[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips May 23, 2002
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, CSSP <cssp@xxxxxxx>;, glee@xxxxxxxxxxxxx;, Charlie Oriez <coriez@xxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, computer_security_day@xxxxxxx;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;;
- Subject: Clips May 23, 2002
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Thu, 23 May 2002 10:16:34 -0400
Clips May 23, 2002
ARTICLES
Open-Source Fight Flares At Pentagon
Computers Would Track Terror Threat
GAO pushes training for Army teams
Study Looks at Health Web Site Use
DOD focus on joint networks urged
Top 10 e-mail scams exposed
Text message votes 'trivialises' elections
Screens blamed for 'air blunders'
Internet2 speed record
Plan to give comunities access to broadband internet
DOD IT projects come under fire
Terror warning issued for nation's ports
Ventura body slams ISP lobby on privacy
******************
Washington Post
Open-Source Fight Flares At Pentagon
Microsoft Lobbies Hard Against Free Software
By Jonathan Krim
Microsoft Corp. is aggressively lobbying the Pentagon to squelch its
growing use of freely distributed computer software and switch to
proprietary systems such as those sold by the software giant, according to
officials familiar with the campaign.
In what one military source called a "barrage" of contacts with officials
at the Defense Information Systems Agency and the office of Defense
Secretary Donald H. Rumsfeld over the past few months, the company said
"open source" software threatens security and its intellectual property.
But the effort may have backfired. A May 10 report prepared for the Defense
Department concluded that open source often results in more secure, less
expensive applications and that, if anything, its use should be expanded.
"Banning open source would have immediate, broad, and strongly negative
impacts on the ability of many sensitive and security-focused DOD groups to
protect themselves against cyberattacks," said the report, by Mitre Corp.
A Microsoft Corp. spokesman acknowledged discussions between the company
and the Pentagon but denied urging a ban on open-source software. He also
said Microsoft did not focus on potential security flaws.
Spokesman Jon Murchinson said Microsoft has been talking about how to allow
open-source and proprietary software to coexist. "Our goal is to resolve
difficult issues that are driving a wedge between the commercial and free
software models," he said.
John Stenbit, an assistant secretary of defense and the Defense
Department's chief information officer, said that Microsoft has said using
free software with commercial software might violate companies'
intellectual-property rights. Stenbit said the issue is legally "murky."
The company also complained that the Pentagon is funding research on making
free software more secure, which in effect subsidizes Microsoft's
open-source competitors, Stenbit said.
Microsoft's push is a new front in a long-running company assault on the
open-source movement, which company officials have called "a cancer" and
un-American.
Software is designated open source when its underlying computer code is
available for anyone to license, enhance or customize, often at no cost.
The theory is that by putting source code in the public domain, programmers
worldwide can improve software by sharing one another's work.
Vendors of the proprietary systems, such as Microsoft and Oracle Corp.,
keep their source codes secret, control changes to programs and collect all
licensing fees for their use.
Government agencies use a patchwork of systems and software, and
proprietary software is still the most widely used. But open source has
become more popular with businesses and government.
The Mitre report said open-source software "plays a more critical role in
the DOD than has been generally recognized."
The report identified 249 uses of open-source systems and tools, including
running a Web portal for the Defense Intelligence Agency, running network
security for the Army command in Europe and support for numerous Air Force
Computer Network Defense tools.
Among the most high-profile efforts is research funded by the National
Security Agency to develop a more secure version of the open-source Linux
operating system, which competes with Microsoft's Windows.
The report said banning open-source software would drive up costs, though
it offered no specifics. Some government agencies have saved significantly
by using open source.
At the Census Bureau, programmers used open-source software to launch a Web
site for obtaining federal statistics for $47,000, bureau officials said.
It would have cost $358,000 if proprietary software were used, they said.
Microsoft has argued that some free-licensing regimes are antithetical to
the government's stated policy that moneymaking applications should develop
from government-funded research and that intellectual property should be
protected.
Microsoft also said open-source software is inherently less secure because
the code is available for the world to examine for flaws, making it
possible for hackers or criminals to exploit them. Proprietary software,
the company argued, is more secure because of its closed nature.
"I've never seen a systematic study that showed open source to be more
secure," said Dorothy Denning, a professor of computer science at
Georgetown University who specializes in information warfare.
Others argue that the flexibility provided by open-source software is
essential, enabling users to respond quickly to flaws that are found.
"With open source, there is no need to wait for a large software firm to
decide if a set of changes is in its best interests," said Eugene Spafford,
a computer-science professor at Purdue University who specializes in security.
Jonathan Shapiro, who teaches computer science at Johns Hopkins University,
said: "There is data that when the customer can inspect the code the vendor
is more responsive. . . . Microsoft is in a very weak position to make this
argument. Whose software is the largest, most consistent source of security
flaws? It's Microsoft."
Stenbit said that the debate is academic and that what matters is how
secure a given piece of software is. To that end, the Defense Department is
now prohibited from purchasing any software that has not undergone security
testing by the NSA. Stenbit said he is unaware of any open-source software
that has been tested.
***********************
MSNBC
Telemarketing telecoms draw ire
Opt-in? Opt-out? Just don't call me, consumers plead
INDIANAPOLIS, May 22 When Jason Settles added his name to Indiana's new
"no-call" list, he expected relief from the tyranny of telemarketers. But
the computer consultant's dreams of dinner in peace quickly turned to alarm
when he learned his own phone company intended to share details of his
calling habits with its corporate affiliates.
