[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips October 10, 2002
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, glee@xxxxxxxxxxxxx;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, akuadc@xxxxxxxxxxx;, computer_security_day@xxxxxxx;, waspray@xxxxxxxxxxx;
- Subject: Clips October 10, 2002
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Thu, 10 Oct 2002 10:06:43 -0400
Clips October 10, 2002
ARTICLES
F.B.I. Admits Surveillance Excess
Higher-Education Organizations Urge a Crackdown on Illegal File Sharing
Anti-Porn E-Mailer 'Fesses Up'
Minors Evade Online Age Checks
Want Wi-Fi? Verizon takes it home
Sometimes It's One Voter, 2 ID Cards
Agencies to try out EA system
NSA will test a high-level access card
Treasury set to issue digital certificates with smart cards
Feds testify about improved antiterror systems
DOD forms a senior biometrics group
DOD will soon set information assurance standards
House committee votes to create e-gov administrator
Panel backs bill to let agencies share business data
Colleges Slow Computer Networks [Piracy]
Hackers send Sendmail a message
Justices take up Mickey Mouse case [Copyright Case]
Microsoft rethinks copy restrictions [Intellectual Property]
Bill of Rights [Intellectual Property]
********************************
New York Times
F.B.I. Admits Surveillance Excess
By NEIL A. LEWIS
WASHINGTON, Oct. 9 An F.B.I. memorandum recently provided to Congress
disclosed that the bureau exceeded its mandate on several occasions in
2000, when it put in place secret surveillance operations against foreign
agents.
The document, released today by a member of Congress, showed that agents
acted improperly in at least 10 incidents in the first quarter of the year.
Agents illegally videotaped suspects, intercepted e-mail messages after
court permissions had expired and recorded the telephone conversations of
an innocent person who had taken over the cellphone number of a terrorism
suspect.
Representative Bill Delahunt, the Massachusetts Democrat who received the
memorandum from the Federal Bureau of Investigation, said through a
spokesman tonight that he was angered because the incidents suggested that
the agency had concealed the problems from Congress when it was considering
legislation on surveillance.
"This was all known to the agency at the time of the hearings on the U.S.A.
Patriot Act," said Steven Schwadron, Mr. Delahunt's chief of staff.
Mr. Schwadron said that in the hearings on the measure a broad
antiterrorism bill enacted after the Sept. 11 attacks, Mr. Delahunt and
others had expressed concerns about provisions to loosen restrictions on
the law that governs court permission for covert surveillance.
"We had specific concerns about abuses," he said. "And this information was
never disclosed."
The memorandum, sent on April, 14, 2000, from the counterterrorism division
of the bureau to all field offices, listed examples, including unauthorized
searches and the monitoring of incorrect addresses.
The bureau sent a cover letter to Mr. Delahunt saying it had changed
procedures to prevent a recurrence of the improper activities. In addition,
a senior F.B.I. official said tonight that the document showed that with
more than 1,000 applications, about 1 percent had problems.
*************************
Chronicle of Higher Education
Higher-Education Organizations Urge a Crackdown on Illegal File Sharing
By VINCENT KIERNAN
The leaders of six major higher-education organizations are asking the
presidents of all American colleges to take steps to stop illegal
distribution of copyrighted materials, such as songs and motion pictures,
through college computer networks.
"Digital file sharing technology has made it easier than ever before for
individuals to make and share a large number of unauthorized copies of
creative works (particularly music and movies) without regard to or
consideration of the rights of the copyright owners," the six wrote in a
letter to the college presidents, which is dated Tuesday and will be mailed
in the next several days. "Unfortunately, in some cases, college and
university computer systems are being misused as servers to distribute such
unauthorized copies worldwide."
The letter was signed by the presidents of the American Association of
Community Colleges, the American Association of State Colleges and
Universities, the American Council on Education, the Association of
American Universities, the National Association of Independent Colleges and
Universities, and the National Association of State Universities and
Land-Grant Colleges.
The issue centers on the use, principally by students, of a variety of
programs to download digitized music and movie files, or to share those
files with others. The music and motion-picture industries, and some
artists, complain that such practices infringe on their copyrights.
Meanwhile, the constant transferring of large numbers of bulky audio and
video files can swamp college networks, hobbling other users.
The Motion Picture Association of America and the Recording Industry
Association of America are preparing their own letter to college
presidents, requesting a halt to illegal downloads. The text of that letter
was not immediately available.
"We share their concern about the use of campus computer networks for
inappropriate file sharing," the six higher-education officials wrote in
their letter.
The education organizations' letter was motivated, in part, by a
"collective concern about potential legal liability for copyright
infringement," said Sheldon E. Steinbach, vice president and general
counsel for the American Council on Education.
Sharman Networks, the Australia-based company which makes KaZaA, one of the
most popular file-sharing systems on college campuses, did not immediately
respond to a request for comment.
The six officials asked college presidents to consult with campus officials
and consider revisions to campus policies regarding computer use and
downloading, as well as to take steps to educate faculty and staff members
and students about copyright law. But the letter does not recommend any
specific action, such as using technology to limit the amount of downloads,
as some colleges have done.
However, Mr. Steinbach said that college presidents should view the
file-transfer problem as much as a business and budgetary issue as a legal
one. "It's a misappropriation of a university-provided facility for
nonacademic use," Mr. Steinbach said of such downloads.
Few college presidents realize the scope of the problem, he said. "It is my
belief that only a fragment of university presidents have any knowledge
about the issue," he said. One reason, according to Mr. Steinbach, is that
presidents tend not to get involved in information-technology problems but
rather leave them for others to solve.
--------------------------------------------------------------------------------
Following is the text of the letter from the higher-education organizations.
October 8, 2002
Dear Colleagues:
We are writing to follow up a letter you recently received from several
associations representing the music and motion picture industries.
These groups are deeply concerned about copyright infringement that is
occurring through the use of peer-to-peer file sharing software on many
computer networks, including those on college and university campuses. The
letter requests that college and university presidents assess this issue at
their own institutions and take positive steps to address illegal practices.
