[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips October 20, 2003
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, glee@xxxxxxxxxxxxx;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, computer_security_day@xxxxxxx;, waspray@xxxxxxxxxxx;, BDean@xxxxxxx;, mguitonxlt@xxxxxxxxxxx, sairy@xxxxxxxxx;
- Subject: Clips October 20, 2003
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Mon, 20 Oct 2003 16:40:10 -0400
Clips October 20,
2003
ARTICLES
Electronic Voting: What You Need To Know
Romania emerges as new world nexus of cybercrime
Google ordered to pay fine in French trademark case
Finns Ready Law for Tracking Young Cellphone Users
Personnel System in Final Stage
Teen computer whiz cleared in Houston hacking
Australia, Korea forge spam pact
Web access app gets Common Criteria certification
Commerce IT reorganization put on back burner
Officials debate rule on liability for anti-terrorism tools
*******************************
t r u t h o u t | Interview
Electronic Voting: What You Need To Know
By William Rivers Pitt
Monday 20 October 2003
Author's Note | In July of 2003, I sat down for
an extended, free-wheeling interview in Denver with three of the smartest
people I have ever met. Rebecca Mercuri, Barbara Simons, and David Dill
have been at the forefront of the debate surrounding the rise of
electronic touch-screen voting machines in our national elections.
Sufficed to say, they are three computer scientists/engineers who are as
well versed on these matters as anyone you will ever meet. Scroll quickly
to the bottom of this interview before reading to view their CVs.
If you are completely new to this, the issue in
brief: In the aftermath of the 2000 election, Congress passed the Help
America Vote Act. After much wrangling, it appears the powers that be
have settled upon electronic touch-screen voting machines as the
solution. There are, however, a number of serious concerns about the
viability of these machines that have been raised. The matter strikes to
the heart of our democracy. If the votes are not counted properly, our
democracy is broken forever. More data on this is linked below, after the
CVs.
Key: 'WP' is me; 'RM' is Rebecca Mercuri; 'DD'
is David Dill; 'BS' is Barbara Simons. These three scientists deserve
great thanks for making this complicated and important issue so clear.
For the Interview Q&A, see:
http://www.truthout.org/docs_03/102003A.shtml
*******************************
USA Today
Romania emerges as new world nexus of cybercrime
By William J. Kole, The Associated Press
10/18/2003
BUCHAREST, Romania It was nearly 70 degrees below zero outside, but
the e-mail on a computer at the South Pole Research Center sent a
different kind of chill through the scientists inside.
"I've hacked into the server. Pay me off or I'll sell the station's
data to another country and tell the world how vulnerable you are,"
the message warned.
Proving it was no hoax, the message included scientific data showing the
extortionist had roamed freely around the server, which controlled the 50
researchers' life-support systems.
The FBI traced the e-mail to an Internet cafe in Bucharest and helped
Romanian police arrest two locals the latest evidence that
computer-savvy Romanians are fast emerging as a bold menace in the
shadowy world of cybercrime.
"It's one of the leading places for this kind of activity,"
said Gabrielle Burger, who runs the FBI's office in Bucharest and is
working with Romanian authorities to arrest suspects "and avoid the
Sept. 11 of cybercrime."
Law enforcement documents obtained by The Associated Press portray a
loosely organized but increasingly aggressive network of young Romanians
conspiring with accomplices in Europe and the United States to steal
millions of dollars each year from consumers and companies.
Their specialties: defrauding consumers through bogus Internet purchases,
extorting cash from companies after hacking into their systems, and
designing and releasing computer-crippling worms and viruses.
Alarmed authorities say the South Pole case underscores the global impact
of this new breed of cyber-outlaw.
"Frustrated with the employment possibilities offered in Romania,
some of the world's most talented computer students are exploiting their
talents online," the U.S.-based Internet Fraud Complaint Center
(www.ifccfbi.gov),
run by the FBI and the National White Collar Crime Center, says in a new
report.
Computer crime flourished in Romania because the country lacked a
cybercrime law until earlier this year, when it enacted what may be the
world's harshest. The new law punishes convicts with up to 15 years in
prison more than twice the maximum for rape.
