[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips August 23, 2002
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, CSSP <cssp@xxxxxxx>;, glee@xxxxxxxxxxxxx;, John White <white@xxxxxxxxxx>;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, akuadc@xxxxxxxxxxx;
- Subject: Clips August 23, 2002
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Fri, 23 Aug 2002 10:56:06 -0400
Clips August 23, 2002
ARTICLES
Growing Threat of Computers In, Poison Out [IT Recycling]
Secret Court Rebuffs Ashcroft
Plans to Computerize Personal Data Ignite Firestorm in Japan
She Wants P2P for the People [Berman Bill]
Group Suggests Its Workforce Rules
OPM will seek proposals to enhance USAJobs
Russian Coding Firm Back for More [DMCA]
Regional emergency system prepped
Feds doing elementary e-gov
Project to test digital watermarks [DRM]
Army picks firm for IT support
DOD gives biometrics a workout
Secret Service: Prevention, not arrests, is key to cybersecurity
Experts see ounce of prevention key to cyber cure
Denmark to push EU data-retention law
Microsoft Warns of Security Risks in Office, IE
FBI raids consulting firm that hacked into military computers
'Reply-all' button can be hazardous to your job
Spam crusaders slog it out in court
Setting a trap for laptop thieves
Unix group calls for more Open Source use in govt
Copy-proof CDs soon, claims Israeli company
******************************
New York Times
Growing Threat of Computers In, Poison Out
Near and far, scrap from electronics is an environmental problem.
By MARK MURRAY
Mark Murray is executive director of Californians Against Waste.
High-tech trade association lobbyists are working overtime in the
California Legislature, seeking to add a perverse corollary to the famous
"Moore's Law." The lobbyists' formula: Although computing power increases
exponentially every 18 months, the technology we use to manage our
discarded electronics retreats a couple of centuries in the same period.
In February, we saw tape and photos of Chinese laborers disassembling
discarded U.S. computers and terminals with hammers (technology that goes
back millenniums) and simple levers (even older). A report issued that
month by the environmental groups Basel Action Network and Silicon Valley
Toxics Network documented that toxic electronic scrap from the U.S. was
being exported to developing countries such as China, India and Pakistan,
where hundreds of thousands of laborers, working without protective gear or
safety awareness, break down components by hand. The results? Drinking
water supplies so badly polluted that water has to be trucked in from other
regions and alarming reports of health problems, especially among children.
The picture in California is also grim, but legislation now being debated
in the state Capitol could help. The electronics industry should get behind
this effort instead of arguing for ineffective voluntary programs. Obsolete
electronics, including microcomputers, are among the fastest-growing
portions of our waste stream, increasing at almost three times the rate of
the rest of our municipal garbage.
According to European governmental studies, this equipment contains a
number of toxic substances. The glass in computer video and TV screens--the
cathode ray tubes, or CRTs--contain lead to protect users from radiation
dangers, according to the California Integrated Waste Management Board.
Last year, the state Department of Health Services affirmed that CRTs
contained hazardous levels of lead and banned their disposal in municipal
and private solid-waste landfills.
The sheer volume of electronic scrap is threatening to overcome our
existing waste management programs. Here in California, about 10,000
computers and TVs become obsolete every day. What happens when more of us
get around to cleaning out our garages, closets and storage sheds?
We've seen the development of a sophisticated and effective system for
recycling beverage cans and bottles, but the infrastructure for electronics
waste remains weak, underfunded and inconsistent.
Some computer manufacturers, including IBM and Hewlett-Packard, have
recently established voluntary "pay as you throw" programs for consumers,
charging between $15 and $35, depending on the size of the unit. But the
high cost, as well as low consumer awareness, has discouraged large-scale
participation.
Some large markets, such as the European Union, have already begun to
require that manufacturers take responsibility both for the design and
long-term handling of their products. We must start doing a better job of
that in the U.S.
Given how well computer marketers advertise the speed of new systems, and
how well companies roll out new product, the failure to provide good
information and support to consumers is inexcusable. It is reminiscent of
another failed product stewardship effort--used tires. Some fly-by-night
recyclers pocketed fees paid by well-meaning consumers, then stacked up the
old tires and eventually abandoned them--leaving taxpayers to clean up the
mess.
According to estimates from Californians Against Waste, our state's total
cost of properly handling obsolete computers and TVs could be $75 million
to $150 million annually. That's a steep cost, but we can't keep ignoring
the problem. The high-tech industry should take steps to avoid
inevitable--and justly deserved--blame by supporting legislation proposed
by state Sen. Byron Sher (D-Stanford) that would establish a front-end fee
to pay for easy-to-use collection programs at no further cost to consumers.
A companion measure by Sen. Gloria Romero (D-Los Angeles) would set state
goals to increase computer and other electronics waste recycling and
consumer education measures.
Lobbyists from the Electronics Industry Assn. and other industry trade
associations oppose Sher's measure, calling it a "tech tax." It is not.
Industry groups also oppose Romero's timetable and standards for recycling
programs while refusing to work in good faith with consumer groups and
environmental advocates on national legislation.
The electronics industry should stop being the problem and start being part
of the solution, or it will earn itself a reputation as a global
environmental polluter of the worst order.
***********************
Washington Post
Secret Court Rebuffs Ashcroft
Justice Dept. Chided On Misinformation
By Dan Eggen and Susan Schmidt
The secretive federal court that approves spying on terror suspects in the
United States has refused to give the Justice Department broad new powers,
saying the government had misused the law and misled the court dozens of
times, according to an extraordinary legal ruling released yesterday.
A May 17 opinion by the court that oversees the Foreign Intelligence
Surveillance Act (FISA) alleges that Justice Department and FBI officials
supplied erroneous information to the court in more than 75 applications
for search warrants and wiretaps, including one signed by then-FBI Director
Louis J. Freeh.
Authorities also improperly shared intelligence information with agents and
prosecutors handling criminal cases in New York on at least four occasions,
the judges said.
The department discovered the misrepresentations and reported them to the
FISA court beginning in 2000.
Given such problems, the court found that new procedures proposed by
Attorney General John D. Ashcroft in March would have given prosecutors too
much control over counterintelligence investigations and would have
effectively allowed the government to misuse intelligence information for
criminal cases, according to the ruling.
The dispute between the Justice Department and the FISA court, which has
raged behind closed doors until yesterday, strikes at the heart of
Ashcroft's attempts since Sept. 11 to allow investigators in terrorism and
espionage to share more information with criminal investigators.
Generally, the Justice Department must seek the FISA court's permission to
give prosecutors of criminal cases any information gathered by the FBI in
an intelligence investigation. Ashcroft had proposed that criminal-case
prosecutors be given routine access to such intelligence information, and
that they be allowed to direct intelligence investigations as well as
criminal investigations.
The FISA court agreed with other proposed rule changes. But Ashcroft filed
an appeal yesterday over the rejected procedures that would constitute the
first formal challenge to the FISA court in its 23-year history, officials
said.
"We believe the court's action unnecessarily narrowed the Patriot Act and
limited our ability to fully utilize the authority Congress gave us," the
Justice Department said in a statement.
The documents released yesterday also provide a rare glimpse into the
workings of the almost entirely secret FISA court, composed of a rotating
panel of federal judges from around the United States and, until yesterday,
had never jointly approved the release of one of its opinions. Ironically,
the Justice Department itself had opposed the release.
Stewart Baker, former general counsel of the National Security Agency,
called the opinion a "a public rebuke.
"The message is you need better quality control," Baker said. "The judges
want to ensure they have information they can rely on implicitly."
A senior Justice Department official said that the FISA court has not
curtailed any investigations that involved misrepresented or erroneous
information, nor has any court suppressed evidence in any related criminal
case. He said that many of the misrepresentations were simply repetitions
of earlier errors, because wiretap warrants must be renewed every 90 days.
The FISA court approves about 1,000 warrants a year.
Enacted in the wake of the domestic spying scandals of the Nixon era, the
FISA statute created a secret process and secret court to review requests
to wiretap phones and conduct searches aimed at spies, terrorists and other
U.S. enemies.
FISA warrants have been primarily aimed at intelligence-gathering rather
than investigating crimes. But Bush administration officials and many
leading lawmakers have complained since Sept. 11 that such limits hampered
the ability of officials to investigate suspected terrorists, including
alleged hijacking conspirator Zacarias Moussaoui.
The law requires agents to be able to show probable cause that the subject
of the search is an agent of a foreign government or terrorist group, and
authorizes strict limits on distribution of information because the
standards for obtaining FISA warrants are much lower than for traditional
criminal warrants.
In Moussaoui's case, the FBI did not seek an FISA warrant to search his
laptop computer and other belongings in the weeks prior to the Sept. 11
attacks because some officials believed that they could not adequately show
the court Moussaoui's connection to a foreign terrorist group.
The USA Patriot Act, a set of anti-terrorism measures passed last fall,
softened the standards for obtaining intelligence warrants, requiring that
foreign intelligence be a significant, rather than primary, purpose of the
investigation. The FISA court said in its ruling that the new law was not
relevant to its decision.
Despite its rebuke, the court left the door open for a possible solution,
noting that its decision was based on the existing FISA statute and that
lawmakers were free to update the law if they wished.
Members of the Senate Judiciary Committee have indicated their willingness
to enact such reforms but have complained about resistance from Ashcroft.
