[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips November 13, 2003
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, glee@xxxxxxxxxxxxx;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, computer_security_day@xxxxxxx;, waspray@xxxxxxxxxxx;, BDean@xxxxxxx;, mguitonxlt@xxxxxxxxxxx, sairy@xxxxxxxxx;
- Subject: Clips November 13, 2003
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Thu, 13 Nov 2003 12:57:57 -0500
Clips November 13,
2003
ARTICLES
Tech Security Chiefs Form Alliance
Secretary of State Orders Audit of All Counties' Voting Systems
ACA's hand forced on privacy [Australia]
California regulators ponder VoIP
Computer Technicians Sue CSC to Seek Overtime Pay
Zombie machines fuelling new cyber crime wave
Dell to offer grants for cities to recycle computers
Feds need coordination on high-end computing
Florida county improves health services by integrating data
Corps? IT official discusses lessons from Iraq
Senate Bill Targets Internet Pirates
Voice Authentication Trips Up the Experts
*******************************
Washington Post
Tech Security Chiefs Form Alliance
By Brian Krebs
Wednesday, November 12, 2003; 6:08 PM
Nearly a dozen top technology luminaries are lending their star power to
a new think-tank that will look for ways to elevate the status of chief
security officers in the private sector, a move that they say will go a
long way toward improving Internet security.
The Global Council of Chief Security Officers was formed by former White
House cybersecurity adviser Howard Schmidt, who said it helps fulfill a
promise he made after leaving the Bush administration earlier this year
to make Internet security a top issue in the business
community.
"I committed to the White House that when I returned to the private
sector I'd make sure this stays as a front page item for corporate boards
and for everyone else," said Schmidt, now the chief security officer
of online auction giant eBay.
The White House's cybersecurity strategy, released in February, contains
plenty of requirements for the federal government to secure its own
computer networks but only features recommendations for the business
community. The problem with that, say technology experts, is that too
many corporations do not devote adequate money and other resources to
computer security even though they control 85 percent of the nation's
vital networks.
"This whole concept of a CSO is a relatively new thing,"
Schmidt said. "Ten years ago (chief information officers) had sort
of an ill-defined role where many companies didn't know where to put them
and how to fund them, and we're seeing much the same thing today in the
security space as well."
Schmidt assembled a group with an array of impressive credentials to
press for more resources for network security operations, including
Microsoft Corp. chief security strategist Scott Charney, encryption
pioneer and Sun Microsystems security chief Whitfield Diffie, Oracle
Corp. Chief Security Officer Mary Ann Davidson and MCI's Vint Cerf,
widely considered the "father of the Internet."
"We really do need to work together, because it's in the interest of
all to improve the lot of all," Oracle's CSO Davidson said.
"Hackers who are colluding against us are definitely cooperating a
lot more than we are right now."
The council also will consult with technology vendors and industry groups
to help design more secure products for the next generation of the
Internet, Schmidt said.
Cerf said that the council should also encourage more compatibility
between different and competing technologies. Failure to do so,
especially as the Internet grows into even more of a commercial medium,
could prove damaging to online networks.
"Many of us have a long-term connection with the Internet and an
interest in seeing it survive well into the 21st century, and there is a
great deal going on that could potentially threaten its stability,"
said Cerf, who also serves as chairman of the board for the Internet
Corporation for Assigned Names and Numbers (ICANN), the group that
oversees the Internet's addressing system.
In the early 70s, when Cerf helped develop the communications rules that
allow computers to talk to one another through the Internet, the network
was used mostly by a small number of trusted researchers and specialists
who were responsible for maintaining its health and security.
Today, the caretakers of the Internet have expanded to include millions
of businesses and home users. In addition, an onslaught of hackers,
viruses, worms and junk e-mail continuously use inherent weaknesses in
those communications rules, which were never designed with security in
mind.
Efforts underway to replace the old standards with more secure rules can
mitigate those threats, but only if a significant number of businesses
and governments building and retool their networks, said Sun's
Diffie.
Schmidt said he hopes the group can live up to its name by expanding its
membership outside of the United States.
"None of us kid ourselves to think we're going to solve all of these
problems, but this gives us the ability to continue to be cheerleaders in
this area," he said.
The council will hold its first meeting in San Jose in January and a CSO
summit in San Francisco the following month. U.S. CERT, a new partnership
between the Department of Homeland Security and the CERT Coordination
Center -- a government funded security watchdog group at Carnegie Mellon
University in Pittsburgh -- will oversee the council's day-to-day
activities.
