[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips January 13, 2003
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, glee@xxxxxxxxxxxxx;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, akuadc@xxxxxxxxxxx;, computer_security_day@xxxxxxx;, waspray@xxxxxxxxxxx;
- Subject: Clips January 13, 2003
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Mon, 13 Jan 2003 16:07:17 -0500
Clips January 13, 2003
ARTICLES
File-Swapping Lawsuit Gets OK
Hollywood Guilds Band Together to Defend Media Ownership Limits
Thieves Take $10 Million in Computer Chips
Manila to Stay on U.S. Piracy Watch List-Envoy
Geneva Suburb Casts Ballots on the Internet in Test Project
E-Rate in 'financial disarray'
Army delays Human Resources system
City opens Internet free-access zone
Federal Computer Week Roster Change
Open-source group names 10 scariest Web vulnerabilities
Does cyberwar start with scholarships?
Oveson is Utah's new CIO
Bush names two for strategic DOD posts
Census will count county lines via Web
Senate fray stalls homeland funding
Armed services chairman will push for faster IT development
New Senate chair voices concerns on information sharing, cybersecurity
House GOP chooses Davis to lead Government Reform Committee
White House tech officials race to build security system
Bush announces pick for homeland CIO
Lobbyists detail top tech policy items
Biting Back [Software Bugs]
Spam? No thanks, we're full
Face recognition cameras stir fears
*****************************
Associated Press
File-Swapping Lawsuit Gets OK
January 13, 2003
LOS ANGELES - A federal judge has given record companies and movie studios
the go-ahead to sue the parent company of Kazaa, a popular online
file-swapping service.
U.S. District Judge Stephen V. Wilson refused to dismiss a copyright
infringement lawsuit against Sharman Networks Ltd., which had argued that
it could not be sued in the United States because it is based in Australia
and incorporated in the South Pacific nation of Vanuatu.
In a 46-page ruling issued Friday, the judge said Sharman is subject to
U.S. copyright laws because it has substantial business dealings in
California and its actions are alleged to contribute to commercial piracy
within the United States.
Kelly Larabee, a Sharman spokeswoman, said that while the company was
"disappointed" with the ruling on the case, "we fully expect to prevail on
the merits."
Larabee said Sharman would be filing a counterclaim that will "set forth
the full story for the first time."
The Sharman case is one of the largest in the recent online copyright wars
testing the international reach of U.S. courts. The plaintiffs maintain
that Kazaa provides free access to copyrighted music and films to about 21
million U.S. users.
******************************
Los Angeles Times
Hollywood Guilds Band Together to Defend Media Ownership Limits
Lobbying campaign pits writers, producers, directors and actors against TV
networks.
By Edmund Sanders
January 13 2003
WASHINGTON -- An unusual alliance of Hollywood producers and creative
workers is mobilizing here for a stiff fight against company efforts to
relax long-standing limits on media ownership.
The coalition combines directors, writers, actors and producers -- groups
more often known for strife than unity.
But the new push by frequently divided siblings is grounded in a shared
fear that any move by the Federal Communications Commission to allow
further consolidation in the TV business would kill jobs and stifle creativity.
"This is really unprecedented," said Victoria Riskin, president of the
Writers Guild of America, West. "It's remarkable how this one issue seems
to have captured the entire community."
The campaign is being led by guilds and professional organizations that
usually are overshadowed in Washington by powerful company groups such as
the film industry's Motion Picture Assn. of America.
This time around, however, members of the creative coalition are
aggressively hiring lobbyists, funding economic studies about the evils of
consolidation and dispatching high-profile representatives, including "Law
and Order" producer Dick Wolf and "The Enforcer" producer Leonard Hill, to
Capitol Hill and the FCC.
The campaign pits the guilds squarely against their members' primary
employers, entertainment and media conglomerates such as Viacom Inc. and
News Corp., which are pushing to kill government rules that restrict them
from buying additional TV stations or mixing ownership of stations and
newspapers in a single market, among other things.
(Tribune Co., parent of The Times and an owner of TV stations, is among the
companies lobbying to lift the rules.)
"In an economic age where four of the six networks are losing money, we
have to figure out different ways to get programming on television," said
Leslie Moonves, president of Viacom's CBS unit. Moonves said one way to
shore up faltering networks is through increased ownership of TV outlets.
"But in no way does that sacrifice quality on television," the executive
insisted.
Among the entertainment unions that have stepped up activities in
Washington are the Writers Guild of America, East and West; the Caucus for
Television Producers, Writers and Directors; the American Federation of
Television and Radio Artists; the Producers Guild of America; the Directors
Guild of America and the Screen Actors Guild.
Unlike the major networks and studios, only one guild -- the DGA -- has a
permanent, full-time lobbying presence in Washington. And the unions have
been criticized at times for bickering among themselves rather than working
together on issues.
"They have a sketchy track record in Washington," one Capitol Hill staffer
said.
The last time the guilds came together so strongly on the policy front was
in the late 1980s, when they worked with major studios to try to keep big
TV networks from reversing an FCC restriction on networks owning their
programs. The guilds and studios lost that fight when the courts tossed out
a modified rule known as the financial interest and syndication rule.
The current battle is even more daunting, Riskin says, because studios and
networks now are often owned by the same parent, leaving the guilds to
fight on their own.
In a sign of cooperation, more than a dozen guilds and advocacy groups now
participate in weekly conference calls to map out strategy on the media
ownership issue.
Several groups, including AFTRA; Writers Guild of America, East; and the
AFL-CIO Department of Professional Employees, recently pooled their
resources to hire economist Dean Baker of the Center for Economic and
Policy Research to analyze the dangers of consolidation for the FCC, which
is reviewing all media ownership rules.
In an effort to raise public awareness, the guilds also persuaded USC and
the Columbia University School of Law to host public forums on the issue.
The first forum, featuring FCC Chairman Michael K. Powell and other
commissioners, will take place Thursday in New York. USC's conference is
slated for Feb. 18.
The activism stems from a rising belief that concentration of ownership is
reducing both creative freedom and business opportunities in television.
Before the financial interest rules changed, for instance, independent
producers generally licensed their shows for a set period to TV networks,
then sold them later to local television stations and abroad, often reaping
a huge financial windfall. Now, networks capture such gains by owning the
programs themselves.
In 1992, 17% of new TV shows were produced and owned by the top four
networks, according to the Writers Guild; last year that number jumped to
77%. NBC owned a stake in 100% of its new programs in 2002.
The result, critics say, is that six entertainment conglomerates are
determining what shows get made and who gets hired, usually favoring
in-house projects and their own talent, even though they may not yield the
highest-quality TV show.
Meanwhile, independent operators such as Carsey-Werner-Mandabach, whose
principals created "The Cosby Show," "Roseanne," "That '70s Show" and other
hits, are a dying breed, observers say.
"I wouldn't want to be starting out now," said Gary David Goldberg, creator
of such hits as "Family Ties" and "Spin City." "Unless something changes
for independent producers and writers, it's a non-business."
When he pitched "Spin City" to ABC in 1996, Goldberg and star Michael J.
Fox were able to control ownership, demand a hefty licensing fee and retain
creative freedom.
Today, he said, networks wouldn't even discuss a deal unless they could own
and control the show themselves.
"I may have gotten the last great ride," said Goldberg, who recently
decided to leave television. He stressed that his departure was unrelated
to the changing environment but said he was worried about the future.
"I used to believe very firmly that only the best shows got on television,"
Goldberg said. "I don't think that's the case anymore."
Moonves sharply disputed that view. Networks, he said, today own a greater
stake in new TV shows because they are the ones putting up the money to
launch them.
Moonves said many producers and writers complaining about declining quality
simply are frustrated that they can no longer get the same financial deals
they could when networks were restricted from taking an ownership stake in
programs.
"They want us to pay 100% of the costs and have none of the ownership,"
Moonves said. "I'd love that deal too."
Moonves said the networks have no incentive to put on low-quality shows
simply because they own them.
"If we own 100% of a bad show, we get hit twice," he said. "We'll put on
the best programs, no matter where they come from."
Nevertheless, a top priority for the guilds is to persuade the FCC to
impose new restrictions on television networks, requiring networks to buy a
minimum amount of their programming, say 25% to 50%, from outside sources.
Meanwhile, in an effort to create a more unified presence in Washington, a
coalition of writers, producers and actors has formed the Center for the
Creative Community, a nonprofit advocacy group whose board includes actress
Sissy Spacek, "Dog Day Afternoon" writer Frank Pierson and "Murphy Brown"
creator Diane English. The group was launched in October by screenwriter
and attorney Jonathan Rintels.
"In Washington, Hollywood is perceived as Jack Valenti [the studios'
longtime lobbyist]," Rintels said. "We may share some of the same issues,
but the creative community needs its own permanent organization here."
The Caucus for Television Producers, Writers and Directors is focusing its
efforts on Capitol Hill, generating interest among lawmakers and pushing
for congressional hearings on the issues. John McCain (R-Ariz.) and Ernest
F. Hollings (D-S.C.), leaders of the Senate Commerce Committee, both have
expressed interest in exploring media consolidation issues, though no
hearings have been set.
"We're hoping to put pressure on the FCC through Congress," said Margaret
Cone, a lobbyist hired by the caucus.
