC
Web rebels profit from net controls
A crumbling concrete anti-aircraft tower off the east coast of England is
home to a dot.com venture with a difference.
The military platform, dubbed Sealand, is the base of internet hosting
company HavenCo which is bucking the downturn of the dot.com economy.
The company has been exploiting Sealand's self-proclaimed sovereignty to
offer an offshore data haven, free of government interference.
"We believe that people have a right to communicate freely," said Ryan
Lackey, co-founder of HavenCo. "If they want to operate certain kinds of
business that don't hurt anybody else, they should be able to do so."
The venture comes at a time when governments across the world are
tightening controls on the internet.
New laws both in the US and Europe are giving officials greater powers to
snoop on online activities.
Self-styled nation
Mr Lackey came up with the idea for HavenCo two years ago and started
looking for somewhere to create an electronic refuge.
"We looked all around the world for somewhere that would have secure
internet hosting, outside of government regulation and we could not really
find any," Mr Lackey told the BBC programme Go Digital.
In the end, he settled on the self-styled sovereign principality of Sealand.
Britain built the anti-aircraft platform during the Second World War.
It remained derelict until the 1960s when a retired Army major, Paddy Roy
Bates, took over the 10,000 square foot platform and declared it the
independent nation of Sealand.
At the time, the platform was beyond the then three-mile limit of British
territorial waters. All this changed in 1987, when the UK extended its
territorial waters from three to 12 miles.
Little regulation
Britain does not recognise the sovereignty of Sealand but this has not
deterred HavenCo.
It has installed internet servers on the platform, linked to the outside
world via satellite links.
There are few controls on the kind of websites that HavenCo is prepared to
host.
"We have a strict policy of three things we prohibit here," explained Mr
Lackey. "We prohibit child pornography, spamming and hacking from our
machines to other machines."
So far many of the sites are online gambling ventures. But a growing number
of political groups banned in their own countries have turned to HavenCo,
such as the website of the Tibetan Government in exile.
"We also permit any sort of free debate about issues whereas a country or
company might try to censor this or sue you," said Mr Lackey.
Providing a service to companies or groups who want to keep their data
secret or publish it on the web without censorship is proving a worthwhile
enterprise.
"We've been profitable since the summer of 2001 so from a commercial
standpoint we can continue forever," said Mr Lackey.
"Regulations in other countries simply increase demand."
However, how long HavenCo will escape the attention of the authorities is
uncertain, with officials insisting that any site hosted on Sealand will
have to comply with British internet regulations.
**********************
BBC
Hate flourishes on the net
Hate has flourished on the internet since the 11 September attacks,
according to the Simon Wiesenthal Center.
The Jewish rights organisation said that websites promoting violence and
racism had proliferated over the past year.
"Extremist groups are undoubtedly spending more of their efforts online,"
said Rabbi Abraham Cooper, at a seminar in Berlin, Germany, where he was
presenting the findings of the organisation's Digital Hate 2002 report.
In particular, the centre found that the number of internet sites
supporting suicide bombers had grown in the last six to nine months to
around 100.
Targeting minorities
The Simon Wiesenthal Center monitors global racist activity against a range
of groups.
In its report, it identifies 3,300 websites as "problematic", up from 2,600
a year ago.
"The biggest difference now is that we're seeing more websites enlisting
suicide bombers and those that validate or encourage terrorism and more
games targeting minorities," said Dr Cooper, associate dean of the Center.
Of particular concern was a game called Kaboom!, which features a suicide
bomber trying to cause maximum casualties.
The Center also noticed a change in the tactics used by racist and violent
groups on the internet.
It said these groups were now focusing on spreading their messages and
enticing people with games and music, rather than trying to recruit them
directly.
Researchers found that the internet was creating alliances, such as between
white supremacists and Islamic extremists against a perceived common Jewish
enemy.
Many groups had used images of the burning World Trade Center towers to
criticise US policy and condemn Jews.
