[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips January 21, 2003
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, glee@xxxxxxxxxxxxx;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, akuadc@xxxxxxxxxxx;, computer_security_day@xxxxxxx;, waspray@xxxxxxxxxxx;
- Subject: Clips January 21, 2003
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Tue, 21 Jan 2003 16:06:04 -0500
Clips January 21, 2003
ARTICLES
Lobbyists Paid for Bush Official's Party
Courts Split on Internet Bans
Bigger tech budget on table Bush proposes 12.3% increase
2004 IT budget request focuses on homeland defense, cybersecurity
Ban on job competition targets stripped from Senate bill
Swiss Village Holds First Internet Vote
Roommate Service Clients Report E-Mail Barrage of Holocaust Revisionism
Poindexter's Still a Technocrat, Still a Lightning Rod
TSA preps $148 million more in grants
*******************************
Lobbyists Paid for Bush Official's Party
Tue Jan 21, 1:47 AM ET
By PETE YOST, Associated Press Writer
WASHINGTON - Just days before going to bat for the wireless industry, the
Bush administration's top policy expert on telecommunications, Nancy
Victory, allowed wireless phone company lobbyists to help pay for a private
reception at her home.
Three lobbyists from Cingular Wireless, SBC Telecommunications and Motorola
threw the party on Oct. 14, 2001, along with an attorney from Victory's old
law firm where her husband is a partner specializing in communications law.
Telecom industry representatives were among the dozens of party guests.
Victory said she regards the lobbyists as personal friends, and cleared the
private reception in advance with her department's ethics office.
"My friends paid for this party out of their personal money," Victory said
in an interview last week with The Associated Press.
Ten days after the catered reception at Victory's million-dollar home in
Great Falls, Va., she asked the Federal Communication Commission to
immediately repeal restrictions that Cingular, SBC and other major cellular
companies had long complained about.
In today's market, "rules such as these that draw arbitrary lines in the
name of ensuring competition are simply not needed," Victory wrote the FCC
(news - web sites) on Oct. 24, 2001.
The FCC voted two weeks later to phase out by Jan. 1, 2003 restrictions on
how much of the spectrum individual carriers could own in a geographic area.
The carriers argued that more airwaves would give them the space to provide
advanced mobile services, but critics said the change would squeeze out
smaller competitors and drive up rates.
Casting the single vote against the change, FCC Commissioner Michael Copps
said that the agency had not done enough to study the shortage of airwaves.
"This is, for some, more about corporate mergers than it is about anything
else," Copps said at the time.
Victory did not report the October 2001 party as a gift on her government
ethics disclosure form, and said it was "ridiculous" to draw a connection
between the party and her letter to the FCC.
"Many of the attendees had nothing to do with that issue," she said,
declining to further identify the guests.
Ethics experts said the arrangement at the very least heightens public
concerns about the appearance of a conflict of interest, and may have run
afoul of federal ethics standards.
"Accepting this gift seems to be insensitive in light of public concern
about whether this Bush administration is in the pocket of corporations and
lobbyists. It doesn't look good for her or the administration," said
Kathleen Clark, a law professor at Washington University in St. Louis who
teaches legal and government ethics.
In a statement, Victory said "the Commerce Department (news - web sites)
ethics office has confirmed that, under the ethics rules, the benefit to me
did not qualify as a reportable gift." But Clark questioned that conclusion
and Stephen Gillers, a professor at New York University's law school,
stated flatly that Victory had a legal obligation to disclose the
lobbyists' largesse on her financial disclosure form.
"Victory's industry friends could pay for the party out of their own
pocket, but she had a duty to reveal their contribution to the public,"
Gillers said.
Clark called the Commerce Department's advice "a very strange
interpretation" and "a bizarre legalistic search for loopholes where there
are none."
If the outside legal experts are correct, Victory can correct the omission
by revising her financial disclosure form.
As an assistant secretary of commerce, Victory is administrator of the
National Telecommunications and Information Administration (news - web
sites) and is the administration's policy representative before the
independent FCC.
A copy of the party's invitation, obtained by AP, clearly names at the top
lobbyists Brian Fontes of Cingular Wireless, Priscilla Hill-Ardoin of SBC
Telecommunications and Rich Barth of wireless phone manufacturer Motorola.
