[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips August 27, 2002
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, CSSP <cssp@xxxxxxx>;, glee@xxxxxxxxxxxxx;, John White <white@xxxxxxxxxx>;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, akuadc@xxxxxxxxxxx;, computer_security_day@xxxxxxx;
- Subject: Clips August 27, 2002
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Tue, 27 Aug 2002 11:12:33 -0400
Clips August 27, 2002
ARTICLES
Head back to drawing board [National Archives and Records Adm.]
Supporting Objective Force [Warfighter Info. Network-Tactical (WIN-T) Program]
Pentagon facility tests tech viability, employee acceptance of iris
scanning [Biometric]
Air Force lab tests e-watermarks
A patchwork approach to info sharing
Four components of Homeland Defense Command and Control Info Mgt
Insecurity slows wireless jump
Feds seek networked nation [Homeland Security]
Justice pools online resources
Intell agencies ready to deal
Air Force's chief of staff urges integration
Suit calls PTO systems flawed [Patent Office]
Web Ad Firm to Limit Use of Profiles [Privacy]
WorldCom Staff Told Not to Talk to Auditor, E-Mails Show
Net-savvy teens want teachers to keep up
RIAA: Feeling Burn of Ripped CDs [Piracy]
Should you insure against ID theft?
What are the real risks of cyberterrorism?
Open source software favoured for the public sector
*********************
Federal Computer Week
Editorial
Head back to drawing board
The National Archives and Records Administration has run smack dab into
electronic reality: It simply does not have the resources to collect, store
and manage the 36 billion e-mail messages and documents the government
generates every year.
NARA's solution, as set out in a draft report released last month, is to
ask individual agencies to focus on storing the most important records
first those that establish agency accountability, protect citizens' rights
and document the national experience. NARA's role, according to the plan,
is to act more as a facilitator by advising agencies on what to preserve
but not how to preserve it; offering records management guidance and
training; and conducting inspections and evaluations.
Whether this approach will work is debatable. In the past, government
guidance issued without any authority to back it up with penalties or
rewards typically fell by the wayside. Agencies simply ignore those
requirements that have little consequences. That's only natural.
But the problem here is what is at stake. As NARA points out in its report,
the most important electronic documents those that outline decision-making
processes for program policies and those that can hold agencies accountable
for their actions as recorded in the electronic documents have disappeared
and continue to do so. Many agencies now post reports in electronic form
only. Once those reports are deleted from the agency's Web site or
intranet, they are gone forever.
NARA officials have struggled for years to develop a workable policy for
electronic document storage and have settled on a solution that, at best,
allows for inconsistency. That's not good enough. Records will continue to
be lost, including electronic information embedded in the documents that
could prove to be valuable to historians, researchers and journalists.
No doubt, solving the problem presents a monumental challenge for NARA. But
officials may need to go back to the drawing board.
***************************
Federal Computer Week
Supporting Objective Force
The Army's Warfighter Information Network-Tactical (WIN-T) program, a
tactical intranet for wired and wireless voice, data and video
communications, will support the warfighting capabilities of Objective
Force, said Col. Tom Cole, WIN-T project manager at the Army
Communications-Electronics Command in Fort Monmouth, N.J.
Fielding Objective Force, which will transform the Army's forces to make
them better able to survive an all-out fight, by the end of the decade will
require not only WIN-T, but its integration with other transformational
systems, including:
* Future Combat System The Army's vision for FCS is to create an
integrated battlespace, in which networked information and communications
systems provide a competitive edge to soldiers in the field and commanders
in the control room. The lead systems integrator team, Boeing Co.'s Space
and Communications Group and Science Applications International Corp., was
awarded a $154 million contract in March and in June added eight more
companies to the mix.
* Joint Tactical Radio System The Army in June awarded Boeing Co. an $856
million contract to lead the development and initial production of the
first generation of JTRS, which uses software-centric radios that can be
programmed to patch users into various radio frequencies, unlike today's
radios, which are not interoperable.
*************************
Federal Computer Week
Pentagon facility tests tech viability, employee acceptance of iris scanning
Members of the Pentagon Athletic Club are trying out a new piece of
equipment an iris scan system.
The Defense Department Biometrics Management Office is in the middle of a
three-phase "quick look" project using iris scan technology to access the
athletic club. Members are voluntarily signing up to test the Pentagon
system, which involves capturing data from a member's identification card
and iris, said Maj. Steve Ferrell, executive officer for the Biometrics
Fusion Center, the testing and evaluation facility for the Biometrics
Management Office.
"It takes no more than two minutes to enroll and verify a new user, which
includes downloading the new template to the server," Ferrell said. The
enrollee can then gain access to the athletic club with the iris scan and a
member ID card. Ultimately, the goal of the project is to eliminate the
member ID-based system and move secure access procedures to biometric
technology.
After the Oklahoma City and Sept. 11 terrorist attacks, federal workers
seem more open to new technologies that will improve security, said Rich
D'Adamo, president of Workforce Solutions LLC, a consulting company based
in Hunt Valley, Md.
"There definitely seems to be a general acknowledgment among federal
employees that the ID card and metal detector systems being used to gain
access to most federal buildings are vulnerable," he said. "I don't sense
there is widespread acceptance of smart card technology at this point
primarily because of the perception that the cards will require uploading
personal information that could be used in a Big Brother-type scenario."
However, fingerprint and iris scanning seem to be more widely viewed as
less intrusive, D'Adamo said. Iridian Technologies Inc.'s IrisAccess 2200
system detects an individual approaching the imager. Once the person's eye
is 3 inches to 10 inches from the mirror in the unit, a camera captures an
iris image, which is digitally processed into a 512-byte IrisCode template,
according to company officials.
A search function performs real-time database matching at the remote unit.
When an iris matches a valid IrisCode template in the database, access is
granted almost instantly.
Moving from member IDs to the iris scan system will enable not only secure
access to the facility for members but also "promote convenience for them
since they will not have to carry anything on their person," said Linda
Dean, director of the Biometrics Management Office, adding that it also
helps Pentagon staff members verify the identity of people attempting to
gain access.
The project has 100 enrollees and more people enroll daily, which is
promising because the Pentagon Athletic Club has about 8,000 members,
according to Ferrell. Feedback has been positive. "The members can't wait
to not have to use their ID card when they are running," he said.
Richard Norton, executive director of the International Biometric Industry
Association, said the key to a project such as this is getting necessary
information to the participants, such as how the system works, what it's
used for and what the benefits are. "Once people understand how it is used
and why, their trust in the system will be significant," he said.
Norton said the iris scan technology has benefits for both users and the
athletic center because ID cards and passwords are no longer necessary,
expiration dates are obsolete and athletic center employees no longer have
to take the time to check people in.
Any privacy concerns should also be allayed because an individual's iris
data cannot be used for any other purposes. "Nothing can be done to abuse
it," Norton said, adding that if anything, the iris scan system should
enhance privacy.
***
Phased approach
The Defense Department's Biometrics Management Office's "quick look" at
iris scan technology at the Pentagon Athletic Club involves three phases.
Phase one involved demonstrating iris scan technology to the athletic
club's staff. Phase two, which began July 23, involves enrolling members
into Iridian Technologies Inc.'s IrisAccess 2200, said Maj. Steve Ferrell,
executive officer for the Biometrics Fusion Center. Phase three, scheduled
to begin Aug. 30, will involve using IrisAccess 2200 as the sole tool for
access into the athletic club. Ferrell declined to comment on the project's
cost.
DOD's quick-look projects involve testing and evaluating commercial
off-the-shelf biometric products for a specific DOD security access
requirement. If testing determines that the product satisfies the
requirement and if resources are available, the tool can undergo more
aggressive testing as a Biometrics Fusion Center pilot project, which would
determine whether the product should be deployed at a service, agency or
command.
************************
Federal Computer Week
Air Force lab tests e-watermarks
The Air Force Research Laboratory (AFRL) Information Directorate announced
last week that it has selected Digimarc Corp. to collaborate on a research
and development project using digital watermarking to combat fraud and
enhance security.