*************************
BBC
Workers sacked for surfing porn
The majority of sackings for internet misuse are due to workers downloading
porn, says a new survey.
A quarter of UK companies have dismissed employees for internet misconduct.
And 40% of all complaints came from co-workers, a survey of more than 500
personnel managers found.
A total of 69% of dismissals were for workers surfing pornographic
websites, according to the research published on Tuesday.
Nearly three quarters of firms questioned had dealt with internet misuse,
with chat rooms and personal e-mails coming second and third respectively
in terms of most frequent complaints.
Warnings issued
Researchers found that more than half of managers preferred to deal with
these complaints by having a "quiet word" with workers.
But 29% favoured using verbal warnings.
The study - carried out for magazine Personnel Today and employee internet
management firm Websense - interviewed 544 human resources managers and
officers from companies employing an average of 2,500 people.
Jonathan Naylor, a barrister in the employment, pensions and benefits
division of law firm Morgan Cole said: "Dismissing an employee for Internet
misuse is a substantial cost to the employer."
"While there are the obvious costs of advertising for new hires,
recruitment, training and supervision, there are also additional financial
burdens caused by the interruption to work patterns, the damage to morale
and the negative publicity to the organisation as a result of the dismissal."
************************
Computerworld
Grocer's digital receipts pay off
Smart & Final Stores Corp.'s IT department last night went live with the
final systems in a trailblazing one-year project to bring digital receipts
to its small-business customers.
But the Commerce, Calif.-based warehouse grocery chain's back-office IT
systems stand to benefit even more than customers who lose their paper
receipts. Point-of-sale data will now be channeled through one server for
use by multiple applications, addressing a long-standing integration
headache and paving the way for near real-time access to data.
Before, Smart & Final had relied on 18 interfaces feeding its IBM S/390
mainframe and needed many more interfaces to extract data for use by
various applications, such as the accounts receivable and sales audit
systems, said Avraham Isaacs, vice president of development.
"It was just really complex," said Zeke Duge, CIO at Smart & Final. "The
data that accounting had looked different than the data that marketing had,
which would look different from this or that or the other."
IT executives knew they needed to improve the system. But, Duge said, it
was tough to go to his executive committee and say, "Hey, guys, I want to
change your data."
Then, Bob Graham, vice president of stores technology, told Duge about a
new digital-receipt standard he had heard about at a National Retail
Federation (NRF) conference. Digital receipts could help relieve some of
the stress on Smart & Final's accounting department, which had to spend an
"enormous amount of hours" ferreting out purchase histories for key
customers, Graham said.
Duge took the digital-receipt proposal to the executives and said, "I can
save real, honest-to-God, countable, touchable head count, and you can
redeploy the assets into more efficient use."
"It juiced up the IT department," Graham said, "because we had the
opportunity to do some things that others hadn't done before."
To make the digital receipts possible, Smart & Final had to put in
middleware that could grab the information collected at its NCR cash
registers, transform that raw data into the XML model approved earlier this
year by the NRF's Association for Retail Technology Standards, and send it
to its Microsoft SQL Server database.
Software from AfterBot Inc. in Norcross, Ga., takes that data and assembles
it into the digital receipts, which customers can view via Web browsers.
The receipts are composed internally and delivered via e-mail or fax,
Graham said.
But it was the middleware piece, from Matra Systems Inc. in Duluth, Ga.,
that gave Smart & Final the flexibility to leverage its digital-receipt
project to other applications. The middleware can unlock the raw data from
the NCR point-of-sale systems and transform it into the format needed by
not only the digital-receipt software, but also by all of Smart & Final's
applications.
"We wanted one single place where we can interpret the data," said Isaacs.
In the past, the data got interpreted at each store, and the flat ASCII
files were moved at day's end to the home office's host system, where they
were interpreted and processed again, Graham said.
Now, the data is fed in near real time to the Matra Freedom-Server, which
runs on a Hewlett-Packard eight-way ProLiant server. In addition to
improving data integrity, the system enables problems to be fixed just
once, Isaacs said.
