[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips November 6, 2003
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, glee@xxxxxxxxxxxxx;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, computer_security_day@xxxxxxx;, waspray@xxxxxxxxxxx;, BDean@xxxxxxx;, mguitonxlt@xxxxxxxxxxx, sairy@xxxxxxxxx;
- Subject: Clips November 6, 2003
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Thu, 06 Nov 2003 11:16:58 -0500
Clips November 6,
2003
ARTICLES
Windows spamming attracts FTC's notice
Senate Debate Due on Hotly Contested Internet Tax Bill
Fairfax Judge Orders Logs Of Voting Machines Inspected
Infrastructure Official Draws Praise for Job
U.S. Agencies Surf for Translators
New Web site for consumers rates home care providers
China to invest in Linux-based software industry
Pure technology not the only answer to accessibility
IRS builds accessibility into enterprise architecture
*******************************
CNET News.com
Windows spamming attracts FTC's notice
Last modified: November 5, 2003, 10:05 PM PST
By Reuters
U.S. regulators on Wednesday voiced concerns about a feature in Microsoft
Windows that could subject Windows users to unwanted pop-up ads.
The U.S. Federal Trade Commission said it had scheduled a press
conference for Thursday "to address consumer concerns" about a
little-used feature of Windows called the Windows Messenger service.
The FTC cited problems with "widespread exploitation" of the
Messenger service. The Windows feature is unrelated to popular instant
messaging software. It's designed instead to allow computer network
administrators to send messages to others on their network.
The agency declined to elaborate, but Messenger has been the subject of
security concerns because purveyors of unsolicited e-mail, or spam,
discovered they could use it to send messages to personal computers that
are connected to the Internet. The messages are especially confusing
because they look as if they've been generated by the operating system
itself. Most PC users, too, have no idea why the ads are appearing or how
to prevent them from showing up.
Complaints last month about the abuse of Messenger prompted Microsoft to
advise computer users on how to shut off the feature as a way of blocking
the ads.
Microsoft said it would issue a software update in the first half of next
year that would shut off Messenger, spokesman Sean Sundwall said. Future
versions of Windows will be shipped with the feature turned off by
default, he said.
Microsoft won't be part of the FTC's Thursday press conference, Sundwall
said.
"Certainly we applaud the FTC for its ongoing efforts to educate
consumers and also to drive policies that help ensure that consumers have
a safer, more secure computing experience," Sundwall said.
Complaints about Messenger spam also have prompted the largest U.S.
Internet service provider, Time Warner unit America Online, to take steps
to turn off the feature on its subscribers' computers.
"It was delivered through a back door," AOL spokesman Andrew
Weinstein said. "It was incredibly confusing for users and
incredibly annoying as well."
Last year Microsoft settled complaints from the FTC about another
unrelated matter, agreeing to submit to government oversight of its
online identity service in order to settle charges that it misled
consumers about security and privacy standards.
The identity service, called Passport, aims to make online shopping
easier by storing passwords and credit-card numbers. FTC officials said
they found that Microsoft did not adequately protect users' personal
information, and that the service tracked users' Web-browsing habits
without their knowledge.
*******************************
New York Times
November 6, 2003
Senate Debate Due on Hotly Contested Internet Tax Bill
By JOHN SCHWARTZ
A long-delayed federal Internet tax bill that would turn a temporary
moratorium on taxes on Internet access into a permanent ban is scheduled
for debate today on the floor of the Senate.
The argument over the bill has been as heated as a chat-room brawl.
Opponents contend that state coffers will be emptied as more areas of
commerce - like telephone service - become Internet-based and fall within
the ban. "Every time we, in our wisdom, tell a state or a city that
it cannot use this tax, all we are doing is increasing the chance that
Minnesota or Tennessee will increase some other tax, or fire some
teachers or lay off some employees or close some parks," Senator
Lamar Alexander, Republican of Tennessee, said Tuesday on the Senate
floor.
Supporters argue that the states want to tax every e-mail message, even
every electron. The bill, they say, will not have the dire effects that
opponents predict. "You now have what amounts to a final assault on
the bill," said Senator Ron Wyden, Democrat of Oregon, who is
sponsoring the bill with George Allen, Republican of Virginia.
Senator Wyden said that his opponents had been predicting "the fall
of Western civilization" since the first moratorium passed seven
years ago. "Who do you want to believe, the people who were wrong
over the last seven years, or the facts?" he asked in a telephone
interview.