Chairman Patrick J. Leahy (D-Vt.) said yesterday's release was a "ray of
sunshine" compared to a "lack of cooperation" from the Bush administration.
Sen. Charles E. Grassley (R-Iowa), another committee member, said the legal
opinion will "help us determine what's wrong with the FISA process,
including what went wrong in the Zacarias Moussaoui case. The stakes
couldn't be higher for our national security at home and abroad."
The ruling, signed by the court's previous chief, U.S. District Judge Royce
C. Lamberth, was released by the new presiding judge, U.S. District Judge
Colleen Kollar-Kotelly.
FBI and Justice Department officials have said that the fear of being
rejected by the FISA court, complicated by disputes such as those revealed
yesterday, has at times caused both FBI and Justice officials to take a
cautious approach to intelligence warrants.
Until the current dispute, the FISA court had approved all but one
application sought by the government since the court's inception. Civil
libertarians claim that record shows that the court is a rubber stamp for
the government; proponents of stronger law enforcement say the record
reveals a timid bureaucracy only willing to seek warrants on sure winners.
The opinion itself -- and the court's unprecedented decision to release it
-- suggest that relations between the court and officials at the Justice
Department and the FBI have frayed badly.
FISA applications are voluminous documents, containing boilerplate language
as well as details specific to each circumstance. The judges did not say
the misrepresentations were intended to mislead the court, but said that in
addition to erroneous statements, important facts have been omitted from
some FISA applications.
In one case, the FISA judges were so angered by inaccuracies in affidavits
submitted by FBI agent Michael Resnick that they barred him from ever
appearing before the court, according to the ruling and government sources.
Referring to "the troubling number of inaccurate FBI affidavits in so many
FISA applications," the court said in its opinion: "In virtually every
instance, the government's misstatements and omissions in FISA applications
and violations of the Court's orders involved information sharing and
unauthorized disseminations to criminal investigators and prosecutors."
The judges were also clearly perturbed at a lack of answers about the
problems from the Justice Department, which is still conducting an internal
investigation into the lapses.
"How these misrepresentations occurred remains unexplained to the court,"
the opinion said.
**************************
Washington Post
Plans to Computerize Personal Data Ignite Firestorm in Japan
Citing Privacy, Municipalities Defy Effort
By Doug Struck
TOKYO -- The first stop for new residents of a Japanese neighborhood is the
local government office, where they dutifully report their presence and
give details of their family. Soon after, the police may stop by to
politely ask again who is living there.
On moving out, they must again notify local authorities and get a report to
take to the ward office of the next place they reside. This official
tracking is accepted with equanimity by most Japanese, as is the
requirement for an even more detailed "family registry" that lists
everything from divorces to births, deaths and domicile.
So the government was surprised when a move to put some of this information
on a computer network to streamline the process -- and to assign an
11-digit identification number to everyone -- erupted into a grass-roots
revolt.
At least four local municipalities have defied the government and refused
to be a part of the computer network that started earlier this month.
Others have waffled, saying their residents' participation was voluntary.
Protesters, wonderfully decorated as bar codes, have taken to the streets.
Public opinion polls show huge opposition to the system. And a nationally
respected journalist has organized a league of influential Japanese to try
to get it abolished.
"We didn't anticipate this," acknowledged an official of the Ministry of
Public Management. "We really don't think the criticisms are justified."
The objections to the network and the national identification number would
seem a bit quaint in other technologically advanced countries, where people
long ago resigned themselves to the pervasiveness of computerized information.
It is even more surprising in Japan, whose residents are the first to admit
they readily submit to dictates of authority.
"I am afraid the Japanese people will become more docile" in the face of
government encroachments on their privacy, said Yoshiko Sakurai, the
journalist who is leading a national movement against the network. "Our
people tend to be much more quiet than your people."
Sakurai argues that giving every one of the 126 million Japanese an
identification number will shackle "the freedom and independence of the
spirit, and the energy that is produced by an independent sprit. Numbering
people somehow suppresses this."
She also argues that the computerized network, coupled with the extensive
personal information the government already collects, will make the nation
and its people vulnerable to crime.
"Japan has quite a lot of money. It will become a very attractive target
for criminal organizations and foreign governments by numbering everyone
from politicians to technology experts and medical experts, and collecting
the personal data under one number," she said. "It is like making all of us
naked and putting all of us in a glass container."
Concerns about the safety of personal data is at the root of objections by
the municipalities. Leaks could happen at the central government or any of
the connected municipalities, they say. They argue that the late prime
minister Keizo Obuchi promised in 1999 the network would be accompanied by
tough privacy legislation outlawing misuse of the data. The government
introduced a bill, but it was shelved this year.
"We think it is the central government that is breaking the law, not us,"
said Nobuo Hoshino, mayor of Kokubunji, a city in Tokyo's western suburbs
that held a "disconnecting ceremony" to defy the law and cut the city's
link to the network. "The law stipulates there will be legislation to
protect personal privacy. When that law is in place, we will participate in
the system."
The government's Ministry of Public Management argues it has met the
requirements by introducing privacy legislation in parliament, and even if
the measure is stalled, the network contains built-in safeguards.
"We don't see any privacy problem with this network," contended Tsuyoshi
Takahara, head of the ministry's planning office for the network, called
Juki Net. He said the opposition is much ado about nothing; the only
information that would now be in the network is routine -- names,
addresses, sex and age, all of which is already available to the public.
The system is intended to streamline the cumbersome paper records kept in
3,300 local offices by computerizing them in a nationwide network. It would
eliminate the requirement that people who move visit their ward offices to
get a physical "exit form" to take to their new locality.
"Everything is now done by exchanging papers. We are trying to make it more
convenient," Takahara said.
But many people are suspicious that the long reach of the Japanese
bureaucracy is at work and Juki Net will gradually grow. They fear it could
become a giant record-keeping system with the ubiquity of U.S. social
security numbers combined with Japan's personal records.
Polls show huge majorities are against the system. And while critics say
they fear hackers and other criminals, one of their chief concerns is
misuse of the data by their own government.
"The problem is, the people don't trust the government," said Hiroshi
Yamada, the mayor of Suginami, another ward of Tokyo that has balked at
participation in Juki Net.
"We've conducted a survey, and only 10 percent of the people want it," he
said. "We've had several people move into Suginami" because of the ward's
refusal to join the network.
There is plenty of grist for public suspicion of bureaucrats. In May, the
Defense Agency admitted it had drawn up a list with names, backgrounds and
political views of citizens who had asked for public information from the
agency. Twenty-nine agency officials were punished. Last month, defense
contractor Fujitsu said it had gotten a blackmail demand from men who had
obtained personal information on military officers leaked from the
company's computers.
And just as Juki Net started up, embarrassed officials in the city of
Moriguchi in Osaka acknowledged they had sent personal information about
2,584 individuals to the wrong people.
"The Ministry of Public Management doesn't answer these concerns," said
Mayor Yamada. "The minister keeps saying it's safe and they'll go ahead
with it. That just fans the anxiety of people even more."
****************************
Wired News
She Wants P2P for the People
They're already calling her the Weblog Candidate.
Real estate agent Tara Sue Grubb is fed up with what she calls "individual
rights sacrificed for big corporate politics." Grubb, 26, is running as a
Libertarian candidate against North Carolina's Howard Coble, the
71-year-old Republican congressman whose public opposition to P2P
file-sharing networks has made him the target of an online backlash.
Even her own party says Grubb's chances of winning are slim. Yet political
pundits cite her online popularity as proof of techies' growing involvement
in government, rather than their dismissal of it.
"This is historical because it's not happening in the lab, it's happening
in the field. This lady is getting money right now," said Ed Cone, a
columnist for the News & Record, the major newspaper in Coble's district.
"It's going to be replicated across the country."
Grubb's campaign -- and the national interest in her -- centers on Coble's
support of a bill introduced by Rep. Howard Berman (D-Calif.) that would
allow copyright holders to act against consumers' computers in order to
remove or disable pirated materials.
Coble also signed a letter to Attorney General John Ashcroft urging him to
act against P2P networks.
"I wouldn't call myself a one-issue candidate," Grubb said from her home in
High Point, North Carolina. "But I'm tired of watching the government come
in and throw their weight around."
Characterizing Coble's position as "It's OK to hack as long as you
contribute to my campaign," Grubb added, "Howard's biggest supporters are
in Hollywood. There's no Hollywood in North Carolina. I really don't have
any clue what his concern is here."
Coble's concern -- and the donations to his coffers from Hollywood industry
groups and lawyers -- centers around his role as chairman of the House
Subcommittee on Courts, the Internet and Intellectual Property. As
chairman, the 18-year congressman has overseen debates on matters ranging
from the terms of rock stars' recording contracts to privacy issues with
the whois database.
Coble's chief of staff, Ed McDonald, told Wired News that Coble and the
subcommittee plan to hold hearings this fall with both proponents and
critics of the Berman bill. "He'll be the first to tell you he does lean
toward the copyright holder," McDonald said of his boss. "But it doesn't
mean to the detriment of someone else's privacy issues."
"People are overreacting to hyperbole they're reading on the Internet," he
added. "We support the broad concept of Mr. Berman's bill. That doesn't
mean we're going to support it in its final form. The purpose of this bill
is to protect copyrighted material. It's not to give Hollywood and the
record companies carte blanche to go into someone's computer and look
around and do what they want."
