[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips December 16, 2002
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, glee@xxxxxxxxxxxxx;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, akuadc@xxxxxxxxxxx;, computer_security_day@xxxxxxx;, waspray@xxxxxxxxxxx;
- Subject: Clips December 16, 2002
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Mon, 16 Dec 2002 17:00:02 -0500
Clips December 16, 2002
ARTICLES
Internet Body Approves Creation of New Web Domains
A Trojan Horse on the Web Has Ethnic Insults and Smut
Va. Court Throws Out Internet Libel Suit
Nigerian Net Scam, Version 3.0
Spam Inc.
Group Is Launching New Types of Licenses
Deadline Nigh for INS Program
Harbor to Put Security to Test
Co. Invokes Security in Seeking U.S. Help
Internet Prescription Sales Rise
Wireless bigger than Bud but still not secure
All eyes on Total Info Awareness
Vendor picked for USAJobs revamp
Homeland e-mail links ready
State sets $100 million pact with GTSI
OPM explores outsourcing retirement systems modernization
Report urges government to wade into wireless
E-government projects aim to simplify paperwork for feds
Bay area goes wireless to secure bridges, tunnels
****************************
Reuters
Internet Body Approves Creation of New Web Domains
Sun Dec 15, 8:15 AM ET
LONDON (Reuters) - The group that oversees the Internet's traffic system
said on Sunday it plans to approve a host of new address suffixes to join
the likes of ".com" and ".org" over the coming year.
But most Internet users will not be able to register Web site names in the
new domains, as they will be limited to organizations in specific fields
such as health care.
The precise number and names of the domains will be determined at an ICANN
(news - web sites) meeting in early 2003, the group said.
The new domains will follow the model of existing "restricted" domains such
as .edu, which is open only to U.S. colleges and universities, and .museum,
which is limited to museums, rather than being open to all like .com and .net.
The Internet Corporation for Assigned Names and Numbers, or ICANN, approved
the plan at its annual meeting in Amsterdam on Sunday.
ICANN President Stuart Lynn said it decided on restricted domains because
they can be put into circulation sooner and were not likely to be the
target of cybersquatters, speculators who look to cash in by selling
coveted domains to companies or organizations.
HOWLS OF PROTEST
Since its creation in 1998, ICANN has faced calls to open up the
domain-name system to a wide variety of new domains such as .xxx, .web and
.golf to ease crowding in .com and other established domains.
ICANN approved seven new domains in November 2000, but encountered howls of
protest from the dozens of applicants whose proposals were rejected, as
well as those who believe ICANN moved too slowly.
The new domains that did win approval then -- .biz, .info, .name, .pro,
.coop, .museum and .aero -- have met with varying amounts of success.
Nearly one million names have been registered in .info, and more than
750,000 names have been registered in .biz, according to State of the
Domain, an industry newsletter.
The .name domain has been slower to catch on, with only 85,000
registrations, while .pro has yet to make names available to the doctors,
lawyers and other professionals who are its target audience.
Restricted domains have faced less controversy, as applicants have had to
prove that they meet certain criteria. The new .coop domain, for example,
is set aside for cooperative organizations. Fewer than 7,000 .coop names
have been sold since they became available in January, a domain
administrator said.
Also at the meeting, the global body approved a proposal to push forward
with ICANN's reform initiatives, an effort to streamline activities that
critics say today typically get bogged down in organizational politics.
"Now with more efficient structures in place and sufficient funding there
is a foundation for ICANN2 to have a successful future," Lynn said.
*****************************
New York Times
December 15, 2002
A Trojan Horse on the Web Has Ethnic Insults and Smut
By SETH KUGEL
A Web site that some Morris Park residents mistook as the work of a
community organization, only to find that it contained pornography and
racially charged debate, has become a focus of controversy in this
traditionally Italian but increasingly diverse neighborhood in the eastern
Bronx.
Two weeks ago, calls started coming in to the Morris Park Community
Association, whose storefront is prominent on the site, www.morrispark.com.
Al D'Angelo, president of the association, which has nothing to do with the
site, warned readers about it in his column in The Bronx Times-Reporter, a
local paper.
A poll asking users which ethnic group dominated the neighborhood (choices:
"Italian, Albanian, Hispanic, Negro, Irish, Other") had appeared on the
site's opening page, attracting hundreds of votes. It was replaced last
week with a photograph of a naked Santa Claus. On message boards, ethnic
insults fly freely. Photographs of local businesses, politicians and
celebrities with neighborhood roots like Regis Philbin are mixed in with
pornography.
State Senator Guy J. Velella of the Bronx is drafting a bill requiring Web
site operators to register with the attorney general.
In e-mail exchanges with a reporter, an administrator and several site
users defended morrispark.com. "We are libertarians, and we support freedom
of speech, individual expression and tolerance of different lifestyles,"
wrote "Sleazy D," who identified himself as Danny, 23, an
Irish-Italian-Puerto Rican Morris Park native living in Whitestone, Queens,
working in the "adult entertainment industry."
One user, Mario Musco of Throgs Neck, defended the ethnic slurs. "Who
cares? My two best friends, one is Albanian and the other is Greek. We make
fun of each other all the time and we love each other like brothers."
The site is registered under what some residents think is a false name:
Tony Guido of Via Pignatelli Aragona, Palermo, Italy. Danny said Guido was
a real person financing the site. He would not give contact information,
and there is no Guido listed on that street in Italian phone directories.
Vincent Russo, who has runs Russo Brothers Bakery on Morris Park Avenue,
expressed anger that site operators used a Palermo address. "They had to
pick on the Sicilians again," he said. "If my father was alive, he'd find
them."
*****************************
Associated Press
Va. Court Throws Out Internet Libel Suit
Fri Dec 13, 6:37 PM ET
By LARRY O'DELL, Associated Press Writer
RICHMOND, Va. - A federal appeals court threw out a Virginia prison
warden's lawsuit against two Connecticut newspapers on Friday, saying
articles posted on the Internet were not aimed at a Virginia audience.
The 4th U.S. Circuit Court of Appeals (news - web sites) reversed a lower
court's ruling that the warden could sue in his home state because that is
where he claimed his reputation was damaged.
Stanley Young claimed The Hartford Courant and The New Haven Advocate
falsely depicted him as racist in articles about alleged mistreatment of
Connecticut inmates who were sent to Virginia to relieve prison crowding.
The articles were posted on the newspapers' Web sites. The fact that the
Internet postings can be viewed by Virginians as well as others was not
enough to support filing the lawsuit in the federal court in Big Stone Gap,
Va., the three-judge panel ruled.
"The facts in this case establish that the newspapers' Web sites, as well
as the articles in question, were aimed at a Connecticut audience," Judge
M. Blane Michael wrote in the unanimous opinion. "The newspapers did not
post materials on the Internet with the manifest intent of targeting
Virginia readers."
The decision came three days after Australia's highest court ruled that an
Australian businessman may sue Dow Jones & Co. for an article posted from
New Jersey but accessible in Australia.
Both courts based their reasonings on targeting, but differed in how they
defined it, said Michael Geist, a University of Ottawa law professor who
tracks Internet rulings around the world.
"We have U.S. courts that looked largely at a commercial presence and the
intended presence, while you got the Australian court more concerned about
where the harm was felt," Geist said.
Stephanie S. Abrutyn, attorney for the Connecticut newspapers, said she was
pleased that the court ruled "that the principles of due process and
jurisdiction should not be applied any differently to the Internet than
they have throughout the history of this country."
She added: "We think that had it gone the other way, it would have had a
chilling effect on speech on the Internet."
Young's lawyer, Stuart Collins, was out of his office and unavailable for
comment.
Connecticut newspapers closely followed the transfer of hundreds of
inmates, most of them black and Hispanic, to Virginia prisons. Newspapers
reported inmate advocates' concerns about harsh conditions at Wallens Ridge
State Prison, a maximum-security lockup.
Young, who is white, claimed in his lawsuit that some of the articles
suggested he "not only tolerates but encourages abuse by his guards." He
argued that filing the lawsuit in Virginia was proper because the
newspapers knew the articles would expose him to public contempt and
ridicule where he lived and worked.
"The focus of the articles, however, was the Connecticut prisoner transfer
policy and its impact on the transferred prisoners and their families back
home in Connecticut," Michael wrote. "The articles reported on and
encouraged a public debate in Connecticut about whether the transfer policy
was sound or practical for that state and its citizens."
******************************
Wired News
Nigerian Net Scam, Version 3.0
All those beleaguered widows, complaining chief's sons and yowling
high-ranking government officials don't want your assistance in getting a
large sum of money out of Nigeria anymore.
Now they want to buy your stuff.
Yes, there's a new twist in Nigeria's thriving Internet-based scam
operations. This time, the scammers pose as potential buyers for big-ticket
items, like cars, listed for sale online.
The buyer explains that a business associate in the United States will mail
the seller a cashier's check for the amount of the item plus the cost to
transport it overseas. The seller is asked to wire the transportation fees
to the buyer once the check has cleared so the buyer can arrange for shipment.
But a week or so after the check clears and the money has been wired,
victims are notified by their banks that the check was counterfeited.
The scam has become so widespread that victims formed their own online
support group last month. The group now has close to a hundred members.
