[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips October 25, 2002
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, glee@xxxxxxxxxxxxx;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, akuadc@xxxxxxxxxxx;, computer_security_day@xxxxxxx;, waspray@xxxxxxxxxxx;
- Subject: Clips October 25, 2002
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Fri, 25 Oct 2002 10:37:32 -0400
Clips October 25, 2002
ARTICLES
Panel Says Terror Defenses Weak in Many Areas
IT spending forecast strong
Changes in store at Treasury
Legal Scholars and Library Groups Seek Clarification From Court [Fair Use]
Voting Machines Can't Help Disabled
Last Bell Tolls for Online School
Blind May Get Look at Digital Pictures
Forman: Turn policy into reality
Architecture for homeland security agencies coming together
Commerce official supports computer security office move [NIST]
Spam: Arriving en masse to an e-mail address near you
Met widens net for Bali terrorists
**************************
Washington Post
Report: U.S. Still Vulnerable
Panel Says Terror Defenses Weak in Many Areas
By John Mintz
Friday, October 25, 2002; Page A01
A prestigious task force led by two former U.S. senators has concluded that
the American transportation, water, food, power, communications and banking
systems remain easy targets for terrorists despite the government's efforts
at tightening the nation's domestic security in the past year.
The panel, sponsored by the private Council on Foreign Relations and
chaired by former senators Gary Hart (D-Colo.) and Warren Rudman (R-N.H.),
suggests that the task of protecting the nation is so complicated and
expensive that the government's multibillion-dollar efforts will barely
dent the problem.
The panel's report comes a week after CIA Director George J. Tenet warned
Congress that the terrorist threat is as grave now as it was just before
the Sept. 11, 2001, attacks.
"A year after 9/11, America remains dangerously unprepared to prevent and
respond to a catastrophic terrorist attack on U.S. soil," the commission
says. "In all likelihood, the next attack will result in even greater
casualties and widespread disruption to our lives and economy."
Among the looming crises that the task force says require immediate
attention are these:
? Only a minuscule fraction of the containers, trains, trucks and ships
entering the country are searched, which means the chances of detecting a
weapon of mass destruction are almost nil.
? The nation's 650,000 state and local police officers operate "in a
virtual intelligence vacuum" because they are denied access to terrorist
watch lists compiled by the State Department for use by U.S. immigration
and consular officials.
? Local police, fire and emergency medical personnel can't communicate with
each other in an emergency because their radios are incompatible, and they
lack the training and protective equipment in the event of a chemical or
biological attack.
? Numerous legal barriers exist that discourage major industries from
addressing security concerns: most private water systems avoid checking
water for signs of sabotage because of fear of litigation; and energy
business executives fear convening to discuss emergency back-up procedures
out of concern about antitrust litigation.
? The National Guard, trained mostly for deployment overseas, is
ill-equipped and ill-trained to respond to a major terrorist strike.
President Bush has proposed creating a Department of Homeland Security that
would consolidate the Immigration and Naturalization Service, the Customs
Service, the Coast Guard and many other agencies. An Office of Homeland
Security, headed by former Pennsylvania Gov. Tom Ridge, is working to
coordinate the functions of these agencies as Congress debates the creation
of the new department.
Ridge's office said yesterday that the new report is out of date and
doesn't recognize the administration's efforts. "We've been actively
implementing what we can, while waiting for Congress to act on the
president's homeland security proposals made in February, such as increased
funding for first responders, bioterrorism and critical infrastructure
protection," said Homeland Security spokesman Gordon Johndroe.
The panel's leaders said they do not intend to criticize the Bush
administration, but rather to focus the nation's attention on what they
consider a crisis.
"Starting from the point that nobody took any of this seriously [before
Sept. 11], the Bush administration has made an adequate start," Rudman said
yesterday. "But I think Tom Ridge and his staff have been so involved in
process, so distracted by the security alerts and by the pending
legislation, that they do have a ways to go. . . . Our message is, for
God's sake, do it."
Seven months before the suicide attacks in New York and on the Pentagon,
Rudman and Hart released a congressionally ordered report that warned that
the threat of terrorism was so severe that the government should create a
homeland security agency. The study received little attention, and some
members of Congress scoffed at it as an irrelevancy. But after Sept. 11,
2001, Bush used the recommendations as a blueprint in planning the new
homeland agency.
Besides Hart and Rudman, the other members of the 15-member task force
include former secretaries of state George P. Schultz and Warren
Christopher; retired Gen. John W. Vessey Jr. and retired Adm. William J.
