[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips July 17, 2002
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, CSSP <cssp@xxxxxxx>;, glee@xxxxxxxxxxxxx;, John White <white@xxxxxxxxxx>;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, computer_security_day@xxxxxxx;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, akuadc@xxxxxxxxxxx;
- Subject: Clips July 17, 2002
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Wed, 17 Jul 2002 10:56:55 -0400
- Cc: jffgrv@xxxxxxxxxxx
Clips July 17, 2002
ARTICLES
Bills Seek to Delay Baggage-Screening Deadline
FTC Seeks Greater Authority Over Telecom Sector
Radio Stations Appeal Ruling on Web Fees
Harris wins FAA telecom deal
US software firm aids Saudi censors
Computer Security Standards Ready
ICANN to Finish Governance Reform in Oct.
FCC Delays Cell Number Deadline
Tech support: Not quite at our beck and call
Maker of Web pop-up ads loses ruling
White House's IT strategy emphasizes info sharing; pilot projects named
Navy steams forward on XML standardization
FBI says it's making progress on technology upgrade
FBI expects two-year wait to replace old computers
Bush plan supports states in developing driver's license standards
Government to the cyber rescue?
Switch on for state snooping
E-vote election 'by 2006'
Computers more costly due to recycling laws
Getting a Pixel Fix on the Enemy
Consumer Federation Warns that FCC Policies Threatens ISPs
No Changes to FCC's "Universal Service" Definition
A Conversation With The Inventor Of Email
New Sun Products Comply With Liberty Alliance Standards
Euro lawmakers discuss Net issues with Congress
Why ICANN can't (IEEE Newsletter Opinion Piece)
************************
Washington Post
Bills Seek to Delay Baggage-Screening Deadline
By Sara Kehaulani Goo
House and Senate lawmakers proposed legislation yesterday to extend a key
deadline to inspect every airline passenger's luggage for explosives by
year's end, saying the rush to install thousands of bomb-detection machines
could choke major airports and result in three-hour delays for travelers.
The deadline is required as part of an airport security law passed by
Congress after the Sept. 11 terrorist attacks, but a growing number of
lawmakers and airport directors doubt that the Transportation Security
Administration will meet it.
Bills filed yesterday by Rep. Kay Granger (R-Tex.) and Sen. John Ensign
(R-Nev.) would delay the deadline for the 25 percent of the nation's 429
airports that have more complicated terminal designs. It would direct the
TSA to come up with permanent plans to install the machines, such as in the
terminals' baggage area, out of sight and out of the way of passengers.
"Let's not impose an artificial deadline that's not going to accomplish
what we want to accomplish," Granger said.
Both Democratic and Republican aides said the legislation will be difficult
to pass on its own because TSA officials and Transportation Secretary
Norman Y. Mineta insist they can meet the deadline. Delaying the deadline
may be viewed by voters as cutting corners on airport security, the aides said.
"Absent the administration saying it, I don't see the political will there"
to move the deadlines, said Peter Rogoff, staff director for the Democrats
on the Senate Appropriations subcommittee on transportation.
Rob Chamberlain, Republican counsel to the Senate Commerce, Science and
Transportation Committee, said the nation's airports cannot afford to wait
any longer for better security. "The bottom line is we don't have anything
in place right now" to detect explosives, Chamberlain said.
House supporters said they intend to try to pass the measure as an
amendment to the bill creating a Homeland Security Department or to an
appropriations bill.
Some airlines and a large group of airport directors, including those who
oversee Washington's three major airports, predict that the difficulties in
installing bomb-scanning equipment will create chaos for airports at the
end of the year.
Some airport directors worry that the long lines will create a greater
security risk. The fatal shooting incident July 4 at Los Angeles
International Airport exposed a security weakness in lobby areas outside of
security checkpoints.
"You're creating a worse security program than you intended," Randall H.
Walker, aviation director at Las Vegas's McCarran International Airport,
said at a meeting of airport executives Monday and yesterday in Washington.
At the same meeting, the TSA's Mike Robinson, associate undersecretary for
aviation operations, disagreed that the push to meet the deadline would
result in major delays. "None of our modeling suggests what we intend to do
is going to crash the system at any place," Robinson said.
************************
Washington Post
FTC Seeks Greater Authority Over Telecom Sector
By Brian Krebs
The Federal Trade Commission is pressing Congress for authority to regulate
the nation's largest telecommunications providers in an effort to shield
consumers against aggressive telemarketers and questionable billing practices.
The FTC has long been excluded from regulating the telecom sector, a job
traditionally left to the Federal Communications Commission.
But the FTC now says it needs to be freed from that exception to build its
proposed national anti-telemarketing registry. The FTC's concern is that
without added oversight powers, the agency could lack the authority to rein
in egregious telemarketing practices among local and long-distance phone
companies.
Consumer groups support the FTC move, arguing that the agency responsible
for policing the industry - the FCC - has failed to crack down on carriers
accused of billing consumers for unauthorized services and "slamming," the
illegal practice of changing a consumer's telephone service without permission.
The added oversight is especially needed in the face of industry
consolidation at a time when the FCC is taking steps to deregulate the
telecom sector, said Gene Kimmelman, Washington director for Consumers Union.
"This barrage of existing and potential market abuses in a time of
deregulation makes it most important to apply traditional competition and
consumer protection rules to telephone companies," Kimmelman said.
The FTC's proposal is opposed by the telemarketing industry and many state
officials who fear the national do-not-call registry could preempt stronger
state laws.
"This effort simply duplicates what the industry and states are already
doing, and just seems like a ridiculous use of public resources," said H.
Robert Wientzen, president of the Direct Marketing Institute.
Nationwide, 20 states have adopted do-not-call laws, and the direct
marketing industry maintains a voluntary registry of roughly 4.5 million
Americans.
The telecommunications industry also is strongly against the move.
"To add another federal regulator to the mix would only cause confusion
that would not be constructive," said Larry Sargeant of the United States
Telecom Association. "No one has identified a particular deficiency with
respect to FCC enforcement."
All five FTC commissioners plan to push for the changes at a Senate
Commerce subcommittee hearing on Wednesday.
Sources familiar with the matter say draft legislation that would grant
much of the FTC's request focuses on funding for new consumer protection
measures, and does not seek to involve the commission in telecommunications
merger and competition proceedings, which are currently decided by the FCC
in consultation with the U.S. Justice Department.
But Mozelle Thompson, one of two Democratic commissioners on the FTC, said
he hopes the commission can use the added authority to weigh in on
competition proceedings within the telecom sector.
"I support a lifting of the common carrier exemption because I think we can
provide substantial expertise on both the consumer protection and
competition sides," Thompson said in an interview.
It remains unclear whether separate legislation stands a chance of passage
this year, particularly given Congress' preoccupation with the Bush
administration's homeland security proposal.
Barry Piatt, spokesman for Sen. Byron Dorgan (D-N.D.), chairman of the
Senate Commerce subcommittee hosting Wednesday's FTC reauthorization
hearing, said his boss remains ambivalent about the FTC's request.
"He's neither for or against it at this point," Piatt said. "He's willing
to listen to both sides and make a decision when the time comes."
*************************
New York Times
Radio Stations Appeal Ruling on Web Fees
By BLOOMBERG NEWS
PHILADELPHIA, July 16 (Bloomberg News) Clear Channel Communications and
other radio operators have asked an appeals court to review rulings forcing
them to pay record companies royalties for songs played on the Internet.
The appeal, filed on Monday in the United States Court of Appeals for the
Third Circuit by the National Association of Broadcasters and several radio
operators like Clear Channel and Cox Radio, challenged a ruling by a
federal court in Philadelphia that allowed the Copyright Office to set the
royalty rates.
Record companies and stand-alone Web sites will have to pay 0.07 cent a
song for each listener for retransmitting music on the Web, according to a
ruling from the Copyright Office last month. At stake are millions of
dollars in fees to record companies. The Recording Industry of America, a
trade group, wants the court to reject the appeal.
************************
Mercury News
Yahoo, eBay fraud nets man 12-year sentence
NORFOLK, Va. (AP) - A man who defrauded Internet auction shoppers out of
more than $100,000 was sentenced to 12 years in prison Tuesday in what
prosecutors said could be the stiffest penalty ever for such an offense.
Prosecutors said Thomas Houser bilked 268 eBay and Yahoo! shoppers.
Houser, of Fairfax, offered electronics, watches, paintball guns and other
goods on both Web sites through the ``Houser Family Store.'' The items did
not exist, prosecutors said.
Houser, who would operate out of motel rooms and move around to avoid
capture, had checks sent to a private postal box in Fairfax, according to
court records. He was captured in February in Georgia.
Investigators said Houser was awaiting sentencing when he was arrested
after pleading guilty on Dec. 13 to similar charges. He had been released
on $50,000.
Authorities have seized from Houser nearly $50,000 in cash and a 1993
Nissan sports car worth about $6,000. The money will be used to repay those
defrauded.
Department of Justice officials said Houser's 12-year sentence is the
longest handed down for Internet auction fraud. His punishment was
compounded by a lengthy criminal record and the fact he committed the new
crime after pleading guilty to the first fraud.