Varujan Pambuccian, a lawmaker and former programmer, helped draft the
new law after Romania's government realized the nation, which is racing
to join the European Union by 2007, was getting a bad online reputation.
"We want a good name for our country," he said. "I'm very
angry that Romania is so well-known for ugly things for street
dogs, street children and hackers." Pambuccian said there was a
noticeable decline in criminal activity in the first three months since
the law took effect.
More than 60 Romanians have been arrested in recent joint operations
involving the FBI, Secret Service, Scotland Yard, the U.S. Postal
Inspection Service and numerous European police agencies.
They include the two suspects implicated in the South Pole extortion
attempt last May. Both are awaiting trial. Another Romanian pair was
arrested on suspicion of extorting cash from Integrity Media of Mobile,
Ala., after information on 30,000 credit card accounts was stolen in
March.
Police say several hackers have been convicted, though in lower-profile
cases.
Although the Russians are better known for online extortion, Romanians
have become major players in the scam, a specialty also favored by
criminals from Bulgaria, Poland and Slovenia.
Information technology is a Romanian forte dating to the former regime,
when the late dictator Nicolae Ceausescu saw computers as a way to
advance communist ideology. Software piracy took firm hold during the
Soviet era, when Romanians too poor to buy licensed software simply
copied it.
Today, Romanians get their first computer lessons in nursery school.
Universities have top-notch IT programs whose graduates are heavily
recruited by Western companies. Microsoft Corp. recently acquired GeCAD,
a leading Bucharest data-security firm.
But all that know-how has spawned a dark side: Internet vampires who prey
on victims half a world away.
The classic scam: Offer high-end electronics or other goods for sale or
auction, take the order, confirm the "shipment" and
simply vanish the moment the consumer has wired payment.
The Internet Fraud Complaint Center said it gets hundreds of complaints
daily from defrauded Americans. Many cases trace to Romania, where
criminals use Internet cafes to elude capture and avoid leaving a digital
trail to their home PCs.
Some have developed Web pages that mimic legitimate sites such as eBay,
diverting them into the cyberspace equivalent of a back alley. Buyers
think they're dealing with eBay, but their money ends up in criminal
hands and the goods are never shipped.
The most brazen hack into protected corporate databases, where they copy
proprietary information and demand cash on threats of publishing the
findings on the open Internet.
This past summer, authorities aided by FBI experts arrested six young
Romanians in the Transylvania town of Sibiu after they successfully
extorted $50,000 from several leading American corporations, which were
not identified.
Virgil Spiridon, chief inspector of Romania's national police and head of
a newly launched computer crime task force, said authorities have
intercepted online traffic, tracked Internet headers and addresses,
searched suspects' homes and seized hard drives.
But Mihai Radu of Bucharest-based BitDefender, a data security company,
says criminals are smarter than local authorities.
Romanian police asked BitDefender to help track down a 24-year-old
university student suspected of creating and releasing a version of the
crippling MSBlaster worm in August. The suspect, Dan Ciobanu, has not
been arrested but remains under investigation.
"The Romanian police aren't qualified," Radu said as young
analysts in jeans, T-shirts and sneakers disassembled strings of code to
detect possible viruses. "They don't have the tools, the skills, the
software."
Pointing up the criminals' knack for staying one step ahead of the law,
FBI documents note that because consumers are reluctant to do business
with Romanians, some scammers have found accomplices in other countries.
Others pass themselves off as coming from elsewhere.
When police caught on that criminals were getting paid through Western
Union transactions, they switched to direct bank-to-bank transfers, which
are trickier to trace. Lately, they've set up bogus PayPal-style escrow
accounts.
In an astonishing show of bravado, some cybercriminals dare even to toy
with those tracking them.
Radu recalls logging on to his PC at home, only to watch in horror as the
cursor moved independently around the screen and the CD-ROM tray slid in
and out as though possessed by a poltergeist.
"I was hacked," he said. "There's a fight between the dark
side and the light side."
