[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips December 3, 2002
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, glee@xxxxxxxxxxxxx;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, akuadc@xxxxxxxxxxx;, computer_security_day@xxxxxxx;, waspray@xxxxxxxxxxx;
- Subject: Clips December 3, 2002
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Wed, 04 Dec 2002 15:20:03 -0500
Clips December 3, 2002
ARTICLES
Judge Orders Madster to Pull the Plug
Digital copyright trial opens in S.J.
Brokerage Firms Fined $1.6 Million
Content discontent - Colleges shocked to discover servers helped speed
porn, gaming sites
FTC Settles Fake Web Case for $300,000
OMB finds security leverage
Infiltrating agency ops
E-gov agenda takes shape
New opportunities for NIST
Homeland agency charged with outreach
Navy taps service's e-gov advocate as new CIO
Homeland defense commander stresses 'need to share' information
New Jersey's CIO resigns
Parents, athletes put GPS to work
A Move to Muzzle E-Mail
*****************************
Los Angeles Times
Judge Orders Madster to Pull the Plug
By Jon Healey
December 4 2002
Stiffening the pretrial restraints he imposed in October, a federal judge
has ordered the operator of the Madster file-sharing service to disable all
computers he controls and pull the plug on his Internet services immediately.
U.S. District Judge Marvin E. Aspen issued the order after Madster,
formerly known as Aimster, did not comply with his earlier injunction
against piracy on its system. The major music and movie firms are suing
Madster creator John Deep and the firms he controls in Troy, N.Y., for
alleged copyright infringement.
Aspen said the restraints, which he applied Monday, would remain in place
until Dec. 22. He also scheduled a hearing Dec. 19 to determine whether to
find Madster in contempt for failing to comply with the October injunction.
*****************************
Mercury News
Digital copyright trial opens in S.J.
By Howard Mintz
A San Jose jury Tuesday was given two starkly different images of the small
Russian software firm at the heart of a precedent-setting test of a
controversial federal copyright law.
During opening statements in U.S. District Court, federal prosecutors
depicted Moscow-based ElcomSoft as a digital pirate out to undermine a
popular copy-protection scheme sold by Adobe Systems. They said ElcomSoft
deserves to be the first defendant charged with violating the criminal
provisions of the 4-year-old Digital Millennium Copyright Act.
``This case is about selling a burglar tool for software in order to make a
profit,'' Assistant U.S. Attorney Scott Frewing told jurors.
But ElcomSoft's lawyers offered an alternate theory on the first day of a
trial being closely watched by cyberlaw experts. When the trial is over,
ElcomSoft attorney Joe Burton promised, the jury will view ElcomSoft as
just another Internet entrepreneur that believed it was marketing
innovation, not violating U.S. law.
``This case is about two companies, a new software industry and a new
law,'' Burton said. ``ElcomSoft and Adobe were both companies that believed
in good faith that the actions they took were appropriate, proper and legal.''
Prosecutors have accused ElcomSoft of illegally selling a software program
that allowed users to copy and distribute electronic books protected by
Adobe's eBook Reader. E-book retailers including Amazon.com and
Barnesandnoble.com rely on Adobe's program to control sales and
distribution of e-books.
Attracting attention
The case has attracted widespread attention since July 2001, when federal
agents arrested Dmitry Sklyarov, an ElcomSoft programmer, at a Las Vegas
conference where he was praising the company's technology. Prosecutors
broke new ground by charging Sklyarov and ElcomSoft under the DMCA, a law
that has been criticized by Internet rights groups and academics who warn
that it is overly broad and threatens the free flow of information in
cyberspace.
U.S. District Judge Ronald Whyte, in a decision that could have major
implications for the copyright law in future cases, has upheld the
constitutionality of the DMCA. The law was enacted to stiffen copyright
protections for a host of industries worried about the Internet's impact on
their ability to prevent computer piracy.
The government dropped charges against Sklyarov, but he is expected to be
one of the star witnesses during the trial, and may testify as early as
Thursday. The company, if convicted, could face millions of dollars in
fines. It earned only several thousand dollars from the product at issue.
Alexander Katalov, ElcomSoft's chief executive officer, also is expected to
testify. He declined through his lawyer to discuss the trial.
In remarks to the jury Tuesday, Frewing outlined the case in simple terms,
saying ElcomSoft ignored warnings from Adobe in June 2001 that it was
marketing a product that undermined U.S. copyright protections. Frewing
told the jury that the sole purpose of the ElcomSoft program, which
unscrambled the encryption codes in Adobe's software, was to allow illegal
copying of e-books.
Legitimate tool?
But Burton, ElcomSoft's lawyer, insisted that ElcomSoft openly marketed the
program because the company considered it a legitimate tool for e-book
customers to gain more flexibility in using what they bought. Burton said
there is no evidence that anyone used ElcomSoft's program to copy and
distribute e-books illegally.
The jury, to convict ElcomSoft, must find that the company intended to
skirt federal copyright laws.
The government's first witness in the case was Thomas Diaz, an Adobe
official involved in developing the eBook Reader. The trial resumes today
with his testimony.
******************************
New York Times
December 4, 2002
Brokerage Firms Fined $1.6 Million
By GRETCHEN MORGENSON
Regulators fined five of the nation's largest brokerage firms yesterday for
failing to preserve internal e-mail communications as required under
securities laws.
The Securities and Exchange Commission, NASD and the New York Stock
Exchange announced joint actions against Deutsche Bank Securities; Goldman
Sachs; Morgan Stanley; Salomon Smith Barney; and U.S. Bancorp Piper
Jaffray. Each firm was fined $1.65 million and was told to review
procedures to ensure that record-keeping practices comply with regulations
in the future. All the firms settled the actions without admitting or
denying the accusations.
The fines, which total $8.25 million, are the largest ever in a
record-keeping case, regulators said.
"The message here to our member firms is the form of the communications
doesn't matter, it's the substance," said Barry Goldsmith, executive vice
president for enforcement at NASD, "and that the rules requiring
broker-dealers to keep those records apply to e-mails and will be enforced."
Securities laws require that brokerage firms preserve electronic
communications related to the business of the firm for three years. Such
messages must be kept in an accessible place for two years.
But during the investigations into analyst practices on Wall Street and the
firms' allocation of hot new stock offerings to favored clients, securities
regulators began to see how haphazard the retention of e-mail messages was
at some brokerage firms.
For example, regulators found that some firms discarded, recycled, or wrote
over the e-mail tapes that should have been kept, sometimes after less than
a year. While some firms relied on their employees to preserve copies of
their e-mail messages on their computers' hard drives, there were no
systems in place to ensure that the e-mail messages were in fact
maintained. In some cases, the hard drives of computers used to preserve
e-mail messages were erased when an employee left a firm.
In recent years, securities firms have argued to regulators that retaining
e-mail messages is too onerous and that it is unclear which messages have
to be kept. The firms have also been lobbying Congress to exempt e-mail
messages from the records that must be maintained under securities laws.
But the S.E.C. reaffirmed its position in November 2001 that e-mail
messages are among the documents that must be preserved.
Stuart Kaswell, general counsel of the Securities Industry Association,
said in a statement yesterday: "We hope this settlement paves the way for a
final resolution to the record-keeping challenges that are currently
confronting the industry. These challenges include clarifying the vague
`business as such' standard applicable to communications so as to more
precisely define which internal e-mail communications a firm must retain."
But several regulators rejected any notion that the law was imprecise.
Linda C. Thomsen, deputy director of enforcement at the S.E.C., said,
"Everyone is free to try and change the existing law, but until it is
changed you are obliged to comply with it."
One person involved in the investigation said: "What was disturbing here
was not that someone made a good faith determination of a rule and was
maybe wrong in how they interpreted it. They didn't like the rule and they
were talking about changing it and in the meantime they just did not comply."
Regulators involved in the case were careful to say that the brokerage
firms had failed to comply with the law, not that they had deliberately
destroyed documents. But the regulators said cases would be brought against
firms if evidence of the destruction of e-mail messages surfaced in any of
the continuing Wall Street investigations. Intentional destruction of
e-mail messages could result in suspension or expulsion from the securities
industry.
All five firms said they were pleased to have resolved the matter. A
spokeswoman for Salomon said, "This settlement resolves a complex
regulatory issue that has been the subject of much discussion with
regulators in recent years."
A Piper Jaffray spokeswoman said that while the firm did retain large
volumes of e-mail messages, its retention procedures were deemed inadequate.