But News & Record columnist Cone also said McDonald recently told him that
the congressman "wouldn't even know how to turn on the computer" -- a
typical statement that exacerbates the feeling among digital rights
advocates that Hollywood studios are dictating technology legislation to
politicians who don't understand what they're dealing with.
"He's thumbing his nose at us," said Silicon Valley analyst and writer Hal
Plotkin. "It's a wonderful example of how little we really matter. Imagine
if someone was going to pass legislation on the auto industry and admitted
he couldn't drive. Detroit would be all over him."
In contrast to Coble, Grubb won an instant fan club by setting up her own
weblog this week. "I'm not a techie," she said. "I was looking at Ed Cone's
weblog and some others, and they were saying, 'Well, what's keeping her
from downloading [weblog editing software] radio?' So I did. It was the
easiest thing in the world."
Still, it's unclear whether Grubb's candidacy will have any effect on Coble
or P2P legislation. Libertarian Party press secretary George Goetz was
realistic about her chances. "It's really tough even to get a seat in the
state legislature," he said. "As far as third parties getting into
Congress, I think you'd have to go back 80 years."
Aside from Grubb, Coble remains unopposed for re-election this fall. A
spokesman for the North Carolina Democratic Party said the party doesn't
recruit candidates. Aspiring contenders have reason to balk: Redistricting
in the area has removed many traditionally Democratic neighborhoods from
Coble's 6th congressional district.
Add to that the lack of a partisan base for digital rights crusaders. Coble
is a Republican, but both Berman and Sen. Fritz Hollings, author of the
controversial Consumer Broadband and Digital Television Promotion Act, are
Democrats.
Besides, digital rights issues will eventually move from Coble's hands into
those of the next subcommittee chair, which may make running against the
man, rather than the issue, futile.
Plotkin, who has written frequently on what he sees as a lack of political
effectiveness in the technology sector, thinks the geeks who decry
Hollywood's donations to politicians should stop looking for clever hacks
around the system and start making donations of their own.
"We don't show up at the fundraising events, and nobody's made a $100,000
contribution on this issue," he said. "Other people do that regularly on
things like whether diapers should go into landfills. Where is Scott
McNealy? Where is Steve Jobs? Where is anyone that has the juice to get
things done? They're all busy looking out for their stock options."
*****************************
Washington Post
Homeland Dept. System Offered
Group Suggests Its Workforce Rules
By Bill Miller
A group of federal executives is urging the White House to use its pay and
personnel system as a model for the proposed Department of Homeland
Security, saying the rules now covering the Senior Executive Service would
protect workers' rights while giving managers plenty of freedom to reward,
discipline and move employees.
The Senior Executives Association, which represents the top rung of the
government career ladder, said its proposal could resolve the dispute over
how the projected 170,000-member workforce would be managed. President Bush
has said the head of the department must have management flexibility, but
union leaders and some lawmakers are resisting changes they say would erode
civil service and union rights.
The department, proposed by Bush in June, would include all or parts of 22
federal agencies. All have their own personnel systems, and Bush has said
that an overhaul is needed so the department can respond quickly to threats.
Under the White House's proposal, workers coming into the new department
would keep their civil service rights, benefits and union membership for at
least a year during a transition. Basic protections covering civil rights,
equal employment opportunity guarantees and whistle-blowers would not be
changed, officials said.
But after the transition period, the new secretary, working with the Office
of Personnel Management, could make adjustments in the personnel system.
In a letter to Bush this week, the association said core civil service
protections would remain in place if the new department adopted the Senior
Executive Service's system. At the same time, the group said, managers
would be able to reassign employees, adjust their pay levels, award bonuses
and set "performance plans."
"We decided we needed to issue something that would be crystal clear and
would hopefully provide a way out of this stalemate," said Carol A.
Bonosaro, president of SEA, which represents about 6,000 top career employees.
The House passed a homeland security bill in July that would allow the
White House to create a new civil service system for the department,
affecting such areas as pay, job performance and labor-management
relations. But a Senate version, which will be debated next month, would
keep intact current civil service rights. The Senate bill also would make
it more difficult for the president to remove workers from unions for
national security reasons; Bush has threatened to veto such a bill.
Bonosaro said adopting the rules covering current government executives
would remove much of the uncertainty now facing federal employees.
"When you have no idea of what's coming down the pike, it's not too hard to
be skeptical about it," she said.
An official with the Office of Personnel Management said the association's
proposal fails to give the White House enough leeway to restructure the
bureaucracy. The House bill remains the best approach, the official maintained.
Jacqueline Simon, public policy director of the American Federation of
Government Employees, said the association's suggestions were a helpful
starting point. But she and other union leaders said that many details
remain to be worked out.
"Maybe this will get the conversation going in a way that hasn't happened
yet," said Colleen M. Kelley, president of the National Treasury Employees
Union.
***************************
Government Computer News
OPM will seek proposals to enhance USAJobs
By Jason Miller
The Office of Personnel Management in early September will release a
request for proposals for a commercial system to enhance its
USAJobs.opm.gov portal.
OPM wants to outsource the day-to-day operations and maintenance of the
system, said an agency spokesman. Improving USAJobs is part of the
E-Recruitment e-government initiative the agency is managing
(www.gcn.com/21_17/inbrief/19170-1.html).
The RFP follows a request for information OPM issued in June for the online
federal job site. The RFI asked vendors to streamline how users find
vacancies, enhance online resume submission and allow applicants to track
the status of their resumes through the entire hiring process.
The agency in late September also plans to announce the two or three agency
federal payroll systems that will consolidate 18 disparate systems, the
spokesman said. OPM in May issued a request for responses to agencies as a
part of the E-Payroll e-government project it also is managing.
***********************
Wired News
Russian Coding Firm Back for More
You would think that the owners and programmers of Moscow software company
ElcomSoft would want to stay as far away from electronic books as possible.
After all, it was an ElcomSoft application for Adobe eBooks that enmeshed
the company in a lengthy, international legal battle that catapulted a
programmer named Dmitry Sklyarov into worldwide prominence and, ElcomSoft
owners say, proceeded to drain the company's financial and emotional
resources.
But despite the courthouse angst, ElcomSoft plans to continue to market
exactly the sorts of products that led to their entanglement with the U.S.
legal system.
"We have serious plans for the eBook market," Vladimir Katalov, managing
director of ElcomSoft, says. "All perfectly legal, of course."
At least, Katalov hopes the new software his company intends to offer for
Adobe and Microsoft eBooks is legal. He said no one at Adobe or Microsoft
will discuss it with him.
"We tried to contact Microsoft ... describing the software we're going to
release, and asking what do they think about that.... Will that violate any
Microsoft patents, copyrights, licenses or whatever," Katalov said.
"(Microsoft) responded that, 'Microsoft's legal department does not give
advice to third parties.'"
Microsoft did not respond to requests for comment.
Much the same situation exists with Adobe, Katalov said.
"Even if they do have problems (with the products), they have not informed
us," he said.
Katalov said without guidance, it's difficult to know which ElcomSoft
products might be illegal in other countries. The application that launched
ElcomSoft's legal battle, the "Advanced eBook Processor" for Adobe eBooks,
is indeed perfectly legal in Russia.
Software users are entitled by Russian law to make backup copies of
software and electronic documents, exactly what the eBook processor allows
owners of Adobe eBooks to do. But since doing that also involves tinkering
with electronic copyright restrictions, the eBook processor is forbidden
under the U.S. Digital Millennium Copyright Act.
Sklyarov, One of the Advanced eBook Processor's programmers, was arrested
and jailed on DMCA charges after attending a U.S. computer security
conference on July 16, 2001. Charges against Sklyarov were later dropped,
but ElcomSoft still faces criminal charges.
The company was notified on Tuesday that the trial date, which had been set
for Monday in San Jose, California, has been re-scheduled for Oct. 21, due
to a conflict in U.S. District Court Judge Ronald Whyte's calendar.
"The problem is that (ElcomSoft) develops products that could be put to
illegal use," explained Manhattan Criminal Attorney Edward Hayes. "But the
programs also have valid legal uses. It's difficult to fault a company for
what a product's user does with it. A knife can be used to cut your dinner
or stab your date."
Apart from its eBook products, ElcomSoft also offers two dozen or so
password recovery programs that can comb through various applications and
reveal passwords and users' login names.
ElcomSoft's Advanced Outlook Express Password Recovery can be used to
recover logins and passwords for Microsoft Outlook Express users' e-mail
and newsgroup accounts.
The Advanced Internet Explorer Password Recovery application can retrieve
users' website passwords and login names, and any personal information they
may have entered onto website forms.
Katalov said ElcomSoft recently added a key-search attack feature to its
Advanced PDF Password Recovery Pro, an application that can remove
password-enabled restrictions from Adobe Acrobat PDF files.
The attack feature can be used to quickly discover user passwords, which
can be used to block others' from opening a PDF document.
PDF owner or master passwords do not affect a user's ability to open and
view a PDF file, but can prevent a user from editing (changing) the file,
printing it, and/or selecting text and graphics and copying them into the
clipboard, among other restrictions.
"Fortunately, there is no need to discover that password at all. Instead,
our software can just remove it (decrypt the file), so the resulting
document will not have any restrictions," Katalov said.