Digital file sharing technology has made it easier than ever before for
individuals to make and share a large number of unauthorized copies of
creative works (particularly music and movies) without regard to or
consideration of the rights of the copyright owners. Unfortunately, in some
cases, college and university computer systems are being misused as servers
to distribute such unauthorized copies worldwide.
Several university presidents and association executives recently met with
representatives of the recording and the movie industries to discuss their
concerns and to review materials that documented such abuses.
We share their concern about the use of campus computer networks for
inappropriate file sharing and are writing to encourage you to give serious
attention to this issue.
Obviously, their letter addresses this topic from the perspective of the
recording and movie industries and reflects their interpretation of these
issues. Nonetheless, we are in total agreement that this issue is important
and merits your attention for multiple reasons.
We urge you to discuss this issue with all appropriate campus officials
including provosts, general counsels, chief information officers, business
officers, librarians, and student affairs officers. These discussions may
well result in a reassessment of your institutional computer usage policies
and bandwidth management practices. In addition, given our responsibility
as educators to help students make ethical and lawful choices, we encourage
you to make efforts to educate students, faculty and staff about
appropriate and inappropriate uses of copywritten materials.
This is an exceptionally complex topic that will be of interest to many
groups on campus. Indeed, the policies to address peer-to-peer file sharing
are likely to have implications for such basic campus values as personal
privacy, free speech, and academic freedom.
Some institutions of higher education have already addressed this issue and
the recording and movie industries' letter provided several examples. While
these illustrations merit your consideration, we do not believe that there
is a single solution that will work equally well for all schools. This is a
challenge that must be addressed on a campus-by-campus basis.
In short, while this is a vexing issue with no simple solutions, we hope
you will join us in addressing the inappropriate use of campus facilities
to disseminate-copywritten materials. Thank you for your consideration.
If you have questions concerning these issues, we encourage you to contact
any of the following individuals: Sheldon Steinbach (ACE -- 202-939-9361);
Richard Harpel (NASULGC -- 202-478-6048); or John Vaughn (AAU --
202-408-7500).
David Ward President, American Council on Education
Nils Hasselmo President, Association of American Universities
David L. Warren President, National Association of Independent Colleges and
Universities
George R. Boggs President, American Association of Community Colleges
Constantine W. Curris President, American Association of State Colleges and
Universities
C. Peter Magrath President, National Association of State Universities and
Land-Grant Colleges
*********************
Wired News
Anti-Porn E-Mailer 'Fesses Up'
By Noah Shachtman
The Internet stalker terrorizing the porn business confessed his sins
yesterday to the FBI.
But the G-Men took no action against Bryan Sullivan, who swamped the
inboxes of adult industry bigwigs with bigoted slurs and stomach-turning
tales of murder and torture.
Sullivan, 37, an electrical engineer with Kansas City Power & Light, was
long suspected of being the man behind dozens of ugly messages from
"zodiac_killer" and "pornhater2002." On Tuesday, he confirmed that
suspicion to the FBI agents who visited his home.
"I had people scared? I like that. I like playing those mind games,"
Sullivan said.
"(The agents) told me, 'People think you're going to do something to
them,'" he continued. "So be it. If they're so thin-skinned, let 'em think
that."
It's a federal crime to harass someone using a "telecommunications device,"
punishable by up to two years of hard time. Making interstate "threats to
injure" is even more serious, with a five-year maximum sentence.
FBI Special Agent Mike Daniels said Sullivan clearly violated the law. But
Daniels needs the cooperation of federal prosecutors before making an
arrest. So he and colleague Todd Gentry are in the midst of preparing a
report on Sullivan for the Western Missouri district of the U.S. Attorney's
office.
"We never arrest anybody right then and there," Daniels said. "But we know
where he is, he's not going anywhere."
At first glance, Sullivan's e-mails certainly seem both harassing and
threatening.
One particularly ugly message -- forwarded to the FBI by Dave Cummings, a
62-year-old porn actor and director -- reads, "I can forsee (sic) your
fate...Your ugly white face grinding into the pavement...blood pumping into
your lungs...."
But the G-Men made no arrest yesterday. Sullivan claims the agents just
told him "to knock it off. They said it was more laughable than threatening."
This is the second time the FBI has visited Sullivan. In April, agents told
him to stop his stalking, but Sullivan's torrent of twisted missives
continued.
After Tuesday's questioning, Sullivan said he's through sending ugly
e-mails, insisting he hasn't sent one since July.
*****************************
Wired News
Minors Evade Online Age Checks
By Amit Asaravala
Habitual porn surfers are now used to having to type in a credit card
number the first time they visit a site to prove they're over 18.
The credit card gateway as age verification standard has been in place ever
since the late 1990s, when the Communications Decency Act (CDA) and the
Child Online Protection Act (COPA) threatened porn publishers with jail
time and fines if they transmitted obscene material to minors.
Yet as any savvy porn surfer will tell you, the age verification systems
don't necessarily work.
Even companies that develop the systems acknowledge this fact. "It's a big
myth. They're not verifying age," admitted the general manager of
age-verification software developer ProAdult, in an interview earlier this
year. The manager gave his first name, Patrick, but declined to provide a
last name.
Although the Supreme Court struck down the prosecution portion of CDA in
1997, and COPA remains in judicial review, owners of adult-oriented sites
continue to use age-verification technology in hopes that their
self-regulation will keep more strict legislation at bay.
To date, credit card gateways remain the primary means of verifying age
online.
"Way back when, credit card companies generally wouldn't issue cards to
minors," Patrick explained. "So it's just an assumption that there is a
very small percentage of people under 18 who have credit cards."
It's an assumption that's no longer true.
A 1999 survey by the American Savings Education Council found that 28
percent of respondents between the ages of 16 and 22 had at least one major
credit card. Since then, credit card companies have been making it even
easier for minors to get cards in their names -- a clear attempt to tap
into the $4.8 billion that Jupiter Research estimates teens will spend
online by 2006.
Age verification is not limited to the adult entertainment industry.
Companies that use the Web to market alcohol and tobacco products are in a
similar bind. They must find ways to keep minors out, without overburdening
their target audience with verification procedures.
Like most beer brewers, Miller Brewing Company adheres to voluntary
guidelines published by the Beer Institute. Miller requires visitors to
enter a date of birth before they can access any of its websites. Visitors
who enter dates that fall within the last 21 years are not admitted.
