Mining Data to Nab Terrorists: Fair?
Christian Science Monitor (05/15/06) P. 1; Clayton, Mark
The real value of harvesting the phone records of millions of Americans is
the possibility that intelligence analysts could use the data to establish
patterns and connections between people that flesh out a network of
potential terrorists, according to computer experts. "From phone records
you can learn who are my friends--and who their friends are -- what
services I use, where I shop," says Johannes Gehrke, a Cornell University
computer scientist. "Our social interactions leave a digital trail.
[Phone record analysis] is government learning about human behavior from
analyzing that trail." Intelligence analysts likely cross-reference phone
records with numerous other data, such as Internet and credit card records,
in an effort to extract meaningful relationships from the wealth of digital
information available today. As it gathers steam, the data-mining program
could run afoul of the law, or grow so large that it creates so many false
positives that finding real terrorists actually becomes more difficult.
Valdis Krebs, an expert in social networking analysis, claims that it is
more effective to conduct analysis around specific persons of interest,
rather than the government's method of amassing vast databases of the
activities of mostly innocent Americans, where it will be difficult to
conduct accurate analysis due to the sheer volume. Krebs maintains that
the government is complicating the problem by taking such a broad-brush
approach and that it will inevitably waste time and needlessly intrude on
innocent Americans because of the myriad scenarios that could produce a
false positive. The Electronic Frontier Foundation (EFF) reports that a
single AT&T database contains 300 TB of information, 15 times the size of
the Library of Congress. Harvard University law professor Charles Fried
dismisses the allegations raised by the EFF and other civil liberties
groups that the program is illegal, noting that phone records only have the
narrowest legal protection.
Click Here to View Full Article
to the top
Sensors Without Batteries
Technology Review (05/15/06) Greene, Kate
Some technologists envision a future where tiny sensors embedded
everywhere will create a kind of ubiquitous computing that provides
information about key environmental factors, such as light, temperature, or
motion. Absent a continuous power source, the sensors would need new
batteries every few months, according to Intel's Josh Smith, who is working
to develop sensors based on the battery-free technique deployed in RFID
tags. Researchers have proposed powering sensors with ambient light or
other environmental energy sources in the past, though it remains uncertain
if the cost of integrating the technology that harnesses ambient energy
into sensors can be brought down enough to facilitate widespread
deployment. Intel's sensors are built from off-the-shelf components,
including an antenna that transmits and receives data and draws energy from
an RFID reader, and a microcontroller with sensors that only needs a couple
hundred microwatts of energy to harvest and process data. An RFID reader
relays its signal to the antenna, creating a voltage that activates a tag
that has come within range of the reader. Through a process known as
backscattering, the tag then relays data to the reader. The
microcontroller provides the real-time computational ability to ensure that
the information relayed is free of errors. In order to be activated,
Intel's sensors currently need to be within roughly a meter of a reader,
which limits the utility of the devices in certain applications. However,
Smith is optimistic that his team will be able to reduce the power
requirement and extend the range to around five meters. Intel has
demonstrated the use of radio waves to power the second hand on a watch,
where one tick uses the same amount of power required to send one bit of
data.
Click Here to View Full Article
to the top
States Beef Up E-Voting Security After Reports on
Weaknesses
E-Commerce Times (05/12/06) Regan, Keith
States that have purchased the Diebold e-voting machines recently reported
to contain a serious vulnerability have been taking steps to improve
security for the next elections. Black Box Voting issued a report
detailing the work of Finnish computer expert Harri Hursti that discovered
what one expert called the most serious vulnerability found to date in a
Diebold machine. "While these flaws are not in the vote-processing system
itself, they potentially seriously compromise election security," the
report said. "It would be helpful to learn how existing oversight
processes have failed to identify this threat." Diebold notes that hacking
the machines would require physical access to them, and that the
vulnerability was designed to ensure that the machines could be updated
with new software to prolong their lives. Many looked to e-voting as an
alternative to the outdated paper systems that created so much confusion in
the 2000 presidential election, though critics are worried that the
increasing reliance on technology puts too much power in the hands of
manufacturers and specialists, and that verifying votes is essentially
impossible in machines that do not produce a paper record. The nonprofit
group Voter Action has helped voters in Arizona file a suit attempting to
halt the state from purchasing e-voting machines, claiming that they would
disenfranchise certain voters. Critics are concerned with the chain of
custody of the machines, noting that a breach could go unnoticed for a long
time because they are frequently moved around and placed in storage for
extended durations. A knowledgeable programmer could infect the machines
with a malicious program in minutes, according to the Black Box report.