Last summer, Cone led producer Len Hill -- a former ABC executive -- and
others through a series of meetings with FCC commissioners and Capitol Hill
staffers, urging them to move slowly on the issue and consider the effect
on Hollywood producers and writers.
"These are successful people," Cone said. "They have an appeal to lawmakers
and an important story to tell."
Finding producers and writers willing to publicly oppose the major networks
has been difficult, guild representatives say. Most are struggling
small-business people, fearful about retribution from the major companies.
Rintels was asked to delay announcing the addition of two board directors
to his organization until the producers could finalize their pending deals
with the networks.
"People fear doors will close," Riskin said.
A spokesman for News Corp., owner of the Fox Network, said such fears are
unfounded.
"In an industry like this, lots of people disagree with us," said spokesman
Andrew Butcher. "But we all still have to work together."
**********************************
Reuters
Thieves Take $10 Million in Computer Chips
Sun Jan 12, 1:51 PM ET
LONDON (Reuters) - British police investigated on Sunday the theft of
computer chips worth an estimated $10 million from a van near London's
Heathrow airport.
The thieves struck Sunday morning when the van was left briefly unattended
in a commercial area close to the airport, police said.
Police stressed that there were no signs that the theft had security
implications for Heathrow, the world's busiest international hub.
The Intel Pentium III chips were believed to have been part of a
consignment from Miami, destination unknown, police said. It was not yet
known whether they had been flown in to Heathrow or were to be flown out of
the airport.
"It is believed that two male suspects took and drove the vehicle away," a
police statement said.
Police recovered the van shortly after the theft behind a nearby row of
shops, still containing around a quarter of its load.
Detectives interviewed the driver from whom the van was stolen and examined
CCTV footage. No one has been arrested.
Police also said they recovered an abandoned white Renault van in Feltham,
a town south of the airport, which the thieves could have transferred their
loot into and used to escape.
The crime followed another theft computer of chips worth $4.5 million from
a cargo service center near Heathrow in October.
*****************************
Reuters
Manila to Stay on U.S. Piracy Watch List-Envoy
Fri Jan 10, 4:35 AM ET
MANILA (Reuters) - The Philippines is unlikely to get off a U.S. piracy
watch list soon after it ended last year without a single conviction in
about 280 cases filed in the courts, a senior U.S. official said on Friday.
William Lash, U.S. assistant secretary of commerce for market access and
compliance, told reporters the Philippines has to step up enforcement of
its intellectual property right (IPR) laws and speed up passage of a
proposed optical disc law before it can be taken off the watch list.
The Philippine Congress has yet to pass the optical media bill, which
specifies regulations and penalties in the production of music and video
discs.
"While there have been many raids, many inspections of copyrighted bootleg
goods, we've found that there have been exactly zero convictions in the
past year," said Lash, who is due to visit Kuala Lumpur and Bangkok after
his Manila stop.
"Obviously, we are very disappointed in that level of enforcement," Lash said.
The United States estimates that U.S. firms lost about $116 million to
piracy in the country while the Philippine government lost about $25
million in potential taxes last year due to the sale of bootleg video discs.
A bootleg DVD copy of the film "Lord of the Rings: Two Towers" has been
selling at about 100 pesos, or less than $2, in Manila streets for weeks
now while the film is set to debut only on Friday in Philippine theaters.
Theater ticket prices are higher than that of pirated DVD copies,
contributing to the popularity of bootleg video discs.
The United States is currently reviewing its IPR watch list and was likely
to announce the results later this month, Lash said.
"When you have a record of no convictions, when you haven't passed the
optical disc law, I couldn't be too encouraging about getting off the watch
list," Lash said. "It's not a prediction, it's just a fact."
The U.S.-based International Intellectual Property Alliance has estimated
that up to 15 underground pirate plants operate in the Philippines, with
finance, management and technical assistance provided by Malaysian,
Singapore, Hong Kong and Taiwan-based organized crime groups.
These groups are moving to the Philippines because of the crackdown in
their home countries.
The United States considers a country's record in protecting intellectual
property rights (IPR) when granting trade benefits, and the Philippines is
one of 15 countries on a "priority watch list" of nations with IPR problems.
**********************************
New York Times
January 12, 2003
Geneva Suburb Casts Ballots on the Internet in Test Project
By ALISON LANGLEY
ANIÈRES, Switzerland, Jan. 9 When the 1,150 citizens of this Geneva suburb
vote later this month to decide whether to allow public money to be spent
renovating its Michelin-rated restaurant, they will be guinea pigs in
Switzerland's continuing effort to make voting easier for its citizens.
The voters will have a choice of three ways to cast their ballot. They will
be able to vote at a polling place in the elementary school or mail their
ballot or, for the first time, vote on the Internet.
"If you have a voting system that may bring more people to the ballot, that
is good," said Michel Chevallier, who helped develop the electronic voting
pilot project.
The Swiss vote on average five times a year as part of their system of
direct democracy. Any Swiss citizen can bring about a nationwide vote by
gathering 100,000 signatures on any issue. In May, for instance, voters
will consider as many as nine initiatives, including changes in the armed
forces, a moratorium on nuclear energy and car-free Sundays.
Since the 1970's, as the number of initiatives has risen, voter turnout has
fallen in this country of 7.3 million. Nowadays, electoral officials say
they are pleased when 60 percent of voters cast a ballot.
"Swiss citizens vote four to six times a year they want a simple ballot,"
Robert Hensler, the state official who oversees elections in the canton of
Geneva, told the 75 citizens who gathered in the Anières elementary school
hall on a recent evening to learn about Internet voting.
The government introduced voting by mail in 1993. It is now used by 95
percent of voters in Geneva elections. "Internet voting is nothing more
than an evolution of postal voting," Mr. Hensler said.
Jean-Jacques Brun, 74, came to the meeting clutching a notebook filled with
pages he printed out after taking the electronic voting tutorial provided
by the canton.
"It came online at noon today, and I tried it immediately and it is all
right," he said, nodding his approval. "So tomorrow I vote." The tutorial
convinced him that his confidentiality the biggest concern of voters at
the meeting was assured.
All eligible voters in Anières received a voter card three weeks before the
Jan. 19 election date. They have until noon on Jan. 18 to cast ballots by
mail or electronically.
Isabelle Anderegg said she would vote online to save time. "I'm very busy,
I'm working a lot," she said. "This is very quick, and I can do it when I'm
at home."
It is impossible to know exactly how much the country spends each year on
elections because no single entity is responsible for the bill. The Swiss
authorities estimate that Internet voting will cost about 500,000 Swiss
francs, or about $350,000 more, per canton per election.
"E-voting will add some great costs," said Hans-Urs Wili, chief of the
Swiss government's political rights division. "So why promote them? Because
we do not know what will be the habits of citizens in 20, 30, 40 years' time."
Mr. Wili estimated that after the test run in Anières, it would take 10
years to provide a working system on a federal level.
******************************
Federal Computer Week
E-Rate in 'financial disarray'
BY Dibya Sarkar
Jan. 10, 2003
A $2.25 billion federal program created six years ago to help connect
schools and libraries to the Internet is "honeycombed with fraud and
financial shenanigans," according to a report the Center for Public
Integrity released Jan. 9.
The center based its conclusions on two reports by the Federal
Communications Commission inspector general's office last year and
subsequent interviews. The nonprofit, nonpartisan group said that the
E-Rate program is in "financial disarray," with problems ranging from
"simple paperwork and reporting errors to false billing and other fraud
potentially involving hundreds of millions of dollars."
E-Rate, created as part of the Telecommunications Act of 1996, provides
schools and libraries with discounts of 20 percent to 90 percent for
Internet access and telecommunications infrastructure and for internal
connections. The program, which is overseen by the FCC but administered
contractually by a nonprofit group called the Universal Service
Administrative Company (USAC), is funded by the telecommunications industry
through taxes on individual telephone bills.
About 86 percent of public schools, 21 percent of private schools and 65
percent of libraries have received discounted services since the program's
inception.
According to the report's author, Bob Williams, the FCC inspector general's
office and USAC are "also concerned about the whole competitive bidding
process. They're not sure ... it's going on as competitive bidding." The
report said program officials began "denying or delaying applications"
involving IBM Corp., the top recipient of E-Rate funding to the tune of
$350 million, because "schools, libraries and/or IBM had not followed
proper competitive bidding procedures."
But the report said USAC doesn't believe the financial mismanagement is as
widespread as the inspector general suspects. Williams said he was
surprised to see an inspector general's report to be "so frank and open
about potential problems within an agency." He also said the FCC wants USAC
to provide more money to hire auditors, but USAC doesn't want to.
Williams said it's likely that Congress will examine the issue
further particularly Sen. John McCain (R-Ariz.), who is expected to be
chairman of the Commerce Committee and who has "never been a huge fan" of
the E-Rate program.
*******************************
Federal Computer Week
Army delays HR system
BY Dan Caterinicchia
Jan. 13, 2003
An Army effort to consolidate 43 personnel databases into one Web-based
"electronic military personnel office" is being delayed because of problems
migrating data into the new system, according to Army Personnel Command
(Perscom) officials.
The $9.5 million eMILPO system is designed to provide near-real-time
visibility on staff information throughout the Army via a Web-based
application.
It was originally scheduled to go online early this month, but was delayed
after an Army fielding team discovered errors from data transactions and
other problems associated with migrating 43 super-server databases to the
eMILPO test database, said Col. Gina Farrisee, the Army's adjutant general.
