[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips December 10, 2002
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, glee@xxxxxxxxxxxxx;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, akuadc@xxxxxxxxxxx;, computer_security_day@xxxxxxx;, waspray@xxxxxxxxxxx;
- Subject: Clips December 10, 2002
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Tue, 10 Dec 2002 13:05:52 -0500
Clips December 10, 2002
ARTICLES
Sklyarov testifies in copyright trial
UMBC students' data put on Web in error
New Tools for Domestic Spying, and Qualms
Report suggests ID alternatives
Creating a Web directory
This is citizen-centered?
CDC system will share data with states
Homeland Security's enterprise architecture deadline extended
Patent office unveils electronic application prototype
Defense to influence tech industry to develop systems useful to military
NIPC chief Ron Dick to retire
Is That Really You? Check My DNA
ICANN At-Large Reps Can Keep Jobs
US Warns Against Buying Certain Drugs Via Internet
Landmark Net libel case approved
Domain names competition opens with a twist [New Zealand]
*****************************
CNET
Sklyarov testifies in copyright trial
By Lisa M. Bowman
Staff Writer, CNET News.com
December 9, 2002, 6:51 PM PT
SAN JOSE, Calif.--The long-awaited live testimony of Dmitry Sklyarov
finally got under way in the ElcomSoft trial Monday afternoon, when the
Russian programmer took the stand for the defense.
ElcomSoft, a software company based in Russia, is charged with five counts
of offering and marketing software designed to crack Adobe Systems' eBooks,
actions prosecutors say violate digital copyright laws.
Sklyarov, whose arrest in July 2001 prompted the case against his employer,
was expected to be called as a government witness. Sklyarov was jailed
after giving a speech about his company's software, but prosecutors later
set aside charges against him in exchange for his testimony in the case
against ElcomSoft. Instead of calling him to the stand during the trial,
however, government lawyers played an edited videotape of Sklyarov's
deposition and would not comment on their decision.
The trial is the first major test of the criminal provisions of the Digital
Millennium Copyright Act (DMCA), which outlaw the offering of software that
can be used to crack copyright protection. The case also raises questions
about how much control a publisher should have over its products after
they've been purchased by a consumer.
Because digital material is so easy to copy and distribute, copyright
holders have sought unprecedented controls over their work, ranging from
technical measures that prevent replicating and printing to laws such as
the DMCA. However, many programmers fear such crackdowns could discourage
technical development and research if engineers fear they will become the
target of criminal suits.
During Sklyarov's testimony Monday in federal court here, ElcomSoft
attorney Joseph Burton tried to paint the programmer as an upstanding
assistant professor who sought to expose flaws in Adobe software as part of
his dissertation. Prosecutors, meanwhile, sought to portray Sklyarov as an
associate of underground hacker networks who didn't care whether the
product he developed broke U.S. laws.
Sklyarov, who declined to use an interpreter while on the stand, testified
that he developed the Advanced eBook Processor while working for ElcomSoft.
During questioning from Burton, he said that although the software could be
used for nefarious purposes such as widely distributing electronic
documents, he actually intended it to be used so people could make backup
copies of an eBook they'd bought, print pages, or transfer it to a reading
device for the blind.
"Was it your intent to violate anyone's rights?" Burton asked. "No,"
Sklyarov replied.
The defense also played a tape of the speech that spurred Sklyarov's
arrest. During his presentation on flaws in eBook security at the DefCon
convention in Las Vegas, Sklyarov told the audience that a publisher of an
eBook "puts itself in danger" when it relies on the insecure software
provided by software publishers including Adobe.
During testimony Monday, Sklyarov told the jury that his software
demonstrates security flaws in such software. "The general pubic needs to
choose which solutions are secure and which are not," he said.
Burton also tried to diffuse government attempts to characterize ElcomSoft
as a shady company that attends hacker conventions.
"Do you consider yourself to be a hacker?" Burton asked Sklyarov.
Sklyarov said he did not. "I am computer engineer, programmer," he said.
During cross-examination, assistant U.S. Attorney Scott Frewing disputed
Sklyarov's assertions that his software was intended for the benign
purposes of helping the blind or letting people print. Frewing pointed out
that after ElcomSoft's product is applied to an eBook, the statement
"protections successfully removed" appear.
In one dramatic moment in a relatively anticlimactic afternoon of
testimony, Frewing forced Sklyarov to acknowledge that he didn't consider
the legality of his program.
"Isn't it true that when you wrote this software you didn't care whether it
violated laws in the U.S.?" Frewing asked.
"That's true," Sklyarov said.
ElcomSoft Managing Director Vladmir Katalov took the stand after Sklyarov.
He testified that ElcomSoft, which also makes password-retrieval software,
has many major customers for its products, including Adobe and the U.S.
Department of Justice.
*******************************
CNET
Australian court to hear Net case
By Reuters
December 9, 2002, 9:45 PM PT
CANBERRA, Australia--Australia's highest court ruled Tuesday that a
defamation case sparked by a story on a U.S Web site could be heard in
Australia, opening a legal minefield for Web publishers over which libel
laws they must follow.
The landmark ruling that an article published by Dow Jones was subject to
Australian law--because it was downloaded in Australia--is being watched by
media companies, as it could set a precedent for other cases.
Dow Jones argued the case, brought by Australian mining magnate Joseph
Gutnick for an Internet version of an article from Dow Jones' Barron's
magazine, should be heard in the United States, where libel laws are
considered relatively liberal.
Debate centered on whether an alleged defamation was published in New
Jersey, where Dow Jones's Web servers are located, or in Victoria,
Australia, where some readers saw the story.
Gutnick, who has initiated defamation proceedings in his home state of
Victoria, was delighted with the ruling.
"They'll have to be very careful what they put on the Net. The Net is no
different from a regular newspaper. You have to be careful what you write,"
he told Australian television.
A disappointed Dow Jones said in a statement that it would continue to
defend the case brought by Gutnick.
Two Victorian courts refused Dow Jones' application. The publisher then
appealed to the High Court of Australia, which unanimously dismissed its
appeal.
"The court was asked to determine where that article was published. It has
made no findings on the merits of the defamation action itself," the court
said in a statement.
The ruling caught the eye of the media sector because it was believed to be
the first time a country's highest court has defined where Internet
publication takes place in a libel case.
The court allowed 18 organizations to make submissions to the hearing,
including AOL Time Warner, Amazon.com, the Associated Press, Bloomberg,
News Corp., Reuters and Yahoo.
Dow Jones, which also publishes The Wall Street Journal, had argued that
exposing Internet publishers to defamation suits in jurisdictions where
material is downloaded could lead to claims all over the world and restrict
freedom of speech.
But the court dismissed Dow Jones' concerns of multiple defamation actions
arising from one publication. It said a publisher could argue it should
only have to defend itself once.
The court said a claim could be brought only if the person had a reputation
in the place where the material was published--in this case, Gutnick's home
town of Melbourne.
Dow Jones said it was encouraged the court ruling recognized the "novel,
complex and global" issues of Internet publication which the publisher said
needed international discussion.
The executive director of Australia's Internet Industry Association, Peter
Coroneos, said the ramifications of the ruling were profound for anyone
publishing content on the Internet.
"However, the practicalities of bringing legal actions could ultimately
prevent the mass of suits that some have feared," he said.
********************************
Baltimore Sun
UMBC students' data put on Web in error
2,500 notified that names, Social Security numbers posted in records
update; 'It was clearly a mistake'
By Laura Barnhardt
Sun Staff
Originally published December 7, 2002
About 2,500 students at University of Maryland's Baltimore County campus
were notified this week that their names and Social Security numbers had
accidentally been published on the Internet, university officials said
yesterday.
