[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips December 9, 2002
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, glee@xxxxxxxxxxxxx;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, akuadc@xxxxxxxxxxx;, computer_security_day@xxxxxxx;, waspray@xxxxxxxxxxx;
- Subject: Clips December 9, 2002
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Mon, 09 Dec 2002 15:30:34 -0500
Clips December 9, 2002
ARTICLES
Norwegian DVD hacker, 18, goes on trial
Lawmaker reviving failed e-waste bill
Israel, FBI Find Suspected Credit Hacker
Bay Area embraces Internet, poll finds But gap widens in computer use
DOD still working on change
FBI seeks to link joint terrorism task forces
Justice states Ptech presents no security risk
Online rule-making to debut Dec. 18
Scientists seek revamped federal supercomputing effort
New technologies key to Defense transformation, says official
*******************************
Houston Chronicle
Norwegian DVD hacker, 18, goes on trial
Associated Press
OSLO, Norway -- Jon Lech Johansen was only 15 when he wrote and distributed
on the Internet for free a program that unlocked copy-protected DVDs,
giving Hollywood nightmares and making him a folk hero among hackers.
Three years later, he's going on trial in an important test case for
Norway's strict laws against computer piracy and hacking.
The proceedings begin today in Oslo District Court and are expected to last
five days, with Johansen taking the stand. But whatever the trial's
outcome, the digital copycat is well out of the bag.
The short program Johansen wrote is only one of many easily available
programs that can break DVD security codes. One is included in a software
package, sold by a U.S. company, that even burns DVDs after cracking the
copy protection.
Johansen has refused to talk to reporters ahead of his trial. But his
defense attorney, Halvor Manshaus, said the teenager has done nothing
wrong, having only written a small program using security-breaking code
developed and sent to him by others.
Under the law, Johansen could be sentenced to up to two years in prison,
fines and compensation, although few expect the teen to do any prison time.
The charges were filed after Norwegian prosecutors received a complaint
from the Motion Picture Association of America, which represents the major
Hollywood studios.
The prosecutors agreed with the movie industry that Johansen's program, in
effect, left their property unlocked and open for theft. Called DeCSS, it
compromised an industry-developed software scheme called the Content
Scrambling System -- usually called CSS -- that was designed to prevent
unauthorized duplication.
Johansen has said he wanted only to watch DVDs on his Linux-based computer,
which lacked the DVD-viewing software of Windows and Macintosh users.
However, DeCSS also lets people copy and share DVD files on the Internet,
thus allowing others to obtain movies for free.
"The access was a violation because the DVD films were sold on the
condition that the user would use authorized playing equipment and respect
the copy protection," the indictment says.
More than 5,000 copies of the DeCSS program were downloaded from the
Internet in the first three months after it was posted in late October
1999, prosecutors say.
Johansen, now 19 and known in Norway as "DVD Jon", became a rallying point
for hackers, some of whom even marched in his support when witnessed at a
New York trial against others who had linked to his DeCSS program.
In the United States, the case is seen as a test of freedom of expression,
since proponents claim that writing such software is an exercise in
intellectual freedom rather than an attempt to steal copyright material.
The act of cracking the code in and of itself should not be criminal, such
people argue.
Johansen's DeCSS program has been the subject of at least three lawsuits in
the United States.
The Electronic Frontier Foundation, a civil liberties organization based on
San Francisco, Calif., has criticized the prosecution of Johansen as
distorting a law intended for serious criminal activity, like breaking into
a bank's computer system.
Johansen, it notes, merely broke in to a DVD he bought legally.
******************************
Mercury News
Lawmaker reviving failed e-waste bill
By Jim Puzzanghera
Mercury News Washington Bureau
WASHINGTON - To deal with the growing problem of electronic waste, a Bay
Area member of Congress plans to reintroduce legislation next month calling
for a fee of up to $10 on each new computer to fund national recycling efforts.
``It's a problem that's really crying out for a solution,'' said Rep. Mike
Thompson, D-Napa, who sponsored similar legislation earlier this year. ``I
think the entire industry recognizes that it's a problem.''
Thompson's proposal follows a Mercury News series detailing the labor and
environmental problems of computer recycling in China. It also follows the
recent announcement by Hewlett-Packard that the world's largest computer
maker now intends to work with California officials to develop a solution
to the problem of toxic electronic waste.
