[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips October 30, 2003
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, glee@xxxxxxxxxxxxx;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, computer_security_day@xxxxxxx;, waspray@xxxxxxxxxxx;, BDean@xxxxxxx;, mguitonxlt@xxxxxxxxxxx, sairy@xxxxxxxxx;
- Subject: Clips October 30, 2003
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Thu, 30 Oct 2003 14:57:00 -0500
Clips October 30,
2003
ARTICLES
Massachusetts eyes 'e-prescribing' regulations
Toner firm gets key support in DMCA spat
White House: Web site doesn?t steer clear of Iraq
U.K. plans to extradite spammers
E-mail providers try to stop spam
U.S. to Install Biometric Screens
Spammers using Matrix as bait to plant trojans
*******************************
USA Today
Massachusetts eyes 'e-prescribing' regulations
Posted 10/29/2003 1:42 PM
BOSTON (AP) State health officials Tuesday proposed regulations
making it easier for doctors to electronically "sign"
prescriptions.
"E-prescriptions" are legal, but the Department of Public
Health's proposed rules would eliminate the requirement that pharmacists
verify each one. The goals are to reduce medication errors and
prescription fraud.
"Written prescriptions can be misread, dosage information can be
misread. That can lead to mistakes being made," DPH spokeswoman
Rosanne Pawelec said.
The state's Public Health Council must approve all regulations. A public
hearing is planned in December before a vote is taken.
There were three million preventable "adverse drug events"
associated with the one billion prescriptions filled in the United States
in 2001, according to a report from the Massachusetts Technology
Collaborative.
The DPH proposal would require doctors use an image digitizing device
that attaches the writing to an electronic prescription.
*******************************
CNET News.com
Toner firm gets key support in DMCA spat
Last modified: October 29, 2003, 4:29 PM PST
By Declan McCullagh
Staff Writer, CNET News.com
The U.S. Copyright Office has sided with Static Control Components in a
high-profile lawsuit over whether the company may sell chips that permit
Lexmark International toner cartridges to be refilled.
As part of a 198-page opinion released late Tuesday, the office said
Lexmark's invocation of the Digital Millennium Copyright Act (DMCA) in
its lawsuit against Static Control was invalid. Lexmark is the No. 2
printer maker in the United States, behind Hewlett-Packard, and
manufactures printers under the Dell brand.
The opinion is not binding on the judges who are considering the case,
which is now before the 6th Circuit Court of Appeals in Cincinnati, Ohio,
but it is expected to be influential. In February, U.S. District Judge
Karl Forester granted Lexmark a preliminary injunction ordering Static
Control to cease selling its Smartek chip.
Static Control CEO Ed Swartz on Wednesday said the opinion was so
sweeping that he may begin selling a second chip with similar
functionality that would not be covered by the injunction. "It gave
us a clear-cut legal path to create a chip that there are no legal issues
with," he said. "We think we've done that, but we're going back
and double-checking everything."
William "Skip" London, the company's general counsel, said:
"We have developed code for such a chip. We've shown this code to
Lexmark. Lexmark has taken the position that we can't sell it."
Swartz said that he has not made a final decision on public sales yet.
Static Control is a small Sanford, N.C.-based company that sells printer
parts and other business supplies.
Lexmark did not respond to repeated requests for comment.
When enacting the DMCA in 1998, Congress ordered the Copyright Office to
conduct regular reviews of one portion of the law. The Library of
Congress, which oversees the Copyright Office and reports to Congress,
was permitted to exempt specific groups from being covered by part of the
DMCA.
During the October 2000 round, two exemptions were set: Filtering
researchers could study blacklisting techniques, and obsolete
copy-protection schemes could be legally bypassed. Those exemptions were
due to expire this month, but the Copyright Office renewed them and added
two additional ones covering e-books and hardware dongles.
In an unusual move, the Copyright Office said that Static Control did not
need a specific exemption for selling toner chips, because other parts of
the DMCA already permitted it. "It appears that the congressional
scheme sufficiently enables the non-infringing uses sought without
requiring the assistance of an exemption in this rulemaking," the
Copyright Office said.
That portion of the DMCA says engineers may bypass a technological
measure "for the sole purpose of identifying and analyzing those
elements of the program that are necessary to achieve
interoperability" with other computer programs. Under a section of
the DMCA, it is generally unlawful to circumvent technology that
restricts access to a copyrighted work.
