Biometric
Bits -
Volume 2006-01-Issue 04 - January 10, 2006
Please Refer to the Biometric Bits
Copyright and Fair Use
NoticeConvenient navigation aids are
as follows: Left clicking on:
A Table of Contents entry will bring
you to the related article. .
"Source" will bring you to the original article at the website of its
initial posting - if it is still there;
"Next" - Will bring you to the next article in sequence.
Contents - Will bring you back to the table of contents.
Henry J. Boitel, Editor
01. Putting
privacy into practice - legally - - Two NBSP Reports - Security
Document World - January 9, 2006
02. New biometrics
group focuses on frequent fliers - By Randy Barrett - National
Journal's Technology Daily - Gov Exec.com - Jan 9, 2006
03. Press Release -
[IBG] Global Biometric Revenues Projected to Grow from $2.1B in 2006 to
$5.7B in 2010 - Jan 9, 2006
04. A Review of the FBI's Handling of the Brandon Mayfield Case -
Unclassified Executive Summary
- Office of the Department of
Justice Inspector General, Oversight and Review Dividision - January
2006 - This is a 21-page pdf.
05. Minnesota
needs to do more to crack down on identity theives, says Gov.
Pawlenty - by T.W. Budig - ECM - Home Town Source - Jan 6, 2005
06.
Entrepreneur Installs RFID Chips in Both Hands - By Robin
Arnfield
- NewsFactor Magazine - January 9, 2006
http://www.newsfactor.com/story.xhtml?story_id=0210002G12EL
07. Blood vessels in
human hand and contactless card combine to create secure biometric
IDs - Secure ID News - January 6, 2006
08. Press
Release - 2005 RCMP Benchmark: SAGEM Morpho Obtains Highest
Overall
Score - Jan 6, 2006
09. Press
Release - ImageWare Systems Sponsors American Association of Airport
Executives' 20th Annual Aviation Issues Conference; Company Will
Contribute to Dialogue on Passenger Pre-Screening, Related Aviation
Security Issues & Programs
- Jan 6, 2006
10. GOVERNMENT:
Pawlenty offers plan to restrict ID theft - Proposals follow Hatch's
criticism
- Associated Press - Grand Forks Herald (Minn) - Jan 6,
2006
11. Press Release - Diamelle
Technologies Releases a Low Cost
Authentication Server to Deter Account Fraud and Identity Theft with
Soft Tokens for Multi-factor Authentication - Jan 6, 2006
http://www.emediawire.com/releases/2006/1/emw329079.htm
12. HK
Polytechnic Univ's new developed system on display -
China View -
Jan 6, 2006
http://news.xinhuanet.com/english/2006-01/06/content_4019118.htm
13. India's First
Bio-ATM From Axis - By Rajendra Chaudhary -
Mumbai - CXO Today [India] - Jan 6, 2006
14. Security Risk
Management is the answer to your security prayers
- Security Park - Jan
6, 2006
15. THE ELECTION -
Harper trumpets get-tough crime plan -
Conservative Leader would raise minimum sentences and try 14-year-olds
as adults - By BILL CURRY - The Globe & Mail- Jan 6, 2006
16. Homeland
Security opening private mail - Retired professor confused,
angered
when letter from abroad is opened - By Brock N. Meeks - MSNBC -
Jan. 6,
2006
17. Biometric
technology secures pocket-sized server
- Secure ID NEws - January 9
2006
18. Military
Sensor Hears Through Walls - By Bill Christensen - Live
Science.com
- Technology.com - Jan 9, 2006
19. Take security
precautions when an employee leaves the organization
- by John McCormick - Tech Republic - Jan 9, 2006
20. Taking the 'I' out
of Identity - Sean McGrath, ITworld.com - Jan 9, 2006
21. Press Release -
bioMETRX, Inc.'s Finger Activated Garage Door
Opener to be Featured
on HGTV's 'I Want That' -
Product To Kick Start Consumer Biometrics Interest -
January 9,
2006
22. Press
Release - The organizers of Security Challenges 2006 (SCC), have
announced the line-up for this year’s winter conference, which
features keynote address speaker John Pescatore of Gartner and guest
speaker Ira Winkler of ISAG, along with a team of other prestigious
speakers and sponsors. The free, two-day online conference will be held
January 18th and 19th 2006, and will feature in-depth evaluations of
today’s most critical security topics.
23. UK rejects
80,000 passport photos following new rules - Jan 9, 2006
24. The dirt on clean data
- By Mary Mosquera - Government Computer News - Jan 9, 2006
25. Three More
States Add Laws on Data Breaches - by Jaikumar Vijayan -
ComputerWorld
- Jan 9, 2006
26. Press
Release - Award Includes PKI and HSPD-12 Compliant Products
and Services - Jan 9, 2006
27. Press Release
-
Product To Kick Start Consumer Biometrics Interest to Operational Research
Consultants, Inc. - Jan 9, 2006
28. PalmSecure Another
CES 'Best of Innovations Honorees'
- CCN Magazine - Jan 9, 2006
29. Press
Release - First Security
Information
and Event Management (SIEM) Solution Interoperable with Websense, Inc.;
Understanding Web-based Threats Critical for Compliance and Security
- Jan 9, 2006
30. Liberty
to unveil personal federated identity management - by Antony
Savvas
- Computer Weekly - Jan 9, 2006
31. TSA Unveils
Enhanced Security Screening Procedures - Sandy Smith -
Homeland
Response - Jan 9, 2006
32. Johns
Hopkins University to Lead New Homeland Security Center - Sandy
Smith - Homeland Response - Jan 9, 2006
33. Press Release
- Enterprise Bank & Trust Cracks the Password Management
Problem with Imprivata OneSign; Ease of Configuration and
Administration, along with Strong Biometric Support, Set OneSign Apart
- Jan 9, 2006
34. Press Release
- (I-Newswire) - Tel Aviv, Israel - - Eurekify, the pioneer
and leading provider of role management solutions, is pleased to
announce exceptional growth and record results for 2005.
Eurekify’s
year-to-year revenue has increased by 130%, supported by the increasing
demand for Role-based Identity Management and Compliance solutions, as
well as by quicker deployment practices and the maturing of Eurekify’s
unique technology. - January 9, 2006
35. The anti-nation - DAN
DUNSKY - Toronto Star - Jan 9, 2006
36. Airport
summit starts on Big Island - Pacific Business News - Jan 2,
2006
37. Press Release -
Aratek, CUST Collaborate to Set up Joint Lab - Jan 9,
2007
38. Press Release - Dubai set to host Middle East’s largest
security expo
- Jan 9, 2006
39.
Password
Tools Lower Compliance Costs - By Cameron Sturdevant
- EWeek - Jan 9, 2006
40. Russia Doesn't
Deserve Its Reputation - An interview by
Mikhail Zygar, Head of the European Commission in Russia Marc Franco
tells Kommersant about the problems that hold Russia and the European
Union back on their paths toward each other. - Kommersant - Jan
9, 2006
41. CIOs prepare for
new technology challenges - Information sharing, hurricane response
will propel many 2006 IT programs - BY Michael Arnone and
Dibya Sarkar
- Federal Computer Week - Jan. 9, 2006
42. The test of
terrorism - Security concerns change life in labs - By HARVEY
BLACK
- Milwuakee Journal Sentinel - Jan. 8, 2006
43. India Revives
Fingerprint Plan to Combat Fraud - by Andy
Mukherjee - Bloomberg.com - Jan 9, 2006
44. Leaving on a
jet plane? Rules are changed again - By JILL SCHENSUL - North
Jersey Media Group - Jan 8, 2006
45. Diamelle
Releases
Java EE Platform-Based
Low Cost Authentication Server to Deter
Fraud and Identity Theft Technology Uses Soft Tokens for Multi-factor
Authentication - SysCon
Belgium - Jan 8, 2006
46. Drivers
under USFJ must tell command of off-base incidents -
Stars
and Stripes - January 8, 2006
47. Report on
FBI may strengthen lawsuit against agency By WILLIAM
McCALL
-
Associated Press - KGW-TV (Oregon & Washington State - Jan 8, 2006
48.
Watch-list
for terror suspects - by Nicolette Burke - in Canberra -
The
Courier Mail [Australia] - Jan 9, 2006
49. In reality,
high tech beats no tech
- By Bob Bong - Daily SouthTown [Illinois]
- January 8, 2006
50. Tighter
security on
visas - By NICOLETTE BURKE - The Advertiser [Australia] Jan 9,
2006
51. Day 3 at CES: What's
hot - By Richard Nass - Mobile Handset DesignLine - Jan 7, 2006
52. Experts
weigh in on bank responses to FFIEC guidelines - Financial
houses strengthen authentication with challenge questions, phone
authentication and other means of outsmarting hacker sleuths - By
Marisa Torrieri, - January 7 2006
53. $80,
fingerprints, eye scan to speed you to your plane -
Starting this summer, some fliers can skip long security lines at the
Indy airport - By Theodore Kim - Jan 7, 2006
54. Boning up on
a
body's identity
- ADRIAN MATHER - Jan 9, 2006 - The Scotsman [UK]
55. A Fictional Story... Or
A Premonition Of Things To Come? -
Jim
Downey's Rants & Raves - Digital Divide Network - Jan 9 2006
56. She Gives
Bodies Their Faces Back - Coroners in L.A. and Orange
counties turn to the Huntington Beach artist when seeking an ID. 'It's
amazing how close she gets,' says one. - By Susana Enriquez, Los
Angeles Times - Jan 9, 2006
57. Press Release -
Ministry launches biometric payment pilot
- Jan 6,
2006
58. Are we heading
for a serious identity crisis? - by David Berlind - ZD Net -
Jan 9,
2006
59. Fake fingers
no match for scanner's electronic nose - New Scientist - by Celeste Biever - Jan 10, 2006
- Jan 6, 2006
60.
We lost the war. Welcome to the world of tomorrow - Du Chaos
Computer Club by Frank Rieger - Jan 10, 2006
61. Press Release -
Frost & Sullivan - Need for Enhanced Homeland
Security to Promote Uptake of Security Technologies - Jan 10,
2006
62. Press
Release - Former META Group
Analyst Mike Rothman Launches Security Incite - Jan 10, 2006
63.
Press Release - Wave Systems on Winning Team with Operational
Research Consultants, Inc. for U.S. GSA Blanket Purchase Agreement Award
- Jan 10, 2006
64. Press Release - 2AB Inc. Announces Open Source
Plans for jLock Scalable JAAS - Jan 10, 2006
65.
Press Release - (Euronext Brussels) - Supercom announces the
award of a tender for a biometric passport issuing and control system
for a western European country - Jan 10, 2006
66. Press Release - UPEK Enables
Fingerprint Authentication Security for Rugged Mobile Computing Leader
Itronix; Itronix GoBook VR-1 Integrates UPEK TouchStrip Fingerprint
Authentication Solution for Secure Authentication of Semi-Rugged
Notebooks
67. Press Release -p Time America Forms New
Subsidiary; NetEdge Devices, LLC to Provide Advanced Data Collection
Device - Jan 10, 2006
68. ID
technology talk on cards for Society - Edinburgh Evening News -
Jan 10, 2006
69.
Press Release - Logicalis Announces Top Technology Trends to Watch in
2006;
Software-as-a-Service Tops This Year's List of Top Customer Trends,
Ripple Effect Will Hit Software and Hardware Vendors - Jan
10,
2006
01. Putting
privacy into practice - legally - - Two NBSP Reports - Security
Document World - January 9, 2006
Source
Next Contents
Large-scale identification programs, such as national ID cards, visas
or ePassports, are enough to put most privacy advocates on the
offensive. Add in the mention of biometric technology and the volume of
opposition is magnified. The good news then, is that a new series of
reports launched today, while fully recognizing the validity of privacy
concerns, has concluded that even the use of biometrics in large-scale
databases is possible without having to sacrifice personal privacy.
The reports by National Biometric Security Project (NBSP), a research
and analysis organization, look at both the impact of biometrics on US
and international privacy laws.
The first report - United States Federal Laws Regarding Privacy and
Personal Data and Applications to Biometrics - demonstrates how, under
the current US legal system and state of the law at the federal level,
use of biometrics as a system to verify identity in virtually any
situation is consistent with the law. The report also illustrates how,
under certain circumstances, using biometrics to identify individuals
through the use of databases is acceptable without sacrificing the
objective of maintaining and protecting personal privacy.
The report was written for the Department of Homeland Security and the
Interagency Working Group on Biometrics chaired by the White House
Office of Science and Technology.
Identification vs. verification
Importantly, the report highlights the distinctions between
identification and verification techniques and discusses how each
method relates to privacy laws and issues. Generally, the report says,
biometric “identification” does a “one to many” search of extensive
databanks to find a match. Because such databanks may contain or be
linked to personal information, and because identification applications
can be used without the subject’s knowledge or consent, such as in
surveillance, the privacy concerns are intensified, the report claims.
Biometric verification systems, meanwhile, use a “one to one” match and
so are generally designed to be used on a voluntary basis. They only
require two pieces of information: something representing your identity
(such as a user name to retrieve your biometric template or a smart
card with your template embedded in it) and your biometric feature or
information (such as your hand to create your hand geometry template)
presented for the match.
Verification systems can be connected to databanks, but unlike
identification systems a database is not a necessary component. The
need for the subject’s consent and the lack of a databank requirement
greatly reduce the privacy concerns.
John E. Siedlarz, Chairman and CEO of NBSP commented: “The increasing
reliance on biometrics in large scale identification applications, such
as watch lists, enrollment eligibility and border control applications
will require a greater sensitivity to privacy issues to ensure that the
rights of individuals are not unduly compromised in the name of
security. There are clear steps that can be taken to make all biometric
systems ‘privacy sensitive’. Those involved in the deployment and
management of identification applications will need to employ those
steps to maintain the right balance between individual privacy
considerations and broader security concerns.”
International Data Privacy
The second study - Report on International Data Privacy Laws and
Application to the Use of Biometrics in the United States - assesses
privacy laws in Canada, Australia, New Zealand and Japan and looks at
possible roles the USA could play in international cooperation.
According to NBSP, resistance to both US and foreign biometric privacy
legislation has come from both sides of the fence. Some proponents of
biometric recognition technology are concerned that any legislation
will restrict the currently legal uses of biometrics. Opponents of
biometric recognition technology (on the basis of its perceived threat
to privacy) are concerned that legislation will condone the use of such
technology on a broad or unrestricted scale.
NBSP concludes that the best compromise is implementation of data
privacy policy and/or legislation that takes into consideration:
*
the fact that most overt and consensual
uses of biometric
recognition technology are legal and non-intrusive;
*
that public concerns over misuses (such
as could occur with
unauthorized database access or unrestricted data-mining) should be
competently addressed;
*
participation in global privacy
standards will enhance proper and
effective use of the technology.
For more information please contact: rryan@nationalbiometric.org
===============================
02. New biometrics
group focuses on frequent fliers - By Randy Barrett - National
Journal's Technology Daily - Gov Exec.com - Jan 9, 2006
Source
Next Contents
A new coalition of biometric and access-control companies launched
Monday to advise the government on large public-credentialing programs
such as the Registered Traveler system of the Transportation Security
Administration.
The group, called the Voluntary Credentialing Industry Coalition, will
be led by Wexler & Walker Vice Chairman Tom Blank. Its members
include ARINC, ImageWare Systems, Iridian Technologies, Lockheed
Martin, Panasonic, GE Security, Saflink and Verified Identity Pass.
While there are numerous trade associations representing the security
and biometrics industries, Blank VCIC will focus on voluntary
credentialing programs and related issues of consumer privacy and data
theft. "What we're trying to address is the public policy component,"
he said. "We expect to have an impact on a full range of federal
credentialing" projects.
The first order of business is Registered Traveler, which is designed
to let pre-cleared, frequent fliers carry biometric identity cards and
speed through security checkpoints at airports. The program finished a
test phase at five airports in 2005 and soon will be expanded
nationwide.
The agency is seeking advice on business models, technology and
liability. In submissions last week, VCIC told TSA that consumer
privacy is a top priority. "We urge that TSA require ... any issuer of
Registered Traveler memberships be subject to the standards of the
Federal Privacy Act" and state clearly whether data will be shared with
third parties.
"One of our highest priorities is articulating and delivering on our
coalition's commitment to strong, accountable privacy protection
standards," Wexler & Walker Chairman Anne Wexler said in a
statement. "And last week's submission to the TSA on privacy protection
makes it clear that we intend to be proactive rather than defensive
when it comes to that issue."
Privacy watchdogs have expressed concern about how personal consumer
data will be safeguarded. "In the case of Registered Traveler," the
Electronic Privacy Information Center said on its Web site, "TSA has
identified 13 categories of 'routine uses' of personal information,"
with several being "so broad as to be almost meaningless."
===============================
03. Press Release -
[IBG] Global Biometric Revenues Projected to Grow from $2.1B in 2006 to
$5.7B in 2010 - Jan 9, 2006
Source
Next Contents
NEW YORK, Jan. 9 /PRNewswire/ -- International Biometric Group announces
the availability of the Biometrics Market and Industry Report
2006-2010, the
most in-depth and authoritative Report on biometric market
opportunities,
trends, and growth drivers. The Report is required reading for
investors,
deployers, systems integrators, and organizations looking to understand
the
current and future landscape of the industry.
In addition to analyzing the biometric industry by
technology,
application, and market, the Report profiles leading biometric vendors.
Key Report findings include the following:
- Global biometric revenues are projected to grow
from $2.1B in
2006 to
$5.7B in 2010, driven by large-scale
government programs and
dynamic
private-sector initiatives
- Fingerprint is expected to gain 43.6% of the
biometric market in
2006,
followed by face recognition at 19.0%
- Annual iris recognition revenues are projected to
exceed $250M by
2008
- Asia and North America are expected to be the
largest global
markets for
biometric products and services
- Multiple-biometric systems will emerge to comprise
roughly 5% of
the
total market for biometrics
Technologies addressed in the Report include the
following:
- Fingerprint
- Face Recognition
- Iris Recognition
- Middleware / Identity Management Software
- Multiple Biometric
- Hand Geometry
- Signature Recognition
- Voice Recognition
- Automated Fingerprint Identification Systems
(AFIS)/Live-Scan
Applications addressed in the Report include the
following:
- Civil ID
- Consumer ID
- Access Control/Attendance
- Device/System Access
- Criminal ID
- Surveillance
Markets addressed in the Report include the
following:
- Law Enforcement
- Military
- State and Municipal Government
- National Government
- Financial Services
- Gaming and Hospitality
- Health Care
- High-Tech and Telecom
- Industrial Manufacturing
- Retail
- Transportation
The Biometrics Market and Industry Report 2006-2010
is available for
online purchase from http://www.biometricgroup.com/BMIR.html.
Report Length: 221 pages, 122 figures and charts
Release Date: January 2006
Price: $3995 USD
About International Biometric Group
International Biometric Group (IBG) is the leading
biometric
research,
consulting, and integration firm. IBG designs, develops, and
integrates
biometric solutions for government and commercial clients. IBG
tests
and
evaluates biometric technologies for accuracy and usability. IBG
builds
business cases for organizations deploying biometric systems and
develops go-
to-market strategies for biometric product and solution
developers.
Learn
more about IBG at http://www.biometricgroup.com.
===============================
04. A Review of the FBI's Handling of the Brandon Mayfield Case -
Unclassified Executive Summary - Office of the Department of
Justice Inspector General, Oversight and Review Dividision, January
2006 - This is a 21-page pdf.
http://www.usdoj.gov/oig/special/s0601/final.pdf
Source
Next Contents
================================
05. Minnesota
needs to do more to crack down on identity theives, says Gov.
Pawlenty - by T.W. Budig - ECM - Home Town Source - Jan 6, 2005
Source
Next Contents
Proposed use of a new technology would not only betray wrinkles but
identities on Minnesota driver’s license photos.
The use of biometric facial recognition - a technology that converts a
mugshot into a telling mathematical algorithm - is one facet of Gov.
Tim Pawlenty’s initiative against identity theft.
“Minnesota needs to do more to strengthen safeguards on personal
information and to crack down on identity thieves,” said Pawlenty.
It’s estimated nearly 3,000 Minnesotans were victims of identity theft
in 2004 - 57 out of every 1,000 residents.
According to the administration, 13 states already use forms of facial
biometrics on their driver’s licenses.
New driver’s license photos are not needed to employ the technology,
according to the administration.
Biometrics, through precise facial measurements, can betray someone
masquerading as someone else and remains an effective screening device
over time, an industry spokesman explained.
Cost of adding the technology is estimated at a dollar or two per
drivers’ license - an initiative jumpstarted by a $800,000 federal
grant to the Department of Public Safety Driver and Vehicle Services
(DVS).
The agency handles some 1.6 million drivers’ licenses and ID cards a
year.
Pawlenty wants lawmakers to act on the biometric technology to secure
adequate funding.
4 other anti-identity stratagems
Besides the drivers’ license initiative, Pawlenty proposed four other
anti-identity theft stratagems aimed at thwarting high-tech criminals
armed with computers.
These include stiffening penalties for unauthorized access to personal
data, going after hackers who secretly gain access to private data but
don’t steal, making it unlawful to use encryption to hide a crime.
Ranging afield, Pawlenty argued that current state data practice law is
flawed and upsidedown- data presumed private unless deemed public, he
explained.
“I think we should look at inverting that presumption,” he said of
current data practices philosophy.
The data privacy issue for a second day became contentious between the
governor and Attorney General Mike Hatch, a DFL gubernatorial candidate
who wants to replace Pawlenty.
Hatch endorsed Pawlenty's proposed use of biometrics - he’s a complete
supporter, he said - but added it would be more effective to make
driver’s license information private.
Hatch charged that the Pawlenty Administration through its DVS
“housekeeping” bill in 2005 conforms state drivers’ license data
practices to federal law.
There’s some 14 data privacy exceptions granted under federal law,
explained Hatch. “When you add them all up it basically means it’s
(driver’s license data) all disclosed,” he said.
His office was never consulted on the legislation, said Hatch. They
were unaware of it, he explained. “I hope that the governor and
administration will support meaningful privacy laws,” said Hatch. Hatch
said he wasn’t pointing the finger of blame.
Pawlenty said that there was “some gamesmanship” going on with the
rhetoric about data privacy.
=========================================
06.
Entrepreneur Installs RFID Chips in Both Hands - By Robin Arnfield
- NewsFactor Magazine - January 9, 2006
Source
Next Contents
"If people want to pretend they're joining the Borg by implanting
radios in their bodies, well good for them," said Andrew Jaquith, a
senior analyst at Yankee Group. "I would point out that the State
Department has been urged to back off of using RFID, ironically, on
security grounds."
Carrying keys and remembering computer passwords are so last year, at
least according to Amal Graafstra.
The Bellingham, Washington-based entrepreneur and his girlfriend,
Jennifer Tomblin, have installed computer chips into their hands to
give them access to their apartment and their computers -- without keys
or passwords.
The devices implanted in Graafstra and his girlfriend are radio
frequency identification (RFID) chips that are commonly used instead of
barcodes to track merchandise in stores.
RFID chips also are used for payment and transportation cards.
Large-scale live implants have so far been confined to pets and cattle,
with only a few notable cases of humans getting the chips installed for
testing purposes.
Airport Security
Implants do not cause a problem with airport security Relevant
Products/Services from Microsoft, according to Graafstra, who has a
chip implanted in both hands. "I've never had either of them set off a
metal detector," he wrote on his blog.
"One time I even had to submit to a handheld wand search. They asked me
if I had any implants before they started, and I told them I had one in
each hand. They ran the wand over me and specifically over my hands,
and the thing never made a peep. It did, however, beep on one of my
tiny shirt buttons, so that just goes to show the amount of metal in
the implant is rather insignificant."
"If people want to pretend they're joining the Borg by implanting
radios in their bodies, well good for them," said Andrew Jaquith, a
senior analyst at Yankee Group. "I would point out that the State
Department has been urged to back off of using RFID, ironically, on
security grounds."
"RFID chips do have a security issue," said Graafstra in an interview.
"But for my private purposes, they are secure enough. If they were used
in a mass-market implementation, security would be an issue, but it
would be easier for someone to put a rock through my window than to
make the effort to clone my RFID chip."
Human Trials
In Europe, there have been several trials involving RFID implants in
humans. Members of the exclusive Vaja Beach Club in Barcelona, Spain,
are offered the opportunity to receive RFID chip implants as a means of
gaining entry to the elite club and also to pay for drinks. The chips,
which are implanted into the arms of members at the club, allow them to
run up tabs without having to carry any other form of identification.
In the UK, Kevin Warwick, Professor of Cybernetics at Reading
University, has had an RFID chip implanted in his arm since 1999.
"The costs of implanting and maintaining a chip in a person are
extremely high," said Avivah Litan, Gartner Group's vice president and
research director. "So even if the technology were accepted by the mass
public, the costs are much higher than the benefits in most scenarios."
It only makes sense is niche areas, said Litan, like gaining access to
top-secret systems and buildings. "And even then, there are much less
intrusive mechanisms, like iris-scanning, that will win out before
implanted RFID chips do."
Graafstra said that, from a privacy point of view, an RFID chip is less
of an issue than a biometric system. "You can leave an RFID system by
just removing your chip, whereas you cannot change your biometric data
[like a fingerprint], and once it is on a database, you cannot easily
remove it."
=========================================
07. Blood vessels in
human hand and contactless card combine to create secure biometric
IDs - Secure ID News - January 6, 2006
Source
Next Contents
Forget fingerprints. A Toronto, Ontario company wants the whole
hand
involved. And it's not talking palm prints. It wants to identify the
blood vessels in your hand.
Identica Corp. has linked its Universal Controller with a hand vascular
scanner manufactured by a Korean company. The result is a biometric
access control mechanism solution that it claims is accurate, fast, and
non-intrusive for users.
Terry Wheeler, Identica president, calls this a "whole new paradigm of
biometrics on its own. Ours is completely unique."
Mr. Wheeler started Identica in 2003. "My background goes back to
biometrics," he said. "At Identica, we were first involved with
fingerprint-based solutions but then I started looking at what was
going to be next, and I found this technology from Seoul, Korea. We got
the rights for Canada, and at that point we realized we needed a bigger
marketplace. Last spring, we acquired American Biometric and Security
in Naples, Florida."
To expand its North American market, Identica recently signed Johnson
Controls Inc. (JCI), Sima Valley, Calif., to sell and integrate the
Techsphere Hand Vascular Pattern Recognition (VPR) biometric solutions
to its clients in the US and Canada (Identica also owns the rights for
the vascular scanner in North America and Mexico).
Live applications and implementations underway …
"Johnson Controls has a large established and growing customer base
that relies on the company for their expert advice and integration of
products to match their security requirements", said Mr. Wheeler. "A
typical JCI client has sophisticated access control security challenges
that require the undeniable user verification and the many other
benefits that the Hand VPR biometric solutions provide."
Identica and its use of the Techsphere vascular hand reader is starting
to get noticed. The company was awarded an iCLASS Innovation 2005 Award
several months ago by HID, a world-leading manufacturer of access
control readers and cards. The award was presented for Identica’s
integration of HID iCLASS smart card modules with its Universal
Controller and the Techsphere Hand Vascular Pattern biometric scanner.
SunFirst Bank, St. George, Utah, just recently integrated the
Techsphere into its access control system for its Datacenter. "It is
being used all over the world. You have installs in gaming, casinos,
banking, transportation, and government."
Mr. Wheeler explained that Techsphere scans a portion of the hand,
going beneath the surface of the skin, "so we're not concerned with
contaminants like fingerprints would be. It scans for the main veins
and blood vessels all around. It does a one to one comparison and it's
very accurate. You can use the product with a standard pin or HID
iCLASS smart card."
He added: "With a smart card (such as with HID's iCLASS) you're storing
the encrypted template right on the card. The user keeps the card with
him. That's one of big issues for any biometric is where template is
stored. I present my card and hand and it sends the message to the
access control system and opens the door," he added.
Only a 208-byte template is required. "You don't have to worry about
where it is. You enroll them once. If you have a thousand doors around
the world, all you need is your card and your hand to enter."
Future plans include additional card types and ID technologies …
"While the product we currently have is with HID, we will also have
Mifare and Desfire capabilities. The whole development project is in
the works for the Universal Controller."
Identica's scanning process will also work with 2D barcodes. "I can
store my template in that barcode and print it on anything, on a
boarding pass, on the back of any card," said Mr. Wheeler. "It really
depends on what the customer wants. I personally think HID iCLASS is
the way to go, but we want to make the integration easy."
He said the initial choice of HID was easy. "HID is the biggest in the
market. They're a great partner to work with and they always support
their products."
=========================================
08. Press
Release - 2005 RCMP Benchmark: SAGEM Morpho Obtains Highest
Overall
Score - Jan 6, 2006
Source
Next Contents
TACOMA, Wash. --(Business Wire)-- Jan. 6, 2006 -- During the 2nd
quarter of 2005, the Royal Canadian Mounted Police (RCMP) organized one
of the most challenging and rigorous benchmarks of the past few years.
The benchmark, executed against background databases of fingerprint
records, palm print records and unsolved latents provided entirely by
the customer, covered all major types of searches. Moreover, all the
searches processed during this benchmark were done both in full "lights
out" mode (without human intervention) and in "best practice" mode as
recommended by AFIS providers.
Although the detailed results are unknown to the providers, the RCMP
officially informed SAGEM Morpho that it obtained the highest overall
benchmark score among all competitors. The RCMP also informed all
competitors that these results would be shared with police forces
requesting them directly from RCMP.
The RCMP benchmark reinforces SAGEM as the AFIS supplier of choice for
law enforcement and civil agencies throughout the United States, Canada
and the world over. Particularly, the MetaMorpho(TM), the latest
generation of SAGEM AFIS, is currently operational or under
implementation at more that 40 different customer sites, including
Interpol and many U.S. States.
MetaMorpho(TM)
The MetaMorpho(TM) is designed to provide an evolutionary platform,
able to incorporate new functions and COTS software/hardware components
such as the RapID(TM) or DigiScan(TM) Web.
DigiScan(TM) and RapID(TM) fulfill real-time identification needs. They
allow fingerprint capture using forensic quality, optical livescans
that transmit prints to a central site for search. RapID is a wireless
mobile terminal for use on patrol to check a suspect's identity on the
spot, while DigiScan(TM) is a desktop providing a large display and
user-friendly interface.
About SAGEM Morpho, Inc. (www.morpho.com)
SAGEM Morpho, the industry leading biometrics company, develops,
manufactures, and integrates multiple biometric technologies including
fingerprint, palmprint, iris scan and facial recognition products and
services. SAGEM Morpho applies more than twenty-five years of global
experience in biometric identification. It delivers trusted and
reliable biometric solutions to address a wide variety of markets that
include the Federal Government, homeland security, law enforcement,
drivers' licenses, civil identification, as well as commercial and
consumer applications. SAGEM Morpho's solutions are in use by
government administrations including the FBI and many other Federal,
State and local agencies. SAGEM Morpho is a wholly owned subsidiary of
the European group SAFRAN.
========================
09. Press
Release - ImageWare Systems Sponsors American Association of Airport
Executives' 20th Annual Aviation Issues Conference; Company Will
Contribute to Dialogue on Passenger Pre-Screening, Related Aviation
Security Issues & Programs - Jan 6, 2006
Source
Next Contents
SAN DIEGO--(BUSINESS WIRE)--Jan. 6, 2006--ImageWare Systems, Inc.
(AMEX:IW), a world leading developer and provider of identity
management solutions, today announced its sponsorship of the American
Association of Airport Executives' (AAAE) 20th Annual Aviation Issues
Conference, held January 8 - 12, 2006, Hapuna Beach Prince Hotel, Kona,
Hawaii.
The Aviation Issues Conference is a forum for far-reaching discussions
between key aviation leaders from the U.S. Government, systems
integrators and the private sector. And, with the Transportation
Security Administration (TSA) seeking industry and public input on its
plan to begin an airline passenger verification program at airports
across the country in 2006, the conference is the ideal forum for
outlining the viability of using security assessments and
biometric-based identity verification technologies in the airport
environment.
ImageWare will be demonstrating their biometric identity management
platform, the IWS(TM) Biometric Engine, which is well suited for
large-scale programs like the one proposed by the TSA, allowing for
multi-biometric searching and matching that is scalable and allows
organizations to manage population databases of unlimited sizes. In
addition, the Biometric Engine is technology and hardware agnostic,
enabling users to employ biometric devices and algorithms from any
vendor, as well as support the combination of the following biometric
types: finger, face, iris, hand geometry, palm, DNA, signature, voice,
3-D face and retina. In fact, the Biometric Engine currently supports
ninety-three hardware devices/methods or image acquisitions and
sixty-five biometric algorithms.
"Our contribution to the conference is a testament to our support for
airline and airport security and related aviation programs," said Jim
Miller, Chairman and CEO, ImageWare Systems. "Through our expertise and
industry insight, we hope to aid in the debate regarding passenger
pre-screening as well as identify opportunities for ImageWare solutions
to play an integral part in future programs, such as Registered
Traveler."
Under the Registered Traveler Program, airline passengers can pay a fee
and voluntarily give their biographic and biometric information to TSA
in exchange for expedited screening at airport security checkpoints.