Digital watermarking ensures the security and authenticity of digital
photographs by embedding an encrypted image in the photograph, similar to
the watermarks used on the redesigned $20, $50 and $100 bills.
The project will explore the use of digital watermarking as a security
feature for identifying fraudulent or altered identity documents, said
Bruce Davis, chairman and chief executive officer of Digimarc. The contract
was awarded earlier this month and is supported by the Air Force's R&D
funding, but the Tualatin, Ore.-based company would not provide further
financial details.
In cooperation with AFRL, Digimarc will produce sample identification cards
and deploy them as part of a security access system at a law enforcement
assessment facility in Rome, N.Y., where the AFRL Information Directorate
is located. Military, federal government and law enforcement
representatives from across the nation visit the facility. Digital
watermarking will be used on the cards to combat fraud and enhance
security, according to a spokesperson for the company.
Raymond Urtz, director of the AFRL Information Directorate, said there are
"broad implications for addressing the problem of document counterfeiting
and forgery through digital watermarking technology," and AFRL is looking
forward to collaborating with Digimarc on the research project.
**************************
Federal Computer Week
A patchwork approach to info sharing
Army officer garners interest with Web app
Imagine that a terrorist group has released a chemical agent in northern
New Jersey that could, based on wind conditions, affect the entire region
and even spread into neighboring New York City.
Responding to such an event would take extraordinary coordination among
federal, state and local officials, who would need to analyze maps and wind
conditions, determine exactly what chemical has been released and quickly
inform citizens what to do before it spreads to their homes.
Maj. Shawn Hollingsworth, chief of the integration and evaluation division
at the Fort Gordon, Ga., Army Battle Laboratory, realized a while ago that,
in such a scenario, lives would be saved or lost depending on how quickly
government officials could find the information they need.
Ideally, a single information network would be available through which
everyone from state and local first responders to officials in the Defense
and Homeland Security departments could receive snapshots of data tailored
to their particular work and their geographical location.
The basic systems that would feed such a network already exist, but they
were not designed to work together, which is just the problem Hollingsworth
has attempted to fix with the Homeland Defense Command and Control
Information Management System.
HLDC2IMS can be used for everything from force protection to homeland
security, and is already generating interest from the upper echelons of the
DOD and homeland security communities, Hollingsworth said.
The system, which he began working on last December in response to the
Sept. 11 terrorist attacks, ties three existing commercial systems and one
military system into one Web-based application.
The Defense Information Systems Agency's (DISA) Information Dissemination
Management tactical system, which is used for sharing information on
battlefields is the basis of the system.
Without the foundation that DISA provides, Hollingsworth's system couldn't
have happened. The system backbone "provides priority-driven, assured
transport of information and manages the flow between sources and users,
across multiple communications platforms," Hollingsworth said. "Different
people see a different picture."
HLDC2IMS updates information every 30 seconds. The system also sorts
information based on profiles and clearances, so users only get the
information they need and are authorized to receive. "That's something
other systems don't do," Hollingsworth said. "It's not just for security,
but also keeps your picture uncomplicated."
HLDC2IMS also includes "assured delivery" features, so if servers crash,
the system finds the shortest available route to the area requesting data
and sends it through, with high-priority information requests bypassing
others when necessary, he said.
Favorable Notice
Several civilian and DOD officials who have seen demonstrations say they
are impressed with the system.
Jim Flyzik, former chief information officer at the Treasury Department and
now on detail to the Office of Homeland Security, said the Bush
administration seeks just those kinds of systems.
"One of the things we're trying to do in homeland security is identify best
practices and identify key applications out there already that we can
leverage and use across the country," Flyzik said. "We're hearing literally
about hundreds of systems across the country, and we're trying to look at
all of them."
Still, Flyzik said that Hollingsworth's system shows promise for use in the
evolving department.
"We want quick hits for applicability to [aid] the homeland security
mission, and [HLDC2IMS] certainly has many interesting features worth
looking at," he said. "There's potential for something that may have
applicability to port to other areas for the homeland security mission."
The system could also have a place in the Enhanced C4ISR for Homeland
Security Operations (ECHO) program, said John Mitchell, technical director
of the Joint Forces Command's Joint C4ISR (command, control,
communications, computers, intelligence, surveillance and reconnaissance)
Battle Center.
ECHO will be responsible for the initial command and control architecture
and infrastructure supporting DOD's new homeland defense command, Northern
Command, when it is formally established Oct. 1.
HLDC2IMS "looked pretty good, and I think it had much broader application
than just the Army," Mitchell said. "Everybody is trying to do the right
thing, so you have got to be careful about what you give to the user."
Mitchell said HLCD2IMS deployment could get a jump-start through the
Advanced Concept Technology Demonstration (ACTD), a DOD program designed to
fund the rapid fielding of new technology. DISA is the technical manager
for ACTD, and Joint Forces Command is the operational manager.
Mitchell said those parties, along with the Joint Task Force Civil Support
Team, will observe HLDC2IMS in action at the Consequence Management 2002
conference at Fort Gordon in late September.
The system stands a chance of being adopted, although it's not a done deal,
he said.
"I think what they've done is great so far, [but] there are a lot of
competing technologies for what they have, and we'll look at those and pull
in the best," Mitchell said. "It's got to be mature technology that can
integrate with the baseline we're establishing, but some of its components
are already in the baseline so it ought to fit fairly well."
Not Easy Getting Green
The HLDC2IMS has received only $179,000 in funding so far and money or a
lack thereof is the greatest obstacle to the system's continued
development and national use, Hollingsworth said.
Representatives from numerous defense and civilian agencies, including the
Federal Emergency Management Agency and the Navy's e-business office, have
seen demonstrations of the system, and Hollingsworth said he hopes someone
will fund the system.
"No one presented with the live system has had a negative comment about
it," Hollingsworth said. "They are all amazed at what we're able to do with
so little, when other systems cost millions."
At the demonstration next month, the system will use simulated sensor data
from ENSCO Inc.'s Sentry system because Hollingsworth doesn't have the
budget for a live feed, said Tom Cirillo, director of business development
at ENSCO.
"Simulated sensor responses will create incident reports" at the
demonstration next month, Cirillo said. "But Sentry creates those reports
automatically, including the chemical release, time of day, where it's
going and metro conditions." He added that Sentry is deployed at a
"high-level DOD facility" in the Washington, D.C., area.
Once the proposed Homeland Security Department is established and handling
massive amounts of information internally, as well as from the intelligence
agencies, state and local governments and others, program managers will
"determine how to push information into" HLDC2IMS, Hollingsworth said.
"Some customization will take place," he said. "But the foundational
technologies are all scalable, and based on that, we can go forward."
If the system was brought into the homeland security ACTD, more funding
would be made available, Mitchell said.
**************************
Federal Computer Week
Four components of Homeland Defense Command and Control Info Mgt
1. The backbone of the Homeland Defense Command and Control Information
Management System is based on the Information Dissemination Management
Tactical system, a Web-based technology run by the Defense Information
Systems Agency (DISA) used for sharing information on battlefields.
HLDC2IMS includes access policies so that only authorized users can send
and receive information, and bandwidth throttling, which can assign
bandwidth based on priorities.
2. ESRI's ArcIMS provides distributed mapping services on the Web and
captures not only geographical map features, but also incidents and events
against the map pertaining to ongoing terrorism. The layers of the map
enable incidents to be presented geographically for analysis; for example,
a biological attack involving poison gas on a layered map can tell what the
affected geographical region is.
3. ENSCO Inc.'s Sentry is Web-based software that interprets multisensor
data and enables users to protect facilities and borders from chemical,
biological, radiological and nuclear (CBRN) attacks. Sentry can also
monitor internal heating, ventilating and air conditioning (HVAC) systems,
including the flow of air through ducts. If the sensors detect a chemical
or biological agent, the tool can tell exactly where the agent is going and
who needs to get out, and can also shut down the HVAC system.