The sensitive information has been deleted from public view. But concerns
remain about the security breach and whether students will become victims
of identity theft as a result.
"It's frightening. It shocked me that it could go unnoticed by the
university," said Mark Stewart, a 22-year-old senior from Columbia who
serves as Student Events Board president.
Jack Suess, chief information officer for UMBC, said, "It was clearly a
mistake on our part."
He said that thousands of other students' Social Security numbers might
have been posted on the Internet, but that it didn't appear they had been
accessed.
The problem began at the end of August when the university deleted e-mails
with students' Social Security numbers, not realizing there was an archive
of those e-mails on a Web page. The e-mails had been a normal way of
updating new students' information and changes in registration information,
Suess said. By deleting the e-mails, the restrictions on those who had
access to the Web site archive was also removed, he said.
The Internet search engine Google indexed the Web site containing the
students' names and Social Security numbers in late August. A student
searching to see whether there was public information about him on the
Internet came across the list and informed the university about it Nov. 6,
said Suess.
The information was then deleted from the Web site, but remained cached in
Google's system - a problem the student noted Nov. 12. Working with Google
staff, the information was removed from the Internet on Nov. 15, Suess said.
"Everyone over the last few years has become increasingly concerned about
identity theft," said Suess. "Your name and Social Security number is a
piece of information you want to try to protect."
Baltimore County Detective Mark Watkins, who specializes in identity theft
cases, said identities can easily be stolen with a person's name and Social
Security number. "The Social Security number is the key to your personal
credit," he said. "With a name and a Social Security number you're in the
door, especially at these places that offer instant credit."
Since sending out e-mails last weekend to the 2,500 students whose
information was exposed, Suess said he has received about 25 replies from
students who wanted more information. He and other authorities recommend
everyone check their credit reports annually to ensure there aren't any
oddities.
Suess stressed that there were only about 15 visits to the Web site and
that to find the information, the user would have had to have searched by
name and Social Security number.
Still, students say that doesn't make them feel that much safer.
"The university doesn't seem that concerned," said Brandon Dudley, editor
of The Retriever, the campus newspaper. "Even if there weren't that many
hits on the site, it only takes one person [to illegally use the
information]. ... From talking to students, it seems a lot of them are
concerned about this."
University officials said they expect to complete a $6 million overhaul of
the way they track student information by 2005.
**********************************
New York Times
December 10, 2002
New Tools for Domestic Spying, and Qualms
By MICHAEL MOSS and FORD FESSENDEN
When the Federal Bureau of Investigation grew concerned this spring that
terrorists might attack using scuba gear, it set out to identify every
person who had taken diving lessons in the previous three years.
Hundreds of dive shops and organizations gladly turned over their records,
giving agents contact information for several million people.
"It certainly made sense to help them out," said Alison Matherly, marketing
manager for the National Association of Underwater Instructors Worldwide.
"We're all in this together."
But just as the effort was wrapping up in July, the F.B.I. ran into a
two-man revolt. The owners of the Reef Seekers Dive Company in Beverly
Hills, Calif., balked at turning over the records of their clients, who
include Tom Cruise and Tommy Lee Jones even when officials came back with
a subpoena asking for "any and all documents and other records relating to
all noncertified divers and referrals from July 1, 1999, through July 16,
2002."
Faced with defending the request before a judge, the prosecutor handling
the matter notified Reef Seekers' lawyer that he was withdrawing the
subpoena. The company's records stayed put.
"We're just a small business trying to make a living, and I do not relish
the idea of standing up against the F.B.I.," said Ken Kurtis, one of the
owners of Reef Seekers. "But I think somebody's got to do it."
In this case, the government took a tiny step back. But across the country,
sometimes to the dismay of civil libertarians, law enforcement officials
are maneuvering to seize the information-gathering weapons they say they
desperately need to thwart terrorist attacks.
From New York City to Seattle, police officials are looking to do away
with rules that block them from spying on people and groups without
evidence that a crime has been committed. They say these rules, forced on
them in the 1970's and 80's to halt abuses, now prevent them from
infiltrating mosques and other settings where terrorists might plot.
At the same time, federal and local police agencies are looking for
systematic, high-tech ways to root out terrorists before they strike. In a
sense, the scuba dragnet was cumbersome, old-fashioned police work, albeit
on a vast scale. Now officials are hatching elaborate plans for dumping
gigabytes of delicate information into big computers, where it would be
blended with public records and stirred with sophisticated software.
In recent days, federal law enforcement officials have spoken ambitiously
and often about their plans to remake the F.B.I. as a domestic
counterterrorism agency. But the spy story has been unfolding, quietly and
sometimes haltingly, for more than a year now, since the attacks on the
World Trade Center and the Pentagon.
Some people in law enforcement remain unconvinced that all these new tools
are needed, and some experts are skeptical that high-tech data mining will
bring much of value to light.
Still, civil libertarians increasingly worry about how law enforcement
might wield its new powers. They say the nation is putting at risk the very
thing it is fighting for: the personal freedoms and rights embodied in the
Constitution. Moreover, they say, authorities with powerful technology will
inevitably blunder, as became evident in October when an audit revealed
that the Navy had lost nearly two dozen computers authorized to process
classified information.
What perhaps angers the privacy advocates most is that so much of this
revolution in police work is taking place in secret, said Cindy Cohn, legal
director of the Electronic Frontier Foundation, which represented Reef Seekers.
"If we are going to decide as a country that because of our worry about
terrorism that we are willing to give up our basic privacy, we need an open
and full debate on whether we want to make such a fundamental change," Ms.
Cohn said.
But some intelligence experts say that in a changed world, the game is
already up for those who would value civil liberties over the war on
terrorism. "It's the end of a nice, comfortable set of assumptions that
allowed us to keep ourselves protected from some kinds of intrusions," said
Stewart A. Baker, the National Security Agency's general counsel under
President Bill Clinton.
Tearing Down a Wall
The most aggressive effort to give local police departments unfettered
spying powers is taking place in New York City.
It was there 22 years ago that the police, stung by revelations of
widespread abuse, agreed to stop spying on people not suspected of a crime.
The agreement was part of a containment wall of laws, regulations, court
decisions and ordinances erected federally and in many parts of the country
in the 70's and 80's.
The F.B.I.'s spying authority was restricted, and the United States'
foreign intelligence agencies got out of the business of domestic spying
altogether. States passed their own laws. On the local level, ordinances
and consent decrees were enacted not just in New York but also in Los
Angeles, Chicago, San Francisco and Seattle. In the years since, these
strictures have "become part of the culture," Mr. Baker said.
But the wall is under attack. Last month, a special appeals court ruled
that the sweeping antiterrorism legislation known as the U.S.A. Patriot
Act, enacted shortly after the September 2001 attacks to give the
government expanded terror-fighting capacity, freed federal prosecutors to
seek wiretap and surveillance authority in the absence of criminal
activity. In Chicago last year, a federal appeals court threw out the
agreement that restricted police surveillance. Some officials in Seattle
would like to follow suit, saying they are effectively sidelined in the
terrorism war.
In New York, the Police Department has sued in federal court in Manhattan
to end the consent decree the department signed in 1980 to end a civil
rights lawsuit over the infiltration of political groups.