The TSA estimates that the cost of administering Registered Traveler
will be about $30 million a year, paid for by user fees. The agency
expects to hire a private company to help administer the program and to
enroll participants at airports nationwide. A request for proposals for
the effort is expected to be issued after Jan. 20, according to the TSA.
About ImageWare Systems, Inc.
ImageWare Systems, Inc. (AMEX:IW) is a world leading developer and
provider of biometric identity management solutions, providing multiple
biometric, secure credential, law enforcement and digital imaging
technologies. Scalable for worldwide deployment, the Company's
biometric product line includes a multi-biometric engine that is
hardware and algorithm independent, enabling the enrollment and
management of unlimited population sizes. ImageWare's identification
products are used to manage and issue secure credentials including
national IDs, passports, driver licenses, smart cards and access
control credentials. ImageWare's digital booking products provide law
enforcement with integrated mug shot, fingerprint LiveScan and
investigative capabilities. The Company also provides comprehensive
digital workflow solutions for the professional photography industry.
ImageWare is headquartered in San Diego, with offices in Canada and
Germany. For more information visit www.iwsinc.com.
Safe Harbor Statement
This news release may contain forward-looking statements made pursuant
to the "safe harbor'' provisions of the Private Securities Litigation
Reform Act of 1995. While these statements are meant to convey to the
public the company's progress, business opportunities and growth
prospects, readers are cautioned that such forward-looking statements
represent management's opinion. While management believes such
representation to be true and accurate based on the information
available to the company, actual results may differ materially from
those described. The company's operations and business prospects are
always subject to risks and uncertainties. Important facts that may
cause actual results to differ are set forth in the company's periodic
filings with the U.S. Securities and Exchange Commission.
===================================
10. GOVERNMENT:
Pawlenty offers plan to restrict ID theft - Proposals follow Hatch's
criticism - Associated Press - Grand Forks Herald (Minn) -
Jan 6,
2006
Source
Next Contents
ST. PAUL - A day after the attorney general criticized the state's
efforts at preventing identity theft, Gov. Tim Pawlenty on Thursday
proposed a series of measures - including facial recognition technology
on driver's licenses - that he said would make state-held private data
more secure.
The governor said his proposals had long been planned and weren't a
response to Wednesday's criticisms by Attorney General Mike Hatch - who
also happens to be the Democratic favorite to run against him in
November. But Pawlenty and Hatch sniped at each other extensively in
dueling media briefings, both claiming they'd do more to prevent
identity theft.
"Identity theft causes great trauma, damage and cost to families,"
Pawlenty said. "There's more Minnesota can do to strengthen safeguards
on personal information and to crack down on identity thieves."
Facial recognition
Likely to get the most attention is a proposal to use what's called
biometric facial recognition technology on driver's licenses. The
technology - which can be applied to existing license photos - converts
the image into a mathematical algorithm to create a unique data file on
every license-holder's face.
The technology, already in use in 13 states, makes it nearly impossible
to fake a driver's license, Pawlenty said. He said most of the cost of
the program could be funded by an $800,000 federal grant.
He also proposed legislation that would make it a crime to disrupt the
normal operations of a computer, add criminal penalties for gaining
access to personal data through a computer, allow computer hackers to
be prosecuted even if they don't steal or destroy computer material,
and make it a crime to disclose computer information knowing it may be
used for a crime.
Wednesday, Hatch contended that driver's license numbers released by
the Department of Public Safety are turning up in cases of check fraud
and identity theft in increasing numbers. He placed the blame at the
feet of the Pawlenty administration and said more needs to be done to
protect that information
=======================
11. Press Release - Diamelle Technologies Releases a Low Cost
Authentication Server to Deter Account Fraud and Identity Theft with
Soft Tokens for Multi-factor Authentication - Jan 6, 2006
Source
Next Contents
Identity theft has become the world’s fastest growing crime.
Consumers
are more and more concerned about doing business online and passwords
are increasingly viewed as not safe for application such as banking,
brokerages, and e-commerce. Hard token solutions are expensive, hard to
deploy and cumbersome for endusers. Diamelle's cost effect soft tokens
provides the benefits of tokens, but operates in something most users
already carry - cell phones, PDAs or PCs.
Cortlandt Manor, NY (PRWEB) January 6, 2006 -- Diamelle Technologies,
(www.diamelle.com)
which provides a comprehensive identity and access
management enterprise solution, announced the release of a low cost
Authentication server with two factor authentication, aimed at the SMB
market and high volume online applications.
Identity theft has become the world’s fastest growing crime and risk
exposure levels are high. Consumers are more and more concerned about
doing business online and passwords are increasingly viewed as not very
safe, especially for sensitive applications such as online banking,
brokerages, and some e-commerce activities. Because passwords are so
easily compromised, the National Credit Union Administration (NCUA) has
been forced to mandate that credit unions go to a higher level of
security. The Federal Financial Institutions Examination Council
(FFIEC) has also recommended implementation of multi-factor
authentication by end of 2006.
Authentication with more than one factor is considered as strong
authentication which is considerably more difficult to compromise as
compared with single factor authentication. Two factor authentication,
using one time passwords (OTP), requires the user to enter something
they know, which is usually a PIN, and something they have; a physical
device such as a token, smart cards with micro-processors, or
biometrics such as finger print scanners.
Hard token generators are expensive, some costing as much as $65 per
token. The high price tag makes it difficult for many businesses to
implement such a feature for high volume applications, no matter how
strong the authentication may be. In addition, consumers are not going
to be happy with lugging around multiple tokens from the different
organizations that they may have relationships with. Currently
available soft token solutions for cell phones often rely on a phone
signal, making them impractical for use in environments where a signal
is not available. Further, the user consumes valuable phone minutes
upon each use.
The Diamelle solution uses something that every online consumer already
has: a PC, a PDA, or a mobile phone. There are no manufacturing or
distribution costs, just a simple one time software download. The
solution is easily distributed to its audience using the self service
module in the Diamelle Authentication Server and downloaded into the
device using the Over the Air feature found in most modern cell phones.
When the member requests a login to the business’s online
authentication server, the small application generates a PIN internally
in their phone (or PDA or PC). Most importantly, the system does not
rely on SMS or need a phone signal or use the member’s precious phone
minutes - it is a completely secure, encrypted and self-contained
system. Alternative authentication methods are available for the odd
occasion a user is unable to access either a cell phone or a PC.
Since no additional hardware is required, the cost per user is very
low. The Authentication server itself is also attractively priced at
$5,000 for the first 100 users, including tokens. Additional users
start at $10 per user and quantity discounts are available for high
volume applications. Available with the server is a web based
administration console to manage user information. A fine grained API
is also available to facilitate additional integration with other
systems.
The Authentication Server can also be expanded to include Diamelle
Technologies’ Enterprise Identity Management solution available for
large corporations. The Diamelle IDM is an integrated, full featured
product built on a Java Enterprise Edition (JAVA EE) platform with WS-I
compliant web services to facilitate integration and provides
authentication with Single Sign-on, authorization, user management,
policy management, user self-service, audit, password management and
delegated administration. Diamelle offers a seamless migration path
from the Authentication server to the IDM solution.
Organizations need authentication and authorization across multiple
applications and platforms. Without a coherent security framework,
users are faced with multiple applications -- each with its own
authentication needs and user repositories with multiple logins and
passwords. Developers spend time creating their own security
frameworks. Each application needs user accounts to be set up and
productivity decreases as users struggle with multiple identities.
Calls to support and help desk increase and raises the cost of
operating systems.
The Diamelle solution manages user information, various identities and
user groups, in a centralized secure infrastructure with
enterprise-wide authentication utilizing both passwords and tokens.
With Single Sign-On, users can login once, and roam freely in secured
domains without being challenged again. Participating domains are not
required to give up their own logins and credentials. The ability to
hold multiple identities, across multiple domains allows for a wide
network of co-operating domains to communicate seamlessly.
Authenticated subjects can access restricted resources requiring
multiple logins and credentials without the need to login at each
domain.
Password Management is an optional module that allows the system to
manage the large number of passwords that a user may be required to
remember. These passwords can be managed through the consistent
administration of password policies as well synchronization of
passwords across systems. A self service module allows users to manage
their own passwords as well as unlock their accounts when the need
arises. This not only saves help desk time but has many checks to
ensure an account is not compromised. Shared secrets such as mother’s
maiden name and zip code used by many financial institutions are not
very reliable. Multiple shared secrets offer better protection and the
Diamelle solution has many such features. Audit logs help identity
unauthorized activities and fraud and promote employee and user
accountability.
Diamelle Authentication server has been built upon the Java EE platform
utilizing a Service Oriented Architecture. The Diamelle product
architecture emphasizes scalability, security, portability, platform
independence, extensibility, business process mapping and easy systems
integration. It is a powerful and flexible programming model which
lowers implementation risks and cost of ownership and scales to
millions of users. The solution can be deployed in a number of
configurations where it can serve as the central identity manager for
the enterprise or it may be deployed as part of an application, without
creating a new footprint, as is often the case for ISVs or departmental
solutions.
The use of the JAVA EE platform means that developers or administrators
already working with JAVA EE app servers can leverage their existing
knowledge. Competing products dating back to earlier times often have
proprietary platforms without the same level of flexibility.
Availability of Web Services and related technologies, simplifies
integration with applications that use other technologies. Since SOAP
toolkits are now available for a large number of platforms, the effort
is greatly reduced and developers can leverage existing knowledge to
achieve this goal.
The Diamelle Authentication server is available for immediate delivery.
A promotional price is being offered during January 2006 where the
Authentication Server for 500 users is available for $7,500-.
Additional users licenses are available for $5- / user for 501 to 5000
user. 5001 to 10,000 users are $4- / user.
About Diamelle Technologies
Diamelle Technologies has been building robust enterprise solutions for
some of the largest corporations on the planet, from Wall Street
trading floors to entertainment and manufacturing industry giants since
1982. It specializes in Java EE systems utilizing a Service Oriented
Architecture featuring Identity Management, CRM, e-Business and Content
Management. Headquartered in New York, with a development center in
Mumbai, Diamelle is uniquely positioned to deliver robust,
transactional, distributed Enterprise systems at an affordable cost.
=============================
12. HK
Polytechnic Univ's new developed system on display - China
View -
Jan 6, 2006
Source
Next Contents
HONG KONG, Jan. 6 (Xinhuanet) -- The World's first
commercial use
Palm-print Identification System is now on display at the ongoing
International Conference on Biometrics 2006, according to Hong Kong
Polytechnic University on Friday.
Developed by Professor David Zhang, Associate Head
of the
Department of Computing of the university, the palm-print
identification system was more accurate than finger-print
identification system and could be applied at identity authentication.
This remarkable development has generated a number
of patents and
earned him many international awards including the Senior Research
Fellowship Award by the Croucher Foundation in 2004, the Gold Medal in
the 14th National Inventions Exhibition of China in 2003, and Special
Gold Award by the Invention Promotion Association of Korea in 2002.
Besides, Professor Zhang and his research team are
integrating
traditional Chinese medicine diagnosis with biometric product
development, creating tongue diagnosis system and pulse diagnosis
system for daily use.
Prof. Zhang said these systems can diagnose
illnesses through human
tongue shape, tongue print and heartbeats.
The Tongue Diagnose System can diagnose such
illnesses as
intestinitis, cholecystitis, pancreatitis, diabetics, cirrhosis and
heart failure, while the Pulse Diagnosis System is capable of
diagnosing heart failure and lethargy.
Organized by the university's Department of
Computing, the
three-day conference which began on Jan. 5 brought together more than
200 biometric experts and academics from over 20 countries to exchange
and share research results.
Biometrics topics focusing on the improvement and
enhancement of
existing biometrics and pattern recognition technology, incorporation
of fake detection and amplifying applicability and utilization are
being discussed.
There is also an exhibition demonstrating the latest
biometric
products and prototypes. Exhibitors include local and overseas
universities and organizations worldwide. Enditem
==================================
13. India's First Bio-ATM From Axis - By Rajendra Chaudhary -
Mumbai - CXO Today [India] - Jan 6, 2006
Source
Next Contents
Axis software, a Pune based technology company has developed
Bio-ATM, a
biometric based automated teller machine for banks and financial
institutions which leverages sophisticated biometric technology to
allow secure ATM transactions.
This is the first time that any Indian company has developed such an
ATM machine. The Bio ATM provides an alternative to the regular card
and pin based ATM transaction systems.
In order to access accounts users need to give their biometric to the
machine that will verify and authenticate it with the biometric records
available in the database. The machine uses fingerprints for the
verification purpose and hence customers will need to register their
fingerprint with the bank.
Speaking to CXOtoday, Abhay Khinvasara, President & CEO, Axis
Software said, "We use FBI approved scanning and matching algorithms.
Wherever required, we can also offer iris recognition, skin texture
recognition or even palm scanning. Since our ATMs are available with
support for all popular Switch Protocols as well as popular
middlewares, a buyer can even replace existing ATMs with the Axis
BioATM seamlessly."
Features such as currency depositing, currency recycling and cheque
truncating can be made available with the Bio-ATMs besides the standard
Biometric authentication feature.
Axis informed CXOtoday that they have tested these ATMs in difficult
markets and conditions which included lack of quality fingerprints data
availability, lower literacy levels of the users and also poor network
bandwidth and connectivity issues and that so far no mis transaction
have been reported at any of the ATMs.
Axis claims that the machine is foolproof and impossible to deceive.
Bio ATM's security features include video output for CCTV monitoring,
intelligent silent alerts and built in data encryption for data
transfer across the network.
The company has also developed a "Retrofitkit", which could be attached
to a normal ATM machine to make it a Biometric one. The kit layers
biometric authentication on top of a regular Card PIN based
authentication without any physical or software changes to the existing
ATM.
Jalgaon Peoples Co-opeative Bank has installed several Bio ATMs at
their branches and the company has plans to export Bio ATMs to Central
Africa and Middle East. Axis offers three types of ATMs in different
sizes and capacities with different standard features. The Bio ATM
prices range from US$ 2,000 to 14,000.
==================================
14. Security Risk
Management is the answer to your security prayers - Security Park -
Jan
6, 2006
Source
Next Contents
It used to be the case that only the most technical members of the
IT
department understood IT security. Viruses, Trojans and worms were not
terms used outside the IT room, management did not yet worry about
hackers or zombie machines, and the board had absolutely no idea what a
zero-day attack was, let alone how much damage it could cause.
Now however, with computers (and their attendant threats) a ubiquitous
part of virtually every organisation, IT security has slowly but surely
risen through the ranks to become the business-wide issue it deserves
to be.
Familiar, traditional IT security solutions usually include as a
minimum the ubiquitous firewall, plus anti-virus software and scanning,
intrusion detection and identity management. But the range and scope of
products available covers all different aspects of security from the
very specific to broad, network-wide prevention measures.
In addition, most businesses using standard applications and software,
for instance Windows, will also implement a programme of patch
management. This ensures that the latest patches - the IT equivalent of
sticking-plasters - are applied to the server or users' computers to
fix any vulnerabilities inherent in the software.
While these security solutions are without a doubt better than nothing,
and are often sufficient to protect the IT infrastructure in the main,
they can also become a major headache for a business, its employees,
and more specifically its IT department. Installing, implementing and
maintaining the myriad solutions is usually an expensive and very
time-consuming process.
IT staff spend time updating patches or reconfiguring firewalls when
they could more usefully be focusing their attention on profit -
driving activities. Security needs are unlikely to be prioritised,
leading to resources being wasted on inessential measures - and
particularly in the case of patches, this lack of understanding can
lead to vulnerabilities being fixed unnecessarily.
The alternative however is worse - that measures are not taken and the
network is left vulnerable. Add to this the fact that virus warnings,
patch updates and other security problems are being constantly issued
at an often incredible rate, and it is not surprising that businesses,
and their IT departments in particular, are having trouble keeping up -
with potentially disastrous consequences.
So what is the solution for businesses that want to protect their
networks and machines in an effective and cost-efficient way? The
answer is automation. Many of the solutions mentioned above can be, and
frequently are automated - patches are automatically installed onto
machines; anti-virus software scans for known signatures of viruses and
worms - and the IT manager simply has to sit back and let the whole
process carry on without them. Unfortunately however this is never as
straightforward as it may seem.
Certain types of security require frequent updates which have to be
manually inputted, while others are incompatible with particular
systems and so need more careful monitoring. Security programmes too
are often not intelligent enough to be relied on to deal with unusual
or unexpected situations in the same way that a human could. A rush of
traffic to a website may be mistaken for a zero-day attack, or the
legitimate addition of new software may be mistaken for a malicious
intrusion.
To avoid these kind of issues, what's needed is a more holistic
approach that aligns security with business goals and more efficiently
manages risk. Security Risk Management (SRM) is emerging as this
missing link, helping translate the black art of security into
compliance risk terms that can be easily digested and documented.
According to Forrester, “IT organisations have always scrambled to
align IT with the business, but now there’s a new scramble going on -
in the area of risk and compliance management.”
Security Risk Management is defined by leading industry analysts as the
complete process of understanding threats, prioritising
vulnerabilities, limiting damage from potential attacks, and
understanding the impact of proposed changes or patches on the target
systems.
SRM solutions integrate and automate multiple information sources and
technologies required to implement an effective vulnerability
management process - and add the analytics required to make more
intelligent decisions to protect critical business assets before an
attack ever occurs, while continuously proving and improving risk
postures.
There are three key steps in the SRM process:
· Risk Assessment: Risk assessment is the identification and
evaluation
of risk and its business impacts. An integrated security approach is
required:
o Define the origins and profiles of various threats
o Collect and normalise vulnerability scanning data
o Collect routing and access information from firewalls and routers
o Define asset classification in business and compliance terms
· Risk Mitigation: Risk mitigation involves prioritising,
evaluating
and implementing the appropriate risk-reduction measures recommended
from the risk assessment process. A business impact analysis approach
is required:
o Model vulnerabilities in context with network routing
o Perform attack simulation to uncover the weaknesses that pose the
greatest potential harm to the business
o Calculate risk exposure metrics and establish benchmarks
o Analyse mitigation alternatives
· Risk Measurement: Risk measurement determines effectiveness of
the
action and continues reassessment and mitigation cycle to minimise
threats and vulnerabilities. A measured ROI approach is required:
o Perform ‘what if’ access and risk analysis
o Evaluate the cost benefits of countermeasures before deployment
o Issue workflow tickets to the change management systems
o Issue appropriate reports to security, IT operations, CICO, CIO,
business owners, auditors
o Repeat and automate the data collection and analysis process to keep
up with constant network infrastructure changes and the introduction of
new threats
This approach ensures that security systems are kept continuously
up-to-date, as well as providing a clear audit trail for the IT
department to monitor and demonstrate the different security processes
in place. It gives businesses a comprehensive overview of their
vulnerabilities and allows them to accurately assess the risks they
face, and determine their priorities for remediation.
Time isn’t spent by the IT department on unnecessary measures so time
can instead be spent on improving efficiencies elsewhere. Perhaps most
importantly the window of vulnerability, from the time that a threat is
identified to the time that it is remediated, is decreased, leaving
businesses far less likely to suffer damage.
With Security Risk Management as a best practice, corporations can
dramatically reduce their risk, reduce the time and effort taken to
conduct and document an audit and improve the accuracy of their
information.
Automation means that security teams and auditors can have a
continuously accurate snapshot of the security situation at any one
time, and quickly see and correct lapses in internal controls to make
sure they are always fully compliant. The IT department, security
teams, business teams and executives can talk about security in the
same terms and work collaboratively to ensure continuous improvement.
SRM is quickly becoming the by-word for intelligent security, and with
threats increasing daily in both frequency and severity, it’s a term
that businesses will soon find themselves familiar with. To have and
maintain the competitive edge when it comes to security now takes more
than just a firewall - it takes a smart, efficient approach to managing
risk.
Article contributed to Security Park by Avi Corfas, VP and MD EMEA,
Skybox Security. Skybox Security is exhibiting at Infosecurity Europe
2006 - www.infosec.co.uk
====================================
15. THE ELECTION - Harper trumpets get-tough crime plan -
Conservative Leader would raise minimum sentences and try 14-year-olds
as adults - By BILL CURRY - The Globe & Mail- Jan 6, 2006
Source
Next Contents
TORONTO -- One of the first acts of a Conservative government would
be
to enact a sweeping law-and-order package to increase mandatory minimum
sentences for gun crimes, require youths 14 and older to be tried as
adults for serious crimes, and end a program under which prisoners are
released after serving two-thirds of their sentences, Stephen Harper
said yesterday.
Speaking in Toronto, where the fatal shooting of a 15-year-old girl on
Boxing Day has sparked a major debate on gun violence, Mr. Harper
accused the Liberals of doing nothing while crime increased during
their 12 years in office.
"The revolving door of criminal justice of this current government
bears significant responsibility for the tide of gun, drug and gang
crime plaguing our cities," Mr. Harper said, near where Jane Creba was
killed while shopping on downtown Yonge Street.
Mr. Harper said Canadians deserve to be proud of the country's
reputation for safe streets, safe communities and low crime rates. "But
we are learning, even in the midst of this campaign, that these things
cannot be taken for granted. The Canadian way of life and those proud
traditions of safety and security are today threatened by a rising tide
of drugs, gangs and guns."
Mr. Harper said his crime package would cost $100-million a year and
would be funded in part by scrapping some of the current government's
justice spending.
The proposals were praised by police and victims-advocates groups. But
others said the Conservative plans reflected the understanding that
law-and-order promises get votes, and that they would serve mainly to
increase the prison population.
The proposals include:
Mandatory minimum sentences of five or 10 years would be imposed for
more than two dozen types of gun crimes; existing mandatory sentences
are one or four years, depending on the offence.
Three new offences would be created and subjected to the five-year
minimum: breaking and entering with the intent to steal a firearm,
robbery with the intent to steal a firearm, and possession of a firearm
contrary to a bail order.
Automatically subjecting to an adult sentence anyone 14 years or older
who is charged with a serious violent offence or repeat offences.
Current law allows that, but does not require it.
Ending house arrest -- or conditional sentences -- for violent
crimes,
sexual offences, weapons crimes, and impaired driving causing death,
among other things.
Ending statutory release, which allows prisoners to be released after
serving two-thirds of their sentences. Prisoners would be required to
earn parole through good behaviour or rehabilitation.
Scrapping the federal gun registry and using the money to hire 1,000
new RCMP officers.
Using face recognition and other biometric technology to screen people
at border crossings and ports of entry.
Appointing a National Security Commissioner to better co-ordinate
Canada's security and intelligence organizations.
Expanding intelligence-gathering activities overseas and working more
closely with foreign agencies.
Rapidly reducing the backlog of deportation orders.
Alan Young, a law professor at York University's Osgoode Hall Law
School in Toronto, said the overall impact of Mr. Harper's proposals
would likely be to boost the prison population. Mr. Young called the
stiffer gun sentences an incremental boost unlikely to have much impact
on anything. "It almost looks like just pulling numbers out of a hat
arbitrarily," he said.
Before more changes are made, there needs to be much more study of the
current minimums -- which have not been in place long -- to see whether
they have had any effect, he said. And there is "absolutely no
evidence" that there is a need to tighten rules governing parole, Mr.
Young added. "It's a myth that parolees are getting out and committing
serious crimes" except in exceptional circumstances, he said.
The Liberal law-and-order package centres on a proposal to outlaw all
handguns. It also calls for tougher sentences for some gun-related
crimes, as well as money to hire more RCMP officers and to train at
least 250 of them to work with the provinces and municipalities on
guns, gangs, organized crime and drug trafficking.
========================
16. Homeland
Security opening private mail - Retired professor confused, angered
when letter from abroad is opened - By Brock N. Meeks - MSNBC -
Jan. 6,
2006
Source
Next Contents
WASHINGTON - In the 50 years that Grant Goodman has known
and
corresponded with a colleague in the Philippines he never had any
reason to suspect that their friendship was anything but spectacularly
ordinary.
But now he believes that the relationship has somehow sparked the
interest of the Department of Homeland Security and led the agency to
place him under surveillance.
Last month Goodman, an 81-year-old retired University of Kansas history
professor, received a letter from his friend in the Philippines that
had been opened and resealed with a strip of dark green tape bearing
the words “by Border Protection” and carrying the official Homeland
Security seal.
“I had no idea (Homeland Security) would open personal letters,”
Goodman told MSNBC.com in a phone interview. “That’s why I alerted the
media. I thought it should be known publicly that this is going on,” he
said. Goodman originally showed the letter to his own local
newspaper,
the Kansas-based Lawrence Journal-World.
“I was shocked and there was a certain degree of disbelief in the
beginning,” Goodman said when he noticed the letter had been tampered
with, adding that he felt his privacy had been invaded. “I think I must
be under some kind of surveillance.”
Goodman is no stranger to mail snooping; as an officer during World War
II he was responsible for reading all outgoing mail of the men in his
command and censoring any passages that might provide clues as to his
unit’s position. “But we didn’t do it as clumsily as they’ve done
it,
I can tell you that,” Goodman noted, with no small amount of irony in
his voice. “Isn’t it funny that this doesn’t appear to be any kind of
surreptitious effort here,” he said.
The letter comes from a retired Filipino history professor; Goodman
declined to identify her. And although the Philippines is on the
U.S.
government’s radar screen as a potential spawning ground for
Muslim-related terrorism, Goodman said his friend is a devout Catholic
and not given to supporting such causes.
A spokesman for the Customs and Border Protection division said he
couldn’t speak directly to Goodman’s case but acknowledged that the
agency can, will and does open mail coming to U.S. citizens that
originates from a foreign country whenever it’s deemed necessary.
“All mail originating outside the United States Customs territory that
is to be delivered inside the U.S. Customs territory is subject to
Customs examination,” says the CBP Web site. That includes
personal
correspondence. “All mail means ‘all mail,’” said John Mohan, a
CBP
spokesman, emphasizing the point.
“This process isn’t something we’re trying to hide,” Mohan said, noting
the wording on the agency’s Web site. “We’ve had this authority
since
before the Department of Homeland Security was created,” Mohan said.
However, Mohan declined to outline what criteria are used to determine
when a piece of personal correspondence should be opened, but said,
“obviously it’s a security-related criteria.”
Mohan also declined to say how often or in what volume CBP might be
opening mail. “All I can really say is that Customs and Border
Protection does undertake [opening mail] when it is determined to be
necessary,” he said.
© 2006 MSNBC Interactive
===========================
17. Biometric
technology secures pocket-sized server - Secure ID NEws - January 9
2006
Source
Next Contents
AuthenTec's fingerprint sensor has been chosen by mobile enterprise
platform developer Realm Systems to secure the company's mobile
pocket-sized server, making it, according to AuthenTec, one of the most
secure in the industry.
SALT LAKE CITY and MELBOURNE, Fla. -- Realm Systems has chosen
AuthenTec's biometric technology to enable secured endpoint computing
in its pocket-sized server. The Realm iD3 Personal Server is a fully
functioning server that is ultra- secure, centrally managed -- and
small enough to fit in your pocket. The Realm iD3 contains its own
processor, memory, storage, built-in AuthenTec biometric fingerprint
sensor, and is completely powered by the USB port of any host computer.
"We are pleased that Realm has chosen AuthenTec's advanced fingerprint
sensors to protect the critical files, features and functions on its
unique mobile server," said Tom Aebli, director of PC segment marketing
for AuthenTec. "By adding AuthenTec biometrics, Realm is setting a new
standard in mobile security for its customers." "Because of the
AuthenTec sensor, the Realm iD3 is one of the most biometrically
secured devices in the industry," said Chris Bodily, Realm iD3 Product
Manager. "Through Realm's proprietary solution, the biometric data
provided by the AuthenTec sensor is never sent over a network or other
possibly compromised medium."
About Realm
Realm Systems provides a next generation Mobile Enterprise Platform
that simplifies the delivery of applications and services to end-users
across the distributed enterprise. Realm Systems is uniquely positioned
to solve many of the issues facing today's networked organizations by
extending the life of desktops and laptops, significantly reducing IT
maintenance costs. Realm's technology simplifies and centralizes
identity and application management and maintenance while preserving
existing IT capital investment. The company is at the nexus of an
enormous opportunity that spans markets, including security, identity
management, regulatory compliance, and mobile device support of
enterprise applications. According to AMR Research, the market for data
security compliance alone is expected to reach $15.5 billion by the end
of 2005. Realm Systems was founded in 2002 by a group of seasoned
technologists and executives with extensive expertise in distributed
computing, integrated circuit development, web services, and IT
security. Realm Systems is privately held with offices in Salt Lake
City, Utah and Seattle, Washington. Visit our website at
www.realmsys.com.
About AuthenTec
With more than six million sensors in use worldwide, AuthenTec is the
world leader in fingerprint sensor security, innovation and sales to
the PC, wireless, and access control markets. AuthenTec's award-winning
FingerLoc(R) and EntrePad(R) sensors take full advantage of "The Power
of Touch" by utilizing the company's patented TruePrint(R) technology
to deliver the most convenient, reliable and cost-effective means
available for enabling touch- powered features that extend beyond user
authentication. The company's network of partners, solution providers
and customers include: Analog Devices, APC, Compal, Cherry, Fujitsu
Computer, Computer Associates, HP, IBM, LGE, Microsoft, Motion
Computing, NEC Packard Bell, Pantech, Quanta, Samsung, Tatung, Texas
Instruments, Toshiba, and Wistron, among others. Visit
www.authentec.com.
===========================
18. Military
Sensor Hears Through Walls - By Bill Christensen - Live Science.com
- Technology.com - Jan 9, 2006
Source
Next Contents
A new handheld radar scope from the Defense Advanced Research
Projects
Agency (DARPA) can provide troops with an ability that was formerly the
province of science fictional superheroes alone-the ability to sense
through up to 12 inches of concrete whether someone is in the next room.
The Radar Scope is expected to be in use in Iraq by spring of this
year, according to DARPA's Edward Baranoski. Weighing just 1.5 pounds,
the device is about the size of a telephone handset and will cost about
$1,000. Waterproof and rugged, it runs on AA batteries. Held up to a
wall, users will be able to sense movements as small as breathing up to
fifty feet into the next room.
"It may not change how four-man stacks go into a
room (during
clearing operations)," Baranoski said. "But as they go into a building,
it can help them prioritize what rooms they go into. It will give them
an extra degree of knowledge so they know if someone is inside."
(From DefenseLink)
Science fiction writers have been working on this idea for generations.
Golden age writer E.E. "Doc" Smith wrote about a spy ray in his 1934
novel Triplanetary. DARPA has yet to actually come up with an actual
sci-fi life detector like the one that Frank Herbert wrote about in
1958 in his story Cease Fire:
The antennae of the Life Detector atop the OP swept
back and forth
in a rythmic halfcircle like so many frozen sticks brittle with rime
ice...
One operator - drugged to shivering wakefulness -
stood watch in
the OP. The space around him was barely six feet in diameter, crammed
with equipment, gridded screens glowing a pale green with spots that
indicated living flesh.
(Read more about Frank Herbert's life detector)
Still, the handheld Radar Scope is a remarkable invention, and should
make the task of searching buildings at least a bit less dangerous.
Read more at DefenseLink.
===========================
19. Take security precautions when an employee leaves the
organization
- by John McCormick - Tech Republic - Jan 9, 2006
Source
Next Contents
Employee separations create critical situations for IT departments.
IT
professionals often concentrate on external threats, but insiders
always pose the most serious threat to computer security. Getting fired
can sour even a model employee's opinion about the company.
An employee's separation period is more critical than his or her
initial hiring. New employees require time to gain a thorough knowledge
of your business: what information is valuable; what isn't; and what
could cause the most harm. When employees leave, they know your
competitors, your phone directory (useful for social engineering), your
client list (useful for poaching), how often you perform backups, how
seriously you take physical security, how often passwords are changed,
and the like.
Although the immediacy of your actions will depend somewhat on whether
the separation is friendly or hostile, your separation process should
be largely the same. After all, you never really know how an employee
feels about the departure or if he or she will change their mind later.
A friendly separation may become hostile. A cunning employee may be
hiding how hostile they feel at the time of separation. A
departing/previous employee may inadvertently discard sensitive company
documents.
Keep your organization safe during employee separations with the
following IT security precautions.
General separation procedures
* Change all network and workstation passwords which
the individual
could possibly have access to - then change all the rest too.
* Deactivate all company e-mail accounts.
* Deactivate any remote access accounts and collect
any remote
access security devices.
* Retrieve company laptops or PDAs (Never permit
employees to use a
personal PDA or laptop for work purposes - they WILL store passwords
and other information on it and later you won't have any control over
it.)
* Retrieve all backup disks, USB keys, and CD-ROMs.
* Conduct a detailed debriefing session with special
emphasis on
any encrypted files or work in progress in electronic form which other
individuals may not know about. It's easy to look through file cabinets
but electronic work product can be highly elusive.
* Take whatever action is appropriate for digital
cameras. This may
include inspecting cameras brought onto company property or simply not
permitting cameras. You can store a lot of data in a camera's storage
media.
* Reprogram voicemail and change passwords.
* Obtain all company-related keys, pass cards, and
ID cards but
remember that keys can be duplicated and many employees will honestly
(or dishonestly) say that they have lost some items.
* Inform security and change any biometric or
physical badge access
codes to exclude the individual.
* Secure all work products, both hard copy and
electronic.
* Make certain you have retrieved all documentation
or other
printed material, especially including company phone books.
