[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips January 6, 2003
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, glee@xxxxxxxxxxxxx;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, akuadc@xxxxxxxxxxx;, computer_security_day@xxxxxxx;, waspray@xxxxxxxxxxx;
- Subject: Clips January 6, 2003
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Mon, 06 Jan 2003 16:29:20 -0500
Clips January 6, 2003
ARTICLES
Justice O'Connor Reinstates California Ruling In Favor of Former Purdue U.
Student
Battle over copyrights brewing
INS proposes passenger matching
Homeland Security Challenge: Make 22 Agencies Work as One
Feds back off proposed disaster recovery regs for Wall Street
Experts See Vulnerability as Outsiders Code Software
Judge Grants Reprieve to Madster
Phone Calling Over Internet Is Attracting More Interest
Council advises architecture security
NIH adds single sign-on to its one-stop portal
National cybersecurity plan omits industry mandates
*************************
Chronicle of Higher Education
Justice O'Connor Reinstates California Ruling In Favor of Former Purdue U.
Student
By VINCENT KIERNAN
A U.S. Supreme Court justice on Friday reinstated a lower-court decision
that held that a California trade association could not sue an individual
in California courts over materials he had posted on the Web while he was a
college student in Indiana.
Justice Sandra Day O'Connor made the decision eight days after she
temporarily suspended the lower-court ruling, by the California Supreme
Court, while she considered whether the DVD Copy Control Association would
likely win the case on an appeal to the U.S. Supreme Court (The Chronicle,
January 2).
As is usual in such decisions, Justice O'Connor did not issue an opinion
explaining her ruling. But to continue her suspension of the California
decision, she would have had to find both that the full court probably
would have overturned it and that the DVD industry would have suffered
irreparable harm without the stay.
The original lawsuit, filed in the Superior Court of California in Santa
Clara County, named as defendants Matthew Pavlovich, a former engineering
student at Purdue University, and several dozen others. The suit accused
them of harming the movie, computer, and electronic industries in
California, in violation of copyright and trade-secret laws, because Web
sites operated by the defendants had posted or linked to a decryption code
for deciphering the content-scrambling system used on DVD's. The encryption
system is designed to limit the copying of DVD's.
The California Supreme Court ruled in November that Mr. Pavlovich was
immune from the suit because he did not live in California and had not
sought to harm California businesses.
The U.S. Court of Appeals for the Fifth Circuit cited the California
decision in another ruling, issued December 31, dismissing a defamation
suit over an article about the terrorist bombing of Pan Am Flight 103 that
had been posted on a Web site operated by Columbia University's journalism
school.
The article -- written by Hart G.W. Lidov, an assistant professor of
pathology and neurology at Harvard Medical School -- accused Oliver (Buck)
Revell, a former associate director of the FBI, of covering up advance
notice of the bombing. Mr. Revell, who lives in Texas, sued Columbia and
Mr. Lidov, who lives in Massachusetts, in a federal court in Texas. (The
full text of the decision in that case, Revell v. Lidov, is available
online. It can be viewed using Adobe Acrobat Reader, available free.)
In the California case, Mr. Pavlovich's backers include the Student Press
Law Center, which defends students' free-speech rights. Officials of the
organization argued that if the DVD association won the case, students
would be reluctant to publish on the Internet because they could be sued by
companies or organizations in distant states.
Under U.S. Supreme Court rules, the DVD association could request a stay
from another justice, or the association could appeal the California ruling
to the U.S. Supreme Court without a stay's having been granted.
The DVD association also could sue Mr. Pavlovich in Texas, where he now
lives. Allonn E. Levy, Mr. Pavlovich's lawyer, said that Mr. Pavlovich
would welcome such a suit. "He doesn't feel that he's done anything wrong,"
said Mr. Levy. Robert G. Sugarman, a lawyer for the DVD association, could
not be immediately reached for comment.
*********************************
Boston Globe
Battle over copyrights brewing
Digital products up for lawmaker debate
By Hiawatha Bray, Globe Staff, 1/6/2003
Congress convenes this week, and if a war and a feeble economy weren't
enough to keep the lawmakers busy, there'll also be a host of technology
issues. There will be efforts to expand privacy protections for Internet
users and crack down on unsolicited e-mail messages, the dreaded ''spam.''
But according to tech-industry watchers, the copyright wars between
producers and consumers of digital entertainment products could provoke the
most intense legislative action.
''There's a real clash shaping up,'' said Fred Von Lohmann, senior
intellectual property counsel for the Electronic Frontier Foundation, an
Internet civil liberties group.
One flash point will be the Digital Millennium Copyright Act, a law
designed to prevent unauthorized copying of digital products. Producers of
digital software, music, and movies want the law to stand as it is.
''We think that the balance struck by Congress in that law is right,'' said
Robert Holleyman, president of the Business Software Alliance. ''We think
it's premature to amend that law.''
But some lawmakers and consumer groups want to relax the law. They say it's
legal for consumers to make copies of their music and video disks for
personal use, and they want the digital copyright act to explicitly
recognize that.