Attorney General John Ashcroft and New York's police commissioner, Raymond
W. Kelly, say the wall is a relic unnecessary and, worse, dangerous. David
Cohen, the former deputy director of central intelligence who is now the
Police Department's deputy commissioner for intelligence, argues that the
consent decree's requirement of a suspicion of criminal activity prevents
officers from infiltrating mosques.
"In the last decade, we have seen how the mosque and Islamic institutes
have been used to shield the work of terrorists from law enforcement
scrutiny by taking advantage of restrictions on the investigation of First
Amendment activity," Mr. Cohen said in an affidavit.
The police in other cities cite the same need. "We're prohibited from
collecting things that will make us a safer city," said Lt. Ron Leavell,
commander of the criminal intelligence division of the Seattle police.
Mr. Cohen did not argue in his affidavit that the authorities, if
unshackled, could have prevented the Sept. 11 attacks. But he did suggest
that the F.B.I.'s failure to dig more deeply into the information it had
before the attacks turned on agents' fears that they could not climb the wall.
"The recent disclosure that F.B.I. field agents were blocked from pursuing
an investigation of Zacarias Moussaoui because officials in Washington did
not believe there was sufficient evidence of criminal activity to support a
warrant points out how one person's judgment in applying an imprecise test
may result in the costly loss of critical intelligence," Mr. Cohen said.
Mr. Cohen has also asked that his testimony before the federal court be
given in secret, unheard even by opposing lawyers. Last week, a judge told
New York City that it needed to present better arguments to justify such
extraordinary secrecy.
Civil libertarians, frustrated that they cannot draw the other side into a
debate, argue that questions about the need for such expanded powers are
critical, and far from answered. "Who said you have to destroy a village in
order to save it?" asked Jethro Eisenstein, one of the lawyers who
negotiated the original consent decree. "We're protecting freedom and
democracy, but unfortunately freedom and democracy have to be sacrificed."
Even the police are far from unanimous about how intrusive they must be.
The Chicago police, who have been free from their consent decree for nearly
two years, say they have yet to use the new power. The Los Angeles police
have made no effort to change their guidelines.
"I have not heard complaints that the antiterrorist division has been
inhibited in its work," said Joe Gunn, executive director of the Los
Angeles Police Commission.
A joint Congressional inquiry into intelligence failures before Sept. 11
concluded that the failures had less to do with the inability of
authorities to gather information than with their inability to analyze,
understand, share and act on it.
"The lesson of Moussaoui was that F.B.I. headquarters was telling the field
office the wrong advice," said Eleanor Hill, staff director of the inquiry.
"Fixing what happened in this case is not inconsistent with preserving
civil liberties."
`It Smacks of Big Brother'
The Congressional inquiry's lingering criticism has added impetus to a
movement within government to equip terror fighters with better computer
technology. If humans missed the clues, the reasoning goes, perhaps a
computer will not.
Clearly, the F.B.I. is operating in the dark ages of technology. For
instance, when agents in San Diego want to check out new leads, they walk
across the street to the Joint Terrorism Task Force offices, where suspect
names must be run through two dozen federal and local databases.
Using filters from the Navy's space warfare project, Spawar, the agents are
now dumping all that data into one big computer so that with one mouse
click they can find everything from traffic fines to immigration law
violations. A test run is expected early next year. Similar efforts to
consolidate and share information are under way in Baltimore; Seattle; St.
Louis; Portland, Ore.; and Norfolk, Va.
"It smacks of Big Brother, and I understand people's concern," said William
D. Gore, a special agent in charge at the San Diego office. "But somehow
I'd rather have the F.B.I. have access to this data than some telemarketer
who is intent on ripping you off."
Civil libertarians worry that centralized data will be more susceptible to
theft. But they are scared even more by the next step officials want to
take: mining that data to divine the next terrorist strike.
The Defense Department has embarked on a five-year effort to create a
superprogram called Total Information Awareness, led by Adm. John M.
Poindexter, who was national security adviser in the Reagan administration.
But as soon as next year, the new Transportation Security Administration
hopes to begin using a more sophisticated system of profiling airline
passengers to identify high-risk fliers. The system in place on Sept. 11,
2001, flagged only a handful of unusual behaviors, like buying one-way
tickets with cash.
Like Admiral Poindexter, the transportation agency is drawing from
companies that help private industry better market their products. Among
them is the Acxiom Corporation of Little Rock, Ark., whose tool, Personicx,
sorts consumers into 70 categories like Group 16M, or "Aging
Upscale" based on an array of financial data and behavioral factors.
Experts on consumer profiling say law enforcement officials face two big
problems. Some commercial databases have high error rates, and so little is
known about terrorists that it could be very difficult to distinguish them
from other people.
"The idea that data mining of some vast collection of databases of consumer
activity is going to deliver usable alerts of terrorist activities is sheer
credulity on a massive scale," said Jason Catlett of the Junkbusters
Corporation, a privacy advocacy business. The data mining companies, Mr.
Catlett added, are "mostly selling good old-fashioned snake oil."
Libraries and Scuba Schools
As it waits for the future, the F.B.I. is being pressed to gather and share
much more intelligence, and that has left some potential informants uneasy
and confused about their legal rights and obligations.
Just how far the F.B.I. has gone is not clear. The Justice Department told
a House panel in June that it had used its new antiterrorism powers in 40
instances to share terror information from grand jury investigations with
other government authorities. It said it had twice handed over terror leads
from wiretaps.
But that was as far as Justice officials were willing to go, declining to
answer publicly most of the committee's questions about terror-related
inquiries. Civil libertarians have sued under the Freedom of Information
Act to get the withheld information, including how often prosecutors have
used Section 215 of the 2001 antiterror law to require bookstores or
librarians to turn over patron records.
The secrecy enshrouding the counterterrorism campaign runs so deep that
Section 215 makes it a crime for people merely to divulge whether the
F.B.I. has demanded their records, deepening the mystery and the
uneasiness among groups that could be required to turn over information
they had considered private.
"I've been on panel discussions since the Patriot Act, and I don't think
I've been to one without someone willing to stand up and say, `Isn't the
F.B.I. checking up on everything we do?' " said John A. Danaher III, deputy
United States attorney in Connecticut.
Several weeks ago, the F.B.I. in Connecticut took the unusual step of
revealing information about an investigation to dispute a newspaper report
that it had "bugged" the Hartford Public Library's computers.
Michael J. Wolf, the special agent in charge, said the agency had taken
only information from the hard drive of a computer at the library that had
been used to hack into a California business. "The computer was never
removed from the library, nor was any software installed on this or any
other computer in the Hartford Public Library by the F.B.I. to monitor
computer use," Mr. Wolf said in a letter to The Hartford Courant, which
retracted its report.
Nevertheless, Connecticut librarians have been in an uproar over the
possibility that their computers with Internet access would be monitored
without their being able to say anything. They have considered posting
signs warning patrons that the F.B.I. could be snooping on their keystrokes.
"I want people to know under what legal provisions they are living," said
Louise Blalock, the chief librarian in Hartford.
In Fairfield, the town librarian, Tom Geoffino, turned over computer log-in
sheets to the F.B.I. last January after information emerged that some of
the Sept. 11 hijackers had visited the area, but he said he would demand a
court order before turning over anything else. Agents have not been back
asking for more, Mr. Geoffino said.
"We're not just librarians, we're Americans, and we want to see the people
who did this caught," he said. "But we also have a role in protecting the
institution and the attitudes people have about it."
The F.B.I.'s interest in scuba divers began shortly before Memorial Day,
when United States officials received information from Afghan war detainees
that suggested an interest in underwater attacks.
