Biometric Bits - Volume 2006-01-Issue 04 - January 10, 2006
Please Refer to the Biometric Bits Copyright and Fair Use Notice

Convenient navigation aids are as follows: Left clicking on:

      A Table of Contents entry will bring you to the related article. .
    "Source" will bring you to the original article at the website of its initial posting - if it is still there;
    "Next" - Will bring you to the next article in sequence.
     Contents - Will bring you back to the table of contents.

 

Henry J. Boitel, Editor

 
Table of Contents

01. Putting privacy into practice - legally - - Two NBSP Reports - Security Document World - January 9, 2006

02. New biometrics group focuses on frequent fliers - By Randy Barrett - National Journal's Technology Daily - Gov Exec.com - Jan 9, 2006

03. Press Release - [IBG] Global Biometric Revenues Projected to Grow from $2.1B in 2006 to $5.7B in 2010 - Jan 9, 2006

04. A Review of the FBI's Handling of the Brandon Mayfield Case - Unclassified Executive Summary
- Office of the Department of Justice Inspector General, Oversight and Review Dividision - January 2006 - This is a 21-page pdf.

05. Minnesota needs to do more to crack down on identity theives, says Gov. Pawlenty - by T.W. Budig - ECM - Home Town Source - Jan 6, 2005

06. Entrepreneur Installs RFID Chips in Both Hands - By Robin Arnfield - NewsFactor Magazine - January 9, 2006
http://www.newsfactor.com/story.xhtml?story_id=0210002G12EL

07. Blood vessels in human hand and contactless card combine to create secure biometric IDs - Secure ID News - January 6, 2006

08. Press Release - 2005 RCMP Benchmark: SAGEM Morpho Obtains Highest Overall Score - Jan 6, 2006

09. Press Release - ImageWare Systems Sponsors American Association of Airport Executives' 20th Annual Aviation Issues Conference; Company Will Contribute to Dialogue on Passenger Pre-Screening, Related Aviation Security Issues & Programs
- Jan 6, 2006

10. GOVERNMENT: Pawlenty offers plan to restrict ID theft - Proposals follow Hatch's criticism
- Associated Press - Grand Forks Herald (Minn) -  Jan 6, 2006

11. Press Release - Diamelle Technologies Releases a Low Cost Authentication Server to Deter Account Fraud and Identity Theft with Soft Tokens for Multi-factor Authentication - Jan 6, 2006
http://www.emediawire.com/releases/2006/1/emw329079.htm

12. HK Polytechnic Univ's new developed system on display - China View - Jan 6, 2006
http://news.xinhuanet.com/english/2006-01/06/content_4019118.htm

13. India's First Bio-ATM From Axis - By Rajendra Chaudhary - Mumbai - CXO Today [India] -  Jan 6, 2006

14. Security Risk Management is the answer to your security prayers
- Security Park - Jan 6, 2006

15. THE ELECTION - Harper trumpets get-tough crime plan - Conservative Leader would raise minimum sentences and try 14-year-olds as adults - By BILL CURRY - The Globe & Mail- Jan 6, 2006

16. Homeland Security opening private mail - Retired professor confused, angered when letter from abroad is opened - By Brock N. Meeks - MSNBC - Jan. 6, 2006

17. Biometric technology secures pocket-sized server
- Secure ID NEws - January 9 2006

18. Military Sensor Hears Through Walls - By Bill Christensen - Live Science.com - Technology.com - Jan 9, 2006

19. Take security precautions when an employee leaves the organization - by  John McCormick   - Tech Republic - Jan 9, 2006

20. Taking the 'I' out of Identity - Sean McGrath, ITworld.com - Jan 9, 2006

21. Press Release - bioMETRX, Inc.'s Finger Activated Garage Door Opener to be Featured on HGTV's 'I Want That'Product To Kick Start Consumer Biometrics Interest -  January 9, 2006

22. Press Release - The organizers of Security Challenges 2006 (SCC), have announced the line-up for this year’s winter conference, which features keynote address speaker John Pescatore of Gartner and guest speaker Ira Winkler of ISAG, along with a team of other prestigious speakers and sponsors. The free, two-day online conference will be held January 18th and 19th 2006, and will feature in-depth evaluations of today’s most critical security topics.

23. UK rejects 80,000 passport photos following new rules - Jan 9, 2006

24. The dirt on clean data - By Mary Mosquera - Government Computer News - Jan 9, 2006

25. Three More States Add Laws on Data Breaches - by Jaikumar Vijayan - ComputerWorld - Jan 9, 2006

26. Press Release -  Award Includes PKI and HSPD-12 Compliant Products and Services - Jan 9, 2006

27. Press Release -  Product To Kick Start Consumer Biometrics Interest to Operational Research Consultants, Inc. - Jan 9, 2006

28. PalmSecure Another CES 'Best of Innovations Honorees'
- CCN Magazine - Jan 9, 2006

29. Press Release - First Security Information and Event Management (SIEM) Solution Interoperable with Websense, Inc.; Understanding Web-based Threats Critical for Compliance and Security - Jan 9, 2006

30. Liberty to unveil personal federated identity management - by Antony Savvas - Computer Weekly - Jan 9, 2006

31. TSA Unveils Enhanced Security Screening Procedures - Sandy Smith - Homeland Response - Jan 9, 2006

32. Johns Hopkins University to Lead New Homeland Security Center - Sandy Smith - Homeland Response - Jan 9, 2006

33. Press Release - Enterprise Bank & Trust Cracks the Password Management Problem with Imprivata OneSign; Ease of Configuration and Administration, along with Strong Biometric Support, Set OneSign Apart - Jan 9, 2006

34. Press Release - (I-Newswire) - Tel Aviv, Israel -  - Eurekify, the pioneer and leading provider of role management solutions, is pleased to announce exceptional growth and record results for 2005.  Eurekify’s year-to-year revenue has increased by 130%, supported by the increasing demand for Role-based Identity Management and Compliance solutions, as well as by quicker deployment practices and the maturing of Eurekify’s unique technology. - January 9, 2006

35. The anti-nation - DAN DUNSKY - Toronto Star - Jan 9, 2006

36. Airport summit starts on Big Island - Pacific Business News - Jan 2, 2006

37. Press Release - Aratek, CUST Collaborate to Set up Joint Lab - Jan 9, 2007

38. Press Release  - Dubai set to host Middle East’s largest security expo
- Jan 9, 2006

39.  Password Tools Lower Compliance Costs - By Cameron Sturdevant - EWeek - Jan 9, 2006

40. Russia Doesn't Deserve Its Reputation - An interview by Mikhail Zygar, Head of the European Commission in Russia Marc Franco tells Kommersant about the problems that hold Russia and the European Union back on their paths toward each other. - Kommersant - Jan 9, 2006

41. CIOs prepare for new technology challenges - Information sharing, hurricane response will propel many 2006 IT programs - BY Michael Arnone and Dibya Sarkar - Federal Computer Week -  Jan. 9, 2006

42. The test of terrorism - Security concerns change life in labs - By HARVEY BLACK - Milwuakee Journal Sentinel - Jan. 8, 2006

43. India Revives Fingerprint Plan to Combat Fraud  - by Andy Mukherjee - Bloomberg.com - Jan 9, 2006

44. Leaving on a jet plane? Rules are changed again - By JILL SCHENSUL - North Jersey Media Group - Jan 8, 2006

45. Diamelle Releases Java EE Platform-Based Low Cost Authentication Server to Deter Fraud and Identity Theft Technology Uses Soft Tokens for Multi-factor Authentication - SysCon Belgium - Jan 8, 2006

46. Drivers under USFJ must tell command of off-base incidents - Stars and Stripes -  January 8, 2006

47. Report on FBI may strengthen lawsuit against agency By WILLIAM McCALL  -  Associated Press - KGW-TV (Oregon & Washington State - Jan 8, 2006

48.  Watch-list for terror suspects - by Nicolette Burke -  in Canberra - The Courier Mail [Australia] - Jan 9, 2006

49. In reality, high tech beats no tech
- By Bob Bong - Daily SouthTown [Illinois] - January 8, 2006

50. Tighter security on visas - By NICOLETTE BURKE - The Advertiser [Australia] Jan 9, 2006

51. Day 3 at CES: What's hot - By Richard Nass - Mobile Handset DesignLine - Jan 7, 2006

52. Experts weigh in on bank responses to FFIEC guidelines - Financial houses strengthen authentication with challenge questions, phone authentication and other means of outsmarting hacker sleuths - By Marisa Torrieri, - January 7 2006

53. $80, fingerprints, eye scan to speed you to your plane - Starting this summer, some fliers can skip long security lines at the Indy airport - By Theodore Kim - Jan 7, 2006

54. Boning up on a body's identity
- ADRIAN MATHER - Jan 9, 2006 - The Scotsman [UK]

55. A Fictional Story... Or A Premonition Of Things To Come? - Jim Downey's Rants & Raves - Digital Divide Network - Jan 9 2006

56. She Gives Bodies Their Faces Back - Coroners in L.A. and Orange counties turn to the Huntington Beach artist when seeking an ID. 'It's amazing how close she gets,' says one. - By Susana Enriquez, Los Angeles Times - Jan 9, 2006

57. Press Release - Ministry launches biometric payment pilot
  - Jan 6, 2006

58. Are we heading for a serious identity crisis? - by David Berlind - ZD Net - Jan 9, 2006

59. Fake fingers no match for scanner's electronic nose - New Scientist - by Celeste Biever - Jan 10, 2006
- Jan 6, 2006

60. We lost the war. Welcome to the world of tomorrow - Du Chaos Computer Club by  Frank Rieger - Jan 10, 2006

61. Press Release - Frost & Sullivan - Need for Enhanced Homeland Security to Promote Uptake of Security Technologies - Jan 10, 2006

62. Press Release - Former META Group Analyst Mike Rothman Launches Security Incite - Jan 10, 2006

63. Press Release - Wave Systems on Winning Team with Operational Research Consultants, Inc. for U.S. GSA Blanket Purchase Agreement Award  - Jan 10, 2006

64. Press Release - 2AB Inc. Announces Open Source Plans for jLock Scalable JAAS
- Jan 10, 2006

65. Press Release - (Euronext Brussels) - Supercom announces the award of a tender for a biometric passport issuing and control system for a western European country  - Jan 10, 2006

66. Press Release -  UPEK Enables Fingerprint Authentication Security for Rugged Mobile Computing Leader Itronix; Itronix GoBook VR-1 Integrates UPEK TouchStrip Fingerprint Authentication Solution for Secure Authentication of Semi-Rugged Notebooks


67. Press Release -p Time America Forms New Subsidiary; NetEdge Devices, LLC to Provide Advanced Data Collection Device
  - Jan 10, 2006

68. ID technology talk on cards for Society - Edinburgh Evening News - Jan 10, 2006

69. Press Release - Logicalis Announces Top Technology Trends to Watch in 2006; Software-as-a-Service Tops This Year's List of Top Customer Trends, Ripple Effect Will Hit Software and Hardware Vendors - Jan 10, 2006


01. Putting privacy into practice - legally - - Two NBSP Reports
- Security Document World - January 9, 2006

Source Next Contents

Large-scale identification programs, such as national ID cards, visas or ePassports, are enough to put most privacy advocates on the offensive. Add in the mention of biometric technology and the volume of opposition is magnified. The good news then, is that a new series of reports launched today, while fully recognizing the validity of privacy concerns, has concluded that even the use of biometrics in large-scale databases is possible without having to sacrifice personal privacy.

The reports by National Biometric Security Project (NBSP), a research and analysis organization, look at both the impact of biometrics on US and international privacy laws.

The first report - United States Federal Laws Regarding Privacy and Personal Data and Applications to Biometrics - demonstrates how, under the current US legal system and state of the law at the federal level, use of biometrics as a system to verify identity in virtually any situation is consistent with the law. The report also illustrates how, under certain circumstances, using biometrics to identify individuals through the use of databases is acceptable without sacrificing the objective of maintaining and protecting personal privacy.

The report was written for the Department of Homeland Security and the Interagency Working Group on Biometrics chaired by the White House Office of Science and Technology.
 
Identification vs. verification

Importantly, the report highlights the distinctions between identification and verification techniques and discusses how each method relates to privacy laws and issues. Generally, the report says, biometric “identification” does a “one to many” search of extensive databanks to find a match. Because such databanks may contain or be linked to personal information, and because identification applications can be used without the subject’s knowledge or consent, such as in surveillance, the privacy concerns are intensified, the report claims.

Biometric verification systems, meanwhile, use a “one to one” match and so are generally designed to be used on a voluntary basis. They only require two pieces of information: something representing your identity (such as a user name to retrieve your biometric template or a smart card with your template embedded in it) and your biometric feature or information (such as your hand to create your hand geometry template) presented for the match.

Verification systems can be connected to databanks, but unlike identification systems a database is not a necessary component. The need for the subject’s consent and the lack of a databank requirement greatly reduce the privacy concerns.

John E. Siedlarz, Chairman and CEO of NBSP commented: “The increasing reliance on biometrics in large scale identification applications, such as watch lists, enrollment eligibility and border control applications will require a greater sensitivity to privacy issues to ensure that the rights of individuals are not unduly compromised in the name of security. There are clear steps that can be taken to make all biometric systems ‘privacy sensitive’. Those involved in the deployment and management of identification applications will need to employ those steps to maintain the right balance between individual privacy considerations and broader security concerns.”

 
International Data Privacy

The second study - Report on International Data Privacy Laws and Application to the Use of Biometrics in the United States - assesses privacy laws in Canada, Australia, New Zealand and Japan and looks at possible roles the USA could play in international cooperation.

According to NBSP, resistance to both US and foreign biometric privacy legislation has come from both sides of the fence. Some proponents of biometric recognition technology are concerned that any legislation will restrict the currently legal uses of biometrics. Opponents of biometric recognition technology (on the basis of its perceived threat to privacy) are concerned that legislation will condone the use of such technology on a broad or unrestricted scale.

NBSP concludes that the best compromise is implementation of data privacy policy and/or legislation that takes into consideration:

    *
      the fact that most overt and consensual uses of biometric recognition technology are legal and non-intrusive;
    *
      that public concerns over misuses (such as could occur with unauthorized database access or unrestricted data-mining) should be competently addressed;
    *
      participation in global privacy standards will enhance proper and effective use of the technology.

For more information please contact: rryan@nationalbiometric.org

===============================

02. New biometrics group focuses on frequent fliers - By Randy Barrett - National Journal's Technology Daily - Gov Exec.com - Jan 9, 2006



Source Next Contents

A new coalition of biometric and access-control companies launched Monday to advise the government on large public-credentialing programs such as the Registered Traveler system of the Transportation Security Administration.

The group, called the Voluntary Credentialing Industry Coalition, will be led by Wexler & Walker Vice Chairman Tom Blank. Its members include ARINC, ImageWare Systems, Iridian Technologies, Lockheed Martin, Panasonic, GE Security, Saflink and Verified Identity Pass.

While there are numerous trade associations representing the security and biometrics industries, Blank VCIC will focus on voluntary credentialing programs and related issues of consumer privacy and data theft. "What we're trying to address is the public policy component," he said. "We expect to have an impact on a full range of federal credentialing" projects.

The first order of business is Registered Traveler, which is designed to let pre-cleared, frequent fliers carry biometric identity cards and speed through security checkpoints at airports. The program finished a test phase at five airports in 2005 and soon will be expanded nationwide.

The agency is seeking advice on business models, technology and liability. In submissions last week, VCIC told TSA that consumer privacy is a top priority. "We urge that TSA require ... any issuer of Registered Traveler memberships be subject to the standards of the Federal Privacy Act" and state clearly whether data will be shared with third parties.

"One of our highest priorities is articulating and delivering on our coalition's commitment to strong, accountable privacy protection standards," Wexler & Walker Chairman Anne Wexler said in a statement. "And last week's submission to the TSA on privacy protection makes it clear that we intend to be proactive rather than defensive when it comes to that issue."