Now that Smart & Final has near real-time access to its point-of-sale data,
the grocery chain can constantly feed its NCR Teradata warehouse, as well
as offer digital receipts in its 230 stores. That gives the company the
potential to view the effectiveness of promotions, measure customer
satisfaction and deliver customized offers through cash registers, all in
real time, Graham said.
"Hopefully, that will create brand loyalty for us," said Duge.
Smart & Final IT executives said head count will remain roughly the same,
because it gained responsibility for 52 more stores through acquisitions
and store openings. They declined to provide project cost figures, noting
that as an early adopter of digital receipts, Smart & Final got special
pricing that might not apply to other retailers.
Not every retailer will be able to justify a digital-receipt initiative,
according to Peter Abell, an analyst at Boston-based AMR Research Inc.
Abell said digital receipts are "nice to have" for customer service and
increased operating efficiency, but they're not a "must have" that would
bring substantial payoffs in revenue increases and cost savings.
************************
MSNBC
Notorious Net thief pleads guilty
Jay Nelson admits scamming 1,700 auction users
July 8 Jay Nelson, the man hundreds of Internet auction users learned to
hate last year, pleaded guilty Monday to several counts of wire and mail
fraud. Nelson, once calling "the Internet's John Dillinger," spent 13
months scamming over 1,700 eBay and Yahoo auction users, netting more than
$200,000.
NELSON USED DOZENS of fake personas he created on eBay and Yahoo,
and multiple accounts on online payment service PayPal, to dupe auction
users. The fraud was simple: accept payment from an auction winner and
never deliver the merchandise.
Nelson was first charged with fraud in February 2001, but skipped
his arraignment in New Hampshire. He then spent six months on the run as a
wanted fugitive, moving from hotel to hotel, funding his escapades by
committing more fraud. Eventually, he was placed on the U.S. Postal
Inspection Service's Most Wanted list.
Nelson was finally nabbed after he was recognized by an alert coin
shop owner, Ann Fetig. Nelson had been using her Kissimme, Fla., store to
pawn gold coins as part of his money laundering scheme. Fetig heard a local
radio station discussing an MSNBC.com story about the Nelson manhunt and
called the authorities.
"She is a very conscientious person," said Michael Gunnison,
supervisor of the white collar section of the U.S. Attorney's office in New
Hampshire. "She won't purchase coins unless someone produces their real
driver's license. And here, he's probably saying 'What's the chance she's
going be plugged in?' Well, she wasn't at first. Then she heard the radio
program."
NABBED AT COIN STORE
Nelson was arrested almost exactly a year ago, after Fetig called
the Postal Inspection office, saying she had their man. On July 11, when
Fettig arrived to unlock the door of her coin store, Nelson was already
waiting outside. So were U.S. Marshals.
"It all happened rather quick," she told MSNBC.com last year. "I
unlocked the door and held it open. Instead of Nelson coming in, the
marshal went flying out with gun drawn and said, 'Jay, get on the ground!'
I wish I could have seen the look on Jay's face, but all I could see was
the gun. Then he was spread-eagled on the ground, and the marshal frisked
him. [Nelson] kept saying, 'I'm not going anywhere.' "
Nelson's long history of alleged Net-based scamming began in
Illinois in 1998 the Illinois Attorney General's office filed a complaint
against Nelson and his wife, Krista, for online auction fraud in 2000. But
by then, he had already moved to Gilsum, N.H., where he began a new string
of scams that would eventually lead to Monday's guilty plea.
In June of 2000, he christened an eBay account called
"harddrives4sale." Using that name, he scammed 247 people out of $32,000,
according to Monday's guilty plea.
He continued creating fake personas and running more scams until
January of last year, when federal authorities filed a criminal complaint
against him with the U.S. District Court in New Hampshire.
Soon after, Nelson went on the run.
