[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips January 9, 2003
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, glee@xxxxxxxxxxxxx;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, akuadc@xxxxxxxxxxx;, computer_security_day@xxxxxxx;, waspray@xxxxxxxxxxx;
- Subject: Clips January 9, 2003
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Thu, 09 Jan 2003 10:18:54 -0500
Clips January 9, 2003
ARTICLES
Charges dropped against former student in Web speech case
Panel lets security makers off the hook
Lawmakers poised to consider Internet tax bill
Va.'s Davis to Head Key Panel
House approves Homeland Security headquarters lease
West Point Creates Campus Wireless Network After Overcoming Security Issues
Retinal-scans to remove social stigma from English school
Hotmail: A Spammer's Paradise?
Lexmark invokes DMCA in toner suit
Bush taps Cooper for homeland CIO
IT reforms at forefront in Virginia
Tauzin Reverses Stance on Do-Not-Call List
Denmark and Greece only states to introduce EU Copyright Directive
****************************
USA Today
Charges dropped against former student in Web speech case
BEAVER, Utah (AP) Misdemeanor defamation of character charges against a
former high school student who used his Web site to attack fellow students
and administrators have been dropped, ending a case that drew national
attention and resulted in the overturning of Utah's criminal-libel law.
Ian Lake was arrested, jailed and charged in May 2000 for his Web site
comments that called his Milford High School principal a "town drunk" and
accused classmates of having loose morals.
The Utah Supreme Court ruled in November that the criminal-libel law under
which Lake originally was charged was unconstitutional.
"Considering the Supreme Court ruling, we cannot see how justice is being
pursued with these (defamation) charges and ask they be dismissed," Von
Christiansen, the newly sworn-in Beaver County attorney, said Tuesday. He
was quoted in a copyright story in The Salt Lake Tribune.
Fifth District Juvenile Court Judge Hans Chamberlain then dropped the class
B misdemeanors, which were brought by then-County Attorney Leo Kanell
before the Supreme Court overturned the criminal libel law.
"Time to get going with life now," said Lake, who returned to Utah from
California for the proceedings.
Lake, now 19, said he had been working up until last week in a real-estate
office in Desert Hot Springs, Calif., and plans to take the admissions exam
for the University of California at Riverside.
"The best part about the case was that it got me out of Milford and to
California, where I graduated with honors from Palm Springs High School,"
Lake said. "The bad part was it cost my family a lot of money."
His father, David Lake, said legal bills have cost the family $50,000, even
though his son has been represented by court-appointed attorneys.
He said Kanell, who is now an assistant county attorney, "wasted a lot of
tax money in his personal pursuit of my son."
Kanell, who did not attend the proceedings Tuesday, maintains the
defamation charges would have passed constitutional muster if they had been
pursued, but he agreed with the dismissal as many of those involved have
moved from the area.
He said the news media sensationalized the case and foiled his attempts "to
help a young man who has problems.
"The media (were) a stumbling block by all the attention they gave this,"
Kanell said. "They never felt sorry for those who were deeply hurt (by Ian
Lake's actions) and how he affected their decisions to leave or retire from
the school district."
*****************************
News.com
Panel lets security makers off the hook
By Declan McCullagh
Staff Writer, CNET News.com
January 8, 2003, 4:45 PM PT
Security software and hardware makers should not have to submit their
products for mandatory performance testing, a federal advisory council said
Wednesday.
Members of the National Infrastructure Advisory Council (NIAC), a
presidentially appointed panel, voted during a conference call Wednesday
afternoon to remove language from a draft cybersecurity report that could
have required that all "security products that protect critical
infrastructure" undergo strict review.
The advisory report is scheduled to be sent to President George W. Bush in
the next month, and any legal requirements it recommends imposing on the
private sector would have to be approved by Congress.
Union Pacific Chairman and CEO Richard Davidson, chairman of NIAC, began
the call by saying that the performance testing requirement is "probably
not as palatable to the IT companies and probably is a little too strong in
terms of regulation recommendations."
Davidson's note of caution was echoed by Cisco Systems CEO John Chambers.
"We found that mandatory testing and evaluation testing and procedures in
the area of security is something that has actually slowed down innovation
and is always two to three steps behind," Chambers said. He suggested that
this could result in a regulation that meets a lowest common denominator
requirement.
