[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips October 6, 2003
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, glee@xxxxxxxxxxxxx;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, computer_security_day@xxxxxxx;, waspray@xxxxxxxxxxx;, BDean@xxxxxxx;, mguitonxlt@xxxxxxxxxxx;
- Subject: Clips October 6, 2003
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Mon, 06 Oct 2003 14:28:19 -0400
Clips October 6,
2003
ARTICLES
Recall Voters Face an Intricate Ballot, and, Indeed, Chads
VeriSign Agrees To Shut Down Search Service
EU directive could spark patent war
SF library wants to track books with computer chips
Pair Mapped Out Their Travels on a Laptop Computer
Students Fill Grade Book On Teachers at Web Site
Federal Reserve checks out new servers
Study: More Privacy Protections Needed as Location-Based Services Emerge
*******************************
New York Times
October 6, 2003
Recall Voters Face an Intricate Ballot, and, Indeed, Chads
By SARAH KERSHAW
LOS ANGELES, Oct. 5 When voters in Los Angeles go to the polls in
California's recall election Tuesday they will have to flip through an
eight-page paper ballot to search for their candidate, listed in
semi-random, not alphabetical order.
It is just one of the complications of an election in which voters must
decide whether to recall Gov. Gray Davis, then choose from 135 possible
replacements. Once Los Angeles voters find their candidate's number, they
will use a stylus to punch out a chad yes, those chads of Florida
fame on a card studded with 312 numbers.
In Plumas County, near the Sierra Nevada, voters will face a 13-page
ballot on a computer screen and use touch-screen voting.
In Yolo County, near Sacramento, the ballot consists of five cards: two
pink cards for the recall question and the two other measures on the
ballot and three white cards listing the names of the 135
candidates.
Each voter is given three white cards, but is asked to return only the
one listing the favored candidate. The two other cards must be placed in
an orange envelope and put in orange boxes at the polling place. The two
pink cards and the one white card go in a gray envelope that the voter
must hand to the poll worker, after punching the cards with a stylus.
These are among the dizzying array of voting methods and situations
facing the 15.4 million voters who registered in California for the
recall election, a record number for a California election for governor,
state officials said.
No one, it seems, has ventured a guess on just how long it might take
voters, whatever system they are using, to wade through the
ballot.
But over the weekend, election officials across the state, nearing the
end of their sprint and trying to anticipate every glitch, prepared
furiously for Tuesday.
In Norwalk, a suburb of Los Angeles where the Los Angeles County
registrar's office has its headquarters, Kristin F. Heffron, chief deputy
of the office, described the scene as "organized
chaos."
On Saturday, in one room, 100 election workers sorted through absentee
ballots, placing thousands of punch card ballots those of hanging,
dimpled and pregnant chad fame into one of two small cardboard
boxes labeled "good" and "damaged," or tossing them
into a metal basket labeled "snags."
Across the hall, several dozen of the 1,800 election workers who will be
on duty by dawn Tuesday made a dry run with the punch card reading
machines.
They fed thick stacks of orange demonstration ballots, which like the
real pink ballots are studded with 312 chads, through loudly clacking
card reading machines counting 1,000 ballots a minute.
"Everybody is saying things are as smooth as silk," Ms. Heffron
said somewhat tentatively, a sentiment that was not shared by some other
nervous county election officials in a state where the mechanics and
methods of voting vary greatly among the 58 counties.
Voters first decide on the recall of Mr. Davis. Regardless of how they
vote on that issue, they select one candidate to replace him should he be
recalled. The polls close at 8 p.m. Pacific time.
Each of the counties will have 28 days after Tuesday's election to
certify their results, and the California secretary of state has 11
additional days to certify the counties' results. That could mean that
the state will not officially declare the result until weeks after the
election.
Still some county officials, including those in Los Angeles, the state's
largest county and the nation's largest electoral district with four
million registered voters, said that unless the recall question and the
governor's race were too close to call, they should have a strong sense
of what most voters had decided by midnight Tuesday in California.
Others, however, including officials in Orange County, where the 1.34
million registered voters will be using an optical scan system for the
first time, said it would probably take them until Wednesday morning to
get an accurate read on the vote.
Despite criticism of the punch card system that was at the center of the
electoral fiasco in Florida in the 2000 presidential race, election
officials in Los Angeles said they were glad they were using the same
method they had used for 35 years, which had never caused problems here.
Some other California counties are using hastily introduced new systems,
which they had not expected to use until next year's March presidential
primary.
Still, even in Los Angeles County, it was a mad dash to the recall. In 77
days, from the day the election was called on July 24, the county
registrar's office, which expects at least half of the 4 million voters
to turn out for the election, zoomed toward the election at break-neck
speed.