Scott Bussen, senior manager of Miller Trademark PR, is optimistic about
the system's efficacy. "It seems like people, by and large, take it
seriously when they see the date-of-birth field," he said.
But even Bussen admits that the system is not perfect. Miller relies on a
third-party consumer information database as a secondary means of filtering
out minors who get onto the site and sign up to receive additional
marketing information. "The ideal scenario is that no one under drinking
age is on our site, but we have to operate in reality," said Bussen.
*****************************
CNET News.com
Want Wi-Fi? Verizon takes it home
By Ben Charny
October 9, 2002, 3:39 PM PT
Verizon Communications on Wednesday became the second Web service provider
to sell wireless home networking equipment directly to subscribers.
Six million to 8 million U.S. homes have installed home networks that use
Wi-Fi, a technology that allows devices located within a 300 foot radius to
communicate without wires. Verizon is looking to cash in on a boom in Wi-Fi
networks, expected to triple in number by 2006.
Linksys manufactures the Verizon equipment, which includes a Wi-Fi access
point and a laptop modem. The access point sells for between $100 and $180,
while the modem sells for $90. The networking package also includes a
high-speed Web account, which costs between $39 and $49 a month, Verizon
representative Bobbi Henson said.
AT&T Broadband has been selling wireless home networking equipment direct
to its own subscribers for several months.
Not all broadband providers are jumping on the Wi-Fi wagon. Time Warner
Cable does not yet have any plans to sell Wi-Fi equipment, a representative
said Wednesday.
One of Time Warner Cable's subsidiaries, Time Warner Cable of New York
City, raised the hackles of Wi-Fi users in June when it requested that
accounts not be used to offer wireless access points to Wi-Fi surfers for free.
The cable provider didn't comment Wednesday on whether it has actually shut
down service to some customers, as it had threatened to do.
With the package, Verizon plans to offer free troubleshooting services to
customers. "Most people say they want this," Henson said.
AT&T Broadband directs troubleshooting and installation help to Linksys.
AT&T Broadband representative Sara Eder said the company is exploring
whether to offer its own service in the future.
Cahners In-Stat analyst Allan Nogee said offering a troubleshooting service
could be a costly gamble, as it could cost up to $300 a call if the company
has to send a technician to customer's home.
******************************
Government Executive
Better technology will keep benefits out of fugitives' hands, GAO says
By Tanya N. Ballard
tballard@xxxxxxxxxxx
Technology and leadership problems are hindering a program aimed at
preventing fugitives from getting federal benefits, according to a new
report from the General Accounting Office.
The Social Security Administration's fugitive felon program has helped
ferret out more than 45,000 fugitives who have received nearly $82 million
in Social Security benefits over the past six years, GAO found. But poor
information sharing with law enforcement agencies and a lack of leadership
from SSA threaten the program, the report concluded.
"Most of the essential tasks of sharing and verifying information are
performed manually," the report said. "SSA currently lacks the capability
to accept warrant information from law enforcement agencies online." SSA
matches warrant information from the FBI, the Marshals Service and state
and local law enforcement agencies against its records to keep fugitives
from getting Social Security benefits.
As a result, SSA's partners must download information from their systems
and mail or hand-deliver the information to the agency. The SSA's computer
systems are also not compatible with the FBI's, which makes exchanging
information even harder.
"Collectively, the manual activities in processing warrant information have
resulted in an inefficient and time-consuming operation that, based on our
analysis of the process used, can take up to 165 days to complete,"
according to the report.
Some state law enforcement agencies are hesitant to form partnerships with
SSA because they do not have the extra resources needed to compile and send
the information to the agency. Consequently, SSA has also not been able to
gather comprehensive felony warrant information from all 50 states.
Sen. Charles Grassley, R-Iowa, who held a hearing on the issue last year,
called on SSA to quickly iron out the program's wrinkles. "The taxpayers
are ripped off when fugitives collect payments they don't deserve," he
said. "Fugitives from justice don't need a government subsidy to enjoy life
on the lam."
For long-term success, GAO recommended that Social Security Commissioner Jo
Anne Barnhart designate a program management office and program manager to
oversee and direct the fugitive felon program.
GAO also suggested that SSA conduct a detailed assessment of the program's
operations and performance, examining the program's information flow, time
frame, costs, workload and benefits. The report also recommended that the
agency move ahead with automating the program.
"The bottom line is, this program has to work to protect taxpayers,"
Grassley said. "I'm hopeful SSA will give these recommendations every
consideration."
But Barnhart was disappointed in the report's findings and disagreed with
most of GAO's recommendations.
"We wish to express our disappointment in the report, as it implied that
neither SSA nor the Office of Inspector General has a vision for this
program," the commissioner said in a written response to the report. "SSA
works diligently to make this program a success."
****************************
New York Times
Sometimes It's One Voter, 2 ID Cards
By MICHAEL WINES
ISLAMABAD, Pakistan, Oct. 9 Pakistani politics, like many a Pakistani, is
a flexible creature, adaptable to crisis, forgiving of transgression.
Politicians fall in coups, only to leap back into the fray with their own
parties. Candidates switch allegiances in midcampaign.
Politics here works a lot like Subsection 11 of the 1974 election law,
which warns briskly that "an electoral roll must be revised and corrected
annually," then adds that if the roll is not revised, then just use the old
one.
There is just one inviolable rule: nobody votes without a National Identity
Card.
"I want to be very clear and specific on it," said Khan Ghazni, public
relations director for the Elections Commission. "The identity card is a
must. It is a must for casting your vote. It is mandated."
Of course, some folks say that rule is flexible too.
Pakistan votes on Thursday, for a new Parliament that its military
government calls the harbinger of a brave new democracy, and as in
elections past, the National Identity Card has many people smelling a rat.
Their suspicions are simple enough. Although the government insists that
each voter present a card before casting a ballot, they allege, it can be
considerably less picky about whose card a voter presents at the polling
place. Or, for that matter, whether an opponent's supporters have cards at all.
This was supposed to be the year that Pakistan laid that dark past to rest.