Diebold and other e-voting supporters note that there has not been a single
reported case of altering an actual election, and that manipulating results
from traditional machines is as simple as destroying the paper ballots.
For information about ACM's e-voting activities, visit
http://www.acm.org/usacm
Click Here to View Full Article
to the top
China Says One of Its Scientists Faked Computer Chip
Research
New York Times (05/14/06) P. 10; Barboza, David
China has reported that Chen Jin, a prominent researcher and a dean of
Jiaotong University, fabricated his research behind one of China's first
native-developed computer chips and that he stole the technology from a
foreign company. Chen has been dismissed from his government and
university positions, and the government has permanently banned him from
participating in any government-funded projects. A statement from the
prestigious Jiaotong University read, "Chen Jin has breached the trust of
being a scientist and educator. His behavior is despicable." Chen
developed his three digital signal processors with the funding and support
of the Shanghai government, Jiaotong University, and China's top scientific
and government organizations. China has made its semiconductor industry a
top priority in the face of tensions with the rest of the world over
intellectual property issues, and heralded Chen's first chip in 2003 as a
major scientific achievement. That chip, known as Hanxin, or China chip,
is a high-speed processor for electronic devices such as mobile phones that
was introduced as a milestone in China's development of a native
semiconductor industry that would help break the foreign monopoly on chip
design. The faster Hanxin 2 and Hanxin 3 appeared nine months later,
though now Jiaotong and the government say the chips do not have the
capabilities that Chen had claimed, despite having reported earlier that
government appraisers had tested the chips. The government has canceled
the Hanxin initiative and recalled its funding. Allegations that Chen
fabricated his findings first appeared on the Internet this past winter,
posted by someone naming himself as a whistle-blower.
Click Here to View Full Article
- Web Link May Require Free Registration
to the top
Fight for .XXX Not Over Yet?
Computer Business Review Online (05/12/06) Murphy, Kevin
ICANN's board has voted 9 to 5 against ICM Registry's application for
oversight of a .xxx porn domain, fueling even further criticism that the
organization is a puppet of the U.S. government. "We see here a first
clear case of political interference in ICANN," a spokesperson for Viviane
Reding, the European commissioner for information society and media, said
following the vote. But ICANN President Paul Twomey says such a view
paints only a fraction of the picture. ICANN received nearly 200,000
letters of complaint from people affiliated with the U.S.-based Christian
right, as well as from the U.K. government and the Free Speech Coalition,
which represents pornographers and feels that an .xxx domain would
eventually lead to censorship. "I think that to say that this [ICANN]
board, as international as it is, was somehow dancing to political
intervention from the U.S. government is ill-founded and ignorant," said
Twomey, noting that the most recent letter came from the U.K.'s
representative to ICANN's Governmental Advisory Committee, Martin Boyle,
reading, "The U.K. expresses its firm view that if the .xxx domain name is
to be authorized, it would be important that ICANN ensures that the
benefits and safeguards proposed by the registry, ICM, including the
monitoring of all .xxx content and rating of content on all servers pointed
to by .xxx, are genuinely achieved from day one." This was taken to mean
ICANN would be forced to take on an enforcement role, which some board
members opposed. ICM President Stuart Lawley may appeal the decision.
"We've done everything that's been asked of us, we've behaved in a positive
way, in a way we felt was acceptable to ICANN," he said. "We're just
considering our options at this point."