"It was a pressure cooker," Ms. Heffron said.
In just a few weeks, the registrar's office produced its eight-page
ballot, after calling its ballot manufacturer in July and requesting an
emergency delivery of ballot stock. Sample ballots were then mailed to
more than four million people and there was a frantic rush to line up
polling places. (Officials reduced the usual number of polling places,
4,900, to 1,786 because there was not enough time to set up all of
them.)
They also scurried to recruit the most experienced poll workers, and by
Sunday had 14,000 signed up.
For any election, officials scrounge for polling places, setting them up
in flower shops, mortuaries and, of course, schools.
But schools were not available for Tuesday's recall, so officials instead
went after churches like crazy and hoped there would be enough parking.
They are now posting notices at the old polling places where voters might
turn up, with maps telling voters where to go instead.
The officials also quickly reserved the sheriff's helicopters they
regularly use to fly ballots into the registrar's office on election
night from far-flung polling places across the 400-square-mile Los
Angeles County.
And with the four helicopter routes settled, 50 pounds of election
materials and supplies delivered to each precinct and Saturday's dry run
revealing no glitches, election officials here said they felt most
everything was in place.
"We're very ready for the election," Conny B. McCormack, the
county registrar-recorder, said on Saturday, surrounded by a throng of
reporters and cameramen, including a photojournalist who is also a
candidate for governor and was shooting footage of the dry run.
"We're in really good shape."
But election officials were concerned, in places like Orange and Shasta
Counties, where punch card machines were hastily replaced with new voting
technology they had not expected to use until next March. They were also
a bit weary, as they processed the large number of absentee ballots that
have been sent in.
Unlike the places with lengthy ballots, San Francisco and other counties
managed to produce a single page: a 10-inch by 17-inch cardboard sheet
filled from top to bottom, front to back with recall candidate names and
the two propositions; voters will mark them with felt-tip pens. Election
clerks, who are required to review the crammed ballot with each voter to
ensure they understand their voting options, said after helping some
voters over the weekend, that they were already tired.
The Yolo County clerk-recorder, Freddie Oakley, said the long list of
candidates, the fact that they were not listed in alphabetical order and
the county's five-card ballot setup, might present problems for voters.
"My No. 1 concern is that voters are going to have difficulty
finding their candidates on the ballot," Ms. Oakley said. "I
don't think the average American, with any level of education, would
discern any order in these."
In Los Angeles, though, officials seemed confident that Election Day
would go relatively smoothly.
"I always like to equate it to the Rose Bowl," Ms. McCormack
said. "Everybody can picture it that's 100,000 people. Well,
picture in a 13-hour time frame, the Rose Bowl filling up or emptying 20
or 25 times. Don't you think there might be a few fender benders in the
parking lot and a few people who can't find their seats?"
*******************************
Washington Post
VeriSign Agrees To Shut Down Search Service
By David McGuire
Saturday, October 4, 2003; Page E01
VeriSign Inc., the firm that oversees Internet addresses ending in
".com" and ".net," yielded to pressure yesterday and
said it will temporarily shut down a new service that steers Web surfers
to its own online search directory when they mistype the name of a
destination into their browser.
The company's action came after the Internet's main oversight
organization, the Internet Corporation for Assigned Names and Numbers
(ICANN), demanded that the company take down the service or face legal
action. ICANN awarded the contract to VeriSign that gives the Mountain
View, Calif-based company exclusive rights to manage the .com and .net
registries.
If VeriSign's service were found to be harming the Internet, ICANN said,
its contract gives ICANN the power to impose fines of up to $100,000 or
strip the company of its authority over the addressing system.
"Without so much as a hearing, ICANN today formally asked us to shut
down the Site Finder service," said VeriSign spokesman Tom Galvin.
"We will accede to their request while we explore all of our
options."
The dispute over VeriSign's new service prompted a debate over who
controls the Internet. By virtue of its contract with ICANN, VeriSign
enjoys a monopoly over the .com and .net registries. The company, though,
initially rejected ICANN's request last week to take down the service
long enough for technical experts to determine whether it was damaging
the Internet.
"War is breaking out between the regulators and the people they
regulate. This is a real power struggle [over] who controls the rules on
the Internet," said Mark Lewyn, chairman of Reston-based Paxfire
Inc., which develops systems to redirect Internet traffic.
About 1.5 million Web users a day were sent to the Site Finder site when
they mistyped the name of common online destinations into their browser.
Site Finder offered links to sites with names similar to the user's
original query, along with a search box and Web directory full of
advertising. The directory competed with similar search services offered
by America Online Inc., Microsoft Corp. and others. Its ads are provided
by Overture Services Inc., a company being bought by Yahoo Inc.