Sensors can also be set up in strategic locations to take meteorological
and CBRN readings nationwide. If anything is detected, the data can be
placed on a map, along with the direction the dangerous element is heading,
indicating both potential and actual affected areas. The system's cost is
based on the number of sensors and the size of the area being protected,
but can range from $50,000 to millions of dollars, officials said.
4. CallingPost Communications Inc.'s Message911 uses the same map as Sentry
and provides names and phone numbers that are automatically called in the
affected areas. Managers can type a message into a text box with directions
about what happened and how to leave the affected area safely, and then
choose emergency response groups to send it to.
***********************
Federal Computer Week
Insecurity slows wireless jump
Emerging security solutions yet to unlock government wireless potential
Handheld computers and personal digital assistants have shed their early
geek status and are increasingly seen as valuable tools that can help
government workers do their jobs better. As wireless capabilities are added
to the devices, enabling such tools as "e-mail on the run," their
usefulness only increases.
However, wireless handhelds and smart, data-enabled mobile phones pose
particular problems for security managers, problems that will expand as
high-speed, next-generation wireless services are introduced in the next
few years. With the new services, the portable devices will be able to
download and store increasing amounts of sensitive data, but this
"always-on" connectivity also opens them up to the same cyberthreats that
now plague their desktop cousins.
The good news is that the security industry has recognized current and
future threats and is working on solutions. But there are still gaping
holes, and many government agencies remain unconvinced that the security
gaps can be plugged.
For example, the military's U.S. Transportation Command (Transcom), with
its global reach and highly mobile workforce, should be a prime candidate
for the use of wireless handheld devices. But those tools are not even on
the command's radar.
That's because security concerns far outweigh the potential benefits of
these devices, according to Martin Mullican, chief of Transcom's C4
Operations and Security Division. Encryption must comply with Federal
Information Processing Standard 140, for example, and such technology is
hard to come by.
But that's the easy part, he said. A lot more work needs to be done on
authentication solutions to ensure that users on the handheld end of
wireless communications are actually who they say they are.
And there is always the fear that handheld devices, which are lost or
misplaced far more frequently than any other kind of computing device,
could be used to gain access to an agency's network.
"We look at these devices very skeptically, and we don't allow them to be
used on an enterprise basis yet," Mullican said. "This soup is a long way
from being served."
Standards Needed
A major problem is that the government is stressing the need for standards
as a central theme for all of its information technology, and although
standards organizations have begun work on defining security profiles for
handheld wireless devices, they are still a long way from being ready to
publish them.
In the meantime, manufacturers are coming up with their own solutions. For
example, the popular Research in Motion Ltd. BlackBerry scored a FIPS 140-1
validation for its embedded technology based on the Triple Data Encryption
Standard, but it uses a proprietary security system to do so.
If other handheld device manufacturers also develop proprietary technology,
it could prove a management nightmare for security administrators.
Desktop computers, whose locations are fixed and known, have been around
for a long time, and security managers feel they have a decent handle on
threats to their wired networks and how to account for them, said Robert
Manchise, chief technology officer at Anteon Corp., which provides IT
solutions and advanced engineering services to the federal government.
Agencies have policies to check for network intrusions, keep firewalls
properly configured and ensure that messages are encrypted.
"Their approach has been to keep their network security intact with
frequent patches," Manchise said. "But that paradigm doesn't work as well
for handhelds. You still have several different operating systems that can
be compromised, but how do you get [timely] patches to them?"
Wireless security for handheld devices may be getting a bad rap because of
the perceived flaws in early attempts to install de facto standards, such
as the over-hyped Wireless Application Protocol. WAP is a
carrier-independent, transaction-oriented protocol first released in 1999
that was pushed as a standard for all wireless data networks.
One of the biggest problems with WAP was that it used a set of protocols
customized for wireless networks called Wireless Transport Level Security
(WTLS), according to Mike Vergara, director of product marketing for RSA
Security Inc., which provides the encryption algorithms at the core of most
modern security solutions. Carriers had to translate communications that
used WTLS to ones that used fixed network encryption methods, such as
Secure Sockets Layer, for Internet-based transmissions.
However, that translation took time to execute, and while it was happening,
transmissions were not secure. This "WAP gap" stalled the use of the
protocol for secure communications, and although WAP is still widely used,
it's nowhere near as prevalent as people had expected it to be.
The truth is, Vergara said, successful wireless services such as iMode in
Japan show that as Internet-style security standards are adopted for
wireless transmissions, "security for wireless can be at least the equal of
that in the wired world."
Many security vendors have already developed solutions, in particular for
virtual private networks (VPNs) and for mobile systems such as laptops, and
are beginning to turn their attention to the handheld wireless universe.
Check Point Software Technologies Ltd., for example, has produced a version
of its VPN-1 secure client for use with the Microsoft Corp. Windows-powered
Pocket PC and is planning versions for other handheld devices, eventually
including next-generation smart phones.
Certicom Corp. has developed an encryption solution called movianCrypt for
the Palm Inc. OS and Pocket PC that works with its movianVPN client or
third-party applications. V-One Corp. offers a mobile solution as part of
its SmartGate VPN software, and Microsoft includes its own VPN software in
the Pocket PC 2002 operating system.
This kind of security is becoming the focus for what will likely be the
major enterprise uses of handheld devices in government.
The Defense Department "is using VPN technology, for example, and it has
made it clear that it certainly would like PDAs to be interoperable with
that," said Tony Rosati, Certicom's vice president of products and marketing.
Educating Users
However, developing handheld-specific security solutions may be putting the
cart before the horse, because many users don't understand the need for
good security practices. Gartner Inc., for example, has calculated that
some 75 percent of all PDAs are carried around with even their minimal
security features disabled.
And agency managers, who are more aware of the need for security, want a
solid understanding of the overall requirements before they will entertain
the use of handheld wireless devices. Transcom's Mullican, for one,
believes this is an area where technology developments have outpaced
policies and practices.
Help may be on the way. The National Institute of Standards and Technology
published draft guidelines in July for deploying wireless technologies in
agencies, one section of which focuses on handheld devices. The intention
is for agencies to use the guidelines to help them incorporate wireless
devices into their enterprise plans.
"People have a very inchoate sense of what security is needed with these
devices," said Tom Karygiannis, a principal researcher at NIST and one of
the authors of the draft guidelines.
"They are operated in a very insecure way currently, and even that security
brought to the table by the device vendors is not used adequately," he
said. "And these are not very complicated things."
Comments on the draft are due by Sept. 1. If no extensive revisions result
from that input, Karygiannis said, the final version of the guidelines
could be published by mid-October.
Robinson is a freelance journalist based in Portland, Ore. He can be
reached at hullite@xxxxxxxxxxxxxxx
******************************
Federal Computer Week
Feds seek networked nation
Office of Homeland Security looks to state, local agencies to build
nationwide info net
The Office of Homeland Security plans to launch within the next month one
of several initiatives designed to develop a nationwide information
technology enterprise architecture to improve information sharing and
communications among federal, state and local agencies.
Officials aim to unveil a Web site that public leaders and business
executives can access to share information on existing homeland
security-related projects, best practices and centers of excellence, said
Steve Cooper, senior director for information integration and chief
information officer for the Office of Homeland Security. Cooper spoke last
week at the Government Symposium on Information Sharing and Homeland
Security in Philadelphia.
The Office of Homeland Security wants state and local agencies to provide
the Web site with information about homeland security projects that other
jurisdictions could emulate or join in on. Texas, for example, created an
Emergency Response Network, which gives police, fire and medical emergency
responders a way to discuss how to prepare and respond to emergencies and
send out alerts on events.
Homeland Security officials hope that if information about the Texas
network is on the Web site, other states or local governments with similar
systems could find ways to link the systems, or those without systems could
join the Texas network. Many local and regional information sharing
programs are under way. For example, the Chicago Police Department has
created a Citizen and Law Enforcement Analysis and Reporting System, which
gives police officers access to information such as arrest records and
neighborhood crime statistics to help target resources on the worst crime
areas.