Andrew S. Duff, the president and chief executive of Piper Jaffray, said,
"We are confident that our current e-mail procedures and enhanced software
fully meets all of the regulatory requirements for e-mail retention.".
A Deutsche Bank Securities spokesman said the firm was improving its
systems to ensure future compliance.
*****************************
Boston Globe
Content discontent
Colleges shocked to discover Akamai servers on campuses helped speed porn,
gaming sites
By Peter J. Howe, Globe Staff, 12/4/2002
Akamai Technologies, the Cambridge Internet company, is using server
computers installed on networks at university campuses to help deliver
content for teen-pornography Web sites and offshore gambling sites whose
legality is in question.
Under a partnership intended to give schools faster, cheaper Net access
while they defray some of Akamai's operating costs, Akamai has installed
devices to speed delivery of Web sites to millions of Net users at schools
including the Massachusetts Institute of Technology, the University of
Massachusetts, Babson College, Brown University, Dartmouth College, the
University of Vermont, and Wesleyan.
Besides carrying content from Web sites such as Boston.com and CNN.com,
research by the Globe found that the on-campus computers are also storing
images for many explicit porn sites. The campus servers are also in many
cases speeding content from gambling sites such as casinoonet.com and
playbigcasino.com that have located their main computers outside the United
States because many state and federal prosecutors expect the sites violate
US and state laws, although their legality has not been fully established.
Officials at several schools said they were surprised to learn the servers
on their campuses were being used this way and were looking into whether
these types of content violated the terms of their contracts with Akamai.
Babson spokesman Michael Chmura said last night the Wellesley college was
assured by Akamai that it was winding down its business with porn and
gambling sites.
''We're going to monitor them to see if they do get out of these contracts.
Hopefully, they will, and if they don't, we will ask them to remove the
servers,'' Chmura said. ''We don't want to have them here with that kind of
content, and we don't want to do business with them if that's the kind of
content they're going to have on these servers.''
James D. Bruce, vice president for information systems at MIT, one of
Akamai's earliest business partners, also said he had not known about the
porn or gambling sites.
''I'd prefer it not be here, if I knew a way to filter out things that are
inappropriate, but it gets us into the whole First Amendment issue, which
is very slippery,'' and also runs up against MIT's commitment to the free
exchange of ideas.
Rosio Alvarez, associate chancellor for information technologies at
UMass-Amherst, said officials there were investigating ''information about
possible objectionable material being facilitated through the campus's
network.''
Alvarez said UMass officials were examining ''the terms of our contract
with Akamai to determine whether there have been any violations of campus
policy,'' but noted: ''As a campus, the university maintains an open
network, and does not monitor or control content.''
Akamai spokesman Jeff Young said yesterday that pornography and gambling
sites each represent no more than ''a fraction of 1 percent'' of Akamai's
more than $100 million in annual revenue.
Young said Akamai is winding down its contracts with the gambling sites and
is not actively seeking new business from what he called ''adult content
sites,'' including one that advertises ''the Web's youngest teen girls'' in
sex acts.
Akamai, which was founded in 1998 and once was one of the stars of the
local Net boom, operates a global network of more than 12,000 server s that
speed the delivery of Web content by storing it closer to Web surfers.
Akamai has servers on 1,100 networks in the United States and 65 countries.
Instead of going through a half-dozen Web connections to download content
that may originate several states or countries away, the Akamai service
stores frequently downloaded content on thousands of widely distributed
machines so users get it on their computers more quickly.
To a larger extent than most of its competitors, Akamai uses servers
installed in college, university, and school district computers as part of
that network, serving both students and computer users outside the
universities.
The upside for the schools is that on-campus users get much speedier access
to Web sites, and the schools can save thousands of dollars by paying for
much less ''bandwidth,'' or Internet traffic capacity, to connect to the Net.
Issues about what kinds of content are being delivered from public and
private higher-education networks by Akamai were raised with the Globe by
Internet industry sources who have both moral concerns and in some cases
financial ties to companies that compete with Akamai. The sources asked not
to be identified.
Kurt Schwartz, chief of the criminal bureau in Attorney General Thomas F.
Reilly's office, said the issue of whether it is illegal for Massachusetts
residents to do business with online gambling sites is an unresolved question.
Three Massachusetts laws appear to cover the issue of online gambling. But
one state law banning the use of telephones to register bets has not been
tested in court to see whether it applies to the Internet, Schwartz said.
Stressing that he was speaking in general terms and not specifically about
Akamai, Schwartz said: ''As part of a criminal case, you would have to
prove that the defendant was keeping a place with apparatus for registering
bets. We would have to look and see what was on the computer here in
Massachusetts.''
Akamai's Young said the company does business with only three gambling
sites, which operate under multiple names, and in each case it only
delivers images and text for the sites, which makes them work more speedily
for online gamblers. ''We do not and have not ever operated any online
gaming transactions'' such as credit-card charges or payoffs on winnings,
Young said.
Chad Couser, a spokesman for Cable & Wireless, a London-based global
telecom company that is one of Akamai's biggest competitors in Web content
delivery, said his company does not think it serves any gambling sites.
''That's not a customer base that we would actually go after'' because of
the legal issues involved, Couser said. Couser said C&W thinks there is a
''0.1 percent chance'' that it handles any traffic from pornographic sites.
Young said that ''we really are just like any telecom company'' including a
phone company that lets people call sexually explicit 900 numbers. ''We're
just a delivery mechanism. It is true that we deliver some adult content
and some gaming content, but we no longer pursue this type of business, and
we are not renewing these contracts'' as they expire. Also, Young noted,
Akamai does not ''push'' content to users but makes it more readily
available based on which sites Web surfers connecting to its servers have
been visiting recently.
Young said Akamai has refocused its business on large corporations,
government accounts, and the 250 most frequently visited Web sites. In the
first nine months of this year, it reported a net loss of $148.8 million on
sales of $109.6 million, as revenues have dropped 13 percent from last
year. Akamai shares, which traded over $300 two years ago, have plummeted
to a closing price of $2 yesterday.
Some universities said that regardless of issues about porn and gambling
Web traffic, they have been pleased with their relationship with Akamai,
under which many of them pay for the cost of powering and operating the
servers Akamai uses.
Justin Harmon, a spokesman for Wesleyan, said: ''They make it easier for
our students and faculty to access sites like CNN.''
MIT's Bruce said with a network that handles 1 million ''page views'' every
day, having Akamai servers on MIT's network ''helps us keep the total
amount of bandwidth going out of this place down,'' which saves MIT
considerable sums on the cost of Net access.
''I'm not sure that even if we were extremely conscientious about trying to
know who Akamai's clients were, we would have to go back to them on a
regular basis, every month or every week, to know exactly what content was
on the site. I just don't know how anyone could practically do that.''
Peter J. Howe can be reached at howe@xxxxxxxxxx
*********************************
Government Computer News
FBI continues push to improve records management
By Wilson P. Dizard III
To get a grip on its files, the FBI is busy converting 750,000 documents a
day to a common electronic format.
The bureau is scanning its records at a facility dubbed the DocLab. The
DocLab uses a dirty optical character reader process, as opposed to a
corrected OCR process, to speed up operations, said William L. Hooton,
assistant director of the FBI's new Records Management Division.
"We just don't have the time right now to do very high-quality OCR," he said.
The purpose of scanning the records is to create databases to which the
bureau can apply data mining techniques, Hooton said.
"We need to figure out how to manage our case files effectively," he said.
"We have no real, in my opinion, records management system at the bureau."
The FBI plans to conduct an inventory of its records, he said, and separate
them into three groups: records to be destroyed, records that haven't been
requested in the last five years but must be kept and records that have
been requested in the last five years. The second group of records will be
stored in offline systems; while the records used most recently will be
housed in the Records Management Application system that the division is
building.
The FBI in the spring consolidated almost 1,000 employees into the Records
Management Division, bringing together staffs from 22 organizations to form
the largest division at bureau headquarters.
The massive records effort came in response to criticism of the FBI's
management of evidence. At Senate hearings early this year, the Justice
Department's inspector general lambasted the bureau's record-keeping.
Hooton described project at a recent meeting of the National Capital
Chapter of the Association for Information and Image Management in
Arlington, Va.
*******************************
Associated Press
FTC Settles Fake Web Case for $300,000
By DAVID HO, Associated Press Writer
WASHINGTON (AP) - Four companies agreed to repay customers a total of
$300,000 to settle federal charges that they sold fake Internet addresses
ending in ".usa" with an advertising campaign pegged to the Sept. 11
terrorist attacks.
