[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips October 8, 2003
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, glee@xxxxxxxxxxxxx;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, computer_security_day@xxxxxxx;, waspray@xxxxxxxxxxx;, BDean@xxxxxxx;, mguitonxlt@xxxxxxxxxxx;
- Subject: Clips October 8, 2003
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Wed, 08 Oct 2003 13:53:13 -0400
Clips October 8,
2003
ARTICLES
Despite Lines, Voting Goes Smoothly
Judge suspends Vonage order [Internet Telephony]
Fairfax's Anteon Wins Homeland Security Contract
Crime gangs honing Net skills, says cyber cop
Stolen video game source code circulating
OMB officially names Haycock chief architect
Homeland Security ready to start ordering technology
DHS adopts biometrics for border control
P2P group seeks cross-industry detente
*******************************
Washington Post
Despite Lines, Voting Goes Smoothly
Local Polling Places Find Luck With Strategies to Cope With Lengthy
Ballot
By Edward Walsh and Dan Keating
Wednesday, October 8, 2003; Page A19
Voting in California's historic gubernatorial recall election appeared to
go smoothly yesterday, as fears of malfunctioning voting equipment and
widespread voter confusion over a ballot listing 135 candidates to
replace Gov. Gray Davis (D) failed to materialize.
There were long lines at some polling places, where voters began arriving
even before the polls opened at 7 a.m., and scattered reports of polling
places opening late. Los Angeles County officials acknowledged that 15
polling places opened late, but said the latest was only about an hour
after the polls were supposed to open.
But there were no indications of serious problems or irregularities at
most polling places across the state. According to exit polls, almost
nine out of 10 voters said they had no problems with the voting equipment
or the lengthy ballot.
Because local elections officials had only a few weeks to prepare for the
balloting, there were about 10,000 fewer polling places than usual, which
some officials feared might depress the turnout. But that did not appear
to be the case, as the heavy voting continued throughout the day.
Some minority groups did complain that inadequately trained poll workers
failed to help voters who were confused about the location of their
polling place.
The nonpartisan Field Poll projected that as many as 10 million
Californians would vote in the recall election, a 30 percent increase
over the 7.7 million people who voted in 2002 when Davis was elected to a
second term. A turnout of that size, representing 65 percent of the
state's 15.3 million registered voters, would be the largest for any
non-presidential election in California history.
County elections officials mailed out more than 3.1 million absentee
ballots to voters who requested them, and as Election Day dawned more
than 2 million absentee ballots had been returned. The Field Poll
estimated that 2.6 million absentee ballots were to be cast in the
election.
The first part of the ballot that confronted California voters was
simple. It asked whether Davis should be recalled from the office of
governor. That was followed by the second part of the ballot, listing the
names of the potential replacement candidates in random order that
differed in each of the state's 58 counties.
All voters could vote for one of the 135 candidates on the ballot,
whether or not they voted to recall Davis.
Outside his polling place in a mansion in Pacific Palisades, Republican
Arnold Schwarzenegger, who was elected governor in the second part of the
ballot as Davis was recalled from office, joked that he had no trouble
finding his name on the ballot. "I just went through 10 pages, and
you always look for the longest name," he said.
Poll workers in Los Angeles said that during the morning there did not
appear to be much confusion in negotiating the ballot.
"It's a land-office business," said Marshall Wernick, who was
signing in voters at a polling place in a computer store in Los Angeles.
"Usually it's so sleepy, we're like the Maytag repairman. But today,
I've never seen a turnout like this."
Half a block away, at Pipi's Petunia Patch, a flower store that was
doubling as a polling place, poll inspector Lawrence Reyes said more than
230 people had voted before noon. "It has been much busier for this
election than previous elections," he said, noting that 37 had cast
ballots there in the 2002 election.
Reyes said that although people were casting their votes on punch-card
machines, there had been no reported problems with the ballot. "We
encourage everyone to punch it hard so there won't be any chads," he
said. "We also tell them to check for chads."
Edana Tisherman said she had no trouble with the ballot Tuesday.