At least one company whose lobbyist helped pick up the tab, SBC, is
checking to see if the approximately $480 Hill-Ardoin spent came from
corporate funds. Fontes and Barth said they don't remember how much they
paid or whether the money came from corporate funds.
"A group of folks who either worked with Nancy or have known her for many
years just got together to toast her," said Fontes, the Cingular lobbyist.
Victory had been confirmed by the Senate for her new government post two
months earlier.
Cingular and SBC both had formally urged the FCC to end the restrictions.
Motorola did not weigh in on the issue, but it's largest commercial
cellular customers, including Cingular, advocated repeal.
*******************************
New York Times
January 21, 2003
Courts Split on Internet Bans
By MATT RICHTEL
If a person goes to prison for using a computer and the Internet to commit
a crime, can he be barred from using the Internet after the sentence is served?
Courts are increasingly facing the question as the Internet age gives rise
to an explosion of cybercrime. But appellate courts in different parts of
the country are coming up with different answers. And in the process, they
are showing how an emerging technology can cause rifts in the legal
landscape and pose difficulties in monitoring offenders.
The United States Court of Appeals for the Fifth Circuit, whose opinion
interprets law in Louisiana, Mississippi and Texas, has ruled that people
on probation may be barred from using computers and the Internet. The court
argued that while this prohibition can greatly restrict a person's freedom
and ability to find work, it also protects society from criminals who have
turned the computer into a weapon.
But two other federal appeals courts, including the one governing New York,
have recently concluded that such a prohibition is too broad. In
overturning the sentence of a child pornographer last year, the Court of
Appeals for the Second Circuit ruled that the Internet was as vital to
everyday existence as the telephone and that while the government could
monitor an offender's computer use, it could not stop it completely.
And the Court of Appeals for the Third Circuit, which covers New Jersey and
Pennsylvania, has issued conflicting opinions in cases involving child
pornography. In one case in 2000, it allowed a complete ban to stand,
saying that it was necessary to deter a public threat to children. But in
another issued earlier this month it argued that such a condition was
overly broad. In this case the court said these sentences would have to
depend on the facts in each individual case.
The courts have noted that computers now pervade virtually every area of
life, suggesting a reason they have found a complete ban excessive, said
Jennifer S. Granick, director of the Stanford Center for Internet and Society.
"Computers are everywhere," she said. "The A.T.M. is a computer; the car
has a computer; the Palm Pilot is a computer. Without a computer in this
day and age, you can't work, you can't communicate, you can't function as
people normally do in modern society."
The issue emerges just as Kevin Mitnick, the hacker once called by the
government "the most-wanted computer criminal in U.S. history," is poised
to start using the Internet again. Mr. Mitnick served five years for
breaking into computer networks of major corporations and stealing
software; he was released from prison in January 2000. As a condition of
his probation, he has not been allowed to use the Internet a restriction
that expires today.
Differences of opinion among federal courts are not unusual, though this
rift can mean that two people living in different states may receive
different sentences, even if they commit similar crimes. But the offenders
are not the only people directly affected by the changing landscape.
The impact has been felt, too, by probation officers, whose job it is to
monitor offenders' activities after they are released from prison. Where
they cannot rely on a complete Internet ban, probation officers are being
forced to pioneer ways to make sure that offenders on probation or on
supervised pretrial release do not use computers and the Internet to commit
new crimes.
That has meant finding technologies to monitor what Web sites offenders
visit and what e-mail messages they send.
"This made our jobs more difficult," Brian Kelly, a federal probation
officer in New York, said of the decision last spring in the case of
Gregory Sofsky by the Federal Court of Appeals for the Second Circuit,
which includes New York, Connecticut and Vermont. Initially, Mr. Sofsky,
who was convicted of receiving child pornography on his home computer, was
sentenced to 10 years in prison, after which he would not be allowed to use
the Internet for three years.
His successful appeal means not only that he will be allowed to use the
Internet after his release from prison, but that sentences prohibiting
Internet use were invalid for other offenders, too. The ruling has resulted
in modified sentences for at least seven other people in the region, who
were originally prevented from using computers while on supervised
release a term that can refer to probation or pretrial release.
Under the modified sentences, they still cannot use computers or the
Internet at will. They are restricted in what Web sites they can see, chat
rooms they can visit, and people they can associate with online.
In the Eastern District of New York, which includes Brooklyn, Staten
Island, Queens and Long Island, the job of monitoring has fallen to Mr.
