[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips October 22, 2002
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, glee@xxxxxxxxxxxxx;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, akuadc@xxxxxxxxxxx;, computer_security_day@xxxxxxx;, waspray@xxxxxxxxxxx;
- Subject: Clips October 22, 2002
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Tue, 22 Oct 2002 15:26:40 -0400
Clips October 22, 2002
ARTICLES
Direct marketers want anti-spam laws
Two Dems Accuse HHS of Removing Info [Censorship]
Networks Act to Avoid More Blunders in Vote Tallies [E-Voting]
Errant E-Mails Ruffle House Democrats' Feathers
SeniorNet campaign pushes tech literacy
Internships go virtual as firms seek ways to save
A tough case to crack How IT can -- and cannot -- aid law enforcement?
Effort to double funding for science agency hits Senate snag [NSF]
Update: Navy searching for hundreds of missing computers
British Concern to Help U.S. Track Terrorists
Screensavers crack medical puzzle
Anti-terror fight goes to the source
Smart Fatigues Hear Enemy Coming
Professor's Case: Unlock Crypto
Terror Turns Real for Horror Site
Police Experts Meet on Internet Child Porn
Who controls your computer? [DRM]
*************************
CNet News.com
Direct marketers want anti-spam laws
By Declan McCullagh
Staff Writer, CNET News.com
October 21, 2002, 3:48 PM PT
The Direct Marketing Association said Monday that unsolicited e-mail has
become so noxious that a federal anti-spam law is finally necessary.
Until now, the DMA has opposed the majority of anti-spam bills in Congress
or offered only lukewarm support. But the ever-rising tide of junk e-mail
has made the influential trade association rethink its stand.
"Even legitimate business' messages are not being looked at because of the
get-rich-quick schemes and pornography and so forth," Jerry Cerasale, the
DMA's vice president for government affairs, said in a telephone interview
Monday afternoon.
The DMA's change of heart, which comes as the group meets in San Francisco
for its 85th annual convention this week, means that a sizable obstacle to
federal legislation has vanished. The DMA, along with its allies at the
U.S. Chamber of Commerce and the National Retail Federation, have
previously scuttled some anti-spam laws from being enacted by Congress.
"We absolutely need legislation," Cerasale said. "So we're going to have to
work to get a compromise that'll have enough support so it will pass."
The DMA told the Senate Commerce committee in April 2001 that a law
governing spam might not be objectionable if it overruled about 20 state
laws currently on the books and prohibited only "the practice of sending
fraudulent electronic mail messages" with forged headers.
Now the association, which boasts about 4,700 members that include direct
mail, catalog and telemarketing companies, says it will lobby for
legislation that has both of those requirements and also provides a way for
recipients to remove themselves from future mailings. "We're finding that
we need to give the consumers the choice to try and allow them to control
their inbox, to try and say no, I don't want this, while leaving the medium
open for commerce," Cerasale said.
But, Cerasale said, a federal requirement that consumers "opt in" instead
of "opt out" of bulk e-mail is unacceptable. "We think the opt-in creates a
true noneconomic model," Cerasale said. "We don't believe you get a viable
economic model in opt-in."
Ray Everett-Church, who represents the Coalition Against Unsolicited
Commercial Email (CAUCE) and other tech clients, says he's taking a
wait-and-see approach.
"The fact that they are realizing that self-regulation hasn't solved the
problem is a very important step," Everett-Church said. "It marks a welcome
change in their thinking. But the folks in the anti-spam community are
waiting to see what the DMA defines as acceptable under any proposed
legislation."
Taking steps to can spam
In September, three consumer groups asked the Federal Trade Commission to
take swift steps to stanch the flow of bulk e-mail.
The DMA opposed the suggested rules as overly intrusive, and the American
Civil Liberties Union said the rules would be unconstitutional if adopted
by the FTC. "Self-regulation is the way to go in terms of preserving First
Amendment rights and, at the same time, making sure that frauds are not
perpetrated," DMA Vice President Jim Conway told CNET News.com at the time.
Around the same time, however, the DMA and companies including AOL Time
Warner and Verizon Communications began meeting in private to figure out if
new laws were necessary.
Because Congress has adjourned until after the November elections, there's
scant time left this year to enact an anti-spam law, meaning the
legislative push would have to wait until the new Congress convenes in 2003.
If the DMA does start lobbying, Everett-Church says the big question will
be the wording of the final bill: "The question is how are they going to
define spam and solve the problem in a way that actually makes a difference
to consumers' mailboxes?"
****************************
Associated Press
Two Dems Accuse HHS of Removing Info
Mon Oct 21, 6:36 PM ET
WASHINGTON (AP) - Two Democratic congressmen contended Monday that the Bush
administration is putting ideology over science, citing appointments to
advisory committees and the removal of information from Web sites.
Reps. Henry Waxman of California and Sherrod Brown of Ohio demanded
explanations in a letter to Health and Human Services (news - web sites)
Secretary Tommy Thompson.
They complained that information about the effectiveness of condoms had
been removed from a Centers for Disease Control and Prevention (news - web
sites) Web site; that experts serving on advisory committees were being
replaced because their views do not match the administration's; and that
HHS is singling out AIDS (news - web sites) groups with probing audits.
In addition, they said, information showing that abortion does not increase
the risk of breast cancer (news - web sites) was removed from a National
Institutes of Health (news - web sites) Web site. "Scientific information
... has been removed, apparently because it does not fit with the
administration's ideological agenda," Waxman and Brown wrote.
They charged that "ideology has replaced scientific qualifications" as HHS
chooses members of advisory committees. Among other examples, they pointed
to a report on a CDC advisory committee on safe lead levels for children.
The report found that nominations of respected academics had been withdrawn
and replaced with consultants to the industry.
"We are deeply concerned that stacking advisory committees with individuals
whose qualifications are ideological rather than scientific will
fundamentally undermine the integrity of scientific decision-making at our
leading public health agencies," the Democrats wrote.
HHS spokesman Bill Pierce said it is Thompson's prerogative to appoint
whomever he chooses for advisory committees. By contrast, he said, Waxman
and Brown "would like all of us to follow their agenda, their liberal
agenda, on these issues."
"They should stop looking for conspiracy theories," Pierce added.
**********************
New York Times
Networks Act to Avoid More Blunders in Vote Tallies
By JIM RUTENBERG
Two years after the embarrassment of making erroneous projections in the
2000 presidential election, the major television news organizations are
taking extra measures to avoid a recurrence.
CNN is contracting nearly 1,000 extra people to stake out polling places in
important precincts to call in the vote tallies as they come in. ABC News,
like NBC News, will isolate its election night analysts from other
networks' reports and even its own producers to insure that competitiveness
does not influence the results. The Fox News Channel is beefing up its exit
polling unit. CBS News is sending monitoring teams into closely contested
states to help decipher data.
All the networks say they will rein in the competitive instinct that drives
them to be first, before declaring winners and losers.
At the top of each network's list is the development of a system that will
reduce reliance on the Voter News Service, the network consortium that
provides election results, polling data and projections.
Among the problems, network executives blamed the service for providing
flawed exit poll data that led them to call Florida initially for Al Gore.
This, Republicans said, may have led some voters to stay home. The system's
failure to detect an overcount for George W. Bush in Volusia County, they
complained, helped lead them to later report that Mr. Bush had won the
state. That, supporters of Mr. Gore said, left the impression that he was a
sore loser when he contested the vote.
The problems led the House Committee on Energy and Commerce to hold a
hearing on the network missteps where a 10-minute video clip of the various
misreports was shown.
"It was the perfect storm for election screw-ups," said Ken Johnson, a
spokesman for the committee and Representative Billy Tauzin, Republican of
Louisiana, who is the chairman. "Clearly, V.N.S. was the eye of the hurricane."
A new V.N.S. computer system has been designed to avoid the problems that
plagued the 2000 election. But it is still undergoing vital testing, and
all of its component parts might not be ready by Election Day.
Ted Savaglio, executive director of the news service, said the system's
most important function, the actual tabulation of votes, was fully
operational. But Mr. Savaglio said, its exit polling, which asks people how
they voted and why, still has some glitches.
That means that the sort of analysis the service usually provides might be
a little bit less robust than it has been in years past. Mr. Savaglio said
the service might be able to provide exit polling in some states, or only
on a national basis on such facts as how specific blocs voted in general.