Crowe Jr., both former chairmen of the Joint Chiefs of Staff; William H.
Webster, former director of the FBI and the CIA; and Harold Varmus, former
director of the National Institutes of Health.
One of the new panel's main points is that the government must act to
reduce the incentive for terrorists to act, not only by making it harder
for them to kill or destroy but also by minimizing the economic impact of a
terrorist strike.
The report cites the nation's 361 ports as examples. While the government
responded quickly to the hijackings of four jets in the Sept. 11 attacks by
tightening security for commercial passengers, it has made little headway
in inspecting the cargo at U.S. ports, the report said.
Since 43 percent of all maritime containers flow through only two ports,
Los Angeles and Long Beach, the cost to the economy of the detonation there
of a weapon of mass destruction would "bring the global container industry
to its knees," the report says.
Port officials estimate the cost of securing U.S. ports at $2 billion. Only
$92 million in federal grants has been authorized.
"This screams at us as a top national priority," said Stephen Flynn, the
task force's director and a former Coast Guard officer. "So few resources
are being expended on this."
Despite the millions of dollars earmarked to train and equip local fire,
police and emergency medical personnel, much more money needs to be devoted
to the task, the report says -- as of July, $2.6 billion in requests for
training and equipment for 18,000 local fire departments remained unfilled.
The report recommends that local, county and state law enforcement officers
be given access to the State Department's terrorist watch lists, which are
given to immigration and consular officials, so they will have a better
chance to keep track of the nation's 8.5 million illegal immigrants and
300,000 fugitive aliens. "When it comes to combating terrorism, the cops on
the beat are effectively operating deaf, dumb and blind," the report says.
Federal agencies need to act to free radio frequencies to allow police and
fire personnel to communicate in an emergency, and those personnel should
be provided with gear that will allow their different radio networks to
communicate with each other, the report says.
On another front, the task force notes that there is no agency that
corresponds to the Centers for Disease Control and Prevention in oversight
of the safety of the food supply, nor is there a communications network
among the states and the U.S. Department of Agriculture. "Confusion over
reporting obligations [and] who has jurisdiction . . . [promises] to
seriously compromise our ability to contain the consequences of attacks on
American crops and livestock," the report says.
There are not enough laboratories in the country to test water for
contamination, and many private water companies avoid testing for dangerous
contaminants because of fear of litigation, the report says.
That was only one of many instances in which the panelists proposed the
lifting of laws or regulations that discourage firms from joining the war
on terrorism. Energy executives, for example, fear that they will be sued
for antitrust violations if they develop industry-wide plans for responding
to attacks on the energy infrastructure, the report notes.
*****************************
Federal Computer Week
IT spending forecast strong
BY Judi Hasson
Oct. 24, 2002
It has been a very good year for information technology vendors in the
federal sector, and next year should be strong too, according to the latest
study by Input, a technology think tank.
Government IT spending continues to grow, according to Input. In fiscal
2002, the government spent $19.3 billion in the civilian sector alone. In
fiscal 2003, which began Oct. 1, the sector is expected to spend $20.5
billion and, in fiscal 2004, spending is estimated at $22.9 billion.
The projections are similar for defense spending too. In fiscal 2002, the
defense sector spent $17.8 billion. In fiscal 2003, it's expected to spend
$19.8 billion and in fiscal 2004, $21.8 billion.
The study said vendors have many opportunities to help government.
On the homeland security front, vendors can help government identify
solutions. In electronic government, they can present full solutions, not
quick fixes. In information assurance, they can make security a part of
every solution, and in procurement, they can track the preferred buying
vehicles, Input said.
"There are opportunities for vendors in all these areas," said Kevin
Plexico, Input's executive vice president, at the company's annual FedFocus
conference Oct. 23 in Reston, Va.
Still, chief information officers are well aware they must get the biggest
bang out of the government's buck.
"The last thing we want to do is create new costs," said Mayi Canales, the
outgoing acting CIO at the Treasury Department who spoke via a video
presentation.
***************************
Federal Computer Week
Changes in store at Treasury
BY Judi Hasson
Oct. 24, 2002
Fred Thompson, a longtime information technology official at the Treasury
Department, is leaving the federal government in the midst of a
reorganization that resulted in cuts to the IT staff.
Thompson, assistant director for consulting and marketing at Treasury's
Office of the Chief Information Officer, is the latest IT official to
announce his departure. Last week, Mayi Canales, the acting chief
information officer, said she was leaving her job in government effective
Oct. 25 to start a consulting business.