UNLESS CUSTOMERS CALL a toll-free number to request otherwise, Ameritech
plans to share information about what numbers they call, how often they
call and how much they pay.
Could telephone offers of Internet, wireless service and other
products be far behind? Settles asked.
"From a marketing standpoint, they're taking the path of least
resistance if you don't do anything, we're going to have the right to use
that information," Settles said. "Most people don't ever get around to
calling that number."
While insisting they are upholding their legal obligation to
protect customers' calling data, many of the nation's biggest phone
companies have begun sharing that information with affiliates.
'OPT-OUT' PLANS DRAW FURY
Verizon, Ameritech parent SBC Communications Inc. and Sprint are
among the telecommunications giants using an "opt-out" approach: notifying
customers about their data-sharing plans, typically through fliers tucked
into phone bills, and assuming customers approve unless they call a
toll-free number.
This backfired for Denver-based Qwest Communications International,
which withdrew its "opt-out" plans in January after thousands of customers
in the West expressed privacy concerns.
Verizon also has responded to consumer resistance, mailing
"opt-out" notices to local-service customers in 30 of the 31 states it
serves. The exception was Washington, where the mailing was postponed after
the Qwest outcry, spokesman Bill Kula said.
The turmoil comes as consumer groups and attorneys general in 38
states are urging federal regulators to reinstate restrictions that
required phone companies to employ an "opt-in" approach for sharing
customer calling information with affiliates.
The banking industry also is in a long-running fight against
information-sharing restrictions, with lobbyists defeating "opt-in"
legislation in several states.
"The whole idea that a company can freely market their customers'
sensitive or personal information unless a customer expressly tells them
not to is troubling to me and should be troubling to anyone who values
personal privacy," said Michigan Attorney General Jennifer Grandholm, one
of the AGs who wrote the Federal Communications Commission in December to
urge an "opt-in" requirement.
In 1999, US West, a former Baby Bell company, challenged the
previous "opt-in" requirement as an unconstitutional infringement of
commercial speech, and the 10th U.S. Circuit Court of Appeals invalidated
the rule.
In response, the FCC is reconsidering regulation of customer
calling data. New rules could emerge by year's end, FCC spokesman Michael
Balmoris said.
Privacy on the Internet also is a target. Legislation has been
introduced in the Senate by Sen. Ernest Hollings, D-S.C., that would allow
data such as addresses, records of items purchased, user preferences and
Web browsing histories, to be shared with third parties unless customers
take the initiative to forbid it.
TELECOMS: CONSUMERS GAIN
Telephone companies that have chosen the "opt-out" route concede
that sharing customer data will lead to more phone sales pitches. But they
argue consumers gain by learning about service options and bill-cutting
strategies.
"I think the biggest misperception people have is that we're selling
this information to third parties," said Mike Marker, a spokesman for SBC
Ameritech of Indiana.
Ultimately, Marker said, sharing of calling data among affiliates
will help usher in a new era of "bundled" communications in which customers
will pay a single bill for a variety of communications services.
Jeff Kagan, an independent telecommunications analyst in Atlanta,
agreed that consumers could benefit in the long run.
"If I'm doing business with the company, I already trust them. So I
would like to know what other products they are offering," he said. "It's a
way of solidifying the customer base."
Still, many consumers want more protection from telemarketers, not
less. More than 25 states have passed "no-call" list legislation, most with
penalties. Typically, violators are fined, from $2,000 in New York to
$10,000 for first-time violators in Indiana.
Under Indiana's law, corporate affiliates of phone companies are
barred from making sales pitches to phone customers on the state's list.
That's a relief to Settles, who said he unknowingly tossed out the
flier Ameritech inserted into January phone bills to notify customers that
had to call to protect their data.
Ameritech should require customers to "opt-in" if they want to
share their calling details, he said.
"As a paying customer, I feel that it is poor service" to take the
opposite approach, he said.
********************
Associated Press
Computers Would Track Terror Threat
By MICHELLE LOCKE, Associated Press Writer
LIVERMORE, Calif. (AP) - National lab scientists are developing a plan to
help cities track biological and chemical agents such as anthrax and other
nearly invisible weapons of mass destruction.
The program, demonstrated Wednesday at the Lawrence Livermore National
Laboratory, links cities by computer to the National Atmospheric Release
Advisory Center (NARAC), which now provides emergency planning response
help to the Energy and Defense departments.
In case of accident or attack, cities would send NARAC the coordinates
where a toxic release is believed to have taken place. Using weather and
previously gathered geographic information, NARAC would map out where the
substance is likely to spread.
The information, available on the city's computers within minutes, should
help emergency response workers decide where to evacuate and what areas
represent safe haven.
"This will provide them generally with a situational analysis of what is
going on," said Don Ermak, leader of the lab's Atmospheric Release
Assessment Program.
Scientists picked Seattle as the pilot city for the program, working with
the nonprofit group Public Technology Inc., an affiliate of the National
League of Cities and other municipal associations.
Lab scientists showed an image of a lemon yellow cloud superimposed over a
map of Seattle in a simulation of what could happen if a release of sprayed
anthrax occurred for about an hour downtown.
The plume, which extended for about 10 miles, showed a small red zone near
the point of release where 85 percent of the population might have received
a lethal dose.
Schools, hospitals and police stations were also highlighted on the map.