****************************
Federal Computer Week
Harris wins FAA telecom deal
The Federal Aviation Administration announced July 15 that it has awarded
Harris Corp. the FAA Telecommunications Infrastructure (FTI) contract,
potentially worth $3.5 billion over 15 years.
FTI will integrate the management of multiple telecom networks, including
satellite and phone services, for air traffic operations and administrative
systems that are reaching the end of their lease terms or useful lives.
The FAA is taking a performance-based approach to the procurement that
emphasizes results rather than detailed specifications and gives vendors
room to come up with a best solution to meet an agency's mission.
"We look forward to putting an FTI network into place that meets the FAA's
unique telecommunications services and security requirements, and support
its critical role of managing the U.S. National Airspace System (NAS),"
Phillip Farmer, chairman and CEO of Harris, said in a July 15 news release.
Harris has teamed with several subcontractors, including BellSouth Corp.,
Qwest Communications International Inc., Raytheon Co., SBC Communications
Inc., Sprint and Verizon.
"The FAA has a need to upgrade their nationwide infrastructure, not just
airport activity but really all of their facilities," said Tony D'Agata,
vice president of the government systems division at Sprint. "It's a major
undertaking initiated a few years ago and it's finally coming to fruition."
Two other groups, led by Lockheed Martin Air Traffic Management and
WorldCom Inc., competed for the services contract, which has a five-year base.
"FTI is a critical element of our overall plan to modernize the national
airspace system," FAA Administrator Jane Garvey said in a July 15 news
release. "The FAA and the Harris team are forming a long-term partnership
to ensure that the U.S. airspace remains the safest in the world." The
telecom network that currently supports the nation's air traffic control
system eventually will become part of FTI.
The Leased Interfacility NAS Communications System (LINCS) -- used to
transmit radar, weather and other data -- links 5,000 locations and carries
more than 14,000 connections, enabling air traffic controllers to
communicate with one another and with pilots.
The FAA awarded a follow-on contract to WorldCom in February to continue
operating LINCS to smooth the transition to FTI.
WorldCom's original contract, which was competitively awarded in 1992,
ended in March. The new five-year deal could bring as much as $604 million.
************************
USA Today
S. Korean activists plan cyber attack against USA
SEOUL, South Korea (AP) Activists threatened on Tuesday to launch cyber
attacks on the White House, U.S. Embassy and military Web sites to protest
the deaths of two South Korean girls fatally struck by a U.S. armored vehicle.
The South Korean activists planned to try to incapacitate the Web servers
by flooding them with a massive number of simultaneous "hits" or visits of
the sites on Wednesday.
"Our aim is to temporarily shut down the servers to show our anger," said
Yoon Su-keun, an organizer of the anti-U.S. protest.
Yoon said activists want an apology from President Bush and punishment for
the two soldiers who were in the vehicle that struck the girls on a narrow
road north of Seoul on June 13.
Anti-U.S. protests have taken place almost daily since then.
About 130 student activists, shouting "Yankee go home," rallied on Tuesday
near the U.S. Embassy, demanding that the two soldiers be tried in a South
Korean court.
About a dozen protesters briefly scuffled with riot police, who blocked
them from entering the embassy building to deliver a protest letter. No
arrests or injuries were reported.
Earlier this month, the U.S. military indicted Sgt. Mark Walker and Sgt.
Fernando Nino on charges of negligent homicide for trial in a U.S. military
court in South Korea. If convicted, they could face up to six years in prison.
The U.S. military had initially said it had no plan to court-martial the
two soldiers. Lee Ferguson, a spokeswoman for the U.S. military command in
Seoul, said enough evidence was later found to prosecute them on criminal
charges.
Maj. Gen. Russel L. Honore, commander of the 2nd Infantry Division, visited
the victims' parents Tuesday and said the U.S. military would build a
memorial near the accident site to honor the two girls.
Walker and Nino, both from the 2nd Infantry Division, were on a training
mission near the border with North Korea when their armored bridge carrier
hit two 14-year-old girls on a public road. The soldiers' home towns were
not released.
South Korea last week requested that the U.S. military give up jurisdiction
over the two soldiers. The military has yet to respond.
Under a treaty, the military can allow South Korea to try American soldiers
involved in accidents while on duty. If convicted in a South Korean court,
the soldiers could face up to five years in prison.
Occasional accidents and crimes by U.S. soldiers have prompted demands from
South Korean activists that Washington give Seoul more legal power in cases
involving American troops. Some activists have also demanded the withdrawal
of the U.S. troops.
Since the 1950-1953 Korean War, about 37,000 U.S. soldiers are stationed in
South Korea as a deterrent against the communist North.
*************************
Boston Globe
US software firm aids Saudi censors
By Hiawatha Bray, Globe Staff, 7/17/2002
It's no surprise that the government of Saudi Arabia blocks its citizens'
Internet access to pornography. But Saudis also are prevented from viewing
hundreds of Web sites on topics ranging from Christianity to gay rights.
And an American software company is helping the Saudi censors in their work.
A report from the Berkman Center for Internet & Society at Harvard Law
School found that of about 64,000 sites tested, over 2,000 were blocked in
Saudi Arabia. Of these, only 795 contained sexually explicit materials. Of
the remaining blocked pages, 246 were on religious topics, among them 45
sites related to Islam, the official religion of Saudi Arabia. Also blocked
were 76 humor sites, 70 music sites, 43 movie sites, and 13 dealing with
homosexuality.
For instance, Saudis can't get access to the iVillage Web site for women;
the Jewish site Israel
.com; Submission.org, an Islamic information site; Answering Islam, a site
promoting Christian evangelism among Muslims; the gay Web site
Queernet.org; and Amnesty International's reports on human rights in Saudi
Arabia. In addition, Saudi authorities block access to Internet services
that translate Web pages from one language to another. Such sites could be
used to translate objectionable Web pages into Arabic.
On the other hand, the study found that many major news sites, such as CNN,
are freely available to Saudis. And some blocked sites, such as the humor
publication The Onion, were later unblocked.
Berkman Center co-director Jonathan Zittrain, who helped conduct the study,
said that Saudi government officials who oversee Internet access in the
country assisted him in his research. The Saudi Internet Services Unit gave
him full access to the country's network of ''proxy server'' computers that
filter Internet data before it enters the country.
''I think they are quite open about what they do and why,'' Zittrain said.
''I don't think they feel this is anything to be embarrassed about. They
might feel differently now that our study is out.''
According to the ISU's Web site, the Saudi government relies on commercial
filtering software to filter out pornographic sites. Such products include
a list of known pornographic Web sites; updates to this list are regularly
sent to customers. Filtering programs also allow users to add their own
lists of sites to be blocked. The ISU says that it blocks non-pornographic
sites when it ''receives orders to block them from related government bodies.''
The basic filtering software used by the ISU is SmartFilter, produced by
Secure Computing Corp. of San Jose, Calif. Executives for Secure Computing
declined to be interviewed.
This isn't the only instance in which American companies are aiding efforts
by foreign countries to limit their citizens' Net access. The Associated
Press reported yesterday that major Web portal Yahoo has agreed to
voluntary censorship of its Chinese site. Under the agreement, Yahoo
pledged to avoid ''producing, posting or disseminating pernicious
information that may jeopardize state security and disrupt social
stability.'' A spokeswoman at Yahoo stressed the new policy applies only to
Chinese Yahoo and will have no bearing on Yahoo's US operations.
But Zittrain said the Saudi and Chinese strategies could help transform the
Internet from a borderless global network to a host of national Internets,
each with its own rules.
''I think that it would be a lost opportunity if the Internet were to
become cantonized, if it were to become a series of countrywide Webs,'' he
said. ''I believe that keeping something like the status quo, where you
have an all or nothing Internet, may be best.''
The Berkman Center report can be seen at cyber.law.harvard
.edu/filtering/saudiarabia.
Hiawatha Bray can be reached at bray@xxxxxxxxxx
********************
Washington Post
Computer Security Standards Ready
U.S. Agencies, Technology Firms Set Guidelines to Protect Against Hacking
By Shannon Henry
In a high-tech, high-powered version of a neighborhood watch, a group of
government agencies and private businesses plan to announce today a common
set of standards and software to fight computer hacking.
The Pentagon, the National Security Agency, the National Institute of
Standards and Technology, and other agencies are joining forces with such
corporations as Intel Corp., Allstate Insurance Co., First Union Corp.,
Visa and Pacific Gas & Electric Co. to agree on technical actions to stem
computer fraud and theft.
"It's support for the homeland security strategy," said Clint Kreitner,
president and chief executive of the Center for Internet Security (CIS),
the nonprofit group of agencies and companies that is coordinating the
effort. "We forged a technical consensus."
The announcement comes as there is increased concern over computer security
since Sept. 11. Computer hacking, much of which has been caused by
mischievous teenagers, has become more pervasive and destructive. The
perceived threat of cyber-terrorism from countries or terrorist groups has
raised the stakes. Richard Clarke, who was appointed the nation's
cyber-security adviser late last year, has said he worries about a "digital
Pearl Harbor," where the country's vital networks could be attacked.
