Hackers Could Skew US Elections
New Scientist (10/09/07) Marshall, Jessica
Security experts at the recent APWG eCrime Researchers Summit at Carnegie
Mellon University warned that hackers are likely to use the Internet to
deceive U.S. voters in an attempt to affect the outcome of elections.
Although election deception is nothing new, security experts say it could
be much more difficult to uncover the perpetrator as the Internet creates
far greater anonymity. The Internet could be used to spread misinformation
such as the location of voting sites, voting times, and candidates'
positions on issues through spam, botnets, and Internet phone calls.
Internet-based telephone attacks are more difficult to trace than those
using landlines, notes Rachna Dhamija of the Harvard Center for Research on
Computation and Society. Such attacks could employ botnets, which would
make them even harder to trace and potentially much larger. Candidates may
also be attacked, either directly through their Web site, as John McCain
was when a picture on his Web site was changed stating he had altered his
position on an issue, or through typo domains such as hillaryclingon.com or
muttromney.com, which could be used to collect fraudulent donations or
spread malware. In 2004, a fake John Kerry Web site stole campaign
contributions and users' debit-card numbers. Fraudulent campaign sites can
also be used to expose users to phishing and malware attacks as it is
difficult to know what the official site of a candidate is. "The fact is
that all of the technology for all of these things to happen is already in
place," says Indiana University's Christopher Soghoian. "I'm not sure this
will happen in 2008, but it will happen."
Click Here to View Full Article
to the top
Software Overcomes Major Problems for Scientists Who
Operate Research Tools Over the Internet
Ohio State University Research News (10/10/07) Gorder, Pam Frost
Ohio State University researchers are developing Remote Instrumentation
Collaboration Environment (RICE), software to help scientists remotely
operate powerful equipment such as special microscopes and telescopes over
the Internet more efficiently and safely. Demand for the Internet-based
operation of powerful research tools is growing, largely due to the cost of
research, says OSU doctoral student Prasad Calyam, a senior systems
developer at the Ohio Supercomputer Center. Calyam and other researchers
are developing the software in collaboration with materials scientists at
OSU's Center for the Accelerated Maturation of Materials. The Internet has
made it common practice for distant institutions to share the use, and
expense, of high-tech research instruments, but Internet traffic congestion
can make the process slow, frustrating, and even dangerous. Video delays
could cause the researcher to be unable to see what is happening and cause
expensive pieces of equipment to crash into one another. To prevent such
accidents, RICE displays three windows, one with a list of researchers
logged in, another for text messaging, and one with a video feed of the
object being studied and buttons to control the equipment. The primary
researcher controls the experiment, but is capable of transferring control
to another researcher if necessary. RICE uses algorithms to block commands
from the researcher when bandwidth availability drops, preventing the
researcher from mistakenly believing the equipment is not responding and
entering more commands. During tests of the software, CAMM engineers were
able to successfully operate a microscope without incident from various
distances, including in the room, in the same building, and from two miles
away. RICE will be presented at the ACM Immersive Telecommunication
conference (IMMERSCOM 2007) conference in Verona, Italy, on October 11,
2007.
Click Here to View Full Article
to the top
Students to Test Programming Skills in Robotics
Competition
HPC Wire (10/08/07)
At the 2007 Richard Tapia Celebration of Diversity in Computing
Conference, to be help Oct. 14-17 in Orlando, Fla., five teams of
university students will compete in the Robotics Competition, the first
time the competition has been held at the conference. The student teams,
representing four universities in the United States and Canada, will guide
their robots in simulated search and rescue missions. "Because each team
is starting with virtually the same hardware, the Robotics Competition
comes down to being a test of programming skills, and how well the students
can design an integrated robot system that can maneuver around a number of
obstacles to reach certain objectives," says Brown University assistant
professor of computer science Chad Jenkins. The robotics competition is
based on a class taught by Jenkins in which students program robots to
perform different types of search-and-rescue missions. The teams include
two teams from the University of Alabama, two teams from the Simon Fraser
University in British Columbia, and one team from Harvey Mudd College. To
qualify for the competition the teams had to program virtual robots to seek
out objects in a simulated disaster environment. In the final competition,
the students will field robots equipped with a camera and touch sensors.