Ermak said officials are still working with Seattle to gather information
for the model and hope to begin testing and training exercises this summer.
The initial cost of linking a city to NARAC is between $300,000 and
$500,000. In Seattle's case, the city is providing manpower and the lab is
picking up the bill for the rest. However, Ermak said lab officials hope to
expand their program to five or six cities and bring the cost down to
between $25,000 and $50,000 per city.
Eventually, they hope to have 100 cities involved, with information
available to city, state and federal officials.
"This project is extremely exciting for us because it brings a technology
not only to the city of Seattle ... but potentially to other cities and
towns across the country," said Ronda Mosley-Rovi of Public Technology
Inc., who spoke at the Wednesday demonstration by way of a video hookup.
*******************
Federal Computer Week
GAO pushes training for Army teams
The Army faces numerous obstacles, including a shrinking workforce and
difficulties in training soldiers on digitized systems, as it plans to
field its first Interim Brigade Combat Team (IBCT) one year from now,
according to a General Accounting Office report.
The IBCT is intended to be a lethal and survivable deterrent force that can
be rapidly deployed anywhere in the world. It is supposed to fill a gap in
military capability between the Army's heavy combat forces, which are
lethal and survivable, and its light infantry forces, which are rapidly
deployable.
Its digital systems are designed to enable soldiers to "see" an enhanced
view of the battlefield through intelligence, reconnaissance and
surveillance, which should make it possible to engage an enemy before
coming into actual contact, according to the May 17 report, "Military
Transformation: Army Actions Needed to Enhance Formation of Future Interim
Brigade Combat Teams."
"Successful formation of the first IBCT is critical to the Army's
transformation plan because it will begin to fill a near-term gap in
military capability and test new concepts that would be integrated into the
future Objective Force," the report said. "Although Army officials are
pleased with the progress made thus far, concerns remain about whether all
capabilities envisioned for the brigade will be achieved in time for the
IBCT's May 2003 certification milestone."
The Army's first IBCTs, stationed at Fort Lewis, Wash., will be without two
interim armored vehicles, and "maintaining proficiency in digital systems
has challenged the IBCT due to personnel turnover," according to the GAO
report.
To address these shortcomings, the watchdog agency recommended that the
secretary of Defense direct the Army's leadership to:
* Expedite development of a program to sustain personnel skills on
digitized equipment so that it will be available for subsequent IBCTs.
* Collect and analyze data on why soldiers leave the IBCTs and take
appropriate action to reduce personnel turnover.
* Estimate the extent and cost of facility improvements that will be needed
at installations scheduled to accommodate the subsequent IBCTs to assist
them in their planning.
* Establish an organization like the one at Fort Lewis that was set up to
ensure the successful formation of the first two IBCTs at subsequent IBCT
locations to deal with daily challenges.
* Provide a central collection point for IBCT lessons learned to make the
information available to personnel throughout the Army.
In a May 3 letter responding to a draft copy of the GAO report, Spiros
Pallas, acting director of strategic and tactical systems in the Office of
the Undersecretary of Defense for Acquisition, Technology, and Logistics,
said the Defense Department "generally" agreed with the recommendations.
With respect to GAO calling for the Army to expedite development of a
program for personnel training on digitized equipment, DOD officials said
that its ability to accelerate digitized training was limited by equipment
delivery schedules.
But GAO said that during its review, "Army officials expressed concerns
that the individual soldiers' digitization skills would quickly erode
without a continuing focused regimen of trainingÖ[and] we continue to
believe that the Army needs to expedite developing such a program and
implement it as a part of each IBCT's training program."
***********************
New York Times
Associated Press
Study Looks at Health Web Site Use
NEW YORK (AP) -- Nearly two in three U.S. Internet users go online for
health information, and many may not be applying a healthy enough dose of
skepticism to the advice they find, a new study shows.
The Pew Internet & American Life Project, in a study released Wednesday,
found that only a quarter of Americans who seek health information online
always follow recommended procedures for checking its source and
timeliness. Another quarter did so most of the time, while half did so only
sometimes, hardly ever or never.
Eighteen percent of those surveyed said they had used the Internet to
diagnose or treat a medical condition without consulting a doctor.
``A lot of people are going back to their doctors when they have questions
or checking with other authoritative sources,'' said Lee Rainie, director
of the Pew project. ``There's no evidence people are doing completely
whacky self-diagnoses.''
The Medical Library Association, a nonprofit educational organization,
recommends Internet users check who sponsors the Web site, when the
information was last updated and whether the information is fact or
opinion. In addition, users should visit several sites and consult with
medical professionals, according to the California HealthCare Foundation.
The Pew study found that 62 percent of Internet users, or 73 million
Americans, have gone online for health information. About 6 million use it
on a given day -- more than those who visit health professionals.
Most Internet users who seek health information look for information about
a particular illness or condition, the study found. Other frequent searches
involve information about nutrition, weight control and prescription drugs.
Most users use a search engine or portal to find medical Web sites, which
can lead to questionable sites.
``How do you know what's an ad for a product? How do you know who's even
providing the information?'' said Vicky Rideout, a vice president at the
nonprofit health group Kaiser Family Foundation. ``The best information is
often not in the first 10 results returned.''
The better approach, she said, is to start with a site recommended by a
doctor or other trusted source.
``I think people have more skepticism in theory, ... but in practice the
Internet is rapidly becoming one of the most common sources of health
information,'' Rideout said. ``So while they may say they don't trust it as
much, they are relying on it.''