Kelly and several colleagues, who employ technologies that let them observe
an offender's computer activity remotely. For instance, they have installed
software on several offenders' computers that lets them dial into an
offender's computer and get a log of Web surfing and other online activities.
"I see every e-mail, every chat, every instant message," Mr. Kelly said
recently, while sitting in his office, bringing the log onto his screen.
"This person was on Google at 8:15. Here's an e-mail he received earlier
today."
Mr. Kelly is planning over the next 60 days to add biometric fingerprinting
equipment, which scans a person's fingerprint before allowing access to a
computer. Mr. Kelly said the technology would help him know exactly who was
logged on to a computer, and thus prevent an offender from asserting that
an illegal activity, like downloading child pornography, took place when
someone else was using the computer.
The monitoring technology is still far from foolproof, Mr. Kelly said,
noting that a sophisticated computer user can probably find ways to evade
it. Still, he said that he received calls "once or twice a week" from
jurisdictions around the country looking to start or upgrade their computer
supervision efforts.
Some other jurisdictions are using decidedly less high-technology methods.
Ms. Granick, the professor at Stanford, who is a lawyer and has defended
computer hackers, said she came upon some methods of restricting her
clients' use that are not foolproof. In one case, she said, a San Diego man
accused of hacking into corporate computers was put on pretrial release and
told not to use the Internet. The way the government enforced the
restriction was by putting black and yellow police tape on the computer to
ensure he did not attach an Internet connection.
But even the high-technology monitoring methods leave much to be desired,
said Scott Charney, chief security strategist for Microsoft and a former
federal prosecutor who headed the computer crime and intellectual property
section for the Justice Department. They "can be easily circumvented," he
said, noting, for example, that a child pornographer could find ways to use
the computer to obtain, then eliminate, offending images before being
caught. "If a guy is technically sophisticated, he can delete and wipe away
all the files."
Still, Mr. Charney added that from a legal standpoint, there is a very good
reason to sentence people to limited Internet access "even if the
technology is not there to enforce it." He said the sentence was an
important deterrent because an offender knows that if he is caught, he will
go back to prison without getting another trial.
Ross Nadel, chief of the division of computer hacking and intellectual
property for the United States attorney for Northern California, said he
believed that good reason still existed in certain cases to sentence
offenders to a complete Internet ban. And he argued that banning someone
from the Internet was not the same as banning someone from use of the
telephone.
"There are not cases where people are using the phone to harm sensitive
computer networks," he said, asserting that computers and the Internet have
become integrated and inseparable in some cases from the crime.
The views of the Second Circuit Court of Appeals and the Fifth Circuit
Court of Appeals, covering Louisiana, Texas and Mississippi, show the
differing reasonings being applied. In the Sofsky case in the Second
Circuit, the court granted that allowing Mr. Sofsky access to the Internet
could "facilitate his continuation of his electronic receipt of child
pornography."
But the court said that not allowing Mr. Sofsky to use the Internet would
prevent him access to e-mail, "an increasingly widely used form of
communication," and prevent his performing tasks like getting a weather
forecast or reading a newspaper online. The ban, it said, "inflicts a
greater deprivation on Sofsky's liberty than is reasonably necessary."
In May 2001, the Fifth Circuit reasoned differently in the case of Ronald
Scott Paul, a Texas man who was caught in 2000 with a large number of child
pornography images on his computer. According to court records, Mr. Paul
also had fliers advertising himself as a lice-removal specialist who would
spray children for lice, a process that would require children to undress
completely.
In its sentence, a lower court ruled that when Mr. Paul was released from
prison, he should not only be prohibited from using the Internet, but even
a computer. In its ruling, the Fifth Circuit court agreed, noting Mr. Paul
used the Internet to exploit children and seek out "boy lovers."
The Internet and computer ban "is reasonably related to Paul's offense and
to the need to prevent recidivism and protect the public," the court ruled.
The rift among the courts may not be resolved any time soon, Mr. Charney of
Microsoft said. He said such differences are not uncommon, particularly in
an emerging area of law. In this case, he said, he would not be surprised
to see the split continue for many years.
*******************************
San Francisco Gate
Bigger tech budget on table Bush proposes 12.3% increase
January 21, 2003
President Bush will propose a 12.3 percent increase in technology spending
for fiscal 2004, partly to beef up the cyber-frontier of the war on
terrorism, a White House official said Monday.