An F.B.I. spokesman said the agency would not confirm even that it had
sought any diver names, and would not say how it might use any such
information.
The owners of Reef Seekers say they had lots of reasons to turn down the
F.B.I. The name-gathering made little sense to begin with, they say,
because terrorists would need training far beyond recreational scuba
lessons. They also worried that the new law would allow the F.B.I. to pass
its client records to other agencies.
When word of their revolt got around, said Bill Wright, one of the owners,
one man called Reef Seekers to applaud it, saying, "My 15-year-old daughter
has taken diving lessons, and I don't want her records going to the F.B.I."
He was in a distinct minority, Mr. Wright said. Several other callers said
they hoped the shop would be the next target of a terrorist bombing.
*********************************
Federal Computer Week
Report suggests ID alternatives
BY Dibya Sarkar
Dec. 10, 2002
A national identification system is one approach to strengthening identity
security, but a white paper published by a coalition of government
organizations also proposes a "confederated" system in which Americans
could use multiple identifiers for clusters of agencies and/or businesses.
This approach would enable individuals to sign on to an account once and
have access to different accounts among several entities they commonly
transact with, according to the National Electronic Commerce Coordinating
Council's (NECCC) white paper.
Agencies and companies would have to develop policies, procedures and an
interoperable technical framework to support such an arrangement. The
advantage to this system over a national ID system is that no single
identifier would follow an individual everywhere. Another advantage is that
there is no single point of failure like that in a national ID system, in
which there would be centralized control.
"An organized, confederated system would not necessarily have as its goal
to establish a single business model across all 50 states," according to
the white paper. "Rather, it could allow states to maintain their own
processes, yet establish criteria to provide consistent levels of trust in
the various credentialing systems that states have established. Determining
exactly what metrics would result in such a trust, however, would be a
considerable undertaking, but one worth investigating."
NECCC, a consortium that promotes e-government, released the identity
management white paper during its sixth annual conference in New York City
Dec. 4-6. It did not recommend one approach over the other, but said they
should be explored further.
Because of national security and identity fraud concerns, governments are
grappling with how best to issue valid and tamper-proof IDs and
authenticate identities while preserving privacy and personal liberties.
A single national system could involve storing personal information such
as fingerprints of every citizen in a large database and issuing ID cards
that would be used across the public and private sector.
Privacy experts contend that such a database smacks of Big Brother.
A national system has some precedence around the world, but with uneven
results, said Daniel Greenwood, who directs the Massachusetts Institute of
Technology's e-commerce architecture program and helped lead and draft the
white paper for NECCC.
The American Association of Motor Vehicle Administrators has been leading
an effort to strengthen state driver's licenses, which are considered the
de facto national ID card. Although that group doesn't advocate a national
system, it wants states to adopt minimum security standards such as
personal data or biometric identifiers embedded in the cards as a way to
prevent identity theft and fraud.
A coalition of companies known as the Liberty Alliance Project is
developing the framework for a confederated approach, including a network
identity and authentication sharing mechanism. The project would entail
developing business agreements among different organizations so they can
mutually recognize authentication. Such a system would help boost
confidence along with e-commerce, representatives said.
The group has about 45 dues-paying sponsors and another 90 affiliate and
associate members. The group is looking to collaborate with governments and
other public-sector agencies that would not be charged membership fees.
*******************************
Federal Computer Week
Creating a Web directory
BY Judi Hasson
Dec. 9, 2002
In addition to calling on agencies to improve their Web sites, the
E-Government Act of 2002 also requires the government to create a federal
Web directory.
That directory will include a taxonomy a content categorization standard
that will enable users to search for information based on subject rather
than on the agency that possesses it.
"We don't really have good ways of sharing information now. We don't have
common terminology. We are setting things in motion to begin to do these
things," said Kurt Molholm, administrator of the Defense Technical
Information Center, the Pentagon's central repository for scientific and
technical information.
While the Pentagon has been working to improve its inventory of Web sites,
no one really knows how many Defense Department sites there are or what
kind of terminology to use when designing sites, Molholm said.
"A lot of organizations don't have the taxonomy," he said. "And if you
don't have one, you have to create one. If you have one, you have to
perhaps cross-reference it."
Agencies have their work cut out for them, said Eliot Christian, the U.S.
Geological Survey's architect for the Global Information Locator Service
(www.gils.net).
"Having a directory of all agency Web sites, you would think we would have
those, and yet we don't," Christian said. "It turns out not to be a
straightforward problem to figure out what is a government Web site.
"What does it mean to be a government Web site? Is it '.com' or '.edu' or
'.gov'?" Christian asked.
*******************************
Federal Computer Week
This is citizen-centered?
Editorial
Dec. 9, 2002
In his management agenda, released in August 2001, President Bush said his
first priority was "to make government citizen-centered," according to the
agenda document. However, the policy, a Bush administration cornerstone,
has so far rung hollow.
In the President's Management Agenda, Bush said he wants to "reduce the
distance between citizens and decision-makers," using, for example,
e-government programs to make it easier for citizens to access public
information and work with agencies.
However, when the administration makes it difficult for officials in the
executive branch to discuss the business of government the people's
business the distance between citizens and decision-makers does not narrow
but rather widens into a chasm.
Increasingly, government information technology managers, when asked by
reporters to discuss and explain IT policies and programs in their
agencies, decline, saying they fear reprisal.
This management by intimidation hinders government reforms by keeping
agency officials from sharing best practices and vetting ideas in a public
forum. The approach makes it difficult for the Bush administration to
reconcile its citizen-centered rhetoric with its management tactics.
Bush's gag order sends a clear message that the administration does not
respect government managers or value open and frank discussion a sentiment
underscored last week when the president declared that federal civilian
employees should receive a 3.1 percent pay increase in 2003, not 4.1
percent, but still found it financially feasible to hand out bonuses to
political appointees.
Bush has called for better government management, but his own
administration has violated some basic good management tenets: Treat
employees fairly, with trust and respect, and foster an atmosphere of open
debate without fear of reprisal. Not doing so will jeopardize Bush's goal
of creating a citizen-centric government and the ability to create
information systems and policies to defend the nation.
******************************
Government Computer News
CDC system will share data with states
By William Jackson
The Centers for Disease Control and Prevention is ready to roll out the
initial version of its National Electronic Disease Surveillance System,
which will link the Atlanta-based agency with state public health departments.
"The system now is in the beginning phase of deployment to 20 states," CIO
James D. Seligman said today at an e-government conference in Washington on
homeland security.
NEDSS is an application developed by CDC to enable real-time data sharing
over existing network connections. It includes standards and specifications
with which states can create their own interoperable applications.
Several states are using NEDSS standards to develop or expand existing
systems, Seligman said.
CDC received funding for NEDSS in 1999, and last year's anthrax attacks
underscored the need for the system, said CDC director Julie L. Gerberding.
Twelve letters laced with anthrax spores infected 22 people, killing five.
"People needed more information than we could possibly have anticipated,"
Gerberding said. "We are experiencing a major leap forward in our ability
to deal with electronic lab reports."
CDC set up its largest emergency operations center in an auditorium from
which 150 people directed the response to last year's attacks. That
experience showed the need for a formal center to deal with emergencies,
Seligman said.
"We're a month away from cutting the ribbon on a new, state-of-the-art
operations center at CDC," he said.
******************************
Government Computer News
Homeland Security's enterprise architecture deadline extended
By William Jackson
The Office of Homeland Security has gotten a brief reprieve on its deadline
for developing an enterprise architecture for the new Homeland Security
Department.