The original plan was to turn off in early January the 43 servers currently
being used, but "waiting 60 more days is the right thing to do," Farrisee said.
"We took a lot of risk with a compressed timeline to field eMILPO," said
Col. William Mansell, deputy to the adjutant general at Perscom. "The key
problem was data migration. We wanted to do it in a test before production,
and there were a number of unanticipated problems found. The good news is
we found them. The bad news is that there [is] not sufficient time" to
field the system this month.
The Army used an unconventional development and testing schedule for
eMILPO, using three series of tests. The second series of tests was
completed in October 2002. That left time to "reload and make corrections,"
but the transition from the third series last November did not go as
planned, he said.
"It became clear that the problems were insurmountable," so officials
decided early last month to delay fielding eMILPO until at least early
March, Mansell said.
"Our promise is that you will not need to re-enter data," Farrisee said in
a recent note to personnel leaders.
Division and Army Corps strength managers at several installations are
helping with eMILPO to ensure that it provides the query capability needed
in the field to incorporate important personnel management information.
Systems integrators are also fine-tuning the system to include the
"enlisted records brief," which is an abbreviated summary of a soldier's
personnel data.
The 60-day delay costs the Army nothing, with the "additional time and
effort being absorbed by the contracting organization [EDS] and the program
manager's office," Mansell said. He added that no single group is
responsible. An incredibly compressed timeline and complex applications
caused the delay.
"It was high risk from the very beginning," he said. "We hoped to pull it
off, but we couldn't. Soldiers in the field deserve the best system we can
give them."
EDS officials declined to comment and referred all questions to the Army.
***
Army leads DOD
The eMILPO system is an interim step toward the Defense Department's
multiservice, integrated personnel and pay management system, known as the
Defense Integrated Military Human Resources System. The Army is scheduled
to be the first service to implement DIMHRS, during the fourth quarter of 2004.
Navy Capt. Valerie Carpenter, DIMHRS Joint Program manager, said her office
is planning to exercise a contract option in June for one of the five
contractors currently competing for the program award. Carpenter said that
the "delay of eMILPO does not negatively affect the development or
deployment of DIMHRS."
*****************************
Federal Computer Week
City opens Internet free-access zone
BY Matt Caterinicchia
Jan. 10, 2003
Dial-up connections and Internet access fees are a thing of the past to
visitors in Long Beach, Calif. Visitors to the downtown area can now
connect to the Internet for free, courtesy of the city's new Downtown
Wireless Internet District.
The new arrangement in Long Beach enables users in particular "hot
zones" such as downtown restaurants and coffee shops to access the
Internet free of charge.
Long Beach can provide the high-speed access at no charge thanks to a
network with wireless access points provided by Intermec Technologies Corp.
These access points provide a broadband connection to a centrally located
switch at speeds up to 11 megabits/sec. An average dial-up connection runs
at 54 kilobits/sec.
All travelers need is a laptop computer and a wireless network card, said
Lois Fenimore, senior communications specialist for Intermec. "Once the
user opens the Internet browser, they are automatically directed to portal
site for Long Beach's Pine Avenue Hot Zone. The users must then provide an
e-mail address and are then able to surf the Web free of charge," she said.
According to Bruce Mayes, wireless zone project manager for the economic
development bureau in Long Beach, users are limited to one hour. "That is
more than enough time," he said. Users must also be in a four-block area of
downtown Long Beach in order to gain access to the portal, he noted.
The majority of funding was provided by donations from vendors and
sponsors. The city pays the annual $4,000 connection fee.
"The restaurateurs have given us very positive feedback," Mayes said. "We
have received a lot of 'now that's very cool' kind of responses."
The free Internet access has been available since Nov. 15, 2002, and the
scheduled public launch will be today.
According to Mayes, this is just the beginning of a new concept of
communication. "It is good to hear a few pieces of good news in the
technology sector at the present time," he said.
Long Beach plans to offer similar Internet access at Long Beach Airport
within 30 to 45 days.
Caterinicchia is a reporting intern for Federal Computer Week.
******************************
Federal Computer Week
Federal Computer Week Roster Change
Government IT personnel moves
Jan. 7, 2003
Anne Reed has been named as president of Acquisition Solutions, a
consulting firm that helps the federal government retool its procurement
practices.
Reed most recently was president of EDS' state and local government group.
Prior to that, she was the chief information officer at the Agriculture
Department. She has had more than 20 years experience with the federal
government.
For more, see "Reed joining Acquisition Solutions"
***
Judith Russell, an electronic information expert and trained librarian, has
been named the new superintendent of documents at the Government Printing
Office.
Russell was named to the position last month and began her new job Jan. 6.
She will be in charge of ensuring that the public has the best possible
access to government information.
Prior to her appointment, Russell served as deputy director of the National
Commission on Libraries and Information Science.
From 1991 to 1996, Russell was director of GPO's Office of Electronic
Information Services, where she helped establish GPO Access and led the
development of GPO's 1996 report to Congress on how to make a successful
transition to a more electronic federal depository library program.
For more, see "Russell tapped for GPO post."
***
George Taylor has been appointed deputy public printer, the second highest
position within the Government Printing Office.
On Jan. 6, Taylor began serving as chief operating officer of GPO,
responsible for overseeing its day-to-day printing, printing procurement
and information dissemination operations serving, Congress, federal
agencies and the public.
Taylor comes to GPO after more than 23 years in information publishing. His
most recent position was senior vice president for operations for Thompson
Corp., an $8 billion information organization with 43,000 employees
globally, where he was responsible for coordinating technology, human
resources, real estate, purchasing and cost reduction initiatives.
***
William Edward (Ed) Flynn III, widely respected for his knowledge of civil
service issues, has retired from the Office of Personnel Management after
three decades of public service.
Flynn, an army veteran and career member of the Senior Executive Service,
has been senior policy adviser to OPM Director Kay Coles James.
As James' senior policy adviser, a position he accepted in early 2002,
Flynn was a fixture during the torrent of activities at OPM that enabled
the Bush administration to get legislation passed establishing the Homeland
Security Department. He also advised James during the yearlong study that
concluded recently with the announcement that OPM would be restructured
based on professional staff recommendations to better serve internal and
external customers.
Flynn previously was the associate director of OPM's Retirement and
Insurance Service. He also made greater use of automation to revive the
agency's Retirement Information Office, which receives more than 1 million
letters and telephone calls annually.
*********************************
Government Computer News
01/13/03
Open-source group names 10 scariest Web vulnerabilities
By William Jackson
The Open Web Application Security Project today released a list of the top
10 vulnerabilities in Web applications and services.
The group said it wants to focus government and private-sector attention on
common weaknesses "that require immediate remediation."
"Also, in the longer term, this list is intended to be used by development
teams and their managers during project planning," the report noted.
"Ultimately, Web application developers must achieve a culture shift that
integrates security into every aspect of their projects."
OWASP is a volunteer open-source community project created to bring
attention to security for online apps. It patterned its list on the SANS
Institute and FBI top 20 list of network loopholes. Like the SANS-FBI list,
the OWASP vulnerabilities are well known, but continue to represent
significant risk because they are widespread. They can be exploited by code
in HTTP requests that are not noted by intrusion detection systems and are
passed through firewalls and into servers despite hardening.
The vulnerabilities, which focus on categories of problems rather than on
specific applications, are:
Unvalidated parameters, which let information to be used by an app before
being validated
Broken access control, in which restrictions on authorized users are not
enforced
Broken account and session management, which leave inadequately protected
account credentials and session tokens vulnerable to hijacking
Cross-site scripting flaws, which let attacks be passed by an app to a browser
Buffer overflows, which can crash an application and allow it to be taken over
Command injection flows, in which improper commands are passed by the app
to another system for execution
Error-handling problems, which can provide an attacker with unintended
information or deny service when errors occur
Insecure use of cryptography, which provides weak protection when
cryptography code is not properly integrated
Remote administration flaws, in which administrative functions are not well
protected
Web and application server misconfiguration.
The complete report is available on the organization's Web site, www.owasp.org.
******************************
Government Computer News
01/10/03
Does cyberwar start with scholarships?
By William Jackson
A sustained digital attack on critical U.S. infrastructure wouldn't be easy
to execute, but there are indications that some groups might be investing
in the human resources such an attack would require, a consultant told
Washington law enforcement and intelligence officials today.
"We really haven't seen an act of cyberterrorism," said Matthew G. Devost,
president of the Terrorism Research Center of Burke, Va. "I don't know if
we would recognize it if it happened. It's more difficult to execute than
you have been brought to believe."
But terrorist groups may be financing the education of computer science
students to acquire the needed expertise, he said, because "we're starting
to see an increase in sponsorships of degrees."
Devost spoke at a seminar sponsored by the Terrorism Research Center and
the Washington Metro Transit Police. He said terrorist organizations have
shown a willingness to spend years in target selection and preparation for
major attacks.
Only now "are they in the process of capability acquisition" for
cyberattacks, he said, and no students pursuing computer science degrees
through sponsored scholarships have been tied to a particular organization.
Devost said his security consulting work has revealed an increase in
insider attacks at companies by employees who appear to have sought their
jobs specifically for that purpose, he said. So-called insider placement
only becomes apparent when illegal or disruptive systems activity is
noticed, Devost said, and a sleeper agent in a sensitive position probably
could not be detected beforehand.
