[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Clips September 18, 2002



Clips September 18, 2002

ARTICLES

Czar of Cyber Security Defends Easing of Rules
Key Players in U.S. Government's Cybersecurity Efforts
Trade group: P2P not illegal or immoral
Parties trade blame for delay of homeland security bill
Plan to Extend Bag Deadline at Some U.S. Airports
Homeland Security: High Tech Starts Kicking In
Interior officials found in contempt
Credit card scam exposes e-commerce security holes
Roster Change Federal Computer Week
Utah CIO bent rules in hiring, auditors say
Web sites reinforce security and privacy policies, review finds
House panel backs bill to make agencies protect data
Under lobbying, high-tech panel alters recommendations
Dissension, lobbying narrow administration's cyber plan
National cyberdefense strategy draft released
Merchant: FBI probes major credit card scam
Block on digital recordings worries consumer groups
Biometric trials point to passport fraud
Cable Likely to Hold Lead in Broadband-Report
Help On The Way In Spam Wars


****************************
Los Angeles Times
Czar of Cyber Security Defends Easing of Rules
Policy: He tells critics of his strategy that industry, and not government, has the right answers.
By CHARLES PILLER and JUBE SHIVER JR.
September 18 2002


SAN FRANCISCO -- Federal cyber security czar Richard Clarke fired back Tuesday at critics who have lambasted his national strategy for cyberspace security as weak and meaningless, saying that government regulation would only make the problem worse.

"Why are we requesting that industry help us, rather than demanding it?" Clarke asked. "Industry frequently knows better than government about the [information technology] infrastructure."

Clarke argued that the problem of cyber security is so complex that it defies a centralized approach. Any regulatory process would be outdated before it took force in the fast-moving world of technology.

The National Strategy to Secure Cyberspace, set for release today, and previewed Tuesday to some experts and members of the media, emphasizes recommendations for better security practices and guidelines for detecting and repelling hackers. It contains no proposals for tax incentives, regulations or legislation to compel businesses or other organizations to safeguard their networks, and thereby increase the nation's overall cyber security.

Experts say there has been a litany of similar reports in recent years, and Clarke's 65-page document adds few new ideas or incentives for industry to patch its security holes.

The Bush administration backed away from several tougher steps, including requiring Earthlink, America Online and other Internet service providers to include security technology with their software, said Michael A. Aisenberg, a director of public policy for VeriSign Inc., a leading security software firm.

White House officials also dropped plans to restrict the use of wireless networks because of rampant security holes, according to industry sources.

Critics have charged that Clarke abandoned those initiatives because of intense lobbying from technology firms, which have wanted to remain free of potentially costly government restrictions.

Clarke denied allegations of undue pressure but would not comment further on earlier drafts of the report.

Some leading security experts rejected the entire report as irrelevant.

"It's not a law. Who cares what it says?" said Bruce Schneier, chief technology officer for Counterpane Internet Security, based in San Jose. "A bunch of voluntary recommendations won't work," given financial pressures in a down economy.

The report, which will be sent to the president in about two months, urges increased public awareness and personal responsibility as a way to create market pressure for better security products and services.

The strategy repeatedly mentions the vulnerability of America's computer networks to cyber attacks by terrorists; much of the urgency behind the report was generated by fears that terrorist organizations may use cyberspace to enhance their attacks in the physical world--a point some security experts say has been vastly exaggerated by government officials.

But Clarke downplayed the terrorist threat as one among many.

"Stop worrying about threats and start worrying about vulnerabilities," he said, noting that perpetrators for many of the most destructive computer viruses and worms--such as Nimda, which was unleashed one year ago and caused billions of dollars of damage--have never been discovered.

"It doesn't really matter if the person who attacked your operation is Al Qaeda ... a criminal cartel or a nation state," Clark added.

Alan Paller, research director for the Sans Institute, a cooperative nonprofit security research organization that works with industry and government agencies, applauded the new emphasis on vulnerabilities and praised the report as a good first step.

But he remains skeptical that a purely voluntary approach will have enough impact in the long run.

Cyber attacks are increasing year by year, despite prior warnings, in part because "whenever there is a perceived conflict between self interest and the national interest, industry has acted in its self interest," he said.
******************************
Washington Post
Key Players in U.S. Government's Cybersecurity Efforts
Compiled by Brian Krebs
Wednesday, September 18, 2002; 12:00 AM


The Administration:

Richard Clarke: President Bush's cybersecurity adviser has sought to make computer security a national security issue, taking his case to the private sector companies that now operate the majority of the nation's most vital computer systems.

John Tritak: Director of the Commerce Department's Critical Infrastructure Assurance Office (www.ciao.gov). The Bush administration wants to fold CIAO into its planned Homeland Security Department, where it will be responsible for ensuring information sharing among the various intelligence departments slated for inclusion in the proposed cabinet level agency.

Ron Dick: Serves as director of the National Infrastructure Protection Center (www.nipc.gov), an arm of the FBI responsible for coordinating communication on computer security concerns between the federal government and the private sector. The NIPC is also targeted for inclusion in the Bush administration's proposed Department of Homeland Security.

Phil Bond: Undersecretary of Commerce for Technology, U.S. Commerce Department.

Richard Pethia: Director of CERT, a government-funded computer security watchdog group at Carnegie Mellon University in Pittsburgh.

U.S. Congress:

Sen. Robert Bennett (R-Utah): Introduced the Critical Infrastructure Information Security Act of 2001, a bill that would encourage businesses to share data about cyber attacks and vulnerabilities with the federal government by exemption the information from Freedom of Information Act requests. The proposal also would give companies limited antitrust protections for sharing such information within individual business sectors.

Reps. Tom Davis (R-Va.) and James Moran (D-Va.): Co-sponsors of a similar antitrust and FOIA exemption bill in the House.

Rep. Lamar Smith (R-Texas): Sponsor of the "Cyber Security Enhancement Act," which requires the U.S. Sentencing Commission to consider a number of new aspects of online crime in coming up with sentencing recommendations in criminal cases.

Sen. Ron Wyden (D-Ore.): Author of the "Cyber Security Research and Development Act," legislation that would earmark $970 million in funding over five years for government agencies to research ways to improve U.S. computer and network security. The bill awaits action by the full Senate.

Rep. Sherwood Boehlert (R-NY): Author of a similar bill, the "Cyber Security Research and Development Act." The bill, which passed the House earlier this year, contains slightly less funding than the Senate version.