* Retrieve any gate pass or parking tags.
* Change PINs to any gas or other credit cards.
Hostile or potentially hostile terminations
When an employee is fired for cause, such as stealing, or when a
terminated employee possesses critical corporate information, the IT
department should act more swiftly than during normal separations. If
at all possible, ask management to warn you in advance of hostile
terminations so you can be ready when the time comes.
=============================
20. Taking the 'I'
out
of Identity - Sean McGrath, ITworld.com - Jan 9, 2006
Source
Next Contents
Few e-business subjects have caused such deep furrowing of brows as
the
concept of identity.
'Obviously', some business folk say, 'to really do E-Business, we will
need a way of guaranteeing that a visitor to our web site is who they
say they are.'
'Sure thing', the younger engineering folk say, 'it is just a matter of
technology. We will start coding and/or buying stuff to make it all
just work.'
'Not so fast', the older engineering folk say, 'this problem is broader
and deeper than you think. Electronic identity is subtle at best,
certainly insanely complicated and possibly even intractable.'
As is often the case with seemingly intractable problems, revisiting
basic assumptions is always a worthwhile exercise. The big assumption
here is that to do business electronically with someone, you need to
know who they are. Is that really true?
Sometimes it most definitely is true of course but there are a
significant number of use cases where it is not true. Sometimes lurking
behind the phrase 'we need to know who they are' lies the real
substance of the concern which is 'we need to know they can pay' or,
more generically 'we need to know that the person/thing we are
interacting with can conduct a value exchange.'
The cracking noise you can hear in the background is the rending of two
concepts that tend to be bound together. The concept of identity on one
hand and the separate concept of 'ability to conduct value exchange' on
the other. People turn up with cash. They can clearly pay. People turn
up with checkbooks. They can clearly pay. People turn up with credit
cards, they can clearly pay...
But, people can pay for things with credit cards on-line. In other
words, credit cards are usable today without the physical exchange of
paper and without physical presence. How does that work? When you take
an order with a credit card on-line, do you really know that the person
is who they say they are?
No you do not. What you do know is twofold (a) that the details
provided to you are considered good by the credit card company and (b)
the credit card company is taking on the risk in return for a
percentage of the transaction value.
I guess what I'm saying is that credit cards have already removed the
need to know anything about the person/thing you are dealing with - the
'I' in identity. All you are interested in, is that the credentials are
valid according to the credit card company and that you can use the
credentials to conduct the value exchange.
Some think this is messy and not really a solution to the identity
problem in E-Business. Some think that we need to establish identity
firmly to move on. Some think that it is only a matter of time before
biometrics or some such technology steps into the breach to solve this
problem. Then and only then, so the story goes, can we really get down
to serious e-business.
Perhaps, but I doubt it. As in so many other areas, the Web has a way
of cooking up an exquisitely balanced sweet and sour blend of
simplicity and complexity. In the case of identity, I think we are well
on the way to jettisoning the knee-jerk binding of identities to people
in favor of a more abstract concept of "thing that can engage in value
exchange".
I sometimes hear folks talking about e-cash and personalized agents and
bots and what have you, in the future tense. From where I'm standing,
we already have these things. To Amazon, I am indistinguishable from a
bot. I might as well not exist for all Amazon's web site cares. It is
the credit card company who worries about whether or not I am real.
Sean McGrath is CTO of Propylon. He is an internationally acknowledged
authority on XML and related standards. He served as an invited expert
to the W3C's Expert Group that defined XML in 1998. He is the author of
three books on markup languages published by Prentice Hall. Visit his
site at: http://seanmcgrath.blogspot.com.
==========================
21. Press Release -
bioMETRX, Inc.'s Finger Activated Garage Door Opener to be
Featured
on HGTV's 'I Want That' -
Product To Kick Start Consumer Biometrics Interest -
January 9,
2006
Source
Next Contents
JERICHO, N.Y., Jan. 9 /PRNewswire-FirstCall/ -- bioMETRX Inc., (OTC
Bulletin Board: BMTX - News) announced today, that its first product,
the smartTOUCH(TM) Garage Door Opener will initially be featured on
HGTV's prime time program "I Want That" on Wednesday January 11th at
8:30pm and several rebroadcasts throughout the months of January and
February. More information on the program can be found at www.HGTV.com.
The highly acclaimed patent- pending garage door opener uses finger
activated technology to operate the homeowner's garage door. bioMETRX
Inc. is a Jericho, New York based research and development company that
is using state of the art finger activated technology to create
innovative, stand alone security and electronics products for the
consumer under the smartTOUCH(TM) brand name. The company is focused on
providing simpler, more secure and convenient products to protect
consumers property and families.
The company's smartTOUCH(TM) family line of products responds to the
needs of a consumer electronics market, especially in residential
security, that has not realized any significant changes in its products
over the last 30 years. Current garage door products have underlying
problems such as unauthorized interference by neighbor's remote garage
door openers, unauthorized use of the opener (anyone can simply press
down a button and open a garage door), or simply a user forgetting
their PIN code.
"Our smartTOUCH(TM) products provide solutions to these annoying
problems, empowering the homeowner to securely open their doors, or set
alarms/thermostats etc. by a simple touch of a finger," said Lorraine
Yarde, V.P of Marketing for bioMETRX. "When you add the convenience of
allowing children and the elderly, who cannot always remember PIN
numbers, with a simple way to come and go securely, demonstrates the
power of biometric technology. The interest we have received for this
product, from both retailers and consumers, is far exceeding our
expectations", noted Ms. Yarde.
About bioMETRX, Inc.
bioMETRX, Inc. is developing a diverse portfolio of wholly owned
companies that design, develop and market biometrics-based products to
the consumer, health information, medical devices and small business
markets under the common brand name -- smartTOUCH(TM). bioMETRX
Technologies, Inc. which was acquired in May, 2005 that designs and
engineers biometrics-based products for the home security, consumer
electronics, medical products and patient medical information markets;
smartTOUCH Security, Inc. that tests and markets the company's
biometrically secured garage door openers, thermostats, deadbolts and
home alarm keypads and, smartTOUCH Medical, Inc., that designs, tests
and markets biometrically secured medical crash carts, rolling medicine
carts, portable patient medical information devices and, security and
retrieval systems for electronic medical records. bioMETRX, Inc.'s
entire product line is branded under the trade name "smartTOUCH(TM)".
For more information on bioMETRX and/or the company's smartTOUCH line
of products including the Garage Door Opener, visit the Company website
at http://www.biometrx.net
Safe Harbor Statement: Forward-looking statements in this release with
respect to bioMETRX' business, financial condition and results of
operations, as well as matters of timing and the prospective terms of
the transaction described are subject to risks and uncertainties that
could cause actual results to differ materially from those expressed in
the forward-looking statements, including, but not limited to, certain
delays beyond bioMETRX' control with respect to market acceptance of
their technology and/or products, whether financing will be available,
the effect of the application of acquisition accounting policies as
well as certain other risk factors which are and may be detailed from
time to time in bioMETRX's filings with the Securities and Exchange
Commission.
=========================
22. Press
Release - The organizers of Security Challenges 2006 (SCC), have
announced the line-up for this year’s winter conference, which
features keynote address speaker John Pescatore of Gartner and guest
speaker Ira Winkler of ISAG, along with a team of other prestigious
speakers and sponsors. The free, two-day online conference will be held
January 18th and 19th 2006, and will feature in-depth evaluations of
today’s most critical security topics.
Source
Next Contents
SCC 2006 consists of five segments each day. Attendees may
choose to
register for all, or parts, of the event based on their organization’s
specific needs. Day one will address enterprise security, intrusion
prevention, email security, virus protection and government security.
Day two will cover vulnerability assessment, anti-virus management,
phishing, identity management and security challenges.
“Security is a priority for every business in today’s marketplace,”
said Tony Mines, CEO of ShoutStream, Inc., parent company of
eSecureLive. “We developed this conference to foster communication
between security professionals and technology leaders, and to
accurately assess new threats and vulnerabilities facing organizations
in 2006.”
“SCC 2006 recruited leading industry analysts and professionals to help
attendees assess their security weaknesses and leverage new information
in order to protect their organizations against growing security
threats,” said Mines.
The event is expected to draw thousands of attendees from a broad range
of industries including government, education and financial services,
to learn about the latest in information security. Event sponsors
include ActivIdentity, Core Security, eEye, GeoTrust, iPolicy Networks,
MailFrontier, MCI, NetContinuum, Neoscale Systems, Inc., and Qualys,
Inc.
To register for this event, or for more information, visit
www.esecurelive.com/scc2006
==============================
23. UK rejects
80,000 passport photos following new rules - Jan 9, 2006
Source
Next Contents
More than 80,000 passport photos were rejected by the UK
Passport
Service (UKPS) within less than two and a half months following the
introduction of tough new standards on how images should be submitted.
The standards introduced last September led to 81,927 photos being
rejected from 597,863 applications - at total of 13.7%, according to
figures obtained by SDW (see Table below). The figures relate to a
period between 12 September 2005 and 24 November 2005.
Whilst this figure appears high, the UKPS was reportedly happy at the
size of the rejection rate, having privately expected 20-25% of photos
to be rejected following the introduction of the new rules. Rejections
are now reportedly down to below 10%.
According to UKPS, the photo rules were necessary in order to meet
stringent, internationally-agreed standards to enable facial
recognition technology to work properly. The requirements were agreed
by the International Civil Aviation Organisation (ICAO) in 2003 and
will enable the production of biometric ePassports as well as the use
of facial recognition technology to counter passport fraud and for
enhanced checks at international border controls, UKPS commented.
Prior to the implementation of the new photographic standards on 12
September, detailed data on photo rejection rates was not gathered,
Andy Burnham, parliamentary under secretary recently commented in a
written answer to Parliament. Burnham also gave a further data point
commenting: “For the period of 18 September 2005 to 4 December 2005 [11
weeks], UKPS rejected 12.5% of applications due to passport photograph
standards.”
UKPS commented that the most common reasons for rejection included eyes
being obscured, unsuitable facial expressions (such as an open mouth)
and incorrect paper quality.
Among the specifications set out in the new photo guidelines are:
•
applicants must submit two identical photos, which have
been taken in the last month;
• the
photos should be printed on normal photographic paper
and should be 45 mm x 35 mm in size;
• the photo
should show a close up of the applicant’s head
and shoulders so that their face covers 65-75% of the photo;
• the photo
should be taken against an off-white, cream or
light grey plain background so that the applicant’s features are
clearly distinguishable against the background;
• the photo
must be of the applicant on their own, with no
other people visible. It must show their full face, looking straight at
the camera, with a neutral expression, with their mouth closed.
Table: A breakdown by passport office looking at passport application
rejection (Source: Home Office)
London - 1,225
Liverpool - 21,291
Peterborough - 17,729
Newport - 22,568
Glasgow - 9,679
Belfast - 8,882
Durham - 37,965
Total queries - 119,339
Total photo rejections - 81,927
Passport application intake - 597,863
Photo queries as percentage of intake - 13.7%
================================
24. The dirt on clean data
- By Mary Mosquera - Government Computer News - Jan 9, 2006
Source Next Contents
With a little elbow grease, agencies can make their data
presentable
More than ever, an agency’s ability to do its job depends on the
quality of its data. From delivering Social Security payments on time
to managing large projects to capturing terrorists, agencies are
finding that inferior-quality, or dirty, data can really gum up the
works.
Clean data, which essentially means data that is accurate and
accessible by outside users, has the opposite effect.
The Office of Management and Budget is trying to get agencies to clean
their data by requiring departments to adopt the Federal Enterprise
Architecture’s Data Reference Model, while a host of other agencies are
scrubbing their existing information to make it more functional.
Version 2.0 of the DRM, which OMB released last month, enables
architects to describe information so it is easy to find and use across
multiple federal agencies and provides the resources to standardize the
description, context and means of sharing data.
While the DRM is one step toward clean data, most agencies are
struggling with the flip side-dirty data, which is inaccurate and
inconsistent. Dirty data has the potential, over time, to impede the
wheels of government, said Kimberlee Mitchel, senior technical adviser
in the Social Security Administration’s Office of Systems.
Domino effect
Dirty data increases the time it takes to process transactions,
requires manual intervention and causes backlogs. It also can cause
errors-for example, in Social Security benefit payments-which can set
off a chain of unwelcome consequences.
SSA shares its earnings reports with other agencies. If the IRS or
state agencies obtained bad data, they might send a notice saying a
person hadn’t paid the right taxes, when in fact they had, leading to a
bad credit report.
“The consequences of clean data are that you’re able to facilitate
automated processing. If we can move to the point where you have
computers talking with computers, sharing and exchanging data, the
productivity of this country would just soar,” Mitchel said.
As agencies increasingly share data across their own business units and
across government, their need for clean data has grown. But even basic
data becomes complex because of variations in formats, cultures and
definitions.
One agency dealing with the problem is the Homeland Security
Department’s U.S. Visitor and Immigrant Status Indication Technology
program, which disseminates information on foreign nationals in the
country to DHS’ Immigration and Customs Enforcement (ICE) directorate
and the State Department.
U.S. Visit verifies the identity of foreign nationals at U.S. ports of
entry and checks them against databases of terrorists and criminals.
The program builds its immigration database on the visitors’ name, date
of birth and passport number. Biometrics of two-fingerprint scans
ensure the accuracy of data collection, said Robert Mocny, U.S. Visit
deputy director. The finger scan can compensate for some variation,
such as the format of the date of birth. “If we don’t have good data on
the bad guys, and we’re not doing a good finger scan or not doing the
due diligence from the biographic side, then we might miss someone at
some point,” Mocny said.
Incomplete and inaccurate data also leads to missed opportunities.
“When we first started giving data to ICE, we were giving them
thousands of records that they really couldn’t follow up on,” Mocny
said. “Now, we’re up to 70-plus arrests in the last few months based on
our records that we’ve given them.”
But biometrics don’t always come into play, such as when DHS has to
track and monitor visitors when they get a legal extension to stay.
That puts the emphasis on the quality of other records.
“The higher you can raise the integrity of data, the better. We aren’t
going to catch terrorists with just finger scans but also by improving
the quality of data,” said Glenn Norton, U.S. Visit mission operation
data management chief.
Beginning this month, U.S. Visit will evaluate data for its usability
before transmitting it to ICE border agents, Norton said.
Sophistication
U.S. Visit sifts through 10 federal systems that have records for
aliens with manual querying or a search algorithm. DHS anticipates
incorporating more sophisticated algorithms into some applications to
automate the search for matches this year, Norton said.
The department put together a data integrity group of analysts, the
Smart Border Alliance, from among U.S. Visit lead contractor Accenture
LLP of Chicago’s partners to spot trends in data errors that ICE agents
report and determine if the errors are related to training or systems,
Norton said.
If data corruption makes federal administrative systems ineffective,
citizens begin to lose confidence in their government, Social
Security’s Mitchel said. Knowing that the source of data-called its
pedigree-is reliable is a key element of clean data.
Automated tools (such as data profiling, search and matching,
statistical analysis applications, algorithms and edits) can clean
data, but the presence of dirty data might not be apparent until its
consequences appear later.
“People are starting to realize that data integrity is the fundamental
thing that an administrative government organization deals with,”
Mitchel said.
To foster data integrity, agencies need a governance and business
model, said Scott Schumacher, chief scientist at Initiate Systems Inc.
of Chicago, which provides data cleansing, matching and integration for
the Veterans Affairs Department and other agencies.
“You need a governance model for what data you will share from an
agency and what rules you have in place for the receiving agency to
look at the information,” he said.
DHS in February plans to implement a data governance framework to
establish data stewardship, accountability and responsibility processes.
=============================
25. Three More
States Add Laws on Data Breaches - by Jaikumar Vijayan -
ComputerWorld
- Jan 9, 2006
Source
Next Contents
JANUARY 09, 2006 (COMPUTERWORLD) - Companies struggling to
keep up with
a patchwork of state laws related to data privacy and information
security have three more to contend with, as a result of new
security-breach notification laws that went into effect in Illinois,
Louisiana and New Jersey on Jan. 1.
Like existing statutes in more than 20 other states, the new laws
prescribe various actions that companies are required to take in the
event of a security breach involving the compromise of personal data
about their customers.
For instance, New Jersey's Identity Theft Prevention Act requires
businesses to destroy all customer data that's no longer needed and to
notify consumers when sensitive data about them has been accessed by an
unauthorized person. The law also limits the use of Social Security
numbers on all items that are sent via postal mail.
Louisiana's Database Security Breach Notification Law requires entities
that collect information on the state's residents to notify affected
individuals of security breaches involving their confidential data.
Government officials also need to be notified, according to the law.
Illinois' Personal Information Protection Act is similar, although it
doesn't require companies to inform the state government when breaches
occur.
For companies that do business nationally or in various states, the
smorgasbord of state laws poses a growing problem, because the measures
often specify different triggers for notifications and set varying
requirements on what needs to be disclosed, to whom and when, said Kirk
Herath, chief privacy officer at Nationwide Mutual Insurance Co. in
Columbus, Ohio.
In addition, some states require companies to provide credit-monitoring
services to affected customers, whereas others don't, Herath said. And
not all of the states offer safe-harbor provisions that exempt
companies that encrypt data from their laws, he said.
Seeking Consistency
"What I would prefer to see is something that would be uniform and
preemptive [of state laws]," Herath said. "Otherwise, you have a very
inconsistent application of the law, with some states requiring you to
do nothing [and] some hammering you to the point of being unfair."
"We're hoping a federal law will help clarify the situation," said the
director of information security at a specialty retail chain based in
California.
Until that comes to pass, the retailer plans to continue to use the SB
1386 breach-disclosure law that went into effect in California more
than two years ago as a "baseline" for developing its security incident
response and notification strategy, said the director, who asked not to
be identified.
The retail chain also plans to develop an information grid that will
help it quickly go through a checklist of requirements for each state
in case it triggers a notification statute. Nationwide already has such
a grid, according to Herath.
"What the situation is crying out for is a federal version of the state
laws," said Arshad Noor, CEO of StrongAuth Inc., a compliance and
identity management services firm in Sunnyvale, Calif. But such a law
would have to be at least as strong as the existing state regulations
are for it to win approval from federal legislators, Noor said.
=============================
26. Press Release - Award Includes PKI and HSPD-12 Compliant
Products
and Services - Jan 9, 2006
Source
Next Contents
FAIRFAX, Va., Jan. 9
/PRNewswire-FirstCall/ -- WidePoint
Corporation's (OTC Bulletin Board: WDPT) wholly-owned subsidiary
Operational Research Consultants, Inc. (ORC), the leading provider of
federal public key infrastructure (PKI) and credential managed
services, announced today that it has been awarded a Blanket Purchase
Agreement (BPA) with a ceiling of $100 million by the General Services
Administration (GSA). Under the BPA, ORC will provide digital
certificates, credentialing services, managed PKI services and Homeland
Security Presidential Directive (HSPD-12) compliant products and
services.
As the first Access Certificates for Electronic
Services (ACES) BPA
issued under the GSA Information Technology (IT) Schedule 70
E-Authentication category (SIN 132-60), this BPA provides for
authentication products and services for purposes of physical and
logical access controls, electronic signature, performance of
e-business transactions, and delivery of Government services.
As a GSA Shared Service Provider (SSP) with an
Authority To Operate
(ATO), ORC's award was based on achieving rigorous qualifications
including security certification and accreditation (C&A), cross
certification with the Federal Bridge Certification Authority (FBCA)
and the ability to provide robust PKI services. ORC operates a
government-compliant authentication-based system for electronic
communications between the government and members of the general public
at Assurance Levels 1 through 4. This BPA augments ORC's unique
expertise as the first federal provider of Personal Identity
Verification (PIV)-ready solutions.
Under the terms of the BPA, ORC's ACES certificates
are intended
for use by the Federal government, state and local units of government,
Native American tribal units, educational institutions, and
non-government entities, including the general public and commercial
business entities.
Steve Komar, CEO of WidePoint, said, "This BPA will
save the
federal government significant time, resources and expenses in
acquiring PKI and credentialing solutions as mandated under HSPD-12.
ORC has almost 15 years of experience in designing, developing and
implementing information assurance solutions for the federal
government. This BPA award confirms the company's reputation as an
elite provider of a wide range of information assurance solutions from
HSPD-12 planning and integration to managed credentialing services. We
look forward to delivering the means necessary for federal agencies to
meet the 2006 PIV-II deadline."
About WidePoint WidePoint is
a technology-based provider of
products and services to both the government sector and commercial
markets. WidePoint presently specializes in providing systems
engineering and information technology services as well as PKI
E-Authentication and credentialing services. WidePoint's wholly owned
subsidiary, Operational Research Consultants, Inc. (ORC) is at the
forefront of implementing public key infrastructure, E-Authentication
and credentialing services. The company's identity management and
E-Authentication services have received three major U.S. federal
government certifications. WidePoint's profile of customers encompasses
U.S. federal government agencies such as the Department of Defense, the
Department of Homeland Security, the U.S Treasury Department and the
Department of Justice as well as major transnational corporations such
as Boeing Aerospace and Northrop Grumman and several major
pharmaceutical companies. ORC BPA#: BPA-FTS-06-001 (under GSA FSS #
GS-35F- 0164J) is available through GSAAdvantage.gov.
An investment profile about WidePoint may be found
at
http://www.hawkassociates.com/widepoint/profile.htm.
For investor
relations information regarding WidePoint, contact Frank Hawkins or
Julie Marshall, Hawk Associates, at (305) 451-1888, e-mail:
info@hawkassociates.com. An
online investor relations kit including
copies of WidePoint press releases, current price quotes, stock charts
and other valuable information for investors may be found at
http://www.hawkassociates.com
and http://www.americanmicrocaps.com.
Safe-Harbor Statement: Under the Private Securities
Litigation
Reform Act of 1995. This press release may contain forward-looking
information within the meaning of Section 21E of the Securities
Exchange Act of 1934, as amended (the Exchange Act), including all
statements that are not statements of historical fact regarding the
intent, belief or current expectations of the company, its directors or
its officers with respect to, among other things: (i) the company's
financing plans; (ii) trends affecting the company's financial
condition or results of operations; (iii) the company's growth strategy
and operating strategy; and (iv) the declaration and payment of
dividends. The words "may," "would," "will," "expect," "estimate,"
"anticipate," "believe," "intend" and similar expressions and
variations thereof are intended to identify forward-looking statements.
Investors are cautioned that any such forward-looking statements are
not guarantees of future performance and involve risks and
uncertainties, many of which are beyond the company's ability to
control, and that actual results may differ materially from those
projected in the forward-looking statements as a result of various
factors.
=========================
27. Press Release
-
Product To Kick Start Consumer Biometrics Interest to Operational
Research
Consultants, Inc. - Jan 9, 2006
Source
Next Contents
Award Includes PKI and HSPD-12 Compliant Products and
Services
FAIRFAX, Va., Jan. 9 /PRNewswire-FirstCall/ -- WidePoint Corporation's
(OTC Bulletin Board: WDPT - News) wholly-owned subsidiary Operational
Research Consultants, Inc. (ORC), the leading provider of federal
public key infrastructure (PKI) and credential managed services,
announced today that it has been awarded a Blanket Purchase Agreement
(BPA) with a ceiling of $100 million by the General Services
Administration (GSA). Under the BPA, ORC will provide digital
certificates, credentialing services, managed PKI services and Homeland
Security Presidential Directive (HSPD-12) compliant products and
services.
As the first Access Certificates for Electronic Services (ACES) BPA
issued under the GSA Information Technology (IT) Schedule 70
E-Authentication category (SIN 132-60), this BPA provides for
authentication products and services for purposes of physical and
logical access controls, electronic signature, performance of
e-business transactions, and delivery of Government services.
As a GSA Shared Service Provider (SSP) with an Authority To Operate
(ATO), ORC's award was based on achieving rigorous qualifications
including security certification and accreditation (C&A), cross
certification with the Federal Bridge Certification Authority (FBCA)
and the ability to provide robust PKI services. ORC operates a
government-compliant authentication-based system for electronic
communications between the government and members of the general public
at Assurance Levels 1 through 4. This BPA augments ORC's unique
expertise as the first federal provider of Personal Identity
Verification (PIV)-ready solutions.
Under the terms of the BPA, ORC's ACES certificates are intended for
use by the Federal government, state and local units of government,
Native American tribal units, educational institutions, and
non-government entities, including the general public and commercial
business entities.
Steve Komar, CEO of WidePoint, said, "This BPA will save the federal
government significant time, resources and expenses in acquiring PKI
and credentialing solutions as mandated under HSPD-12. ORC has almost
15 years of experience in designing, developing and implementing
information assurance solutions for the federal government. This BPA
award confirms the company's reputation as an elite provider of a wide
range of information assurance solutions from HSPD-12 planning and
integration to managed credentialing services. We look forward to
delivering the means necessary for federal agencies to meet the 2006
PIV-II deadline."
About WidePoint
WidePoint is a technology-based provider of products and services to
both the government sector and commercial markets. WidePoint presently
specializes in providing systems engineering and information technology
services as well as PKI E-Authentication and credentialing services.
WidePoint's wholly owned subsidiary, Operational Research Consultants,
Inc. (ORC) is at the forefront of implementing public key
infrastructure, E-Authentication and credentialing services. The
company's identity management and E-Authentication services have
received three major U.S. federal government certifications.
WidePoint's profile of customers encompasses U.S. federal government
agencies such as the Department of Defense, the Department of Homeland
Security, the U.S Treasury Department and the Department of Justice as
well as major transnational corporations such as Boeing Aerospace and
Northrop Grumman and several major pharmaceutical companies. ORC BPA#:
BPA-FTS-06-001 (under GSA FSS # GS-35F- 0164J) is available through
GSAAdvantage.gov.
An investment profile about WidePoint may be found at
http://www.hawkassociates.com/widepoint/profile.htm.
For investor
relations information regarding WidePoint, contact Frank Hawkins or
Julie Marshall, Hawk Associates, at (305) 451-1888, e-mail:
info@hawkassociates.com. An
online investor relations kit including
copies of WidePoint press releases, current price quotes, stock charts
and other valuable information for investors may be found at
http://www.hawkassociates.com
and http://www.americanmicrocaps.com.
Safe-Harbor Statement: Under the Private Securities Litigation Reform
Act of 1995. This press release may contain forward-looking information
within the meaning of Section 21E of the Securities Exchange Act of
1934, as amended (the Exchange Act), including all statements that are
not statements of historical fact regarding the intent, belief or
current expectations of the company, its directors or its officers with
respect to, among other things: (i) the company's financing plans; (ii)
trends affecting the company's financial condition or results of
operations; (iii) the company's growth strategy and operating strategy;
and (iv) the declaration and payment of dividends. The words "may,"
"would," "will," "expect," "estimate," "anticipate," "believe,"
"intend" and similar expressions and variations thereof are intended to
identify forward-looking statements. Investors are cautioned that any
such forward-looking statements are not guarantees of future
performance and involve risks and uncertainties, many of which are
beyond the company's ability to control, and that actual results may
differ materially from those projected in the forward-looking
statements as a result of various factors.
==============================
28. PalmSecure Another
CES 'Best of Innovations Honorees' - CCN Magazine - Jan 9, 2006
Source
Next Contents
Fujitsu’s palm vein authentication technology works by
utilizing the
unique characteristic of deoxidized hemoglobin. The palm vein device
captures the palm image while radiating it with near-infrared rays. The
deoxidized hemoglobin in the palm vein absorbs these rays, thereby
reducing the reflection rate and causing the veins to appear as a black
pattern. This vein pattern is then verified against the pre-registered
pattern to authenticate the individual1. As veins are internal in the
body and have a wealth of differentiating features, assuming false
identity through forgery is extremely difficult, thereby enabling an
extremely high level of security.
In addition to providing outstanding security, ease of use of Fujitsu’s
palm vein device is key. The user simply places the palm of the hand
above the reader and the machine does all the work, creating a
contactless, hygienic solution necessary for public areas.
Fujitsu’s palm vein device is distinctive because its sensor is only
able to recognize the pattern if hemoglobin is actively flowing through
the person’s veins. Additionally, research to date by Fujitsu indicates
that each individual’s palm vein pattern is unique, even in the case of
identical twins. These factors give Fujitsu’s palm vein device an edge
over competing biometric identification products.
Fujitsu’s palm vein authentication technology is based on more than two
decades of image recognition experience. The company decided to
aggressively pursue this because the biometric security industry is
expected to have dramatic adoption growth in the near future.
Applications for Fujitsu’s palm vein technology are vast and span
several vertical markets, including security, financial/banking, access
control, healthcare and government applications.
===============================
29. Press
Release - First Security Information
and Event Management (SIEM) Solution Interoperable with Websense, Inc.;
Understanding Web-based Threats Critical for Compliance and Security -
Jan 9, 2006
Source
Next Contents
WESTWOOD, Mass. and SAN DIEGO--(BUSINESS WIRE)--Jan. 9,
2006--Network
Intelligence(TM) Corp., the market-proven leader in transforming
enterprise-wide data into automated compliance and security
information, and Websense, Inc. (NASDAQ: WBSN), the world's leading
provider of employee internet management solutions, announced today
that Network Intelligence security information and event management
(SIEM) solutions are now interoperable with Websense(R) software. This
integration allows organizations to centrally access detailed Websense
web security and filtering reporting on employee internet use and
security threats. Data received through SIEM technology helps protect
organizations from new and emerging web-based dangers, and keeps
organizations compliant under multiple rules and regulations, including
Gramm-Leach-Bliley Act (GLBA), Payment Card Industry Standard (PCI),
and California SB 1386.
Through the integration, Websense web security data and employee
internet usage patterns are viewed along with other network and
security data sources, such as perimeter security, network,
application, and host data, offering a holistic view of compliance and
security across the enterprise. With this, Network Intelligence
customers are provided real-time and historical security and compliance
analysis, as well as powerful reporting and compliance alerts. Network
Intelligence SIEM technology continues to expand its value proposition
by collecting and protecting all of the data critical to compliance and
security infrastructures.
"Network Intelligence is the first security information and event
management solution to interoperate with Websense," said Steve Kelley,
director of strategic alliances for Websense, Inc. "Network
Intelligence has given us a clear indication of the value they place on
providing Fortune 1000 customers with a complete view of security
events across the entire enterprise."
Websense software protects companies and employees who use the internet
from a growing number of threats such as phishing, spyware and
malicious code prevalent on peer-to-peer (P2P) sites, as well as
enhancing security, improving employee productivity and reducing legal
liability. The software closes the time and technology gaps left open
by antivirus and network security infrastructure to protect against
security breaches such as malicious code outbreaks, Trojan horses and
keylogging software.
"Websense and Network Intelligence interoperability enables enterprise
customers to add web-based threats to their compliance and security
posture," said Upesh Patel, vice president for product marketing at
Network Intelligence.
Network Intelligence captures all the data from security, network,
infrastructure, application, host and storage devices. Network
Intelligence creates a complete picture of network usage, to verify
security policy compliance, to generate alerts for possible compliance
breaches, and to analyze and report on network performance. Relentless
IT security threats generated from viruses and worms, and legislation
such as Sarbanes-Oxley, GLBA, HIPAA and PCI require companies to deploy
SIEM technology. Network Intelligence enables businesses to quickly
address these challenges by efficiently and cost-effectively deploying
an appliance-based solution that automatically manages all the data,
from any IP device, without filtering or agents.
Network Intelligence is a member of the Websense Web Security
Ecosystem(TM)--a comprehensive ecosystem of world class security and
networking technology providers to enable easy deployment and
integration of Websense solutions in enterprise environments. The
Websense Web Security Ecosystem incorporates vendors from leading
security and networking markets, including: network access control,
internet gateways, appliance platforms, security event management, and
identity management. The Websense Web Security Ecosystem provides
interoperability of joint solutions to ensure seamless integration in
enterprise environments.
Websense software is available for organizations who wish to protect
themselves from internet and application security threats. For a free
30-day evaluation of Websense software or for more information on
protecting your organization from a wide range of threats including
spyware, peer-to-peer, virus outbreaks and internal hacking exploits,
please visit www.websense.com. Websense Security
Labs(TM) offers free
email security updates as new internet threats are discovered and is
available at www.websensesecuritylabs.com.
About Network Intelligence Corporation
Network Intelligence is the market-proven leader in transforming
enterprise-wide data into automated compliance and security
information. The Company's LogSmart(R) Internet Protocol Database
(IPDB) provides the only architecture proven to efficiently collect and
protect all the data, from any IP device, without filtering or agents.
Network Intelligence takes the cost and complexity out of compliance
and security for hundreds of customers worldwide, including 5 of the
Fortune 10. For more information, please visit the Company's Web site
at www.network-intelligence.com,
or phone 781-375-9000.
About Websense, Inc.
Websense, Inc. (NASDAQ: WBSN), the world's leading provider of employee
internet management solutions, enables organizations to optimize
employee use of computing resources and mitigate new threats related to
internet use including instant messaging, peer-to-peer, and spyware. By
providing usage policy enforcement at the internet gateway, on the
network and at the desktop, Websense products enhance productivity and
security, optimize the use of IT resources and mitigate legal liability
for our customers. For more information, visit www.websense.com.
(C) 2006, Websense, Inc. All rights reserved. Websense and Websense
Enterprise are registered trademarks of Websense, Inc. in the United
States and certain international markets. Websense has numerous other
unregistered trademarks in the United States and internationally. All
other trademarks are the property of their respective owners.