The only thing that both sides agree on, it seems, is that the bill has
nothing to do with banning sales taxes on online purchases. The
moratorium bans taxes on Internet access, including high-speed access
through telephone digital subscriber lines; "discriminatory"
taxes, which include taxes by multiple states on the sales of a single
item; and taxes that would treat Internet purchases differently from
sales at brick-and-mortar stores.
The moratorium, which was passed in 1998 and extended in 2001, expired on
Nov. 1. The House has already passed a similar version of the bill. The
new bill would take away the right to tax Internet access from a handful
of states, including Texas and Wisconsin, which passed such taxes before
1998 and have been allowed to keep collecting those taxes under a
grandfather clause. It would also cancel taxes on residential digital
subscriber line access being levied by more than 15 states, causing the
loss of as much as $80 million a year in total revenue to those states,
the Congressional Budget Office said.
Bush administration officials weighed in yesterday, urging Congress to
pass the bill. "Keeping the Internet free of multiple or
discriminatory taxes will help create an environment for innovation and
will help ensure that electronic commerce remains a vital, and growing,
part of our economy," Treasury Secretary John W. Snow and Commerce
Secretary Donald L. Evans said in a joint statement. "A permanent
moratorium means a permanent victory for American consumers and
businesses."
But state and local governments oppose the bill. David Quam, the director
of state-federal relations for the National Governors Association, said
that the "the debate is over whether you want to reach into state
and local pockets in these difficult fiscal times, to unnecessarily
expand the scope of the moratorium to existing state and local
taxes." Mr. Quam said that despite assurances from Senator Wyden to
the contrary, the bill would help companies evade billions of dollars in
state and local taxes on telecommunications and other services. "Our
position has always been, if you're going to pre-empt state and local
law, then you need to do it precisely, so there are no unintended
consequences of that action," he said.
Senator Alexander has called the bill an unfunded federal mandate because
it restricts the ability of states to impose taxes. In his speech
Tuesday, he said that he would raise a point of order that would require
51 senators to waive the ban on unfunded mandates and suggested that he
might demand a companion law that would use federal money to repay the
states for any lost revenue. "If we think it is so important, we
should pay the bill," he said.
Senator Wyden said that the bill would not exempt telecommunications and
other services from taxation, and that he had worked with Senator
Alexander and the states to write language in the bill to resolve any
ambiguity.
He acknowledged that state and local governments had "very
significant financial needs," but said, "they don't come about
because of Internet tax policy - they come about by misguided tax
policies put in place by the executive branch and its supporters"
and because of a "fumbling economy."
States have long wanted to be able to collect taxes from Internet
merchants who sell within their borders, just as they have wanted to
collect sales taxes on catalog and telephone sales. But under a 1992
Supreme Court decision in Quill Corp. v. North Dakota, merchants are only
required to collect sales taxes in those states where they have a
physical presence, or nexus.
"They can't overturn Quill, they can't overturn mail order, they
can't overturn phone sales," Senator Wyden said. "They see this
as the last cash cow they can possibly milk."
*******************************
Washington Post
Fairfax Judge Orders Logs Of Voting Machines Inspected
By David Cho
Thursday, November 6, 2003; Page B01
It took more than 21 hours from the time polls closed Tuesday night for
Fairfax County, the putative high-tech capital of the region, to get
final election results from its new, computerized vote
machines.
Widespread problems in the system, which the county paid $3.5 million to
install, also opened the door to possible election challenges by party
leaders and candidates.
School Board member Rita S. Thompson (R), who lost a close race to retain
her at-large seat, said yesterday that the new computers might have taken
votes from her. Voters in three precincts reported that when they
attempted to vote for her, the machines initially displayed an
"x" next to her name but then, after a few seconds, the
"x" disappeared.
In response to Thompson's complaints, county officials tested one of the
machines in question yesterday and discovered that it seemed to subtract
a vote for Thompson in about "one out of a hundred tries," said
Margaret K. Luca, secretary of the county Board of Elections.
"It's hard not to think that I have been robbed," said
Thompson, whose 77,796 recorded votes left her 1,662 shy of reelection.
She is considering her next step, and said she was wary of challenging
the election results: "I'm not sure the county as a whole is up for
that. I'm not sure I'm up for that."