In an e-mail sent to his friends and colleagues on Oct. 24, Thompson said
he decided to end his 30-year federal career on Nov. 1 after 30 years in
the government. His first plan is to take a vacation in Hawaii and then
look for a job in the private sector.
"I appreciate the support and encouragement that I have gotten from my many
friends and colleagues at Treasury during my (almost) five years here as
well as during the 10 years that I served in the Internal Revenue Service,"
Thompson said in his e-mail.
A strong believer in making government an employer of choice for IT
workers, Thompson, working with the National Academy of Public
Administration, helped draft a study released last year of alternative pay
systems and other human resources issues. The study called for solving the
federal IT workforce crisis by using innovative programs such as
pay-banding and special salary rates; beefing up training programs; and
awarding bonuses.
It also called on agencies to offer a balanced work/life program and invest
the time and resources needed to implement change.
In another move, Mike Parker, currently the director of Enterprise IT
Business Planning and Assurance for Treasury's CIO office, will become the
interim acting CIO while officials look for a permanent candidate. Parker
began his tenure at Treasury as director of financial management for the
CIO office in 1999.
******************************
Chronicle of Higher Education
Legal Scholars and Library Groups Seek Clarification From Court on Software
Licenses
By ANDREA L. FOSTER
Washington
Law professors and academic-library groups are asking a federal appeals
court here to modify a recent ruling to make it clear that established
copyright provisions, like fair use, sometimes trump software-licensing
agreements that would otherwise narrow consumers' rights.
The case in question, Harold L. Bowers v. Baystate Technologies Inc.,
involves the shrink-wrap license on a piece of software Mr. Bowers created
to improve computer-aided-design software. Mr. Bowers, of Memphis, said
Baystate had purchased a copy of his software and then "reverse-engineered"
the product -- figuring out how it worked and then creating a similar
product for sale under Baystate's name.
Mr. Bowers told the court that Baystate had violated the terms of his
software's shrink-wrap license, which prohibits purchasers from
reverse-engineering the software. Such licenses are typically found inside
the box containing the software, and are printed on the envelope containing
the CD-ROM or disk. The U.S. Court of Appeals for the Federal Circuit
agreed in August that Baystate, based in Marlborough, Mass., had breached
its contract with Mr. Bowers.
Baystate had argued that the Copyright Act pre-empted the shrink-wrap
license's ban on reverse engineering, as well as other restrictions in the
license. Such restrictions prevent fair use of copyrighted material, the
company said.
The scholars who are seeking clarification from the court don't necessarily
agree with Baystate that the Copyright Act overrules Mr. Bowers's
shrink-wrap license. Rather, they say, they are concerned that the court's
decision is a "blanket rule" that shrink-wrap licenses "are never
pre-empted." Because the terms of the licenses are written by the sellers
and vary widely from product to product, the scholars are worried that the
licenses do not necessarily recognize longstanding assumptions of copyright
law, such as fair use.
Computer-science researchers are also concerned about the provision in Mr.
Bowers's license banning reverse-engineering, which the researchers say is
an important technique in their discipline.
"What we want is for the court to acknowledge the importance of
reverse-engineering, and to change its opinion so that it doesn't hold that
shrink-wrap licenses can automatically ban reverse-engineering," says Mark
A. Lemley, a law professor at the University of California at Berkeley. He
says reverse-engineering promotes scientific progress.Mr. Lemley wrote the
brief that was submitted to the appeals court last month on behalf of,
among others, the Association of Research Libraries, the American Library
Association, the Electronic Frontier Foundation, the U.S. Association for
Computing Machinery, and 33 professors of intellectual-property law.
The brief (requires Adobe Acrobat Reader, available free) states that the
court's ruling has repercussions that go beyond reverse-engineering. It
could mean that by using a shrink-wrap license at the behest of a
publisher, consumers waive all their privileges under the Copyright Act,
the brief reads.
"A scholar could lose his fair-use privilege to quote a novel ... A library
could lose its ability under the first-sale doctrine to lend books."
The argument is reminiscent of that made by academic-library groups that
oppose the Uniform Computer Information Transactions Act, or Ucita, a model
law intended to make software-licensing agreements uniformly enforceable in
all 50 states. (See an article from The Chronicle, September 13.)
Frederic M. Meeker, a Washington lawyer representing Mr. Bowers, declined
to comment on the case.
****************************
Washington Post
Voting Machines Can't Help Disabled
Lack of Staff Leaves New Technology Unusable for Now
By David Nakamura
Thursday, October 24, 2002; Page DZ03
Advocates for the disabled had hoped to unveil high-tech machines in the
general election to make voting easier for District residents who are blind
or have limited hand dexterity. But that will have to wait.