Rep. Stephen Horn (R-Calif.): Chairman of the House Government Reform subcommittee that hands out annual computer security report cards to each executive branch agency. The average grade last year was a "D-minus," prompting the White House Office of Management and Budget to promise that will slash funding for key programs at agencies that do no make computer security a higher priority.

Private Sector:

Vinton Cerf: Now a vice president for WorldCom, Cerf helped develop computer protocols that allows computers to communicate through the Internet.

Harris Miller: President of the Information Technology Association of America (www.itaa.org).

Alan Paller: Director of research for the SANS Institute, a computer security training organization that has worked with the federal government on a variety of cybersecurity issues (www.sans.org).

Tatiana Gau: senior vice president, Integrity Assurance, for America Online. Worked on the nation strategy's recommendations for home users and small businesses.

Robert Holleyman: President of the Business Software Alliance (www.bsa.org).

Scott Charney: Microsoft's chief security strategist.
*****************************
News.com
Trade group: P2P not illegal or immoral
By John Borland
September 17, 2002, 4:08 PM PT

After months of making low-key complaints, a consumer electronics maker trade group on Tuesday launched a bitter attack on record labels' and movie studios' anti-piracy campaigns.
In a speech given at a storage technology conference in San Francisco, Consumer Electronics Association CEO Gary Shapiro blasted the copyright owners' "scorched earth" legal and policy drives. He also warned policymakers against passing new legislation without serious scrutiny of labels' and movie studios' claims.


"The entire theme of the copyright community is that downloading off the Web is both illegal and immoral," Shapiro said, according to the text of his speech. "It is neither."



The speech marks Shapiro and the consumer electronics community's boldest recent statement against the record companies' and movie studios' efforts. The group's words place it squarely in the midst of a cross-industry backlash to the copyright holders' war on Internet piracy, however. ISPs (Internet service providers) and technology companies have separately made their own displeasure public in recent weeks.

For the most part, consumer electronics companies have been careful to say that they are working with copyright holders to find an appropriate balance between consumer and copyright holder rights, and that they respect the labels' and studios' goals.

But the heightening rhetoric leveled at people who download movies and music off the Net, and the bills introduced in Congress that would force electronics companies to change the way they make their products, have brought matters to an unacceptable situation, Shapiro said.

"The copyright community has declared war on technology and is using lawsuits, legislatures and clever public relations to restrict the ability to sell and use new technologies," Shapiro said. "Content providers would be served better by working with technology companies to deploy (anti-piracy technologies) rather than suing everyone and lobbying Congress."

Record and movie studios have blamed a decline in record sales on the spread of Internet file-sharing and unauthorized CD burning. Fast-rising downloads of movies online threatens to have a similar impact on movie industry profits, studios contend.

The Recording Industry Association of America (RIAA) recently said that CD shipments for the first half of the year were down nearly 7 percent. The music industry group pointed to consumer behavior studies it said showed that people who use file-swapping networks tend to buy fewer CDs.

The motion picture industry has been even more aggressive in petitioning Congress for help against what it perceives as online threats. Several controversial bills have been introduced that would force computer and technology companies to add anti-piracy features to their products and would let copyright owners use hacker-style attacks on peer-to-peer networks that have been used to swap billions of copies of their products.

In his speech, Shapiro hit several familiar notes, saying that the music and movie companies should not "whine" about the inability to compete with free file-swapping services, and instead should "should stop complaining so much and look for technological solutions to its own problems."

Much of the last few years has been dedicated to looking for "technological solutions," however. The music-industry sponsored Secure Digital Music Initiative (SDMI) and several movie industry-backed efforts, both with participation by technology and consumer electronics companies, have spent considerable time looking at different ways to protect content against illegal copying.

Most of these efforts have broken down after the various participants have found themselves unable to agree on a solution.
*****************************
Washington Times
Parties trade blame for delay of homeland security bill


The White House yesterday accused Senate Democrats of filibustering the homeland security bill in order to punish President Bush for insisting on management flexibility in the proposed department and the ability to have a related White House agency

"Some senators who can't have their way are creating an environment where no one will get their way, that no department will be created," White House Press Secretary Ari Fleischer said yesterday.

Hours later Senate Majority Leader Tom Daschle, South Dakota Democrat, responded by filing a cloture motion that, if it passes, would bring debate to a close on a Democratic counterproposal. The vote will come tomorrow.

The Senate has been debating the Democratic proposal for two weeks, but has not made much progress on many thorny issues. The House already has passed a bill that the White House supports.

"There is no desire to slow this legislation down," Mr. Daschle said, though he blamed the president for the bill not having been completed. "If the president had supported homeland security legislation when Democrats first offered it last summer, we probably would have completed it by now."

But Mr. Bush, speaking at a political fund-raiser in Nashville, Tenn., accused Senate Democrats of being "more interested in Washington's special interests than they are in the interests of protecting the American people."

The president wants to pull together 170,000 federal employees from scores of scattered departments and put them into a new Department of Homeland Security, under his direct command.

Democrats want the employees protected by civil service regulations and collective-bargaining agreements that would make hiring and firing more difficult.

"I don't want to see people fired because they disagree with their boss. I don't want to see people fired because they're Republican or Democrat. I don't want to see people fired simply because they had made a statement and it appears on one of the front pages of the newspapers," Mr. Daschle said.

But the administration said leaving the president without flexibility sets the new department up for failure.

"I hope they get a good bill out of the Senate before they go home to campaign," Mr. Bush said. "But I'm going to make good on my promise that if the flexibility is not in the bill, I'm going to use my veto power."

The House passed its version of the bill, which the president has said he will accept, in a 295-132 vote July 26. The Senate began considering the bill just before its August recess, and has been debating the bill since returning Sept. 3.

But in the two weeks since that time, senators have only passed two amendments one codifying a test program to let airline pilots have access to firearms in cockpits and the other to prohibit companies that move overseas to avoid taxes from bidding on Homeland Security Department contracts.

Mr. Fleischer accused the Democrats of effectively filibustering the bill through endless debate and the drafting of alternatives unacceptable to Mr. Bush.

"It's being talked to death," he told reporters aboard Air Force One. "Debate is entirely appropriate. But there reaches a tipping point where the Senate becomes an institution of inaction and nothing but debate, nothing but talk."

Since Thursday, Sen. Robert C. Byrd, West Virginia Democrat, had refused to relinquish control of the debate, arguing that the Senate was rushing to create this new department and would give too much power to the executive branch without enough congressional oversight.