Privacy watchdogs have expressed concern about how personal consumer data will be safeguarded. "In the case of Registered Traveler," the Electronic Privacy Information Center said on its Web site, "TSA has identified 13 categories of 'routine uses' of personal information," with several being "so broad as to be almost meaningless."

===============================

03. Press Release - [IBG] Global Biometric Revenues Projected to Grow from $2.1B in 2006 to $5.7B in 2010 - Jan 9, 2006

Source Next Contents

NEW YORK, Jan. 9 /PRNewswire/ -- International Biometric Group announces
the availability of the Biometrics Market and Industry Report 2006-2010, the
most in-depth and authoritative Report on biometric market opportunities,
trends, and growth drivers.  The Report is required reading for investors,
deployers, systems integrators, and organizations looking to understand the
current and future landscape of the industry.
    In addition to analyzing the biometric industry by technology,
application, and market, the Report profiles leading biometric vendors.

    Key Report findings include the following:

    - Global biometric revenues are projected to grow from $2.1B in 2006 to
      $5.7B in 2010, driven by large-scale government programs and dynamic
      private-sector initiatives
    - Fingerprint is expected to gain 43.6% of the biometric market in 2006,
      followed by face recognition at 19.0%
    - Annual iris recognition revenues are projected to exceed $250M by 2008
    - Asia and North America are expected to be the largest global markets for
      biometric products and services
    - Multiple-biometric systems will emerge to comprise roughly 5% of the
      total market for biometrics

    Technologies addressed in the Report include the following:

    - Fingerprint
    - Face Recognition
    - Iris Recognition
    - Middleware / Identity Management Software
    - Multiple Biometric
    - Hand Geometry
    - Signature Recognition
    - Voice Recognition
    - Automated Fingerprint Identification Systems (AFIS)/Live-Scan

    Applications addressed in the Report include the following:

    - Civil ID
    - Consumer ID
    - Access Control/Attendance
    - Device/System Access
    - Criminal ID
    - Surveillance

    Markets addressed in the Report include the following:

    - Law Enforcement
    - Military
    - State and Municipal Government
    - National Government
    - Financial Services
    - Gaming and Hospitality
    - Health Care
    - High-Tech and Telecom
    - Industrial Manufacturing
    - Retail
    - Transportation

    The Biometrics Market and Industry Report 2006-2010 is available for
online purchase from http://www.biometricgroup.com/BMIR.html.
    Report Length: 221 pages, 122 figures and charts
    Release Date: January 2006
    Price: $3995 USD

    About International Biometric Group
    International Biometric Group (IBG) is the leading biometric research,
consulting, and integration firm.  IBG designs, develops, and integrates
biometric solutions for government and commercial clients.  IBG tests and
evaluates biometric technologies for accuracy and usability.  IBG builds
business cases for organizations deploying biometric systems and develops go-
to-market strategies for biometric product and solution developers.  Learn
more about IBG at http://www.biometricgroup.com.

===============================

04. A Review of the FBI's Handling of the Brandon Mayfield Case - Unclassified Executive Summary
- Office of the Department of Justice Inspector General, Oversight and Review Dividision, January 2006 - This is a 21-page pdf.

http://www.usdoj.gov/oig/special/s0601/final.pdf
Source Next Contents
================================

05. Minnesota needs to do more to crack down on identity theives, says Gov. Pawlenty - by T.W. Budig - ECM - Home Town Source - Jan 6, 2005

Source Next Contents

Proposed use of a new technology would not only betray wrinkles but identities on Minnesota driver’s license photos.

The use of biometric facial recognition - a technology that converts a mugshot into a telling mathematical algorithm - is one facet of Gov. Tim Pawlenty’s initiative against identity theft.

“Minnesota needs to do more to strengthen safeguards on personal information and to crack down on identity thieves,” said Pawlenty.

It’s estimated nearly 3,000 Minnesotans were victims of identity theft in 2004 - 57 out of every 1,000 residents.

According to the administration, 13 states already use forms of facial biometrics on their driver’s licenses.

New driver’s license photos are not needed to employ the technology, according to the administration.

Biometrics, through precise facial measurements, can betray someone masquerading as someone else and remains an effective screening device over time, an industry spokesman explained.

Cost of adding the technology is estimated at a dollar or two per drivers’ license - an initiative jumpstarted by a $800,000 federal grant to the Department of Public Safety Driver and Vehicle Services (DVS).

The agency handles some 1.6 million drivers’ licenses and ID cards a year.

Pawlenty wants lawmakers to act on the biometric technology to secure adequate funding.

4 other anti-identity stratagems

Besides the drivers’ license initiative, Pawlenty proposed four other anti-identity theft stratagems aimed at thwarting high-tech criminals armed with computers.

These include stiffening penalties for unauthorized access to personal data, going after hackers who secretly gain access to private data but don’t steal, making it unlawful to use encryption to hide a crime.

Ranging afield, Pawlenty argued that current state data practice law is flawed and upsidedown- data presumed private unless deemed public, he explained.

“I think we should look at inverting that presumption,” he said of current data practices philosophy.

The data privacy issue for a second day became contentious between the governor and Attorney General Mike Hatch, a DFL gubernatorial candidate who wants to replace Pawlenty.

Hatch endorsed Pawlenty's proposed use of biometrics - he’s a complete supporter, he said - but added it would be more effective to make driver’s license information private.

Hatch charged that the Pawlenty Administration through its DVS “housekeeping” bill in 2005 conforms state drivers’ license data practices to federal law.

There’s some 14 data privacy exceptions granted under federal law, explained Hatch. “When you add them all up it basically means it’s (driver’s license data) all disclosed,” he said.

His office was never consulted on the legislation, said Hatch. They were unaware of it, he explained. “I hope that the governor and administration will support meaningful privacy laws,” said Hatch. Hatch said he wasn’t pointing the finger of blame.

Pawlenty said that there was “some gamesmanship” going on with the rhetoric about data privacy.

=========================================

06. Entrepreneur Installs RFID Chips in Both Hands - By Robin Arnfield - NewsFactor Magazine - January 9, 2006

Source Next Contents

"If people want to pretend they're joining the Borg by implanting radios in their bodies, well good for them," said Andrew Jaquith, a senior analyst at Yankee Group. "I would point out that the State Department has been urged to back off of using RFID, ironically, on security grounds."


Carrying keys and remembering computer passwords are so last year, at least according to Amal Graafstra.

The Bellingham, Washington-based entrepreneur and his girlfriend, Jennifer Tomblin, have installed computer chips into their hands to give them access to their apartment and their computers -- without keys or passwords.

The devices implanted in Graafstra and his girlfriend are radio frequency identification (RFID) chips that are commonly used instead of barcodes to track merchandise in stores.

RFID chips also are used for payment and transportation cards. Large-scale live implants have so far been confined to pets and cattle, with only a few notable cases of humans getting the chips installed for testing purposes.

Airport Security

Implants do not cause a problem with airport security Relevant Products/Services from Microsoft, according to Graafstra, who has a chip implanted in both hands. "I've never had either of them set off a metal detector," he wrote on his blog.

"One time I even had to submit to a handheld wand search. They asked me if I had any implants before they started, and I told them I had one in each hand. They ran the wand over me and specifically over my hands, and the thing never made a peep. It did, however, beep on one of my tiny shirt buttons, so that just goes to show the amount of metal in the implant is rather insignificant."

"If people want to pretend they're joining the Borg by implanting radios in their bodies, well good for them," said Andrew Jaquith, a senior analyst at Yankee Group. "I would point out that the State Department has been urged to back off of using RFID, ironically, on security grounds."

"RFID chips do have a security issue," said Graafstra in an interview. "But for my private purposes, they are secure enough. If they were used in a mass-market implementation, security would be an issue, but it would be easier for someone to put a rock through my window than to make the effort to clone my RFID chip."

Human Trials

In Europe, there have been several trials involving RFID implants in humans. Members of the exclusive Vaja Beach Club in Barcelona, Spain, are offered the opportunity to receive RFID chip implants as a means of gaining entry to the elite club and also to pay for drinks. The chips, which are implanted into the arms of members at the club, allow them to run up tabs without having to carry any other form of identification.

In the UK, Kevin Warwick, Professor of Cybernetics at Reading University, has had an RFID chip implanted in his arm since 1999.

"The costs of implanting and maintaining a chip in a person are extremely high," said Avivah Litan, Gartner Group's vice president and research director. "So even if the technology were accepted by the mass public, the costs are much higher than the benefits in most scenarios."

It only makes sense is niche areas, said Litan, like gaining access to top-secret systems and buildings. "And even then, there are much less intrusive mechanisms, like iris-scanning, that will win out before implanted RFID chips do."

Graafstra said that, from a privacy point of view, an RFID chip is less of an issue than a biometric system. "You can leave an RFID system by just removing your chip, whereas you cannot change your biometric data [like a fingerprint], and once it is on a database, you cannot easily remove it."

=========================================
07. Blood vessels in human hand and contactless card combine to create secure biometric IDs - Secure ID News - January 6, 2006

Source Next Contents

Forget fingerprints. A Toronto, Ontario company wants the whole hand involved. And it's not talking palm prints. It wants to identify the blood vessels in your hand.

Identica Corp. has linked its Universal Controller with a hand vascular scanner manufactured by a Korean company. The result is a biometric access control mechanism solution that it claims is accurate, fast, and non-intrusive for users.

Terry Wheeler, Identica president, calls this a "whole new paradigm of biometrics on its own. Ours is completely unique."

Mr. Wheeler started Identica in 2003. "My background goes back to biometrics," he said. "At Identica, we were first involved with fingerprint-based solutions but then I started looking at what was going to be next, and I found this technology from Seoul, Korea. We got the rights for Canada, and at that point we realized we needed a bigger marketplace. Last spring, we acquired American Biometric and Security in Naples, Florida."

To expand its North American market, Identica recently signed Johnson Controls Inc. (JCI), Sima Valley, Calif., to sell and integrate the Techsphere Hand Vascular Pattern Recognition (VPR) biometric solutions to its clients in the US and Canada (Identica also owns the rights for the vascular scanner in North America and Mexico).


Live applications and implementations underway …

"Johnson Controls has a large established and growing customer base that relies on the company for their expert advice and integration of products to match their security requirements", said Mr. Wheeler. "A typical JCI client has sophisticated access control security challenges that require the undeniable user verification and the many other benefits that the Hand VPR biometric solutions provide."

Identica and its use of the Techsphere vascular hand reader is starting to get noticed. The company was awarded an iCLASS Innovation 2005 Award several months ago by HID, a world-leading manufacturer of access control readers and cards. The award was presented for Identica’s integration of HID iCLASS smart card modules with its Universal Controller and the Techsphere Hand Vascular Pattern biometric scanner.

SunFirst Bank, St. George, Utah, just recently integrated the Techsphere into its access control system for its Datacenter. "It is being used all over the world. You have installs in gaming, casinos, banking, transportation, and government."

Mr. Wheeler explained that Techsphere scans a portion of the hand, going beneath the surface of the skin, "so we're not concerned with contaminants like fingerprints would be. It scans for the main veins and blood vessels all around. It does a one to one comparison and it's very accurate. You can use the product with a standard pin or HID iCLASS smart card."

He added: "With a smart card (such as with HID's iCLASS) you're storing the encrypted template right on the card. The user keeps the card with him. That's one of big issues for any biometric is where template is stored. I present my card and hand and it sends the message to the access control system and opens the door," he added.

Only a 208-byte template is required. "You don't have to worry about where it is. You enroll them once. If you have a thousand doors around the world, all you need is your card and your hand to enter."


Future plans include additional card types and ID technologies …

"While the product we currently have is with HID, we will also have Mifare and Desfire capabilities. The whole development project is in the works for the Universal Controller."

Identica's scanning process will also work with 2D barcodes. "I can store my template in that barcode and print it on anything, on a boarding pass, on the back of any card," said Mr. Wheeler. "It really depends on what the customer wants. I personally think HID iCLASS is the way to go, but we want to make the integration easy."

He said the initial choice of HID was easy. "HID is the biggest in the market. They're a great partner to work with and they always support their products."

=========================================

08. Press Release - 2005 RCMP Benchmark: SAGEM Morpho Obtains Highest Overall Score - Jan 6, 2006


Source Next Contents

TACOMA, Wash. --(Business Wire)-- Jan. 6, 2006 -- During the 2nd quarter of 2005, the Royal Canadian Mounted Police (RCMP) organized one of the most challenging and rigorous benchmarks of the past few years. The benchmark, executed against background databases of fingerprint records, palm print records and unsolved latents provided entirely by the customer, covered all major types of searches. Moreover, all the searches processed during this benchmark were done both in full "lights out" mode (without human intervention) and in "best practice" mode as recommended by AFIS providers.

Although the detailed results are unknown to the providers, the RCMP officially informed SAGEM Morpho that it obtained the highest overall benchmark score among all competitors. The RCMP also informed all competitors that these results would be shared with police forces requesting them directly from RCMP.

The RCMP benchmark reinforces SAGEM as the AFIS supplier of choice for law enforcement and civil agencies throughout the United States, Canada and the world over. Particularly, the MetaMorpho(TM), the latest generation of SAGEM AFIS, is currently operational or under implementation at more that 40 different customer sites, including Interpol and many U.S. States.

MetaMorpho(TM)

The MetaMorpho(TM) is designed to provide an evolutionary platform, able to incorporate new functions and COTS software/hardware components such as the RapID(TM) or DigiScan(TM) Web.

DigiScan(TM) and RapID(TM) fulfill real-time identification needs. They allow fingerprint capture using forensic quality, optical livescans that transmit prints to a central site for search. RapID is a wireless mobile terminal for use on patrol to check a suspect's identity on the spot, while DigiScan(TM) is a desktop providing a large display and user-friendly interface.

About SAGEM Morpho, Inc. (www.morpho.com)

SAGEM Morpho, the industry leading biometrics company, develops, manufactures, and integrates multiple biometric technologies including fingerprint, palmprint, iris scan and facial recognition products and services. SAGEM Morpho applies more than twenty-five years of global experience in biometric identification. It delivers trusted and reliable biometric solutions to address a wide variety of markets that include the Federal Government, homeland security, law enforcement, drivers' licenses, civil identification, as well as commercial and consumer applications. SAGEM Morpho's solutions are in use by government administrations including the FBI and many other Federal, State and local agencies. SAGEM Morpho is a wholly owned subsidiary of the European group SAFRAN.
========================

09. Press Release - ImageWare Systems Sponsors American Association of Airport Executives' 20th Annual Aviation Issues Conference; Company Will Contribute to Dialogue on Passenger Pre-Screening, Related Aviation Security Issues & Programs - Jan 6, 2006

Source Next Contents

SAN DIEGO--(BUSINESS WIRE)--Jan. 6, 2006--ImageWare Systems, Inc. (AMEX:IW), a world leading developer and provider of identity management solutions, today announced its sponsorship of the American Association of Airport Executives' (AAAE) 20th Annual Aviation Issues Conference, held January 8 - 12, 2006, Hapuna Beach Prince Hotel, Kona, Hawaii.

The Aviation Issues Conference is a forum for far-reaching discussions between key aviation leaders from the U.S. Government, systems integrators and the private sector. And, with the Transportation Security Administration (TSA) seeking industry and public input on its plan to begin an airline passenger verification program at airports across the country in 2006, the conference is the ideal forum for outlining the viability of using security assessments and biometric-based identity verification technologies in the airport environment.

ImageWare will be demonstrating their biometric identity management platform, the IWS(TM) Biometric Engine, which is well suited for large-scale programs like the one proposed by the TSA, allowing for multi-biometric searching and matching that is scalable and allows organizations to manage population databases of unlimited sizes. In addition, the Biometric Engine is technology and hardware agnostic, enabling users to employ biometric devices and algorithms from any vendor, as well as support the combination of the following biometric types: finger, face, iris, hand geometry, palm, DNA, signature, voice, 3-D face and retina. In fact, the Biometric Engine currently supports ninety-three hardware devices/methods or image acquisitions and sixty-five biometric algorithms.