Click Here to View Full Article
to the top
Microsoft Spotlights Futuristic Collaboration
Technologies
TechNewsWorld (05/11/06) Morphy, Erika
Microsoft is showcasing the collaboration technologies under development
at its Center for Information Work, a laboratory where the company is
exploring cutting-edge applications to support its Office of the Future
initiative. "To help our customers boost their individual and corporate
productivity, we must continually increase our understanding of the demands
facing information workers today as well as the trends shaping the new
world of work," said Microsoft's Tom Gruver. The initiative seeks to
develop smart, fun, and easy-to-use technologies to enhance personal
productivity, "make information universally available across different
applications and devices, and make information easier to find and share,"
according to the company. Microsoft also hopes that its platform will help
users identify business-intelligence trends, facilitate inexpensive
distributed meetings, and streamline workflows with software to
automatically route approvals, alerts, and exceptions. Although Microsoft
has long been known as a company fond of promoting its far-off research
activities, one technology expected to reach the market next year is the
Microsoft Roundtable, from the company's Unified Communications Group, a
communication device that features a 360-degree camera for
multiple-location videoconferencing.
Click Here to View Full Article
to the top
Gadget Firms Tackled on Usability
BBC News (05/15/06)
The Alliance for Digital Inclusion (ADI) has thrown its support behind an
initiative that seeks to make technology easier to use. "We recognize that
technology can be both a cause of and a solution to exclusion," says Heidi
Lloyd, spokeswoman for ADI, whose members include Cisco, Intel, BT,
Microsoft, and IBM. The group has joined the Royal National Institute for
the Deaf (RNID), the Disabled Living Foundation, and the technology
consultancy Scientific Generics in an effort to sign up computer, mobile
phone, and TV makers for the E-Inclusion Charter, which calls for
improvements in the navigation and usability of their products. "If you
sign up to it, it's not just a piece of paper, it's an undertaking to bring
about real change," adds Guido Gybels, director of new technologies at the
RNID. Technology products should be accessible to anyone who buys or uses
them, Gybels maintains, adding that everyone would benefit if high-tech
firms paid more attention to the design of software and hardware. Applying
the principles of usability and user testing to products and services offer
business advantages, studies indicate.
Click Here to View Full Article
to the top
Xerox's Centre of Missed Opportunities
Financial Times (05/12/06) P. 16; Yee, Amy
Xerox's storied Palo Alto Research Center (Parc), famous for letting other
companies prosper by commercializing the research that led to some of the
most important innovations of the computing age, is now taking a more
business-minded approach. The shift began when Anne Mulcahy took over as
CEO in 2001 and began pulling the company back from the brink of bankruptcy
by cutting jobs, restructuring operations, and realigning the objectives of
Parc with the company's overall business goals. "In the past, creating new
knowledge was enough," said Mark Bernstein, president and director of Parc.
"Now, it's 'How can my work matter to the business?'" When Xerox spun off
Parc in 2002 as a wholly-owned subsidiary, the center began to operate
under a more focused business strategy. Long criticized for spinning off
its own businesses too quickly and allowing its research to die on the
vine, Parc is now aggressively pursuing strategic partnerships with
governments, corporate sponsors, and research organizations as it attempts
to move away from office equipment in favor of technology services. Parc
now generates about $30 million in annual revenue from corporate sponsors,
and has also begun incubating businesses in-house. Parc has joined up with
SolFocus to research new energy-efficient technologies and the Scripps
Research Institute to explore new methods for identifying cancer cells.
NASA has employed Parc as a subcontractor to develop robots to explore
space, and Fujitsu has signed a long-term agreement to sponsor the center's
development of ubiquitous computing sensors that could be used in health
care, retail, and transportation.