Republicans, though, said they think Democrats are trying to set the bill up for failure. They wondered why Mr. Daschle had to file his motion to end debate, rather than just ask Mr. Byrd to sit down.

Even more curious, they said, was that Mr. Byrd then signed the petition to end debate.

"There's one easy way to end this filibuster. The Democratic senator who is engaged in the filibuster could simply stand down," said Senate Minority Leader Trent Lott, Mississippi Republican. "What's going on otherwise is a clear effort to kill any chances of the Senate passing the homeland security bill that the president can sign."

? Bill Sammon reported from Nashville while traveling with President Bush.
*****************************
New York Times
Plan to Extend Bag Deadline at Some U.S. Airports


WASHINGTON (Reuters) - Legislation introduced on Tuesday in the U.S. Senate would relax the year-end deadline imposed by Congress for screening checked bags for bombs at up to 40 airports.

Crafted by members of the Commerce Committee chaired by South Carolina Democrat Ernest Hollings, the bipartisan proposal would also dramatically tighten security procedures for cargo on commercial planes, and extend government-backed ``war risk'' liability coverage for airlines.

The bill to be considered by the commerce panel on Thursday represents a successful step in a campaign by the Transportation Department to get the Dec. 31 deadline pushed back at 10 percent of the nation's 429 commercial airports that officials have said are not likely to meet it.

This compromise must still be reconciled with legislation passed by the House of Representatives earlier this summer as part of its homeland security package that would extend the bag deadline by a year.

Some airport executives have complained that the deadline approved in the aftermath of the Sept. 11 hijack attacks was too ambitious.

They asserted that it created unmanageable logistical challenges and cost pressures that were at odds with the goal of providing an efficient and safe system for screening checked baggage for explosives.

The backbone of the new security system is a network of machines the size of sport utility vehicles that can scan hundreds of bags each hour.

Manufacturing and installing them quickly in airport terminals has proven extremely difficult for some big airports, some of which have had to tear down walls and rearrange space in terminals.

UP TO 35 AIRPORTS WILL MISS DEADLINE

James Loy, the director of the Transportation Security Administration, told the commerce panel last week that up to 35 airports would not meet the deadline for checked-bag screening and recommended an extension for them. They were not named.

The Senate proposal would grant extensions for up to 40 airports, which will be required to submit progress reports every 30 days.

The legislation would also tighten security procedures for hauling air cargo. The industry uses a government-approved program that relies on shippers to ensure cargo is safe. The so-called ``known-shipper'' program has been criticized as too lax but transportation planners say it is reasonable and cost-effective for now.

But the bill would require the Transportation Department to establish a formal inspection program for all cargo transported by air as well as boost checks of shipping companies and their facilities. The legislation also requires the agency to beef up security for airlines that only handle cargo.

Any plan for those companies must include background checks for all employees with access to cargo operations as well as screening of flight crews and others on board the planes.

Also, the bill would extend government coverage of third-party terrorism liability coverage while the industry tries to develop a private fund that it could tap to pay the ``war-risk'' premiums. Details were still being worked out but the airline industry had requested a one-year extension.

Airlines could not afford to operate without government insurance backing because many big insurers fear the prospect of more hijack attacks. Those underwriters have mainly pulled out of the market or dramatically raised premiums and cut coverage below the levels required under international law for commercial airlines to fly.

The government, through the Federal Aviation Administration, has periodically extended coverage in excess of $50 million over the past year. The current extension expires in mid-October. The bill would extend coverage for another nine months.
*************************
Business Week
Homeland Security: High Tech Starts Kicking In
Despite agonizing delays, money is flowing at last to fund the bold proposals for bolstering security


Shortly after the World Trade Center came crashing down, a contingent of tech industry heavyweights, including Hewlett-Packard's (HPQ ) Carly Fiorina, AOL Time Warner's (AOL ) Steve Case, and AT&T's (T ) C. Michael Armstrong, flew to Washington to meet with Administration officials. And during the following 12 months, 100 or so tech leaders held a flurry of follow-up meetings with the White House and the Defense Dept. The subject at hand: how best to marshal the strongest ideas from Silicon Valley in the new war against terrorism.

http://www.businessweek.com:/print/magazine/content/02_37/b3799608.htm?mainwindow
************************
Federal Computer Week
Interior officials found in contempt
BY Megan Lisagor
Sept. 17, 2002

Finding them "unfit trustee-delegates," a federal judge held Interior Department Secretary Gale Norton and Assistant Secretary for Indian Affairs Neal McCaleb in civil contempt today.

"The agency has indisputably proven to the court, Congress and the individual Indian beneficiaries that it is either unwilling or unable to administer competently the [Individual Indian Money (IIM)] trust," U.S. District Judge Royce Lamberth wrote in a 267-page opinion. "Worse yet, the department has now undeniably shown that it can no longer be trusted to state accurately the status of its trust reform efforts."

Norton and McCaleb committed four counts of fraud and one of litigation misconduct for a range of actions that include making false and misleading statements about computer security for IIM data, Lamberth concluded.

Interior has leased American Indian-owned properties and processed revenue earned from farming and drilling for more than 100 years. A group of beneficiaries, led by Elouise Cobell, filed a class-action lawsuit in 1996, claiming poor bookkeeping has prevented landowners and their descendants from determining their account balances. The plaintiffs estimate as much as $10 billion in lost or missing funds and have asked the court to place the trust in receivership out of the department's control.

Lamberth has now paved the way for that action by finding that the appointment of a receiver is warranted and constitutionally permissible, plaintiffs said.

"Clearly, they ought not to be trusted in either administrating the IIM trust competently or reporting accurately," they said in a statement today. "The court has set the foundation for proper resolution."

Meanwhile, officials at the Interior and Justice departments maintain that Interior "has worked very hard over the past 18 months to improve the trust management system and will continue to do so," according to a joint statement issued this afternoon.

"Justice does not believe that the facts of this case or the applicable law justify a finding of contempt," said Robert McCallum Jr., assistant attorney general of the department's civil division. "We disagree with the court's decision and are evaluating it to consider all of the options for appeal."

Lamberth has expressed frustration with the department throughout the case. In 1999 he held then-Secretary Bruce Babbitt, then-Assistant Secretary for Indian Affairs Kevin Grover and then-Secretary of the Treasury Department Robert Rubin in civil contempt.

The situation didn't improve.

In December, he ordered Interior to disconnect from the Internet to protect data maintained under its Trust Asset and Accounting Management System (TAAMS). Some of the department remains offline and, subsequently, under his watch.