"There's been so much coverage of this, it's very simple," she
said. "I said, 'Four holes, no chads, we're gone.' "
Vivo Bennett, who was escorting his mother at a Los Angeles polling
place, said he had no problems, either. "It just took a little while
to find who I wanted to vote for in the 135 people [on the ballot],"
he said.
Bennett predicted that many voters who showed up later would be
disheartened by long delays to vote. "They'll be so discouraged they
won't even stay to vote," he said.
Local elections officials faced a variety of problems in preparing for
the unprecedented recall. Yolo County, like many others in the state, had
to change its procedures to deal with the list of 135 candidates for a
single office.
To do that, the names were printed on the fronts and backs of three punch
cards. But the ballot-reading machines have no way to know if a voter
marks one candidate on the first card and another candidate on the second
card, so voters in Yolo County were asked to do the sorting themselves.
Voters were instructed to punch out the spot for only one candidate, and
drop only that card into the ballot box, disposing of the extra two
cards.
Other counties had employees go through the cards to make sure voters did
not cast extra votes on different cards.
At midday Tuesday, Yolo County Clerk Freddie Oakley said she had not
received any complaints about her impromptu system of having voters
separate their own ballot cards, but realized there was some risk in the
system.
"If three little old ladies say they were confused, I'll be
pilloried," she said.
In Santa Cruz County, elections manager Gail Pellerin said the biggest
complaint was about candidates who had dropped out of the contest. She
said people who had cast absentee ballots earlier wanted another chance
to vote.
But in most parts of the state, there appeared to be little voter
confusion. Joan Carlson, 60, a picture framer from Pasadena, had the 2000
presidential election debacle in Florida in mind when she cast her vote.
"It's very easy if you study the ballot beforehand and you know what
page to go to and where your candidate is," she said. "We've
heard so much about chads since the Florida election that it's pretty
much automatic that you flip it over and check for them so you don't have
any problems."
Staff writer Dan Balz and special correspondent Kimberly Edds in Los
Angeles contributed to this report.
*******************************
CNET News.com
Judge suspends Vonage order
Last modified: October 7, 2003, 4:28 PM PDT
By Ben Charny
Staff Writer, CNET News.com
A federal judge on Tuesday ordered Minnesota regulators to stop forcing
Internet phone provider Vonage to abide by state telephone operator
rules.
Judge Michael J. Davis made his decision during oral argument between
lawyers for Vonage and the Minnesota Public Utilities Commission,
according to his clerk's office. A written order will be made available
publicly by Friday.
We're very pleased," Vonage spokesman Mitchell Slepian
said.
The order bars Minnesota's Public Utilities Commission from treating
Vonage, and presumably other voice-over-Internet Protocol (VoIP)
providers, as it does regular telephone companies. In August, the state
ordered Vonage to get the proper telephone company business licenses and
to immediately pay fees to the state's Department of Administration to
support 911 services.
IP phone service is a cheaper form of telephone calling that uses the
Internet, instead of a public telephone network. Free services like Skype
are drawing hundreds of thousands of users, while Vonage and other
subscription Net phone providers are drawing in new converts at a healthy
pace. Cable companies are also using IP phone service to enter the local
phone dialing business.
*******************************
Washington Post
Fairfax's Anteon Wins Homeland Security Contract
By Anitha Reddy
Wednesday, October 8, 2003; Page E05
Anteon International Inc. won a contract from the Department of Homeland
Security to provide a thousand card readers that will be used to check
foreigners' identities at ports of entry, the Fairfax information
technology firm said yesterday.
The machines will become part of the U.S. Visit program, a government
project that will eventually track every foreign visa holder entering or
leaving the country. The contract is estimated to be in the billions of
dollars, and technology contractors of all sizes are angling to get a
piece of the business.
Anteon's card-reader contract, worth $3.6 million, is not part of the
multibillion-dollar contract to build the primary monitoring system.
Though the two contracts are not linked, Anteon and some analysts believe
that yesterday's award could give the company an edge when it competes
for work on the much larger U.S. Visit contract.
With deadlines to begin instituting U.S. Visit quickly approaching -- the
primary contract is to be awarded in May, and the system should be rolled
out by the end of 2005 -- officials in the department will have to rely
at least partially on existing technologies such as Anteon's card reader,
said Mark C. Jordan, an analyst for A.G. Edwards & Sons.