The conference is organized by the Coalition to Diversity Computing and
sponsored by ACM and the IEEE Computing Society. For more information on
the conference, visit
http://www.richardtapia.org/2007/
Click Here to View Full Article
to the top
Quantum Cryptography to Secure Ballots in Swiss
Election
Network World (10/11/07) Messmer, Ellen
Swiss officials plan to use quantum cryptography technology to protect
ballot information in an election in the Geneva region of Switzerland on
Oct. 21, the first time such advanced encryption will be used for an
election. "We would like to provide optimal security conditions for the
work of counting the ballots," says Geneva state chancellor Robert Hensler.
"In this context, the value added by quantum cryptography concerns not so
much protection from outside attempts to interfere as the ability to verify
that the data have not been corrupted in transit between entry and
storage." A quantum encryption system will be used for the point-to-point
encryption of ballot information sent over a telecommunications line from
the central ballot-counting station to the government data center.
"Protection of the federal elections is of historical importance in the
sense that, after several years of development and experimentation, this
will be the first use of the 1 GHz quantum encrypter, which is transparent
for the user, and an ordinary fiber-optic line to send data endowed with
relevance and purpose," says University of Geneva professor and quantum
cryptography researcher Nicolas Gisin. He says "this occasion marks
quantum technology's real debut." The use of quantum cryptography in the
election marks the start of the SwissQuanum, a project managed by Gisin
that aims to set up a pilot communications network throughout Geneva that
supporters compare to the first Internet links in the United States in the
1970s.
Click Here to View Full Article
to the top
62 Days + Almost 3 Billion Pinks + New Visualization
Scheme = The First Internet Census Since 1982
USC Information Sciences Institute (10/08/07)
University of Southern California Information Sciences Institute
researchers recently completed and plotted a comprehensive census of every
allocated address on the Internet--more than 2.8 billion. The researchers
say it is the first complete census of the Internet since 1982, when there
were only 315 allocated addresses. "An Internet census is just that: every
single assigned address in the entire Internet was sent a probe," says IS
project leader John Heidemann. Over the course of 62 days, almost 3
billion Internet Control Message Protocol echo request packets, or "pings,"
were sent. The majority of pings, 61 percent, received no response at all,
while many others got a "do not disturb" or "no information available"
response that is frequently built into routers and firewalls. However,
millions of sites did respond, some positively and some negatively, and a
unique atlas of the Internet was formed. The atlas is numeric, not
geographic, and builds on the mathematical structure of the Internet
address system, with similar addresses being grouped together. Heidemann
says the Internet census serves several purposes as it can help improve
Internet security as well as provide more information on how long before
every Internet address is taken, which some experts believe could happen as
soon as 2010. The researchers now hope to push beyond the "snapshot" of
the Internet produced by their census to create a "dynamic movie" of
Internet evolution by repeatedly pinging the Internet to uncover and
monitor trends.
Click Here to View Full Article
to the top
Panelists Cite Threats to U.S. Computer Networks
CongressDaily (10/10/07) Kreisher, Otto
The United States' ability to protect its electronic networks from
cyberattacks is hampered by "policy restraints" and a dearth of
coordination, a panel of experts said Tuesday. "Cyberspace has become a
really big deal," says Lt. Gen. Robert Elder, commander of the Air Force's
Cyberspace, Global Strike and Network Operations command. "We do our
banking, our commercial activities over the Internet." However, the
country's interconnected electronic networks are under constant attack,
analysts say. The military Web and computer networks are attacked
thousands of times each year, reports military analyst Rebecca Grant. In
June 2007, one such attack brought some of the Pentagon's unclassified
computer systems to a halt and interrupted the Defense Secretary's office
email system. The major denial-of-service attack that paralyzed Estonia's
government and commercial communications for weeks further revealed the
capacity of a cyberassault. Because the U.S. Air Force uses cyberspace to
transmit satellite and aircraft data and convey global communications, the
Air Force has designated cyberspace as one of its "warfighting domains."