TAAMS -- originally deployed in 2000 by Babbitt -- was designed to replace two of the department's legacy systems: the Land Records Information System, which tracks such data as land ownership, and the Integrated Records Management System. IRMS holds a wide variety of data, including information on oil and gas leases and royalties, and is used to distribute royalty payments to more than 300,000 American Indians.

Even before Interior began attempting to intertwine the old and new systems, however, the General Accounting Office predicted trouble.

"According to Interior, [these] two mainframe-based systems are not integrated, have no electronic interfaces and duplicate much of the same information," GAO officials reported to Congress in September 2000. Moreover, "the accuracy, availability and completeness of trust fund records has been a long-standing problem. Tens of thousands of records on trust fund accounts, for example, contain incorrect addresses for the account holders or lack Social Security or taxpayer identification numbers."

That "long-standing" nature prompted some politicians to come to Norton's defense.

"On days like this, it's important to note that the mishandling of Indian trust funds dates back two centuries; Secretary Norton has been in office less than two years," Rep. J.D. Hayworth (R-Ariz.), co-chairman of the Congressional Native American Caucus, said in a statement today. "She deserves commendation, not contempt, for the commitment and energy she has brought to bear on this problem and for the real results she has achieved."

In recent months, Norton had killed her proposal to consolidate trust fund duties into a new agency -- after the plan was panned throughout Indian country -- and instead began working to hash out a new solution with a joint Interior/tribal task force. Those discussions, however, disintegrated as both parties came to an impasse over standards for management, according to the National Congress of American Indians.

"Trust reform is a complex undertaking," Interior and Justice officials said in their joint statement. "This administration has done more to fix a very broken trust management system than any previous administration in history.

A third contempt trial for Norton and McCaleb will begin Dec. 18.
**************************
USA Today
Credit card scam exposes e-commerce security holes

SAN FRANCISCO (AP) A mysterious credit card scam involving more than 100,000 bogus Internet transactions has delivered another alarming reminder about online commerce's security weaknesses.


Although no money was actually transferred in the scheme, more than 60,000 of the illicit transactions received authorization codes during a con job exposed late last week.


The authorization codes verified the validity of those account numbers, opening the door for more widespread theft had the ruse not been detected.

All the affected account numbers have been deactivated and investigations have been opened by federal authorities, said John Rante, president of Online Data, a Chicago-based credit card processor that authorized the bogus transactions.

"People have nothing to be concerned about," Rante said. "We are cooperating with the authorities and we will catch the people behind this."

It's unclear how many account numbers and merchants accounts were targeted in the ruse.

Spitfire Ventures, a startup whose novelty items include a talking toilet paper holder, received 140,000 credit card submissions in 90 minutes on Sept. 12 and 62,477 were authorized at $5.07 each, said Paul Hynek, the company's chief executive.

Los Angeles-based Spitfire discovered the fraud after getting swamped with calls from worried credit card holders swept up in the scam.

"The scary part is that more than 60,000 people had their credit card accounts violated and a lot of them don't even know about it," Hynek said.

Online Data pegged the number of bogus transactions at 104,000. All the transactions involved just a few cents or dollars.

Spitfire's Web site usually processes five to 30 daily transactions, but the Sept. 12 surge in activity didn't immediately trigger security concerns.

Mountain View-based Verisign, the online security firm that handled the transactions, said fewer than 20 merchants received bogus credit card purchase requests. But Hynek said he was told by Online Data that 25 merchants got hit.

Last week's wave of bogus credit card transactions could be a sign of an even bigger problem if the crooks got the numbers by hacking into the customer database of a major Internet merchant.

"The bigger story is where the thieves got this information," said Dan Clements, who follows credit card fraud for Cardcops.com. "It's possible that the thieves found a hole in a database that still needs to be plugged. They could still be mining for credit card numbers."

The scheme's method indicates the culprits relied on a computer program to spit out randomly generated account numbers in search of authorization codes to verify their existence, Rante said. "I'm pretty confident that this didn't originate with a block of stolen credit cards."

The scam's successful retrieval of so many authorization codes exposed cracks in the online credit card processing system.

The credit card processors say the breach probably wouldn't have happened if the perpetrators hadn't been able to crack the affected merchants' passwords.

"This underscores the importance of using strong passwords," said Verisign spokesman Tom Galvin.

When a merchant opens a credit account, Online Data issues a default password and advises the password be changed every few weeks, said Nicole Mondia, the processor's executive vice president of operations.

"When you don't change the password, that leaves the system vulnerable," she said.

Spitfire Ventures never received any advice about its password after it started accepting credit cards three months ago, Hynek said.

"If the passwords are so important, why did they start us off behind the eight ball by giving us an easy-to-break password?" Hynek said.
*************************
Federal Computer Week
Roster Change Federal Computer Week


Art Money, former Defense Department chief information officer, has been elected to Rainbow Technologies Inc.'s board of directors, effective Sept. 5. Rainbow Technologies is a provider of information security solutions.

Money is president of ALM Consulting, which specializes in command, control, communications, intelligence, signal processing and information operations. From 1999 to 2001, he was assistant secretary of Defense for command, control, communications and intelligence and DOD CIO.

***

Retired Air Force Brig. Gen. Russell Anarde has been recruited to lead the space operations and systems support organization for CACI International Inc., according to a company announcement released Sept. 11.

Anarde is former director of plans and programs for the Air Force Space Command at Peterson Air Force Base, Colo.

CACI officials say that Anarde's recruitment reflects the company's increased focus on providing information technology solutions to U.S. military space commands and related activities of the federal government and commercial space organizations.

Anarde will be based at CACI's Colorado Springs location and will help craft a business development program that focuses on CACI's solutions for command, control, communications, computers, intelligence, surveillance and reconnaissance, tailored to the needs of the space market.

***

Edwin Patton has been named vice president and technical director for systems engineering at Dimensions International Inc., the IT company announced Sept. 10.

Patton will be responsible for developing and managing systems engineering programs for defense, federal and commercial customers, with an emphasis on requirements analysis, telecommunications, IT, network management and security.

Patton previously held senior leadership positions at Teledyne Brown Engineering, TRW Inc. and Science Applications International Corp. He also has an extensive engineering and management background in telecom, IT and software development. As one of the first engineers hired by MCI WorldCom, he was instrumental in the design and engineering of the company's nationwide backbone network.

***

Transportation Secretary Norman Mineta last week announced the selection of five federal security directors who will assume responsibility for 13 airports:

* Thomas Anthony, Palm Springs International Airport, Calif.