While some government agencies and corporations have installed rigorous
security provisions, others lag behind, failing to use even commonly
available patches. There has not even been a commonly agreed-upon set of
fixes to install; the decision about how a computer system will be
protected usually falls to the person in charge of installing the protection.
Representatives of those agreeing to the standards had an initial meeting
on April 18, said Kreitner, that was followed by a flurry of e-mails.
"The challenge here is to get the significant experts in this field to
agree on the steps to achieve security," Kreitner said. He admits that it's
not an easy task, which is why so few such agreements have been reached.
"Everybody has their own opinion," he said.
What the group came up with is a series of specific technical actions
designed to heighten security, recommended to all organizations that use
Microsoft Windows 2000, a common operating system, although not the newest
one. A software "scoring" program has been created by CIS members that
would then check to ensure those settings are in place. The software, which
also checks to see if patches are up to date, will be available free to
anyone who wants it, said Kreitner, although it's not currently aimed at
individuals. All CIS members, which cover many industries, were invited to
participate in the creation of the standards.
Several of the top technology executives in America, including Microsoft
Corp.'s Bill Gates and Oracle Corp.'s Larry Ellison, this year have said
they are also working to make their products tougher to break into.
Shannon Kellogg, vice president of the Information Technology Association
of America, a trade association, cautioned that the agreement would only be
successful if it concentrates on performance-based standards, not on
specific technologies that could stifle innovation. And, he added, it
requires much more communication.
*************************
Washington Post
ICANN to Finish Governance Reform in Oct., More Tech Policy Briefs...
The Internet Corporation for Assigned Names and Numbers (ICANN) will
finalize its plans for gutting and replacing its existing governance
structure in October. In a status report issued today, the internal ICANN
committee charged with steering the changeover said it would publish a
preliminary "implementation report" on or around Aug. 1, followed by an
Interim report Sept. 1, and a final plan due out Oct. 1. At a meeting in
Bucharest, Romania, last month, ICANN voted to replace its board of
directors, in the process abandoning a structure that allowed ordinary
Internet users to elect a portion of the ICANN board. An internal committee
will elect most of ICANN's board under the resolutions approved by ICANN in
June. ICANN manages the Internet's worldwide addressing system. The status
report is online icann.org.
-- David McGuire (07/16/02)
**************************
Washington Post
FCC Delays Cell Number Deadline
By David Ho
Associated Press Writer
Tuesday, July 16, 2002; 11:16 AM
WASHINGTON Cell phone users will have to wait longer to keep their phone
numbers when they switch carriers, federal regulators decided Tuesday.
The Federal Communications Commission for the third time extended the
deadline requiring carriers to allow consumers to keep their numbers. The
new date is Nov. 24, 2003, one year later than the previous deadline.
Congress said in 1996 that people can keep their traditional local phone
numbers when they change phone companies. The FCC said that year that
wireless carriers also would have to offer "number portability."
Verizon Wireless, Cingular Wireless, Sprint PCS and AT&T Wireless are among
the major cell phone companies opposing the requirement, citing cost and
technical hurdles. But others, such as Nextel Communications and San
Diego-based Leap Wireless, support the measure as a way for them to gain
customers.
The FCC decision Tuesday was prompted by a request from Verizon Wireless,
which petitioned the commission last year to eliminate the requirement.
Much of the wireless industry supported the petition.
The four FCC commissioners denied the petition, but had to compromise on
the length of the extension.
Commissioner Kathleen Abernathy said she wanted a delay that stretched into
2004 to give companies more time and to avoid draining their resources.
Commissioner Michael Copps said he wanted a shorter delay.
About 137 million Americans subscribe to cell phone services and about a
third change carriers each year, according to industry figures.
Travis Larson, a spokesman for the Cellular Telecommunications and Internet
Association, said those numbers show that not being able to keep phone
numbers is not preventing people from switching.
"Competition is alive and well," Larson said before the decision. His
industry group supported eliminating or delaying the FCC requirement.
But consumer advocates say not being able to retain numbers is one of the
biggest barriers preventing even more cell phone users from switching in
search of better service and prices.
"The idea that this won't benefit consumers is ludicrous," said Chris
Murray, an attorney for Consumers Union, the publisher of Consumer Reports
magazine.
Gilbert Crowell, an agricultural products salesman from San Marcos, Calif.,
said not being able to keep his cell phone number hurts his ability to do
business.
"They hold you hostage," he said. "I'm wedded to AT&T now and if I decide
Verizon or somebody else has a better deal for me I have to go through some
horrendous process of attempting to get people to know my new cell phone
number."
The wireless industry estimates that implementing portable numbers will
cost more than $1 billion in the first year and $500 million each year
after that.
"Maybe consumers would prefer that money be spent in building up networks,
filling in dead spots and reducing busy signals," Larson said.
Larson said the portability requirement was originally intended to increase
competition among traditional wireline carriers and should not apply to
wireless services, which already have a competitive market.
In 1996, the FCC required that wireless companies let cell phone users keep
their numbers in the top 100 U.S. cities by June 1999. But the agency gave
the carriers extensions, setting the deadline for later this year.
Many cell phone users outside the United States in places such as Britain,
Australia and Hong Kong already have the option of keeping their numbers
when they switch carriers.
On the Net:
FCC wireless bureau: http://wireless.fcc.gov
CTIA: http://www.wow-com.com
Verizon Wireless: http://www.verizonwireless.com/
*******************************
USA Today
Tech support: Not quite at our beck and call
Tom Mariam boasts an Ivy League education, but by his own admission is no
techie. So when the owner of a Port Chester, N.Y., communications firm
booted up his Dell and received a warning relating to a possible virus, he
hit "terminate" and attempted to boot the PC again. The same error message
popped up. Mariam wasn't sure what to do next.
Permit me to present to the court yet more evidence, if needed, of the
woeful state of support.
Mariam became an unwilling participant in the Blame Game. He called Dell,
which told him it was a software issue and he'd need to contact Symantec,
maker of the Norton AntiVirus software on his machine. But, Mariam says,
"You can only get help from Norton online. How do I contact Norton if I
cannot boot up my computer?"
Mariam finally used an old laptop to reach the Norton site, where he was
referred to a chat room "of people with similar but not the same problems.
It's useless, at least to an amateur like me," he says. "Eventually, after
many forced steps, you can send an e-mail to Norton, but there was a
warning that it could take several days to get back to you by e-mail" and
possibly longer, because of July 4.
Only after all this did Mariam stumble upon actual tech support phone
numbers and the fact that he would have to pay either a flat fee of
$39.95, or $3.95 per minute, to solve his problem that way. Mariam had
recently paid more than $20 to upgrade his virus protection for a year, so
he wondered, "Why should I pay for help?" He didn't. A friend eventually
bailed him out.
Sadly, most of us have been in Mariam's sorry shoes.
For all the steady advancements that have been made in personal computing
over the years, tech support still lags and might even be slipping. As PCs
evolve into digital darlings that do music, pictures, video and home
networking, the likelihood of a meltdown would appear to increase.
"People end up buying the cool toys that have a lot more functionality
built in, which makes them a lot more complex and (makes it) harder to
figure out what's wrong," says analyst Tony Adams with research firm
Gartner puts it. He believes, and I agree, that tech support staffers
should be involved in product planning and design processes. "What's
missing is a lot of advance thinking," he says. "That is the crime of the
century."
The aptitude test
When I informed Chris Monnette, who heads tech support for Symantec, about
Mariam's episode, he was surprised Dell didn't handle it. "Our arrangement
with them is that they would provide that support." (Blame Game, round
two.) Though the company provides free phone support for installation
problems or known defects, handholding on how to use or interpret the
program will cost you. "There's a certain level of computer savvy that we
expect the customers to have when using our products, and if they need help
beyond that, we have to charge for it," he says.
Come again? Folks should pass an aptitude test before pulling out their
wallets?
I'm certainly not out to finger Symantec its issues are emblematic of an
industrywide problem. Microsoft charges $35 per incident for phone help
with Windows or Office, though since the arrival of Windows XP, the fee
only kicks in on the third support incident. (You also get unlimited free
support during the installation.)
Microsoft reports that 97% of customer support contacts take place on the
Web these days. But "if you're a relative novice, you won't get near the
(Web) knowledge base," concedes Matt Fingerhut, director of Windows client
support, who says phone help is free on most Microsoft entertainment and
reference titles.
I am not naive. I recognize that providing phone support (and the requisite
manpower and infrastructure) is extremely expensive, and it doesn't help
that the economy is in the toilet. Indeed, Monnette says the average
support call dealing with just one particular virus last year exceeded 79
minutes and the longer the call, the more it hurts the business
financially. That's why most companies would rather have you seek
assistance on the Web. And for some lucky customers, that works out just fine.
But try explaining that to the poor schnook who paid for a working product,
only to get milked the moment the thing starts acting up.
I hear stories of frustration all the time. Having worked with countless
products over the years, I've experienced more than my share of
problems issues no sane person should be expected to comprehend. I'm
certain if I didn't have corporate contacts to harangue, and if those same
contacts hadn't been trying extra hard to make nice with me, I'd have spent
hundreds of dollars and thousands of hours keeping things running.