The 150 machines, costing $1.2 million, are in place. Volunteers needed to
operate the equipment are not.
Several advocacy groups were supposed to recruit the volunteers under a
court settlement this year of a lawsuit brought by the groups against the
D.C. Board of Elections and Ethics. The suit alleged that the city's
current balloting system requires many disabled people to have assistance
in the voting booth, denying them the right to cast ballots in private.
The city bought the machines, about 30 of which were used in demonstrations
during the September primary elections. The machines were demonstrated more
widely -- at all 140 polling places -- for the general election Nov. 5, but
the advocacy groups could not find enough volunteers to run them, officials
said.
So the machines will sit dormant this year. They are scheduled to be used
for actual voting in the presidential primary of May 2004.
"We weren't able to reach as many people as we'd hoped," said Linda
Royster, executive director of the Disability Rights Council of Greater
Washington. "We're unable to pull together enough volunteers to make the
demos worthwhile. The board will not assist or provide us with the people.
To be fair, it's not malicious on their part. They just don't have the people."
Under the court settlement, which affects more than 16,000 District voters,
the city was not required to recruit volunteers or train them for a
demonstration next month, city officials said.
However, the city will be responsible for recruiting and training in 2004.
Board of Elections spokesman Bill O'Field said city officials will try to
demonstrate and publicize the new machines before the 2004 primaries.
Using them, voters who can see but cannot read or write English will
receive audio instructions and make selections by touching a screen on a
desktop-size computer that can handle as many as five languages.
Sight-impaired voters or those with limited hand movement will receive
audio instructions and make their selections by pushing a button on a
separate electronic box attached to the computer.
Royster said her organization and the American Association of People With
Disabilities, another plaintiff in the lawsuit, could not offer a stipend
to volunteers this November. In contrast, the city will pay poll workers a
$100 daily stipend.
"Oh, how I wish," Royster said. "We are a very small nonprofit. We don't
have that kind of money."
Board of Elections officials said they will pay workers a stipend to
operate the new machines in 2004 but cannot afford a demonstration next month.
"We have always been on the same page," said Kenneth McGhie, general
counsel to the elections board. "We wanted further [voter] participation.
To that extent, [the new machines] are what we both wanted. The only thing
we ever disagreed on was the timing. The timing was a problem because we do
not have enough money."
Royster said that both nonprofit organizations asked members to volunteer
but that many people said they were too busy. She said she does not foresee
a problem getting the machines running by the 2004 primary.
The District will be the nation's only jurisdiction to use both the
optical-scan voting and computerized systems. The city replaced its
punch-card system with optical-scan balloting last year.
***************************
Wired News
Last Bell Tolls for Online School
MORRISVILLE, Pennsylvania -- Embattled cyberschool Einstein Academy is
slated to go offline for good.
On Wednesday the Morrisville school board voted overwhelmingly to revoke
Einstein's charter, potentially pulling the plug on a controversial academy
whose launch ignited a firestorm of political debate over virtual education.
Board President Ken Junkins said board members voted 8-0 in favor of
revoking the charter, with one abstention. "We felt that the problems with
the school were so great that the education of these students was
imperiled. There was more danger to these children from attending the
school than not attending," he said.
The decision comes after the board held two months of hearings prompted by
allegations of financial irregularities, mismanagement and numerous
violations of state education guidelines.
Einstein Academy started its second school year in September with
approximately 670 students, down from 2,700 at the beginning of the 2001-02
school year. Einstein's students are given a computer and free Internet
access, and receive all instruction and coursework online.
Junkins said that while parents testified at the hearings claiming both
satisfaction and concern about the school's effectiveness, the
"disenrollment of those 2,000 students speaks strongly." He said the
school's failure to provide services to special education students who
can't participate in public education -- a primary justification for
chartering the virtual school -- was its most glaring violation.
Einstein can appeal the decision, which would allow it to stay online until
the Pennsylvania Department of Education renders a decision, which usually
takes 30 to 45 days.
Calls made to Einstein for comment were not returned -- which may not be
surprising for a school without a leader.
According to Morrisville school superintendent John Gould, who helps to
oversee the school's operations, the school has had three chief executives,
including two in the past three months. Barry Delit, chairman of the board
of directors at Einstein, is now the de facto president.
Gould said Einstein hasn't received most of the funds the school district
had earmarked for it for this year because it failed to file the proper
paperwork, resulting in mounting bills and unpaid teachers.