Adobe spokeswoman Layla McHale responded to a request for comment with a
statement outlining Adobe's "official position."
"Security is an ongoing effort at Adobe. We are committed to strengthening
the security of our products by using sophisticated, industry-standard
levels of software encryption. We also continue to work with the software
community, including 'White Hat' security experts.... However, no software
is 100-percent secure from determined hackers."
Katalov said ElcomSoft's products are not hacking tools, but provide
features that users need or want. The password recovery programs are used
in legal investigations and to recover passwords and user names that have
been forgotten or are inaccessible by other means - as in the case of
employees who may be on medical leave, quit or were laid off.
Despite the ongoing legal issues, Katalov said that for the most part, it's
been business as usual at ElcomSoft.
"We have lost some corporate customers, but got a few more 'home' ones, so
the total sales are about the same as a year ago -- maybe just a bit
better," he said. "But our legal expenses, of course, are very high, and so
we had to cut our investments into research and development."
He also regretted that nagging legal concerns have put some constraints on
the sorts of deep code explorations of other companies' products that could
lead to interesting new ElcomSoft applications.
"But there's nothing we can do about that -- at least for now," he said.
**************************
Federal Computer Week
Letter to the editor
Angered over personnel system
I have been working for the past eight years as an information systems
manager, including the past five working for the federal government. I was
recruited for civilian service right out of college and into a position
helping to manage a multidomain Air Force information infrastructure.
The Air Force personnel system chose to classify my job as an electronics
engineer series (GS-0855). Since that time, I have taken and passed several
certification exams all on my on dime. I am currently a Microsoft Certified
Systems Engineer and a Cisco Certified Network Associate.
This year, I was shocked and angered when the Air Force personnel system
stated that I was not qualified for an information systems job series
(GS-2210) because I lacked the one year experience at the lower grade level.
Basically, because I don't have a number in my career brief, I am not
qualified to do a job I have been doing for eight years. Because of this
fact, I cannot get anyone in the personnel center to look at my
qualifications. I was hired because of my qualifications stated on my
rÈsumÈ. Now, that I am part of the system, my rÈsumÈ will only be looked at
if the numbers in my career brief match the numbers of the job I am seeking.
I find this kind of hiring practice ludicrous. I wonder how many other
qualified civilians have been screwed out of a job because a number was not
in their career brief?
The Air Force personnel systems should be scrapped. If a person is
qualified for a job, you won't find out by looking at numbers. You will
find out by looking at the qualifications posted on a resume.
Robert Cameron
Electronics engineer
*****************************
Federal Computer Week
Regional emergency system prepped
Police, fire, ambulance, and transportation officials from Maryland,
Virginia and Washington, D.C. are closer to developing an interoperable and
real-time wireless data communications system.
IBM Corp. announced on Aug. 22 that it has been chosen as the systems
integrator for the $20 million Capital Wireless Integrated Network (CapWIN)
project.
CapWIN, which spun off from a Transportation Department project about two
years ago, will provide a communications bridge for emergency responders
across jurisdictions to effectively respond to daily incidents as well as
events such as last year's terrorist attack on the Pentagon.
An estimated 40 state, local and federal agencies will communicate with
each other via the network using laptops, personal digital assistants and
other devices.
Sponsors of the project (www.capwin.org), which is managed by the
University of Maryland's Center for Advanced Transportation Technology,
include the National Institute of Justice and the Public Safety Wireless
Network. An executive committee composed of local, state, and federal
officials governs the project.
"CapWIN is revolutionary thinking," said Fred Davis, CapWIN's deputy
program director. "People have got to change the way they do business. The
days of 'this is my turf and you can't play' well, those days are over."
The open-architecture system will be built using commercial, off-the-shelf
technology that has been already developed, Davis said. IBM has a number of
subcontractors - including Templar Corp., PB Farradyne Inc.,
TeleCommunications Systems and PelicanMobile Computers Inc. - to help with
implementation, which will occur in several phases. The system will
interface with existing disparate legacy systems.
By February, Davis said mobile computing capability would be provided to
those agencies that don't have such systems and interfaces will be
developed for transportation centers in Maryland and Virginia that collect
traffic information useful to officials.
In addition, disparate mobile systems will be connected among agencies.
Databases maintained by different agencies will be linked and only
appropriate information will be shared, Davis said. For example,
transportation officials would not have access to criminal databases.
Eventually, the project will provide Web-based incident command systems for
first responders to effectively manage and deploy personnel and equipment
at an emergency. When the system is fully developed, it will be easier for
transportation and other emergency officials to redirect traffic in case of
an overturned truck, for example, he said.
Although agencies from across jurisdictions will have to sign memorandums
of understanding, Davis doesn't anticipate a problem. "The basic
fundamental concept of CapWIN is partnerships," he said. "If we don't have
partnerships we can't move forward."
***************************
Federal Computer Week
Feds doing elementary e-gov
A survey of federal government Web sites revealed that most agencies still
offer little more than the most basic elements of electronic government.
More complex features, such as interactive forms and e-commerce
applications, remain relatively scarce.
The San Francisco State University survey showed that 87 percent of federal
Web sites still fail to meet accessibility standards despite being required
by law for the past 14 months.
Professor Genie Stowers studied 148 federal agency Web sites and discovered
that most offered basic information and documents, and elementary services
such as employment information. But only about half offered such useful
items as downloadable forms, and even fewer still offered interactive forms
and interactive databases. Only 12.8 percent offered e-commerce
applications and only 8.8 percent offered direct links to e-government
services.
Stowers, a professor of public administration and associate dean at San
Francisco State, studied federal Web sites between January and April for
the PricewaterhouseCoopers Endowment for the Business of Government.
A key finding, she said, is that many government Web sites do a poor job of
making information and services readily available to those who are least
familiar with government agencies.
Too many federal Web sites are "designed so that only those who really
understand government and how it works can successfully navigate them," she
said in a 44-page report, "The State of Federal Web Sites: The Pursuit of
Excellence," released Aug. 21.
The prevalence of poor design creates a whole new digital divide, she said.
To bridge it, agencies must design Web sites that are easier to use.
"Federal Web sites have enormous audiences and the potential for
significant impact," Stowers said. "It is crucial that federal Web managers
develop and implement sites that are user-friendly as well as stocked with
useful information."
In general, federal Web sites should offer more features to help users,
Stowers said. Although most sites include a search function, and about half
offer a site map, only a third offered answers to frequently asked
questions, only 31 percent asked for user feedback, 27 percent offered a
"help" feature and 25 percent offered a site index, Stowers discovered.
Stowers did single out a few federal Web as examples of excellence. Her top
five are:
* The U.S. Patent and Trademark Office (www.uspto.gov), which she said
"provides a vast amount of useful content and a comprehensive set of aids
to the user." The site offers several means of finding information and
offers help with key subjects such as how to apply for a patent. It offers
access to a number of searchable databases of patents and trademarks.
However, it flunks the accessibility test, meaning it is not fully usable
by people with disabilities such as blindness.
* The Department of Health and Human Services (www.hhs.gov) wins praise for
providing "enormous amounts of information and types of services for many
types of users." For example, the department offers fact sheets on subjects
ranging from aging and mad cow disease to genetic testing and teen
pregnancy, Stowers said.
* The Education Department site (www.ed.gov) ranked high for the plethora
of services it offers from applications for financial aid to information
arranged for various audiences. But the site lost points for opening with a
"splash page in a somewhat confusing format."
* The Treasury Department (www.treas.gov) scored points for e-commerce
services such as savings bond and other investment sales, and souvenirs
such as "$1 Texas Lone Star notes" and "$1 Year of the Horse notes." The
site scores for "all kinds of forms" that can be downloaded and automatic
e-mail notification of law enforcement actions, interest rate statistics
and policy papers.
* The Navy Web site (www.navy.mil) "is a gateway to considerable content"
and offers valuable navigation tools, Stowers said. A part of the site
devoted to information on housing, legal assistance pay and benefits is
"very useful for military personnel and their families," she said.
In addition to the top five, Stowers also cited the federal Web portal,
FirstGov for its "thoughtful and effective design and content." The portal
is intended to serve as a guide to government information and services.
************************
Federal Computer Week
Project to test digital watermarks
The Air Force Research Laboratory (AFRL) Information Directorate announced
this week that it has selected Digimarc Corp. to collaborate on a research
and development project using digital watermarking to combat fraud and
enhance security.
Digital watermarking ensures the security and authenticity of digital
photographs by embedding an encrypted image over the photograph, similar to
the watermarks used on the redesigned $20, $50 and $100 bills.
The project will explore the use of digital watermarking as a security
feature for identifying fraudulent or altered identity documents, said
Bruce Davis, chairman and chief executive officer of Digimarc. The contract
was awarded last week and is supported by the Air Force's research and
development funding, but the Tualatin, Ore.-based company would not provide
further financial details.
In cooperation with AFRL, Digimarc will produce sample identification cards
and deploy them as part of a security access system at a law enforcement
assessment facility in Rome, N.Y., where the AFRL Information Directorate
is located. The facility is visited by military, federal government and law
enforcement representatives from across the nation. Digital watermarking
will be used on the cards to combat fraud and enhance security, according
to a spokesperson for the company.