The Federal Trade Commission said Tuesday that the companies TLD Network
Ltd., Quantum Management Ltd., TBS Industries Ltd., and Quantum Management
U.S. Inc. last year jointly sold Internet domain names ending with ".brit"
and ".scot." After Sept. 11, the companies began an e-mail campaign
advertising ".usa" domain names, with statements such as, "Be Patriotic!
Register .USA Domains."
The FTC said the ".usa" domain names are not usable over the Internet and
probably never will be. Many new Internet suffixes have joined the familiar
".com," ".net" and ".org," but not the names sold by the four companies.
The settlement bars the companies, primarily based in London, from
deceptive promotions involving domain names and from selling their customer
lists, the FTC said.
An attorney for the companies did not immediately return calls seeking
comment Tuesday. By settling, the companies don't admit breaking any law.
The FTC complaint, filed last February with the U.S. District Court for the
Northern District of Illinois in Chicago, argued the companies violated
federal law by misleading consumers, many of whom purchased multiple domain
names for $59 each. The FTC said the operation made at least $1 million in
sales.
While three of the companies are British, they did business in the United
States and are subject to U.S. law.
The government lawsuit said the companies used Web sites and advertising
that looked professional and hid their location from consumers, making it
nearly impossible to get refunds.
U.S. District Judge James Holderman on Feb. 28 issued a temporary
restraining order that froze the companies' U.S. assets and shut down their
"DotUSA" Web site.
****************************
Federal Computer Week
OMB finds security leverage
The Bush administration uses security law and funding threats to push
agencies to offer security solutions
BY Diane Frank
Dec. 2, 2002
Two years ago, if someone brought up information security in a meeting of
agency managers, the most likely response would have been, "The technology
folks are taking care of it."
But that attitude is changing. Now, federal security experts say, even some
Cabinet-level secretaries could provide details about their agencies'
security policies.
Not every top government executive is so well informed, but information
security clearly is a topic agency managers outside the information
technology office are discussing in detail. As a result, they are no longer
just discussing specific security strategies they are also planning for
them and putting them into practice, said an administration official who
asked not to be named.
"Now it is all about implementation," he said.
Many experts trace the change back to the Government Information Security
Reform Act (GISRA) of 2000, which requires agencies to conduct annual
assessments of their security programs and strategies and submit reports to
the Office of Management and Budget.
"I think it started with the requirement that the department head had to
sign your GISRA report, and therefore it had to be staffed through your
executive management who asked questions, who forced the business unit
leaders and executives in the department to be accountable for
cybersecurity," said Lisa Schlosser, assistant chief information officer
for IT security at the Transportation Department.
Officials from the General Accounting Office, which has issued many
scathing reviews on agencies' security practices during the years, have
noticed the shift in attitude.
"All agencies had weaknesses in security program management, which can
often lead to weaknesses in other control categories," said Robert Dacey,
GAO's director of information security. "But at the same time, a number of
actions to improve information security are under way, both at an agency
and governmentwide level."
Dacey testified last month before the House Government Reform Committee's
Government Efficiency, Financial Management and Intergovernmental Relations
Subcommittee. At the hearing, Rep. Stephen Horn (R-Calif.), subcommittee
chairman, released his latest security grades for agencies, giving the
government an overall failing grade.
Dacey was cautiously optimistic about agencies' progress in securing
systems. "Some of these actions may require time to fully implement and
address all of the significant weaknesses that have been identified, but
implementation of [GISRA] is proving to be a significant step in improving
federal agencies' information security," Dacey said.
OMB's Big Stick
Federal IT security experts say agency IT managers have begun to make
improvements in information security because they are focusing on security
management, rather than security technology.
In the past, IT managers typically would focus on simply buying technology
on an ad hoc basis to secure systems, but they learned that technology
alone did not solve the problem. GISRA pushed managers to take a methodical
approach to identify vulnerabilities across an organization and develop a
comprehensive strategy to fix them.
In their GISRA reports, agencies must measure the performance of managers
in charge of information security, the effectiveness of security training
programs, the integration of security programs and the enforcement of
security policies in agency contracts.
With help from those GISRA reports, OMB last winter began reinforcing a
February 2000 policy as part of the fiscal 2003 budget process. According
to the policy, programs will not receive funding unless "adequate" security
plans are in place.
The policy had been in place, but GISRA made agency managers take notice.
"This past summer, if you said 'GISRA,' people knew what you were talking
about," said Sallie McDonald, assistant commissioner for information
assurance and critical infrastructure protection at the General Services
Administration. OMB's policy tends to get even the highest officials'
attention, McDonald pointed out.
OMB's strategy forced agencies to think about security as part of a larger
question of how they invest in information systems one of the provisions
of the Clinger-Cohen Act of 1996.
It has been a long struggle through both the Clinton and Bush
administrations to "hitch the security program wagon to the Clinger-Cohen
capital-planning train [to] tie security so tightly to the budget process
that no one could ignore it and when the opportunity came up, codify it in
law," the administration official said.
Security will not improve unless agencies view it not only as one of the
basic elements of any program, but also as an ongoing management focus,
experts say.
"I believe that if you can demonstrate that you have a sound management
strategy for cybersecurity, then you should get the appropriate funding,"
Schlosser said. "But if you can't demonstrate that, you shouldn't get
increased funding."
OMB officials withheld fiscal 2003 funding for some IT projects, and the
office is now working with agencies to straighten out the problems in their
system and program designs, said Mark Forman, OMB's associate director for
IT and e-government, testifying at Horn's hearing last month.
"Generally, the agencies would rather work through their security problems
than not get funding, so that incentive structure seems to work," he said.
OMB is prepared to make life difficult for agencies that are not fixing
existing security problems before tackling new ones.
"One of the recurring problems that we've seen is agencies' desire to
invest in new IT, [but] at the same time they can't remediate legacy system
problems," Forman said. "There's a trade-off to be made. We're making it
very clear to the agencies that we're simply not going to fund new
investments and short remediation or accreditation and certification."
OMB and agency officials have also incorporated information security into
management score cards, which measure agency support for the President's
Management Agenda.
Learning the Tricks
OMB may be getting involved at the front-end of agency planning right now,
but agencies need to learn how to think about security measures as part of
program planning, Forman said.
Some agencies have already gotten with the program. The Energy Department,
for example, has included security in its Innovative Department of Energy
E-Government Applications (IDEA) project, said John Przysucha, associate
CIO for cybersecurity at DOE, speaking recently at a breakfast sponsored by
the Bethesda, Md., chapter of AFCEA International.
Through the IDEA project, the department is investing in initiatives that
demonstrate how e-government can support agency operations. Some of the 19
initiatives focus on security problems, but none of the initiatives will be
successful without good security, he said.
Numerous agencies now require programs to pass through system certification
and accreditation reviews, which forces program managers to focus on
security upfront. It's similar to OMB's strategy: If a program fails a
review, it cannot go forward.
Still, security problems will occur, despite the best planning, so agencies
are working with industry to find ways to detect and respond to problems
within systems and across departments.
Transportation officials recently signed an enterprise license for
Foundstone Inc.'s vulnerability scanning and management solution. The
department also uses Computer Associates International Inc.'s eTrust
intrusion-detection system and several other companies' security products.
Now the department is working with those industry partners to bring those
products together into a single, departmentwide incident-management solution.
"We're piloting that, working with industry right now to facilitate that
next evolution," Transportation's Schlosser said. "The government isn't
usually the leading edge on these kind of new initiatives, but in this
case, we're trying to be. This is what we've challenged our industry
partners to put together: Tell us, show us, integrate your point solutions
so that we have a management perspective on vulnerability management and
remediation."
GSA, which houses the Federal Computer Incident Response Center, has been
tackling the same challenge governmentwide, developing an analysis tool
that can pull together incident reports across civilian agencies.
Predicting the Future
The further agencies push into security management, however, the tougher it
gets.
A good management strategy makes it easier to deploy solutions for
detecting and responding to attacks. But the ultimate goal is prevention.
"If you can predict what the threat's going to be and [assess] your
vulnerability, you can go back to making better...and smarter investments,"
Schlosser said.
The FedCIRC data analysis tool is also intended to help with this effort,
McDonald said.
Another boost will come from increased investments in cybersecurity
research and development by the federal government.
Last month, Congress passed the Cyber Security Research and Development
Act, authorizing more than $900 million during the next five years for
grants through the National Science Foundation and other agencies. This
will help immensely, experts say.
