[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips January 12, 2004
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, glee@xxxxxxxxxxxxx;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, computer_security_day@xxxxxxx;, waspray@xxxxxxxxxxx;, BDean@xxxxxxx;, mguitonxlt@xxxxxxxxxxx, sairy@xxxxxxxxx;
- Subject: Clips January 12, 2004
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Mon, 12 Jan 2004 10:01:12 -0500
Clips January 12,
2004
ARTICLES
ELECTION 2004
Students' Data on Web, and N.Y.U. on Defensive
Michigan's Online Ballot Spurs New Strategies for Democrats
Survey: Internet Grows as Campaign News Source
Support swells for livestock ID system
ICANN calls for redundant Internet name servers
Camera phones don't click at work
U.S. to Push Airlines for Passenger Records
Batteries Can't Keep Up
Congressional leaders promise action on tech
*******************************
Miami Herald
Posted on Thu, Jan. 08, 2004
BY ERIKA BOLSTAD <ebolstad@xxxxxxxxxx>
ELECTION 2004
New system no easy touch for 134 voters in Broward Today's recount in the
House District 91 race is likely to raise questions about electronic
voting, including whether paper records are necessary.
Three years after helping render punch-card voting systems obsolete,
Broward County voters have proven that no election system is foolproof.
In Tuesday's special election to fill state House seat 91, 134 Broward
voters managed to use the 2-year-old touch-screen equipment without
casting votes for any candidate.
How so many happened to cast nonvotes remains a riddle. Unlike with punch
cards or paper ballots, there's no paper record with electronic voting
that might offer a clue to the voter's intent.
The percentage of nonvotes -- 1.3 percent -- is modest compared to the
days of ''hanging'' and ''pregnant chads.'' But in Tuesday's race, every
vote was crucial. In a seven-candidate field, Ellyn Bogdanoff beat Oliver
Parker by just 12 votes.
''These were the new machines,'' said Chas Brady, a spokesman for
Parker's campaign. ``This was not supposed to happen.''
Bogdanoff had a ready explanation for the mystery. She theorized that
some of the people who cast nonvotes were among the county's true-blue
Democrats who were appalled to find a ballot with only Republicans.
''That would make a heck of a lot of sense if you were looking for a
Democrat on the ballot,'' she said.
PUSH THE `VOTE'
Election Systems & Software, maker of the $17.2 million system in use
in Broward, believes that some voters failed to push the ''vote'' button
at the conclusion of the ballot -- akin to hitting the ''send'' button to
dispatch an e-mail.
The company says voters might have been confused by the ballot's
''review'' screen, since there was only one item on the ballot to review,
said Broward Mayor Ilene Lieberman, who talked to ES&S officials
Wednesday.
When voters hit the ''send'' button after failing to select a candidate,
the touch screen gives them a warning. But it doesn't prevent them from
voting anyway or, in this case, nonvoting.
That's probably what many did, suggested Gisela Salas, the former
Miami-Dade deputy elections supervisor who now works for newly appointed
Broward Supervisor of Elections Brenda Snipes.
''It happens in every election,'' Salas said. ``There are people who make
the choice not to select any candidates.''
Brady, spokesman for Parker, the second-place finisher, doesn't buy that
theory, since there's just one page on the ballot.
''It's not as though they're on Page 5 and are tired of voting,'' he
said.
And Lieberman, a Democrat, believes that anyone who would take the time
to go to the polls for such a small election would want their vote to
count.
''It's incomprehensible that 134 people went to the polls and didn't cast
votes,'' said Lieberman, who served on the canvassing board that oversaw
Tuesday night's count. ``We need to find an answer to this
question.''
ADD PRINTERS
Lieberman has advocated adding printers to the touch-screen machines to
create a paper record of each vote cast. Voters would be able to see the
printout to verify it before they leave the machine, a type of technology
that many states are beginning to consider.
Lieberman has asked ES&S, which also manufactured Miami-Dade County's
voting machines, to provide some answers on the nonvotes by 1:30 p.m.
today, when the canvassing board meets for a state-mandated
recount.
None of this would have drawn much notice had the race to fill the
District 91 seat in Northeast Broward not been so breathtakingly close,
said Palm Beach County Supervisor of Elections Theresa LePore, who
survived her own recount in 2000 after designing a controversial
''butterfly'' ballot.
''We always pray for large margins,'' she said.
Herald staff writers Beth Reinhard and Karl Ross contributed to this
report.
*******************************
New York Times
January 10, 2004
Students' Data on Web, and N.Y.U. on Defensive
By KAREN W. ARENSON
Three years ago, when Brian Frank entered New York University, he signed
up for intramural basketball, providing his name and his university
identification number, which was also his Social Security number.
Yesterday morning, Mr. Frank, who is now a senior, learned from N.Y.U.
that these details had been posted on the Internet. He was among about
1,800 N.Y.U. students who received the same e-mail notification from the
university. In some cases, students' phone numbers were posted,
too.
"I'm furious," he said in a telephone interview from his home
in Parsippany, N.J., where he is spending his winter break. "It is
an egregious violation of student privacy."
Mr. Frank said that in an age of growing identity theft, he was concerned
that unscrupulous people might have found his personal information and
tried to use it.