"Our contribution to the conference is a testament to our support for airline and airport security and related aviation programs," said Jim Miller, Chairman and CEO, ImageWare Systems. "Through our expertise and industry insight, we hope to aid in the debate regarding passenger pre-screening as well as identify opportunities for ImageWare solutions to play an integral part in future programs, such as Registered Traveler."

Under the Registered Traveler Program, airline passengers can pay a fee and voluntarily give their biographic and biometric information to TSA in exchange for expedited screening at airport security checkpoints.

The TSA estimates that the cost of administering Registered Traveler will be about $30 million a year, paid for by user fees. The agency expects to hire a private company to help administer the program and to enroll participants at airports nationwide. A request for proposals for the effort is expected to be issued after Jan. 20, according to the TSA.

About ImageWare Systems, Inc.

ImageWare Systems, Inc. (AMEX:IW) is a world leading developer and provider of biometric identity management solutions, providing multiple biometric, secure credential, law enforcement and digital imaging technologies. Scalable for worldwide deployment, the Company's biometric product line includes a multi-biometric engine that is hardware and algorithm independent, enabling the enrollment and management of unlimited population sizes. ImageWare's identification products are used to manage and issue secure credentials including national IDs, passports, driver licenses, smart cards and access control credentials. ImageWare's digital booking products provide law enforcement with integrated mug shot, fingerprint LiveScan and investigative capabilities. The Company also provides comprehensive digital workflow solutions for the professional photography industry. ImageWare is headquartered in San Diego, with offices in Canada and Germany. For more information visit www.iwsinc.com.

Safe Harbor Statement

This news release may contain forward-looking statements made pursuant to the "safe harbor'' provisions of the Private Securities Litigation Reform Act of 1995. While these statements are meant to convey to the public the company's progress, business opportunities and growth prospects, readers are cautioned that such forward-looking statements represent management's opinion. While management believes such representation to be true and accurate based on the information available to the company, actual results may differ materially from those described. The company's operations and business prospects are always subject to risks and uncertainties. Important facts that may cause actual results to differ are set forth in the company's periodic filings with the U.S. Securities and Exchange Commission.
===================================

10. GOVERNMENT: Pawlenty offers plan to restrict ID theft - Proposals follow Hatch's criticism - Associated Press - Grand Forks Herald (Minn) -  Jan 6, 2006


Source Next Contents

ST. PAUL - A day after the attorney general criticized the state's efforts at preventing identity theft, Gov. Tim Pawlenty on Thursday proposed a series of measures - including facial recognition technology on driver's licenses - that he said would make state-held private data more secure.

The governor said his proposals had long been planned and weren't a response to Wednesday's criticisms by Attorney General Mike Hatch - who also happens to be the Democratic favorite to run against him in November. But Pawlenty and Hatch sniped at each other extensively in dueling media briefings, both claiming they'd do more to prevent identity theft.

"Identity theft causes great trauma, damage and cost to families," Pawlenty said. "There's more Minnesota can do to strengthen safeguards on personal information and to crack down on identity thieves."

Facial recognition

Likely to get the most attention is a proposal to use what's called biometric facial recognition technology on driver's licenses. The technology - which can be applied to existing license photos - converts the image into a mathematical algorithm to create a unique data file on every license-holder's face.

The technology, already in use in 13 states, makes it nearly impossible to fake a driver's license, Pawlenty said. He said most of the cost of the program could be funded by an $800,000 federal grant.

He also proposed legislation that would make it a crime to disrupt the normal operations of a computer, add criminal penalties for gaining access to personal data through a computer, allow computer hackers to be prosecuted even if they don't steal or destroy computer material, and make it a crime to disclose computer information knowing it may be used for a crime.

Wednesday, Hatch contended that driver's license numbers released by the Department of Public Safety are turning up in cases of check fraud and identity theft in increasing numbers. He placed the blame at the feet of the Pawlenty administration and said more needs to be done to protect that information
=======================

11. Press Release - Diamelle Technologies Releases
a Low Cost Authentication Server to Deter Account Fraud and Identity Theft with Soft Tokens for Multi-factor Authentication - Jan 6, 2006


Source Next Contents

Identity theft has become the world’s fastest growing crime. Consumers are more and more concerned about doing business online and passwords are increasingly viewed as not safe for application such as banking, brokerages, and e-commerce. Hard token solutions are expensive, hard to deploy and cumbersome for endusers. Diamelle's cost effect soft tokens provides the benefits of tokens, but operates in something most users already carry - cell phones, PDAs or PCs.

Cortlandt Manor, NY (PRWEB) January 6, 2006 -- Diamelle Technologies, (www.diamelle.com) which provides a comprehensive identity and access management enterprise solution, announced the release of a low cost Authentication server with two factor authentication, aimed at the SMB market and high volume online applications.

Identity theft has become the world’s fastest growing crime and risk exposure levels are high. Consumers are more and more concerned about doing business online and passwords are increasingly viewed as not very safe, especially for sensitive applications such as online banking, brokerages, and some e-commerce activities. Because passwords are so easily compromised, the National Credit Union Administration (NCUA) has been forced to mandate that credit unions go to a higher level of security. The Federal Financial Institutions Examination Council (FFIEC) has also recommended implementation of multi-factor authentication by end of 2006.

Authentication with more than one factor is considered as strong authentication which is considerably more difficult to compromise as compared with single factor authentication. Two factor authentication, using one time passwords (OTP), requires the user to enter something they know, which is usually a PIN, and something they have; a physical device such as a token, smart cards with micro-processors, or biometrics such as finger print scanners.

Hard token generators are expensive, some costing as much as $65 per token. The high price tag makes it difficult for many businesses to implement such a feature for high volume applications, no matter how strong the authentication may be. In addition, consumers are not going to be happy with lugging around multiple tokens from the different organizations that they may have relationships with. Currently available soft token solutions for cell phones often rely on a phone signal, making them impractical for use in environments where a signal is not available. Further, the user consumes valuable phone minutes upon each use.

The Diamelle solution uses something that every online consumer already has: a PC, a PDA, or a mobile phone. There are no manufacturing or distribution costs, just a simple one time software download. The solution is easily distributed to its audience using the self service module in the Diamelle Authentication Server and downloaded into the device using the Over the Air feature found in most modern cell phones. When the member requests a login to the business’s online authentication server, the small application generates a PIN internally in their phone (or PDA or PC). Most importantly, the system does not rely on SMS or need a phone signal or use the member’s precious phone minutes - it is a completely secure, encrypted and self-contained system. Alternative authentication methods are available for the odd occasion a user is unable to access either a cell phone or a PC.

Since no additional hardware is required, the cost per user is very low. The Authentication server itself is also attractively priced at $5,000 for the first 100 users, including tokens. Additional users start at $10 per user and quantity discounts are available for high volume applications. Available with the server is a web based administration console to manage user information. A fine grained API is also available to facilitate additional integration with other systems.

The Authentication Server can also be expanded to include Diamelle Technologies’ Enterprise Identity Management solution available for large corporations. The Diamelle IDM is an integrated, full featured product built on a Java Enterprise Edition (JAVA EE) platform with WS-I compliant web services to facilitate integration and provides authentication with Single Sign-on, authorization, user management, policy management, user self-service, audit, password management and delegated administration. Diamelle offers a seamless migration path from the Authentication server to the IDM solution.

Organizations need authentication and authorization across multiple applications and platforms. Without a coherent security framework, users are faced with multiple applications -- each with its own authentication needs and user repositories with multiple logins and passwords. Developers spend time creating their own security frameworks. Each application needs user accounts to be set up and productivity decreases as users struggle with multiple identities. Calls to support and help desk increase and raises the cost of operating systems.

The Diamelle solution manages user information, various identities and user groups, in a centralized secure infrastructure with enterprise-wide authentication utilizing both passwords and tokens. With Single Sign-On, users can login once, and roam freely in secured domains without being challenged again. Participating domains are not required to give up their own logins and credentials. The ability to hold multiple identities, across multiple domains allows for a wide network of co-operating domains to communicate seamlessly. Authenticated subjects can access restricted resources requiring multiple logins and credentials without the need to login at each domain.

Password Management is an optional module that allows the system to manage the large number of passwords that a user may be required to remember. These passwords can be managed through the consistent administration of password policies as well synchronization of passwords across systems. A self service module allows users to manage their own passwords as well as unlock their accounts when the need arises. This not only saves help desk time but has many checks to ensure an account is not compromised. Shared secrets such as mother’s maiden name and zip code used by many financial institutions are not very reliable. Multiple shared secrets offer better protection and the Diamelle solution has many such features. Audit logs help identity unauthorized activities and fraud and promote employee and user accountability.

Diamelle Authentication server has been built upon the Java EE platform utilizing a Service Oriented Architecture. The Diamelle product architecture emphasizes scalability, security, portability, platform independence, extensibility, business process mapping and easy systems integration. It is a powerful and flexible programming model which lowers implementation risks and cost of ownership and scales to millions of users. The solution can be deployed in a number of configurations where it can serve as the central identity manager for the enterprise or it may be deployed as part of an application, without creating a new footprint, as is often the case for ISVs or departmental solutions.

The use of the JAVA EE platform means that developers or administrators already working with JAVA EE app servers can leverage their existing knowledge. Competing products dating back to earlier times often have proprietary platforms without the same level of flexibility. Availability of Web Services and related technologies, simplifies integration with applications that use other technologies. Since SOAP toolkits are now available for a large number of platforms, the effort is greatly reduced and developers can leverage existing knowledge to achieve this goal.
The Diamelle Authentication server is available for immediate delivery. A promotional price is being offered during January 2006 where the Authentication Server for 500 users is available for $7,500-. Additional users licenses are available for $5- / user for 501 to 5000 user. 5001 to 10,000 users are $4- / user.
About Diamelle Technologies

Diamelle Technologies has been building robust enterprise solutions for some of the largest corporations on the planet, from Wall Street trading floors to entertainment and manufacturing industry giants since 1982. It specializes in Java EE systems utilizing a Service Oriented Architecture featuring Identity Management, CRM, e-Business and Content Management. Headquartered in New York, with a development center in Mumbai, Diamelle is uniquely positioned to deliver robust, transactional, distributed Enterprise systems at an affordable cost.
=============================

12. HK Polytechnic Univ's new developed system on display - China View - Jan 6, 2006

Source Next Contents

    HONG KONG, Jan. 6 (Xinhuanet) -- The World's first commercial use Palm-print Identification System is now on display at the ongoing International Conference on Biometrics 2006, according to Hong Kong Polytechnic University on Friday.

    Developed by Professor David Zhang, Associate Head of the Department of Computing of the university, the palm-print identification system was more accurate than finger-print identification system and could be applied at identity authentication.

    This remarkable development has generated a number of patents and earned him many international awards including the Senior Research Fellowship Award by the Croucher Foundation in 2004, the Gold Medal in the 14th National Inventions Exhibition of China in 2003, and Special Gold Award by the Invention Promotion Association of Korea in 2002.

    Besides, Professor Zhang and his research team are integrating traditional Chinese medicine diagnosis with biometric product development, creating tongue diagnosis system and pulse diagnosis system for daily use.

    Prof. Zhang said these systems can diagnose illnesses through human tongue shape, tongue print and heartbeats.

    The Tongue Diagnose System can diagnose such illnesses as intestinitis, cholecystitis, pancreatitis, diabetics, cirrhosis and heart failure, while the Pulse Diagnosis System is capable of diagnosing heart failure and lethargy.

    Organized by the university's Department of Computing, the three-day conference which began on Jan. 5 brought together more than 200 biometric experts and academics from over 20 countries to exchange and share research results.

    Biometrics topics focusing on the improvement and enhancement of existing biometrics and pattern recognition technology, incorporation of fake detection and amplifying applicability and utilization are being discussed.

    There is also an exhibition demonstrating the latest biometric products and prototypes. Exhibitors include local and overseas universities and organizations worldwide. Enditem
==================================

13. India's First Bio-ATM From Axis - By Rajendra Chaudhary - Mumbai - CXO Today [India] -  Jan 6, 2006

Source Next Contents

Axis software, a Pune based technology company has developed Bio-ATM, a biometric based automated teller machine for banks and financial institutions which leverages sophisticated biometric technology to allow secure ATM transactions.

This is the first time that any Indian company has developed such an ATM machine. The Bio ATM provides an alternative to the regular card and pin based ATM transaction systems.

In order to access accounts users need to give their biometric to the machine that will verify and authenticate it with the biometric records available in the database. The machine uses fingerprints for the verification purpose and hence customers will need to register their fingerprint with the bank.

Speaking to CXOtoday, Abhay Khinvasara, President & CEO, Axis Software said, "We use FBI approved scanning and matching algorithms. Wherever required, we can also offer iris recognition, skin texture recognition or even palm scanning. Since our ATMs are available with support for all popular Switch Protocols as well as popular middlewares, a buyer can even replace existing ATMs with the Axis BioATM seamlessly."

Features such as currency depositing, currency recycling and cheque truncating can be made available with the Bio-ATMs besides the standard Biometric authentication feature.

Axis informed CXOtoday that they have tested these ATMs in difficult markets and conditions which included lack of quality fingerprints data availability, lower literacy levels of the users and also poor network bandwidth and connectivity issues and that so far no mis transaction have been reported at any of the ATMs.

Axis claims that the machine is foolproof and impossible to deceive. Bio ATM's security features include video output for CCTV monitoring, intelligent silent alerts and built in data encryption for data transfer across the network.

The company has also developed a "Retrofitkit", which could be attached to a normal ATM machine to make it a Biometric one. The kit layers biometric authentication on top of a regular Card PIN based authentication without any physical or software changes to the existing ATM.

Jalgaon Peoples Co-opeative Bank has installed several Bio ATMs at their branches and the company has plans to export Bio ATMs to Central Africa and Middle East. Axis offers three types of ATMs in different sizes and capacities with different standard features. The Bio ATM prices range from US$ 2,000 to 14,000.

==================================
14. Security Risk Management is the answer to your security prayers - Security Park - Jan 6, 2006


Source Next Contents

It used to be the case that only the most technical members of the IT department understood IT security. Viruses, Trojans and worms were not terms used outside the IT room, management did not yet worry about hackers or zombie machines, and the board had absolutely no idea what a zero-day attack was, let alone how much damage it could cause.

Now however, with computers (and their attendant threats) a ubiquitous part of virtually every organisation, IT security has slowly but surely risen through the ranks to become the business-wide issue it deserves to be.

Familiar, traditional IT security solutions usually include as a minimum the ubiquitous firewall, plus anti-virus software and scanning, intrusion detection and identity management. But the range and scope of products available covers all different aspects of security from the very specific to broad, network-wide prevention measures.

In addition, most businesses using standard applications and software, for instance Windows, will also implement a programme of patch management. This ensures that the latest patches - the IT equivalent of sticking-plasters - are applied to the server or users' computers to fix any vulnerabilities inherent in the software.

While these security solutions are without a doubt better than nothing, and are often sufficient to protect the IT infrastructure in the main, they can also become a major headache for a business, its employees, and more specifically its IT department. Installing, implementing and maintaining the myriad solutions is usually an expensive and very time-consuming process.

IT staff spend time updating patches or reconfiguring firewalls when they could more usefully be focusing their attention on profit - driving activities. Security needs are unlikely to be prioritised, leading to resources being wasted on inessential measures - and particularly in the case of patches, this lack of understanding can lead to vulnerabilities being fixed unnecessarily.

The alternative however is worse - that measures are not taken and the network is left vulnerable. Add to this the fact that virus warnings, patch updates and other security problems are being constantly issued at an often incredible rate, and it is not surprising that businesses, and their IT departments in particular, are having trouble keeping up - with potentially disastrous consequences.

So what is the solution for businesses that want to protect their networks and machines in an effective and cost-efficient way? The answer is automation. Many of the solutions mentioned above can be, and frequently are automated - patches are automatically installed onto machines; anti-virus software scans for known signatures of viruses and worms - and the IT manager simply has to sit back and let the whole process carry on without them. Unfortunately however this is never as straightforward as it may seem.