"Government scholarship programs that have started are a step in the right
direction, but they need to be expanded over the next five years to help
build the university infrastructure we need for the long-term development
of trained security professionals," said Richard Pethia, director of the
CERT Coordination Center at Carnegie Mellon University.
The fight has already begun to make sure that the authorization is followed
with appropriations. Basic security education will require sustained
attention and resources.
Agencies are working to raise the awareness of all their employees, making
everyone understand that security is the responsibility of anyone who uses
a computer and works on a network. More specific training for program
managers and security staff are also being developed.
Online IT security training and coursework are available at the government
level, Forman said. And the e-Training Initiative, led by the Office of
Personnel Management, will soon incorporate additional security courses, he
said.
Many security experts have spent much of their time during the past few
years making the same speeches, pointing out the same problems and calling
for the same fixes. The mindset is changing, but it has not changed
completely. The speeches will not end anytime soon, McDonald said.
"Those of us who are out there proselytizing need to continue," she said.
******************************
Federal Computer Week
Infiltrating agency ops
BY Diane Frank
Dec. 2, 2002
Including security as a basic feature of every system and program isn't as
easy as it sounds.
"Our philosophy has been and our key objective for the cybersecurity
program is to improve executive management of the program by integrating
[information technology] security controls into all the major business
processes of the department," said Lisa Schlosser, assistant chief
information officer for IT security at the Transportation Department.
This approach is outlined in a diagram that shows how all the components of
the agency's security strategy build on one another including the security
management programs, technical framework and governance structure. Without
any one piece, the entire structure could collapse, Schlosser said.
Building on the President's Management Agenda score cards which grade an
agency's status on e-government, financial management and other
priorities DOT and other agencies are putting security at the forefront
for every manager.
"I'm a very strong believer in performance metrics and accountability
through performance metrics. So, we integrated security metrics into the
e-government component of the president's management score card, and that
got briefed at the senior team management meetings within the department on
a quarterly basis," Schlosser said. "That got a lot of visibility."
Identifying the right performance metrics is not an easy task. But agencies
already are required to use the minimum metrics outlined in the Office of
Management and Budget's guidance for the Government Information Security
Reform Act of 2000.
Those metrics are not just for the performance of systems and programs, but
also for the performance of the people overseeing them, said Mark Forman,
OMB's associate director for IT and e-government, testifying late last
month at a House committee hearing.
Metrics provide the best way to demonstrate that security is not just a
black hole where money goes in and a solution never comes out, Schlosser said.
You've succeeded "when you can demonstrate through a strong performance
measurement system that you are decreasing your risk through tracking of
metrics," she said.
*******************************
Federal Computer Week
E-gov agenda takes shape
E-Government Act promotes Web standards, procurement reform, security policies
BY Judi Hasson
Dec. 2, 2002
In one of the most dramatic changes in information technology policy since
the passage of the Clinger-Cohen Act of 1996, President Bush is expected to
sign into law this week the E-Government Act of 2002, which lays out the
rules of engagement for agencies providing information and services online.
The bill affects nearly every aspect of IT management and rules. It defines
e-government and its basic parameters from Web sites for managing crises,
to electronic archives and directories that give the public a road map to
government information. For the first time, lawmakers earmarked money $345
million during four years to fund e-government programs.
The legislation also extends existing rules for security, outlines new
initiatives for training the federal government's IT workforce and creates
new buying rules to help drive down the cost of IT.
"It is one of the most significant pieces of legislation passed since
Clinger-Cohen," said David McClure, vice president for e-government at the
Council for Excellence in Government. "It covers so many angles of
information that it goes beyond many of the other pieces of legislation."
The Clinger-Cohen Act aimed to end years of poor federal IT management and
billions of dollars of cost overruns in IT systems development.
Rep. Tom Davis (R-Va.), who pushed for passage of many key provisions in
the new bill, said the e-government act will "revolutionize Americans'
relationship with their government.... The Web-savvy citizen of the 21st
century is accustomed to the standard of service on commercial Web sites
and will accept nothing less from government sites."
Turning Up the Volume
The bill, which comes more than a year after the Bush administration
launched its 24 e-government initiatives, does not stake out new territory,
federal IT experts said. Instead, it provides a formal management structure
for a disparate array of e-government concepts and initiatives. "It is an
accelerator," McClure said. "It really is broadening citizen interaction
and access to government."
As expected, the bill calls for the creation of a permanent position in the
Office of Management and Budget for an e-government administrator,
appointed by the president, to develop policies related to e-government.
The role is similar to the one played by Mark Forman, OMB's associate
director for IT and e-government.
Some e-government projects are already under way, from e-grants to
e-filing, as part of the administration's 24 e-government initiatives. But
the bill will give those projects greater vitality and more velocity,
according to experts.
"The e-Grants initiative is currently funded by 11 partner agencies and how
the [e-gov] bill...is going to impact us will be determined by the setup of
the electronic government office," said Diana King, who is detailed to
e-Grants Program Management Office at the Department of Health and Human
Services.
Reflecting the revolution in online services both in the government and the
private sector, the bill also imposes discipline and standards on the
haphazard universe of government information on the Internet, where more
than 24,000 federal Web sites reside.
One provision requires that all of the information agencies publish in the
Federal Register also must be posted on the agency's Web site, where the
public can more easily find it.
The bill also requires that an interagency committee develop standards
establishing how government information is organized and categorized so
that it can be searched electronically across agencies.
The idea is to ensure that agencies provide at least a basic level of
essential information to the public via the Internet, said Melissa Wojciak,
staff director of the House Government Reform Committee's Technology and
Procurement Policy Subcommittee, which Davis chairs.
It also calls for building a federal Internet portal as a single point from
which citizens can access all government information and services. FirstGov
serves that purpose now but is not as comprehensive or user-friendly as the
portal envisioned for the future, said Kevin Landy, who was involved in
drafting the E-Government Act for Sen. Joe Lieberman (D-Conn.).
Owen Unangst, the e-government coordinator for the Natural Resources
Conservation Service in the Agriculture Department, said the bill bolsters
the USDA's Web efforts to automate certain functions.
"My agency has recognized that there's a certain part of agriculture that
still needs to have a face-to-face approach, but there's definitely a
growing desire to do more self-service work," Unangst added.
Buying Power
Lawmakers also used the bill to support other IT initiatives, including a
long-fought effort to allow state and local governments to buy products and
services through General Services Administration schedule contracts.
Davis and other lawmakers have been pushing this concept, known as
cooperative purchasing, since the mid-1990s as a way to increase the volume
of GSA schedule business, potentially lowering prices for federal agencies
and giving state and local agencies easier access to IT products.
Davis spokesman Dave Marin said e-government transformation cannot happen
without state and local governments.
"Cooperative purchasing is an invaluable tool that gives state and locals
access to contracting vehicles that let them acquire the latest IT products
in the world," Marin said.
Nevertheless, the verdict from states is still out on whether they want the
option, according to Larry Allen, executive director of the Coalition for
Government Procurement, a Washington, D.C., industry group.
Some states, he said, require that all purchases come from businesses
within their borders. Others, such as North Carolina, have found that the
federal schedules often "do not represent the best value," said John
Leaston, North Carolina's state purchasing officer.
"Over time, our competitive bidding process has demonstrated that we can
get better prices," he said.
Another Davis provision in the bill promotes the use of share-in-savings
contracts, in which a vendor forgoes some upfront payment in exchange for a
share of the savings realized by using an IT solution. With a five-year
contract, an agency will have 10 years to pay off a vendor for services,
using the money saved from more efficient solutions.
"It has the potential for having a much higher return on investment," said
Chip Mather, senior vice president of Acquisition Solutions Inc. "You can
really make a profit if it works."
The e-government bill, like the homeland security bill signed last week,
includes two initiatives aimed at improving security. It incorporates the
Federal Information Security Management Act, which extends the Government
Information Security Reform Act of 2000. GISRA combined many federal
security policies into one law and mandated an annual assessment to track
compliance.
The two laws also give the National Institute for Standards and Technology
a potentially larger role in setting security policy.
Diane Frank and William Matthews contributed to this story.
**************************
Federal Computer Week
New opportunities for NIST
BY Diane Frank
Dec. 2, 2002
Both the Homeland Security Act of 2002 and the E-Government Act of 2002
include provisions that attempt to raise the profile of cybersecurity
initiatives. Central to each bill is a potentially larger role for the
National Institute for Standards and Technology.