The Pew report notes that health care seekers often apply common sense
rather than specific techniques when evaluating sites. For example, if the
same information appears on multiple sites, the user will consider it
trustworthy.
But the report also notes that sites often pool resources, so that the same
piece of information can appear at multiple sites, leading users to
mistakenly believe that it comes from multiple sources.
The study was primarily based on telephone interviews with 500 online
health seekers age 18 and older conducted June 19 to Aug. 6, 2001. The
survey has an error margin of plus or minus 4 percent.
*********************
Washington Post
Industry, Government Want 'Whois' Fixes
By David McGuire
Washtech.com Staff Writer
Wednesday, May 22, 2002; 3:06 PM
Rampant inaccuracies in public lists of Internet address holders are
crippling efforts to track down con artists, pirates and other online
wrongdoers, government and industry representatives told a congressional
panel today.
"It's hard to overstate the importance of accurate (registrant) data to our
Internet investigators," Federal Trade Commission Director of Consumer
Protection Howard Beales said today. "We cannot easily sue fraudsters if we
cannot find them."
Beales testified alongside representatives from the Internet addressing
industry at a hearing on the reliability of the "Whois" databases that are
maintained by domain-name sellers.
Witnesses at today's hearing stopped short of asking Congress to fix the
problem, but panel Chairman Howard Coble (R-N.C.) said legislation might be
the right answer.
While Internet registrars - the retail sellers of domain names - are
supposed to maintain up-to-date information about their customers in
publicly available Whois databases, the lists are replete with willful
inaccuracies and incomplete data, Beales told the House Judiciary
Committee's Subcommittee on Courts, the Internet and Intellectual Property.
Although some Whois inaccuracies stem from honest mistakes, much of the
false information is deliberately keyed in by domain buyers trying to
obscure their identities, Beales said.
Steven Metalitz, the vice president and general counsel of the Copyright
Coalition on Domain Names, questioned the resolve of Internet registrars to
clean up their databases.
"It's hard to escape the conclusion that most registrars don't care about
the quality of the Whois data they collect," Metalitz said.
Instead of congressional action, some witnesses at today's hearing
suggested that the Internet Corporation for Assigned Names and Numbers
(ICANN) - which manages the Internet's global addressing system - should
take a more active role in tackling the problem of fraudulent Whois data.
"I think ICANN is the logical party to do this," Metalitz said. "If ICANN
won't do it, I think you have to look at legislative and other" options, he
said.
ICANN Chief Policy Officer Andrew McLaughlin said following the hearing hat
while there was no "magic bullet" for cleaning up Whois data, ICANN wants
to collaborate with interested parties to solve the problem.
Michael Palage, an attorney who represents Internet registrars within
ICANN, said that verifying the accuracy of Whois data poses problems for
address sellers. Palage said that registrars and the Internet community at
large would benefit from the development of uniform guidelines for weeding
out bad Whois data.
Coble and Subcommittee Ranking Democrat Howard Berman (D-Calif.) earlier
this year introduced legislation that would make it a crime in some cases
for Internet address buyers to willfully submit false contact information
to registrars.
Coble today said that his frustration with continued Whois problems had
changed his previous view that Congress should avoid introducing
legislation to deal with the problem.
*******************
Federal Computer Week
DOD focus on joint networks urged
The Defense Department should direct more resources toward information
technology that can drive joint, networked operations, a former vice
chairman of the Joint Chiefs of Staff said.
DOD has made strides toward joint forces, but the process is moving far too
slowly, said retired Adm. William Owens, vice chairman and co-chief
executive officer for Teledesic LLC, speaking May 21 at the Network Centric
Warfare 2002 conference in Arlington, Va.
Instead of focusing on the evolutionary changes that can come from
implementing network-centric operations, the military has been focused on
such things as the Army's controversial Crusader weapon system or the
Navy's next-generation warship, the DDX.
DOD officials need to focus on integrating systems and pulling together all
of the pieces so they work jointly, Owens said.
However, DOD lacks a central authority that could look at using commercial
technologies to improve warfighting efforts, he said. "Where do you go in
DOD to talk about commercial technologies?" Owens asked. "That's the great
strength of this country."
The United States needs to take this seriously because other countries are
looking to leverage technology to find the U.S. military's weak points, he
said. Other countries understand that they cannot take on the U.S. military
in a conventional battle, so they are looking for new and innovative ways
to enable their armed forces. The Chinese government, for example, has been
spending money on such initiatives, he said.
"It's the next blitzkrieg," he said, and the United States is not spending
adequate amounts of money or effort if it is going to maintain its superiority.
"We are here in the United States where we focus on mass" in terms of the
size and strength of forces. But others are thinking about leveraging
information technology and information warfare, he warned.
Owen also was critical of Defense agencies. Although many of those agencies
were created in the hopes of enabling joint operations, that effort has
largely failed. "We've wound up with nine additional stovepipes, and they
are sucking up money," he said.
**********************
Federal Computer Week
Wanted: Expert 'change managers'
Steve Cooper is looking for change management experts to help the Office of
Homeland Security, and he is convinced he will find some good ones within
the federal government.
Chief information officers across government have discovered time and again
that the biggest challenge to creating e-government, or even just
installing a new system, is not the technology but the cultural changes
that must be made to accommodate the technology. And when agencies must
integrate systems and cultures as is often the case when using information
technology to support the Bush administration's homeland security
efforts the cultural backlash can be even greater.