Einstein was one of the first online schools in the state to receive a
charter. The school met with immediate opposition in the form of lawsuits
from school districts and school boards (PDF) that sought to shut down the
school because it could enroll students from across the state and was
operating outside the control of the Department of Education.
Junkins said Pennsylvania rewrote its cyberschool law in July to move
chartering authority from individual districts to the state board of
education, largely due to the experience with Einstein.
Nevertheless, Junkins said, he believes that "cybereducation has great
potential for the commonwealth."
Gould, who was instrumental in getting Einstein's charter approved, said
everyone involved has learned valuable lessons.
"We tell kids, 'It's good to learn from your mistakes,' and that's what
we're doing," he said.
****************************
Washington Post
Blind May Get Look at Digital Pictures
Technology Lets Users 'See' by Touch
By Mike Musgrove
Friday, October 25, 2002; Page E05
The National Institute of Standards and Technology unveiled a prototype of
an appliance yesterday that could one day help blind people "see" digital
images.
The device, which has been in the works for more than a year, translates
the images from a personal computer to a grid of 3,600 pins. The pins rise
from their normal position into a copy of the image, and users can "read"
that pattern with their fingertips.
Dubbed by its creators a "tactile graphic display," the appliance will now
spend another year or so getting road-tested by the National Federation of
the Blind, a 50,000-member advocacy group based in Baltimore.
At the heart of the prototype is a ten-year-old Hewlett-Packard "XY
plotter" -- a printer-like appliance typically used by engineers to graph
equations. Though the plotter was designed to produce its results as ink on
paper, the NIST team has re-engineered the device. An inspiration for the
invention was a "bed of nails" toy usually sold at novelty stores, in which
a flexible grid of steel pins can take the shape of a hand or anything
placed under it.
Marc Maurer, NFB president, said viewing images in this manner "is so
uncommon that it does not come naturally" at first. Maurer added that once
people learn how to use it, the device could be a useful tool for students
in thousands of schools for the blind.
John Roberts, leader of the project at the NIST, estimated that the device
could start at about $2,000 when it eventually debuts on the market. While
the device now can be used to communicate large shapes to blind people,
Roberts said he hopes to eventually tweak the product to enable the blind
to effectively "see" digital pictures this way.
Deputy Commerce Secretary Sam Bodman, who was on hand to unveil the device,
said that blind people tend to have lower incomes and that 70 percent of
Americans with disabilities are unemployed, he said. Tools such as the
NIST's new graphic display have "the potential to change the income pattern
of this sector of society," he said.
"This looks like Texas," Curtis Chong, director of technology at the NFB,
said as he passed his fingertips over the device, which was displaying an
outline of the Lone Star State.
"This would be great for geography class. That's one I used to fail all the
time," he joked.
The announcement was timed as part of National Disability Employment
Awareness Month and the NFB's National Meet the Blind Month.
****************************
Federal Computer Week
Forman: Turn policy into reality
BY Judi Hasson
Oct. 24, 2002
One year away from the congressional mandate calling for federal agencies
to offer digital forms and accept electronic signatures, and it still isn't
clear whether the government will meet the deadline, according to Mark
Forman, the federal e-government chief.
Forman said government is still "thinking in terms of passing paper."
However, he said the issue is not just achieving a paperless system, but
eliminating the redundancies in government agencies that produce a plethora
of similar electronic forms that citizens and businesses must fill out.
During the coming year, Forman said agencies would have to turn policy
initiatives into reality, including the Government Paperwork Elimination
Act, which goes into effect in October 2003.
"We cannot think of IT just in terms of IT anymore," said Forman, assistant
director for information technology and e-government at the Office of
Management and Budget.
In the past, vendors took one solution and sold it many times over to many
departments. Now, the drive is to find one solution and integrate it
throughout government, he said.
"We are no longer going to buy one solution multiple times," he said.
"There are dramatic implications for not buying multiple times."
Agencies will have to make a credible business case to purchase information
technology. And they will have to provide real milestones, not just say
"they will fix it" once the contract is in place, he said.
Speaking at the Input FedFocus 2002 conference in Reston, Va., Oct. 23,
Forman told vendors that they are "the engine of our innovations."
He also said government would continue working with the Government
Information Security Reform Act even though the law is expected to expire
next month and Congress has not yet extended it.
GISRA calls for agencies to do annual self-assessments of their security
management practices and submit a report to the Office of Management and
Budget.
In addition to submitting an annual report to Congress on agencies'
compliance with GISRA, OMB is using the law as an important management
enforcement tool for the White House.