NIST has developed security guidance for years, but agencies are not
required to follow it because the secretary of the Commerce Department has
rarely used the authority granted in the Computer Security Act of 1987 to
make NIST's standards and guidance mandatory.
Underscoring the importance of security, the e-government bill reaffirms
that authority and "a lot of us hope that the secretary will use that
authority more extensively than in the past," said Franklin Reeder,
chairman of the federal Computer Systems Security and Privacy Advisory Board.
The bill "stresses the importance of this set of responsibilities" and
could be important as NIST follows through on new requirements in both the
e-gov and homeland security acts to develop and revise performance measures
for agencies' security policies and programs, said Ed Roback, director of
NIST's Computer Security Division.
Federal security could improve if the secretary should decide to make
additional NIST guidance and standards mandatory, but such a decision could
also have drawbacks, said Sallie McDonald, assistant commissioner for
information assurance and critical infrastructure protection at the General
Services Administration. "But you don't get people's cooperation for the
right reasons," and involuntary compliance could lead to agencies just
checking off another requirement box instead of using the guidelines to
improve their security management, she said.
***************************
Federal Computer Week
Homeland agency charged with outreach
Security strategy at risk if coordination fails
BY Diane Frank, Megan Lisagor and Dibya Sarkar
Dec. 2, 2002
When President Bush signed the Homeland Security Department into law last
week, he triggered activity on two fronts.
Internally is the much-publicized effort to bring 170,000 employees from
nearly two dozen agencies into a single department, if only virtually.
Externally is the often overlooked effort to coordinate the department's
work with a multitude of organizations across state and local government
and the private sector. This second front, many observers say, is equally
vital and equally at risk for failure.
The Homeland Security Act of 2002 highlights more than a dozen different
requirements to ensure that federal agencies and their state and local
counterparts have access to the information and technology they need to
carry out their jobs.
The law, for example, sets up a central office led by the undersecretary of
management to coordinate with state and local governments and requires the
undersecretary of information analysis and infrastructure protection to
develop policies and procedures for sharing law enforcement information.
It also sets up several partner organizations, such as the Homeland
Security Advanced Research Projects Agency, which will support long-term
technology research through grants to public- and private-sector organizations.
Yet while the act spells out the objectives, the means for reaching them is
left vague, observers say. So while the intentions are admirable, the
execution is a concern, they say.
"We've now spent over a year battling over what this thing should look
like moving boxes, creating new ones now we're going to spend much more
time making sure those new boxes work the way they're supposed to," said
Don Kettl, executive director of the Century Foundation's Working Group on
Federalism Challenges in Homeland Security.
There is no way to tell at this point, however, whether the single
structure outlined in the law is the best way to make the nation more secure.
"You could do as much harm as good with a one-size-fits-all, heavy-handed
approach," said Warren Suss, president of Suss Consulting Inc., an
information technology consulting firm. "Execution is everything in this
business."
Creating Accountability
Many instances of reorganizations in the public and private sectors have
shown that creating a new entity does not guarantee new service, much less
the intended results, observers say.
"Congress can say you shall coordinate or you shall be damned to hell
forever, [but] that isn't necessarily going to be done," said Richard Varn,
chief information officer for Iowa. "It all comes down to people and good
processes and good organization and just good implementation."
Homeland security officials have the benefit of a head start, Suss said,
because the Bush administration's transition team "will provide them some
momentum going into this."
The administration already decided on four basic department divisions:
border and transportation security; emergency preparedness and response;
chemical, biological, radiological and nuclear countermeasures; and
information analysis and infrastructure protection.
Clearly, the first task is bringing together the different agencies and
organizations that will make up each of the divisions, such as the Coast
Guard, the Transportation Security Administration and others merging to
form the border and transportation security division.
But there is no assurance that the new department structure will make that
task any easier than it was when the agencies were scattered across other
departments.
"No matter how much you say you are going to make this one-stop shopping,
this is still a huge organization with sweeping policy mandates," Kettl said.
Clear accountability structures holding specific people responsible for
ensuring first responders get everything from bulletins about possible
terrorists in their area to the right technology to detect disease
outbreaks should help significantly when it comes to making coordination
and information sharing happen, experts say.
"They need to have single points of accountability as well as contact,"
Varn said. "Someone has to have the role of being identified as the
accountable person for making sure [that coordination happens]."
And progress that already has occurred could accelerate.
Some coordination and information sharing has occurred, but cultural and
organizational barriers still existed, said Patrick Schambach, associate
undersecretary for information and security technology and TSA's CIO.
"With accountability now going to be consolidated to a large degree in this
new agency, we can start to expect real information sharing," he said.
A Need for Union
State and local agencies, which will be doing much of the day-to-day work
in the homeland security fight, ultimately hope the new department will
help create a single strategy for communications and information-sharing
technology.
"We have not been able to address those concerns with the existing
agencies, so certainly I'm very hopeful that the whole Department of
Homeland Security will be able to do that," said Karen Anderson, mayor of
Minnetonka, Minn., and president of the National League of Cities (NLC).
"Just the fact that those new agencies will be in one place [and] will be
able to communicate with one another will be a head start for us," she said.
At all levels, one of the biggest challenges for IT leaders may be getting
everyone to understand that resources for the information-sharing
infrastructure are just as important as resources for vaccines and
bomb-proof buildings in the homeland security effort, said Gerry
Wethington, CIO for Missouri and president of the National Association of
State Chief Information Officers.
"Those are all important aspects in first responder communities and public
health arenas, etc., but there's also a need for infrastructure growth and
expansion to accommodate information sharing," he said.
"My hope is that that's recognized at the federal level; and when they
begin to put their programs together that they set funds aside to make sure
that they address the technology needs that are necessary to...support
homeland security," he said.
Some state and local officials also are concerned that the department will
not look at homeland security technology from a national perspective, said
Costis Toregas, president of Public Technology Inc., the technology
division of organizations such as the NLC and the National Association of
Counties.
Billions of dollars will be spent on procurement for information sharing
and communications, but Homeland Security Department officials must develop
a strategy to guide procurements based on needs and capabilities at all
levels, Toregas said.
***
A federal agency, a national mandate
The Homeland Security Act of 2002 underscores many ways the Homeland
Security Department should work with organizations in the public and
private sectors.
The department is expected to:
* Ensure compatibility of department databases and state and local systems.
* Create advisory groups to assess the needs of federal, state and local
law enforcement agencies.
* Award grants to public and private groups for technology research.
* Improve policies and procedures for information sharing.
* Promote existing and new public/private partnerships.
********************************
Federal Computer Week
Group urges air traffic upgrades
BY Megan Lisagor
Dec. 2, 2002
The government needs to create a joint program office to coordinate the
deployment of a highly automated air traffic management system, according
to a presidential commission.
In findings released Nov. 18, the Commission on the Future of the U.S.
Aerospace Industry called for a range of actions including development of
real-time, space-based communications.
The commission made nine recommendations to the Bush administration and
Congress that, if implemented, would impact aerospace initiatives at
several agencies the Defense Department, NASA, the Federal Aviation
Administration, the National Oceanic and Atmospheric Administration and
others that must begin working together, it emphasized.
"We stand dangerously close to squandering the advantage bequeathed to us
by prior generations of aerospace leaders," the commission wrote in the
executive summary to its 300-page final report, which covered vision, air
transportation, space, national security, government, global markets,
business, workforce and research issues. "We must reverse this trend and
march toward rebuilding the industry."
The commission backed funding for the FAA's modernization effort.
Rep. Sherwood Boehlert (R-N.Y.), chairman of the House Science Committee,
said, "The report makes a strong case that government must increase its
investment in aerospace research and?must increase investment in math and
science education to ensure a continuing pipeline of motivated, talented
men and women."
******************************
Federal Computer Week
Bill pushes security, but no money so far
BY DIANE FRANK
Dec. 2, 2002
A new bill awaiting President Bush's approval heralds the importance of
cybersecurity, but the funds to bolster security education and research are
yet to come.
The Cyber Security Research and Development Act (H.R. 3394) of 2002 is
expected to kick-start the education and research support structure that
has long been lacking in the security world.
The act would provide $903 million for grants and scholarships through the
National Science Foundation and the National Institute of Standards and
Technology, among other things. While the bill is expected to become law,
there will still be a battle for the money that it authorizes.
The bill is being hailed by agencies, academia and industry as the best way
to encourage long-term, focused information security research and, in turn,
encourage students and professors to seek careers in the information
security field.