The system, which began in the mid-1990s as a local management and incident
response system, has expanded since the Sept. 11 terrorist attacks to
include local law enforcement agencies nationwide, said Karen Rowan,
general counsel to the superintendent of the Chicago Police Department.
Rowan said that this program could be passed on to the federal level, but
that the department would move forward with the program regardless of
federal government policies.
The more projects and practices that the federal government can find and
build on, the more likely a nationwide enterprise architecture will
develop, Cooper said. "This Web site will enable us to begin to share and
communicate what's going on," he said.
A collection of best practices, ideas and systems is desperately needed at
the state and local levels because of the vast differences in expertise,
resources and existing infrastructures, said Jose Cordero, chief of the
Newton, Mass., Police Department.
Although incidents may occur locally, responses will almost always involve
multiple jurisdictions because the impact often reaches beyond the location
that was attacked. Therefore, interoperability and regional response
mechanisms must be officials' primary concern, he said.
In another effort to reach out to state and local government, Office of
Homeland Security officials met with the National Association of State
Chief Information Officers earlier this month to start working on state
requirements for the enterprise architecture. In that first meeting,
officials dealt with the basic questions of definitions and the approach
that should be taken, Cooper said.
Because local-level officials are dispersed, Homeland Security officials
are still trying to determine the best way to contact them and keep in
touch, he said. Officials are already working with organizations such as
the National Governors Association and the National Association of
Counties, but it is hard to find a central point for information technology
leaders at the city and regional levels, he said.
Officials may find that the best way to reach everyone is to rely on the
relationships already in place among federal agencies, their state
counterparts and local officials, Cooper said.
"It is imperative that we all participate and that we get this enterprise
architecture right," he said. "We have got to hear from everybody."
**************************
Federal Computer Week
Justice pools online resources
Web site integration may be starting point for nationwide connection
As the Office of Homeland Security seeks to create networks of networks to
share information among federal, state and local government agencies, the
law enforcement community is close to completing its own network connection.
The FBI's Law Enforcement Online (LEO) intranet and the Bureau of Justice
Assistance's Regional Information Sharing Systems (RISS) program serve the
law enforcement community's collaborative needs.
But bringing those networks together through a single Web interface will
give users access to computing resources and experts across the entire
spectrum of government, said George March, director of the RISS Office of
Information Technology, speaking last week at the Government Symposium on
Information Sharing and Homeland Security in Philadelphia.
One of LEO's biggest advantages is the ability to offer a secure online
space for special interest groups to share information. And RISS excels in
providing Web access to databases maintained by jurisdictions across the
country, March said.
After the Sept. 11 terrorist attacks, officials at the Justice Department
and the Office of Homeland Security started looking for ways to connect the
entire law enforcement community. In the end, they decided to link the
existing networks, March said.
Members of the law enforcement working group that serves as the point of
contact between the intelligence and law enforcement communities are
viewing the LEO/RISS integration as a potential starting point for
connecting law enforcement agencies across the country.
Jeff Baxter, a member of the board of regents at the Potomac Institute for
Policy Studies and a consultant to the working group, advises local police
departments seeking access to other jurisdictions' resources to look first
to existing network connections, such as RISS, before attempting to create
their own.
The hardware and software for the new network connections are already in
place. Justice officials have tested the interface, which has also
undergone full federal certification and accreditation, March said. He
anticipates that final approval will come soon, and then the networks will
be available for community use.
Both LEO and RISS will continue to exist as separate entities, because each
has different users. In fact, March said, several enhancements to LEO are
planned over the coming months (see box).
The Web interface that the LEO and RISS teams have been developing,
however, will provide a seamless bridge between the two networks, he said.
Office of Homeland Security officials are considering using the same
approach to create information sharing systems across government. However,
that task is much more complex.
Agency officials work with a multitude of systems and must address complex
questions of redundancy and interoperability, said Steve Cooper, senior
director of information integration and chief information officer at the
Office of Homeland Security.
It is not an easy solution, but until the many agencies and organizations
involved in homeland security have the money to invest in single systems,
the network-of-networks approach is the only one that makes sense, said Ken
Piernick, senior director of the office's Intelligence and Detection
Directorate.
"We can't wreck anything until that occurs," he said.
Officials at the LEO and RISS management offices are establishing an
advisory committee to oversee the integration of the two networks. Part of
the plan is to capitalize on the strengths of each network by making LEO
the lead on advancing Web-based applications and RISS the lead on handling
database applications, March said.
The combined system will also have a directory and an e-mail system, which
will enable members of either network to contact the person or group with
the appropriate expertise. To ensure full security, the directory will give
access according to the individual's security clearance.
March sees many potential uses for the networks. For example, LEO could
become the central point through which local law enforcement agencies
receive homeland security alerts from federal officials.
***
Upgrading LEO
The FBI has several enhancements planned for the Law Enforcement Online
intranet over the coming months, including:
* Identifying new collaboration tools.
* Creating a special interest group for crisis management officials.
* Connecting other law enforcement networks, in addition to the Regional
Information Sharing Systems program.
* Developing a national alert system that can track whether recipients
receive the alerts.
*********************
Federal Computer Week
Intell agencies ready to deal
Homeland security spurs more info sharing
After a long tradition of keeping its information and systems in the
shadows, the federal intelligence community is ready to work with civilian
agencies to improve the flow of homeland security-related information.
The Office of the Chief Information Officer for the U.S. intelligence
community (www.cia.gov/ic) has taken an information architecture created
for the intelligence community and adapted it to support communications
with other agencies gathering homeland security intelligence, officials
said at the Government Symposium on Information Sharing and Homeland
Security, held in Philadelphia.
This architecture, developed across several years to support data sharing
and collaboration among the many agencies working with top-secret or secret
information, defines the system interfaces and policies needed for agencies
to exchange information.
"The sharing demands have completely changed," said Dolly Greenwood,
director of architecture and implementation in the CIO's office. With the
architecture plans, "we can start to build things so they can be totally
accessible."
Since Sept. 11, the intelligence community has become much more open to
sharing information with nontraditional government users, particularly the
federal, state and local law enforcement communities, said Winston Wiley,
the CIA's associate director for homeland security.
In addition to work with classified intelligence, the intelligence
community is doing what it can to produce sensitive but unclassified
information that can be passed on to the larger homeland security
community, he said.
The intelligence and law enforcement communities were already informally
linked through a law enforcement working group, officials said. The
3-year-old organization, now in the final stages of becoming formally
chartered, was established to enable the intelligence community to learn
what kind of intelligence information law enforcement officials could use.
But now all of the communities are opening up to one another, which means
that law enforcement, first responders and diplomatic officers on the front
line are beginning to understand what resources are available from the
intelligence community, said Kathleen Kiernan, chairwoman of the working
group.
At the same time, the intelligence community now can contact hundreds of
thousands of new intelligence gatherers, said Ken Piernick, senior director
of the Office of Homeland Security's Intelligence and Detection Directorate.
The final architecture calls for three domains that, while remaining
separate, are connected by trusted, controlled interfaces that will allow
authorized information to pass back and forth, said William Dawson, deputy
CIO for the intelligence community.
Intelink supports much of this homeland security architecture, said John
Brantley, director of the Intelink Management Office. Intelink effectively
serves as the intelligence community's intranet and provides collaboration
applications, Web portals and directories for analysts around the world.
The Intelink Management Office is already working with the Defense
Information Systems Agency to provide a secret version, Intelink-S, based
on the Defense Department's Secret Internet Protocol Router Network,
Brantley said.
The new network will be based on the old Open Source Information System, a
secure virtual private network. It will connect DOD's NonClassified
Internet Protocol Router Network, the FBI's Law Enforcement Online network,
and the State Department's OpenNet, which will allow wider access to
State's many visa information databases, he said.