Other security chiefs in the group include Motorola's Bill Boni, Dave
Cullinane of Washington Mutual, and Rhonda McLean from Bank of America,
as well as former Citigroup security head Steve Katz and Will Pelgrin,
director of the New York State Office of Cyberspace Security.
The council is on the web at:
http://www.csocouncil.org.
*******************************
Los Angeles Times
Secretary of State Orders Audit of All Counties' Voting Systems
Review of upgraded touchscreen software leads to discovery that two
registrars installed it without state's OK.
By Allison Hoffman and Tim Reiterman
Times Staff Writers
November 13, 2003
Responding to revelations that at least one county used unapproved voting
software in the Oct. 7 recall election, Secretary of State Kevin Shelley
has ordered an audit of voting systems used in all 58 California
counties.
State elections officials reviewing an upgraded version of Diebold Inc.'s
Accuvote touchscreen voting machines for future certification were told
by company employees that the new software had already been installed in
Alameda and Plumas counties without state approval.
The software had been certified by a federal panel for use in the
states.
"We believed that with the federal certification [of the software],
we were meeting state certification," said Diebold spokesman David
Bear. He said the company would cooperate with the audit.
Shelley also said he would require the chief executive of each voting
system company to affirm, under penalty of perjury, that no significant
changes be made to elections systems or software without asking for
approval from the secretary of state's office.
Terri Carbaugh, a spokeswoman in the secretary of state's office, said,
"From our point of view, modifications to software require
certification."
Alameda and Plumas counties are the only two in California using the
Diebold touchscreen systems. Bradley Clark, Alameda County's registrar,
said that the new software had been installed before the recall election,
but Kathleen Williams, Plumas County's registrar, said that she had not
installed the upgrade before the election.
Los Angeles County Registrar Conny B. McCormack said the incident
highlighted ongoing uncertainty in Sacramento about how to regulate
electronic voting.
She said all counties in the state, whether they use electronic or
mechanical voting systems, had installed significant software upgrades in
the past several years to accommodate changes to primary voting and to
handle the unique recall election itself.
"All of us have made changes to our software even major
changes and none of us have gone back to the secretary of
state," McCormack said. "But it was no secret we've been doing
this all along. [Shelley] knew we were making changes."
*******************************
Australian IT
ACA's hand forced on privacy
Selina Mitchell
NOVEMBER 13, 2003
THE telecommunications watchdog has been "forced" to set new
rules to protect sensitve consumer information stored in a huge national
database.
The Australian Communications Authority will create a standard
controlling the use of information stored in the Integrated Public Number
Database, after discovering phone directory companies were misusing the
information.
The Database contains the personal details of every Australian with a
telephone number, including home, holiday, mobile and all other possible
contact details.
The information is used by police and emergency services as well as for
the production telephone directories and directory assistance services.
Until now use of the information in the database has been governed by an
industry code administered by the Australian Communications Industry
Forum.
The ACA discovered consumer information was being used for purposes other
than those set out in the code by a number of companies after it began
investigations into an incident which occurred earlier this year.
*******************************
CNET News.com
California regulators ponder VoIP
Last modified: November 12, 2003, 5:49 PM PST
By Ben Charny
California public utility regulators will meet Thursday in a
much-anticipated showdown with Internet phone providers.
At the meeting, the five-member California Public Utilities Commission
(CPUC) for the first time will hear details from a report that commission
staff prepared on the issue, which is expected to heavily sway future
decisions.
The commission will also come face-to-face with a lawyer for voice over
Internet Protocol (VoIP) provider Vonage, one of six VoIP providers the
state has asked to seek a traditional telephone license. A Vonage
spokesman said one of its attorneys will read a prepared statement to the
commission.
"We welcome them to an open dialogue," a Vonage spokesman said
Wednesday.
California is one of a dozen states that favor imposing traditional phone
rules on VoIP providers. Some states, such as California, have already
begun regulating VoIP providers, while others, including New York, have
just begun exploring the issue. In a move largely backed by traditional
phone companies, states want to regulate VoIP providers because it
generates much-needed fees to fund necessary phone services like 911. But
VoIP providers say their rules apply only to calls that travel over a
traditional phone network. VoIP calls use the Internet instead.