The system that takes the raw material of the exit polls and precinct
counts to project winners in the various races is also undergoing testing.
Mr. Savaglio said he was hopeful, but unsure, it would be fully ready by
Election Day.
While network executives expressed some frustration with the pace of
getting the new system ready, they said they would rather it proceed
carefully than too quickly. They said they had plenty of backup, including
a separate vote-counting system run by The Associated Press.
"Our watchwords are 100-percent accuracy and reliability," said David L.
Westin, the ABC News president. "We're not going to run anything with the
risk that we're wrong."
Like its competitors, ABC has agreed not to project a winner in a given
state until the scheduled closing time for all the polls.
ABC said competitive pressure partly contributed to the missteps in 2000.
That is why it plans to keep its analysts away from televisions showing
what the competition is reporting.
CBS News, on the other hand, will put its analysts in its main studio, to
make sure that there is communication between anchors who hear regularly
from experts and reporters in the field and executives making the actual
decisions based on computer data.
CNN seems to be going to the greatest lengths to safeguard against error.
Under a new system called CNN RealVote, the network will send nearly 1,000
people out to precincts in 10 key states. Those people "will actually phone
in real votes when the ballot boxes are opened," said Walter Isaacson, the
CNN chairman. "That's a system that's meant to be a double-check on exit
polls."
All of the networks emphasized that they would move slowly this time.
"Viewers may have to stay up a little bit later to find out who runs the
House and Senate," said John Moody, Fox News Channel senior vice president
in charge of news. "But they will find out."
*****************************
Washington Post
Errant E-Mails Ruffle House Democrats' Feathers
By Dana Milbank
Tuesday, October 22, 2002; Page A25
President Bush and his aides called the congressional vote on Iraq a matter
of conscience. Apparently not everybody in the White House shares that view.
A day after Congress voted to authorize Bush to use force against Iraq, a
mass e-mail was distributed by the executive office of the president. It
referred to Sen. Robert C. Byrd (D-W.Va.), who led the opposition to the
resolution, as "doddering old Bob Byrd, the senile senator from West
Virginia." It called Hispanic Democrats in the House who opposed the
resolution "self-centered, do-nothing, $150,000/year plus perks yo-yo's."
"If they have a defense for their actions," the memo said, "they should
deliver it to the kids in uniform that could one day have their ass shot
off to protect these ninnies!"
Democrats demanded an apology and an explanation for the e-mail, written by
a California Republican but distributed through White House e-mail by a
White House official without identifying an author. The e-mail offered a
view at odds with the official White House line that the Iraq vote was not
about politics.
The author of this missive was Fernando Oaxaca, 75, a former Ford
administration official and former chairman of the Republican National
Hispanic Assembly. Oaxaca e-mailed the memo to GOP faithful across the
country, including a few Bush White House officials. A White House aide
then distributed the memo, without Oaxaca's name, to more than 100 Latino
activists -- among them some staffers for the Hispanic Democrats Oaxaca had
skewered.
"As far as I know it was an error, or a mispunching of a button in their
e-mail system," Oaxaca said yesterday. He said he wrote the memo as a
private citizen and the White House "is entitled to do what they want."
Sources said a relatively senior Bush aide liked the memo and directed a
young aide to forward it to Hispanic Republican activists; the memo was
accidentally sent instead, without explanation, to a mostly Hispanic
Democratic group. Still, that does not explain why the White House would
distribute such an e-mail, even to its allies.
On Oct. 11, White House press secretary Ari Fleischer described the
previous day's Iraq votes as "matters of conscience, and the president
thinks it is entirely appropriate for elected officials in both parties to
exercise their good conscience on behalf of their constituents."
Fleischer's briefing ended at 12:57 p.m. At 2:49 p.m., the White House sent
out the memo. Titled "Can you believe this?" the e-mail proclaimed the "sad
results" that "every Latino Democrat in the Congress voted against
supporting the president." It suggested the lawmakers "lack something our
brave young volunteers in our armed forces have plenty of" and declared
them "out of touch with their constituency and out of touch with America."
Referring to Reps. Jim McDermott (D-Wash.), David E. Bonior (D-Mich.) and
Gary A. Condit (D-Calif.), the memo said of the Hispanic lawmakers: "Except
for Bonior and McDermott, the congressional Baghdad Boys and Gary Condit,
who else are they following? The other anti-Bush bloc voters, the Black
Caucus?"
The memo closed with a series of phrases connected by ellipses: "Let's tell
all these Washington folks how we feel . . . let's stay on their case . . .
time is going by . . . the next anthrax or nerve gas delivery might come
across our borders or dumped on our Embassies or Armed Forces facilities
overseas . . . while we wait for the political circus to end!"
The e-mail ended with "Que verguenza!" -- Spanish for "how shameful."
That's what Rep. Silvestre Reyes (D-Tex.) thought -- for opposite reasons.
On Friday, the combat veteran and chairman of the Hispanic Caucus fired off
an angry letter to Bush requesting a "formal apology" and information about
"what is being done to address this shocking misuse of government resources."
"Less than 24 hours after this serious issue was discussed on the floor of
the people's House, one of your aides forwarded a mean-spirited, misguided
and offensive message to dozens of individuals, including members of my
staff," he wrote. Reyes expressed hope that "dissemination of such a
mean-spirited message will be thoroughly investigated and those responsible
will be appropriately disciplined."
White House spokeswoman Claire Buchan said the memo "was written by an
outside activist and it does not reflect the president's views. We regret
that it was mistakenly forwarded. The White House respects those who differ
with us on this."
In another White House e-mail controversy, the president himself sent a
solicitation for campaign funds that apparently went to some federal
employees' government addresses. "Your donation . . . will make a big
difference to my agenda to make America safer, stronger, and better," said
the e-mail, from "President George W. Bush" at the address
"georgewbush@xxxxxxxx"
The mass e-mail was intended for GOP faithful everywhere and likely was not
targeting federal workers. But a government worker who received the
solicitation at his ".gov" e-mail address complained to Rep. Henry A.
Waxman (Calif.), ranking Democrat on the House Government Reform Committee,
about a possible Hatch Act violation. "Obviously inappropriate, obviously
illegal, and obviously a reflection that the administration will do
anything to raise campaign dollars," said an obviously irritated Waxman.
***************************
Mercury News
SeniorNet campaign pushes tech literacy
By Mary Ann Ostrom
Mercury News
SeniorNet is launching its first national advertising campaign beginning
today to encourage older Americans to become computer literate.
The yearlong campaign explaining the benefits of the Internet will consist
of three public-service television ads in 23 markets, including the Bay
Area. Planet Earth Media Foundation will produce the campaign, an in-kind
donation valued at $4.7 million, and the San Jose-based Skoll Community
Fund contributed a $250,000 grant.
SeniorNet, a San Francisco-based non-profit, provides support for more than
220 learning centers nationwide that train older adults in using
technology. Although older adults are among the fastest-growing group to go
online, a recent Pew Internet & American Life Project found only 22 percent
of Americans ages 65 or older are regular Internet users. The first ad,
being unveiled today at an event at Adobe Systems headquarters in San Jose,
features a woman talking about the benefits of using the Internet to stay
in touch with family and friends.
``It's clear we're not reaching everyone who needs to hear this message,''
said Ann Wrixon CEO and President of SeniorNet, founded in 1986. ``There
are significant benefits to going online in terms of getting health
information and avoiding social isolation. No one has taken on the
challenge of doing the public education that needs to be done.''
Part of the campaign's aim is to draw the attention of government, business
and community leaders in a bid to increase funding for older-adult
technology training, Wrixon said.
Among speakers at today's campaign kick-off are Nuala O'Connor Kelly, the
U.S. Department of Commerce's chief counsel for technology, Dixie Horning,
executive director of the UCSF National Center of Excellence in Women's
Health and SeniorNet's board chair, Jeff Skoll, former eBay president and
founder of the Skoll Community Fund, and John Nicol, general manager of
Microsoft Network's TV Services.
****************************
USA Today
Internships go virtual as firms seek ways to save
By Stephanie Armour, USA TODAY
Some cost-cutting employers are trying a novel alternative to the
traditional student apprenticeship: virtual internships.
Companies are hiring college students to work on projects from afar rather
than relocating them for short-term assignments. The programs, dubbed
e-internships, are a new way for companies and pending graduates to get
connected. (Related: Internship can give you a leg up.)