Meanwhile, attorneys for local Republicans and GOP candidate Mychele B.
Brickner, who lost her bid to chair the Fairfax County Board of
Supervisors, went before a Circuit Court judge yesterday morning, asking
him to keep 10 voting machines under lock and key and not to include
their tabulations in the results. The machines, from nine precincts
scattered across the county, broke down about midday Tuesday and were
brought to the county government center for repairs and then returned to
the polls -- a violation of election law, Republicans argued.
The judge said the activity logs of all 10 machines will be inspected
this week, with members of both major parties present.
"It's like Florida in many ways," said the Republicans'
attorney, Christopher T. Craig, referring to that state's 2000
presidential ballot-counting controversy. "This is about ballot
integrity. . . . A lot of people have been telling us they couldn't vote
for someone. . . . I have been hearing that there are a lot of
problems" with the county's new WINvote computer
technology.
As more details emerged yesterday, county officials defended the system.
Luca insisted that most of the problems had less to do with computer
glitches than human error.
"The new machines get an A-plus," she said. "It's the plan
to collect the vote that gets the failing grade."
Fairfax purchased the 1,000 touch-screen vote machines this year from
Advanced Voting Solutions of Frisco, Tex. The machines, which resemble
laptop computers, were used countywide Tuesday for the first time, and
the problems that resulted mirrored what occurred in Montgomery County
last year when similar new technology was used. The equipment in
Montgomery County was blamed for delayed results and confusion at the
polls.
Fairfax officials had confidently promised that their machinery would
work much better, citing a battery of tests conducted last week. They
also predicted that the system would greatly speed the reporting of
results.
Instead, it churned out one of the slowest vote counts in
memory.
Much of the delay occurred at 7 p.m. when the polls closed. Most of the
county's 223 precincts attempted to send in their computer tallies at
once, overloading the system. Many poll officials ended up calling in
their numbers, but some couldn't get through and instead drove their
results to the county government center.
In at least 19 precincts, results were officially sealed in the mistaken
assumption that they had been sent by computer modem, officials said
yesterday. Sealed results cannot be opened unless all three election
board members are present, which led to further delays.
In addition, software errors kept the results from two precincts from
being posted until about 4:30 yesterday afternoon.
"Everyone seems to be aghast at how this could happen,"
Thompson said. "But this seems like something you could have had the
foresight to see."
John Service, 50, of North Springfield said it took him four or five
tries to register his vote for Thompson, and he wondered whether some
voters were disenfranchised. "I am concerned about voters who might
have been in a rush and didn't go back and check to make sure all the
names [they intended to vote for] appeared on the final ballot," he
said.
The glitches forced a handful of precincts to return to paper ballots.
And even at polls where computer problems didn't arise, voter
unfamiliarity with the technology created long lines.
Some voters gave up -- a thought that crossed Jeff Fisher's mind.
Fisher, 43, of Annandale said he almost walked out of his polling place
when a woman in front of him spent 10 minutes getting through the
ballot.
Others, though, wondered why so many people had problems with the
machines. "I thought it was very easy to vote, and I'm not even that
bright of a kid," Al Richards, 61, of Falls Church said.
*******************************
Washington Post
Infrastructure Official Draws Praise for Job
By John Mintz
Wednesday, November 5, 2003; Page A27
Robert Liscouski still has the pierced ear but not the long hair that he
sported in the 1970s, when he was an undercover narcotics officer in
northern New Jersey selling marijuana and cocaine to biker
gangs.
Now Liscouski, 49, has a higher-ranking job, but one requiring the same
long hours and cool demeanor that he exhibited as a narc -- he is the
Department of Homeland Security's top official protecting gas pipelines,
railroads, dams and other critical facilities from terrorist
attacks.
The job of assistant secretary for infrastructure protection is one of
the most challenging in the 170,000-employee department, as well as one
of the main reasons Homeland Security was created, officials
said.
While many of the department's divisions are being criticized for
disorganization, Liscouski's 200-person shop is widely praised for the
crispness of its analysis and its efficiency. Some members of Congress
who are highly critical of other Homeland Security offices praised
Liscouski's performance, as did a number of industry figures.
"He's very knowledgeable on issues of infrastructure
protection," said Ronald Dick, a former top FBI counterterrorism
official who is now director of national security and foreign affairs at
Computer Sciences Corp., a federal contractor. "He's got some huge
challenges addressing things never done before in this
country."