Cooper, senior director of information integration and CIO for the Office
of Homeland Security, is determined to face those barriers head-on by
finding and using the people who already know how to manage change in
government.
Even though people use the phrase "change management" throughout the
government, you cannot go to an agency and ask to speak to the change
management experts, Cooper said, "because you'll get blank stares."
So he's taking a different tack to find the people he needs: He's asking
agency officials about the most successful projects they've participated in
or know about and then identifying the program director and executive who
championed them.
"I guarantee you what that project did was effectively manage change," he
said. "And I guarantee you in those two people, either one or both of them
might be the kind of person I'm looking for, but in absolute certainty,
they will be able to identify the people who will carry the skills and the
characteristics that I'm looking for."
This is really the only way to find people who can manage the types of
changes that homeland security information-sharing systems and policies
require, said Donald Kettl, professor of political science and public
affairs at the University of Wisconsin-Madison and a senior fellow at the
Brookings Institution. Users are another important group to get input from,
to see if they also believe the projects were successful, he said.
"It's finding the people out there who are already finding the ways to
crack the system?and it's basically a networking challenge," he said.
Good change management leaders share some common traits (see box, below),
but basically they are people who are driven to solve problems, Kettl said.
Cooper already has a list of more than 50 government programs that fit his
profile. His next step is talking to program managers to identify leaders
who can help the Office of Homeland Security as it seeks to eliminate many
of the cultural and organizational barriers in government, he said. n
The best change management experts are:
Problem-oriented. They identify the most important problems and devote
resources to solving them. Performance-driven. They measure success or
failure at every point in a project against the identified goals.
Not hierarchy-bound. They work within the organizational structure but are
not limited by it when considering options.
**********************
BBC
Top 10 e-mail scams exposed
Ninety-four percent of respondents to a National Consumers League survey
said they had received unsolicited emails offering financial services or
touting dubious money-making schemes.
The NCL, the main US consumer lobby, warned that many of these offers could
be fraudulent.
"Consumers should be very suspicious of anyone who promises them easy
money, incredibly cheap prices, or 'free' services that may have hidden
costs," said Susan Grant, director of the NCL's Internet Fraud Watch
programme.
Beware the inbox
The fastest-growing internet fraud is an online version of the notorious
'Nigerian money offer'.
Reports of e-mailed Nigerian money scams - designed to obtain recipients'
bank account details by offering to transfer large sums to them for
safekeeping - rose by 900% between 2000 and 2001, the NCL said.
Scams of this kind, which often emanate from Nigeria or other African
countries, have been circulating for years through the post or by fax.
Other frequent internet scams include bogus auctions, dubious work-at-home
schemes, and phoney credit card offers.
Hall of shame
The top 10 internet frauds reported to the NCL last year were:
Bogus online auctions, where the items purchased are never delivered.
Deliberate misrepresentation or non-delivery of general merchandise
purchased online.
Nigerian money offers.
Deliberate misrepresentation or non-delivery of computer equipment or
software purchased online.
Internet access scams, where bogus internet service providers fraudulently
charge for services that were never ordered or received.
Credit card or telephone charges for services that were never ordered or
misrepresented as free. These often include charges for accessing 'adult'
material.
Work-at-home schemes promising wildly exaggerated sales and profits.
Advance fee loans, where consumers are duped into paying upfront charges
for loans which never materialise.
Phoney offers of cheap-rate credit card deals, once again on payment of
upfront fees.
Business opportunities or franchises sold on the basis of exaggerated
profit estimates.
Law enforcement agencies have long warned that the rise of the internet has
opened up fresh opportunities for fraudsters.
Last year, the European Commission said that online shopping sites had
contributed to a 50% rise in credit card fraud in the European Union during
2000.
******************
BBC
Text message votes 'trivialises' elections
The survey suggests that many worried about the security and privacy of
e-voting, while others found it difficult to key in accurately personal
identification numbers (Pin) that would identify them.
There was also little support for the use of text voting from mobile phones
because it was felt "to trivialise" the election process, although its use
has not been ruled out.
The De Montford University-led study into alternative ways of voting aimed
to root out barriers to e-voting in a bid to offer an e-enabled general
election sometime after 2006.
Trials on 2.5 million potential voters carried out at the local elections
earlier this month found that in some areas, like two wards in Liverpool,
turnout increased from 20.71% to 27.49%.
But in Newham, where electronic voting and e-counting were trialled,
turnout fell by 0.4% to 27.6%.
Abuse safeguards
Local Government Minister Nick Raynsford said the sole purpose of the
research was to make it easier for people to vote.
"This was an important stage in the government programme to test
alternative ways of voting that may make it easier for people to exercise
their democratic rights," he said.
"Any changes to the voting system must be properly researched to ensure
that they are of real benefit to the public, as well as incorporating
effective safeguards against abuse.
"Whatever else we do, we must maintain confidence in the whole polling
process and we must maintain the integrity of the ballot.
"We are proceeding in a very measured way with a series of pilots, all of
which will be evaluated by the independent Electoral Commission.
"I believe the pilots were a success. The postal voting pilots clearly did
have a positive impact on the level of turn out."
Resistance
Mr Raynsford said the e-voting was found to be easy to use and more than
10% of those who voted in Swindon, voted by internet - higher than those
who voted by post.
Dr Laurence Pratchett, who led the research, said: "There is support for
e-voting in the population, even among those who won't use it.