******************************
Government Computer News
01/10/03
Oveson is Utah's new CIO
By Trudy Walsh
Utah Gov. Mike Leavitt this week appointed W. Val Oveson as the state's new
CIO, replacing Phillip Windley, who resigned last month. Oveson had been a
managing director at PricewaterhouseCoopers LLP of New York for two years
before the appointment.
In 1998, then-U.S. Treasury secretary Robert Rubin named Oveson the
national taxpayer advocate for the IRS. Oveson also helped make revisions
to the IRS case-tracking system A certified public accountant, he was
Utah's lieutenant governor from 1984 to 1993 and redesigned the computer
systems for the Utah State Tax Commission.
Windley, the outgoing CIO, said on his weblog, at www.windley.com, that
Oveson "is a great choice because he knows well how to navigate the dark
maze of government. ? Breaking down silos is right for e-government and
homeland security."
Windley resigned after a legislative audit found instances of favoritism in
the IT Services Office's hiring practices [see story at
www.gcn.com/vol1_no1/daily-updates/20593-1.html].
*************************
Government Computer News
01/10/03
FAA modernization plan is delayed by three years
By Dipka Bhambhani
GCN Staff
The Federal Aviation Administration this week released the latest version
of its Operational Evolution Plan for airspace modernization, highlighting
greater air travel efficiency but also giving notice of a three-year
extension. The new Version 5.0 of the plan has a "crisper vision that
emphasizes collaborative decision-making, required navigation performance
and shared information systems," FAA administrator Marion Blakey said in a
statement.
The modernization project's 2010 completion date has now become 2013.
"Though current economic conditions caused us to delay some initiatives,"
FAA officials said, "the plan continues to reflect the maturing of
procedures and new technologies." They attributed the delay to financial
uncertainty about certain runway programs as well as the timing of
airlines' readying their fleets for OEP initiatives. FAA has had to suspend
Precision Runway Monitor operations in Minneapolis because of safety
issues, for example. Also, runways that are being built at less than
standard spacing lack the necessary surveillance capability.
"A wide range of challenges face the implementation efforts in the coming
year," the plan said. Its goal is to improve the capacity and efficiency of
the National Airspace System, but numerous individual projects could affect
the completion date. One project, the Integrated Terminal Weather System,
is already off budget and schedule [see story at
www.gcn.com/vol1_no1/daily-updates/20818-1.html].
Bill Shumann, an FAA spokesman, said the ITWS issues have not affected the
overall plan yet. "Depending on what happens with the program, that could
change," he said. "But the ITWS is a small portion of the total $11.5
billion."
FAA is counting on the airline industry to spend about that much, too.
"If all the airlines and general aviationeverybody who flies in the
systemwere to do everything in the equipage and training plan, it would
cost the industry about $11 billion over 10 years," Shumann said.
Two other major projectsthe Standard Terminal Automation Replacement System
and revamping the Host system for air traffic controllerswere not far
enough along to appear in Version 5.0.
Version 5.0 holds several improvements:
Increases in arrival and departure rates at Phoenix and Detroit airports
because of several new runways
An operational Traffic Management Advisor at seven airports
Implementation of Four-corner Post airspace redesign in Las Vegas
An operational User Request Evaluation Tool at six traffic control centers.
********************************
Government Computer News
01/10/03
Bush names two for strategic DOD posts
By Dawn S. Onley
GCN Staff
President Bush plans to nominate former Pennsylvania congressman Paul
McHale as assistant secretary of Defense for homeland defense. McHale is
now vice president of Tallman, Hudders and Sorrentino, a labor and
employment law firm in Allentown, Pa. While in Congress from 1993 until
1999, McHale served on the House Armed Services and Science committees.
Bush also plans to nominate Christopher Ryan Henry, corporate vice
president for strategic assessment and development at Science Applications
International Corp. of San Diego, as deputy undersecretary of Defense for
policy.
A graduate of Lehigh University in Pennsylvania and Georgetown University
in Washington, McHale served with the Marine Corps in operations Desert
Shield and Desert Storm. He is a colonel in the Reserve.
Before joining SAIC, Henry, a Virginian, was a senior fellow at the Center
for Strategic International Studies where he directed the Conflict in the
Digital Age project. Henry graduated with merit from the U.S. Naval Academy
and at the top of his class from National Defense University.
*******************************
Government Computer News
01/10/03
Census will count county lines via Web
By Susan M. Menke
Under a Census Bureau contract, the Open GIS Consortium Inc. is working out
ways for local and tribal jurisdictions to begin reporting their boundary
changes electronically. Robert Marx, chief of Census' Geography Division,
said the agency's 1960s-era Boundary and Annexation Survey (BAS) will start
changing this spring from a paper-intensive mapping operation and will be
ready by about 2008 for the next decennial census.
The Wayland, Mass., consortium is rapid-prototyping the online reporting
technology as a pilot for Census. Marx said the contract value is
"relatively small." Participants include ESRI of Redlands, Calif.; Galdos
Systems Inc. of Vancouver; Intergraph Corp. of Huntsville, Ala.; Northrop
Grumman Information Technology and subsidiary TASC Inc.; and Syncline Inc.
of Boston. They will use the consortium's OpenGIS interface specification
and OGC Web Services to make various geographic information system and
geospatial applications interoperable.
In addition to prototyping the online system for updating local and tribal
boundaries, the contract calls for OpenGIS specifications for serving up
Census' Topologically Integrated Geographic Encoding and Referencing
(TIGER) data. The two prototypes will be called WebBAS and WebTIGER.
"We hope to be active by spring so that this year's survey respondents can
report," Marx saida total of about 5,000 local and tribal governments. Just
before the next decennial census, the agency needs new boundary data from
all 39,000 local governments in the nation. "I'm sure they're not prepared
yet" to send everything electronically, Marx said. "We'll try the software
now and refine it as we get ready for 2010."
******************************
Government Computer News
01/09/03
Senate fray stalls homeland funding
By Wilson P. Dizard III
Delays in negotiating the committee structure of the Senate, where the
Republicans will be the new presiding party, have stalled the reprogramming
of $125 million that would provide seed money for the Homeland Security
Department, Senate appropriations staff said.
Senate Minority Leader Tom Daschle (D-S.D.) and Majority Leader Bill Frist
(R-Tenn.) today negotiated the structure of committees in the
Senateespecially the question of how many members each party can appoint to
each committee, an area where conflicting precedents point to varying
outcomes.
The dispute likely will last into next week, sources said. Meanwhile, the
Senate is expected to approve an extension of the continuing resolution for
government funding under a special unanimous consent agreement,
congressional sources said.
As a result of the organizational standoff, the Senate Appropriations
Committee has not followed its House counterpart by approving a $125
million reprogramming of funds for homeland security, Senate Appropriations
staff members said. Until party leaders settle the organizational dispute,
incoming Appropriations Committee chairman Sen. Ted Stevens, (R-Ak.) cannot
follow the lead of his house counterpart, Rep. C.W. Bill Young (R-Fla.),
and approve the reprogramming, appropriations committee staff said.
Young approved the reprogramming in a Jan. 7 letter to Office of Management
and Budget Director Mitchell E. Daniels Jr.
According to that letter, the $125 million will be drawn from previously
appropriated fiscal 2003 funds for the following agencies:
Coast Guard, $3.5 million
Customs Service, $30 million
Federal Emergency Management Agency, $32 million
Immigration and Naturalization Service, $30 million
Secret Service, $4.5 million
Transportation Security Administration, $25 million.
According to Young's letter, $10 million of the funds will be used to
establish the department's Science and Technology Directorate, $20 million
for the Information Analysis and Infrastructure Protection Directorate, $50
million for space-related costs of the new department headquarters, and $45
million for salaries and benefits of the new staff.
Young asked Daniels to provide additional information about the new
department's funding by Feb. 10, much of it having to do with the IT
operations of the department. For example, he asked Daniels to describe a
new command center the department plans to build and how the department
plans to spend $12.9 million allocated for IT, telecommunications and WAN
communications.
Young honed in on the department's plans for an architectural framework for
IT and telecommunications. He asked Daniels to describe how the new
department would assure interoperability among all HSD agencies, and what
management structure the new department will use to ensure that IT
planning, acquisition and development meet statutory and business
requirements. "Who is responsible for overseeing the development and
implementation of this architecture?," Young wrote.
The Appropriations Committee chairman also advised Daniels that the
Transportation Security Administration had not filed reports requested by
the committee, and asked Daniels to help obtain the information.
*****************************
Government Computer News
01/09/03
Armed services chairman will push for faster IT development
By Dawn S. Onley
Rep. Duncan Hunter (R-Calif.) was chosen last night to be the new chairman
of the House Armed Services Committee. He vowed to improve the "speed of
bureaucracy" by bringing new technologies to the warfighter faster.
"We live in an age in which technology is improving dramatically," Hunter
said today during a press conference. "It's very important that we take new
technology and get it to the R&D process and procurement process very
quickly. We haven't seen that in the past."
The threat of war could be the impetus to accelerate the rollout of
innovative technologies, Hunter said. For example, during the conflict in
Bosnia, the Predator unmanned aerial vehicle was brought into battle with
remarkable results, even before it had finished testing.
Later, Hunter said, the Predator failed testing. Telling a commander of the
failure, Hunter said the commander responded: "You send me some more of
those failures."