Because of delays in passing the bill creating the department, the original
Jan. 1 deadline has been pushed to Jan. 25, said Lee Holcomb, the office's
director of infostructure.
"It's a daunting task," Holcomb said today at the E-gov Conference on
Homeland Security in Washington.
The effort is further complicated by Congress' failure to pass a fiscal
2003 budget, he said. "We're operating on zero budget," Holcomb said.
The White House's Office of Homeland Security will continue to exist after
the new department is organized. During the transition period, the office
is spearheading development of the enterprise architecture to tie together
the 22 agencies that will make up HSD. A meeting with all the agencies was
held last week.
The first job is to establish Day 1 capabilities for the new department,
Holcomb said. These will include a common directory and e-mail access for
170,000 people in the new .dhs domain. Internal and external Web portals to
answer general questions also will be a priority, he said.
Holcomb said his team has turned to industry for advice on establishing a
common enterprise.
********************************
Government Executive
December 6, 2002
Patent office unveils electronic application prototype
From National Journal's Technology Daily
The Patent and Trademark Office announced on Friday that it has begun to
implement a prototype for a new system that will allow the agency to fully
process patent applications electronically.
If successful, the prototype eventually would replace the agency's
processing paper-based patent applications.
Under the system, select patent applications would be transferred to an
electronic format and then be reviewed by patent examiners.
"Automating the patent-examination process is another example of the
ongoing efforts of [office] and the Bush administration to create a
quality-focused, market-driven, e-commerce-based organization that rapidly
responds to the demands of the national and global marketplaces," PTO
Director James Rogan said in a statement.
The European Patent Office designed core software used in the electronic
image-based processing system contained in the prototype.
***************************
Government Executive
December 5, 2002
Defense to influence tech industry to develop systems useful to military
By William New, National Journal's Technology Daily
Retired Vice Adm. Arthur Cebrowski, head of the Defense Department's office
for modernizing the military, said on Thursday that he will seek to
influence commercial technology development at the earliest stages to
encourage more appropriate military technologies.
"We need to broaden the technology base and marketplace and influence it so
we're better positioned to take advantage of what's there," Cebrowski said.
The military also should promote entrepreneurial activity, he said, adding
that the way to accomplish those goals is by working with venture-capital
firms.
He made the comments at the "Commercial Information Technology for Defense
Transformation" conference sponsored by National Defense University, the
Information Technology Association of America and the Computer Coalition
for Responsible Exports. Cebrowski is the director of force transformation
at Defense, with the mandate of transforming military capabilities "from
the industrial age to the information age," he said.
The idea to influence technology development further upstream came from
research that his office conducted recently. Most of the transformation
proposals received from industry were from large, traditional defense
contractors, but a "not insignificant" portion came from very small firms,
he said. Often, small firms' technologies eventually will be bought by the
larger firms and then shared with the military, but Cebrowski said it might
be possible to influence technology development before it reaches that
buyout stage.
He said the venture-capital community has been "very responsive" to the
suggestion that they act as "tech finders" for the military, but now the
next step rests with the Pentagon. "We'll see what happens," he said.
Cebrowski said the United States spends "most of the world's money with
regards to defense," and, in doing so, should adapt to change. To address
change and the new types of decentralized and unpredictable threats, the
military is moving into "network-centric" warfare, he said.
Cebrowski said the "cultural bias" in the military is toward hierarchy but
added that networking, where different nodes can connect directly without
going to the top of the chain, is a better approach now. He also said a
technical change that the military must address is the prevalence of
ubiquitous, low-cost technologies, which lowers barriers to competition.
The joint forces of the military face "very severe joint problems" in
applying information technology, Cebrowski said. A special problem is "last
mile" interoperability among their devices, he said. Systems may be able to
communicate at higher levels of command, but a soldier on the ground and
pilot in the air above sometimes cannot view the same computerized
information on a target that the other sees, which leads to delays as
higher-level tactical command has to relay communications.
"The network has more power and is more survivable than the old hierarchy,"
he said.
Margaret Myers, Defense's deputy chief information officer, said in the
move to a data-centric approach, the military is trying to build security
requirements so each piece of information is tagged for who can see it. "We
do know the Achilles Heel [of a network-centric approach] is security," she
said.
*******************************
Computerworld
NIPC chief Ron Dick to retire
By DAN VERTON
DECEMBER 09, 2002
WASHINGTON -- Ron Dick, the director of the FBI's National Infrastructure
Protection Center (NIPC), the cyberthreat and warning arm of the bureau,
plans to retire this month, bringing to a close a 25-year career in law
enforcement.
Dick, who took the helm of the NIPC in March 2001 during one of the most
tumultuous times in the agency's brief history (see story), is credited
with helping the NIPC define its role and mission within a growing and
complicated federal cybsersecurity bureaucracy and amid incessant assaults
from an army of critics who often took aim at what they saw as a lack of
strategic analysis coming out of the agency.
Navy Rear Adm. James Plehal, the NIPC's deputy director, will take over as
acting director until March 1, 2003, when the agency is expected to be
absorbed into the Homeland Security Department.
"Ron gets an A on the enforcement side [for] finding and prosecuting
criminals all over the world, including the Leaves worm creator to the
Melissa virus creator to the 'I Love You' creator," said Alan Paller,
director of research at the Bethesda, Md.-based SANS Institute. "Overall,
I'd say he made a substantial difference in fighting cybercrime."
Harris Miller, president of the Arlington, Va.-based Information Technology
Association of America called Dick an "effective" leader.
"He has increased the coordination among the government organizations
involved and has been tireless in his efforts to reach out to the private
sector to increase information flow between the private and public sector
on cybersecurity risks and cyberterror threats," said Miller.
Dick is also credited with helping to increase and improve the NIPC's
analysis capabilities, bringing in Bob Gerber, a career CIA officer, to
serve as the NIPC's chief of analysis and warning; Leslie Wiser, a new
watch chief recently hired away from the National Security Agency who was
also the FBI agent responsible for nabbing CIA spy Aldrich Ames; and a
Secret Service agent to serve as a liaison between the NIPC and that agency.
In one of his first steps toward demonstrating a coordinated federal
approach to cybersecurity, Dick publicly introduced the Cyber Incident
Coordination Group (CICG), which consists of select cyberintelligence
experts from the CIA, the National Security Council, the Critical
Infrastructure Assurance Office and the FBI. The CICG was formed late last
year and conducts virtual meetings to coordinate responses to
cyberincidents that may pose a risk to national security.
However, one of Dick's biggest challenges during his tenure came in July
2001. That was when the Code Red worm began its rampage through the
Internet. Coming as it did on the heels of a series of critical reports
from the General Accounting Office on the NIPC's performance (see story),
Code Red was an important test of Dick's leadership ability.
"Everybody issued warnings, and yet we didn't reach a significant number of
people who utilize the software," he said in an interview in his office at
the height of the Code Red crisis (see story).
"When I got here, we were basically a start-up," Dick said during that 2001
interview. "There wasn't a staff here, there weren't facilities here and no
dedicated source of funding. We basically had to build those capabilities
from the ground up. It takes time."
*****************************
Wired News
Is That Really You? Check My DNA
Retinal scans. Fingerprints. Face scans. In the post 9/11 world, these
kinds of biometric measures are increasingly used in public places like
government offices, airports and rental car kiosks.
But one personal identifier may soon trump all others as a tool for
security personnel: DNA.