Akamai Technologies' George Conrades said he would support the government's
taking a market approach--using its purchasing power--to oversight of the
cybersecurity industry. This would help quell concerns about slowing down
innovation, the company chairman and CEO said. Conrades also agreed with
the removal of the word "mandatory" from the report.
Margaret Grayson, CEO of network security firm V-One, suggested that
certain "products be required to interoperate with each other." Other NIAC
members, including Chambers, spoke out against the proposal, and Grayson
eventually amended the testing requirement to become only advisory.
President Bush created the NIAC by executive order in Oct. 2001, after the
Sept. 11 terrorist attacks, and appointed most members to it a year later.
The crafting of the NIAC recommendations is linked to the unveiling in
September of a draft White House proposal recommending that industry and
individuals take greater care in securing data rather than recommending
tough new laws and regulations requiring specific industry segments to
secure themselves.
*****************************
USA Today
Lawmakers poised to consider Internet tax bill
January 9, 2003
LANSING, Mich. (AP) There soon may be no way to avoid paying the sales tax
on Internet and catalog purchases in Michigan as state lawmakers appear
poised to consider a bill to collect those taxes.
The legislation would be based on an agreement recently reached by a group
of 33 states, including Michigan. It's intended to create more uniform tax
laws so taxes on purchases made across state lines can be more easily
collected.
Michigan's budget woes are giving a boost to the bill, which would bring in
an estimated $100 million to $300 million in sales and use tax revenue that
now goes uncollected each year, according to the nonpartisan Senate Fiscal
Agency.
However, the national agreement calls for states to pay for some of the
collection system, which would include computer software for retailers to
report sales tax revenues and which state should collect it.
The agreement would be voluntary for retailers who do business in different
states, said Ellen Marshall, spokeswoman for the Streamlined Sales Tax
Project.
Simplifying the tax code would make it more attractive for retailers to
collect sales tax, state Treasury spokesman Terry Stanton said Wednesday.
Many online retailers say it's too difficult to figure out the patchwork of
sales taxes across the nation and make sure the money is collected and sent
to the states from which residents are making online and catalog purchases.
Consumers are required to pay sales tax on purchases made online, over the
telephone and by mail, but people don't always pay it and the state doesn't
go after them.
In Michigan, the 6% sales tax accounts for 28% of the state's total tax
revenue, Stanton said. The sales tax brought in about $6.5 billion last
year, he said.
Michigan's single sales tax rate puts it ahead of other states where
officials have to figure out how to collect different local and state taxes
to create a uniform system, Stanton said.
"The state is between 80% and 90% compliant with the agreement now," he
said. "Some sales and use tax statutes would have to be changed in
legislation, but we wouldn't be starting from scratch."
Under the national agreement, a business would charge the appropriate tax
at the time of purchase and then electronically submit the tax information
to the state, said Eric Rule of the Michigan Retailers Association.
Proposed legislation may contain some tax credits for retailers to purchase
the electronic equipment, he said.
Supporters of the Streamlined Sales Tax Project, including Democratic Gov.
Jennifer Granholm and Republican House Speaker Rick Johnson, say it would
level the playing field between Michigan retailers and out-of-state
merchants who sell through catalogs and the Internet.
"The mom and pop stores have been calling me about it," said Johnson, of
LeRoy. "It's not a new tax, it's a fairness issue that will help keep some
people in business."
Despite the support of Johnson and Granholm, the bill isn't likely to
receive quick approval from the GOP-controlled legislature.
Two years ago, the House narrowly approved a bill to allow Michigan to
participate in the national group's efforts to develop a way to collect
taxes. A number of Republicans think the bill will mean new taxes and
stifle economic growth.
Rep. Leon Drolet, a Republican from Macomb County's Clinton Township, said
the bill may have a hard time in the current legislature, which he
considers more conservative than the one that left office Dec. 31.
Although the state faces a deficit and could use the money, the slow
economy is hurting taxpayers as well, he said.
"We don't need the money, the people need the money to keep the economy
going," Drolet said.
The bill to participate in the national Streamlined Sales Tax Project
expired on Dec. 31. Johnson said the House may consider a bill to extend
the state's participation in the group.