HP had lobbied hard against an e-waste recycling bill earlier this year,
helping persuade Gov. Gray Davis to veto the legislation.
HP and the rest of the computer industry would prefer a nationwide solution
that would avoid a patchwork of different state regulations. An
organization of companies, government agencies and non-profit groups trying
to find a consensus on the issue may have some recommendations as early as
February.
Rep. Zoe Lofgren, a San Jose Democrat and a strong voice in Congress on
high-tech issues, also said she is looking at crafting legislation to
address the problem when the new congressional session begins in January.
``The point made that this really is a nationwide issue, it's not a
California issue, is true,'' Lofgren said.
The Mercury News series showed how the computer industry has distanced
itself from taking responsibility for toxic materials in its products.
Migrant workers in China earning pennies a day end up scavenging an
increasing number of discarded personal computers, pulling out the
hazardous materials with no protection. And industry efforts to solve the
problem have been ineffective.
A consensus about how to deal with the problem among politicians, industry
officials and environmentalists would be crucial to getting
electronic-waste legislation through Congress next year. The issue is not
on the agenda of either party's leadership, meaning a bill lacking broad
support may not even make it to a hearing, much less a vote.
Consensus needed
And Lofgren predicted that the only way to get the signature of President
Bush is to have the industry and both political parties strongly on board.
But California's continued push on the issue may help force it onto the
congressional agenda, Lofgren said.
Led by state Sen. Byron Sher, D-San Jose, who plans to reintroduce the
electronics-recycling legislation that Davis vetoed in October, California
has been at the forefront of dealing with an issue that is getting more
attention in statehouses around the country. Last year, 24 states
contemplated legislation dealing with electronic waste, according to the
Electronic Industries Alliance, a trade group representing 2,300 companies.
The high-tech industry is adamant about avoiding computer-recycling laws
that differ from state to state, said Heather Bowman, director of
environmental affairs for the alliance.
``The one thing that all of our manufacturers agree on -- and I can hardly
ever say that -- is this shouldn't be done on a state-by-state level,'' she
said. ``It would be way too complex.''
But that's where the consensus ends.
Sher's legislation in California would require a $10 fee on the sales of
new computer monitors and televisions to help pay for the recycling of
cathode ray tubes in those devices, which are laden with hazardous lead.
The money would then be distributed to local governments, non-profit
agencies and others who handle recycled electronics.
Thompson's legislation would go beyond the recycling of cathode ray tubes
to other dangerous electronic waste. It would impose up to a $10 fee on the
retail sales of computers, monitors and laptops to help establish
computer-recycling programs throughout the country. The money would go to
the Environmental Protection Agency, which would distribute grants to state
and local governments, businesses or other groups to set up environmentally
responsible recycling programs.
The high-tech industry would prefer voluntary programs, and would like the
fee to be paid when the electronics are disposed of, not when they are
purchased, Bowman said.
HP would like to see Thompson's proposal deal only with cathode ray tubes,
the company said.
``We should walk before we run,'' said David Isaacs, HP's director of
global public policy. He said legislation should start with the recycling
of cathode ray tubes and see how that works before addressing the broader
issue of recycling waste in the computer's central processing unit.
Seeking support
Thompson so far has taken the lead in Congress on the issue. He introduced
the Computer Hazardous Waste Infrastructure Act in July and lined up 15
co-sponsors, including three Republicans -- crucial in the GOP-controlled
House of Representatives. But with the bill coming late in the
congressional session, it was referred to an Energy and Commerce
subcommittee and did not receive a hearing before the House adjourned for
the year.
Lofgren said she was unaware of Thompson's bill until this week, and a news
liaison for Rep. Mike Honda, D-San Jose, said the bill's late introduction
meant his staff had not had a chance to review it. Thompson is also looking
for someone in the Senate to help shepherd the legislation through that
chamber. He said he had had preliminary discussion with California Sens.
Barbara Boxer and Dianne Feinstein, but said the process had just begun.
Thompson acknowledged that dealing with mounting toxic electronic waste is
not a priority for either Democrats or Republicans in Congress right now.
But momentum might be building for federal legislation.