This press release contains forward-looking statements that involve
risks, uncertainties, assumptions and other factors which, if they do
not materialize or prove correct, could cause Websense's results to
differ materially from historical results or those expressed or implied
by such forward-looking statements. All statements, other than
statements of historical fact, are statements that could be deemed
forward-looking statements, including statements containing the words
"planned," "expects," "believes," "strategy," "opportunity,"
"anticipates" and similar words. These statements may include, among
others, plans, strategies and objectives of management for future
operations; any statements regarding proposed new products, services or
developments; any statements regarding future economic conditions or
financial or operating performance, including estimates of billings and
revenue; statements of belief and any statements of assumptions
underlying any of the foregoing. The potential risks and uncertainties
which contribute to the uncertain nature of these statements include,
among others, customer acceptance of the company's services, products
and fee structures; the success of Websense's brand development
efforts; the volatile and competitive nature of the Internet industry;
changes in domestic and international market conditions and the entry
into and development of international markets for the company's
products; risks relating to intellectual property ownership; changes in
estimated amounts based on the review and audit of Websense's financial
statements by its independent auditors; and the other risks and
uncertainties described in Websense's public filings with the
Securities and Exchange Commission, available at http://www.sec.gov.
Websense assumes no obligation to update any forward-looking statement
to reflect events or circumstances arising after the date on which it
was made.
\==================================
30. Liberty
to unveil personal federated identity management - by Antony
Savvas
- Computer Weekly - Jan 9, 2006
Source
Next Contents
The Liberty Alliance will this week unveil a federated
identity
management system to allow individuals to manage their personal lives
securely on the web.
The Liberty ID-WSF People Service is a key component in the alliance’s
ID-WSF 2.0 federated identity management specification.
Federated identity management allows internet users to use a single
sign-on procedure to access and share information across different
websites and corporate intranets.
Liberty says People Service is the industry's first comprehensive
platform for managing social information within an open federated
network environment.
Other federated identity management systems are proprietary rather than
open, such as Microsoft’s Passport log-in system, which is used on
Microsoft’s websites and a few third-party websites, including eBay.
People Service allows consumers and enterprise users to manage social
applications such as bookmarks, blogs, calendars, photo sharing and
instant messaging using the ID-WSF 2.0 framework.
People Service has been developed to allow individuals to easily store,
maintain and categorise on-line relationships. Consumers and enterprise
users can centrally manage all of their information using privacy
controls built into the system based on a Liberty web services platform.
Related Jobs
=========================
31. TSA Unveils
Enhanced Security Screening Procedures - Sandy Smith - Homeland
Response - Jan 9, 2006
Source
Next Contents
The specific changes include more additional screenings of
passengers
and their bags using a variety of methods selected at random.
Passengers will also once again be able to carry small tools and
scissors on-board aircraft. These changes will allow the Transportation
Security Administration (TSA) workforce to focus on detecting and
defeating more serious threats, such as explosives.
"It is paramount to the security of our aviation system that terrorists
not be able to know with certainty what screening procedures they will
encounter at airports around the nation," said Hawley. "By
incorporating unpredictability into our procedures and eliminating
low-threat items, we can better focus our efforts on stopping
individuals that wish to do us harm."
Passengers will continue to walk through a metal detector and have
their carry-on and checked baggage screened. However, these measures
may now include a brief additional search of their person or their
property. Examples of this additional screening include: explosive
screening of shoes, hand-wanding of passengers, enhanced pat down
searches and inspections of carry-on bags. These searches will be
generated at random and will take only about a minute to complete. They
will allow transportation security officers (TSOs) to better screen
passengers for explosives and other threats to the aviation system.
As of Dec. 22, scissors with a cutting edge of 4 inches or less and
tools such as screwdrivers, wrenches and pliers smaller than seven
inches will be permitted on board. Scissors longer than four inches and
tools such as crowbars, drills, hammers and saws will continue to be
prohibited from carry-on bags. Lighters will continue to be banned from
the cabin of aircraft and in checked baggage.
In addition to these changes, the agency's 43,000 transportation
security screeners have been re-classified as TSOs.
============================
32. Johns
Hopkins University to Lead New Homeland Security Center - Sandy
Smith - Homeland Response - Jan 9, 2006
Source
Next Contents
This fifth Homeland Security Center of Excellence, formally
titled the
Center for the Study of High Consequence Event Preparedness and
Response, will study deterrence, prevention, preparedness and response,
including issues such as risk assessment, decision-making,
infrastructure integrity, surge capacity and sensor networks. In
particular, it will study interactions of networks and the need to use
models and simulations.
"Johns Hopkins University has assembled and will lead a talented and
deeply experienced team of professionals from institutions across the
country," said DHS Secretary Michael Chertoff. "Together, they will
help DHS strengthen the nation's ability to prevent and, where
necessary, effectively manage high-consequence disasters or terrorist
attacks."
The Johns Hopkins Office of Critical Event Preparedness and Response
(CEPAR), created shortly after 9/11, will serve as the seat of the
consortium. JHU's schools of Medicine, Public Health, Advanced
International Studies, Engineering, Professional Studies in Business
and Education, and the Applied Physics Laboratory will also serve as
consortium members. The Center of Excellence will be led by Dr. Lynn R.
Goldman, professor of Environmental Health Sciences, and Dr. Gabor D.
Kelen, professor and chair, Department of Emergency Medicine, and
director of CEPAR.
"We all hope and pray there will never be another 9/11 or Hurricane
Katrina," said Dr. William Brody, president of Johns Hopkins
University. "If there is, however, the knowledge developed by this new
center will go a long way toward assuring the best possible preparation
and the most humane, coordinated effort possible to assist victims and
speed recovery."
The Centers of Excellence, overseen by the Office of University
Programs within the Homeland Security Science & Technology
directorate, establish a network of university-based centers that
conduct multi-disciplinary research and develop innovative educational
programs. Through this initiative, the Department of Homeland Security
and partner universities focus the nation's most talented researchers
on homeland security issues.
Existing Homeland Security Centers of Excellence include:
* The Center for Risk and Economic Analysis of
Terrorism Events
(CREATE), led by the University of Southern California
* The National Center for Food Protection and
Defense (NCFPD), led
by the University of Minnesota
* The National Center for Foreign Animal and
Zoonotic Disease
Defense (FAZD), led by Texas A&M University
* The Center for Behavioral and Social Research on
Terrorism and
Counter-Terrorism (START), led by the University of Maryland
* The Center for Advancing Microbial Risk Assessment
(CAMRA), a
separate but closely associated venture, jointly sponsored by the
Department of Homeland Security and the U.S Environmental Protection
Agency and led by Michigan State University.
In January 2005, Homeland Security's Science and Technology directorate
released an announcement calling for proposals focusing on research and
education relevant to the study of high consequence event preparedness
and response. Thirty-four proposals were received and reviewed by a
team of 38 peer reviewers from academia, the private sector and
multiple government agencies. The three-tier review process evaluated
scientific and technical merit, mission relevance and management
effectiveness. The process resulted in site visits to four different
institutions and the subsequent selection of JHU.
==============================
33. Press Release
- Enterprise Bank & Trust Cracks the Password Management
Problem with Imprivata OneSign; Ease of Configuration and
Administration, along with Strong Biometric Support, Set OneSign Apart
- Jan 9, 2006
Source
Next Contents
LEXINGTON, Mass.--(BUSINESS WIRE)--Jan. 9,
2006--Imprivata(R), Inc.,
the Enterprise Single Sign-on (ESSO) appliance company, today announced
that Enterprise Bank & Trust, a St. Louis, Missouri-based financial
services institution, has implemented Imprivata OneSign(TM) as its ESSO
solution. After an exhaustive review process, including intensive
on-site testing, Enterprise Bank chose Imprivata OneSign, the
industry's only ESSO appliance, over other SSO solutions because "it
really worked!" As the only company that is laser-focused on ESSO,
Imprivata provides the full-service financial organization with the
ability to quickly, affordably and securely SSO-enable
business-critical applications, successfully achieving increased
password security and reducing IT help desk costs in a matter of days.
"With security regulations intensifying and passwords becoming
increasingly complex, the headache of password resets was beginning to
burden our IT as well as our users," said Steve Siress, network systems
manager at Enterprise Bank. "With Imprivata's quick to deploy,
out-of-the-box solution, we've found a way to comply with audit
regulations while significantly reducing help desk costs and improving
employee productivity. Our employees absolutely love the new system,
especially the users that have been given biometrics."
Due to the large number of applications requiring unique passwords, as
well as the need for higher security in the financial services
industry, Enterprise Bank turned to Imprivata to execute on a more
secure, efficient and effective password management policy. Prior to
employing OneSign, Enterprise Bank was struggling with the need to
implement a more complex password system in order to satisfy audit
regulations mandating stringent password policies in the financial
services arena. The IT department could see that this implementation
would foster significant frustration amongst users and IT staff alike.
Users would likely have struggled to remember their many strong
passwords, ultimately resorting to either weakening security by writing
passwords down, or making frequent calls to the help desk for password
resets, leading to increased costs and a significant loss of employee
productivity.
While Enterprise Bank tested multiple SSO products in the company's
evaluation process, Imprivata's ESSO solution stood apart from other
offerings because it not only simplified password management for
Enterprise Bank employees, but it also alleviated strain on the IT
staff, all while maintaining a high level of password security. Siress
continued, "Imprivata has done a remarkable job of designing an
interface that was easy to learn and simple to add more applications to
the Single Sign-on process." OneSign integrates seamlessly with
Enterprise Bank's biometric implementation and, as a self-updating
hardware appliance designed for organizations of all sizes, it also
provides users with a common log-in across all applications,
eliminating the need to remember multiple passwords. Furthermore,
Imprivata's Application Profile Generator(TM) self-learns the behavior
of any application's authentication processes, so the IT department no
longer needs to make costly and time-consuming modifications to
existing code.
"Financial services institutions like Enterprise Bank are realizing
that while a secure password policy is critical to the success of their
organizations, implementing a stronger system can be very costly and
can cause significant losses in user productivity," said Omar Hussain,
president and CEO of Imprivata. "OneSign allows these institutions to
achieve a high standard of security in an affordable, easy-to-manage
way. We are pleased to help Enterprise Bank maintain the highest
standard of service to its clients by offering a simple, effective
solution to the organization's password management issues."
About Enterprise Financial Services Corporation
Enterprise Financial Services Corporation is a high growth financial
services holding company which addresses the needs of privately-held
businesses, their owner families and other success minded individuals
through its two primary businesses - commercial banking and wealth
management. The company is the parent of Enterprise Bank and Trust,
under which it operates in the St. Louis and Kansas City markets. The
Company's stock is listed nationally on NASDAQ under the symbol EFSC.
About Imprivata
Based in Lexington, Mass., Imprivata develops enterprise single sign-on
solutions that dramatically simplify password administration and
enhance IT security. The company is privately held with venture funding
from Polaris Venture Partners, Highland Capital Partners and General
Catalyst Partners. Imprivata OneSign is changing the way midrange
businesses secure their applications. Imprivata's OneSign product is
packaged as an affordable, easy-to-implement and maintain appliance and
is distributed through an established network of value-added resellers.
For more information visit www.imprivata.com.
======================
34. Press Release
- (I-Newswire) - Tel Aviv, Israel - - Eurekify, the
pioneer
and leading provider of role management solutions, is pleased to
announce exceptional growth and record results for 2005.
Eurekify’s
year-to-year revenue has increased by 130%, supported by the increasing
demand for Role-based Identity Management and Compliance solutions, as
well as by quicker deployment practices and the maturing of Eurekify’s
unique technology. - January 9, 2006
Source
Next Contents
In 2005, Eurekify has more than doubled its diverse customer
base that
includes international banks, insurance and financial companies and
health care providers as well as retail chains and government
institutes. Eurekify's customers are being driven by the need for
mitigating security risks and dramatically reduced administrative costs
as well as compliance and audit verification.
Well recognized for its unique underlying technology, Eurekify’s Sage
Discovery & Audit v2.8 helps customers plan and implement true
Role-Based Identity Management solutions, as well as automate
verification of compliance with policies and regulations. Eurekify’s
customers greatly benefit from Eurekify's Survey, Plan, Deploy, and
Manage methodology, which allows them to quickly assess their Identity
Management ( IdM ) needs, select the most suitable provisioning
solution, prepare and plan the IdM project, as well as reduce the cost
and risk of implementation and of ongoing management.
During 2005, Eurekify has also substantially expanded its partner
network to include KPMG, PwC, IBM and HP as well as a range of
strategic regional partners across Europe, the US and Middle East.
Leading Identity Management consultants and solution integrators
regularly choose Eurekify for new IdM and pre-IdM projects. Auditing
and consulting firms are also using Eurekify to audit IT systems for
regulatory requirements and to implement internal IT and security
controls.
Responding to the growing demand in the US, Eurekify started a New York
office that will continue to provide the best-in-class support as well
as better accommodate the needs of the company’s wide base of US
customers and partners.
“2005 has been a great year for Eurekify in all aspects”, says Azi
Cohen, Eurekify CEO, “revenue and customer base growth, backed by
partner network expansion, are validating our belief that role-based
solutions are what customers really need in Identity Management. We are
confident that this momentum will only increase in 2006 and 2007, and
we continue to expand and improve our product and service offerings to
provide our customers with the most comprehensive Role Management and
Compliance solutions”.
“We are pleased with the results” says Roni Einav, Eurekify Chairman of
the Board, “based on my past experience and the deals we foresee
coming, I can see how Eurekify's Role Management solution becomes a
strategic part in the infrastructure of any large organization".
About Eurekify
Eurekify is the pioneer and leading provider of Role Management,
Auditing and Compliance solutions. Eurekify’s Sage Discovery and Audit
( DNA ) helps large organizations assess their Identity Management (
IdM ) needs, and deploy a business oriented role-based system that
maximizes security and manageability. Recognized by IdM specialists,
role-based management is critical for successful IdM implementations.
Sage DNA also allows enforcement and verification of IT controls and
compliance with internal policies as well as regulations such as SOX,
HIPAA, Basel II, etc. Leveraging on advanced pattern-recognition
technology, Sage DNA is unique in its capabilities and is regularly
recommended by leading IdM implementers worldwide. For more information
about Eurekify, visit www.eurekify.com
===========================
35. The anti-nation - DAN
DUNSKY - Toronto Star - Jan 9, 2006
Source
Next Contents
Every country has its problematic national story: race in
the United
States, class in Britain, empire in Russia. Canada's problem is its
perpetual identity crisis, a collective neurosis bred of being a
confederation of English and French peoples - what the novelist Hugh
MacLennan once called the country's "two solitudes" - and the small
neighbour to one of history's few great nations. Canadians alternately
worry about too much American attention - of being overwhelmed by the
United States - and, as suggested by the title of a book published in
1999, Invisible and Inaudible in Washington: American Policies Toward
Canada (UBC Press), of being ignored by the United States. (It didn't
help that the New Republic once judged the most boring headline ever to
be "Worthwhile Canadian Initiative.")
These twin pressures have always existed as an immutable fact for
Canadians and likely always will. But American policymakers need to be
far more interested in how we deal with these questions, since their
answers will largely determine whether Canada is likely to remain a
trusted ally in the unpredictable post-9/11 world or become a
dangerously exposed northern flank.
The United States cannot "wall itself off" from Canada. Traffic across
the 5,061-kilometre border, which Ronald Reagan once hailed as "a
meeting place between great and true friends," cements the most
comprehensive bilateral trading relationship in history. A truck
crosses the U.S.-Canadian border every 2.5 seconds. Approximately $1.3
billion in two-way trade crosses the border every day Ñ $500
billion a
year. More than 200 million two-way border crossings occur yearly,
making the shared border the busiest international boundary in the
world.
Nearly 25 per cent of American exports go north to Canada. More
significantly, Canada is now America's largest source of crude oil and
petroleum products. This may become more important, both because of
continuing instability in the Persian Gulf and because, according to
the Oil and Gas Journal, Canada contains, at 180 billion barrels, the
world's second-largest proven reserves.
"Anyone watching what is happening up north will recognize that, before
long, Canada will inevitably overtake Saudi Arabia as the world's oil
giant," said Utah Senator Orrin Hatch recently. While chastising Canada
for "irresponsible" talk of favouring China with increased oil exports
as payback for the ongoing U.S.-Canadian softwood lumber dispute, Hatch
nevertheless said that "we in this country don't want to be on Canada's
shit list, ever."
Despite the senator's fears, however, Canada has much more to worry
about than the U.S. Quite simply, the border is Canada's economic
lifeline. Owing to the absence of a large domestic market and an
abundance of natural resources, Canada must export to survive. And
today the United States consumes fully 85 per cent of Canada's exports,
accounting for an astounding 40 per cent of the country's GDP. In
addition, many high-value Canadian products and services Ñ for
example,
Canada's contribution to the U.S. space program Ñ are designed
to
piggyback on existing American initiatives.
The signing of the U.S.-Canadian Free Trade Agreement in 1988 (and
NAFTA in 1993) accelerated the vertical integration of Canada's economy
with that of the United States. Some 50 per cent of Canadian foreign
direct investment (FDI) is now aimed at the U.S., while more than 60
per cent of inbound FDI is American. According to Export Development
Canada, a federal Crown corporation, "the import content used to make
Canadian exports has been growing steadily and now averages around 35
per cent, and in many manufacturing industries [exceeds] 50 per cent."
This integration has, in turn, increased Canadian productivity. In
short, it is no exaggeration to say that Canada's primary national
interest is located south of the border.
The shock on Canadian economic activity of the effective closure of the
border after 9/11 demonstrated the country's vulnerabilities and
highlighted Canada's interest in safeguarding its southern frontier.
The nightmare scenario for Canadian politicians today is a successful
attack on the U.S. homeland by a terrorist who enters through Canada.
Faced with this reality, Canada has strengthened its anti-terrorism
posture. Over the past four years, in addition to specific action on
the border, Parliament has passed Canada's first-ever Anti-Terrorism
Act, a Public Safety Act, and a new Immigration and Refugee Protection
Act. Further, the government has created the Office of Public Safety
and Emergency Preparedness, Canada's answer to the Department of
Homeland Security, and has undertaken a foreign affairs and defence
review. Canadian law now defines terrorism and designates terrorist
groups operating in Canada. It is an offence to support terrorist
groups or any activities related to such groups. And security,
intelligence and law-enforcement agencies have been given enhanced
powers of surveillance, arrest and detention, including preventive
arrests or arrests without warrants.
Canada has established common procedures with the United States for the
screening of high-risk goods in third countries prior to their arrival
at North American airports and seaports, and the Department of
Transportation has plans to increase the use of biometric systems and
radiological scanners at Canadian points of entry.
Similarly, after 9/11, public pressure to rebuild the Canadian armed
forces has grown dramatically. In its 2005 budget, the federal
government pledged an additional $11 billion to the armed forces over
five years, a move supported even by the dovish NDP. This marked the
first substantial increase to the defence budget since cuts in the
overall federal budget during the 1990s reduced military spending by
some $25 billion.
And though Canada chose to sit out the Iraq War, Canadian Special
Forces joined American units in Afghanistan in 2001 and later assumed
the leadership of the International Security Assistance Force (ISAF) in
Afghanistan. In the summer of 2005, the Canadian military enhanced its
Afghan force and set up base in Kandahar. Using language that Canadians
had all but forgotten, Major-General Andrew Leslie, former commander of
Task Force Kabul and deputy commander of ISAF, predicted that Canada
may be in Afghanistan for a generation: "There are things worth
fighting for. There are things worth dying for. There are things worth
killing for."
In sum, Canada has acted to improve its overall security posture since
9/11. In keeping with the Canadian realist approach to bilateral
continental relations, Canada has endeavoured to safeguard its economic
interests by satisfying American security concerns, which, according to
former Canadian ambassador Allan Gotlieb, "opens doors [in Washington]
like no other key."
But if self-interest was clearly at work in Canada's post-9/11 security
decisions, it is less clear whether the Canadian and American
governments share the same global outlook. Whether Canada is a trusted
ally of the United States Ñ insofar as the latter has defined
its
global roles and responsibilities Ñ is a more difficult question
to
answer. For, in many disturbing ways, Canada seeks to unify its
chronically fractured sense of nationhood in opposition to the United
States.
By and large, Canadians like Americans. A recent comprehensive study of
the country's attitudes reveals that 70 per cent of Canadians "value
and respect the United States and its citizens," while only 15 per cent
admit to not liking or respecting "anything that the United States and
its people stand for." The problem is that, today, Canada's political
reality reinforces the minority anti-American sentiment.
Traditionally, Canadians distinguished themselves from Americans on the
basis of having a different political system. Canadians, said the great
literary critic Northrop Frye, are Americans who rejected the
revolution. However, over the last half-century, as centrifugal forces
threatened to tear the country apart, opinion-makers began to
distinguish Canadians from Americans on the basis of having a different
value system.
Alarmed at the rise of nationalism in French Canada, and fearful that
as the British Empire receded from memory the United States would
replace Great Britain in the affections of English Canadians, a new
breed of federal politicians and bureaucrats attempted to erase
Canada's very real divisions (and centuries of history) by appealing to
a largely rhetorical set of "Canadian values" shared by all from sea to
sea. Only by appealing to these values, Canadian nationalists believed,
would Canada overcome its cultural neurosis and emerge as a single,
unified state capable of resisting the inevitable lure of America.
So, where Americans were religious, Canadians were now secular. Where
Americans were a martial people, Canadians were now pacifists. Where
Americans were conservative, Canadians were now liberal. Where
Americans were greedy capitalists, Canadians were now empathetic social
democrats. And these beliefs - reinforced by a large contingent of
nationalist and anti-American media - rubbed off on the population at
large. Today, Canadians consistently tell pollsters that they are more
tolerant, more respected by others, better educated and friendlier than
Americans. Oh, yes: and more modest, too.
This pattern shows up in international matters, as well. Canadians are
confirmed multilateralists (except when they seize Spanish and
Portuguese fishing trawlers on the high seas, bomb Kosovo without UN
authorization, and unilaterally claim a 320-kilometre marine exclusive
economic zone). Canadians are a "moral superpower" (except when it
comes to official development assistance, where Canada's contribution
ranks among the lowest of wealthy nations, despite the prime minister's
pledge that "our foreign policy must always express the concerns of
Canadians about the poor and underprivileged of the world"). Canadians
are environmentally conscious (except that they consume more energy per
capita than all OECD countries except tiny Iceland and Luxembourg and
have no feasible plan for implementing their Kyoto promises). Canadians
believe in international law and normative foreign policy (except when
government agencies look the other way as their own citizens suspected
of being terrorists are "rendered" to Syria or Egypt). And on and on it
goes. "A country that seeks great changes and lacks the willingness to
run great risks dooms itself to futility," the 17th-century English
statesman Lord Clarendon is said to have remarked. He could well have
been describing Canada today.
This need to present a unique set of Canadian values is not without
consequence. Consider just three recent episodes involving the
governing Liberal Party. First, the communications director of former
prime minister Jean ChrŽtien called George W. Bush a "moron," and the
prime minister at first declined her resignation. Then, an MP was
caught on camera saying "Damn Americans! I hate those bastards." And,
in an "open letter" to Condoleezza Rice, former minister of foreign
affairs Lloyd Axworthy called the United States a "virtual one-party
state," devoid of the checks and balances the country "once espoused
before the days of empire." This from someone whose own party has
governed Canada for 70 of the past 100 years!
More seriously, despite the promising reaction to the terrorism threat,
the prevailing Canadian-values and anti-American paradigm has
influenced government policy on security issues. The most recent
example is Canada's confused decision on ballistic missile defence
(BMD). The government of Paul Martin had given every indication that
Canada would sign on to the development and deployment of BMD, even
ensuring that NORAD, the joint U.S.-Canadian air defence system, would
be used as a key component in the program. However, the opposition
Ñ
and, again, elite opinion Ñ relentlessly attacked BMD as
America's
"missile defence madness," as "the weaponization of space," and as
something that would "harm Canada's international reputation."
Canadians, who had not been asked to contribute financially to the
development of the system, and who could one day be protected by it,
had been favourably predisposed to join. After the onslaught of
negative attacks, however, they changed their minds. The government,
fearing that as many as 20 members of its own caucus would vote with
the opposition, decided to opt out of the program.
To understand how this anti-American bias is being strengthened by
Canada's current political reality, one must begin with Lord Durham's
observation in 1839 that Canada was "two nations warring in the bosom
of a single state." Some 165 years later, Canada remains a country
where, in the words of historian H. V. Nelles, "unambiguous unity and a
singular identity" still largely elude its inhabitants. Except that
today, Canada is really three nations: Quebec, the West, and the
multicultural cities.
Quebec is already separate within Canada. To the average Quebecer, the
Canadian federal government is essentially irrelevant. Quebecers make
almost all their own political and social choices, and international
markets are as influential an economic force in the province as is the
rest of Canada, perhaps more so. Quebecers are more left-wing and
statist than their English-Canadian counterparts and more culturally
confident, too. The province has a thriving French-language magazine,
book, film, Web and TV industry that utterly dominates public tastes,
as opposed to the American products that resonate widely in the rest of
Canada. No serious people today think that Quebecers want to return to
past political arrangements or that Quebec nationalism is a waning fad.
The province has never signed the 1982 Canadian constitution (though it
is bound by its provisions) and support for independence hovers around
the 50 per cent mark. A few weeks from now, Quebecers may well send
more secessionists to represent them in the federal House of Commons
than ever before.
Meanwhile, more than one-third of Western Canadians believe it is time
to consider separating from Canada, according to 2005 survey data.
Western Canadian alienation is nothing new, but it has lately taken a
different form with the rise of the Conservative Party, which dominates
the region and is the official opposition. The Conservative Party's
intellectual roots owe more to the American conservative movement than
to traditional Canadian Toryism: It is the party of smaller government,
social conservatism and rural populism. Alberta, the engine of this new
West, is Canada's wealthiest province, home to the country's galloping
oil and gas industry, and enjoys a faster population growth than any
other region. Nearly 60 per cent of Albertans supported the Iraq War,
while fewer than a quarter of Quebecers did.
This leaves Canada's increasingly multicultural cities. Five cities are
home to 43 per cent of Canadians; Toronto alone accounts for 17 per
cent of the total population. Canada's cities are also the primary
destination for immigrants and refugees to the country. About 20 per
cent of Canada's residents Ñ and half of Toronto's Ñ are
foreign-born,
compared with 11 per cent in the United States, 5.6 per cent in France
and 4 per cent in the U.K. Cities are therefore the testing ground for
Canada's multicultural experiment.
However, multiculturalism rejects the idea that a single set of
organized cultural beliefs and political principles are foundational to
the nation's public life. So multicultural Canada cannot demand, as
other countries can and do, that new arrivals adapt to the country's
traditional cultural and political forms because, as the minister of
citizenship and immigration has said, "we've developed, as a Canadian
value, an appreciation of diversity Ñ if not a complete
nurturing of
that diversity."
Furthermore, multiculturalism has today become an anti-Western impulse,
specifically one that sees the United States as the locus of all manner
of evil in the world. Therefore, large segments of Canada's urban areas
should be seen to be, in effect if not in intention, hostile to the
Western political tradition in general and to American ideals in
particular.
In truth, Canada is now a country of three solitudes Ñ four, if
Canada's ever more assertive native population is included Ñ
where each
has increasingly little in common with the others. Quebec's
secessionist political parties obviously do not believe in trying to
bridge these gaps. Significant portions of Canada's Conservative Party
probably do not believe in doing so either, though the party will not
acknowledge this publicly. This leaves the federal Liberals as the only
major party attempting to be pan-Canadian in its appeal. And their only
way of appealing to these disparate groups is by reference to the
mythical Canadian values described earlier. "As the only truly national
party," Prime Minister Martin said this month, "we will defend Canadian
values."
However, Canada's first-past-the-post electoral system and demographic
reality (highly urban Ontario and Quebec represent 60 per cent of the
country's population) reduces Liberal pan-Canadianism to vote-getting
among multicultural city dwellers and non-secessionist Quebecers. So a
typical Liberal election campaign preys on fears of the country's
disintegration at the hands of Quebec's secessionists and the loss of
its unique social character and diversity at the hands of the
Conservatives and their "hidden agenda" of "U.S.-style" policies.
The current campaign is a case in point: Here's the prime minister
addressing Bloc leader Gilles Duceppe on Dec. 16: "Let me say also that
I am a Quebecer, and you are not going to take my country away from
me." And here's the prime minister on Jan. 3: "That is the clear
difference of values that is illustrated by Stephen Harper's goal of a
fend-for-yourself Canada and my vision of a country in which we strive
together as a society toward a common good."
Ergo, the Liberals believe they are the only thing holding the country
together and preventing its inevitable drift into the American orbit.
Thus does the Liberal Party confuse its interests with those of
Canada's citizens and use electoral politics to heighten
anti-Americanism and Canadian regionalism.
However, as long as this Liberal electoral playbook results in election
victories, don't expect Canada to ally itself too closely with the
United States on any matter that doesn't directly affect the country's
key economic interests.
Paul Martin is fond of saying that Canada "will set the standard by
which other nations judge themselves." Politicians are often called
upon to say silly things, but it is generally a good idea not to let
rhetoric stray too far from reality. But contemporary Canada Ñ
with the
exception of its competent economic management Ñ leaps precisely
that
gulf between rhetoric and reality, perhaps overcompensating for deep
feelings of inferiority. It is a leap that too many Canadians have
grown accustomed to hearing and by now enjoy believing. And it will
persist until the status quo of Canadian federalism changes: either by
devolving much more power to the regions and allowing each to make its
own political, economic and social choices, or by breaking apart.
Either way, the narcissistic and corrosive platitudes of "Canadian
values" and "national unity" should cease.
There is no shame in fundamentally altering Canada's political
arrangements. Unlike the United States, the country was not founded on
an ecstatic commitment to a great cause but on the more pedestrian
grounds of being a good idea. Such pragmatism should welcome change, if
change is best. Canadians should be mature enough to question whether
the country created in 1867 is still acting in the best interests of
all its citizens in 2006.
Just as few predicted the collapse of the Berlin Wall, the break-up of
Canada also seems far-fetched. Nevertheless, American policymakers
should consider the possibility. In 1999, President Clinton said the
United States "valued our relationship with a strong and united Canada.
We look to you; we learn from you. The partnership you have built
between people of diverse backgrounds and governments at all levels
is... what democracy must be about, as people all over the world move
around more, mix with each other more, live in close proximity more."
But what if the "partnership" Canada has built no longer supports
America's global roles and responsibilities? What if the essential
condition for Canadian unity is an anti-American value system built
into the national political process? In that case, it is unclear that
Canada is a long-term ally of the United States out of anything more
than economic necessity. In that case, is it still in America's
interest to support Canadian unity?
============================
36. Airport
summit starts on Big Island - Pacific Business News - Jan 2, 2006
Source
Next Contents
Airport officials flew to Kona for the American Association
of Airport
Executives' 20th annual Aviation Issues Conference.
"With passenger traffic meeting, and in some cases exceeding, pre-9/11
levels, the aviation industry faces several challenges, including
airline and airport financial uncertainty, funding for critical
security projects, continued terrorist threats, system capacity
improvements and air traffic modernization," the AAAE said. "In 2006,
lawmakers will again have to make tough funding decisions about
aviation programs in what is expected to be another tight budget
climate."
The conference, Sunday-Thursday at the Hapuna Beach Prince Hotel, also
drew vendors in the field of passenger screening and biometric I.D.
verification for employees.
"With the Transportation Security Administration seeking industry and
public input on its plan to begin an airline passenger verification
program at airports across the country in 2006, the conference is the
ideal forum for outlining the viability of using security assessments
and biometric-based identity verification technologies in the airport
environment," said San Diego-based ImageWare Systems (AMEX: IW), a
sponsor of the conference that is showing its own biometric identity
management platform.
Biometric I.D. vendors are eager to show their services now because the
Transportation Security Administration is expected to issue a request
for proposals late this month for its Registered Traveler program, in
which travelers may voluntarily pay fees and submit to background
checks to join a program that lets them jump the line at airports. It's
estimated that $30 million in federal contracts await the companies
hired to make this work.
The conference may also be the latest venue for the never-ending tussle
between airports and airlines about landing fees. Airport executives
often complain that airlines object to paying their fair share of
unavoidable security costs while airline executives describe airports
as monopolies that run inefficiently and sock airlines with their
bills.
================================
37. Press Release -
Aratek, CUST Collaborate to Set up Joint Lab - Jan 9, 2007
Source
Next Contents
(SinoCast Via Thomson Dialog NewsEdge)CHONGQING, Jan 09,
2006 (SinoCast
via COMTEX) --Aratek, a global biometric identification solution
supplier, recently announced it has reached an agreement with Chongqing
University of Science and Technology (CUST) to set up a joint
laboratory.
Subject to the agreement, both sides will join hands in the
establishment of the biometric identification joint lab, and a series
of fields as talent training, scientific research teaching, application
study and market expansion of biometric identification.
Meanwhile, they will jointly promote the application of biometric
identification technology in the scientific research teaching and
talent training in the western China.
The biometric identification joint lab, which will focus on the
development of software and hardware products of biometric
identification, is the core of the cooperation.