Raymond Urtz, director of the AFRL Information Directorate, said there are
"broad implications for addressing the problem of document counterfeiting
and forgery through digital watermarking technology," and the AFRL is
looking forward to collaborating with Digimarc on the research project.
Rep. Sherwood Boehlert (R-N.Y.), chairman of the House Science Committee,
said he was excited that a portion of the $4.5 million Information
Authentication/Digital Watermarking research and development project that
he helped secure for Rome last year contributed to the formation of the
partnership. The combined talents and expertise of the AFRL and Digimarc
"is great news for homeland security and for future information assurance
R&D efforts in central New York," Boehlert said.
**************************
Federal Computer Week
Army picks firm for IT support
The Army Test and Evaluation Command (ATEC) announced this week that it has
selected STG Inc. to provide information technology support services at
three U.S. locations.
Under terms of the contract, which was awarded Aug. 9, STG will operate,
maintain and enhance the enterprisewide IT infrastructure that supports
ATEC in carrying out its mission of testing, experimentation and
evaluation. The award, a seven-year task order valued at $53 million, was
issued under the Commerce Department Information Technology Solutions contract.
ATEC is responsible for ensuring equipment and systems used by the Army
meet standards and safety requirements. The command plans, conducts and
integrates developmental testing, independent operational testing,
independent evaluations, assessments, simulations and experiments to
provide information to decision-makers.
STG's four focus areas are customer support, enterprise network management,
IT logistics and administrative services.
The Fairfax, Va.-based company has begun providing those services at ATEC's
headquarters in Alexandria, Va.; the Army Evaluation Command's location in
Aberdeen, Md.; and the Operational Test Command headquarters in West Fort
Hood, Texas, according to an STG spokesperson.
***************************
Federal Computer Week
DOD gives biometrics a workout
The Defense Department Biometrics Management Office (BMO) is in the middle
of a three-phase "quick look" project using iris scan technology to gain
access to the Pentagon Athletic Club.
The first phase involved educating the athletic club's staff about iris
scan technology via a demonstration. The second phase, which began July 23,
involves one month of enrolling members into Iridian Technologies Inc.'s
IrisAccess 2200, said Maj. Steve Ferrell, executive officer for the
Biometrics Fusion Center, the testing and evaluation facility for the BMO.
The quick-look projects involve testing and evaluating commercial,
off-the-shelf biometric products for a specific DOD security access
requirement. If the testing determines that the product satisfies the
requirement and if resources are available, the tool can undergo more
aggressive testing as a Biometrics Fusion Center pilot project. The pilot
determines whether the product will be deployed at a service, agency or
command.
Enrollment for the Pentagon project is voluntary and involves capturing
data from the member's identification card and iris, Ferrell said.
"It takes no more than 2 minutes to enroll and verify a new user, which
includes downloading the new template to the server," Ferrell said in an
e-mail message. The enrollee can then gain access to the athletic club with
the iris scan and a member ID card. The goal of the project is to eliminate
the member ID-based system and move secure access procedures to biometric
technology.
The IrisAccess system detects an individual approaching the imager. Once
the person's eye is 3 to 10 inches from the mirror in the unit, a camera
captures an iris image, which is digitally processed into a 512-byte
IrisCode template, according to officials from the Moorestown, N.J.-based
company.
A search function performs real-time database matching at the remote unit.
When an iris matches a valid IrisCode template in the database, access is
granted almost instantaneously. Moving from member IDs to the iris scan
system will enable not only secure access to the facility for members but
also "promote convenience for them since they will not have to carry
anything on their person," said Linda Dean, director of the BMO, adding
that it also aids the Pentagon staff in verifying the identity of people
attempting to gain access.
The project has 100 enrollees with more people being enrolled daily, which
is promising because the Pentagon Athletic Club has about 8,000 members,
according to Ferrell.
The third phase of the quick look is scheduled to begin Aug. 30 and will
involve using IrisAccess 2000 as the sole tool for access into the athletic
club. The cost of the project is "restricted data," Ferrell said.
Feedback has been positive. "The members can't wait to not have to use
their ID card when they are running," he said.
***************************
Federal Computer Week
Letter to the editor
Laptop theft alarming
I found considerable information of interest in the article on laptops gone
missing from the Justice Department ["Laptops lost, stolen at Justice,"
FCW, Aug. 12]. One of my laptop computers was stolen from a hotel room
while I was on business travel in Europe a few years ago.
I noted in the article that, except for bar codes and scanners, the two
lists of proposals to alleviate the problem contain no technological
solutions. I know there are several such solutions.
It occurred to me several years ago that there must be a simple deterrent
to the casual or opportunistic laptop thief. For that reason, I patented,
through my company, a motion-sensor alarm built into laptops that is set
and reset by a combination on an external keypad. ("Portable Computer with
Integrated Alarm System," U.S. Patent No. 5760690 issued on June 2, 1998.)
To my knowledge, no one has yet produced one. Maybe the time has come.
PS: I'd like to tell you that my laptop was stolen before the patent was
issued, but such was not the case. It would have made an interesting
headline: "Holder of U.S. patent for laptop alarms has laptop stolen."
Roger Allan French
Former security program office manager
Digital Equipment Corp./Compaq Computer Corp.
Londonderry, N.H.
****************************
Government Computer News
Secret Service: Prevention, not arrests, is key to cybersecurity
By William Jackson
In its efforts to combat cybercrime, the Secret Service is learning from
law enforcement mistakes made in the war on drugs.
"Enforcement controlled the agenda, and prevention was a small part of it,"
said Special Agent John Frazzini, who is helping to organize a nationwide
electronic crimes task force.
That approach did not work very well against drugs and will not work
against hackers, Frazzini said during a panel discussion on cyberterrorism
at the Sector5 cybersecurity conference in Washington.
"We're not going to arrest our way to security," he said. "The concept of
the task force is analogous to the neighborhood watch program," in which
members of a community look out for each other to prevent crime. So the
Secret Service is moving from a posture of secrecy toward one of public
engagement.
The national task force was mandated by the U.S. Patriot Act and is based
on the New York Electronic Crimes Task Force, a multiagency effort in which
the Secret Service is a leading participant. A similar task force has been
set up in Washington.
The consensus of the panel of government, industry and academic experts was
that cooperation and information exchange, both within and between
organizations, is key to protecting networks and systems. Technology cannot
keep up with the task of finding and fixing new vulnerabilities in hardware
and software.
"Security is getting worse faster than it can ever be fixed," said Jeff
Moss, a self-described hacker and now chief executive officer of Black Hat
Inc. of Seattle, which organizes cybersecurity training sessions and
conferences. "Now we have to figure out how to live with it."
But the future is not necessarily bleak, Moss said. "It's been this way for
10 years, and we're still here."
****************************
Government Executive
Experts see ounce of prevention key to cyber cure
By Maureen Sirhal, National Journal's Technology Daily
The increasing number of attacks on business computer networks means that
organizations and government agencies should change their cybersecurity
mindset to one of prevention, a panel of experts warned Thursday.
"Security is getting worse faster than it will ever be fixed," said Jeff
Moss, the CEO of Black Hat, a Seattle-based cybersecurity training firm.
"That fundamental view isn't going away."
But Moss and other panelists, speaking before a cybersecurity conference in
Washington, noted that while there may never be a silver bullet for
information security, organizations can reduce cyber risks by creating a
mindset of prevention.
Security firm Riptech estimates that over the last six months,
organizations have suffered from more than 180,000 cyberattacks. "The data
do not speak well," Georgetown University information security professor
Dorothy Denning said. But "98 percent of those attacks could have been
prevented. There is a lot of room for improvement ... given the right
incentives and tools."
John Frazzini a special agent with the U.S. Secret Service, described how
the agency's Electronic Crimes Task Force, which focuses on cyber crimes
and terrorism, is promoting prevention as a means of reducing the risks.
He compared the approach that most organizations take to cybersecurity with
the government's efforts to curtail drug trafficking. Over time, Frazzini
said, those efforts have shifted from enforcement to prevention in order to
reduce the demand for drugs. The challenge of cybersecurity is similar, he
said.
"It is really a matter of creating an environment where prevention is the
hallmark of what we do," he added.
The key to prevention is monitoring change, and sharing key information,
such as "best practices" in cybersecurity, said Saul Wilen, CEO of the San
Antonio, Texas-based consulting firm International Horizons Unlimited. The
biggest problem, he noted, is that organizations and government groups do
not effectively communicate their approaches to business and security. The
business plan has become isolated from the security plan, Wilen said. "It's
almost like the two will never meet."
But Frazzini also suggested that domestic hackers demonstrate unpatriotic
and even criminal behavior when they engage in activities that actually may
be innocently intended.
"The issue of information security really can become an issue of national
security ... depending on how you look at it," he said. "It's almost
unpatriotic if you're in the U.S. and you're still causing damage to our
networks."
Denning also said that training courses for responding to cyberattacks
present a real problem by adding to the body of knowledge that could
bolster hackers' skills. "It's something we absolutely have to pay
attention to," he said.
But Wilen called the courses a "necessary risk." "We have more to lose by
not engaging other people than by what we put on the Web," he said.
**************************
Computerworld
Denmark to push EU data-retention law
BRUSSELS -- Denmark, holder of the European Union's six-month rotating
presidency, will try to push through a law that would force Internet and
telecommunications service providers throughout the EU to store their
customers' data traffic for more than a year.