Last spring the government ordered everyone to replace dogeared paper cards
with a new Computerized National Identity Card a space-age miracle crafted
of fatigue-resistant green Teslin, embossed with anticounterfeit
microprinting and a hologram and striped with a magnetic tape encoded with
everything from the bearer's name to his or her thumbprint.
"The National ID Card (NIC) includes a sophisticated array of security
features to safeguard against fraud and improper use," the government
states on its identity card Web site.
For many uses, like obtaining a passport, that may be true. But when it
comes to the election on Thursday, the government's leap into 21st-century
technology has only revived complaints of 20th-century politics, Chicago style.
Hours before the vote, hundreds of thousands of Pakistanis more likely
millions, many say have yet to receive their new cards, although the old
cards were to have become inactive on June 1. Foes of the government say
they worry that the cards are being withheld to deprive their supporters of
a vote, or that the cards will be whipped out and given to pro-government
forces on election day.
The government furiously denies it, and states that both old and new cards
will be accepted at polling stations. To rival candidates, the prospect
that Pakistan will have two identity cards for almost every voter is even
more chilling.
"On the basis of past experience with elections, we have seen that this
kind of manipulation and rigging has taken place," said Farhatulla Babar,
the spokesman for the parliamentary caucus of the Pakistan People's Party,
perhaps the biggest opposition party. "In 1997, in 1993, in 1990 it has
happened. We are talking about interpolating the past into the future."
We are also talking, potentially, about sliced baloney, for as Mr. Babar
allows, there is no proof that the government is stacking these cards
against its opponents. There are only rumors and press reports, and the
legacy of what many call a pretty seamy electoral history.
It was a military strongman, Gen. Mohammad Zia ul-Haq, who first required
adult Pakistanis to obtain National Identity Cards in the 1980's. Many say
the cards have been cleverly stacked against opposition candidates in
almost every election since.
"At some places people did not have ID cards," I. A. Rehman, the director
of the Human Rights Commission of Pakistan, said in a telephone interview
from Lahore. "And at other places they had too many ID cards."
Pro-government workers printed bogus cards on presses in their homes, Mr.
Rehman said; women's cards, lacking full addresses or photographs, were
widely used to cast false votes. As many as 20 or 30 voters claimed the
same address on their identity cards in key precincts.
The government says flatly that those days are gone and that polling places
now have antifraud safeguards. Still, if the press is to be believed a
leap, as journalism here is famously flexible itself something could be
rotten in Rawalpindi.
Consider the recent report from Peshawar, where officials were said to have
found 24,798 bogus cards, and the account from Landi Kotal, a tribal area
none too fond of the ruling authorities, that cards were being denied to
anyone who could not hand over 300 rupees, or about $6.
In Larkana, in south-central Pakistan, the police were said last week to
have uncovered a ring that had produced 29,000 fake identity cards.
Candidates in Quetta held a rally last week to protest what they claimed
was ID-card fraud.
Even in Islamabad, the capital, a People's Party candidate accused the
government of failing to send 80,000 cards to voters in his district.
Mr. Ghazni, of the Elections Commission, calls such reports political
disinformation, saying he knows of only one fraud case in remote
Baluchistan, a case the government itself ferretted out. On Tuesday the
government accused the Pakistan People's Party of engineering the Larkana
identity card fraud.
As for undelivered cards, Mr. Ghazni said, that is a canard: almost all
have been delivered.
But practically everyone questioned by one reporter this week either had
not received a new card, despite applying for one, or knew someone who had
not. "In some families two or three members get the cards and the others
are still waiting for them," said Tariq Aziz, 35, a salesman.
Attique ur-Rehman, 22, a vendor in a local market, said: "I got my new
card, but there was a mistake in it, so I sent it back. I haven't heard
back. That was three months ago."
Not to worry, though: today a senior election official in Islamabad moved
the identity card goal post yet again. Now, it said, election workers will
accept not just a new card, nor just an old card, but a photocopy of an old
card.
Mind you, only an identity card will do.
That rule is inviolable. "This condition," Mr. Ghazni warned, "cannot be
shelved."
****************************
Reuters
China Says Viruses Infect 80 Percent of Computers
Wed Oct 9,11:29 PM ET
BEIJING (Reuters) - Viruses have infected at least 80 percent of China's
computers, the official China Daily newspaper said on Thursday,
highlighting the vulnerability of one of the world's biggest PC and
Internet markets.
The findings were the result of a six-week survey conducted by the National
Computer Virus Emergency Response Center, the newspaper said.
"Only 16 percent of computer users we sampled this year reported they were
free from any virus attack, while last year nearly one in three users said
they suffered no computer infections," the newspaper quoted the center's
chief engineer, Zhang Jian, as saying.
Half of the infected machines had suffered data losses, problems browsing
the Web, or other damage, the newspaper said.
Computer viruses are small programs often sent via e-mail or hidden in
other software. Once inside a computer, they can do malicious tasks like
erase data or reproduce and send copies to other machines over the Internet.
However, a recent worm called "Bugbear" -- which records keystrokes makes
them vulnerable to hacking attacks -- appeared not to have affected many
systems in China, the newspaper said.
Only a small percentage of Chinese have access to computers and the
Internet, but with a population of nearly 1.3 billion, the absolute numbers
are still huge.
China added 12 million new Internet users in the first six months of this
year, pushing its total to more than 45 million, official data show.
***************************
Federal Computer Week
Agencies to try out EA system
BY Diane Frank
Oct. 9, 2002
Later this month, agencies will get their first look at the management
system intended to provide an enterprise view of systems in place across
government.
The Office of Management and Budget this month plans to use several
agencies to test the governmentwide version of the Enterprise Architecture
Management System, said Robert Haycock, program manager of the Federal
Enterprise Architecture.
EAMS is the repository chosen to hold all of the information on agencies'
systems and how they fit within OMB's business reference model, which
outlines the common lines of business across government. The business
reference model is one of five reference models being developed by OMB's
Federal Enterprise Architecture Program Management Office to help identify
areas for collaborative investment and eliminate redundancy.
EAMS presently holds all the fiscal 2003 information, and as OMB budget
examiners go through agencies' fiscal 2004 budget requests, that
information will be added as well, Haycock said.