"Clearly, they respect Anteon enough to buy this," Jordan said.
The readers will compare biometric data, such as fingerprints, with the
data stored on 13 million cards carried by permanent immigrants and
Mexican and Canadian citizens who cross the border frequently. The
Department of Homeland Security plans to expand biometric checks to
almost all foreign visa holders by the end of 2004, so Anteon's card
readers will be closely watched as a test of the system on a small
scale.
At least half of the readers will be delivered to the department before
January, so the department may use them to meet its Dec. 31 deadline to
check the fingerprints of all foreign visa holders entering the country
through airports and seaports.
If the readers work smoothly, Anteon's reputation could get a boost
shortly before the Department of Homeland Security awards the giant U.S.
Visit contract to a team of companies in the spring.
"Anytime you can get some type of reference base and show people
that [your product] works and it's cost-effective, that should give you
an advantage," said William R. Loomis, an analyst for Legg
Mason.
Mark Heilman, Anteon's executive vice president of corporate development,
said the Department of Homeland Security's decision to choose Anteon's
laser card readers could set a precedent for other agencies with plans to
introduce smart cards as IDs, such as the State Department.
Lockheed Martin Corp., Computer Sciences Corp. and Accenture are the only
firms leading teams to bid on the broader U.S. Visit contract. Anteon is
a member of one of the teams, but officials declined to say which one.
Eric Stange, head of Accenture's defense and homeland security business,
said in an interview yesterday that the company's team will include
Raytheon Co., Dell Inc., Sprint Communications Co., SRA International
Inc., Datatrac Information Services Inc., Global Technology Management
Inc., Sandler and Travis Trade Advisory Services Inc., and Titan Corp.
SRA International is based in Fairfax, Global Technology Management Inc.
is based in Vienna, and Sandler and Travis Trade Advisory Services is
headquartered in Baltimore.
Lockheed Martin Corp. and Computer Sciences Corp. have already announced
their preliminary teams.
*******************************
USA Today
Crime gangs honing Net skills, says cyber cop
By Bernhard Warner, Reuters
Posted 10/7/2003 10:52 AM
LONDON - Organized crime syndicates have stepped up their presence on the
Internet, operating extortion rackets, child pornography rings and
elaborate financial scams, Britain's top cyber cop told
Reuters.
And the most vulnerable target is the individual Web user, said Detective
Chief Superintendent Len Hynds, head of the UK's National Hi-Tech Crime
Unit (NHTCU).
"Organized crime is turning to the weakest element in the chain,
which is the people. It's the hands on the keyboard on either end of the
transaction that is the actual weak point," Hynds said.
The crime syndicates, he said, are based in every corner of the globe.
Investigations have led the NHTCU repeatedly to Eastern European
countries, including Ukraine, Russia and Latvia.
The groups have honed their Internet skills as a greater flow of business
is conducted online.
"Organised crime in all its guises is extremely flexible. It does
spot the new and lucrative opportunity," Hynds said.
Blackmail, extortion, child porn
In the NHTCU's two-year existence, the 55-person task force has made
nearly 110 arrests for such age-old crimes as blackmail and extortion to
decidedly hi-tech computer hacking cases.
Law enforcement officials throughout the world suspect crime rings are
recruiting technically savvy programmers to concoct fraud schemes against
banks and businesses.
An increasingly common scam hitting financial institutions is known as
"Web site spoofing" in which a fraudster sets up a bogus online
business that closely resembles a bank or business Web site.
The aim is to lure unsuspecting Internet users to the phoney site in an
effort to get them to submit their credit card and bank details. The
NHTCU said 40 UK businesses have been hit by the spoofing scam so far
this year, up from seven a year ago.
From teenage tricks to organized crime
Hacking attacks, once considered the domain of bored teenagers looking to
prove their Net skills, have also become an increasingly common weapon in
organized crime's arsenal, said Hynds.
Some have launched "denial of service" attacks which consists
of a crippling barrage of data capable of knocking Net companies offline
against Internet service providers and online casinos.