The Danish initiative will be discussed at the committee level with 14
other EU members next month, a European Commission spokesman said. It comes
less than three months after the EU passed a controversial data-protection
law that opened the door for prolonged data retention.
In May, the European parliament passed a new data-protection law that
allows EU states to force Internet service providers and telecommunications
providers to retain data on their customers' online and phone activity
beyond the one or two months this information is usually stored for billing
purposes.
The Danish initiative would take this one step further by specifying that
such data would have to be retained for a period of more than a year. The
initiative was proposed to harmonize data-retention policies across the EU
and to help fight international crimes such as terrorism, human trafficking
and pedophilia, according to the EC spokesman. But to European online
privacy advocates and telecommunications operators, the new initiative
confirms their worst fears.
"The traffic data of the whole population of the EU -- and the countries
joining -- is to be held on record. It is a move from targeted to
potentially universal surveillance," said Tony Bunyan, an editor for the
civil liberties group Statewatch.
When the directive on data protection for telecommunications was passed in
May, Internet service providers warned that it would be followed by more
draconian legislation that would enhance justice authorities' rights to
snoop on e-mail and Internet users.
"This is the beginning, not the end of data retention," Joe McNamee,
European affairs manager for industry group EuroISPA, said at the time.
"Now we know that all along they were intending to make it compulsory
across Europe," said Bunyan in reaction to the latest legislative initiative.
Internet service providers and telecommunications operators fear being left
to foot the bill for extended storage times for everyday traffic data and
for the retrieval mechanisms needed to make this data accessible to the
authorities.
The data to be retained if the new law is passed would include information
identifying the source, destination and time of communication, as well as
the personal details of the subscriber to any communications device.
Access to this information by law enforcement officials would require a
warrant from a court.
Britain's Investigatory Powers Act allows law enforcement and intelligence
agencies to access personal communications data without any court or
executive warrant. This law may have to be softened to fit in with the
proposed law, a commission spokesman said.
*******************************
Computerworld
Secret Service expands cybersecurity task forces
WASHINGTON -- Businesses in large cities across the U.S. soon will have a
chance to send their IT specialists to quarterly government-sponsored
meetings to compare notes with their peers on cybersecurity.
Companies need not worry that they might risk exposing secrets about their
systems or about successful attacks against their systems, say members of
the government organization facilitating the meetings. That organization is
the U.S. Secret Service, and it prides itself on secrecy.
Nine Secret Service offices across the country, including those in Boston,
Chicago, Los Angeles and Miami, are preparing to roll out their own
Electronic Crimes Task Forces (ECTF), patterned on New York's, which has
been in place for seven years, said Secret Service officials who
participated in Sectors, a cyberterrorism conference in Washington, this week.
The task forces operating in New York and in Washington (see story) are
designed to foster open discussions on security and to help companies
tighten cybersecurity through cooperation with other companies, academics
and government IT specialists, said Bob Weaver, the assistant special agent
in charge of the task force in New York.
The task forces have worked so well that Congress mandated that they be set
up in every major U.S. city under the Patriot Act, passed earlier this year
in response to the Sept. 11 terrorist attacks, Weaver said. In addition, an
appropriations bill now awaiting President Bush's signature includes $17
million in additional money for the Secret Service to fund the first set of
new task forces.
The quarterly meetings held by the New York task force have brought
together as many as 500 participants, and the Washington meetings have seen
as many as 250, said Secret Service special agent Bryan Palma. Companies
are encouraged to send no more than two representatives and to prepare for
a general session that is open to reporters, Palma said.
"But when something has to be kept secret, we know how to do it," Palma
said. "Our name proves we know how."
The task forces are the "only vehicle of their kind" in law enforcement,
said special agent John Frazzini. He acknowledged that the business
community might consider the Secret Service an unlikely partner in the
struggle against cyberterrorism. But the task forces show that law
enforcement is trying to do business differently by actively working with
companies to prevent and prepare for cyberterrorism, he said. Frazzini
views this as a change within the service that places more emphasis on
education and prevention.
***************************
Washington Post
Microsoft Warns of Security Risks in Office, IE
Reuters
By Reed Stevenson
SEATTLE (Reuters) - Microsoft Corp. said on Thursday that "critical"
security lapses in its Office software and Internet Explorer Web browser
put tens of millions of users at risk of having their files read and
altered by online attackers.
The world's No. 1 software maker said that an attacker, using e-mail or a
Web page, could use Internet related parts of Office to run programs, alter
data and wipe out the hard drive as well as view file and clipboard
contents on a user's system.
Office is a software product that runs on Windows and is used to write
documents and crunch numbers.
"Microsoft is committed to keeping customers' information safe, and is
providing a patch that eliminates three vulnerabilities in Office Web
Components," Microsoft Security Program Manager Christopher Budd said in an
e-mail.
In addition, Microsoft reported vulnerabilities in the three latest
versions of its dominant Internet Explorer browser software that allows
infiltrators to read files.
Microsoft urged users to fix the glitches by downloading software patches
from Microsoft's TechNet Web site (http://www.microsoft.com/technet).
"It's important that users get the patch," said Russ Cooper, head of
security at TruSecure Corp., a computer security company, and editor of
NTBugTraq.
"Typically with these types of issues it will be six to nine months until
we see a massive attempt to start exploiting it," Cooper said, adding that
a preemptive patch was critical.
Since Office is used by at least 100 million users, the risk of widespread
attacks was significant, Cooper said.
The security warnings are the latest headaches for the Redmond,
Washington-based software company.
Microsoft, shaken by break-ins to its system and vulnerabilities in its
software, launched a "trustworthy computing" campaign earlier this year to
improve the security of all of its software.
Since that initiative, which chairman Bill Gates said had cost the company
$100 million so far this year, Microsoft has issued at least 30 security
bulletins for flaws in its software.
Last week, security experts reported serious flaws in the Internet Explorer
browser and a complementary encryption program that could expose credit
card and other sensitive information of Internet users.
The Office-related programs vulnerable to attacks include Microsoft Office
2000, Office XP, Money 2002, Money 2003, Project 2002 as well as server
software related to such client software, Microsoft said.
Microsoft said it is not aware of any specific security breaches or the
amount of any potential damage that might have occurred due to
vulnerabilities in its software.
*****************************
USA Today
FBI raids consulting firm that hacked into military computers
SAN DIEGO (AP) The FBI raided the offices of a consulting firm after a
newspaper trumpeted the company's claims that it found security loopholes
in U.S. military computers.
In demonstrating how easy it was to penetrate sensitive military computers,
four-month-old ForensicTec Solutions may have violated federal law
prohibiting unauthorized intrusions. The FBI raided the offices of the San
Diego firm over the weekend.
ForensicTec said it identified 34 military sites where they said network
security was easily compromised, including Army computers at Fort Hood,
Texas; NASA's Ames Research Center in Northern California and Navy
facilities in Maryland and Virginia.
The company reportedly used free software to identify vulnerable computers
and then peruse hundreds of confidential files containing military
procedures, e-mail, Social Security numbers and financial data.
The company's president, Brett O'Keeffe, told The Washington Post that its
goal was to call attention to the need for better security and "get some
positive exposure" for the fledgling firm.
Hours after the claims were reported Friday in The Post, the FBI began
searching the firm's offices.
A spokesman for ForensicTec did not immediately return a phone call
Thursday from The Associated Press.
The FBI confirmed the search, but a spokesman declined to discuss the case.
Army investigators also joined the investigation.
"Regardless of the stated intent, unauthorized entry into Army computer
systems is a federal offense," said Marc Raimondi, spokesman for the Army
Criminal Investigation Command in Virginia. "If there is an intrusion and
we are notified or we detect it, then we lauch a criminal investigation
into the act."
Even though the raid may look to some like retribution, Mark Rasch, the
Justice Department's former top computer crimes prosecutor, said
ForensicTec stepped over the line.
"Just because you can break into Army computers doesn't mean you either
should do it, have a right to do it, or can avoid criminal liability for
doing it," Rasch said.
ForensicTec should have gotten permission from the Army before probing
their computers, Rasch said.
"They thought they were doing a public service," Rasch said. "What they
did, at best, was exercised a monumental lack of judgment."
***************************
USA Today
'Reply-all' button can be hazardous to your job
By Chad Graham, Gannett News Service
Maybe my brain just locked up. Maybe it was a case of Idiotic Stupiditis.
Picture it: Hollywood trade paper two years ago. One of the pushiest,
meanest editors on Earth is on the instant message system tearing into me
for no apparent reason for the 10th time that day.
I snap and message one of my co-workers also a target of the editor's
wrath. My message includes the English translation of "%&!$" and concludes
with a prediction that our boss will probably be piloting the next boat to
hell.
I push "send," and the message is delivered to the boss.
Rats!
After the color completely drains from my face, I discover said boss has
stepped out of the office and hasn't seen the message. In a pure "Mission:
Impossible" moment, I sneak into her office and in a second delete the
e-mail. My heart still pounds at the thought of getting caught and probably
canned.
Others aren't so lucky.
The "reply all" button can be evil.
At a major Des Moines employer several years ago, a couple of employees
were having extramarital activity nights. One sent an e-mail to the other
saying she could no longer continue and the get-togethers had to stop. A
slight problem: She hit the "reply all" button by mistake and in seconds
all of her co-workers knew about the end of the affair.