The two- to three-week "proof of concept" test to begin this month will
check to make sure that:
* The system is easy to use.
* The system contains the information agencies need to find potential
opportunities for collaboration.
* The reports OMB chose to generate are useful.
* The queries allowed on the system get agencies the information they need.
Following the test of EAMS, OMB officials plan to release the system to all
agencies on a read-only basis, but agencies will be able to fully search
the repository and generate reports. That full release is expected to come
in mid-November, and "that should be well in time for the 2005 [budget]
process," Haycock said.
The Federal Enterprise Architecture Program Management Office is evaluating
the appropriate access controls for EAMS. In addition to ensuring security
controls for federal users, this will be the basis for allowing access to
state and local officials so everyone can see "where business lines at the
federal level might link up into business lines at the state and local
level," Haycock said.
Meetings are already under way between OMB and the National Association of
State Chief Information Officers' enterprise architecture group to discuss
the potential benefits of this access, he said.
*****************************
Government Computer News
NSA will test a high-level access card
By Dipka Bhambhani
The National Security Agency is planning to test its own version of the
Common Access Card at the end of next year.
While most Defense Department employees will use the Common Access Card,
top NSA officials will use the Universal Secure Access smart card for
physical and network access to DOD facilities.
NSA recently asked SSP-Litronic Inc. of Irvine, Calif., to come up with a
stronger, more secure smart card for its Key Management Infrastructure
initiative to develop NSA's public-key infrastructure.
"This card will be used for higher levels of security than the CAC," said
Michael Butler, chief of smart-card programs at DOD.
Forte meets the FIPS 140-2 security requirements developed by the National
Institute of Standards and Technology with Level 3 assurance.
The card is embedded with a 32-bit cryptomath processor and a chip. "It's a
minicomputer on a smart card," said Richard Depew, president and chief
operating officer of the parent company. "It has a lot more processing
capability to do encryption and decryption on the card."
General Dynamics Communication Systems of Needham, Mass., under a $24.4
million contract from NSA to install KMI, is running the Forte pilot at the
end of next year.
"The USA card is not presently seen as a direct replacement for the CAC nor
will it be fielded to all DOD employees," Butler said.
The KMI initiative is designed to work with the CAC to make it
interoperable with the CAC.
"The CAC was made to integrate the multiple identification cards throughout
the infrastructure," Butler said.
*************************
Government Computer News
Treasury set to issue digital certificates with smart cards
By Dipka Bhambhani
The Treasury Department plans to issue digital-certificate-embedded smart
cards to 7,000 Treasury employees across the country beginning next month,
said Bernadette Curry, Treasury's PKI program manager.
Treasury became one of the first four agencies to join the Federal Bridge
Certification Authority at the end of last month. Its certificates became
interoperable with those of NASA, the National Finance Center and the
Defense Department.
"This is a huge deal," Curry said about the cross-certification, because it
sets things up for other projects. "We started to issue certificates in the
latter part of March of this year," she said.
Only 90 Treasury employees have digital certificates now. Curry said the
department decided to wait for its smart-card deployment to issue its
certificates.
"We don't have that many people using certificates because we are waiting
to issue certificates on smart cards," she said.
****************************
Government Computer News
Feds testify about improved antiterror systems
By Wilson P. Dizard III
State Department, FBI and Immigration and Naturalization Service officials,
among others, described improvements to government systems for border
control and for tracking terrorists' finances during a hearing today on the
effectiveness of the USA Patriot Act.
The act, passed a year ago, comprised a wish list of information-sharing
and -gathering provisions assembled by the law enforcement community. Sen.
Dianne Feinstein (D-Calif.) convened a hearing of the Senate Judiciary
Committee's Subcommittee on Technology, Terrorism and Government
Information to evaluate the effectiveness of the law and review the
possibility of changes.
Much of the hearing focused on the FBI's lack of a single written plan to
confront terror threats, a charge leveled last week by the Justice
Department's inspector general, Glenn Fine.
Other testimony highlighted improvements some agencies have made. Stephen
A. Edson, acting deputy assistant secretary of State for visa services,
described the department's progress in improving databases used to pinpoint
terrorists among visa applicants.
Edson focused in part on the department's Consular Lookout and Support
System, which he said "uses sophisticated search algorithms to match
lookout information to individual visa applicants." Every single visa
applicant is run through CLASS, Edson said.
"CLASS records have doubled since Sept. 11 [2001]," Edson said. Under a
mandate in the Patriot Act, the department added 7 million names of people
with FBI records as of August, augmenting 5.8 million names from State,
INS, the Drug Enforcement Administration and intelligence sources.
He said 20,000 records of people identified by the Customs Service as
serious violators also have been added. "CLASS now has over 78,000 name
records of suspected terrorists, up 40 percent in the past year."
Many of the additional names of potential terrorists have entered CLASS via
the Tipoff program, which the State Department runs to add sanitized
intelligence information about suspected terrorists gathered from the
intelligence community.
According to Edson's testimony, State now is working to improve CLASS by
adding:
better data on lost and stolen passports
more deportation records from the INS
a backup facility in Kentucky
hardware and new search algorithms.
Dennis Lormel, chief of the FBI's Terrorist Financing Operations Section in
the Counterterrorism Division, added details about the government's use of
technology to track enemy funds.
Lormel said the FBI is mining data from financial activities databases,
including the Suspicious Activity Report, Currency Transaction Report and
Monetary Instrument Report systems it uses in cooperation with the Customs
Service and the Financial Crimes Enforcement Network.
According to Lormel's testimony, FinCEN has developed a USA Patriot Act
Communication System that allows financial institutions to file reports
online and provide financial institutions with alerts and other information
about suspicious transactions.
Michael Cronin, INS' assistant commissioner for inspections, testified that
the service is evaluating biometric technology for use in the Entry Exit
System to track persons crossing the border.
***************************
Government Computer News
DOD forms a senior biometrics group
By Dipka Bhambhani
The Defense Department has created a decision-making group to help guide
development of the Biometrics Enterprise Solution, DOD's enterprise
architecture for biometrics.