VeriSign could easily generate $100 million in revenue annually from Site
Finder by selling "sponsored" results to search terms, Lewyn
said.
The move irked companies such as AOL and Microsoft, which lost traffic to
their own search sites. Two other companies have filed lawsuits against
VeriSign, contending that its service represents unfair competition:
Orlando-based Popular Enterprises LLC, owner of the Netster search
engine, and Scottsdale, Ariz.-based Go Daddy Software Inc., which sells
Internet addresses.
VeriSign also angered the close-knit group of engineers and scientists
who are familiar with the technology underpinning the Internet. They say
that Site Finder undermines the worldwide Domain Name System, causing
e-mail systems, spam-blocking technology and other applications to
malfunction.
VeriSign said the claims are overblown. Before agreeing to take down Site
Finder, VeriSign had promised to work with the Internet community to
eliminate any glitches caused by Site Finder.
"There is no data to indicate the core operation of the Domain Name
System or the stability of the Internet has been adversely
affected," Galvin said. "ICANN is using anecdotal and isolated
issues in an attempt to assert a dubious right to regulate non-registry
services."
*******************************
CNET News.com
EU directive could spark patent war
Last modified: October 3, 2003, 8:00 AM PDT
By Matthew Broersma
Special to CNET News.com
The European Parliament's decision to limit patents, as they apply to
software and business methods, risks creating a "patent war"
with a fallout that could make it illegal to access some European
e-commerce sites from the United States, analyst firm Gartner has warned.
The parliament recently voted to approve the Directive on the
Patentability of Computer-Implemented Inventions--but with a series of
amendments that are designed to limit the ways in which software can be
patented.
Pure software should not be patentable, the parliament argued, and
software makers should not be required to license patented technology for
the purposes of interoperability--for example, creating a device that can
play a patented media format, or allowing a computer program to read and
write a competitor's patented file formats.
The amendments also sought to ban the patenting of business methods such
as Amazon.com's patent on one-click purchasing. In the United States,
business methods and pure software are routinely patented, a situation
that has been harshly criticized by information technology executives,
software developers, economists and others as being harmful to
competition and innovation.
Though the European Union's patenting system might more effective,
Gartner has highlighted problems that could arise from its being out of
sync with the system in United States. For example, if a patented
e-commerce technology is enforceable in the United States but not the
European Union, users of the technology in the United States could be
breaking the law by accessing an EU Web site that employed the
technology, according to Gartner.
"If the amended directive becomes law, the significant differences
between the U.S. and European approaches to software patenting raise the
prospect of a patent war," the firm said in a statement.
Any practical effects will take until at least the end of 2005 to appear,
Gartner estimated, the earliest date the EU governments could introduce
the directive's provisions into national law.
U.S. concerns
The U.S. government has also expressed concern about the directive's
amendments, according to documents seen by ZDNet UK. In a letter to the
European Parliament that comments on the amendments, sent before the
vote, a U.S. official said three articles of the directive are
particularly "problematic." The most troubling: Article 6(a),
which states that patents cannot be used to restrict interoperability,
said the official, who recommended that the article be deleted.
The Foundation for a Free Information Infrastructure (FFII), which
lobbied in favor of the amendments, responded that it would be absurd to
rely on antitrust law to protect the software industry from companies'
attempts to control data-exchange standards.
"The U.S. DoJ v. Microsoft case shows how insecure and inefficient
competition law is in this area," the organization said in a
statement. "Competition considerations need to be built into a
patent directive which deals with software-related problems."
The patents directive will next return to the European Commission for
review, followed by votes in parliament and the Council of Ministers,
after which, if approved, it will be implemented in the national laws of
EU member states.
However, the commission has indicated that the amendments may be
"unacceptable" to it and is considering withdrawing the
directive.
*******************************
USA Today
SF library wants to track books with computer chips
By Ron Harris, Associated Press
Posted 10/3/2003 7:30 PM
SAN FRANCISCO A civil liberties watchdog group is expressing
concern over the San Francisco Public Library's plans to track books by
inserting computer chips into each tome.
Library officials approved a plan Thursday to install tiny radio
frequency identification chips, known as RFIDs, into the roughly 2
million books, CDs and audiovisual materials patrons can borrow. The
system still needs funding and wouldn't be ready until at least 2005.
The microchips send out electromagnetic wave to a device that converts
them to digital data containing a host of information. In libraries, the
system is primarily designed to locate books in branches and speed up the
checkout process.
Library officials say the "passive" chips would be deactivated
as materials are taken from the library, thus preventing any stealth
tracking of books and by extension, people off premises.