At stake is a key distinction between voice services, which have in the
past used the Public Switched Telephone Network, and data services such
as the Internet. Unlike phone networks, data networks have been left
largely unregulated and untaxed to help spur growth. This has raised
concerns for groups such as the Multistate Tax Commission that
Internet-style services could jeopardize billions of dollars in state
funding for programs including universal telephone service, 911 emergency
services and the E-Rate school technology fund.
*******************************
Los Angeles Times
Computer Technicians Sue CSC to Seek Overtime Pay
The lawsuit could mark the start of a wave of litigation targeting the
technology sector.
By Lisa Girion
November 13, 2003
Computer Sciences Corp. was accused Wednesday of cheating thousands of
computer technicians out of overtime pay in a lawsuit that could open the
technology industry to the same class-action litigation that has forced
millions of dollars in back wages from fast-food chains and retail
outlets.
The suit, filed in U.S. District Court in Los Angeles, alleges that the
El Segundo company owes back pay to all systems administrators and other
technical employees who have not received time-and-a-half compensation
for work in excess of 40 hours a week.
The plaintiffs, two former CSC employees in Connecticut, seek to
represent a proposed nationwide class of workers who earn as much as
$50,000 or more installing and maintaining computer software and
equipment for CSC clients.
A spokeswoman for the company, which employs about 92,000 people
worldwide, said she could not discuss details of the suit.
"CSC has always strived to comply with all state and federal
laws," said the spokeswoman, Janet Herin. "Based on what we
know at this time, we believe that we are compliant. We have not been
served with this complaint and have no further comment at this
time."
The suit, which cites federal overtime law, is believed to be the most
sweeping effort to win overtime pay for computer workers who do not write
software or design systems, according to several labor lawyers. It is
expected to test state and federal statutes adopted since 1996 that allow
companies to avoid paying overtime to certain computer
professionals.
In order to exempt an employee from the federal overtime mandate for
computer professionals, companies must prove, among other things, that
the worker in question earns at least $27.63 an hour (the equivalent of
$57,500 a year) and is primarily engaged in software development or other
independent, creative work.
"This could line up to be a very good fight," said Frank
Cronin, a labor lawyer for Snell & Wilner in Irvine, a firm that
represents employers. "It will be watched by others in the industry
because there are hundreds of other smaller firms that have people doing
the same work. This could be a landmark case?. An awful lot of these jobs
are right on that borderline."
Class-action overtime lawsuits have swept through the restaurant and
retail industries. More recently, banks have been the targets of such
litigation, and insurance companies have taken some of the biggest
hits.
California Chamber of Commerce Vice President Fred Main said "it was
only a matter of time" before computer workers were the subject of
overtime suits.
"They get paid a lot of money, so if you can get them out of the
exemption for computer professionals, then you can make a significant
amount on a class-action claim," Main said. "It's potentially
far more lucrative than reclassifying the shift manager at a fast-food
joint."
Steve Zieff, a San Francisco lawyer who represents the computer workers,
won a $90-million overtime verdict against Farmers Insurance on behalf of
2,400 claims adjusters. Zieff said he believed that alleged overtime
violations in the information-technology industry went beyond
CSC.
He said he and other lawyers on the case had received similar complaints
from employees of other computer firms.
"It doesn't matter what you call someone; it matters how you spend
your time," said James Finberg, a San Francisco attorney who has
represented insurance adjusters and fast-food restaurant managers in
overtime suits and is also representing the CSC plaintiffs.
"There is a specific exemption for people who are developing
software, but that's not what these people are doing," he said.
"They install software and answer questions."
*******************************
USA Today
Zombie machines fuelling new cyber crime wave
By Bernhard Warner, Reuters
Posted 11/12/2003 6:06 PM
LONDON The rapid growth of broadband home computer connections may
be inadvertently fuelling what police suspect could be the start of a new
crime wave cyber-blackmail.
As more homes connect to faster delivery systems, their computers are
becoming vulnerable to hackers and virus writers who can turn them into
"zombie" machines, ready to carry out any malevolent
command.
Favorite targets for the extortionists many thought to come from
eastern Europe have been casinos and retailers, but one recent
high-profile victim was the Port of Houston.
"At the end of the day, this is old-fashioned protection racket,
just using high-tech," said a spokeswoman for Britain's Hi-Tech
Crime Unit.
On Wednesday, UK cyber crime cops made a plea to businesses to report
attacks against their Internet businesses following a recent string of
incidents with the blackmailing trademark.
Police have seen an increase in the number of distributed denial of
service (DDoS) attacks targeting online businesses.