Other plans for the committee will include modernizing the military,
rolling out more precision munitions and ensuring that soldiers are well
compensated, Hunter said.
He also plans to restructure the committee into six subcommittees:
Tactical Air and Land Forces will be responsible for Army and Air Force
acquisition programs, Navy and Marine Corps aviation programs, National
Guard and Army and Air Force reserve modernization, and ammunition programs.
Readiness will handle military readiness, training, logistics and
maintenance programs.
Terrorism, Unconventional Threats and Capabilities will be responsible for
Defense counterterrorism programs, Special Operations Forces, the Defense
Advanced Research Projects Agency, IT policy and programs, force protection
policy and oversight, and intelligence support.
Total Force will handle military personnel policy, employment, health care,
education and POW/MIA issues.
Strategic Forces will oversee space programs, ballistic missile defense and
Energy Department national security programs.
Projection Forces will be responsible for Navy and Marine Corps
programsexcept for IT accountsdeep strike bombers and related systems.
*****************************
Government Executive
New Senate chair voices concerns on information sharing, cybersecurity
By William New, National Journal's Technology Daily
New Senate Governmental Affairs Committee Chairwoman Susan Collins,
R-Maine, has deep concerns about the privacy implications of the
government's movement toward the use of combined government databases to
help fight terrorism.
Converging the previously unconnected databases of various agencies that
are becoming part of the new Homeland Security Department "gives you the
tremendous advantage of being able to better track people who may be of
concern, but it also raises the specter of the government using massive
databases to compile information on individuals [when] there are no
allegations of wrongdoing," Collins said in a Thursday interview with
National Journal Group reporters.
She said a central question is, "How do we maintain privacy and civil
liberties while at the same time bringing about the sharing of information
and the efficiencies and the joint computer systems that will allow us to
be more effective in the war against terrorism?"
Of particular concern is the Defense Department's research project to
create tools to mine massive amounts of personal data to find terrorists,
she said. The Total Information Awareness project being developed under the
Defense Advanced Research Projects Agency "raises extraordinary concerns
about individual privacy," Collins said.
Collins said she would either raise that issue in the Senate Armed Services
Committee or hold a hearing on it in Governmental Affairs. She said that
even though Congress approved millions of dollars in funding for the
project under the Defense budget, she had never heard of it until press
reports brought it to light.
"I'm a very diligent member of the Armed Services Committee, and I can tell
you there was never a discussion of that program," she said.
"It's a difficult issue because on the one hand, Congress is always
criticizing agencies that their computers don't talk to each other, that
they don't share [information with] each other, and that is a legitimate
concern," as the Sept. 11, 2001, terrorist attacks showed, she said. "But
the flip side of that is if you start amassing all this data and connect it
with computers and match files, there are troubling privacy implications."
Collins also is worried about the continuing vulnerabilities of government
agencies to cyberattack, she said.
"I think that cybersecurity remains a very important concern and priority,"
she said. "Our government computers remain vulnerable to cyberattacks, and
it seems that every single year, there's a hearing on how vulnerable our
computers are, and another [General Accounting Office] report highlighting
the vulnerability of our computers, but we don't seem to be making much
progress."
She said she already has discussed cybersecurity with Defense officials,
and the department is trying to standardize its information technology
systems in the hope of reducing vulnerability. That effort has allowed the
department to curtail the abuse of credit cards by some federal employees
as it obtains the management systems needed to target such activity, she said.
*****************************
Government Executive
January 9, 2003
House GOP chooses Davis to lead Government Reform Committee
By Mark Wegner, CongressDaily
House Republicans late Wednesday chose Rep. Tom Davis, R-Va., to chair the
Government Reform Committee.
Both Davis and Rep. Christopher Cox, R-Calif., sought to chair the
Government Reform Committee and denied interest in chairing the newly
created select Homeland Security Committee. But following Davis' selection,
House Speaker Dennis Hastert, R-Ill., said he would appoint Cox to that slot.
As the outgoing chairman of the National Republican Congressional
Committee, Davis kept Republicans in the majority for two terms, making it
difficult for the Steering Committee to deny him the chairmanship.
By tapping Davis, Republicans also skipped over Rep. Christopher Shays,
R-Conn., who had more seniority than either Cox or Davis.
Republicans Wednesday also chose Rep. Richard Pombo, R-Calif., to chair the
Resources Committee and Rep. Bob Goodlatte, R-Va., to head the Agriculture
Committee. Rep. Duncan Hunter, R-Calif., was unchallenged for the Armed
Services panel chairmanship.
In choosing Pombo for Resources, Republicans sorted through a crowded field
that also included bids by Reps. John Duncan, R-Tenn., and Elton Gallegly,
R-Calif. Rep. Jim Saxton, R-N.J., had the most seniority but took himself
out of the running earlier this week.
The Steering Committee also approved the selections of Appropriations
Committee Chairman Bill Young, R-Fla., for the 13 Appropriations
subcommittee "cardinals."
Five subcommittees have new leaders, including Rep. David Hobson, R-Ohio,
at the Energy and Water Appropriations Subcommittee; Rep. Charles Taylor,
R-N.C., at the Interior Appropriations Subcommittee; and Rep. Joseph
Knollenberg, R-Mich., at the Military Construction subcommittee.
The two newest cardinals are Reps. Jack Kingston, R-Ga., who will chair the
Legislative Branch Appropriations Subcommittee, and Rodney Frelinghuysen,
R-N.J., who will head the District of Columbia Appropriations Subcommittee.
******************************
Government Executive
January 9, 2003
White House tech officials race to build security system
By Bara Vaida, National Journal's Technology Daily
LAS VEGAS -- As the top information technology officials in the Bush
administration are racing to build an integrated computer system for the
new Homeland Security Department by Jan. 24, they face some obstacles, a
top administration official said on Thursday.
Lee Holcomb, the White House Office of Homeland Security's director of
information infrastructure, told government tech executives that the
administration is facing a huge challenge to integrate disparate databases
and systems into one or two civilian and military networks. He also noted
that his group recognizes the technical and legal concerns in melding the
networks of the 22 agencies that will fall under the Homeland Security
umbrella.
"There are a lot of disparate databases ... law enforcement, immigration,
bio-medical ... and there are legal restrictions from sharing information
between those databases," Holcomb said at a Government Emerging Technology
Alliance conference here.
He noted that the cultural differences among agencies "won't go away
overnight" and are likely to be another hurdle to full integration of the
department.
Holcomb also outlined several principles guiding the administration as it
is integrates the systems. He said the No. 1 goal is to balance the desire
for privacy of individuals with the need for security. The administration
immediately rejected the ideas of one giant "data warehouse" of information
because of privacy concerns and of giving people chips to track their
whereabouts.
"Over the last six months, we have seen 4,000 to 5,000 companies come visit
us with ideas such as these," Holcomb said.
The IT staff also is working to integrate existing computer systems rather
than recreating entirely new ones. The computer system should "collect
information once and then re-use it;" and the quality of the database
created by the department "must have trusted information," Holcomb said.
In the short-term, Holcomb said the administration has been "buying lines"
and developing a single e-mail communications system for employees that he
"hopes" will be running by Jan. 24. The fact that no one knows yet where
the new department will be located is hindering that goal, he said. As a
result, he said employees of the six major agencies merging into the
department probably will have only a single e-mail system, and the
remainder will come online by March.
Besides an e-mail system, Holcomb said the administration is working to
create a secure videoconferencing system to connect state officials with
the new department.
Further, the administration is working on creating a list of critical
technologies for homeland security, such as data-mining equipment,
authentication systems, biometrics devices, wireless services, and
simulation and modeling technologies.
***************************
Government Executive
January 8, 2003
Bush announces pick for homeland CIO
From National Journal's Technology Daily
President Bush on Wednesday nominated Steven Cooper as the chief
information officer for the new Homeland Security Department.
Cooper currently serves as special assistant to the president and senior
director for information integration in the White House Office of Homeland
Security. He has been spearheading efforts alongside Mark Forman, the head
of information technology at the White House Office of Management and
Budget, to consolidate the tech systems for the 22 federal agencies that
will become part of Homeland Security.
Before his White House service, Cooper was the chief information officer
for Corporate Staffs and the executive director of strategic information
delivery at Corning. He also served as director of corporate information
systems at the pharmaceutical maker Eli Lilly.
*******************************
Government Executive
January 3, 2003
Lobbyists detail top tech policy items
By Bara Vaida, National Journal's Technology Daily
Proposals designed to stimulate the economy, foster the deployment of
high-speed Internet access, prevent digital piracy and protect online
privacy promise to be among the top policy items for the high-tech sector
in the 108th Congress, according to industry lobbyists.
Other issues on the agenda likely will include cybersecurity, education
policy, export-control reform, federal procurement and appropriations, H-1B
visas for highly skilled foreign workers, the disposal of high-tech
equipment, Internet taxation, employee stock options and trade.
"We will be aggressive on the issues important to the tech community, and
we think we can have the same success in the 108th Congress as we did in
the 107th Congress," said Ralph Hellmann, senior vice president at the
Information Technology Industry Council (ITI). The group ranks economic
stimulus, broadband deployment and the debate over whether to mandate
anti-piracy technology as its most important policy items next year.