Employers are experimenting with the idea because more college students
have access to computers, virtual work has become more commonplace and
companies want to tap more-affordable labor sources. Firms can save money
because the internships may be short in duration or unpaid. For example:
At Cardinal Health in Dublin, Ohio, college students in states such as
Arkansas and Ohio have been hired for virtual internships. Using school
computers, they've worked on data warehousing and other projects and
searched for errors on Web sites. The students are paired with a mentor and
are paid. The company is a provider of health care products and services.
Says Dennis Joseph, 23, a senior at Southern Arkansas University in
Magnolia, who is testing applications as a virtual intern: "It tests your
communication skills and shows you can work virtually."
International Truck and Engine, a maker of commercial trucks and diesel
engines based in Warrenville, Ill., has launched a virtual internship
program. Last year, four students at Hiram College in Hiram, Ohio, worked
for the company and were supervised by phone and e-mail. The students, who
each received $500, worked on a Web-marketing project.
"We get a lot of great work at a low cost," says Jim Clarke, manager of
channel development in used truck operations. "The only thing is (that)
they don't learn anything about the company culture. But it's a good
recruiting tool."
At Edwards & Hill Communications in Baltimore, about 10 college students
have participated in virtual internships. Using their own computers, the
students post casting notices online for the multimedia company, which runs
a Web site catering to the entertainment industry.
No one knows how many companies are offering virtual internships, but
hiring experts say they're a creative approach that could catch on.
And even though students may never set foot in the companies that hired
them, the e-internships often retain the hallmarks of traditional programs.
Students often have mentors, projects to work on and online brainstorming
sessions with colleagues.
"It was a pretty cool experience," says Guru Pinglay, 26, a technical
support analyst at Cardinal Health who previously worked as a virtual
intern and was hired in June. "The communication problems were more, but
that was the only disadvantage."
*****************************
Federal Computer Week
A tough case to crack
How IT can -- and cannot -- aid law enforcement's search for a D.C.-area sniper
BY William Matthews
Oct. 21, 2002, 2002
Technology has received a prominent role in the hunt for a sniper who has
killed nine and wounded two in a two-week spree in the Washington, D.C.,
metropolitan area, but even technology experts say the case is most likely
to be cracked by cops, not computers.
"This is a fairly low-tech kind of crime," said Jay Siegel, a forensic
science professor at Michigan State University's School of Criminal
Justice. "What's going to solve this crime is old-fashioned police work. It
does not require a lot of technology."
Nevertheless, numerous government agencies at the federal, state and local
levels turned to information technology as a tool to help catch the sniper.
Last week, the Army was preparing to contribute high-tech reconnaissance
planes to track a getaway vehicle if another shooting occurs.
Meanwhile, police in Montgomery County, Md., where the shootings began Oct.
2, are working with a Canadian company to develop a computer-generated
geographic profile of the sniper, which is intended to identify the area in
which a criminal lives based on the locations of his or her crimes.
The FBI is using its computerized Rapid Start Information Management System
to comb a vast database of evidence, tips and old cases, searching for
similarities, patterns and matches that might steer police to the sniper.
The Bureau of Alcohol, Tobacco and Firearms has searched its National
Integrated Ballistics Information Network for digital images of bullets or
shell casings for any that might match the bullet fragments recovered from
the shooting victims and the single shell casing found near a middle school
where a 13-year-old boy was wounded Oct. 7.
Maryland state troopers have increased their reliance on recently acquired
handheld computers for retrieving information from the Maryland Interagency
Law Enforcement System, the FBI's National Crime Information Center and
databases containing information on vehicles and suspicious individuals.
Despite the array of high-tech tools, after more than two weeks of sporadic
sniping attacks, police still had no suspect, no motive, no composite
sketch of the sniper, no positive identification of the gun, no license
plate number and only a vague description of a possible getaway van and a
truck.
"In the current state of things, you probably won't see a large impact" on
the sniper case from computer and technology systems, said David Epstein,
director of scientific services at the National Forensic Science Technology
Center in Largo, Fla.
In some instances, the technology is too new to improve the chances of
solving such cases. The ballistics information network, for example, "is
still in the process of being rolled out," Epstein said. It contains
relatively few ballistic images compared to the number of guns in
circulation. Thus, finding a match for the sniper's weapon is highly
unlikely, he said.
Early in the investigation, hope for a quick resolution was fueled by
reports that the police were using geographic profiling to help locate the
sniper's home.
With assistance from Environmental Criminology Research Inc., police
created an electronic map that marked the location of each shooting. Based
on that information, the profiling system used a complex algorithm to
calculate where the sniper was likely to live. The procedure has been used
in about 700 investigations and has been credited with helping solve about
150 of them, according to ECRI President Ian Laverty.
But in this case, days passed, shootings continued at sites more distant
and dispersed, and the sniper remained at large. "What we usually find,
having followed up on a lot of these cases, is that technology alone does
not solve the crime and it's not intended to," Laverty said.
The science of extracting useful information from raw crime data, as
geographic profiling does, "is just getting out of its infancy," Siegel
said. "We're just learning that we can learn a lot from data."
That's what the FBI is trying to do with its Rapid Start system, said FBI
spokesman Barry Maddox. Agents feed data and thousands of tips collected at
the shooting scenes into the system, which analyzes them and compares them
with data culled from old cases. Rapid Start hunts for data matches,
similarities and patterns, and alerts agents to information that might
point to a perpetrator.
Rapid Start, which has existed for more than a decade, was used in the
investigations into the Oklahoma City bombing and the terrorist attack on
USS Cole in Yemen, according to the FBI. Maddox wouldn't say whether it has
yielded useful results in the ongoing sniper investigation.
The system has substantial capabilities, according to Siegel. Yet, 15 days
after the first shooting, he was surprised that police still had not
located the sniper's van. In a case like this, he said, technology is no
substitute for "basic police legwork."
In all, a dozen or more law enforcement agencies have been working on the
case, and their ability to communicate and cooperate showed marked
improvement since their previous joint efforts, when they responded to last
September's terrorist attack on the Pentagon and the anthrax attacks a
month later.
Montgomery County, for example, used a notification system put in place
after Sept. 11 to send electronic messages to key officials in the county
when the sniper attacks began. "They were able to mobilize their emergency
operations center and their emergency operations processes," said John
Cohen, president and chief executive officer of PSComm LLC, a consulting
firm that advises government agencies on how to use technology.
Extraordinary coordination among local, state and federal authorities made
it possible for police to swiftly seal the exit ramps and block lanes along
20 miles of Interstate 95 and nearby roadways south of Washington, D.C.,
after the eighth slaying, which occurred at a Virginia gas station during
rush hour Oct. 11. But the massive hunt came up empty-handed.
Police hope for better results with the aid of an Army RC-7 Airborne
Reconnaissance Low plane, a small, four- engine plane mainly used to hunt
for drug smugglers in Latin America and monitor North Korean military
activities. Packed with $17 million worth of electronic systems, including
computer-enhanced long-range cameras and heat-seeking sensors, the plane
can stay aloft for about 10 hours.
John Pike, the director of GlobalSecurity.org, dismissed the idea that the
plane's infrared sensors might be able to spot the flash of a rifle muzzle.
And although equipment such as the plane's moving target indicator "is good
for telling you whether the North Korean army is crossing" the
demilitarized zone, it is not capable of spotting a vehicle of a particular
color and tracking it through traffic, he said.
The long-range camera might prove useful if the plane happens to be in the
immediate area of a sniper attack, but it would be useless if the attack
occurs miles away, he said.
"This stuff isn't easy," Epstein said.
*****************************
Government Executive
Effort to double funding for science agency hits Senate snag
By William New, National Journal's Technology Daily
The reauthorization bill that would put the National Science Foundation
(NSF) on track to double its budget in five years snagged in the Senate
just before lawmakers recessed last week.
The bill, H.R. 4664, was set for voice-vote passage last Tuesday, according
to the Senate Democratic cloakroom, but a senator anonymously objected,
leading to no action before senators departed Thursday to campaign for the
Nov. 5 election.
Industry groups charge that a Republican senator delayed action on behalf
of the White House Office of Management and Budget (OMB), reportedly
because of concerns about the planned spending increase. But an OMB
spokeswoman said the office has no official position on the bill.