Click Here to View Full Article
- Web Link May Require Paid Subscription
to the top
Computing Behavior Key to Work
University at Buffalo Reporter (05/11/06) Vol. 37, No. 32,Keltz, Jessica
University of Buffalo computer scientist Sheng Zhong is currently
researching the economic incentives that encourage computing behavior, and
how to maximize individual computing behavior for the collective of users.
Zhong says some wireless networks depend on contributions from users'
computers to move data along. However, many users realize that their
battery power and bandwidth is limited, and they are more concerned with
taking advantage of the computing power of their computers for themselves,
and not about improving the operation of the network for all users. "But
if nobody helps others, the network just cannot be run," says Zhong. The
National Science Foundation's Cyber Trust program has provided funding for
Zhong's "Incentive-Combative Protocols" research project over the past
three years, and his recent paper offers some theories for designing a
network that would facilitate such sharing. Zhong says his research is
more theoretical than experimental, and that the code he uses has not been
completed. "It cannot be directly used by consumers, but it illustrates
aspects of our design," he explains. Zhong also is pleased that his
research has been cited 169 times by other academics since 2003.
Click Here to View Full Article
to the top
MS Researchers Tackle Automated Malware
Classification
eWeek (05/11/06) Naraine, Ryan
At the recent European Institute for Computer Anti-Virus Research
conference in Hamburg, Germany, Microsoft researchers announced their plans
to develop an automated technique for identifying the thousands of
varieties of malware that target Windows computers. Their approach will
utilize distance measure and machine learning technologies to improve on
the existing methods of classifying different viruses, Trojans, rootkits,
and other forms of malware. "In recent years, the number of malware
families/variants has exploded dramatically," says Microsoft's Tony Lee.
"Virus [and] spyware writers continue to create a large number of new
families and variants at an increasingly fast rate." The evolutionary
habits of malware families make it extremely difficult to automate static
file analysis, Lee said. Microsoft believes that automation would provide
a faster, more objective method for malware classification that saves more
information than current techniques, which rely heavily on human research
and memorization. Microsoft is hoping that its new method will address all
aspects of classification holistically, including knowledge consumption,
representation, and storage, as well as the generation and selection of
classifier models. The technique will require the efficient structuring,
storage, and analysis of the classifications so that familiar patterns can
be identified immediately.
Click Here to View Full Article
to the top
Smart Homes--An Intelligent Answer to Healthcare
Challenges
University of Ulster (05/12/06)
Northern Ireland is gearing up for the fourth International Conference on
Smart Homes & Health Telematics, which is being hosted by the University of
Ulster. Scheduled for June 26-28, ICOST2006 will have a technological
focus on intelligent environments, personal robotics and smart wheelchairs,
cognitive devices, wearable sensors, medical data collection and
processing, and home networks. However, the event will also cover
non-technical issues related to smart homes that have a wider societal
impact, such as privacy and security. Northern Ireland has a growing aging
population, and University of Ulster computer science senior lecturer
Maurice Mulvenna believes the health care industry should find ICOST2006 to
be particularly informative. Smart homes can provide older people and
those with disabilities with an opportunity to continue to live outside of
health care facilities, but remain connected to their families, friends,
and their health care support system in a secure environment. "Smart homes
offer these kinds of facilities while promoting and maintaining the
functional independence of aging people through automation," says ICOST2006
Chairman Dr. Chris Nugent. "Functions like turning heating on or off,
which in turn can promote cost savings to those with limited energy
budgets."
Click Here to View Full Article
to the top
Cricket Liu Interviewed: DNS and BIND, 5th Edition
CircleID (05/10/06)
Cricket Liu, co-author of the DNS and BIND book, often called the bible of
DNS, talks here about the latest developments in the Domain Name System
following an announcement of the release of the latest edition of the book,
its 5th. The new edition's biggest update is a new chapter on DNS
architecture, the lack of standardization of which has led to a trial and
error approach by administrators. Security is given focus, with a
description of vulnerabilities within Internet name servers that allow them
to be exploited by "DNS amplification" attacks and how to thwart such
attacks by limiting access to recursion on Web-accessible name servers.