Scam victims admit they initially were skeptical when the deal was
brokered, but after receiving and depositing a cashier's check that
cleared, they assumed all was well.
The scam takes advantage of a little-known loophole in the U.S. banking
system. Many people don't realize that when a bank says funds have cleared,
it doesn't mean the check is good, according to Carol McKay, director of
communications for the National Consumers League.
"Under federal law, depending on the type of checks deposited, banks must
give consumers access to the money within one to five days. Longer holds
can be placed on deposits over $5,000, but banks are reluctant to
inconvenience their customers," McKay explained.
"Unfortunately, it can take weeks for fake checks to be detected in the
banking system. And consumers are then left holding the bag for the money
they've withdrawn. That's because it's the depositor, not the bank, who is
responsible if a check turns out to be bad."
Jeff and Shawn Mosch were victims of the scam, and they figure their bank
is just as much at fault as the con artist who ripped them off for $7,200.
Shawn Mosch said she went to the bank with the cashier's check and told the
teller, "I need to know when this is going to be a good, clear check --
when this is going to be actual money I can spend and it's never going to
come back and bite me in the butt."
She was told her butt would be out of harm's way in 24 hours.
Mosch said she waited an extra day just to make sure, and then wired the
money to the buyer. Five days later, the bank informed Mosch the check was
counterfeit and her checking account was now $5,000 overdrawn.
McKay said the scam isn't limited to Internet sellers. The Consumers League
is starting to hear from people who have also received counterfeit checks
in connection with work-at-home offers.
"Banks would serve their customers better by explaining that they can't
immediately tell if the checks are good and that the depositors will be
stuck if they're not," McKay said. "In general, it's probably a good idea
to wait several weeks before drawing on checks from unfamiliar sources.
"But the bottom line is this: No legitimate company will offer to pay you
by arranging to send you a check and asking you to wire some of the money
back. If that's the pitch, it's a scam."
**********************************
PC World
Spam Inc.
In 2002, spam is not just a scourge, it's big business. Our investigator
reveals who's behind the assault on your in-box and why stemming the tide
won't be easy.
Daniel Tynan
[story http://www.idg.net/ic_989775_1794_9-10000.html]
***************************
Los Angeles Times
Group Is Launching New Types of Licenses
The nonprofit's goal is to promote creativity while reinvigorating the
public domain.
By David Streitfeld
Times Staff Writer
December 16 2002
SAN FRANCISCO -- For generations, the owners of creative material had tight
control over how it was distributed. Violating someone's copyright took a
major effort. A printing plant was needed to pirate a book, a factory to
bootleg an album.
The Net changed all that, making casual infringement, unauthorized
borrowing and wholesale piracy effortless and pervasive. Copyright holders
are responding by cracking down on violators, who in other circumstances
might be customers.
Into this messy and acid-edged situation comes Creative Commons, a new
nonprofit organization that will launch its first projects today. Based at
Stanford Law School's Center for Internet and Society, Creative Commons has
a high-profile board and an ambitious mission. The goal is to promote
creativity and collaboration by developing new forms of copyright while
reinvigorating the ever-shrinking sphere of copyright-free works: the
public domain.
"Using the copyright system, we will make a wider, richer public domain for
creators to build upon and individuals to share," said Stanford law
professor and Creative Commons Chairman Lawrence Lessig. "Walt Disney built
an empire from the riches of the public domain. We'd like to support a
hundred thousand more Walt Disneys."
As a first step, Creative Commons has developed a group of licenses that
will allow copyright holders to surrender some rights to works while
keeping others.
One license, for instance, allows people to copy or distribute a work as
long as they give the owner credit. Another allows a work to be copied,
distributed or displayed as long as it is for a noncommercial purpose. A
third license permits copying but forbids using the work to make another,
derivative work. (The licenses are legal documents, although that doesn't
guarantee that people will honor them.)
A license pioneer is Roger McGuinn, leader of '60s rock group the Byrds and
more recently a folk music enthusiast. He's licensing 80 songs through
Creative Commons, giving the world permission to take his work as long as
all three of his licenses are respected.
By encouraging free distribution and widespread sampling, McGuinn might end
up increasing his sales. It's an argument almost as old as the Web;
Creative Commons is merely offering tools to allow it to happen on an
easier, artist-sanctioned basis.
"Realistically, the first group to use these licenses will mostly be
academics and hobbyists," said Executive Director Glenn Otis Brown. "But I
can imagine perfectly mainstream record companies licensing things on parts
of their Web site. In our wildest dreams, in five years pretty much every
kind of material will be licensed."
That this will really happen, and that the material licensed will be things
worth looking at, reading or listening to, may seem improbable. But then,
so did the notion of mounting an effective challenge to the
constitutionality of the current copyright law, which was the recent
undertaking by several members of the Creative Commons brain trust.
The legal case arose out of the outrage felt by Eric Eldred, an Internet
publisher of material in the public domain, when Congress in 1998 extended
copyright terms by 20 years. The result was that no new material -- no
Hemingway, no Gershwin -- will enter the public domain until 2019.
Lessig, then at Harvard, took Eldred as a client. He nursed the case
through two lower court defeats and an entirely unexpected decision by the
Supreme Court to review it. Oral arguments were in October; a decision is
due by the end of June.
Eldred is a member of the Creative Commons board. Other members include
computer science professor Hal Abelson of the Massachusetts Institute of
Technology, Duke University law professor James Boyle and former
documentary filmmaker Eric Saltzman, all of them big guns in the field of
cyber law.
If the Eldred case represents an attempt to short-circuit the entertainment
industry's desire to keep its old works under exclusive control for an
ever-lengthening amount of time, Creative Commons was developed as an
intellectual property conservancy through which control would be shared,
limited or nonexistent.
The notion of loosening the bounds of copyright isn't new. For more than a
decade, the Free Software Foundation has used for its own programs and
offered others a license that guarantees the freedom to share and change
software. O'Reilly & Associates, a leading computer manual publisher, uses
the Web to publish a number of books under open-publication licenses.
Still, the notion that creation confers ownership and that ownership is
practically eternal is embedded in the system.
Since 1978, copyright protection has been automatic on any new work --
which has made it very hard to purposely free it. In response, Creative
Commons has developed what it is calling the Founders' Copyright. A creator
agrees to a contract with Creative Commons to guarantee that a work will
enter the public domain after just 14 years, which was the span granted by
the first copyright law in 1790. O'Reilly said it will be the first to
publish under these terms.
Another license puts work into the public domain immediately. One of the
first works to have a public domain license will be "The Cluetrain
Manifesto," an influential book on Internet marketing that was published
three years ago. It was a natural evolution, considering that the text of
"Cluetrain" was posted on the Web awhile ago by the authors.
"It continues to sell well in stores and on the Web," said one of the
book's four authors, Doc Searls. "Did having the whole text on the Web
help? I think so, but we can't tell."
How much "Cluetrain," as well as the experiences of O'Reilly and the Free
Software Foundation, presages a wider movement toward limited licensing or
the public domain is uncertain.
Critics already are wondering why a creator would donate anything to the
public domain beyond, for example, an unpublished or unpublishable novel.
Are people so altruistic as to create things for free? "The same thing was
said about the whole Internet a few years ago," Eldred observed. "The
existence of the Web is the answer."
********************************
Wired News
Deadline Nigh for INS Program
Monday marks an important deadline for almost 3,000 men ages 16 and up who
are visiting the United States from five countries designated as sponsors
of terrorism.
They must register with the Immigration and Naturalization Service's new
biometric immigration database or face fines and deportation.
Under the National Security Entry Exit Registration System, launched on the
one-year anniversary of the Sept. 11 attacks, the government must maintain
photographs and fingerprints of all male visitors from Iraq, Iran, Libya,
Syria and Sudan. Another 13 countries were added to the list in October
with a compliance deadline of Jan. 10.
Participants are digitally photographed and fingerprinted so that
investigators can determine whether they fit the profile of suspected
terrorists, as well as aliens with criminal records.
So far, 179 individuals have been detained after registering, but none
turned out to be terrorists, said Jorge Martinez, a spokesman for the
Immigration and Naturalization Service.
The creation of the INS program is the first step in a process that will
include the integration of the system's database with the FBI's data on 40
million criminals.
Congress directed that the databases be merged after a notorious 1999 case
wherein the INS deported a wanted serial killer, who later returned and
killed four more people. However, a number of significant hurdles, both
technical and political, must be cleared before that can happen.
The INS system contains two flat (digitally scanned) fingerprints of each
person, whereas the FBI's database stores 10 fingerprints rolled in ink of
each person. That makes it difficult to conduct searches across both
databases.
In addition it takes around two hours to search the FBI's database, which
is too long for the INS purposes.
On the political front, the INS system is under fire from both liberals and
conservatives.
Rep. Anthony Weiner (D-N.Y.) has expressed anger that Saudi Arabia was kept
off the list of nationalities being monitored, even though 15 of the 19
Sept. 11 terrorists were Saudi nationals.
A leaked Justice Department directive, first published by WorldNetDaily,
indicated both Saudi Arabia and Pakistan would be added to the list in
October. Neither were added, however, and Martinez refused to comment on
the document.
Hussein Ibish, spokesman for Arab-American Anti-Discrimination Committee,
said the list is discriminatory because it only includes Muslim countries,
along with North Korea.