The House passed the measure June 5 by a margin of 397-25. It would
authorize 15 percent funding increases for NSF each year from fiscal 2003
through fiscal 2005, including $5.5 billion for the agency next year, an
increase of $719 million from fiscal 2002.
"The irony of the situation is [that] the appropriations committees have
called for 13 to 14 percent program increases at NSF in the coming year,"
said David Peyton, director of technology policy at the National
Association of Manufacturers.
Proponents of the bill said it would put NSF on a similar funding course as
the National Institutes of Health (NIH), whose budget currently is being
doubled over five years. According to an industry source, a White House
official early in the Bush administration said that officials saw a lot of
political support for NIH but not as much for other research areas.
As a result the tech industry "has been working hard" to increase political
support for NSF's budget increase and believed it had succeeded. "So what's
the problem?" the source said.
Funding for NSF falls under the appropriations bill for the Veterans
Affairs and Housing and Urban Development departments.
Before departing, the Senate did approve by voice vote another bill sought
by some in the tech industry. The measure, H.R. 2733, would authorize the
National Institute of Standards and Technology (NIST) to work with
manufacturing industries to develop and employ standards for information
exchanges aimed at ensuring a seamless flow of information along the supply
chain.
"We're looking for ways to reduce the costs of software duplication to the
supply chain, where suppliers have to run multiple programs to do business
with different customers" Peyton said. "We're going after excess cost in
the supply chain."
The problem affects the automobile and aerospace industries in particular,
he said. The bill would authorize $47 million over four years for NIST to
work with industries. "We look forward to the appropriations committees
funding the work in line with the authorization," Peyton said.
*****************************
Computerworld
Update: Navy searching for hundreds of missing computers
By DAN VERTON
OCTOBER 21, 2002
At least 595 laptops and desktops belonging to the Navy's Pacific Command
in Hawaii have been potentially lost or compromised, according to an
internal report that detailed the service's inability to account for
hundreds of computers, some of which contained classified data.
The audit, conducted in July by the Naval Audit Service, concluded that the
mishap poses a "threat to national security." It was obtained last week by
Defense Week, a defense industry trade magazine, despite Navy efforts to
block its release.
The report identifies failures and breakdowns in the Navy's system for
tracking sensitive equipment deployed aboard Navy ships and submarines -- a
system that remains largely paper-based and manual.
John Yoshishige, a spokesman for the Navy's Pacific Command in Hawaii, said
that since last week the number of missing computers has been reduced from
595 to 187.
"And we expect that some of those may still turn up ashore," Yoshishige
said. "The inventory in the report was only of afloat units."
He was referring to PCs and laptops used onboard ships and submarines.
In addition to ordering an inventory of all shore-based units, the
commander of the Pacific Fleet has also directed that the command's CIO,
known in Navy parlance as the N6, develop an inventory control management
system that will be used by all Pacific Fleet commands.
This isn't the first time the military has lost computers containing
sensitive data. For example, in August, two laptop computers classified at
the top-secret level disappeared from a Sensitive Compartmented Information
Facility (SCIF) run by the U.S. Central Command at MacDill Air Force Base
in Tampa, Fla. The only reason those laptops were discovered to be missing
was that Secretary of Defense Donald Rumsfeld had ordered investigators to
look into how plans for an invasion of Iraq had leaked to the media.
Missing laptop and hard-drive fiascos have also stung the State Department,
the Department of Energy and even the FBI in recent years. In August, the
Justice Department acknowledged that it couldn't located 400 laptops and
775 weapons belonging to the FBI and the Drug Enforcement Agency. In
addition, the classification level of 317 of the computers belonging to the
FBI couldn't be determined.
Accountability problems often stem from the fact that individual military
and civilian agency officials are appointed as control or accountability
officers for a vast array of equipment, including mobile computers, desks
and chairs, that's often deployed for extended periods of time around the
world. In addition, the process of keeping tabs on equipment is often
determined by the individual officer assigned to manage the hardware and
isn't subject to any departmentwide or governmentwide standard.
*************************
New York Times
British Concern to Help U.S. Track Terrorists
By JOHN MARKOFF
SAN FRANCISCO, Oct. 20 Autonomy, a British developer of sophisticated
information retrieval software, plans to announce on Monday that it has
been chosen to provide an analysis system to help the United States
government track suspected terrorists.
The company, which has headquarters here and in Cambridge, England, said
that the General Services Administration had awarded it the multimillion
dollar contract and that licenses for the software were being made
available to the 21 agencies that may one day make up the proposed
Department of Homeland Security.
The company's executives said they were not permitted to divulge the
specific agency driving the contract award, but said that it was a
"security-oriented agency."
John Cronin, Autonomy's vice president for the government sector, said that
Steven I. Cooper, the chief information officer for the interim Office of
Homeland Security established by the Bush administration, had been "very
much" involved in the decision to purchase the software.
Autonomy's software uses statistical techniques to search for patterns of
information across large masses of data. Mr. Cooper has said publicly on
several occasions that the domestic security effort will require technology
that will allow government agencies to share and analyze information, and
that data-mining technologies will be a central part of the operation.
The Autonomy software will make it possible to build automatically updated
indexes of disparate databases that are now maintained separately by
different government agencies.
"The problem you have is that any one of these agencies can come up with
pieces of the puzzle," said Michael R. Lynch, the chief executive of
Autonomy. "This system will be accessed by over 200,000 people ranging from
experts on shipping to experts on North Korea."
The chief knowledge officer of the Coast Guard, Dr. Nathaniel S. Heiner,
said that a number of government agencies were already working toward
integrating their data sources and that the Autonomy tool was a significant
addition. "We can't leave any stones unturned when it comes to finding the
right mix of information and getting it into the right hands," he said.
Industry analysts said that the Autonomy software could play a role in the
effort to bring together information from different agencies with
incompatible computer systems.
"They're looking at Autonomy as the simplest thing that can be incorporated
into all of the agencies to build collaboration," said French Caldwell, a
computing industry analyst at Gartner Inc., a market research firm. He
added, however, that true collaboration would be a remarkably difficult
challenge for the government. Many agencies currently do not even share
secure electronic mail, he said.
One early application for the Autonomy software will be as part of a
consolidated watch list for suspected terrorists that the agencies will
maintain, according to Mr. Cronin of Autonomy. He described the possibility
that dozens of separate data repositories would be accessible by Autonomy
software known as the Intelligent Data Operating Layer, which is designed
to integrate unstructured text documents and traditional database information.
Once the Autonomy indexing system is established, it could be used both to
search all of the repositories simultaneously as well as to automatically
generate alerts in response to certain inquiries.
The Autonomy software has the flexibility to search names and words with
variable spellings as well as to retrieve information based on patterns
that are related but may not match exactly.
The software is based on Bayesian statistical techniques, which are used to
match patterns and are gaining favor among software designers and
artificial-intelligence researchers.
The agencies that will acquire licenses to the Autonomy software under the
contract include the Office of Homeland Security, the Secret Service, the
Transportation Security Administration, the Coast Guard, the Federal
Emergency Management Agency and the State Department.
****************************
BBC Online
Screensavers crack medical puzzle
The spare capacity of thousands of computers has helped scientists solve a
complex problem - which could one day help them fight disease.
It is one of the first occasions so-called "distributed computing", in
which each volunteer machine is given a chunk of data to compute, has led
to a research paper published in a top scientific journal.
Problems suitable for "distributed computing" are those which would take
years of processor time if carried out on just one, or a small group of
computers.
However, if the task is divided between many thousands of computers, the
time it takes to finish the job falls dramatically.
The downloaded software swings into operation when the computer has been
idle for a set period.
The principle has been used for everything from the design of new drugs to
the search for extraterrestrial life.
Folding conundrum
The success has been achieved by the Folding@home project, run by
scientists at Stanford University in the US.
It is looking into proteins - essential chemical messengers which control
many vital body functions.
Each long protein molecule is a sequence of amino acids folded into a
complex, three-dimensional shape which is key to its particular role.
Protein misfolding is thought to play a role in many diseases, including
CJD and Alzheimer's.
The aim of the Folding@home project was to simulate just part of this
folding process, which takes just a few microseconds to happen.
A single average computer would take all day just to simulate one
nanosecond of protein folding.
Willing volunteers
Folding@home was launched two years ago, and has so far recruited 200,000
PC owners.
A new recruit will download data analysis software, then be assigned
particular computational tasks, sending the results back when they are
completed.