"A lot of older people in the focus groups said that they wouldn't use
electronic voting, but they couldn't see why others shouldn't use it."
But he added: "There were significant pockets of resistance."
The use of cash and lottery machines were seen as "non starters as far as
the public is concerned", said Dr Pratchett.
Public confidence
The affect of e-voting on the numbers of people going to the polls is
likely to be "minimal".
"Those who don't vote are no more likely to vote," he said.
Dr Pratchett said some people felt e-voting disconnected the voter from the
system even further.
The survey said widescale remote voting by electronic means should not be
embarked on until issues of secrecy, security and public confidence in the
different voting methods were addressed.
Electors should be able to choose from a range of ways to vote, including
the traditional polling station, to suit their commitments and lifestyles,
it added.
Mr Raynsford said e-voting would make it easier for local authorities to
test public views instantly on issues, including the rate of council tax.
Ben Fairweather, from De Montford University, said e-voting needed to be
designed to detect hacking immediately.
Postal voting in May's local elections was reported to have increased by
28%, while e-voting increased by 5% and online voting by 1%.
Local Government Secretary Stephen Byers suggested on Tuesday that the 2004
European elections could be the first nationwide all-postal vote.
**********************
BBC
Screens blamed for 'air blunders'
According to confidential documents obtained by the magazine, Computer
Weekly, the controller had difficulty distinguishing the codes for the two
cities.
Another also reportedly misread the heights of planes and sent an aircraft
into the wrong airspace.
The problems are said to have arisen because of the small size of the text
on computer screens at the £623m new centre.
The Civil Aviation Authority (CAA) and National Air Traffic Services (Nats)
insist that safety has not been compromised - a claim backed by the air
traffic controllers union, Prospect.
Testing on an improved display is due to begin shortly.
Computer Weekly claims Nats and the CAA told it that only a small number of
controllers have had screen-reading difficulties and it was not a
safety-related concern.
But in a confidential report by controllers seen by the magazine, the
controllers themselves categorised the errors as safety-related issues.
In one report, a controller reported having had "great difficulty" seeing
clearly EGPF (the location code for Glasgow) and EGFF (the location code
for Cardiff).
Cancelled flights
The controller had initially treated the aircraft as if bound for Cardiff
and then discovered it was headed for Glasgow.
Computer Weekly editor Karl Scheider said: "These are the sort of teething
problems you expect with a new computer system - the trouble is most don't
have responsibility for controlling aircraft in the skies."
The magazine reported the Swanwick controllers had repeatedly misread the
height displayed on a screen by thousands of feet.
One controller reportedly mixed up FL360 (36,000ft) with FL300 (30,000ft)
as the displayed height of an aircraft on his screen.
The report added the controller had been "repeatedly misreading" requested
flight levels.
A further warning report said a controller misread a requested aircraft
height level on an electronic flight strip and "co-ordinated the aircraft
into the incorrect sector".
The mistake was spotted by another controller and corrected.
Radar screen
Iain Findlay of the air traffic controllers union Prospect, said safety had
not been jeopardised as the problem did not affect the main control screens.
"It has to be made clear that there are two screens we are talking about.
"One is the planning screen where there are problems with the font size and
the typeface - but that's not the screen that controls the aircraft.
"The radar screen has all the information and is reading properly."
He added: "We take safety very seriously indeed... controllers put safety
first, second, third and last."
Computer problems at Swanwick delayed the opening of the new centre from
1996 to January of this year.
Another computer problem at the centre caused many flights to be cancelled
or delayed last weekend.
On Tuesday, the CAA refused to allow the cash-strapped Nats to raise the
charges it imposes on airlines.
*********************
Sydney Morning Herald
Internet2 speed record
An international team has set a new record for Internet performance by
transferring the equivalent of an entire CD's contents across more than
12,272km of network in 13 seconds.
The rate of 401 megabits per second achieved in transferring 625 megabytes
of data from Fairbanks, Alaska to Amsterdam in the Netherlands is over 8000
times greater than the fastest dial-up modem.
The team consisted of the University of Alaska at Fairbanks, the Faculty of
Science of the University of Amsterdam, and SURFnet, the national computer
network for higher education and research in the Netherlands. At both ends,
standard PC-like hardware running Debian GNU/Linux was used.
With an Internet connection of this size transferring all six CDs of Woody,
the soon-to-be released version 3.0 of Debian, from Fairbanks to Amsterdam
would only require 78 seconds. Faster CD burners are needed, it would seem.
"This shows that geography is no barrier to advanced network applications,"
said Kerry Digou, the systems programmer who headed the University of
Alaska team. "Using standard equipment and infrastructure developed in the
Internet2 community, we've pushed the boundaries to the edges."
*******************
The New Zealand Herald
Plan to give comunities access to broadband internet
Rural and provincial communities will get access to broadband internet as
part of new plan unveiled in today's Budget.
Tens of millions of dollars will be spent over the next two years putting
broadband access into schools and communities.
The earliest beneficiaries will be schools, but Dr Cullen says that once
deployed, the access to high speed internet will also benefit local
businesses and most government departments.
In his Budget speech, Dr Cullen described broadband as the nervous system
of the new economy, and said it was as important to New Zealand as roads,
power lines, railways, and telephone cables were last century.
The objective of the plan is that the majority of schools will have access
to high speed two-way internet by end of 2003.
The infrastructure will be made available to remote schools by the end of
2004.
Telecommunication suppliers will be asked to tender for the work region by
region.