The Biometrics Senior Coordinating Group, composed of DOD officials, had
its first meeting yesterday to recognize all members and meet with its
chairman, Army CIO David Borland, and to discuss the department's goal to
deploy biometrics agencywide.
The plan is to embed biometrics on every Common Access Card and within
DOD's tactical environments by 2005.
The group will vote on various facets of the department's enterprise
architecture, acting on suggestions from the existing Biometrics Enterprise
Solution working groups composed of Army, Navy, Air Force, DOD Biometrics
Management Office and other military and civilian DOD agency officials.
All groups report to Defense CIO John Stenbit.
The working groups research biometrics policy and aspects such as economic
analysis, requirements, legal architecture, acquisition, collection,
storage, access, retrieval and use.
"The working groups are down in the trenches doing the research, actually
doing the legwork," said a DOD spokesperson.
****************************
Government Computer News
DOD will soon set information assurance standards
By Dawn S. Onley
In a few weeks, Defense Department CIO John Stenbit will release a
directive setting standards for information assurance.
The directive, DOD 8500, will lay out requirements to guide Defense
agencies on how to secure their networks. The policy is expected to cover
everything from access control capabilities to high-speed firewall
protection and will be linked to initiatives in the intelligence agencies.
The directive aims for a layered security approach, or defense in depth,
said Bob Lentz, director of information assurance for the Office of the
Assistant Secretary of Defense for command, control, communications and
intelligence.
It will establish baseline controls so users can keep the requirements in
mind as they design networks, acquire products and implement lifecycle
decisions, Lentz said. The purpose of DOD 8500 moves beyond encryption,
Lentz added, even though all 3 million Defense users will be required to
log on and to sign e-mails using a public-key infrastructure by October 2003.
Lentz said the Defense policy will give warfighters a greater sense of
situational awareness by securing one of their most precious resources
during wartime: information.
"Warfighters must be able to trust all of the information that they need,"
Lentz said. "[Information] must be dynamic with reduced possibilities of
error."
Lentz spoke yesterday at the 2002 Military Communications Conference in
Anaheim, Calif.
*****************************
Government Executive
House committee votes to create e-gov administrator
By Molly M. Peterson, National Journal's Technology Daily
A bipartisan bill to create an e-government office within the Office of
Management and Budget won approval Wednesday from the House Government
Reform Committee.
Approved by voice vote, the legislation, H.R. 2458, aims to improve
coordination and deployment of information technology across the federal
government and help agencies achieve the IT management reforms required
under the 1996 Clinger-Cohen Act.
Virginia Republican Tom Davis, who chairs the Technology and Procurement
Policy Subcommittee that approved the bill, said federal agencies' efforts
to comply with that law have revealed the lack of a centralized focus on
information management and pervasive information security and IT
acquisition problems.
"This bill includes language designed to improve the internal management of
information, information technology and information security," Davis said.
"Additionally, it includes a number of provisions intended to ensure
greater citizen access to the federal government through the improved use
of information technology."
The proposed e-government office is based largely on the administrative
structure established in June 2001, when Mark Forman was appointed
associate director of OMB for information technology and e-government.
As introduced by Jim Turner of Texas, the subcommittee's ranking Democrat,
the legislation called for a Senate-confirmed chief information officer
within OMB. But a bipartisan substitute adopted Wednesday calls for an
e-government "administrator" instead of a new CIO. The substitute would
allow the administrator to be appointed without Senate confirmation.
Arguing that confirmation "imbues a position with prestige and power,"
Turner tried to restore that requirement. "We have, for a long time, fought
for a strong leadership position on information technology within the
federal government," he said. "Not requiring this position to be
Senate-confirmed would, in my judgment, weaken the leadership of this new
officer."
But Republicans opposed Turner's amendment, and the panel rejected it by
voice vote. "We already have six officials at OMB who are subject to
confirmation," said Committee Chairman Dan Burton, R-Ind. "So there is
plenty of accountability built into the process, and I don't believe we
need a seventh."
Democrats also raised concerns about language that would authorize federal
agencies to acquire information technology through a limited number of
"share-in-savings" contracts. Under such an arrangement, an agency could
obtain a product or service from a contractor without paying large, upfront
costs. Rather, the agency would agree to pay the contractor a percentage of
whatever long-term savings are achieved by using the new product or service.
Davis said the provision would encourage industry to share creative
technology and management solutions with the government while enabling
agencies to improve efficiency without the big investments.
But Henry Waxman of California, the full committee's ranking Democrat, said
analyses by some federal employee unions have indicated that the proposed
share-in-savings provision could increase government expenditures.
"This is the exact opposite of what the bill is supposed to achieve, and I
believe these concerns ought to be addressed prior to this measure going to
the [House] floor," Waxman said.
***************************
Government Executive
Panel backs bill to let agencies share business data
From National Journal's Technology Daily
Legislation to enable three federal statistical agencies to share data
while protecting confidential information won quick approval from the House
Government Reform Committee Wednesday.
The bipartisan bill, H.R. 5215, which cleared the panel by voice vote,
would allow the Census Bureau, the Bureau of Labor Statistics and the
Bureau of Economic Analysis to share the business data they collect.
Lawmakers said that provision would help to eliminate duplication and
resolve serious data inconsistencies.
"Because these agencies cannot share data, they often collect the same
information separately," said Rep. Steve Horn, R-Calif., the bill's chief
sponsor. "This wastes taxpayers' dollars and imposes unnecessary burdens on
those who supply the data.
The bill also would take steps to prevent the unauthorized use of
confidential data.
"This is particularly important with the Census," said Rep. Carolyn
Maloney, D-N.Y. "People will not give us the information if they do not
believe that we will ... protect their confidentiality."
***************************
Washington Post
Colleges Slow Computer Networks
Ever since Napster appeared on the scene, students have been causing
college and university administrators headaches with their constant
swapping of music and video clips a habit that can stall a school's
computer networks.
Now scores of colleges are fighting back with technology.
Buffalo State College is among schools that are limiting the capacity on
the circuits that parcel data packets to residence halls during the day,
when faculty and staff are on campus.
The idea is to give administrators enough network capacity to keep the
campus running.