A group of 30,000 computers was able to perform 32,500 folding simulations
and accumulate 700 microseconds of data.
The results - predicting that a particular protein would take six
microseconds to fold - tallied well with laboratory tests.
Dr Vijay Pande, from Stanford University, said: "These experiments
represent a great success for distributed computing.
"Understanding how proteins fold will likely have a great impact on
understanding a wide range of diseases."
The results were published in the online version of the journal Nature.
This is by no means the first success for distributed computing - it has
cracked complex mathematical problems before - but it is the first to be
published in a journal such as Nature.
The most famous project, the Search for Extra-Terrestrial Intelligence
(SETI), which analyses radio telescope data, has also thrown up some
promising "leads".
***************************
BBC Online
Anti-terror fight goes to the source
US anti-terror agencies are linking their intelligence databases to pool
information about suspects and spot hints about future attacks.
The pool will include text documents, video and audio gathered from a
regularly updated collection of sources of information about terror groups.
The agencies will analyse the information looking for trends, key
individuals or recurring phrases that signify code words or concealed
messages.
British firm Autonomy is providing the technology to sift through the data
looking for clues.
Code clause
The US Department of Homeland Security is behind the project to unify the
intelligence databases of the 21 agencies, which includes the CIA and FBI,
and will try to ensure that anti-terror work becomes closely co-ordinated.
It hopes that by strengthening links between the intelligence databases of
all the agencies involved in the fight against terror it will get a better
idea of if, when and where future attacks might come.
Autonomy's software will be used to analyse text, video and audio sources
looking for common concepts, phrases or individuals to produce a
consolidated watch-list.
Analysis of freshly gathered intelligence will also help the agencies keep
abreast of the plans of suspected terror groups.
The sophisticated analysis could also make it easier for anti-terror
agencies to pick out the common code words or phrases used by groups to
co-ordinate their activities.
More than 200,000 employees across the anti-terror agencies will be using
the software.
Before now US anti-terror groups have struggled to find out how attacks are
co-ordinated.
Widespread rumours that Al Qaeda is hiding passwords and plans inside
pornographic images on the internet have not been substantiated, even after
millions of images have been scanned.
The Department of Homeland Security was created after 11 September 2001
with the aim of preventing future terror attacks on US soil.
*****************************
CNET News.com
Google sued over site ranking
By Stefanie Olsen
October 22, 2002, 9:30 AM PT
Top billing in Google search results has become so coveted that one Web
hosting company is suing for it.
Search King, an Oklahoma City-based Web site network and advertising
seller, filed a lawsuit Friday against Mountain View, Calif.-based Google,
alleging the search giant unfairly bumped down its Web addresses from top
rankings in search results. The complaint was filed in the U.S. Western
District Court of Oklahoma.
The popular search service "purposefully reduced Search King's value, as
well as that of Web sites hosted by Search King," according to the
complaint. This is "due to the fact that Search King was legally profiting
from the page ranking assigned by Google to certain Web sites, with the
intent to cause Search King's clients to cancel contracts with Search King."
Google could not be immediately reached for comment.
On its Web site, however, the company explains that Web site rankings may
change each time it updates its index, which is every four weeks.
"You can be assured that no one at Google has adjusted the results to
decrease the ranking of one site or increase the ranking of another,"
according to the site. "Google's order of results is automatically
determined by several factors, including our PageRank algorithm."
At the center of the dispute are the "PageRank algorithm" and Google's
hidden recipe for calculating search results--which have made it a hit with
Web surfers the world over.
Though the company has largely kept secret its formula for answering
queries with fast, germane results, it has publicized one big part of the
equation. PageRank is a factor that determines a site's importance in
results based on the popularity it has in the Web community--roughly
tabulated by the number of links coming to that site and the importance of
those pages linking to it. It boils down to a number between 1 and 10 given
to a site to determine its position in specific results. Translated, a site
with a PR 10 is favored in results over a site with PR 7.
According to explanatory notes on Google's Web site: "Google's order of
results is automatically determined by several factors, including our
PageRank algorithm. Due to the nature of our business and our interest in
protecting the integrity of our search results, this is the only
information we make available to the public about our ranking system."
Because Google is one of the largest search services on the Web, high
ranking in its index could mean traffic from America Online, Yahoo and
other licensing partners, as well from Google.com. With knowledge of how
PageRank works, Web marketers and search engine spammers have tried to
reverse-engineer the formula by creating elaborate link structures, or
"link farms," to multiple sites to create page popularity and boost PageRank.
On a list of "do's and don't's" to get listed in the Google index, the
company says Web sites should not "participate in link exchanges for the
sole purpose of increasing your ranking in search engines."
Who's No. 1?
Some industry watchers say that the practice of building "link farms"
resulted in recent changes to Google's search algorithm in September.
Marketers such as Search King complain that Google's changes come with no
forewarning to a Web community so dependent on it for traffic.
Search King owner Bob Massa said in the lawsuit that the site's PageRank
was 7 out of 10 from February 2001 to July 2002, when it was then raised to
an 8. But a month later, things went downhill for the network.
According to the complaint, the Web hosting company in August started the
PR Ad Network--an advertising network in which it sold text links on the
popular Web sites to get them a better listing in Google's results.
Shortly after Search King boasted the trick, the PR number for its Web site
and those it hosts dropped from an 8 to a 4. The PR Ad Network itself was
given a zero, "which in the Internet community is recognized as a manually
determined penalty," according to the suit.
"Due to the high value associated with page rank, the purposeful reduction
of Search King and related Web sites' page rankings has damaged (its)
reputation and diminished its value," according to the suit.
"Google, as a provider of a ranking system upon with the Internet community
relies, must apply the system in a manner that is not arbitrary, nor aimed
at restraint of trade."
Search King is seeking a preliminary injunction against Google to be
restored to its previous ranking. It is also seeking unspecified damages in
excess of $75,000, a threshold it is using to file the suit under claims of
tortious interference with contractual clauses.
*****************************
CNET News.com
Justice Dept. reaches for "smart" gun
By Sandeep Junnarkar
October 22, 2002, 8:02 AM PT
The U.S. Justice Department is turning to technology to help guns recognize
whose finger is on the trigger.
The National Institute of Justice, the research and development arm of the
Justice Department, is teaming up with Metal Storm, an electronic gun
maker, to study how a firearm could be designed to determine whether the
person wielding it should be allowed to fire it.
"If an officer drops a gun or it is taken away from him during a tussle, a
'smart' gun could not be turned against him because there would be means of
specifically identifying the authorized user," said Charles Vehlow, Metal
Storm's chief corporate officer. "The study will identify the various
technologies that could make this possible and recommend the best ones to use."
The research will focus on biometrics systems such as fingerprint
technologies, computer chips that could be programmed to recognize an
individual's grip or other physical features, and electronic keys and codes.
"Biometrics clearly have advantages over keys and codes in terms of time
needed to activate or disarm a firearm," said Vehlow.
Interest in biometrics--systems that recognize people by scanning for
unique physical features such as fingerprints, an eye's iris and the
contour of a face--has surged since the terrorist attacks on the Pentagon
and World Trade Center in September 2001. Law enforcement agencies and
private companies in the airline and travel industry are hoping to rely in
part on some new technologies to help counter security threats.
Within law enforcement, there is a sense of urgency to find a way to
protect officers from their own firearms. A review conducted over a 10-year
period looking at how law enforcement officers were killed found that one
in six was shot to death by their own firearm after being disarmed by a
suspect. The report, dubbed the "FBI's Law Enforcement Officers Killed and
Assaulted Uniform Crime Report," also found that 113 firearms were stolen
from police officers during that period.
Earlier, the National Institute of Justice funded the Sandia National
Laboratories, to the tune of $500,000 to study the problem of firearms
being taken away from police officers, identifying the extent to which
officers are assaulted and killed with their own firearms and also
identifying the requirements officers would want in a "smart gun."
The institute is providing Metal Storm, a company traded on the Nasdaq
Stock Market, with almost $200,000 for the current research and
development. The company, based in Arlington, Va., said it would submit the
results of the study in the first half of 2003, providing an analysis of
the design, use, manufacturing process and costs of delivery a "smart gun."
******************************
Wired News
Smart Fatigues Hear Enemy Coming
Call it a security blanket for soldiers: GIs may someday march into battle
armed with a swatch of fabric rather than bulky electronics.