''I've introduced a bill that would give digital consumers the freedom to
bypass that technology, as long as they're doing so for a lawful purpose,''
said US. Representative Rick Boucher, a Virginia Democrat.
Meanwhile, a controversial bill proposed last year by US Senator Ernest
Hollings, Democrat of South Carolina, continues to reshape the terms of the
debate, even though the legislation went nowhere. The Hollings bill would
have required all makers of personal computers and other digital equipment
to build features into their products to prevent unauthorized copying of
software, music, or videos.
The legislation galvanized ferocious opposition from the nation's powerful
computer and consumer electronics industries. But it also drove them to the
bargaining table.
''Right now, we're sitting down with the computer people,'' said Jack
Valenti, president of the Motion Picture Association of America, ''trying
together in good faith negotiations'' to find a compromise.
However amicable the discussions, they're only happening because the
electronics companies fear that legislation similar to the Hollings bill
could someday become law.
''That's the big ax on the table for the entertainment industry,'' said Von
Lohmann.
Computer industry leaders may be talking to the digital content producers,
but they're still adamantly opposed to a law that would tell them how to
design their products.
''We don't believe a technology mandate is the answer,'' said Jennifer
Greeson, spokeswoman for the Computer Systems Policy Project, an
organization of CEOs of the nation's biggest computer companies.
But Valenti said that he wants the negotiations to result in a federal law
that would impose anti-copying standards on all future digital devices.
Unless a compromise can be struck, the Hollings bill, or something like it,
could emerge once more.
Another hot-button issue for digital entertainment producers is digital TV
broadcasting. Movie makers are afraid consumers will be able to make
perfect digital copies of their films, so they want to embed a ''broadcast
flag'' - a sort of digital watermark that will prevent unauthorized
copying. Once again, this will only work if every digital TV, VCR, or DVD
recorder had built-in hardware to detect the broadcast flag and prevent
copying of the flagged materials. The Federal Communications Commission is
considering such a mandate, and Congress will also consider broadcast flag
legislation.
Meanwhile, Boucher said he plans to introduce privacy legislation that
would require online businesses to tell customers what they will do with
any personal information the customer provides. He also wants to enact
anti-spam legislation that would outlaw the practice of putting fake return
address and message routing information in commercial e-mail messages.
Requiring accurate address and routing information will make it easier for
Internet providers to filter out spam messages.
Congress could also find itself tackling the thorny question of whether to
levy sales taxes on Internet merchants. Last month, 31 states and
Washington, D.C., agreed to ask for permission to start charging such
taxes, once a federally mandated moratorium ends next November.
Hiawatha Bray can be reached at bray@xxxxxxxxxx
*******************************
Federal Computer Week
INS proposes passenger matching
BY Judi Hasson
Jan. 6, 2003
The Immigration and Naturalization Service proposed a new rule Jan. 3
requiring airlines and shippers to electronically submit a list of
passengers arriving in and departing from the United States.
The proposed INS rule would require all passengers arriving or departing,
as well as crew members, to provide the following information: name; date
of birth; citizenship; sex; passport number and country of issuance;
country of residence; U.S. visa number and other details of its issuance;
address while in the United States; and, when it applies, alien
registration number.
The information will be compared against different databases seeking to
match the names of those on law enforcement watch lists or other data alert
network.
The rule proposes to implement Section 402 of the Enhanced Border Security
and Visa Entry Reform Act of 2002, which required the new procedure to
tighten border security in the wake of Sept. 11, 2001, terrorist attacks.
Although most airlines already have been providing manifests of incoming
passengers, it is the first time airlines and vessels will be required to
electronically submit a list of passengers within 15 minutes of leaving the
United States, according to David O'Connor, regional director of the
International Air Transport Association in Washington, D.C.
Another new provision requires manifests to list information about crew
members and others getting rides, such as airline employees catching a free
flight if a seat is available, he said.
It also is requiring private companies as well as governments to convert
their electronic systems to United Nations Electronic Data Interchange for
Administration, Commerce and Transport, an international standard for data
formats.
The rule is likely to cost the government about $124 million and the
private sector $42 million, according to the notice published in the
Federal Register.
********************************
Washington Post
Homeland Security Challenge: Make 22 Agencies Work as One
By Renae Merle
Washington Post Staff Writer
Monday, January 6, 2003; Page E01
The transition office for the new Homeland Security Department has the
spare feel of Internet start-up soon to be abandoned. The walls are bare,
save one on which employees keep count of the days until Jan. 24, when the
agency will transform from concept to reality. The offices and rooms are
sparsely furnished.
In one of the glass offices, Steven I. Cooper, special assistant to the
president on information technology's place in homeland security,
contemplated the new department with cautious optimism.