Under such a scenario, the groups threaten to unleash the attacks on
businesses unless they pay a ransom.
But the most active area for the NHTCU, and the new cyber investigation
teams everywhere, continues to be breaking up child pornography rings.
Nearly half of the 110 arrests made by the unit have been for
pedophilia-related charges, Hynds said.
"We are focusing on the organized groups that are making money out
of peddling child pornography on the Internet. We are doing that in
partnership with business and industry," he said.
"We've deployed officers from this office overseas to physically
remove children to places of safety," he added.
International police forces have been tackling the rise of child
pornography online with greater success recently. Last week, German
police said they cracked a global paedophile ring that involved 26,500
computer users from 166 countries.
*******************************
USA Today
Stolen video game source code circulating
By Peter Svensson, Associated Press
Posted 10/7/2003 7:05 PM
NEW YORK After perhaps the most egregious case of piracy to hit
video gaming, playable parts of the year's most eagerly anticipated title
were reported circulating online Tuesday.
Gamer Web sites said a considerable portion of Half-Life 2, the sequel to
a very popular PC action game, was available in piracy circles.
The game had been scheduled for release late this year and were
unconfirmed media reports said the leak would force a rewrite of some
parts of the game, delaying its release until April.
Phone calls by The Associated Press seeking comment to the Los Angeles
offices of the distributor, Vivendi Universal Games, were not returned.
Nor were calls returned by the game's developer, Valve of Bellevue, Wash.
According to the gaming fan site Planethalflife.com, a partial version of
Half-Life 2 was "floating around" online. Another site,
hl2world.com, posted screen shots and a video clip apparently from the
pirated game.
"Whatever is out there, I can't say if it's the entire game, but
some people say it is," said Rob Shively, chief executive of network
security consultancy PivX Solutions.
A smaller part of the game's code was available last week after a hacker
broke into a computer at Valve. But that code was of little use to
players. The playable code surfaced early Tuesday.
David Cole, game industry analyst at DFC Intelligence, said Half-Life 2
was expected to be the biggest seller this year. However, he does not
believe the hacked version will have a great effect on sales, since it
will be limited to black market channels.
Games are routinely pirated after their release anyway, he said.
The original Half-Life game, released in 1998, and its spin-off
Counter-Strike are still some of the most played action games online.
*******************************
Mercury News
Posted on Wed, Oct. 08, 2003
Student skirts CD's piracy guard
SOFTWARE COMPANY SAYS IT KNEW OF `SHIFT' TRICK
By Elise Ackerman
A Princeton University student has found he can defeat a highly touted
computer program to prevent music piracy with the stroke of a single key:
``Shift.''
In a paper posted on his Web site Monday, graduate student John
Halderman, 22, said he got around restrictions built into the CD ``Comin'
>From Where I'm From,'' by Anthony Hamilton, a soulful R&B artist. The
CD, released by BMG's Arista Records last month, was heavily promoted as
the first to use copy-management technology. Software included on the CD
limited consumers to burning only three regular copies or to sending
promotional copies that timed out after 10 days.
But Halderman managed to stop the software from installing itself on his
PC.
``In practice, many users who try to copy the disc will succeed without
even noticing that it's protected, and all others can bypass the
protections with as little as a single key stroke,'' he wrote.
Nathaniel Brown, a BMG spokesman, admitted the restrictions could be
bypassed by a determined consumer. But he likened the software, made by
SunnComm Technologies, to a ``speed bump'' that would deter ordinary
consumers from casually making multiple illegal copies.
``It's not going to stop a hacker or someone who wants to mass-copy,'' he
said.
Brown said the company chose to use the technology anyway because it
``offers a new level of playability'' -- which means consumers can now
play the CD in their cars.
Lawsuits filed
BMG, a Bertelsmann subsidiary, and other music companies have sought to
discourage mass copying by taking 261 people to court last month for
sharing songs without permission and threatening other
lawsuits.
SunnComm said Halderman made circumventing its software sound too easy,
and that the company already knew about the loophole. Halderman's paper
could be considered a violation of the Digital Millennium Copyright Act,
a controversial law which prohibits making devices that circumvent
copy-prevention measures, said Peter Jacobs, president of the Phoenix
company.