Certain types of security require frequent updates which have to be manually inputted, while others are incompatible with particular systems and so need more careful monitoring. Security programmes too are often not intelligent enough to be relied on to deal with unusual or unexpected situations in the same way that a human could. A rush of traffic to a website may be mistaken for a zero-day attack, or the legitimate addition of new software may be mistaken for a malicious intrusion.

To avoid these kind of issues, what's needed is a more holistic approach that aligns security with business goals and more efficiently manages risk. Security Risk Management (SRM) is emerging as this missing link, helping translate the black art of security into compliance risk terms that can be easily digested and documented. According to Forrester, “IT organisations have always scrambled to align IT with the business, but now there’s a new scramble going on - in the area of risk and compliance management.”

Security Risk Management is defined by leading industry analysts as the complete process of understanding threats, prioritising vulnerabilities, limiting damage from potential attacks, and understanding the impact of proposed changes or patches on the target systems.

SRM solutions integrate and automate multiple information sources and technologies required to implement an effective vulnerability management process - and add the analytics required to make more intelligent decisions to protect critical business assets before an attack ever occurs, while continuously proving and improving risk postures.

There are three key steps in the SRM process:
· Risk Assessment: Risk assessment is the identification and evaluation of risk and its business impacts. An integrated security approach is required:
o Define the origins and profiles of various threats

o Collect and normalise vulnerability scanning data

o Collect routing and access information from firewalls and routers

o Define asset classification in business and compliance terms

· Risk Mitigation: Risk mitigation involves prioritising, evaluating and implementing the appropriate risk-reduction measures recommended from the risk assessment process. A business impact analysis approach is required:

o Model vulnerabilities in context with network routing

o Perform attack simulation to uncover the weaknesses that pose the greatest potential harm to the business

o Calculate risk exposure metrics and establish benchmarks

o Analyse mitigation alternatives

· Risk Measurement: Risk measurement determines effectiveness of the action and continues reassessment and mitigation cycle to minimise threats and vulnerabilities. A measured ROI approach is required:

o Perform ‘what if’ access and risk analysis

o Evaluate the cost benefits of countermeasures before deployment

o Issue workflow tickets to the change management systems

o Issue appropriate reports to security, IT operations, CICO, CIO, business owners, auditors

o Repeat and automate the data collection and analysis process to keep up with constant network infrastructure changes and the introduction of new threats

This approach ensures that security systems are kept continuously up-to-date, as well as providing a clear audit trail for the IT department to monitor and demonstrate the different security processes in place. It gives businesses a comprehensive overview of their vulnerabilities and allows them to accurately assess the risks they face, and determine their priorities for remediation.

Time isn’t spent by the IT department on unnecessary measures so time can instead be spent on improving efficiencies elsewhere. Perhaps most importantly the window of vulnerability, from the time that a threat is identified to the time that it is remediated, is decreased, leaving businesses far less likely to suffer damage.

With Security Risk Management as a best practice, corporations can dramatically reduce their risk, reduce the time and effort taken to conduct and document an audit and improve the accuracy of their information.

Automation means that security teams and auditors can have a continuously accurate snapshot of the security situation at any one time, and quickly see and correct lapses in internal controls to make sure they are always fully compliant. The IT department, security teams, business teams and executives can talk about security in the same terms and work collaboratively to ensure continuous improvement.

SRM is quickly becoming the by-word for intelligent security, and with threats increasing daily in both frequency and severity, it’s a term that businesses will soon find themselves familiar with. To have and maintain the competitive edge when it comes to security now takes more than just a firewall - it takes a smart, efficient approach to managing risk.

Article contributed to Security Park by Avi Corfas, VP and MD EMEA, Skybox Security. Skybox Security is exhibiting at Infosecurity Europe 2006 - www.infosec.co.uk

====================================

15. THE ELECTION - Harper trumpets get-tough crime plan - Conservative Leader would raise minimum sentences and try 14-year-olds as adults - By BILL CURRY - The Globe & Mail- Jan 6, 2006


Source Next Contents

TORONTO -- One of the first acts of a Conservative government would be to enact a sweeping law-and-order package to increase mandatory minimum sentences for gun crimes, require youths 14 and older to be tried as adults for serious crimes, and end a program under which prisoners are released after serving two-thirds of their sentences, Stephen Harper said yesterday.

Speaking in Toronto, where the fatal shooting of a 15-year-old girl on Boxing Day has sparked a major debate on gun violence, Mr. Harper accused the Liberals of doing nothing while crime increased during their 12 years in office.

"The revolving door of criminal justice of this current government bears significant responsibility for the tide of gun, drug and gang crime plaguing our cities," Mr. Harper said, near where Jane Creba was killed while shopping on downtown Yonge Street.

Mr. Harper said Canadians deserve to be proud of the country's reputation for safe streets, safe communities and low crime rates. "But we are learning, even in the midst of this campaign, that these things cannot be taken for granted. The Canadian way of life and those proud traditions of safety and security are today threatened by a rising tide of drugs, gangs and guns."

Mr. Harper said his crime package would cost $100-million a year and would be funded in part by scrapping some of the current government's justice spending.

The proposals were praised by police and victims-advocates groups. But others said the Conservative plans reflected the understanding that law-and-order promises get votes, and that they would serve mainly to increase the prison population.

The proposals include:

Mandatory minimum sentences of five or 10 years would be imposed for more than two dozen types of gun crimes; existing mandatory sentences are one or four years, depending on the offence.

Three new offences would be created and subjected to the five-year minimum: breaking and entering with the intent to steal a firearm, robbery with the intent to steal a firearm, and possession of a firearm contrary to a bail order.

Automatically subjecting to an adult sentence anyone 14 years or older who is charged with a serious violent offence or repeat offences. Current law allows that, but does not require it.

 Ending house arrest -- or conditional sentences -- for violent crimes, sexual offences, weapons crimes, and impaired driving causing death, among other things.

Ending statutory release, which allows prisoners to be released after serving two-thirds of their sentences. Prisoners would be required to earn parole through good behaviour or rehabilitation.

Scrapping the federal gun registry and using the money to hire 1,000 new RCMP officers.

Using face recognition and other biometric technology to screen people at border crossings and ports of entry.

Appointing a National Security Commissioner to better co-ordinate Canada's security and intelligence organizations.

Expanding intelligence-gathering activities overseas and working more closely with foreign agencies.

Rapidly reducing the backlog of deportation orders.

Alan Young, a law professor at York University's Osgoode Hall Law School in Toronto, said the overall impact of Mr. Harper's proposals would likely be to boost the prison population. Mr. Young called the stiffer gun sentences an incremental boost unlikely to have much impact on anything. "It almost looks like just pulling numbers out of a hat arbitrarily," he said.

Before more changes are made, there needs to be much more study of the current minimums -- which have not been in place long -- to see whether they have had any effect, he said. And there is "absolutely no evidence" that there is a need to tighten rules governing parole, Mr. Young added. "It's a myth that parolees are getting out and committing serious crimes" except in exceptional circumstances, he said.

The Liberal law-and-order package centres on a proposal to outlaw all handguns. It also calls for tougher sentences for some gun-related crimes, as well as money to hire more RCMP officers and to train at least 250 of them to work with the provinces and municipalities on guns, gangs, organized crime and drug trafficking.

========================

16. Homeland Security opening private mail - Retired professor confused, angered when letter from abroad is opened - By Brock N. Meeks - MSNBC - Jan. 6, 2006

Source Next Contents

WASHINGTON - In the 50 years that Grant Goodman has known and corresponded with a colleague in the Philippines he never had any reason to suspect that their friendship was anything but spectacularly ordinary.

But now he believes that the relationship has somehow sparked the interest of the Department of Homeland Security and led the agency to place him under surveillance.

Last month Goodman, an 81-year-old retired University of Kansas history professor, received a letter from his friend in the Philippines that had been opened and resealed with a strip of dark green tape bearing the words “by Border Protection” and carrying the official Homeland Security seal.

“I had no idea (Homeland Security) would open personal letters,” Goodman told MSNBC.com in a phone interview. “That’s why I alerted the media. I thought it should be known publicly that this is going on,” he said.  Goodman originally showed the letter to his own local newspaper, the Kansas-based Lawrence Journal-World.

“I was shocked and there was a certain degree of disbelief in the beginning,” Goodman said when he noticed the letter had been tampered with, adding that he felt his privacy had been invaded. “I think I must be under some kind of surveillance.”

Goodman is no stranger to mail snooping; as an officer during World War II he was responsible for reading all outgoing mail of the men in his command and censoring any passages that might provide clues as to his unit’s position.  “But we didn’t do it as clumsily as they’ve done it, I can tell you that,” Goodman noted, with no small amount of irony in his voice. “Isn’t it funny that this doesn’t appear to be any kind of surreptitious effort here,” he said.

The letter comes from a retired Filipino history professor; Goodman declined to identify her.  And although the Philippines is on the U.S. government’s radar screen as a potential spawning ground for Muslim-related terrorism, Goodman said his friend is a devout Catholic and not given to supporting such causes.

A spokesman for the Customs and Border Protection division said he couldn’t speak directly to Goodman’s case but acknowledged that the agency can, will and does open mail coming to U.S. citizens that originates from a foreign country whenever it’s deemed necessary.

“All mail originating outside the United States Customs territory that is to be delivered inside the U.S. Customs territory is subject to Customs examination,” says the CBP Web site.  That includes personal correspondence.  “All mail means ‘all mail,’” said John Mohan, a CBP spokesman, emphasizing the point.

“This process isn’t something we’re trying to hide,” Mohan said, noting the wording on the agency’s Web site.  “We’ve had this authority since before the Department of Homeland Security was created,” Mohan said.

However, Mohan declined to outline what criteria are used to determine when a piece of personal correspondence should be opened, but said, “obviously it’s a security-related criteria.”

Mohan also declined to say how often or in what volume CBP might be opening mail.  “All I can really say is that Customs and Border Protection does undertake [opening mail] when it is determined to be necessary,” he said.
© 2006 MSNBC Interactive
===========================
17. Biometric technology secures pocket-sized server - Secure ID NEws - January 9 2006

Source Next Contents

AuthenTec's fingerprint sensor has been chosen by mobile enterprise platform developer Realm Systems to secure the company's mobile pocket-sized server, making it, according to AuthenTec, one of the most secure in the industry.

SALT LAKE CITY and MELBOURNE, Fla. -- Realm Systems has chosen AuthenTec's biometric technology to enable secured endpoint computing in its pocket-sized server. The Realm iD3 Personal Server is a fully functioning server that is ultra- secure, centrally managed -- and small enough to fit in your pocket. The Realm iD3 contains its own processor, memory, storage, built-in AuthenTec biometric fingerprint sensor, and is completely powered by the USB port of any host computer.

"We are pleased that Realm has chosen AuthenTec's advanced fingerprint sensors to protect the critical files, features and functions on its unique mobile server," said Tom Aebli, director of PC segment marketing for AuthenTec. "By adding AuthenTec biometrics, Realm is setting a new standard in mobile security for its customers." "Because of the AuthenTec sensor, the Realm iD3 is one of the most biometrically secured devices in the industry," said Chris Bodily, Realm iD3 Product Manager. "Through Realm's proprietary solution, the biometric data provided by the AuthenTec sensor is never sent over a network or other possibly compromised medium."

About Realm
Realm Systems provides a next generation Mobile Enterprise Platform that simplifies the delivery of applications and services to end-users across the distributed enterprise. Realm Systems is uniquely positioned to solve many of the issues facing today's networked organizations by extending the life of desktops and laptops, significantly reducing IT maintenance costs. Realm's technology simplifies and centralizes identity and application management and maintenance while preserving existing IT capital investment. The company is at the nexus of an enormous opportunity that spans markets, including security, identity management, regulatory compliance, and mobile device support of enterprise applications. According to AMR Research, the market for data security compliance alone is expected to reach $15.5 billion by the end of 2005. Realm Systems was founded in 2002 by a group of seasoned technologists and executives with extensive expertise in distributed computing, integrated circuit development, web services, and IT security. Realm Systems is privately held with offices in Salt Lake City, Utah and Seattle, Washington. Visit our website at www.realmsys.com.

About AuthenTec
With more than six million sensors in use worldwide, AuthenTec is the world leader in fingerprint sensor security, innovation and sales to the PC, wireless, and access control markets. AuthenTec's award-winning FingerLoc(R) and EntrePad(R) sensors take full advantage of "The Power of Touch" by utilizing the company's patented TruePrint(R) technology to deliver the most convenient, reliable and cost-effective means available for enabling touch- powered features that extend beyond user authentication. The company's network of partners, solution providers and customers include: Analog Devices, APC, Compal, Cherry, Fujitsu Computer, Computer Associates, HP, IBM, LGE, Microsoft, Motion Computing, NEC Packard Bell, Pantech, Quanta, Samsung, Tatung, Texas Instruments, Toshiba, and Wistron, among others. Visit www.authentec.com.

===========================

18. Military Sensor Hears Through Walls - By Bill Christensen - Live Science.com - Technology.com - Jan 9, 2006

Source Next Contents

A new handheld radar scope from the Defense Advanced Research Projects Agency (DARPA) can provide troops with an ability that was formerly the province of science fictional superheroes alone-the ability to sense through up to 12 inches of concrete whether someone is in the next room.

The Radar Scope is expected to be in use in Iraq by spring of this year, according to DARPA's Edward Baranoski. Weighing just 1.5 pounds, the device is about the size of a telephone handset and will cost about $1,000. Waterproof and rugged, it runs on AA batteries. Held up to a wall, users will be able to sense movements as small as breathing up to fifty feet into the next room.

    "It may not change how four-man stacks go into a room (during clearing operations)," Baranoski said. "But as they go into a building, it can help them prioritize what rooms they go into. It will give them an extra degree of knowledge so they know if someone is inside."
    (From DefenseLink)

Science fiction writers have been working on this idea for generations. Golden age writer E.E. "Doc" Smith wrote about a spy ray in his 1934 novel Triplanetary. DARPA has yet to actually come up with an actual sci-fi life detector like the one that Frank Herbert wrote about in 1958 in his story Cease Fire:

    The antennae of the Life Detector atop the OP swept back and forth in a rythmic halfcircle like so many frozen sticks brittle with rime ice...

    One operator - drugged to shivering wakefulness - stood watch in the OP. The space around him was barely six feet in diameter, crammed with equipment, gridded screens glowing a pale green with spots that indicated living flesh.
    (Read more about Frank Herbert's life detector)

Still, the handheld Radar Scope is a remarkable invention, and should make the task of searching buildings at least a bit less dangerous. Read more at DefenseLink.
===========================

19. Take security precautions when an employee leaves the organization - by  John McCormick   - Tech Republic - Jan 9, 2006

Source Next Contents

Employee separations create critical situations for IT departments. IT professionals often concentrate on external threats, but insiders always pose the most serious threat to computer security. Getting fired can sour even a model employee's opinion about the company.

An employee's separation period is more critical than his or her initial hiring. New employees require time to gain a thorough knowledge of your business: what information is valuable; what isn't; and what could cause the most harm. When employees leave, they know your competitors, your phone directory (useful for social engineering), your client list (useful for poaching), how often you perform backups, how seriously you take physical security, how often passwords are changed, and the like.

Although the immediacy of your actions will depend somewhat on whether the separation is friendly or hostile, your separation process should be largely the same. After all, you never really know how an employee feels about the departure or if he or she will change their mind later. A friendly separation may become hostile. A cunning employee may be hiding how hostile they feel at the time of separation. A departing/previous employee may inadvertently discard sensitive company documents.