Fewer repairs needed
And yet there is some reason for optimism. Industry execs are mindful of
negative press and recognize the correlation between user satisfaction and
repeat business. "We know that if we spend a dollar on support, it comes
back to us in reduced marketing expenses," Gateway CEO Ted Waitt told me
recently.
The latest PC Magazine service and reliability reader survey, due on
newsstands in the next few days, reports that the average overall
satisfaction rating among desktop PC users (on a scale of 1 to 10)
registers a respectable 7.9.
Fewer machines require repair these days. Editor in chief Michael Miller
says increasingly stable operating systems, integrated motherboards, fewer
separate components, easier connections and color-coded ports are all
leading to improvements. "I'm not going to tell you it's perfect," he says.
"I don't think it is good enough."
By itself, desktop PC tech support rated a mediocre 6.7. That may reflect a
more dire condition when you consider that PC Magazine's readers are more
technically proficient than the market at large.
Among desktop PC makers, Dell continues to be the perennial service and
reliability champ. But even Dell is slipping: Its notebooks dropped to a B+
from last year's A, and some respondents complained that Dell's phone
staffers speak English poorly. (In an effort to cut costs, many companies
"outsource" phone centers overseas.)
Dell also received worse than average scores on "in-warranty" repairs. I've
noticed that Dell is scrimping on the length of warranties supplied with
some models.
The results are even more daunting for the newly combined Compaq and HP.
Measured separately in the survey, Compaq received an E (failing) for its
desktops, with HP a barely better D-.
What kind of service should an end user ultimately expect? Says Waitt:
"What's realistic is that if you have a problem with a PC, you have some
great tools online and get it resolved quickly, (or) if you engage in a
chat session you get a response very quickly. If you want to pick up the
phone, your call should be answered within five minutes, guaranteed."
Waitt says Gateway is besting those marks already, on average, with most
people (but certainly not everyone) getting their issues resolved on the
first call. I trust those of you who haven't been rescued quite as swiftly
will let Gateway (and any other company) know loudly.
************************
USA Today
Maker of Web pop-up ads loses ruling
RICHMOND, Va. (AP) A California software company must stop delivering ads
that pop up unauthorized when surfers visit the Web sites of several
prominent media companies, a federal judge has ruled.
U.S. District Judge Claude Hilton in Alexandria, Va., issued the
preliminary injunction Friday in a lawsuit that 12 media companies filed
last month against Gator of Redwood City, Calif.
The plaintiffs, including parents of The Washington Post, The New York
Times and USA Today, accused Gator of parasitic behavior.
No date has been set for trial.
Janet Collum, an attorney for Gator, said company officials were
considering an appeal of the injunction, confident it will win the case at
trial. "We believe strongly that the facts and the law are on our side,"
she said.
Gator, which runs an ad network that claims 22 million active users and 400
advertisers, produces pop-up ads that appear when computer owners with its
software browse Web sites targeted by Gator's advertisers.
Internet users get Gator advertising software when they install a separate
product for filling out online forms and remembering passwords. Gator also
comes hitched with free software from other companies, including games and
file-sharing programs.
As users surf the Web, Gator runs in the background and delivers
advertisements on top of what the surfer would normally get at a site.
Terence Ross, an attorney for the plaintiffs, said the court injunction "is
an indication that the judge thinks our case does have merit."
The publishers claim Gator's practices lower their advertising revenue by
directing Web surfers to competitors' sites, hiding legitimate ads and
offering deals that directly compete with those of the site's paid advertisers.
Ross said Gator's practice also "causes a loss of content control," noting
that Gator ads might conflict with stories on Web sites and potentially
create an appearance of journalistic bias or incompetence.
But Gator likens its practice with having multiple windows from multiple
applications open at once: To ban its ads would be to ban running instant
messaging and a Web browser at the same time.
Last year, the Interactive Advertising Bureau threatened to file a
complaint with the Federal Trade Commission over Gator's selling of ads
that block out the banner ads displayed on other Web sites.
Gator responded with a federal suit in California against the trade group,
seeking the court's declaration that the practice was legal. Gator
ultimately agreed to stop the practice, and the lawsuit was dismissed.
The 12 plaintiffs in the current case against Gator are Washington Post
Newsweek Interactive, Gannett Satellite Information Network, Media
West-GSI, the New York Times Company, the Boston Globe Newspaper Company,
Dow Jones, Smartmoney, the Chicago Tribute Interactive, Condenet, American
City Business Journals, Cleveland Live, and Knight Ridder Digital.
****************************
Government Computer News
White House's IT strategy emphasizes info sharing; pilot projects named
By Joab Jackson
Washington Technology Staff
Information sharing and data mining will be integral IT components of the
White House's newly released national strategy for homeland security, said
Steve Cooper, chief information officer of the Homeland Security Office,
during a July 16 administration briefing. Cooper also said three new pilot
projects have already been identified by the office to ramp up new
technologies.
In this briefing, Cooper stressed the need for information sharing and data
mining tools to track potential terrorist behavior.
Cooper said the administration is looking to a "capture once and reuse
many" approach to data gathering, meaning data will be shared among
agencies. The proposed office would employ a business-focused
enterprisewide architecture to facilitate data sharing within the
department and with other agencies.
Cooper said the department would develop guidelines for other agencies
acting as "primary guardians" of data. Data mining would also be a central
IT function for homeland security, according to Cooper. "What we're talking
about is pattern recognition, or the use of software intelligent agents to
peruse data, [which are] driven by algorithms and rules that define
themselves over time," Cooper said. Such tools "can marry statistically
derived outcomes from known events to predictive models."
Cooper said the proposed department would take on several pilot projects to
test emerging technologies for large-scale use. Three projects have already
been approved "by the equivalent of the deputies and assistant secretaries
in the relevant agencies," he said. They are:
*A project led by the Florida Department of Law Enforcement for law
enforcement agencies across 10 states as well as federal agencies to share
criminal information. Analytical tools would also be incorporated into this
system. This project would have an estimated cost of around $10 million.
*A consolidation of lists of suspected terrorists that are kept by civilian
and defense agencies. Cooper said this project would cost under $1 million.
*A homeland security portal for states and local law enforcement agencies
to obtain more information on topics such as critical infrastructure. This
project would likely cost in the range of "a couple hundred thousand
dollars," Cooper said.
Cooper did not have an estimate of the proposed department's IT budget,
though Mark Forman, associate director of information technology and
e-government for the Office of Management and Budget, said at the
conference that budget could be estimated as being between $1 billion and
$2 billion.
The national strategy, unveiled by President Bush, describes the defense
mechanisms the United States should put in place to defend against nuclear,
radiological, biological, chemical and cyberattacks. It also further
defines the duties of the administration's proposed Department of Homeland
Security.
A copy of the report can be found at
www.whitehouse.gov/homeland/book/nat_strat_hls.pdf.
**************************
Government Computer News
Navy steams forward on XML standardization
By Patricia Daukantas
Less than a year into the Navy's effort to standardize the use of
Extensible Markup Language, the service's XML working group recently
published the second edition of its developers' guide.
Since May 1, Navy developers have had Version 1.1 of the 41-page guide that
the working group published last November as Version 1.0. Both are
available online at quickplace.hq.navy.mil/navyxml.
The Navy is committed to participating in XML standards organizations, said
Michael Jacobs, data architecture project lead for the Navy CIO's office.
The service has already joined the Organization for the Advancement of
Structured Information Standards and is applying for membership in the
World Wide Web Consortium.
Jacobs spoke yesterday at a government-industry meeting for XML developers
hosted by Mitre Corp. of Bedford, Mass.
It's critical for the Navy to stay involved in development of the
standards, because the Defense Department has a history of having to modify
off-the-shelf applications after they are acquired, Jacobs said.
The Navy's XML group, established in August 2001, attracts 50 to 60 Navy
personnel to its meetings, Jacobs said. The group's near-term goals include
drawing up an XML implementation plan and documenting the requirements for
a Navywide repository of XML schemas and code.
In the developers' guide, the Navy aims to present a balance between being
overly restrictive and being so loose that developers use nonstandard
components at their discretion, said Brian Hopkins, an engineering
consultant working with the Navy CIO's office. It's supposed to provide
general guidance on XML component selection, component naming conventions
and design of XML schema.
**************************
Government Executive
FBI says it's making progress on technology upgrade
From National Journal's Technology Daily
The FBI is nearing completion on two of three major steps to improve its
information infrastructure, FBI project management executive Sherry Higgins
said in written testimony at a Tuesday hearing of the Senate Judiciary
Administrative Oversight Subcommittee.
The agency has purchased new printers, scanners and workstations, and
updated Microsoft Office software at all field offices as the first part of
its "Trilogy" program, Higgins said.
The second part, which involves the creation of a higher-speed network both
between and within FBI buildings as well as new encryption programs, is
scheduled for completion in March 2003, back from a previous date of July 2002.
Under the final component, the agency will merge five software applications
into a Web-based virtual case file aimed at easing navigation.
Higgins said the program would improve methods for manipulating documents
and sharing information. The first part of the Web application should be
released by December 2003.
****************************
Computerworld
FBI expects two-year wait to replace old computers
WASHINGTON -- The FBI is moving aggressively to replace an antiquated
computer system that uses green screens with no click-and-point capability,
but it will still take two years to complete the project, a bureau official
told a Senate committee today.