Michigan doesn't need to be in the group to be part of the most recent
agreement on collecting sales taxes across state lines. But it may need to
be a member to be part of any future agreements.
*****************************
Washington Post
Va.'s Davis to Head Key Panel
Thursday, January 9, 2003; Page A08
Rep. Thomas M. Davis III (R-Va.) was named chairman of the House Government
Reform Committee last night, succeeding term-limited Rep. Dan Burton
(R-Ind.) as head of the panel that oversees civil servants, federal
contractor and governmental operations and investigations.
"We Republicans were elected as reformers," said Davis, 54, who is credited
with helping preserve the GOP House majority in 2000 and 2002 as head of
the National Republican Congressional Committee. He called the committee
"ground zero" in GOP efforts "to streamline the federal government."
The chairmanship is a plum assignment, with the power to initiate
investigations into most government functions and to oversee at least some
homeland security activities. Davis 54, a five-term incumbent from Fairfax
County, was chosen over Rep. Christopher Cox (R-Calif.), 50, an eight-term
incumbent, and Christopher Shays (R-Conn.), 57, who is serving his 16th year.
*******************************
Government Executive
January 8, 2003
House approves Homeland Security headquarters lease
By Jason Peckenpaugh
jpeckenpaugh@xxxxxxxxxxx
The Bush administration won approval from the House Wednesday for its plan
to lease a headquarters for the Homeland Security Department, a move that
could aid plans to locate the new department in Northern Virginia.
The House approved a prospectus that calls for 225,000 square feet to
275,000 square feet for the new headquarters, paving the way for the
General Services Administration to award a lease later this month. The
approval means the House Transportation and Infrastructure Committee will
not review the arrangement, as it typically does with major federal leases.
The lease provision was included in a continuing resolution, providing
temporary fiscal 2003 funding for agencies, which passed by voice vote. The
Senate has yet to act on the measure.
On Wednesday The Washington Post reported that the Bush administration is
considering three sites for the Homeland Security headquarters, all of
which are in Northern Virginia. Two are in the Tysons Corner area near the
Dulles Toll Road, and one is in Chantilly, Va., near Route 28.
Reps. Eleanor Holmes Norton, D-D.C., and Steny Hoyer, D-Md., criticized the
House's move, saying it kept Congress from modifying a selection process
that was biased towards Northern Virginia. "Even prior to the insertion of
the lease provision in the [continuing resolution] today, the District of
Columbia never had a fair chance to get the lease for the temporary
headquarters," Norton said at a press conference.
"Ramming this provision through the House today is unfair not only to the
jurisdictions who were bidding for the site of the headquarters, but
doesn't take into consideration the needs of the employees whose lives will
dramatically shift when the site is complete," Hoyer said in a statement.
A GSA official would not comment on the selection process, which he said
was still ongoing. But GSA is on track to pick a site by the end of next
week. GSA's solicitation, issued Dec. 12, says the government intends to
move furniture and equipment to the new building by Jan. 17, and move the
first homeland security employees by Jan. 24, according to the official.
The chosen site must also be able to provide up to 250,000 square feet of
additional office space, and have a 50-foot setback from the street for
perimeter security.
Rep. James Oberstar, D-Minn., said this leasing strategy nets enough office
space to house up to 2,200 employees, a fraction of the 17,000
Washington-area employees who are slated to move to the new department.
"Does this administration have any intention of ever creating one
department under one roof?" he asked at the press conference.
Reaching any of the three potential sites for the headquarters could create
new commuting challenges for Homeland Security workers. None of the three
sites are accessible by Metro, the Washington subway system. The two sites
in the Tysons Corner area can be reached by bus.
Laura Allen, press secretary for the Coalition for Smarter Growth, a
Washington-based pro-transit group, said the new department should be
located near a Metro station. "The federal government should certainly not
be involved in putting new offices in areas where you have no choice but to
drive," she said.
*******************************
Chronicle of Higher Education
West Point Creates Campus Wireless Network After Overcoming Security Issues
By FLORENCE OLSEN
The U.S. Military Academy, in West Point, N.Y., has begun using wireless
networks in its classrooms -- but only after conducting extensive research
on security hazards and waiting two years for fast wireless technology to
become available.
West Point officials believe the wireless network they now have is secure,
which makes it unlike most wireless networks on college campuses. But to
secure the network, West Point had to pay about $625,000, about five times
what the network itself cost.