"Candidly, we're moving, I think, somewhat effectively and probably a
little slower than all of us would prefer," Cooper said. "That's not
because we're doing anything incorrect. It's because this is all new. This
is a learning experience. There is no handbook that you can go to, there is
no OMB circular, there is no Department of Homeland Security handbook that
you can look up in the Library of Congress to say 'Hey, here is how you do
this.' "
Cooper, 52, is to be named chief information officer of the new department
this month, sources involved in the transition said. The position will give
him a key role in deciding how information technology will be used against
terrorists. It is a role that bears watching for the dozens of government
technology contractors in the Washington area, from Lockheed Martin Corp.
on down, that hope for a multibillion-dollar bonanza.
The industry considers Cooper to be a champion of information technology,
industry executives said. "This provides the opportunity for the case study
of how to do it right," said James A. Kane, president and chief executive
of consulting group Federal Sources Inc.
One of the challenges in creating a department from a hodgepodge of 22
federal agencies and 170,000 employees is the information technology headache.
"It is not enough to shuffle redundant or overlapping programs under the
new bureaucracy," Michael Scardaville, a policy analyst at the Heritage
Foundation, wrote in a recent report. The department "should develop and
deploy an information technology infrastructure that links and fuses
intelligence and law enforcement terrorism databases."
Federal agencies have a spotty record in launching big information
technology projects. The Justice Department's inspector general recently
chastised the FBI for its $458 million Trilogy project, a program to
upgrade the agency's computer system. Trilogy probably will exceed its
budget and be finished late, in 2004, the inspector general's report said.
The Homeland Security Department plans to adopt the best practices from
industry, other agencies and academia to avoid such problems, Cooper said.
For example, Hewlett-Packard Co.'s "adopt and go" strategy, which
emphasizes fast execution once a decision is made, will be a guiding
principle, he said.
The agency must merge more than two dozen payroll and human resource
programs into a single operation but will not needlessly study every option
for months before deciding what to do, Cooper said. "The reason that we
have a Department of Homeland Security is to beef up new strategic
capabilities and new operational abilities day one," he said. "We only get
there if we don't spend time over analyzing every option."
Cooper, an Alexandria native, reached the Office of Homeland Security after
nearly 30 years in the industry. After serving in the Navy, Cooper studied
chemistry and zoology at Ohio Wesleyan University in Delaware, Ohio. His
first post-college job, though, was as a programming analyst at government
contractor CACI International Inc.
Cooper later was chief information officer for Corning Inc. He held a
similar position at Eli Lilly Co. He said his experience with large
acquisitions at both companies will help him integrate 22 agencies into the
Homeland Security Department. "I think there are some things that both of
those companies did well and there were some mistakes," he said.
After Sept. 11, 2001, Cooper said, he contacted the White House to offer
ideas on how information technology could be used to address the problem
with "stovepipes" -- disparate federal agencies whose systems cannot
communicate with one another. After several visits, director Tom Ridge
asked him to join the Office of Homeland Security, Cooper said.
Representative of the agency's challenge will be monitoring the thousands
of freighters that enter U.S. ports daily. The task now is handled by
several agencies, including the Coast Guard, the Immigration and
Naturalization Service and the Customs Service. That scattered approach is
not always efficient or effective, Cooper said. Under the new department,
the agencies will be controlled by a border and transportation security
directorate, combining resources and capabilities, he said.
The department wants a "smart border" program in which cargo ships heading
for U.S. ports would electronically file information detailing the contents
of cargo containers, crew members' names and nationalities and what stops
the ships are scheduled to make before reaching the United States. "What we
would really like to do is push that border out so that the border
theoretically begins when the ship is being loaded," Cooper said.
But, Cooper admitted, it may be a lengthy process. "I think parts of it
could probably be done fairly quickly, meaning within months instead of
years," he said. "To fully put together something like that across the
world is obviously going to take a longer period of time."
In the short term that will not translate into the gold rush in information
technology contracting that many in the industry have expected. There will
be priorities, including border and transportation security technology,
such as equipment that identifies radioactivity and software that
identifies non-obvious trends in databases or protects computer
infrastructure from hackers.
Some programs may be delayed or canceled to accommodate those priorities,
Cooper said. "We will begin to see some small increase in new programs and
new capabilities, but it will not be new, large amounts of money coming to
the budget," he said. "It will be a reallocation."
*******************************
Computerworld
Feds back off proposed disaster recovery regs for Wall Street
By LUCAS MEARIAN
JANUARY 03, 2003
Federal regulators have reportedly dropped a proposed plan to require Wall
Street firms to move their disaster recovery data centers 200 to 300 miles
away from primary data centers, according to an announcement by a U.S.
senator today.
In letter to U.S. Sen. Charles Schumer, (D-N.Y.), the heads of the Federal
Reserve System, the U.S. Office of the Comptroller of the Currency (OCC)
and the U.S. Securities and Exchange Commission (SEC) said they will now
work individually with companies to develop contingency plans that will
help keep backup sites in New York.
"At a time when New York is scrambling to keep businesses downtown in the
wake of 9/11, it would have been disastrous to force the mainstays of New
York's financial industry to move out of the city," Schumer said in a
statement.