The two-year estimate is better then the original timeline that put the
completion date at three years. But June 2004 is still too long to wait for
U.S. Sen. Charles Schumer (D-N.Y.), chairman of the Judiciary Committee's
Subcommittee on Administrative Oversight and the Courts.
"Given that this should be one of the highest priorities that America has,
it's still going to take us a couple of years," said Schumer. "It seems
like an awfully long time given how important this is."
Sherry Higgins, who was appointed last March to head the FBI's IT project
upgrade initiative called Trilogy, agreed that it was an "extremely long
time" but said, "The right solution takes a longer time then to just get a
solution."
The FBI was nonetheless working to get some upgrades completed quickly,
including improving the ability of agents to search databases. The FBI
system's search engine can't handle complex searches with multiple words.
One problem hurting a speedy implementation is a lack of documentation on
existing systems, said Higgins.
Higgins, in her testimony and by demonstration, showed what the FBI's new
interfaces would like -- point-and-click interfaces, with pull-down menus,
an interface that would look familiar to anyone who shops online.
The FBI's effort would also link all of its major criminal databases, and
Higgins, a former CIO at Lucent Technologies Corp., said talks were under
way with other federal agencies to ensure that the systems architecture
would facilitate interoperability.
Schumer also called for a private-sector advisory board, comparing it to
the oversight now sought for accountants. "It's good for the accountants to
have somebody else looking over their shoulders, giving advice," he said.
Higgins said she "totally supports" the idea, as does the FBI director.
The FBI is receiving $507 million in this fiscal year for IT, an increase
of 127% from the previous year's budget of $223 million.
************************
Computerworld
Bush plan supports states in developing driver's license standards
WASHINGTON -- The White House's new homeland security strategy calls for
uniform standards for driver's licenses but doesn't offer the road map that
technology companies and the police would ultimately need for accessing
license data.
Instead, the National Strategy for Homeland Security report, released
today, calls on the federal government to support a state-led effort to
develop minimum license standards.
As increasing numbers of states encode data on driver's licenses, more
businesses are scanning encoded data to authenticate the card and the
holder, although the technologies vary. Business groups want a single
standard for encoding that data.
"Without a single standard, you have a real interoperability problem," said
John Hervey, chief technology officer at the National Association of
Convenience Stores in Alexandria, Va. Different standards can mean "a
nightmare for retailers in terms of equipment and software."
The White House report said that al-Qaeda and other terrorist groups have
exploited the absence of standards for content, format and issuance of
licenses. About 45 states use magnetic stripes, bar codes or both
technologies on driver's licenses.
It's unclear what effect the White House's push for more secure driver's
licenses will have on existing efforts to improve driver's license
security. Since Sept. 11, there has been strong interest in developing a
driver's license that includes a biometric component, possibly a fingerprint.
In January, the American Association of Motor Vehicle Administrators in
Arlington, Va., said it had begun work on unifying licenses and is
developing a recommendation. And in the U.S. Senate, Sen. Richard Durbin
(D-Ill.) has introduced legislation seeking minimum uniform standards for a
driver's license. In the House, two Virginians, Reps. Tom Davis, a
Republican, and James Moran, a Democrat, have introduced legislation
calling for a biometric-enabled smart card. Their bill seeks more than $300
million to help fund that initiative.
With time running out in this session, however, lawmakers aren't expected
to act on either bill this year.
Despite the absence of federal action, there are clear technology trends
among states.
Two-dimensional bar codes are gaining ground over magnetic stripes, with 37
states using them, according to the motor vehicle administrators
association. Twenty states use magnetic stripes, but some use both
technologies.
Advocates of 2-D technology, such as Dennis Nussbaum, a top official in
Wisconsin's Division of Motor Vehicles, say the bar codes are more durable
than magnetic stripes, hold more data and can be easily used on other
documents.
Pennsylvania last year added 2-D bar codes to its driver's licenses but is
continuing to use magnetic stripes to give technology options to law
enforcement agencies and retailers, said Joan Nissley, a spokeswoman for
the Pennsylvania Department of Transportation.
Symbol Technologies Inc. in Holtsville, N.Y., developed the 2-D technology
standard. One of the attractions of 2-D bar codes is their storage
capability; each can hold 1,108 bytes of data. Magnetic stripes have a
maximum capacity of 210 bytes. With the likelihood that states will move to
biometric identifiers -- possibly as a result of a federal law -- 2-D bar
codes might be more appealing because of their storage capacity.
But the magnetic stripe may not be out of the running.
MagTek Inc. in Carson, Calif., has developed a higher-density standard for
magnetic stripes that would increase capacity to 1,836 bytes. The standard
has already been submitted to various approval bodies.
Kiran Gandhi, vice president of marketing at MagTek, said the appeal of
magnetic stripes is that most businesses have readers for them.
Magnetic stripes put data on three tracks; the data that businesses scan is
on Tracks 1 and 2. The high-density standard uses six tracks, and a new
reader would be needed to access that data, but the first two tracks would
be backward-compatible, said Gandhi.
A smart card, which contains a microprocessor, can hold up to 64,000 bytes
of data and can offer high security, as well as storage for many other
applications, such as health and motor vehicle insurance. But states say
the technology would cost millions to deploy and would take a push in
Congress for funding, said Randy Vanderhoof, CEO of Smart Card Alliance
Inc. in Princeton Junction, N.J.
***************************
MSNBC
Government to the cyber rescue?
Computer security standards unveiled
ASSOCIATED PRESS
WASHINGTON, July 16 Creating a "Good Housekeeping" approval seal of sorts,
the government is releasing standards and a software program that will help
computer users configure their systems for maximum security against hackers
and thieves.
THE PROGRAM will be made available free to anyone and mandated for
some federal agencies.
The Pentagon, National Security Agency and other agencies will join
with private partners Wednesday in announcing the security standards for
computers that run Microsoft's Windows 2000. The operating system is
commonly used by businesses and government.
The seal of approval comes in the form of a small program that
probes computers for known security flaws and makes suggestions on how to
eliminate holes used by hackers.
The unprecedented effort will have immediate impact.
All Defense Department computers will have to meet the standards
immediately. The White House is considering making the rest of the
government follow suit.
Experts say the keys to success will be extending the standards to
home and business users, making them simple enough for the public to
understand and ensuring they stay ahead of increasingly sophisticated
computer attackers.
"If it's just government, it won't have as much value as if it's
government and the private sector," said Richard Clarke, President Bush's
computer security adviser.
The private partners in the project have their eyes set on
broadening the standards to other operating systems, including the Windows
products most commonly used at home.
"It's a massive problem," said Clint Kreitner, head of the Center
for Internet Security, a nonprofit partnership of companies and American
and Canadian government agencies. "They slap their systems on the Net and
get ready to go, then wonder why they get breached in the next 10 minutes."
The effort has brought together some of the biggest names in
business, including computer chipmaker Intel Corp., Chevron and Visa part
of the group that helped create the standards and is encouraging their use.
Microsoft, which is embarking on its own efforts to makes its
software more secure, has reviewed the standards and made suggestions.
The standards have developed slowly, in part because security in
the past frequently has been handled through technical security bulletins
written for engineers.
"You'd give a 200-page document to a system administrator, and say,
'Have a nice day,"' Clarke said. "So no one did it."
The breadth of the problem is staggering. The technology research
firm Gartner recently projected that through 2005, 90 percent of computer
attacks will use known security flaws for which a solution is available but
not installed.
WORRIES OVER TERROR CYBERATTACKS
Most recent attacks were written and released by bored youngsters
testing their skills, but the government is becoming more concerned about
organized attacks against federal computers from terrorists or foreign
governments.
Several government agencies have had their own security standards
for some time. What is new about Wednesday's announcement is that the
various agencies have agreed on a single standard a difficult task that
occurred about three months ago.
Experts at the CIS, the NSA and Commerce's National Institute for
Standards and Technology had three different candidates for standards at
first. On April 18, the authors met in a room at NIST offices in Maryland.
"They were told they could leave as soon as they came to an
agreement," said Alan Paller of the Sans Institute, a research and
education group involved in the announcement.
That night, they had a document several hundred pages long
describing how to make Windows 2000 secure, but still usable.
That was only half the battle, though. Clarke, the White House
adviser, said they wanted to make it easy for federal network engineers to
make the changes.
To fix that, the government created the software tool that grades
computer security so that everyone, from the engineers to top executives,
understands how secure their computers are. The tool then recommends changes.
Some government agencies, including the Air Force, plan to use
their procurement power to require that vendors offer more secure versions
of their software based on the standards.
"Now we can go to Microsoft and others to say that this is our
common set of expectations," said Jhn Gilligan, the Air Force's chief
information officer. "Right now, we're doing the work."
© 2002 Associated Press. All rights reserved. This material may not
be published, broadcast, rewritten or redistributed.
*****************************
BBC
Switch on for state snooping
From August net service providers in The UK will be legally obliged to
carry out automatic surveillance of their customers' web habits.
Controversial laws passed in 2000 oblige large communications companies to
install technology that allows one in 10,000 of their customers to be watched.