For other threats, Liu says, extensions to the DNS protocol such as DNSSEC
are useful, applying asymmetric cryptography to DNS so administrators can
digitally sign zones. Liu moves on to talk about the advent of Telephone
Number Mapping that will make it possible for VoIP phones to complete calls
over the Web without the need to convert phone numbers to URIs. Asked
about IDNs, the author says the issue of identical characters in various
scripts still poses a problem no one has solved yet. Liu says the move
toward IPv6 is inevitable and may come even sooner than expected. Summing
up, Liu says that enhancements to the DNS system will make "obsolete the
traditional way of managing name servers and zone data with text-based
configuration and zone data files."
Click Here to View Full Article
to the top
The Internet Splits Up
Newsweek International (05/22/06) Foroohar, Rana; Villeminot, Florence;
Schafer, Sarah
Although the Internet has always been a uniquely bottom-up,
nonhierarchical, seamless form of global communication, that is beginning
to change as governments, multinational companies, and individuals battle
for control of the Web. For example, China has begun tweaking the local
search engine baidu.com so that users in the country who search for Falun
Gong, for example, will only get state-approved, anti-Falun Gong Web sites.
A number of other countries have also adopted such censorship techniques,
which could undermine the global unity of the Internet. Meanwhile, nations
such as Iran--who are concerned that U.S. dominance of the Internet could
mean that their national domain names will someday be turned off for
political reasons--have created their own alternative versions of the
Internet. Although they have vowed not to make any politically motivated
changes on their servers, governments and political organizations such as
Germany's Open Root Server Network could create new, misleading versions of
U.S. Web sites, which Internet users could be misrouted to without even
realizing it. Some also worry that as nations create their own versions of
the Internet, the entire system could collapse. Telecoms' plans to charge
content providers such as Google, eBay, and Yahoo! higher rates to
guarantee reliable delivery of their new video content have also been a
threat to the unity of the Internet. Overturning the long-held principle
of net-neutrality will create a two-tiered Internet, which could hamper
technological innovation by increasing the cost of startups and changing
the whole Web paradigm of forming companies quickly and on a shoestring
budget.
Click Here to View Full Article
to the top
Password Security Is Her Game
California State University, Long Beach (05/06) Vol. 58, No. 5,Manly,
Richard
Password security is not going anywhere, even though it may not be the
most secure form of protection, according to Kim-Phuong Vu of the
Psychology Department of California State University, Long Beach. Vu, a
human factors expert who specializes in proactive password protection,
wants to make passwords more secure and memorable. The editor of the
handbook "Human Factors in Web Design" last year, Vu says many people have
about six passwords, about half never write them down and have to reset
their passwords because they have forgotten them, and she adds that it is
not difficult to crack the average password. In fact, she has conducted
research that shows 60 percent of passwords can be cracked within a few
hours and some can be determined in less time. People tend to choose
something that is easy to remember for their passwords, which makes them
easy to crack. A password that is easy to figure out puts bank accounts,
grades, Web sites, and more at risk, but people have generally embraced
password security, which is affordable. Voice recognition is still not
ready, and high-fidelity systems are expensive, as are fingerprint and
retina scans, which the typical computer user also finds unsettling. Vu
says a combination of higher or lower case letters, numbers, and special
characters would make for proactive password protection, and suggests that
users would have to spend more time committing passwords to memory.
Click Here to View Full Article
to the top
Managing SOA Metadata: Registries or Repositories?