* Debora Jean Brooke, Savannah International Airport, Ga. She will also be responsible for Hilton Head Airport, S.C.

* Nicholas Bruich, Yeager Airport, Charleston, W.Va. He will also be responsible for Tri-State Airport in Huntington, Benedum Airport in Bridgeport, Wood County Airport in Parkersburg and Morgantown Municipal Airport, all in West Virginia.

* John Peoples, Saipan International Airport.

* David Bassett, Greater Rochester International Airport, N.Y. He will also be responsible for Elmira-Corning Regional Airport in Horseheads, Binghamton Regional Airport in Johnson City and Tompkins County Airport in Ithaca.
**************************
Federal Computer Week
War hero shares IT lessons learned
BY Dan Caterinicchia
Sept. 17, 2002


Special operations troops deployed in Afghanistan have had to wage war in some of the most challenging environments imaginable, and for the most part, their information technology tools have performed admirably.

But something must be done to lighten soldiers' battlefield loads, which can exceed 140 pounds, with more than 73 percent of that weight coming from equipment, according to Air Force officials who have had to carry those packs.

"It's absolutely unacceptable that we have to walk with that much weight with the technology we have today," said Air Force Reserve Tech. Sgt. James Hotaling, a combat controller in the 720th Special Tactics Group in the Air Force's Special Operations Command. Hotaling carried a 143.3-pound pack during Operation Anaconda in March, and he knew many of the more than one dozen troops who were killed or injured in that battle.

Speaking Sept. 16 at the Air Force Association's 2002 National Convention in Washington, D.C., Hotaling briefed the audience on his participation in direct action and strategic reconnaissance missions during Operation Enduring Freedom, serving as the communications specialist for U.S. and coalition forces.

Some missions required scaling ridges thousands of feet high, others were conducted in the desert, and still others were conducted in the snow. The packs carried into all of those locations were made heavier by outdated, inefficient technology, he said.

"The batteries we use [for the portable radios] are lithium and weigh 2 pounds each," Hotaling said. "It takes two to power the radio we're using and that only lasts a day. For a 12-day mission, that's 24 batteries [weighing 48 pounds] and that's crazy."

Col. Craig Rith, commander of the 720th Special Tactics Group, said the Air Force is partnering with industry to lighten the load. He also said the Air Force research laboratories have played a key role in integrating off-the-shelf technologies in the first of a three-part effort aimed at shortening the time needed to strike an enemy target.

The second step will be producing and using "better, lighter versions" of the tools, and the third stage calls for going even lighter and providing "click, click technology," in which the images and intelligence captured by combat controllers on the ground are automatically sent to the closest aircraft and the weapons systems they are carrying, Rith said.

That final step is crucial because different aircraft currently require different information, or at least data presented in different ways, the Air Force officials said.

Still, IT has helped coalition forces immensely in Afghanistan, including the Air Force's Predator, an unmanned aerial vehicle that uses radar, a TV camera and an infrared camera for surveillance, reconnaissance and targeting, Hotaling said.

Personnel at various air operations centers viewed the video feeds from Predators and relayed pertinent data to Hotaling to help him navigate through foreign locales and serve as the "point man" on some missions, he said.

U.S. allies also contributed useful IT, particularly for mission planning. Before various coalition teams would begin a mission, the allied forces' computers, imagery and mapping tools would provide 3-D maps of areas, which enabled the teams to do virtual walk-throughs, Hotaling said.

Hotaling, who was activated in September 2001 and will return to his job as a Washington state trooper when he completes his tour this month, also said that IT interoperability was never really a problem in Afghanistan because Special Forces teams are trained to work jointly, "and that's all we know."

"There's always going to be glitches, but it's mostly things like they got the frequency wrong, but the radio is OK," he said.
*************************
Government Computer News
Utah CIO bent rules in hiring, auditors say
By Wilson P. Dizard III


Utah CIO Phillip Windley and others in the Information Technology Services Office violated and manipulated the state's personnel and contracting rules to hire former employees of Excite At Home, a bankrupt company where Windley had worked, state auditors said.

"We think what happened here is probably some bad management," legislative auditor general Wayne Welsh said. Abuse of personnel rules is not a criminal matter, he said.

"The CIO and some other officials exhibited favoritism to employees of Excite At Homeand they circumvented procedures to get those employees on board," Welsh said.

The auditors' investigation of the matter appeared in a report issued Monday on hiring practices of the CIO and ITS. "While individual cases may not raise strong concerns, taken together we believe these cases display a pattern which does yield strong concerns of favoritism," the report said. The auditors questioned practices used to hire nine state employees, according to the report.

Windley and other Utah state officials, including officials in the governor's office, were not available for comment. In a letter responding to the audit, Windley and other officials appointed by Gov. Mike Leavitt emphasized that the qualifications and competence of the employees discussed in the report had not been disputed. They noted that the report pointed out areas for improvement in hiring practices.

"I would say this is unusual," Welsh said of the incident. "We haven't come across many cases like this." The resolution of the matter is up to Leavitt, who appointed Windley and the other officials and can remove them, Welsh said.
****************************
Government Computer News
Web sites reinforce security and privacy policies, review finds
By Wilson P. Dizard III


A Brown University analysis of government Web sites found that more federal and state sites are taking security and privacy seriously compared to last year.

The Center for Public Policy at Brown analyzed 1,265 federal and state sites, measuring available features, variations between state and federal sites, and responsiveness to citizens' information requests.

According to the study, 34 percent of the sites now have a visible security policy, up from 18 percent last year. And 43 percent have some form of privacy policy, up from 28 percent two years ago.

But the attention to security has led to an increase in restricted areas on government Web sites, some of which require registration and passwords for access, and occasionally fees. Six percent of government sites surveyed had restricted areas and 1 percent had premium features requiring payment.

"These developments are encouraging the creation of a two-class society in regard to e-government," the Brown report said.

The study found that 93 percent of government sites provide access to publications and 57 percent provide access to databases. Of the Web sites examined this year, 23 percent offered services that users could execute fully online, roughly the same number as last year. The most frequently offered services were tax payment, job application, driver's license renewal, and hunting and fishing licensing.

Twenty-eight percent of the sites now have a measure of access for users with disabilities, compared to 27 percent last year, the study said. Seven percent of sites offered some foreign language access, up from 6 percent last year.