Colleges then expand the network pipes that connect the rest of the campus
to dorms in the evening, when students are most likely to be sharing files
with each other and over the Internet, said Judy Basinski, Buffalo State's
associated vice president of computing services.
Wilson Craig, a spokesman for Packeteer, Inc., the California company that
sells the line-provisioning technology, said about 600 American colleges
and universities are using their PacketShaper program. Another 140 programs
are also being used in elementary and high schools nationwide, he said.
The program narrows the flow of data to dorm-room computers a bit like a
valve restricting the flow of water through a hose.
Installation of the program has not jeopardized research and academic
pursuits on campus networks, said Mark Luker, a senior policy analyst with
Educause, an organization that monitors technology in higher education.
It also has not affected students' ability to send e-mail or access
academic material such as professors' Web pages, said Kevin Talbert, the
chief information officer for technological services at Southern Oregon
University.
The transmission of basic data files such as e-mail and Web pages don't
degrade network performance as songs or movies do.
"Our experience thus far has been very good," said Talbert, who was
responsible for installing the program at Southern Oregon this year.
Everyone's happy except students, like Buffalo State sophomore Carlene
Peterson.
Last year, she downloaded up to three tunes a day onto her laptop: This
semester, Peterson has yet to record a single song.
"Downloading songs is next to impossible," she said. "It takes terribly long."
An Iowa State University encryption expert says it's only a matter of time
before students weaned on the Internet figure out how to widen the
pipes and overwhelm campus technology supervisors.
"A lot of schools are barely sustaining their information technology
support systems," said Iowa State's Steffen Schmidt. Many are "extremely
behind the curve on all this."
Kenneth C. Green, with the Campus Computing Project in Encino, Calif., a
high technology advisory group, disagrees. He said colleges and
universities deserve credit for staying abreast of developments in the
technology sector.
*************************
CNET News.com
Hackers send Sendmail a message
By Robert Lemos
October 9, 2002, 4:21 PM PT
Online vandals hacked into the primary download server for Sendmail.org and
replaced key software with a Trojan horse, a Sendmail development team
member said Wednesday.
The apparent attack on Sendmail didn't leave a back door in the popular
open-source e-mail software package, as previously believed, but
compromised the download software on the Sendmail consortium's primary
server so that every tenth request for source code would receive a modified
copy in reply.
"The exploited code that we see is not in our (development) tree at all,"
said Eric Allman, chief technology officer of Sendmail Inc., which sells a
version of the open-source e-mail server program, and a member of the
Sendmail Consortium, the development group for the software. "It seemed to
be going to the (Sendmail) host, but it was delivering a corrupted file
that wasn't on our server anywhere."
The problem apparently only affects source code for version 8.12.6 of
Sendmail downloaded between Sept. 28 and Oct. 6, according to an advisory
posted by the Computer Emergency Response Team (CERT) Coordination Center
on Tuesday.
While the Sendmail development group is only just starting its forensic
analysis of the computer that hosted the files, Allman said that its
current theory is that the FTP (file transfer protocol) server had been
hacked. If a user tried to download the latest Sendmail source code from
the ftp.sendmail.org server, a compromised copy of the code would be sent
instead about 10 percent of the time.
"It was a little bizarre that way," said Allman.
If the evidence confirms the theory, the hack would definitely be a strange
way to compromise a downloadable file, said Marc Maiffret, chief hacking
officer for security software firm eEye Digital Security.
"I'm not sure why they would want to do that," he said.
A Trojan horse--like the instrument that led to the downfall of the city of
Troy--is a program that appears to be a legitimate piece of software but in
fact has unwanted functions that allow a company or hacker to access the
victim's computer.
The FTP server compromised by this attack apparently provided people who
requested downloads not with the Sendmail source file, but with a
Trojan-horse copy. This copy included a non-Sendmail test component that,
when compiled, started a program that opens a covert channel to another
server on the Internet. That server has since been configured to block the
covert connection, according to messages posted to the Bugtraq security list.
Taking into account the 1-in-10 ratio, about 200 people may have downloaded
the corrupted software over that eight-day period, said Sendmail's Allman.
The development group is trying to contact everyone who downloaded the
source code.
Both Sendmail and the CERT Coordination Center stressed that any software
that is downloaded from the Internet should be verified using common
cryptographic tools and the file's signature.
"Anyone that downloaded the code and followed good software practices would
have found that this software was bogus," said Marty Linder, team leader
for incident handling for CERT Coordination Center.
Linder stressed that, while the open development projects that give
open-source its name may seem to invite problems like those of Sendmail,
companies working on proprietary software have also run into problems.
In October 2000, Microsoft's source code may have been compromised by a
hacker that penetrated the company's network allegedly with the help of a
malicious program known as the Qaz Trojan.
"The same thing can happen if an intruder compromises the source tree of a
private company," Linder said. "It's just another method for injecting
badness into software."
***************************
MSNBC
Justices take up Mickey Mouse case
At issue is law that extended copyright by 20 years
ASSOCIATED PRESS
WASHINGTON, Oct. 9 The Supreme Court debated Wednesday whether Congress
was wrong to block public access to Mickey Mouse and other classics. In a
case with appeal for many people, the court is considering whether it was
unconstitutional for Congress to give writers and other creators a 20-year
copyright extension. Hanging in the balance are huge profits for companies,
like The Walt Disney Co. and AOL Time Warner Inc., which benefit from
copyrights.
SOME JUSTICES seemed bothered by the retroactive extension, enacted
in 1998, which delayed the release of many old books and movies. But they
seemed equally concerned about their standing to intervene.
"I can find a lot of fault with what Congress did," Justice Sandra
Day O'Connor said. "This flies directly in the face of what the framers of
the Constitution had in mind, but is it unconstitutional?"
The extension protected some depictions of Disney's Mickey Mouse,
along with hundreds of thousands of books, movies and songs that were about
to be released into the public domain.
"If this (extension) is permitted, then there is no limit,"
Stanford Law School professor Lawrence Lessig argued on behalf of a New
Hampshire Internet publisher who challenged the law.
Solicitor General Theodore Olson told justices that while they may
personally disagree with the law, Congress had authority to pass it. "That
is where the framers invested the responsibility," he said.