Computer scientists and textile experts are working together to weave
fabric with electronics that can assist the military in sound detection and
other useful applications.
Researchers at the University of Southern California and Virginia Tech have
developed a fabric woven with conductive wires and a cluster of seven
button-size microphones that can be used to detect the sound of remote
objects, like approaching vehicles.
"The fabric gives us the capacity to make very large computing systems with
integrated sensors and integrated power supplies and to do this very
cheaply with existing textile manufacturing capabilities," said Mark Jones,
a professor of electrical computer engineering at Virginia Tech.
A small circuit board attached to the fabric compares the sounds from each
microphone and uses algorithms to compute the direction the sound is coming
from.
That direction, called the line of bearing, is then reported by radio to a
laptop or PDA that the soldier carries.
Currently, pockets in the fabric hold the batteries that power the system.
In future models, the circuit board and batteries would be woven into the
material.
The fabric can be placed on the ground or hung from a tree in unsafe areas
like potential combat zones. The material could also be used to manufacture
tents or parachutes.
It's a cheaper and less cumbersome alternative to some of the mobile
detection systems the military uses now, which are usually mounted onto
trucks or jeeps, said Bob Parker, deputy director of USC's Information
Sciences Institute.
A prototype of the special fabric will be tested in November. Parker
estimated that the fabric will detect objects more than 100 meters away.
To build the prototype itself, researchers first had to find a weaver.
Until she received the e-textile project's unusual request, Dana Reynolds
had only woven scarves and decorative cloth.
"It was pretty scary because I have never dealt with weaving with wire and
I was clueless as to how it would behave," said Reynolds, who has been
weaving as a hobby for several years. "Actually, it's turned out to be
pretty easy."
Reynolds wove in about 24 strands of wire in each direction with light,
crocheted cotton thread. She wove three different layers of material: the
vertical wires are on the bottom, the horizontal wires are on the top, and
in between the two is a buffer layer. The buffer prevents the wires from
short-circuiting.
"I had to manually dig down through the layers and pull up one intersection
of the horizontal and vertical wires and hold them together temporarily
with a pin," Reynolds said. "They took those intersections and attached
whatever microphones."
She estimated that the whole process took several hundred hours --including
discussions with researchers, setting up the loom and doing the weaving.
She used 40 balls of crocheted thread plus the wires to create the
prototype. The next prototype will be larger, measuring 30 inches by 10 yards.
Mixing the old art with state of the art electronics is tricky because it's
still in the earliest stages of development.
"Textile folks and computer scientists have to learn to speak a common
language, and that's only begun to happen," Parker said. "They approach
problems from very different viewpoints."
A professor at North Carolina State University has developed a similar
project and sees e-textiles as a burgeoning industry.
"Look at the fabrics around you," said Abdelfattah Seyam, who teaches at NC
State's College of Textiles. "We have fabric on seats, carpets, wall
coverings. We have a really giant area covered by textile fabrics.
"There are millions of fibers in a little square of fabric. Taking some of
these fibers would be more than enough to form very advanced electrical
circuits," he said.
Seyam said existing textiles machines must be modified to incorporate
devices that can connect conductive fibers.
Once that's accomplished, the potential applications are numerous.
In the case of homeland security, if a person is carrying a weapon or
chemicals in an airport, carpets and wall coverings made of e-textiles
could identify them.
"Microphones, radio transmitters, sensors to measure pulse rate and body
temperature, GPS -- you can have all of that incorporated into fabric,"
said Anuj Dhawan, a PhD student in fiber and polymer science and electrical
engineering at NC State. The average soldier, then, "doesn't have to carry
electronic equipment and his mobility can be increased."
Eventually, e-fabric could be programmed to lift up a corner of the
material by itself and take a photo, or roll up and move on its own, Parker
said.
***************************
Wired News
Professor's Case: Unlock Crypto
Daniel Bernstein seems intent on striking the deathblow to U.S. government
regulations on cryptography.
The latest chapter in his decade-long battle began to unfold on Friday,
when lawyers representing both the Department of Commerce and Bernstein, a
University of Illinois associate professor of mathematics, statistics and
computer science, prepared to ask federal district court judge Marilyn Hall
Patel to grant a summary judgment. At stake: the last remnants of a system
that once prevented U.S. citizens from releasing software code that creates
secure, electronic communications.
Bernstein is trying to eradicate the last of the export laws that
previously kept Americans from distributing any work related to cryptography.
It's a bit confusing to some in the cryptography arena who feel that the
current laws allow anyone to distribute their programs without fear of
reprimand. Bruce Schneier, security expert and author of Applied
Cryptography, said the future battle over encryption won't be trying to
free software code, but rather preventing corporations from using it to
limit rights.
"We always thought about cryptography as being a tool to protect the little
guy versus the big guy," said Schneier. "It never occurred to us that the
Digital Millennium Copyright Act would get passed."
Even with the looming fight over the DMCA, many are still uncomfortable
with the court battle Bernstein continues to wage.
"When you empower people to do things, we empower them to do bad things,"
said Mike Godwin, staff council at the Center for Democracy and Technology.
"It's a hard problem: What do you allow people to do in a free society?
This is the hard part of democracy. You have to end up trusting people."
The problem, the government claims, occurs when the technology falls into
the hands of people outside democracies. Earlier this year, for example,
The Wall Street Journal bought a computer in Kabul, Afghanistan, that held
encrypted files. The news organization broke the security -- with the help
of the government -- revealing a wealth of information about al-Qaida
activities.
The security was relatively easy to break, since the al-Qaida operatives
who owned the computer used an off-the-shelf, 40-bit encryption program.
However, if they had used one of the newer, more powerful encryption
programs, those messages would likely have been lost forever.
That has been the heart of the government's fight to limit general access
to cryptography for the last 30 years. It does this by requiring people to
apply for a license called a commodities jurisdiction. Without this
license, nobody can export any cryptography product, which includes
publishing it on the Web -- and, for good reason, according to Stewart
Baker, an affable Washington lawyer with Steptoe & Johnson.
Baker, who was general counsel for the National Security Agency from 1992
until 1994, said there is strong evidence, for example, that World War II
was won because we had better cryptographers than Germany and Japan. Behind
tight security at Fort Meade, Maryland, the NSA has teams of mathematicians
and programmers working on the some of the world's most powerful
supercomputers, making and cracking codes.
Making the knowledge freely accessible to everyone, Baker said, takes away
one of the United States' strategic advantages.
Bernstein has repeatedly beaten back the government's attempt to restrict
cryptographic technology. But, Baker said, much of that battle was waged
during a different political climate.
"If it had come up 10 years later, this battle probably could have been
won," Baker said. "But even then it would have been a very hard battle
because there are so many valuable uses for encryption.... My guess is that
at the end of the day, we would have ended up here."
Here is a place where very strong public encryption technology is available
to the public, thanks to a handful of people, working in a loose collective
led by Dr. Whitfield Diffie. The group developed their own system for
secure communication that was so strong the NSA deemed it a threat to
national security to sell it commercially. That started an epic battle
between the government and the technology community, which is chronicled in
Steven Levy's book Crypto.
The legal flare-up began in 1995 when Bernstein filed suit against the
State Department, claiming the export laws that limited where academics
could publish their research were unconstitutional.
With the help of Cindy Cohn, now a staff attorney with the Electronic
Frontier Foundation, Bernstein successfully challenged the government's
ability to restrict publishing code. In 1999, Patel agreed with Cohn. Three
years later, the 9th Circuit Court of Appeals upheld Patel's ruling.
Since then, the government has eased restrictions on export technology,
although the government still maintains the right to limit certain exports.
*****************************
Wired News
Terror Turns Real for Horror Site
Matt Rexer admits that he was hoping to raise a little hell on his website.
But the sudden appearance this week of a message purporting to be from
Osama bin Laden, head of the al-Qaida terrorist network, on Rexer's Clive
Barker fan site truly spooked the horror film fan.
The message that turned up on Rexer's site congratulated the "... Islamic
world for the heroic operations of courageous jihad carried out by its
pious fighter children in Yemen, against the tanker of the crusaders, and
in Kuwait, against the American invasion and occupation forces," and was
signed "Osama bin Mohammad bin Laden, your brother."
Rexer's site isn't the only one forced to act as an unwilling al-Qaida
content host, according to online antiterrorist activist Andrew Weisburd.