Elder plans to use Air National Guard staff to develop a force of
"cyberwarriors" who can safeguard America's networks and, if needed, bring
down an enemy's systems. Elder plans to establish a cyber security unit in
every U.S. state within one year. In addition, Elder and other Air Force
officials believe the country needs to adopt a comprehensive policy on
cyberwarfare operations.
Click Here to View Full Article
to the top
Generating 'Oohs' and 'Aahs': Vocal Joystick Uses Voice
to Surf the Web
University of Washington News and Information (10/08/07) Hickey, Hannah
University of Washington associate professor of electrical engineering
Jeffrey Bilmes is developing the Vocal Joystick, software that enables
people with disabilities to control a computer cursor using their voice.
"There are many people who have perfect use of their voice who don't have
use of their hands and arms," says Bilmes. The Vocal Joystick only
requires a microphone, a computer with a standard sound card, and a user
capable of producing sounds. The Vocal Joystick can detect sounds 100
times per second and instantly turn sound into movement on the screen.
Different vowel sounds such as "ah," "ee," "aw," and "oo" control movement,
while hard clicking sounds such as "k" and "ch" activate a mouse click. "A
lot of people ask: 'Why don't you just use speech recognition?'" Bilmes
says. "It would be very slow to move a cursor using discrete command like
'move right' or 'go faster.' The voice, however, is able to do continuous
commands quickly and easily." Preliminary tests show that an experienced
user could have as much control as someone using a handheld device. In
addition to controlling a computer, Vocal Joystick can also control a
robotic arm and Bilmes believes it could be adapted to control an
electronic wheelchair.
Click Here to View Full Article
to the top
Four Added to GENI Science Council
Computing Research Association (10/11/07)
The Science Council for the Global Environment for Networking Innovations
(GENI) has been expanded to include four additional members. The new
members are Joan Feigenbaum, the Henry Ford II Professor of Computer
Science at Yale University; James A. Hendler, Tetherless World Senior
Constellation Chair at Rensselaer Polytechnic Institute; Michael Kearns,
National Center Chair in Resource Management and Technology at the
University of Pennsylvania; and Larry Peterson, Chair of Computer Science
at Princeton University. Edward Lazowska, chair of the Computing Community
Consortium (CCC) Council, says the new members will give the GENI Science
Council research expertise in different areas of computing. CCC partnered
with the National Science Foundation to create the GENI Science Council in
March. The group will provide guidance on the direction researchers should
take in addressing key issues for communications, networking, and
distributed systems.
Click Here to View Full Article
to the top
Universal Avatars Bestride Worlds
BBC News (10/11/07)
IBM and Linden Lab are teaming up to develop new open tools that will
allow people to move between different virtual worlds. The partners hope
to raise the profile of virtual worlds at a time when they are becoming
more popular. More than 30 virtual worlds will be featured at this year's
Virtual Worlds conference, which is scheduled for Oct. 10-11, in San Jose,
Calif., but only nine were widely known at the time of the inaugural event
in early 2006. IBM and the creator of Second Life also have plans to
develop a universal character creation system that would allow people to
create a single avatar that can travel between such cyberspaces, including
games and other systems such as Second Life. Although the appearance of a
virtual character may change because of where it is taken, basic
characteristics such as looks and underlying personal data would remain the
same. "It is going to happen anyway," says Colin Parris, IBM vice
president of digital convergence. "If you think you are walled and secure,
somebody will create something that's open and then people will drain
themselves away as fast as possible."