``I don't see how telling people to press the shift key can be a
circumventive device,'' said Halderman in an interview.
`Hall of fame'
``This technology is going to end up in the hall of fame beside the
previous Sony technology that was famously defeated by drawing on the CD
with a felt-tipped pen,'' wrote Edward Felton, Halderman's adviser, who
publishes a Weblog, ``Freedom to Tinker.'' A Princeton professor, Felton
was threatened by the Recording Industry Association of America in 2001
when he sought to publish research on vulnerabilities in digital
watermarking technology.
Jacobs said he had no intention of suing Halderman under the copyright
act, and that the student should spend his time researching something
more worthwhile. He said, ``This just isn't one of the weighty issues of
the world.''
*******************************
Government Computer News
OMB officially names Haycock chief architect
By Jason Miller
The Office of Management and Budget earlier this week officially hired
Bob Haycock as its first chief architect.
Haycock, whose first formal day in the position will be Oct. 20, has been
on detail to OMB as chief architect from the Interior Department?s Bureau
of Land Management since June 2002.
?My job will not change other than working for Karen directly,? Haycock
said, referring to Karen Evans, OMB administrator for E-government and
IT.
Haycock will take on some of former OMB chief technology officer Norm
Lorentz?s responsibilities, ?but I haven?t had the chance yet to talk
with Karen at length about the changes,? he said. ?I know will continue
to do a lot of the technical stuff, and I will not be doing any of the
political stuff.?
His continuing responsibilities include running the Federal Enterprise
Architecture Program Management Office, developing and implementing the
first iteration of the Federal Enterprise Architecture and working with
the CIO Council to integrate the federal blueprint with agency
architectures, he said.
One of Haycock?s first goals is to finish the Data Performance Reference
Modelthe final piece to the Federal Enterprise Architecture. He said the
model should be released to agencies for formal comment in a couple of
months.
Haycock also will oversee entering data into the Federal Enterprise
Architecture Management Systemwhich agencies will use to find
opportunities for collaboration along similar business
functionsintegrating state and local governments architectures with the
federal blueprint and determining how to better incorporate security into
the architecture models.
He also will have to wait and see whether Congress funds the
administration?s $2.5 million request to support the program management
office efforts.
*******************************
Government Executive
October 7, 2003
Homeland Security ready to start ordering technology
By David J. Wallace, National Journal's Technology Daily
CAMBRIDGE, Mass.The Homeland Security Department is finally "open
for business" for companies offering innovative protective systems,
an industry executive said Tuesday.
Thousands of vendors have given up hope of landing federal security
contracts after two years of waiting for the department to hire staff,
announce programs or standards, and increase budgets, Edmond Woollen,
vice president of Raytheon of Waltham, Mass., told a conference for
Massachusetts companies weighing federal sales. But the window of
opportunity is finally here.
Woollen said he believes Homeland Security has the quickest response of
any government buyer. But he cautioned companies to be prudent and think
long term in pursuit of both independent sales and collaborating with
larger "system engineers" or integrators such as Lockheed
Martin, Raytheon or IBM.
The department is seeking "evolutionary and revolutionary"
technologies that show quantitative improvements in safety, not just
change, said Charles McQueary, Homeland Security's undersecretary for
science and technology.
Of the department's projected $37.6 billion budget for fiscal 2004, $900
million is earmarked for science and technology, including $198 million
to prevent biological attacks, McQueary said. About 400 bidders appeared
last week at the first meeting for vendors of systems for detecting
chemical and biological weapons, he added.
An estimated 85 percent to 90 percent of the $900 million will be devoted
to near-term solutions instead of long-term research, McQueary said,
describing a two-year schedule in which suppliers move quickly from
prototype to installation. Longer-range research still will be done by
other defense-oriented labs or companies, but may be funded by Defense
Department grants or other agencies, he said.
"We need to do things, and it's my view that if we were to have a
science and technology division that was looking five or six years out,
in that time we'd become irrelevant to the department," he said.
"I'm looking for companies, university labs and others that have
solutions todaythings that are relevant to make an impact on overall
homeland security."