Dan Stein, executive director of the Federation for American Immigration
Reform, a conservative group, has also criticized the system for its narrow
focus on a handful of targeted nations.
Both Ibish and Stein think the INS system should monitor visitors from all
countries outside the U.S.
They may soon get their wish. Under the Enhanced Border Security Act of
2002, the government is required to develop an automated information system
called Chimera that places machine-readable biometric identifiers in all
visas and passports by 2004. The General Accounting Office estimates
Chimera will cost between $6 billion and $11.5 billion to build.
However, the same technical issues preventing the INS from integrating its
data with the FBI's information are making it difficult to put Chimera into
practice, officials said.
To solve this dilemma, the Justice Department is considering a plan to
digitally capture the equivalent of 10 rolled prints, which would be a
significant step toward a successful integration.
Still, the INS would still need to find a way to check these prints in
minutes, not hours.
Even then, as with all biometric systems, fingerprint identification isn't
foolproof. A recent Federal Aviation Administration prototype system missed
18 to 36 percent of correct matches in a recent test. It also issued false
positives in up to 8 percent of cases.
*****************************
Los Angeles Times
Harbor to Put Security to Test
New safeguards could offer valuable lessons to deter terrorism. But the
challenge will be to not disrupt flow of cargo.
By Louis Sahagun
Times Staff Writer
December 16 2002
The adjacent ports of Los Angeles and Long Beach are being transformed into
testing grounds for new devices and strategies designed to deter terrorism,
particularly the threat of a nuclear bomb.
The challenge, authorities say, is to balance the new safeguards with the
flow of commerce in the nation's busiest harbor complex, where 15,000
tractor-trailer-sized cargo containers arrive from around the world each day.
"Given that uninspected containers are a logical entry vehicle for a weapon
of mass destruction, this is an important area for testing new security
technology," said Rep. Jane Harman (D-Venice), a member of the House
Subcommittee on Terrorism and Homeland Security. "The lessons we learn from
these systems will have broader applications everywhere in the country."
By the end of next year, authorities expect the waterfront to bristle with
video camera systems, motion sensors and radiation detectors able to sniff
out a nuclear bomb in a container on a train traveling past at 30 mph.
Suspicious cargo may be scrutinized at a $40-million inspection center
planned for Terminal Island and funded by a variety of revenue sources,
including state and federal counter-terrorism programs, as well as the
local ports, authorities said.
The Los Angeles Port Police, once a backwater agency dedicated to keeping
thieves and drug smugglers off the docks, will move into a
40,000-square-foot headquarters connected to video surveillance cameras
scanning operations between the Vincent Thomas Bridge and the breakwater.
The Homeland Security Department's Transportation Security Administration
and local authorities aim to fund a $35-million credential system that will
involve plastic identification cards containing every port worker's
holographic photograph, fingerprints, signature, driver's license number
and criminal background.
The 10,500-member International Longshore and Warehouse Union has long
opposed credential systems if they include extensive criminal background
checks, arguing that they would amount to an unfair invasion of privacy.
Union officials Friday were reluctant to comment on the current proposal.
Experimental tamper-proof locks and other security systems will be tested
next year on Los Angeles-bound containers before they leave Hong Kong's
Modern Terminals under a program to be partly funded by the U.S. Department
of Transportation.
Under that program, "the port will be working partners with foreign port
officials and terminal operators to establish new protocols and technology
prototypes for screening and securing containers before they leave for Los
Angeles," said Mayor James K. Hahn.
"We will continue to be at the forefront of security because only when our
ports are safe and secure can we do our best to expand economic vitality."
Elsewhere, the Long Beach Police Department has added boats to its arsenal,
and "no fishing" signs are going up wherever freight is moved near the
water's edge.
New Team Deployed
Only a month ago, the Coast Guard stationed a new 72-member marine safety
and security team in San Pedro that is trained for close-quarters battle at
sea. It is ready for deployment anywhere on the West Coast on 12 hours' notice.
The team's mission is maritime homeland security, with a focus on
protecting the nation's 50 major ports. Its duties range from routine
harbor patrols to intercepting hijacked ships.
"We're not going to sit by and let another Sept. 11 happen in this water,"
Coast Guard Petty Officer Chuck Ashmore said as he boomed across the harbor
in one of the team's specially designed boats powered by dual
225-horsepower engines and armed with two .60-caliber machine guns.
A few minutes later, he pulled up alongside a dock where commercial divers
were working on the hull of a foreign freighter. After team members
eyeballed the operation and asked the divers for proof of identification,
Ashmore turned his boat around and sped off to intercept a fishing hauler
half a mile away that was cruising uncomfortably close to an incoming oil
tanker.
"We're out here day and night," said Coast Guard Lt. Cmdr. Keith Smith, who
is in charge of the team. "Are we successful? Hard to say. We may never
know whether someone changed their mind about trying something horrible
because they saw us go by."
Some of the security enhancements are less visible to the public. For
example, the Coast Guard has, for the first time, begun conducting port
security probes with plainclothes officers.
The stakes are high. A surprise attack on a tanker, chemical plant,
refinery, bridge or rail system in the harbor, which has a daily population
of about 200,000 and handles about 43% of the nation's annual sea trade,
could have a catastrophic effect on the local community and the global
container industry.
Holes in Security Net
As it stands, authorities concede that the shoreline's security net is full
of holes.
The 20 law enforcement, fire and health agencies that serve the harbor
could be better organized, and they have yet to agree on a common radio
frequency for communication. Federal grants for port security measures have
been less than expected.
Emergency officials acknowledge that there is a potential for chaos in the
event of a "worst-case scenario," such as the sinking of a freighter at the
entrance to either of the harbor's two shipping lanes, a toxic cloud rising
off a major conflagration at a chemical plant or the detonation of a "dirty
bomb" law enforcement jargon for a conventional explosive used to spread
radioactive material.
The ports of both Los Angeles and Long Beach have contracted with security
giant Science Applications International Corp. of San Diego, which designed
the 2002 Winter Olympics safety command center, to help develop a
coordinated response to potential terrorist strikes.
"We're jazzed about the future," said Coast Guard Capt. John Holmes, whose
jurisdiction includes the Southern California coastline. "It's exciting to
know that what we are doing here now may well change the way cargo security
is handled around the world."
For the time being, the focus is on preventing terrorists from hiding a
nuclear weapon in a cargo container.
"We feel that's the biggest threat to the port," said Los Angeles Port
Police Chief Noel Cunningham. "The Osama bin Ladens of this world are
trying to find ways to penetrate our defenses. If they feel we're guarding
the ports of entry, they'll go elsewhere."
With that goal in mind, the ports have contracted with Sandia National
Laboratories in New Mexico, which is developing relatively low-cost
radiation detectors that authorities want to test at key locations in
Singapore, the harbor complex and the 20-mile-long Alameda Corridor rail
line connecting the ports with train yards just south of downtown Los Angeles.
Charles Massey, an expert on maritime security at Sandia, has applied for
federal funding to conduct the experiments.
"Once that federal funding is turned on," he said, "I'll have the system on
the ground and working before the end of 2003."
Separately, Customs Service spokesman Dennis Murphy said, "Los Angeles is
high on our list" for deployment of its own radiation detection systems.
In the meantime, "we should continue be worried about the ports, which
remain our greatest point of vulnerability," said Councilwoman Janice Hahn,
whose district includes the Port of Los Angeles.
"While we've making big strides in the effort to prevent a weapon of mass
destruction from entering the port complex," she said, "they haven't been
fast enough."
*******************************
Associated Press
Co. Invokes Security in Seeking U.S. Help
By TED BRIDIS, Associated Press Writer
WASHINGTON - The Bush administration sped approval for moving one of the
Internet's 13 traffic-management computers after a prominent technology
company urged the government to "declare some kind of national security
threat and blow past the process," according to federal officials' e-mails.
The correspondence provides a window into how U.S. corporations invoke
national security to expedite business requests.
In this case, the Commerce Department (news - web sites) approved in just
two days Verisign Inc.'s request at the end of October to move one of the
13 computer servers that manage global Internet traffic. Verisign operates
two of the world's "root servers," which contain lists of directories that
control e-mail delivery and Web surfing.
The company's lobbyists had argued that waiting additional days or weeks
for approval "is a problem and could impact national security," according
to e-mails among U.S. officials obtained by The Associated Press under the
Freedom of Information Act.
Leading technology experts and senior government officials said the change
was appropriate to correct a poor design decision made five years earlier.
They said holding off for days or weeks would not have jeopardized either
national security or the Internet.
Watchdog groups say it is an increasingly popular, and successful, argument
for companies to claim requests need approval to avoid risks to national
security.
So far, it has helped win liability protection for airlines and
pharmaceutical companies and financial help for insurance companies.
"It's become the mantra. Industries are using the national security threat
to get a lot of regulations they want," said Larry Noble, executive
director for the Center for Responsive Politics. "The problem for
government is to sort out the legitimate claims and what are cover stories."
Banks, utilities and technology companies warned Congress this year that
they feared telling U.S. officials too much about their security problems
because the information might be disclosed publicly and risk national
security. The result: President Bush (news - web sites) signed new
exemptions from open records laws last month.