Most colleges have dealt with the threat of casual attackers by recognizing
the problem and providing secure Web pages for students' coursework. But
West Point officials say they had to invest in a much more secure approach
because their campus network is connected to the Department of Defense
network, making it a more likely target of deliberate attackers.
"We cannot pose a threat to the rest of DOD through our network," says Col.
Donald J. Welch, associate dean for information and educational technology.
In setting up their wireless network, West Point officials created what is
known as a virtual private network -- VPN, for short -- and installed 60
access controllers around the campus.
The VPN software, which West Point purchased separately from its wireless
network, is made by Cranite Systems, a software company located in San
Jose, Calif. The software uses the federal government's most advanced
encryption algorithm to guarantee the privacy of data files and network
information.
The access controllers act as firewalls between the academy's
wireless-access hardware and the campus's wired network. According to
Colonel Welch, an expert in information security, the access controllers
prevent even an "insidious type of attack."
Technicians have installed 150 wireless-access hubs so far. Coverage of the
entire campus will be completed by the start of the fall semester.
West Point is using a fast wireless technology, known as 802.11a, which
requires more access devices than does the more commonly used but slower
802.11b technology. The main advantage of the 802.11a networks, beside
speed, Colonel Welch says, is that they are relatively free of the
congestion that often disrupts communications on the slower networks.
West Point's network is set up so that each classroom of 18 or fewer
students has its own wireless cell. Within that cell, the network bandwidth
is about 25 megabits per second, or five times as fast as the effective
bandwidth of 802.11b networks.
"We can watch TV over the wireless," says Colonel Welch. "Bandwidth has not
been a constraint."
********************************
USA Today
Retinal-scans to remove social stigma from English school
January 9, 2003
LONDON (AP) A new high school said Wednesday its students will be charged
for their lunches with a retina scanning device to prevent poor children
who eat for free from being ridiculed in the cafeteria.
Dr. Ed Yates, headmaster of the Venerable Bede school, said the advanced
eye-recognition software will be in place when the institution opens its
doors to 900 students in September in Sunderland, western England.
He said the school is concerned that if students are forced to pay for
their lunches in cash the poor ones who receive food for free could be
stigmatized. So officials have decided to make the entire school "cashless."
The retina scanning device also will be used in the library when students
take out and return books, Yates said.
He assured parents the low-intensity light of the retina scanning devices
will be safe for all students.
"We think we are the first (school) in the country to use this," he said of
the device. "But this is not a James Bond school for spies. ... This is not
science fiction. This is technology that exists."
********************************
Wired News
Hotmail: A Spammer's Paradise?
02:00 AM Jan. 09, 2003 PT
If so many spam offers weren't totally bogus, Hotmail users would be
incredibly well-endowed, slim people with plenty of hair who make big money
working at home when they aren't having great sex provoked by free porn and
herbal Viagra.
Many users of the free e-mail service offered by Microsoft's MSN.com say
that within a day of creating a new Hotmail account the spam starts flowing
in, almost as if spammers have sunk a tap directly into Hotmail's user
database and are slurping up a free-flowing torrent of e-mail addresses.
And according to Steve Linford, of the anti-spam Spamhaus Project that's
almost exactly what's happening.
Spamhaus has proof that at least one spammer has been conducting a massive
dictionary attack against the mail servers of both Hotmail.com and MSN.com,
at the rate of three to four tries per second, 24 hours a day, continuously
for the last five months.
A dictionary attack utilizes software that opens a connection to the target
mail server and then rapidly submits millions of random e-mail addresses.
Many of these addresses have slight variations, such as
"jdoe1abc@xxxxxxxxxxx" and "jdoe2def@xxxxxxxxxxxx" The software then
records which addresses are "live" and adds the addresses to the spammers
list. These lists are typically resold to many other spammers.
Dictionary attacks are not new, and many e-mail servers are protected
against them, but Hotmail and MSN servers are not.
Linford figures that in the attack he's been tracking, the spammers have
hit Hotmail's server more than 52 million times. Even assuming a pitifully
low 1-percent rate of live addresses gleaned from those hits, it still
amounts to a significant number of e-mail addresses being added to spam lists.
According to Linford, the attack is originating from servers operated by
American spammers in Beijing, China.