N.Y.U. officials said the information was posted on an Internet page run
by Brian Ristuccia, a computer technician in Massachusetts who found it
on N.Y.U.'s Web site in a list of students interested in intramural
sports. The university said it was considering taking legal action.
"We regret the concern that this may cause our students and former
students who were on the list, and we apologize to them," John
Beckman, an N.Y.U. spokesman, said yesterday.
He said that the university's own Web site is better protected now, and
that the information has been removed from Mr. Ristuccia's Web
site.
For his part, Mr. Ristuccia said he had removed the information on
Thursday "mostly because N.Y.U. had notified the affected students,
and that was the goal of my endeavor."
Computer privacy experts said that Mr. Frank had good reason to be
concerned.
"The students are at risk for identity theft," said Beth
Givens, director of the Privacy Rights Clearinghouse, a nonprofit
consumer advocacy organization based in San Diego. "Who knows how
many individuals got access to their names and Social Security numbers?
Just by putting this information on a so-called protected page, N.Y.U.
was exposing these students to risk."
She added, "This is not the first time I've heard about personal
information being posted on an internal Web site that is then tapped into
by someone who has no legitimate right of access."
Mari McQueen, associate editor of Consumer Reports, who led an
eight-month investigation into identity theft that was published in the
magazine's October 2003 issue, said that many universities used Social
Security numbers for student identification, and that the practice opened
the students to potential financial problems and fraud.
"It is a very common practice, and one that needs to be curtailed,
given the abuses," she said.
She said that it was a particular problem for college students, because
they have no control over the use of the information.
"If you want to attend the university," she said, "you
don't have any choice."
Mr. Ristuccia, a 25-year-old computer system administrator for a private
company that he declined to identify, said in an interview that he
learned in late November about the information being available on
N.Y.U.'s Web site. He said a friend told him about it after finding his
sister on the list.
He said that he sent an e-mail message to N.Y.U.'s system administrators
in early December to tell them about the problem, but that it was
anonymous because "it is very common for an organization faced with
a security problem to blame the person that discovers the
problem."
He said that he also made a copy of the information - he called it a
mirror - "so that it would be difficult for N.Y.U. to claim that the
information never existed."
Mr. Beckman said the material had been accessible to people outside
N.Y.U. because an athletic official failed to activate the appropriate
security mechanisms. But he said the university had received no previous
notification of the problem. He also questioned why Mr. Ristuccia had put
the information on his own Web site. "That sounds like a
self-serving excuse to me," he said. "If you were really
concerned about the privacy of the students, you would not post their
information on your Web site."
He said that Mr. Ristuccia had also not responded when the university
first tried to reach him, but waited until the university followed up
with letters from its legal office.
Mr. Ristuccia, who has posted a commentary of the episode at
http://osiris.978.org/brianr/nyu-publication/,
said yesterday that he did not think he had broken any laws.
"There is a class of people who make a hobby of breaking into other
people's computer systems, but I don't advocate that type of thing,"
he said. "And that is not what I did. The information was available
with a search engine."
He said that N.Y.U. had erred by putting such information where it was
accessible.
Some computer advocacy experts said that problems like this are a clear
illustration of why universities should not use Social Security numbers
for student identification.
"A lot of universities have moved away from it," said Marc
Rotenberg, executive director of the Electronic Privacy Information
Center in Washington. "It was probably a mistake to use Social
Security numbers to identify students and to make the numbers accessible
online. It is not quite like publishing the number. But if someone was
able to access it without too much work, it is like publishing it online.
But this other person doesn't have clean hands, either."
Mr. Beckman said that N.Y.U. has been studying the feasibility of using a
different student identification system for more than a year, and would
probably make that change in the next couple of years. He said the wide
use of the numbers made changing the system a complex
undertaking.
Mr. Beckham said he did not know if this episode would prompt N.Y.U. to
speed up the conversion.
*******************************
New York Times
January 10, 2004
Michigan's Online Ballot Spurs New Strategies for Democrats
By KATHARINE Q. SEELYE
DETROIT, Jan. 7 The virtual ballot box has arrived in Michigan.
Democrats in this state are the only voters in the country who have the
option of voting online in the presidential primaries this
year.
Since New Year's Day, voters have been allowed to apply for ballots and
vote by mail or Internet in advance of the Feb. 7 caucuses. Or, on Feb.
7, they can go to one of 576 caucus sites and vote the old-fashioned way.
By Thursday night, 11,000 people had applied for ballots, three-fourths
of them over the Internet, according to the Michigan Democratic Party.
About 100 people had voted so far, 90 of them online.
Mark Brewer, executive chairman of the party, said he had promoted the
Internet option as a way to make voting easier and increase turnout.
"Polls show that this is very popular, particularly with young
people, and they have one of the worst rates of participation," Mr.
Brewer said. "If this helps them, that's terrific."
When Mr. Brewer proposed online voting last year, none of the candidates
objected. But when Howard Dean started climbing in the polls, they had a
change of heart, fearing that his Web-surfing followers would have an
inherent advantage.
Seven of the nine candidates all but Dr. Dean and Gen. Wesley K.
Clark joined a challenge to the process initiated by Joel Ferguson,
a Lansing businessman and member of the Democratic National Committee.