Weisburd has been tracking the Web activities of terrorist organizations
for the last several months. He said that takeovers have occurred on at
least three other sites recently.
Rexer said he had no idea why his "geeky tribute to a horror movie series"
was selected as a home for a terrorist rant.
"I find it utterly bizarre that they'd bury their message in the middle of
a page that celebrates a decadent, sin-filled, Western movie series and
that also sports the word 'hell' all over the place," Rexer said.
Rexer's life was further complicated when a report by the AFP news wire
service appeared in newspapers around the world, pointing to islammemo.com
and Rexer's cenobite.com as the two websites that had posted bin Laden's
latest message.
After the story ran, Rexer's site started to get a lot of interesting new
visitors.
"It was not a fun experience at all," Rexer said. "It's both terrifying and
infuriating to check your site's log and see that suddenly a whole bunch of
your http_referrers are coming from Arabic anti-American sites."
The message didn't appear directly on Rexer's site, but could only be found
by accessing the site through a URL that led to the file where Rexer stored
images for the site.
Rexer only found out that his website had been altered when a French
blogger contacted him after reading the AFP story to ask about the unusual
contents of Rexer's site.
Rexer said that he discovered on Tuesday that his Web host company, Liquid
Web, had also (briefly) hosted alneda.com, a site listed as belonging to
the Center for Islamic Research that many believe is an al-Qaida
communication site.
The Alneda site has been attacked on a regular basis and currently bears
the message "Hacked, tracked and NOW owned by the U.S.A."
Rexer speculates that familiarity with the hosting company may have allowed
his site's attackers to exploit a security hole on its servers.
Liquid Web could not immediately be reached for comment.
Mike Sweeney, owner of networking consultant firm Packetattack, said it
appeared Rexer's user ID and password for the administrative side was
cracked, and the attackers probably used a well-known weakness on the Web
server to bypass security.
"This is not a site hijack but more of a parasite website," Sweeney said.
"You have the host website and then buried within it is a second website,
or the parasite site."
Sweeney said the attack could have easily been performed by someone with no
real technical skills using tools widely available online.
Rexer said after he discovered bin Laden's message lurking on his website
he quickly shut down access to the site, changed his password and informed
his Web hosting company of the problem.
"Liquid Web deleted the folder that contained the bin Laden garbage and
gave me the last IP to log into my account," Rexer said. "I used Visual
Traceroute's demo page to trace that IP to a German DirecPC.com user."
Sweeney said it was obvious from the tracks left behind that whoever
altered Rexer's site wasn't particularly skilled.
"Any hacker worth their bits would have cleared the log so there would not
be obivious traces of someone being there," Sweeney said. "Any IP that is
found there will probably be a cybercafe or a site that had been hacked and
then jumped from. Tracking it back probably won't really accomplish all
that much."
****************************
Reuters Internet Report
Police Experts Meet on Internet Child Porn
2 hours, 2 minutes ago
THUN, Switzerland (Reuters) - Police and criminologists from 34 countries
began a three-day meeting Tuesday aimed at combating crime against
children, especially pornography on the Internet (news - web sites),
officials said.
Some 85 experts are taking part in the talks which follow a series of raids
across Europe netting thousands of suspected pedophiles or customers of
online child pornography sites.
The specialized group from Interpol, the international policing
organization, links experts from Asia, the United States, Europe and Africa
and strives to keep up with rapid technological advances.
Makers of child porn on the Web leave few traces, making it difficult to
identify and prosecute them.
Interpol has gathered some 150,000 images of child abuse from all over the
world. It shares information with countries on previous cases, especially
those just joining the online age.
"It is very important that law enforcement (groups) share this information
so organizations which are new in this field don't have to start from the
beginning," said Anders Persson, Interpol criminal intelligence officer in
human trafficking.
Swiss Justice Minister Ruth Metzler told the meeting demand for child porn,
"with younger and younger children and harder scenes," was increasing.
"Morals know no boundaries and children are turned into cheap products.
According to Unicef (news - web sites), a million children are forced each
year into pornographic productions that generate $20 billion in sales," she
said.
*****************************
Reuters Internet Report
Internet Providers Snub UK Data Demands
Tue Oct 22,11:51 AM ET
By Corinne Amoo
LONDON (Reuters) - The Internet (news - web sites) industry dealt a blow to
Britain's tough anti-terrorism legislation on Tuesday by refusing to reveal
personal cyber-data to police.
It has turned down a request from Home Secretary David Blunkett to allow
police and intelligence officers to access the personal records of their
customers on request without the approval of a judge.
The government's plans have drawn fire from civil liberties campaigners.
"Millions of innocent users of telephone, email and internet will have
their private communications information and their movements stored on the
off chance it might be of use in the future," said Roger Bingham from
Liberty, a civil liberties lobby group.
Blunkett's anti-terrorism surveillance plans urge Internet providers to
store the personal information of British web and email users for longer
periods of time.
They also urge the Internet providers to make this personal information
accessible to intelligence and law enforcement agencies, without seeking
judicial approval.
"Data retention is not intended to infringe the privacy of the law-abiding
citizen but is designed to ensure that terrorism is in no way assisted by
the developing technologies," said a Home Office spokesman.
The Internet Service Providers Association (ISPA) are key players in the
dispute and have told their members not to comply with the government's
request, which they feel violates the Data Protection Act, 1998.
"We do not feel we can recommend Internet Service Providers voluntarily to
comply with the government's proposed code of practice," an ISPA spokesman
told Reuters.
"There are other laws such as the Regulation Investigatory Powers Act, 2000
where law enforcement agencies can ask for personal information on approval
by a judge."
******************
Sydney Morning Herald
Who controls your computer?
By Richard Stallman
Comment
October 22 2002
Who should your computer take its orders from? Most people think their
computers should obey them, not obey someone else. With a plan they call
"trusted computing," large media corporations (including the movie
companies and record companies), together with computer companies such as
Microsoft and Intel, are planning to make your computer obey them instead
of you. Proprietary programs have included malicious features before, but
this plan would make it universal.
Proprietary software means, fundamentally, that you don't control what it
does; you can't study the source code, or change it. It's not surprising
that clever businessmen find ways to use their control to put you at a
disadvantage. Microsoft has done this several times: one version of Windows
was designed to report to Microsoft all the software on your hard disk; a
recent "security" upgrade in Windows Media Player required users to agree
to new restrictions. But Microsoft is not alone: the KaZaa music-sharing
software is designed so that KaZaa's business partner can rent out the use
of your computer to their clients. These malicious features are often
secret, but even once you know about them it is hard to remove them, since
you don't have the source code.
In the past, these were isolated incidents. "Trusted computing" would make
it pervasive. "Treacherous computing" is a more appropriate name, because
the plan is designed to make sure your computer will systematically disobey
you. In fact, it is designed to stop your computer from functioning as a
general-purpose computer. Every operation may require explicit permission.
The technical idea underlying treacherous computing is that the computer
includes a digital encryption and signature device, and the keys are kept
secret from you. (Microsoft's version of this is called "palladium.")
Proprietary programs will use this device to control which other programs
you can run, which documents or data you can access, and what programs you
can pass them to. These programs will continually download new
authorization rules through the Internet, and impose those rules
automatically on your work. If you don't allow your computer to obtain the
new rules periodically from the Internet, some capabilities will
automatically cease to function.
Of course, Hollywood and the record companies plan to use treacherous
computing for "DRM" (Digital Restrictions Management), so that downloaded
videos and music can be played only on one specified computer. Sharing will
be entirely impossible, at least using the authorized files that you would
get from those companies. You, the public, ought to have both the freedom
and the ability to share these things. (I expect that someone will find a
way to produce unencrypted versions, and to upload and share them, so DRM
will not entirely succeed, but that is no excuse for the system.)
Making sharing impossible is bad enough, but it gets worse. There are plans
to use the same facility for email and documents -- resulting in email that
disappears in two weeks, or documents that can only be read on the
computers in one company.
Imagine if you get an email from your boss telling you to do something that
you think is risky; a month later, when it backfires, you can't use the
email to show that the decision was not yours. "Getting it in writing"
doesn't protect you when the order is written in disappearing ink.
Imagine if you get an email from your boss stating a policy that is illegal
or morally outrageous, such as to shred your company's audit documents, or
to allow a dangerous threat to your country to move forward unchecked.