In hopes of boosting sales of its own brand of toner cartridges for its
T-series laser printers, Lexmark embedded a technological measure that
prevents third-party remanufacturing and consumer use of its
remanufactured "Prebate" toner cartridges. Inside those
cartridges is a simple software program called the Toner Loading Program
designed to let the printer estimate how much toner remains. Before a
T-series printer permits a cartridge to be used, it insists on performing
a secret handshake, a kind of authentication, with the Toner Loading
Program.
This system created a problem for consumers who wished to refill their
own cartridges, but an opportunity for Static Control, which sold its
Smartek chip that mimicked the authentication sequence used in Lexmark
chips and tricked the printer into accepting aftermarket cartridges.
Swartz of Static Control said the Copyright Office was trying to send a
signal to the courts. "They're not going to allow anyone to use the
DMCA as a means to gain an electronic monopoly," he said. "They
think the DMCA applies to entertainment, not products."
In addition to raising the DMCA claim, Lexmark's original complaint also
alleged traditional copyright infringement, saying the Smartek chips
contain "unauthorized, identical copies of Lexmark's copyrighted
Toner Loading Programs."
If that allegation were proven to be true, the Copyright Office was
careful to say, the existence of the DMCA loophole might not save Static
Control from liability. "The wholesale copying of a copyrightable
computer program is likely to be an infringing use," the office
noted.
*******************************
Associated French Press
US cyber-diplomacy now up and running
Wed Oct 29, 5:51 PM ET
WASHINGTON (AFP) - US diplomacy has officially entered the electronic age
with the completion of a two-year, multi-million-dollar project to
provide Internet access to all US embassies and consulates, the State
Department said.
Some 44,000 foreign service officers and other embassy staffers are now
able to surf the worldwide web at Washington's more than 260 often
far-flung diplomatic missions from Afghanistan (news - web sites) to
Zimbabwe, spokesman Richard Boucher said proudly.
The project -- a priority of Secretary of State Colin Powell (news - web
sites) since he took office in 2001 -- was completed last week when the
last unwired mission, the US embassy in Khartoum, Sudan, came on-line on
October 23, he said.
"One of the first things (Powell) asked for was funding to bring the
State Department into the modern, electronic age: indeed, he called for a
'state-of-the-art' State Department," Boucher told reporters.
In addition to the Internet access project, the State Department has now
linked 224 of its posts to classified e-mail and intranet systems, he
said.
A second department official said the upgrades had cost a total of 207
million dollars and had come with warnings not to use the new capability
to download pornography or other questionable material found on the web.
"To say that is discouraged would be an understatement," the
official said.
US diplomats, often considered stodgy in demeanor, are not generally
known to embrace new technology with enthusiasm and the State Department
has lagged behind other government agencies and private businesses in
making improvements.
Powell, however, is a confirmed computer fanatic and has pressed hard to
bring the foreign service establishment into the cyber-age.
Boucher said the recently completed projects were part of an overall
initiative to modernize the department, including the gradual elimination
of the time-honored staple of embassy communication: the embassy cable.
"Now that we've got to this state of the art, we've got a program to
make sure we stay there," he said.
*******************************
Government Computer News
10/29/03
White House: Web site doesn?t steer clear of Iraq
By Joab Jackson
The White House today dismissed charges that its Web site was
deliberately guiding search engines away from pages about Iraq, saying
its Web team was only trying to avoid duplication.
?It?s lubricious,? said White House spokesman Jimmy Orr, replying to
charge issued by a Democratic Party Web site.
Search engine spiders, which index content on the Internet, were directed
away only from indexing duplicate pages, Orr said.
?All the material on the White House Web site is fully searchable by our
search engine,? Orr said.
Orr was responding to a minor tempest arising from a Web page authored by
Keith Spurgeon, a New York resident who works in the Internet industry.
On Oct. 24, Spurgeon noticed that the White House Web site carried
instructions for search engines not to index certain White House Web
pages about Iraq.
Internet search engines such as Google use spiders to crawl through Web
sites and index the contents.
Frequently indexed sites often post a file, called ROBOTS.TXT, that
instructs spiders to not index certain pages on that site. These files
usually list pages that have scripts, file-pointers and other forms of
content generally more of interest to computers than potential readers.
Spurgeon, however, said he saw that the White House?s ROBOTS.TXT file
listing 783 files or directories with the term ?Iraq? in their titles,
most of them leading to pages about the recent combat operations in that
country.