Their brief, filed with the national committee, which oversees the rules
for states, said that major security problems had not been resolved and
that online voting discriminated against low-income blacks and Hispanics,
less likely than whites to be computer-literate.
But the national party agreed to the Michigan proposal, and now, with the
rules set, the candidates have embraced the process, devising innovative
ways to track their supporters and prompt them to vote online.
Dr. Dean's campaign, for one, is not relying just on supporters who are
Internet-savvy. Its union backers are taking laptop computers into
workplaces to help members apply for ballots and vote. They also make
house calls. Some of the unions backing Representative Richard A.
Gephardt are doing the same.
General Clark's campaign is using the Internet to encourage rural voters
in northern and western Michigan to vote online.
"A lot of those places don't even have movie theaters, and the
Internet is their way to connect and be part of the world on a real-time
basis," said Jonathan Beeton, a spokesman for General Clark's
Michigan campaign. "With the Internet, it's much easier for us to
mobilize a field operation without devoting a huge staff and resources to
cover vast areas of the state."
Senator John Kerry's supporters are flooding college campuses with
newspaper advertisements encouraging students to vote online. Almost all
the candidates have links on their Web sites to allow Michigan voters to
apply online for ballots. Voting is a two-step process: applying for a
ballot, then either returning it by mail or using a password to vote via
the Internet.
But the effort to extend Internet voting beyond the young and affluent is
transforming Michigan into a state that is more reliant on organization
than it has been in the past. In this respect, it is more like Iowa than
anyplace else, because candidates need deep networks to get supporters to
the caucuses..
Dr. Dean's campaign is perhaps the most advanced in bringing the virtual
ballot box to voters.
Local 79 of the Service Employees International Union, which has endorsed
Dr. Dean, bought 20 laptop computers and this week began carrying them
into the work sites of its 17,000 members in Detroit. The local has more
than 1,200 members at the Detroit Medical Center, which allowed
organizers in to help members apply for ballots on Wednesday.
The organizers sent out word that union members could drop by during
their lunch breaks. Alicia Robertson, 29, a dietary aide, was one of
several who requested a ballot, with John Switalski, an organizer,
guiding her on the keyboard.
"Sure," she said of the next step, voting via the Internet,
"if all I've got to do is what he just showed me."
Patsy Bell, 54, a janitor, stopped by before lunch and applied for a
ballot. Ms. Bell has a computer at home and said she was comfortable
voting online. "It won't take but a second," she
said.
Others were not ready to make the leap. Chris Butler, 62, a cook, said
she would probably vote by mail, though she applied online for a
ballot.
"With the Internet, they have so many problems," Ms. Butler
said. "I don't want to take a chance. I'll probably do it by mail
because I like to take my time."
In any case, they all planned to vote for Dr. Dean. "I trust
him," Ms. Butler said. "I like what he's offering, especially
the health care."
Jerry Morrison, directing the union's online effort, said the Internet
option combined with the five-week time period for voting offered
tremendous advantages for campaign organizers.
"Instead of having one day and one way to deliver all your votes,
we've got five weeks and three ways to vote," Mr. Morrison said, and
that is likely to increase turnout.
But those who challenged the process said it was unfair. Their brief to
the Democratic National Committee noted that the digital divide involved
not just race but also income, age and education. In households earning
less than $25,000 a year, only 39 percent have Internet access, while in
households earning more than $75,000 a year, 94 percent are wired. The
federal Department of Commerce reported that 55.6 percent of Michigan
homes had Web access in 2001, slightly above the national
average.
The Rev. Al Sharpton, a Democratic candidate for president, called
Internet voting "a high-tech poll tax." "If someone can
vote in the warmth of their living room, but a grandmother has to go down
four flights of stairs and out into the cold, that's not an even playing
field," Mr. Sharpton said in an interview.
That is not the only concern. Because the caucuses are run by the party
and not state officials, the ballots are not secret. They have a personal
identification number to make sure voters do not vote more than once.
Beyond that, party rules allow unions and other special interests to help
people use the Internet, raising the possibility of influence or
coercion.
The Democratic National Committee overrode such objections and allowed
the Michigan Democrats to proceed with Internet voting, as long as the
party also offered mail and in-person voting and increased the number of
caucus sites.
Mr. Brewer, of the state party, asserted that voting online was no less
secure than voting by absentee ballot. As long as the party offers other
methods of voting, he said, he sees no problem with allowing those who
want to vote online to do so. As for the lack of secrecy, there is no
pretense to secrecy, he said, though as a matter of practice no one
bothers to check to see how people vote.
Many analysts say that Internet voting is the wave of the future and that
Michigan is taking an important step. It follows an online voting project
in the Democratic presidential primary in Arizona in 2000. But that was
not a competitive race, and the voting was limited. Arizona Democrats are
not using it this year.
The Defense Department is preparing pilot projects in which people from
51 counties in seven states can vote online in November if they are
United States citizens who are overseas. Polli Brunelli, director of the
Federal Voting Assistance Program, which is running the pilot projects,
said the Pentagon had developed an elaborate encrypted system to guard
against fraud, but she said of Michigan, "You're trying to
enfranchise as many people as possible, so you have to start
somewhere."