The Commerce Department said it never had been convinced by Verisign's
lobbying that national security would be threatened unless the server were
moved quickly to a new location in northern Virginia to protect it better
from natural disasters or hacker attacks. The last such change was in 1997.
(Story continues after advertisement)
Commerce spokesman Clyde Ensslin said the department worked to approve the
request "as quickly as possible, but there was no known national security
threat to the root server system and therefore no need to proceed on an
emergency basis."
The department approved the decision two days after the request was
presented through the Internet Corp. for Assigned Names and Numbers, an
organization that oversees Web addresses. The change originally was to have
taken place after some of the organization's top experts made
recommendations in mid-November.
With Verisign pressing, there was some confusion inside the Commerce
Department, according to the e-mails.
In one series of e-mails, the head of Commerce's National
Telecommunications and Information Administration (news - web sites), Nancy
Victory, and another NTIA official were reported to have spoken with a
Verisign lobbyist on Oct. 30 and "asked them to invoke the emergency
procedures."
"This will allow the change to happen ASAP," wrote Robyn Layton, the
Commerce agency's associate administrator.
Another Commerce employee at headquarters responded minutes later in an
e-mail, asking: "So, what does this mean invoke the emergency procedures?
Do I have to do anything on this end?"
This employee lamented a lack of instructions for making changes to the 13
most important computers managing the world's Internet traffic. She
followed up the next morning with another e-mail that "things are under
control once again."
The Commerce Department said Victory never approved emergency procedures as
Verisign's lobbyists had sought.
Verisign spokesman Brian O'Shaughnessy said the company "never officially
asked for emergency procedures." But a second spokesman, Tom Galvin,
acknowledged, "We really wanted it done as soon as it could be."
Several Commerce officials' e-mails describe a series of contacts from
Verisign lobbyists making the plea for urgency.
The company wants "to push us to declare some kind of national security
threat and blow past the process," one e-mail said. The subject line of
another message described the company's "request for immediate authority to
effect address change."
One Commerce official predicted that Verisign's Washington lobbyist "will
call again today with the same `national security' concern he had before.
... If you want me to fend him off, then I need to know what to say."
Lobbying experts said companies must cautiously decide when to invoke
national security.
"Any good lobbyist always tries to fairly and accurately represent his
client's position and do so in a truthful way," said Wright Andrews, a
former president of the American League of Lobbyists. "It's unethical and
just plain dumb to go in and make a misrepresentation."
Vinton Cerf, board chairman for the ICANN (news - web sites) organization,
said the change was planned for months and that nothing in recent
weeks not even an unusual hacker attack Oct. 21 against all 13
servers justified special urgency.
"I do not think this was a consequence of the attack," Cerf said.
"I really don't think there was a national security issue," agreed Stephen
Crocker of Bethesda, Md., an early Internet expert and head of an advisory
committee on the security and stability of these 13 computer servers. "I
think this was more a desire to make it happen and an opportunity to cut
through some of the normal bureaucracy."
*******************************
New York Times
December 16, 2002
Internet Prescription Sales Rise
By BOB TEDESCHI
Now that the Internet's young, high-spending set is increasingly sharing
cyperspace with older, less affluent users, some significant electronic
commerce opportunities are emerging.
Consider drug retailing. As online users look to reduce their prescription
costs and the number of trips to the drugstore, analysts say Web
pharmacists are well positioned to take a greater share of the retail
pharmaceutical market.
As with so many other e-commerce categories, the market looks much
different from the one that people expected just a few years ago. So-called
pure-play online drug retailers may have stumbled just as badly as
merchants in many other Internet categories. But unlike other e-tailers,
the online drug merchants were not done in primarily by bricks-and-mortar
stores.
Rather, e-tailers and traditional retailers have ceded much of the Internet
drug market to what might best be called the catalogers of the medical
world: pharmacy-benefit managers. These companies, known as P.B.M.'s, help
run health care benefits programs for insurers and are big businesses in
their own right. For years, benefit managers like Express Scripts and the
Medco Health Solutions unit of Merck have sold prescriptions by mail to
millions of their health plan members.
What is more, these benefit managers can dictate which Web sites their
members can buy from, assuming the members want to take advantage of
reduced prices and other benefits under their plans. In some cases, as with
Express Scripts, pharmacy-benefit managers have agreed to work with other
Internet druggists, but the biggest ones, like Medco Health, have not.
As a result, most online prescription drug sales go to the Web sites of the
benefit managers, not to the sites of traditional drugstores like CVS or
Rite-Aid and not to the lone remaining pure-play online drug retailer of
significance, Drugstore.com. Still, analysts said the online market was
growing briskly enough for Drugstore.com and its traditional drugstore
rivals to perform reasonably well if not up to the overblown expectations
of 1999 while continuing mainly to benefit the pharmacy-benefit managers.
"The good news for all these guys is that the pie is growing bigger, and
mail-order sales are showing the fastest rate of growth," said Jonathan
Gaw, an analyst with IDC, a technology research company.
Mail-order prescriptions, a category that includes Internet sales, grew to
nearly $28 billion in 2001, from $17 billion in 2000, according to the
National Association of Chain Drug Stores, an industry trade group, which
has not yet released 2002 figures. It is easily the fastest-growing
component of the $164 billion drug industry.
And the Internet portion of the mail-order drug industry currently about
20 percent of the total is itself growing rapidly. Forrester Research, a
technology consultant, says consumers will buy $2.8 billion worth of
prescription drugs online this year, as well as $900 million worth of
over-the-counter drugs and vitamins. Forrester predicts that those numbers
will more than double next year to $6.7 billion for online prescription
drug sales and $3.3 billion in non-prescription remedies and vitamins. They
should double again in 2004, Forrester says.
Even so, industry executives are looking for ways to entice more consumers
online, where companies can sell drugs more profitably and insurers and
health care providers can realize much-needed cost savings.
Analysts still see validity in the logic that made so many bullish about
the online drug market during the dot-com heyday: baby boomers are growing
older and are facing more chronic illnesses with each passing year. And as
buying on the Internet becomes more of a mainstream activity even for
less-affluent and older adults, analysts predict that baby boomers will
choose to order their Viagra, Propecia, Lipitor and other nonemergency
medications online rather than trudging to the pharmacy and standing in line.
Analysts say the most successful online seller of prescriptions is Medco
Health, a pharmacy-benefit manager that sold about $1 billion worth of
drugs on its Web site, medcohealth.com, in the first 10 months of this year.
Although the figure is but a fraction of the $29 billion worth of
prescriptions the company sold last year to its 65 million plan members, it
is substantial nonetheless, in the view of Stephen J. Gold, Medco Health's
senior vice president for electronic commerce strategy and delivery.
Like executives at other mail-order companies, Mr. Gold said Internet sales
were more efficient than taking orders over the phone. Medco Health, he
said, shares the savings gleaned from such sales with customers, in the
form of lower prices, and with its clients, in the form of lower health
care costs. Mr. Gold said the Internet could also be an important tool for
helping steer consumers to generic brands and other lower-cost drugs
through e-mail promotions, for example, thereby saving companies
substantial sums on health insurance contributions they make on their
employees' behalf for brand-name drug purchases.
Traditional drugstores have chosen not to compete directly with
pharmacy-benefit managers online, analysts said, in part because they do
not want to risk alienating them. The P.B.M.'s determine which retailers
their plan members can buy drugs from, and the drugstores do not want to be
shut out.
And yet, traditional retailers like CVS have enjoyed at least one important
benefit of online prescriptions: steady foot traffic to their stores. Of
the prescriptions processed through CVS.com, 80 percent are picked up in
CVS stores, "a number we found very startling," Todd Andrews, a CVS
spokesman, said.
Mr. Andrews said he had no information on whether those consumers tended to
spend more money at the stores than non-Internet shoppers. But online
analysts have long said that customers who patronize a company through
various means be it catalog, stores or the Web are significantly more
valuable than those who shop through just one retail channel.
And yet, Drugstore.com has clung to its Internet-only roots. Although the
company is still in the red, losing $14 million last quarter, it says it
has enough cash on hand to continue operations through 2004, when it says
it will reach profitability.
Andy Stergachis, Drugstore.com's senior pharmacy adviser, says the key to
reaching that goal is prescription drugs, which represent about 60 percent
of the company's sales. As with any pharmacy, he said, customers frequently
come to the site to fill prescriptions, then fill their baskets with some
of the other 18,000 products Drugstore.com sells.
The company has made deals with pharmacy-benefit managers, like Express
Scripts, that account for 60 percent of the nation's population. Analysts
said Drugstore.com had little chance of attracting all the big benefit
managers in the near future, but such deals are helping the company
increase its drugs sales faster than the industry average.
"And with the size of this market," Mr. Stergachis said, "you don't need a
large percentage of sales to get to an extraordinary number."
*******************************
San Francisco Chronicle
TECH21
Wireless bigger than Bud but still not secure
Before too long, Wi-Fi will be bigger than Bud.
At least that's the claim of the Wi-Fi Alliance, the trade association that
promotes wireless networking based on the family of standards known as
802.11. In a keynote earlier this month at a conference called 802.11
Planet, the group's chairman, Dennis Eaton, displayed a chart showing that
annual revenue from sales of Wi-Fi gear is on track to pass Budweiser's $5
billion by the end of 2005.