In some cases, the attacks, which can cripple a corporate network with a
barrage of bogus data requests, are followed by a demand for money. An
effective attack can knock a Web site offline for extended
periods.
Hitting the slots
Online casinos appear to be a favorite target as they do brisk business
and many are located in the Caribbean where investigators are poorly
equipped to tackle such investigations.
In 2001, cyber forensics expert Neil Barrett told Reuters that his firm
Information Risk Management was working with Internet casinos to shore up
their defences against a spate of DDoS attacks.
At the time, he said the denial-of-service barrages were followed by
demands to pay up or the attacks would continue. He said the attacks
appear to have come from organized criminal groups in Eastern Europe and
Russia.
Police said because of a lack of information from victimised companies,
they are unsure whether these are isolated incidents or the start of a
new crime wave.
Whatever the motive, DDoS attacks are on the rise, coinciding with the
proliferation of broadband deployment in homes. Security experts believe
the increasing number of unsecured home PCs may be a major
culprit.
New Internet- and e-mail-borne computer infections are hitting home
computers, turning them into zombie machines that can be controlled by
outsiders without the owner's knowledge, security experts say.
Such infected machines can be told to send e-mail spam or even be used to
initiate or participate in a denial of service attack against another
computer.
"Home broadband computers are going to be the launching point for a
majority of these," said Richard Starnes, director of incident
response for British telecoms firm Cable & Wireless and an advisor to
Scotland Yard's Computer Crime Unit.
Last week, the online payment service WorldPay admitted to suffering a
major DDoS attack that lasted three days. WorldPay, owned by the Royal
Bank of Scotland, has been fully restored.
The NHTCU spokeswoman said the investigation into the WorldPay attack is
ongoing.
*******************************
USA Today
Dell to offer grants for cities to recycle computers
By April Castro, Associated Press
Posted 11/12/2003 7:57 PM
AUSTIN Dell is strengthening its push to recycle old computers,
awarding $10,000 grants to 12 cities around the country to host computer
recycling drives.
The grants will be used to organize, promote and recycle computer
equipment.
The 12 cities will be selected by a review board based on various
factors, such as community need and interest.
"These events are intended to keep reusable and recyclable equipment
out of landfills while raising awareness of responsible product
end-of-life options," said Pat Nathan, Dell's sustainable business
director.
Dell has been the subject of criticism from environmentalists who say the
Round Rock-based company doesn't do enough to protect the environment.
They contend the most dangerous ingredient in old computers is lead from
cathode ray tubes and solder used on the motherboard.
Dell began recycling computers from consumers last fall, when it offered
the service for free if the customer shipped the machine to Dell, a
costly proposition. In March, the company switched to a $15 fee and
offered to pick up the old machines. Now Dell will pick up old computers
for $7.50.
Dell on Wednesday advanced 66 cents to close at $35.67 Wednesday on the
Nasdaq Stock Market.
*******************************
Federal Computer Week
Feds need coordination on high-end computing
BY Diane Frank
Nov. 12, 2003
Central coordination of federal high-end computing investments is
critical as the supercomputing arena competes with high-profile
technology needs for fewer budget dollars, experts said today.
For many years, the federal government comprised most of the high-end
computing environment, but today it is only a fraction of the market,
which is now focused on commercial products instead of scientific and
national security needs. That has raised concerns in the Bush
administration, and in Congress.
However, any new policy must be tied to federal needs and missions,
because it's easy to get "really cool technology" that's not
truly helpful, said Dona Crawford, associate director for computation at
Lawrence Livermore National Laboratory. She was speaking on a panel
sponsored by the IBM Corp. Center for the Business of
Government.
A new report by the center highlights the need for coordination within
the federal government. What is high-end computing today will be
mainstream technology tomorrow, said Juan Rogers, a co-author of the
report, associate professor of public policy and director of the research
value mapping program in the Georgia Institute of Technology's School of
Public Policy.
Even more important, the United States must have a high-end computing
policy driven by sustained results, not emergencies or specific events,
Rogers said.
"Rather than studying for an exam in a class, you want to learn the
skills to be able to apply them over and over," he said.
The High-End Computing Revitalization Task Force is intended to provide
coordination among agencies, and between mission and investment, said
John Grosh, a project manager in the Office of the Deputy Undersecretary
of Defense for Science and Technology.