*******************************
Internet Reports
Survey: Internet Grows as Campaign News Source
Sun Jan 11, 4:04 PM ET
WASHINGTON (Reuters) - The Internet has emerged as an important source of
presidential campaign news for many Americans, on par with weekly news
magazines and television talk shows, according to a survey released
Sunday.
While television remains dominant, the audience for broadcast news shows
is shrinking in the face of competition from cable TV and the Internet,
according to the Pew Research Center for the People and the Press, a
Washington nonprofit group.
Some 42 percent of those surveyed said they learned about the campaign
regularly from local TV news, a decline of 6 percentage points from the
last presidential election in 2000. Nightly network news programs and
daily newspapers suffered a larger decline, according to the survey.
Cable news networks commanded a growing audience share, with 38 percent
of the 1,506 adults surveyed saying they learned about the campaign from
networks like CNN and Fox News.
Internet news sources posted the largest relative gain, as 13 percent of
those surveyed said they regularly went online for campaign news and
another 20 percent saying they did so occasionally. In 2000, only 9
percent said they regularly turned to the Internet.
Younger Americans said they relied less on traditional news sources,
turning instead to cable news, the Internet and comedy shows such as
Saturday Night Live for campaign news.
But Americans overall know little about the campaign or many candidates.
Only one-third said they had heard about 2000 Democratic candidate Al
Gore (news - web sites)'s endorsement of former Vermont governor Howard
Dean (news - web sites), and fewer knew that Wesley Clark (news - web
sites) served as an Army general.
Those who get their news from the Internet tended to be the most
knowledgeable, while those who rely on comedy shows and late night
broadcast television tended to be poorly informed, the survey found.
Americans are more likely to perceive the news media as biased than they
were several years ago. In 1987, 62 percent said they thought campaign
coverage was free from bias, but that figure fell to 39 percent.
The survey was conducted between Dec. 19 and Jan. 4 in association with
the Pew Internet and American Life Project, an affiliated nonprofit
group.
*******************************
Federal Computer Week
Support swells for livestock ID system
U.S. to speed project in wake of mad cow find in Washington state
BY Florence Olsen
Jan. 12, 2004
Agriculture Department Secretary Ann Veneman recently signaled a strong
commitment to finish developing the program, which the department's
Animal and Plant Health Inspection Service has been developing for the
past 18 months.
Despite some resistance within the livestock industry, cattlemen, dairy
farmers and others have long seen the need for such a program. The USDA
program would eventually track livestock, poultry and other food animals.
The USDA's plan is similar to Canada's mandatory system, under which
every animal is tagged before it leaves the farm or ranch where it was
born. U.S. animal health officials say that a system is needed here that
lets officials act quickly within 48 hours to trace the
origins and movements of a diseased animal. No such capacity exists
today. Some of that livestock information is computerized; some of it is
kept in shoeboxes.
Even before mad cow disease, other animal disease scares had convinced
many government officials and industry groups that a computerized system
for animal tracking was needed. "The foot-and-mouth disease outbreak
in the United Kingdom made us all realize real fast that we needed to be
able to trace animals very quickly because of the speed with which that
disease moved," said Donna Gilson, a spokeswoman for the Wisconsin
Agriculture Department.
Different livestock numbering systems have grown up in the past around
specific animal diseases such as brucellosis, scrapie and tuberculosis.
Some farms and ranches use several numbering systems at once, and those
systems would have to be merged into a single system of unique ID
numbers, USDA officials say. The department has proposed using the same
numbering system that Canada uses.
Because of widespread agreement that a national system is needed, many
groups are more optimistic that one can be created despite the technical
difficulties, the concerns of producers and the cost. But producers must
first find a way to overcome the shortcomings of the data entry
technology that has been proposed for the system. That technology, which
uses radio frequency transponders, has practical limitations.
"You get a hundred animals moving down a corral, individually
reading each tag with radio frequency is not like reading a bar code off
a package by the [parcel] delivery guy," said Neil Hammerschmidt,
animal identification coordinator for the Animal and Plant Health
Inspection Service.
Despite its limitations, the use of radio technology is more efficient
than reading numbers on a metal ear tag and copying those numbers
manually into an electronic database, Hammerschmidt said. Canada plans to
introduce radio frequency identification technology into its mandatory
identification system early this year, he said.
Resistance to a national tracking program from some livestock producers
has been an obstacle in the past, but that resistance has weakened.
Producers are worried that more incidents like the mad cow scare could
further harm the industry.
Before the mad cow incident, animal producers had "questions about
sharing of data and who would have access to it," said Bob Ehart,
animal and plant health safeguarding coordinator for the National
Association of State Departments of Agriculture. "Those are probably
still issues that need to be resolved. But they are not ones that will
stand in the way of developing a program that can be implemented, and I
think probably fairly soon."
In addition to overcoming producers' resistance, agriculture and industry
officials say they still must find a way to pay for the system. In a
preliminary report, the U.S. Animal Health Association recommended a
public/private partnership to pay for the project's substantial cost. The
association's members are state and federal agencies, universities and
industry groups.
Cost remains a concern for cattle producers, said Michele Peterson,
speaking for the National Cattlemen's Beef Association, a trade group.