Schumer, a member of the Senate Banking Committee, which has oversight over
federal financial agencies, based his analysis of regulators' plans on a
Dec. 23 letter from the board of governors of the Federal Reserve System,
the SEC and the OCC. That letter said, in part:
"Some of the public accounts, including commentary on prospective job
migration, have not accurately described the draft white paper. The draft
white paper does not recommend as a sound practice that firms move out of
center-city locations. Nor does it set specific minimum distance
requirements for back-up operations or mandate the size of the staff at
such operations," the letter said.
"As we go forward ... we also intend to work on a case-by-case basis with
those firms that the agencies deem critical to the U.S. financial markets
as they develop contingency plans to respond to new post-Sept. 11 risk
issues," the letter added.
Federal regulators released an interagency white paper earlier this year,
titled "Sound Practices to Strengthen the Resilience of the U.S. Financial
System," which was criticized by financial services firms as not being able
to "accommodate the unique complexity of individual firms."
The Banking Information Technology Secretariat (BITS), a Washington-based
organization made up by the 100 largest financial services firms in the
U.S., wrote a comment letter in October to regulators that opposed several
parts of the plan.
"The regulators are trying to do the right thing, but let's do it in a way
where we don't impose excessively high costs or implement something that is
technologically not possible to do," said John Carlson, senior director of
BITS.
Fibre Channel, which is the common network protocol between data centers,
currently has a distance limitation of about 70 miles.
Carlson said BITS continues to work with regulators on identifying
vulnerabilities of the financial services industry, including what
investments could strengthen disaster recovery sites, testing of companies'
business continuity plans and what role the government may play in
providing economic incentives or aid for the telecommunications industry.
*****************************
New York Times
January 6, 2003
Experts See Vulnerability as Outsiders Code Software
By JOHN SCHWARTZ
As American companies increasingly move their software development tasks
out of their own offices to computer programming companies here and abroad,
new concerns are being raised about the security risks involved.
Some of these concerns over the practice, known as outsourcing, are being
raised by people with an obvious self-interest for example, programmers
who have seen their livelihoods shift to less expensive operations
overseas. And the companies providing outsourcing services argue that they
take all necessary precautions to limit risk. But the question of whether
the booming business in exporting high-tech jobs is heightening the risk of
theft, sabotage or cyberterrorism from rogue programmers has been raised in
discussions at the White House, before Congress and in boardrooms.
"I can't cite any examples of this happening but what that means is we
haven't found any," said James Lewis, director of the technology program at
the Center for Strategic and International Studies in Washington. "It's
clearly a temptation for people, and it's a concern," he said.
While operations in some countries, like the United States, Britain and
India, are considered generally safe for such software outsourcing,
nervousness is beginning to grow at companies and in the government about
the possibility of abuse by hackers, organized crime agents and
cyberterrorists in nations like Pakistan, the Philippines and Russia.
To Mr. Lewis, the potential for problems in the software design process
goes beyond the earlier trend of running back-office operations and call
centers in other countries.
"The banks have done a fairly good job of insulating themselves," he said,
keeping their call centers overseas from being able to engage in unwanted
activity. But letting outsiders work on the software that runs businesses
and financial institutions could be opening up a world of trouble, he said.
"You're going to have code that will be written in countries like India and
China," he explained, "and no one's going to know what's in it."
David McCurdy, a former congressman and executive director of the Internet
Security Alliance, an industry group, said that although he considered
himself a "free trader" with a strong belief in the benefits of global
commerce, he believed that the risk from offshore outsourcing was "the most
serious of the industry-based issues that this country faces."
The issue has been discussed quietly at the highest levels of government,
said Howard Schmidt, vice chairman of the president's critical
infrastructure protection board. At the White House, he said, "this has
come up as part of a broader discussion of how do we get trust and
reliability" in computer systems.
He said, however, that the issue was outsourcing itself, not simply the
overseas kind, and cited spies like Aldrich H. Ames and Robert Hanssen as
examples of how Americans could do just as much damage to the nation from
within as outsiders could. "Irrespective of where it's done, we need to
make sure that our code is clean and protected across the board," he said.
It is easy to see why companies find the economics of outsourcing
compelling; cost savings can be 25 to 40 percent. Forrester Research of
Cambridge, Mass., predicted in a recent report that the acceleration in
outsourcing would result in 3.3 million American jobs' moving offshore by
2015, an exodus reminiscent of the tide of American blue-collar jobs that
moved to East Asia in the 1980's. Forrester estimates that 70 percent of
these jobs will move to India, 20 percent to the Philippines and 10 percent
to China.
Patrick P. Gelsinger, the chief technology officer of Intel, said the cost
of one engineer in the United States would pay for the services of three
Indians, four Chinese or five Russians. But he said he was not concerned
about the potential for mischief within his own company's overseas software
development. The software is reviewed, he said, to avoid surprises.
"Is it possible?" he said. "Sure, it's possible. Is it a unique risk there?
No, it isn't."
Offshore outsourcing got its trial run in preparations for the Year 2000
changeover, when government and industry had to check every line of
software for glitches that could make computer networks and even building
security systems shut down at 12 a.m. on Jan. 1, 2000.