Every human cell contains DNA, the blueprint for all life, and that genetic
code is unique to each individual. So unless you have an identical twin,
there's little chance that someone could mistake your DNA for somebody
else's if it were used as a form of identification.
"DNA is nature's digital signature," said Clay Shirky, an adjunct professor
in the interactive telecommunications program at New York University.
Shirky recently posted an article on his website outlining how DNA could be
used as a biometric. Shirky maintains that DNA used as a biometric has the
advantage of being easily digitized because genetic information can be
expressed as a formula that contains just four letters -- similar to
computer code -- which is based on a binary system.
"It occurred to me that DNA has a unique set of characters that are ...
tied to individuals and is actually digital in its essence. It's encoded in
base 4 (represented by the letters A, T, C and G)," he said. "Everything
else we have: retinal scans, thumbprints, etc., have to be digitized after
the fact."
Everyone's DNA is made up of three billion pairs of the letters A, T, C and
G. Each pair (A with T and C with G) marks the ends of the rungs on the
ladder of the DNA double helix.
Slight differences in each person's DNA code can be used as ID markers, and
scientists are continually developing additional markers to identify
individual genetic sequences.
Despite DNA's unique implications as an identifier, privacy experts aren't
exactly shaking in their boots. From a privacy perspective, they say, DNA
isn't much different than any other form of identification currently being
used.
"I think DNA at the end of the day raises peoples' concerns because it does
require taking tissue or fluid physically in a way that the other
biometrics don't," said Lee Tien, a senior staff attorney at the Electronic
Frontier Foundation. "It's more intrusive, but I think from an
informational standpoint it's not that much different."
That said, Tien wonders whether a greater chance of identity theft would
exist if DNA sequences proliferate as a form of identification.
"People leave DNA all over the place," Tien said. "I can get a sample of
anybody's DNA I want to, but does that mean I would be able to spoof
someone? Would I have the key to their information?"
No one uses DNA as an identifier yet, but Shirky said the technology exists
and it's simply a matter of execution.
"VISA is currently eating about 2 percent of their transactions in fraud,"
he said. "All they have to say is 'Take a scrape of your cheek and mail it
to us and we'll give you a credit card that has a better APR.'"
Although Shirky is not a privacy advocate himself, he believes Tien and
others would be remiss not to recognize the potential power of DNA as a
biometric.
"The privacy experts are ... wrong in believing that all (identifiers) are
the same, because one kind is different, and that's DNA," he said.
For example, DNA identifiers could provide a simple way for investigators
to root out discrepancies in a person's identification records as a result
of pseudonyms or other false information. A felon might have a driver's
license in New York and also have an arrest record under a different name
in California. But authorities wouldn't easily be able to determine it's
the same person.
No matter what search criteria they use -- license number, social security
number or name -- the two databases will likely not be connected because
the data is different, Shirky explained.
If authorities uncovered a clue that the two databases represented the same
guy, they'd have to agree in advance on a primary key to merge the
information.
But if they had sampled the person's DNA instead of relying on other data,
using a false name or social security number would be irrelevant. A simple
search with his DNA string could link the records, Shirky said.
"If this thing I'm talking about (linking databases) happens ... it goes
from being something that required a lot of advance coordination to
something that becomes a side effect of simple registration of DNA in the
system," he said.
*********************************
Wired News
ICANN At-Large Reps Can Keep Jobs
The California company that oversees the Internet's domain-name structure
has decided to keep its five democratically elected board members through
early next year -- even though their terms were due to expire this month.
The move must be formally approved at the Dec. 14 meeting of the Internet
Corporation for Assigned Names and Numbers in Amsterdam. It comes on the
heels of protests over the decision to eliminate the elected at-large seats.
"To me it's very obvious that what they're trying to do is defuse the
criticism of ICANN that has come from their repudiation of the principle
that institutions that affect the public need to have public
representatives," said Karl Auerbach, one of five members elected two years
ago in online elections.
He predicted the board members would be asked to continue on much longer
than the transition period of several months that ICANN predicted.
ICANN President M. Stuart Lynn scoffed at the characterization that the
democratically elected board members were being kept on just for
appearances. "I can only say that's silly," he said. "No one brought
pressure and criticism. That's a Karl Auerbach fantasy."
Lynn said the transition board that will be set up to map ICANN's future
will include all nine at-large board members, except for Phil Davidson,
whose term is expiring. Two new board members will be added.
He left open the idea of returning to online elections in the future, but
said for the time being limited participation and other difficulties ruled
it out.
"If anyone can ever straighten out the difficulties, we might go back to
it, but it's off the table," Lynn said. "One problem is the small amount of
people who participated. It's also making sure that these online elections
are free from fraud and capture. No one has done worldwide online elections
but us. It's very, very difficult, and expensive. The United States had a
hard time making elections work in Florida. We're little old ICANN."
He said ICANN wants committed, ongoing participation from the Internet
community, not just the token involvement of an online vote. He also
bristled at suggestions that in scheduling its meetings around the world,
ICANN was doing anything other than reaching out.
"Traveling to these meetings is not some fun junket," he said. "It's damn
hard work. We're at hotels all the time, at meetings. This is not fun. This
is work."
The global nature of the Internet may in the end present more of a
challenge to ICANN than domestic critics or maverick board members like
Auerbach and Andy Mueller-Maguhn.
"Opposition from the likes of Auerbach and Mueller-Maguhn is little more
than a speed bump," said Michael Geist, an Ottawa Law School professor who
specialized in Internet law. "The larger challenge, it seems to me, comes
from the (U.N.) International Telecommunication Union, which continues to
be very active in bringing together participants in the Internet governance
field without much regard for what ICANN is up to."
**********************************
Reuters Internet Report
US Warns Against Buying Certain Drugs Via Internet
WASHINGTON (Reuters) - U.S. regulators on Monday advised consumers not to
buy via the Internet the acne drug Accutane, the leprosy treatment
thalidomide and other medicines that have serious risks and are supposed to
be used only with special safeguards in place.
The Food and Drug Administration (news - web sites) also told its field
staff to detain the medicines if they find them being imported from overseas.
"Use of these FDA-approved products without adequate controls or
monitoring, and using versions of these products not approved by the FDA,
increases the risk of serious adverse events for patients who might
otherwise benefit from the drugs' use," FDA Commissioner Mark McClellan
said in a statement.
Each of the drugs the FDA singled out were approved with restrictions, such
as limiting their distribution to physicians with special training or
expertise, or requiring medical procedures such as blood or pregnancy tests.
For example, both thalidomide, which is sold under the brand name Thalomid,
and Accutane can cause serious birth defects, and pregnancy tests are
required for women taking either drug.
Another drug, schizophrenia treatment Clozaril, requires regular blood
tests to check for a potentially dangerous drop in white blood cells.
Other drugs included in the FDA warning were Actiq for severe cancer pain,
irritable bowel treatment Lotronex, heart drug Tikosyn, antibiotic Trovan,
the so-called abortion pill Mifeprex, narcolepsy therapy Xyrem, and
Tracleer, which treats a serious lung condition.
*****************************
MSNBC
Landmark Net libel case approved
Australian high court rules U.S. publisher can be sued there
CANBERRA, Australia, Dec. 10 Australia's highest court ruled Tuesday that
a defamation case sparked by a story on a U.S Web site could be heard in
Australia, opening a legal minefield for web publishers over which libel
laws they must follow.
THE LANDMARK RULING that an article published by Dow Jones & Co was
subject to Australian law because it was downloaded in Australia is being
watched by media firms as it could set a precedent over where Internet
publication occurs.