Keep your organization safe during employee separations with the following IT security precautions.
General separation procedures

    * Change all network and workstation passwords which the individual could possibly have access to - then change all the rest too.
    * Deactivate all company e-mail accounts.
    * Deactivate any remote access accounts and collect any remote access security devices.
    * Retrieve company laptops or PDAs (Never permit employees to use a personal PDA or laptop for work purposes - they WILL store passwords and other information on it and later you won't have any control over it.)
    * Retrieve all backup disks, USB keys, and CD-ROMs.
    * Conduct a detailed debriefing session with special emphasis on any encrypted files or work in progress in electronic form which other individuals may not know about. It's easy to look through file cabinets but electronic work product can be highly elusive.
    * Take whatever action is appropriate for digital cameras. This may include inspecting cameras brought onto company property or simply not permitting cameras. You can store a lot of data in a camera's storage media.
    * Reprogram voicemail and change passwords.
    * Obtain all company-related keys, pass cards, and ID cards but remember that keys can be duplicated and many employees will honestly (or dishonestly) say that they have lost some items.
    * Inform security and change any biometric or physical badge access codes to exclude the individual.
    * Secure all work products, both hard copy and electronic.
    * Make certain you have retrieved all documentation or other printed material, especially including company phone books.
    * Retrieve any gate pass or parking tags.
    * Change PINs to any gas or other credit cards.

Hostile or potentially hostile terminations

When an employee is fired for cause, such as stealing, or when a terminated employee possesses critical corporate information, the IT department should act more swiftly than during normal separations. If at all possible, ask management to warn you in advance of hostile terminations so you can be ready when the time comes.
=============================

20. Taking the 'I' out of Identity - Sean McGrath, ITworld.com - Jan 9, 2006

Source Next Contents

Few e-business subjects have caused such deep furrowing of brows as the concept of identity.

'Obviously', some business folk say, 'to really do E-Business, we will need a way of guaranteeing that a visitor to our web site is who they say they are.'

'Sure thing', the younger engineering folk say, 'it is just a matter of technology. We will start coding and/or buying stuff to make it all just work.'

'Not so fast', the older engineering folk say, 'this problem is broader and deeper than you think. Electronic identity is subtle at best, certainly insanely complicated and possibly even intractable.'

As is often the case with seemingly intractable problems, revisiting basic assumptions is always a worthwhile exercise. The big assumption here is that to do business electronically with someone, you need to know who they are. Is that really true?

Sometimes it most definitely is true of course but there are a significant number of use cases where it is not true. Sometimes lurking behind the phrase 'we need to know who they are' lies the real substance of the concern which is 'we need to know they can pay' or, more generically 'we need to know that the person/thing we are interacting with can conduct a value exchange.'

The cracking noise you can hear in the background is the rending of two concepts that tend to be bound together. The concept of identity on one hand and the separate concept of 'ability to conduct value exchange' on the other. People turn up with cash. They can clearly pay. People turn up with checkbooks. They can clearly pay. People turn up with credit cards, they can clearly pay...

But, people can pay for things with credit cards on-line. In other words, credit cards are usable today without the physical exchange of paper and without physical presence. How does that work? When you take an order with a credit card on-line, do you really know that the person is who they say they are?

No you do not. What you do know is twofold (a) that the details provided to you are considered good by the credit card company and (b) the credit card company is taking on the risk in return for a percentage of the transaction value.

I guess what I'm saying is that credit cards have already removed the need to know anything about the person/thing you are dealing with - the 'I' in identity. All you are interested in, is that the credentials are valid according to the credit card company and that you can use the credentials to conduct the value exchange.

Some think this is messy and not really a solution to the identity problem in E-Business. Some think that we need to establish identity firmly to move on. Some think that it is only a matter of time before biometrics or some such technology steps into the breach to solve this problem. Then and only then, so the story goes, can we really get down to serious e-business.

Perhaps, but I doubt it. As in so many other areas, the Web has a way of cooking up an exquisitely balanced sweet and sour blend of simplicity and complexity. In the case of identity, I think we are well on the way to jettisoning the knee-jerk binding of identities to people in favor of a more abstract concept of "thing that can engage in value exchange".

I sometimes hear folks talking about e-cash and personalized agents and bots and what have you, in the future tense. From where I'm standing, we already have these things. To Amazon, I am indistinguishable from a bot. I might as well not exist for all Amazon's web site cares. It is the credit card company who worries about whether or not I am real.
Sean McGrath is CTO of Propylon. He is an internationally acknowledged authority on XML and related standards. He served as an invited expert to the W3C's Expert Group that defined XML in 1998. He is the author of three books on markup languages published by Prentice Hall. Visit his site at: http://seanmcgrath.blogspot.com.

==========================

21. Press Release - bioMETRX, Inc.'s Finger Activated Garage Door Opener to be Featured on HGTV's 'I Want That'Product To Kick Start Consumer Biometrics Interest -  January 9, 2006



Source Next Contents

JERICHO, N.Y., Jan. 9 /PRNewswire-FirstCall/ -- bioMETRX Inc., (OTC Bulletin Board: BMTX - News) announced today, that its first product, the smartTOUCH(TM) Garage Door Opener will initially be featured on HGTV's prime time program "I Want That" on Wednesday January 11th at 8:30pm and several rebroadcasts throughout the months of January and February. More information on the program can be found at www.HGTV.com. The highly acclaimed patent- pending garage door opener uses finger activated technology to operate the homeowner's garage door. bioMETRX Inc. is a Jericho, New York based research and development company that is using state of the art finger activated technology to create innovative, stand alone security and electronics products for the consumer under the smartTOUCH(TM) brand name. The company is focused on providing simpler, more secure and convenient products to protect consumers property and families.

The company's smartTOUCH(TM) family line of products responds to the needs of a consumer electronics market, especially in residential security, that has not realized any significant changes in its products over the last 30 years. Current garage door products have underlying problems such as unauthorized interference by neighbor's remote garage door openers, unauthorized use of the opener (anyone can simply press down a button and open a garage door), or simply a user forgetting their PIN code.

"Our smartTOUCH(TM) products provide solutions to these annoying problems, empowering the homeowner to securely open their doors, or set alarms/thermostats etc. by a simple touch of a finger," said Lorraine Yarde, V.P of Marketing for bioMETRX. "When you add the convenience of allowing children and the elderly, who cannot always remember PIN numbers, with a simple way to come and go securely, demonstrates the power of biometric technology. The interest we have received for this product, from both retailers and consumers, is far exceeding our expectations", noted Ms. Yarde.

About bioMETRX, Inc.

bioMETRX, Inc. is developing a diverse portfolio of wholly owned companies that design, develop and market biometrics-based products to the consumer, health information, medical devices and small business markets under the common brand name -- smartTOUCH(TM). bioMETRX Technologies, Inc. which was acquired in May, 2005 that designs and engineers biometrics-based products for the home security, consumer electronics, medical products and patient medical information markets; smartTOUCH Security, Inc. that tests and markets the company's biometrically secured garage door openers, thermostats, deadbolts and home alarm keypads and, smartTOUCH Medical, Inc., that designs, tests and markets biometrically secured medical crash carts, rolling medicine carts, portable patient medical information devices and, security and retrieval systems for electronic medical records. bioMETRX, Inc.'s entire product line is branded under the trade name "smartTOUCH(TM)". For more information on bioMETRX and/or the company's smartTOUCH line of products including the Garage Door Opener, visit the Company website at http://www.biometrx.net

Safe Harbor Statement: Forward-looking statements in this release with respect to bioMETRX' business, financial condition and results of operations, as well as matters of timing and the prospective terms of the transaction described are subject to risks and uncertainties that could cause actual results to differ materially from those expressed in the forward-looking statements, including, but not limited to, certain delays beyond bioMETRX' control with respect to market acceptance of their technology and/or products, whether financing will be available, the effect of the application of acquisition accounting policies as well as certain other risk factors which are and may be detailed from time to time in bioMETRX's filings with the Securities and Exchange Commission.

=========================

22. Press Release - The organizers of Security Challenges 2006 (SCC), have announced the line-up for this year’s winter conference, which features keynote address speaker John Pescatore of Gartner and guest speaker Ira Winkler of ISAG, along with a team of other prestigious speakers and sponsors. The free, two-day online conference will be held January 18th and 19th 2006, and will feature in-depth evaluations of today’s most critical security topics.

Source Next Contents

SCC 2006 consists of five segments each day. Attendees may choose to register for all, or parts, of the event based on their organization’s specific needs. Day one will address enterprise security, intrusion prevention, email security, virus protection and government security. Day two will cover vulnerability assessment, anti-virus management, phishing, identity management and security challenges.

“Security is a priority for every business in today’s marketplace,” said Tony Mines, CEO of ShoutStream, Inc., parent company of eSecureLive. “We developed this conference to foster communication between security professionals and technology leaders, and to accurately assess new threats and vulnerabilities facing organizations in 2006.”

“SCC 2006 recruited leading industry analysts and professionals to help attendees assess their security weaknesses and leverage new information in order to protect their organizations against growing security threats,” said Mines.

The event is expected to draw thousands of attendees from a broad range of industries including government, education and financial services, to learn about the latest in information security. Event sponsors include ActivIdentity, Core Security, eEye, GeoTrust, iPolicy Networks, MailFrontier, MCI, NetContinuum, Neoscale Systems, Inc., and Qualys, Inc.

To register for this event, or for more information, visit www.esecurelive.com/scc2006

==============================

23. UK rejects 80,000 passport photos following new rules - Jan 9, 2006

Source Next Contents

More than 80,000 passport photos were rejected by the UK Passport Service (UKPS) within less than two and a half months following the introduction of tough new standards on how images should be submitted.

The standards introduced last September led to 81,927 photos being rejected from 597,863 applications - at total of 13.7%, according to figures obtained by SDW (see Table below). The figures relate to a period between 12 September 2005 and 24 November 2005.

Whilst this figure appears high, the UKPS was reportedly happy at the size of the rejection rate, having privately expected 20-25% of photos to be rejected following the introduction of the new rules. Rejections are now reportedly down to below 10%.

According to UKPS, the photo rules were necessary in order to meet stringent, internationally-agreed standards to enable facial recognition technology to work properly. The requirements were agreed by the International Civil Aviation Organisation (ICAO) in 2003 and will enable the production of biometric ePassports as well as the use of facial recognition technology to counter passport fraud and for enhanced checks at international border controls, UKPS commented.

Prior to the implementation of the new photographic standards on 12 September, detailed data on photo rejection rates was not gathered, Andy Burnham, parliamentary under secretary recently commented in a written answer to Parliament. Burnham also gave a further data point commenting: “For the period of 18 September 2005 to 4 December 2005 [11 weeks], UKPS rejected 12.5% of applications due to passport photograph standards.”

UKPS commented that the most common reasons for rejection included eyes being obscured, unsuitable facial expressions (such as an open mouth) and incorrect paper quality.

Among the specifications set out in the new photo guidelines are:

•           applicants must submit two identical photos, which have been taken in the last month;

•           the photos should be printed on normal photographic paper and should be 45 mm x 35 mm in size;

•           the photo should show a close up of the applicant’s head and shoulders so that their face covers 65-75% of the photo;

•           the photo should be taken against an off-white, cream or light grey plain background so that the applicant’s features are clearly distinguishable against the background;

•           the photo must be of the applicant on their own, with no other people visible. It must show their full face, looking straight at the camera, with a neutral expression, with their mouth closed.

Table: A breakdown by passport office looking at passport application rejection (Source: Home Office)

London - 1,225

Liverpool - 21,291

Peterborough - 17,729

Newport - 22,568

Glasgow - 9,679

Belfast - 8,882

Durham - 37,965

Total queries - 119,339

Total photo rejections - 81,927

Passport application intake - 597,863

Photo queries as percentage of intake - 13.7%
================================

24. The dirt on clean data - By Mary Mosquera - Government Computer News - Jan 9, 2006

Source Next Contents

With a little elbow grease, agencies can make their data presentable

More than ever, an agency’s ability to do its job depends on the quality of its data. From delivering Social Security payments on time to managing large projects to capturing terrorists, agencies are finding that inferior-quality, or dirty, data can really gum up the works.

Clean data, which essentially means data that is accurate and accessible by outside users, has the opposite effect.

The Office of Management and Budget is trying to get agencies to clean their data by requiring departments to adopt the Federal Enterprise Architecture’s Data Reference Model, while a host of other agencies are scrubbing their existing information to make it more functional.

Version 2.0 of the DRM, which OMB released last month, enables architects to describe information so it is easy to find and use across multiple federal agencies and provides the resources to standardize the description, context and means of sharing data.

While the DRM is one step toward clean data, most agencies are struggling with the flip side-dirty data, which is inaccurate and inconsistent. Dirty data has the potential, over time, to impede the wheels of government, said Kimberlee Mitchel, senior technical adviser in the Social Security Administration’s Office of Systems.

Domino effect

Dirty data increases the time it takes to process transactions, requires manual intervention and causes backlogs. It also can cause errors-for example, in Social Security benefit payments-which can set off a chain of unwelcome consequences.

SSA shares its earnings reports with other agencies. If the IRS or state agencies obtained bad data, they might send a notice saying a person hadn’t paid the right taxes, when in fact they had, leading to a bad credit report.

“The consequences of clean data are that you’re able to facilitate automated processing. If we can move to the point where you have computers talking with computers, sharing and exchanging data, the productivity of this country would just soar,” Mitchel said.

As agencies increasingly share data across their own business units and across government, their need for clean data has grown. But even basic data becomes complex because of variations in formats, cultures and definitions.

One agency dealing with the problem is the Homeland Security Department’s U.S. Visitor and Immigrant Status Indication Technology program, which disseminates information on foreign nationals in the country to DHS’ Immigration and Customs Enforcement (ICE) directorate and the State Department.

U.S. Visit verifies the identity of foreign nationals at U.S. ports of entry and checks them against databases of terrorists and criminals.

The program builds its immigration database on the visitors’ name, date of birth and passport number. Biometrics of two-fingerprint scans ensure the accuracy of data collection, said Robert Mocny, U.S. Visit deputy director. The finger scan can compensate for some variation, such as the format of the date of birth. “If we don’t have good data on the bad guys, and we’re not doing a good finger scan or not doing the due diligence from the biographic side, then we might miss someone at some point,” Mocny said.

Incomplete and inaccurate data also leads to missed opportunities.

“When we first started giving data to ICE, we were giving them thousands of records that they really couldn’t follow up on,” Mocny said. “Now, we’re up to 70-plus arrests in the last few months based on our records that we’ve given them.”

But biometrics don’t always come into play, such as when DHS has to track and monitor visitors when they get a legal extension to stay. That puts the emphasis on the quality of other records.

“The higher you can raise the integrity of data, the better. We aren’t going to catch terrorists with just finger scans but also by improving the quality of data,” said Glenn Norton, U.S. Visit mission operation data management chief.

Beginning this month, U.S. Visit will evaluate data for its usability before transmitting it to ICE border agents, Norton said.

Sophistication

U.S. Visit sifts through 10 federal systems that have records for aliens with manual querying or a search algorithm. DHS anticipates incorporating more sophisticated algorithms into some applications to automate the search for matches this year, Norton said.

The department put together a data integrity group of analysts, the Smart Border Alliance, from among U.S. Visit lead contractor Accenture LLP of Chicago’s partners to spot trends in data errors that ICE agents report and determine if the errors are related to training or systems, Norton said.

If data corruption makes federal administrative systems ineffective, citizens begin to lose confidence in their government, Social Security’s Mitchel said. Knowing that the source of data-called its pedigree-is reliable is a key element of clean data.

Automated tools (such as data profiling, search and matching, statistical analysis applications, algorithms and edits) can clean data, but the presence of dirty data might not be apparent until its consequences appear later.

“People are starting to realize that data integrity is the fundamental thing that an administrative government organization deals with,” Mitchel said.

To foster data integrity, agencies need a governance and business model, said Scott Schumacher, chief scientist at Initiate Systems Inc. of Chicago, which provides data cleansing, matching and integration for the Veterans Affairs Department and other agencies.

“You need a governance model for what data you will share from an agency and what rules you have in place for the receiving agency to look at the information,” he said.