But Lee Tien, a staff lawyer for the Electronic Frontier Foundation, is
concerned that the chips may have information that would remain
accessible and trackable, whether by ingenious hackers or law enforcement
subpoena. That, he says, would be a threat to privacy rights.
"If there's a technology for temporary deactivation, then presumably
there's a system for reactivating it," Tien said. "Does the
person have the ability to know if the RFID is on or off?"
Some of the foundation's concerns are rooted in the provisions of the USA
Patriot Act, which critics have assailed as giving government the
authority to obtain the records and threatening the privacy and First
Amendment rights of library and bookstore patrons.
San Francisco's city librarian, Susan Hildreth, says the devices will
help streamline inventory and prevent loss. Tracking people is not the
goal, she insisted.
"It will not allow us to track people to their home or any
location," Hildreth said.
She pointed out that several other major libraries, including the Seattle
public library system, are moving to the chips instead of bar codes.
"Industry trends show that it's going to replace the bar code very
shortly," Hildreth said. "We're trying to prepare for the
future."
Seattle's 24 libraries are installing RFID tracking systems, with the
first to be ready next spring.
The city of Santa Clara is installing RFID tracking at its main library
and the county is considering a similar move.
Still, it's the opportunity for unauthorized tracking that concerns Tien.
"The issue is other people, other institutions. What will they do if
the RFID is insecure?" Tien said. "We're talking about the
imbedding of location trafficking devices into the social fabric."
Hildreth said San Francisco library officials may hold a public forum to
discuss the chips further.
*******************************
Washington Post
Pair Mapped Out Their Travels on a Laptop Computer
Monday, October 6, 2003; Page A11
Malvo and Muhammad had it down to a system. Using the laptop stolen from
Paul La Ruffa and a global positioning navigation device they had in the
Caprice, Malvo navigated them easily around the area. Maps printed out
from their software appeared to indicate some of their travels. "You
have the computer," Malvo would tell the authorities later.
"It's all on there."
One map highlighted a Virginia route that went from Manassas to Haymarket
to Centreville, with a detour within sight of where Dean Harold Meyers
was killed. Another map showed a route right past the Tasker school in
Bowie, where Iran Brown was shot. Several spots were designated with
small skull-and-crossbones icons. One marked a spot across the street
from where Premkumar A. Walekar was killed in Aspen Hill. Another marked
White Flint Mall, near where James L. "Sonny" Buchanan was
killed. Another marked a place a few blocks from the Wheaton shopping
center where James D. Martin was killed.
Other skull icons marked spots where there had been no reported
shootings: the Howard University campus in Washington; a spot near Quincy
Street off Brookville Road in Chevy Chase; the busy intersection of
Connecticut Avenue and Veirs Mill Road, not far from the area of the Oct.
3 shootings; Indian Spring Drive near a YMCA in Silver Spring; and
Martinsburg Mall in West Virginia, about 90 miles northwest of
Washington.
Some maps featured places marked with smiling or frowning face icons.
National Naval Medical Center in Bethesda got a frowning face in the
middle of the hospital grounds. But a spot near rural Fairplay, Md.,
south of Hagerstown, earned a smiling face and a box that read
"potential area." Some of the maps also contained spots denoted
with exact addresses. Two were for YMCAs in Maryland and North Carolina.
Three others were for schools just outside Washington: Rosaryville
Elementary School in Upper Marlboro; Mary Harris "Mother" Jones
Elementary School in Adelphi; and Berwyn Heights Elementary School near
College Park. All were brand new, in recently built or refurbished
buildings, and had just opened a few weeks before.
Other maps traced routes between Washington and Fredericksburg and south
into North Carolina. Several map locations in southern Virginia and North
Carolina had small computer screen boxes that read "good spot,"
"good spot off I-95," "good spot, drag effect" and
"eastern move, many ways out."
Malvo would later laugh describing to investigators a shot he said had
missed a boy, who then swatted the air as if at a bee. He wasn't specific
about where that was. Some investigators concluded it could have been the
first Michaels shooting. But the maps hint that it could have been any of
the other locations the pair seem to have cased.
Malvo said they watched the media and the police response carefully.
"You said this so we did this or that. . . . The media would say
this so we would do another thing. We had something for
everything."
Malvo indicated that he and Muhammad took turns with the Bushmaster,
deciding who would do what before they went out for the day. One would
set up to shoot, while the other spotted, not to aid the shooter but to
look for trouble. Police would later find, in a sock left in the Caprice,
a second rifle scope besides the one Malvo called the
"battlescope" on the gun.