McQueary cited the upcoming Oct. 15 release of standards for a $60
million program to protect commercial aircraft from ground attacks. He
said it is more complex to equip passenger planes and meet other federal
standards from the Federal Aviation Administration, for example, than
supplying a contract under military specifications.
With technical standards emerging and budgets growing to fund
anti-terrorism, cybersecurity and transportation infrastructure projects,
companies are aggressively pursuing business in Washington.
Such contracts often are low-profit-margin sales that can take several
years to materialize, said Arthur Coviello, chief executive of Bedford,
Mass.-based RSA Security, which provides digital certificates and other
encryption tools. But he estimates that 10 percent to 15 percent of RSA's
sales are to government.
"Once you're on a contract," he said, "the repeat business
and the lower costs of selling makes it a worthwhile endeavor."
*******************************
Computerworld
DHS adopts biometrics for border control
Large-scale deployments signal growing trend
Story by Dan Verton
OCTOBER 07, 2003 ( COMPUTERWORLD ) - WASHINGTON -- The U.S. Department of
Homeland Security during the past week has jump-started an aggressive
biometric deployment program to help fill gaps in the U.S. border
security perimeter.
The DHS today announced a $3.5 million deal with Fairfax, Va.-based
Information Spectrum Inc. (ISI), a wholly owned subsidiary of Anteon
International Corp., for 1,000 optical-stripe read/write drives and
biometric verification systems for the U.S. Visitor and Immigration
Status Indication Technology, or U.S. VISIT, program. The contract comes
on the heels of an Oct. 3 announcement by the department that it had
signed what's being described as one of the largest contracts in history
for biometric fingerprint-scanning technologies with Minnetonka,
Minn.-based Identix Corp.
Mark Heilman, executive vice president of corporate development at
Anteon, said biometric technology has come a long way over the past
several years, but "the jury is still out" in terms of its
ability to handle a challenge as large and complex as homeland security.
"There are a number of technologies out there, and I think DHS is
still looking for the right mix," Heilman said. "I think there
will be some choices made during the next year or so that will shake out
the industry."
However, the important aspect of his company's recent contract with DHS,
Heilman said, is that it doesn't necessarily represent a commitment to
fingerprint technology. "The optical card doesn't limit them to
using only fingerprint biometric identifiers," he said. "You
could certainly store an iris scan on the card."
The ISI optical drives and biometric verification software will be
deployed to ports of entry around the U.S. for operation on existing DHS
computer systems. The software will enable border-crossing agents to read
the encoded data on any of the more than 13 million permanent-resident
and border-crossing cards issued by the U.S. government, authenticate the
biometric data stored on the cards and alert DHS inspectors to the
presence of possible counterfeit cards.
Meanwhile, through a five-year blanket purchase agreement that could be
worth up to $27 million, the DHS last week said it will begin deploying
Identix's TouchPrint 3000 live-scan fingerprint booking stations and
desktop systems to support the Citizenship and Immigration Services (CIS)
program as well as other departments within the DHS.
The CIS program will use the Identix fingerprint-scanning systems to
digitally capture and electronically submit fingerprint images from
immigration applicants to the FBI. The fingerprints will then be used to
conduct criminal background checks on the applicants before the CIS
decides whether to grant immigration benefits. Live-scan systems are
currently deployed at more than 130 CIS application support centers
throughout the U.S., including the territories of Guam, the Virgin
Islands and Puerto Rico. Other DHS bureaus, including the Bureau of
Immigration and Customs Enforcement and the Bureau of Customs and Border
Protection, also use Identix live-scan technology at ports of entry and
border-control points.
Frances Zelazny, a spokeswoman for Identix, said the Immigration and
Naturalization Service has been using Identix live-scan systems for at
least five years to conduct criminal background checks on people who
apply for immigrant and asylum status in the U.S.
Zelazny added that the DHS today has already issued its first order under
the contract totaling more than $2 million and has announced plans to
extend the contract to its overseas screening operations.
*******************************
CNET News.com
P2P group seeks cross-industry detente
Last modified: October 8, 2003, 6:56 AM PDT
By John Borland
Staff Writer, CNET News.com
At an open meeting Wednesday of a peer-to-peer forum backed by the parent
company of Kazaa, the discussion will turn to a seemingly improbable
concept: how to eliminate piracy from file-swapping networks.