"The largest issue would be that our cattle producers remain
profitable through the implementation of such a program."
One financing possibility is a direct appropriation from Congress.
"No one has mentioned a dollar value, but the latest thing that
we've seen coming out of USDA is that there will be funding
available," Ehart said.
Creation of a national livestock identification program is by no means
ensured until money can be found to pay for it. But livestock producers,
states and consumer groups have a vested interest in establishing such a
program. Most states recognize the need for a national program. Beginning
this month, Wisconsin, for example, is looking for volunteers among dairy
producers in the state to test its new animal identification system,
which is based on the Canadian model. State officials are hoping the
Wisconsin system will help accelerate adoption of a national system along
lines that would satisfy both state and national needs.
***
Mad cow management
A national animal-tracking system based on radio frequency
identification, or RFID, technology might work like this:
1. A newborn calf gets tagged in the ear with an RFID chip encoded with
an ID number, which specifies where it was born.
2. The animal goes to market, where its chip is read and the data entered
into the national database.
3. The animal goes to a slaughterhouse where, again, its RFID chip is
read and that data is automatically entered into a national
database.
4. If disease is found, the laboratory contacts animal health and food
safety authorities, who can trace the origins of the animal back to its
original farm.
Source: Wisconsin Livestock Identification Consortium
*******************************
Government Computer News
ICANN calls for redundant Internet name servers
By Joab Jackson
January 12, 2004
The organization that oversees the Internet Domain Name System wants
top-level domains such as .gov and .mil to double up on their DNS
servers, placing them on different networks and in different locations.
The Internet Corporation for Assigned Names and Numbers has issued a DNS
infrastructure recommendation to clarify server architectures for root
and top-level domain services. DNS requires that zone administrators run
two independent servers to answer domain name queries, so that if one
fails, the other can still deliver information. The new recommendation
stipulates that each server be in a different location and on a separate
network for better security.
The General Services Administration, at
www.nic.gov/index.html,
manages DNS servers for the .gov domain. The .mil domain is managed by
the Defense Department Network Information Center,
http://www.nic.mil.
The .us domain, used by most states, is managed by NeuStar Inc. of
Sterling, Va.
These servers respond to queries from the Net?s 13 root domain name
servers, at
http://www.root-servers.org.
U.S. federal offices operate three of those servers: the Army Research
Laboratory, the Network Information Center and NASA?s Ames Research
Center. The University of Maryland also runs a root server. ?The thing
that triggered this recommendation was a review of the procedures the
[Internet Assigned Numbers Authority] was using when it received a
request to change an entry in the root zone,? said Steve Crocker, who
chairs the ICANN security committee.
ICANN, a not-for-profit corporation, administers the Internet name and
address system. IANA oversees IP address allocation.
*******************************
USA Today
Camera phones don't click at work
By Stephanie Armour
Posted 1/12/2004 1:59 AM
Some major employers are banning camera phones on the job amid growing
fears the high-tech gadgets pose serious threats to workers' privacy and
company secrets.
The phones, which average about $150, allow users to take pictures and
transmit them globally.
Companies fear employees will use the phones to send images of new
products or other company information, or else to take pictures of
unsuspecting co-workers in locker rooms or bathrooms.
A growing number of employers are cracking down:
? At DaimlerChrysler, a policy drafted in September bars employees and
visitors from bringing camera phones into any company building.
? Employees and visitors to General Motors' product development plants
can't bring in camera phones. Also, the company won't supply employees
with cell phones that have a camera feature.
Employees entering those research areas must "surrender camera
phones and reclaim them when they go out," says Chris Preuss at
General Motors. "It's for security reasons."
? Employees at Texas Instruments can bring their camera phones to work
but are forbidden to take pictures.
Bans have also affected the public. At the Oakland County Courthouse in
Pontiac, Mich., posted signs warn that camera phones aren't allowed. The
policy was adopted in November.
"Our concern was the photographing of jurors and witnesses, such as
undercover agents," says Chief Judge Wendy Potts.
Some labor lawyers are fielding more questions from companies grappling
with the new concerns. "What makes the technology worrisome to
employers is it has the ability to capture and transmit images so
fast," says Scott McDonald, a labor lawyer at Littler Mendelson in
Dallas. "In the old world, you would take a picture with a small
camera and smuggle it out."
It's an issue overseas, too. In Munich, BMW spokesman Jochen Frey says
the company has signs in the lobby of its technical center banning
cameras and camera phones. In South Korea, Samsung bans camera phones on
the job.
Camera phones made up 4% of global handset sales in 2002, according to
Boston-based Strategy Analytics. By the end of 2005, more than a quarter
of global handset sales will be camera phones. "A policy on camera
phones is going to be standard," says Eddie Tapiero, an analyst at
Strategy Analytics.
He and other analysts say demand for the phones is so strong that such
policies should not hamper sales.
Contributing: David Kiley
*******************************
Washington Post
U.S. to Push Airlines for Passenger Records
Travel Database to Rate Security Risk Factors
By Sara Kehaulani Goo
Monday, January 12, 2004; Page A01
Despite stiff resistance from airlines and privacy advocates, the U.S.
government plans to push ahead this year with a vast computerized system
to probe the backgrounds of all passengers boarding flights in the United
States.