Gesturing toward BitDefender's football field-sized room of programmers,
he added cryptically: "They can do anything. If they weren't working
for us, who knows what they'd be up to."
*******************************
USA Today
Google ordered to pay fine in French trademark case
By Christopher Noble, Reuters
10/18/2003
PARIS A French court has ruled against Internet search powerhouse
Google in an intellectual property rights case that could have far
reaching technological and financial implications for Web search firms,
who process tens of millions of queries a day.
The civil court in Nanterre, near Paris, fined privately held Google
75,000 euros for allowing advertisers to link text Internet
advertisements to trademarked search terms and gave the company 30 days
to stop the practice, common at Internet search services.
The ruling, handed down earlier this week, is believed to be the first in
which the owner of a trademarked term successfully sued an Internet
search service over the practice of allowing advertisers to use protected
terms in text ads.
If it was upheld on appeal and validated in other countries the decision
could force the search services to pre-screen search terms for trademarks
before letting advertisers use them.
It was not the first time the French legal system has taken aim at the
Internet. In November 2000, a French judge ordered Internet giant Yahoo
to bar people in France from accessing sites selling Nazi memorabilia in
a case that sparked a trans-Atlantic legal spat.
Timothy Koogle, the company's one-time chief executive, was acquitted
earlier this year of charges that he condoned war crimes by selling the
items on Yahoo sites.
In the trademark case, the owner of the name "Bourse des vols"
(Market for Flights), an Internet travel agent, wanted Google to stop
allowing competitors to include "Bourse des vols" as a term
that would generate an advertisement and link to their own site that
Internet searchers could click on.
Google had refused, arguing its French arm was not responsible, that the
term bourse des vols was not protected by a valid trademark and that the
issue was technological and could not be resolved.
But the court found for the plaintiff on all three issues, said Fabrice
Dariot, who owns the trademark to "Bourse des Vols" and sued
Google. Dariot said that while the fine was small, the decision could be
important.
"It was as though the Internet and the real world were two different
worlds, but this ruling shows that there is only one world," he said
in an interview. "It shows that the Internet will have to respect
intellectual property rights."
The result of the decision would be that any time the term "Bourse
des Vols" was typed in, only ads for that specific site could be
posted with the search results, Dariot said.
Mountain View, California-based Google said it would appeal the decision
and declined further comment.
But because the decision was made on an enforceable basis, Google will
have to make the changes while the appeal is underway or face fines of up
to 1,500 euros for each infraction, Dariot said.
*******************************
Reuters
Finns Ready Law for Tracking Young Cellphone Users
Fri Oct 17, 8:49 AM ET
HELSINKI (Reuters) - Finland has proposed a new law that would let
parents track the movements of their young children via mobile phone,
even without their consent, in a move that could set an EU benchmark in
privacy and handset use.
The proposal is part of new law on privacy in electronic communications
and could still be changed in parliament hearings, although the Nordic
country's coalition government accepted it unanimously this week.
Parliament will likely start discussing the proposal early in November,
but state officials and politicians said it was too early to estimate
when the law could be passed.
"Roughly similar legislation will be a reality in the European Union
(news - web sites) area in the near future," said Juhapekka Ristola,
an official at the transport and communications ministry.
He said other countries may follow the example of Finland, home to the
world's largest mobile phone maker Nokia (news - web sites), because the
proposal is based on the EU's directive on privacy and electronic
communications.
According to the draft, individuals aged 15 or older could only be
tracked after giving their consent, but for children under 15 such
consent could also be given by their parents or guardians.
In emergency situations people can still be tracked without their consent
regardless of their age.
Finland's top two mobile operators, TeliaSonera and Elisa, currently
offer positioning services which locate the phone user based on the
mobile base station he or she is nearest to.
TeliaSonera says the positioning works from between 100 meters (yards) in
congested areas to 20 km (12 miles) in less populated areas.
Finland is a world leader in mobile technology, and last February topped
the World Economic Forum (news - web sites)'s list as the most tech-savvy
country in the world.