The task force -- made up of about 60 people from agencies including the
Defense Department, NASA, the Environmental Protection Agency, and the
Office of Management and Budget -- has a draft of a five-year road map
for advancing the federal high-end computing investment portfolio, Grosh
said. The map focuses the government on specific portions of the high-end
computing environment, such as clusters and advanced architectures, and
provides a process for moving from basic and applied research to advanced
development, experimentation, and testing and evaluation.
That report has gone through the Office of Science and Technology Policy
and OMB. Administration leaders should be briefed on it in the next few
months, Grosh said.
Bush administration officials and Congress are interested in the United
States' high-end computing capabilities, and "the timing is right,
the window is open to attempt to improve the state of play here," he
said.
*******************************
Government Computer News
11/13/03
White House should oversee spectrum, new report says
By Joab Jackson
GCN Staff
The White House must take over management of the nation?s airwaves, the
Center for Strategic and International Studies advises.
In a new report, Spectrum Management For the 21st Century, the center
recommends a number of steps to quell increasing fights over existing
spectrum space:
Develop a national spectrum strategy
Increase research support for technologies that make better use of the
spectrum
Establish a spectrum oversight advisory board
Implement White House oversight. The Federal Communications Commission
now oversees commercial use of the nation?s airwaves, and the National
Telecommunications and Information Administration handles government use.
In the past few years, companies have pressured both agencies to change
existing spectrum holder rights. New wireless technologies, for instance,
have spawned a call from many IT companies for the Defense Department to
relinquish some of the spectrum reserved for national security needs.
At a House briefing yesterday, the center presented its report to Rep.
Tom Davis (R-Va.), chairman of the House Committee on Government Reform.
Davis said his committee will weigh the report?s findings, along with the
results of five ongoing General Accounting Office reviews and a
Presidential Spectrum Policy Initiative study commissioned in June.
"This is a very good start," Davis said.
The GAO reports are due early next year, and the presidential report in
May, said Grace Washbourne, a committee staff member.
She cautioned, however, that it might be years before any spectrum reform
legislation is introduced because of the issue?s complexity and the need
for independent evaluations.
A team of advisers from both telecommunications companies and government
agencies-including DOD, FCC and NTIA-drafted the Center for Strategic and
International Studies report.
The center is a private research organization that studies global issues.
To order the report, click here for a link <
http://www.csis.org/pubs/2003_spectrum.htm>.
*******************************
Government Computer News
11/13/03
Florida county improves health services by integrating data
By Trudy Walsh
Orange County, Fla., is juicing up its health and family services case
management system to boost efficiency and give health workers a clearer
view of their clients? cases.
The Health and Family Services Department is adopting a browser-based
case management system from Softscape Inc. of Wayland, Mass.
Since February, the department has been using Softscape?s CaseOne
software for medical case management, outpatient services and referrals
to specialists, said Pete Clarke, deputy director of the department.
The system runs on an intranet within the county?s firewalls, Clarke
said.
Before, the data had resided on several standalone mainframes in multiple
formats, said Kris Richarde, the department?s supervisor of application
development.
The department plans to eventually use the Softscape app to separate out
patients that require intensive monitoring and care, such as patients
with diabetes or asthma.
The CaseOne system has between 100 and 150 users, mostly nurses,
administrators and social workers, Richarde said.
The system uses a group-level security scheme, she said. Each groupsuch
as social workers or nurseshas its own system administrator and
predefined level of security.
The system complies with the Health Insurance Portability and
Accountability Act of 1996.
Passwords are carefully controlled, Richarde said. The software
automatically logs users off after a period of inactivity, she said.
After three unsuccessful log-in attempts, users must call their sysadmin
to reset passwords.
The system accesses records for 30,000 patients in an Oracle Corp.
database.
CaseOne works with Oracle, Microsoft SQL Server and IBM DB2 databases,
said Kim D?Augusta, vice president of government sales for Softscape. It
also has an application server built in C++.
?It?s been our dream for a long time to have a single database,? Clarke
said. ?We have folks that go from program to program. They overlap.? With
multiple systems and databases, it is harder to track patients? needs, he
said.
Clarke gave the example of a patient with asthma. ?It could be he
actually has asthma. Or it could be he just doesn?t have adequate
ventilation in his home,? Clarke said. The solution could be as simple as
moving the person to a room with a window.
In a year or so, Richarde expects 70 percent of the records for the
county?s Health and Family Services clients will be on one system.
From both an IT perspective and a business perspective, ?it makes our
life a lot easier,? Richarde said.