MANY PAYPAL ACCOUNTS
By the time he'd moved to Florida last summer, Nelson knew federal
authorities were watching his various bank accounts for activity. So when
he defrauded an auction user, he had the victim pay using PayPal. He then
transferred the money through various PayPal accounts. But even then, he
couldn't withdraw any of the money into a bank account so he traded PayPal
funds for gold coins, which he then pawned for cash.
"When they found him in Florida, he said he was tired of running,"
Gunnison said.
Nelson will be sentenced in October. Under federal sentencing
guidelines, Nelson should be sentenced to about 5 years in jail, Gunnison said.
While the U.S. Attorney's office has attempted to contact victims
for restitution, many can't be found, Gunnison said. Many others have
already been reimbursed by PayPal.
Despite the prosecution of Nelson and other Net criminals, auction
site fraud is still on the rise, said U.S. postal inspector Tom Higgins.
Just last week, MSNBC.com revealed a set of more complex frauds involving
Western Union payments and even the creation of fake escrow or shipping sites.
"The number of complaints have increased," Higgins said. "But from
when all this started going on in 2000, both eBay and PayPal have evolved
and made great strides. They are good companies that have put a lot of
controls in place."
************************
MSNBC
New worm eats into Kazaa
KWBot second worm to hit file-sharing network
By Matt Loney
July 8 The Kazaa file-swapping network has been hit by another worm, just
months after the first such attack, according to antivirus vendors.
Antivirus company Sophos said it had received several reports of the KWBot
worm in the wild. KWBot appears to be the second worm to hit the Kazaa
network, which fell prey to the Benjamin worm in May.
KWBOT SPREADS in a similar way to Benjamin in that it alters
Windows registry keys and then disguises itself as files that are likely to
prove popular with file-swappers. It makes particular use of the names of
movies and applications. When first executed, the worm copies itself to the
Windows system folder as xplorer32.exe, said Sophos. It will then create
two registry entries so that the copy is run each time Windows is started.
The worm may also allow attackers to gain control of an infected
computer using commands transmitted over Internet Relay Chat, said Sophos.
Kazaa is not the only file-swapping network to have been targeted
by virus writers. The Gnutella file-swapping network was hit by a
proof-of-concept worm in February.
There have also been threats from other quarters. In April, a bug
was found in the popular Winamp software for playing digital music files.
The bug could allow an attacker to embed malicious code into an MP3 file,
potentially damaging the user's PC and infecting other MP3s.
In addition, the music industry recently began planting "decoys" on
free peer-to-peer services in its fight against online piracy, according to
sources. This practice, known as "spoofing," entails the hiring of
companies to distribute "decoy" files that are empty or do not work in
order to frustrate would-be downloaders of movies and music.
Overpeer, a New York-based software firm funded by South Korea's SK
Group, is understood to be one of the firms helping the industry disguise
online files to thwart unauthorized swapping.
*************************
Nando Times
Study names 'best-connected' cities
Agence France-Presse
WASHINGTON (July 8, 2002 9:43 a.m. EDT) - Chicago, Washington and Dallas
top the list of "best-connected" cities, according to a new study on
Internet use and Web access to be made public Monday.
The next three are Atlanta, New York and U.S. technology capital San
Francisco, which posted a surprisingly low fifth-place ranking, according
to the National Science Foundation.
The West Coast showed the most growth in Internet access between 1997 and
2000, according to the study, which placed eight western U.S. cities among
the top 20.
Cities with a sophisticated Internet infrastructure have the best chance of
economic growth over the next several years, said Morton O'Kelly, a
geography professor at Ohio State University and co-author of the study.
Swift and efficient access to the Web by businesses was a strategic and
financially beneficial investment for U.S. companies, the study found.
**************************
Sydney Morning Herald
Internet privacy laws flagged
The Victorian government today flagged new internet privacy laws to prevent
people's photos being published on websites without their consent.
Premier Steve Bracks announced the move after photos of Victorian Surf
Lifesavers again appeared on a gay website.