Click Here to View Full Article
to the top
Program Puts Far-Out Technology Into Use Today
Investor's Business Daily (10/10/07) P. A5; Howell, Donna
The Center for Commercialization of Advanced Technology (CCAT) is intended
to quicken the development and deployment of small robots capable of
performing tasks on their own. CCAT Defense Department liaison Stephen
Lieberman, who is also head of technology transfer at the Space and Naval
Warfare Center (SPAWAR), says the government realizes that a lot of
innovation is occurring at small companies and universities and CCAT tries
to improve communication between these organizations and the government and
shorten the innovation development time by providing funding. Since its
launch in 2001, CCAT has received about $28 million in funding, supporting
145 projects at 131 companies and universities. CCAT founder and program
manager Barry Janov says robots have become a focus at CCAT, which is
working with the Navy's SPAWAR SSC San Diego robotics program to identify
technologies that will advance military robots to the next generation.
Although thousands of robots are in use in Afghanistan and Iraq, they are
not "tele-operated," and thus need to be controlled by a nearby soldier,
who in turn needs to be protected by other team members. However, Janov
says soldiers could remain at safer distances if robots were better at
knowing their own positions, where to go, and what to look for. He says
CCAT, the SPAWAR robotics lab, and several firms are collaborating to
develop technology to enhance robots currently used by the military,
including technology that would allow robots to map the surrounding areas,
identify their position, triangulate the location of dirty bombs, and be
able to detect sounds such as someone removing a gun from a holster.
Click Here to View Full Article
to the top
Fixing Our Fraying Infrastructure
CNet (10/11/07) Kleeman, Michael
The Internet's architecture was not designed for widespread public use and
should not be expected to handle the demands being placed on it,
particularly as bandwidth demand is growing rapidly, writes Michael
Kleeman, a senior fellow at both the University of California at San Diego
and USC's Annenberg Center for Communication. Kleeman says the average
home today uses as much bandwidth as a major office park did a few years
ago. The popular YouTube video "The Evolution of Dance" was downloaded 54
million times, equaling an entire month's worth of traffic of data on the
network in 2000. In addition to using the Internet for more demanding
tasks, users also expect fast and uninterrupted connections. Over the past
five years, the U.S. dropped from fourth place to 15th place on the
broadband ranking list kept by the Organization for Economic Cooperation
and Development. In order for the U.S. to be competitive in the next
Internet age, broadband penetration and quality needs to improve
drastically, Kleeman argues. A national broadband policy is essential if
the U.S. is to maintain the competitive edge that it gained in the past.
High-speed Internet access should not be viewed as a luxury, but as a
necessity for members of a developed country, and should be pursued by the
government as aggressively as other national infrastructure necessities.
Kleeman says possible ways of improvement include creating more advanced
core routers, greater use of compression and network triage, and more
expansion of network capacity.
Click Here to View Full Article
to the top
Technology Would Help Detect Terrorists Before They
Strike
University at Buffalo News (10/05/07) Goldbaum, Ellen
University at Buffalo computer and behavioral scientists are developing
automated tracking systems that monitor people's faces, voices, body
movement, and biometrics and automatically compare it to tested behavioral
indicators to provide a quantitative score on the likelihood of the subject
being a terrorist. "We are developing a prototype that examines a video in
a number of different security settings, automatically producing a single,
integrated score of malfeasance likelihood," says UB professor of computer
science and engineering Venu Govindaraju. The project will focus on
developing an accurate baseline of indicators specific to an individual
during extensive interrogations as well as clues during faster, routine
security scans. The system will also be able to learn from subjects during
the course of a 20-minute interview, an important feature according to
Govindaraju, because many behavioral clues to deceit are unique to each
individual person. "As soon as a new person comes in for an interrogation,
our program will start tracking his or her behaviors, and start computing a
baseline for that individual 'on the fly,'" Govindaraju says. The UB
researchers expect to have a working prototype ready in a few years.