**************************
Federal Computer Week
Forman: Turn policy into reality
Although the debate over creating a Homeland Security Department is stalled
in Congress, officials have quietly drawn up a list of their top priorities
to jump-start the agency if and when lawmakers approve it.
Jim Flyzik, a senior adviser at the Office of Homeland Security, said Oct.
23 that the first priority would be consolidating the 58 government watch
lists of suspected terrorists into one list.
One of many errors disclosed in the wake of last year's Sept. 11 terrorist
attacks was that the names of suspected terrorists had been available on
one classified watch list, but the information was not shared with other
agencies that might have been able to stop the terrorists before they
entered the United States. "How fast we can move depends on the
legislation," Flyzik said, referring to the stalemate over labor issues and
the bill that would create a new department, moving 22 departments or parts
of agencies under its umbrella.
"Right now, we do not have that money in the bank," Flyzik told attendees
at the annual Input FedFocus conference in Reston, Va.
Nevertheless, Flyzik and agency chief information officers have been
meeting every Thursday to hammer out a plan for the new department. In
addition to consolidating the watch lists, he said officials hoped to develop:
* A single portal for the agency.
* Secure videoconferencing for federal, state and local officials.
* Secure Internet expansion so law enforcement across the country can share
information.
* A classified collaborative environment.
"This is not about Washington, D.C., and the federal government. This is
about a national effort," Flyzik said. "The goal is to get the right
information to the right people at the right time."
****************************
Federal Computer Week
Roster Change
Oct. 22, 2002
Mayi Canales, the acting chief information officer at the Treasury
Department, is leaving her government job Oct. 25 to start a consulting
firm. The company will do strategic planning and contract management,
focusing on both federal and state customers.
For more, see "Treasury CIO headed to industry"
***
Gary Christopherson, CIO at the Veterans Health Administration, has stepped
down following a reorganization that stripped him and two others CIOs of
the authority to make independent information technology decisions.
In a memo to his staff, Christopherson said he would become a senior
adviser effective Oct. 21, working on HealthePeople, a project across
several federal agencies.
Robert Kolodner, a psychiatrist who has worked for the Department of
Veterans Affairs for more than 20 years, will replace him as acting deputy
CIO for the VHA.
For more, see "VHA CIO loses power, leaves job"
***
Paul Schneider has joined the National Security Agency as a senior
acquisition executive, NSA officials announced Oct. 8. Schneider will be
leading the agency's efforts in acquisition reform.
He brings to NSA more than 35 years of acquisition-related experience
within the defense arena. He previously was with the Navy, serving as the
principal deputy assistant secretary of the Navy for research, development
and acquisition.
**************************
Government Computer News
Navy gets more time for intranet rollout
By Dawn S. Onley
GCN Staff
The Senate passed a bill last week extending the $6.9 billion Navy-Marine
Corps Intranet contract from five years to seven years.
Introduced by Rep. Tom Davis (R-Va.), chairman of the House Government
Reform Subcommittee on Technology and Procurement Policy, the bill gives
the Navy more time to prepare and implement NMCI before the agency decides
whether to continue the contract during the three one-year option years.
"Davis and a number of bipartisan colleagues introduced the legislation to
authorize an extension of the NMCI contract because they believe this is an
extremely important project that would be jeopardized without the
extension," said David Marin, spokesman for Davis.
The bill is awaiting approval by President Bush.
A Navy official said the extension would not affect the contract costs.
Electronic Data Systems Corp. is the lead vendor.
"They can amortize their costs, and we can decide whether we want to deal
with the option years," the official said.
For months, the Navy has lobbied for legislators to extend the contract
beyond the five-year base period to give the Navy time to use NMCI before
officials were forced to consider entering into the contract's option periods.
Although the contract was awarded in October 2000, it has suffered from
delays partly attributable to Office of Secretary of Defense testing
demands and to cutover problems at some sites because of tens of thousands
of legacy applications, Navy officials said.
The Navy had anticipated having 100,000 seats cutover to the NMCI
environment at this point in the contract. They have 39,000 seats cutover.
NMCI is an enterprisewide system that will link voice, video, and data
communications throughout the Navy Department.
***************************
Government Computer News
Architecture for homeland security agencies coming together
By Jason Miller
Technology officials in the White House's Office of Homeland Security
transition planning office have detailed the IT platforms for all 22
agencies that would be included in the new Homeland Security Department.
Jim Flyzik, senior adviser to Homeland Security director Tom Ridge,
yesterday said his team finished the technical reference model and an
application inventory for all the proposed agencies that could move into
the new department. The technical reference model outlines the technology
used to support the business lines.