Word of the proposed $59.1 billion information technology budget for 2004,
up from Bush's 2003 budget of $52.6 billion, was music to the ears of
strapped Silicon Valley firms.
"We're moving to take more advantage of technologies coming out of Silicon
Valley, as opposed to the government trying to jury-rig our own versions of
technology," said White House official Mark Forman, who presented a preview
of the budget at a conference hosted by Oracle Corp. in San Diego.
The proposal includes $4.7 million for security products such as fire walls
and intrusion-detection systems. However, homeland security initiatives
outlined in the budget are not limited to security products, said Forman,
associate director for IT and E-Government at the White House Office of
Management and Budget.
"So many of the lessons learned since 9/11 are that agencies need to work
together to share information, to leverage knowledge management
techniques," said Forman. For example, the increased IT spending will be
used to better analyze entries and exits into the country to keep out
terrorists, or to monitor disease outbreaks to identify biological attacks,
he said.
The White House also has added $1.6 billion to its 2003 budget to make up
for monies already being spent on technology, Forman said. That would bring
the total to $54.2 billion, retroactively. Much of the 2004 increase would
actually be spent in 2003 because government agencies have already received
White House approval to begin some IT improvements that are part of the
2004 budget.
Bush's 2003 IT spending proposal was about 15 percent more than the
government spent on technology the year before.
Congress is still working on the 2003 appropriations for most government
agencies. But Forman said that because IT projects usually come out of an
agency's overall operating budget, many can go ahead before approval by
Congress.
Silicon Valley companies applauded news of the increase.
"Our companies are really excited about it," said Taryn Lynds, spokeswoman
for AeA, the high-tech trade association formerly known as the American
Electronics Association. "In this economy, companies are really searching
for any means of revenue that they can get."
"I think it's a very, very positive step for the government," said Harris
Miller, president of the Information Technology Association of America, an
advocacy group whose members include most Silicon Valley leaders such as
Hewlett-Packard Co., Intel Corp. and Oracle Corp.
Oracle Chief Security Officer Mary Ann Davidson praised the government's
growing emphasis on secure products.
"That forces vendors to change the way they build products. It's good for
the industry," Davidson said. Oracle sells databases and computer programs
used to run large offices to the federal government.
Tech companies have been hoping to see major federal spending increases
since Sept. 11. But salespeople are still fighting to get their hands on
some of the 2003 budget, much of which has still not been appropriated by
Congress. Another delay in technology spending has been the government's
reorganization.
"While the Homeland Security Department has been forming, it has caused
some complexity in doing business with the departments that will become
part of that. . . . The overall budget process is just a little bit
garbled, quite frankly," John Thompson, chief executive of Cupertino
security firm Symantec, said in a conference call with analysts last week.
E-mail Carrie Kirby at ckirby@xxxxxxxxxxxxxxxx
*******************************
Government Computer News
01/20/03
2004 IT budget request focuses on homeland defense, cybersecurity
By Jason Miller
The Bush administration's 2004 IT budget request will put the majority of
funding increases into homeland defense and cybersecurity, a senior
administration official said.
Mark Forman today said homeland security, the war on terrorism and other
modernization increases, and cybersecurity would account for more than $9.6
billion in the 2004 request.
In all, the administration's 2004 IT budget request would be $59 billion,
an increase of 14 percent over the 2003 request, Forman, the Office of
Management and Budget's associate director for IT and e-government, said.
Forman, who released the IT budget at the Oracle AppsWorld Conference in
San Diego, said the request for homeland security IT funds would increase
to $4.9 billion and cybersecurity to $4.7 billion. OMB also attributed the
overall increase to realizing $1.6 billion in IT spending not previously
reported by agencies, Forman said.
Non-defense discretionary spending, however, will increase only by a "few
hundred million," he said.
"Last year was the first year we put in place rigorous budget reporting
requirements," Forman said. "Capital planning is a critical element of that
and we also took action to strengthen the roles of CIOs at the departments
of Energy and Veterans Affairs, so we got better reporting."
For the second straight year, cybersecurity will see a significant
increase, up from $4.2 billion in 2003 and $2.7 billion in 2002.
"The increase in security spending represents a increased commitment and
need to do more cybersecurity," Forman said.
The overall budget, which the administration will release Feb. 3, will see
only a modest increase, OMB director Mitchell E. Daniels Jr. said last
week. This is the third straight year the administration's IT budget
request has increased dramatically.