Without the money authorized for programs at NSF and NIST, the push to
increase security proficiency in the United States will not be as
effective, according to security experts.
But talks are already under way, said Rep. Sherwood Boehlert (R-N.Y.),
chairman of the House Science Committee and a co-sponsor of the bill.
"We are engaged in conversations with the appropriators, and we are
bringing [the bill] to their attention," he said.
The bill's sponsors are checking with White House staff particularly at
the Office of Management and Budget to make sure the funding requests are
included in the president's budgets.
Officials will be "unyielding" in their efforts to make sure that actual
money follows the bill, but the private sector, because of its power as a
lobbying force, also has a large role to play in this fight, Boehlert said.
The Information Technology Association of America, which supports the bill,
has already been working on the funding issue with appropriations committee
staff members and White House officials, said Harris Miller, president of
the Arlington, Va.-based industry group.
Even if the bill gets funding, research and education do not turn out
immediate results. "It's not a quick-fix bill. It's a bill to build the
human and intellectual capital in the long run," according to William Wulf,
president of the National Academy of Engineering.
However, "the sooner we make that funding available, the sooner we create
that pipeline of trained professionals," said Rep. Brian Baird (D-Wash.), a
co-sponsor of the bill.
***
Follow the money
The Cyber Security Research and Development Act authorizes $903 million
during the next five years for several internal and grants-based federal
security programs, such as:
* National Science Foundation research grants: $233 million.
* NSF graduate scholarships: $90 million.
* NSF faculty development scholarships: $25 million.
* National Institute of Standards and Technology research program: $275
million.
Source: House Science Committee
********************************
Federal Computer Week
TSA preps smart ID pilot programs
BY Colleen O'Hara
Dec. 2, 2002
The Transportation Security Administration is ramping up its smart
card-based programs designed to put identification into the hands of
transportation workers nationwide and allow frequent travelers to get
through airports quickly.
TSA is preparing to launch two regional pilot projects for its
Transportation Worker Identification Credential (TWIC) System that will
provide workers at airports, ports, railways and other locations with
secure access to buildings and systems.
TWIC is "a system of information systems," said Elaine Charney, TSA's TWIC
program manager. The goal is to produce an integrated system that can
support one identification card, which then can be used across all
transportation industries, she said.
TSA officials will soon begin the three-month planning phase of the TWIC
pilot project in the Philadelphia/Wilmington, Del., region, Charney said,
and soon after will begin the planning phase for the Los Angeles/Long
Beach, Calif., region pilot project.
Each planning phase will be followed by a four-month technical evaluation.
TSA will then conduct a four-month prototype so agency officials can
evaluate and refine the products, including determining how effectively the
pilot projects incorporated the different agency systems used to check
employees' backgrounds.
During the technical evaluation phase, the administration plans to test
access technologies that include digital photographs and holographic
images, optical media stripes, memory-microprocessor chips, magnetic
stripes, 2-D bar codes and linear bar codes.
TSA also will evaluate TWIC components such as the enrollment center, a
regional database and regional card production, personalization and
issuance, said Charney, who spoke Nov. 19 at the CardTech SecurTech ID 2002
show in Washington, D.C.
The TWIC program would form the foundation of another program TSA hopes to
begin testing soon: the Registered Traveler Program, which will allow
certain credentialed and pre-screened passengers to speed through security
checkpoints in airports.
The program would reduce the "hassle factor" associated with passenger
screening and allow airport officials to focus their security resources on
passengers who present a greater security risk, said Michael Barrett,
Registered Traveler Program manager at TSA.
TSA plans to consider "a lot of options," Barrett said, including biometric
technologies and cost-sharing options.
This "trusted traveler card" should improve privacy, said James Hall,
managing partner of Hall and Associates and former National Transportation
Safety Board chairman.
Encoding information on a card with a fingerprint is a secure way to
protect the identity of card users, according to Hall.
******************************
Government Computer News
Navy taps service's e-gov advocate as new CIO
By Dawn S. Onley
Dave Wennergren, champion of the Navy Department's e-business initiatives
and smart-card deployment, will become the service's next CIO.
Wennergren, former deputy Navy CIO for enterprise integration and security,
will replace Dan Porter, who retired Dec. 1. Porter accepted an early
retirement option from the Navy and has taken a job as senior vice
president for strategic development at Vredenburg Inc., a professional
services company in Reston, Va.
Porter is the third top official in the service's CIO office to retire this
year. Alex Bennet, former deputy CIO for enterprise integration, left
earlier this year; Ron Turner, deputy CIO for infrastructure, systems and
technology, has announced he will retire next month.
As CIO, Wennergren will oversee an annual IT budget of $5.6 billion. He
also will manage the $8.82 billion Navy-Marine Corps Intranet program.
********************************
Government Executive
December 3, 2002
Homeland defense commander stresses 'need to share' information
By Molly M. Peterson, National Journal's Technology Daily
Officials at the newly established U.S. Northern Command may have to
consider abandoning the military's traditional system for classifying
information as they build crucial lines of communication with federal,
state and local homeland security agencies, the Northern Command's chief
information officer said recently.
Speaking to reporters at a homeland security summit late last month, Maj.
Gen. Dale Meyerrose said inter-agency information sharing is a "blossoming
requirement" for the Northern Command, which is headquartered at Peterson
Air Force Base in Colorado Springs, Colo. The command is charged with
consolidating the military's homeland defense and civil-support missions.
The Defense Department's current classification system allows military
offices to share information on a need-to-know basis, and requires security
clearances and background checks for access to information with such labels
as "top secret" and "classified." But Meyerrose said that system could
hinder the Northern Command's ability to share real-time information with
civilian agencies that classify their information differently.
"My mantra is that I need to change from a 'need to know' to a 'need to
share' foundation," Meyerrose said. "That is fundamentally a different
level of information-exchanging requirement."
Federal law generally prohibits direct military involvement in domestic law
enforcement, but during terrorist attacks and other national emergencies
that might exceed the capabilities of federal, state and local agencies,
the Pentagon can assign the Northern Command to provide civil support.
Meyerrose noted that in order to provide that assistance, the Northern
Command must be able to communicate quickly and efficiently with emergency
management officials at all levels of government, using radios, computers
and other technologies.
"I am not advocating that we undo the need to know [classification]
associated with national security information, but my requirements are
going to be driven by a need to share, not a need to know," he said. "But
we're developing a lot of things, so we have not formally stated that
requirement."
Meyerrose said the Northern Command also must build on existing
information-sharing architectures, such as those that have allowed the
Federal Aviation Administration to exchange data with the North American
Aerospace Defense Command.
"We're trying to make sure we don't reinvent any of those wheels,"
Meyerrose said, adding that the Northern Command is interested in ideas
from the private and academic sectors. "We have our catcher's mitt open.
We're listening."
Lockheed Martin will play a key role in meeting the Northern Command's
information technology requirements. The company recently won two
contracts, totaling $5.8 million, to help the command integrate various
systems and develop new information operations capabilities.
"We have begun work on the contracts, and we're looking forward to helping
them with their IT and infrastructure," Lockheed spokesman Joe Wagovich
said on Tuesday.
*****************************
Government Computer News
12/04/02
New Jersey's CIO resigns
By Trudy Walsh
Judith Teller will resign from her post as New Jersey CIO on Dec. 31.
Gov. James McGreevey appointed Teller as the state's IT chief in January.
Besides her duties as CIO, Teller was on the board of directors for the
intergovernmental Geospatial One Stop committee as a representative of the
National Association of State CIOs. The committee is working on spatial
data collection and classifications standards for use by federal, state and
local governments.
Before becoming New Jersey's CIO, Teller worked for Accenture LLP of
Chicago for 27 years, specializing in state and local IT. Her clients at
Accenture included New York City, Philadelphia, Fairfax County, Va., and
New Jersey. She is a graduate of the Wharton School at the University of
Pennsylvania.
********************************
Washington Post
President Signs 'Dot-Kids' Legislation
By David McGuire
washingtonpost.com Staff Writer
Wednesday, December 4, 2002; 11:08 AM
President Bush today signed legislation that seals off a G-rated
"neighborhood" for kids on the World Wide Web.
The Dot-Kids Implementation and Efficiency Act creates a dot-kids domain
within America's dot-us addressing space.
Sen. Byron Dorgan (D-N.D.), who co-sponsored the bill in the Senate, said
in a recent interview that a dot-us domain would provide a "step forward
for parents."