*******************************
Government Computer News
11/12/03
Corps? IT official discusses lessons from Iraq
By Dawn S. Onley
Although the Marine Corps deployed its most advanced systems in Iraq,
there were still technical snafus, deputy CIO Debra Filippi said today.
The Corps had problems communicating on the move, identifying enemy and
friendly units, and crossing the digital divide between operational and
tactical forces, Filippi said at an Armed Forces Communications and
Electronics Association?s Northern Virginia chapter luncheon. The service
is reviewing its experiences and deciphering how best to make
improvements in its deployable IT, she said.
The Marine Corps Tactical Data Network extended 375 miles ashore, and new
command, control, communications and computer systems debuted and were
successful, Filippi said.
Still, the Corps had difficulty integrating the many so-called Blue Force
Tracking systems used throughout the battlefield into a single common
operational picture of friendly and enemy forces, she said. Despite the
use of updated troop-tracking software, each of the services saw only a
partial picture of enemy and friendly forces.
*******************************
Government Computer News
11/12/03
Is government ignoring the threat of cyberterrorism?
By William Jackson
GCN Staff
The government has not been taking the threat of cyberterrorism seriously
enough, according to the author of a new book on the subject.
Dan Verton, author of Black Ice: The Invisible Threat of Cyberterrorism,
said the private sector has forestalled regulating privately owned
critical infrastructure components despite government recognition of
their importance to national security.
?If we are going to call them national security concerns, we should start
treating them like national security concerns,? he said during a speech
at the Cato Institute in Washington.
Verton criticized the IT security community for what he called
appeasement, accepting unacceptable levels of risk and focusing on past
threats rather than future dangers.
?This is going to be one of the primary battlefields of the future,? he
said. ?We need to have a discussion of cybervulnerabilities today, before
the next failure occurs.?
George Smith, a senior fellow with Globalsecurity.org of Alexandria, Va.,
and co-editor of vmyths.com, which combats what it calls computer
hysteria, was less critical of the state of IT security.
?We haven?t seen any direct physical attacks that fit the
prognostications of the doomsayers,? Smith said.
He said reports of cyberthreats too often are accepted without critical
evaluation and that there is a high level of ?flake factor? in
cyberterrorism discussions.
The background of the two men was reflected in their approach to
cybersecurity. Vertona former Marine with a crewcut, suit and
tiepresented the threat in military terms of victory or defeat.
Smithbearded with an open collar and generally rumpledcautioned against
mistaking hype for facts.
But both agreed that the reactive nature of security today is inadequate
for keeping pace with the quickly evolving nature of threats to the IT
infrastructure.
*******************************
Government Computer News
November 12, 2003
Agencies urged to seek outside input on e-gov projects
By Amelia Gruber
agruber@xxxxxxxxxxx
Four agencies should pay more heed to outside input on their electronic
government projects, the General Accounting Office recommends in a new
report.
President Bush's management agenda established 24 e-government
initiatives aimed at providing citizens with greater access to federal
agencies and improving efficiency in government.
Managers in charge of the Office of Personnel Management's e-payroll
initiative, which aims to reduce the number of agencies processing
federal employee paychecks from 22 to four, have done a good job of
fostering collaboration among the agencies designated as future payroll
providers, GAO reported.
But OPM needs to fully involve all agencies slated to use the
consolidated system in the project, GAO said. The agencies need to agree
upon a common set of payroll standards, the report (GAO-04-6) explained.
OPM has adequately canvassed agencies for suggestions, GAO said. Even so,
reaching a consensus will likely prove challenging, the report predicted.
"Unless OPM places increased emphasis on collaboration as
governmentwide standards are developed and consolidation of payroll
systems progresses, it will be at increased risk that the consolidated
systems will not meet the needs of all federal agencies," GAO
cautioned.
For instance, Veterans Affairs Department officials told GAO that OPM
rushed them into choosing the Defense Finance and Accounting Service as a
future payroll provider. VA later found that "migrating to the DFAS
would be costly and inefficient, because VA would have to separate its
payroll system from its human resources system."
OPM has the "ultimate authority in deciding how payroll operations
are to be consolidated," but risks interfering with the project's
overall schedule by "not fully considering stakeholder
concerns," the report said. In response, OPM officials said they
would continue holding discussions with VA to resolve concerns.