The incident follows two cases earlier this year in which pictures of young
Victorian boys were posted on similar websites.
Mr Bracks said he was outraged the photos had been used without consent,
and the government would introduce new legislation to tackle the problem.
"We are framing up legislation ... to prevent images going on without the
approval and support of those people who are going on the internet," Mr
Bracks said.
He said the laws would be modelled on US legislation, and be completed
after the Law Reform Commission completed its current investigation on the
issue.
But he said the federal government would have to enact similar laws, and he
would write to Prime Minister John Howard requesting his assistance.
"We need the support of the Commonwealth government, with its external
powers obligations, to have this ban to ensure that images are not put on
without consent," Mr Bracks said.
He said if the matter was not resolved in coming weeks, he would seek to
have it discussed at the next Council of Australian Governments (COAG)
meeting.
************************
New Zealand Herald
Net Guard shuts up shop after inquiry
Auckland-based Net Guard (New Zealand) has following a Commerce Commission
investigation.
The commission had received complaints that Net Guard, formerly known as
World4Vision, was operating a sophisticated pyramid scheme in breach of
section 24 of the Fair Trading Act.
Net Guard described itself on its website as a "technology-driven
international membership organisation focused on becoming a market leader
in the design and development of wireless internet-enabled tracking and
location systems".
The commission began investigating Net Guard last month after receiving
more than 30 complaints about the business.
Commission chairman John Belgrave said Malcolm Stockdale and Stuart
Baldwin, two of the people who set up the scheme in New Zealand, were
linked to the Alpha Club - an alleged pyramid scheme the commission is
taking civil action against.
"The commission found that more than 60 people had joined Net Guard and
that the business had already generated up to half a million dollars in
membership fees," Mr Belgrave said.
Net Guard recruited "agents" through invitation-only presentations around
Auckland.
Agents paid $6800 to become members and received $1200 for each new recruit
they brought to the organisation.
Mr Stockdale and Mr Baldwin left the country last month and are thought to
have set up a similar scheme in Australia.
Net Guard members can contact the Commerce Commission on 0800 943-600 in
business hours.
***********************
Peoples Daily China
New Technology Searches Internet in Chinese
A Beijing-based network company has worked out a "real name" technology
that has made Chinese a "universal" language of the Internet.
A Beijing-based network company has worked out a "real name" technology
that has made Chinese a "universal" language of the Internet.
The technology, a major breakthrough of 3721.com, allows Chinese users to
find a full list of relevant organizations and products by simply typing in
the address column their names in Chinese characters.
More than 25 million Chinese "netizens" were using the real name technology
to locate the Internet databank each day, said 3721.com's chief executive
officer Zhou Hongwei here Tuesday.
"You don't have to remember complex domain names in English andtype out all
the 'www', 'com' and 'net'," said Zhou. "A name -- and in Chinese
characters -- is enough."
While the Internet normally searches for websites through a combination of
the 26 English letters or the 10 Arabic numerals, the real name technology
has made the network more user-friendly to English-illiterate Chinese.
The real name, a new generation network technology following the Internet
protocol and domain name, had surpassed all search engines in locating
network resources in China, statistics showed.
"The fast-growing Internet has provided a new platform for enterprises,
most of which are likely to put their conventional business transactions
online," said Zhou. "The new technology can help protect their brands and
reputations and even attract potential customers."
The technology also benefited small and medium-sized enterprises, which
could generate a company profile when registering themselves with 3721.com.
"In this way, you don't have to spend heavily on a company website, but the
customers will find you easily when they use the real name technology to
locate relevant network resources," said Zhou.
After four years of operation, 3721.com now has 250,000 membership
enterprises worldwide and covers 95 percent of China's netizens.
***********************
Peoples Daily China
Chinese to Check E-mails by Phone
China's leading personal computer maker, Legend Holdings, has developed an
interactive voice operation system to check and reply to e-mails by phone.