It is hoped that a substantial portion of the work will be completed by the
end of 2002.
The initiative is jointly funded through education and economic development
funding.
The Government has conducted five regional pilot projects to test demand.
******************
Computerworld
DOD IT projects come under fire
Despite the recent fanfare surrounding what the U.S. Navy called a
successful test and evaluation phase of its $6.9 billion Navy/Marine Corps
Intranet program, deployment problems are threatening the project,
according to internal memos obtained by Computerworld.
In an April 25 e-mail to employees of Plano, Texas-based Electronic Data
Systems Corp., the Navy's prime contractor on the program, Mike Hatcher,
EDS's N/MCI director for Navy Operating Forces, warned that the current
deployment schedule could put the future of the program at risk.
"We have agreed with [N/MCI director Rear Adm. Charles] Munns . . . that
ruthlessly rolling seats is the only way for N/MCI to survive and prosper,"
wrote Hatcher. "Our present way of working . . . if left unchanged would
spell an end to the N/MCI program by summertime."
The N/MCI program is designed to replace hundreds of disparate Navy and
Marine Corps computer networks with a centrally managed setup operated by EDS.
A Scorched-Earth Rollout?
In addition to an initial 60,000 seats, the Pentagon on May 3 granted the
Navy permission to purchase an additional 100,000 seats based on EDS's
success in meeting the requirements of the initial test and evaluation phase.
Officials had hoped to have 135,000 seats deployed this year. However, the
Hatcher e-mail warned the EDS N/MCI team that the current deployment rate
would likely result in only 60,000 seats being operational by the end of
the year, leaving the program open to criticism and political attacks that
could put its future in jeopardy.
In fact, Hatcher referred to a meeting between Munns and Al Edmonds,
president of EDS's government information solutions division, during which
Edmonds reportedly characterized the new deployment plan as "a
scorched-earth seat rollout."
Rick Rosenberg, EDS's program executive for N/MCI, downplayed the e-mail,
calling it a "rallying cry for the troops" that used inappropriate language.
Part of the EDS/Navy "scorched-earth" deployment plan includes a directive
to EDS installers to no longer wait for security certifications to make
their way through the various bureaucratic layers of the Navy before
beginning installation of N/MCI seats. Instead, EDS employees will now
install N/MCI systems simultaneously while waiting for the Navy to issue
final, signed Interim Authority to Operate letters. Any application that
fails or is expected to fail security certification, or that doesn't run on
Windows 2000, will be automatically installed on a kiosk separate from
N/MCI, "no questions asked," according to Hatcher's e-mail.
Although a staff member of the House Armed Services Committee has been
reviewing the contents of the e-mail for what one Capitol Hill source
called "at best an overzealous e-mail and at worst possible violations of
federal or Defense Department security policy," EDS and Navy
representatives vehemently denied that any policy infractions took place or
that the program has hit a major snag.
"We do not connect anything to N/MCI without the Navy's approval," said
Rosenberg. In addition, "there may have been an isolated incident [causing
delays], but that is not the status today," he said.
Technical Snags
However, there have been recent technical snags. In one major instance,
glitches caused the CIO at the Naval Air Systems Command (NAVAIR), one of
the first Navy organizations to use N/MCI, to temporarily halt deployment
until the technical problems could be fixed.
Such problems and delays shouldn't be downplayed, said an IT industry
lobbyist and vocal supporter of the N/MCI program who regularly meets with
lawmakers on Capitol Hill to discuss the contract.
EDS kept falling further and further behind due to the testing delays and
because of the large number of legacy applications that had to be dealt
with, the source said, adding that "the delays were killing this contract."
********************
Computerworld
Terror warning issued for nation's ports
WASHINGTON -- A new terrorism warning surfaced this week indicating that as
many as 25 terrorists of Middle Eastern origin may have slipped into the
U.S. unnoticed after stowing away aboard cargo ships that entered four
major U.S. seaports.
The new warning, sent by the U.S. Coast Guard and reviewed by members of
the Senate Select Committee on Intelligence, states that the 25 dressed as
stevedores and simply walked off cargo ships and melted into the cities and
towns around ports in Miami, Fort Lauderdale, Georgia and California.
The threat, while not new, underscores the need for better IT security
systems to help port authorities and local law enforcement agencies better
track suspected terrorists and criminals that attempt to jump ship in the
nation's seaports, say port authority officials.
The security systems could also help defend against terrorists that attempt
to load a ship container with weapons of mass destruction, say port
authority officials.
Beth Rooney, manager of port security at the Port Authority of New York and
New Jersey, where specific threats to historical landmarks this week have
put officials on a heightened state of alert, said one of the biggest
problems facing port security is that ship cargo information isn't received
by port authorities until three to five days before the ship arrives in port.
"We are pushing for [systems to ensure] supply chain integrity and the
integrity of the contents of the container, including that there's not a
person in there," said Rooney.
"I would also like to see a database or notification system for ports and
law enforcement agencies affiliated with the port to network and alert each
other when we discover something out of the ordinary," said Lindy Rinaldi,
chief of police for the South Carolina State Ports Authority. "Right now we
do not have any communication [systems] to link other ports and law
enforcement agencies together.
"Currently all notifications are made by phone," Rinaldi said. "This can
cause serious delays in passing along much needed information that would be
useful for our homeland security protection."