``I don't expect I'll introduce this on a Tuesday and it will be heard the
following Wednesday. It's going to take a while,'' he said. ``We'll come
back next year and continue to work on it.''
***********************************
Associated Press
Israel, FBI Find Suspected Credit Hacker
By RAMIT PLUSHNICK-MASTI, Associated Press Writer
JERUSALEM (AP) - Israeli police, aided by the FBI (news - web sites),
arrested an Israeli suspected of hacking into computers of a U.S.-based
electronics company and stealing personal information, including the credit
card numbers of some 80,000 customers, according to court document released
Sunday.
David Sternberg, 24, of the port city of Haifa, was arrested late Friday
while driving in a stolen car, police said. The FBI notified the Israelis
he was wanted in 2000 and police began searching for him in 2001, according
to the transcript of his detention hearing.
Sternberg allegedly broke into the computers of a large U.S. company that
sells CD-ROMs and DVDs, but police refused to release the name of the
company. The court document also did not mention the company's name.
"It's a company in the (United) States. The FBI had been in connection with
us about this case. ... He (Sternberg) was listed as wanted for
investigation," police spokesman Gil Kleiman said.
The U.S. Embassy spokesman said he had no immediate information about the
case.
In more than two years of Israeli-Palestinian violence, cyberwar has become
an integral part of the fighting as Israeli and Palestinian hackers attack
rival Web sites and computers crashing, jamming and overwriting systems.
**********************************
Washington Post
E-Mail Overload Is a Myth, Study Says
Findings Differ From Popular Belief
By Shannon Henry
Washington Post Staff Writer
Monday, December 9, 2002; Page E05
Most American workers are not -- repeat not -- overwhelmed by stuffed
e-mail inboxes or vast amounts of spam, according to a new study that
contradicts conventional wisdom that e-mail has become a major burden on
people's lives.
About 60 percent of workers surveyed for the study by the Washington-based
Pew Internet & American Life Project said they receive an average of 10 or
fewer messages per day.
When asked to describe their e-mail load, 65 percent of respondents said
"e-mail is not a problem whatsoever," while 30 percent said they manage to
stay on top of it and just 4 percent said they felt under e-mail siege.
Deborah Fallows, a senior research fellow at Pew and author of the study,
said the findings shocked her. She personally gets too many e-mails, and so
do most of the people she knows.
Fallows said the counterintuitive results show there is a relatively small
and vocal group of workers -- about 15 to 20 percent of the population, who
are what she calls "power e-mailers" who handle high volumes of e-mail, but
most users are simply not drowning in electronic mail at work.
Pew's conclusions, however, do not match the findings of other
organizations that study Internet use.
"It makes no sense to me," said Maurene C. Grey, research director of
Gartner Inc., a research firm in Stamford, Conn.
"We've found workers are extremely overloaded. My gut reaction was who in
the world were they interviewing? I would seriously question the results of
that study."
Grey said she has found the opposite to be true, that e-mail use among
workers is growing enormously and that nearly 100 percent of those she
talks to say e-mail has become a productivity drain as well as a
productivity enhancer.
If such a study is true, said Grey, she cannot imagine why a successful
cottage industry has sprouted up to help employees better manage their
e-mail. For example, Brightmail Inc. of San Francisco, which creates
anti-spam software, says that in September 2001 unsolicited bulk e-mail,
known as "spam," represented 8 percent of all e-mail volume.
However, that number jumped to 35 percent in September 2002, said Francois
Lavaste, Brightmail's vice president of marketing.
Grey said that if Pew mainly interviewed "mom and pop" store workers, such
as those who work in the bagel store down the street, it is possible that
many of those employees use e-mail much less often than office workers and
are therefore less likely to be overwhelmed by e-mail.
Pew surveyed 2,447 Internet users, 1,003 of which use e-mail at work, by
conducting random phone calls across the country. The study only
concentrated on e-mail in the workplace. Had it also included e-mail use at
home, the findings would have been vastly different, Fallows said. Spammers
aggressively target users of the most popular home e-mail services,
including America Online, Yahoo and Microsoft's Hotmail, because e-mail
addresses using those domain names, such as johnsmith@xxxxxxx, can be more
easily guessed and reach more users than those at individual corporations.