"You keep your network, but you create a protected interface between your
network and mine," said Dave McKee, deputy director of State's Intelligence
Resources and Planning Office.
***
The power of three
The intelligence community's homeland security information architecture
outlines three domains of information, each with its own rules and
authorization levels:
* The top secret/secret compartmentalized information domain is for
information and users at the highest classification level, primarily
traditional intelligence agencies and organizations.
* The collateral information domain is for information and users at the
secret level, which extends the community to portions of the Defense
Department, the law enforcement community and other agencies.
* The sensitive but unclassified domain brings in nontraditional
intelligence agencies and users identified under homeland security, such as
the first responder community.
****************************
Government Computer News
Air Force's chief of staff urges integration
By Thomas R. Temin
MONTGOMERY, Ala.The Air Force's chief today told his systems underlings to
stop acting like members of a tribe and more like members of an integrated
team.
The trouble with tribal thinking is it leads to "jealousy over programs and
platforms. Too few of us are about integration," chief of staff Gen. John
Jumper told assembled Air Force IT employees at the annual Air Force IT
Conference.
Jumper said the service's various programs spend too much time
distinguishing the difference between an intelligence platform and weapons
or firepower delivery systems, when in may cases they should be one and the
same thing. That would save time and confusion between becoming aware of a
target and killing it, he said.
For airborne crews, "there can be no Web searches. There are no hourglasses
up there," he said, referring to the screen icon that indicates a computer
is processing data.
The Air Force needs more programs like one in which laser homing data is
delivered to an A-10 attack aircraft, Jumper said. That, he said, "is like
cats and dogs living together."
Similarly, sensor and other command and control data needs to be integrated
on aerial tankers because, despite their narrow specific function, they are
always present in battle.
The focus of data integration, Jumper said, should be to give all platforms
a "find, fix, track, target, assign, exchange and assess" capability.
***************************
Government Computer News
Suit calls PTO systems flawed
By Wilson P. Dizard III
Charging that the Patent and Trademark Office's databases are riddled with
errors, the National Intellectual Property Researchers Association
yesterday filed suit in the U.S. District Court for the Eastern District of
Virginia to stop the phasing out of paper patent and trademark records.
PTO declined to comment on the pending litigation, NIPRA v. James E. Rogan.
Rogan, Commerce undersecretary for intellectual property, earlier this year
unveiled a plan to automate virtually all of PTO's activities to improve
service and reduce costs.
PTO last year fielded the Examiners Automated Search Tool (EAST) and the
Web Enabled Search Tool (WEST) as steps toward a paperless system. The
office has long planned to phase out paper records, partly because it
issues them in such volumeabout 3,500 patents weekly, each patent ranging
from 20 or 30 pages in length. It has maintained that the databases are
more reliable than paper records because they can be searched more quickly
and thoroughly.
NIPRA said in a statement that it is not opposed in principle to patent
automation. But the association asserted that maintenance of paper
collections, particularly for foreign records and trademark files, is
essential until the automated searching tools can provide results
equivalent to a combined search of paper and electronic records.
Association spokesperson Robert Weir said one of the suit's purposes is to
direct PTO's attention to problems with EAST and WEST, including missing
records and flawed search engines. NIPRA president James Cottone said that
eliminating paper records "makes no sense at this time, given the many bugs
remaining" in the databases.
*************************
Washington Post
Web Ad Firm to Limit Use of Profiles
By Robert O'Harrow Jr.
NEW YORK, Aug. 26 -- A leading online advertising company agreed today to
pay $450,000 and limit its use of personal information to bring an end to
an investigation by 10 states into claims the firm inappropriately profiled
computer users.
The settlement follows a 30-month probe of DoubleClick Inc.'s use of
millions of electronic tags called "cookies" to track, on behalf of
clients, what Web sites individual computer users visited and whether they
clicked on online banner ads.
Under the agreement announced today by New York Attorney General Eliot
Spitzer, DoubleClick still will be able to track consumers online. But it
will have to better disclose how it does so and give individuals access to
the profiles created about them. The company also agreed to allow an
outside company to audit its privacy promises for several years.
Other states involved in the agreement include California, Connecticut,
Massachusetts, Michigan, New Jersey and Washington.
"It's hard for consumers to trust e-commerce when they can't see the
practices behind the promises," Spitzer said in a statement. "When an
online contractor can invisibly track nearly every online consumer,
consumers deserve to know the privacy cost of surfing the Web."
"It basically sends a message there are real penalties for companies who
don't play fair with customers' information," said Mary J. Culnan, a
business professor and privacy specialist at Bentley College in Waltham, Mass.
DoubleClick attracted intense scrutiny from state attorneys general -- as
well as from the Federal Trade Commission and privacy activists -- when it
announced that it intended to merge its online files with data collected
about individuals' off-line purchases to better target promotions.
At the time, the FTC began its own investigation after complaints from
consumer activists. Congress discussed the possibility of legislation that
would prohibit some of the practices the company was implementing or had
proposed.
To quell the furor, DoubleClick dropped its plans to merge online and
off-line information about people. It also helped create the Network
Advertising Initiative, a group pledging not to use personally identifiable
information about sexual orientation, Social Security numbers, or medical
or financial data for marketing.
DoubleClick and the other members also agreed to alert computer users to
the placement of cookies and give those users a chance to opt out of data
collection.
Earlier this year, the company said it would pay $1.8 million to settle a
private class-action lawsuit. Today, DoubleClick officials said their
agreement with the state attorneys general demonstrates their commitment to
privacy.
Among other things, the company said it will disclose how it collects and
uses personal information; it will minimize the amount of information it
collects and restrict how it shares that information with other companies;
and it will alert interested computer users to changes in its privacy policy.
"In order to maintain its position as a leader in online privacy,
DoubleClick has worked closely with the attorneys general to build upon the
robust privacy practices it has already implemented," said DoubleClick's
general counsel, Elizabeth Wang.
At least one critic remains skeptical. Chris Hoofnagle, legislative counsel
for the Electronic Privacy Information Center, a nonprofit advocacy group
in the District, said the agreement is a good step. But it still allows the
company to create profiles, as long as it provides notice of the activity.
"We can't go forward saying notice solves all privacy problems," he said.
********************************
Washington Post
WorldCom Staff Told Not to Talk to Auditor, E-Mails Show
By Jonathan Krim
WorldCom Inc.'s former controller warned employees who questioned the
company's accounting practices not to discuss their concerns with the
firm's outside auditors, according to a new batch of corporate e-mails
released by congressional investigators yesterday.
David F. Myers, one of two top finance executives who were fired as a
result of the company's accounting scandal, was furious that finance
officials in the company's European operations had met with Arthur Andersen
LLP auditors to discuss how to properly depreciate some of the company's
assets.
"Do not have any more meetings with AA for any reason," Myers wrote in an
e-mail on Jan. 22 of this year to Steven Brabbs, a top international
finance official based in Britain. "I do not want to hear an excuse," he
continued, "just stop. . . . Don't make me ask you again."
The e-mails provide further insight into an atmosphere of tight-fisted
control over WorldCom's finances by Myers at a time when the company was
improperly booking expenses in the United States, said Peggy Peterson, a
spokeswoman for the House Financial Services Committee, which released the
messages.
The e-mails do not relate directly to the improper booking of $3.9 billion
in operating expenses as capital expenses, which ultimately led the
Securities and Exchange Commission to charge WorldCom with defrauding
investors. That bookkeeping allowed the company to report a profit instead
of a loss because capital expenses are spread out over long periods.
The e-mail discussion was about how much the company could write off the
"impairment" of assets in the European division. It is not clear from the
e-mails how the issue was resolved.
Earlier the same January day, Brabbs was warned not to pursue the issue
with Arthur Andersen auditors by Mark Willson, who worked for the deputy of
WorldCom's chief financial officer, Scott D. Sullivan. Sullivan was fired
along with Myers.
"Issues such as . . . asset writedown will not be concluded on by UK AA,"
Willson wrote to Brabbs.