Spurgeon had searched the ROBOTS.TXT file when he noticed that the Google
search engine, owned by Mountain View, Calif.-based Google Inc., had not
indexed all of the White House?s pages. He then found an earlier version
of the White House ROBOTS.TXT file, dating from April 2003, with only 10
instances of the word ?Iraq.? Spurgeon did not speculate on why the White
House disallowed these pages.
But other observers had no shortage of theories.
The Democratic National Committee Web log, linking to Spurgeon?s site,
accused the White House of historical revisionism. Google and other
engines keep copies of the pages they index. So not allowing a search
engine to cache a page means that fewer alternate copies of a page will
existand so it will be easier for the White House to change a document
without people noticing.
Dan Gillmor, a technology columnist for the San Jose Mercury News,
speculated on his Web log: ?Perhaps the White House doesn't want to make
it easy for people to compare its older statements about Iraq with
current realities.?
The pages that were listed were duplicate pages, Orr said. Last summer,
the White House set up a section of the site devoted of issues relating
to Iraq at
www.whitehouse.gov/infocus/iraq/index.html.
Although this section has a different look-and-feel from the rest of the
White House site, it uses many documents that are also posted elsewhere
on the site, such as press releases relating to the combat effort.
The ROBOTS.TXT file lists those documents that appear in multiple places
on the site, Orr said. The staff wanted to reduce the number of duplicate
items that someone would see by doing a search on the site.
Although agreeing most of the pages are duplicates, Spurgeon maintains
that the file does have pointers to pages without duplicates.
?We?ve tried to eliminate redundancies on the site,? Orr said. Orr
oversees administration of the White House site, which has about 33,000
documents. A staff of 10 people manages the site, he said.
*******************************
CNET News.com
U.K. plans to extradite spammers
Last modified: October 30, 2003, 7:54 AM PST
By Reuters
British lawmakers hope to use a new tactic to stop the torrent of junk
e-mail that floods in from overseas: Extradite the mass-mailers and bring
them to trial in the United Kingdom.
"Spammers are no longer an irritant; they are a threat,'' British
Member of Parliament Brian White said Thursday. The United Kingdom last
month was the second European Union country after Italy to criminalize
spam in a law that goes into effect in December.
But the law has drawn criticism from antispam crusaders who say it will
be powerless to stop the flood of messages at the source. The majority of
spam originates overseas, and in particular, the United States, industry
experts say.
While initially, extradition would be used to target spammers, it could
be expanded to include suspects in other cybercrime cases such as
virus-writing and hacking, White added.
White said he and fellow British lawmakers traveled to the United States
earlier this month where they talked to FBI officials about extraditing
American spammers who violate British laws.
"The FBI's reaction was, subject to the individual case, they
couldn't see any problem with it,'' he said.
U.K. and U.S. law enforcement authorities have a long history of
cooperation in criminal matters, a relationship that has only grown
stronger in the wake of the Sept. 11, 2001, attacks in America and their
subsequent crackdowns on subversive groups.
The rise of spam, that flood of unsolicited e-mail offering everything
from porn and cheap mortgages to a full head of hair, has become an
urgent matter for lawmakers around the world.
Lately, law enforcement officials have begun to crack down on spam as a
growing amount contains child pornography and as spam messages have been
used in a spate of recent fraud scams that target online banking
customers.
White said spammers could be extradited if they violated the Computer
Misuse Act, a 13-year-old U.K. law that makes it illegal to tamper with
and damage another user's computer.
Therefore, a spammer who sends e-mails that contain viruses or Trojans,
programs capable of taking over another user's computer, would be grounds
for extradition, White said.
"The majority of spam is either breaking the law regarding fraud,
obscenity, child pornography, or (distribution and marketing) of
prescription drugs. We wouldn't get every spammer under all three of
those laws, but you could get a majority,'' he added.
The challenge for prosecutors will be building a strong enough case
linking spammers with a particular crime as most operate under aliases
and have effectively disguised their whereabouts.
Story Copyright © 2003 Reuters Limited. All rights
reserved.
*******************************
MSNBC
E-mail providers try to stop spam
Engineers tinkering with technical architecture of service
By Jonathan Krim
THE WASHINGTON POST
Oct. 30 Congress recently edged closer to passing the nation?s
first law to curb e-mail spam, but those who work under the Internet?s
hood are attacking the problem from another angle.
RATHER THAN trying to flag and prohibit
unsavory messages, as a Senate bill that passed last week would attempt,
they are tinkering with the technical architecture of e-mail so that
computers will be able to recognize good mail.