*******************************
Washington Post
Personnel System in Final Stage
Panel to Review Options for Homeland Security Workers
By Christopher Lee
Monday, October 20, 2003; Page A21
One of the government's most important construction projects will hit a
crucial phase this week, yet not a shovel of dirt will be turned over.
Starting today, officials from the Bush administration and federal
employee labor unions will enter the final stages of building a new
personnel system for 180,000 employees at the new Department of Homeland
Security. The 18-member senior review committee will spend three days at
the Almas Temple downtown going over the 52 personnel system options that
a federal working group spent more than six months developing.
The panel will produce a summary report -- but not specific
recommendations for a new personnel system -- to Tom Ridge, the homeland
security secretary, and Kay Coles James, the director of the Office of
Personnel Management. The committee's power is limited. Although Congress
required the administration to consult with employee groups in crafting a
new personnel system, Ridge and James have the final say.
Ridge and James are expected to come up with a proposed plan in December,
which will then undergo 60 days of legal review and public comment before
becoming final early next year.
"This process is a model for how management and labor can work
together with mutual respect even though there may be real policy
differences," James said in a statement this month.
John Gage, president of the American Federation of Government Employees
and a member of the review panel, said he hopes Ridge and James consider
the union's input, but the fact remains that unions have no power to
shape the final outcome.
"We have to be big boys and face reality on that," Gage told
reporters Friday. "I think it puts a lot of pressure on [Ridge].
He's going to be pulled in a number of different directions on this. . .
. He's going to have to make some tough decisions."
The process is important because the new system will help define the
operation of a vast department formed less than a year ago through the
consolidation of 22 agencies to better protect the nation against
terrorism. More than that, however, the final product could provide a
template for the administration to use in pursuing sweeping personnel
reforms across the government, participants said.
"Whatever Ridge and James ultimately do, I think, will be looked at
by all other agencies," said Colleen M. Kelley, president of the
National Treasury Employees Union and a member of the review panel.
"It's just a matter of time before they are all standing in line
saying, 'We want the ability to either do exactly what DHS does, or at
least to have the opportunity to make some more changes.'
"
Tasia Scolinos, a DHS spokeswoman, said Ridge and James want to hear from
many voices before making a final decision.
"They want all concerns, all pros and cons, on the table," she
said.
Although some might consider crafting a personnel system a mundane task,
the creation of the department was delayed for months last year because
of a bitter fight in Congress over work rules at the new agency.
President Bush and Republican lawmakers argued that existing civil
service laws would tie managers' hands in their efforts to build an
effective department. Democrats said erasing long-standing protections
against unfair treatment of civil servants would not enhance national
security.
In the end, Bush prevailed and Congress granted the administration
freedom to rewrite civil service rules in the areas of pay, performance
appraisals, job classifications, labor-management relations, discipline
and employee appeals.
Administration officials have said they are intent on creating a system
that ties pay to performance rather than longevity, that more quickly
resolves employee grievances and appeals, and that limits collective
bargaining rights. Union leaders say agencies, including DHS, don't have
the expertise or money to implement pay for performance properly. And
they say workers won't want to stay in a department without an
independent appeals process and collective bargaining rights to protect
them from unfair treatment and cronyism. "Morale is not good in
Homeland Security," Gage said. "People are very concerned and
maybe a little demoralized about what's going on."
*******************************
USA Today
Teen computer whiz cleared in Houston hacking
10/17/2003
LONDON (AP) A teenage computer expert was acquitted Friday of
hacking a system that provides navigational data for the port of Houston.
A jury at Southwark Crown Court in London accepted 19-year-old Aaron
Caffrey's contention that unidentified vandals had installed an attack
script on his computer, which he then unknowingly set into motion.
Prosecutors had said Caffrey intentionally launched an electronic assault
on a woman he met in an Internet chat room because he believed she had
insulted his girlfriend. They alleged that in carrying out that attack,
Caffrey inadvertently paralyzed the Houston system by bombarding it with
thousands of electronic messages.
The port's Internet site was forced out of service temporarily, making it
difficult to obtain information about ships' whereabouts.