Willson also sent a copy of the note to Myers to show what action he had
taken. Myers shot back: "Not that I was looking for another reason to have
him executed."
Brabbs, in fact, had challenged financial practices at WorldCom's
Mississippi headquarters before.
One day after WorldCom announced the scandal and fired Myers and Sullivan,
Brabbs sent a lengthy letter to its auditors decribing another instance in
which he resisted making adjustments to the international division's books
in 2000, despite pressure from Myers.
Brabbs said that journal entries made at Sullivan's direction were improper
and amounted to a $33.6 million understatement of costs, and that he had
raised the issue with Arthur Andersen. Myers was angry then that Brabbs had
gone to the auditing firm, Brabbs wrote.
Brad Burns, a spokesman for WorldCom, said, "We're cooperating with all
investigations and will continue to do so until we gain full resolution."
***************************
USA Today
Net-savvy teens want teachers to keep up
By Jinny Gudmundsen, Gannett News Service
Katie Lauerman, 13, researches man-eating sharks online for a school
assignment as she simultaneously has "IM" conversations with four friends,
reserves books at the public library site and participates in an online quiz.
Katie and other teens across America don't think twice about using the
Internet to multitask it is something they have grown up doing.
In fact, researchers say today's teens are so Net-savvy that they are
reporting a "substantial disconnect" between how they use the Internet
outside of school and how they use it in the classroom. According to a new
study by the Pew Internet & American Life Project, teens are frustrated
that teachers don't incorporate more Web learning into the curriculum or
know how to use the Web more effectively.
"They are not saying, 'We don't want teachers,' and they are not saying,
'This is better than teachers,' " said Lee Raine, director of the Pew
project. "They are saying, 'We know there is cool stuff on the Internet
that helps us learn the things teachers want us to learn, and it would be
great if more teachers would integrate these online experiences.' "
The "digital disconnect" has become more pronounced as teens have flooded
the Internet. A July 2002 Pew survey estimates that 78% of teens 12 to 17
go online. They have experienced the interactivity of learning on the Web
through their exploration of sites and have come to expect the same
sophistication when using the Internet at school.
"Instead of just reading textbooks, teachers should use Web sites that are
hands-on so kids can learn as they do things," said Lauerman.
The disconnect has not gone unnoticed by teachers. Even teachers at Thomas
Jefferson High School for Science and Technology, a Virginia magnet school
specializing in technology, acknowledge the disparity in Internet knowledge.
"We [teachers] are catching up, whereas these kids have grown up on it.
They are far ahead of us," said Cathy Colglazier, an English teacher.
Colglazier says the new generation of techno-teens is creating a paradigm
shift similar to the one that occurred when the first generation of Sesame
Street-watching kids hit elementary school.
"We found more multimedia ways to present things," Colglazier said. Now,
she incorporates the use of the Internet. "There are always kids who know a
whole lot more about technology, and we have to be careful not to fear them
but rather to embrace them."
Students participating in the Pew study acknowledge that there are many
factors contributing to the "digital disconnect." While most schools are
now wired for the Internet, that access may be so limited that it is
impossible to get online. Many teachers lack training in how to effectively
incorporate the benefits of the Internet into teaching. Students also cited
short class times and filtering software as hindrances to online teaching.
Teens in the study acknowledge that some teachers are using the Internet in
ways that excite them. They cited examples of chemistry sites that had
interactive movies and online scavenger hunts.
*****************************
Wired News
RIAA: Feeling Burn of Ripped CDs
The recording industry blames the rapid decline of album sales on a new
technology that allows people to easily copy and transport music. It's
expected to cripple the major record labels.
The year was 1979. Audio cassettes and the Sony Walkman were the feared
technologies. Twenty-two years later, the industry is making similar
claims, but today's culprit is MP3 files and file-trading services.
The hit-driven recording industry has long been at the mercy of popular
tastes, but executives still view emerging technology as dangerous.
Shipments of CDs dropped 7 percent in the first six months of this year, a
fact attributed to an increase in music downloads through file-trading
services, according to a report issued Monday by the Recording Industry
Association of America (RIAA).
It's the same argument the organization made two years ago during its legal
scrape with Napster. Back then, however, record sales were still climbing.
Today, the decline in sales appears to bolster the RIAA's case.
"There are numerous red flags and warning bells that illustrate
conclusively the harmful impact of illegal downloading on today's music
industry," said RIAA President Cary Sherman.
But the industry weathered similar downturns when the disco era came to an
end -- portable music devices like the Sony Walkman were introduced, and
video arcades were competing for teenagers' limited cash reserves.
Three year of tumbling sales hit bottom when CBS Records, then one of the
largest labels, was forced to fire 300 employees and close nine
distribution centers on one bloody Friday in 1982, an event chronicled in
the book Hit Men, which follows the ups and downs of the music industry.
By the mid-1980s, the labels' economic fortunes had turned around. MTV had
re-created the rock star. The video game market had disintegrated, and
compact discs had supplanted tapes, forcing consumers to replace their
antiquated tapes and LPs with digital music.
Congress, too, has repeatedly stepped in to ensure that new technologies
wouldn't swallow old business models. In 1992, it created a tax that added
a few dollars to the price of digital audio tapes and digital recorders.
That money was then distributed among labels.
"Each of these gradations of change can be shocking at first, in the sense
that you can digitally send a perfect duplication of a sound recording,"
said Jim Griffin, CEO of Cherry Lane Digital. "We respond with a fair, but
not perfect, way of splitting it up. It's how we responded to webcasting
and the audio tape."
While the RIAA works hard to protect its business model, consumers continue
to adopt new forms of music media.
The RIAA's most recent study bears this out. People are downloading more
files and burning more CDs, according to "Music and the Internet," a study
by the Peter D. Hart Research Firm.
Internet users also say they are more likely to download a song -- not buy
the album -- after they first hear it.
However, the study is delivered in broad terms and doesn't probe the
reasons for consumers' actions. For example, it found that consumers have
acquired more burned CDs -- 11.3 this year compared to 5.8 last year -- but
there was no indication whether those CDs were personal compilations, which
is considered fair use, or mixed CDs made by friends, which isn't.
The study also ignores the effects that online subscription services
Pressplay and MusicNet, initiatives backed by the five major music labels,
may have had on retail CD sales.
Some analysts believe this is because the labels have not made any effort
to provide consumers with choices online, leaving them to fend for themselves.
"Consumers are beginning to understand what digital means," said P.J.
McNealy, an analyst with technology research firm GartnerG2. "That goes
hand and hand with the PC manufacturers and the ISPs wanting to become
entertainment providers. Music is the first introduction of that
(thinking), but it takes time to change consumer behaviors.
"The music industry is going through another disruptive technology period
like it did 30 years ago, and it will take some time to reverse revenues
back in the right direction."
****************************
MSNBC
Should you insure against ID theft?
New policies offer to cover expenses of reclaiming your name
ASSOCIATED PRESS
COLUMBUS, Ohio, Aug. 26 The thieves who stole Amy Jo Sutterluety's
identity spent $70,000 in her name. They also took her time: a month to
close 15 fraudulent accounts. Insurance policies to cover her out-of-pocket
expenses for phone calls and legal battles didn't exist back in 1998 when
she was victimized though she wish they had.
"HAVING BEEN THROUGH IT, I would say it's well worth the $25
rider," said Sutterluety, an associate professor at Baldwin-Wallace College.
Still, experts have mixed feelings about the growing number of
companies that offer such coverage.
Travelers Insurance of Hartford, Conn., first offered an identity
theft policy in 1999. Cincinnati Insurance Cos. and Columbus-based Grange
Insurance are among those that since have added the coverage, usually as a
rider to a homeowner's policy.
The product has been slow to take off, being added to 1 percent or
less of policies, and few if any claims have been filed, representatives of
the companies said.
The insurance covers expenses to restore credit copies, mail,
calls, time lost from work, even attorney fees. Premiums range from $10 to
$40 for up to $25,000 in coverage; most policies have a $100 or more
deductible.