Dow Jones argued the case, brought by Australian mining magnate
Joseph Gutnick for an Internet version of an article from Dow Jones' New
York-based Barron's magazine, should be heard in the United States, where
libel laws are considered relatively liberal.
Gutnick initiated defamation proceedings in the Supreme Court in
his home state of Victoria in Australia.
Debate centered on whether an alleged defamation was published in
the U.S. state of New Jersey, where Dow Jones's web servers are located, or
in Victoria, where some readers saw the story.
Two Victorian courts refused Dow Jones' application. The publisher
then appealed to the High Court of Australia, the country's highest court.
"The High Court has unanimously dismissed an appeal brought by Dow
Jones," the court said in a statement.
"The court was asked to determine where that article was published.
It has made no findings on the merits of the defamation action itself."
The court allowed 18 organizations to make submissions to the
hearing, including AOL Time Warner Inc, Amazon.com Inc, the Associated
Press, Bloomberg LP, CNN, News Corporation Ltd, Reuters Group Plc and
Yahoo! Inc.
Dow Jones argued that exposing publishers to defamation cases where
Internet material was downloaded would expose them to claims all over the
world and restrict freedom of speech.
"The court was asked to determine where that article was published.
It has made no findings on the merits of the defamation action itself."
The court allowed 18 organizations to make submissions to the
hearing, including AOL Time Warner Inc, Amazon.com Inc, the Associated
Press, Bloomberg LP, CNN, News Corporation Ltd, Reuters Group Plc and
Yahoo! Inc.
Dow Jones argued that exposing publishers to defamation cases where
Internet material was downloaded would expose them to claims all over the
world and restrict freedom of speech.
*****************************
New Zealand Herald
Domain names competition opens with a twist
10.12.2002
By RICHARD WOOD
The registration of internet domain names has opened up to competition,
with a twist.
The previous monopoly supplier, Domainz, will operate as a special
"stabilising registrar", to help the changeover rather than compete on price.
On Saturday domain name sellers Webaddress, Iserve and Iconz connected to a
new shared registry system, and the Herald understands at least 20 others
will join over the next three months.
The Internet Society of New Zealand (InternetNZ), which owns Domainz, would
like some but not all Domainz customers to shift to these other incoming
registrars.
Society secretary David Farrar said in March that a letter would go out to
any Domainz customers who had remained by default with Domainz, asking them
which of the registrars they wanted to be with.
InternetNZ intends to sell Domainz to avoid a conflict of interest, as it
owns the firm that runs the registry system as well. Its stabilising
registrar agreement with Domainz ends in September next year.
In October and November Domainz increased its wholesale price for domain
names to A-level providers from $22.50 a year to $27, and this will go up
to $39.38 in February. This attracted some criticism.
Domainz chief executive Derek Locke said that although 15 of its resellers
were receiving a price rise, for more than 100 the wholesale price remained
the same.
Farrar said the price decision was made at an internet society meeting in
June in order to provide a larger financial buffer as market changes were
implemented.
Domainz has yet to decide whether it has a future in wholesaling domain
names, but Locke said it would not compete in the wholesale market at the
level of $30 that early competitors are entering at, and he did not expect
those prices to last.
Farrar said the costs of implementing the new system had been lower than
expected and it was likely that the wholesale price would drop in future.
Despite suggestions of rising prices the onset of wholesale competition in
the domain name market has had an immediate effect.
Iserve has dropped its retail price from $45 to $38 a year with no name
holder or setup fees and has wholesale for high-volume buyers down to
$29.50 a domain with a $282 a customer annual fee.
Newcomer Webaddress has a bulk-buyer focus, selling domain name
registrations for $32.63 a year with a minimum $62.50 monthly bill.
Iconz is reviewing its pricing, which is at present $44, to register a name
with a $50 set-up fee in some situations and a $10 charge per three domain
names.
Christchurch seller RegisterDirect will join the registry this week.
Spokesman Michael Schupback said it would review its prices but for now
keep them at $49.50 retail for domain registration and a $33.75 name-holder
setup fee.
He expects prices to drop on basic registrations and that money to be made
up on additional services.
Last month Richard Shearer, of domain name seller Freeparking, questioned
whether prices would drop, considering that the wholesale price for the
larger sellers had risen from $22.50 to $27 a year. Freeparking's retail
price is $44.95, and it has an affiliate program that pays users $5 per NZ
domain.
Shearer expects FreeParking to have joined the registry before February.
Telecom-owned ISP Xtra has not committed to becoming a registrar. Spokesman
Chris Thompson said he expected some turbulence and the market would take a
while to settle down.
He said Xtra did not want to be the "domain name speculative area" of the
market and its customers demanded that Xtra take a conservative approach
around supplying domain name services.
A total first-year cost of domain name setup and ownership through Xtra at
present costs $267.75.
**************************************
Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 510
2120 L Street, NW
Washington, D.C. 20037
202-478-6124
lillie.coney@xxxxxxx
From owner-technews@xxxxxxxxxxxxxxxxx Mon Dec 16 14:00:23 2002
Received: from sark.cc.gatech.edu (sark.cc.gatech.edu [130.207.7.23])
by cleon.cc.gatech.edu (8.11.6/8.11.6) with ESMTP id gBGJ0Ns29215;
Mon, 16 Dec 2002 14:00:23 -0500 (EST)
Received: from postel.acm.org (postel.acm.org [199.222.69.7])
by sark.cc.gatech.edu (8.11.6/8.11.6) with ESMTP id gBGJ0Ba02972;
Mon, 16 Dec 2002 14:00:12 -0500 (EST)
Received: from postel (postel.acm.org [199.222.69.7])
by postel.acm.org (8.9.3/8.9.3) with ESMTP id NAA16342;
Mon, 16 Dec 2002 13:46:11 -0500
Received: from LISTSERV2.ACM.ORG by LISTSERV2.ACM.ORG (LISTSERV-TCP/IP release
1.8d) with spool id 0010 for TECHNEWS@xxxxxxxxxxxxxxxxx; Mon, 16 Dec
2002 13:24:17 -0500
Approved-By: technews@xxxxxxxxxx
Received: from hq.acm.org (hq.acm.org [199.222.69.30]) by postel.acm.org
(8.9.3/8.9.3) with ESMTP id NAA25576 for
<technews@xxxxxxxxxxxxxxxxx>; Mon, 16 Dec 2002 13:23:15 -0500
Received: by hq.acm.org with Internet Mail Service (5.5.2656.59) id <Y222LV07>;
Mon, 16 Dec 2002 13:31:44 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2656.59)
Content-Type: text/plain; charset="iso-8859-1"
Message-ID: <545947EC482B4146BAE4AA754D14773921E160@xxxxxxxxxx>
Date: Mon, 16 Dec 2002 13:31:43 -0500
Sender: ACM TechNews Early Alert Service <TECHNEWS@xxxxxxxxxxxxxxxxx>
From: technews <technews@xxxxxxxxxx>
Subject: ACM TechNews - Monday, December 16, 2002
To: TECHNEWS@xxxxxxxxxxxxxxxxx
Content-Length: 8717
Status: RO
X-Status:
X-Keywords:
X-UID: 347
Dear ACM TechNews Subscriber:
Welcome to the December 16, 2002 edition of ACM TechNews,
providing timely information for IT professionals three times a
week. For instructions on how to unsubscribe from this
service, please see below.