The information gathered about the websites that people visit, who they
exchange e-mail with and who they call on the phone will be passed to the
police or a government monitoring station.
The demands have been criticised by experts who say the law conflicts with
basic guarantees of privacy and that the government is not doing enough to
help pay for the installation of the surveillance systems.
Data hoover
The controversial Regulation of Investigatory Powers Act was passed in
October 2000 and gave law enforcement agencies sweeping powers to snoop on
the electronic lives of citizens.
The Act demands that organisations it dubs Communication Service Providers
(CPS) - broadly anyone that helps people keep in touch via the web, fax
machine or phone - install technology that can automatically monitor what
many of their customers are doing.
It also demands that service providers start monitoring a customer within
24 hours of being told that the police or other investigation agencies want
to snoop on them.
The information collected must also be passed on electronically to the
agency which asked for the snooping to start.
A spokeswoman for the Home Office said 1 August was the day on which the
new surveillance regime would start, even though the snooping systems are
yet to be installed.
"It will just mean that police can go to CSPs and say we want information
on this person," she said.
Data delivery
Roland Perry, public policy director for the London Internet Exchange which
interconnects the networks of net service companies, said the government
was still working out how best to put the surveillance systems in place.
"It's a very long-term project," he said. "The whole thing will be done on
a one-to-one basis with the individual companies concerned."
The government is also currently working out what types of information it
wants from CSPs and how it will be delivered.
"In theory, an interception capability would deliver all the data," said Mr
Perry. "It's the internet equivalent of a telephone tap."
The government is hoping that its work on automatic surveillance will
become a European standard and be widely adopted.
Costly communication
Service providers have asked for help to buy the equipment needed to set up
the permanent interception capability.
"The Home Office has said it would contribute £20m to this but the net
industry has said it will cost a lot more than that," said Ian Brown,
director of the Foundation for Information Policy Research.
The Internet Service Providers Association has warned about the potentially
huge costs of installing surveillance equipment to meet the demands of the
RIP Act and the recently passed Anti-Terrorism, Crime and Security Act.
A spokesman for the organisation said it was still seeking clarification
over the types of data its members were supposed to be catching, how long
it had to be stored for and who would pay for the storage.
Mr Brown said one of the few safeguards on the snooping system was the fact
that the agencies asking for the surveillance to be carried out will be
charged to use it.
"This means agencies have to make a judgement whether it's worth making a
request if costs a few hundred pounds to do it," said Mr Brown.
***********************
BBC
E-vote election 'by 2006'
E-voting could replace the traditional ballot box by 2006, a UK Government
report has suggested.
Online polling, accompanied by postal votes and voting by telephone, would
replace ballot papers and ballot boxes under the plan.
Commons leader Robin Cook has put the proposals, which would mean all votes
being counted electronically, out for consultation.
Cash was made available in Chancellor Gordon Brown's spending review to
develop e-voting with a series of pilot projects over the next three years.
The report says: "A programme to achieve successful implementation of
e-voting is under way to ensure that robust systems can be in place for an
e-enabled general election after 2006."
Pilot projects over the next two years could involve voting via digital TV,
telephones and text messaging.
The report says action needs to be taken to encourage more people to vote
amid fears about political apathy.
'Invigorate'
In last May's local elections, turnouts increased in areas where voters
were given the chance to vote by post, at the weekend and electronically.
Mr Cook said he hoped the proposals would "invigorate debate" on using
technology to aid the democratic process.
He said the Green Paper would set out the government's aim of using new
technologies to "promote, strengthen and enhance our democratic structures".
"Information and Communication Technologies (ICT) provide a means to
increase public participation, and we hope that with an active government
policy the potential benefits can be maximised," he said.
A spokesman for the Work Foundation's iSociety project welcomed the news.
'Sickly politics'
"This paper is an important step forward, and puts Britain in pole position
to capitalise on opportunities to use new technology to improve the
workings of democracy.
"However, the government now needs to think even bigger.
"eDemocracy needs to be more than an elastoplast for a sickly politics."
Technology alone could not reignite interest - there was a need for
"genuine new thinking and changing the way that politics is run" the
spokesman added.
"Basically, if people don't want to vote, and aren't interested in
participating, the fact that they could do it online will make no
difference at all."
************************
Euromedia.net
Computers more costly due to recycling laws
12/07/2002 Editor: Cathy O'Sullivan
A European directive that will make the manufacturers of personal computers
responsible for what happens to old machines when customers upgrade, could
result in computers becoming more costly.
Experts fear that the cost of disposal and recycling and research into new
ways to dispose of the obsolete hardware could push up the price of
computers. Some in the industry warn of E50 hike per computer when the EU
environmental laws come into force.
According to the BBC, officials at The Department of Trade and Industry
estimate that the total bill to British industry of the directives could
top GBP3bn (E4.7bn).
The Waste from Electrical and Electronic Equipment directive covers
recycling of equipment such as computers, and the Hazardous Substances in
Electrical and Electronic Equipment Directive would ban certain substances
used in the manufacturing of IT equipment.
***********************
Wired News
Getting a Pixel Fix on the Enemy
By Erik Baard
Our culture thrives on simultaneously preserving data over eons and
cramming it through a pipeline in a blink. Now two mathematicians working
for the U.S. Navy have developed an algorithm that promises to do a bit
with both, aiding experts who need to see the world through the eyes of old
artistic masters and killer robots alike.
The Office of Naval Research is funding the work of Guillermo Sapiro, of
the University of Minnesota, and Andrea Bertozzi, of Duke University. The
Navy is motivated to dispel the "fog of war" -- making sure visual
intelligence is complete and in a form suitable to the human eye, as well
as available in real-time.
Transmission troubles can corrupt the data of digital images and video,
leaving images blurry or blotchy. Compression to save bandwidth can also
degrade images. Sapiro and Bertozzi, an expert in fluid dynamics, recover
lost information in its most probable form by extrapolating on the color,
shading, lines, and other qualities of the region surrounding the gap.
"The algorithm is automatic. It looks at the gray values and gradients
(edges) of the pixels surrounding the hole," Sapiro said in an e-mail. "In
simpler words, both the color/intensity and the borders. These borders are
continued inside the hole."
Art restorers often deal with images made incomplete by stains, rips,
scratches or flaking paint. These experts take days or even months to
"inpaint" a bridge across the gaps to create a consistent image, using
knowledge and subjective intuition in what is an ancient craft.
In the world of mathematics, that's called "partial differential
equation-based interpolation of lost image regions," and it's done at
lightning speed and utterly objectively. By contrast, a software program
like PhotoShop digitizes the process but doesn't change the essentials of
inpainting.
For the Navy, apart from correcting faulty images, this new form of
inpainting could dramatically cut back bandwidth demands in the field by
having crude blocks of basic information sent from a source, with a machine
on the receiving end sharpening and filling the image with the algorithm.
In what's sure to get them e-mailed images of UFOs, grassy knolls and
Nessie, the researchers say the technique might be applied to photo
enhancement.
But some of Sapiro's image alterations leave the viewer wanting to reach
for his or her Photoshop stylus. The larger a filled-in gap is, the
smudgier it seems to be. The program ably removes text from a distant
image, revealing a clean photo underneath, because details are hard to
discern anyway. But close-ups of larger obstructions or gaps leave a
ghostly blur, almost as if the neighboring pixels are watercolors bleeding
into the void.
"In many cases (we) perform perfect, in many not. We follow basic rules
used by restorators. But in (a) half-minute/minute, we do not get always
what restorators do in days/months. Sometimes, the restorator has to
briefly go over our results, and use them just as a hint or as a starting
point. "It can be a fully automatic tool for some cases and a helping tool
in others," Sapiro said. The program sees only pixels - it still takes
organic intelligence to discern an artist's intent, or to mimic style like
the scintillation of a Klimpt or the folds of fabric in a Vermeer.
"This is a really interesting question," Bertozzi said. "My group at Duke
is just starting to explore, on a more rigorous mathematical level, how to
quantify this more precisely. The methods we are using are based on very
nonlinear processes for which such questions are an active area of research
in ... the physics community."
But there can still remain a sore need for human judgment - in one image a
bungee cord is removed so the subject appears to be flying over river.
Sadly, the jumper still has a pronounced wedgy lifted toward the camera.
"We never claimed, not in our publications and not in our talks, that we
perform 100-percent perfect," Sapiro concedes.
**************************
News.com
11 vie for .org name
By Paul Festa
A key Internet decision-making body is weeks away from naming the new
guardian of one of the Internet's oldest and most popular domains.
The Internet Corporation for Assigned Names and Numbers (ICANN) is poring
over 11 applications to decide who will take over the .org registry from
VeriSign.
VeriSign's Network Solutions division has had custody of .org since the
U.S. government awarded it the contract for domain name administration a
decade ago.
Applicants to take over .org include the Internet Society (ISOC), in
partnership with Afilias, IBM, Ultra DNS and DSI Technology Escrow
Services; the Register.com subsidiary Register Organization; and the Union
of International Associations, which is affiliated with VeriSign.
ICANN, a nonprofit, private-sector corporation, was formed in 1998 with the
mandate to introduce more competition into the market for domain names.