The Brown researchers gave high marks to the sites of seven federal organizations: the Labor, Treasury and State departments; Environmental Protection Agency; Federal Communications Commission; General Services Administration's FirstGov; and Social Security Administration. The lowest rankings went to the sites run by the U.S. circuit courts and the Supreme Court.

Among state sites, the researchers praised the sites of California, Connecticut, Nevada, New Jersey, Pennsylvania, Tennessee, Texas, South Dakota, Utah and Washington. They assigned low ratings to the sites of Alabama, Colorado, Mississippi and Wyoming.

Public officials' responsiveness to Web inquiries has fallen, the study said. Last year, 80 percent of government officials answered the researchers' sample query, only 55 percent did so in 2002.
**************************
Government Executive
House panel backs bill to make agencies protect data
By Michael Posner, CongressDaily


A bill to protect privacy of people and businesses that provide information to government statistical agencies cleared a House Government Reform subcommittee Tuesday.


The legislation (H.R. 1152) was approved by voice vote in the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations and sent on to the parent committee. Only the chairman, Rep. Stephen Horn, R-Calif., and Rep. Janice Schakowski, D-Ill., were present among the nine subcommittee members.



Uniform protections are outlined in the bill to keep confidential data individuals and businesses give government agencies for statistical purposes. Currently different agencies have different rules for protecting privacy and some don't have any.



In addition to adding protections, the bill would let the Census Bureau, the Bureau of Labor Statistics and the Bureau of Economic Analysis share data under limited circumstances to get more accurate information and to limit requests to businesses to file data to different government statistics collectors.



The approved legislation was a substitute by subcommittee chairman Horn to the originally introduced bill. The substitute was partly in response to a Heritage Foundation request. It clarified that non-government researchers could continue to get information they now receive on a limited basis as long as it does not identify the identities of those who supplied it.
*************************
Government Computer News
Under lobbying, high-tech panel alters recommendations
From CongressDaily


Under intense lobbying by industry groups, a White House panel studying ways to protect America's high-tech backbone has dropped several security ideas and turned others into topics for discussion rather than government mandates, according to the latest version of the plan circulated Monday.

The ideas dropped include requiring companies to pay into a fund to improve national computer security and restricting use of emerging wireless networks until their security is approved, according to the draft obtained by the Associated Press.

"We're just identifying the stuff we already know to be a problem, and saying it's a problem," said Russ Cooper, of network security firm TruSecure Corp., who was briefed on the plan. "I thought there was going to be some meat, and there's not."

The cybersecurity panel headed by President Bush's computer security adviser, Richard Clarke, is expected to release its recommendations Wednesday.

Once called the "National Strategy to Secure Cyberspace," the draft circulated Monday added the words, "For Comment" to the title.
******************************
Government Executive
Dissension, lobbying narrow administration's cyber plan
By Bara Vaida, National Journal's Technology Daily


In the days before the unveiling of the Bush administration's national strategy to protect cyberspace, dissension within the administration and continued lobbying by some business groups led to a whittled down version of the initial plan, according to high-tech industry sources.

Earlier in the month, the administration's Critical Infrastructure Protection Board had planned to release a hefty strategy report that ambitiously outlined actions that business sectors and the federal government should take to secure their computer networks and critical infrastructure, according to industry sources.


The official draft to be released Tuesday evening is 66 pages and clearly marked "draft." It is voluntary and contains no government mandates. It, like earlier versions, states that the document was expected to evolve and undergo updates as technology and national security progressed. Technology Daily obtained a copy of the official draft from industry sources.



Several days ago, a version sent to government agencies was 340 pages, but disagreements from the private sector and within government agencies prompted the board, chaired by Richard Clarke, to make numerous changes, industry sources said.



"To give them the benefit of the doubt, they are trying to get an awful lot of people in the government to sign off, and what always happens with these reports is every agency has its own agenda," said Jim Dempsey, deputy director of the Center for Democracy and Technology.



"That was compounded by ... having to get clearance from the private sector, which was appropriately included in this process. You had to get seven sectors of the [economy] to sign off on this, from the telecommunications sector to the power sector to the computer sector."


Private-sector fears were of particular concern to the administration, as the mid-term election is only a few weeks away and White House officials are reluctant to upset potential campaign donors, said James Lewis, chief technology policy director for the Center for Strategic and International Studies.


"We are in the season where everything is looked at through the prism of the election," Lewis said.



Further, Lewis said Clarke might have overreached with the broader cybersecurity plan. "Dick tried to do too much," Lewis said. "Maybe it would have been better to bite off a small part of [of cybersecurity] like the federal government. ... I would have picked the top 10 doable things rather than try to do everything."



In an example of one change to the report, cybersecurity action plans for defense and intelligence agencies were noted in the 340-page version but eliminated in the 66-page version.



The White House organized a Tuesday afternoon briefing with reporters on the plan and has embargoed its official release for 8 p.m.



Clarke will publicly release the plan at Stanford University on Wednesday, with high-tech industry executives expected to attend, including representatives from Microsoft, Oracle, Apple Computer and Sun Microsystems.
******************************
Computerworld
National cyberdefense strategy draft released


The President's Critical Infrastructure Protection Board today released a draft copy of the long-awaited National Strategy to Secure Cyberspace, giving the private sector 60 days to review it and provide feedback before the final version is sent to the president for approval.
According to the plan, obtained by Computerworld, the strategy being formally unveiled for the first time today will continue to evolve as individual sectors of the nation's private economy develop their own cybersecurity strategies and the government refines details of the plan (see story).


"This strategy is not written in stone," the document states.

The White House is scheduled to release the draft strategy to the public in an event at Stanford University later today.

In a letter accompanying the strategy, signed by both Richard Clarke, chairman of the President's Critical Infrastructure Protection Board, and Howard Schmidt, vice chairman, the White House stressed the need to form a public/private partnership that is flexible.

"This unique partnership and process is necessary because the majority of the country's cyber resources are controlled by entities outside of government," the letter states. "For the strategy to work, it must it must be a plan in which a broad cross-section of the country is both invested and committed."

To further solidify the public-private partnership and to obtain more feedback on the draft strategy, the White House plans to conduct eight more so-called town-hall meetings around the country. Feedback on the draft strategy released today is due to the White House by Nov. 18.