Linford said he has tried to contact Hotmail and MSN representatives to
offer assistance in stopping the current attack, but has received no response.
Microsoft did not respond to requests for comment for this story.
Steve Atkins, of the anti-spam website Sam Spade, said that Hotmail is the
primary target of spammers, who often use dictionary attacks to harvest
addresses from Hotmail servers.
"Other providers do suffer from address harvesting in this way. Vanity
domains with catch-all e-mail addresses suffer particularly, but none are
targeted with quite the ferocity that Hotmail is."
Given the sheer volume of e-mail traffic Hotmail/MSN servers handle each
day, spammers conducting dictionary attacks can hide undetected for many
months. But the attacks are stoppable.
"Hotmail could deal with this particular problem if they chose to do so by
detecting such traffic and permanently blocking the addresses it occurs
from," Atkins said.
Linford said he would be happy to tell Hotmail engineers where the attacks
are originating from, if someone would get back to him.
"But those spammers will simply move to new IP addresses and resume,"
Linford added. "Microsoft needs to implement anti-dictionary attack -- also
called anti-brute-force attack -- protection on their mail servers."
Atkins agreed that Hotmail/MSN should protect their servers against these
sorts of spam attacks, but added that it would require a serious cash
investment to design, build and deploy such protection for an e-mail system
the size of Hotmail.
"There's not that much business incentive for Hotmail to do this, as their
use of Brightmail spam filtering reduces the amount of spam that people
receive directly in their inbox, so users of Hotmail don't see a large
fraction of the spam they receive," Atkins said.
"But that spam is still delivered to the users' bulk-mail folder, so it
counts toward their mailbox quota."
Hotmail users get two megabytes of storage space on Hotmail's servers. If
an account goes over that limit, Hotmail begins deleting messages. Once
removed, messages cannot be recovered. Users who want more storage space
can pay for an expanded version of the service.
According to Linford, until Hotmail/MSN finds a way to permanently prevent
the attacks, the only way to protect against harvesting attacks is to
create a long user name with plenty of random characters interspersed with
digits -- one that even dictionary-attack software trying billions of
random combinations can probably not guess.
*****************************
News.com
Lexmark invokes DMCA in toner suit
By Declan McCullagh
Staff Writer, CNET News.com
January 8, 2003, 7:28 PM PT
Printer maker Lexmark has found an unusual weapon to thwart rivals from
selling replacement toner cartridges: the Digital Millennium Copyright Act.
A federal judge in Kentucky has scheduled a hearing for Thursday in the
case, which Lexmark filed against Static Control Components in an effort to
slam the brakes on the toner cartridge remanufacturing industry. Lexmark is
the No. 2 printer maker in the United States, behind Hewlett-Packard, and
manufactures printers under the Dell Computer brand.
This lawsuit is the latest of several recent DMCA cases--both civil and
criminal--that have tested the limits of the 1998 copyright law, in which
Congress intended to limit Internet piracy. Eight movie studios wielded it
to force 2600 magazine to delete a DVD-descrambling utility from its Web
site, but the Justice Department lost a case last month against a Russian
company that created a program that cracked Adobe's electronic books.
Lexmark claims that Static Control violated the DMCA by selling its Smartek
chips to companies that refill toner cartridges and undercut Lexmark's prices.
The legal action escalates what has been a technological cold war, pitting
the aftermarket ink and toner industry against printer manufacturers who
try to prevent customers from buying products from third parties. In an
essay titled "OEM Warfare," Static Control CEO Ed Swartz says: "The OEMs
will continue to escalate their technologies to erect barrier after barrier
to our industry. Each barrier will require an ever growing amount of time,
money, talent and effort to overcome."
Under section 1201 of the DMCA, it is generally unlawful to circumvent
technology that restricts access to a copyrighted work.
In a 17-page complaint filed on Dec. 30, 2002, the company claims the
Smartek chip mimics the authentication sequence used by Lexmark chips and
unlawfully tricks the printer into accepting an aftermarket cartridge. That
"circumvents the technological measure that controls access to the Toner
Loading Program and the Printer Engine Program," the complaint says. The
Toner Loading Program checks toner levels in the cartridge, and the Printer
Engine Program controls operations such as paper feed and the actual
transfer of the dry ink to paper.