"It's not one phone call to these companies, it's a dozen phone
calls, it's a dozen letters," said Linda Foley, a victim and director of
the San Diego-based Identity Theft Resource Center.
The Department of Justice estimates there are 500,000 to 700,000
identity theft victims a year. The Federal Trade Commission told Congress
this year that the frequency and cost of the crime is growing.
"Given the occurrence and risk of identity theft, and given the
real inexpensive nature of this coverage, consumers would be well served to
carefully consider getting this kind of coverage," said Todd Boyer,
spokesman for the Ohio Department of Insurance.
Victims have testified before Congress that they must cancel a
fraudulent account several times because collection agencies keep reopening
the cases. Some have lost jobs because of criminal charges filed against
the person using their identity, the FTC reported.
INSURERS COULD PURSUE BANKS
Foley said insurers might go after banks that issue instant credit
without checking the birth date or address associated with a Social
Security number, or collection agencies that reopen cleared cases.
"They're going to force these corporations to adopt these better
business practices," she said.
Sutterluety, 37, said she spent about 200 hours calling creditors,
police and other agencies. Expenses were about $800, she said, but that
could have swelled to $7,500 if an attorney friend hadn't provided free help.
"I am certain that if I did not have the summer off, I would have
had to take at least 10 days vacation," Sutterluety said.
Insurers and advocates often quote a May 2000 study saying victims
spend an average 175 hours and $808 on legal problems. The study was based
on 66 victims who called the California Public Interest Research Group.
About 94,100 victims called the FTC's identity theft hotline from
November 1999 through September 2001. More than 80 percent gave no
financial information.
About a thousand, or 1 percent, reported spending $1,000 or more
trying to restore their credit.
Because of such uncertainty, not everyone is a fan of the insurance.
"You should save your insurance dollars for things that are
catastrophic in nature and not just pesky," said Bob Hunter, insurance
director for the Consumer Federation of America.
Insurance may cover the costs but doesn't end the "nightmare" of
restoring credit, said Mari Frank, a California attorney and victim advocate.
"You still have to do all the work yourself," she said.
*******************************
MSNBC
What are the real risks of cyberterrorism?
By Robert Lemos
ZDNET
Aug. 26 In 1998, a 12-year-old hacker broke into the computer system that
controlled the floodgates of the Theodore Roosevelt Dam in Arizona,
according to a June Washington Post report. If the gates had been opened,
the article added, walls of water could have flooded the cities of Tempe
and Mesa, whose populations total nearly 1 million. There was just one
problem with the account: It wasn't true.
A HACKER DID break into the computers of an Arizona water facility,
the Salt River Project in the Phoenix area. But he was 27, not 12, and the
incident occurred in 1994, not 1998. And while clearly trespassing in
critical areas, the hacker never could have had control of any damsleading
investigators to conclude that no lives or property were ever threatened.
"It's like the children's game of 'telephone,'" said Gail Thackery,
assistant attorney general for Arizona and the prosecutor on the Salt River
hacking case. "You get the reality at one end and, at the other end,
something completely different."
The misreported incident serves as a metaphor for today's pressing
debate over the Internet's vulnerability to attack. While warnings pervade
government and the media, doomsday scenarios of cyberterrorism that result
in massive deaths or injury remain largely the stuff of Hollywood scripts
or conspiracy theory.
Although it is possible for electronic intrusions to damage
infrastructure and threaten physical danger, taking control of those
systems from the outside is extremely difficult, requires a great deal of
specialized knowledge and must overcome non-computerized fail-safe
measures. As a result, government and corporate security expertswhile
careful not to dismiss the gravity of the issuepoint to this indisputable
fact: It is still easier to bomb a target than to hack a computer.
"If we had so many dollars to spend on a water system, most of it
would go to physical security," said Diane VanDe Hei, executive director of
the Association of Metropolitan Water Agencies and point person for the
Information Sharing and Analysis Center (ISAC) for the water utilities.
In a so-called "digital Pearl Harbor" exercise sponsored by the
U.S. Naval War College and Gartner last month, analysts posing as
terrorists were able to simulate a large-scale cyberattack on the nation's
infrastructure. But to do so they needed $200 million, high-level
intelligence and five years of preparation time. The college concluded that
such an offense could cripple communications in a heavily populated area
but would not result in deaths or other catastrophic consequences.
Yet the hyperbole about an Internet attack frequently overshadows
common sense. On Sept. 11, it took less than 24 hours after four passenger
jets were used as weapons of mass destruction for cries of cyberterrorism
to emerge as the next great threat, triggering calls for new legislation to
broaden the authority of law enforcement agencies.
"Until we secure our cyber infrastructure, a few keystrokes and an
Internet connection is all one needs to disable the economy and endanger
lives," said Rep. Lamar Smith, R-Texas, in a statement heralding the
House's passage of the Cyber Security Enhancement Act last month. His
favorite tag line: "A mouse can be just as dangerous as a bullet or a bomb."
That sort of rhetoric is why many dislike the term "cyberterrorism."
Ambiguity over its definitionand, therefore, which threats are real and
which are nothas confused the public and given rise to countless myths. The
phrase has become a catchall buzzword that evokes nightmare images that can
be exploited to support political agendas ranging from stronger
surveillance authority to tighter immigration controls.
"If you say cyberterrorism, you confuse people," said Richard
Clarke, President Bush's special adviser for cybersecurity. "Osama bin
Laden is not going to come for you on the Internet."
Cyberattacks come in two forms: one against data, the other on
control systems. The first type attempts to steal or corrupt data and deny
services. The vast majority of Internet and other computer attacks have
fallen into this category, such as credit-card number theft, Web site
vandalism and the occasional major denial-of-service assault.
Control-system attacks attempt to disable or take power over operations
used to maintain physical infrastructure, such as "distributed control
systems" that regulate water supplies, electrical transmission networks and
railroads. While remote access to many control systems have previously
required an attacker to dial in with a modem, these operations are
increasingly using the Internet to transmit data or are connected to a
company's local networka system protected with firewalls that, in some
cases, could be penetrated.
Still, Clarke and other security officials say any damage resulting
from electronic intrusion would be measured in loss of data, not life.
"It would be relatively easy to conduct a cost-free or risk-free
attack given the endemic vulnerabilities in our system," said Michael
Vatis, director of the Institute for Security Technology Studies at
Dartmouth University and a former director of the National Infrastructure
Protection Center, the cybersecurity arm of the FBI. "It would be harder to
kill people or have a lasting effect using cyberattacks."
It is true, however, that data attacks could have severe
consequences without causing deaths. Many power companies and water
utilities are operated with networks of computer-controlled devices, known
as supervisory control and data acquisition (SCADA) systems, which could be
hacked.
SCADA systems could be attacked by overloading a system that, upon
failure, causes other operations to malfunction as well, said John Dubiel,
a Gartner consultant who worked on the electrical power attack in last
month's war games. Such domino effects have been seen in incidents
resulting from natural events.
In 1996, the power along much of the West Coast corridor went out
for nine hours after a tree branch fell on some power lines and, in
combination with several other problems, caused a cascading failure. In
1990, a similar event with an AT&T switch touched off a chain reaction that
shut down long-distance communications across the United States.
"The system attacks itself in these cases," Dubiel said.
Making matters worse, more than 80 percent of such critical
infrastructure is privately owned, and in many cases the companies have not
been sufficiently educated about information security until recently.
Security consultants have attested that many utilities have an indirect
path to the Internet from their SCADA master terminals.
In November 2001, 49-year-old Vitek Boden was sentenced to two
years in prison for using the Internet, a wireless radio and stolen control
software to release up to 1 million liters of sewage into the river and
coastal waters of Maroochydore in Queensland, Australia.
Boden, who had been a consultant on the water project, conducted
the attack in March 2000 after he was refused a full-time job with the
Maroochy Shire government. He had attempted to gain access to the system 45
times, and his last attempt proved successful, allowing allowed him to
release raw sewage into the waterways.