DHS in February plans to implement a data governance framework to establish data stewardship, accountability and responsibility processes.
=============================
25. Three More States Add Laws on Data Breaches - by Jaikumar Vijayan - ComputerWorld - Jan 9, 2006

Source Next Contents

JANUARY 09, 2006 (COMPUTERWORLD) - Companies struggling to keep up with a patchwork of state laws related to data privacy and information security have three more to contend with, as a result of new security-breach notification laws that went into effect in Illinois, Louisiana and New Jersey on Jan. 1.

Like existing statutes in more than 20 other states, the new laws prescribe various actions that companies are required to take in the event of a security breach involving the compromise of personal data about their customers.

For instance, New Jersey's Identity Theft Prevention Act requires businesses to destroy all customer data that's no longer needed and to notify consumers when sensitive data about them has been accessed by an unauthorized person. The law also limits the use of Social Security numbers on all items that are sent via postal mail.

Louisiana's Database Security Breach Notification Law requires entities that collect information on the state's residents to notify affected individuals of security breaches involving their confidential data. Government officials also need to be notified, according to the law. Illinois' Personal Information Protection Act is similar, although it doesn't require companies to inform the state government when breaches occur.

For companies that do business nationally or in various states, the smorgasbord of state laws poses a growing problem, because the measures often specify different triggers for notifications and set varying requirements on what needs to be disclosed, to whom and when, said Kirk Herath, chief privacy officer at Nationwide Mutual Insurance Co. in Columbus, Ohio.

In addition, some states require companies to provide credit-monitoring services to affected customers, whereas others don't, Herath said. And not all of the states offer safe-harbor provisions that exempt companies that encrypt data from their laws, he said.

Seeking Consistency

"What I would prefer to see is something that would be uniform and preemptive [of state laws]," Herath said. "Otherwise, you have a very inconsistent application of the law, with some states requiring you to do nothing [and] some hammering you to the point of being unfair."

"We're hoping a federal law will help clarify the situation," said the director of information security at a specialty retail chain based in California.

Until that comes to pass, the retailer plans to continue to use the SB 1386 breach-disclosure law that went into effect in California more than two years ago as a "baseline" for developing its security incident response and notification strategy, said the director, who asked not to be identified.

The retail chain also plans to develop an information grid that will help it quickly go through a checklist of requirements for each state in case it triggers a notification statute. Nationwide already has such a grid, according to Herath.

"What the situation is crying out for is a federal version of the state laws," said Arshad Noor, CEO of StrongAuth Inc., a compliance and identity management services firm in Sunnyvale, Calif. But such a law would have to be at least as strong as the existing state regulations are for it to win approval from federal legislators, Noor said.
=============================

26. Press Release -  Award Includes PKI and HSPD-12 Compliant Products and Services - Jan 9, 2006

Source Next Contents

    FAIRFAX, Va., Jan. 9 /PRNewswire-FirstCall/ -- WidePoint Corporation's (OTC Bulletin Board: WDPT) wholly-owned subsidiary Operational Research Consultants, Inc. (ORC), the leading provider of federal public key infrastructure (PKI) and credential managed services, announced today that it has been awarded a Blanket Purchase Agreement (BPA) with a ceiling of $100 million by the General Services Administration (GSA). Under the BPA, ORC will provide digital certificates, credentialing services, managed PKI services and Homeland Security Presidential Directive (HSPD-12) compliant products and services.

    As the first Access Certificates for Electronic Services (ACES) BPA issued under the GSA Information Technology (IT) Schedule 70 E-Authentication category (SIN 132-60), this BPA provides for authentication products and services for purposes of physical and logical access controls, electronic signature, performance of e-business transactions, and delivery of Government services.

    As a GSA Shared Service Provider (SSP) with an Authority To Operate (ATO), ORC's award was based on achieving rigorous qualifications including security certification and accreditation (C&A), cross certification with the Federal Bridge Certification Authority (FBCA) and the ability to provide robust PKI services. ORC operates a government-compliant authentication-based system for electronic communications between the government and members of the general public at Assurance Levels 1 through 4. This BPA augments ORC's unique expertise as the first federal provider of Personal Identity Verification (PIV)-ready solutions.

    Under the terms of the BPA, ORC's ACES certificates are intended for use by the Federal government, state and local units of government, Native American tribal units, educational institutions, and non-government entities, including the general public and commercial business entities.

    Steve Komar, CEO of WidePoint, said, "This BPA will save the federal government significant time, resources and expenses in acquiring PKI and credentialing solutions as mandated under HSPD-12. ORC has almost 15 years of experience in designing, developing and implementing information assurance solutions for the federal government. This BPA award confirms the company's reputation as an elite provider of a wide range of information assurance solutions from HSPD-12 planning and integration to managed credentialing services. We look forward to delivering the means necessary for federal agencies to meet the 2006 PIV-II deadline."

    About WidePoint     WidePoint is a technology-based provider of products and services to both the government sector and commercial markets. WidePoint presently specializes in providing systems engineering and information technology services as well as PKI E-Authentication and credentialing services. WidePoint's wholly owned subsidiary, Operational Research Consultants, Inc. (ORC) is at the forefront of implementing public key infrastructure, E-Authentication and credentialing services. The company's identity management and E-Authentication services have received three major U.S. federal government certifications. WidePoint's profile of customers encompasses U.S. federal government agencies such as the Department of Defense, the Department of Homeland Security, the U.S Treasury Department and the Department of Justice as well as major transnational corporations such as Boeing Aerospace and Northrop Grumman and several major pharmaceutical companies. ORC BPA#: BPA-FTS-06-001 (under GSA FSS # GS-35F- 0164J) is available through GSAAdvantage.gov.

    An investment profile about WidePoint may be found at http://www.hawkassociates.com/widepoint/profile.htm. For investor relations information regarding WidePoint, contact Frank Hawkins or Julie Marshall, Hawk Associates, at (305) 451-1888, e-mail: info@hawkassociates.com. An online investor relations kit including copies of WidePoint press releases, current price quotes, stock charts and other valuable information for investors may be found at http://www.hawkassociates.com and http://www.americanmicrocaps.com.

    Safe-Harbor Statement: Under the Private Securities Litigation Reform Act of 1995. This press release may contain forward-looking information within the meaning of Section 21E of the Securities Exchange Act of 1934, as amended (the Exchange Act), including all statements that are not statements of historical fact regarding the intent, belief or current expectations of the company, its directors or its officers with respect to, among other things: (i) the company's financing plans; (ii) trends affecting the company's financial condition or results of operations; (iii) the company's growth strategy and operating strategy; and (iv) the declaration and payment of dividends. The words "may," "would," "will," "expect," "estimate," "anticipate," "believe," "intend" and similar expressions and variations thereof are intended to identify forward-looking statements. Investors are cautioned that any such forward-looking statements are not guarantees of future performance and involve risks and uncertainties, many of which are beyond the company's ability to control, and that actual results may differ materially from those projected in the forward-looking statements as a result of various factors.

 =========================

27. Press Release -  Product To Kick Start Consumer Biometrics Interest to Operational Research Consultants, Inc. - Jan 9, 2006

Source Next Contents

Award Includes PKI and HSPD-12 Compliant Products and Services

FAIRFAX, Va., Jan. 9 /PRNewswire-FirstCall/ -- WidePoint Corporation's (OTC Bulletin Board: WDPT - News) wholly-owned subsidiary Operational Research Consultants, Inc. (ORC), the leading provider of federal public key infrastructure (PKI) and credential managed services, announced today that it has been awarded a Blanket Purchase Agreement (BPA) with a ceiling of $100 million by the General Services Administration (GSA). Under the BPA, ORC will provide digital certificates, credentialing services, managed PKI services and Homeland Security Presidential Directive (HSPD-12) compliant products and services.

As the first Access Certificates for Electronic Services (ACES) BPA issued under the GSA Information Technology (IT) Schedule 70 E-Authentication category (SIN 132-60), this BPA provides for authentication products and services for purposes of physical and logical access controls, electronic signature, performance of e-business transactions, and delivery of Government services.

As a GSA Shared Service Provider (SSP) with an Authority To Operate (ATO), ORC's award was based on achieving rigorous qualifications including security certification and accreditation (C&A), cross certification with the Federal Bridge Certification Authority (FBCA) and the ability to provide robust PKI services. ORC operates a government-compliant authentication-based system for electronic communications between the government and members of the general public at Assurance Levels 1 through 4. This BPA augments ORC's unique expertise as the first federal provider of Personal Identity Verification (PIV)-ready solutions.

Under the terms of the BPA, ORC's ACES certificates are intended for use by the Federal government, state and local units of government, Native American tribal units, educational institutions, and non-government entities, including the general public and commercial business entities.

Steve Komar, CEO of WidePoint, said, "This BPA will save the federal government significant time, resources and expenses in acquiring PKI and credentialing solutions as mandated under HSPD-12. ORC has almost 15 years of experience in designing, developing and implementing information assurance solutions for the federal government. This BPA award confirms the company's reputation as an elite provider of a wide range of information assurance solutions from HSPD-12 planning and integration to managed credentialing services. We look forward to delivering the means necessary for federal agencies to meet the 2006 PIV-II deadline."

About WidePoint

WidePoint is a technology-based provider of products and services to both the government sector and commercial markets. WidePoint presently specializes in providing systems engineering and information technology services as well as PKI E-Authentication and credentialing services. WidePoint's wholly owned subsidiary, Operational Research Consultants, Inc. (ORC) is at the forefront of implementing public key infrastructure, E-Authentication and credentialing services. The company's identity management and E-Authentication services have received three major U.S. federal government certifications. WidePoint's profile of customers encompasses U.S. federal government agencies such as the Department of Defense, the Department of Homeland Security, the U.S Treasury Department and the Department of Justice as well as major transnational corporations such as Boeing Aerospace and Northrop Grumman and several major pharmaceutical companies. ORC BPA#: BPA-FTS-06-001 (under GSA FSS # GS-35F- 0164J) is available through GSAAdvantage.gov.

An investment profile about WidePoint may be found at http://www.hawkassociates.com/widepoint/profile.htm. For investor relations information regarding WidePoint, contact Frank Hawkins or Julie Marshall, Hawk Associates, at (305) 451-1888, e-mail: info@hawkassociates.com. An online investor relations kit including copies of WidePoint press releases, current price quotes, stock charts and other valuable information for investors may be found at http://www.hawkassociates.com and http://www.americanmicrocaps.com.

Safe-Harbor Statement: Under the Private Securities Litigation Reform Act of 1995. This press release may contain forward-looking information within the meaning of Section 21E of the Securities Exchange Act of 1934, as amended (the Exchange Act), including all statements that are not statements of historical fact regarding the intent, belief or current expectations of the company, its directors or its officers with respect to, among other things: (i) the company's financing plans; (ii) trends affecting the company's financial condition or results of operations; (iii) the company's growth strategy and operating strategy; and (iv) the declaration and payment of dividends. The words "may," "would," "will," "expect," "estimate," "anticipate," "believe," "intend" and similar expressions and variations thereof are intended to identify forward-looking statements. Investors are cautioned that any such forward-looking statements are not guarantees of future performance and involve risks and uncertainties, many of which are beyond the company's ability to control, and that actual results may differ materially from those projected in the forward-looking statements as a result of various factors.
==============================

28. PalmSecure Another CES 'Best of Innovations Honorees' - CCN Magazine - Jan 9, 2006


Source Next Contents

Fujitsu’s palm vein authentication technology works by utilizing the unique characteristic of deoxidized hemoglobin. The palm vein device captures the palm image while radiating it with near-infrared rays. The deoxidized hemoglobin in the palm vein absorbs these rays, thereby reducing the reflection rate and causing the veins to appear as a black pattern. This vein pattern is then verified against the pre-registered pattern to authenticate the individual1. As veins are internal in the body and have a wealth of differentiating features, assuming false identity through forgery is extremely difficult, thereby enabling an extremely high level of security.

In addition to providing outstanding security, ease of use of Fujitsu’s palm vein device is key. The user simply places the palm of the hand above the reader and the machine does all the work, creating a contactless, hygienic solution necessary for public areas.

Fujitsu’s palm vein device is distinctive because its sensor is only able to recognize the pattern if hemoglobin is actively flowing through the person’s veins. Additionally, research to date by Fujitsu indicates that each individual’s palm vein pattern is unique, even in the case of identical twins. These factors give Fujitsu’s palm vein device an edge over competing biometric identification products.

Fujitsu’s palm vein authentication technology is based on more than two decades of image recognition experience. The company decided to aggressively pursue this because the biometric security industry is expected to have dramatic adoption growth in the near future.

Applications for Fujitsu’s palm vein technology are vast and span several vertical markets, including security, financial/banking, access control, healthcare and government applications.

===============================

29. Press Release - First Security Information and Event Management (SIEM) Solution Interoperable with Websense, Inc.; Understanding Web-based Threats Critical for Compliance and Security - Jan 9, 2006

Source Next Contents

WESTWOOD, Mass. and SAN DIEGO--(BUSINESS WIRE)--Jan. 9, 2006--Network Intelligence(TM) Corp., the market-proven leader in transforming enterprise-wide data into automated compliance and security information, and Websense, Inc. (NASDAQ: WBSN), the world's leading provider of employee internet management solutions, announced today that Network Intelligence security information and event management (SIEM) solutions are now interoperable with Websense(R) software. This integration allows organizations to centrally access detailed Websense web security and filtering reporting on employee internet use and security threats. Data received through SIEM technology helps protect organizations from new and emerging web-based dangers, and keeps organizations compliant under multiple rules and regulations, including Gramm-Leach-Bliley Act (GLBA), Payment Card Industry Standard (PCI), and California SB 1386.

Through the integration, Websense web security data and employee internet usage patterns are viewed along with other network and security data sources, such as perimeter security, network, application, and host data, offering a holistic view of compliance and security across the enterprise. With this, Network Intelligence customers are provided real-time and historical security and compliance analysis, as well as powerful reporting and compliance alerts. Network Intelligence SIEM technology continues to expand its value proposition by collecting and protecting all of the data critical to compliance and security infrastructures.

"Network Intelligence is the first security information and event management solution to interoperate with Websense," said Steve Kelley, director of strategic alliances for Websense, Inc. "Network Intelligence has given us a clear indication of the value they place on providing Fortune 1000 customers with a complete view of security events across the entire enterprise."

Websense software protects companies and employees who use the internet from a growing number of threats such as phishing, spyware and malicious code prevalent on peer-to-peer (P2P) sites, as well as enhancing security, improving employee productivity and reducing legal liability. The software closes the time and technology gaps left open by antivirus and network security infrastructure to protect against security breaches such as malicious code outbreaks, Trojan horses and keylogging software.

"Websense and Network Intelligence interoperability enables enterprise customers to add web-based threats to their compliance and security posture," said Upesh Patel, vice president for product marketing at Network Intelligence.

Network Intelligence captures all the data from security, network, infrastructure, application, host and storage devices. Network Intelligence creates a complete picture of network usage, to verify security policy compliance, to generate alerts for possible compliance breaches, and to analyze and report on network performance. Relentless IT security threats generated from viruses and worms, and legislation such as Sarbanes-Oxley, GLBA, HIPAA and PCI require companies to deploy SIEM technology. Network Intelligence enables businesses to quickly address these challenges by efficiently and cost-effectively deploying an appliance-based solution that automatically manages all the data, from any IP device, without filtering or agents.

Network Intelligence is a member of the Websense Web Security Ecosystem(TM)--a comprehensive ecosystem of world class security and networking technology providers to enable easy deployment and integration of Websense solutions in enterprise environments. The Websense Web Security Ecosystem incorporates vendors from leading security and networking markets, including: network access control, internet gateways, appliance platforms, security event management, and identity management. The Websense Web Security Ecosystem provides interoperability of joint solutions to ensure seamless integration in enterprise environments.

Websense software is available for organizations who wish to protect themselves from internet and application security threats. For a free 30-day evaluation of Websense software or for more information on protecting your organization from a wide range of threats including spyware, peer-to-peer, virus outbreaks and internal hacking exploits, please visit www.websense.com. Websense Security Labs(TM) offers free email security updates as new internet threats are discovered and is available at www.websensesecuritylabs.com.