Then, the theory goes, it is a
relatively simple matter to block all other e-mail from getting
through.
For the past nine months, several
separate initiatives by technologists at e-mail and Internet provider
companies have sought to crack the problem, but solutions have been
elusive. A major hurdle is that spammers exploit the very attributes of
e-mail that help make it popular: Anyone can send mail directly to anyone
else and can do so anonymously if they choose.
The result is that it can be
difficult to sort good from bad. Not only can spammers devise fictitious
Internet addresses to mask their locations, but increasingly they are
forging the addresses of legitimate individuals and companies.
Now, efforts to make such identity
?spoofing? more difficult are beginning to yield results. The software
code for one such approach, put forth by a small e-mail account company
in Philadelphia, was made available this week.
Meanwhile, a trade group of direct
e-mailers issued a blueprint for its system last month.
And Microsoft Corp., America Online,
Yahoo Inc. and EarthLink Inc. the top Internet provider and e-mail
account companies that joined together to work on the problem last
spring are close to an announcement on a ?trusted sender?
system.
?We have to allow legitimate senders
of e-mails to distinguish themselves from spammers,? said Harry Katz, a
program manager at Microsoft.
DIFFERING APPROACHES
The approaches by the different groups
vary, but they all hinge on retooling e-mail so that servers the
computers that power networks of other computers can mark mail that
is sent as trusted and identify those same characteristics when the
e-mail is received.
?The impunity of anonymity? for bulk
mailing must be stopped, said J. Trevor Hughes, executive director of the
Network Advertising Initiative, a consortium of companies that do bulk
e-mailing for firms marketing products and services.
Last month, the group unveiled the
first outlines of a plan, dubbed Project Lumos, to certify e-mail and to
electronically measure the reputations of bulk mailers.
Like other initiatives, the plan
relies on bulk e-mailers voluntarily adopting a set of technical
standards for adding information to the ?header? portion of a message,
which provides routing information for the Internet?s e-mail
system.
Internet account providers such as
AOL, Yahoo, Microsoft and EarthLink would adjust their incoming mail
servers to recognize the new information and block mail sent in bulk that
does not include the information.
To be certified, bulk mailers would
have to agree to abide by rules that would require them to take certain
actions, such as providing easy ways for consumers to stop getting
messages. The system also creates an electronic scoring system that rates
mailers based on the number of complaints they receive for failing to
comply with the rules, and incoming mail servers could block mail from
mailers with low compliance.
The proposal and other such efforts
are being followed closely by a loose federation of organizations that
govern the Internet?s plumbing.
?Project Lumos is a well-thought-out
proposal,? said Paul Q. Judge, chief technology officer for CipherTrust
Inc., a Georgia-based e-mail security firm. He also is co-chairman of the
Anti-Spam Research Group, one of many such groups under the umbrella of
the Internet architecture board.
PREVENTING ADDRESS FORGING
Another system, known as SPF, for senders
permitted from, simply seeks to stop spammers from hiding behind
fictitious Internet addresses or forging the addresses of others, a
tactic known as ?Joe-jobbing.?
?People get Joe-jobbed every day,?
said Meng Wong, chief technology officer and founder of Pobox.com, a
Philadelphia-based e-mail account provider. ?Spammers forge their e-mail
address and then send huge spams. The only thing their [Internet
provider] can do is to shut off their mail.?
Under Wong?s system, companies that
operate outgoing mail servers would electronically ?publish? the numeric
Internet addresses of all confirmed machines that send mail from its
domain.
Every Internet-connected computer is
assigned such an address by its Internet account provider.
When an e-mail arrives that purports
to be from an aol.com address, for example, the incoming mail server
could check to see whether it is indeed coming from a numeric Internet
location that AOL has assigned. If not, the AOL address has been spoofed,
and the mail would be rejected.
If AOL account holders are spamming,
they can be easily found.
Wong acknowledged that his system
would not work if a spammer is exploiting a worm that allows him to
actually commandeer another computer and launch spam from that machine.
In that case, the spam is coming from a legitimate source, even though
the owner has nothing to do with it.
Wong said that Internet providers
have expressed interest in his system and that one spam-blocking software
company, SpamAssassin, will include it in its next version.
Katz of Microsoft said that the
working group of top Internet providers plan to have an announcement of
its system in the coming weeks.
Katz said that to be effective, any
of these new initiatives will require a ?tipping point,? or a threshold
of participants after which a firm that did not join in would be at risk
of losing business.