A friend of mine accidentally sent family reunion pictures to a boss, who
had the same last name as her uncle. Another friend accidentally zapped a
raunchy joke to the entire office ironically, a joke about forwarded
messages. Other friends have sent biting messages about co-workers, only to
have 15 people read their running commentary.
"It's happening all over," said Dana May Casperson, a business etiquette
consultant based in Santa Rosa, Calif.
Casperson, the author of Power Etiquette: What You Don't Know Can Kill Your
Career, tells the story of the worker who accidentally e-mailed extremely
personal information about the boss to the entire office.
"I would think that every person by now would know the potential of what
can happen with e-mail," she said. "You're spreading gossip. It's a tragedy."
Casperson's solution to a nasty e-mail sent to the boss? Fess up as soon as
possible.
Don't ramble, either. Prepare what you are going to say, maybe explaining
that the incident was a slip of the mind, and apologize.
"It takes a lot of courage to go face-to-face, but you'll gain respect,"
she said. "You still might lose your job or damage your promotion."
What about the Chad Graham solution of tinkering with the boss's e-mail
system?
"That ranks right up there with industrial espionage," said a laughing Dale
Cyphert, coordinator of the University of Northern Iowa's business
communication program. "That really strikes me as not being a safe move."
If a young worker has a grievance with his or her boss, Cyphert's advice is
to pick the battle. Office newbies need to know when to keep their traps
shut and adjust to the company, such as hating the dress code, and when a
problem is serious enough to go to the boss or human resources department.
To find out how to maneuver through the politics, Cyphert advises finding a
trusty mentor who has worked at the company for years. That person may not
tell you what you want to hear, but run the complaint by the person first.
It's safer than firing off an angry e-mail.
Meanwhile, no more e-mail shenanigans for me. I'm sticking with the old
stand-by of talking behind co-workers' backs.
There's no electronic record. Only plausible deniability.
Chad Graham writes for The Des Moines Register
**********************************
New York Times
Ford Settles Domain Name Lawsuit
By THE ASSOCIATED PRESS
DETROIT (AP) -- Ford Motor Co. and a local entrepreneur have reached a
settlement over two Internet domain names -- fordfield.com and fordfield.net.
In 1999 and 2000, Michael Ouellette secured the Internet addresses as well
as the corporation name Ford Field Inc. for his small T-shirt and grass
seed business in Troy.
Now with the $350 million Detroit Lions stadium named Ford Field set to
open Saturday, the automaker has paid Ouellette for the Web addresses and
corporation name.
Neither side would disclose terms of the deal, which ends a nearly yearlong
dispute between Ford and Ouellette.
Ford filed a federal lawsuit against Ouellette last year, accusing him of
trademark infringement and cybersquatting -- hoarding of potentially
valuable Internet addresses and hoping for a payout.
``It's an acceptable and practical resolution for both parties,'' Ford
spokeswoman Kathleen Vokes told The Detroit News for a Thursday story.
Ouellette said his business' name was inspired by a Clinton Township public
baseball diamond named Ford Field, where he used to play. He said his
business was established before the name of the new Lions stadium was
revealed in November 1999.
Ouellette said he ``was happy and very satisfied with the settlement. The
litigation was getting pretty intense.''
****************************
News.com
By Paul Festa
Spam crusaders slog it out in court
Staff Writer, CNET News.com
August 23, 2002, 4:00 AM PT
When Joel Hodgell took a Florida steroids marketer to court for violating
Washington state's anti-spam statute, he thought he might make some money
while striking a blow against junk e-mail.
Instead, he was hit last month with a nearly $7,000 judgment to pay the
spammer's legal fees.
Hodgell is one of a small and slowly growing cadre of spam activists who
are attacking spam using the state laws that have sprung up over the past
five years to restrict or outlaw the sending of unsolicited commercial
e-mail. Some compare these activists' suits to the anti-smoking legal
trailblazers who 20 years ago started paving the way for the recent
multibillion-dollar judgments against the tobacco industry.
Hodgell ascribed the judgment to a technical error he made before he got a
lawyer and dismissed it as a minor setback in a longer fight against the
steroids marketer and spammers in general. But the Seattle litigant is
hardly alone in finding that the road to courtroom spoils from spam is
strewn with hazards.
In recent months, a Utah man found his hard drive subpoenaed in a
class-action spam suit against Sprint--a subpoena the judge in the case
ultimately refused to enforce. In addition, successful spam plaintiffs
everywhere have found it easier to win judgments than to collect on them
from often shadowy defendants.
Anti-spam litigants, often equipped with nothing more than a business or
technology background and a sense of outrage, are finding themselves thrust
into a temperamental justice system that is struggling to achieve
consistency in a volatile new area of the law.
The Hodgell case vividly illustrates the pitfalls of bringing on individual
cases against junk e-mailers, giving pause to anti-spam plaintiffs who are
already distrustful of the legal system.
"There is continued frustration among anti-spam litigants," said Bruce
Miller, one of the first recipients of a spam settlement. Miller cited
significant differences of opinion among judges at the King County District
Court in Washington state over jurisdiction and over factual errors in the
court's informational Web site, and warned potential spam litigants: "Where
the judges are being real nitpicky about enforcing rules and laws, the
information from the court itself can lead people to think things that are
not true and that will not be upheld in court."
Much of the legal fire from individuals comes in small claims court, which
imposes maximum judgments of a few hundred dollars. Many spam litigants are
representing themselves in court and taking a crash course in the law.
Some, like Hodgell, are taking their cases to higher courts in search of
bulkier judgments. With his current legal team, Hodgell plans to re-file
his case in either federal district court or state superior court in hopes
of winning a judgment between $500,000 and $1 million.
With the risk of expensive counter-judgments and other obstacles warding
individual spam recipients away from the courts, the real impact from spam
law may wind up coming from corporate lawyers, state attorneys general and
federal commissions.
Big boys on the battlefront
Internet service providers, for example, have met with significant
successes on the anti-spam legal battlefield. AOL Time Warner's America
Online unit, for example, in April won an injunction and secured a
"significant" monetary settlement against a spammer; EarthLink last month
secured a more than $24 million judgment in a comparable case.
In state capitals, attorneys general are also on the legal warpath against
senders of unsolicited commercial e-mail.
In New York, Attorney General Elliot Spitzer in May sued an outfit called
MonsterHut for sending unsolicited messages to New Yorkers. Washington's
attorney general, Christine Gregoire, this year sued two alleged spammers
in Minnesota.
California Attorney General Bill Lockyer has been soliciting specimens of
junk e-mail from anti-spam mailing lists to lay the groundwork for lawsuits.
"What we're looking for is examples of spam that is illegal," said Hallye
Jordan, a representative for the attorney general. "We are actively
pursuing companies that are violating California's anti-spam laws, and if
we find that there are companies that we can track and prove that they are
violating the law, we will take appropriate action."
At the federal level, the Federal Trade Commission early this year warned
that it is preparing to go after spammers in court. But the commission's
threats have yet to be manifested in legal action.
Meanwhile, some individuals--variously bold, litigious and idealistic--are
pursuing spammers, at once aided and confused by a growing patchwork quilt
of state laws.
Twenty-six U.S. states have some sort of law restricting or banning
unsolicited e-mail, according to the Spamlaws Web site, maintained by David
Sorkin, an associate professor of law at The John Marshall Law School in
Chicago, Ill.
A paramount concern for spam law trailblazers is having to learn the quirks
and eccentricities of the law and of temperamental judges in a
far-from-settled legal terrain.
A fellow King County resident seconded Miller's account of the court system
there.
"The biggest obstacle was that the three judges at the local district court
had three different views of what the law said and how to bring these
cases, so I had to learn a different set of rules for each one judge," said
Bennett Haselton, who has brought more than 50 anti-spam cases to court in
Washington state. "And since judges don't say in advance what rules they're
following--each of them says that their different version of the rules is
'the law'--I had to learn each of their rules just by trial and error."
Haselton, the anti-content filtering and anti-spam activist behind the
Peacefire Web site, has been taking spammers to court for much of the year,
racking up $5,000 in judgments against them.
But he has yet to see the bulk of his awards, having collected less than
$1,000 so far.
Haselton is not alone among spam litigants to have met with mixed success
in court. A California woman who took the online delivery service Kozmo to
court for spamming her wound up failing to collect on a judgment against
the company because it went out of business first.
Legal loopholes
But as one of the most experienced veterans of Washington's spam law
battlefield, Haselton reserved his biggest complaints for the vagaries of
the legal system.
Haselton criticized what he called "the wild inconsistencies in judges'
handling of these cases, not just on the anti-spam law but on basic
questions of courtroom procedure. This is a serious impediment to the
effectiveness of anti-spam laws, and it has to be addressed before calling
for more laws will make any difference."
Courtroom consistency aside, legal academics question the degree to which
the law can thwart spam.
"Based on our mailboxes, we know the laws aren't having a very good
deterrent effect," said Eric Goldman, assistant professor at Marquette
University Law School in Milwaukee, Wis., and former chief counsel for
Epinions. "And not many lawsuits are being brought under the laws. So what
effect have they had? Or were the laws just a way for the legislators to
slap each other on the back, go home after a hard day of work, and
self-delusionally think they made a difference?"