In addition, anti-spam technology and information technology officers at
companies have become more adept at stemming the flow of unwanted mail.
Not everyone is entirely thrilled with e-mail, however, the study said.
About a quarter of work e-mailers find e-mail distracting. And one-fifth
said e-mail has caused misunderstandings on the job.
Fallows said some people Pew spoke with said they were so sick of e-mail
overload that they ignored e-mail or intended to stop checking e-mail
altogether. The study found that 11 percent of "power users" felt
overwhelmed by e-mail, compared with 2 percent of regular users. But she
said those people were rare, and more power users are sophisticated enough
to have effectively figured out how to manage their inbox.
*****************************
San Francisco Chronicle
Bay Area embraces Internet, poll finds But gap widens in computer use
between rich, poor
Bay Area residents are increasingly logging on to the Internet, although
the gap in use between high- and lower-income groups is widening, according
to a new survey.
The annual Bay Area Poll, commissioned by the Bay Area Council business
group, underscores the persistence of the so-called digital divide.
But the survey also paints a picture of a region that has embraced
technology more than many other areas of the country.
Among the findings is that nearly 75 percent of all local residents use the
Internet at least once a week, up 3 percent from last year. Nationally, the
average is around 60 percent.
Bay Area residents with annual household incomes of more than $80,000 led
the online charge. Their rate of adoption surged to 90 percent, up 5
percent from last year.
But Internet use in lower-income households grew more slowly, according to
the survey. Nearly 58 percent of residents with household incomes of less
than $40,000 said they used the Internet, up only 2 percent from the
previous year.
The digital divide becomes even more glaring when computer use is
considered. Computer adoption actually declined 3 percent for lower-income
residents to 65 percent, according to the survey. However, the rate for
higher- income residents surged 5 percent to 92 percent.
For years, educators and economists have worried about the poor being left
behind in the Internet revolution. They say that the online have-nots are
more likely to fall behind in school and therefore be unqualified for
higher paying jobs.
"It is troublesome to us that that digital divide is widening," said Sunne
Wright McPeak, chief executive for the Bay Area Council. "What that
suggests is a hardening of adoption in the poorer neighborhoods that is
going to require a strong public policy to break through the barriers."
The Bay Area Poll, released today, is derived from 600 telephone interviews
across an array of topics with a representative sample of Bay Area
residents. The margin of error is plus or minus 4 percent.
For the first time, residents were asked whether they access the Internet
on dial-up or high-speed connections. The responses showed a relatively
high percentage of the public using broadband compared with national averages.
Among Internet users, 43 percent said they have high-speed connections at
home through cable or DSL lines. Fifty-three percent said they had regular
telephone modem connections.
Nationally, the breakdown is around 28 percent for broadband and 71 percent
for dial-up connections, according to NetRatings, a market research firm.
The most popular use for the Internet, the survey found, was reading
reference materials, journals or databases. Second place went to accessing
online news, followed by travel and weather information in third place.
The mean time spent online at home and work for online users was 11.46
hours, according to the survey.
Results for all questions will be available Wednesday on the Bay Area
Council Web site at www.bayareacouncil.org.
[For statistics, see:
http://sfgate.com/cgi-bin/article.cgi?f=/c/a/2002/12/09/BU203352.DTL&type=chart]
*******************************
Federal Computer Week
DOD still working on change
BY Nancy Ferris
Dec. 9, 2002.
The military is embracing the idea of network-centric warfare, but Defense
Department officials need to change their mind-sets if they want to make it
stick, according to the man who first championed the concept.
"Much of what they focus on is becoming irrelevant," said retired Vice Adm.
Arthur Cebrowski, director of the Pentagon's Force Transformation Office,
at the annual conference of the non-profit CNA Corp. (formerly the Center
for Naval Analysis).
DOD and Congress, for example, are debating what kinds of aircraft to
build, while "the real fight is over sensors" the systems that find and
identify enemy forces, then launch attacks, he said.
Cebrowski called for acceleration in the transition from the Industrial Age
to the Information Age, saying that "fighter vs. fighter combat is in a
state of devolution" as threats increasingly come from small nations that
lack major military forces or from groups not aligned with nations. With
better information systems, the United States will be better prepared to
combat these "asymmetric" threats, he said.