Feedback forms are available at the White House special Web site, www.securecyberspace.gov.
****************************
Computerworld
Merchant: FBI probes major credit card scam


The CEO of a Los Angeles-based novelty company, Spitfire Ventures Inc., said the FBI is investigating a major credit card scam involving 140,000 fraudulent credit card transactions at the company's Web site, TalkingTP.com.
Spitfire's CEO, Paul Hynek, said he was told by the company's credit card processor, Online Data Corp. in Westchester, Ill., that the scam may have affected as many as 25 other companies. But Online Data President John Rante said he believes only 15 to 20 merchants were affected and that a total of 100,000 fraudulent credit card transactions were involved.


The FBI couldn't be reached for comment.

According to Hynek, Online Data approved more than 60,000 of the false charges, worth $5.07 each, on Sept. 12. Online Data is a reseller of Mountain View, Calif.-based VeriSign Inc.'s credit card payment gateway services, which actually performed the authorizations.

Although about $300,000 in charges were approved by VeriSign, the company stopped the transactions before they were completed, so no money was ever transferred to Spitfire, according to Hynek. However, the authorizations let the thieves know that those credit cards were valid.

As soon as Online Data became aware of the problem, Rante said, the company worked closely with VeriSign to notify the credit card companies, which then deactivated the cards. Rante said the credit card companies are cooperating with federal authorities investigating the fraud.

If the scam hadn't been detected, Hynek said, thousands of dollars in fraudulent charges could have been racked up before cardholders became aware of any problem.

Spitfire, whose products include a talking toilet paper holder, learned of the scam when customers who noticed false charges on their accounts began calling the company, Hynek said.

Hynek, Rante and VeriSign spokesman Tom Galvin all said they believe thieves most likely got the credit card numbers by cracking the passwords of the affected merchants.

But Dan Clements, a credit fraud expert at Malibu, Calif.-based CardCops.com, disagreed.

"The real story here hasn't been told yet," he said. "Since they had 140,000 cards, they probably have a lot more."

Clements said he believes the crooks may have exploited a hole in the customer database of a large Internet merchant that didn't properly secure its Web site.

According to Clements, during their investigations, the credit card companies involved will pull information on the accounts of some of the affected cardholders looking for common denominators.

"Say, if Amazon.com showed up on all their statements, then that's most likely where the credit cards came from," he said. "These numbers were not randomly generated. This was not a crapshoot."
****************************
Mercury News
Block on digital recordings worries consumer groups
By Dawn C. Chmielewski
Mercury News


Some subscribers to one of the nation's largest cable systems are unable to make digital recordings of television shows in what the company labeled an unforeseen technological glitch but consumer advocates called a chilling curb on home recording.

An industry newsletter reported that Cablevision has invoked copy restrictions on all unscrambled digital TV programming delivered to its 3 million subscribers in metropolitan New York. It renders a range of cable shows -- from late 1970s sitcoms like ``Diff'rent Strokes'' to Formula One racing on Speedvision -- unrecordable on certain types of devices.

The incident shows how easy it is for cable providers to block recording, consumer advocates said. Even if what Cablevision did was inadvertent, they said, it is a example of how copy-blocking can be used to set limits on how individuals use the most ubiquitous of technologies -- the television set.

``The trend here is if Hollywood has its way, this is what the future looks like,'' said Joe Kraus, co-founder of dig italconsumer.org, an advocacy group. ``The future looks like the world where you press record and it doesn't work and you don't know why. You no longer control the media you pay for.''

The blocking affects a small number of subscribers who use an advanced digital recording device.

Cablevision, the nation's seventh-largest cable company, said it didn't deliberately suspend home recording. Rather, it blamed an unexpected clash between its conditional access system -- which makes sure subscribers see only the TV programs they've paid for -- and the software inside Sony's television set-top boxes.

This software conflict somehow triggered a copy protection scheme known as 5C, which is designed to prevent mass duplication of television shows and movies. It labeled all digital programming off limits to copying.

For now, the glitch prevents viewers from digitally taping any cable show using a next-generation digital videotape recorder called DVHS, the HDTV Insider newsletter reported. These devices recognize the programming as copy-blocked -- and turn off.

Cablevision said it is scrambling to eradicate the bug, identified three weeks ago.

But it notes the problem only affects subscribers who attempt to record programming through the IEEE 1394 interface, a high-speed digital connection known as Firewire or iLink found on high-end digital televisions manufactured by Mitsubishi, RCA and Hitachi, certain set-top boxes and DVHS recorders.

Cablevision says it does not prevent recording on more familiar consumer devices, such as a videocassette recorder or a Tivo-like digital video recorder.

Advocacy groups said the rollout of 5C's copy-protection scheme -- together with the entertainment industry's attempts to extend copy-protection to over-the-air television broadcasts -- are eroding home recording rights, with little consumer input.

``The content industry denies it will affect how consumers watch, enjoy and record television,'' said Kraus. ``But the Cablevision example goes to prove these technologies impact consumers dramatically.''

An attorney for the consortium of technology companies that developed the 5C copy-protection technology said just the opposite is true. He says rules are designed to reflect home use -- while addressing piracy fears that prevent Hollywood from releasing more high-quality content.

Cablevision violated strict licensing agreements when it imposed copy bans on generic cable programming -- shows that consumers should be entitled to copy freely, said Seth Greenstein, a Washington lawyer who negotiates 5C licenses for the consortium.

The only time 5C licensing rules allow copying to be prohibited is with special categories of paid programming, such as on-demand movie services or pay-per-view events, like the Oscar de la Hoya and Fernando Vargas prize fight.

And the movie studios and broadcasters ultimately get to decide what shows to protect -- the cable and satellite operators act as distributors, who honor the rules. They're not supposed to impose copy bans unilaterally.

``We have to figure what happened here,'' said Greenstein. ``5C worked awfully hard to put these encryption rules into its agreement to achieve a certain level of consumer recording rights. Having fought for it, we don't intend to relinquish it.''
****************************
News.com
Biometric trials point to passport fraud
By Andrew Colley
September 18, 2002, 10:15 AM PT


The Australian federal government is poised to crack down on identity fraud amid indications that biometric technology trials have yielded instances of illegal multiple passports.
Sources close to the trial said testing of the biometric technology against Passport Australia's existing database of passport information has identified individuals' unique facial biometrics in more than one stored passport. Passport Australia is the agency that issues passports in the country.


The sources said this indicated that individuals may have applied for and been issued multiple passports fraudulently.


However, Australia's Department of Foreign Affairs and Trade declined to confirm that such instances had occurred. "We have undertaken limited testing using facial biometric recognition technology. Some issues did arise during the tests, and these have been addressed and appropriate action taken where necessary," a DFAT representative said.


The representative declined to elaborate on the issues that arose and the additional action the department intends to take.