"Everyone who's a parent appreciates the difficulty of supervising their
children on the Internet. This is a tool for parents," Dorgan said. "We're
not censoring anything. We're just going to try to provide a domain that's
safe for children."
The Senate altered the House language after NeuStar Inc., the company that
would be responsible for operating dot-kids, said that running the domain
could cost too much money and effort.
The new language grants NeuStar an extra two years on its four-year
contract to operate dot-us if it upholds its dot-kids obligations. The
legislation also would allow NeuStar to throw its hat into the ring when
the government re-bids the dot-us contract.
The changes represent a potentially lucrative set of extensions for NeuStar
if it abides by its contractual obligations. NeuStar's primary
responsibility is to police the new domain, ensuring that Web sites bearing
kids.us addresses abide by the child-friendly standards established by
Congress.
"We think this has created a more fair approach to the kids.us space. It's
definitely legislation we think we can work with," NeuStar Director of
Business Development James Casey said.
NeuStar holds the government contract to run dot-us. Like dot-uk in England
and dot-jp in Japan, dot-us is America's sovereign Internet domain,
existing alongside dot-com, dot-net and dot-org in the Internet's global
addressing system.
Because of the Internet's hierarchical nature, domain name owners can
easily use their addresses as "second-level" Internet domains. Since the
U.S. government has reserved the address kids.us, it can assign a virtually
infinite number of names within that address (for example, address.kids.us,
playground.kids.us, school.kids.us, etc.).
The dot-kids legislation represents a step back from an earlier proposal
calling for the creation of a stand-alone dot-kids suffix to be included
alongside dot-com, dot-net and dot-org in the Internet's Domain Name System
(DNS).
The U.S. Commerce Department and the Internet Corporation for Assigned
Names and Numbers (ICANN) -- the entities that share responsibility for the
DNS -- criticized that proposal, prompting the compromise.
The act says that Web site with a kids.us address cannot post hyperlinks to
locations outside of the kids.us domain. It also prohibits chat and instant
messaging features, except in cases where a site operator can guarantee the
features adhere to kid-friendly standards developed for the domain.
*******************************
USA Today
Parents, athletes put GPS to work
By Donna Rosato, Special for USA TODAY
GPS is no longer just for hikers, pilots and drivers. Consumer devices
using global positioning navigation technology are rapidly being developed
for multiple purposes, such as finding lost children and measuring speed
and distance in sports such as skiing, surfing and golf.
GPS, made up of a network of 24 satellites placed into orbit by the U.S.
Department of Defense, was originally intended for military use. In the
1980s, the government opened the system to civilians.
Athletes grab on
GPS can be used by anyone who tracks their location and the direction
they're moving. GPS is often used by automobile drivers, pilots, surveyors,
boaters and hikers. But with smaller chips, batteries and other electronic
components and a steady drop in component prices GPS is finding a slew of
new commercial uses.
Suunto, a Finnish company whose name means "direction," last month began
selling in the USA a wristwatch-like personal golf computer with GPS. The
G9, about $750, allows golfers to measure distance from tee to hole and the
length of each shot. It advises on the best club based on a golfer's
history, average length of shots and distance to the green.
It also displays course information, such as hazards, and automatically
records scores. All the data can be downloaded to a PC for analysis.
GolfLogix and ParView make GPS devices for golf carts. The GolfLogix
device, about the size of a cell phone, can be mounted on the cart or
clipped on the golfer's belt. The "xCaddie" displays the distance to the
green's center.
At the end of the game, the information is downloaded into a computer at
the pro shop, and golfers get a three-page printout detailing each shot.
About 25 U.S. golf courses have the GolfLogix system. They charge a fee for
the system or add the cost onto greens fees.
The ParView system, meanwhile, is permanently mounted in a golf cart a
10.4-inch video screen that sits where a rearview mirror would be. ParView
displays a hole and green overview, exact distancing and electronic
score-keeping. It also allows golfers to put in food and drink orders, get
pro tips and do two-way text communication. If threatening weather is
coming, golfers will be alerted by a text message. The ParView system has
been adopted by about 160 courses, which lease the system for a monthly fee.
"Purists say they'd rather mark off the distance themselves, but this is so
much faster, it really speeds up play," says Mark Van Patten, general
manager of the Daily News, a newspaper in Bowling Green, Ky.
Garmin, one of the biggest manufacturers of GPS devices for consumers,
teamed up with Timex to develop an Ironman sports watch that incorporates
GPS. The Timex Speed and Distance Monitor uses GPS to calculate how fast
the wearer is going and the distance covered. The device, which costs $225,
consists of a watch and a 5-ounce GPS receiver worn on the arm or a belt.
GPS satellites have atomic clocks built in, so time is extremely accurate.
Unlike other tools such as pedometers that track speed and distance, no
calibration or input is needed. "It's a great tool for athletes like
downhill skiers and surfers who have never been able to gauge their exact
distance and speed," says Jim Katz, a spokesman for Timex, which launched
the watch in May.
Garmin also recently began selling the Rhino Radio, $169, which combines
GPS and a two-way radio. It allows users to communicate and send their
positions so they can see where they are in relation to each other.
Safety first
Other companies are using GPS to target safety and security.
Several companies are marketing GPS "personal locator" devices.
Wherify just started shipping its GPS Personal Locator for children. It
sells for $399.99, plus a monthly service charge of $25 to $49.
Like a bracelet, the device combines GPS and digital wireless technologies
to pinpoint a wearer's position within a few feet, Wherify says. Parents
can view satellite or street maps on Wherify's Web site or call an 800
number, day or night, to obtain their kids' location and movements. By
using cellular technology, plus GPS, the device can work inside buildings
and underground locations that GPS can't penetrate.
If the wearer is abducted or lost, he or she can contact 911 by pressing a
panic button on the bracelet. The locator, marketed for children ages 4 to
11, has a built-in numeric pager and is made of water- and cut-resistant
material. Parents lock the bracelet onto their children's wrists and can
unlock it by key or remotely.
Cutting or forcibly removing the band would activate an alarm for the
company's emergency operators.
Earlier this year, Applied Digital Solutions began selling Digital Angel, a
combination watch and clip-on tracking device that also uses GPS. The
Digital Angel costs $400, with a monthly fee of $30. The owner of the unit
can go on the Net to view a map showing the wearer's location, and the
watch also can be programmed to alert someone when the wearer has wandered
outside of designated boundaries.
The alerts can be automatically sent to any number of devices, including
cell phones and pagers.
The University of Washington, meanwhile, is developing a handheld computer
that incorporates GPS to assist early-stage Alzheimer's patients. The
current prototype memorizes an Alzheimer's patient's daily routine and
offers directions when they become lost or confused. The device won't be
available for at least five years.
"The applications are limitless," says Tim Neher, founder and president of
Wherify. He says he was inspired to build the personal locator after
temporarily losing his niece and nephew at a zoo five years ago. The next
model, due in January, will be a personal locator for elderly people.
"Our goal is to get as many of these products into consumer hands as
possible, whether it's on your wrist when you're jogging, for your child or
your pet," he says.
*******************************
Los Angeles Times
A Move to Muzzle E-Mail
A court may decide if a fired employee's mass messaging to Intel workers is
legal or electronic 'trespassing' on the firm's system.
By Maura Dolan
December 4 2002
Ken Hamidi lost his job at Intel Corp. after a long fight over a workers'
compensation claim, but he did not go quietly.
The engineer, 55, formed a support group for current and past Intel
workers. He then sent six waves of e-mails critical of the company's labor
practices to thousands of the firm's employees.
Eventually the giant chip maker obtained a court order preventing Hamidi
from "trespassing" on the company's e-mail system. The ruling, now on
appeal before the California Supreme Court, has sparked a loud outcry from
dozens of civil libertarians but won plaudits from industry.
The outcome of the battle, pitting private property rights against free
speech, will help determine whether the Internet is a public forum
regardless of the ownership of the servers and computers that make up the
world wide system.
The decision is expected to be a milestone in the still-emerging field of
cyber law. Because California has so much high-tech industry, many of the
rulings on Internet law have come in California cases. It was one of the
first states to regulate commercial e-mail, or spam.
Hamidi's case breaks new ground because his messages expressed personal
views, which the 1st Amendment generally prevents the government from
censoring.
"We look at the Internet as a public resource, but that does not have to be
true," said Jennifer Granick, director of the Center for Internet and
Society at Stanford University.
If the trespass ruling stands, "it means any Internet provider can become a
gatekeeper and keep out e-mail it doesn't like because of its political
content," said Ann Brick of the American Civil Liberties Union Foundation
of Northern California.