Caffrey, who belongs to a group called Allied Haxor Elite, acknowledged
hacking into computers in the past but only with the permission of the
machines' owners, whom he said wanted to test their security systems.
He insisted he had nothing to do with the September 2001 attack in
Houston, testifying during a two-week trial that he knew nothing about it
until police came to arrest him in January 2002.
The officers confiscated his computer. He was charged and brought to
trial after computer experts failed to find so-called "Trojan
horse" software that would have indicated someone had hijacked
Caffrey's computer.
He testified that the program might have been designed to self-destruct,
leaving no trace of its presence.
"This ordeal has been a dark cloud hanging over him for the last two
years," Caffrey's lawyer, Iain Ross, said after the verdict.
"He had always insisted he was not guilty and that he was a victim
of a criminal act rather than being a criminal himself."
*******************************
USA Today
Scottsdale company pioneers Amber Alert Web site
10/18/2003
MESA, Ariz. (AP) A Scottsdale-based company could begin operating a
free Web portal that disseminates Amber Alerts nationwide by the end of
next year.
The site would allow states to share information instantly and could be
used to alert the country in case of an abduction or disaster.
E2C, which stands for Engaging and Empowering Citizenship, has the Web
portal partially up in Arizona, said company founder and CEO Chris
Warner. By the end of this year, Arizona and Washington will be online,
Warner said.
"So, by the end of the next year, there's a very good chance we are
going to have all 50 states working, fully functional," he said.
The system lets computers send out alerts, allowing a first responder to
upload information with the help of the Arizona Department of Public
Safety, Warner said.
"Then, in one push of the button, it goes out to any concerned
party," he said.
All 50 states have signed on to join the program.
The National Alliance of State Broadcasters Associations voted
unanimously to support the portal and the Department of Homeland Security
is also looking at it, said Art Brooks, chairman of the Amber Alert
Oversight Committee in Arizona.
The Web portal, which uses software that cost between $1 to $2 million to
develop, is partially funded by donations from corporate sponsors, Warner
said.
Amber Alerts are used by law enforcement to spread information about
abductions and suspects. The system, which Arizona started using this
fall, distributes details on abductions to radio and television stations,
and to electronic message signs on state highways.
*******************************
Australian IT
Australia, Korea forge spam pact
Kate Mackenzie
OCTOBER 20, 2003
AUSTRALIA and Korea have signed a memorandum of understanding on spam,
pledging to work together to reduce junk emails in both
countries.
The Australian Communications Authority, the National Office for the
Information Economy, and the Korean Information Security Agency formally
signed the agreement today in Melbourne.
Acting ACA chairman Bob Horton said the agencies would share information
and work closely together, with the aim of reducing the volume of spam
both originating in, and being sent to, Australia and South Korea.
"The ACA is looking forward to working closely with KISA and NOIE to
develop cooperative mechanisms to combat the rapidly growing spam
problem," Dr Horton said.
Anti-spam software vendor MessageLabs estimates 3.5 per cent of spam
originates from South Korea. The United States was responsible for 58.4
per cent, according to the company's research.
*******************************
Federal Computer Week
Performance flogs Tampa facial tech
Viability of facial-recognition systems left in question, privacy issues
linger
BY Dibya Sarkar
Oct. 20, 2003
Although facial-recognition technology often raises privacy concerns,
Tampa, Fla., officials' recent decision to jettison an experiment using
surveillance cameras to electronically probe city streets for criminals
had to do with performance, not privacy.
Tampa officials had planned to use cameras to match criminals' faces
against a large criminal database. Their decision to drop the technology
casts doubt on its future in the public arena, leaving Virginia Beach,
Va., as the only U.S. municipality still using it.
Joseph Atick, president and chief executive officer of Identix Inc.,
which provided the software to both cities, said facial-recognition
technology is not jeopardized. The company, however, will no longer
market the software for that particular function.
Facial-recognition technology "has never been in a better position
than it is right now," he said. "We are pursuing surveillance
at security checkpoints, at border control areas. They think it is
important for us to do the check to make sure people aren't on a watch
list. But wide-area surveillance in the street is not an application we
are pursuing."