China's leading personal computer maker, Legend Holdings, has developed an
interactive voice operation system to check and reply to e-mails by phone.
This system was displayed at Monday's Beijing International Exhibition of
Digital Info-Service and Technology.
Legend's software design engineer Ren Wenjie said that users are able to
access their e-mails by simply talking to a telephone.
By dialing the service number, users can hear the phone tellingthem content
of their e-mails according to their request by mailing time, senders,
subjects, slugs, order and attachments.
Meanwhile, the system can record users' voice mails, which willbe sent as
attachments to replies. Saying "exit" or simply hangingup will allow users
to exit the system.
The intelligent voice system serves as a personal secretary, Ren said.
However, she admitted that the technology still lags behind itsforeign
counterparts due to the syllable difference between Chinese and Western
languages.
The engineer told Xinhua that Legend has tried to apply this system to news
navigation on the Internet. "But it will take some time before the
experimental technology will be applied in industry," she said.
Zhang Zijiao, a teacher of network programming at Zhengzhou University in
central China, said, after his e-mail checking trial,the industrialization
of the system would have a tremendous future,"at least as a great help to
the elderly and blind people in browsing the Internet."
Legend is currently negotiating with Beijing Civil Affairs Bureau to apply
the technology to community services, Ren added.
*********************
Wired News
Spam-Cramming Foils Vacationers
By Michelle Delio
Vacationers with a sudden yearning to get away from it all are discovering
that cyberspace isn't an easy place to escape.
After making a bold decision not to check e-mail frequently or at all
during vacations, many find that when they do log on again they are greeted
by a mailbox crammed with spam -- as well as a message from their Internet
Service Provider informing them that their account has reached its allotted
capacity and no further e-mail will be delivered until the box has been
purged.
"This was the first time in about 10 years that I hadn't checked my e-mail
every day," grumbled Peter Grummel, a programmer from Richmond, Virginia.
"With everything that happened this year, I needed real down-time. But when
I got home, I discovered that slews of spam had totally overwhelmed my
server space allotment. The spam got through, of course, but important
business and personal e-mail bounced."
Many ISPs set limits on the amount of e-mail messages that can be stored on
their servers, conflicting with seemingly ever-increasing amounts of spam
and many people's newfound desire to really get away from it all. If e-mail
isn't regularly downloaded and removed from the server, new messages will
bounce back to the sender.
"It's like you have to baby-sit your e-mail account," Nadine Gormell, a
London investment counselor, said. "I get so much junk mail that I am
forced to log on a few times a day while on holiday, just to clean up the
spammers' mess."
ISP representatives also agree that spam has become more than a mere
nuisance. Major ISPs have had to pour significant amounts of resources and
attention into spam-stopping, according to the representatives who add that
unsolicited commercial bulk e-mails also result in increased costs for
labor, servers, storage and network capacity.
"This is what many of us have been saying for years: Spam causes real harm
and also prevents real mail from being delivered," Laura Atkins, president
of the SpamCon Foundation, an anti-spam organization, said.
Atkins feels that spam has become such an "ugly, ugly problem" that she is
unsure what sort of technology or legislation would now be able to
completely stop the ever-increasing flow of unwanted commercial e-mail.
"The current technical fixes don't address the problem of mailboxes filling
up, as ISPs don't want to delete customer mail automatically," Atkins
explained. "The current legal fixes won't actually address this problem
since most state laws require the end user to opt-out to stop the mail. And
if you're on vacation you can't opt-out."
New technology may help to at least slash spam totals in the near future.
EarthLink is considering offering a user-selected scale of screening,
according to Steve Dougherty, director of systems vendor management for the
ISP. Stricter filters may delete innocent e-mail, Dougherty said, but it's
a tradeoff that some users might be willing to make.
"Spam is fundamentally a growing nuisance," Dougherty said. "Swatting a
couple of mosquitoes isn't particularly onerous -- but when you're
enveloped in clouds of them, it requires significant changes in behavior."