Attentions Turn To Economic Jumpstart
An economic stimulus package is most likely to be the first issue to demand
high-tech lobbyists' attention, as President Bush is planning to introduce
a package of tax cuts aimed at boosting business investment and getting
more money into consumers' hands. Early this year, a coalition of high-tech
companies helped win enactment of an economic stimulus bill that lets firms
take tax write-offs for an additional 30 percent of assets when they
purchase them. But the economy has remained sluggish, and many businesses
have been calling for another round of tax cuts.
Hellmann said many observers believe that the 30-percent depreciation
figure in the 2002 stimulus package was not enough to encourage businesses
to invest in information technology. He said high-tech lobbyists are
working with the Bush administration and lawmakers on extending or
expanding the depreciation measure, in conjunction with a tax incentive
that would give consumers and businesses more money to purchase technology
and other business products.
ITI companies also are considering other tax measures, such as reforming
international tax law to encourage U.S. businesses with international
offices to invest more of their capital at home. Some tech companies also
may push for a permanent research and development tax credit. The credit is
set to expire in June 2004.
"We are encouraged by anything the White House can do to stimulate the
economy," said Brian Kelly, senior vice president at the Electronic
Industries Alliance. Kelly said the administration has sought advice from
the high-tech sector on a stimulus package.
The broadband debate is now centered at the FCC, which in January is
expected to decide whether to change the rules governing how competing
firms share the networks of the Bell telephone companies and how those
rules affect the rollout of high-speed facilities and investment in
technology innovation.
High-tech companies have argued that the FCC should deregulate the Bell
companies' new investments in broadband. If the FCC does not act in a way
that satisfies high-tech companies, they are likely to begin lobbying for
legislation.
Regardless, incoming Senate Commerce Committee Chairman John McCain,
R-Ariz., already has declared that broadband will be on the agenda in his
committee next year. Some companies also may continue to lobby Congress to
pass a tax credit designed to encourage the deployment of broadband
infrastructure in rural areas.
"Across the board our industry views the widespread availability of
broadband as critical," said Jonathan Zuck, president of the Association
for Competitive Technology.
Intellectual Property A Priority
A number of high-tech companies also have formed a coalition to educate
lawmakers on the industry's efforts to combat piracy on the Internet. In
addition, they plan to fight any legislation that would impose a technology
mandate in an effort to stymie such piracy.
Ernest (Fritz) Hollings of South Carolina, who will be the Senate Commerce
Committee's ranking Democrat, introduced a bill last year that would have
imposed such a mandate. The Motion Picture Association of America has been
lobbying Congress heavily to impose a legislative solution to Internet piracy.
The anti-piracy effort also will be discussed in the context of the
transition to digital television. House Energy and Commerce Committee
Chairman W.J. (Billy) Tauzin, R-La., has promised to hold hearings on how
to protect digitally broadcasted content.
After lying dormant for the past year, meanwhile, privacy is expected to
resurface as a key lobbying issue, reflecting the rise of Alabaman Richard
Shelby as chairman of the Senate Banking Committee after Republicans won
control of the Senate last November. Shelby has said that privacy is of
intense interest to him and that he may examine the issue if Congress
modifies the Fair Credit Reporting Act (FCRA), parts of which face
reauthorization.
Computer security, federal procurement and appropriations to the new
Homeland Security Department will be an important issue for some high-tech
firms, as they seek new markets within government. Firms also plan to
encourage the government to invest in building an efficient department and
to bolster computer security at federal agencies.
Further, they plan to monitor the development of the White House
cybersecurity strategy. The plan does not require much action from Congress
but could if it fails to convince the private sector that it needs to
protect its computer networks.
Business Software Alliance President Robert Holleyman also said his group
will be lobbying to make sure the Homeland Security Department does not
choose one technology standard.
Renewed Focus On Stock Options, Exports
The handling of stock options remains a worry for some high-tech companies
because McCain last year introduced a bill to require them to record those
options as expenses and vowed to have a debate on the issue in the Senate.
Additionally, the nation's accounting oversight body, the Financial
Accounting Standards Board, plans to decide in the first quarter whether to
change rules that allow U.S. companies to avoid treating stock options as a
compensation expense.
Computer companies also plan to lobby for renewal and reform of the 1979
Export Administration Act (EAA) and an end to the standard that restricts
computer exports based on the millions of theoretical operations per second
(MTOPS) that computers perform. And on trade, EIA's Kelly said his
association will work with the Office of the U.S. Trade Representative to
ensure that high-tech interests are addressed in new treaties.
Here is a summary of other issues likely to be on the high-tech agenda:
Electronic waste: EIA is watching state and local and international
regulations governing the disposal of high-tech equipment. The issue also
may surface in Congress, as some lawmakers push for a national effort to
pre-empt multiple and competing laws in the states.
Internet taxes: Harris Miller, president of the Information Technology
Association of America (ITAA), said states may try to increase pressure on
Congress to allow them to tax both access to the Internet and e-commerce,
but ITAA will lobby to continue the current moratorium on access taxes, as
well as to prevent online sales taxes, an issue separate from the moratorium.
Education: AeA plans to continue work with the states to help them
implement the education bill that Bush signed in 2002.
H-1B visas: High-tech companies may lobby to increase the level of visas
that enable highly skilled foreign workers into the United States for six
years. The cap on those visas is scheduled to drop to 65,000 from 195,000
at the end of fiscal 2003.
*************************
Computerworld
Biting Back
Find and fix 1% of your software bugs, and 90% of your system problems go
away, say experts.
By ALAN S. HOROWITZ
JANUARY 13, 2003
Bugs are small. Usually. Unless, of course, they are of the software kind,
in which case they can grow quite large and become hugely expensive to fix.
The Sustainable Computing Consortium, a collaboration of major corporate IT
users, university researchers and government agencies, estimates that buggy
or flawed software cost businesses $175 billion worldwide in 2001. In the
U.S., software bugs cost companies nearly $60 billion per year, according
to the Commerce Department's National Institute of Standards and Technology
(NIST). More important is that one-third of these costs could be eliminated
with improved testing that catches errors earlier in the software
development process, NIST says.
Smart CIOs are creating comprehensive strategies to test for and fix bugs
in both off-the-shelf software and applications created in-house. They know
that bugs, like infections, fester the longer they hang around and, as a
result, cost more to deal with when left unchecked.
Gartner Inc. analyst Theresa Lanowitz says a software defect left unfixed
until late in the development cycle costs 80 to 1,000 times more to fix
than it would if it was dealt with earlier. No company is immune to the
potential costs of software bugs, which is why a comprehensive plan for
dealing with them is critical.
Bugs are small. Usually. Unless, of course, they are of the software kind,
in which case they can grow quite large and become hugely expensive to fix.
The Sustainable Computing Consortium, a collaboration of major corporate IT
users, university researchers and government agencies, estimates that buggy
or flawed software cost businesses $175 billion worldwide in 2001. In the
U.S., software bugs cost companies nearly $60 billion per year, according
to the Commerce Department's National Institute of Standards and Technology
(NIST). More important is that one-third of these costs could be eliminated
with improved testing that catches errors earlier in the software
development process, NIST says.
Smart CIOs are creating comprehensive strategies to test for and fix bugs
in both off-the-shelf software and applications created in-house. They know
that bugs, like infections, fester the longer they hang around and, as a
result, cost more to deal with when left unchecked.
Gartner Inc. analyst Theresa Lanowitz says a software defect left unfixed
until late in the development cycle costs 80 to 1,000 times more to fix
than it would if it was dealt with earlier. No company is immune to the
potential costs of software bugs, which is why a comprehensive plan for
dealing with them is critical.
*******************************
USA Today
Spam? No thanks, we're full
By Janet Kornblum USA TODAY
FREE mortgage quotes! Cheap printer cartridges! Free passes to thousands of
XXX sites! "URGENT & CONFIDENTIAL!"
If you think you're getting more spam than ever, you're right. Spam junk
e-mail has dramatically increased in the past year, studies have shown.
And next year will be even worse, one new report says. It predicts that by
July, the volume of spam sent to business e-mail addresses will exceed the
amount of regular e-mail. (See related story: How to put spam out of your
misery)
"It's an annoying, unwanted intrusion on consumers' lives," says Brian
Huseman, a staff attorney with the Federal Trade Commission, the government
agency that deals with consumer protection and online marketing. "The
problem is growing."
Experts attribute the rise to several factors, including the most obvious:
More people are online. Sixty-one percent of U.S. adults 116 million and
40 million to 45 million children are online, according to the Pew Internet
& American Life Project. And 94% of them use e-mail.
And the entry costs of e-mail soliciting are few. For some, getting into
spam means simply having a home computer and Internet connection and a
little knowledge they can pick up on the Net. They can also buy cheap CDs
with millions of e-mail addresses, or just pay someone else to spam for
them about $25 for each million e-mail addresses.
If someone sends out 1 million postal mail ads, he has a high cost in
postage to pay, with no guaranteed return. But if he sends out 1 million
ads by e-mail, and just a fraction of recipients respond, he has probably
made some money.
"It just takes a handful of people to purchase the products to make them
profitable," says Jared Blank, a senior analyst with Jupiter Research. "The
true problem is that spam is effective."
Internet service providers, government officials and others are fighting
back with a variety of countermeasures, including lawsuits, new legislation
and software that filters e-mail and separates out spam before it reaches
your inbox.
Marketers especially target America Online, Yahoo and Microsoft's MSN
Hotmail, the three largest providers of personal e-mail.