The transformation chief said speed is an important ingredient of 21st
century warfare, but information and combat orders are slowed down by
having to move up and down each service's ranks, because "we have no joint
structures" that extend onto the battlefield.
Retired Rear Adm. Michael McDevitt, who is now on CNA's staff, cited the
Global Positioning System as an example of how information technology can
change the character of military operations. He said that future historians
probably will conclude that "GPS has been as transformative as the aircraft
or the internal combustion engine."
But retired Marine Corps Lt. Gen. Paul Van Riper challenged the
conventional wisdom about the importance of IT. He said civilian and
military leaders are making the microprocessor the focus of the
transformation drive, and he fears that focus is a mistake that could leave
the armed services unprepared for a future war.
The notion of network-centric warfare does little to prepare soldiers and
sailors for actual combat against a real enemy, Van Riper said. Instead of
focusing on IT, he said, the services must develop new concepts of
effective military operations. "Don't put your faith in the technology," he
said after the conference, "You've got to do the thinking first."
Other speakers also called for development of new concepts of operations
for joint forces. But few joined in Van Riper's criticism of what he
considers excessive reliance on IT.
Lt. Gen. John Riggs, director of the Army's Objective Force Task Force,
said, "Still to this day, we haven't discovered all that is to be
discovered" about IT, but we do know it's a force multiplier.
An enterprise architecture is one element of the Army's transformation
plan, known as Objective Force, but he acknowledged that the service faces
"a significant integration challenge" just to get its own systems
communicating with one another.
In the Navy, "we are plugging in like we never have before," said Vice Adm.
Michael Mullen, deputy chief of resources, requirements and assessments for
the service. The forthcoming ForceNet architecture will pull together the
enabling technology for the transformed Navy, he added.
The Air Force, too, is counting on an enhanced network linking sensors,
communications systems and weapons systems, said Maj. Gen. Ronald Bath, the
service's director of strategic planning.
Ferris is a freelance writer in Chevy Chase, Md. She can be reached at
nancy.ferris@xxxxxxxx
************************************
Federal Computer Week
FBI seeks to link joint terrorism task forces
Bureau wants to streamline info sharing
As part of the FBI's effort to enhance its information-sharing
capabilities, the bureau is attempting to link more than 50 joint terrorism
task forces (JTTF) on a network that would far surpass current
communication methods.
The FBI established many of the task forces following the Sept. 11, 2001,
attacks as a way to streamline communications and intelligence-sharing
efforts. The task forces include representatives from the Defense
Department and other government agencies at each of the FBI's 56 field
divisions nationwide.
"One year ago, nearly half of these task forces didn't exist," FBI Director
Robert Mueller said in an October address at the International Association
of Chiefs of Police's annual conference. "The ones that did exist were not
nearly as large as they are now. Today, information flows more freely. Tips
are routed more quickly. Leads are covered more efficiently. Again, it is
not perfect. But it gets better every day."
Now, the bureau is focused on providing a common operating picture for JTTF
participants as well as finding a way to link all of the task forces so
they can share information, said James McDougall, deputy
counterintelligence staff officer at the U.S. Pacific Command. Even though
each participant has a computer system, "we're attempting to find a common
picture for all of them," he said last month after participating in a panel
at AFCEA International's TechNet Asia-Pacific conference in Honolulu.
JTTF-Pacific may have inspired the FBI's plans to link the task forces
nationwide. It is composed of 19 federal, state and local government
agencies, including Pacom, the FBI, the Army and the Navy, McDougall said,
adding that the Customs Service and the Immigration and Naturalization
Service soon will join on the intelligence side.
Furthermore, as manager of the FBI's National Intel Share Project, Bill
Eubanks is coordinating an initiative to ensure the basic sharing of
appropriate information and intelligence among the bureau and other
federal, state and local law enforcement entities, Mueller said. "We have
more to do and we know it," he said. "But we are seeing an unprecedented
level of cooperation throughout the law enforcement community. Some of the
most significant changes have less to do with what we are doing and more to
do with how we are doing it."
JTTF-Pacific has a standard DOD communications suite, which can handle
information ranging from sensitive to unclassified, but the bureau still
uses computer systems for its daily operations that are incompatible with
the DOD tools.