Sometimes the shooter would be in the car, sometimes out of it. Often,
shooter and spotter would not be together. Malvo told investigators they
used walkie-talkies to communicate. They selected a location and a time
window. It was the call of the "sniper" whether to take the
shot. Escape was made cautiously, so as not to arouse suspicion. But
knowing they were still invisible, they sometimes came back, as in
Manassas, and hung around to watch the expressions on the faces of the
bystanders. Malvo even asked police officers what had happened and would
be asked, in turn, if he had seen anything suspicious. He and Muhammad
also would test the roadblocks to see if the car caught police attention.
It never did.
*******************************
Washington Post
Students Fill Grade Book On Teachers at Web Site
Critics Call Effort Hurtful, Unscientific
By Rosalind S. Helderman
Monday, October 6, 2003; Page B01
Students have always talked about teachers behind their backs, warning
peers about the hard ones, giggling at others.
Mix in the teenage obsession with the Internet, and what results is
ratemyteachers.com, a two-year-old Web site that allows students -- or
anyone else with Internet access -- to post comments about middle and
high school teachers for all to see.
Across the nation, more than 400,000 teachers at more than 23,000 schools
have received ratings. The site, based in California, includes commentary
on teachers at most high schools and many middle schools in the
Washington area.
A group of adults established the site, saying it is especially important
at a time when good teaching is being touted as the key to student
achievement. The federal No Child Left Behind law requires that every
public school class be taught by a "highly qualified teacher"
by 2005.
Great teaching is all about the ability to make connections with pupils,
and the students themselves know when a teacher does that, said Michael
Hussey, a public relations consultant and co-founder of the site. He said
ratemyteachers.com gives students a voice in their own
education.
"The most important thing is that no matter how smart or intelligent
the teacher is, there really needs to be an atmosphere of mutual
trust," Hussey said. "In general, if you go through a school
where ratemyteachers has really taken hold, you can really determine if
that atmosphere is in the classroom."
He said the site, which includes advertising, is breaking even, but he
hopes it will soon make a profit.
Critics, including many teachers and principals, said the site's ratings
are unscientific, not to mention hurtful. Many school districts across
the country, including Montgomery County and Loudoun County, have blocked
access to ratemyteachers.com from school computers.
They fear that, instead of improving teaching, the ratings could push
already stressed teachers out of the profession by subjecting them to
public, although anonymous, barbs.
Linda Bigler, a teacher for 30 years, said she looked at the site just
once before deciding she didn't plan to look at it again. Most of the
more than 60 comments posted on the site about Bigler, a Spanish teacher
at Fairfax County's Thomas Jefferson High School for Science and
Technology -- where the site has been especially popular -- are positive,
but she said the first negative comment she read stung.
"One negative comment, one negative interaction, is the thing that
you go home with," she said. "If you have something
constructive, you say it in a polite and well-mannered way. The [Web
site] encourages the contrary. I think a site like this encourages
venting and unloading a frustration for whatever reason."
The site lets students rank teachers on a scale of 1 to 5 -- with 5 being
the top grade -- for their easiness, helpfulness and clarity and then
fill out a comment section. Comments on the site range broadly, often
bashing and praising the same teacher. Teachers get criticized for
telling bad jokes, assigning too much reading and having poor hearing.
Hussey said 1,600 student volunteers work with the site, reading every
posting before it goes public. They are supposed to exclude comments that
are potentially libelous, sexually explicit, profane or unrelated to
teaching. A function lets visitors to the site red-flag any comment they
feel is out of bounds. Hussey said every flagged comment is reviewed by
an adult. Scathingly negative comments stay, he said, as long as they
relate to classroom atmosphere. Although teachers have threatened to sue
the site, none has done so, he said.
Alek Montgomery, 17, a senior at Park View High School in Sterling, said
the site can reveal things about teachers that they should know but that
students may be too frightened to tell them face to face.
"Teachers are there to teach us," she said. "If they're
not making something clear or they need to slow down, they need to
know."
Hussey said the site gets more positive than negative comments.
"She made reading a 'want' instead of a 'need,' " wrote one
student about an English teacher in Virginia.
"This is a man unequaled by his peers, except possibly in the case
of God, who very well might be one of his peers," a student wrote
about a Maryland teacher.
Another dismissed the same teacher as boring.
"Bring two pillows. One for you, and one for your pillow," a
student wrote.
Students are not the only ones interested in candid talk about teachers.
Some parents said the site, if taken with a grain of salt, could be a
good way to learn about teachers their children might
encounter.
"I'm curious what they're writing. I think young people would be
more curious, and incoming freshmen parents would find it even more
curious," said June Cofield, mother of two Howard County
students.