Flyzik said much of this system architecture work would help the new agency
start work immediately, which will be 90 days after Congress passes the
legislation. Congress and the administration are at odds over work force
issues and Flyzik said he believes the time frame of the legislation
passing depends on which way the Senate goes in the November election.
"Unlike most mergers where there is a buyer and a buyee, this is an actual
start-up," Flyzik said. "We have broken up our mission into short-term
projects and Day 1 projects."
The enterprise architecture approach Flyzik's team is taking will let the
department finish four initiatives during the transition period. The
projects include:
Consolidating the criminal and terrorist watch lists
Deploying a Homeland Security Department portal
Setting up secure videoconferencing
Setting up secure Internet expansion to share information with state and
local authorities.
Flyzik delivered the keynote address at the FedFocus 2003 conference
sponsored by Input of Chantilly, Va., in Reston, Va.
*******************************
Government Executive
Commerce official supports computer security office move
From National Journal's Technology Daily
Despite opposition to the idea from the technology industry, a senior
Commerce Department official voiced support last week for a proposal to
transfer the Computer Security Division of the National Institute of
Standards and Technology to the Homeland Security Department.
"There's no doubt that the new ... department will require technical
competence and the encryption of computer information," Deputy Secretary
Samuel Bodman said in an interview, noting that the division specializes in
those areas.
"Therefore, having that groupor a group that does that kind of workas part
of a Department of Homeland Security makes every sense and probably should
take place."
The House-passed homeland security bill, H.R. 5005, would block the
transfer, and industry lobbyists have argued that the Senate version should
be amended to do the same.
In a recent letter to Senate leaders, Business Software Alliance President
Robert Holleyman said the transfer is unnecessary.
***************************
Computerworld
Spam: Arriving en masse to an e-mail address near you
By Brian Fonseca and Cathleen Moore, InfoWorld
OCTOBER 24, 2002
Shifting from daily nuisance to serious IT and business concern,
uncontrolled spam is prompting customers to arm themselves with tools to
fight back against productivity loss, potential liability and
bandwidth-clogging consequences that unsolicited commercial e-mail can
bring to an enterprise.
Targeting a growing concern on the antispam battlefront, IronPort Systems
Inc. yesterday introduced technology designed to prevent legitimate e-mail
messages from being weeded out by antispam filters.
IronPort rolled out two e-mail delivery appliances based on the company's
Virtual Gateway technology, which allows users to assign a specific
outbound IP address to each message based on campaign or message type. The
technology, in essence, creates a separate virtual machine for each
mailing, separating critical transaction confirmation messages from other
marketing messages that might be snared by a spam filter, according to
Scott Banister, chairman and chief technology officer of IronPort, in San
Bruno, Calif.
"Companies are finding that if they send out e-mail marketing newsletters,
increasingly Internet service providers are deploying antispam systems that
often inadvertently trap messages that are legitimate," Banister said. "No
one wants to be throwing out babies with the bath water."
IronPort's Virtual Gateway ensures that even if a marketing message is
trapped by a filter, other traffic being sent from the same infrastructure
will be unaffected, he said. The two new delivery appliances, the A60 and
A30, are designed for high- and low-volume requirements, respectively.
Similarly, Postini Inc. and BrightMail Inc. last week introduced new
antispam products and services designed to help end users restore normalcy
to workplace operations being hampered by hundreds upon thousands of e-mail
messages targeting random in-boxes and servers over the Internet.
In fact, most corporate customers and service providers are oblivious to
the massive amount of spam proliferation caused by automated e-mail address
"harvesting" over the Web, said Joyce Graff, vice president and research
director of Stamford, Conn.-based Gartner Inc.
Spam "is burning your resources; it's keeping your message transfer agent
busy doing stupid things; it's clogging bandwidth, clogging disk space and,
most important, stealing people's time," said Graff. "Even more important,
it's creating a very upset work environment."
Graff said tools capable of launching a myriad of spam-related attacks are
becoming readily available over the Internet. This enables even beginners
to send out spam and fuels con artists to perpetrate hoaxes, identity
theft, fraud, bulk junk mail and mass-market advertising. Spammers can
easily set up and dispose of multiple free e-mail accounts to hide their
tracks.
According to Graff, many spam attacks bombarding enterprises feature
increasingly vulgar and insensitive content. This raises the question of
whether a company is legally responsible for blocking inappropriate spam
messages viewed by its employees.