That disconnect means participants often have to rely on the "shoulder tap"
method to share intelligence, as opposed to simply clicking a button,
McDougall said.
Another complication was identified when trying to share intelligence with
local law enforcement officials. The chief of the Honolulu Police
Department has top-secret clearance but no access to DOD's Secret Internet
Protocol Router Network, so pertinent messages must be sent via trusted
courier or delivered in person, McDougall said.
To eliminate such problems, Pacom hired a contractor on behalf of JTTF-
Pacific to create a way for task force members to use a common operating
picture, or at the very least, establish high-speed, secure links among
computer systems, he said.
Security requirements, such as identifying sufficient software or firewall
solutions, complicate the establishment of those links, McDougall said.
After learning of the Hawaii team's work, officials at FBI headquarters
decided that the contractor also should examine ways to link the 56
geographically disparate JTTFs, he said, adding that he could not name the
vendor for security reasons.
Oliver "Buck" Revell, former associate deputy director for investigations
at the FBI, said JTTFs can exchange information through encrypted teletypes
or sec-ure faxes and telephones, but they crave a network to quickly and
securely connect them all.
"That link would not be as cumbersome as teletype, and the secure phone and
fax [lines] are insufficient" for work the task forces need to do and the
information they need to share, said Revell, president of Revell Group
International Inc., a security consulting company. "They are all anxious to
have it."
The FBI did not return calls seeking comment.
*******************************
Government Computer News
Justice states Ptech presents no security risk
By Wilson P. Dizard III and Patience Wait
Post Newsweek Tech Media
In the aftermath of an early Friday search of software vendor Ptech Inc.'s
headquarters, Justice Department officials say the government does not have
any reason to believe any federal systems have been compromised.
"The search was conducted in connection with an on-going financial crime
investigation," U.S. Attorney for Massachusetts Michael J. Sullivan said in
a statement. "Media characterizations of this as a terrorist investigation
are premature."
For its part, Ptech denied that that the search of its Quincy, Mass.,
offices constituted a raid and said it was cooperating with the
investigation. "The company categorically denies having any connection with
a terrorist organization," a company release said.
Sullivan said because Ptech had provided software to federal agencies,
"there have been questions raised concerning their products. All the
products provided to the government were of a nonclassified nature.
However, out of an abundance of caution, the affected government agencies,
including the FBI, conducted a review of their computer systems."
The General Services Administration said in a statement that Ptech has
conducted about $3.3 million in work for the federal government under a GSA
schedule contract.
The review had not uncovered any vulnerabilities in Ptech products,
Sullivan said. "There is also no evidence to suggest that the system is
susceptible to compromise or poses any security risk," he said.
Sources close to the company said it had never worked on any classified
systems, and federal background checks of its employees had been carried
out for other reasons, such as contact with sensitive information. Ptech
said it had been told by government investigators that neither the company
nor its officers and employees are the target of the government's
investigation.
Ptech said company officials had granted federal investigators access to
the company's premises. "Moreover, Ptech has assisted the government in its
investigation and intends to continue to do so," the company said.
The investigation has drawn IBM Corp. into the fray as well because Ptech
promotes an "alliance partner" relationship with IBM on its Web site. IBM
spokesman Jeff Gluck minimized the connection between the two companies. "A
lot of small companies like to play up the relationship with IBM. This is
one example," Gluck said.
Gluck confirmed that Ptech has worked with IBM's global services group to
help map and model enterprise architectures. "There are engagements where
we're working together, [and] places where Ptech sold us their software,"
he said. But there is no reason to suspect there's anything wrong with the
software, Gluck said.
No law enforcement agencies have contacted IBM about Ptech, he said.
*********************************
Government Computer News
By Jason Miller
GCN Staff
The Office of Management and Budget and the Environmental Protection Agency
plan to launch the first iteration of the Online Rulemaking e-government
project on Dec. 18. The portal, at www.regulations.gov, will let citizens
and businesses find and comment on proposed federal regulations.
An OMB official said the portal will be fully functional by then, but OMB
will launch it formally at a ceremony early next month.
Although OMB hoped to get the system up in September, load testing and
software compatibility problems moved the date back to October and then to
Dec. 18, the official said [see story at
www.gcn.com/vol1_no1/daily-updates/20117-1.html]. Despite the delays, the
project still is ahead of its Dec. 31 deadline.