Aratek will offer genuine biometric identification software and
hardware facilities, as well as related training and technical support,
to the lab.
In addition, the two partners will pay close attention to talent
training.
They aim to train the biometric identification talents of different
levels accord with various kinds of demands inside and outside the
university.
==========================
38. Press Release - Dubai set to host Middle East’s largest
security expo - Jan 9, 2006
Source
Next Contents
Intersec 2006, the largest international security and safety
trade fair
and conference in the region, has attracted the most phenomenal
gathering of the world’s leading specialist suppliers and services ever
seen in the Gulf area. After selling out over 2 months ago, the
organisers, Messe Frankfurt, have extended the exhibiting area by 40%
following the increasing local demand to exhibit.
Set for 29 - 31 January, exhibitor attendance has increased by a
considerable amount compared to last year, with over 400 international
exhibitors from across the globe, 78 of whom are UAE based. This rapid
growth in exhibitors from the UAE has been attributed in part by the
organisers to the growing maturity of the market here, with the UAE and
Dubai firmly established as a safe and secure trading location.
Local exhibitors include some of the key players in the industry such
as Al Falasi Group of Companies, who specialise in biometric security
and verification solutions. Citytec cover all areas of security. Atlas
Telecom offer a range of items and services including Image
intensifiers, vehicle inspection devices and night vision instruments,
while EMIRTEC will have their range of surveillance systems on display.
FIREX and NAFFCO are manufacturers of fire fighting, fire protection
and fire detection systems, Siemens who specialise in central command
and control display, CCTV and access control among other areas, and
Sanyo renowned experts in audio and video equipment will all be in
strong attendance.
According to Ms Imke Huelsmann, Intersec's show manager, “the growth
and success of Intersec is attributable to the increased number of
international companies recognising the opportunities that exist in the
Gulf area. Most GCC countries have major projects underway that require
increased attention to security and safety needs.”
Many countries have been targets of terrorist attacks over the past
year, including Iraq, Qatar, Jordan, Egypt, Lebanon, and Saudi Arabia.
In addition, the war in Iraq and the increased terrorism threats posed
by insurgents in that area shows that the need for heightened security
and safety is imperative. The internationally acclaimed Intersec 2006
offers an extremely high level of education and awareness in all
aspects of this field.
Another territory attracted to the show is Africa; many of its
countries are investing in new homeland security, border control
projects and national ID Cards. Across the globe awareness on security,
be it associated with terrorism, tourism safety, or money laundering,
has increased in recent years.
Intersec 2006 covers all possible areas of security and safety. As well
as the presence of some of the most respected suppliers in the
industry, there will be a host of international specialists in the area
of Police, Security, Fire, Health and Safety. An estimated 8,500
visitors will attend this year’s event.
===========================
39. Password Tools Lower Compliance Costs - By Cameron
Sturdevant
- EWeek - Jan 9, 2006
Source
Next Contents
Password management systems including single-sign-on tools
such as RSA
Sign-On Manager 4.5 can drastically reduce a number of IT costs, not
the least of which are those associated with regulatory compliance.
When single-sign-on tools are combined with two-factor authentication
systems such as RSA's SecurID for Windows, compliance becomes almost a
piece of cake.
In their recent book titled "Sarbanes-Oxley: IT Compliance Using COBIT
and Open Source Tools" ($49.95, Syngress Publishing), authors Christian
Lahti and Roderick Peterson outline a model password control policy.
Many of their password suggestions can be handled by using a
single-sign-on tool.
Further, single-sign-on software tools that are combined with
two-factor authentication hardware tokens ensure that users can't write
down all the information needed to access company systems because part
of that information is constantly changing. During our tests of Sign-On
Manager 4.5, we used SecurID for Windows tokens on which the passcode
required at log-on time changed every minute.
One thing we've heard repeatedly from IT managers who have implemented
user identity management systems-from federated identity tools to
two-factor authentication systems-is that doing so drastically reduces
the amount of paperwork needed to prove that the organization is always
in control and able to account for user access to enterprise systems.
Instead of walking auditors through reams of change-request forms and
showing how each of those forms is handled when an employee is hired,
moved or fired, IT managers can instead show a relatively simple
password enforcement policy. For savvy IT managers, this is a good way
to demonstrate to the business side of the enterprise that IT not only
can support business processes but also can reduce friction with
auditors.
One other big advantage of using a password management system is a
lessening of the threat of employee discipline. For example, the model
compliance policy in "The Cost of Compliance" includes the hair-raising
threat that "Any employee found to have violated this policy might be
subject to disciplinary action, up to and including termination of
employment."
Password management systems likely won't be of much help, at least in
reducing compliance costs, if a consistently high value has been placed
on organized preparation for external audits. Most financial
institutions, which have been audited since time immemorial, will
likely not see the same dramatic audit cost reductions as organizations
such as hospitals, manufacturers or educational institutions.
And in cases where organizations do see password management systems
having a big impact in reducing audit costs, it is likely that the very
act of implementing the identity management tool will immediately
suggest other cost-saving moves. For example, as soon as a password
management project is even contemplated, the directory structure for
user information comes to mind. Scrutinizing directories to see where
they can be streamlined will likely lead in the direction of looking at
the process whereby employees and consultants are onboarded and
offboarded.
Are biometrics the answer to your password problems? Click here to read
more.
By driving costs out of these areas, IT managers can show a commitment
to keeping the cost of doing business low while demonstrating
leadership in making the organization more agile and streamlined.
Technical Director Cameron Sturdevant can be reached at
cameron_sturdevant@ziffdavis.com.
Check out eWEEK.com's Security Center for the latest security news,
reviews and analysis. And for insights on security coverage around the
Web, take a look at eWEEK.com Security Center Editor Larry Seltzer's
Weblog.
=================================
40. Russia Doesn't
Deserve Its Reputation - An interview by
Mikhail Zygar, Head of the European Commission in Russia Marc Franco
tells Kommersant about the problems that hold Russia and the European
Union back on their paths toward each other. - Kommersant - Jan 9,
2006
Source
Next Contents
[Extract Only]
Franco: That problem arose not from the expansion of the EU, but from
the breakup of the USSR in 1991, when Kaliningrad became an enclave.
Yes, the issue of transit of people has been settled. People travel
from Kaliningrad to the rest of Russia and back with simplified transit
documents allowing for the crossing of the Polish and Lithuanian
borders and obtainable with the tickets. One more problem is that there
is no consulate in Kaliningrad of a country that belongs to the
Schengen zone. That is, if a resident of Kaliningrad wants to go, for
example, to Germany, he has to receive or his visa in Moscow or St.
Petersburg. That problem will be solved next year too. Two consulates
will be opening, those of Germany and Sweden, and they will be able to
issue Schengen visas and to represent the interests of other countries
and give out visas for them. When Lithuania and Poland join the
Schengen zone, their consulates will be able to grant Schengen visas.
Kommersant: How realistic is a visa-free regime?
* * *
Franco: We are now working a simplified regime. It will be easier for
those who travel for work - businessmen, journalists, scientist,
athletes - to receive long-term visas. As for a visa-less regime, it
would be necessary for Russia and the EU to trust each other's
passports for negotiations to begin. The EU countries have to be sure
of the authenticity of the documents that Russians use for travel, and
Russia should trust European passports. New passports with biometric
data are being introduced on both sides and that should reduce the risk
of the use of false documents. In addition, it is very important that
contacts and cooperation be established between the law enforcement
structures of Russia and the EU. In the Schengen zone, the police
exchange information about criminals. Since there is no internal border
control, the police of various countries have to work together to be
able to identify criminals.
Finally, there is one more principle moment - the agreement on the
readmission that includes the return of illegal immigrants to the
territory of the country they came from. It says in the agreement that,
during the transitional period, three years from the moment of
ratification, Russia will receive illegal immigrants who are Russian
citizens. That's normal, it's worldwide practice. At the end of the
transition period, Russia should take back all of the illegal
immigrants who entered the EU through Russian territory. In that time,
Russia should make similar agreements on readmission and extradition
with other countries. Then, in three years, at the end of the
transitional period, readmission will enter its final stage and Russia
will begin to take all illegal immigrants automatically that had come
through its territory.
Kommersant: Migration has been one of Europe's most pressing problems
lately. The EU countries will most likely tighten up migration
legislation. How will that be reflected din Russia?
Franco: Migration is a problem not only in the EU, but probably of al
countries of the continent. We should admit that we worked badly on
that problem before. It is the main challenge to politics in the coming
years and a lot will have to be done to regulate it. There is no magic
solution. It will have to be developed so that it doesn't go the way it
did 40 or 50 years ago. Because the immigrants couldn't integrate. On
one hand, the immigrants themselves don't want to integrate. On the
other hand, society has to want them to integrate. Otherwise, the
situation will be even more explosive. * * *
=======================================
41. CIOs
prepare
for
new technology challenges - Information sharing, hurricane response
will propel many 2006 IT programs - BY Michael Arnone and Dibya
Sarkar
- Federal Computer Week - Jan. 9, 2006
Source Next Contents
Irresistible forces -- both natural and manmade -- carved
the
technology landscape that federal chief information officers must
navigate in 2006.
The apocalyptic rage of Hurricane Katrina made CIOs take emergency
preparedness and response -- and the technologies that make them
possible -- more seriously. But other factors continue to alter the
information technology environment. They include pressure from federal,
state and local governments to share more information, particularly for
first responders and law enforcement; the need to unify computer
networks that are more secure and reliable against evolving, more
dangerous security threats; and calls from Congress to spend money
wisely.
The converging threats and responsibilities will require federal CIOs
to juggle more responsibilities than ever, while contending with budget
cuts made to pay for hurricane relief, the war on terrorism and other
pressing needs. Federal Computer Week asked several CIOs and government
watchdogs what technologies will matter to them in the next year and
how they will pay for and implement them in the post-Katrina world.
NOAA's eye for an eye
The devastation caused by Katrina and the communications problems it
exposed are driving much of the new technology at the National Oceanic
and Atmospheric Administration.
NOAA will continue some major initiatives and launch others, said Carl
Staton, NOAA's CIO. Several initiatives are related to tracking
hurricanes or tornados and developing better climate models. For
example, the agency is working on an unmanned aerial vehicle that would
escort a hurricane for a long duration.
"It's conceivable that the UAV technology will allow such a vehicle to
fly, say, over 60,000 feet and track the storm for as much as a week
and continually gather measurements of pressure and wind, which would
be a significant improvement in data availability... [and] result in a
significant improvement in our forecast," he said.
Meanwhile, researchers from the agency's Geophysical Fluid Dynamics
Laboratory in Princeton, N.J., are developing a prototype
high-resolution computer model to simulate an entire season of
hurricane activity. NOAA expects to implement the model in the next
year or two.
NOAA officials also plan to expand integration of aerial imagery with
commercial services, such as Google Earth. Another smaller initiative
alters mobile radar trucks used by tornado chasers to temporarily
replace radar communications destroyed in natural disasters.
Staton said NOAA will likely award the much-anticipated
high-performance computing contract for next-generation research and
development activities in the second quarter of 2006. Internally, the
agency will deploy some high-end intrusion-detection systems, perform
network consolidation to move toward a single NOAA network and
consolidate Web servers.
DHS' to-do list
The Homeland Security Department has its own extensive list of
improvements to make after Katrina, most notably in the Federal
Emergency Management Agency.
DHS' inspector general will closely monitor how FEMA addresses its IT
deficiencies, said Frank Deffer, DHS' assistant IG for IT. FEMA at
first vociferously disagreed with the IG's September 2005 assessment
that condemns the agency for being ill-equipped. But later information
appears to confirm the IG's argument, Deffer said.
Finding better ways to share information, improve IT networks and
manage essential programs should top the 2006 to-do list for Scott
Charbo, DHS' CIO, and his employees, experts from DHS watchdog agencies
say.
The IG's office will issue a report in several weeks on difficulties in
managing DHS' older networks. DHS is moving toward a standard network
platform for sensitive but unclassified information, called One
Network, Deffer said. One Network will fix some of DHS' lingering IT
problems, such as the lack of a global address list. The IG will look
for DHS to set a schedule for the program in 2006.
In 2006 DHS must improve its information sharing with state and local
partners through the Homeland Security Information Network, Deffer
said. The network is a major effort to promote good communications and
knowledge management among federal, state and local homeland security
partners, he said. The IG office is still auditing the system and will
publish its findings in the spring, he said.
DHS must improve management of its technology for checked baggage
screening and radiation detection, said Norman Rabkin, managing
director of homeland security and justice issues at the Government
Accountability Office. The department must look at ways to move
screening equipment out of airport lobbies and integrate the technology
into existing baggage-handling lines to improve efficiency, even though
that is more expensive, he said.
The department must resolve ongoing privacy and technical concerns
about its Secure Flight program, which checks airline passengers
against terrorist watch lists, Rabkin said. DHS must also ensure that
it uses biometrics to verify the identities of participants in the U.S.
Visitor and Immigrant Status Indicator Technology program, which
screens foreign travelers to spot terrorists, and users of the
Transportation Worker Identification Credential.
Watch over Sentinel
Perhaps no single federal technology program will get as much scrutiny
in 2006 as Sentinel, the FBI's new investigative case management
system. Then again, no other program has to overcome the reputation
that it was a $170 million flop.
The FBI launched a program in May 2005 to develop Sentinel after
pulling the plug on the Virtual Case File management system. VCF, which
was never deployed because of ongoing cost and schedule overruns, was
part of the FBI's Trilogy program to modernize the bureau's obsolete
computer systems.
Another reason the FBI and Justice Department are concentrating on
Sentinel is because the system will be the basis for all future federal
investigative case management systems, said Vance Hitch, Justice's CIO.
The department leads the Office of Management and Budget's case
management line of business.
Justice's new Litigation Case Management System will be similar to
Sentinel in technology and potential impact. It will replace eight or
nine aging systems that must be dispensed immediately, Hitch said. The
U.S. Attorney's Office will lead the program, and all Justice
components will participate in the nationwide implementation, he said.
Hitch said the department expects to award both contracts in early
2006. The contracts will determine the schedules of both programs,
which Justice will implement in phases. Sentinel is on target for
completion by 2009, he said.
The FBI's move to a service-oriented architecture and the creation of
Sentinel are getting the most attention these days, but the bureau is
working on other tech issues, too, said Zalmai Azmi, the FBI's CIO. The
FBI will focus on wireless technology in 2006. The bureau is seeking
tools that can overlay multiple layers of classified information on
geospatial maps. It also wants to create a national database for
gang-related information this year.
Justice is working on several new systems and test programs to
implement its national Law Enforcement Information Sharing Program for
federal, state and local law enforcement partners, Hitch said.
The Regional Data Exchange, an internal tool that allows all department
components to share structured and unstructured data, is critical to
the program's success, Azmi said. The FBI wants to add four exchanges,
including one with DHS and one in San Diego, in 2006 to one already
operating in Seattle, he said. The U.S. Attorney's Office must approve
the arrangements, he said.
The FBI is starting work on a National Data Exchange, which will serve
as an index. Hitch said he expects to issue a procurement proposal for
that program this year.
Justice will also devote more energy to internal IT projects. The
department's Unified Financial Management System will bloom in 2006,
and a procurement for the program is imminent, Hitch said.
Hitch expects to work hard to comply with Homeland Security
Presidential Directive 12, which requires federal agencies to issue
compliant identity cards to employees and contractors beginning Oct.
27, 2006.
===============================
42. The test of
terrorism - Security concerns change life in labs - By HARVEY BLACK
- Milwuakee Journal Sentinel - Jan. 8, 2006
Source
Next Contents
Toxins and the fear of their misuse - especially since Sept.
11 - has
changed life in the laboratory for many scientists.
Passed in 2002, the Public Health Security and Bioterrorism
Preparedness and Response Act requires scientists doing research on any
of a number of bacteria, viruses and toxins meet a variety of strict
security measures, as well as have employees pass a federal background
check.
While some researchers say that the regulations are appropriate and
reasonable, considering the potential for terrorism, others complain
that the requirements impede their work on important issues.
"The constraints are reducing research effectiveness," says Caitilyn
Allen, a professor of plant pathology at the University of
Wisconsin-Madison, referring to her efforts to study a plant pathogen
on the select agent list, which covers some 70 such organisms and
toxins. They include a number of viruses, such as Ebola and bacteria
responsible for diseases such as anthrax and plague.
Ralstonia solanacearum, race 3 biovar 2 can kill tomatoes when it
infects the plant in warm, humid environments. One focus of her
research is developing tomato strains that can resist the bacterium.
Doing so, she says, can help Guatemalan farmers who are working to
develop an export market for tomatoes as a way to boost their income.
"We scientists in the developed world have a moral obligation to do
work that can benefit people in the developing world," she says. But
installation of security equipment, such as biometric locks that read
fingerprints - at an estimated cost of $150,000 - interferes with that
research.
"Making Caitilyn do fingerprint scans to work with this pathogen just
doesn't strike me as a good use of resources," says Tim Denny, a
researcher at the University of Georgia.
He abandoned work on this bacterium because of the expense and
restrictions of the new security regulations, saying the organism was
not central to his research.
Document, document
Beyond the security hardware, which regulates entry to the lab, there
is extensive paperwork required to document what happens to samples of
the bacteria.
"I figure my technician spends 20 percent of her time on compliance
issues. That's research money being spent on something other than
research," Allen says.
Researchers also complain that the restrictions can limit who can do
research on these agents.
"I can't just say, 'You're hired to work on this,' because it has to go
through federal approval. That takes routinely from three months up to
six to eight months," says UW-Madison researcher Gary Splitter, who has
been working for three decades on brucellosis, an infectious livestock
disease that can be transmitted to people.
Brucellosis was weaponized by the United States until the destruction
of the stockpile in the 1970s.
The federal government requires background security checks by the
Justice Department on those who work with select agents.
The time required to complete the background check as well as training
a newcomer to the lab, can slow research significantly, says Splitter.
"I think it has the effect of driving professors out of the area (of
working on select agents)," says Thomas Montville of Rutgers, who works
with the bacteria responsible for making the deadly poison botulinum,
another select agent.
He says his work on developing natural inhibitors to this poison, which
can be found in canned foods, is suffering because of the length of
time it takes to get students federally approved.
"The net effect of this legislation for the scientific community, as a
whole, has reduced the amount of work going on, on this list of select
agents, which should be studied intensively," says Adam Bogdanove, an
Iowa State University scientist who is sequencing the genome of a
rice-attacking bacterium that is on the select agent list.
Though he clearly decided it was important to continue his federal
government- funded work on this organism, he says that five of his
colleagues at the university decided not to continue their research on
various select agents because of the restrictions and expense.
Jan Leach, a plant scientist at Colorado State University, abandoned
research on this rice pathogen for similar reasons. She notes she had
been able to work on it with no restrictions for the past 20 years.
She says that her colleagues outside the U.S. who study it, in hopes of
better understanding and eventually combating pathogens that attack
this important crop, are "stunned" at the restrictions imposed on U.S.
researchers.
Overall restrictions appear to have had a significant effect. Less than
half the laboratories predicted to work with select agents have
registered to do so, according to Science magazine last year.
But Lee Ann Thomas, of the U.S. Department of Agriculture, which is one
of the government agencies responsible for regulating select agents,
disputes such arguments.
"I am not aware of significant numbers of researchers who have dropped
out," she says. She adds that there is an increasing number of
researchers wanting to work with select agents.
Some favor new rules
Other researchers sound relatively content with the restrictions.
"I think they're justified. We need these protections in place. Given
the threat of bioterrorism, I think these things have to be in place so
we know who has these agents," says David Wagner of the University of
Northern Arizona, who works with the bacteria responsible for causing
glanders, an infectious disease of horses that can be transmitted to
people.
Similarly, Julie Coffield of the University of Georgia, who works with
botulinum toxin, says the restrictions and equipment, such as
fingerprint readers that control access, have made her feel more secure
about her lab.
Thomas suggests that scientists who are unhappy with the select agent
restrictions fail to recognize the consequences of a changed world.
"It is a community that has not been subject to regulations, but the
world changed on 9-11 and subsequent to that," she says, adding that in
the event a bioterror attack is launched using any of the select
agents, "we will know who has it and who has been handling it
appropriately. It does improve our emergency response abilities."
Governmental concern about these select agents extends to an
unwillingness to release the names of researchers who are studying them.
That "information in the wrong hands could cause problems," says Von
Roebuck, a spokesman for the federal Centers for Disease Control and
Prevention, which also regulates select agents.
And at UW-Madison, James Tracy, an associate dean at the School of
Veterinary Medicine, whose job it is to see that the university
complies with the select agent regulations, will not reveal who works
with them on campus.
"I will not go on the record as to what agents we do or don't have,
simply to protect people," he says.
===========================
43. India
Revives Fingerprint Plan to Combat Fraud: - by Andy
Mukherjee - Bloomberg.com - Jan 9, 2006
Source
Next Contents
Jan. 9 (Bloomberg) -- India's stock market regulator has
unearthed a
scam, which it is now using as an excuse to revive an intrusive
fingerprinting plan that may put off genuine investors.
According to the regulator, the fraud took place in June 2005 when one
Roopalben Panchal made a bid for 1,050 shares of Yes Bank Ltd., a
Mumbai-based lender that was selling stock to the public for the first
time.
The bank's initial public offer was hugely oversubscribed; Panchal's
application was unsuccessful. Yet, before the first day of trading on
July 12, she managed to come into possession of almost a million
shares, receiving 150 each from 6,315 people.
More than 98 percent of Panchal's selfless benefactors happened to have
the same address as her sister.
After receiving the shares, Panchal sold 80 percent of the stock to
five buyers, four of whom dumped their holdings on the market on the
first day of trading. The return the shares sold? An astronomical 432
percent, annualized.
``It would take extreme naivete or suspension of disbelief to accept
the intricacies of such convoluted transactions as a normal incidence
of genuine dealings in securities,'' the Securities and Exchange Board
of India, or Sebi, said in its Dec. 15 order. Sebi banned Panchal and
her associates from subscribing to initial share sales until further
order.
On Dec. 30, it reintroduced fingerprinting of investors.
The proposed fingerprinting of U.K. citizens for a national identity
card plan has created quite a stir in that country. Critics have panned
it as an assault on personal liberty. Many travelers to the U.S., too,
have resented the post-Sept. 11 experience of being fingerprinted at
airports.
Invasion of Privacy
What makes the Indian exercise more objectionable than both the
American and British variants is that it has absolutely nothing to do
with national security.
Until mid-2005, there was an 18-month-long Sebi-sponsored drive in
India to create a biometrics-based investor identification system,
which was being touted as a foolproof method for weeding out wrongdoers
from the markets.
The regulator had ruled that anyone who wanted to trade securities
valued at more than 100,000 rupees ($2,239) would need to quote their
unique identification numbers. The drive was suspended after investors
complained and a Sebi-appointed panel criticized it.
By the time registrations were suspended last July 1, fewer than
313,000 individuals had provided personal details for the biometric
database. That's a fraction of the 7 million accounts used by investors
to buy and sell shares.
IPO Rules
On Dec. 30, the regulator decided to resume registrations in the
biometric database, though it is now compulsory only for those who wish
to trade shares worth more than 500,000 rupees. The threshold will be
gradually lowered, Sebi Chairman M. Damodaran told reporters in Mumbai.
The IPO fraud has thus become a pretext for reintroducing a draconian
measure that serves no purpose -- no fraudster would be naive enough to
commit manipulative trading under his own identification.
Sebi should instead have focused on changing the rules for allotment of
IPO shares. The entire incentive for fraud exists because of a
regulation that favors small investors.
Individuals who applied for shares worth more than 50,000 rupees were
grouped together as ``non-institutional,'' and 25 percent of the Yes
Bank IPO was reserved for them; those who invested less than that
amount were put in the ``retail'' category and 25 percent of the shares
were set aside for them.
Had Panchal applied in the non-institutional section, she would never
have been able to corner as many as she did. That's because this
segment was oversubscribed 43 times. She made a killing by getting her
applications considered in the retail category, which was
oversubscribed only 10-fold.
Google It
Since the Yes Bank IPO, it's become even worse: Reservation for small
investors has gone up to 35 percent, from 25 percent.
``The system of cross subsidizing small investors in the allotment
process is the root cause of the abuse,'' says Jayanth Varma, a former
member of the Sebi board and a professor at the Indian Institute of
Management in Ahmedabad.
``Today the technology exists,'' Varma says, ``to ensure that IPO
allotments are made to all investors at the same market clearing price
in a completely non-discriminatory manner. There is no need to reserve
shares for some categories of investors.''
Google Inc.'s 2004 IPO has shown how the Dutch auction method can
enable price discovery to be achieved not by investment bankers, but by
direct bids from potential investors.
Database Security
Share trading has already gone paperless in India. Investors keep
accounts with share depositories. The accounts are credited and debited
with every purchase and sale of securities. In Panchal's case, the
depository should have found it suspicious that a few thousand clients
had the same address.
When information that already is being collected is not being properly
analyzed, why bother asking for more? There are real concerns that
thumb impressions could be stolen from the database and abused.
Fingerprinting would only harass honest investors; the crooks would
learn to beat the system in no time.
============================
44. Leaving on a
jet plane? Rules are changed again - By JILL SCHENSUL - North
Jersey Media Group - Jan 8, 2006
Source
Next Contents
Air passengers, pay attention.
The rules are changing.
Rule 1: Be good or be gone.
Recently, the captain of a Monarch Airlines flight from Manchester,
England, to Tenerife, the Canary Islands, made an unscheduled stop on a
tiny island en route, to ditch an inebriated passenger. The man had
been swearing at the crew, according to the Daily Mail, after they
refused him more alcohol.
This was just the most recent in a spate of airplane ousting incidents:
a pair of brothers ditched in New Mexico, during a Southwest flight
from Phoenix to Philly, and a United Airlines flight that diverted for
a landing in Charlotte, N.C., after an unruly passenger lit a cigarette
and urinated in the aisle.
Take heed. Behave yourself, unless you really didn't want to get where
you were going to begin with.
Rule 2: Sharp objects bring tradeoffs.
As of Dec. 22, the list of objects banned from planes shrank, when the
TSA decided it was OK to let people bring aboard not only their
precious lighters (remember, no smoking, even out
side) but a variety of sharp objects such as nail clippers.
Instead, security will start performing more random searches of
passengers and their stuff. Some days, at some airports, you may be
required to remove your shoes, other days you won't be. The rule? There
are no rules.
Rule 3: Forget about privacy.
As recent events have shown, the government will do whatever prying it
takes in the name of national security. Don't start arguing if they ask
at the airport for information about you, your friends and your
relatives.
However, if you are willing disclose a variety of personal information,
you can get in on the TSA's Registered Traveler program, which will be
offered nationwide June 20.
The TSA will collect personal information including name, address,
phone number and date of birth, along with biometric data, including
fingerprints and/or an iris scan. A "security assessment" will include,
according to the TSA, a check with law enforcement and intelligence
sources along with a search for outstanding warrants.
Travelers who are sufficiently trustworthy after the checks will be
able to breeze quickly through special security checkpoints after
providing their credentials and biometrics scanning. A fee, not yet
determined, will be charged for the privilege. For more information, go
to tsa.gov/public.
Rule 4: Don't get used to low fares.
As Independence Air's recent demise reminds us, price hikes love a void.
When Independence arrived on the scene 18 months ago, offering fares as
low as $29 one way, it forced other carriers on the same routes to
reduce their fares, too.
Unfortunately, mismanagement, higher fuel costs and, ironically,
competition from other low-fare carriers forced Independence out of the
running, and analysts predict fares will go up to fill the void it left.
One rule that hasn't changed, at least for now, is protection for
passengers if an airline folds. In November, Congress extended Section
145 of the Aviation and Transportation Security Act, which gave
travelers holding tickets for a defunct airline certain rights.
It specified that airlines flying the same routes as the defunct
airline are required to accommodate stranded passengers, on a
space-available (standby) basis. The passenger pays a maximum of $50,
one way, for a seat on the alternate airline, and has to make alternate
arrangements within 60 days of the date service ceased.
Independence Air (flyi.com) says it will request permission from
bankruptcy court to refund unused tickets. Passengers who charged their
tickets can also request a refund from the issuing card company.
==============================
45. Diamelle Releases
Java EE Platform-Based Low Cost Authentication Server to Deter
Fraud and Identity Theft
Technology Uses Soft Tokens for Multi-factor Authentication -
SysCon
Belgium - Jan 8, 2006
Source
Next Contents
Diamelle Technologies which provides a comprehensive identity and
access management enterprise solution, has announced the release of a
low cost Authentication server with two factor authentication, aimed at
the SMB market and high volume online applications.
Authentication with more than one factor is considered as strong
authentication which is considerably more difficult to compromise as
compared with single factor authentication. Two factor authentication,
using one time passwords (OTP), requires the user to enter something
they know, which is usually a PIN, and something they have; a physical
device such as a token, smart cards with micro-processors, or
biometrics such as finger print scanners.
The Diamelle solution uses something that every online consumer already
has: a PC, a PDA, or a mobile phone. There are no manufacturing or
distribution costs, just a simple one time software download.
The Authentication Server can be expanded to include Diamelle
Technologies’ Enterprise Identity Management solution available for
large corporations. The Diamelle IDM is an integrated, full featured
product built on a Java Enterprise Edition (JAVA EE) platform with WS-I
compliant web services to facilitate integration and provides
authentication with Single Sign-on, authorization, user management,
policy management, user self-service, audit, password management and
delegated administration. Diamelle offers a seamless migration path
from the Authentication server to the IDM solution.
Diamelle Authentication server has been built upon the Java EE platform
utilizing a Service Oriented Architecture. The Diamelle product
architecture emphasizes scalability, security, portability, platform
independence, extensibility, business process mapping and easy systems
integration. It is a powerful and flexible programming model which
lowers implementation risks and cost of ownership and scales to
millions of users. The solution can be deployed in a number of
configurations where it can serve as the central identity manager for
the enterprise or it may be deployed as part of an application, without
creating a new footprint, as is often the case for ISVs or departmental
solutions.
The use of the JAVA EE platform means that developers or administrators
already working with JAVA EE app servers can leverage their existing
knowledge. Competing products dating back to earlier times often have
proprietary platforms without the same level of flexibility.
Availability of Web Services and related technologies, simplifies
integration with applications that use other technologies. Since SOAP
toolkits are now available for a large number of platforms, the effort
is greatly reduced and developers can leverage existing knowledge to
achieve this goal.
The Diamelle Authentication server is available for immediate delivery.
A promotional price is being offered during January 2006 where the
Authentication Server for 500 users is available for $7,500-.
Additional users licenses are available for $5- / user for 501 to 5000
user. 5001 to 10,000 users are $4- / user.
==============================
46. Drivers
under USFJ must tell command of off-base incidents - Stars
and Stripes - January 8, 2006\
Source
Next Contents
U.S. Forces Japan personnel must report off-base vehicle incidents to
installation law enforcement officials, but punishment is often left to
a commander’s discretion, even for minor infractions.
Air Force Col. James Brophy, USFJ’s provost marshal, said there are
standard reporting procedures that outline the steps U.S.
servicemembers and civilians should take following traffic accidents
and violations, both on and off base.
If a military member, Defense Department civilian or dependent is
involved in a wreck on base, they are required to notify security
forces or military police immediately, according to Brophy. Vehicle
accidents and citations outside the gates must be reported to base law
enforcement officials at the closest U.S. military installation. That
includes offenses for drunken driving, speeding and seat belt use.
If a driver isn’t arrested but is given a citation, he added, that gets
forwarded to the home installation for action by the individual’s
commander. It may result in a fine or appearance before local Japanese
police. Commanders can impose additional points to the driver’s license
as well.
In Japan, the police don’t distinguish between a vehicle’s driver and
its owner in accidents or cases of misconduct, he said.
So if a U.S. servicemember is operating a car owned by his Japanese
girlfriend and gets a ticket or winds up in an accident, “he will be
held as the professional driver by the Japanese, regardless of who owns
the vehicle. If they commit an infraction, say speeding, he’ll be given
the citation - even if it’s his girlfriend’s car,” Brophy said.
Under USFJ guidelines, he must inform officials on base.
South Korean law enforcement officials provide traffic tickets to the
nearest military provost marshal office, where the tickets are recorded
in the Defense Biometric Identification System.
The MPs then send the tickets through the military postal system.
If an individual receives multiple citations, or doesn’t pay the
ticket, the chain-of-command is alerted.
Before leaving Korea, personnel must deregister their vehicles and any
unpaid tickets will be flagged.
The U.S.-South Korea Status of Forces Agreement contains a requirement
that USFK authorities are alerted if a SOFA member “is detained,
arrested or otherwise taken into custody,” according to a USFK response
to query.
=============================
47. Report
on
FBI may strengthen lawsuit against agency By WILLIAM McCALL
-
Associated Press - KGW-TV (Oregon & Washington State - Jan 8, 2006
Source
Next Contents
A Justice Department report that faulted the FBI for sloppy work may
strengthen a lawsuit filed against the agency by a Portland man who was
arrested after his fingerprints were mistakenly identified during the
investigation into the 2004 Madrid train bombings.
Attorneys for Brandon Mayfield "don't have to argue a particular
violation of Mayfield's religious rights or First Amendment rights,"
said Robert Precht, who represented defendants in the 1994 World Trade
Center bombing in New York.
"They only have to argue the government engaged in blatant misconduct,"
said Precht.