OMB also wants to increase the funding for work on agency enterprise
architectures. The $1 billion request would make sure every agency receives
at least $15 million to $25 million for work on their modernization
blueprints, Forman said.
Forman said the administration also is requesting $37 billion for mission
projects and $21 billion for office automation and infrastructure initiatives.
*****************************
Government Executive
January 17, 2003
Ban on job competition targets stripped from Senate bill
By Jason Peckenpaugh
jpeckenpaugh@xxxxxxxxxxx
The Senate has removed language from an omnibus fiscal 2003 appropriations
bill that would have blocked the White House from putting thousands of
federal jobs up for competition with private firms.
But Sen. Barbara Mikulski, D-Md., an opponent of the administration's
initiative, plans to reintroduce the language as an amendment to the bill,
according to spokeswoman Amy Hagovsky.
The provision, which was part of the Treasury-Postal bill, would prevent
the Office of Management and Budget from setting numerical targets for
competitive sourcing. OMB has told agencies to compete or directly
outsource 15 percent of their commercial jobs by October 2003, although it
has said that some agencies may fall short of this target.
The full House approved the provision in July as part of the
Treasury-Postal bill.
OMB has strongly condemned the contracting provision. OMB Director Mitch
Daniels said last year that advisers to President Bush would recommend that
he veto the Treasury-Postal bill if it contained the ban on targets. In
September, OMB officials said the administration might order agencies to
compete all commercial work in government850,000 federal jobsif the measure
became law.
Sen. Craig Thomas, R-Wyo., led Senate efforts to remove the provision from
the appopriation bill. "Sen. Thomas is very pleased that the appropriators
have stripped this provision," said Chris Jahn, Thomas' chief of staff. "It
would have prevented the President from establishing targets for increasing
government efficiency."
Federal employee unions favor the provision and are backing Mikulski's
efforts to reintroduce it as an amendment. "The House repudiated the OMB
privatization quotas on a bipartisan basis," said John Threlkeld, a
legislative analyst for the American Federation of Government Employees.
"The Senate should follow that example."
******************************
Associated Press
DVD Kid's Acquittal to Be Appealed
Mon Jan 20, 1:43 PM ET
By DOUG MELLGREN, Associated Press Writer
OSLO, Norway - Norwegian prosecutors will appeal the acquittal of a
Norwegian teenager charged with digital burglary for creating and
circulating online a program that cracks the security codes on DVDs.
Rune Floisbonn, a prosecutor with Norway's economic crimes police, told the
NTB news agency Monday that an appeal would be filed. He did not
immediately return calls from The Associated Press.
Jon Lech Johansen, 19, was found innocent of violating Norway's data
break-in laws Jan. 7 in a ruling that gave prosecutors two weeks to decide
whether to appeal the high profile case. That deadline expires Tuesday.
"An appeal was expected," Johansen's attorney, Halvor Manshaus, told AP by
telephone. "I haven't gotten it confirmed ... but I believe it is correct
and that there will be an appeal."
Floisbonn told Nettavisen, a Norwegian online newspaper, that prosecutors
would challenge the Oslo City Court's interpretation of the law and the
evidence presented in their case against Johansen.
In its unanimous 25-page ruling, the three-member court found
Johansen known in Norway as DVD-Jon innocent on all charges.
The ruling was a key test in how far copyright holders can go in preventing
duplication of their intellectual property. It said that consumers have
rights to view legally obtained DVD films "even if the films are played in
a different way than the makers had foreseen."
Johansen, who was 15 when he developed and posted the program on the
Internet in late 1999, said he developed the software only to watch movies
on a Linux (news - web sites)-based computer that lacked DVD-viewing software.
The short program Johansen wrote is just one of many readily available
programs that can break the film industry's Content Scrambling System,
which prevents illegal copying but also prevents the use of legitimate
copies on unauthorized equipment.
Charges against Johansen were filed after Norwegian prosecutors received a
complaint from the Motion Picture Association of America and the DVD Copy
Control Association, the group that licenses CSS.
The court ruled that Johansen, who works as a programmer in Oslo, could not
be convicted of breaking in to DVDs that were his own property, since he
had bought them legally.
Manshaus said he did not know when the appeal would be heard.