I don't usually put much stock in such industry self-promotion, but I'm a
Wi-Fi booster myself. I first wrote about it 2 1/2 years ago in a column
"Welcome to my wireless world," where I described the pleasures of reading
my e-mail at the kitchen table and surfing the Web from my sofa.
Although the equipment was still hard to find for Windows PCs, I thought I
was on to something big, and the response to the column proved the point:
It generated more than 300 e-mail messages -- more than anything else I've
written before or since.
Since then Wi-Fi sales have soared, even as most other tech categories have
staggered. Now virtually every computer and networking manufacturer is
pushing wireless gear.
The industry's two superpowers, Microsoft and Intel, have hopped on the
bandwagon: The former has not only built good support for Wi-Fi into
Windows XP, but also (as my colleague Todd Wallack notes elsewhere on this
page) come out with its own line of networking hardware.
Intel is predicting that more than half the notebooks that use its chips
next year will ship with wireless capability built in, so it has retooled
its investment and development programs to give priority to this
phenomenon. Just this month it joined with IBM and AT&T in a new joint
venture, Cometa Networks,
to build and service 20,000 Wi-Fi hot spots (public-access networks) -- on
top of the 12,000 that have already sprung up in recent years.
Altogether, Wi-Fi has been a big winner for the industry and its customers,
particularly the growing numbers of consumers who have a notebook and a
broadband connection at home.
There's every reason to think that will continue, but there are some clouds
that mar this rosy picture -- some issues that generate anxiety and
frustration among adopters of wireless technology.
One of them, as Wallack's experience reveals, is initial setup It's still
complicated and fraught with hassles. The plain truth is that the rest of
the industry still hasn't caught up with the standard Apple set in this
area three years ago when it introduced wireless networking to the consumer
mainstream with its AirPort line.
For this week, though, I'll leave that issue to Wallack, except to say that
Microsoft's promise of a breakthrough in ease of setup didn't work out any
better for me that it did for him. Over the years, I've set up more than a
dozen Wi-Fi networks, usually with only minor hassles, but with Microsoft's
gear, it took me seven tries and two hours on the phone with a senior
support technician to get things working properly.
Beyond that, I'll focus on another issue that ought to concern anyone using
or considering wireless networking: security. In a future column I'll
address the problem of proliferating and sometimes conflicting wireless
standards.
COMING SOON: SECURITY
Technology that was designed to keep casual passers-by or malicious hackers
from exploiting your bandwidth and intercepting your data was designed into
802.11 from the start. For several reasons, though, it doesn't work very well.
First, to avoid further complicating an already challenging setup process,
most vendors of wireless equipment turn the built-in data-encryption scheme
-- called WEP, for Wired Equivalent Privacy -- off by default, and many,
probably most, users never bother to turn it on.
Second -- again in an effort to make things easy -- vendors often supply
default values for some essential settings, such as the name ("SSID") that
will identify your local wireless network or the keyword used to decode
scrambled data if you turn WEP on.
The trouble is, many users don't bother to change these default values.
Therefore, anyone who purchased gear from the same vendor or any hacker who
has collected the default settings used by major vendors has easy access to
your network.
Third, even if you turn on all the standard security measures and configure
them with values a stranger can't easily guess, you're still vulnerable, at
least to serious hackers. Although the encryption algorithm underlying WEP
is sound, its implementation turns out to be deeply flawed (as much in the
128- bit version, which was supposed to provide tighter security, as in the
low-end 64-bit version).
A series of papers published last year by cryptography experts exposed
these flaws, and software enabling hackers to take advantage of them
quickly appeared on the Internet. Today anyone with this software, an
ordinary laptop and an off-the-shelf wireless card can crack WEP and get on
your network within an hour or two once they get within range.
Back in September 2001, just weeks after the most devastating disclosure of
WEP's weaknesses, I reported that "it looks as though a relatively quick
and painless fix may be in the offing." The relevant standards committee,
convening in an emergency session to deal with the crisis, had outlined a
new security scheme, one that would supposedly be free of WEP's flaws but
compatible with most existing Wi-Fi hardware.
"With luck," I wrote, based on interviews with representatives of the Wi-Fi
trade association (then known as WECA), "the fix should be ready this fall"
-- the fall of 2001.
Unfortunately, it seems that Lady Luck isn't into wireless, or else she has
her own security system. It took the technical experts more than a year to
agree on the substance of a new plan, and they still haven't finished
editing the technical document describing it.
The process is far enough along so companies are starting to engineer the
plan, which is known as Wi-Fi Protected Access (WPA), into their products.
The Wi-Fi Alliance plans to start testing these products in February or so,
to make sure different manufacturers' implementations of the standard work
together reliably.
Some wireless gear with WPA could be on the shelves that month, and
products certified by the alliance should be out by April. You should be
able to upgrade current cards and access points to the new standard by way
of new software drivers and firmware updates.
Of course, there's an important qualifier to all of those predictions: with
luck.
WHAT IS TO BE DONE?
Where does that leave consumers in the meantime? If you don't have wireless
yet, you're concerned about security and you don't want to worry about
having to update your equipment in a few months, you might want to hold off
until updated, compatibility-certified products are available.
But then you'd be missing out on the joys of Wi-Fi until then. If you don't
want to wait or if you already have Wi-Fi, there are steps you can take
that will provide effective security against casual snoops, if not against
determined and knowledgeable hackers:
-- Turn on WEP, for what it's worth.
-- Make sure your network name and WEP key are not the defaults, your
street address or anything else that's easily guessed.
-- If your configuration software has a feature called closed network,
access control or something similar, you can set it so only machines with
IP numbers you specify will be allowed on the network.
-- If you're connecting to your company network, you should be using an
add- on data-scrambling software called a virtual private network (VPN).
Talk to your IT department.
Aside from these wireless-specific issues, it's extra-important for home
users with wireless to take the basic precautions anyone with a broadband
connection should:
-- Make sure the firewall features built into your router -- the device at
the center of your network -- are fully enabled. Most routers today have
such capabilities, and as far as I can tell, they're usually on by default,
but it pays to check. Look in the manual that came with the device, then in
your software settings, which in most cases you can get to with just a Web
browser.
-- If you don't use file sharing -- the feature of Windows and Mac
operating systems that gives machines on your network access to files on
others -- turn it off. (For specific instructions, look up sharing in your
computer's electronic help system.) If you share files occasionally but not
regularly, consider leaving sharing off except when you're actually using it.
--------------------------------------------------------------------------------
ONLINE INFO FOR NETWORK NOVICES
Here are some places that have more information on Wi-Fi:
-- For some basic background on wired and wireless home networking, see two
recent Tech21 columns: "How to network your home"
(sfgate.com/cgi-bin/article.cgi?f=/c/a/2002/10/28/BU206176.DTL) and
"Wireless comes of age"
(sfgate.com/cgi-bin/article.cgi?f=/c/a/2002/11/04/BU101976.DTL).
-- There's a lot of useful information about both wired and wireless
networking at www.homenethelp.com. One section of the site offers advice
about finding a professional installer or consultant, although there aren't
many such operations listed for the Bay Area.
-- The wireless-networking trade association, Wi-Fi Alliance, has a much
improved Web site, including a step-by-step guide to planning and
installing a wireless network, at www.wi-fi.org.
-- CNET has a section called "Wireless Networking 101" at
computers.cnet.com/hardware/0-7052-8-20517010-1.html?tag=inside.
-- Microsoft offers a useful introduction to networking, at
www.microsoft.com/insider/networking.
-- Apple provides a helpful document called "Designing AirPort Networks"
with its AirPort wireless gear. One that covers both Mac OS 9 and X is
available at
manuals.info.apple.com/Apple_Support_Area/Manuals/hardware/0220180AirPortNetworks2.PDF.
-- Some third-party manufacturers of networking gear post background info
on their Web sites. Linksys has a section called "How to Network" at
www.linksys.com/edu, and 3Com offers online courses on networking at
www.3com.com/support/en_US/learning_center/catalog.html.
****************************
Federal Computer Week
All eyes on Total Info Awareness
BY Dan Caterinicchia
Dec. 16, 2002
Perhaps no project being developed as a result of the Sept. 11, 2001,
terrorist attacks has caused such intense public scrutiny and debate as the
Defense Advanced Research Projects Agency's Total Information Awareness
(TIA) system.
TIA, in theory, will enable national security analysts to detect, classify,
track, understand and pre-empt terrorist attacks against the United States
by spotting patterns using public and private transaction and surveillance
methods.
The system, parts of which are already operational, incorporates
transactional data systems, including private credit card and travel
records, biometric authentication technologies, intelligence data and
automated virtual data repositories. Its goal is to create an "end-to-end,
closed-loop system," to help military and intelligence analysts make
decisions related to national security, said Robert Popp, deputy director
of DARPA's Information Awareness Office (IAO), which is heading up the effort.
"The purpose of TIA would be to determine the feasibility of searching vast
quantities of data to determine links and patterns indicative of terrorist
activities," said Pete Aldridge, undersecretary of Defense for acquisition,
logistics and technology, at a Nov. 20 press briefing.
But the system poses concerns. Speaking Dec. 12 at a briefing entitled
"Yellow Light on Total Information Awareness," sponsored by the Cato
Institute a libertarian, market-oriented think tank Robert Levy, senior
fellow in constitutional studies at Cato, said the TIA system poses three
potential risks:
* Misuse of the database information.