ACM's MemberNet is now online. For the latest on ACM
activities, member benefits, and industry issues,
visit http://www.acm.org/membernet
Remember to check out our hot new online essay and opinion
magazine, Ubiquity, at http://www.acm.org/ubiquity
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ACM TechNews
Volume 4, Number 435
Date: December 16, 2002
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Site Sponsored by Hewlett Packard Company ( <http://www.hp.com> )
HP is the premier source for computing services,
products and solutions. Responding to customers' requirements
for quality and reliability at aggressive prices, HP offers
performance-packed products and comprehensive services.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Top Stories for Monday, December 16, 2002:
http://www.acm.org/technews/current/homepage.html
"Group Is Launching New Types of Licenses"
"Digital Pearl Harbor Is More Marketing Ploy Than Real Threat"
"IDC: Cyberterror and Other Prophecies"
"New Tactics Could Stave Off Digital Pirates"
"In the World of the Very Small, Companies Make Big Plans"
"Feds Invoked National Security to Speed Key Internet Change"
"Life on the Edge"
"Designing a Robot That Can Sense Human Emotion"
"Nanoparticles Could Aid Biohazard Detection, Computer Industry"
"Word to the Wise: Decentralize"
"Hollow Promise"
"W3C Proposes XML Encryption, Decryption Specs"
"ABA to Vote on UCITA Next Year"
"Integrating America"
"The Robot Evolution"
"Multimodality: The Next Wave of Mobile Interaction"
******************* News Stories ***********************
"Group Is Launching New Types of Licenses"
Stanford Law School's Center for Internet and Society is helping
to launch a new licensing program that aims to increase the
amount of intellectual property in the public domain. The
Creative Commons will allow content owners to offer three new ...
http://www.acm.org/technews/articles/2002-4/1216m.html#item1
"Digital Pearl Harbor Is More Marketing Ploy Than Real Threat"
Both the government and technology companies are issuing warnings
about possible cyberterrorism incidents in the hopes that it
could spur people into buying and investing in anti-terror
products and tools, which would give billions of dollars to ...
http://www.acm.org/technews/articles/2002-4/1216m.html#item2
"IDC: Cyberterror and Other Prophecies"
International Data (IDC) chief research officer John Gantz made a
dire prediction for 2003 at a Thursday teleconference, in which
he detailed a cyberterrorist attack that will cripple the
Internet for at least 24 hours and wreak economic havoc. The ...
http://www.acm.org/technews/articles/2002-4/1216m.html#item3
"New Tactics Could Stave Off Digital Pirates"
Consumers must increasingly deal with software with built-in
usability limitations, which many copyright holders are
implementing in an attempt to curb digital piracy and
counterfeiting. New versions of products such as Microsoft's ...
http://www.acm.org/technews/articles/2002-4/1216m.html#item4
"In the World of the Very Small, Companies Make Big Plans"
More and more companies are investing in nanotechnology, with a
focus on specially tailored molecules that can be incorporated
into other substances. 3M and other manufacturers are marketing
paper-thin optical films synthesized from nanoscale crystals that ...
http://www.acm.org/technews/articles/2002-4/1216m.html#item5
"Feds Invoked National Security to Speed Key Internet Change"
The U.S. Commerce Department approved VeriSign's request to move
one of the two VeriSign-managed root servers just two days after
the request was made. VeriSign had asked the government to skip
routine administrative decision-making procedures in the name of ...
http://www.acm.org/technews/articles/2002-4/1216m.html#item6
"Life on the Edge"
The Supernova decentralization conference showed the tension
between business mindsets and technologists who are committed to
building out equalizing, networked systems. Topics included blogs,
Web services, and Wi-Fi--all of which are technologies that do ...
http://www.acm.org/technews/articles/2002-4/1216m.html#item7
"Designing a Robot That Can Sense Human Emotion"
Vanderbilt University researchers Nilanjan Sarkar and Craig Smith
are working on a robot that can determine a person's emotional
state from physiological cues, and respond appropriately; they
detail their work in the December issue of the journal Robotica. ...
http://www.acm.org/technews/articles/2002-4/1216m.html#item8
"Nanoparticles Could Aid Biohazard Detection, Computer Industry"
Purdue scientists have discovered a new way of creating metal
interconnects on chips that saves money, time, and even has
antiterrorism applications. By dipping semiconductor chips into
a solution of dissolved metal salts, the researchers are able to ...
http://www.acm.org/technews/articles/2002-4/1216m.html#item9
"Word to the Wise: Decentralize"
Technology analyst Kevin Werbach says enterprise IT systems will
continue to decentralize in the future as centralized systems
become too vast and complex to manage. However, better
management, provisioning, and automatic features are needed for ...
http://www.acm.org/technews/articles/2002-4/1216m.html#item10
"Hollow Promise"
Burak Temelkuran and colleagues report in this week's Nature that
they have constructed a hollow optical fiber that can transmit
light through air rather than glass, a solution that may allow
much more data to travel over fiber-optic lines. The interior of ...
http://www.acm.org/technews/articles/2002-4/1216m.html#item11
"W3C Proposes XML Encryption, Decryption Specs"
The World Wide Web Consortium (W3C) has given its recommendation
to the XML Encryption Syntax Processing specification and the
Decryption Transform for XML Signature as ways to secure XML data
within documents and aid organizations that are building Web ...
http://www.acm.org/technews/articles/2002-4/1216m.html#item12
"ABA to Vote on UCITA Next Year"
An American Bar Association vote on the controversial Uniform
Computer Information Transactions Act (UCITA) in February is
viewed as a turning point in the fate of the software licensing
law. The ABA will on whether UCITA should be adopted by states; ...
http://www.acm.org/technews/articles/2002-4/1216m.html#item13
"Integrating America"
IT will be key to the success of the Department of Homeland
Security (DHS), which aims to integrate 22 agencies and programs,
and merge 170,000 workers into a cohesive entity. Office of
Homeland Security CIO Steve Cooper and Treasury Department CIO ...
http://www.acm.org/technews/articles/2002-4/1216m.html#item14
"The Robot Evolution"
MIT Artificial Intelligence Laboratory director Rodney A. Brooks
says intelligent robots will replace humans as a source for
low-cost manufacturing labor in the future. In his latest book,
"Flesh and Machines: How Robots Will Change Us," Brooks writes ...
http://www.acm.org/technews/articles/2002-4/1216m.html#item15
"Multimodality: The Next Wave of Mobile Interaction"
Multimodality technology aims to integrate speech, touch, and
vision to usher in a new age of mobile interaction that could
enable spontaneous, intuitive communications and hasten the
spread of value-added services, among other things. Multimodal ...
http://www.acm.org/technews/articles/2002-4/1216m.html#item16
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-- To review Friday's issue, please visit
http://www.acm.org/technews/articles/2002-4/1213f.html
-- To visit the TechNews home page, point your browser to:
http://www.acm.org/technews/
-- To unsubscribe from the ACM TechNews Early Alert Service:
Please send a separate email to listserv@xxxxxxxxxxxxxxxxx
with the line
signoff technews
in the body of your message.
-- Please note that replying directly to this message does not
automatically unsubscribe you from the TechNews list.
-- To submit feedback about ACM TechNews, contact:
technews@xxxxxxxxxx
-- ACM may have a different email address on file for you,
so if you're unable to "unsubscribe" yourself, please direct
your request to: technews-request@xxxxxxx
We will remove your name from the TechNews list on
your behalf.
-- For help with technical problems, including problems with
leaving the list, please write to: technews-request@xxxxxxx
----
ACM TechNews is sponsored by Hewlett Packard Company.