About Network Intelligence Corporation

Network Intelligence is the market-proven leader in transforming enterprise-wide data into automated compliance and security information. The Company's LogSmart(R) Internet Protocol Database (IPDB) provides the only architecture proven to efficiently collect and protect all the data, from any IP device, without filtering or agents. Network Intelligence takes the cost and complexity out of compliance and security for hundreds of customers worldwide, including 5 of the Fortune 10. For more information, please visit the Company's Web site at www.network-intelligence.com, or phone 781-375-9000.

About Websense, Inc.

Websense, Inc. (NASDAQ: WBSN), the world's leading provider of employee internet management solutions, enables organizations to optimize employee use of computing resources and mitigate new threats related to internet use including instant messaging, peer-to-peer, and spyware. By providing usage policy enforcement at the internet gateway, on the network and at the desktop, Websense products enhance productivity and security, optimize the use of IT resources and mitigate legal liability for our customers. For more information, visit www.websense.com.

(C) 2006, Websense, Inc. All rights reserved. Websense and Websense Enterprise are registered trademarks of Websense, Inc. in the United States and certain international markets. Websense has numerous other unregistered trademarks in the United States and internationally. All other trademarks are the property of their respective owners.

This press release contains forward-looking statements that involve risks, uncertainties, assumptions and other factors which, if they do not materialize or prove correct, could cause Websense's results to differ materially from historical results or those expressed or implied by such forward-looking statements. All statements, other than statements of historical fact, are statements that could be deemed forward-looking statements, including statements containing the words "planned," "expects," "believes," "strategy," "opportunity," "anticipates" and similar words. These statements may include, among others, plans, strategies and objectives of management for future operations; any statements regarding proposed new products, services or developments; any statements regarding future economic conditions or financial or operating performance, including estimates of billings and revenue; statements of belief and any statements of assumptions underlying any of the foregoing. The potential risks and uncertainties which contribute to the uncertain nature of these statements include, among others, customer acceptance of the company's services, products and fee structures; the success of Websense's brand development efforts; the volatile and competitive nature of the Internet industry; changes in domestic and international market conditions and the entry into and development of international markets for the company's products; risks relating to intellectual property ownership; changes in estimated amounts based on the review and audit of Websense's financial statements by its independent auditors; and the other risks and uncertainties described in Websense's public filings with the Securities and Exchange Commission, available at http://www.sec.gov. Websense assumes no obligation to update any forward-looking statement to reflect events or circumstances arising after the date on which it was made.

\==================================

30. Liberty to unveil personal federated identity management - by Antony Savvas - Computer Weekly - Jan 9, 2006

Source Next Contents

The Liberty Alliance will this week unveil a federated identity management system to allow individuals to manage their personal lives securely on the web.

The Liberty ID-WSF People Service is a key component in the alliance’s ID-WSF 2.0 federated identity management specification.

Federated identity management allows internet users to use a single sign-on procedure to access and share information across different websites and corporate intranets.

Liberty says People Service is the industry's first comprehensive platform for managing social information within an open federated network environment.

Other federated identity management systems are proprietary rather than open, such as Microsoft’s Passport log-in system, which is used on Microsoft’s websites and a few third-party websites, including eBay.

People Service allows consumers and enterprise users to manage social applications such as bookmarks, blogs, calendars, photo sharing and instant messaging using the ID-WSF 2.0 framework.

People Service has been developed to allow individuals to easily store, maintain and categorise on-line relationships. Consumers and enterprise users can centrally manage all of their information using privacy controls built into the system based on a Liberty web services platform.
Related Jobs
=========================


31. TSA Unveils Enhanced Security Screening Procedures - Sandy Smith - Homeland Response - Jan 9, 2006

Source Next Contents

The specific changes include more additional screenings of passengers and their bags using a variety of methods selected at random. Passengers will also once again be able to carry small tools and scissors on-board aircraft. These changes will allow the Transportation Security Administration (TSA) workforce to focus on detecting and defeating more serious threats, such as explosives.

"It is paramount to the security of our aviation system that terrorists not be able to know with certainty what screening procedures they will encounter at airports around the nation," said Hawley. "By incorporating unpredictability into our procedures and eliminating low-threat items, we can better focus our efforts on stopping individuals that wish to do us harm."

Passengers will continue to walk through a metal detector and have their carry-on and checked baggage screened. However, these measures may now include a brief additional search of their person or their property. Examples of this additional screening include: explosive screening of shoes, hand-wanding of passengers, enhanced pat down searches and inspections of carry-on bags. These searches will be generated at random and will take only about a minute to complete. They will allow transportation security officers (TSOs) to better screen passengers for explosives and other threats to the aviation system.

As of Dec. 22, scissors with a cutting edge of 4 inches or less and tools such as screwdrivers, wrenches and pliers smaller than seven inches will be permitted on board. Scissors longer than four inches and tools such as crowbars, drills, hammers and saws will continue to be prohibited from carry-on bags. Lighters will continue to be banned from the cabin of aircraft and in checked baggage.

In addition to these changes, the agency's 43,000 transportation security screeners have been re-classified as TSOs.
============================


32. Johns Hopkins University to Lead New Homeland Security Center - Sandy Smith - Homeland Response - Jan 9, 2006

Source Next Contents

This fifth Homeland Security Center of Excellence, formally titled the Center for the Study of High Consequence Event Preparedness and Response, will study deterrence, prevention, preparedness and response, including issues such as risk assessment, decision-making, infrastructure integrity, surge capacity and sensor networks. In particular, it will study interactions of networks and the need to use models and simulations.

"Johns Hopkins University has assembled and will lead a talented and deeply experienced team of professionals from institutions across the country," said DHS Secretary Michael Chertoff. "Together, they will help DHS strengthen the nation's ability to prevent and, where necessary, effectively manage high-consequence disasters or terrorist attacks."

The Johns Hopkins Office of Critical Event Preparedness and Response (CEPAR), created shortly after 9/11, will serve as the seat of the consortium. JHU's schools of Medicine, Public Health, Advanced International Studies, Engineering, Professional Studies in Business and Education, and the Applied Physics Laboratory will also serve as consortium members. The Center of Excellence will be led by Dr. Lynn R. Goldman, professor of Environmental Health Sciences, and Dr. Gabor D. Kelen, professor and chair, Department of Emergency Medicine, and director of CEPAR.

"We all hope and pray there will never be another 9/11 or Hurricane Katrina," said Dr. William Brody, president of Johns Hopkins University. "If there is, however, the knowledge developed by this new center will go a long way toward assuring the best possible preparation and the most humane, coordinated effort possible to assist victims and speed recovery."

The Centers of Excellence, overseen by the Office of University Programs within the Homeland Security Science & Technology directorate, establish a network of university-based centers that conduct multi-disciplinary research and develop innovative educational programs. Through this initiative, the Department of Homeland Security and partner universities focus the nation's most talented researchers on homeland security issues.

Existing Homeland Security Centers of Excellence include:

    * The Center for Risk and Economic Analysis of Terrorism Events (CREATE), led by the University of Southern California
    * The National Center for Food Protection and Defense (NCFPD), led by the University of Minnesota
    * The National Center for Foreign Animal and Zoonotic Disease Defense (FAZD), led by Texas A&M University
    * The Center for Behavioral and Social Research on Terrorism and Counter-Terrorism (START), led by the University of Maryland
    * The Center for Advancing Microbial Risk Assessment (CAMRA), a separate but closely associated venture, jointly sponsored by the Department of Homeland Security and the U.S Environmental Protection Agency and led by Michigan State University.

In January 2005, Homeland Security's Science and Technology directorate released an announcement calling for proposals focusing on research and education relevant to the study of high consequence event preparedness and response. Thirty-four proposals were received and reviewed by a team of 38 peer reviewers from academia, the private sector and multiple government agencies. The three-tier review process evaluated scientific and technical merit, mission relevance and management effectiveness. The process resulted in site visits to four different institutions and the subsequent selection of JHU.
 
==============================

33. Press Release - Enterprise Bank & Trust Cracks the Password Management Problem with Imprivata OneSign; Ease of Configuration and Administration, along with Strong Biometric Support, Set OneSign Apart - Jan 9, 2006

Source Next Contents

LEXINGTON, Mass.--(BUSINESS WIRE)--Jan. 9, 2006--Imprivata(R), Inc., the Enterprise Single Sign-on (ESSO) appliance company, today announced that Enterprise Bank & Trust, a St. Louis, Missouri-based financial services institution, has implemented Imprivata OneSign(TM) as its ESSO solution. After an exhaustive review process, including intensive on-site testing, Enterprise Bank chose Imprivata OneSign, the industry's only ESSO appliance, over other SSO solutions because "it really worked!" As the only company that is laser-focused on ESSO, Imprivata provides the full-service financial organization with the ability to quickly, affordably and securely SSO-enable business-critical applications, successfully achieving increased password security and reducing IT help desk costs in a matter of days.

"With security regulations intensifying and passwords becoming increasingly complex, the headache of password resets was beginning to burden our IT as well as our users," said Steve Siress, network systems manager at Enterprise Bank. "With Imprivata's quick to deploy, out-of-the-box solution, we've found a way to comply with audit regulations while significantly reducing help desk costs and improving employee productivity. Our employees absolutely love the new system, especially the users that have been given biometrics."

Due to the large number of applications requiring unique passwords, as well as the need for higher security in the financial services industry, Enterprise Bank turned to Imprivata to execute on a more secure, efficient and effective password management policy. Prior to employing OneSign, Enterprise Bank was struggling with the need to implement a more complex password system in order to satisfy audit regulations mandating stringent password policies in the financial services arena. The IT department could see that this implementation would foster significant frustration amongst users and IT staff alike. Users would likely have struggled to remember their many strong passwords, ultimately resorting to either weakening security by writing passwords down, or making frequent calls to the help desk for password resets, leading to increased costs and a significant loss of employee productivity.

While Enterprise Bank tested multiple SSO products in the company's evaluation process, Imprivata's ESSO solution stood apart from other offerings because it not only simplified password management for Enterprise Bank employees, but it also alleviated strain on the IT staff, all while maintaining a high level of password security. Siress continued, "Imprivata has done a remarkable job of designing an interface that was easy to learn and simple to add more applications to the Single Sign-on process." OneSign integrates seamlessly with Enterprise Bank's biometric implementation and, as a self-updating hardware appliance designed for organizations of all sizes, it also provides users with a common log-in across all applications, eliminating the need to remember multiple passwords. Furthermore, Imprivata's Application Profile Generator(TM) self-learns the behavior of any application's authentication processes, so the IT department no longer needs to make costly and time-consuming modifications to existing code.

"Financial services institutions like Enterprise Bank are realizing that while a secure password policy is critical to the success of their organizations, implementing a stronger system can be very costly and can cause significant losses in user productivity," said Omar Hussain, president and CEO of Imprivata. "OneSign allows these institutions to achieve a high standard of security in an affordable, easy-to-manage way. We are pleased to help Enterprise Bank maintain the highest standard of service to its clients by offering a simple, effective solution to the organization's password management issues."

About Enterprise Financial Services Corporation

Enterprise Financial Services Corporation is a high growth financial services holding company which addresses the needs of privately-held businesses, their owner families and other success minded individuals through its two primary businesses - commercial banking and wealth management. The company is the parent of Enterprise Bank and Trust, under which it operates in the St. Louis and Kansas City markets. The Company's stock is listed nationally on NASDAQ under the symbol EFSC.

About Imprivata

Based in Lexington, Mass., Imprivata develops enterprise single sign-on solutions that dramatically simplify password administration and enhance IT security. The company is privately held with venture funding from Polaris Venture Partners, Highland Capital Partners and General Catalyst Partners. Imprivata OneSign is changing the way midrange businesses secure their applications. Imprivata's OneSign product is packaged as an affordable, easy-to-implement and maintain appliance and is distributed through an established network of value-added resellers. For more information visit www.imprivata.com.
======================

34. Press Release - (I-Newswire) - Tel Aviv, Israel -  - Eurekify, the pioneer and leading provider of role management solutions, is pleased to announce exceptional growth and record results for 2005.  Eurekify’s year-to-year revenue has increased by 130%, supported by the increasing demand for Role-based Identity Management and Compliance solutions, as well as by quicker deployment practices and the maturing of Eurekify’s unique technology. - January 9, 2006

Source Next Contents

In 2005, Eurekify has more than doubled its diverse customer base that includes international banks, insurance and financial companies and health care providers as well as retail chains and government institutes. Eurekify's customers are being driven by the need for mitigating security risks and dramatically reduced administrative costs as well as compliance and audit verification.

Well recognized for its unique underlying technology, Eurekify’s Sage Discovery & Audit v2.8 helps customers plan and implement true Role-Based Identity Management solutions, as well as  automate verification of compliance with policies and regulations. Eurekify’s customers greatly benefit from Eurekify's Survey, Plan, Deploy, and Manage methodology, which allows them to quickly assess their Identity Management ( IdM ) needs, select the most suitable provisioning solution, prepare and plan the IdM project, as well as reduce the cost and risk of implementation and of ongoing management.

During 2005, Eurekify has also substantially expanded its partner network to include KPMG, PwC, IBM and HP as well as a range of strategic regional partners across Europe, the US and Middle East. Leading Identity Management consultants and solution integrators regularly choose Eurekify for new IdM and pre-IdM projects. Auditing and consulting firms are also using Eurekify to audit IT systems for regulatory requirements and to implement internal IT and security controls.

Responding to the growing demand in the US, Eurekify started a New York office that will continue to provide the best-in-class support as well as better accommodate the needs of the company’s wide base of US customers and partners.

“2005 has been a great year for Eurekify in all aspects”, says Azi Cohen, Eurekify CEO, “revenue and customer base growth, backed by partner network expansion, are validating our belief that role-based solutions are what customers really need in Identity Management. We are confident that this momentum will only increase in 2006 and 2007, and we continue to expand and improve our product and service offerings to provide our customers with the most comprehensive Role Management and Compliance solutions”.
“We are pleased with the results” says Roni Einav, Eurekify Chairman of the Board, “based on my past experience and the deals we foresee coming, I can see how Eurekify's Role Management solution becomes a strategic part in the infrastructure of any large organization".

About Eurekify
Eurekify is the pioneer and leading provider of Role Management, Auditing and Compliance solutions. Eurekify’s Sage Discovery and Audit ( DNA ) helps large organizations assess their Identity Management ( IdM ) needs, and deploy a business oriented role-based system that maximizes security and manageability. Recognized by IdM specialists, role-based management is critical for successful IdM implementations. Sage DNA also allows enforcement and verification of IT controls and compliance with internal policies as well as regulations such as SOX, HIPAA, Basel II, etc. Leveraging on advanced pattern-recognition technology, Sage DNA is unique in its capabilities and is regularly recommended by leading IdM implementers worldwide. For more information about Eurekify, visit www.eurekify.com

===========================

35. The anti-nation - DAN DUNSKY - Toronto Star - Jan 9, 2006

Source Next Contents

Every country has its problematic national story: race in the United States, class in Britain, empire in Russia. Canada's problem is its perpetual identity crisis, a collective neurosis bred of being a confederation of English and French peoples - what the novelist Hugh MacLennan once called the country's "two solitudes" - and the small neighbour to one of history's few great nations. Canadians alternately worry about too much American attention - of being overwhelmed by the United States - and, as suggested by the title of a book published in 1999, Invisible and Inaudible in Washington: American Policies Toward Canada (UBC Press), of being ignored by the United States. (It didn't help that the New Republic once judged the most boring headline ever to be "Worthwhile Canadian Initiative.")

These twin pressures have always existed as an immutable fact for Canadians and likely always will. But American policymakers need to be far more interested in how we deal with these questions, since their answers will largely determine whether Canada is likely to remain a trusted ally in the unpredictable post-9/11 world or become a dangerously exposed northern flank.