* Blurring of the enforcement lines between terrorism and nonterror-related
crimes.
* Overall ineffectiveness because terrorists will learn the rules or
patterns and adjust, as well as "false positives" on targeting innocent
citizens.
'They Have Adapted'
Levy's concern about terrorists' ability to adapt appear to be justified,
based on remarks that Air Force Gen. Richard Myers, chairman of the Joint
Chiefs of Staff, made Nov. 4 at the Brookings Institution. Myers said that
U.S. military efforts in Afghanistan may need to be revamped because of the
ability of al Qaeda to adapt to DOD's tactics.
"They have adapted," Myers said. "They adapt the way they talk to each
other, the way they pass money. They've made lots of adaptations to our
tactics, and we've got to continue to think and try to out-think them and
to be faster at it."
Despite the need for new tactics in the near-term, Aldridge said the TIA
"experiment" would be demonstrated using test data resembling real-life
events, but that the "feasibility" of actually using the system is "several
years away, based upon the ability to understand the technology."
"We'll not use detailed information that is real," Aldridge said. "In order
to preserve the sanctity of individual privacy, we're designing this system
to ensure complete anonymity of uninvolved citizens, thus focusing the
efforts of law enforcement officials on terrorist investigations. The
information gathered would then be subject to the same legal protections
currently in place for the other law enforcement activities."
Such assurances did not satisfy Levy, who repeatedly questioned the civil
liberties infringements that may result from using the TIA system and said
DOD still has many questions to answer, including:
* Who has access to the system and how are those people selected and trained?
* What oversight procedures are in place and what are the sanctions for misuse?
* What restrictions apply to the use of private data?
Charles Pe-a, senior defense policy analyst at Cato, said that TIA might
better stand for "totally innocent Americans." He added that the way the
"law of large numbers" works means that many innocent people will be
falsely accused if the government's intention is to keep a dossier on every
adult American, of which there are about 240 million.
Pe-a said the only way that the TIA system could be useful is if it is used
to look for behavior and transaction patterns of a small number of people
that are suspected of having terrorist potential.
"The pool of suspects must number in the hundreds" and be preceded by solid
law enforcement and detective work, he said.
Some Components Already at Work
The TIA system will combine strategic analysis with knowledge discovery and
will promote collaboration among users worldwide by providing access to the
most relevant and timely information, Popp said.
"There are currently subsets of the tools and technologies being used by
analysts to help us understand if they are useful or not," Popp told
Federal Computer Week in October.
Several TIA components are housed at the Army Intelligence and Security
Command's Information Dominance Center. That partnership enables DARPA to
maintain its research and development focus while working with the command
on testing and evaluation and "getting technology into the hands of the
user" as quickly as possible, Popp said.
Clyde Wayne Crews Jr., technology policy director at Cato, said that the
TIA system could also have a freezing effect on the nation's e-commerce
activity for many reasons including:
* Data transfer procedures for turning over private records to the government.
* Loss of business due to increased public fear that previously private
transactions and records could be turned over to the government.
* Companies' right to refuse to turn over citizen records to the government
being jeopardized.
E-commerce is still in its infancy, and "the last thing we need is an
impediment to assuring people their data is private," Crews said.
TIA Leader Causes Greater Concern
DARPA created the Information Awareness Office in mid-January 2002 with the
mission of developing and demonstrating information technology such as
data-mining tools designed to counter "asymmetric threats," such as
terrorist attacks.
John Poindexter, national security adviser to President Reagan, who may be
most well known for his part in the infamous Iran-Contra dealings, is the
director of the new agency. His involvement in the project has only fanned
the flames of controversy.
Sen. Charles Schumer (D-N.Y.), Cato analysts, and many privacy and
government watchdog groups have expressed serious reservations about
Poindexter's involvement in the program.
But no one may have taken a tougher stance against Poindexter than New York
Times columnist William Safire, who in a scathing Nov. 14 editorial, wrote:
"He is determined to break down the wall between commercial snooping and
secret government intrusion. The disgraced admiral dismisses such necessary
differentiation as bureaucratic 'stovepiping.' And he has been given a $200
million budget to create computer dossiers on 300 million Americans."
DOD's Aldridge said Poindexter came to the department with the TIA project
proposal after Sept. 11, but that his involvement will end in the research
stage.
"Once the tool is developed...John will not be involved," Aldridge said.
"What John Poindexter is doing is developing a tool. He's not exercising
the tool. He will not exercise the tool. That tool will be exercised by the
intelligence, counterintelligence and law enforcement agencies."
The TIA project is funded in the fiscal 2003 budget at $10 million, and DOD
is developing future funding requirements, Aldridge said.
However, the Electronic Privacy Information Center obtained DARPA budget
documents and found that although the TIA budget is $10 million, related
programs that may become part of the system are funded at $240 million for
fiscal 2001 through 2003.
Popp said IAO's budget for fiscal 2003 is about $150 million, up from about
$96 million last year. He added that DARPA received more than 170 proposals
after issuing a broad agency announcement for the TIA system in March and
is in the process of funding the most relevant ones.
******************************
Federal Computer Week
Vendor picked for USAJobs revamp
BY Colleen O'Hara
Dec. 16, 2002
The Office of Personnel Management has selected a vendor to redesign the
agency's online jobs site so that it is easier to use and appeals to people
in the private sector considering a job with the federal government.
As soon as this week, OPM is expected to announce the winning vendor that
will revamp USAJobs as part of the Recruitment One Stop e-government
initiative. The decision is awaiting final approval from OPM Director Kay
Coles James.
"Our goal is to compete with the private sector," said Norm Enger, director
of OPM's e-government programs. When job-seekers come to USAJobs, Enger
said, they should be attracted to it and eager to submit their resume. "We
will have a place to attract the best and the brightest."
Applicants inside and outside government have long criticized the federal
hiring process as slow and cumbersome. Federal job vacancy announcements
are hard to understand and hard to find, and applicants get little feedback
once their resumes are submitted.
The new USA Jobs site is expected to change all that. For instance, it will
offer easy job searching, better display of information, improved
readability of job announcements, the ability by applicants to check the
status of their resume once submitted, and immediate feedback on certain
items such as the applicant's eligibility for a particular job, said Claire
Gibbons, project manager for the Recruitment One Stop program.
OPM expects to unveil the new site at least the first iteration of the new
site in January. By July 2003, the site will integrate seamlessly with
agency business processes and automated assessment tools.
One of the barriers to creating a new streamlined hiring process, Gibbons
said, is that applicants may still submit hard copy applications and may
use any format. Also, agencies must implement business processes to support
receipt of electronic applications.
Gibbons and Enger were speaking Dec. 13 at a conference presented by
Federal Sources Inc. and Potomac Forum Ltd.
*****************************
Federal Computer Week
Homeland e-mail links ready
BY Diane Frank
Dec. 16, 2002
When the Homeland Security Department officially comes into being Jan. 24,
2003, the basic technologies to connect all its workers will be in place,
said Steve Cooper, chief information officer at the Office of Homeland
Security.
A group of designers from the agencies and organizations that will be
moving into the department have created a single virtual e-mail directory
that will direct all incoming messages to the appropriate existing agency
e-mail systems and send out all e-mails with a "username@xxxxxxx" address,
Cooper said in an interview Dec. 13.
Testing of the task group's common Lightweight Directory Access Protocol
directory will begin soon after Jan. 1 so that it can go live Jan. 24,
Cooper said.
Discussions are ongoing about whether employees at the larger, intact
agencies -- the Coast Guard, the Transportation Security Administration and
the Secret Service -- will get a slightly different address, such as
"username@xxxxxxxxxxx," he said.
Cooper and other officials in the Office of Homeland Security have long
said that e-mail and an internal Web portal are among the new department's
most important systems to have running on Day One.
The external portal will be built using TSA's platform, Cooper said. But
the internal portal, or intranet, initially will be an interim solution
that takes pieces from many existing portals, he said. The task group is
preparing this temporary portal while developing recommendations for a
permanent one, he said.
For now, all of this is being done with only the funding that the agencies
involved are donating. However, following the passage of the Homeland
Security Act last month, the Office of Management and Budget has been
working to gather the approximately $140 million in appropriations
scattered throughout the bill.
The final figure will not be determined until Cooper's office figures out
how much more can be transferred from existing agencies now that the
department is official. However, the Office of Homeland Security is asking
for $25 million to $50 million out of that $140 million to use on the
e-mail directory and portals, Cooper said.
Most of that money likely will be used for laying lines and cables and
paying new employees to run the offices, he said.
***********************************
Government Computer News
State sets $100 million pact with GTSI
By Wilson P. Dizard III
The State Department has negotiated a five-year blanket purchasing
agreement with GTSI Corp. for hardware and software. The deal could be
worth $20 million annually.
All State offices and 18 other foreign affairs agencies can buy hardware,
software and support services through the agreement with the Chantilly,
Va., company.
The contractknown as the State Information Infrastructure PC/LAN/WAN/Web
BPAdoes not represent a new program, department spokeswoman Mary Swann
said, but will support existing programs.
State is installing PCs and servers for classified and unclassified
networks as it implements a global systems security plan.