Three other e-government initiatives could also benefit from more outside
input, GAO said. The Interior Department should encourage state and local
officials to become more involved in its geospatial one-stop initiative,
a project to gather geospatial data in a central location, the report
recommended.
The General Services Administration should solicit advice from agency
chief financial officers on its integrated acquisition environment
project, designed to facilitate more efficient procurement, GAO said. And
Small Business Administration were urged t get more advice from potential
users of its proposed "business gateway," which would reduce
paperwork for small businesses and provide them with information on
relevant laws and regulations.
*******************************
Washington Post
Senate Bill Targets Internet Pirates
By David McGuire
Thursday, November 13, 2003; 10:25 AM
People who steal copies of films and albums and post them on the Internet
before their official release dates could face felony charges under
legislation scheduled to be introduced Thursday in the U.S.
Senate.
Authored by Sens. John Cornyn (R-Texas) and Dianne Feinstein (D-Calif.),
the Artists Rights and Theft Prevention (ART) Act makes it easier to
prosecute suspected pirates who offer "pre-release" movies and
music online.
"We're trying to go after the pre-release stuff that is absolutely
killing any potential revenue for one of the segments of our economy
that's doing well," said Don Stewart, a spokesman for Cornyn. The
movie studios and record labels are "just absolutely getting
clobbered."
The movie and record industries are eager to stamp out pre-release
piracy, which they see as one of the most dangerous trends facing their
respective industries. This year alone, blockbuster films like "The
Hulk" and "The Matrix Reloaded" hit the Web before they
hit the theaters. More recently, popular hip-hop artists Jay-Z and G-Unit
had to bump up the release dates for their albums when pirated copies hit
the Internet.
Internet movie piracy is costing the major studios up to $1 billion a
year in lost revenue, according to Macrovision Corp., which develops
anti-piracy technology. The largest music publishing and distribution
companies lost $700 million to digital file sharing in 2002, according to
a report from the Boston-based Forrester research group.
For movie studios, which count on earning revenues from film releases
from the time they hit the theaters until well after they come out on
DVD, pre-release piracy is especially galling, said Motion Picture
Association of America spokesman Rich Taylor.
"If it happens before a film can even penetrate the darkness of the
theater for the first time, obviously it has grave consequences,"
Taylor said.
Under current law, felony charges apply only to piracy suspects who
distribute 10 or more copies of pre-release albums and movies, with a
retail value of more than $2,500. Under the Cornyn-Feinstein bill, felony
charges could be filed against people who share pre-release entertainment
online, regardless of the number of copies or its value.
On the Internet, where many pirated goods are offered free over
peer-to-peer networks, it can be difficult to place a dollar figure on a
single act of piracy. That difficulty has made it harder to prosecute
even the most egregious cases of copyright infringement, Stewart
said.
For the movie and music industries, which have often faced staunch
opposition in their efforts to push stiffer anti-piracy laws, the
Cornyn-Feinstein bill could be a slam-dunk. While civil liberties
advocates have opposed efforts to topple peer-to-peer networks or impose
copyright-friendly technological standards on personal computers, this
bill is unlikely to face much opposition.
Public Knowledge President Gigi Sohn said the bill addresses the concerns
of copyright owners without trampling consumers' constitutional rights.
"To us it's a narrow bill, but for them it's a huge problem and this
is a good way of taking care of it."
"To the extent that the bill remains focused on those ... problems,
it doesn't raise much of a problem for us," Sohn said, adding that
she hopes the legislation marks the start of a new approach for the music
and movie industries.
"Focus on illegal behavior and not on outlawing technology,"
she said.
Stewart said it's unlikely that the legislation will go anywhere before
Congress goes home for the holidays, but the senators want to use that
time to seek support from their colleagues.
Senate Judiciary Committee Chairman Orrin Hatch has already signed on as
a co-sponsor.
*******************************
New York Times
November 13, 2003
WHAT'S NEXT
Voice Authentication Trips Up the Experts
By ANNE EISENBERG
T'S not easy to recognize speakers solely by their voices. A voice on an
audiotape might be that of Osama bin Laden, but it might also be that of
a skilled imposter.
It turns out, though, that computers can help humans in the tricky task
of speaker recognition, using their huge memories, pattern matching and
fast processing to search a database and pair the sound of a voice with
its owner.
Computer-based applications of speaker recognition are gradually
expanding, and already include intelligence gathering and telephone
transactions, in which sellers reduce the risk of fraud by making sure
that the voice on the line is in fact that of the credit card's
owner.