*******************************
Associated Press
Swiss Village Holds First Internet Vote
Sun Jan 19, 2:35 PM ET
ANIERES, Switzerland - A small Swiss lakeside village made history Sunday
with the country's first legally binding Internet vote.
Authorities said that 323 voters cast their ballot through the Internet,
370 by mail and just 48 went to the polls.
There was a 61.3 percent majority in favor of awarding a taxpayer funded
grant to renovate an expensive restaurant, officials said.
Under Switzerland's system of direct democracy, voters routinely cast their
ballots on national questions such as asylum or abortion laws and local
issues like funding for schools or new roads.
In Anieres, a wealthy suburb of Geneva, more than 90 percent of the
1,162-strong electorate traditionally votes by mail. Sunday's vote marked
the first time they could vote online, through a special Geneva state Web
site using a regular home computer.
Residents had to type in a series of security codes, their date and place
of birth, then cast their vote on whether $3.1 million of taxpayer money
should be spent to renovate a municipal property housing the restaurant.
*******************************
New York Times
Roommate Service Clients Report E-Mail Barrage of Holocaust Revisionism
By DAVID F. GALLAGHER
Users of a well-known roommate-matching service in Manhattan say that after
signing up with the service they began receiving e-mail messages from a
Holocaust-revisionist Web site run by the service's founder.
Michael Santomauro, who started the Roommate Finders service in 1979, also
runs a Web site called RePortersNoteBook.com that is critical of Jews and
Israel, with headlines like "How Kosher Is the Holocaust Story?" Several
users of Roommate Finders said similar material began landing in their
electronic mailboxes soon after they gave their addresses to the service.
The e-mail messages were mostly articles taken from Web sites, including
material from mainstream news outlets and sites that question historical
accounts of the Holocaust. One message discussed the role of Jews in
prostitution in the last century, while another concluded, "The Hitler `gas
chambers' never existed." At the bottom of the messages were offers of
related books in exchange for a donation, along with Mr. Santomauro's name
and a link to his site.
Mr. Santomauro denied that he had knowingly added users' e-mail addresses
to his RePortersNoteBook .com mailing list, which he said had more than
140,000 people on it.
"The bulk of my client base happens to be Jewish," he said, "and I'm
sensitive to that." He said he bought addresses from mailing list brokers
and sold his customers' addresses to others. "When I'm compiling or buying
lists, there may be names that are overlapping," he said. The Roommate
Finders Web site, at roommatefinders.com, says nothing about how the e-mail
addresses will be used, only that personal information may be shared with
prospective roommates.
Mr. Santomauro said he saw nothing wrong with sending such material to
people who had not requested it as long as he gave them the option of
removing themselves from the list.
"It's just an e-mail," he said, "and you have the opportunity to unsubscribe."
Some people who ended up on the list took a different view. Svetlana
Lebedeva, 24, said that when she began receiving e-mail messages from
RePortersNoteBook.com in October, she immediately made the connection with
Roommate Finders, where she had recently signed up. "Nobody asked for my
permission to be on it, and something as absolutely outrageous as this, I
shouldn't have been on it to begin with," she said. "It was very disturbing."
Another subscriber, Harla Rozner, 30, said she signed up with the service
twice in the past year seeking roommates to share her Upper East Side
apartment. Both times she began getting e-mail messages from
RePortersNoteBook.com. "I would open my mailbox and there would be tons of
them," she said.
Ms. Rozner said that after she wrote to Roommate Finders this month
complaining about the messages and asking to have her apartment listing
removed, she received in response an article on Jewish slumlords, sent from
a Roommate Finders' address.
John Mozena, a founder and vice president of the Coalition Against
Unsolicited Commercial E-Mail, an advocacy group, said those examples show
how Web users need to look for a site's privacy policy before turning over
personal data.
"This seems like the best example I've seen yet on how not to use your
customers' information," he said.
Roommate Finders charges $300 for access to listings of people with
apartments to share, but adding a listing is free. The site says the
service has had more than 217,000 clients, and lists dozens of companies
and universities "that put their trust in us," including American Express
and Columbia University.
Mr. Santomauro said he was "an amateur Holocaust revisionist" who believes
that the number of Jews killed by the Nazis has been overstated. He
characterized his mailings as noncommercial because they asked only for
donations. But he said the books he offered were generating more income
than Roommate Finders, which he said has been hurt by a real estate slump.