The official said OMB moved the project to EPA from the Transportation
Department in October after an independent evaluation of agency online
rule-making systems found that EPA's system is best suited to go
governmentwide. The project's business case calls for agencies to migrate
to the EPA system, the official said, so it made sense for EPA to manage
the project.
******************************
Government Executive
Scientists seek revamped federal supercomputing effort
By Bara Vaida, National Journal's Technology Daily
In April, Japan rocked the U.S. supercomputer sector, which traditionally
has led the world in producing the fastest machinery, with the unveiling of
the Earth Simulator, a $400 million product that outpaces the speed of U.S.
supercomputers.
Now U.S. scientists are hoping that their government will boost spending in
fiscal 2004 to keep pace with Japan, whose government paid the Japanese
computer firm NEC to create the supercomputer. The Earth Simulatorso named
because it aims to create a "virtual earth" that could simulate various
climate conditionsmatches the raw computing power of 20 of the fastest
American computers combined.
"There is a fear that our technology leadership could go overseas" unless
the United States invests in keeping its lead in high-end computing, said
Jim Rottsolk, chairman and CEO of the Cray supercomputer company.
The United States has increased significantly its investment in
non-defense, high-end computing research and development over the past five
years, with an estimated $846.5 million expected to be spent in fiscal
2003, up from $462.2 million in fiscal 1998. The increase is spread
throughout agencies such as the Energy Department and Defense Advanced
Research Projects Agency.
The White House Office of Science and Technology Policy declined to comment
on whether the Bush administration will continue to increase its investment
in high-end computing because the formal fiscal 2004 budget will not be
released until February, but Ray Orbach, director of Energy's Office of
Science, has testified to Congress that keeping the United States' lead in
supercomputing is his top priority.
The nation has fallen behind Japan in supercomputing, some scientists
argue, in part because over the past 10 years the United States has focused
on "distributed cluster computing," which involves a collection of
interconnected computers that comprise a unified resource. Some government
agencies considered this type of computing less expensive than investing in
singular, large supercomputers.
Chris Jehn, vice president of government programs at Cray, said the problem
with clustered computers is that the high-speed connections achieve less
than 10 percent of the potential speed of a networked machine. Japan
invested in building faster connections that enable the Earth Simulator to
reach 50 percent to 70 percent of the machine's processing power, he said,
and that is why Japan has taken the lead in producing the fastest
supercomputer.
"Ten years ago, many thought clustered commodity computing was the future
of supercomputing," Jehn said. "But as it turns out, challenging scientific
and technical problems ... are not handled well by cluster computing." He
cited cryptanalysis, the theory and art of cracking computer codes, as one
such problem.
Cray customized its processors and connections within machines for higher
speeds and hence is on track to eventually match the Earth Simulator's
computing speeds, Jehn said.
On another front, Jehn noted that there is no U.S. supercomputing policy, a
point that got Congress's attention last year. The fiscal 2002 Defense
appropriations law required the National Security Agency to study whether a
supercomputing strategy should be crafted. That study has been completed
and is being reviewed within the Pentagon, Jehn said.
****************************
Government Executive
New technologies key to Defense transformation, says official
From National Journal's Technology Daily
The Pentagon sees great value in developing operational prototypes of
technologies to determine whether they can assist in the Defense
Department's efforts to transform the military into a high-tech force,
according to the director of the Defense transformation office.
Retired Adm. Arthur Cebrowski said in a press briefing last week that a
robust prototyping program causes a ripple-down effect on defense acquisition.
Cebrowski also cited the importance of working with foreign partners to
develop new concepts and technologies. New technology is key to
transformation, as it gives an advantage for the period of time before
adversaries obtain it, he said. He emphasized the importance of looking for
new technologies beyond the traditional defense industry.
Cebrowski also addressed interoperability and said the Sept. 11, 2001,
terrorist attacks gave the transformation effort an "enhanced sense of
urgency." It also has proved the need to expand U.S. capabilities, he said.
*******************************
Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 510
2120 L Street, NW
Washington, D.C. 20037
202-478-6124
lillie.coney@xxxxxxx