But the underlying technology is still far from foolproof, so a small
band of researchers is working to refine its accuracy and
consistency.
Some of the researchers say they are finding the task harder than they
had expected. "In principle, this is a very simple problem,"
said George Doddington, a speaker recognition expert in Orinda, Calif.,
who is a consultant to the federal government. "It's a binary
decision - is this person who he claims to be or not?"
But accuracy has been hampered by many difficulties, from the differences
in telephone connections and microphones to the inherent variability of
the human voice.
"Voice characteristics vary with your age, your metabolic state,
your emotional state and all the ways you can say 'yeah,' " Dr.
Doddington said.
"You'd think we could exploit the differences for recognition,"
he said. "But people's voices are different at different
times."
Adding to the difficulty are the varied circumstances in which voices are
recorded. People talking in a studio sound different from people talking
on a car phone. To do a good job, authentication programs must account
for all these sources of variation.
To spur research in the technology, the National Institute of Standards
and Technology in Gaithersburg, Md., enlists many scientists in annual
evaluations to see how their computer programs stack up in matching
unidentified voices with the actual speakers.
The task set for the competition is a tough one, said Alvin F. Martin, a
mathematician at NIST and one of the organizers of the event, which uses
recordings of telephone conversations. The contestants' programs have to
determine if two speech excerpts are from the same speaker. "But
they don't know in advance what words they will be dealing with,"
Dr. Martin said.
This is a far harder task for programs to handle than word-for-word
matching of passwords or code numbers, a standard approach of traditional
authentication software. "Instead, they are matching speech on
different things at different times," he said.
Dr. Martin said that the technology had improved strikingly in the last
few years, particularly in mining other characteristics of voice beyond
the physical ones related to a speaker's vocal apparatus. "We are
learning to take advantage of many other kinds of information from the
speech signal," he said, "like word combinations that speakers
typically use."
Douglas Reynolds, a senior staff member at the Massachusetts Institute of
Technology's Lincoln Labs in Lexington, Mass., is among the researchers
who have worked on extending the traditional range of acoustic
information analyzed, adding characteristics like pitch, pauses and
pronunciation style. Information like this should prove highly useful in
applications like audio mining, in which computers search tapes to
identify particular speakers.
"If you have archived meeting minutes or news broadcasts and you
want to know who is speaking, you want to squeeze as much information as
you can from the speech signal, because you can't get more," Dr.
Reynolds said.
At I.B.M.'s Thomas J. Watson Laboratory in Hawthorne, N.Y., Ganesh
Ramaswamy and his group of researchers are using multiple sources of
information from a conversation to develop their technology, which they
call conversational biometrics.
"We look not just at the voice," Dr. Ramaswamy said, "but
at what you say and how you say it."
The I.B.M. technology is intended for use in authenticating transactions
like gaining access to credit card account information over the
telephone. I.B.M. enrolls people in the program by asking them to read
from a magazine for 30 seconds. "Any magazine is fine," Dr.
Ramaswamy said. "When people speak this long, you get enough of an
idea of the frequency content of the various sounds in their
voices." The program also creates a model of other details like
pronunciation.
This might suffice to authenticate a voice in simple cases, he said.
"If someone is calling from a home phone and the voices match along
with the phone numbers, that might be the end of it."
But the system has programming to deal with more complicated situations;
it asks questions of the speaker and decides whether the answers are
adequate. "The acoustic verification runs in parallel with the
speech recognition," Dr. Ramaswamy said. "It will ask a lot
more questions for a $1,000 transaction than for a $10 one."
.
Applications of voice verification research are gradually showing up
commercially. A recent survey of voice-based biometrics by Judith
Markowitz, a consultant based in Chicago, listed more than 50 companies
providing goods and services.
The use of voice in biometrics may turn out to have a significant
advantage, said Joel S. Lisker, senior vice chairman of a lobbying and
consulting firm in Washington. "For other biometrics like face or
dynamic signature, you have to go someplace to do it, like a bank,"
he said. "Here you can do the enrollment in comfort at home or at
your desk - a huge plus."
Dr. Doddington hopes that whatever comes, future vendors of voice
authentication systems will be wary of making facile comparisons to
fingerprints, less they offer false assurances. "Fingerprints are
physical," he said. "Speech is a completely different animal.
It's something you do as opposed to what you are. It's a
performance."
E-mail: Eisenberg@xxxxxxxxxxx
*******************************