That involved breaking Network Solutions' monopoly control over the three
primary top-level domains: .com, .net and .org.
In March 2001, VeriSign agreed to relinquish .net and .org. ICANN
subsequently issued a call for applications to take over .org as of Jan. 1,
2003.
Through the end of the year, VeriSign retains control of the .org registry,
essentially giving it wholesale rights over .org addresses. Its rights to
the .com registry are good through 2007.
VeriSign's successor in controlling .org will be chosen by ICANN's board of
directors. Advising the board is ICANN's Domain Name Supporting
Organization, in particular that organization's noncommercial domain name
holders' constituency.
ICANN is scheduled to post evaluations of the 11 applications on July 22
and to announce a successor to VeriSign on Aug. 1.
************************
Network Digest
Consumer Federation Warns that FCC Policies Threatens ISPs
The FCC's broadband proposals threaten to wipe out independent ISPs,
according to a new study by the Consumer Federation of America. The report
highlights anti-competitive practices in advanced networks, including
architectural barriers and restrictions on services imposed on the
independent ISPs by the incumbent operator.
http://www.consumerfed.org/backpage/070102_broadband_release.html
*************************
Network Digest
No Changes to FCC's "Universal Service" Definition
The FCC received a recommendation that no new services should be added or
removed from the definition of services supported by "universal service."
The main issue under discussion had been whether advanced or high-speed
services should be included within the list of core services supported by a
federal universal service fund. A Federal-State Joint Board on Universal
Service, which was composed of three state regulatory commissioners and
three FCC commissioners, found that no new service satisfies the statutory
criteria of the Communications Act of 1934. The Board concluded that the
public interest would not be served by expanding the scope of universal
service at this time. The Board reasoned that high-speed service is not
"essential" to consumers because online resources are available by voice
telephone, dial-up connections and in public libraries and schools.
Moreover, a substantial majority of consumers so far have chosen not to
subscribe to high-speed services where they are available. The Board
further cited a heavy federal financial burden to include high-speed access
as part of universal service, especially in rural areas. An expansion of
universal service would also violate the principle of competitive
technology neutrality (DSL vs. cable). However, the Board was split on the
issue of equal access of fundamental telecommunication services to all
Americans.
http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-02J-1A1.pdf
*************************
Earthweb
A Conversation With The Inventor Of Email
By Sharon Gaudin
Ray Tomlinson gave society one of the greatest communication tools in
history. He invented email back in 1971 -- essentially fostering global
business communication and turning the Internet into a digital kitchen
table for far-flung family members.
The MIT grad is one of the forefathers of the Internet, working on ARPANET,
the forerunner to the Internet, along with workstations, super computers
and a slew of protocols.
But email may be his greatest legacy -- if not the toughest project he's
ever worked on. Alexander Graham Bell became a household name -- someone
children learn about in school -- because he invented the telephone. But
consider that in this high-tech era there are more emails sent every day
than telephone calls. That definitely gives Tomlinson his own place in
history, if not a life of fame and fortune.
In this Q&A, the man who was honored earlier this year for a lifetime of
innovation by Discover magazine, says he's irked by spam and hopes for a
technical solution. He also talks about his vision for the future of email,
dismisses claims that he's changed society and updates us on the
distributed computing project he's working on today at BBN Technologies in
Cambridge, Mass., where he's worked for the past 35 years and is their
much-lauded principal engineer.
Q: What was your vision for email, and has the reality of it lived up to
your expectations?
I'm not sure there was a vision there. It was a hack -- a neat thing to try
out. ...It probably took four, five, six hours to do. Less than a day
spread over a week or two -- when I had a spare moment. The idea was this
facility had proved its usefulness sending messages to the same computer.
What about when someone was on another computer, maybe across the country?
It would be like the telephone but they wouldn't have to be there to answer
the phone.
Q: When did you realize how big email was going to be?
It never seemed big at the beginning because there weren't many computers.
It was only as big as the network. It depended upon having people with
access. As an idea, it caught on right away, but there were so few people
on the network... We didn't call it email. If we called it anything we
called it mail or messages. The contrast with snail mail wasn't necessary
then... I never documented the creation of the program. In 1993, someone
started to ask where email started. I knew I had done the program... but
later various people came along and there were a lot of additional ideas
that went into it.
Q: How many email addresses do you have?
I have three that I use and three that I don't. They're three
come-along-for-the-ride email addresses that you get from an ISP.
Q: How do you feel about spam and what should be done about it?
I get irked when I get spam. It's a tough problem and I'd like to see a
solution come along. So far the solutions aren't working. Either they
filter too much or they're not effective when they should be. They don't do
what humans would do. Why did that email come through? And why didn't that
legitimate one get through? No, I don't think legislation will work. I hate
legislative solutions. It just doesn't sit well. I'd like to think people
have the common sense not to spam, but obviously they don't. It's still
possible we may have a technological solution for it. I would like to see
that. I'm not spending any time on it myself. The other stuff I'm working
on now is more interesting to me. I didn't have any association with email
after the late '70s. I watched it from afar but I didn't participate.
Q: How do you see email evolving? What will it look like 10 years from now?
If it doesn't get killed off from spam, it probably won't be a lot
different. You may see it more closely integrated with other forms of
communication, though, like instant messaging. Once email is answered, you
could continue the conversation more immediately, like with instant
messaging. Simultaneous correspondence is a lot better than a few emails in
a few hours. Or maybe you'll get an email and press a button and make a
phone call... not with Verizon, but over the Internet. People would like
more seamless interaction between the tools. They don't like being in a
particular mode and having to switch to another. I want to specify what I
want to do. I don't care how it happens... Bandwidth will go up. DSL is
becoming more common. Cable modems are more common. Technology there will
improve those services.
Q: What do you think of instant messaging?
I don't use it myself. I got turned off when I installed some browser that
insisted with cluttering my screen up with instant messaging. The closest
I've come to IM is some chat services. They were not fast enough. They
weren't instant to me. I think people who use it are very happy with it. It
fills an important niche.
Q: What can be done to make email more secure and cut down on the
distribution of viruses and worms?
The insecure part of email is not something you can fix with technology.
It's just so convenient. You can have an attachment in an email that does
something for you. The attraction with that tempts people to click on an
application... and get a virus. Anything you can think of to tag that as a
virus is not going to be used. You'd have to have the cooperation of the
hacker for that to work. And if your ISP threw away every attachment, that
wouldn't work because email would lose its utility as a communication tool.
Q: A lot of people say email has changed society. Do you buy into that?
I think there will never be an answer to that. It's had an effect. I don't
think people are fundamentally different now than they would have been.
They simply communicate more. Maybe they've made friends and maintain
relationships that they wouldn't have. But bad guys are still bad guys.
Good guys are still good guys. Friendly people are still friendly. Just
because they can be friendly over email and not a telephone [isn't that
much of a difference]. You just have a larger community to draw from. If
you have problems or are looking for answers, you have additional
opportunities to find those answers. It's like having a library in your
hometown or not. If it's not there and you have to make a trip to another
town, you might not do it. You can tap into resources more readily. People
have found answers to questions and email has been part of that solution.
Q: Is high-tech research as exciting to you now as it was back in the late
'60s and early '70s when you were working on ARPANET and email?
Yeah, the subjects are different. This may be more exciting because there's
so much happening all at once. We have this wonderful tool - the Internet.
It's been around in one form or another since about '74. That's when the
first networks were hooked together. It's just a wonderful resource. Think
of ways to hook things together. Think of ways to get information.
Q: What are you working on now?
Distributed systems that use tools in various places around the country and
work out solutions to problems. Trying to get it to happen is a challenge,
but getting it to happen is tremendous. The system is based on agents,
which are software applications that have certain expertise to work out
solutions, like scheduling. Other agents know how to take a problem and
break it down into smaller problems. They talk with each other and give
each other answers. One agent will have access to specific information so
it will be able to answer specific questions. We're actually working on
solving the Department of Defense's logistical problems. We have a
particular focus, but the overall techniques are general and could be
adapted to other scenarios... We're working on both Linux and Windows and
it's written in Java so it's relatively platform independent.
Q: Does it bother you that Ray Tomlinson is not a household name despite
the contributions you've made?
No, it doesn't bother me. It's a geek thing. Computer nerds know that I've
done this. I've gotten emails from individuals who've run across this fact.
They say, 'It's great what you did. Why don't you do something about spam?'
I'm not a household name. I wouldn't say it has brought me no fame and
fortune, but it's not what most people think of when you say those words.
It's kind of neat to have people talking about what you did and have people
interested in it. It's not the center of my life.
Q: What is the center of your life?
I'm not sure I have a center. I just do what I do. I play around with
computers and do some music and a little golfing.
Q: Was email the biggest thing that you've worked on?
I think there were bigger things -- things that took more effort. The
workstation that I designed and built back around 1980 -- that was the
biggest single thing I've done. It was a two-year effort. And it worked and
it was useful. We never tried making a product out of it but it did serve
our researchers... It was fun playing around with the super computer
design. It didn't pan out, but it expanded my own knowledge. Everything has
been interesting. I can't single out any one thing.
Q: What else interests you right now?
I read about anything I can get my hands on, from biology to archeology. I
see none of these as something I'll directly work on... but biological
computing is intriguing. And I'm interested in quantum computing too.