But principals and teachers dismiss the idea that the site could be used
to improve instruction. The same students can post again and again, or
teachers can go online and critique themselves or colleagues -- something
Hussey acknowledged has happened. Marshall Peterson, principal of Oakland
Mills High School in Columbia, noted that teachers at his school who have
been rated often have no more than 12 or 13 comments posted.
"Over the course of two years, that teacher very easily has taught
200-plus kids," he said. "Would you take anything that was a
sample of 13 of 200? No."
Hussey said his mother is an art teacher in Maine but has not yet been
rated. And if she got poor marks? "I'm not too worried," he
said. "I think she's pretty well respected by students."
*******************************
Washington Post
October 6, 2003
Spam Fighters Turn to Identifying Legitimate E-Mail
By SAUL HANSELL
The software engineers helped create the spam problem. Can they solve
it?
As politicians have been racing to find ways to ban the junk e-mail known
as spam, Internet providers have been boasting about filtering
technologies capable of identifying the sort of messages typically sent
by spammers and disposing of them.
But the spammers have been keeping ahead of the law and the filters. The
open nature of e-mail technology designed decades ago by computer
scientists who had little reason to anticipate spam lets spammers
hide their tracks and transform many of their messages to avoid
detection.
As a result, many e-mail software experts now contend that the most
powerful way to clean people's mailboxes is to focus not on catching the
spam, but on identifying the legitimate mail.
"People have been spending all their time creating filters to find
the bad guys," said Nico Popp, vice president for research and
advanced products of VeriSign, the largest registrar of Internet sites
and a seller of online identification systems. "We want to turn that
on its head and find ways to identify the good guys and let them
in."
Put simply, these efforts are trying to develop the Internet equivalent
of caller ID, a technology that will let the receiver of an e-mail
message verify the identity of the sender. As with caller ID for
telephones, senders will be able to choose whether to remain anonymous.
But also like caller ID, recipients may presume that those who do not
identify themselves are sending junk.
The loudest calls for such a system are coming from the banks, travel
companies and online stores that are finding that much of their e-mail is
getting caught in spam filters. The advertisers gave the big Internet
providers an earful recently at a forum sponsored by Doubleclick, an
advertising technology company. The Internet providers responded that
they were working on standards for a new system, and that their
much-delayed proposal would be published this fall.
The technical challenges to creating such an identification system are
daunting. The millions of computers that process e-mail for half a
billion users may need to be retrofitted. Moreover, the Internet is not
governed in any organized way. Rather, it is influenced by impromptu
committees that nudge practices in certain directions.
These plans must compensate for e-mail technology designed two decades
ago by a happy-go-lucky confederation of computer scientists. They
created the protocols the technical communication rules for
e-mail in such a trusting and open way that now anyone can send
e-mail impersonating someone else with little prospect that the messages
can ever be traced to the original sender. Little did these pioneers
suspect that the systems, meant to exchange research papers, would lead
to a global system that provides nearly instant communication for
hundreds of millions of people, yet now is in danger of being overrun by
anonymous purveyors of pills and pornography.
A lot of money is riding on how these problems are solved. And under the
technical discussion of spam fighting systems is a power struggle between
the companies that send a lot of e-mail and the large Internet service
providers. The e-mailers are exasperated with the filters and want a
system that defines their e-mail as legitimate and guarantees its
delivery.
The Internet providers are concerned more about customer complaints and
do not want to promise to deliver any particular mail. Some are also wary
about creating an industry standard for spam fighting, because the big
providers are finding that their proprietary spam filters attract new
customers.
Circling all of these discussions are a group of e-mail handling
companies and other organizations that expect to profit if their
identification ideas are accepted as the standard. (Even the Postal
Service wants to get into the act, with an electronic
postmark.)
The upper hand is probably held by the four largest service
providers Microsoft, America Online, Earthlink and Yahoo
which have been meeting since April to try to define spam fighting
standards. They say they must go slowly out of respect for the
decentralized nature of the Internet (and on the advice of their
lawyers).
"We're very self-conscious about being a big player in the e-mail
business, and we don't want to be seen as laying out the law for
everyone," said Brian Sullivan, senior director for mail operations
at America Online. "We need to build a consensus around a
framework."
There already does appear to be agreement that any system would be
optional for senders. Most likely big commercial e-mailers would use it
at first. Mail from others that did not adopt these new
technologies individuals, small business, those in foreign
countries might still be delivered but it would be subject to
greater scrutiny.
The clearly identified mail "will be like the express line at the
airport," said Kevin Doerr, a business manager for antispam products
at Microsoft. "You will only be frisked once and not thrown in with
the unwashed masses."