******************************
Government Computer News
OPM explores outsourcing retirement systems modernization
By Jason Miller
The Office of Personnel Management on Friday released a request for
information about outsourcing its Retirement Systems Modernization.
The RSM project is closely linked to the agency's five Quicksilver
e-government projects, but it is not a part of the Office of Management and
Budget's 25 initiatives. Interested vendors have until Feb. 21 to respond;
only those vendors that respond will be eligible to bid should OPM decide
to outsource the effort.
OPM analyzed the customer service operations and retirement claims
processing and defined benefit record-keeping functions for the
government's Civil Service Retirement and the Federal Employees Retirement
systems.
The agency found that outsourcing "offers potentially lower risk and faster
implementation, and may be comparable in cost to the estimated RSM baseline
for some functions."
The customer service operations include all communications as well as
payment adjustments.
OPM manages its claims processing and defined benefits record-keeping on
paper. Through the modernization, it wants to automate manual processes,
including the review of claim applications, updating of benefit pay status
and appeals filings.
The retirement systems cover more than 5 million current and retired
federal workers and their families. More than 2 million retirees receive
payments each month and the trust has more than $450 billion in assets. The
current retirement systems have interfaces with 14 federal human resources
systems.
*******************************
Government Computer News
Report urges government to wade into wireless
By Vandana Sinha
Secure wireless devices have plenty of potential federal users, but first
agencies must weigh their willingness to embrace the technology, according
to a pair of professors who have surveyed more than 200 federal workers.
"User technology readiness plays an important role in determining whether
to go for immediate deployment of wireless/mobile technology and in
determining the strategy for deployment," noted Ai-Mei Chang, a systems
management professor at the National Defense University, and P.K. Kannan, a
marketing associate professor at the University of Maryland.
Agencies should launch wireless pilots, they said in a new report,
Preparing for Wireless and Mobile Technologies in Government, sponsored by
the IBM Endowment for The Business of Government. The first steps should
include assessing employee readiness for wireless integration, training
workers and budgeting for these products use as part of an agency's
long-term strategy, the report recommended.
The report suggested using a technology readiness index, a metric that
measures employees' optimism against their distrust of technology, and
their tendency for innovation against their discomfort with new technology.
Based on the authors' survey, the report said high levels of optimism and
innovation paralleled high levels of discomfort.
Chang and Kannan recommended that agencies encourage employees to use
wireless devices in their personal lives to become more comfortable with
them. Agencies also should provide training classes and create peer support
groups in which tech-savvy employees can walk their less-technical
colleagues through wireless use.
Agencies should start with simple applications, such as mobile e-mail,
before venturing into projects that demand interagency collaboration, the
report said. Meanwhile, the authors called on wireless vendors to address
the high-cost, interoperability, and inadequate security and privacy issues
related to enterprisewide wireless use.
If agencies do not begin launching wireless technologies, they will lose
out on significant data-sharing possibilities with one another, the public
and industry, the report concluded.
"The coming decade is clearly the era of e-government," it said. "Societies
in each city, state and country are increasingly interconnected, and
citizens and customers who have experienced the improvements and efficiency
that the Internet facilitates are demanding more from their governments."
*******************************
Government Executive
E-government projects aim to simplify paperwork for feds
By Amelia Gruber
agruber@xxxxxxxxxxx
Some of the administration's e-government initiatives will put pay and
other human resources information online, making life much easier for
federal employees, an Office of Management and Budget official said Friday.
At least six of the administration's 24 e-government initiatives will put
electronic training, travel, records management and payroll resources at
workers' fingertips, according to Mark Forman, associate director of
information technology and e-government at OMB, speaking at an e-government
conference on Friday. The initiatives aimed at federal workers will also
include a one-stop recruitment center and information on simplifying the
acquisitions process.
The goal is to "simplify and unify" internal agency procedures that have
become inefficient, Forman said. New hires would no longer have to fill out
15 or more forms asking for overlapping, redundant information, he said.
And workers could complete training from their desks, which would cost less
than if agencies sent employees to courses outside the agency.
"What we envision, is a suite of human resources applications that cover
the entire life cycle of government employees," said David McClure, vice
president of e-government at the Council for Excellence in Government, a
good government group.
The "life cycle" for employees begins with recruitment, where a centralized
online "recruitment center" will provide personnel offices with the tools
they need to hire candidates and job seekers with the latest information
about job openings. Once hired, workers who needed a security clearance
could move through the system more quickly, Forman said.
Other initiatives would create a standard e-payroll system across agencies,
reduce the amount of paperwork employees have to fill out for government
travel, and make the acquisition process less cumbersome. The initiatives
will eventually give federal workers access to all of the financial
planning resources and other tools needed to complete work rapidly, Forman
said.
While technology to implement the envisioned initiatives is not completely
in place, Forman said he is impressed with the progress he has seen.
Getting project managers to agree on a basic vision for the projects was
work enough, he added.
Forman praised leaders of the e-payroll initiative for narrowing down their
search for software providers to four potential vendors. Forman also
praised golearn.gov, an online training site that more than 20,000
employees used in the first two months after its launch in July.
But a lot of work remains before the programs are up and running, McClure
cautioned. "The concept is great, but the implementation is difficult," he
said.
Forman said that he will encourage project managers at different agencies
to coordinate with one another and work as a team to develop a business
model that cuts down on costs by sharing resources among the agencies. Good
teamwork and support from agency executives will be the key to making the
e-gov initiatives work, he said.
*******************************
Computerworld
Bay area goes wireless to secure bridges, tunnels
By BOB BREWIN
DECEMBER 16, 2002
In a homeland security project, the California Department of Transportation
is using multiple wireless systems to transmit surveillance data from seven
bridges and three tunnels in the San Francisco Bay area to a command center
in Oakland.
The department, known as Caltrans, has completed the first phase of the $20
million Bay Area Surveillance Enhancement project. BASE includes
installation of up to 15 point-to-point wireless links spanning distances
of as much as 16 miles each and transmitting data at 90M bit/sec.,
according to IT industry executives involved in the project. The wireless
technology is being tied to 250 video cameras that will use video-over-IP
technology to transmit images to the command center.
Caltrans activated the BASE system at two bridges and a tunnel in the South
Bay area last month and plans to turn on the rest of the technology in
February. Some details of the project are due to be announced this week by
Sunnyvale, Calif.-based Proxim Corp., which is supplying all of the
wireless equipment.
Greg Bayol, a spokesman for Caltrans, said the BASE system was designed to
help the agency and the California Highway Patrol monitor bridges and
tunnels for potential security problems. The cameras are being deployed to
"watch for anyone who should not be there," Bayol said.
He added that Caltrans chose wireless links instead of fiber-optic cable
because of cost issues and the vast distances that the network needs to
span in order to reach all the bridges and tunnels.
David Brown, a division manager at Sacramento, Calif.-based Royal Electric
Co., the prime contractor on the BASE project, agreed that cost was a
decisive factor in prompting Caltrans to opt for wireless links.
In an unrelated project, Royal Electric recently installed a 3-mile fiber
link across one Bay area bridge at a cost of about $3 million, Brown said.
He estimated that it would cost $30 million to $40 million just to put
fiber-optic cables on all the bridges and tunnels that will be covered by
the BASE wireless system.
Layers of Complexity
Open Computing Platforms Inc. in Moorpark, Calif., handled the wireless
systems integration work for Caltrans. CEO Steve Williams described the
BASE project as one of the most complex that Open Computing has ever done.
The complexity resulted from factors such as the size of the network and
the need to install numerous links that cross water, which can cause
multipath distortion of wireless signals, Williams said. He added that the
project also required extensive frequency coordination to ensure that there
won't be any interference between the BASE signals and other wireless
transmissions.
That process was further complicated by the fact that BASE uses a mix of
licensed and unlicensed spectrum, with most of the wireless systems
operating in the unlicensed 5-GHz band, Williams said.
Multiple levels of wireless security protections are being installed in an
attempt to ensure that the BASE technology can't be penetrated by
unauthorized users, he noted. The protections include the use of Triple
Data Encryption Standard algorithms on the signals sent by the video
cameras, as well as virtual LANs and the IPsec protocol to provide
additional encryption and user authentication capabilities.
In addition, Williams said the Proxim-based wireless subscriber units that
are being attached to the video cameras have built-in Global Positioning
System receivers. The receivers broadcast the geographic coordinates of
each wireless unit to Proxim-built base stations at the bridges. If a
subscriber unit is moved, the base station won't accept signals from the
new coordinates, he said.
Video camera images are transmitted via wireless links to the
point-to-multipoint base stations, which in most cases are connected by
Ethernet to point-to-point wireless transmitters that are also made by Proxim.
Ken Haase, director of product marketing at Proxim's WAN division, said the
company's equipment operates in the same frequency band as 802.11a wireless
LANs. But, he said, the Proxim technology uses proprietary protocols to
help boost security and throughput levels.