Some defense experts say the war on terrorism is one of the first U.S.
national-security crises in which the government is forced to ask for
voluntary help from wide swaths of industry. It is Liscouski's job to
secure that help.
U.S. intelligence says al Qaeda is interested in targeting elements of
the nation's critical infrastructure -- sites as diverse as the Hoover
Dam, Three Mile Island nuclear plant and the DuPont chemical complex in
Delaware. The terrorist network's central goals would be to cripple the
economy and strike symbols of U.S. power.
From the government's point of view, the problem is that many of those
facilities -- some of whose destruction could devastate communications or
transportation or commerce -- lie in private hands. So Liscouski must
jawbone to persuade industry executives to blanket the facilities with
security.
"We need to frame our arguments to CEOs [in favor of spending money
to secure corporate assets] on the basis that it is good for
shareholders," besides being good for the country, Liscouski said.
After leaving the Bergen County, N.J., detective squad in 1980, Liscouski
joined the State Department's security office in Europe. It was the early
1980s, when German, Italian and Palestinian terrorist groups were on the
loose in Europe. Liscouski protected U.S. Ambassador Maxwell Rabb in
Rome, trained foreign security agents and acted as the department's
representative to Interpol.
In 1991, he joined a software firm, Orion Scientific, and sold
data-sorting software to U.S. intelligence and law-enforcement agencies.
Six years later, he set up a small company, largely with his own money,
that researched news and market trends for corporate clients.
Ultimately his firm went under, and he joined Coca-Cola Co.'s security
division.
Far from simply guarding gates, his office was in charge of protecting
Coke's secure data -- including its all-important product formulas -- as
it zipped across the 200 countries in which the company operates.
Liscouski also helped handle all manner of crises, such as a 1999 health
scare in Belgium stemming from allegations that Coke cans had been
contaminated and leading to a $250 million recall.
"At Coke, I learned you have to articulate a business argument for
why to spend money on security," he said.
"Bob's DNA is he's very focused, very dedicated, and when he's
committed to something, he does it 1,000 percent," said James Hush,
a Liscouski friend and Coke vice president also in security.
Liscouski joined Homeland Security on March 24, only weeks after the
department was formed as the combination of 22 separate agencies. It was
also a few days into the Iraq war, and the imposition of the highest
security alert in U.S. history. National Guard troops guarded some
nuclear plants, and hundreds of other sites were locked down as never
before.
Despite having a staff that was only a fraction of what his budget called
for, Liscouski was one of the top officials coordinating this security
alert. "There was so much to do and so few people to do it," he
said, recalling months of hectic 20-hour days.
His key task is examining the possible threats against U.S. industry --
as gleaned from, for example, the vague intelligence picked up in
interrogations of captured al Qaeda operatives -- and matching them with
the possible vulnerabilities at thousands of key sites and networks
across the country. Then he takes action to batten down the
hatches.
House Democrats, declaring in a recent report that "two years is too
long to wait," criticize Liscouski's shop as too slow in finishing a
listing of which parts of the infrastructure are most at risk. But agency
officials say the delay is caused by his office's understaffing and the
importance of the task.
One question facing Liscouski is whether the government should demand
through regulation that industries secure themselves, or let them do it
voluntarily.
"Only time will tell," he said. "We're now using the bully
pulpit, but industry has to step up and take responsibility."
Harvard University information policy professor Anthony Oettinger said he
cannot imagine anyone better suited to crack such a challenging
puzzle.
"Bob's range of expertise is astonishing," said Oettinger, who
chairs a CIA science advisory panel on which Liscouski served as a
member. "He's got such common sense, and he's unflappable. . . .
He's bedrock."
*******************************
Washington Post
U.S. Agencies Surf for Translators
A Dearth of Linguists Sends CIA, FBI to Web
By John Mintz
Thursday, November 6, 2003; Page A31
The CIA and the FBI are launching a program to help solve the shortage of
linguists in Arabic and other languages, which officials say has become a
crisis in the fight against terrorism. They're going online and creating
a "virtual" network of bilingual university students,
professors and other language experts.
When the National Virtual Translation Center starts operations Dec. 1, it
will initiate an unusual and perhaps risky plan: hiring individual
language speakers around the nation who haven't worked in government to
translate documents and audiotapes sent to their homes or offices by
e-mail.