"If you're a spammer, you are going to go for the big market," says Deborah
Fallows, senior research fellow with the Pew Internet & American Life
Project, which follows online lifestyle trends.
Like other e-mail providers, the three companies filter e-mail behind the
scenes. Even though people still see junk e-mail in their in-boxes, they'd
get a lot more if the companies weren't digitally blocking e-mail from
known spammers.
San Francisco political consultant Ellie Schafer says she uses all the
filters offered on her MSN account, but she still gets 20 to 25 junk e-mail
messages a day about a third of her total e-mail.
A hassle for everyone
"Most of them are about high school girls and farm animals," Schafer says.
"It's extremely frustrating. I have thought of leaving. If there was a
service that blocked out all of the spam, I would switch without
hesitation even if it cost more.
"I'm frightened to think what it would be like if I didn't have all the
spam filters on already."
Though not all Net users are as overrun, studies show that junk e-mail is
in fact a problem for nearly everybody:
In 2002, the average consumer received an estimated 2,300 pieces of spam
e-mail, according to Jupiter. By 2007, the number is projected to grow to
3,600 pieces. "There's an escalating war between spammers and (providers),"
Blank says. And so far, "the spammers are winning."
The number of spam messages sent increased nearly 300% from 2001 to
2002 from 14,078,511 to 55,683,103, according to e-mail filtering company
Brightmail. The company filters 10% of all Internet e-mail, including
several large online services such as Microsoft's MSN and EarthLink, says
Enrique Salem, Brightmail's president and CEO.
In September 2001, 8% of all e-mail was spam. But by December 2002, that
had increased to 40%, Salem says. "If spam continues to increase at this
pace, you'll be getting more spam than legitimate e-mail," he says. "That
will start devaluating e-mail."
More than half of the Internet e-mail sent to America Online's 35 million
members is spam, according to AOL, but much of it is blocked before ever
getting to anyone's inbox. And like other companies, AOL is constantly
seeking new ways to block spam. In October, AOL upgraded its system with
software that allows members to directly report spam when they get it by
simply clicking a button. Yahoo and Microsoft offer similar programs.
Before October, AOL was getting reports of about 200,000 pieces of spam a
day. Now users report as many as 2 million pieces daily.
Providers are increasingly giving customers more power to control who sends
them e-mail; they also can put spammers on a blacklist. Most providers use
some sort of blocking list designed to reject mail coming from the e-mail
addresses of known spammers.
Pushing for new laws
Some blacklists are shared; others are proprietary. The lists are
imperfect, however, and sometimes innocent people are inadvertently
blacklisted because, for instance, they use the same e-mail provider as a
known spammer.
Companies also are pushing behind the scenes for legal solutions.
Twenty-six states have passed some form of anti-spam legislation, says
David Sorkin, a law professor with the Center for Information Technology
and Privacy Law at the John Marshall Law School in Chicago. "There's only
one or two that are at all strong Delaware and Ohio."
Many anti-spam activists are pushing for a national law. Though there have
been proposals for national laws, none have passed yet. And those that are
in the pipeline can be worse than no laws at all, Sorkin says. Currently,
spammers exist in a sort of legal and ethical gray zone. Simply advertising
a legitimate product is legal. But many companies shy away from e-mail ads
because consumers take a dim view of them. If the law were to make some
forms of spam illegal, companies might see it as a green light to send
other forms, Sorkin says.
Additionally, national laws can do nothing to fight spam that is generated
from outside the USA.
Large companies have successfully sued spammers in court. AOL, for
instance, recently touted a legal victory against a spammer in Rockford,
Ill., that was advertising porn sites. The U.S. District Court of the
Eastern District in Virginia awarded AOL statutory damages of almost $7
million. The company has gone out of business.
******************************
MSNBC
Face recognition cameras stir fears
VIRGINIA BEACH, Va., Jan. 12 Police in this popular resort city recently
began operating video surveillance cameras with controversial face
recognition technology that critics say brings the United States one step
closer to becoming a society where "Big Brother is watching you." Virginia
Beach, along with Tampa, Florida, is one of only two cities in the United
States to acquire the technology, which cost it $197,000. The system went
live last September, at the tail end of the summer vacation period when the
city was crowded with visitors.
"BEFORE WE SWITCHED it on, we went through an extensive public
education process with hearings and the involvement of citizen groups and
minority groups, who helped write the policies we are using," said deputy
police chief Greg Mullen.
As a result, the cameras may only be used for two narrowly defined
purposes: to catch some 1,500 people wanted by the city on outstanding
felony warrant, and to find runaway children or missing persons. All the
images picked up by the cameras are immediately deleted from the system if
there is no match.
A citizens' auditing committee has the right to perform unannounced
spot checks on police headquarters to make sure the technology is not being
misused.
Virginia Beach has had video surveillance cameras watching over its
beachfront area since 1993. Three of the city's 13 cameras are linked
full-time to the face recognition system, though the others can be
activated as needed. The database of wanted people is updated every day.
So far, the system has failed to produce a single arrest, though it
has generated a few false alarms. In September, it was sending some 8,000
images a day to the computer at police headquarters. Each camera has the
capacity to generate six pictures a minute.
It works by analyzing faces based on a series of measurements, such
as the distance from the tip of the nose to the chin or the space between
the eyes. Critics say it is highly inaccurate and can be easily fooled.
Mullen, who sees the system eventually being linked to the
databases of other city, state and federal law enforcement agencies to
track criminals and suspected terrorists, said: "The system doesn't look at
skin color or your hair or your gender. It takes human prejudices out of
the equation."
Civil liberties groups are hardly reassured. They fear an erosion
of personal privacy and evoke the dark vision of British author George
Orwell's novel "1984," in which he imagined a totalitarian society with a
"Big Brother" who kept all its citizens under constant surveillance.
'PEOPLE FEEL COWED'
"This technology has little or no effect on the crime rate but it
does have an effect on peoples' behavior. People feel cowed," said Bruce
Steinhardt, who directs a technology and liberty program for the American
Civil Liberties Union.
Video surveillance has mushroomed across industrialized nations in
recent years. Britain leads the world: the average Londoner is estimated to
have his or her picture recorded more than 300 times a day, but New York is
not far behind, although its cameras are not linked to face recognition
technology.
Studies have found that any reduction in crime after surveillance
cameras go in may wear off over time. But Mullen said the cameras in
Virginia Beach had provided evidence at trials, allowed police to arrive at
crime scenes much more quickly and track criminals as they made their
escape. They have also helped police disperse crowds before they became
rowdy and freed up officers for other tasks.
In the aftermath of the attacks on the World Trade Center and the
Pentagon, Americans seem to be more willing to sacrifice some of their
personal privacy for the sake of enhancing security.
Still, many are alarmed by concepts like the Pentagon's proposed
Total Information Awareness system, which would collect individuals'
financial, medical, communication and travel records in a massive database
in the hope of uncovering patterns of potentially hostile activity.
Despite the fact that tests have shown face recognition only works
in around 30 percent of cases, the ACLU is alarmed that the technology may
soon spread to airports. The organization also fears it could potentially
be used to monitor individuals' political activities to harass law-abiding
citizens.
"This kind of surveillance should be subject to the same procedures
as wiretaps. Law enforcement agencies should justify why they need it and
it should be tightly limited, otherwise it will soon become a tool of
social control," said Mihir Kshirsagar of the Electronic Information
Privacy Center.
Nor does such criticism come exclusively from the political left.
Lawyer John Whitehead, founder of the conservative Rutherford Institute,
wrote in an editorial that the technology threatened the right of each U.S.
citizen to participate in society without the express or implied threat of
coercion.
"After all, that is exactly what constant surveillance is the
ultimate implied threat of coercion," he wrote.
Mullen said that was nonsense. To him, the cameras are no different
in principle from a police officer standing on a street corner with a
wanted poster just more efficient.
*****************************
From owner-technews@xxxxxxxxxxxxxxxxx Wed Jan 15 15:13:27 2003
Received: from sark.cc.gatech.edu (sark.cc.gatech.edu [130.207.7.23])
by cleon.cc.gatech.edu (8.11.6/8.11.6) with ESMTP id h0FKDPs24394;
Wed, 15 Jan 2003 15:13:25 -0500 (EST)
Received: from postel.acm.org (postel.acm.org [199.222.69.7])
by sark.cc.gatech.edu (8.11.6/8.11.6) with ESMTP id h0FKDMa20336;
Wed, 15 Jan 2003 15:13:22 -0500 (EST)
Received: from postel (postel.acm.org [199.222.69.7])
by postel.acm.org (8.9.3/8.9.3) with ESMTP id PAA49472;
Wed, 15 Jan 2003 15:02:17 -0500
Received: from LISTSERV2.ACM.ORG by LISTSERV2.ACM.ORG (LISTSERV-TCP/IP release
1.8d) with spool id 0022 for TECHNEWS@xxxxxxxxxxxxxxxxx; Wed, 15 Jan
2003 14:41:09 -0500
Approved-By: technews@xxxxxxxxxx
Received: from hq.acm.org (hq.acm.org [199.222.69.30]) by postel.acm.org
(8.9.3/8.9.3) with ESMTP id OAA47242 for
<technews@xxxxxxxxxxxxxxxxx>; Wed, 15 Jan 2003 14:40:35 -0500
Received: by hq.acm.org with Internet Mail Service (5.5.2656.59) id <C9F2TN2A>;
Wed, 15 Jan 2003 14:51:36 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2656.59)
Content-Type: text/plain; charset="iso-8859-1"
Message-ID: <8DFA8DABC2E6FA438EDCFD26881380A5D3795A@xxxxxxxxxx>
Date: Wed, 15 Jan 2003 14:51:35 -0500
Sender: ACM TechNews Early Alert Service <TECHNEWS@xxxxxxxxxxxxxxxxx>
From: technews <technews@xxxxxxxxxx>
Subject: ACM TechNews - Wednesday, January 15, 2003
To: TECHNEWS@xxxxxxxxxxxxxxxxx
Content-Length: 9547
Status: O
X-Status:
X-Keywords:
X-UID: 377
Dear ACM TechNews Subscriber:
Welcome to the January 15, 2003 edition of ACM TechNews,
providing timely information for IT professionals three times a
week. For instructions on how to unsubscribe from this
service, please see below.