****************************
Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 510
2120 L Street, NW
Washington, D.C. 20037
202-478-6124
lillie.coney@xxxxxxx
From owner-technews@xxxxxxxxxxxxxxxxx Mon Nov 25 14:00:29 2002
Received: from sark.cc.gatech.edu (sark.cc.gatech.edu [130.207.7.23])
by cleon.cc.gatech.edu (8.11.6/8.11.6) with ESMTP id gAPJ0Ss18501;
Mon, 25 Nov 2002 14:00:28 -0500 (EST)
Received: from postel.acm.org (postel.acm.org [199.222.69.7])
by sark.cc.gatech.edu (8.11.6/8.11.6) with ESMTP id gAPJ0Aa13266;
Mon, 25 Nov 2002 14:00:10 -0500 (EST)
Received: from postel (postel.acm.org [199.222.69.7])
by postel.acm.org (8.9.3/8.9.3) with ESMTP id NAA33070;
Mon, 25 Nov 2002 13:53:18 -0500
Received: from LISTSERV2.ACM.ORG by LISTSERV2.ACM.ORG (LISTSERV-TCP/IP release
1.8d) with spool id 0014 for TECHNEWS@xxxxxxxxxxxxxxxxx; Mon, 25 Nov
2002 13:36:08 -0500
Approved-By: technews@xxxxxxxxxx
Received: from hq.acm.org (hq.acm.org [199.222.69.30]) by postel.acm.org
(8.9.3/8.9.3) with ESMTP id NAA14996 for
<technews@xxxxxxxxxxxxxxxxx>; Mon, 25 Nov 2002 13:35:07 -0500
Received: by hq.acm.org with Internet Mail Service (5.5.2656.59) id <W8L28YHC>;
Mon, 25 Nov 2002 13:41:49 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2656.59)
Content-Type: text/plain; charset="iso-8859-1"
Message-ID: <545947EC482B4146BAE4AA754D14773921E0E7@xxxxxxxxxx>
Date: Mon, 25 Nov 2002 13:41:42 -0500
Sender: ACM TechNews Early Alert Service <TECHNEWS@xxxxxxxxxxxxxxxxx>
From: technews <technews@xxxxxxxxxx>
Subject: ACM TechNews - Monday, November 25, 2002
To: TECHNEWS@xxxxxxxxxxxxxxxxx
Content-Length: 8088
Status: RO
X-Status:
X-Keywords:
X-UID: 349
Dear ACM TechNews Subscriber:
Welcome to the November 25, 2002 edition of ACM TechNews,
providing timely information for IT professionals three times a
week. For instructions on how to unsubscribe from this
service, please see below.
ACM's MemberNet is now online. For the latest on ACM
activities, member benefits, and industry issues,
visit http://www.acm.org/membernet
Remember to check out our hot new online essay and opinion
magazine, Ubiquity, at http://www.acm.org/ubiquity
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ACM TechNews
Volume 4, Number 427
Date: November 25, 2002
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Site Sponsored by Hewlett Packard Company ( <http://www.hp.com> )
HP is the premier source for computing services,
products and solutions. Responding to customers' requirements
for quality and reliability at aggressive prices, HP offers
performance-packed products and comprehensive services.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Top Stories for Monday, November 25, 2002:
http://www.acm.org/technews/current/homepage.html
"IT Warns Against Slippery Slope to Regulation"
"Agency Weighed, but Discarded, Plan Reconfiguring the Internet"
"New Gizmos May Spark Deregulation"
"Researchers: Pull Plug on Battery Attacks"
"'Here's Looking At You' Has New Meaning: Eye Contact Shown to
Affect Conversation Patterns, Group Problem-Solving Ability"
"Nano Research Should Study Consequences"
"Radical Physicist Flatters Computer Fans"
"Planning for the Day When Silicon Rules No More"
"Straining Digital Copyright Law, Junior Paper Exposes Protection
Flaws in CDs"
"A Visionary Pays a Visit"
"The Next Chapter"
"Retooling the Programmers"
"The FBI's Cybercrime Crackdown"
"The Ghosts of Computers Past"
******************* News Stories ***********************
"IT Warns Against Slippery Slope to Regulation"
The IT industry responded to the White House's draft National
Strategy to Secure Cyberspace last week, in which hardware and
software vendors commented on recommendations that were both
promising and troubling. The Business Roundtable praised the ...
http://www.acm.org/technews/articles/2002-4/1125m.html#item1
"Agency Weighed, but Discarded, Plan Reconfiguring the Internet"
The Defense Advanced Research Projects Agency (DARPA) looked into
the possibility earlier this year of creating a new Internet
environment where every user would necessarily leave uniquely
identifiable imprints, just as criminals leave DNA evidence at a ...
http://www.acm.org/technews/articles/2002-4/1125m.html#item2
"New Gizmos May Spark Deregulation"
Technology experts argue that a series of breakthroughs should
lead to a rethinking of how people use the airwaves: Among them
are wireless technologies being developed by the Defense Advanced
Research Projects Agency (DARPA), Intel, Bell Laboratories, ...
http://www.acm.org/technews/articles/2002-4/1125m.html#item3
"Researchers: Pull Plug on Battery Attacks"
Virginia Tech scientists Tom Martin, Dong Ha, and Michael Hsiao
are conducting research on ways to counter cyberattacks on mobile
computers that aim to incapacitate their targets by draining
their batteries. The researchers are concentrating on three ...
http://www.acm.org/technews/articles/2002-4/1125m.html#item4
"'Here's Looking At You' Has New Meaning: Eye Contact Shown to
Affect Conversation Patterns, Group Problem-Solving Ability"
Dr. Roel Vertegaal of Queen's University has discovered a
correlation between the amount of eye contact people receive and
their involvement in conversations, and believes this research
could have valuable ramifications for the development of future ...
http://www.acm.org/technews/articles/2002-4/1125m.html#item5
"Nano Research Should Study Consequences"
A study authored by Glenn Harlan Reynolds of the University of
Tennessee College of Law and released by the Pacific Research
Institute (PRI) calls for nanotechnology researchers to openly
disclose the nature of their research to the public while also ...
http://www.acm.org/technews/articles/2002-4/1125m.html#item6
"Radical Physicist Flatters Computer Fans"
This fall's Comdex trade show was unusual in that a key speaker
presented radical ideas that could be applied in the distant
future, as opposed to the present. Physicist Stephen Wolfram,
the author of "A New Kind of Science," explained his view that ...
http://www.acm.org/technews/articles/2002-4/1125m.html#item7
"Planning for the Day When Silicon Rules No More"
In their respective keynote speeches at the Nanoelectronics
Planet Conference & Expo on Thursday, Dr. Thomas Theis of IBM's
Research Division and Dr. Yong Chen of Hewlett-Packard
Laboratories' Quantum Science Research agreed that silicon still ...
http://www.acm.org/technews/articles/2002-4/1125m.html#item8
"Straining Digital Copyright Law, Junior Paper Exposes Protection
Flaws in CDs"
Alex Halderman, a senior computer science major at Princeton
University, has acknowledged the possibility that he could be
sued by the music industry for allegedly violating the Digital
Millennium Copyright Act (DMCA) if he presents a junior paper at ...
http://www.acm.org/technews/articles/2002-4/1125m.html#item9
"A Visionary Pays a Visit"
Vinton Cerf spoke about envisioning the Internet last week at the
well known Toronto Empire Club that counts many of Canada's
leading business figures as members. Cerf believes that issues
such as the assignment of domain names, taxing e-commerce, online ...
http://www.acm.org/technews/articles/2002-4/1125m.html#item10
"The Next Chapter"
CenterBeam Chairman Sheldon Laube sees disposable PCs as the
future of information technology, considering personal computers
can be purchased for less than $200 today. Because it would not
make economic sense to ship a PC back for repairs, within five ...
http://www.acm.org/technews/articles/2002-4/1125m.html#item11
"Retooling the Programmers"
Aspect-oriented programming seeks to relieve companies of many
headaches, such as the intense difficulty programmers face in
converting the needs and ideas of non-technical personnel into
usable code, as well as organizing and updating vast numbers of ...
http://www.acm.org/technews/articles/2002-4/1125m.html#item12
"The FBI's Cybercrime Crackdown"
Cybercrime is a growing concern in Washington, especially with
experts warning that an online assault on the nation's critical
infrastructure coupled with a physical terrorist attack could
trigger chaos, confusion, and loss of life, to say nothing of the ...
http://www.acm.org/technews/articles/2002-4/1125m.html#item13
"The Ghosts of Computers Past"
The Computer History Museum in Mountain View, Calif., contains an
archive of precedent-setting hardware and software, and museum
board member John Mashey says the need to historically document
the evolution of today's computers is critical, especially since ...
http://www.acm.org/technews/articles/2002-4/1125m.html#item14
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-- To review Friday's issue, please visit
http://www.acm.org/technews/articles/2002-4/1122f.html
-- To visit the TechNews home page, point your browser to:
http://www.acm.org/technews/
-- To unsubscribe from the ACM TechNews Early Alert Service:
Please send a separate email to listserv@xxxxxxxxxxxxxxxxx
with the line
signoff technews
in the body of your message.
-- Please note that replying directly to this message does not
automatically unsubscribe you from the TechNews list.
-- To submit feedback about ACM TechNews, contact:
technews@xxxxxxxxxx
-- ACM may have a different email address on file for you,
so if you're unable to "unsubscribe" yourself, please direct
your request to: technews-request@xxxxxxx
We will remove your name from the TechNews list on
your behalf.
-- For help with technical problems, including problems with
leaving the list, please write to: technews-request@xxxxxxx
----
ACM TechNews is sponsored by Hewlett Packard Company.