*******************************
New York Times
Poindexter's Still a Technocrat, Still a Lightning Rod
By JOHN MARKOFF
The pursuit of a technological solution to the nation's military challenges
is nothing new for Vice Adm. John M. Poindexter nor is the attending
controversy.
Admiral Poindexter, 66, is the force behind the Total Information Awareness
project, an experimental system being developed by the Pentagon that seeks
to scan information on billions of electronic transactions performed by
millions of people here and abroad each day, analyze them and flag
suspicious activity for possible investigation.
He is being vilified by civil liberties groups, Democrats in Congress and
even some Republicans as the personification of a new type of Big Brother.
But the roots of his new enterprise actually lie well in the past, in a
vision he pioneered for building a Star Trek-style command and control
system while working as the national security adviser for President Ronald
Reagan two decades ago.
"From the beginning Poindexter has been a technocrat involved with the
manipulation of information," said Dr. John Prados, a military historian at
the National Security Archive, a research organization in Washington.
It is a vision he continued to pursue as a consultant after he left the
government in 1986 because of his role in the Iran-contra affair, in which
sales of arms to Iran were used to finance rebels fighting in Nicaragua at
a time when Congress had barred such assistance.
For over two decades the admiral has been preoccupied with giving
battlefield commanders including the commander in chief better
information during times of crisis. For the last year, he has once again
been pursuing that goal, from within the Pentagon.
"Whenever I would talk with him he would tell me, `The president doesn't
have enough information during a crisis to make decisions,' " said a former
official of the Pentagon's Defense Advanced Research Projects Agency, known
as Darpa.
According to several scientists who have worked with Admiral Poindexter at
the Pentagon, that vision, to surround military decision makers with
high-tech computer systems that make sense of the battlefield and are able
to display vast quantities of information, led directly to the idea of
Total Information Awareness, known as T.I.A.
"He wanted real-time intelligence feeds in the White House, feeds that were
under direct White House control rather than being filtered through the
C.I.A. or other intelligence agencies," said a scientist who works closely
with Darpa. "This really has strong links to his current views on T.I.A."
Between 1981 and 1983, Admiral Poindexter was involved in the modernization
of the White House Crisis Management Center also known as the Presidential
Emergency Operations Center in the Executive Office Building. It was
equipped with video equipment, computers and electronic message systems a
more novel concept then to connect to the Pentagon and State Department
and intelligence agencies.
In the 1990's, as a military consultant, he promoted a variety of efforts,
including the Command Post of the Future project, to provide more
information to military planners via computer networks. Another project,
known as Genoa, which was also intended to give intelligence planners and
decision makers better information, preceded the more ambitious Total
Information Awareness project, which Mr. Poindexter now directs.
"He may be the only guy in government who deeply understands computers and
what they are good for," said John C. Dvorak, a personal-computer industry
columnist who met and became friends with Admiral Poindexter after the
Iran-contra scandal.
But his technical skill has not been complemented by political deftness. As
the national security adviser, he clashed with civil libertarians over a
variety of initiatives, including a 1984 national security directive that
gave agencies broad authority to control "sensitive but unclassified
information" in addition to the classified variety. And he is battling
civil liberties groups again over the Total Information Awareness concept.
"John Poindexter is a brilliant nuclear engineer who is also politically
tone-deaf," said a former high-ranking naval officer who served with the
admiral during the 1970's and 1980's.
Admiral Poindexter would not comment for this article and has been
forbidden to respond to his critics by his superiors at the Defense
Department. But he has told a number of people that he believes the attacks
on him by civil libertarians are based on a distortion of the way the Total
Information Awareness technology would operate.
He has argued that because the system would look only for certain patterns
in commercial databases not create any centralized record-keeping system
of American citizens' activities it would not violate civil liberties.
But that has not overcome discomfort over the admiral's premise that the
battlefield command center must now watch the private activities of
American civilians to detect potential terrorists. Civil liberties groups
worry that preventing the system's misuse will be difficult because it
breaks down the traditional separation among law enforcement, military and
intelligence agencies.
While this particular surveillance system has become a lightning rod for
criticism, Admiral Poindexter's ambitious push for a technological solution
to the terrorism threat is more broadly emblematic of the Pentagon's
struggle to find the right information tools to fight a new kind of warfare
that may take place on American soil.
"John Poindexter was a pioneer in thinking about threats to national
security that didn't look just like us," said John Arquilla, an expert on
unconventional warfare at the Naval Postgraduate School in Monterey, Calif.