Today you can send this to a reporter and expose the activity. With
treacherous computing, the reporter won't be able to read the document; her
computer will refuse to obey her. Treacherous computing becomes a paradise
for corruption.
Word processors such as Microsoft Word could use treacherous computing when
they save your documents, to make sure no competing word processors can
read them. Today we must figure out the secrets of Word format by laborious
experiments in order to make free word processors read Word documents. If
Word encrypts documents using treacherous computing when saving them, the
free software community won't have a chance of developing software to read
them -- and if we could, such programs might even be forbidden by the
Digital Millennium Copyright Act.
Programs that use treacherous computing will continually download new
authorization rules through the Internet, and impose those rules
automatically on your work. If Microsoft, or the U.S. government, does not
like what you said in a document you wrote, they could post new
instructions telling all computers to refuse to let anyone read that
document. Each computer would obey when it downloads the new instructions.
Your writing would be subject to 1984-style retroactive erasure. You might
be unable to read it yourself.
You might think you can find out what nasty things a treacherous computing
application does, study how painful they are, and decide whether to accept
them. It would be short-sighted and foolish to accept, but the point is
that the deal you think you are making won't stand still. Once you come
depend on using the program, you are hooked and they know it; then they can
change the deal. Some applications will automatically download upgrades
that will do something different -- and they won't give you a choice about
whether to upgrade.
Today you can avoid being restricted by proprietary software by not using
it. If you run GNU/Linux or another free operating system, and if you avoid
installing proprietary applications on it, then you are in charge of what
your computer does. If a free program has a malicious feature, other
developers in the community will take it out, and you can use the corrected
version. You can also run free application programs and tools on non-free
operating systems; this falls short of fully giving you freedom, but many
users do it.
Treacherous computing puts the existence of free operating systems and free
applications at risk, because you may not be able to run them at all. Some
versions of treacherous computing would require the operating system to be
specifically authorized by a particular company. Free operating systems
could not be installed. Some versions of treacherous computing would
require every program to be specifically authorized by the operating system
developer. You could not run free applications on such a system. If you did
figure out how, and told someone, that could be a crime.
There are proposals already for U.S. laws that would require all computers
to support treacherous computing, and to prohibit connecting old computers
to the Internet. The CBDTPA (we call it the Consume But Don't Try
Programming Act) is one of them. But even if they don't legally force you
to switch to treacherous computing, the pressure to accept it may be
enormous. Today people often use Word format for communication, although
this causes several sorts of problems (see
http://www.gnu.org/philosophy/no-word-attachments.html). If only a
treacherous computing machine can read the latest Word documents, many
people will switch to it, if they view the situation only in terms of
individual action (take it or leave it). To oppose treacherous computing,
we must join together and confront the situation as a collective choice.
For further information about treacherous computing, see
http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html.
To block treacherous computing will require large numbers of citizens to
organize. We need your help! The Electronic Frontier Foundation
(www.eff.org) and Public Knowledge (www.publicknowledge.org) are
campaigning against treacherous computing, and so is the FSF-sponsored
Digital Speech Project (www.digitalspeech.org). Please visit these Web
sites so you can sign up to support their work.
You can also help by writing to the public affairs offices of Intel, IBM,
HP/Compaq, or anyone you have bought a computer from, explaining that you
don't want to be pressured to buy "trusted" computing systems so you don't
want them to produce any. This can bring consumer power to bear. If you do
this on your own, please send copies of your letters to the organizations
above.
Postscripts:
1. The GNU Project distributes the GNU Privacy Guard, a program that
implements public-key encryption and digital signatures, which you can use
to send secure and private email. It is useful to explore how GPG differs
from treacherous computing, and see what makes one helpful and the other so
dangerous.
When someone uses GPG to send you an encrypted document, and you use GPG to
decode it, the result is an unencrypted document that you can read,
forward, copy, and even re-encrypt to send it securely to someone else. A
treacherous computing application would let you read the words on the
screen, but would not let you produce an unencrypted document that you
could use in other ways. GPG, a free software package, makes security
features available to the users; they use it. Treacherous computing is
designed to impose restrictions on the users; it uses them.
2. Microsoft presents Palladium as a security measure, and claims that it
will protect against viruses, but this claim is evidently false. A
presentation by Microsoft Research in October 2002 stated that one of the
specifications of Palladium is that existing operating systems and
applications will continue to run; therefore, viruses will continue to be
able to do all the things that they can do today.
When Microsoft speaks of "security" in connection with Palladium, they do
not mean what we normally mean by that word: protecting your machine from
things you do not want. They mean protecting your copies of data on your
machine from access by you in ways others do not want. A slide in the
presentation listed several types of secrets Palladium could be used to
keep, including "third party secrets" and "user secrets" -- but it put
"user secrets" in quotation marks, recognizing that this is not what
Palladium is really designed for.
The presentation made frequent use of other terms that we frequently
associate with the context of security, such as "attack," "malicious code,"
"spoofing," as well as "trusted." None of them means what it normally
means. "Attack" doesn't mean someone trying to hurt you, it means you
trying to copy music. "Malicious code" means code installed by you to do
what someone else doesn't want your machine to do. "Spoofing" doesn't mean
someone fooling you, it means you fooling Palladium. And so on.
3. A previous statement by the Palladium developers stated the basic
premise that whoever developed or collected information should have total
control of how you use it. This would represent a revolutionary overturn of
past ideas of ethics and of the legal system, and create an unprecedented
system of control. The specific problems of these systems are no accident;
they result from the basic goal. It is the goal we must reject.
Richard Stallman is the founder of the free software movement.
Copyright 2002 Richard Stallman
Verbatim copying and distribution of this entire article is permitted
without royalty in any medium provided this notice is preserved.
****************************
Broadband News Online
NGN 2002 Keynote: Cyber Security - Vulnerabilities, Threats, and Responses
The United States must prepare for a major attack on its networks at a
level that could bring down the economy, warned Richard Clarke, Special
Advisor to the President for Cyberspace Security, Critical Infrastructure
Assurance Office (CIAO), in a keynote address at the Next Generation
Networks conference in Boston . No one should assume that future attacks to
networks will be simply the worms, viruses and denial of service zombies
that we have experienced in the past. Al Qaeda, Iraq , or some other
terrorist group could target the basic mechanisms of the Internet, seeking
to disable or destroy key switches, routers and transmission facilities.
Too many vulnerabilities exist. Preparing for such a threat, argued Clarke,
is everyone's responsibility, not simply the role of government. He
believes that Internet security currently faces a "tragedy of the commons"
- everyone believes that someone else should be responsible for maintaining
and securing the common good. While the federal government played a key
role in creating the Internet, Clarke argued that the government should not
run or regulate the Internet. It should be an advisor to industry, a role
model and fund basic research.
Clarke shared nine specific security goals that he asked network equipment
vendors and service providers to work on:
Routers and switches must be designed with security in mind. Today, they
are generally shipped without security features activated, and most do not
use encryption and authentication.
Address the security vulnerabilities of BGP now
Address the security vulnerabilities of DNS now
Quickly adopt protocols that enhance security, especially IPv6. A world of
mixed IPv4 and IPv6 implementations actually increases the security threat.
Address the physical security of our networks, especially key sites and
fibers where the backbone is concentrated. Peering points and telecom
hotels are vulnerable. Real redundancy, diversity and protection are needed.
ISPs should not blindly pass off traffic to their peers. They have the
responsibility to know what is in the packets and not to hand off viruses
or attacks. We need technology that allows us to scan packets in real time
at high speeds.
We need a NOC system that can provide a real-time, holistic view of the
entire Internet. The industry could achieve this with some government
support.
We must get over the belief that segmenting networks is a "violation of
Internet religion." We need some air-gapped networks, such as for
utilities, aviation, banking, etc.
Security must be designed into systems from the beginning. It is not
acceptable to rush technology to market before finding and fixing the
vulnerabilities, or treating security as a difficult to use add-on.
Last month, the Bush administration announced a Draft National Strategy to
secure Cyberspace. The government is currently seeking input and commentary
from the industry and the general public. Clarke encouraged everyone review
and comment on the plan, which can be found at:
http://www.whitehouse.gov/pcipb/
*******************************
Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 510
2120 L Street, NW
Washington, D.C. 20037
202-478-6124
lillie.coney@xxxxxxx