The facial biometric--a machine-readable algorithm generated from an individual's facial features--is as unique as a fingerprint. Theoretically, a biometric algorithm generated from photos held in Passport Australia's database should only match a passport once.

Sources close to the trial indicated that Passport Australia was exploring the technology because it believes that searching through photographs manually to find instances of fraud is too human-resource intensive.

They indicated trials of the technology had revealed it was 95 percent accurate.

ZDNet Australia's Andrew Colley reported from Sydney.
************************
Reuters Internet Report
Cable Likely to Hold Lead in Broadband-Report
Wed Sep 18,12:23 PM ET

BOSTON (Reuters) - Cable modems, the primary means currently used to connect to the Web for high-speed service, are the next growth area for the Internet as more consumers seek out digital movies and music, a research firm said on Wednesday.

In a research report, Yankee Group said 58 percent of high-speed Internet users were accessing the Web while about one-third of users are using digital subscriber lines.

Cable modems will easily maintain leadership as the most important technology used to connect to high-speed services. At the end of 2001, more than 7 million consumers and 500,000 business subscribers were connecting via cable modem ( news - web sites), Yankee Group said. But cable will likely have to chase DSL in the small business area, they said.

"Emerging technologies have the potential to shake up this forecast in the 2004-2007 timeframe, however, over the next two to three years, the market share for broadband access technologies is unlikely to change substantially," said Matt Davis, broadband access technologies director at Yankee Group.

Internet companies have been aggressively seeking deals with cable operators and digital subscriber lines so they can offer high-speed, or broadband, access to subscribers wherever they live.

For example, in some areas Internet service providers do not have deals to offer their subscribers access via cable but they do have a deal for DSL.

To the consumer, cable modems and DSL offer about the same type of service although some have complained the implementation process for DSL is more cumbersome.

Meanwhile, consumer access of high-speed Internet service through satellite technology has not grown at the rate it had expected, the research firm said, because it saw the proposed merger of EchoStar Communications Corp. and Hughes Network Systems being approval by regulators more quickly.

Between the close of 2001 and the beginning of 2003, 5.6 million U.S. broadband subscribers will be added to the 13.3 million that make up the installed base, Yankee said in its report.

As dial-up growth slows, Internet giants such as AOL Time Warner Inc.'s America Online, Microsoft Corp.'s MSN and Yahoo Inc. have stepped up their efforts to offer high-speed access and services.

"The question most important to mass-market broadband proliferation is now changing from 'Can I get broadband?' to 'Do I want broadband?,"' Yankee Group said, adding that the core issue at the moment was pricing as it costs more than $40 per month in most areas.
**************************
Sydney Morning Herald
Internet subscribers down
September 18 2002


The number of Australians Internet subscribers decreased by 43,000 in the six months ending March 2002, according to figures released by the Australian Bureau of Statistics today.

The drop was attributed to the decline of services offering free access (180,000 subscribers) and hourly access (155,000). An increase of 292,000 subscribers with monthly, quarterly, annual, volume and other access kept the fall to 43,000.

The number of ISPs also decreased during this period, continuing a trend that began in September 2000. Australia now has 571 ISPs, of which only six can be considered very large - with over 100,000 subcribers. These six ISPs provided connectivity to two-thirds of the country's subcribers - 2.8 million out of 4.2 million.

Thirty-two ISPs went out to the wall between September 2001 and March 2002. Only Tasmania (2) and the Northern Territory (4) showed an increase in ISPs during this period.

Of the 4.2 million subscribers, there were 3.7 million were from households and 505,000 from business and government.
*****************************
Earthweb
Help On The Way In Spam Wars
By Sharon Gaudin


New spam-fighting tools will flood the market in the next 18 months helping companies and consumers battle the growing deluge of spam that's filling inboxes with an increasing amount of porn and money schemes, according to a new report from Giga Information Group.

"The amount of spam has increased more than four-fold during the past year," reports Jonathan Penn, a research director at Giga, a Cambridge, Mass.-based analyst firm. "The content has become more offensive. Spam messages are no longer just innocuous solicitations, but marketing of pornographic material or services. The anti-spam market will develop rapidly in the next 18 months, as content security and anti-virus vendors address this growing problem."

Penn points out that SurfControl's Email Filter and Cipher Trust's IronMail are two new spam-fighting products that already have hit the market.

Penn and other industry watchers say a slew of other products will be following close behind.

"The more tools on the market, the better," says Ray Everett-Church, chief privacy officer for ePrivacy Group and a board member for the Coalition Against Unsolicited Email. "Users are more fed up than normal. The flood of spam has increased so dramatically in the past six or eight months that people who were merely annoyed before are now on the verge of revolution."

Everett-Church says he too sees a growing wave of spam-fighting tools that are about to hit the market and he adds that it's about time vendors tackle the problem. "More tools on the market means companies and consumers have more opportunities to defend themselves against spam," he says.

Kelly Thompson, an independent anti-spam consultant and co-founder of the Forum for Responsible and Ethical Email, says she's not overly impressed with most of the anti-spam tools that are out there now.

"They vary widely in their efficacy," says Thompson. "None of them are something I would use on my inbox."

But Thompson also says she has a lot of hope for strong spam-fighting tools to start coming out.

"At some point, companies perceived that there was no business justification for blocking spam," she says. "Users are becoming more angry about it. And the volume has increased so it's costing companies more money. It's more economically justified to buy a spam-blocking tool. It's creating a market."

And a major reason for users' anger is that spam is smuttier than ever. Brightmail Inc., a San Francisco-based anti-spam company that sells software and rules to filter out spam, reported recently that email inboxes are being flooded with about 400% more unsolicited bulk email, or spam, than they were back in September.

Numbers from Mail-Abuse Prevention Systems LLC (MAPS), one of the largest anti-spam organizations out there, backs that up with its own numbers. Margie Arbon, director of operations at MAPS, recently reported that they've seen 600% to 700% more spam between April and June of this year, compared to the same time frame last year.

And a growing percentage of that spam is pornographic, with graphic subject lines and even images.

But with companies trying harder to block spam, Everett-Church warns network managers to be careful that they're not blocking legitimate email along with it.

"The real challenge is to make sure these tools don't wind up blocking legitimate email," he warns. "That's a real danger. You can block a lot of spam but if you block a lot of legitimate mail, you're not a lot better off."
**************************


Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 510
2120 L Street, NW
Washington, D.C. 20037
202-478-6124
lillie.coney@xxxxxxx