Much of that work was done overseas, and although industry experts warned
that foreign programmers might commit crimes or lay the groundwork for
terrorism, no evidence of sabotage occurred, said Jay Ehrenreich, senior
manager for cybercrime prevention and response at PricewaterhouseCoopers,
the consulting firm. After that experience, he said, many companies felt
comfortable sending software work overseas, and now such bespoke
programming is done around the world.
Programmers say the confidence is not justified.
"Anyone tells you that `offshoring' computer systems does not put the
infrastructure at risk is lying," said Ken O'Neil, a programmer who lives
on Long Island. He and other programmers talk of "sleeper bugs" that could
be set to go off at a later date, or back doors that would let intruders in
to shuttle money around, steal fractions of a penny from millions of
transactions or shut down the system entirely. They warn of risks from
political instability, organized crime and terror cells, and even from
governments that might demand the ability to spy.
Such talk could be dismissed as the grumblings of disgruntled white-collar
workers who have seen their high-paying jobs move elsewhere. "Nobody is
going to cry for people who make $75,000 or $100,000 a year," said Marc
Alan Fink, who lost his programming job more than a year ago.
In fact, some of the newly expressed concern is part of a long-running and
acrimonious fight by programmers to hold on to their jobs in the face of
relaxed immigration standards for technical workers and increased
outsourcing. They attack the rise in special visas for immigrant engineers,
known as H1-B visas, and the trend toward sending jobs overseas.
The companies that provide software outsourcing services say that they take
rigorous precautions to ensure that their employees are trustworthy and
their code is secure.
Arup Gupta, president of Tata Consultancy Services, an Indian company that
is part of a conglomerate, said he had gotten worried calls from clients
after the recent F.B.I. raid on Ptech, a software company in Quincy, Mass.
The agents were looking for connections between the company and Yasin
al-Qadi, a Saudi Arabian financier suspected of financing terrorism, but
early speculation in news reports focused on questions about whether the
company, which provides software used by many government agencies,
including the F.B.I., was secure.
Mr. Gupta assured his clients that his company used exacting background
checks and multiple reviews of company-written software based on industry
standards. "With all these in place, we can guarantee, basically, that the
code we deliver will be bug-free and will perform to specifications and
will not have holes in it," he said.
He said he could speak for only his own company, but he added that since
the Sept. 11 attacks, security fears and economic troubles had shrunk his
industry and brought about the consolidation of the major Indian software
houses. "The top five or six companies, you can be assured that they are
conforming to these standards," he said. "The others, you cannot be
sure but maybe they are."
United States technology services companies are also expanding their
overseas outsourcing offerings. Electronic Data Systems provides
outsourcing services in 93 "solution centers" that it has opened around the
world since 1990. Paul D. Clark, the chief information security and privacy
executive for the company, said E.D.S. understood that the threat of
sabotage in outsourcing is real. He said, "To say that it isn't is to deny
the realities." That is why the company adheres to security and testing
standards wherever code is written, he said, adding, "whether it's India or
Indiana, it doesn't make any difference."
The company is careful about what code it releases to which countries, said
Dan Zadorozny, president of application services for EDS Solutions
Consulting; some federal government work, he said, is done only in the
United States and Britain, and "we're not going to move that anywhere." But
E.D.S. insists that its standards are high enough that its outsourcing
sites offer "a more secure environment than you can provide yourself."
Some programmers, however, argue that reviews are less thorough than
companies say. "If code runs, I assure you, nobody ever looks at it," said
one, who said conducting a line-by-line review would be like having an
electrician tear into walls to check wiring even though the lights were
working. "It never gets done in practice."
Mr. Ehrenreich, the crime consultant, said that it was up to companies to
demand that kind of security, even if it cost more. He recalled a case in
which he was asked to investigate the possibility of illegal activity on an
Indian outsourcing contract and discovered that it was nothing more than
run-of-the-mill overbilling fraud.
What struck him, however, was that the company had no idea how big the
problem was. He said far-worse crimes could have been committed without
anyone's knowing. "The risk was there that more could have been done," he
said. "They clearly did not have the controls in place to mitigate it,
control it."
"You can outsource the work," he said, "but you can't outsource the risk."
**********************************
Los Angeles Times
Judge Grants Reprieve to Madster
By Jon Healey
January 6 2003
A federal judge in Albany, N.Y., has granted a temporary reprieve to
Madster, an online file-sharing system being sued for copyright
infringement by the entertainment industry.
The major record companies, music publishers and Hollywood studios accuse
Madster, formerly known as Aimster, of enabling wide-scale piracy.
While that case is pending in federal court in Chicago, a federal court in
New York is handling a bankruptcy petition filed by Troy, N.Y.-based
Madster's creator, John Deep.
On Dec. 2, U.S. District Judge Marvin E. Aspen in Chicago ordered Deep to
stop all copyright infringements by Madster while the lawsuit was pending.
But U.S. District Judge Lawrence E. Kahn in Albany suspended Aspen's order
Friday, citing the potential damage to Madster's creditors. He also
scheduled a hearing for Thursday on the issue.