The government will compel airlines and airline reservations companies to
hand over all passenger records for scrutiny by U.S. officials, after
failing to win cooperation in the program's testing phase. The order
could be issued as soon as next month. Under the system, all travelers
passing through a U.S. airport are to be scored with a number and a color
that ranks their perceived threat to the aircraft.
Another program that is to be introduced this year that seeks to speed
frequent fliers through security lines in exchange for volunteering
personal information to the government.
The two new initiatives will augment a system introduced last week to
fingerprint and photograph millions of foreign visitors on arrival in the
United States.
Privacy and consumer advocates worry that both programs could be
discriminatory because they subject airline passengers to different
levels of scrutiny. Certain travelers, such as non-U.S. citizens, could
face additional questioning under the program known as CAPPS 2, or the
second version of the Computer Assisted Passenger PreScreening Program,
some organizations say. Business travelers who typically pay high prices
for their seats will likely get an easier pass through security in the
"registered traveler" program.
Privacy advocates say they are most concerned about CAPPS 2, which would
replace the airlines' existing computer screening system. The TSA
believes the current system is based on old assumptions about terrorists,
flagging passengers, for instance, who paid with cash or bought one-way
tickets. Passengers targeted for additional screening commonly find an
"SSS" or "***" designation on their boarding pass.
The TSA said the new computerized system is to provide a more thorough
approach to screening passengers. It will collect travelers' full name,
home address and telephone number, date of birth and travel itinerary.
The information will be fed into large databases, such as Lexis-Nexis and
Acxiom, that tap public records and commercial computer banks, such as
shopping mailing lists, to verify that passengers are who they say they
are. Once a passenger is identified, the CAPPS 2 system will compare that
traveler against wanted criminals and suspected terrorists contained in
other databases.
The two-step process will result in a numerical and color score for each
passenger. A "red" rating means a passenger will be prohibited
from boarding. "Yellow" indicates that a passenger will receive
additional scrutiny at the checkpoint and a "green" rating
paves the way for a standard trip through security. Also factored into
one's score will be intelligence about certain routes and airports where
there might be higher-rated risks to security.
Although it is unclear how many passengers would fit into each category,
the TSA said its best estimation is that 5 percent of the traveling
public will be flagged yellow or red, compared with an estimated 15
percent of passengers who are flagged under the current version of CAPPS
1.
The registered traveler program, also known as "trusted
traveler," has been a favorite of the airline industry since the
terrorist attacks in 2001. The first leader of the Transportation
Security Administration declined to pursue the idea, saying he worried
that terrorists in "sleeper cells" could establish themselves
as trusted residents over a period of years and later exploit their
status to hijack planes.
Now under new leadership, the TSA is to begin testing the program at
selected airports with $5 million in Congressional funding. Officials say
the program could enhance security because the pool of those who need to
be assessed would be reduced by the background checks each passenger
would undergo. The agency declined to say how the program would work
except that it would be voluntary and that registered passengers would
not skip security screening altogether.
"It's not as though the person who goes through the checkpoint won't
be going through a basic level of screening," said David M. Stone,
the TSA's acting administrator.
But privacy experts are skeptical. Registered traveler is "going to
create two classes of airline travelers," said Barry Steinhardt,
director of the technology and liberty program at the American Civil
Liberties Union, an organization that opposes both programs. Registered
traveler, he said, "has no security benefits." Terrorists will
learn one way or another how to "game" the system, he said.
Last week, the Department of Homeland Security started a visa-tracking
program that the ACLU and other groups also deemed discriminatory.
International airports and ports began digitally fingerprinting and
photographing foreign visitors from certain countries in the Middle East,
Asia, Africa and South America when they enter the country on a visa,
although most European countries are exempt from the program.
"These kinds of dragnet systems are feel-good but
cost-inefficient," said Richard Sobel, a privacy policy researcher
at Harvard Medical School. "The government would do much better
using resources to better identify people and deter people who might
cause some harm than to use resources devoted to the 99 percent of people
who are innocent."
Under one proposal advocated by the major U.S. airlines, passengers who
submit an application to the TSA would receive a special card or other
identification, if they're approved. At the airport, they would show the
card at the security checkpoint or ticket counter and submit to a
handprint or fingerprint to verify their identity. Then, the passenger
could walk through a checkpoint area dedicated to members of the
program.
The airline industry argues that a registered traveler program would not
create a class system but would simply reduce wait times for all
passengers. "The thing that really frustrates people is not the fact
that someone goes through [the security line] more quickly," said
Jim May, chief executive officer at the Air Transport Association, the
airline industry's lobbying organization. "It's the people who don't
prepare themselves and go through security and tie up the whole line.
They're the people who really aggravate those people who are trying to
catch a plane."
In the push forward on CAPPS 2, U.S. officials said the TSA is to soon
begin forcing the airlines to turn over their passenger reservation
lists. No airline responded to the agency's initial request for the
documents last fall. U.S. carriers have been reluctant to turn over the
data because of negative publicity association with the
program.
The TSA's first airline partner to test CAPPS 2, Delta Air Lines, backed
out of the agreement after privacy advocates put up a Web site
encouraging passengers to boycott the airline. The European Union, whose
passengers would also be rated and screened, have said the system would
violate EU privacy laws, but it has allowed the TSA to use passenger data
for testing purposes.