Eventually, however, Internet Service providers expect to develop easy
ways to help individuals and small businesses identify their e-mail so
it, too, would have the benefit of the express line through the spam
filters.
Most likely, individual users would not have to do anything differently
as they read their mail. But some of the more elaborate proposals
envision requiring users to get updated software that they could set to
determine the sort of e-mail they want to read or delete.
There is also a growing agreement that it is not enough for an e-mail
sender to identify itself. The sender must also earn the trust of e-mail
recipients, by promising to follow certain standards and having
violations tallied and published. That would let people choose to discard
mail from senders with high complaint rates.
"Just because we can verify your identity doesn't mean you send good
email," said Miles Libbey, the manager for antispam products at
Yahoo. "You absolutely need identity and you also need
reputation."
Deciding whose mail will be delivered and whose will be bounced is a
thankless task, and most proposals envision that several independent
groups would publish e-mail standards. A sender would choose one of these
to follow, and that group, in turn, would monitor its compliance. Truste,
a group that monitors Web site privacy policies, wants to get into that
business.
The biggest unanswered question is how to identify each sender in a way
that cannot be counterfeited. As with so many other issues, there is a
choice between simple and quick solutions that are limited and
technically flawed and more comprehensive approaches that will take years
to fully adopt.
The most robust, but most complicated approach would have every sender
attach to each message a unique code, called a digital certificate, which
the recipient's Internet provider or e-mail software could authenticate.
Others argue that a far simpler approach would be good enough: they
propose the creation of a registry of e-mail servers the computers
that process the mail for big companies and internet providers
whose owners have been verified. Any mail sent from an unregistered
server would be automatically suspect.
The Internet service provider group appears to prefer this approach, at
least as a first step.
But the big e-mail senders, and some security experts, say that it would
be flawed. They note that spammers appear to be skilled and shameless
hackers. Many have found ways to secretly take over the computers of
unsuspecting people to relay their messages and to attack computers used
by groups that fight spam.
Only digital certificates, they say, can clearly distinguish legitimate
e-mail senders from counterfeit ones.
"It's not easy to change something as successful and widely used as
e-mail," said Richard Reichgut, a vice president at AuthentiDate, a
company that has a contract to develop electronic postmarks based on
digital certificates for the Postal Service. "But the only way to
fix e-mail is to have a strong way to know who is sending you
mail."
Moreover, using digital certificates can allow finer distinctions among
mail from one sender. A bank's credit card statements might get one
identifier and its offers of new services another.
"My concern is that the solution not be penny-wise and
pound-foolish," said Hans Peter Brondmo, a senior vice president of
Digital Impact, a company that sends mail on behalf of big companies.
"We could take six more months and have something that is far more
comprehensive."
Mr. Brondmo is one of the main developers of Project Lumos, a sender
identification proposal by the E-mail Service Provider Coalition, a group
of big e-mail senders.
Some Internet service providers acknowledge that ultimately some form of
digital certificate may be useful. But they disagree that the simpler
approach, based on an existing identification number assigned to each
server called Internet Protocol address, is too vulnerable to
attacks.
Internet Protocol "spoofing is hard to do and easy to detect,"
Mr. Doerr of Microsoft said.
And that position is endorsed by Paul Q. Judge, the chairman of the
Anti-Spam Research Group of the Internet Emerging Issues Task Force, one
of the main groups that publishes standards for the Internet.
"There is a huge gain that can happen today with I.P.-based systems
that use existing technology," Mr. Judge said. "The benefit of
having a certificate for each individual e-mail is not worth the hassle
and the cost."
*******************************
Government Computer News
10/03/03
Federal Reserve checks out new servers
By Patricia Daukantas
The Federal Reserve System needed more computing power for its
check-clearing operations, and the most cost-effective upgrade proposal
came from its in-house IT staff.
Dennis Heidlebaugh, a capacity planner with the Federal Reserve IT group
in Richmond, Va., used a modeling tool to estimate how much to boost the
server capacity at one of the Fed?s processing centers. Heidlebaugh spoke
yesterday at a Washington conference sponsored by BMC Software Inc. of
Houston.
His group was asked to take over systems management for the Fed?s
check-processing business, which has private-sector competitors. The
check application, running on IBM SP servers under AIX, was poised for
significant growth and experiencing some performance problems, he said.
In the short term, the IT group used the Predict function of BMC?s Patrol
for Unix-Perform & Predict to try out combinations of existing
equipment and transfer some of the workload to a standby server node. For
the long term, however, hardware would have to be upgraded or acquired.
Working with projected check growth, Heidlebaugh?s team drew up scenarios
for two-hour peak processing periods and modeled them with Perform &
Predict. The first set of models predicted that several CPU nodes would
become overloaded. Based on the models, Heidlebaugh recommended that the
processing center upgrade its hardware to IBM p670 eServers.