The latest order allows Deep to distribute Madster's software again. But
Deep said in an interview that he wouldn't take any action before
Thursday's hearing.
*****************************
New York Times
January 6, 2003
Phone Calling Over Internet Is Attracting More Interest
By SIMON ROMER
Phone calls over the Internet may finally be catching on.
When the technique was first used in the mid-1990's, Internet telephone
conversations were hailed as a way to make long-distance calls without
paying toll charges. The most zealous advocates predicted that the
conventional public telephone network would quickly become obsolete. That
has yet to happen, of course.
Despite the money-saving potential, sending voice telephone calls over the
Internet remains largely a niche service for technophiles and for people
seeking cheaper international communications like users of prepaid phone
cards, who may not even realize that their discount calls are bypassing the
regular phone network. Yet the technology is showing signs of gradually
expanding to a broader audience, a step that could eventually mean
wide-reaching changes in the telecommunications industry, if early
experiments by individuals and businesses are any indication.
Terence Chan, an employee at a Seattle technology company, for example,
uses a service called Free World Dialup to talk to his family in Hong Kong.
Free World allows Mr. Chan and his relatives to use equipment that looks
and sounds like regular telephones but enables users to call one another
and pay no fees beyond the rates for their fast Internet connections.
"I was interested in Internet calling as a technological novelty," Mr. Chan
said, "but what really got me into it was the fact that it is free."
Among business users, meanwhile, Japanese companies appear to be leading a
migration to Internet calling. Organizations like Shinsei Bank and Tokyo
Gas have begun using it for internal communications and some external
calls. A recent survey by the Mitsubishi Research Institute showed that
more than 40 percent of Japanese companies planned to begin using Internet
calling in the next few years.
Internet calling currently accounts for more than 10 percent of
international calling traffic, with about 18 billion minutes worldwide, up
from 9.9 billion minutes at the end of 2001, according to the research firm
Telegeography.
"We expect a steady transition to Internet calling so that by 2010, nearly
all calls will go over the Internet," said Tom Evslin, chief executive of
ITXC, a company in Princeton, N.J., that is a leading carrier of Internet
calls.
To be sure, few people in the telecommunications industry expect an
overnight transition. Instead, analysts and industry executives foresee a
gradual transition over several years, similar to the way people switched
from black-and-white to color television.
A big factor is the billions of dollars that large local and long-distance
carriers have invested in conventional network equipment. These companies,
which still transmit the overwhelming majority of phone calls, will be
reluctant to mothball their systems anytime soon.
Still, numerous companies on the margins and even closer to the center of
the telecommunications industry are seeking to take business away from the
dominant carriers by offering cheaper Internet-based services.
One of them is Mr. Chan's provider, Free World, a company based in
Melville, N.Y. Free World gives its users five-digit telephone numbers that
enable them to communicate using special Internet phones made by Cisco
Systems, for which Free World users pay less than $300. If the company can
reach its target of 50,000 users by September, it plans to start charging
for add-on services like voice mail and conference calling.
Advances in technology and the use of faster network connections have
alleviated many of the problems that plagued early forms of Internet
calling, like noticeable delays between the time someone spoke a word and
the time the person receiving the call heard it. The sound quality is now
comparable to that of calls placed via the public telephone network.
These improvements have benefited companies that transmit international
calls over the Internet, providing the service to other companies that sell
prepaid calling cards to the public. The callers and the people they call,
who use regular telephones, typically cannot tell that the Internet is
carrying all but the first and last few miles of their calls; the signals
are routed through Internet gateways.
The big difference between calls that travel over the Internet and those
that use the regular telephone network is the underlying routing
technology. Although the public phone network has become highly
computerized in recent decades, it is still in many ways the equivalent of
stringing two cans together to allow sounds to travel from one point to
another: each conversation requires a single dedicated circuit. The modern
phone network's complexity lies in the way any two "cans" are able to be
temporarily strung together by software that routes calls through a
carefully designed system of thousands of switching locations.
The Internet, on the other hand, uses a crazy-quilt network to send and
receive information, whether it is in the form of voice calls, e-mail
messages or video conferences.
In each case, sounds, text messages or images are digitally broken into
tiny bits of information and disseminated over the network, using any
number of routes before all the packets of bits are reassembled at the
other end of the line.
Many network engineers say that if telephone networks were built from
scratch today, they would almost certainly be Internet-based.
The Net is believed to be more efficient compared with the dedicated
circuits of conventional phone networks.
Executives at some of the largest telecommunications communications
companies are planning to make Internet calling part of their business as
they seek efficient ways to route some calling. But they expect the
technology to catch on at a much slower pace.
"We have a very reliable telephone system that has worked well for many
decades," said Eric Rabe, a spokesman for Verizon Communications, the
nation's largest local telephone company. "We see an eventual movement away
from the traditional system, but right now it's mainly early-adopter types."