But the U.S. Chamber of Commerce and other business groups said in a brief
in the case that courts must assure "American businesses that e-mail is a
tool worth having in the workplace, rather than a time bomb waiting to
explode."
No one has free-speech rights on private property that is not generally
open to the public, said University of Chicago law professor Richard A.
Epstein, who was selected by Intel to represent other industries in the case.
"There is no 1st Amendment right to go into the lobby of Intel to speak to
its employees, and if he can't use the lobby, why can he use the
equipment," which in this case is Intel's server, asked Epstein.
Hamidi, who is married and has two daughters, describes his saga with Intel
with the kind of emotion a jilted husband might have toward the wife who
left him years earlier.
He began working for Intel in Folsom, Calif., in 1986. He said he loved his
job, and believed he would spend the rest of his career with Intel.
Hamidi filed for workers' compensation in 1992 after suffering a back
injury in an automobile accident while returning from a conference.
He began gulping down Vicodin for pain, couldn't sleep and was depressed,
he said. He eventually asked for workers' compensation for his depression
too, contending it stemmed from his chronic back pain. Intel finally gave
him a three-month medical leave, he said, but stopped paying for his
medical treatments the day the leave started.
"They picked on the wrong guy," Hamidi said over lunch in Sacramento, where
he works as a compliance representative for a state agency. "They could not
bring me to my knees."
During his protracted struggle, Hamidi described having to wait for months
and to drive long distances to see doctors specified by Intel. The firm
videotaped him changing a tire after it had been slashed and used the
videotape against him, he said.
Intel fired Hamidi in 1995 for failing to return to work after a medical
leave. A state workers' compensation appeals board eventually ruled against
Hamidi on his psychiatric claim.
The appeals board found that his depression did not stem from his back
injury and that he had exaggerated his problems to his doctors.
During his battle with Intel, Hamidi said, he entered a mental hospital
twice and was placed under a suicide watch.
Hamidi credits the formation of FACE-Intel, a support group and Web site,
with turning his life around. He said he has saved jobs at Intel by
counseling employees not to file for workers' compensation and has
prevented suicides. Focusing on others' problems distracted him from his
own and gave him a voice, he said.
"Annual review time is very close," warned one of six e-mails Hamidi sent
over a two-year period. "Unfortunately many of you ... will be
terminated.... We can help."
In another e-mail to Intel, Hamidi wrote: "If you are on redeployment, it
is highly likely that you are targeted for termination and there will not
be any jobs available for you.... NEVER, EVER believe there is something
wrong with you. Based on testimonies of numerous Intel victims, there is
life after Intel that is rewarding."
When Intel took Hamidi to Sacramento County Superior Court in 1998 to stop
his e-mails, the out-of-work engineer could not afford a lawyer and
initially represented himself.
His six e-mails had been sent in bunches that ranged from 8,000 to 35,000
at a time, meaning that Intel employees received an average of one e-mail
from Hamidi every four months.
His case attracted the attention of legal scholars only after a Court of
Appeal in Sacramento upheld the injunction last December, ruling 2 to 1
that he was committing "trespass to chattels."
Chattel is private property other than real estate, and for decades courts
have held that that someone can be liable for such a wrong only if the
property was damaged or temporarily taken away from the owner.
A simple analogy is this: "If I kicked your dog, it would not be actionable
unless the dog was hurt," said UC Berkeley law professor Stephen Barnett,
who teaches tort law.
Intel's computer system was not damaged, nor was there even any evidence
that Hamidi's messages slowed the company's e-mail service.
But the company said Hamidi's e-mail had distracted employees, reduced
morale, forced managers to spend time reassuring workers that their jobs
were safe and required technical employees to work on efforts to block
future e-mail from Hamidi.
The state Supreme Court has agreed to hear the case, which means it will be
the first state high court to rule on the legal theory of "trespass to
chattels" as applied to the Internet.
Because of the case's potential impact, many in the legal community have
rushed to embrace Hamidi's case. The ACLU, a labor group, 41 law professors
and other civil libertarian and Internet activist groups agreed to weigh in
on Hamidi's behalf. The state high court has yet to schedule arguments in
the case, Intel vs. Hamidi.
William M. McSwain, who is representing Hamidi, wrote a law review article
about the case while he was a student at Harvard Law School. McSwain has
arranged for the international corporate law firm where he now works in
Philadelphia to represent Hamidi at no charge.
No court would have issued an injunction based on trespass if Hamidi had
sent his messages through the U.S. Postal Service, and e-mail should not be
any different, McSwain maintains.
"We're not talking about commercial advertising here," said McSwain. "This
is a gentleman trying to disseminate a message of important public concern
to people who want to hear it."
The ruling against Hamidi, if allowed to stand, could potentially turn
millions of Americans who use the Internet into law breakers, McSwain said.
"You cannot have a situation where anything, even the movement of
electrons, constitutes trespass," he said. "The court needs to put a stop
to this madness."
Critics of the early rulings in the Intel case say courts should insist
that companies deal with the Hamidis of the world by bringing nuisance or
defamation cases against them. Under those legal theories, Hamidi probably
would have fared better, analysts said.
The ACLU has asked the court to apply the trespass doctrine only in cases
in which there is physical damage or impairment to the computers or the
company server. If a barrage of e-mail caused computers to crash or slow
down, the company would have a claim against the sender, they say.
But if the content of the message is at issue, free speech guarantees
protect it, the ACLU's Brick wrote. In Hamidi's case, the content was the
issue because Intel would not have objected if the messages had been
laudatory, she said.
Intel declined to allow its lawyer in the case to be interviewed.
But Epstein, who represents industry groups aligned with Intel, said in a
brief to the state high court that the uproar over the ruling stems from
the fact that people tend to "wax mystical" when it comes to the Internet.
"I think the Internet is a communications tool, not a transformative social
revolution," Epstein said
"Intel runs its e-mail system beside -- not on -- the Internet highway," he
argued in the brief. "It is no more a part of the public infrastructure of
the Internet than an office building or factory that is not open to the
public but which happens to operate alongside the public highways."
The United States Chamber of Commerce contends that the case is about a
vengeful former employee trying to destroy a corporation that fired him for
incompetence.
"If this court permits Hamidi's conduct to continue unchecked in the
absence of criminal and civil penalties, American businesses may choose to
curb technological development and e-mail privileges in the workplace,"
wrote Mark Theodore, who is representing the U.S. and California chambers
in the case.
In its brief, Intel said Hamidi evaded Intel security measures put in place
to block his mail.
"To avoid detection and the various measures Intel might take to block his
messages," the brief said, "Hamidi sent e-mails in the dead of night and
from different computers."
Hamidi smiled when asked about this. He said he sent the e-mails late at
night because computers at the time were slower than they are now, and he
had to send his bulk messages when there was less Internet traffic.
He evaded Intel's attempted blocks by switching servers and adding dashes
or periods to his name and the name of his organization, he said. He
obtained the e-mail addresses of Intel employees from someone inside Intel
who sent him the directory anonymously, he said.
Chuck Mulloy, an Intel spokesman, described Intel as a "meritocracy," and
"a fair place to work," headquartered in Santa Clara with 80,000 employees
worldwide.
He said Intel has not tried to stop Hamidi from expressing his views on his
own Web site, in leaflets or in media interviews. "But when he sends e-mail
in the volume he does, in our view he is trespassing on our property."
Hamidi's messages contained a section in which recipients could ask to be
removed from Hamidi's list. He said he honored about 450 such requests.
When the court barred him from sending e-mails to Intel employees, Hamidi
rented a horse and buggy and delivered leaflets to Intel's headquarters.
Another time he went to Intel on horseback.
Hamidi runs his support group out of his home office in a working-class
neighborhood north of Sacramento. He has two computers, an array of office
equipment and a book of press clippings.
"Did you know I was 'Disgruntled Employee of the Year' in 1997?" he asked
with a grin. An Internet magazine gave him the title.
Hamidi continues to counsel Intel workers who contact his Web site,
www.FaceIntel.com, and he is helping to facilitate three possible
class-action lawsuits against the chip maker. He receives e-mail on his
site from people around the world, and spends hours each evening at his
computers.
"They cannot force me into submission," Hamidi said. "If I have been
wronged, I will stand up and say, 'You have wronged me.' That is my
constitutional right."
***************************
Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 510
2120 L Street, NW
Washington, D.C. 20037
202-478-6124
lillie.coney@xxxxxxx