That configuration turned out to be less expensive and more expandable
than proposals from four outside vendors, he said, partly because fewer
IBM DB2 licenses would be needed on the more powerful servers.
*******************************
Government Executive
October 6, 2003
Homeland security, crime are focus of tech-related bills
By Chloe Albanesius, National Journal's Technology Daily
The outcry over the 2001 antiterrorism law known as the USA PATRIOT Act
manifested itself in new Senate legislation last week.
Patrick Leahy, D-Vt., and Larry Craig, R-Idaho, authored the measure, S.
1695, which would expand the "sunset" provision in the PATRIOT
Act so that additional government surveillance powers granted in the
statute would expire after five years. The bill's backers said the
measure would let Congress review whether the goals of the law are being
met.
Craig, meanwhile, introduced an additional bill that would amend the
PATRIOT Act. The measure, S. 1709, would limit the use of surveillance
and the issuance of search warrants.
Sen. Carl Levin, D-Mich., addressed another homeland security issue in
new legislation: background checks. His bill, S. 1665, would allow
employers looking to hire private security officers to submit
fingerprints or other means of identification to state identification
bureaus in order to check the applicants' records for crimes.
Two other security measures also were filed this week: H.R. 3227, which
would require the Homeland Security Department to establish guidelines
for "first responders" to emergencies; and H.R. 3235, which
would revoke federal highway funds to states that issue driver's licenses
to illegal aliens.
On the crime front, two House and Senate companion bills, H.R. 3237 and
S. 1706, seek to improve the FBI's National Instant Criminal Background
Check System (NICS) by imposing new requirements on the Justice and
Homeland Security departments. NICS was established as part of the law
requiring background checks for people wanting to buy handguns as a way
to determine if applicants can have firearms under federal or state
law.
Two other companion bills, S. 1700 and H.R. 3214, seek to improve the
current system for DNA testing. Specifically, the measures would work to
improve the technology used to compile DNA samples, reduce DNA backlogs,
improve training for the handling of DNA, strengthen the quality of legal
representation in death-penalty cases and facilitate access to DNA
testing for inmates.
Other technology-related bills introduced this week included:
H.R. 3233, which would require financial institutions to notify
consumers, credit-reporting agencies and law enforcement when security
information is compromised.
H.R. 3220, which would set standards for state taxes on "business
activity," with the goal of ensuring that businesses are not taxed
merely because their Web sites can be viewed by someone in a given state.
S. 1688, which would provide tax breaks to companies that do not transfer
their business operations overseas.
H.R. 3228, which would stop normal trade relations with China.
*******************************
Washington Post
Study: More Privacy Protections Needed as Location-Based Services Emerge
By ELSA WENZEL
Monday, October 6, 2003; 1:55 PM
BRUSSELS, Belgium - Terrorism-fighting tools and the rise of "little
brother" digital devices threaten to erode Europeans' right to be
left alone, according to a study released Monday by the European
Commission.
Policy makers need to work now to properly balance security and privacy
before emerging technologies - such as mobile phones that pinpoint
drivers' locations - become a part of daily life, the study
says.
The study does not attempt to define the proper balance. The objective,
rather, was "to underline the fact that the balance established over
years of democratic process has been upset."
After the Sept. 11, 2001, terrorist attacks in the United States,
"many governments enhanced their surveillance powers, but at the
risk of affecting privacy," the report states.
The findings come as the European Union and the United States struggle
over a U.S. law that requires airlines to provide data on passengers,
including credit card information, travel agencies used, seating and
dietary preferences.
"I would hope that the EU would use this report as an opportunity to
re-establish its pre-eminence in the field of protection of
privacy," said Simon Davies, director of the London-based watchdog
group Privacy International.
"There's been a need for caution for many years but now the
sensitivity should be much higher."
The EU report addresses emerging technologies that will reveal a lot
about consumers in the not-so-distant future.
For instance, tiny, inventory-control radio tags hidden in anything from
chocolate bars to blue jeans may be able to identify shoppers' likings,
perhaps even direct them to specific departments when they enter a store.
Computers can also analyze data gathered to predict someone's mood or
purchases of food, drink or vacations.
Later this month, the EU head office will propose electronic privacy
legislation that officials said will address some of the concerns
enumerated in the study.
For instance, it will require that location information generated by
mobile phones can only be used or passed on by network operators with the
consent of the user, unless it is an emergency call.
"Citizens are not prepared to let privacy be one of the casualties
in the war on terrorism," Philippe Busquin, the European Union's
commissioner for research, said in a statement.
*******************************