Other legal experts agree that the Justice Department report does not
undercut Mayfield's lawsuit - and may help it.
In the report released on Friday, Justice Department Inspector General
Glenn Fine faulted the FBI for mistakenly matching a fingerprint found
on a bag of detonators near the Madrid bombing site to those of
Mayfield.
The report said no "intentional misconduct by FBI employees" was found,
but said there were "performance issues by various FBI employees ...
that helped cause the errors in the Mayfield case."
Mayfield was jailed for two weeks in May 2004 - even though Spanish
investigators disagreed with the FBI's fingerprint analysis. The FBI
acknowledged the mistake on May 24 and apologized to Mayfield.
He sued the Justice Department and the FBI in October 2004, claiming he
was singled out because of his Muslim faith and that searches of his
home and other locations were in violation of the Fourth Amendment of
the U.S. Constitution, which protects against unreasonable search and
seizure.
If Mayfield can show that FBI experts were under pressure to make an
identification without being certain - which the FBI and the Justice
Department have denied - then he may be able to establish a pattern of
misconduct, Precht said.
He said the Justice Department report leaves open questions about the
possibility of pressure on forensic experts.
"Once the government or the prosecutor's office or an (FBI) supervisor
says we think this guy may be guilty, the whole machinery of government
goes to work to find the evidence that supports that," Precht said.
"People do these things naturally. That's why we have safeguards about
the presumption of innocence."
Michael Greenberger, a University of Maryland law professor and
director of its Center for Health and Homeland Security, said the delay
in correcting the mistake may be ammunition for Mayfield to argue there
was pressure.
"They should have figured out sooner those were not his fingerprints,"
Greenberger said.
Brian Roehrkasse, a Justice Department spokesman in Washington, D.C.,
said the agency could not comment on the pending lawsuit and he
referred questions about the report to the FBI.
The agency, in a statement released with the inspector general's
report, said Mayfield's mistaken arrest "was based on an extremely
unusual confluence of events."
The FBI said it has changed its procedures at the recommendation of an
international panel of experts in order to prevent a similar mistake.
Precht, who recently left the University of Michigan to return to
private practice in New York, said the pressure on investigators and
prosecutors is enormous once they believe they have the right suspect.
"This is a textbook example of people having assumed a person's guilt,
and then they look for evidence to confirm it," Precht said.
Veteran trial lawyer Gerry Spence, who is representing Mayfield, has
argued the FBI targeted the former Army officer because he is a convert
to Islam.
The inspector general's report concluded that religion played no role
in the initial, mistaken fingerprint identification because the FBI
experts did not know Mayfield was a Muslim, or that his wife is
Egyptian or that he represented other Muslims as an attorney.
The report noted, however, that "whether Mayfield's religion was a
factor in the (FBI) laboratory's failure to revisit its identification
and discover the error in the weeks following the initial
identification is a more difficult question."
Elden Rosenthal, a Portland lawyer also representing Mayfield, said the
case raises important issues of protecting constitutional rights during
the government's war on terrorism.
"Those of us concerned about civil liberties always sound like we're
talking about abstract concepts," Rosenthal said. "Here is a concrete
example of why civil liberties should not be allowed to take a back
seat to the war on terror."
In Mayfield's case, Rosenthal said the FBI won approval from a secret
court established by the Foreign Intelligence Surveillance Act, or
FISA, to plant electronic "bugs" in the Mayfield home and his law
office, execute repeated "sneak and peek" searches of his home and
office, and place wiretaps on his phones.
Despite the inspector general's conclusion the FBI could have gotten
FISA approval for surveillance without the Patriot Act, the report
found that changes made by the act permitted access to more information
about Mayfield than could have been obtained without it, said Dave
Fidanque, executive director of the Oregon chapter of the American
Civil Liberties Union.
"The inspector general's report confirms for the first time that
Mayfield's home, and probably his office, were 'bugged,'" Fidanque said.
Greenberger said the Mayfield case may provide the first opportunity to
test whether Patriot Act provisions on surveillance and searches
violate the Constitution.
"Everybody has been waiting for a case where these kinds of searches
under the Patriot Act can be brought to a court's attention by somebody
who has standing to raise it - and Mayfield has that standing,"
Greenberger said.
"There's a big, big constitutional issue here," he said.
=============================
48.
Watch-list
for terror suspects - by Nicolette Burke - in Canberra - The
Courier Mail [Australia] - Jan 9, 2006
Source
Next Contents
POTENTIAL terrorists and war criminals entering Australia will face
heightened scrutiny, under a new watch-list to be set up this year.
The Department of Immigration and Federal Government security agencies
are setting up a control centre to administer the Movement Alert List,
which places a red flag next to the names of criminals, people with
terrorist connections, and other undesirables.
Everyone applying for a visa to come to Australia will have their name
checked against the database, which contains more than 400,000 people
of interest.
They include terrorists, serious criminals, those involved in organised
immigration rackets, people who have previously breached their visa
conditions and those known to be carrying significant health risks.
More than 7000 of the people on the list are named as war criminals,
particularly in the former Yugoslavia and Rwanda.
The new set-up will use better computing technology to analyse the
names and pseudonyms of terrorists, many of whom have common or complex
names.
Almost 10,000 people a day are checked against the alert list before
coming to Australia.
In the past year the number of names on the list has increased by
around 25 per cent.
A departmental spokesman said the new system was likely to be operating
by June.
"Substantial improvements in name search algorithms, quality assurance
of records, technical expertise and the MAL work environment will
ensure that the risk of missing a genuine match is minimised," the
spokesman said.
"The system enhancements include a change in the processing regime so
that all applications are checked on MAL using the most rigorous name
searching techniques at the earliest stage of application processing."
Late last year, a Muslim convert from Britain, Abdur Raheem Green, who
has been named as a radical, was refused entry to Australia because he
was named on the Immigration Department's Movement Alert List.
Mr Green, who has said Muslims "cannot live peaceably together" with
Westerners, was due to make a series of speeches at mosques in
Australia, but was stopped before boarding his flight to Australia from
Sri Lanka.
The bolstered system will complement the Regional Movement Alert List,
where travel documents are examined at the airport check-in counter,
and passengers barred from boarding the flight if they are suspected of
passport fraud.
New kinds of biometric information, including fingerprints, iris scans
and photographs, will also be stored in the database to help protect
Australian borders.
The collation of this information is currently on trial at Sydney
airport, with a view to rolling out biometric testing nationally to
prevent identity and passport fraud, which the Government has said has
strong links to terrorist activity.
==============================
49. In reality,
high tech beats no tech - By Bob Bong - Daily SouthTown [Illinois]
- January 8, 2006
Source
Next Contents
Business editor I can no longer pride myself for not owning a cell
phone.
Not having a cell phone (or a pager) seemed a simple way to rebel
against the technology creeping more and more into our lives.
My daughter changed all that when she gave cell phones to me and the
wife for Christmas.
Mind you, the phones are as basic as you get. These are pay-as-you-go
models with no fancy ring tones and no cameras.
As she presented them, my daughter said it was high time we left the
Stone Age.
That got me thinking about how technology has become such a part of our
lives; not that technology hasn’t been a part of society since some
caveman rolled the first wheel. Appliances we take for granted, such as
refrigerators and washing machines, are technology, after all.
But technology has been coming at us fast and furious in recent years.
It took 25 years to go from Pong (the first video game) to Nintendo,
but the original Xbox already has been replaced by Xbox 360.
At home, we have a programmable thermostat that has come in handy this
winter in keeping heating bills under control. When we go to work and
the house is empty, the thermostat is set at a chilly 60 degrees (a
co-worker sets his at 58 during the day, but he’s from Minnesota, so we
don’t pay him much mind).
About an hour before my wife gets home, the heat ratchets up to 66
degrees, before slipping back to 64 overnight. With natural gas prices
about a third higher than last year, it’s a great tool. Who cares
whether the house is cold when nobody’s home?
And we were shopping at Cub Food the other day when the checker asked
us whether we wanted to sign up for the finger plan. It seems the
grocery store chain is the first in the Chicago area to employ
biometric systems at its stores.
Biometrics is something right out of James Bond stories, or “Star
Trek.” At Cub, you sign up and then your designated finger becomes your
new checkbook. You just place your finger on the screen and the money
is transferred out of your account.
Some of the computer companies are working on using the same technology
to safeguard your computer. You’d have to scan your finger to gain
access to your computer files. Another system uses a scan of your eye’s
retina to achieve the same kind of security.
A similar finger scan is being used to keep drunk drivers off the road.
Drivers have to have their finger scanned to determine whether they are
legally able to drive. If you test too high, the car won’t start.
Another version of that system requires drivers to blow into a testing
device, which will determine whether the motorist is OK to drive.
Medical technology is a modern marvel. I had cataract surgery on both
eyes and had new lenses implanted. A few weeks ago, when I went to
renew my driver’s license, I passed the vision test without the glasses
I have needed since I was a kid.
Medical technology also allows people who have lost a limb or some
other body part to function in everyday life. Prostheses have advanced
so far that some soldiers wounded in Iraq have asked to return to
active duty after being outfitted with a new arm or leg.
The list of technological marvels also includes microwave ovens that
are so small and cheap that we throw them away when they break.
The same goes for televisions, CD and DVD players and VCRs, if you
still have one of those dinosaurs.
And we won’t even mention TiVo.
============================
50. Tighter
security
on
visas - By NICOLETTE BURKE - The Advertiser [Australia] Jan 9, 2006
Source
Next Contents
POTENTIAL terrorists and war criminals entering Australia will face
heightened scrutiny, under an improved "watch list" to be set up this
year.
The Department of Immigration and Federal Government security agencies
are setting up a control centre to administer the Movement Alert List,
which places a red flag next to the names of criminals, people with
terrorist connections, and other undesirables.
Everyone applying for a visa to come to Australia will have their name
checked against the database, which already contains more than 400,000
people of interest.
They include terrorists, serious criminals, those involved in organised
immigration rackets, people who have previously breached their visa
conditions and those with health risks.
The new set-up will use better computing technology to analyse the
names and pseudonyms of terrorists.
Almost 10,000 people a day are checked against the alert list before
coming to Australia, and there has been a jump of 25 per cent in the
number of names placed on the list in the last year.
A DIMIA spokesman said it was likely to be operating by June.
"Substantial improvements in name search algorithms, quality assurance
of records, technical expertise and the MAL work environment will
ensure that the risk of missing a genuine match is minimised," the
spokesman said.
Biometric information, including fingerprints and iris scans, also will
be stored in the database.
===============================
51. Day 3 at CES: What's
Hot - By Richard Nass - Mobile Handset DesignLine - Jan 7,
2006
Source
Next Contents
This is day three at the Consumer Electronics Show (CES), and for me,
it's getaway day. The crowds at the show just seems to get bigger and
bigger each day. Just trying to walk the aisles became a chore.
So what did I see that was impressive, you ask? One of the more
interesting products was a radio developed by Alereon that transmits
both Bluetooth and Ultra Wideband (UWB) signals. In fact, the radio can
dynamically switch between the two protocols, even while transferring a
file.
SigmaTel is getting into the video business in a bigger way than it had
in the past. They've develop an IC to code/decode/compress video on an
iPod-like system. This will find a home in lots of coming players,
assuming Apple's video iPod takes off as expected.
Analog Devices showed a Blackfin-based door lock, also known as a
biometric security device. It works using fingerprint recognition.
And one of Freescale's customers is on the verge of shipping a ZigBee
system to control the home. It operates the lighting and can monitor
security cameras, all from an Internet connection
=================================
52. Experts
weigh in on bank responses to FFIEC guidelines - Financial
houses strengthen authentication with challenge questions, phone
authentication and other means of outsmarting hacker sleuths - By
Marisa Torrieri, - January 7 2006
Source
Next Contents
Bank of America’s answer to the new federal guidelines isn’t
a
biometrics apparatus that detects a legit banker’s paw print or a
hardware token that generates passwords on the fly. For now, it’s much
simpler.
The Charlotte, N.C., national bank chain just started rolling out
SiteKey, its free, new online security technology intended to better
protect its 13.2 million online banking customers. The risk-based
authentication software works behind the scenes, passing information
back and forth between the user and bank. When logging on, customers
select an image, write a brief phrase and select three challenge
questions. When the customer signs in to online banking, they view
their image and phrase before inserting their password -- confirming
that they are at the real Bank of America site. If a customer uses a
computer the bank doesn’t associate with them, SiteKey will issue a
challenge question to confirm that it is the appropriate customer.
”We see this as [part of] an ongoing process,” says Betty Reiss, a
spokeswoman for Bank of America’s online activities, adding that the
upgrades will protect online bankers from phishing and other fraudulent
activities.
The decision to install SiteKey to increase online security is based on
months of market research involving focus groups, Reiss says. BOA’s
potential customers favored the idea of a challenge question because of
its convenience over other two-factor authentication methods.
Additionally, the bank’s corporate headquarters favored the method
because it was less costly to implement than other methods.
“It adds an added layer of authentication but doesn’t require an
additional purchase in software,” Reiss says.
Like Bank of America, many banks and credit unions serving regular Jane
Does (the “horizontal markets” composed of consumers) are charging full
speed ahead to improve the security of online banking. The recent
guidelines put out by the Federal Financial Institutions Council
(FFIEC) sped up that process. In the recent guidelines, “Authentication
in an Internet Banking Environment,” financial institutions are
instructed to analyze risks of fraud attacks and enhance systems with
some form of two-factor authentication.
The good news for the companies that make two-factor authentication
products is that banks must do something to show they are evaluating
risks of customers’ data being exposed to the wrong parties via their
existing information technology in palace.
“The FFIEC guidance has had a huge impact of making people move,” says
Stu Vaeth, chief security officer at Diversinet, a company that
develops soft tokens and provisioning for two-factor authentication.
“It’s putting a lot of the banks over the edge, saying, let’s do
something now.’
Banks also want to do something because of the growing media attention
to phishing, identity theft, and the risks related to online banking.
The more their consumers read about online attacks, the more fear they
have to do their banking outside of a branch setting, Vaeth says.
Since online banking costs a bank far less than branch-based
activities, it’s easy to see why financial institutions are weighing
their options, wallets in hand.
Great security versus keeping customers happy: How banks are handling
the FFIEC guidelines for two-factor authentication
For the producers of two-factor authentication products, courting a
U.S.-based bank is far easier today than in the past ... though still
not a slam dunk. They must show that their software or other “solution”
provides high level of security, is cheap to install, and won’t
inconvenience customers. Cost and convenience are the biggest factors
influencing banks’ investments, according to bank analysts and IT staff.
“The consumer I think is to blame in a lot of cases,” says Doug Graham,
a security consultant for BusinessEdge Solutions, Inc. “They want their
cake, and they want to eat it as well.”
The biggest challenge is making online banking more secure while
inconveniencing consumers as little as possible. This challenge may
explain the hesitancy for banks to start issuing hard tokens, or
one-time passwords (OTP), says Vaeth, as they lack universal
authentication.
Because of the lack of a single, authentication standard for all online
transactions, you have to use multiple hard tokens for different
transactions - you can’t use the same password to transfer money that
you use to order goods from Amazon.com, for example. This is perhaps
one the biggest reasons why the sale of OTP devices hasn’t exploded in
America, says Vaeth.
“Hard tokens are less desirable for those who don’t want to carry
around a necklace of tokens,” says Diversinet’s Vaeth, who doubles as a
co-chair for the Initiative for Open Authentication’s (OATH) technical
group. The organization, formed in February 2004, is one of a growing
number of consortiums meeting to address the “necklace” problem by
developing an open standard for strong authentication for any online
application.
Although the larger 180 or so national institutions like Bank of
America have been aware of the need to build to build stronger online
security systems to deter fraud, smaller institutions with $5 billion
or less in assets are still trying to figure out the best solution,
says George Tubin, a security analyst with TowerGroup, who just
authored a new report that interprets the FFIEC regulations (Tubin’s
report endorses the risk-based authentication technologies such as that
used by Bank of America, over hard tokens).
Not turning off customers was International Bank of Miami’s primary
consideration when it decided to overhaul its infrastructure and use a
voice-based biometric authentication system for high-end customers
doing wire transfers or making account changes.
After upgrading desktop computers and back end systems, the company
contracted with Diaphonics to install the voice authentication system,
says Ray Guzman, the bank’s vice president of IT. Such a system
enhances security for such customers. Now that the FFIEC made it clear
that the bank needs to do more to amplify its security for the rest of
its “few thousand” customers, Guzman is comparison shopping different
soft token-based “solutions.”
“The biggest concern is customers,” Guzman says. “Will they accept the
technology?”
What’s next for two-factor authentication, 2006 and beyond
Methods in place such as SiteKey are good deterrents for fraudsters
today. But just as security for protecting customer information
improves, so do the methods for circumventing a bank’s firewalls. And
so, whatever banks are doing today may need an upgrade in the
not-too-distant future.
In his report, the TowerGroup’s Tubin addresses a series of cyber
threats that continue to emerge, including Trojan horses, Drive-by
Downloads and DNS cache poisoning. Because of the growing level of
sophistication, the TowerGroup recommends institutions to look beyond
the FFIEC's minimum requirements and implement comprehensive
authentication solutions to protect against the potential for
enterprise-wide fraud within an institution.
One way of doing this is by offering multiple solutions to different
customers, says Graham. For example, a bank using one vendor’s
risk-based authentication technologies may find itself interested in
another provider’s hard tokens for corporate-level bankers who conduct
online transactions at multiple locations.
What is likely to happen is a growing number of banks offering a range
of products for different customers - high-end users, corporate bankers
and low-risk users. For example, a bank might offer an internal,
behind-the-scenes risk management system for one customer, but give
another customer an OTP to do mobile transactions from afar.
Products that allow cross authentication - customers to use a single
solution to interact with multiple financial entities they have
relationships with - will become more important in the future, says
Graham.
Instead of multiple security devices, “the industry needs to come up
with a solid solution where one single authenticator can be used to
validate identity to multiple entities, or where trust relationships
can be leveraged from one institution to another through the use of
identity federation,” Graham says. “Simply put, we need to give the
consumers one method of validating their identity, or authenticating to
multiple sources.”
==========================
53. $80, fingerprints, eye scan to speed you to your plane -
Starting this summer, some fliers can skip long security lines at the
Indy airport - By Theodore Kim - Jan 7, 2006
Source
Next Contents
Indianapolis International Airport on Friday became one of the first
airports in the nation to adopt a new federal program that will allow
frequent fliers and other travelers to get through airport security
more quickly.
Known as the Registered Traveler Program, the initiative is meant to
ease checkpoint hassles without compromising airline security. It is
expected to begin here this summer.
Passengers who pay an annual fee of about $80, undergo a background
check and submit biometric information -- their fingerprints and an
iris scan -- will gain access to special screening lanes, airport
Security Manager Reggie Baumgardner said.
Travelers who enroll in the program also will greatly reduce their
chances of being subjected to a secondary security search. These
passengers and their carry-on baggage still will be screened for
weapons, explosives and other illicit materials.
The seven-member Indianapolis Airport Authority voted unanimously to
hire a New York-based company, Verified Identity Pass, to put the
program into place and oversee it. The initiative pays for itself
through the fees collected from passengers.
"The goal here is to find the proverbial needle in the haystack,"
Verified's founder, Steven Brill, said in a telephone interview. "What
we're doing is removing some of the hay. It has real security benefits."
Approval of the program here comes months after the federal
Transportation Security Administration decided to expand the initiative
nationally after successful pilot programs at five other airports.
A sixth, Florida's Orlando International Airport, has directed a
longer-term experimental effort called "Clear." Verified Identity also
administers that program.
The concept has raised questions of whether it infringes on civil
liberties and might create an unfair caste system among passengers:
those who can pay to get through security more quickly and those who
cannot.
Industry experts, meanwhile, have said the program could create a
potential security loophole because it would, in effect, create yet
another entry point onto an airline for would-be terrorists.
The pilot programs, however, have met with generally favorable reviews
from passengers. Such was the sentiment of frequent fliers Friday at
the Indianapolis airport.
Matt Del Garbino, a 35-year-old personal trainer from Westfield, said
he might join the program. He often travels to visit his fiancee, Diana
McGinnis, who lives in the Los Angeles area.
Friday, it was McGinnis who made the four-hour flight to Indianapolis
for the weekend.
"I'd definitely do it, too," the 35-year-old McGinnis said as she
collected her luggage and received a hug from Del Garbino. "You get
people who don't understand how to get through the security
checkpoints."
Don Rice, 56, a sales manager and frequent traveler from Evansville,
also liked the idea.
"It's often 6 a.m. and I'm often half-asleep when I'm going through
security," Rice said. "And I always seem to be the random guy they'll
pull out (for a secondary search). I'm for whatever makes it easier."
==========================
54. Boning up on
a
body's identity - ADRIAN MATHER - Jan 9, 2006 - The Scotsman [UK]
Source
Next Contents
THE year is 1935 and in an isolated ravine in Dumfriesshire two young
women have stumbled on a grisly scene.
Mutilated to hide their identities, the remains of two human bodies lie
in a ditch wrapped in a Lancaster newspaper and left to rot in the
wilderness.
The police are baffled. Both bodies - a 34-year-old woman and another
in her 20s - have been dismembered and had their fingertips sliced off.
Over the next few days, 43 pieces of flesh and tissue are painstakingly
recovered from the scene, leaving police with a decomposing jigsaw to
solve.
The killer, back in England, is convinced he's safe from the law. After
all, Dr Buck Ruxton has made every attempt to hide the fact that it was
his wife and the couple's unfortunate nursemaid whom he had butchered
in a jealous rage.
An Indian medical student called Gabriel Hakim before changing his
name, Ruxton met wife Isabella while practising as a doctor in
Edinburgh. The couple moved to England after the birth of their first
child. Two more children followed.
But Ruxton became increasingly convinced that Isabella was having an
affair. The couple's fights were common knowledge, as were Isabella's
weekend trips away without her husband.
The jealous doctor even secretly followed her when she made a trip to
Edinburgh with a male companion in September 1935.
Even though she and the man, a 25-year-old who worked in the Lancaster
town clerk's office, booked into different rooms in a hotel, the doctor
concluded his wife was being unfaithful and decided to kill her.
The grisly act was carried out on Isabella's return to the marital home
- and the nursemaid, Mary Jane Rogerson, is believed to have walked in
at the wrong moment. The prosecution at the trial concluded he killed
her for fear that she would tell the authorities.
But even after Ruxton recklessly asked a patient for help to clean his
bloodstained flat in Lancaster and was arrested by police, there was
little evidence to link him with the crime - since no-one could
identify either of the mangled bodies.
However, investigators had a new, groundbreaking scientific technique
at their disposal to discover the truth. In Ruxton's landmark trial in
1936, they juxtaposed the remains of one of the recovered skulls on to
a photo of the doctor's wife and proved it was a perfect match.
Combined with a number of incriminating fingerprints gathered at his
house, this new type of "bone forensics" proved Ruxton had brutally
killed his wife, and sent him to the prison gallows.
The presiding judge, Mr Justice Singleton, paid tribute to the
forensics work, saying: "Never have I seen expert witnesses more
careful."
THE damning evidence was the work of Professor James Brash, a scientist
at Edinburgh University's forensic medical department - the
200-year-old institution which produced world-renowned figures such as
Sidney Smith, founder president of the British Association of Forensic
Medicine, and the two men reputed to be the inspiration behind Sherlock
Holmes, Joseph Bell and Dr Henry Littlejohn.
And although it is exactly 70 years since the technique was first
demonstrated in a British court, it remains a vital part of forensic
work today. In investigations across the world, bones are analysed by
experts in a bid to identify a victim and, ultimately, how and when
they died.
The fascinating techniques, based on those pioneered 70 years ago, have
captured the imagination of TV scriptwriters too. This week, a new US
drama, Bones, begins on Sky One, based on forensic pathologist and
best-selling author Kathy Reichs' crime novels. It follows an
anthropologist and FBI agent team who solve crimes by identifying the
long-dead bodies of missing persons by their bone structure.
Not that television programmes always show the real forensic
anthropologists' work accurately.
"Because of programmes like CSI, you'd think that a scientist in a lab
coat can just take a DNA sample and identify a body in a matter of
minutes, but that isn't the case at all," sighs Edinburgh-based
scientist Laura Sinfield.
"There are 61 million people in Britain and the national DNA database
only has three million on it, so even if you manage to get a sample you
still may not be able to find out anything about the person who it
belongs to.
"That's why forensic anthropology is so important. "
Sinfield is one of Britain's 20 dedicated forensic anthropologists, who
deal exclusively with identifying skeletal remains, assessing the of
time and cause of death. A former PhD student with a keen interest in
archeology, she has been working in the field of forensic anthropology
for the past ten years. Her career has seen her studying human remains
in Bosnian killing fields, as well as helping police in murder and
suicide investigations across the country.
And she admits that, although the techniques used to identify human
remains have become more sophisticated over the years, they still owe a
great deal to James Brash's involvement in the Ruxton trial.
"You still have to look at the bones you've found, measure them and
examine them thoroughly. When you see a modern-day facial
reconstruction that has been created from studying a skull, it is
really a continuation of the superimposed photo that was presented in
the Ruxton case," she explains.
"In fact, we owe a lot to the Ruxton trial. Although some of the ideas
had been developed in the United States, it was the first time that
this kind of evidence had ever been used in a murder trial in Britain
and it was truly groundbreaking.
"Nowadays, if there is any occasion where human remains have been found
and there is no way of identifying the body, there will always be a
pathologist or forensic anthropologist called to analyse the remains.
"If the body has been burned or it has decomposed, and if there are no
teeth or fingerprints, we have to use what's left to build up a picture
of what has happened. You need to work out the height, sex, race and
age of the person before you can start trying to find out who they are."
Working out the height is probably the simplest - before the Second
World War the only way was to lay out the skeleton and measure it.
But Sinfield says: "It was very unreliable. And it's also rare to find
an entire skeleton in the first place. Nowadays you have to measure
some of the longer bones, such as the arms and legs, and use that to
try to determine what the person's height is." Age is trickier - a
child's bones, because of the size, mean the age can be gauged quite
accurately, but for adults it's the amount of wear and tear which gives
the clearest indication - and this can differ in individuals.
Sex is determined by examining elements such as the pelvic bone and
looking at where the muscles were attached at the neck. Race is by far
the most difficult to tell, although some clues are given by the shape
of the skull.
However, even if it's never going to be a story with a happy ending,
identifying a body brings its satisfactions.
Sinfield explains: "I had a case a few years back when a skull was
dredged up from the North Sea by a fishing boat. There weren't any
other bones to work with, but by analysing it thoroughly I discovered
that it was a man in his 60s - who the police later matched with a
61-year-old who had committed suicide in Durham two years earlier."
It's a piece of deduction that Brash would have been proud of. And
Sinfield says there is one aspect of forensic anthropology that hasn't
altered since the 1930s. "The ethos behind it has never changed.
Whether it turns out to be a murder, a suicide or a missing person, as
far as I'm concerned it's all about building up a picture of what
happened, getting the facts right and learning the truth."
Bones, Thursday, Sky One, 10pm
==================================
55. A Fictional Story...
Or A Premonition Of Things To Come? - Jim
Downey's Rants & Raves - Digital Divide Network - Jan 9 2006
Source
Next Contents
It was two AM when the knock came on the door. My dog began barking and
my wife nudged me to go take care of whom ever had the audacity to
knock on our door at that hour. I threw on my robe, put the dog in his
crate, and went to answer the door. There was shouting and more hurried
knocking coming from the other side. Before I could reach the door, it
burst open. The glass to the sliding doors near the living room
shattered. Suddenly there were 15 to 20 men, all masked and armed to
the teeth, in my home. They were yelling and swearing at the top of
their lungs, instructing me to drop to the floor and lay on my stomach.
My wife bolted out of the bed and rushed out of the bedroom. A shot was
fired in her direction. More yelling and swearing, this time directed
at her. She, too, was being told to hit the floor. The dog was barking
like a rabid watchdog.
The rush of armed bodies kept coming. One of them stepped onto the
middle of my back. I cried out in pain and was hit for my effort.
Suddenly, three men grabbed my arms, pulled them behind me, and
fastened them together with something that cut into my wrists. I could
feel pain in my wrists and blood dripping down over the wrists.
My wife was screaming and crying out. I was helpless to respond. I
could not see her from my place on the floor. The dog yelped and
stopped barking, and I heard whimpering from the direction of his
crate. Without warning, I am lifted off the floor and practically
dragged out to a black van that was fitted as a police vehicle. I could
not see anything outside of the van. I heard my wife yelling. Suddenly,
the van jerked, sped up and I was aware that I was being taken
somewhere.
After riding in the back of the van, completely void of any views or
communication, the ride stops. The door of the van is opened and I am
dragged out and escorted to a large building. My surroundings are
unfamiliar. I am pushed and nudged all the while. I am rushed through a
process of getting my picture, fingerprints and paperwork completed. No
one answers any of my questions or talks to me in any way except to get
information from me or to give me commands. My questions regarding my
wife’s whereabouts and safety go unanswered. My request for a lawyer
goes unheeded. I am placed in a dark cell and the doors are slammed
behind me. There are no other people in the cell areas. I can hear the
sound of activity coming from other areas of this building. I sit on
the cold metal bench that is permanently fixed to the wall. Whatever is
restraining my hands is still cutting into the flesh of my wrists. I
manage to lie down on the bench and fall asleep.
A loud crash awakens me. There are five men in my cell yelling and
screaming at me. The torrent of their questions is disturbing and
confusing. My attempts to ask about my wife and request a lawyer
results in name-calling. Somewhere between my requests and all the
yelling I hear one of them call me a goddamned terrorist. I am hoisted
from the bench and pushed around the cell. The lights in the hall
leading to the cell go dark and I am escorted out of the cell. I am
placed in a room with a table and three chairs. The room is devoid of
any décor, equipment or other furniture. My hands are cut free,
only to
be placed in actual handcuffs, which are then attached by a chain to
the table. The men leave the room.
Some twenty or thirty minutes later a large man enters the room and
sits across from where I am restrained. My inquiries as to why I am
being held against my will are ignored, as are my requests for a
lawyer, and my concerns about my wife. The man stares at me without
saying a word. I begin to quietly say a prayer to my self. As the man
notices my lips moving he slams his fists on the table and, with a
torrent of profanity, tells me to shut my mouth. I tell him that I was
praying. I receive a slap across my face. I continue my prayer in my
head. Some time later I receive another slap across my face and a
chastisement for my thoughts. I feel my face redden and sting in
response to the slap. The man leaves the room. I am sitting alone in
the room for what seems to be an eternity.
Without warning the lights in the room start to strobe and loud punk
rock music is pumped into the room. I cannot reach my ears to cover
them. The noise is loud enough, and annoying enough, that my head
begins to pound. The strobe light causes me to feel a bit of nausea.
The effect is disorienting. My mouth is dry and I am feeling the need
to urinate.
After a long barrage, the music stops and the lights go out. I am alone
and in the dark. While I am thankful that the music has stopped, the
urge to urinate is now becoming significantly uncomfortable. The
darkness, the pain from my stretched bladder, and the torrent of
unanswered questions running through my mind are as disorienting and
torturous as was the strobe light and music.
Again, without warning, the room is lit. Another man enters the room,
unchains me and takes off the handcuffs. He instructs me to strip off
my clothes. I resist this idea and request a lawyer. He shoves me into
a corner and threatens me. Even with my own history of using profanity,
the rush of swears coming out of him is offensive. He again instructs
me to strip of my clothes. This time he adds a threat of bodily harm if
I refuse to comply. I refuse. He rushes me. I strike back. My military
and martial arts training give me the advantage. I throw him to the
ground. Within seconds I feel an electrical current rushing through my
body. I am being attacked with a tazer. I fall to the ground. The man I
was struggling with gets up and kicks me. Another jolt of current is
sent through my body. I am instructed to stand up and remove my
clothing. I have no choice but to comply. I am now aware of several
more people in the room, including a couple of women.
I ask that the women leave the room. Another burst of electricity is
sent through my body. I drop to my knees. The group of people in the
room begin to yell at me, shouting a variety of instructions to remove
my clothing. I stand and start removing my clothes. I realize as I am
removing my trousers that the pain from my bladder is now gone. During
one of the zaps from the tazer my urinary sphincters released. I am
embarrassed. The women in the room are now laughing and calling me
names in reference to having wet myself. One of the men removes the
tazer connections with several sharp yanks on the wires. There is a
stabbing pain with each tug. Another man yells at me to hurry up the
process of removing my clothes. I stand naked, completely exposed, cold
and wet along my legs and crotch. My mind reels and I try to remove
myself from the reality of what I am experiencing. I am again
handcuffed and chained to the table. All of the others leave and the
lights go out. I am alone in the dark, naked and overwhelmed. I begin
to cry in response to the anger, embarrassment and frustration that I
feel.
I put my head down on the desk and begin to talk to myself in a quiet
whisper. I remind myself of my boot camp experiences. I recall my
training as a fleet marine corpsman. I seek memories of survival
training experiences. I recite the “Lord’s Prayer,” seeking some solace
and rest through my connection with God. I fall asleep.
The door opens and the lights go on. A single person enters carrying a
yellow jumpsuit and some flip-flop sandals. I am unchained and released
from my handcuffs. The person offers the jumpsuit and sandals. I take
them. As I open up the jumpsuit to accommodate putting it on, I notice
the word “TERRORIST” is written on the back and front of the jumpsuit.