"Marine life died, the creek water turned black and the stench was
unbearable for residents," said Janelle Bryant, investigations manager for
the Australian Environmental Protection Agency.
That the facility failed to notice the first 44 attempts speaks
volumes about the state of security at public utilities. In a 1997 survey
of 50 utilities, then-graduate student Barry C. Ezell, a captain in the
U.S. Army, found that 40 percent of water facilities allow their operators
direct access to the Internet, and 60 percent of the SCADA systems could be
connected by modem.
Ellen Vancko, a representative for the North American Electric
Reliability Council, said such access should not always be considered
unsafe. "All the electric companies are connected to the Web in one way or
another," she said. "But that doesn't mean our control systems are hooked
up to the public Net."
Granted, but an Internet connection does provide one more way for
an electronic intruder to get into a system. Chris Wysopal, director of
research and development for digital security firm @Stake, said he first
looks for connections to the Net when called in to analyze the security of
an infrastructure network.
"Whenever we see a control system connected to the Internet, that
is scary. There is no need for it, except for productivity, and when you
are talking about public safety, you should err on the side of security,"
said Wysopal, whose company has been hired for such audits only since Sept.
11. "We found a power plant where all the control systems had their
administrative systems set to the same password."
Because firewalls and other internal protections are not always
adequate, risk levels are increased exponentially if networks are connected
to the Internet.
"Are we vulnerable? Absolutely. We have the massive bowl of
spaghetti between the Internet, phone lines, and extranets, and no one can
map it," said Assistant Attorney General Thackery. "We have miles and miles
and miles of wire and none of it is secure. And we have all these windows
and doors that are open, and they are still open."
She noted that the Net played a major role in a well-publicized
incident in 1989, when the Legion of Doom hacker group seized control of
much of the infrastructure of Southern Bell's telephone network. During the
attack, the hackers could have tapped phone lines and even shut down the
911 system.
BellSouth "had 42 people that I knew of on 24-hour emergency alert
to keep control of their network," said Thackery, who was forced to use an
encrypted phone in the Secret Service's office in Phoenix because her line
had been tapped. "To me, that's one of the scariest scenarios, and these
were all college kids. Just pranksters."
Yet even the most notorious incidents have fallen well short of the
type of massive destruction envisioned in some of the more imaginative
warnings about cyberterrorism. The Queensland incident, for instance,
claimed no lives and cost just $13,000 to clean up, and it was accomplished
only with extensive inside knowledge.
Wysopal and many other security experts readily acknowledge that
wide-scale infrastructure disruption is no easy feat. Even if an intruder
manages to break in, he said, commandeering a system "still requires a
fairly sophisticated skill set."
In last month's "Pearl Harbor" exercise, Gartner analysts playing
the role of attackers reinforced that observation. "It is very hard to
attack something that you don't have a specific knowledge of," said David
Fraley, an analyst who simulated an attack on telecommunications networks.
Even in a successful attack on a metropolitan power grid, many
critical systemssuch as hospitals and prison operationswould continue
running because they have independent generators. In addition, utilities
and infrastructure operators have elaborate backup measures to protect the
public even if a system is breached.
For example, if a hacker were to dramatically raise the chlorine
levels of a reservoir, the contaminated water would probably never make it
to the public because such supplies are typically tested up to five times
before entering public pipelines. The Environment Protection Agency
requires utilities to look for more than 90 regulated contaminants in these
tests. An easier attack, and one that such agencies spend more to prevent,
is a terrorist dumping chemicals into a reservoir directly.
Federal authorities are also concerned about computer systems that
control the nation's transportation systems, including trains, trucks,
buses and barges. The railroad industry's networks alone are massive, with
more than 500 small railroads to supervise.
"The railroad industry today is one of the biggest users of
computer systems in the country," said Nancy Wilson, senior vice president
of the Association of American Railroads and point person on the Surface
Transportation ISAC. "We were early users of technology and we are big
users of technology. If we lose computer capabilities, we would kind of
grind to a halt."
For that reason, most rail companies have extensive safety measures
and backup systems. Sensors tell when the track has been tampered with, and
security mechanisms provide early warning alerts for possible intrusions.
"We have had our share of little hacker problems, but they have
never been serious," Wilson said. "I'm not saying we are perfect, but I am
saying that we have come a long, long way toward identifying our
vulnerabilities."
Redundant safety measures are also taken in manufacturing
companies, many of which use SCADA systems. But that hasn't stopped the
proliferation of popular urban legends.
In one such myth, a hacker breaks into a food company's network
through a Web connection and manipulates a breakfast cereal recipe to add
vastly higher levels of iron, threatening children who have a low tolerance
for the mineral. Another rumor had a hacker gaining entry to a
tank-manufacturing company and changing the temperature specifications for
armor used in the vehicles, making the metal more brittle and vulnerable.
Neither story is true.
Security experts generally agree that the infrastructure most
susceptible to hacking alone is the Internet itself. They often point to
the Nimda worm, which caused as much as $3 billion in estimated damages and
lost productivity by some estimates.
Some Internet vulnerabilities have been exposed without any
attacks. At least one serious weakness was discovered in 1997 when a
technician changed two lines of code and nearly brought down the global
network for three hours.
The change occurred to one of the hundreds of thousands of routers
that form a key part of the Internet infrastructure. Because of the
two-line mistake by the technician at the McLean, Va.-based MAI Network
Services, one of its routers indicated that it provided the best path to
the entire Internet. Other routers then began sending all their data to the
ISP's small leased line, crashing MAI's network and clogging systems around
the world.
"Within minutes you had most of the routers throughout the Internet
going down," said Craig Labovitz, director of network architecture and lead
border gateway protocol researcher for security firm Arbor Networks. "It
was absolutely the most massive Internet outage we've seen."
Here again, however, the consequences were neither disastrous and
nor interminable.
"This wasn't a catastrophe. It was a brownout that sporadically hit
providers at various strengths," said one network technician to the North
American Network Operator's Group following the outage. He noted that at
least one network service provider saw a drop of only 15 percent in traffic.
To law enforcement agencies, the Internet's largest threat is
simply the ease of international communication and the ability to hide
among the seemingly infinite volume of traffic it carries. In an effort to
track down terrorists electronically, the FBI has waived several
requirements for new recruits who have technical training.
"The worry right now is not so much a cyberterrorism event," said
Don Cavender, a special agent and instructor with the FBI's Computer
Training Unit at Quantico, Va., "but when the terrorists use the Internet
to facilitate the planning of these attacks."
Copyright © 2002 CNET Networks, Inc. All rights reserved. ZDNet is a
registered service mark of CNET Networks, Inc. ZDNet Logo is service mark
of CNET Networks, Inc.
********************************
Euromedia.net
Open source software favoured for the public sector
27/08/2002
Editor: Joe Figueiredo
Public sector institutions should move to open source software (including
free software) because it is cheaper and easier to manage, and also
accelerates competition in the software market, according to researchers at
University of Maastricht's International Institute of Infonomics.
This EU-sponsored 'Free/Libre and Open Source Software' (FLOSS) study,
which involved surveying 1452 companies and public institutions in Germany,
Sweden and the UK, provides information on the use of open source software,
and identifies business models and the impact of changes in government policy.
The report also finds that open source software is especially suited for
government institutions because it supports the right of access to public
information, and provides good control over the security of stored
information.
These findings may boost the Dutch open source lobby's arguments for
governmental organisations opting for such open source products as the
Linux operating system and related applications.
In the Netherlands, the municipality of The Hague has already signed a
controversial software contract with Microsoft, and Amsterdam has chosen
open source MMBase for its counter services.
Elsewhere, Germany's central government is using Linux in all its
workstations, and the French Ministry of Defence, Culture and Economics is
migrating to open source software.
*******************************
Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 510
2120 L Street, NW
Washington, D.C. 20037
202-478-6124
lillie.coney@xxxxxxx