The court's eventual ruling will determine if the books, art and
music will become freely available over the Internet or in digital
libraries soon and whether people could use them without paying licensing
fees.
The Constitution allows Congress to give authors and inventors the
exclusive right to their works for a "limited" time. The Supreme Court is
considering if the latest extension can apply retroactively.
Congress has repeatedly lengthened the terms of copyrights over the
years. With the challenged 1998 extension, the period is 70 years after the
death of the creator. Works owned by corporations are now protected for 95
years.
The 20-year extension, included in the Sonny Bono Copyright Term
Extension Act, brought U.S. rules in line with those of the European Union.
It was supported by Disney and other companies with lucrative
copyrights.
Hundreds of groups have filed arguments with the court in this case,
some supporting the Bush administration and others on behalf of publisher
Eric Eldred.
AOL Time Warner said if the extension were struck down, it would
threaten copyrights for some of its movies, including "Casablanca," "The
Wizard of Oz" and "Gone With the Wind."
Songs that would come into the public domain are "Stardust," "Yes! We
Have No Bananas," and "Yes Sir! That's My Baby," the Songwriters Guild of
America told the court.
The court's ruling will not affect trademarks, like the one Disney has
for Mickey Mouse.
Erik S. Jaffe, a Washington attorney who filed a friend-of-the-court
brief, said Congress could keep extending the copyright protection forever,
even though creators have been adequately paid for their inventions.
"It's like the last mortgage note is to be paid, and the bank says,
'No, you've got another 20 years,"' Jaffe said.
Olson told the court in a filing that Congress has been conservative
with its extensions.
The case is Eldred v. Ashcroft, 01-618.
******************************
MSNBC
Microsoft rethinks copy restrictions
At issue is use of TV programs recorded on PCs
ASSOCIATED PRESS
SAN JOSE, Calif., Oct. 9 Bowing to criticism, Microsoft Corp. on Wednesday
backed off a copyright protection scheme that would have restricted the use
of TV programs recorded on computers that run an upcoming version of the
Windows XP operating system. Windows XP Media Center Edition, which is to
be installed on a new line of Hewlett-Packard Co. personal computers later
this year, would have encrypted recordings so that they could only be
played on the PC that recorded the program.
AFTER DETAILS OF MICROSOFT'S original plan emerged last month,
consumer advocates criticized the system as being more restrictive than
traditional technology such as videotape recorders, which let viewers make
personal copies of TV shows and watch them on any set. (MSNBC is a
Microsoft - NBC joint venture.)
Now, consumers will be able to burn recorded programs onto DVDs to
watch on other computers and, by the end of the year, on standalone
players, said Murari Narayan, a product marketing director at Microsoft.
The recordings also will be transferrable over the Internet, though
that would not be easy given the size of most video files.
"We have to make sure we enable a very good consumer out-of-the-box
experience," he said.
The software still will support the Copy Generation Management
System, which, if restrictions were encoded into a broadcast, would bar the
sharing of a DVD recording, Narayan said. He said less than 1 percent of
all broadcast content is encoded with CGMS restrictions.
"We take feedback from partners, customers, press and analysts very
seriously," he said. "We heard loud and clear that we have to enable
consumer choice."
Frightened by the free-for-all of the late music-swapping Napster
service, Hollywood studios and other copyright holders have been pressuring
Silicon Valley to create mechanisms for protecting intellectual property.
But Microsoft's original plan is more like the existing experience
with home-recorded videos, said Scott Dinsdale, executive vice president of
digital strategy for the Motion Picture Association of America.
He said the new plan will open the door to piracy.
"If I have a copy that's digitally encoded on Microsoft's platform,
I can then take that and send it out over the Internet to my 10,000
favorite friends," he said. "I would not call that equaling the current
consumer experience."
HP applauded Microsoft's decision.
"We think this is definitely a step in the right direction for the
consumer because it gives our customers greater flexibility in how they'll
be able to manage their digital content," said Tiffany Smith, an HP
spokeswoman.
HP's Media Center PCs, which will hit store shelves later this
year, will range in price from $1,500 to $2,000.
HP faces competition from Sony, which has announced its own
media-focused systems that will not bar the transfer of programs recorded
onto its hard drive.
"Obviously, there was a lot of feedback in the industry about it.
You saw it everywhere," Smith said. "I'm sure some of that was taken into
consideration."
*******************************
CIO Insight
October 2, 2002
Bill of Rights
By Susan J. Marks
Sony had a problem. The hit British rock band, Oasis, wanted to create buzz
for its latest CD, Heathen Chemistry, by promoting certain songs before the
CD was to hit store shelves last month. Trouble was, the band's record
company, Big Brother Recordings Ltd., an arm of Sony Music Entertainment
Inc., knew that giving fans advance access to music tracks would be
tantamount to profit suicide. The songs would surely find their way online
and onto various peer-to-peer networks, letting millions of people download
them. Not only would that cool anticipation for the new album; actual sales
also would suffer.
Then came an ideaand an important new test of thinking in the post-Napster
world of digital commerce. On June 23, nearly two million Britons opened
their Sunday edition of the London Times and found a free CD containing
three not-yet-released song clips from the band's new album.
But this was no ordinary promotional CD: Using new digital content
controls, Sony had encoded it with instructions that, in effect, banned
people from playing the three clips for more than just a few times on their
home PCs. Fans also were unable to copy the music file and post it to
file-sharing networksthereby making it harder to steal. Oasis fans who
wanted to hear more had to link to the band's Web site and preorder the new
album from U.K.-based retailer HMVor wait until it was released. The idea:
Use software code not to ban, but to create buzz for new products without
getting burned in the process.
Did it work for Oasis? Preorders of the album exceeded company expectations
by 30,000 during the week following the Sunday Times' promotion, and Oasis'
record company gained data from 50,000 fans who registered onlinenew
information that could be used to sell more CDs in the future. HMV was able
to raise the number of visitors to its retail Web site, and even the Sunday
Times was able to score a win in the deal: Circulation that day was
300,000its second-highest Sunday circulation ever.
*****************************
Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 510
2120 L Street, NW
Washington, D.C. 20037
202-478-6124
lillie.coney@xxxxxxx