I ignore it just so I can put on something warm and preclude any future
embarrassment and exposure. The person, who I can now identify as a man
dressed in a suit, asks me to take a seat. He pulls a bottle of water
from his suit coat pocket and offers it to me. As I open it and drink
from it, I realize how thirsty I was.
The man introduces himself as a member of a federal task force on
domestic terrorism and a FBI agent. I ask him for a lawyer. He tells me
that since I am being held as a suspect of terrorism under the Patriot
Act, I am not entitled to a lawyer. He informs me that all of my
belongings from my home have been packed up, moved to a warehouse, and
are being carefully examined for evidence of my collusion with Al-Qaeda
operatives. Expressing my anger and frustration, I yell at him that I
am not a terrorist. I reference my military record, my honorable
discharge from two branches of the service, and my citizenship. He gets
up and leaves.
A short time later the room is filled with several people, including
the two women. I recognize them most of them as having been present
when I was attacked with the tazer. I am instructed to stand up and
remove the jump suit. The bottle of water is confiscated. I am barraged
with orders and profanity. I remove the jumpsuit and, once again, stand
before them naked and exposed. The jumpsuit and water are taken out of
the room. The group begins to question me in rapid-fire succession. I
don’t even have time to run the questions through my mind before
another question hits me like a brick wall. Somewhere in the process I
become aware of questions regarding phone calls to a close friend named
Mohammed, who lives in Canada. Then there are questions about e-mails
to my friend Elsa, a Christian missionary teacher and lay preacher
living in Bahrain. Then I am asked about my past visits to my friend
Massoud in Qatar. My reason for working as a teacher in Bahrain and
Saudi Arabia were also brought up. I could not answer the questions
because they came too fast and there wasn’t time to answer. I decided
to just shut up. Shortly after I shut up, the group left the room, and
the lights went out. I found the chair and sat down, still naked, still
exposed. I remained in the room for a long time, alone and vulnerable,
thoughts racing through my mind.
Why did they want to know about Mohammed? He’s a teacher that I met
while teaching in Bahrain. He lived in Toronto and we stay in touch. I
visited him several times since 1997. Elsa is a British citizen that I
also met while I was in Bahrain. She was a missionary. Why would they
want to know about her? Massoud is a business owner that I met though
Bader, a friend that had immigrated to American just after the fall of
Iran to the Ayatollah Khomeini. Bader became a naturalized citizen
after having sought asylum here I the states. These were my friends.
None of them had anything to do with terrorism.
My thoughts were interrupted when the light went on and the same man in
the suit returned. He gave me the same jumpsuit to put back on. As soon
as I had the jumpsuit buttoned up, another person came in with a tray
of food. I sat down and the FBI guy let me eat while he asked
questions. I answered only the questions that I felt were innocuous, or
were common knowledge.
He asked me about e-mails I sent to Massoud, Mohammed, Bader and Elsa.
He asked me about my trip to India in 1995. And then he asked about the
jaunt I took to Pakistan that same year. I told him about visiting
India as part of my exploration of the region while on vacation from
teaching in Bahrain and Saudi Arabia. I told him about visiting
Mohammed and Monsoor, another teaching colleague and friend, in Karachi
and Islamabad. He inquired about my blog and my political opinions
expressed in my writings. The questions involved every aspect of my
life. I only answered in limited fashion. I informed him that I felt I
was being illegally held, that I wanted a lawyer, and that I wanted to
know what was happening to my wife. He became obviously irritated. I
finished my food as fast as I could.
He got up, picked up the tray, and left the room. As soon as he left
the strobe light and loud punk music filled the room. I found a corner
of the room, sat down, put my hands over my ears and closed my eyes. I
don’t know how long this assault lasted, but the room went dark and
silent at some point in time. I sat in the dark for a long time. Then
the door opened, the lights went on, and I was instructed to stand up.
I was handcuffed and escorted out of the room. I was led to another
cell area, just as isolated as the previous cell, but this was lit with
high intensity lighting. There was no bench or furniture of any kind.
There was a bucket in the corner. The cell door was closed behind me
after I was nudged through the doorway.
I sat in a corner, away from the bucket. I could smell feces and urine
coming from the bucket. It had been in the bucket for some time and the
odors filled the room. I tried to ignore the stench. Closing my eyes,
and holding my hands over them, I tried to shut out the
over-stimulation of the high intensity lighting. I was in the room,
alone, without water, food or comfort for a long time. I occasionally
got up to relieve my bladder. I eventually had to use the bucket for a
bowel movement, but there was no toilet paper. I had to deal with the
discomfort of going without the amenities of daily hygiene. No one came
to look in on me.
It was not until I was totally exhausted that I was able to sleep. But
without the use of my CPAP machine, it was not a restful sleep. My
sleep apnea kept me from getting any real rest. Still, no one came to
look in on me. At times I got up and walked around, just to keep my
muscles from aching and cramping. Each time I reached a point of
exhaustion I would drop off into an un-restful sleep. The odors from
the bucket only bothered me when I used it to relieve myself and the
use would stir up its contents. I measured time the best way I could by
keeping track how full the bucket was getting. Still, I had no idea how
long I had been in this cell, how long I had been left alone, or when I
had last eaten. I was thirsty and my throat was parched. My nostrils
were dried out and that made my breathing more difficult during those
periods when I did sleep. I had not taken any of my blood pressure
medications since just before going to bed on the night that these
folks had raided my home.
My thoughts ventured to my wife and my dog. I wondered what was
happening to them. I broke down into tears several times, wondering if
my wife was suffering or being treated in the same manner they were
treating me. I wondered what they did to my dog. Was he being held at a
kennel? Had they left him alone in his crate? Again, I became exhausted
and fell into yet another un-restful sleep.
I was awakened by the sound of people approaching the cell. The door
opened and I was escorted back to the room where I had been attacked
with the tazer. I was instructed to sit down and I was chained to the
table. I realized at that moment that I had been handcuffed all the
time I had been in the brightly lit cell with the nauseating bucket. I
sat alone for a long time, then the strobe light and music began. My
mind was reeling and I screamed for it to stop, but it continued for
some time.
The door opened, the strobe light and music stopped, and a man that I
had not seen before came into the room. I was again questioned about
all the things the FBI man had asked me. I was also asked about various
files and writings that were found on my computers that were
confiscated from my home. The man refused to answer any of my questions
regarding my wife, my dog, or anything to do with time or date. My
requests for a lawyer were ignored. After a long period of questioning
the man got up and left.
A short while later the same group of people that I had struggled with
before entered the room, including the two women. I was unchained and
released from the handcuffs. They instructed me to remove the jumpsuit.
After complying with the request, everyone but the two women left the
room. I was instructed to stand against the rear wall, facing the
women. I stood there while the women made comments about my appearance,
smell and lack of hygiene. I tried to ignore them, but I knew that
their presence was embarrassing and frustrating. After an eternity of
embarrassment, they left. Another man, this one dressed in military
police garb, entered the room and placed me in handcuffs. He escorted
me to an area where there were toilets and showers. I was allowed to
clean myself up, brush my teeth with a bare toothbrush, and shower. I
was given a clean jumpsuit, this one without the label “TERRORIST” on
it.
After cleaning up and showering, I was escorted to a cell that had a
bench, a working toilet, and a small window that allowed some natural
light. I could see that it was daytime, but I could not tell if it was
morning or afternoon. I lied down on the bench and drifted off to yet
another un-restful sleep, not knowing how long I had been held, or how
long I would be held. I did not know why I was being held. I did not
have any contact with my friends, family or colleagues. I had not been
able to call my job and let them know what was happening. I did not
know where my wife was, or how she was being treated. I had done
nothing wrong. I was not a terrorist and I had no contacts with
terrorists. Yet, I was a prisoner without recourse, with all my rights
being denied, and being deprived of all the basics of daily living.
--------------
The foregoing story is fictional. However, given the realities of
domestic
spying, indefinite detention of accused persons, denial of legal
representation, wiretapping and data mining, and the broad powers that
are being claimed and exercised by the Bush administration, it could
become reality. Our Constitutional rights are under assault in the name
of power, control and an exaggerated sense of danger. The terrorists
that seek to do us harm are winning the war against terror because they
have provided those with a fascist ideology to create climates where we
are not only deprived of our fundamental liberties and rights, but many
of us are convinced that these folks are right to do so. We must
understand that what George W. Bush has done is exactly what our
forefathers and framers of the Constitution feared. Liberty, justice
and rights are under attack in these United States of America, and it
is our own leaders that are attacking.
Please pass this along… We need to get the word out and tell our
leaders that we want a reasonable level of security, but not at the
complete sacrifice of our privacy, rights, liberties justice and our
first principles
=======================
56. She Gives
Bodies Their Faces Back - Coroners in L.A. and Orange
counties turn to the Huntington Beach artist when seeking an ID. 'It's
amazing how close she gets,' says one. - By Susana Enriquez, Los
Angeles Times - Jan 9, 2006
Source
Next Contents
Marilyn Droz draws dead people.
During her three hours with a corpse, she looks at the hair follicles
to help her establish a missing hairline. She analyzes clothing to help
determine the person's build. She pulls out a ruler and measures the
distance between the eyes, nose and mouth. She peels back the eyelids
and lips to see the eyes and teeth.
"They're like putting complicated puzzles together," said Droz,
59.
Droz is the person the coroners in Los Angeles and Orange counties turn
to when they can't identify a body. Through her sketches, she erases
injuries and decomposition.
"You need something that looks alive, that isn't going to be disturbing
to the family when they see the person in the newspaper," Droz said.
"Putting up the actual picture of someone [dead] is going to be more
disturbing to a loved one, as opposed to a portrait."
The Huntington Beach resident is among a handful of artists who work
for law enforcement agencies around the country drawing bodies, said
Karen Taylor, a forensic art instructor at the FBI Academy in Virginia
who has sketched thousands of John and Jane Does.
Droz works mostly with the LAPD and several Orange County police
departments drawing composite sketches of criminals. Postmortem drawing
is a niche within the field of forensic art that requires an
understanding of anatomy, Taylor said.
Although some agencies release photographs of the deceased, others
consider the practice taboo.
"It seems to us to be more dignified to do it in a hand drawing," said
Bruce Lyle, Orange County's assistant chief deputy coroner. "If we have
a better option, why not use it? Why push the issue?"
Lyle said counties interpreted the laws that govern the release of
coroner photos differently.
In Orange County, the coroner releases photos only for trials and
teaching forensics. The coroner's website has nearly 50 John and Jane
Does dating from 1970, 16 of which were drawn by Droz.
A sketch depicting how a person may have looked is helpful, Lyle said,
because the Doe may not be recognizable because of injuries, exposure
to extreme temperatures, decomposition or scavenging insects or animals.
If the person is missing a nose, Lyle said, Droz can draw one, based on
other features. To keep a corpse's odor at bay, she dabs medicated
ointment below her nostrils.
The Los Angeles County coroner's office, which has hundreds of Does on
its website, posts photographs unless the person was shot in the head
or the body is extremely decomposed, said coroner's investigator Gilda
Tolbert.
In those situations, the agency posts descriptions of the person's
clothing, jewelry and tattoos, or they call Droz, who has helped in the
identification of several of the county's Does.
This week, Droz got a message from Tolbert saying a John Doe she had
sketched in July had been identified. In that case, Droz reconstructed
the face of the teenage boy, whose skeleton was found in the chimney of
a vacant South Los Angeles building in March.
A woman who saw the drawing called and said the boy resembled her
nephew, who had been missing since 1977. DNA testing proved it was him.
"It's amazing how close she gets," Tolbert said. "She's good."
Droz sketched her first John Doe in 1981, a man who had been shot with
a hunting arrow in Huntington Beach. "I'm sure I was terrified," she
said.
In the years that followed, she drew a John Doe who was found in a
plastic bag floating in a pond and another who was burned after he was
killed. Because she was able to see past the swollen and charred faces
of the men and sketch something remarkably close to what they looked
like before they died, both were identified.
"It feels good when you know you helped a family have closure," Droz
said. A few years ago, the family of a Brea man asked for her drawing
as a keepsake.
Although her work with the dead has diminished because of the advent of
a statewide automated identification system that stores criminals'
fingerprints, Droz still sketches about five per year.
Many Does, she said, remain unidentified because they are transients
from out of state or undocumented immigrants.
A recent subject was Orange County's latest John Doe.
In October, the Asian man, estimated to be 16 to 29 years old, was
killed when hit by a car on Pacific Coast Highway in Huntington Beach.
As she reviewed her sketch months later, she realized she had
accidentally drawn him with a lazy eye.
"It looked right to me when I was doing it," she said. "You can get so
intent on getting the bone structure and the hairline right and then
mess up on something simple, like centering the eye."
=======================
57. Press
Release -
Ministry launches biometric payment pilot - Jan 6,
2006
Source
Next Contents
(BNamericas.com Via Thomson Dialog NewsEdge)Bolivia's finance ministry
began on Friday (Jan 6) a pilot program using a biometric system to
govern salary payments to its employees, with the first user being
finance minister Waldo Gutirrez, treasury director Liliana Riveros told
BNamericas.
The system has proved necessary because regular payment by depositing
checks in employees' accounts is subject to various forms of fraud,
such as employees claiming extra checks using false identities.
In March or April, when the pilot program is concluded, the biometric
system will be used to pay out the salaries of some 200,000 civil
servants and 160,000 pensioners, who will identify themselves by
fingerprint in order to receive their salary or pension.
The system uses Identix hardware along with applications developed
internally at the ministry in order to reduce the overall system cost,
said Riveros.
Some 30 biometric scanners are currently in place at government
agencies, but when the system is fully operational it will include 56
points of payment nationwide, many with multiple scanners. This is by
virtue of a contract signed between the Bolivian government and three
private banks, which have also made a significant investment in the
system, said Riveros.
The biometric system is designed to ensure transparency in the
disbursement of public funds by avoiding fraud, thus allowing the
country to take a great leap forward in the modernization of the
government, Gutirrez was quoted as saying in local daily Los Tiempos.
In addition, it is expected to reduce waiting times, speed up the
process of authorizing payments and lower printing and logistics
expenses.
===========================
58. Are we heading
for a serious identity crisis? - by David Berlind - ZD Net - Jan 9,
2006
Source
Next Contents
If you've been following our series on Digital Restrictions Management
(DRM) [sic], then you know that DRM is wall-building material when it
comes to turning the Internet into a bunch of segregated nets or
"walled-gardens." Apple has it's walled garden consisting of the
iTunes Music Store (as a source of content) and compatible end-user
devices (iTunes software, iPods, etc.). Microsoft has it's
walled-garden with it's own sources and compatible devices.
Sony. Now
Google. And so on. In a 'bout of may the best stovepipe
win, the
DRM-politico structure of the industry is returning the industry to the
stovepipe structure that the Internet's core protocol (TCP/IP) once
promised to eliminate. The situation has folks like Doc Searls —
one
of the more sane voices that I've heard in this digital age —
thoroughly depressed. Simply put, DRM is a vendor lock-in control
point. With patents to back the various flavors up, DRM is
potentially
the key to the next monoculture (should one win) — a monoculture that
is far more dangerous and that stretches its tentacles into far more of
society than just the computing parts. Telecommunications for
example. Your cell phones. Your stereos and
televisions. Your car.
This is nothing new for the computer industry. For ever and ever,
vendors have worked their way up from the bottom of the most popular
software stacks looking for a control point that makes them the
toll-taker. TCP/IP withstood the assault to be extended in a
proprietary fashion. Going up a layer in the stack, so too has
the Web
(HTTP). Although a layer higher where the applications (the
browsers)
sit, havoc has been wrough (yielding what is essentially incompatible
Webs). DRM is just another one of those control points in
another
laye of the "stack." Own the control point, and the rest of the
stack
follows. At CES last week, Google co-founder Larry Page summed it
up
rather nicely. "It" being the key to winning the masses over to
one
form of DRM or the other — perhaps giving one DRM provider the keys to
the stack. In response to a question about the Google-specific
DRM
that will no doubt be a part of Google distribution pacts like the one
the search giant inked with CBS, Page said:
There are a bunch of details about that; I remember some of them, but
they're not important. What we've seen with iTunes is that having
a
pretty good user experience is important.
Page is 100 percent correct. What Apple has proven with the way
it has
integrated its iTunes Music Store with the Internet, iTunes software
(for Windows or OS X) and its iPods (and to some extent the iTunes
phones from Motorola) is that if you can build an absolutely pristine
user experience, people will take whatever drug goes with it no
questions asked. Today, Fairplay — Apple's form of DRM — is that
drug. And it's very addicting. Most people who are addicted
to
Fairplay-protected content (purchased through the iTunes Music Store)
have no idea how difficult it will be to exit Apple's walled garden
should they choose to do so down the road (for example, if the latest
greatest coolest hippest device that everyone must have isn't
sprinkled with Apple's holy water).
DRM is rough stuff. But what most people don't realize is that
even
rougher than DRM (if you ask me), is the layer in the stack that lies
just below it. The foundation on which the DRM walled gardens
sit. The
identity layer. Today, DRM is invariably based on your identity: some
key token or combination of tokens like your e-mail address and a
credit card that affirms your uniqueness from everyone else out there
in userland. And if you think all the different DRM schemes are
incompatible with other, try imagining the identity management systems
that lie underneath them. In referring to the un-interwinable
nature
of Windows, Sun CEO Scott McNealy used to refer to Microsoft's
platforms as a hairball. One that couldn't be disentangled. The
various DRM schemes and the identity systems to which they're bound are
the new hairballs; in some ways, an identity crisis in the making.
But lest you think that this is the only pending crisis that's routed
in our idenity, there are others. They've always been there, but
the
light bulb really went off when I started getting suggestions for
discussion topics for the upcoming Mashup Camp that Doug Gold and I are
organizing (by the way, although it's still very much under
construction, Mashup Camp's Web site is up and running). Mashups
are a
new breed of software that play the starring role in what I'm calling
the uncomputer. Or for some, maybe it's Computer 2.0. Many refer
to it
as Web 2.0, but I don't buy that because HTTP — the protocol that makes
the Web tick — hasn't changed in years.
When the proposed discussion topics started rolling in (there are
already 14), one of them was yelling "hello" at me. Not "hello" like
"Hi there big fella." It was more like "Hellooooooo… did you not
see
me crossing the friggin' street!" Identity? What does
identity have
to do with mashups? As it turns out, a lot. Sure, most of
the current
breed of mashups have no concept of identity. But, the mashup
ecosystem is just getting started. Judging by some of the Mashup
Camp
attendees that I've been in touch with, there's real interest in
mashing up mission critical enterprise applications — the kind where
identity management is a pre-requisite. That got me to
thinkin'. What
happens if the two systems a developer is trying to mash together into
an identity-aware mashup use two completely different identity
management schemes? Back in the 1999/2000 timeframe, when one of
my
responsibilities was to oversee the integratation of Web sites like job
matchmaker Dice.com into ZDNet (two sites that are identity-aware),
reconciling their incompatible namespaces was an impossible task that
require a significant amount of custom development. Now, I'm just
trying to imagine this sort of integration — mashup style — for the
masses (of mashup developers) and I don't see identity aware systems
getting bolted together as easily as the first wave of mashups were
hooked up.
Let me rephrase: Is DRM simply a blade on the identity management
system razor and are there a whole bunch of other blades that we're not
paying attention to?
===========================
59. Fake
fingers no match for scanner's electronic nose - New Scientist - by
Celeste Biever - Jan 10, 2006
Source
Next Contents
Fingerprint
scanners can be fooled by fake fingers made of silicone, so experts are
working on an e-nose that can identify the aroma of human skin
FINGERPRINT
scanners, increasingly used for everything from improving security at
airports to preventing cellphone theft, can be fooled by fake fingers
made of silicone, gelatine and even Play-Doh. Biometrics experts are
working on ways to beat the fraudsters, and one of the latest takes a
sensuous approach: an "electronic nose" that can distinguish the unique
aroma of human skin.
Electronic noses are often used to monitor
pollution and to determine whether food is spoilt. They contain a metal
oxide film the electrical properties of which change when certain gas
molecules pass over it. Different metal oxides react to different
gases.
Now Davide Maltoni at the University of Bologna in Italy
suggests placing noses inside fingerprint scanners, next to the optical
device that images the fingerprint, to detect the volatile molecules
exuded by human skin. To test the idea, he used an off-the-shelf
electronic nose based on a single metal oxide ...
==============================
60. We lost the
war. Welcome to the world of tomorrow - Du Chaos Computer Club
by
Frank Rieger - Jan 10, 2006
Source
Next Contents
Losing a war is never a pretty situation. So it is
no wonder that most people do not like to acknowledge that we have
lost. We had a reasonable chance to tame the wild beast of universal
surveillance technology, approximately until september 10th, 2001. One
day later, we had lost. All the hopes we had, to keep the big
corporations and “security forces” at bay and develop interesting
alternative concepts in the virtual world, evaporated with the smoke
clouds of the World Trade Center.
Just right before, everything looked not too bad. We had survived Y2K
with barely a scratch. The world’s outlook was mildly optimistic after
all. The “New Economy” bubble gave most of us fun things to do and the
fleeting hope of plenty of cash not so far down the road. We had won
the Clipper-Chip battle, and crypto-regulation as we knew it was a
thing of the past. The waves of technology development seemed to work
in favor of freedom, most of the time. The future looked like a yellow
brick road to a nirvana of endless bandwith, the rule of ideas over
matter and dissolving nation states. The big corporations were at our
mercy because we knew what the future would look like and we had the
technology to built it. Those were the days. Remember them for your
grandchildren’s bedtime stories. They will never come back again.
We are now deep inside the other kind of future, the
future that we speculated about as a worst case scenario, back then.
This is the ugly future, the one we never wanted, the one that we
fought to prevent. We failed. Probably it was not even our fault. But
we are forced to live in it now.
Democracy is already over
By its very nature the western democracies have become
a playground for lobbyists, industry interests and conspiracies that
have absolutely no interest in real democracy. The “democracy show”
must go on nonetheless. Conveniently, the show consumes the energy of
those that might otherwise become dangerous to the status quo. The show
provides the necessary excuse when things go wrong and keeps up the
illusion of participation. Also, the system provides organized and
regulated battleground rules to find out which interest groups and
conspiracies have the upper hand for a while. Most of the time it
prevents open and violent power struggles that could destabilize
everything. So it is in the best interest of most players to keep at
least certain elements of the current “democracy show” alive. Even for
the more evil conspiracies around, the system is useful as it is.
Certainly, the features that could provide unpleasant surprises like
direct popular votes on key issues are the least likely to survive in
the long run.
Of course, those in power want to minimize the
influence of random chaotic outbursts of popular will as much as
possible. The real decisions in government are not made by ministers or
the parliament. The real power of government rests with the
undersecretaries and other high-level, non-elected civil servants who
stay while the politicians come and go. Especially in the bureaucracies
of the intelligence agencies, the ministry of interior, the military,
and other key nodes of power the long-term planning and decision-making
is not left to the incompetent mediocre political actors that get
elected more or less at random. Long term stability is a highly valued
thing in power relations. So even if the politicians of states suddenly
start to be hostile to each other, their intelligence agencies will
often continue to cooperate and trade telecommunication interception
results as if nothing has happened.
Let’s try for a minute to look at the world from the
perspective of such an 60-year-old bureaucrat that has access to the
key data, the privilege to be paid to think ahead, and the task to
prepare the policy for the next decades. What he would see, could look
like this : ?
First,
paid manual labor will be eaten away further by
technology, even more rapidly than today. Robotics will evolve far
enough to kill a sizeable chunk of the remaining low-end manual jobs.
Of course, there will be new jobs, servicing the robots, biotech,
designing stuff, working on the nanotech developments etc. But these
will be few, compared with today, and require higher education.
Globalization continues its merciless course and will also export a lot
of jobs of the brain-labor type to India and China, as soon as
education levels there permit it.
So the western societies will end up with a large
percentage of population, at least a third, but possibly half of those
in working age, having no real paid work. There are those whose talents
are cheaper to be had elsewhere, those who are more inclined to manual
labor. Not only the undereducated but all those who simply cannot find
a decent job anymore. This part of the population needs to be pacified,
either by Disney or by Dictatorship, most probably by both. The
unemployment problem severely affects the ability of states to pay for
social benefits. At some point it becomes cheaper to put money into
repressive police forces and rule by fear than put the money into
pay-outs to the unemployed population and buy the social peace.
Criminal activities look more interesting when there is no decent job
to be had. Violence is the unavoidable consequence of degrading social
standards. Universal surveillance might dampen the consequences for
those who remain with some wealth to defend. ?
Second,
climate change increases the frequency and devastation
of natural disasters, creating large scale emergency situations.
Depending on geography, large parts of land may become uninhabitable
due to draught, flood, fires or plagues. This creates a multitude of
unpleasant effects. A large number of people need to move, crop and
animal production shrinks, industrial centers and cities may be damaged
to the point where abandoning them is the only sensible choice left.
The loss of property like non-usable (or non-insurable) real estate
will be frightening. The resulting internal migratory pressures towards
“safe areas” become a significant problem. Properly trained personal,
equipment, and supplies to respond to environmental emergencies are
needed standby all the time, eating up scarce government resources. The
conscript parts of national armed forces may be formed into disaster
relief units as they hang around anyway with no real job to do except
securing fossil energy sources abroad and helping out the border police.
Third,
immigration pressure from neighboring regions will
raise in all western countries. It looks like the climate disaster will
strike worst at first in areas like Africa and Latin America and the
economy there is unlikely to cope any better than the western countries
with globalization and other problems ahead. So the number of people
who want to leave from there to somewhere inhabitable at all costs will
rise substantially. The western countries need a certain amount of
immigration to fill up their demographic holes but the number of people
who want to come will be far higher. Managing a controlled immigration
process according to the demographic needs is a nasty task where things
can only go wrong most of the time. The nearly unavoidable reaction
will be a Fortress Europe : serious border controls and
fortifications,
frequent and omnipresent internal identity checks, fast and merciless
deportation of illegal immigrants, biometrics on every possible corner.
Technology for border control can be made quite efficient once ethical
hurdles have fallen.
Fourth,
at some point in the next decades the energy crisis
will strike with full force. Oil will cost a fortune as production
capacities can no longer be extended economically to meet the rising
demand. Natural gas and coal will last a bit longer, a nuclear
renaissance may dampen the worst of the pains. But the core fact
remains : a massive change in energy infrastructure is
unavoidable.
Whether the transition will be harsh, painful and society-wrecking, or
just annoying and expensive depends on how soon before peak oil the
investments into new energy systems start on a massive scale as oil
becomes to expensive to burn. Procrastination is a sure recipe for
disaster. The geo-strategic and military race for the remaining large
reserves of oil has already begun and will cost vast resources.
Fifth,
we are on the verge of technology developments that may
require draconic restrictions and controls to prevent the total
disruption of society. Genetic engineering and other biotechnology as
well as nanotechnology (and potentially free energy technologies if
they exist) will put immense powers into the hands of skilled and
knowledgeable individuals. Given the general raise in paranoia, most
people (and for sure those in power) will not continue to trust that
common sense will prevent the worst. There will be a tendency of
controls that keep this kind of technology in the hands of
“trustworthy” corporations or state entities. These controls, of
course, need to be enforced, surveillance of the usual suspects must be
put in place to get advanced knowledge of potential dangers. Science
may no longer be a harmless, self-regulating thing but something that
needs to be tightly controlled and regulated, at least in the critical
areas. The measures needed to contain a potential global pandemic from
the Strange Virus of the Year are just a subset of those needed to
contain a nanotech or biotech disaster.
Now what follows from this view of the world ?
What
changes to society are required to cope with these trends from the
viewpoint of our 60-year-old power brokering bureaucrat ?
Strategically it all points to massive investments into
internal security.
Presenting the problem to the population as a mutually exclusive choice
between an uncertain dangerous freedom and an assured survival under
the securing umbrella of the trustworthy state becomes more easy the
further the various crises develop. The more wealthy parts of the
population will certainly require protection from illegal immigrants,
criminals, terrorists and implicitly also from the anger of less
affluent citizens. And since the current system values rich people more
then poor ones, the rich must get their protection. The security
industry will certainly be of happy helpful assistance, especially
where the state can no longer provide enough protection for the taste
of the lucky ones.
Traditional democratic values have been eroded to the
point where most people don’t care anymore. So the loss of rights our
ancestors fought for not so long ago is at first happily accepted by a
majority that can easily be scared into submission. “Terrorism” is the
theme of the day, others will follow. And these “themes” can and will
be used to mold the western societies into something that has never
been seen before : a democratically legitimated police state,
ruled by
an unaccountable elite with total surveillance, made efficient and
largely unobtrusive by modern technology. With the enemy (immigrants,
terrorists, climate catastrophe refugees, criminals, the poor, mad
scientists, strange diseases) at the gates, the price that needs to be
paid for “security” will look acceptable.
Cooking up the “terrorist threat” by apparently stupid
foreign policy and senseless intelligence operations provides a
convenient method to get through with the establishment of a
democratically legitimized police state. No one cares that car
accidents alone kill many more people than terrorists do. The fear of
terrorism accelerates the changes in society and provides the means to
get the suppression tools required for the coming waves of trouble.
What we call today “anti-terrorism measures” is the
long-term planned and conscious preparation of those in power for the
kind of world described above.
The Technologies of Oppression
We can imagine most of the surveillance and oppression
technology rather well. Blanket CCTV coverage is reality in some cities
already. Communication pattern analysis (who talks to whom at what
times) is frighteningly effective. Movement pattern recording from
cellphones, traffic monitoring systems, and GPS tracking is the next
wave that is just beginning. Shopping records (online, credit and
rebate cards) are another source of juicy data. The integration of all
these data sources into automated behavior pattern analysis currently
happens mostly on the dark side.
The key question for establishing an effective
surveillance based police state is to keep it low-profile enough that
“the ordinary citizen” feels rather protected than threatened, at least
until all the pieces are in place to make it permanent. First principle
of 21st century police state : All those who “have nothing to
hide”
should not be bothered unnecessarily. This goal becomes even more
complicated as with the increased availability of information on even
minor everyday infringements the “moral” pressure to prosecute will
rise. Intelligence agencies have always understood that effective work
with interception results requires a thorough selection between cases
where it is necessary to do something and those (the majority) where it
is best to just be silent and enjoy.
Police forces in general (with a few exceptions) on the
other hand have the duty to act upon every crime or minor infringement
they get knowledge of. Of course, they have a certain amount of
discretion already. With access to all the information outlined above,
we will end up with a system of selective enforcement. It is impossible
to live in a complex society without violating a rule here and there
from time to time, often even without noticing it. If all these
violations are documented and available for prosecution, the whole
fabric of society changes dramatically. The old sign for totalitarian
societies - arbitrary prosecution of political enemies - becomes a
reality within the framework of democratic rule-of-law states. As long
as the people affected can be made looking like the enemy-”theme” of
the day, the system can be used to silence opposition effectively. And
at some point the switch to open automated prosecution and policing can
be made as any resistance to the system is by definition “terrorism”.
Development of society comes to a standstill, the rules of the law and
order paradise can no longer be violated.
Now disentangling ourselves from the reality tunnel of
said 60-year-old bureaucrat, where is hope for freedom, creativity and
fun ? To be honest, we need to assume that it will take a couple
of
decades before the pendulum will swing back into the freedom direction,
barring a total breakdown of civilization as we know it. Only when the
oppression becomes to burdensome and open, there might be a chance to
get back to overall progress of mankind earlier. If the powers that be
are able to manage the system smoothly and skillfully, we cannot make
any prediction as to when the new dark ages will be over.
So what now ?
?
Move to the mountains, become a gardener or carpenter, search for
happiness in communities of like minded people, in isolation from the
rest of the world ? The idea has lost its charm for most who ever
honestly tried. It may work if you can find eternal happiness in
milking cows at five o’clock in the morning. But for the rest of us,
the only realistic option is to try to live in, with, and from the
world as bad it has become. We need to built our own communities
nonetheless, virtual or real ones.
The politics & lobby game
So where to put your energy then ? Trying to play
the
political game, fighting against software patents, surveillance laws,
and privacy invasions in parliament and the courts can be the job of a
lifetime. It has the advantage that you will win a battle from time to
time and can probably slow things down. You may even be able to prevent
a gross atrocity here and there. But in the end, the development of
technology and the panic level of the general population will chew a
lot of your victories for breakfast.
This is not to discount the work and dedication of
those of us who fight on this front. But you need to have a lawyers
mindset and a very strong frustration tolerance to gain satisfaction
from it, and that is not given to everyone. We need the lawyers
nonetheless.
Talent and Ethics
Some of us sold their soul, maybe to pay the rent when
the bubble bursted and the cool and morally easy jobs became scarce.
They sold their head to corporations or the government to built the
kind of things we knew perfectly well how to built, that we sometimes
discussed as a intellectual game, never intending to make them a
reality. Like surveillance infrastructure. Like software to analyze
camera images in realtime for movement patterns, faces, license plates.
Like data mining to combine vast amounts of information into graphs of
relations and behavior. Like interception systems to record and analyze
every single phone call, e-mail, click in the web. Means to track every
single move of people and things.