In the past, the CIA, the National Security Agency (NSA) and other
agencies had to obtain security clearances for their translators and then
bring them to the location of the untranslated materials -- to
Afghanistan, say, to translate al Qaeda documents, or to secure vaultlike
U.S. government facilities where classified data could be
reviewed.
"Historically we brought linguists to the material, but now we'll
get the material to the linguists," the new center's director,
Everette Jordan, said in a recent interview. "It means we can move a
lot faster."
To Kevin Hendzel, a spokesman for the American Translators Association
(ATA), which is working closely with the Pentagon, the CIA and FBI on the
linguist shortage, the new program is "truly revolutionary" and
"perhaps the most important innovation to address this great
national security priority."
Government officials say the backlog of untranslated documents -- and of
unexamined tape recordings of conversations surreptitiously recorded by
the NSA -- has become so colossal that they need to try something
new.
"We're feeling trapped in the way we've always done things,"
said Jordan, a 27-year translator and administrator for the U.S. Army and
the NSA. "The situation is dire."
Officials naturally are moving on other fronts, too -- the FBI and CIA
have hired up to 500 translators since Sept. 11, 2001, and intelligence
agencies are upgrading computers that translate texts automatically or
can sort through vast amounts of data to find the most telling
passages.
Jordan is officially announcing the new effort at an ATA conference today
in Arizona.
The FBI will oversee day-to-day operations of the center, which is housed
in a downtown Washington office building near FBI headquarters. But along
with Congress, CIA Director George J. Tenet has been the driving force in
creating it.
At least 300 non-government employees are expected soon to be working as
center contractors, with most coming from universities, companies and
private laboratories. Jordan is scouring the country for experts in
fields including economics, politics, immunology and metallurgy who also
know languages such as Arabic, Farsi, Pashto, Bahasa Indonesian and
Korean.
Most of them will get a cursory background check and will not receive
full security clearances. Those working at this level will not be given
secret materials to translate, but they will do more humdrum work, such
as translating transcripts of a Chinese biotechnology conference or texts
on Iran's oil industry.
The translators won't be informed of the context of the government's
interest in the documents.
The idea is to fill in the U.S. government's knowledge of societal trends
in those countries, in the same way that the CIA spent years scrutinizing
the Soviet bloc's politics and economics during the Cold War.
Most of the government's best linguists grew up speaking the languages
being translated and understand the subtle nuances in dialect and
culture, officials said. Jordan added that in Arab culture, people often
speak in allegorical or mystical terms that can flummox even expert
outsiders.
Jordan has a reputation as a star at the NSA, say people who know him. He
learned French and Spanish effortlessly in high school. Posted to Germany
while in the Army, he mastered first German and then Russian. He started
his work in the NSA in 1982, and for years he wore headphones listening
to Soviet military officers discussing their work and their lives --
though he refuses to discuss it.
In 1990, he learned Arabic and shifted to work in that part of the world.
But ever since he appeared at his superiors' instruction in a CNN
documentary about the NSA in March 2001, he has been unable to travel
abroad for security reasons.
His center will struggle to overcome many academics' innate unease about
working with the intelligence community, officials said. Since the
Vietnam War and scandals about the CIA in the 1970s, some college
professors and administrators have come to view intelligence
professionals as "baby killers," Jordan said.
Likewise, suspicion pervades intelligence circles about working with
academics, said Jordan, who added that it won't be easy persuading
intelligence officials to entrust their untranslated documents to college
professors lacking full security clearances.
"To them, it's having strangers do your work," Jordan said,
"a bit like sending your kid off to kindergarten in another
town."
*******************************
USA Today
New Web site for consumers rates home care providers
Posted 11/5/2003 8:30 PM
INDIANAPOLIS (AP) Consumers attempting to unravel the myriad home
health care choices before them have a new tool: a Web site with a
federal database rating licensed providers in 11 areas.
The federal Center for Medicare and Medicaid Services went online with
its Home Health Quality Initiative this week after setting up a similar
program for nursing homes two years ago. Consumers can access the
database at the Web site
www.medicare.gov.
The home health database shows providers' improvement rates in 11 areas,
such as the percentage of patients who improve at bathing and those who
are confused less often. It includes state providers and state and
national averages.
"From the consumer standpoint, it's important to be empowered with
information," said Suzanne Baker, director of St. Vincent Home Care
in Indianapolis.