SD Times (05/01/06)No. 149, P. 33; Weiszmann, Carol; Messenheimer, Susan
More extensive use of service-oriented architecture (SOA) implementations
requires a better methodology for organizing, accessing, and managing
runtime metadata. An SOA-type repository is the only way to correctly
store reusable metadata, while a registry can manage runtime artifacts such
as services and directories with more precision. However, repositories and
registries are starting to overlap in emerging SOA deployments. IBM
WebSphere product manager Sunil Murphy explains that an SOA repository must
be used to store a fine-grained model of service metadata artifacts, while
an SOA registry's purpose is to enable semantic annotations of service
metadata to support service advertisement, rich queries, and rich
classification models. LogicLibrary co-founder Brent Carlson stresses the
importance of distinguishing a runtime registry from a design-time
registry: The former supplies dynamic lookup functionality for SOA-based
applications to recover deployed service instances, and must respond in
real time to operational application loads with a restricted set of data
via a programmatic interface; the latter provides contextual data about
candidate service for use by application developers, and has to offer a
richer set of data to developers that operate in SDLC environments accessed
through a graphical user interface. Complete registry/repository solutions
are those that integrate "SOA-specific Web services administration
features--i.e., a registry--with features that are common to many
developer-centric repositories, such as organization-specific metadata and
management of reusable code fragments," according to Software AG's Chris
Warner. Flashline CEO Charles Stack says SOA registry/repositories can
lower the incidence of duplication, support reuse functionality, and
recombine Web services to organize and reorganize business processes.
Click Here to View Full Article
to the top
Young Cyber-Sleuths
Government Technology (05/06) Vol. 18, No. 5, P. 30; McKay, Jim
The CyberScience Laboratory (CSL) of the National Institute of Justice's
Office of Science and Technology places students in cyber-crime labs
through the Embedded Intern Program. It is part of CSL's effort to offer
computer forensics training and supply local and state law enforcement with
personnel to investigate electronic crimes and provide technical support.
"We're looking for somebody who can bridge the gap between the physical,
investigative, law enforcement world and the computer cyber-world,"
explains Embedded Intern Program director Robert DeCarlo. He adds that
demand for cyber-crime investigators will swell exponentially as the
Internet and wireless devices continue to proliferate. "There aren't
enough computer forensics programs available to grow people in the
profession," notes National White Collar Crime Center (NW3C) computer
crimes section manager Robert Hopper, who points to an international need
for more trained cybersecurity workers. Finding the right person for an
internship involves a penetrating examination of candidates' backgrounds,
including their extracurricular activities and cover letters. DeCarlo says
the CSL and NW3C programs take care to ensure that interns work on projects
of significance, and that their contributions play a vital role in the
agencies where they are embedded. Following the completion of an
internship, CSL students are asked to furnish a report that the laboratory
features on its Web site and at seminars.
Click Here to View Full Article
to the top
Brain Power
IEEE Spectrum (05/06) Vol. 43, No. 5, P. 24; Sarpeshkar, Rahul
Energy-efficient computing could be realized by neuromorphic engineering
and biologically inspired electronics, with bionic prostheses among the
likely near-term practical products. The central principle of neuromorphic
engineering is low-power analog processing and digitalization, which is
routinely carried out by special-purpose, interconnected biological
structures such as neurons. Converting analog signals into digital bits
and running digital processing algorithms on them is inefficient because it
requires both high bandwidth and precise calculations, and the efficiency
of biological processors lies in their ability to knit together many
imprecise analog computational units by combining analog and digital
mechanisms. Low-power circuits that support biological-like computing
employ subthreshold transistors that have an intriguing property in common
with ion channels on the surface of brain cells: The relationship between
subthreshold current and the controlling voltage. A voltage-controlled
chemical signal from one cell causes ion channels on an adjacent cell to
open, facilitating an ion flow that triggers a change in the cell's
voltage. MIT researchers have developed an analog bionic ear that
electronically imitates certain aspects of the human ear's sound processing
mechanism and postpones digitalization until it is necessary as well as
energy efficient, as biological systems do. Several challenges must be
addressed before computing systems capable of outclassing biological
systems can be created. Researchers must determine how biological systems
execute efficient, dependable computations with noisy, unreliable devices
in large-scale systems; how such systems function at numerous timescales
and across many length scales; and how to reproduce a cell's ability to
process many intersecting inputs and generate output that stimulates many
other cells.
Click Here to View Full Article
to the top