ACM's MemberNet is now online. For the latest on ACM
activities, member benefits, and industry issues,
visit http://www.acm.org/membernet
Remember to check out our hot new online essay and opinion
magazine, Ubiquity, at http://www.acm.org/ubiquity
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ACM TechNews
Volume 5, Number 446
Date: January 15, 2003
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - -
Site Sponsored by Hewlett Packard Company ( <http://www.hp.com> )
HP is the premier source for computing services,
products and solutions. Responding to customers' requirements
for quality and reliability at aggressive prices, HP offers
performance-packed products and comprehensive services.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - -
Top Stories for Wednesday, January 15, 2003:
http://www.acm.org/technews/current/homepage.html
"Entertainment, Tech Firms Reach Truce on Digital Piracy"
"More Computer Viruses Expected in 2003--Expert"
"Business Apps Get Bad Marks in Usability"
"W3C Embraces Scalable Vector Graphics Specs"
"Hearings Sought on Data Agency"
"Games of Infinite Possibilities"
"Can Wi-Fi and Lasers Bridge the Last-Mile Gap?"
"Open Source Group Issues Top Ten Web Vulnerabilities"
"Phone Units Join in Effort for Seamless Wireless Net"
"Report: Internet Security Threats Will Get Worse"
"Security Experts to Teach Teens 'Ethical Hacking'"
"Study Shows Linux on the Rise in Data Centers"
"Time to Rethink Digital Copyright Act"
"Internet Browser That Quadruples Surf Speed Wins Irish Science Prize"
"Pervasive Computing Gets Organized"
"Process Power"
"The Nanodrive Project"
"A Grip on the Future"
******************* News Stories ***********************
"Entertainment, Tech Firms Reach Truce on Digital Piracy"
The Recording Industry Association of America, the Business
Software Alliance, and the Computer Systems Policy Project are
hoping to seal the rift between the entertainment and technology
industries over the issue of digital piracy by announcing their ...
http://www.acm.org/technews/articles/2003-5/0115w.html#item1
"More Computer Viruses Expected in 2003--Expert"
A monthly average of 600 to 700 new computer viruses will emerge
this year, according to anti-virus solutions provider Sophos,
continuing a pace established over the past two years, but
decreasing from the 800 to 900 viruses per month that were born ...
http://www.acm.org/technews/articles/2003-5/0115w.html#item2
"Business Apps Get Bad Marks in Usability"
Difficult to use business applications impede many software
projects and cost companies millions of dollars, according to
Forrester Research. Forrester says many enterprise resource
planning (ERP) applications are too difficult for ordinary users, ...
http://www.acm.org/technews/articles/2003-5/0115w.html#item3
"W3C Embraces Scalable Vector Graphics Specs"
The World Wide Web Consortium (W3C) is ready to consider Scalable
Vector Graphics (SVG) 1.1 and SVG Mobile as standards that would
help mobile devices display rich graphics better. An influx of
new cell phones and handhelds sometimes have trouble displaying ...
http://www.acm.org/technews/articles/2003-5/0115w.html#item4
"Hearings Sought on Data Agency"
Congressional members are requesting more information about the
massive data mining project planned by the Defense Department.
Sen. Russell Feingold (D-Wis.) plans to introduce a bill that
would halt work until Congress has finished a review of the ...
http://www.acm.org/technews/articles/2003-5/0115w.html#item5
"Games of Infinite Possibilities"
North Carolina State University assistant professor of computer
science R. Michael Young is researching artificial intelligence
that allows evolving storylines in computer games. Young says
that instead of following programmers' expectations of how a game ...
http://www.acm.org/technews/articles/2003-5/0115w.html#item6
"Can Wi-Fi and Lasers Bridge the Last-Mile Gap?"
Telecommunications and wireless access firms are looking at free
space optics (FSO) as a way to link homes and offices to
high-speed network thoroughfares. FSO uses light pulses to
transmit data at speeds up to 100 Mbps, and requires laser ...
http://www.acm.org/technews/articles/2003-5/0115w.html#item7
"Open Source Group Issues Top Ten Web Vulnerabilities"
The Open Web Application Security project (OWASP) released a list
of the 10 most pressing Web application security problems for
government and commercial organizations yesterday. Among them
are information from Web requests that goes unauthenticated; ...
http://www.acm.org/technews/articles/2003-5/0115w.html#item8
"Phone Units Join in Effort for Seamless Wireless Net"
Motorola, Proxim, and Avaya today are expected to announce a
collaborative effort to develop technology that enables wireless
communications to seamlessly transfer between networks. Analysts
say the project is the boldest attempt yet to exploit the ...
http://www.acm.org/technews/articles/2003-5/0115w.html#item9
"Report: Internet Security Threats Will Get Worse"
Internet security problems will worsen in the new year, with the
biggest threats coming from new mass-mailing worms and rising
hactivism, according to a recent study by Internet Security
Systems (ISS). More incidents targeting consumer broadband and ...
http://www.acm.org/technews/articles/2003-5/0115w.html#item10
"Security Experts to Teach Teens 'Ethical Hacking'"
Computer security expert Andy Robinson is launching a program for
high school students in Maine that aims to teach them both
computer security skills and relevant ethics. As a student
himself, Robinson received direction from the study of computers, ...
http://www.acm.org/technews/articles/2003-5/0115w.html#item11
"Study Shows Linux on the Rise in Data Centers"
The open-source Linux operating system will have an increasing
presence in corporate data centers, according to a new report
from the Goldman Sachs Group. The report concludes that Linux's
popularity among corporate technology buyers will stem from the ...
http://www.acm.org/technews/articles/2003-5/0115w.html#item12
"Time to Rethink Digital Copyright Act"
Hiawatha Bray suggests that the new Congress should reconsider
the Digital Millennium Copyright Act (DMCA), especially in light
of the latest case to cite it. The DMCA, which was originally
instituted to prevent the piracy of copyrighted digital content ...
http://www.acm.org/technews/articles/2003-5/0115w.html#item13
"Internet Browser That Quadruples Surf Speed Wins Irish Science Prize"
A web browser named "XWEBS" developed by 16-year-old student
Adnan Osmani in Mullingar, Ireland, has won a prestigious Irish
exhibition prize for young scientists for successfully increasing
Internet surfing speed up to 500 percent. Dublin University ...
http://www.acm.org/technews/articles/2003-5/0115w.html#item14
"Pervasive Computing Gets Organized"
The National Institute of Standards and Technology (NIST) is
working on pervasive computing protocols that would merge data
from many different sensors, allowing completely different modes
of interaction between computers and users. NIST computer ...
http://www.acm.org/technews/articles/2003-5/0115w.html#item15
"Process Power"
Companies that wish to reduce their staff and maintain their
productivity need efficient business processes, which is where
business process management (BPM) software comes in. BPM's most
compelling feature is its versatility: For example, Shell U.S. ...
http://www.acm.org/technews/articles/2003-5/0115w.html#item16
"The Nanodrive Project"
IBM's Millipede project is an attempt to create a "nanodrive"
that will significantly boost data storage capacity beyond the
limits of conventional silicon. The device, which has progressed
to the prototype stage through trial and error, rapidly writes ...
http://www.acm.org/technews/articles/2003-5/0115w.html#item17
"A Grip on the Future"
Immersion sells products that use haptic technology to impart
tactile sensations to users as they interact with
computer-generated environments. The primary driver of
Immersion's growth has been computer gaming equipment ...
http://www.acm.org/technews/articles/2003-5/0115w.html#item18
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-- To review Monday's issue, please visit
http://www.acm.org/technews/articles/2003-5/0113m.html
-- To visit the TechNews home page, point your browser to:
http://www.acm.org/technews/
-- To unsubscribe from the ACM TechNews Early Alert Service:
Please send a separate email to listserv@xxxxxxxxxxxxxxxxx
with the line
signoff technews
in the body of your message.
-- Please note that replying directly to this message does not
automatically unsubscribe you from the TechNews list.
-- To submit feedback about ACM TechNews, contact:
technews@xxxxxxxxxx
-- ACM may have a different email address on file for you,
so if you're unable to "unsubscribe" yourself, please direct
your request to: technews-request@xxxxxxx
We will remove your name from the TechNews list on
your behalf.
-- For help with technical problems, including problems with
leaving the list, please write to: technews-request@xxxxxxx
----
ACM TechNews is sponsored by Hewlett Packard Company.