As more calls are made through a mix of Internet and conventional methods,
pricing is likely to become an issue. Calls over the conventional
network especially long-distance calls have generally been priced on a
per-minute basis, while billing for Internet connections is more typically
a flat monthly fee. Either system could be changed, although the Bell
companies and other giant carriers have an interest in maintaining the
pricing for the conventional network.
In addition, governments in several developing countries, including Panama,
Kenya and South Africa, have sought to limit the use of Internet calling
out of concern that national carriers in those countries were losing
revenue to Internet-based systems. In those countries and elsewhere,
regulators could require that Internet calls be billed by the minute or taxed.
Within this country, a potentially major force in Internet telephony could
be the cable television industry. Large cable companies are already
providing telephone service, with about 2.1 million local voice customers
as of June 2002, according to the National Cable and Telecommunications
Association. Though it is still a relatively new business, that number is
expected to grow as cable companies bundle local phone services with their
offerings of fast Internet service and digital cable television.
Other companies, mainly start-ups that have managed to survive the
industry's recent turbulence, have their own strategies. One such firm is
Vonage, a company in Edison, N.J., that offers flat-rate calling services
over high-speed Internet connections.
Vonage customers can use a regular touch-tone telephone for a service plan
that charges $40 a month for unlimited local and long-distance calling in
the United States. Vonage subscribers use an adapter that lets them connect
their phones to their high-speed Internet modems. Users also have access to
low-cost international calling plans.
Despite the attention on consumer-focused services like Vonage's, some
analysts say the real growth behind Internet calling will come from
business customers. But in this country, that will require the continued
growth of high-speed, or broadband, Internet services.
Tom Nolle, the president of the CIMI Corporation, a technology consulting
firm in Voorhees, N.J., says broadband penetration needs to climb to about
20 percent of the population from the current level of 10 percent for
Internet calling to begin to make sense to a large number of businesses.
Once that happens, companies can start to use Internet calling to
communicate between their own offices and customers and suppliers. Such a
trend, of course, would raise the competitive pressure on large local phone
companies like Verizon and SBC Communications, which so far have felt
minimal impact from Internet telephony.
Another source of pressure on the phone companies could be the growing
popularity of the form of wireless Internet access known as Wi-Fi. Several
start-up companies mean to provide Internet calling services via Wi-Fi
networks, using hand-held or laptop computers equipped with microphones and
earpieces.
"There's no reason why companies can't use P.D.A.'s to give employees in
the field a way to access their corporate telephone systems," said Raju
Gulabani, the chief executive of TeleSym, a company based in Bellevue,
Wash., that makes software for wireless Internet calling on hand-held
personal digital assistants, or P.D.A.'s. Intel's communications fund is an
investor in TeleSym.
As with any emerging technology, it is unlikely that all the new approaches
to Internet telephony will take hold. But one thing is clear: Internet
phone calls have emerged as one of the most creatively vibrant parts of the
battered telecommunications industry.
"There's been very little innovation in 125 years of the public telephone
network," said Jeff Pulver, founder of Free World Dialup. "Anything that
can be done to wrest influence from the large companies that have such
control over the way we talk to each other is a step in the right direction."
*******************************
Federal Computer Week
Council advises architecture security
BY Megan Lisagor
Jan. 3, 2003
In this season of resolutions, the CIO Council has reminded agencies to
secure their enterprise architecture software tools and the sensitive
information those tools collect.
Enterprise architecture software aligns information technology investments
within and across agencies, providing up-to-date inventories of systems.
Experts have called the tools critical to the success of e-government.
"The detailed information they and associated databases contain regarding
agency assets and processesÖshould be considered mission critical,"
officials from the council wrote in a Jan. 2 letter to chief information
and security officers. "These applications must be appropriately secured to
protect against the harm resulting from the loss, misuse or unauthorized
access to or modification of information."
The council advised agencies to discuss plans to secure the software as
part of their next quarterly updates to the Office of Management and
Budget. They should do so, officials noted, in compliance with the Federal
Information Security Management Act. FISMA, passed as part of the
E-Government Act last month, updates the Government Information Security
Reform Act of 2000, which expired Nov. 29, 2002. GISRA combined many
federal security policies into one law.
*******************************
Government Computer News
01/06/03
Name recognition company helps FBI in search of illegal visitors
By William Jackson
GCN Staff
Language Analysis Systems Inc., a producer of multicultural name
recognition software, has given the FBI information about the names of five
individuals suspected of entering the country illegally about three weeks ago.
The FBI published an alert Dec. 29, saying it was seeking five individuals
with Pakistani names believed to have crossed the border from Canada around
Dec. 24. LAS, of Herndon, Va., provided the FBI with a list of variations
of the names on Dec. 30, and published the most common variations on its
Web site today.
It is common for names transliterated from foreign scripts such as Arabic
to have several valid spellings in the Roman alphabet, complicating the
task of tracking and identifying people who enter this country.
LAS has worked as a consultant for 18 years with the federal law
enforcement, intelligence and border control communities developing proper
name analysis applications. It received permission to commercialize the
software in 2001 and released its Name Reference Library, which uses a
database of 1 billion names to provide variations of and information about
proper names.