Anne Moise, manager of port security at the South Carolina State Ports
Authority, said her organization has big plans for improving security, but
little funding. For example, at the port in Charleston, S.C., an
identification system is in place that's tied to the port authority's
computer system. The computer lets the port police officer know if a
specific person is approved for access.
However, "this system is not fully utilized yet due to funding issues, but
the format is in place," Moise said.
Funding may be on its way, however. A Department of Defense appropriations
bill would provide $93.3 million to the new Department of Transportation's
Transportation Security Administration to fund port security assessments
and enhancements. Likewise, the Port and Maritime Security Act of 2001,
which passed the Senate Dec. 20, calls for $390 million in grants for port
security infrastructure improvements.
And improvements to the infrastructure at large ports may be the most
important move needed in the near term, said Rooney.
"Transactions between the buyer and seller take place 40 to 50 days ahead
of time," said Rooney. "If you can provide the purchase order information
to the authorities at the time the transaction is made then the we can have
intelligence on what to look for," she said. "It's integration. The systems
and the data is out there."
The Port Authority of New York and New Jersey recently requested funding to
build and test an element of such a purchase order transaction monitoring
function in its system. Grants will be awarded by the Transportation
Security Administration in June.
"We can build the functionality and have it ready to go in July," Rooney said.
*****************************
Computerworld
Ventura body slams ISP lobby on privacy
Minnesota Gov. Jesse Ventura this afternoon signed a controversial Internet
privacy bill that one Internet service provider (ISP) lobbying group said
would force ISPs to abandon the North Star State. The bill prevents ISPs
from selling information about the Web-surfing habits of users to outside
companies.
Last month, Emily Hackett, executive director of the Washington-based
Internet Alliance, predicted that ISPs would probably stop doing business
in Minnesota if Ventura signed the bill. The organization lobbies state
legislatures on behalf of ISPs and marketing and high-tech companies,
including @Once, 24/7 Real Media Inc., AOL Time Warner Inc., the Council of
Better Business Bureaus, Encirq Corp., Cox Interactive Media, Juno Online
Services Inc., IBM, Microsoft Corp., WorldCom Inc. and Verizon Communications.
This morning, however, Hackett said she wasn't sure whether ISP flight
would indeed happen.
"Now we will see," Hacket said. "It is the first broad privacy bill that
has been passed in the 50 states."
Hackett said she fears Minnesota's action may prompt other states to take
similar action, which could result in such a patchwork of laws that it
would be impossible for ISPs to operate without running afoul of them.
Not everyone sees that as bad thing, however.
Telemarketers, cable TV providers and many other industries have to comply
with myriad state laws, and all do so effectively, said Chris Hoofnagle,
senior counsel for the Washington-based Electronic Privacy Information
Center (EPIC).
"Cable is regulated state by state, and sometimes county by county,"
Hoofnagle said, adding that specific state laws are better than "vague
federal standards."
"Most commerce is interstate, but most consumer protection [is] on a state
basis," Hoofnagle said. He noted that the same argument can be made by
those who claim that the Internet is a global entity that can't be
regulated by a state.
Commerce is global as well, he pointed out -- and it is regulated by the
states.
Still, Hackett questioned whether the Minnesota law would eventually be
found unconstitutional on the federal level because it might interfere with
interstate commerce.
Ari Schwartz, associate director of the Washington-based Center for
Democracy & Technology (CDT), said he would like to see a strong federal
privacy standard but he understands why Minnesota chose to act.
"States are going to act, if the federal government doesn't step up to the
plate," Schwartz said. "The CDT would prefer a federal standard for
privacy, but the longer that takes to happen, the more we will see states
pick up the issues."
Although the announcement that Ventura had signed the bill into law was
posted as a bulletin on the Minnesota governor's Web site, a longer
statement has not yet been released.
In the past, Ventura's office said that the governor had mixed feelings
about the law because although he doesn't like government regulation, he
does value his own privacy.
*******************
CNET
Microsoft warns of new debugger flaw
By Robert Lemos
Staff Writer, CNET News.com
May 22, 2002, 5:25 PM PT
Microsoft warned Windows NT and 2000 users on Wednesday of a new flaw in
its debugger tools that could let attackers give themselves complete
control of a system once they've gained basic access to that system.
The vulnerability involves a flaw in the debugger's authorization feature.
The flaw lets any user run any program on the system, with the highest
privileges.
The hole could be used in conjunction with other Windows vulnerabilities
that allow a remote attacker to run as a local user, said Marc Maiffret,
chief hacking officer with network-protection company eEye Digital Security.
"By itself, I would say it's not that dangerous, but coupled with other
vulnerabilities, it's nasty," Maiffret said. "It makes threats like Nimda
possible."
The Nimda worm used a similar double whammy to gain base-level access to a
system and then elevate its privileges to take control of the infected
computer.
Microsoft gave the vulnerability a "critical" rating for client systems but
would not estimate what portion of Windows NT 4.0 and Windows 2000
computers might be vulnerable to the new flaw.
"Being able to log on to the computer in the first place, and being able to
run code (once logged on), are the two limiting factors for this flaw,"
said Christopher Budd, security program manager for Microsoft's security
response center.
For example, a guest account could be co-opted by an attacker and used to
exploit the flaw to run code only if the system's administrator allowed
guests access to the console and let them introduce code to the machine,
Budd said.
Microsoft has posted an advisory and a patch for the problem.
***********************
Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 507
1100 Seventeenth Street, NW
Washington, D.C. 20036-4632
202-659-9711