The final blow came in September last year, when JetBlue Airways was sued
in several states by passengers after the airline admitted it had turned
over passenger data for a military project related to aviation security.
The TSA has since been unable to find an airline to help the agency test
CAPPS 2 and might now have to resort to coercion to get the reservation
data.
Homeland Security officials said some elements of CAPPS 2 and the U.S.
VISIT program for fingerprinting and photographing foreigners will
overlap because both systems compare passengers against the same
terrorist and criminal watch lists. The U.S. VISIT also aims to ensure
that visitors do not overstay their visas. U.S. officials said they are
considering merging the two programs.
Nuala O'Connor Kelly, the chief privacy officer at Homeland Security,
said if the databases are merged, the government would impose strict
rules about which agencies can use the passenger information and how it
could be used.
"We want these programs to be efficient to the extent it makes them
more efficient to have them rolled together, we will be looking at
that," Kelly said.
But Kelly acknowledged that there will be several hurdles to clear. The
U.S. government has not said how long it will keep data on U.S. VISIT
travelers. Information on most passengers screened by CAPPS 2 can be held
only for "a matter of days," she said.
*******************************
Washington Post
Batteries Can't Keep Up
By Mike Musgrove
Sunday, January 11, 2004; Page F07
Lithium ion batteries, the battery type most commonly used inside laptops
and the flashy gadgets that early adopters of new technology lug
everywhere in their pockets, are the most lightweight, powerful and
low-maintenance batteries around. They're even more environmentally
friendly than other choices.
But they have one drawback: a limited lifespan. Lithium ion batteries are
particularly susceptible to aging; as soon as one leaves the
manufacturing line, its countdown begins. A typical lifespan is two to
three years, whether it is ever used or not -- as some disgruntled owners
of Apple Computer Corp.'s iPod found when their digital music players
suddenly went dead. A huge hullabaloo ensued.
Despite that limitation, gadget makers say they are using the batteries
in more and more products because their compact size means they can be
used to build the slicker and thinner devices that attract
consumers.
"To get cooler industrial design, you can only do it with these new
[lithium-ion] batteries," said Jeff Hastings, president of digital
music player company Rio Audio. Though Rio offers players with both
replaceable and built-in battery options, Hastings said that most
consumers care more about a player's looks than its onboard battery
lifespan when comparison shopping.
Some gadget makers have programs to replace batteries when they've worn
out, some don't. Apple eventually agreed to set up a battery-replacement
program for the popular digital music player (iPod owners can now have
their batteries replaced for $99). Handheld maker PalmOne doesn't have a
program in place to replace the batteries of old handhelds; PalmOne's
vice president of hardware engineering, Gregg Zehr said that most users
choose to upgrade to a new handheld when the battery wears out.
There isn't much that users can do to make the batteries last longer. For
example, some older battery technologies survived longer when users fully
discharged them before loading them up with a fresh charge. That's not
the case with lithium ion batteries; it makes little difference if users
let the batteries run down or keep their gadgets "topped off"
by plugging them in every night or two.
That built-in battery in your digital music player or personal digital
assistant will typically survive 500 complete recharge cycles. After so
many visits to the power outlet, that battery will still retain 80
percent of the charge it could originally hold, but it's at the beginning
of a pretty steep downward curve in performance.
If there's anything that lithium ion technology doesn't respond to well,
it's heat. Heat ages these batteries rapidly by accelerating the chemical
reaction that eventually kills them. If you aren't going to use that
battery-using gadget for a long period, the best thing to do is to store
it in a cool place with about a 40 percent charge, said Isidor Buchmann,
author of a book on batteries and founder of Cadex Electronics Inc., a
British Columbia-based battery-charger company.
Buchmann said gadgets should come with a birth date stamped on the side
"like a loaf of bread" so that consumers will have an idea of
how long they can expect a gadget to last.
Though battery researchers boost the performance of lithium ion
technology about 10 percent every year, Buchmann said, the lowly battery
still tends to be the most expensive and least reliable component of a
portable device.
It's a fact of life that electronics makers are all too familiar with.
"It's been vexing that batteries have not been keeping up with
Moore's law," observed Zehr at PalmOne, referring to the
computer-industry maxim that computer chips will double in complexity and
power every 18 months or so. "We keep making all these improvements
[to PalmOne's handheld line], but it's basically the same battery you
bought in 1999. . . . Batteries have just not kept up."
*******************************
CNET News.com
Congressional leaders promise action on tech
Last modified: January 10, 2004, 11:30 AM PST
By David Becker
LAS VEGAS--Federal lawmakers are ready to help the technology industry
solve its problems--at least some of the issues.
That was the consensus from eight U.S. senators and representatives
gathered Friday for a panel at the Consumer Electronics Show.
Congressional leaders vowed concerted action on some hot-button tech
issues, but warned attendees not to expect too much.
Some of the most vigorous debate focused on trade policy, with speakers
describing a balancing act between encouraging free international trade
and preventing an exodous of U.S. jobs to overseas locations.