Postini customer Lee Rocklage, IT manager at Redwood City, Calif.-based DPR
Construction, estimated that about 40% of his company's daily e-mails at
one time were spam. Before deploying Postini's Security Manager product, he
noted that offensive e-mail proved a major distraction and was "the biggest
complaint" from his employees.
"It became a concern," said Rocklage. "We're a service-oriented company,
and having to sort through all of the unnecessary e-mails each morning to
identify those that were important or required a quick response can be very
time-consuming."
Last week, Postini announced the availability of Postini Perimeter Manager,
Postini Security Manager and Postini Resource Manager, three new service
offerings to heighten e-mail protection against spam, viruses and directory
harvest attacks.
BrightMail, which offers a software license as well as a services model,
made noise on the spam battlefield last week with the launch of BrightMail
Anti-Spam 4.0 Enterprise Edition. Designed to support Microsoft Windows
2000 and Sun Solaris environments, the new version can remove randomness
inserted by spammers in the header of an e-mail message body to reduce
polymorphic spam attacks and can generate rules against slightly altered
attacks, said Ren Chin, director of product development at San
Francisco-based BrightMail.
Albert Rodriguez, president of Ann Arbor, Mich.-based ImageMaster Financial
Publishing, said the annoyance of unwanted e-mails forced him to seek out a
product such as SurfControl's Anti-Spam Agent, which could not only filter
spam, but also provide his staff with the ability to flag or isolate
e-mails for further inspection.
"The product is blocking spam, but it's doing it by allowing us to have
control of exactly what comes through and what doesn't. If it weren't for
that, we wouldn't have gotten it," said Rodriguez, who said a queue has
been set up to flag key phrases, Web addresses and redirection attempts.
Graff said it is critical that customers stay away from generating false
positives that could prevent legitimate business or e-mail messages from
getting through even if it appears off-color.
Toward that concept, IronPort offers a Bonded Sender program, designed to
integrate with the appliances, which lets companies use a financial bond to
stand behind valid e-mail messages. Described as a kind of first-class
postage stamp for e-mail, the Bonded Sender service signifies to Internet
service providers and corporations that the message sender has a legitimate
business relationship with the recipients, Banister said.
*****************************
USA Today
Former professor found guilty of attempting to seduce minor online
SANFORD, Fla. (AP) A former professor at the University of Central Florida
has been found guilty of attempting to seduce a 12-year-old girl.
Jurors needed about two hours Thursday to decide that Madjid Belkerdid, 49,
knew his partner in online explicit chat sessions was underage. Belkerdid,
who will remain at Seminole County Jail without bond until his Dec. 2
sentencing, faces up to five years in prison.
During closing arguments, defense attorney Arthur Baron said Belkerdid
believed an adult was behind the lusty conversation. Baron also suggested
computer evidence had been tampered with.
In a conversation that was taped and played for jurors on the opening day
of the trial, the girl tells Belkerdid that she was 13 and asked him if
that mattered. Belkerdid went ahead with plans to meet the girl in a park,
where he was arrested by police.
Belkerdid, an electrical engineering professor, resigned from UCF shortly
after his 1999 arrest.
****************************
Guardian Online
Met widens net for Bali terrorists
Lewis Williamson
Friday October 25, 2002
The Metropolitan police has turned to the internet in the search for
information about the terrorist bombings in Bali.
In a bid to reach travellers who may have been on the Indonesian island at
the time of the attack on October 12, an appeal for information has been
launched through the web-based email services Hotmail and Yahoo.
The services are popular with travellers because they enable users to
access their inboxes from internet cafes anywhere in the world.
Metropolitan police press officer Angie Evans said it was the first time
the Met had used such a method to reach possible witnesses.
"It's a unique situation and it is possible that people who were in Bali at
the time of the attacks and may have useful information have now moved on
to other parts of the world," she said.
The police appeal appears only in the email accounts of users who signed up
for Yahoo and Hotmail in the UK, but it will be seen by those users
wherever they are when they access their email.
The appeal says that officers are keen to speak to anyone who has returned
from Bali in the last few days "and believes they may have seen something
suspicious", particularly in the Kuta beach resort where the explosions
occurred.
People with "home video footage or photographs" of the area are also urged
to get in touch on a free hotline number.
However, one possible flaw in the appeal, which was launched on Monday, is
that there is no email address for users to reply to.
Ms Evans said there was as yet no information about the response to the
strategy or the number of click-throughs to the appeal from Hotmail and Yahoo.
***************************
Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 510
2120 L Street, NW
Washington, D.C. 20037
202-478-6124
lillie.coney@xxxxxxx