Spamlaws' Sorkin took a somewhat brighter view of the law's effectiveness
but agreed that it alone would be insufficient to stem the spam tide.
"Lawsuits have been somewhat successful in addressing the most extreme
instances of spamming, and a number of jurisdictions have enacted specific
laws in an attempt to regulate spam," Sorkin wrote in a USF Law Review
article. "But legal approaches in general seem to have been no more
successful than technical responses to the spam problem, and the primary
result to date is a great deal of uncertainty surrounding spam. Ultimately,
a consensus approach that coordinates legal and technical responses is
likely to provide the only effective solution."
One of the reasons spam litigants are only just getting started is that
laws against unsolicited e-mail have wended so slowly through legislatures
and legal challenges.
Washington state's law, for example, was passed nearly four years ago but
spent much of the intervening time tied up in the courts before the state's
high court upheld it last year.
Another hurdle is the wide disparity of restrictions state by state. That
has spam litigants agitating for a national law that would supercede state
laws--but an effort to pass such legislation has stalled in Congress.
Steps against spam
Meanwhile, anti-spam litigants--aspiring or actual--have a growing list of
resources on the Web to assist them in their legal exploits. The Spamcon
Foundation's Law Center (formerly Suespammers Project) keeps track of laws
and individual cases and hosts a discussion forum. Peacefire has its own
page recommending legal anti-spam action; and Miller maintains a page
advising Washington residents how to sue spammers.
While waiting for law to settle out, spam litigants warn that going to
court is not for the faint of heart--or those looking to earn a quick buck.
"I would not recommend being a trailblazer to anyone who wants to do it for
profit," Haselton said. "I would only recommend it to someone if a) they're
idealistic enough to want to help fight spam without making enough money to
pay for their time, or b) they want some practice in how to use the legal
system.
"Once the trailblazing is done, however, and courts have begun to handle
the cases more consistently, I hope that enough Washingtonians will become
aware of their rights and bring more of these cases, either by themselves
or through a lawyer, and take some spammers' money until the spammers back
off," Haselton continued. "The winnings won't be enough to make a living
off of--and, no, nobody is making a living off of it now--but it will be
enough to motivate people who are not as idealistic as the people doing it
now."
Others pursuing spammers in court sounded a similarly community-minded note.
"Bringing a spam lawsuit can be frustrating and hazardous, if done in a
court where attorney fees apply," said Miller, who 20 years ago was a
"nonsmoker's rights" activist. "But bringing them is a part of the
necessary process of shifting public policy. Shifting public policy takes
time. But you can probably help join the social movement to clean up
Internet e-mail and get a few bucks along the way."
*************************
News.com
Setting a trap for laptop thieves
By Sandeep Junnarkar
Notebook computers are small, powerful, increasingly affordable--and easily
stolen. Now, new services being offered by major PC makers could help track
down pilfered systems.
A spate of publicity in recent months over misplaced laptops at government
agencies, such as those missing from the FBI, the Internal Revenue Service
and the Pentagon, has drawn attention to the problem of notebook computer
theft.
"At one time, people stole televisions; then they stole VCRs. Now, laptops
are the most stolen article of property in San Francisco," said Richard
Leon, an inspector in the San Francisco Police Department burglary detail.
"We get reports of hundreds of laptops stolen each month."
Looking to stem that problem--and to gain some badly needed
revenue--leading notebook makers IBM, Hewlett-Packard and Dell Computer are
offering software with their new notebooks that's the PC industry's
equivalent of the LoJack stolen car tracking system.
But instead of using a hidden transmitter--as LoJack does--software from
companies like Absolute Software and zTrace Technologies is embedded on
notebook hard drives, allowing systems to be tracked as soon as they are
connected to the Internet.
IBM, which offers Absolute's ComputracePlus, said it is seeing growing
demand from laptop buyers in the education and enterprise markets.
Vancouver, British Columbia-based Absolute said it saw a nine percent
growth in sales in 2001 but expects growth of between 35 percent and 50
percent this year.
IBM has a variety of packages for the tracking service, ranging from a $49,
12-month agreement for one license, to site licenses that cover 20 notebook
systems for $2,999 for 48 months.
zTrace, which is available on HP laptops, is priced similarly. A one-year
contract for a single notebook costs $49.95. A 20-user license is $2,499
for 48 months.
A call to action
When a laptop is loaded with Absolute's ComputracePlus application,
tracking-agent software silently connects with the company's monitoring
center whenever the device is connected to the Internet. If that notebook
is reported stolen or lost, its location is tracked and local law
enforcement is called in to recover the stolen property.
Leon said the software is very effective. "One time we were tracking a
laptop broadcast as we approached an apartment to serve a warrant," he
said. "When we knocked on the door, this guy answers and over his shoulder
we could see the laptop all lit up and connected to the phone line."
The technology works over analog phone lines, as well as digital broadband
connections. If the laptop is calling over a phone line, the software uses
technology that allows Absolute to identify the phone number. If the device
connects to the Internet over a T1 line, a cable modem or DSL, the location
is traced using the IP (Internet protocol) address.
"We take the address to the ISP (Internet service provider)--AOL or whoever
it happens to be--and get the account information associated with that IP
address," said John Livingston, Absolute's chief executive.
But like most computer security products and services, analysts warn, these
tracking systems have vulnerabilities.
"A lot of people steal laptops for commercial espionage--to get the data
that resides on them," said Alan Promisel, a portable computer analyst at
research firm IDC. "Those people will steal them without ever intending to
go online."
SFPD's Leon agrees, noting that businesses users are often less interested
in retrieving the laptop and more worried about the confidentiality of the
data on their systems. A benefit to these tracking systems is that a
customer can request a signal be sent to the notebook that would delete all
the information on the hard drive.
Another weakness of the tracking systems is that in some cases a thief
could reformat and configure the hard drive in a way that bypasses the
tracking agent.
"We'll survive a reformat of the hard drive, but where it gets tricky is
when people reinstall operating systems on top of each other. It also
depends on what OS is being loaded," Absolute's Livingston said.
Specifically, the software will survive a reformat and reinstallation of
any Windows 9X operating system. Installing Windows XP or 2000 can create
problems, depending on how the system is configured.
"Someone can wipe the drive everywhere except where we are loaded, because
we're working at such a low level in the system--that is, below the Windows
operating system at the hardware level," Livingston said.
Experts say this type of tracking security would work best if it is part of
a larger theft-prevention strategy. Other devices, such as cable locks, can
prevent the theft from occurring in the first place, as can motion
detectors that sound an alarm if the notebook is removed beyond a certain
perimeter.
Some information technology managers said that in certain situations, such
as in a business setting or on a college campus, warning notices posted in
conspicuous places can also serve as a deterrent.
"Before we got the service, we had two or three laptops disappear from each
campus," said Richard Scaletti, director of networks and telecommunications
for North Shore Community College's three campuses in Massachusetts. "We
installed the software and put up signs--not one has disappeared yet."
***************************
Sydney Morning Herald
Unix group calls for more Open Source use in govt
The Australian UNIX and Open Systems User Group (AUUG, Inc.) has called on
the Federal government to adopt more IT solutions based on Open Source
solutions such as Linux and BSD.
In a media release, the AUUG said the Government deserved praise for its
recent progress in adopting Open Source solutions.
There were two recent instances, the first when CentreLink, the world's
12th largest processing organisation, announced that it had established a
world class Linux Laboratory in collaboration with IBM to reduce costs and
raise the flexibility of the agency's IT systems and the second when the
Federal Department of Veterans' Affairs decided to move its file and print
services for all branch offices to an IBM zSeries mainframe running Linux.
The group called on the Government to review all areas of IT procurement
and information standards and ensure there was no bias against Open Source
solutions based on open standards.
Government IT managers would be able to calculate the true return on
investment for each acquisition and deployment - enabling the comparison of
open and proprietary solutions, a comparison that the group believes will
show that Open Source can win and, in the long run, save tax dollars.
AUUG's call comes ahead of its annual national conference, to be held in
Melbourne from September 1 to 6. Details of the conference are available
here. http://www.auug.org.au/conf/auug2002/
****************************
Sydney Morning Herald
Copy-proof CDs soon, claims Israeli company
An Israeli company, Doc-Witness, has developed a means of copy protection
for CDs/DVDs that, it claims, will prevent copying, sharing, counterfeiting
and faking IDs.
The technology, OpSecure, works by turning an ordinary CD drive into a
smart card reader. A smart card embedded in the CD unlocks the disc's
encrypted content.
A photodetector at the CD's edge turns the drive's laser into electrical
pulses which request the key from the embedded smart card. If the card
judges that the request is legitimate, it returns the key as an electronic
signal that an onboard light-emitting diode converts into light and beams
back to the drive.
The CD can be copied but without the smart card, it will not run.
Instructions in the smart card can also prevent the software on the disc
being installed on more computers than intended.
Doc-Witness claims OpSecure is impractical to crack since it is
hardware-based and is based on dynamic protection. Unlike competitors, the
company claims it is not based on passive protection (that is easily
cracked) or remote activation (that is both offensive to customer's privacy
and easily cracked).
*****************************
Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 510
2120 L Street, NW
Washington, D.C. 20037
202-478-6124
lillie.coney@xxxxxxx