The database allows users to find home health providers by state, county
or ZIP code, and provides basic information about the services offered,
such as speech pathology or occupational therapy.
"Most families when they encounter the need for home care have no
idea what to do," said John Cardwell, chairman of the Indiana Home
Care Task Force, an alliance of 70 organizations.
Cardwell suggests consumers also contact one of their state's Area
Councils on Aging, which also maintain information on individuals, such
as nurses and former nursing home employees, who may not be licensed home
health providers. Dealing with a licensed agency increases the likelihood
of receiving good service, he said.
The nursing home database rolled out in November 2001.
Consumers without Internet access can call toll-free 1-800-MEDICARE.
Staff will work with them to file information requests that can be
printed and mailed.
*******************************
USA Today
China to invest in Linux-based software industry
November 5, 2003
BEIJING (Reuters) The Chinese government plans to throw its
financial weight behind Linux-based computer systems that could rival
Microsoft's Windows in one of the world's fastest-growing technology
markets, an official said on Wednesday.
China would build a domestic software industry around Linux a
cheaper software standard that can copied and modified freely said
Gou Zhongwen, a vice minister at the powerful Ministry of Information
Industry.
"Linux is an opportunity for us to make a breakthrough in developing
software," he was quoted as saying on the ministry Web site
www.mii.gov.cn.
"But the market cannot be developed on a large scale without
government support."
Gou did not give details on the amount of planned government investment
in Linux.
China's information technology market is growing at 20% a year, with
software sales expected to reach $30.5 billion in 2005, according to
research house International Data Corp.
The domestic industry is dominated by Microsoft, Oracle, IBM, Sybase,
UFSoft and Kingsoft.
Japan, China and South Korea agreed in September to collaborate on
building a new computer operating system as an alternative to Windows.
Japanese media reported they would likely build an open-source system
such as Linux. (Related story: China, Japan, South Korea agree to develop
non-Windows operating system)
Chinese officials have said they preferred to use software with open
source codes to ensure that software guarding sensitive state information
and networks cannot be tampered with easily.
The government has been pushing the development of a homegrown software
industry and a national standard for Linux to counter the dominance of
Windows.
*******************************
Government Computer News
Pure technology not the only answer to accessibility
By Thomas R. Temin
November 6, 2003
When it comes to accessibility products for deaf or hard-of-hearing
users, sometimes cool technology alone doesn?t cut it. That?s because
translating for the deaf involves subtle cultural issues that no
technology can fully overcome.
At the IDEAS Section 508 conference yesterday in Washington,
Hewlett-Packard Co. officials demonstrated a product called
iCommunicator. The PC application accepts live voice input, converts it
to on-screen text, then converts the text to video images of sign
language. The software draws on a library of several thousand short clips
of a professional sign linguist, according to Gail Rosenberg, product
manager for iCommunicator.
Because it links text to the video clips, the signing produced is in
word-for-word order, not idiomatic English. And it included what several
deaf observers thought was an inordinate amount of finger-spelling. Thus
the video output is mechanical and disconcertingly unlike American Sign
Languagein effect the signing equivalent of eerie synthesized audio
voices.
Rosenberg, who is also a certified audiologist, said that as more whole
signed words are added to the library, the amount of finger-spelling, in
which the signer spells out words letter by letter, would be reduced.
More revealing was the question from a deaf observer of the
demonstration. Fredrick Waldorf, a retired FBI employee, asked whether
the model in the video clips was deaf or hearing. Rosenberg said the
model is hearing and has a deaf son.
Asked afterward the significance of the question, Waldorf, joined by
Stephanie Phillips of the Agency for International Development and Brenda
Sue Pickering of the Interior Department, said through an interpreter
that skilled signers include inflection and emotion through their faces
and hand movements. And, while not criticizing iCommunicator itself, they
added that deaf people can tell whether a signer is deaf by body language
and style in arm and hand motions. Often, they said, deaf people are
sensitive that such cues that can create emotional affinity with the
signer, whether live or on video.
*******************************
Government Computer News
IRS builds accessibility into enterprise architecture
By Wilson P. Dizard III
The IRS has incorporated Section 508 requirements into its enterprise
architecture and lifecycle management policies.
"Section 508 compliance has to be part of an agency's business plan
and enterprise architecture" because 10.7 percent of IRS employees
have disabilities, T.J. Cannady said yesterday.