A spokesman for America Online said
that identifying good mail is ?an elixir, not a panacea.? He added that
his company remains committed to its filtering system as well as to
collaborative research on other approaches.
Hans Peter Brondmo, one of the
technical architects of the Project Lumos initiative and a senior vice
president at bulk mailer Digital Impact Inc., said he does not know whose
initiative will prevail, but he thinks the first step will be an Internet
address check along the lines of Wong?s plan by the end of this
year.
But a broader solution is at least a
year away, he said.
?I?m reasonably good with crystal
balls, but not so good with timing,? Brondmo said.
*******************************
Wired News
U.S. to Install Biometric Screens
12:56 PM Oct. 29, 2003 PT
WASHINGTON -- The public got its first look Tuesday at fingerprinting and
photo equipment that will be installed at 115 airports and 14 seaports to
check identities of millions of foreign visitors.
The equipment, which goes into use Jan. 5, will allow inspectors to check
identities of visitors against those on terrorist watch lists.
"This gives us the ability to know those who would violate a visa or
overstay a visa," said Asa Hutchinson, undersecretary for Border and
Transportation Security in Homeland Security.
A General Accounting Office report issued last month called the system
"a very risky endeavor" with daunting goals, likely high costs
and details that had yet to be worked out. The GAO said the system could
lead to long lines at ports of entry.
But Hutchinson said it will add only a few minutes to the inspection of a
traveler while significantly enhancing national security.
Travel industry groups have voiced concern in the past that the system
could hurt the industry. Members of the Travel Industry Association of
America were meeting with Hutchinson about the new system Tuesday.
"It has to be effective and in fact improve security, and it has to
do it without adding a really onerous burden to travelers to the United
States," said Dexter Koehl, an association spokesman.
The system consists of a small box that digitally scans fingerprints and
a spherical computer camera that snaps pictures. It will be used for the
estimated 24 million foreigners traveling on tourist, business and
student visas who enter through an airport or seaport.
Fifteen of the 19 Sept. 11, 2001, hijackers entered the United States
legally on travel visas. Three were admitted with business visas. The
19th entered on a student visa. At least three of the hijackers had
expired visas. The new system will gradually phase out a paper-based
system that Congress mandated be modernized following the attacks.
The "exit" portion of the system to ensure visitors leave when
required still is being developed, but officials showed off an electronic
kiosk, much like those used to dispense e-tickets at airports. The kiosk
would allow foreigners to scan documents and provide fingerprints as they
leave.
A person whose fingerprints or photos raise questions would not be turned
away automatically. The visa holder would be sent to secondary inspection
for further questions and checks. False hits on the system have been less
than 0.1 percent, officials said.
Training on the system and a tryout will begin next month at the Atlanta
airport. Originally, the system was scheduled to begin operation Jan. 1,
but Hutchinson said its debut was delayed to avoid the busy holiday
travel period, a decision made after consultation with industry groups.
Congress provided $368 million to produce the system and put it in
airports, but only provided $330 million of the $400 million President
Bush requested to put the system in land borders in 2004.
Hutchinson said the lower appropriation could affect meeting deadlines
for next year. He said he does not anticipate a user fee like the $100
foreign students may pay to cover the costs of a student tracking
system.
*******************************
Australian IT
Spammers using Matrix as bait to plant trojans
By Sam Varghese
October 29, 2003
Another day, another little bit of social engineering by spammers in a
bid to use email and trick users into downloading trojans to their
computers.
This time the bait being used is a download of Matrix Revolutions, the
third film in the series which is due out in November.
Canberra-based sysadmin Daniel McNamara, who did a spot of investigation
after he received one such email, said it purported to offer a download
to the first 1000 users.
The email reads:
Matrix Revolution is coming out on 5th of November.
You don't have to catch your cinema ticket up.
Only 1000 people can download its FULL movie from our site. Get it now
before too late!
The images in the email link to a genuine movie site; the text hyperlinks
go to a bogus site.
McNamara followed the trail using the text browser elinks on a Linux
machine to avoid getting his own machine infected. Such trojans only work
on computers running the Windows operating system.
His investigation led him to conclude that a trojan which reports back to
an internet relay chat server is planted on the computer of those who
visit the site.
"I can't be 100 percent sure that this is the case as I don't have a
sacrificial machine to use for tracking," he said. "I'll pass a
copy of the trojan on to the major anti-virus companies and let them
complete the job."
*******************************