Click Here to View Full Article
to the top
Computer Science, Art & Technology Team on NSF
Grant
Stevens Institute of Technology (10/02/07)
The National Science Foundation has awarded a grant to researchers at the
Stevens Institute of Technology who plan to develop a transderivational
search engine. The project is inspired by the way artists and designers
are able to find analogies in diverse artifacts and ultimately pull them
together in a coherent and novel manner, says computer science professor H.
Quynh Dinh. Dinh will work with Ebon Fisher, a professor from the
Department of Art, Music, & Technology, to develop a search engine that can
be used to find connections in text, 1D audio, 2D images, 3D geometry, and
4D motion data. "We will develop a transderivational search engine in the
context of designing interactive, mixed-media installations and in a
brainstorming application for artists and designers to help them make
mental associations in design tasks such as gathering media artifacts for a
thematic installation from an archive in media samples," Fisher says. The
researchers describe a transderivational search engine as transformative
technology that brings together art, computer graphics, machine learning,
cognitive psychology, and human-computer interaction. They plan to make
their algorithms available to others under an open source license.
Click Here to View Full Article
to the top
Scavenger Champion
UBC Reports (10/04/07) Vol. 53, No. 10, Chan, Lorraine
University of British Columbia director of the Laboratory of Computational
Intelligence (LCI) Jim Little specializes in the integration of robotics
and vision systems and is working on improving robotic vision,
comprehension, and response. Little says the process of seeing and
perception involves multiple steps and problems for computers. "We're
attacking the whole problem of how robots move around, how they identify
objects, and how they decide which visual information is important," says
Little. Recently, a LCI robot called Curious George won the "Semantic
Robot Vision Challenge" at the Advancement of Artificial Intelligence
conference. The LCI researchers wrote a program for Curious George that
enabled the robot to search the Internet for images that matched each item
on a scavenger hunt list. Curious George was able to find seven out of 15
objects while the other robots were unable to find more than three objects.
The LCI robot also used software previously developed by LCI researchers
to detect images and verify certain visual similarities, as well as an
invention of Little's known as stereo-vision mapping that uses two cameras
to help robots see with greater depth perspective. Little hopes that the
technologies used in Curious George can be applied to creating assistance
technologies such as wheelchairs that can navigate obstacles, remember
appointments, and record travel routes, or a smart house that can remind
owners to turn off the stove.
Click Here to View Full Article
to the top
From Stick Figures to Artificial Intelligence
ExpressNews (University of Alberta) (10/04/07) Necheff, Julia
University of Alberta computer science PhD student Brian Tanner is
researching reinforcement learning in artificial intelligence in an effort
to "make computers smarter." Tanner says much of the work being done on
artificial intelligence is fragmented and focused on practical applications
for achieving specific tasks, such as when an online store makes
suggestions based on a customer's recent purchase. Tanner is developing
procedures that will enable a computer to automatically learn how to make
its own decisions, ultimately resulting in a computer program that can
successfully manage a variety of artificial intelligence problems. "The
more a computer can make its own decisions, the more it 'learns,'" he says.
"The more it learns, the more powerful a tool it becomes and the more it
can be used for real-life problems."
Click Here to View Full Article
to the top
Robots May Aid Aging Japanese Population
Associated Press (10/04/07) Tabuchi, Hiroko
Care technology was on display at this week's home care and rehabilitation
convention in Tokyo. Secom showed off its My Spoon feeding robot, a spoon-
and fork-fitted swiveling arm that the elderly and disabled will be able to
maneuver using a joystick. The National Institute of Advanced Industrial
Science and Technology has developed a wheelchair that recognizes voice
commands such as "forward" and "back," and "right" and "left," and the
Kanagawa Institute of Technology has developed a full-body robotic suit
that nurses will be able to use when lifting patients in and out of their
beds. Analysts say care technology will become increasingly important to
Japan in the years to come as its population continues to age. About 22
percent of the population has reached 65 years of age, and more elderly
people are not being cared for by their children and grandchildren in their
golden years. "We want to give the elderly control over their own lives,"
says Secom developer Shigehisa Kobayashi.