************************
InformationWeek
New Sun Products Comply With Liberty Alliance Standards
Identity Server 6 and Directory Server 5.2 are compatible with the
specifications, which promise interoperability between systems to enable
opt-in account linking and simplified user sign-on capabilities.
By Larry Greenemeier
Sun Microsystems on Tuesday introduced Sun One software and services that
are compliant with the new network-identity specifications disclosed Monday
by the Liberty Alliance Project.
Sun's Identity Server 6 and Directory Server 5.2 are compatible with the
specifications, which promise interoperability between systems to enable
opt-in account linking and simplified user sign-on capabilities. The
specifications encourage technology providers to use Security Assertion
Markup Language to exchange user credentials between applications that
exist within a company or between companies. Sun is also providing Security
Hardening Service and Security Assessment Service for Firewall DMZ as part
of its new Sun One network identity solution.
The new identity and directory servers are part of the Sun One Platform for
Network Identity, which is sold in Enterprise and Internet editions. The
Enterprise Edition, which was unveiled in March, is designed to manage up
to 10,000 online identities inside the firewall, and the Internet Edition
is designed to manage up to 250,000 online identities outside the firewall.
The Enterprise and Internet Editions are priced starting at $149,995 and
$999,995, respectively.
The primary advantage to standards-based single sign-on technology is that
it lets users access multiple applications while signing on once, says
Shawn Willett, principal analyst at Current Analysis. For example, anyone
logging on to an airline Web site to book reservations can move easily to
rental car and hotel reservation sites without interrupting the online
transaction because the user data is available to each site.
It's unclear when this will become the pervasive model for E-business.
Sun's membership in the Liberty Alliance positions it to move quickly to
adopt the organization's recommendations. By the end of the year, Novell
will have network-identity management software code-named Saturn that's
based on Liberty Alliance specifications. IBM's plans are not clear, and
Microsoft has no plans to join the Liberty Alliance. Willett says
Microsoft's participation in the Liberty Alliance would help companies that
want to use Microsoft Passport in conjunction with the Sun One platform.
"Otherwise, you set up two camps--with Sun on one side, Microsoft on the
other, and IBM in between."
************************
Info World
Euro lawmakers discuss Net issues with Congress
By Cara Garretson
WASHINGTON -- A group of European Parliament members are in Washington,
D.C., this week to discuss with U.S. regulators and lawmakers areas where
the governments can come closer together on matters of Internet policy.
On Monday the European group met with several U.S. agencies here including
the U.S. Federal Communications Commission, U.S. Department of Commerce,
and U.S. Department of Justice, as well as vice president Richard Cheney.
The group's goal is to promote trans-Atlantic communication on key Internet
issues such as privacy, security and intellectual property, said Arlene
McCarthy, a European Parliament member from the U.K.
"The purpose of this visit is to have a debate," McCarthy said.
Expectations are not that the two approaches to Internet policy will become
identical, but that they can be compatible enough to help facilitate global
commerce and enforcement. "The issue is not harmony, but outcome," McCarthy
said.
On Tuesday afternoon, congressmen and members of the IT industry joined the
group for panel discussions on privacy and security, sponsored by the
Congressional Internet Caucus, a bipartisan group of lawmakers working to
promote Internet education and tackle various issues.
While U.S. lawmakers said their views differ from those of many Europeans
on matters such as data privacy, they expressed an interest in working with
their European counterparts. "For the last several years we've been
building closer ties with the European Parliament," said Representative Bob
Goodlatte, a Republican from Virginia and co-chair of the caucus. "Our
differences of opinion on privacy led to efforts to bridge that gap."
"The Internet is [one of the] only areas where good cooperation exists"
among the many commerce issues that the two governments must work on
together, said Erika Mann, a European Parliament member from Germany.
Nonetheless, there are a number of areas where the two governments'
Internet policies diverge, as Europe in general takes a more regulatory
approach while the U.S. favors market forces. For example, legislation has
already passed in Europe that strictly limits how spam and Internet contact
directories are used.
Under European Union law, spam must almost always be an "opt-in" option,
meaning a consumer must give expressed consent to receive it, said Elly
Plooij-van Gorsel, a European Parliament member from the Netherlands.
Internet-based directories that list names and contact numbers must receive
approval from consumers before including them, she added.
One point that representatives from both governments agreed on is the need
to heighten information security without trampling on consumers' privacy
rights.
"I think there is a sense of understanding that clearly we need balance ...
to work together and find the right balance between security and privacy,"
Mann said.
The group will reconvene on Wednesday to discuss intellectual property and
broadband issues.
****************************
IEEE Newsletter Opinion Piece
Why ICANN can't
By regarding itself as a technical priesthood, this Internet naming bodyhas
failed as an international policymaking institution
By Milton Mueller, Syracuse University
An Internet domain name, like a license-plate or bank account number, is
one of those things that we all take for granted. You type in a name like
syracuse.edu, ieee.org, or ibm.com, and within seconds the correct page
pops up on your computer screen, whether the bits come from Tonopah or
Tokyo. That ease-of-use and dependability is one of the most important
reasons why the Internet blossomed in roughly a decade to become the global
phenomenon that it is today.
But who chose .com, .net, .org, and the several dozen other top-level
names? Why isn't there a .xxx domain for porn, or a .kids domain for
child-safe content? How many top-level names are enough? What if the name
you registered happens to be the trademark of an Argentinian company, which
wants to take it away from you?
Such decisions have to be made by someone, and in 1998 the U.S. Department
of Commerce authorized the Internet Corporation for Assigned Names and
Numbers (ICANN) to make them. This nonprofit organization establishes the
policies that govern the domain name system. It decides what new top-level
domainssuch as .biz or .infoto add to the name system, when to add them,
and who will be in charge of them. It settles disputes over name
assignments and oversees the dozens of companies, called domain-name
registrars, that sell and control domain names.
But ICANN is floundering. Last April, computer industry observer Esther
Dysona former chair of ICANN's boardcalled it "a real cesspool." The
organization, based in Marina Del Rey, Calif., has never won over the
managers of the country code top-level domains in the rest of the world,
such as .uk (United Kingdom) and .de (Germany). Its relations with the root
server operators are also strained. The latter maintain the 13 computers
around the world in which copies of the key records for the top-level
domain names are stored along with their corresponding Internet protocol
addresses [see "Striking at the Internet's Heart," IEEE Spectrum, December
2001, pp. 66-67].
A broken pledge
Most disturbingly, ICANN recently abandoned its pledge to create a
membership structure to elect its powerful, 18-member board of directors.
Currently, outside views are in effect excluded because agencies within
ICANN, called Supporting Organizations, select most of the board members.
This flawed structure dates back to the 1998 establishment of the
institution, when the Commerce Department handed it over to a small group
of Internet pioneers, including Vinton Cerf, Mike Roberts, and the late Jon
Postel.
Nevertheless, the Commerce Department did some things right when it created
ICANN. It had the foresight to call on individuals and private-sector
entities to forge a consensual approach to governing the assignment of
Internet addresses and domain names. I was among the people who greeted the
challenge enthusiastically. We really thought we were going to forge a new,
nongovernmental form of international organization. That heroic experiment
has been sabotaged, however, by the ruling faction's fear of losing control
and its unwillingness to share power and incorporate dissenting views.
At the root of ICANN's troubles is a paralyzing clash of visions of what
the organization should be. One view of ICANNthe one that prevails among
its current leadershipis of a private technical organization. In this view,
the leadership (the board) regards itself as a kind of technical
priesthood. The other conception, to which I and many other critics
subscribe, is of ICANN as a public policymaking institution, a regulatory
body of quasi-governmental character.
It was the priesthood view that the founders clearly embraced. Throughout
its brief existence, ICANN has described itself as a technical coordination
body. The claim is partly self-serving: if all ICANN does is technical
coordination, then it is perfectly fine for its management to run it like a
private corporation and insulate itself from political constituencies that
it doesn't like.
Politics at work
That's where the founders went astray. They did not understand, or refused
to accept, that the seemingly technical function of domain name
administration had become a public and politically charged endeavor.
ICANN's contracts with the Department of Commerce give it regulatory
authority similar to that of the U.S. Federal Communications Commission,
which few people would argue is a purely technical body.
ICANN puts price caps on the cost of registering a domain name, and
controls the supply of those names by accepting or rejecting applications
for top-level domains (.com, .net, and the like). It imposes technical
standards on the domain-name registration industry, for example, for
methods of sharing access to registration databases. It fosters and limits
certain kinds of competition, by, for example, determining which companies
get certain kinds of businesssuch as those involving the registering of
names. It also decides which businesses must divest themselves of existing
enterprises. It strengthens or weakens the scope of intellectual property
rights by setting up the rules by which officials must resolve trademark
conflicts over domain names. It routinely affects consumers of domain name
registration services, by deciding which companies to accredit to register
names and interact with consumers. Finally, it can even strengthen or
undermine personal privacy rights: it determines what information about
domain-name holders is released for all to see on the Internet.
*************************
Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 510
2120 L Street, NW
Washington, D.C. 20037
202-478-6124
lillie.coney@xxxxxxx