Chief executive officer John Hermansen said about 75 percent of the
company's sales are to government, but private sector sales to companies
such as banks and airlines are growing.
The FBI is searching for Abid Noraiz Ali, Adil Pervez, Akbar Jamal,
Iftikhar Khozmai Ali and Mustafa Khan Owasi. LAS posted a list of more than
70 alternate spellings to the names on its Web site at
las-inc.com/fbialert. The company calls the alternatives "highly plausible"
variations of the names originally provided in the FBI alert.
Organizations that can demonstrate a need can get the full list of name
variations from LAS by e-mailing a request to fbialertrequest@xxxxxxxxxxx
and including name, organization, title, address, phone number and the
purpose of the request.
*****************************
Government Computer News
01/03/03
NIH adds single sign-on to its one-stop portal
By Vandana Sinha
Early next month, employees who log on to the National Institutes of
Health's my.nih.gov data portal will need only one password to open
protected applications. NIH's Center for Information Technology announced
this month that it is erecting a security gateway, called Enterprise
Authentication, which will later extend to the Integrated Time and
Attendance System and the NIH Business System modules for travel, general
ledger and budget functions.
Once those applications are connected, likely by spring, the authentication
umbrella will be unfurled over other NIH Business System modules, the
nVision data warehouse and the NIH Enterprise Directory. The umbrella
system is built on SiteMinder network access software from Netegrity Inc.
of Waltham, Mass.
The crossover of so many applications, however, requires administrators to
revert any personalizations that employees have made to their portal pages
back to a uniform default profile. If employees want to preserve their
personal changes to My Pageswhich display up to 150 items such as weather,
airport delays, biotechnology news and virus warningsthey must send their
user names and domains by Jan. 14 to portaladmin@xxxxxxxx
The portal, which has been running since June 2001, combines the agency's
internal data, documents and processes with external research news and
links. Employees can plug into shared Communities sites about specific
topics and consult a Document Directory of all NIH resources.
************************
Government Executive
January 6, 2003
National cybersecurity plan omits industry mandates
By Bara Vaida and William New , National Journal's Technology Daily
The latest version of the national cybersecurity plan expected to be
presented to President Bush within the next month encourages the private
sector to do more to protect the Internet but without mandates on industry,
which had been proposed in the initial draft released publicly last September.
Internet service providers (ISPs) will not be required to build a
centralized system to enable broad monitoring of the Internet; rather, they
will be encouraged to develop a national network operations center (NOC)
that could complement a federal cybersecurity response team that is to be
developed in the Homeland Security Department, according to a copy of the
plan obtained by National Journal's Technology Daily.
"In substance, the latest draft isn't all that different from September,"
said one high-tech industry source who viewed the latest version.
"Stylistically, it's much different in that it is much better written,
simpler and more straightforward. If you ticked off the items in this draft
compared to the other, however, there aren't that many differences."
The administration has been gathering comments on the first draft and has
addressed issues raised in those comments, including suggestions that the
plan more clearly state that it does not seek to regulate the private sector.
Late last month, The New York Times reported that the Bush administration
was planning to propose requiring that ISPs build a central monitoring
system of the Internet, raising fears that the strategy had become more
regulatory. However, the version that has been circulating within the
high-tech sector since December says only that private-sector organizations
focused on cybersecurity "should consider the benefits of creating an
entity or center with a synoptic view of the health of cyberspace on a 24
by 7 basis."
The creation of such an operations center will continue to face resistance
from companies that have made a business by monitoring cyberspace for
specific clients, a high-tech lobbyist said. Richard Clarke, the special
adviser to Bush on cybersecurity and chief architect of the strategy, "just
hasn't made a good enough case that a NOC is necessary ... when it is
already being done in the private sector," the lobbyist said.
The strategy states that "federal regulation will not be used as a primary
means of securing cyberspace" but also emphasizes that the federal
government cannot protect the Internet alone.
On the international front, the draft still makes a strong pitch for global
cooperation but adds that the United States "reserves the right to respond
in an appropriate manner, including through cyberwarfare." It also stresses
stronger U.S. counterintelligence efforts in cyberspace, improvements in
attributing cyberattacks to their sources, and better interagency
coordination.
Other points emphasized in the latest version include:
A Cyber Warning and Information Network to allow government officials and
the private sector to discuss cyber threats.
Tests to determine the impact cyberattacks would have on processes in
various agencies.
A program to manage the information flow and to protect the information on
threats to critical infrastructures that companies voluntarily submit.
A public-private task force to recommend the implementation of the new
Internet protocol, IPv6 in the United States.
Annual priorities for cyber-security research and development and periodic
reviews of emerging cyber-security technologies.
An information and analysis center for universities and colleges because
they have among the most powerful computing systems in the nation.
A task force of public and private-sector officials to identify ways that
information technology providers, other organizations and the government
can reduce the burden on home users and small businesses in securing their
computer systems.
*****************************
Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 510
2120 L Street, NW
Washington, D.C. 20037
202-478-6124
lillie.coney@xxxxxxx