Click Here to View Full Article
to the top
ORNL's SensorPedia Targets National Security
Mission
Oak Ridge National Laboratory (10/04/07)
The Oak Ridge National Laboratory is developing a writeable Web site that
will enable emergency responders and decision-makers to share data from
different kinds of sensor networks in near-real time. Current sensor
systems that detect radiation, chemicals, and biological agents are unable
to offer such access because there is not a single standard for making
interoperable sensor networks. ORNL calls its system SensorPedia because
it is based on the underlying technology of Wikipedia, but it differs from
the online encyclopedia in that it links to near-real-time data for
streaming data, supports interactive "mashups" of information, and limits
written contributions to approved personnel. The federal government will
initially use SensorPedia, which is being built with existing tools and
resources. SensorPedia will be hosted on a Wiki-enabled ORNL server that
controls credentials and authentication. "Our system simplifies sensor
information sharing while preserving the integrity, security, and
authenticity of sensor information," says Bryan Gorman of ORNL's
Computational Sciences and Engineering Division. Interoperability is the
key to effective sensor networks, adds Gorman.
Click Here to View Full Article
to the top
Smart Sheets Let Gadgets Talk Through Their Feet
New Scientist (10/06/07) Vol. 196, No. 2624, P. 32; Marks, Paul
For a group of researchers at the University of Tokyo in Japan, ubiquitous
computing in the home would make use of smart sheets embedded in tables,
walls, and floors that could provide spontaneous connections and exchange
data when gadgets are placed on them. "This allows devices resting on
surfaces to discover each other and communicate," says Chris Wren, a
ubiquitous computing expert at Mitsubishi Electric Research Labs in
Cambridge, Mass. "This could become the magic wiring that plugs all our
devices together." Takao Someya, Tsuyoshi Sekitani, and colleagues have
sent information between two tiny robots at 2 Mbps via a flexible,
21-centimeter-square sheet, which is filled with plastic transistors and
copper wires, and is ink-jet printed, which would make it affordable.
Still, the researchers must find a way to shrink the computer on the edge
of the sheet that moves data between devices, as well as get separate
sheets to communicate. The system has the potential to be more secure and
robust than Wi-Fi, Bluetooth, and other wireless technologies. The
researchers will discuss the project at the International Electron Devices
meeting in Washington, D.C., in December.
Click Here to View Full Article
- Web Link May Require Paid Subscription
to the top
Career Watch: What to Do About Women's
Under-Representation in IT
Computerworld (10/08/07) Vol. 41, No. 41, P. 48; Eckle, Jamie
Eileen Trauth, interim associate dean for diversity, outreach, and
international engagement at Penn State's College of Information Science and
Technology, believes it is important to bring more women into the IT
workforce to break through the societal barriers currently barring women
from the industry and because the United States puts itself at a serious
disadvantage by disenfranchising half of its working population. Trauth,
who has received a National Science Foundation grant to interview women IT
professionals about the issues they have encountered in their careers, says
that a variety of complex reasons are responsible for the low number of
women in IT, including cultural definitions of femininity, historical
associations of technology, and gender stereotypes. The situation
continues to perpetuate itself as decreasing numbers of women in IT make it
more of a men's club, and, with fewer female professionals in the field,
young women will be less inspired to enter the industry. To increase the
number of women in IT the industry and academia first need to recognize
that it is not a "woman's problem" but a societal problem that needs to be
solved by people of all genders, Trauth says. She says steps include
teaching both men and women gender issues and creating better strategies
for equality and accountability when harassment and exclusion occurs.
Click Here to View Full Article
to the top