Rep. Tom Davis, R-Va., said misguided concerns about jobs are setting the
agenda now. "What we're seeing is a continuing assault on free
trade," he said, adding that some lawmakers "want to punish
companies that do business offshore."
"We've been in defense all year," Davis said. "The AFL-CIO
is out there--they're taking book on this."
But Rep. Steve Buyer, R-Ind., warned that fellow free-trade Republicans
shouldn't make the mistake of thinking the jobs issue isn't real.
"There's some realities out there that hurt Americans," he
said. "There's a beginning of the erosion of the middle class in
this country."
Debate was more unified on intellectual property issues, with lawmakers
saying that while Congress will continue to support strong copyright
protection, media industries need to come up with their own solutions to
file-swapping and other issues.
Sen. John Sununu, R-N.H., joined others in criticizing the Recording
Industry Association of America (RIAA) for suing alleged music swappers,
calling the RIAA's legal tactics heavy-handed and against the intent of
U.S. copyright laws, including the controversial Digital Millennium
Copyright Act (DMCA).
"The fundamental problem with the approach of the RIAA took is that
it was based on legislation that created special property rights,"
Sununu said. "Suddenly, you had a private entity that's able to
issue subpoenas, which is unprecedented."
"That's not what the DMCA was intended to do," he said.
"We can't be writing legislation that gives holders of certain types
of intellectual property special rights...We can't carve out special
legislation to give special powers to certain types of content."
Rep. Joe Barton, R-Texas, said it's up to content creators to come up
with business models that accommodate modern technology and attitudes.
"I don't agree you're going to get teenagers and young people to
believe they're doing something immoral" in file swapping, he said.
"The industry has to decide on a different model."
Lawmakers also spoke in support of moratoriums on taxing the Internet,
with Sen. George Allen, R-Va., saying lawmakers need to be vigilant
against efforts by state and local authorities to grab a chunk of
broadband service fees.
Sununu said those same force are hungry to take a bite out of the
emerging market for Internet-based telephone service. "I think the
most important policy issue we'll be dealing with over the next few
months is voice over IP," he said. Sununu said Congress' job is
"to try to protect it from taxation, to define it as an information
service, so the technology can grow."
*******************************
Wired News
Errant E-Mail Shames RFID Backer
By Mark Baard
02:00 AM Jan. 12, 2004 PT
The companies and organizations behind radio-frequency identification
tags are scrambling to improve their image by promising to protect the
privacy rights of consumers, after they were caught trying to dig up dirt
about one of their most effective critics.
The companies also said they are developing devices to disable RFID tags,
which they are placing on everything from shampoo bottles to suit jackets
in the United States and Europe.
RFID tags may eventually replace bar-code labels on all consumer goods.
When exposed to radio signals, they transmit a unique serial number for
individual items and help manufacturers, distributors and retailers keep
track of every item in their inventory. But privacy groups, led by
Consumers Against Supermarket Privacy Invasion and Numbering (or
CASPIAN), fear that businesses and governments can use those signals to
track individuals' movements inside stores and in public places.
One organization may have been shamed into soliciting CASPIAN's advice,
however. The Grocery Manufacturers of America this week inadvertently
sent an internal e-mail to CASPIAN suggesting it was looking for
embarrassing information about the group's founder, Katherine Albrecht.
The e-mail, written by a college intern at GMA, reads, "I don't know
what to tell this woman! 'Well, actually we're trying to see if you have
a juicy past that we could use against you.'"
The intern earlier had asked Albrecht to produce her personal biography,
"as part of an RFID research project," and became frustrated
when Albrecht asked what GMA planned to do with the information,
according to GMA spokesman Richard Martin.
But the research project had a limited scope: Albrecht was the only
person contacted by GMA, Martin admitted.
GMA, which represents the interests of RFID backers Coca-Cola, Procter
& Gamble and Gillette, is working on privacy guidelines for adopters
of RFID tags and the Electronic Product Code, the industry standard
governing how RFID tags are used with consumer goods.
And now the GMA says it wants Albrecht's advice.
"We are interested in maintaining a dialogue with consumer advocacy
groups like CASPIAN as we move forward in rolling out EPC and RFID,"
said Martin.
This represents an about-face by many RFID backers, who have often played
down their plans to tag individual items and accused Albrecht of
exaggerating the threat the tags pose to consumer privacy.
Wal-Mart, which tested RFID tags and readers in at least two of its
stores last year, said it would adhere to the RFID privacy guidelines
published by EPCglobal, the EPC standards body. The guidelines require
companies to publicly state how they plan to use data collected from the
EPC tags.
"We understand and care about the concerns that some of our
customers have about privacy and, as always, we put our customers' needs
first," said Wal-Mart spokeswoman Sarah Clark.
Wal-Mart and other retailers say they plan to place RFID tags only on the
pallets and containers in their supply chains.
But Germany's largest retailer, Metro Group, says it plans to tag every
item in its stores with RFID. It said it is working with IBM to develop a
device that would disable RFID tags as customers left Metro stores.
CASPIAN's Albrecht said she welcomes tag-killing technologies, as well as
the overtures by RFID users who want to work with her. "I just hope
they're looking for a real dialogue about the implications of this
technology," she said, "and not simply trying to appear
concerned."
*******************************