But in their bid to win respectability--as well as economic and legal
breathing room--that's just what Distributed Computing Industry Alliance
(DCIA) founding members Sharman Networks and the affiliated Altnet say
they're seeking: At the group's meeting they'll unveil a plan they say
can turn the millions of monthly music downloads on networks such as
Sharman's Kazaa into cash for artists and record companies.
Evoking shades of Napster's five-year, $1 billion offer to the record
labels in 2001, the plan foresees online revenue of $900 million a month
for record labels--as long as everyone puts past grievances behind them
and agrees to work together on a plan for turning file-swapping networks
into cash cows.
"The goal is to begin a real discussion focusing on robust business
models that have a depth of technical and practical specificity that
makes them credible," said DCIA Chief Executive Officer Marty
Lafferty.
The effort to establish file-swapping companies as legitimate businesses
is picking up in Washington, D.C., but with mixed results.
Another trade association dubbed P2P United, which includes a larger
group of companies including Streamcast Networks, LimeWire and Grokster,
has begun actively lobbying Congress on issues affecting its members and
other Internet companies.
The DCIA, by contrast, isn't explicitly a lobbying group. It was formed
to create a forum where content, telecommunications and file-swapping
companies could hash out and agree on a plan that would allow services
such as Kazaa to exist while soothing content-companies' fears about
losing online revenue.
That's a steep hill to climb, as other companies have found, and as the
DCIA knows. As yet, the "Alliance" portion of its title remains
somewhat theoretical because the group doesn't divulge its members. Not
one of the big five major record companies is on board, something that
will have to happen if any plan is to be universally accepted. The DCIA
says it's in discussions on that matter.
Moreover, the plan being submitted Wednesday bears the clear fingerprints
of Altnet and Sharman, which have outlined similar proposals in federal
securities regulatory filings and in legal briefs that charge the record
industry with antitrust violations. Lafferty said other plans will be
submitted to the group in coming weeks, with an eye toward producing an
open discussion.
The plan's outlines are ambitious and would require a cease-fire among
parties that are now bitter enemies.
A plan, in stages
In a first stage, music companies would let their songs be distributed on
file-sharing networks such as Kazaa, but wrapped in
digital-rights-management tools that would require listeners to pay to
unwrap them. This is roughly the business plan for a joint venture
between Altnet and Sharman, but Lafferty said the technology could be
handled by anyone, not just those companies.
The plan doesn't involve blocking unauthorized versions of songs from the
network, something that the Recording Industry Association of America
(RIAA) has repeatedly suggested. Seeding search results with authorized
versions will be enough to reduce much of the piracy now going on, the
plans' authors predict.
A second stage would let billing for these encryption-wrapped songs be
handled though more familiar means, such as though a telephone number.
Finally, file-identification systems, such as those now being developed
by Audible Magic, would be installed in Internet service providers. When
songs are downloaded, they would be identified by this file watcher, and
swappers would be billed through their Internet service provider, the
proposal will suggest.
By the end of 3 years--assuming everybody involved voluntarily allows the
entire project to happen--the record industry could be making $900
million a month from downloads, Lafferty said.
But bringing everyone on board will be difficult. Sharman is still the
target of lawsuits from the recording industry, and it has filed its own
countersuit against the record companies. The file-swappping companies
affiliated with P2P United say they're deeply suspicious of the DCIA's
Altnet-centric proposals, although they say they are looking for comprise
too.
"It is premature for anyone to claim that they have the solution to
the conundrum of how best to enable a marketplace for tomorrow,"
said Adam Eisgrau, a longtime lobbyist representing P2P United. "We
believe that ideally the parties can come to a table and work something
out. But failing that we think Congress should compel parties to come to
a table."
Lafferty says he recognizes that today's meeting is just the early stages
of a long and difficult attempt to bring respectability to file swapping.
"We're doing everything we can to earn (everybody's) trust," he
said. "It's quite a bit to overcome. We are a peace table, but no
one's declared a truce."
*******************************