Cannady, the IRS' program manager for the Information Resources
Accessibility Program, and other officials from the tax agency discussed
the service?s efforts to comply with Section 508 of the Rehabilitation
Act Amendments of 1998 during a panel at the Interagency Disability
Educational Awareness Showcase 2003.
IRAP provides technical support to IRS offices as they work to make
systems compliant, Cannady said.
At the IRS, IT planners are trying to building compliance into systems
from the start to minimize costs. "Section 508 compliance can be
expensive if you try to add it on the back end," she said. "You
have to plan for it from the beginning.?
The idea is comparable to the agency?s view on the application of the Tax
Code, Cannady said. "I am reminded of the IRS mission statement of
applying the tax laws with integrity and fairness to everyone."
Charles Murray, an IRS computer scientist, emphasized that Section 508
compliance is included in the enterprise lifecycle plan the service
adopted in 2001.
Janice Thomas, an accessibility technology specialist for IRAP, said
incorporating 508 requirements into an agency's enterprise architecture
involves much more than just adding a paragraph summarizing the law's
requirements.
The requirements must be integrated into enterprise architecture
provisions that detail applications technology, software development and
telecommunications systems, Thomas said. "You want to make sure you
are developing systems that serve everyone."
The requirements also must apply to methods of interacting with the
public as well as to an agency?s help desk and support services, she
said.
Murray added that the best way to ensure that 508 considerations are
being taken into account during systems development is to create project
milestones for developers to review accessibility considerations.
*******************************
MSNBC
Who falls for e-mail scams?
A look at what happens after victims fall for ?phish? stories
By Bob Sullivan
MSNBC
Nov. 4 It certainly looked like the real thing. Full of eBay logos
and links, the e-mail said their accounts were expiring, and they?d
better fill out a form quickly or risk losing their current auctions. So
they did typing in everything from drivers license numbers to
credit card PINs. Since then, thieves have attempted to steal their money
and their private information has been posted on the Internet for all the
world to see. The lapse in judgment was momentary, but the consequences
continue to unfold.
WHAT?S THE EASIEST way to steal
consumers? personal data for identity theft? Just ask them for it.
So-called ?phisher? e-mails, which
look like authentic notes from real companies like eBay, Citibank or
America Online, are a growing problem for Internet users, who continue to
fall for the dupe and give away credit card numbers, Social Security
numbers, and other critical personal data.
The e-mails are remarkably
successful, say Internet scam artists who?ve discussed their techniques
anonymously with MSNBC.com. One claimed as many as 10 percent of
recipients fill out the forms, which take advantage of the ease with
which genuine Web sites are copied. With imitation artwork and text a
fake Web site can look like the real thing to anyone not looking
closely.
Anyone can be tricked by the phisher
e-mails.
MSNBC TV anchor Contessa Brewer fell
for the ploy in September, giving up her Social Security number to a Web
page that looked like an authentic one from America Online. The instant
she hit submit, she knew she had made a mistake.
?I know better,? she said. ?But I
had just moved, and I was filling out a whole lot of forms at the time,
and this just seemed like one more form.?
ONE E-MAIL, MANY VICTIMS
That?s just about what happened to
dozens of consumers who answered one such phisher e-mail sent out in
July. Eventually, their data reached its way to a chat room devoted to
swapping ?phish? stories, enabling MSNBC.com to contact the victims and
hear their stories.
One victim, when shown the chat room
log, responded with astonishment.
?There?s my cell number. My PIN.
Wow, that?s scary,? said Nikki Rizzi of New York. ?My Social Security
Number. Look at that.?
The information was posted to the
chat room apparently as the result of a dare from one member to the
other. Internet fraud artists looking to sell ?hot? financial account
information often post a slice of the stolen data to boost their
credibility.
All of the victims contacted had been hit
with some kind of financial fraud but few had made the connection between
the fake eBay e-mail and the fraud until contacted by MSNBC.com. Several
didn?t even remember filling out the form.
Contrary to conventional wisdom,
most of the victims were Internet-savvy. Several regularly check their
credit cards and bank statements online, for example, and discovered
their identities had been stolen just that way. Still, the e-mail was
convincing enough to dupe them.
?They sent you e-mail posing as
eBay. The page looks so real, you fall for it and give them all your
information,? said Ed Dwyer, of Thompson Falls, Mont. Like the other
victims, Dwyer surrendered virtually all the keys to his financial
kingdom: His bank name, account number and routing number. His credit
card number, expiration date, and PIN number. Even his Social Security
number, driver license number, date of birth and mother?s maiden
name.