Some users now opt to use multiple layers of filters, using a public e-mail
address offered by services such as SpamCom or WhiteIce, which filter
messages for spam and then pass legitimate e-mails along to a private
address, where it is often filtered yet again.
After that, some users say e-mail still needs to pass through their
personal filtering system before it appears in their inboxes.
"And despite three layers of filters, I still get 20 or so spams a day,"
fumed Toronto-based technical freelance writer Mikal McCormick. "It's
totally, utterly, completely spiraling out of control."
Some services, like Hotmail and America Online, allow the user to
"whitelist" mail. A whitelist only allows mail to be delivered if the user
has specifically selected to receive e-mail from that sender.
Some ISPs are also investigating the new peer-to-peer anti-spam programs,
such as the one offered by Cloudmark, to see if the technology and concepts
are viable.
Functioning like a file-sharing program, peer-to-peer spam-blockers use the
combined power of individual computers to stop spam. After a piece of spam
is identified, it's tagged and forwarded to other computers running the
networked spam filtering software, automatically updating each
application's blocking filters.
Constant scanning and filter updating is necessary in the battle against
spam. Despite protests from most spammers that theirs is a legitimate
business, many bulk e-mailers constantly develop new ways to sneak their
unwanted mail through spam-fighting filters.
"We zap millions and millions of spam mails a day from our servers," AOL
spokesman Nicholas Graham said. "But spam is a cat-and-mouse game that can
be stopped only through collaborative efforts between users, ISPs, the law
and technology."
AOL's Graham said that when users get spam that includes a new
filter-foiling trick, they should forward it to the appropriate address at
their ISP, so that filters can be updated.
"We really do want and need your spam," Graham said.
**************************
The Register UK
EU report calls for widespread open source adoption
By John Lettice
Posted: 09/07/2002 at 10:14 GMT
A European Commission funded report into the pooling of software across the
EU's administrations has recommended that governments share and adapt
software via the Open Source model. The study, conducted by (arf arf)
sometime Microsoft buddies Unisys, calls for a development program lasting
six years, starting with a clearing house to which governments could
'donate' software for reuse, with a total investment of E6 million over the
period.
The report, Pooling Open Source Software, was commissioned via the IDA
(Interchange of Data between Administrations), the body set up with the
brief of investigating the Interchange of... Well, it's pretty obvious,
isn't it? It would however be absolutely incorrect to say (as we're sure
the more rabid insurrectionists in Brussels and environs will) that
proprietary and/or Microsoft software lost out in a head-to-head
evaluation, because the IDA effectivey handed Unisys a loaded pistol, with
instructions to go pull the trigger.
That, of course, is worse news for Microsoft than just some pesky report
recommending wholesale deployment of open source software, because it means
the people who're driving have already decided. The study deals largely
with software developed by government departments for their own
administrative services, and starts from the premise that if such software
is to be transferred to and adapted for other adminstrative departments in
other countries, then the open source model "comes naturally."
Which does have a compelling logic to it, although you can see why
Microsoft's government sales people might start complaining that the IDA's
playing with a stacked deck here. But it's specifically not a case of loose
evangelists (not writing the study, anyway): "The study purpose is... not
of the advantages or disadvantages of open source and proprietary
software... It is not to take position in the commercial or sometimes
ideological conflict between the advocates of free software distribution
and the advocates of reinforcing intellectual and industrial property on
software.
"It is just to examine the pre-requisites and conditions (functional,
legal, technical) of a pan-European pooling service."
Which it then proceeds to do. Clearly, not a lot, possibly very close to
none, of software used by governments in the EU today is open source. Much
of it however is bespoke, and more receptive to being at least moved
towards open source, with the caveat that software that doesn't start
development under an open source licence regime is generally difficult to
convert to one, because multiple IP ownerships have to be tracked down
first. Conversion and adaptation alone would therefore be likely to run
into the sand, so to really get to interchangeable open source software,
European administrations will also have to move to making new projects open
source, and resist implementing new projects based on proprietary software.