"The Pentagon is full of people who accept his view quite fully today."
What makes the admiral's critics wary, however, is that his skill at
technology and his misuse of it partly led to his undoing during the 1980's.
While spending time at President Reagan's ranch in California as the
national security adviser, according to several former military officers
who worked with him, the admiral would sit for hours with his Grid laptop
computer, then very high-tech. Connected to a mainframe computer by a
satellite phone, he would patiently program and polish the software that
controlled the White House's newly installed e-mail system.
It was Admiral Poindexter's technological expertise that permitted him to
create a back door, named "private blank check," in the e-mail system to
circumvent normal White House channels, according to David A. Wallace, a
specialist in electronic records at the School of Information at the
University of Michigan in Ann Arbor. The system made it possible for the
admiral to oversee the illegal activities of Col. Oliver North.
Admiral Poindexter's legal troubles later stemmed in part from the 6,000
messages he destroyed with Colonel North. He was convicted on five felony
counts, including lying to Congress, destroying documents and obstructing
Congress in its investigation, but his conviction was overturned on appeal.
"Clearly Poindexter consciously manipulated the system to act in a way to
hide information," Mr. Wallace said. "When faced with a system of checks
and balances, he decided to act illegally. What does this say about the
person who we are putting in charge of designing the most comprehensive
surveillance system on U.S. citizens ever?"
It was a spectacular fall for the admiral, who was first in his class at
the Naval Academy in 1958 and later received a Ph.D. in nuclear physics at
the California Institute of Technology. Early in his military career, he
became a protégé of the civilian Pentagon planners and military officers
who were putting a high-technology face on the Pentagon in the late 1960's.
He was briefly one of the "whiz kids" nurtured by Secretary of Defense
Robert McNamara, who believed that winning the war in Vietnam was a matter
of engineering and quantitative methods.
Admiral Poindexter came of age when the Navy was leading the military in
deploying broadband communications and advanced command and control
systems. Later, when he arrived at the White House, he became one of the
original participants in the planning behind President Reagan's Strategic
Defense Initiative, called Star Wars by its critics. He was present at the
initial meetings when the plan was first conceived in 1983.
While in the White House, he was offered the coveted command of the Sixth
Fleet but turned down the offer, a move that still baffles military
officers who knew him.
"Working in the White House can be very intoxicating," said a military
officer who worked with Admiral Poindexter during his years on the National
Security Council. "A lot of military people turn down great career jobs to
stay there."
Now, with his return to government, the admiral's actions are under close
scrutiny, which has even focused on his choice of an emblem for the
Information Awareness Office at Darpa.
The emblem featured a human eye, embedded in the peak of a pyramid,
scanning the globe. It carried the motto "scientia est potentia," or
"knowledge is power."
Admiral Poindexter told several people that he had not thought about the
Big Brother implications of such an image. In his mind, the eye had
represented the letter I, the pyramid the letter A and the globe the letter
O a way of describing his new organization. The emblem has since been removed.
*******************************
Federal Computer Week
TSA preps $148 million more in grants
The Transportation Security Administration will dole out $148 million in
new grants for port and bus security, Transportation Department Secretary
Norman Mineta announced Jan 14.
The money will include $28 million for Operation Safe Commerce, a pilot
program focused on protecting ports in Los Angeles; Long Beach, Calif.; New
York; New Jersey; Seattle; and Tacoma, Wash.
"These grant programs will help [TSA] identify critical infrastructure,
provide transit personnel security training, harden our seaports, enhance
vehicle tracking and driver protections and increase security throughout
the supply chain," Mineta said in a news release.
President Bush established TSA in November 2001 when he signed the Aviation
and Transportation Security Act, which mandated improvements in securing
the nation's transportation systems. Congress provided the agency with
funding for the grants programs in the fiscal 2002 Supplemental
Appropriations Act.
The first round of grants was awarded in June 2002, with $92.3 million
going to 51 ports nationwide. Of that money, $9.3 million paid for "proof
of concept projects" to explore the use of new technologies, including
vessel tracking and electronic notification of arrivals.
About the same time, the department completed a test of e-seals radio
frequency devices that enable agencies to determine if a container has been
tampered with and began work on a transportation worker identification
system that includes smart cards.
A board, with representatives from TSA, the Coast Guard and the Maritime
Administration, will judge the latest grant applications.
******************************