Lexmark is asking U.S. District Judge Karl Forester to order Static Control
to "deliver up for destruction" all Smartek chips and to cease selling
them. Static Control could not be reached Wednesday for comment.
Jessica Litman, a professor at Wayne State University who specializes in
copyright law, said it's likely that Lexmark would not have been able to
succeed in its lawsuit without the DMCA, but stands a good chance with it.
Pre-DMCA cases involving video game consoles concluded that it was legal to
copy code for the purposes of interoperability, Litman said. In Sony v.
Connectix, the 9th U.S. Circuit Court of Appeals concluded that it was
legal for Connectix to copy the Sony PlayStation's BIOS for the purpose of
interoperability.
"I think they almost certainly would have skated were it not for the
existence of the DMCA," Litman said of Static Control. "I would have
expected the eastern district of Kentucky to follow the 9th Circuit to say
that reverse engineering and copying of the code was fair use because it
was enabling interoperability."
Cindy Cohn, an attorney at the Electronic Frontier Foundation, a civil
liberties group in San Francisco that's one of the chief critics of section
1201 of the DMCA, said she expected more cases like the one brought by
Lexmark.
"We have long said that the DMCA's potential use as an anticompetitive tool
has been great," Cohn said. "Now we're seeing it happen."
Lexmark's complaint also alleges traditional copyright infringement, saying
the Smartex chips contain "unauthorized, identical copies of Lexmark's
copyrighted Toner Loading Programs."
*****************************
Federal Computer Week
IT reforms at forefront in Virginia
BY Matt Caterinicchia
Jan. 8, 2003
Virginia Gov. Mark Warner's proposal to restructure information technology
management in the state government part of a broader package of
reforms will go before the General Assembly when it convenes this afternoon.
The reforms, which Warner announced Dec. 10, 2002, at a meeting of the
Southern Technology Council, will consolidate state IT functions within one
agency, the Virginia Information Technologies Agency, resulting in the
removal of three existing agencies and two government oversight boards.
The biggest beneficiaries of the governor's proposals are the citizens of
Virginia, George Newstrom, Virginia's secretary of technology, said in an
interview this week. "The main focus is providing the citizens with better
services as well as save them a substantial amount of money," he said. "We
want services to be enhanced as well as save money to constituents."
The elimination of the Department of Information Technology, the Department
of Technology Planning and the Virginia Information Providers Network
Authority will not result in a net loss of jobs, Newstrom explained. "There
are currently 2,000 jobs in technology. There will be 2,000 jobs when we
are done," he said.
By consolidating about $450 million in annual spending on IT, the state
seeks to generate savings by eliminating redundant activities and taking
advantage of the buying power of the state for computer hardware and
software purchases.
Along with agency consolidation and the attempt to achieve long-term cost
savings, Warner wants to provide increased opportunities for state
government IT employees. According to Newstrom, government employees will
benefit from the IT reform because the consolidation of the agencies will
"keep our employees at the forefront of technology."
The proposal will include the following opportunities for government
employees that are not readily available under the current system in
Virginia's state government:
* Training and retraining of employees to ensure that skills keep pace with
the changing nature of technology.
* Access to technology tools, resources and techniques.
* A professional focus that emphasizes customer service to both state
government agencies and Virginia's citizens.
If the proposal is approved, the legislation will go into effect July 1.
"We will be poised and fully ready to implement by this date," Newstrom said.
"This effort is one of the boldest in the country that I can see," he said.
"We are seeing a tremendous amount of curiosity from other states."
*****************************
Government Computer News
1/08/03
Bush taps Cooper for homeland CIO
By Wilson P. Dizard III
President Bush plans to appoint Steven I. Cooper, now CIO of the Homeland
Security Office, to be the CIO of the Homeland Security Department, the
White House has announced.
Bush also sent his nominations of Tom Ridge, director of the Homeland
Security Office, to be Secretary of Homeland Security and Navy Secretary
Gordon England to be deputy secretary of the new department. Both must be
confirmed by the Senate; their nominations had been announced earlier. The
CIO position does not require Senate confirmation.
Before joining the White House's Homeland Security Office, Cooper had been
CIO of Corning Inc. of Corning, N.Y. and director of corporate information
systems at Eli Lilly and Co. of Indianapolis.