Two weeks later, Dwyer, 34, was
watching TV when he heard the Federal Trade Commission was warning people
about the phisher scams. The examples the FTC cited were identical to the
eBay e-mail Dwyer had received.
?Right then I felt like a sucker,?
he said.
But he?s hardly the only one.
Rizzi, 25, fell for the same scam.
Then, during one 15-minute span in September, someone made seven separate
$200 cash advance withdrawals from his MBNA credit card. Four other
attempts later that night were stopped.
?I was out coming home from gym and
went to use my card and it was invalid,? Rizzi said. ?The next day I
checked it out online, and there were seven transactions done but I still
had my credit card in my hand. Whoever it was used my credit card number
to make a fake credit card and had my PIN.?
Rizzi didn?t know how the criminal
had managed to get the PIN until he was reminded of the eBay look-alike
e-mail by MSNBC.com.
?I do remember that one . ... I
thought it seemed weird,? he said. ?But being a young person, you embrace
the Internet.?
Rizzi has since changed banks,
canceled all credit cards and moved, making most of the stolen data which
appeared in the public chat room useless. But not all of it.
?I can?t change my Social Security
number,? he said. ?What am I supposed to do about that??
FRAUD ALERTS HELP
Experts say that best thing for
victims to do is check their credit reports which are available for
free to victims of identity theft and to place a ?fraud alert? on
their records at each of the three credit reporting bureaus. But none of
the victims interviewed for this story had taken that step, or were
advised to do so by their financial institutions.
Randall Allen, of Witchita, Kan.,
thought he was being careful. He uses eBay to buy equipment for his
company and set up a special credit union account just for online
purchases. Allen maintained only a fractional balance in the account,
just in case a criminal ever managed to access it. He even checked the
account weekly.
Still, the original eBay look-alike
e-mail was enough to fool Allen.
?I remember filling in the
form,? he said. ?Now, I feel like, gosh I just gave them the keys to
everything, didn?t I??
He discovered something was wrong
when an overdraft notice appeared on the account, after someone moved
$100 out of it.
A couple of weeks later, a sales
representative at Gateway called him after someone tried to buy a new
computer via automatic withdrawal from his credit union. But by then, the
account had been blocked.
A LOT OF LOST TIME
Allen, like all of the other victims
interviewed for this piece, hasn?t yet lost any money because of the
identity theft, thanks to refunds from the financial institutions
involved. But he did lose a lot of time half a day at the credit
union office dealing with paperwork, followed by more paperwork later, he
said.
?It took me a lot of time to take
care of this,? Allen said. ?Luckily, I watch my money. But I want this
kind of stuff to stop. I cannot believe people do this.?
David Aasum of Rochester, Minnm. had $800
wired out of his bank account in September, when most of the financial
crimes connected to the July eBay look-alike e-mail took place. It?s not
clear why the successful ?phisher? waited so long.
?I monitor my accounts all the
time,? Aasum, 60, said, adding that after he discovered the withdrawal,
?it was immediately taken care of by my bank.? By that Aasum means that
his bank put $800 back into his checking account. But the bank didn?t
advise him to take other steps to protect his now stolen identity, such
as contacting credit bureaus, he said.
Fraud fighter Dan Clements, who
operates a credit card fraud awareness Web site called CardCops.com,
spotted the chat room where the data was posted and shared the
information with MSNBC.com.
?It?s really just a numbers game,?
Clements said. ?(Criminals) send out hundreds of thousands of those, and
if they get just a few back they are ahead of the game.?
While it?s easy to criticize victims
for divulging personal information, Clements said so many Internet users
are falling for the trick that the financial industry has to do more than
simply blame the victims.
?Busy professionals, sophisticated
people see an e-mail with the right logos, fill it out, and hit submit.
Lots of times, an instant later, they think, ?What have I done,? but it?s
too late,? he said. ?We have seen that the banking industry has been slow
to respond to some of these issues.?
EBay could do a better job warning
consumers, too, Aasum suggested.
?When I got it, I did try to contact
the real eBay, and they never responded,? he said. But he has received
other notices from eBay saying the firm would never ask for information
such as credit card PIN numbers. ?I guess I don?t know what eBay could
really do,? he said.
*******************************