Tampa, which scrapped the program in August, had been testing the
technology for a couple of years in an 11-block section of the city. The
pilot program sought to integrate the facial-recognition software with
its 37 surveillance cameras, which still remain in place. During that
period, however, the city did not have "one alert, one
identification nor made one arrest as a result of the software,"
said Capt. Bob Guidara, the police department's spokesman.
"With a database of over 24,000 local wanted and missing persons,
and not one alert, we're perplexed as to why that was the fact especially
when this entertainment district was frequented on Thursday, Friday and
Saturday nights with crowds of 10,000 to 20,000" people, he said.
"We concluded that the software, at least in this environment or
application, did not really serve any true benefit to us," Guidara
said. "And rather than instill a false sense of security both with
our officers and the public, we felt it was better to eliminate that
application."
Atick suggested that Tampa's newly elected mayor, Pam Iorio, might have
decided to discontinue the program given the privacy concerns that the
system sparked.
Privacy groups, including the American Civil Liberties Union, have
complained. Such technology, they have said, is unproven and its usage
smacks of Big Brother tactics despite police department assurances that
data collected on innocent pedestrians would not be stored but would be
discarded immediately. Privacy groups said deploying more patrol officers
would be more effective.
Guidara said the timing was coincidental. The contract with Identix that
provided the city with free usage of the facial-recognition software was
up for renewal. After an assessment with the police chief and
consultation with the mayor, they decided against renewing it.
***
Virginia Beach system continues
Tampa, Fla., officials have abandoned facial-recognition technology, but
Virginia Beach, Va. officials have no plans to take down their system,
said Lt. Dennis Santos, supervisor of the city's facial- recognition
system.
Virginia Beach's system, which cost $200,000 in federal and city funds,
has been operating since September 2002. It surveys a beachfront area.
During summers, the city's normal population of 500,000 swells to 4
million. Although it has 13 surveillance cameras, the department linked
the software to only three. The software scans against a database of
about 600 records, which include local felony warrants, lost and runaway
children and older individuals, and the FBI's 10 most wanted list and
terrorist wanted list, Santos said. However, because of military call-ups
of several officers, finding workers to man the system during the summer
has been difficult. Normally, the system operates from 10 a.m. to
midnight, he said. In the past year, Santos said the system has issued
two alerts. One suspect did not turn out to be a match after officers
interviewed him. In the second case, officers were unable to find the
individual after being alerted by the system's operator of a very good
match. Interviews are consensual and police officers first inform the
individuals that they were chosen because they were matched by the city's
facial-recognition system. Local law enforcement agencies and other
groups across the country and in Canada have expressed interest in the
system. Santos said eventually the city's database would expand, but
never reach Tampa's large size.
*******************************
Government Computer News
Web access app gets Common Criteria certification
By Patricia Daukantas
IBM Corp. today announced that its Tivoli Access Manager software, an
application that controls access to online information, has received
international Common Criteria security certification.
The software was certified under Evaluation Assurance Level 3, said Chris
O?Connor, IBM?s director for corporate security. The EAL3 certification
requires that the application?s security functions have been methodically
tested and checked.
For the Common Criteria test, Tivoli Access Manager 4.1 was tested on
four operating systems: IBM AIX 5.2, Sun Solaris 8, Microsoft Windows
2000 Advanced Server with Service Pack 3 and Suse Linux Enterprise Server
8.
Atsec Information Security GmbH of Germany performed the testing, which
was then certified with the German Federal Office for Information
Security, O?Connor said. The United States is one of the nations that
recognizes Common Criteria certification.
The evaluation of the Tivoli application is part of a broader IBM
strategy to gain EAL3 certification for apps that agencies can use for
e-government projects, O?Connor said. Several other IBM products,
including its WebSphere Application Server, are currently being evaluated
through the Common Criteria program.