Since his appointment as CIO of the Homeland Security Office, Cooper has
led teams that have been crafting the information architecture of the
Homeland Security Department. The early goals of the homeland security IT
officials include consolidating overlapping systems in the 22 agencies that
will form the department, creating an e-mail system to link all the
department's employees and launching a portal for the new department.
"One of the areas that is going to show up on Day 1 is the intelligence
analysis and infrastructure protection capability," Cooper said recently.
*********************************
Washington Post
Tauzin Reverses Stance on Do-Not-Call List
Congressman Pledges Support for FTC's Proposed Telemarketing Registry
By Caroline E. Mayer
Thursday, January 9, 2003; Page E04
Amid a strong show of congressional support for a government program to
curb unsolicited calls, a key House committee chairman yesterday dropped
his opposition to a Federal Trade Commission request for quick funding for
a national do-not-call list.
After a 90-minute committee briefing with FTC Chairman Timothy J. Muris,
Rep. W.J. "Billy" Tauzin (R-La.), chairman of the House Energy and Commerce
Committee, said he will help the agency obtain quick approval for the plan
-- as long as the funding is limited and Congress has a chance to review
the program in a couple of years.
"We are working with the FTC to try to get one to two years' funding
authority" for the anti-telemarketing registry, Tauzin spokesman Ken
Johnson said shortly after the briefing. "We are shooting to get this
done," he added, so the $16 million in funding can be approved by the end
of this month and the do-not-call list can be operational by the end of the
year.
Tauzin's support contrasted with reservations he expressed as recently as
Tuesday. In a letter to Muris late last month, Tauzin said he would block
the agency's request for immediate funding until his committee had
"adequate opportunity to properly review and evaluate" the plan.
During the briefing, one committee member after another denounced
telemarketing calls and applauded Muris for his agency's efforts to limit
unwanted telephone solicitations.
"This is a giant step forward for consumers often plagued by unsolicited,
intrusive telemarketing calls," Rep. Edward J. Markey (D-Mass.) said, just
as his cell phone started to ring. "No, I don't want to change my phone
service; take me off that list," he said, as if berating a telemarketer, as
the audience in the committee room laughed.
"It will be nice to return to the days when you want to answer the phone,"
added Rep. John M. Shimkus (R-Ill.).
Not only was the praise bipartisan, but several congressmen suggested that
Congress consider taking the do-not-call list even further by enacting
legislation to broaden the FTC's authority to bar solicitations from
politicians. Even Tauzin said he was "personally offended by recorded calls
from politicians."
Under the FTC's plan, announced last month, consumers would be able to join
a national do-not-call list by dialing a toll-free number from their home
telephone and then punching in some numbers, or by signing up via the
Internet. Telemarketers calling numbers on that list would risk being fined
up to $11,000 for each banned call. The $16 million needed to fund the list
would be repaid by the telemarketers, who would have to pay a fee to gain
access to it to know whom not to call.
Although Tauzin said he would support a pilot program, he wondered whether
the FTC has the authority to go ahead with its plans and worried that
without further congressional action, the do-not-call list could be
challenged in court. Tauzin also noted that some industries, such as
insurance, banking and telecommunications, would be exempt because the
agency doesn't have authority to regulate those businesses.
"The last thing we need is for two separate agencies to have different
jurisdictional scope crafting their own regulations," he said.
Muris said the Federal Communications Commission is reviewing its
telemarketing rules, and he hopes that agency will issue new rules forcing
those industries to comply with the FTC's do-not-call list.
K. Dane Snowden, chief of the FCC's bureau of consumer and governmental
affairs, said both agencies are "going to make sure we don't contradict one
another as we go forward."
****************************
Euromedia.net
Denmark and Greece only states to introduce EU Copyright Directive
08/01/2003 Editor: Leigh Phillips
Denmark and Greece are the only member states to have introduced the EU
Copyright Directive as law prior to the December 2002 deadline for
implementation.
Although their introduction has been encouraged by Hollywood and the
software industry, the new regulations on copyright protection have run
into much opposition from online civil libertarians, who welcome the delay
in implementation.
Campaigners view the directive as a possible obstacle to open source
development and the legitimate free use of copyright material, while
industry feels the directive is needed to combat what it views as digital
piracy.
******************************