Thinking about what can be done with the results of
one’s work is one thing. Refusing to do the job because it could be to
the worse of mankind is something completely different. Especially when
there is no other good option to earn a living in a mentally
stimulating way around. Most projects by itself were justifiable, of
course. It was “not that bad” or “no real risk”. Often the excuse was
“it is not technical feasible today anyway, it’s too much data to store
or make sense from”. Ten years later it is feasible. For sure.
While it certainly would be better when the
surveillance industry would die from lack of talent, the more realistic
approach is to keep talking to those of us who sold their head. We need
to generate a culture that might be compared with the sale of
indulgences in the last dark ages : you may be working on the
wrong
side of the barricade but we would be willing to trade you private
moral absolution in exchange for knowledge. Tell us what is happening
there, what the capabilities are, what the plans are, which gross
scandals have been hidden. To be honest, there is very little what we
know about the capabilities of todays dark-side interception systems
after the meanwhile slightly antiquated Echelon system had been
discovered. All the new stuff that monitors the internet, the current
and future use of database profiling, automated CCTV analysis, behavior
pattern discovery and so on is only known in very few cases and vague
outlines.
We also need to know how the intelligence agencies work
today. It is of highest priority to learn how the “we rather use
backdoors than waste time cracking your keys”-methods work in practice
on a large scale and what backdoors have been intentionally built into
or left inside our systems. Building clean systems will be rather
difficult, given the multitude of options to produce a backdoor -
ranging from operating system and application software to hardware and
CPUs that are to complex to fully audit. Open Source does only help in
theory, who has the time to really audit all the source anyway...
Of course, the risk of publishing this kind of
knowledge is high, especially for those on the dark side. So we need to
build structures that can lessen the risk. We need anonymous submission
systems for documents, methods to clean out eventual document
fingerprinting (both on paper and electronic). And, of course, we need
to develop means to identify the inevitable disinformation that will
also be fed through these channels to confuse us.
Building technology to preserve the options for change
We are facing a unprecedented onslaught of surveillance
technology. The debate whether this may or may not reduce crime or
terrorism is not relevant anymore. The de-facto impact on society can
already be felt with the content mafia (aka. RIAA) demanding access to
all data to preserve their dead business model. We will need to build
technology to preserve the freedom of speech, the freedom of thought,
the freedom of communication, there is no other long-term solution.
Political barriers to total surveillance have a very limited half-life
period.
The universal acceptance of electronic communication
systems has been a tremendous help for political movements. It has
become a bit more difficult and costly to maintain secrets for those in
power. Unfortunately, the same problem applies to everybody else. So
one thing that we can do to help societies progress along is to provide
tools, knowledge and training for secure communications to every
political and social movement that shares at least some of our ideals.
We should not be too narrow here in choosing our friends, everyone who
opposes centralistic power structures and is not geared towards
totalitarism should be welcome. Maintaining the political breathing
spaces becomes more important than what this space is used for.
Anonymity will become the most precious thing.
Encrypting communications is nice and necessary but helps little as
long as the communication partners are known. Traffic analysis is the
most valuable intelligence tool around. Only by automatically looking
at communications and movement patterns, the interesting individuals
can be filtered out, those who justify the cost of detailed
surveillance. Widespread implementation of anonymity technologies
becomes seriously urgent, given the data retention laws that have been
passed in the EU. We need opportunistic anonymity the same way we
needed opportunistic encryption. Currently, every anonymization
technology that has been deployed is instantly overwhelmed with file
sharing content. We need solutions for that, preferably with systems
that can stand the load, as anonymity loves company and more traffic
means less probability of de-anonymization by all kinds of attack.
Closed user groups have already gained momentum in
communities that have a heightened awareness and demand for privacy.
The darker parts of the hacker community and a lot of the warez trading
circles have gone “black” already. Others will follow. The technology
to build real-world working closed user groups is not yet there. We
have only improvised setups that work under very specific
circumstances. Generic, easy to use technology to create fully
encrypted closed user groups for all kinds of content with comfortable
degrees of anonymity is desperately needed.
Decentralized infrastructure is the needed. The
peer-to-peer networks are a good example to see what works and what
not. As long as there are centralized elements they can be taken down
under one pretext or another. Only true peer-to-peer systems that need
as little centralized elements as possible can survive. Interestingly,
tactical military networks have the same requirements. We need to
borrow from them, the same way they borrow from commercial and open
source technology.
Design stuff with surveillance abuse in mind is the
next logical step. A lot of us are involved into designing and
implementing systems that can be abused for surveillance purposes. Be
it webshop systems, databases, RFID systems, communication systems, or
ordinary Blog servers, we need to design things as safe as possible
against later abuse of collected data or interception. Often there is
considerable freedom to design within the limits of our day jobs. We
need to use this freedom to build systems in a way that they collect as
little data as possible, use encryption and provide anonymity as much
as possible. We need to create a culture around that. A system design
needs to be viewed by our peers only as “good” if it adheres to these
criteria. Of course, it may be hard to sacrifice the personal power
that comes with access to juicy data. But keep in mind, you will not
have this job forever and whoever takes over the system is most likely
not as privacy-minded as you are. Limiting the amount of data gathered
on people doing everyday transactions and communication is an absolute
must if you are a serious hacker. There are many good things that can
be done with RFID. For instance making recycling of goods easier and
more effective by storing the material composition and hints about the
manufacturing process in tags attached to electronic gadgets. But to be
able to harness the good potential of technologies like this, the
system needs to limit or prevent the downside as much as possible, by
design, not as an afterthought.
Do not compromise your friends with stupidity or
ignorance will be even more essential. We are all used to the minor
fuckups of encrypted mail being forwarded unencrypted, being careless
about other peoples data traces or bragging with knowledge obtained in
confidence. This is no longer possible. We are facing an enemy that is
euphemistically called “Global Observer” in research papers. This is
meant literally. You can no longer rely on information or communication
being “overlooked” or “hidden in the noise”. Everything is on file.
Forever. And it can and will be used against you. And your “innocent”
slip-up five years back might compromise someone you like.
Keep silent and enjoy or publish immediately may become
the new mantra for security researchers. Submitting security problems
to the manufacturers provides the intelligence agencies with a long
period in which they can and will use the problem to attack systems and
implant backdoors. It is well known that backdoors are the way around
encryption and that all big manufacturers have an agreement with the
respective intelligence agencies of their countries to hand over
valuable “0 day” exploit data as soon as they get them. During the
months or even years it takes them to issue a fix, the agencies can use
the 0 day and do not risk exposure. If an intrusion gets detected by
accident, no one will suspect foul play, as the problem will be fixed
later by the manufacturer. So if you discover problems, publish at
least enough information to enable people to detect an intrusion before
submitting to the manufacturer.
Most important : have fun ! The eavesdropping
people
must be laughed about as their job is silly, boring, and ethically the
worst thing to earn money with, sort of blackmail and robbing grandmas
on the street. We need to develop a “lets have fun confusing their
systems”-culture that plays with the inherent imperfections, loopholes,
systematic problems, and interpretation errors that are inevitable with
large scale surveillance. Artists are the right company for this kind
of approach. We need a subculture of “In your face, peeping tom”.
Exposing surveillance in the most humiliating and degrading manner,
giving people something to laugh about must be the goal. Also, this
prevents us from becoming frustrated and tired. If there is no fun in
beating the system, we will get tired of it and they will win. So let’s
be flexible, creative and funny, not angry, ideologic and stiff-necked.
=========================
61. Press
Release - Frost & Sullivan - Need for Enhanced Homeland
Security to Promote Uptake of Security Technologies - Jan 10, 2006
Source
Next Contents
LONDON, January 10 /PRNewswire/ -- Recent terrorist attacks across
Europe
have underlined the urgent need for the European Union (EU) to enhance
its
security capabilities, particularly at its borders. This is driving the
implementation of security technologies at major entry/exit points with
demand for biometric identification/authentication systems, radio
frequency
identification (RFID) and explosive detection systems projected to
surge over
the next decade.
"Technologies that can increase security capabilities and supply chain
efficiency as well as reduce costs at the same time are poised to
experience
significant demand growth over the next ten years," notes Frost &
Sullivan
(http://defense.frost.com)
Research Analyst Friso Buker.
For instance, biometrics will be more widely deployed at airports
for
passenger processing and electronic access control, as the technology
provides an opportunity to reduce labour costs while at the same time
maintaining, or even potentially increasing, security capabilities.
By 2014, the European homeland security technologies market
(comprising
biometrics, screening, RFID, unmanned aerial vehicles (UAV) and closed
circuit television (CCTV) technologies) is set to amass nearly EUR874.0
million.
Airports are expected to display significant demand for
identification/authentication and screening technologies from
2005-2014.
Seaports will exhibit notable uptake of screening technologies and
particularly, tracking technologies. Borders will generate the lowest
level
of demand for screening technologies in the first half of 2005-2014.
However,
the overall border demand will increase in the second half of this
period,
spurred on by the growing importance of UAVs.
The need to improve air travel security and facilitate economical
and
effective air passenger processing will promote the uptake of security
technologies, especially biometrics. The passage of key legislation
along
with standardisation efforts by industry associations are expected to
provide
further impetus to the biometrics market. Most EU national governments
have
already begun biometric procurement programmes, with companies
receiving
several sizeable contracts for biometric technologies.
Government receptivity is playing a central role in the more
widespread
implementation of biometric systems. At the same time, the
establishment of
standards and safeguards is supporting public awareness and acceptance
of
biometric technologies. Even as the biometric industry undergoes
significant
changes over the next ten years, manufacturers of RFID will benefit
from
their expanded use at European seaports.
For companies keen to leverage emergent growth opportunities in the
European homeland security market, a prospective pitfall that must be
avoided
is to use the US homeland security experience as a template for
entering the
European market. The EU market is unique, in terms of both overall
security
requirements and security funding.
"The level of funding, the number of stakeholders, the
identification of
decision-makers and the selection of strategic partnerships: all these,
and
more, are necessary to prevent failure in this expanding market,"
explains
Mr. Buker. "Without a true understanding of the hurdles that they need
to
overcome, market participants will struggle to achieve competitive
success."
As the market expands, small industry participants are likely to be
taken
over by different types of industry participants that, in turn, are
likely to
be acquired by other companies that may not have existing expertise in
the
homeland security market, but are looking to gain a foothold in this
lucrative industry.
Strategic partnerships and alliances with regional leaders will
advance
the prospects of potential market participants. Moreover, an in-depth
understanding of the regional market along with its particular business
idiosyncrasies will advance revenues in the long term.
If you are interested in a virtual brochure, which provides
manufacturers, end-users, and other industry participants an overview
of the
latest analysis of the European Homeland Security - A Market
opportunity
analysis (B447), then send an e-mail to Srividhya Parthasarathy,
Corporate
Communications, at sparthasarathy@frost.com
with the following information:
your full name, company name, title, telephone number, fax number and
e-mail
address. Upon receipt of the above information, an overview will be
sent to
you via e-mail.
Background
Frost & Sullivan, a global growth consulting company, has been
partnering
with clients to support the development of innovative strategies for
more
than 40 years. The company's industry expertise integrates growth
consulting,
growth partnership services and corporate management training to
identify and
develop opportunities. Frost & Sullivan serves an extensive
clientele that
includes Global 1000 companies, emerging companies, and the investment
community, by providing comprehensive industry coverage that reflects a
unique global perspective and combines ongoing analysis of markets,
technologies, econometrics, and demographics.
===================
62. Press
Release - Former META Group Analyst Mike
Rothman Launches Security Incite - Jan 10, 2006
Source
Next Contents
New analyst firm unveils 2006 views on information security and
provides businesses with thought-provoking analysis.
ATLANTA (PRWEB via PR Web Direct)
January 10, 2006 -- Former META Group analyst Mike Rothman today
launched Security Incite, a new analyst firm founded to offer bold,
thought-provoking and irreverent analysis of the information security
market. Coinciding with the launch of Security Incite, the firm has
published predictions and trends for the information security business
in 2006. These “Security Incites” are available on www.securityincite.com
and reflect the belief that the key macro-trend in security is
simplification.
Security Incite aims to bring technology research back to its
roots—objective and end-user centric. Offering a number of annual
subscription packages starting at the reasonable price of $1,350,
Security Incite provides detailed analyses of top-of-mind information
security issues. In addition to offering monthly reports to
subscribers, Security Incite also launched the Security Incite Rants
(SI Rants) blog, available at www.securityincite.com,
providing timely analysis of vendor and industry news to help wade
through the morass of daily news and announcements about information
security.
“The existing premium priced research model consisting of short
research notes, vendor quadrant rankings, and infrequent conversations
with analysts is not doing the job,” said Mike Rothman, president and
principal analyst of Security Incite. “End users are struggling. They
need more detailed information to help make their high profile security
initiatives successful. Security Incite provides detailed, action
oriented research to help subscribers make better decisions, execute
more effectively, and save time and money.”
End User Driven Incite:
Central to the company’s research model is The Incite Network, a group
of end users and VARs that provide early warning intelligence on key
issues of protecting corporate information. By discovering, analyzing
and sharing advice on key attack vectors and hacking techniques while
sharing best practices on how to protect those areas, The Incite
Network helps to make the Internet a safer place. As an added benefit,
Incite Network members get free access to Security Incite research.
Another unique Security Incite innovation is a community driven
research agenda. Weekly, via a polling capability on www.securityincite.com,
the community determines which announcement and news items get thorough
analysis. Quarterly, the community helps to refine the Security Incite
research agenda, offering direction on the topics included in detailed
monthly reports.
"Maintaining adequate security has gotten much harder over the past
five years," continued Rothman. "Users are confused and continue to
throw money at the problem with abysmal results. Security Incite helps
subscribers wade through the noise, focus on what’s important, spend
judiciously, and ultimately execute those high-profile projects
successfully.”
2006 Security Incites and Predictions:
As part of its ongoing research and analysis, the firm has published
its 2006 predictions and trends for the information security business,
focusing on the belief that the key macro-trend in security is
simplification.
“Whether talking about consolidating functions on a single hardware
platform, or embracing increasing homogeneity of infrastructure
equipment, the pendulum is swinging back towards integrated security
offerings and a select few dominant players,” said Rothman. “In times
of unprecedented complexity, increasingly narrow solutions are
frustrating users, who are clamoring for simple security solutions.
Vendors that focus on simplicity will win.”
First report will be on Identity Management:
Security Incite’s first detailed report will focus on the identity
management (IDM) market. This report will provide an overview of the
IDM market, and help subscribers to select the right product and set
the proper scope and expectations to ensure compelling ROI and improved
security. The report will also present best practices for
implementation and profile the key vendors in the IDM space in order to
streamline and accelerate IDM initiatives. The report will be available
in early February.
Members of the press will be offered full access to Security Incite
reports and Webcasts by registering in the press section of Security
Incite’s Web site. In addition, Mike Rothman is available to comment on
current events and announcements in the information security market.
About Security Incite:
Security Incite is an industry analyst firm specializing in the
information security market. By providing bold, thought-provoking and
irreverent analysis through the “Security Incite Rants” blog and
publishing detailed reports examining a different area of security each
month, Security Incite helps subscribers protect their information
assets more effectively by making better decisions. With research
driven by The Incite Network, a proprietary group of sources, Security
Incite provides timely, accurate, and above all else, actionable
research. For more information, visit www.securityincite.com.
===============================
63. Press Release -
Wave Systems on Winning Team with Operational Research Consultants,
Inc. for U.S. GSA Blanket Purchase Agreement Award - Jan 10,
2006
Source
Next Contents
LEE, Mass.--(BUSINESS WIRE)--Jan. 10, 2006--Wave Systems Corp. (Nasdaq:
WAVX - www.wave.com)
announced today that the company is teamed with Operational Research
Consultants, Inc. (ORC), a wholly owned subsidiary of WidePoint
Corporation (OTC BB: WDPT), in connection with the first Blanket
Purchase Agreement award issued under the new U.S. General Services
Administration (GSA) "Authentication Products and Services" Category
Special Item No. (SIN) 160 32, part of existing IT Schedule 70 (the
"ORC ACES BPA"). The ORC ACES BPA is an indefinite delivery/ indefinite
quantity (ID/IQ) program that has total ceiling value of $100 million.
Under the BPA award ORC will provide certified credentialing for
identity management solutions to federal, state and local governments.
In connection with an agreement between ORC and Wave, Wave expects ORC
to provide federal government authorized Access Certificates for
Electronic Services (ACES) capability, in combination with Wave's
Embassy(R) Trust Suite secure software technology for use with
compliant public key infrastructures. The terms upon which Wave will
participate in the project are subject to the completion of a
subcontract to be entered into between Wave and ORC.
The BPA
recognizes ORC as a fully operational ACES and Shared Services Provider
(SSP) as well as a provider of Homeland Security Presidential Directive
(HSPD-12) products and services. Further, the BPA also recognizes the
ORC team as the only provider of Personnel Identity Verification (PIV)
ready solutions for HSPD-12 products and services. The combined
products of ORC and Wave offer HSPD-12 ready solutions for both
"logical" and "physical" security.
"ORC is working with Wave
to make trusted computing solutions embedded with External Certificate
Authority (ECA) and ACES digital certificates available to all branches
of government," said Daniel Turissini, president of ORC. "The
combination of Wave's Embassy software technology integrated with ORC's
Trusted Third Party services provides another tool to ensure high
levels of Information Assurance technologies in the ongoing efforts to
protect personal information within the federal government."
"Authenticating a computer user into a network by using methods more
secure than passwords is a continuing effort for network administrators
within government and enterprises," said Steven Sprague, president and
CEO, Wave Systems. "With the ORC ACES BPA, government administrators
will now have easy access to Class 3 PKI certificates that can be used
within a Trusted Computing-based framework: a network of personal
computers secured by industry standard Trusted Platform Modules and
Wave's powerful and secure software technology."
==========================
64. Press Release -
2AB Inc. Announces Open Source Plans for jLock Scalable JAAS - Jan
10, 2006
Source
Next Contents
BIRMINGHAM, Ala.--(BUSINESS WIRE)--Jan. 10, 2006--2AB Inc., provider of
Access Management Solutions for Distributed Business, announces plans
to Open Source jLock, a scalable implementation of the Java
Authentication and Authorization Service (JAAS) with advanced features
for application-level security. Licensing options for the source
provide a choice between the GNU Public License (GPL) and a commercial
license.
jLock provides Java developers a robust, scalable solution to the
fine-grain access control requirements of business applications. jLock
supports the standard JAAS APIs while allowing support for ACL-list,
role-based, rules-based and entitlement-based access policies. jLock
also supports the ability to securely communicate and establish the
login context of the original user on the server side of a distributed
application. User and access policy management tools remove the burden
of embedding access policy and allow policy to be developed, managed,
evolved and audited without modification to the business logic.
The open source plans includes the JAAS implementation, the iLock
Security Center Service and the standard edition of the jLock
Administrative tools. This complete offering provides a scalable
implementation of JAAS with graphical Identity Management of Users,
Groups and Roles.
2AB will continue to offer and support the
jLock Power Edition product. Current commercial licensees of jLock will
be provided access to the source immediately. General availability of
the open source version is planned before the end of 1st quarter.
About 2AB:
2AB is a provider of Access Management Solutions for Distributed
Business(SM). Providing standards-based tools that make access
management simple to understand and easy to use by business developers
is a key goal of their access management products. 2AB's products
enable customers to meet the fine-grain access control requirements of
federal privacy and confidentiality legislation while maintaining
consistent, auditable access control policy across an enterprise that
includes diverse technology. Founded in 1997, 2AB is privately held and
headquartered in Shelby County, Alabama. For more information, please
see http://www.2ab.com.
==========================
65. Press
Release - (Euronext Brussels) - Supercom announces the award of a
tender for a biometric passport issuing and control system for a
western European country - Jan 10, 2006
<>Source
Next Contents
Project implementation expected to start in the first quarter of 2006
Qadima, Israel, January 10, 2006– SuperCom (OTCBB: SPCBF.OB; Euronext:
SUP), a leading provider of smart card and electronic identification
(e-ID) solutions, today announced an award of a tender to provide the
technology for a biometric passport issuing and control system for a
country in western Europe. The implementation of the project is
expected to start during first quarter of 2006.
The contract is for the implementation of a biometric passport issuing
and control system, and includes a six-year contract for maintenance
and support.
Mr. Eli Basson, SuperCom’s Vice President of International Projects and
Solutions said, “This is an important contract for SuperCom,
establishing a relationship with another European Government as a
client and validates SuperCom’s Magna platform for ID projects.”
Mr. Avi Schechter, SuperCom’s Chief Executive Officer, added, “We
believe that this type of E-passport solution will be adopted by more
and more governments globally, and we see this win further
strengthening our position in this market in which we expect to play an
important role.”
About SuperCom:
SuperCom, Ltd. provides innovative solutions in smart-card and e-ID
technologies to the commercial and government sectors. The
Company
offers a wide range of standard and customized smart-card-based
solutions for physical and logical security, education, corrections
facilities and air & seaports. It is also a leader in the
manufacturing of secure and durable documents such as national identity
cards, passports, visas, drivers’ licenses and vehicle registration to
improve homeland security, governmental efficiency and document ease of
use. Headquartered in Israel, SuperCom has subsidiaries in the US and
Hong Kong. For more information, visit our website at
www.supercomgroup.com.
Safe Harbor
This press release contains forward-looking statements within the
meaning of Section 27A of the Securities Act of 1933, as amended, and
Section 21E of the Securities Exchange Act of 1934, as
amended. These
statements are subject to known and unknown risks, uncertainties and
other factors that may cause our actual results, performance or
achievements to be materially different from any future results,
performance or achievements expressed or implied by such
forward-looking statements. Statements preceded or followed by or
that
otherwise include the words “believes”, “expects”, “anticipates”,
“intends”, “projects”, “estimates”, “plans”, and similar expressions or
future or conditional verbs such as “will”, “should”, “would”, “may”
and “could” are generally forward-looking in nature and not historical
facts. Forward-looking statements in this release also include
statements about business and economic trends.
You should consider the areas of risk described under the heading
“Forward Looking Statements” and those factors captioned as “Risk
Factors” in our periodic reports under the Securities Exchange Act of
1934, as amended, or in connection with any forward-looking statements
that may be made by us and our businesses generally,
All information in this release is as of January 2006. Except for
our
ongoing obligation to disclose material information under the federal
securities laws, the Company undertakes no duty to update any
forward-looking statement to reflect subsequent events, actual results
or changes in the Company's expectations. The Company also
disclaims
any duty to comment upon or correct information that may be contained
in reports published by the investment community.
This press release and other releases are available on
www.supercomgroup.com.
========================
66. Press Release
- UPEK
Enables
Fingerprint Authentication Security for Rugged Mobile Computing Leader
Itronix; Itronix GoBook VR-1 Integrates UPEK TouchStrip Fingerprint
Authentication Solution for Secure Authentication of Semi-Rugged
Notebooks
Source
Next Contents
EMERYVILLE, Calif.--(BUSINESS WIRE)--Jan. 10, 2006--UPEK(R), the
leader
in biometric fingerprint authentication solutions, today announced that
Itronix, a General Dynamics Company (NYSE:GD), is embedding UPEK's
TouchStrip Fingerprint Authentication Solution in select GoBook VR-1
semi-rugged notebooks. The GoBook VR-1, offering durability,
performance and connectivity in the semi-rugged segment, incorporates
UPEK biometric fingerprint technology for "access gate keeping." UPEK's
fingerprint authentication hardware and software securely authenticate
users at the power-on and operating system levels. The GoBook VR-1
targets the semi-rugged market: professional "road warriors" and
in-vehicle environments such as police cars. To be integrated into the
GoBook VR-1, which meets the fully rugged military standard (MIL-STD
810-F) for vibration, humidity and temperature, UPEK's TouchStrip
Fingerprint Authentication Solution passed rigorous qualification
testing for durability and reliability.
"Our customers require secure authentication in a wide range of
environments," said Matthew Gerber, senior vice president of product
line management for Itronix. "Itronix is committed to the semi-rugged
computing market and will continue to add new capabilities such as
fingerprint authentication solutions to enhance the GoBook product
line's security, durability and mobility."
"We are pleased to
work with Itronix, which has demonstrated leadership in the rugged
notebook market," said Greg Goelz, VP of marketing, UPEK. "They have
innovated mobile computing by successfully delivering a notebook that
meets a high level of durability, mobility and security standards."
About UPEK
UPEK, Inc., the global leader in biometric fingerprint security
solutions, offers integrated end-to-end solutions including
comprehensive design & integration services to the world's leading
consumer and industrial products companies. UPEK solutions enable the
strongest fingerprint authentication security available, packaged for
high user convenience and rapid integration into existing products and
network architectures.
UPEK biometric security products enable
a wide range of applications including password replacement for PCs and
applications, centralized management for corporate network security,
secure mobile transactions, protection of portable data, identity
verification for government and military applications, and physical
access control.
=======================
67. Press Release
-p Time America Forms New Subsidiary; NetEdge Devices, LLC to Provide
Advanced Data Collection Device - Jan 10, 2006
Source
Next Contents
SCOTTSDALE, Ariz.--(BUSINESS WIRE)--Jan. 10, 2006--Time America, Inc.
(OTCBB:TMAM) has formed a subsidiary company, NetEdge Devices, LLC,
which will manufacture and distribute a new line of advanced data
collection devices that track and display critical labor information
across a variety of industries.
Headquartered in Scottsdale, Ariz., NetEdge Devices will offer its
TA7000 family of data collection devices as a private label solution to
software application development companies, systems integration
providers and value-added resellers. The TA7000 device tracks time and
attendance information, which can be easily integrated into a company's
human resources system including payroll. The device can also serve as
the front end interface for other corporate systems, such as employee
self services, enterprise resource planning (ERP), manufacturing
resource planning (MRP), and security/access control.
Unlike
most devices currently on the market, the TA7000 data collection series
has a truly open architecture that enables OEM partners to fully
control, develop and integrate their own proprietary applications into
the device.
"Since we unveiled our time clock series this
summer, we have received a significant amount of interest from our
resellers and partners who are seeking a private label relationship,"
said Thomas Bednarik, president and chief executive officer of Time
America. "By forming the NetEdge subsidiary, we are creating a separate
focus for the TA7000 series in order to target a diversified number of
prospective industries."
Jon Weiss, vice president of business
development for Time America, will lead the NetEdge business alliance
and OEM program. With more than 18 years of experience in marketing
enterprise resource planning (ERP), and manufacturing and warehouse
solutions, Mr. Weiss will be responsible for the sales of NetEdge
products to the OEM channel.
Commenting on the abilities of
the TA7000 series, Mr. Weiss said: "Not only does the TA7000 line meet
traditional time and attendance inputs, but it also serves as a kiosk
for workers without computers to access Employee Self Services such as
schedules and benefit accruals via a color touch screen using
fingerprint biometrics for security."
About NetEdge Devices, LLC
A wholly owned subsidiary of Time America, Inc. (OTCBB:TMAM),
NetEdge
Devices manufactures, markets and sells a series of technologically
advanced data collection devices that increase operational efficiency
and decrease cost in labor management practices within corporations and
organizations. For more information on NetEdge Devices or the TA7000
terminal series, please contact Jon Weiss at jonw@netedgedevices.com or
visit the Company website at www.netedgedevices.com.
About Time America, Inc.
Time America, Inc. has been a leader in providing innovative
workforce
management since 1988. Our software and data collection solutions
enable companies to transform employee time and labor data into
information that improves payroll processing and workforce
productivity. The Deloitte Technology Fast 500 has honored Time America
as one of the 500 fastest growing technology companies in North
America. For more information, please visit the Time America Web site
at www.timeamerica.com.
===========================
68. ID technology talk on cards for Society -
Edinburgh Evening News - Jan 10, 2006
Source
Next Contents
THE Edinburgh branch of the British Computer
Society is to host a debate on the technologies behind the Government's
plans for identity cards.
The trade-off between security and privacy as a result of new
biometric technology - which identifies features particular to an
individual - will be explored by speaker Gavan Duffy, of IT firm The
Generics Group.
The talk takes place at the Royal Pharmaceutical Society on York
Place at 6.30pm tomorrow.
===================================
69. Press
Release - Logicalis Announces Top Technology Trends to Watch in 2006;
Software-as-a-Service Tops This Year's List of Top Customer Trends,
Ripple Effect Will Hit Software and Hardware Vendors - Jan 10, 2006
Source
END Contents
BLOOMFIELD HILLS, Mich.--(BUSINESS WIRE)--Jan. 10, 2006--This year
enterprise technology will become more about the "fabric" and less
about the "fashion," predicts Jeff Reed, industry guru and chief
technology officer for Logicalis, a global provider of high-performance
technology solutions. According to Reed, corporate enterprises are
going to spend their IT budgets on technologies that help extend their
business, which means a focus on back office processes, not hot
products.
Reed's biggest prediction? That the on-demand software model, known
as
software-as-a-service, will see escalating corporate adoption,
especially in SMB and mid-market companies. Long term, this trend has
the potential to cause a ripple effect in the industry, decreasing the
need for both corporate software and hardware purchases. Reed says to
watch for shifting priorities among software and hardware vendors as
the trend of software-as-a-service sweeps away old business models.
Reed oversees the technology deployment for Logicalis' customers,
representing a wide range of industries -- including financial
services, manufacturing, healthcare and retail. He says it's just that
perspective that has helped him develop some important IT trend
predictions for 2006.
These trends are more like waves that
have been approaching the enterprise shore for some time and are going
to crest in 2006, sometimes with unsettling force for those who are not
prepared. Based on Reed's assessment of customer IT priorities, he has
developed The Logicalis Top Technology Trends to Watch in 2006:
Software-as-a-service will become a corporate standard. Driven by a
common sense, pay-as-you-go approach to software needs, Logicalis
believes that 2006 will finally be the year when the ability to
purchase hosted software, such as customer relationship management
applications, email and enterprise resource planning packages, is fully
embraced by corporations.
"Software-as-a-service represents a
profoundly different business model for the enterprise IT community,"
says Reed. "Some examples are Microsoft Live, Salesforce.com and MySAP,
just to name a few. This will be a win for customers, but it may cause
some pain for vendors as the model turns some traditional enterprise
servers and applications into a utility play."
Service-oriented architecture will be the glue that binds. Web
services
and service-oriented architecture, which serve to expose and link data
sources among partners, will continue to be prevalent in the enterprise
as companies increase their ability to integrate back office systems to
suppliers and partners in order to drive revenues.
Reed
comments, "By exposing their data and making application programming
interfaces (APIs) readably available to the rest of their supply chain,
companies can drive down costs and inefficiencies." Furthermore, this
trend will drive the adoption of "software-as-a-service" as companies
are able to expose critical data to outside vendors who can then
integrate it in to applications that don't need to be inside the
corporate firewall.
Software will become more "verticalized."
Corporate IT will benefit from a renewed focus on vertical
industry-specific solutions and business processes by large enterprise
software companies like IBM and HP. IBM WebSphere is already being used
to develop industry-specific portals. And HP OpenView is being enhanced
to drive actual business processes
"This 'verticalization' of
enterprise software will also increase the pace of M&As in the
software industry," says Reed. "Keep an eye on service-oriented
architecture (SOA) companies like BEA and Tibco. These represent solid
acquisition targets for the IBMs of the world."
Security &
Compliance will become more important, and more complex. SEC
regulations for public companies, privacy regulations for industries
such as healthcare and the increasing use of mobile devices and IM at
work will continue to place an enormous strain on enterprise IT
resources for security and storage. Couple this with the fact that the
current Internet architecture is inherently "insecure," and security
will remain a focus for the IT world.
"Secure email archival
and retrieval for compliance will be top of mind for many companies.
Enterprise workers will require more network-level and
application-level secure data access," comments Reed. "Watch for
companies like EMC and Cisco to provide more secure storage and network
access, and IBM and Microsoft and HP to provide more identity
management and enterprise-wide authentication."
2006 will be
all about access. The consolidation of voice, video and data networks
coinciding with the explosion of powerful mobile devices -- combined
with the trends above -- will begin to remove any remaining barriers to
the "virtual corporation."
"We're seeing more converged
devices on the horizon that will directly connect end-users with
corporate data," predicts Reed. "Dual mode VoIP-over-WiFi-cell-phones
from companies like Motorola and continued Blackberry and Treo
penetration will ensure real-time, multi-channel access to corporate
network assets."
"And maybe a few new industry acronyms," jokes Reed.
For more information about trends shaping the industry and how your
company can benefit from Logicalis' point of view, visit www.us.logicalis.com
About Logicalis
Logicalis is a global provider of high-performance technology
solutions. Logicalis and its affiliated companies employ 1,000 people
worldwide, including highly trained service specialists who specify,
design, deploy and manage IT infrastructure to meet the needs of over
5,000 corporate and public sector customers. Logicalis maintains strong
partnerships with technology leaders such as HP, IBM, Cisco and EMC.
Logicalis is a part of Logicalis Group, a division of Datatec
Limited
(JSE:DTCJ), a $3 billion business listed on the Johannesburg Stock
Exchange. With its international headquarters in the UK, Logicalis
Group will have annualized global revenues of approximately $700
million from operations in the U.S., UK, Germany and South America. In
North America, Logicalis' annualized revenues will amount to some $450
million, with nearly 400 employees in the U.S. For more information,
visit www.us.logicalis.com.
=====================
End of this Issue - Return to Top