*******************************
Government Computer News
10/20/03
Commerce IT reorganization put on back burner
By Wilson P. Dizard III
An administration plan to consolidate three Commerce Department
technology agencies has been delayed because of the press of legislative
business in Congress, a department spokeswoman said.
?It has been sent to Capitol Hill, but it has not been introduced,? said
Connie Correll, spokeswoman for the department?s Technology
Administration. ?I think we are just waiting for the appropriations
process to die down because there are so many other things going on right
now.?
In July, Commerce secretary Don Evans sent the 21st Century Innovation
Act to Vice President Dick Cheney, who is president of the Senate, with a
request to introduce it. But neither Cheney nor any other lawmaker has
sponsored the bill.
The proposal, which Evans first announced in February [see story], calls
for merging the Technology Administration, the National
Telecommunications and Information Administration and the electronic
commerce functions of the International Trade Administration [see story].
The new agency would be called the Technology and Telecommunications
Administration.
Legislative aides on the House Energy and Commerce Committee and Senate
Commerce Committee said they were not familiar with the proposal.
Commerce?s Correll said the proposal is a ?must-do piece of legislation
for the technology sector,? but conceded that ?it doesn?t rise to the
level of reforming Medicare or fighting the war on terrorism.?
Mike Zaneis, director of technology policy for the U.S. Chamber of
Commerce, said his organization generally favors proposals to streamline
government but added that his organization would want to see the details
of any proposal before endorsing it.
*******************************
Government Executive
October 17, 2003
Officials debate rule on liability for anti-terrorism tools
By Greta Wodele, National Journal's Technology Daily
Lawmakers and industry officials on Friday expressed concern about the
Homeland Security Department's plan to implement a law designed to limit
the liability that companies might face for their counter-terrorism
technologies.
"By passing the [law], Congress acted quickly to resolve uncertainty
over liability concerns so that the full power of American technology
could be unleashed in the war on terrorism," Virginia Republican Tom
Davis, chairman of the House Government Reform Committee, said during an
oversight hearing on the Support Anti-Terrorism by Fostering Effective
Technologies (SAFETY) Act. "[The department] must be careful that
its implementing regulations and processes are not so complicated that
they defeat the very purpose of the SAFETY Act."
He said "bureaucratic delays" have resulted in "private
firms waiting to submit applications until they have seen some finality
in the application process and implementing regulations."
Homeland Security said it would begin taking applications in September
but began the process on Thursday after issuing an interim rule late last
week, Davis said. The law, which was enacted in January, provides limited
liability protection for companies if their products or services fail to
prevent terrorist attacks.
Parney Albright, a Homeland Security assistant secretary, said the delay
was due to a review of public comments from more than 40 companies and
associations. Albright also said the regulatory process typically takes
18 months, but Homeland Security "compressed" it to seven. The
department plans to issue a final rule in about 90 days, he said.
Harris Miller, president of the Information Technology Association of
America (ITAA), testified that changes to the applications process are
necessary. The application, he said, would take companies an average of
1,000 hours to complete.
"We are concerned that the ... information requirements are so
massive as to ignore the real-world business issues surrounding
deployment of anti-terrorism technologies and urge the department to
rethink the scope of information being required," he said.
The department, however, estimated that it would take 108
hours.
When asked by lawmakers if the process would prove burdensome and delay
the use of anti-terrorism technologies, Albright argued that the
requested data meets criteria established not by the department but by
the law. Albright also said if the department believes it needs
"statutory relief" in the future, it would work with Congress
to make necessary changes.
Miller, along with the Professional Services Council and the Chamber of
Commerce, also called the request for detailed financial data
"unnecessary," arguing that it would deter companies from
applying for liability limits and negate the purpose of the law.
"The information submitted to the [department] will necessarily
contain very sensitive confidential and proprietary ...
information," said John Clerici, a lawyer representing the chamber.
"Without assurances of confidentiality, the need to supply this
information alone will likely deter sellers."
Industry officials also cited "significant hurdles" that need
to be addressed before finalizing the rule, including prioritizing
applications and clarifying protections for proprietary information.
Davis agreed, saying, "The interim rule is not where we need to
be."
*******************************