Depending on how hot to trot Brussels is, governments could come under
severe pressure to conform to this, which might be awkward for the UK's own
dear E-Envoy, who is currently clutching a number of Microsoft-based
e-government projects. If open source became the lingua franca of Europe
(and by George, we need one), then individual governments would be faced
with the choice of joining in or becoming more and more isolated. Open
source as IT's Euro? Could be.
The study does not recommend any specific software platform or open source
licence variant. But it does seem to take the view that pooled software
should be exchanged between administrations, rather than being available to
all and sundry, which suggests that the GPL won't be the way European
goverment goes. It also considers the BSD licence and MPL, whereby "the
code and the executable binary may be disassociated." This would allow the
executable to be distributed with a proprietary licence, and hence would
allow it to be restricted.
According to the IDA, the report was welcomed by a specialist hearing in
Brussels last month. EU Enterprise and Information Society Commissioner
Erkki Liikanen commented: "Good practice is built on proven solutions that
work. Software and concrete applications that work in practice are an
important element of these. They could be usefully used as source of
inspiration for Member States to develop good and interactive public
services in the future to the benefit of Europe's citizens." No, we've no
idea what that's supposed to mean either, but the hapless Commission press
release writers claim Erkki was "Commenting on the potential benefits of
greater re-use of public sector software," OK?
************************
Wired News
Hacker to Apple: Watch those downloads
By Matt Loney
Special to CNET News.com
A security mailing list has alerted Apple Computer OS X users to a program
that could let a hacker piggyback malicious code on downloads from the
company's SoftwareUpdate service.
According to the BugTraq mailing list, a hacker named Russell Harding has
posted full instructions online for how to fool Apple's SoftwareUpdate
feature to allowing a hacker to install a backdoor on any Mac running OS X.
The exploit takes advantage of SoftwareUpdate, Apple's software updating
mechanism in OS X, which checks weekly for new updates from the company.
According to Harding, who claims to have discovered the exploit, the
feature downloads updates over the Web with no authentication and installs
them on a system. So far, there are no patches available for this problem.
"Apple takes all security notifications seriously and is actively
investigating this report," a company representative said.
Harding stressed that the exploit is a simple one if using several
well-known techniques, including domain-name service (DNS) spoofing and DNS
cache poisoning.
DNS spoofing is an attack where an individual seeks out a numerical IP
(Internet Protocol) address (for example, 1.2.3.4) corresponding to a
specific Internet address (for example, www.cnet.com), but an attacker's
computer intercepts the request. The attacker then sends back a false IP
address that corresponds to a hostile server.
DNS cache poisoning has similar results, but instead of intercepting a
request for an IP address, the attacker uses a variety of techniques to
replace the valid address in an official DNS server with an address
pointing to the attacker's computer.
When SoftwareUpdate runs normally, a person's computer connects via HTTP to
an Apple.com page and sends a simple request for an XML document containing
the latest inventory of OS X software. The Apple.com site returns the
document, which the person's computer then cross-checks against what it has
installed.
After the check, OS X sends a list of software that needs to be updated to
another page on Apple.com. If an update for the software is available, the
SoftwareUpdate server responds with the location of the software, its size,
and a brief description. If not, the server sends a blank page with the
information, "No Updates."
On his Web site, Harding provides two programs that he says have been
customized for carrying such an attack. One program listens for DNS queries
for updates, and when it receives them replies with spoofed packets
rerouting them to the attacker's computer.
The second program, which is downloaded onto a victim's Mac and masquerades
as a security update, contains a copy of the encrypted communications
program, Secure Shell.
Automatic updates of software--particularly operating system software--is a
growing trend. Several Linux companies offer this feature for their
distributions of the open-source operating system, and Microsoft recently
launched a similar service called Microsoft Software Update Services.
*************************
Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 510
2120 L Street, NW
Washington, D.C. 20037
202-478-6124
lillie.coney@xxxxxxx