The United States cannot "wall itself off" from Canada. Traffic across the 5,061-kilometre border, which Ronald Reagan once hailed as "a meeting place between great and true friends," cements the most comprehensive bilateral trading relationship in history. A truck crosses the U.S.-Canadian border every 2.5 seconds. Approximately $1.3 billion in two-way trade crosses the border every day Ñ $500 billion a year. More than 200 million two-way border crossings occur yearly, making the shared border the busiest international boundary in the world.

Nearly 25 per cent of American exports go north to Canada. More significantly, Canada is now America's largest source of crude oil and petroleum products. This may become more important, both because of continuing instability in the Persian Gulf and because, according to the Oil and Gas Journal, Canada contains, at 180 billion barrels, the world's second-largest proven reserves.

"Anyone watching what is happening up north will recognize that, before long, Canada will inevitably overtake Saudi Arabia as the world's oil giant," said Utah Senator Orrin Hatch recently. While chastising Canada for "irresponsible" talk of favouring China with increased oil exports as payback for the ongoing U.S.-Canadian softwood lumber dispute, Hatch nevertheless said that "we in this country don't want to be on Canada's shit list, ever."

Despite the senator's fears, however, Canada has much more to worry about than the U.S. Quite simply, the border is Canada's economic lifeline. Owing to the absence of a large domestic market and an abundance of natural resources, Canada must export to survive. And today the United States consumes fully 85 per cent of Canada's exports, accounting for an astounding 40 per cent of the country's GDP. In addition, many high-value Canadian products and services Ñ for example, Canada's contribution to the U.S. space program Ñ are designed to piggyback on existing American initiatives.

The signing of the U.S.-Canadian Free Trade Agreement in 1988 (and NAFTA in 1993) accelerated the vertical integration of Canada's economy with that of the United States. Some 50 per cent of Canadian foreign direct investment (FDI) is now aimed at the U.S., while more than 60 per cent of inbound FDI is American. According to Export Development Canada, a federal Crown corporation, "the import content used to make Canadian exports has been growing steadily and now averages around 35 per cent, and in many manufacturing industries [exceeds] 50 per cent." This integration has, in turn, increased Canadian productivity. In short, it is no exaggeration to say that Canada's primary national interest is located south of the border.

The shock on Canadian economic activity of the effective closure of the border after 9/11 demonstrated the country's vulnerabilities and highlighted Canada's interest in safeguarding its southern frontier. The nightmare scenario for Canadian politicians today is a successful attack on the U.S. homeland by a terrorist who enters through Canada.

Faced with this reality, Canada has strengthened its anti-terrorism posture. Over the past four years, in addition to specific action on the border, Parliament has passed Canada's first-ever Anti-Terrorism Act, a Public Safety Act, and a new Immigration and Refugee Protection Act. Further, the government has created the Office of Public Safety and Emergency Preparedness, Canada's answer to the Department of Homeland Security, and has undertaken a foreign affairs and defence review. Canadian law now defines terrorism and designates terrorist groups operating in Canada. It is an offence to support terrorist groups or any activities related to such groups. And security, intelligence and law-enforcement agencies have been given enhanced powers of surveillance, arrest and detention, including preventive arrests or arrests without warrants.

Canada has established common procedures with the United States for the screening of high-risk goods in third countries prior to their arrival at North American airports and seaports, and the Department of Transportation has plans to increase the use of biometric systems and radiological scanners at Canadian points of entry.

Similarly, after 9/11, public pressure to rebuild the Canadian armed forces has grown dramatically. In its 2005 budget, the federal government pledged an additional $11 billion to the armed forces over five years, a move supported even by the dovish NDP. This marked the first substantial increase to the defence budget since cuts in the overall federal budget during the 1990s reduced military spending by some $25 billion.

And though Canada chose to sit out the Iraq War, Canadian Special Forces joined American units in Afghanistan in 2001 and later assumed the leadership of the International Security Assistance Force (ISAF) in Afghanistan. In the summer of 2005, the Canadian military enhanced its Afghan force and set up base in Kandahar. Using language that Canadians had all but forgotten, Major-General Andrew Leslie, former commander of Task Force Kabul and deputy commander of ISAF, predicted that Canada may be in Afghanistan for a generation: "There are things worth fighting for. There are things worth dying for. There are things worth killing for."

In sum, Canada has acted to improve its overall security posture since 9/11. In keeping with the Canadian realist approach to bilateral continental relations, Canada has endeavoured to safeguard its economic interests by satisfying American security concerns, which, according to former Canadian ambassador Allan Gotlieb, "opens doors [in Washington] like no other key."

But if self-interest was clearly at work in Canada's post-9/11 security decisions, it is less clear whether the Canadian and American governments share the same global outlook. Whether Canada is a trusted ally of the United States Ñ insofar as the latter has defined its global roles and responsibilities Ñ is a more difficult question to answer. For, in many disturbing ways, Canada seeks to unify its chronically fractured sense of nationhood in opposition to the United States.

By and large, Canadians like Americans. A recent comprehensive study of the country's attitudes reveals that 70 per cent of Canadians "value and respect the United States and its citizens," while only 15 per cent admit to not liking or respecting "anything that the United States and its people stand for." The problem is that, today, Canada's political reality reinforces the minority anti-American sentiment.

Traditionally, Canadians distinguished themselves from Americans on the basis of having a different political system. Canadians, said the great literary critic Northrop Frye, are Americans who rejected the revolution. However, over the last half-century, as centrifugal forces threatened to tear the country apart, opinion-makers began to distinguish Canadians from Americans on the basis of having a different value system.

Alarmed at the rise of nationalism in French Canada, and fearful that as the British Empire receded from memory the United States would replace Great Britain in the affections of English Canadians, a new breed of federal politicians and bureaucrats attempted to erase Canada's very real divisions (and centuries of history) by appealing to a largely rhetorical set of "Canadian values" shared by all from sea to sea. Only by appealing to these values, Canadian nationalists believed, would Canada overcome its cultural neurosis and emerge as a single, unified state capable of resisting the inevitable lure of America.

So, where Americans were religious, Canadians were now secular. Where Americans were a martial people, Canadians were now pacifists. Where Americans were conservative, Canadians were now liberal. Where Americans were greedy capitalists, Canadians were now empathetic social democrats. And these beliefs - reinforced by a large contingent of nationalist and anti-American media - rubbed off on the population at large. Today, Canadians consistently tell pollsters that they are more tolerant, more respected by others, better educated and friendlier than Americans. Oh, yes: and more modest, too.

This pattern shows up in international matters, as well. Canadians are confirmed multilateralists (except when they seize Spanish and Portuguese fishing trawlers on the high seas, bomb Kosovo without UN authorization, and unilaterally claim a 320-kilometre marine exclusive economic zone). Canadians are a "moral superpower" (except when it comes to official development assistance, where Canada's contribution ranks among the lowest of wealthy nations, despite the prime minister's pledge that "our foreign policy must always express the concerns of Canadians about the poor and underprivileged of the world"). Canadians are environmentally conscious (except that they consume more energy per capita than all OECD countries except tiny Iceland and Luxembourg and have no feasible plan for implementing their Kyoto promises). Canadians believe in international law and normative foreign policy (except when government agencies look the other way as their own citizens suspected of being terrorists are "rendered" to Syria or Egypt). And on and on it goes. "A country that seeks great changes and lacks the willingness to run great risks dooms itself to futility," the 17th-century English statesman Lord Clarendon is said to have remarked. He could well have been describing Canada today.

This need to present a unique set of Canadian values is not without consequence. Consider just three recent episodes involving the governing Liberal Party. First, the communications director of former prime minister Jean ChrŽtien called George W. Bush a "moron," and the prime minister at first declined her resignation. Then, an MP was caught on camera saying "Damn Americans! I hate those bastards." And, in an "open letter" to Condoleezza Rice, former minister of foreign affairs Lloyd Axworthy called the United States a "virtual one-party state," devoid of the checks and balances the country "once espoused before the days of empire." This from someone whose own party has governed Canada for 70 of the past 100 years!

More seriously, despite the promising reaction to the terrorism threat, the prevailing Canadian-values and anti-American paradigm has influenced government policy on security issues. The most recent example is Canada's confused decision on ballistic missile defence (BMD). The government of Paul Martin had given every indication that Canada would sign on to the development and deployment of BMD, even ensuring that NORAD, the joint U.S.-Canadian air defence system, would be used as a key component in the program. However, the opposition Ñ and, again, elite opinion Ñ relentlessly attacked BMD as America's "missile defence madness," as "the weaponization of space," and as something that would "harm Canada's international reputation." Canadians, who had not been asked to contribute financially to the development of the system, and who could one day be protected by it, had been favourably predisposed to join. After the onslaught of negative attacks, however, they changed their minds. The government, fearing that as many as 20 members of its own caucus would vote with the opposition, decided to opt out of the program.

To understand how this anti-American bias is being strengthened by Canada's current political reality, one must begin with Lord Durham's observation in 1839 that Canada was "two nations warring in the bosom of a single state." Some 165 years later, Canada remains a country where, in the words of historian H. V. Nelles, "unambiguous unity and a singular identity" still largely elude its inhabitants. Except that today, Canada is really three nations: Quebec, the West, and the multicultural cities.

Quebec is already separate within Canada. To the average Quebecer, the Canadian federal government is essentially irrelevant. Quebecers make almost all their own political and social choices, and international markets are as influential an economic force in the province as is the rest of Canada, perhaps more so. Quebecers are more left-wing and statist than their English-Canadian counterparts and more culturally confident, too. The province has a thriving French-language magazine, book, film, Web and TV industry that utterly dominates public tastes, as opposed to the American products that resonate widely in the rest of Canada. No serious people today think that Quebecers want to return to past political arrangements or that Quebec nationalism is a waning fad. The province has never signed the 1982 Canadian constitution (though it is bound by its provisions) and support for independence hovers around the 50 per cent mark. A few weeks from now, Quebecers may well send more secessionists to represent them in the federal House of Commons than ever before.

Meanwhile, more than one-third of Western Canadians believe it is time to consider separating from Canada, according to 2005 survey data. Western Canadian alienation is nothing new, but it has lately taken a different form with the rise of the Conservative Party, which dominates the region and is the official opposition. The Conservative Party's intellectual roots owe more to the American conservative movement than to traditional Canadian Toryism: It is the party of smaller government, social conservatism and rural populism. Alberta, the engine of this new West, is Canada's wealthiest province, home to the country's galloping oil and gas industry, and enjoys a faster population growth than any other region. Nearly 60 per cent of Albertans supported the Iraq War, while fewer than a quarter of Quebecers did.

This leaves Canada's increasingly multicultural cities. Five cities are home to 43 per cent of Canadians; Toronto alone accounts for 17 per cent of the total population. Canada's cities are also the primary destination for immigrants and refugees to the country. About 20 per cent of Canada's residents Ñ and half of Toronto's Ñ are foreign-born, compared with 11 per cent in the United States, 5.6 per cent in France and 4 per cent in the U.K. Cities are therefore the testing ground for Canada's multicultural experiment.

However, multiculturalism rejects the idea that a single set of organized cultural beliefs and political principles are foundational to the nation's public life. So multicultural Canada cannot demand, as other countries can and do, that new arrivals adapt to the country's traditional cultural and political forms because, as the minister of citizenship and immigration has said, "we've developed, as a Canadian value, an appreciation of diversity Ñ if not a complete nurturing of that diversity."

Furthermore, multiculturalism has today become an anti-Western impulse, specifically one that sees the United States as the locus of all manner of evil in the world. Therefore, large segments of Canada's urban areas should be seen to be, in effect if not in intention, hostile to the Western political tradition in general and to American ideals in particular.

In truth, Canada is now a country of three solitudes Ñ four, if Canada's ever more assertive native population is included Ñ where each has increasingly little in common with the others. Quebec's secessionist political parties obviously do not believe in trying to bridge these gaps. Significant portions of Canada's Conservative Party probably do not believe in doing so either, though the party will not acknowledge this publicly. This leaves the federal Liberals as the only major party attempting to be pan-Canadian in its appeal. And their only way of appealing to these disparate groups is by reference to the mythical Canadian values described earlier. "As the only truly national party," Prime Minister Martin said this month, "we will defend Canadian values."

However, Canada's first-past-the-post electoral system and demographic reality (highly urban Ontario and Quebec represent 60 per cent of the country's population) reduces Liberal pan-Canadianism to vote-getting among multicultural city dwellers and non-secessionist Quebecers. So a typical Liberal election campaign preys on fears of the country's disintegration at the hands of Quebec's secessionists and the loss of its unique social character and diversity at the hands of the Conservatives and their "hidden agenda" of "U.S.-style" policies.

The current campaign is a case in point: Here's the prime minister addressing Bloc leader Gilles Duceppe on Dec. 16: "Let me say also that I am a Quebecer, and you are not going to take my country away from me." And here's the prime minister on Jan. 3: "That is the clear difference of values that is illustrated by Stephen Harper's goal of a fend-for-yourself Canada and my vision of a country in which we strive together as a society toward a common good."

Ergo, the Liberals believe they are the only thing holding the country together and preventing its inevitable drift into the American orbit. Thus does the Liberal Party confuse its interests with those of Canada's citizens and use electoral politics to heighten anti-Americanism and Canadian regionalism.

However, as long as this Liberal electoral playbook results in election victories, don't expect Canada to ally itself too closely with the United States on any matter that doesn't directly affect the country's key economic interests.

Paul Martin is fond of saying that Canada "will set the standard by which other nations judge themselves." Politicians are often called upon to say silly things, but it is generally a good idea not to let rhetoric stray too far from reality. But contemporary Canada Ñ with the exception of its competent economic management Ñ leaps precisely that gulf between rhetoric and reality, perhaps overcompensating for deep feelings of inferiority. It is a leap that too many Canadians have grown accustomed to hearing and by now enjoy believing. And it will persist until the status quo of Canadian federalism changes: either by devolving much more power to the regions and allowing each to make its own political, economic and social choices, or by breaking apart. Either way, the narcissistic and corrosive platitudes of "Canadian values" and "national unity" should cease.

There is no shame in fundamentally altering Canada's political arrangements. Unlike the United States, the country was not founded on an ecstatic commitment to a great cause but on the more pedestrian grounds of being a good idea. Such pragmatism should welcome change, if change is best. Canadians should be mature enough to question whether the country created in 1867 is still acting in the best interests of all its citizens in 2006.

Just as few predicted the collapse of the Berlin Wall, the break-up of Canada also seems far-fetched. Nevertheless, American policymakers should consider the possibility. In 1999, President Clinton said the United States "valued our relationship with a strong and united Canada. We look to you; we learn from you. The partnership you have built between people of diverse backgrounds and governments at all levels is... what democracy must be about, as people all over the world move around more, mix with each other more, live in close proximity more."

But what if the "partnership" Canada has built no longer supports America's global roles and responsibilities? What if the essential condition for Canadian unity is an anti-American value system built into the national political process? In that case, it is unclear that Canada is a long-term ally of the United States out of anything more than economic necessity. In that case, is it still in America's interest to support Canadian unity?
============================

36. Airport summit starts on Big Island - Pacific Business News - Jan 2, 2006

Source Next Contents

Airport officials flew to Kona for the American Association of Airport Executives' 20th annual Aviation Issues Conference.

"With passenger traffic meeting, and in some cases exceeding, pre-9/11 levels, the aviation industry faces several challenges, including airline and airport financial uncertainty, funding for critical security projects, continued terrorist threats, system capacity improvements and air traffic modernization," the AAAE said. "In 2006, lawmakers will again have to make tough funding decisions about aviation programs in what is expected to be another tight budget climate."

The conference, Sunday-Thursday at the Hapuna Beach Prince Hotel, also drew vendors in the field of passenger screening and biometric I.D. verification for employees.

"With the Transportation Security Administration seeking industry and public input on its plan to begin an airline passenger verification program at airports across the country in 2006, the conference is the ideal forum for outlining the viability of using security assessments and biometric-based identity verification technologies in the airport environment," said San Diego-based ImageWare Systems (AMEX: IW), a sponsor of the conference that is showing its own biometric identity management platform.

Biometric I.D. vendors are eager to show their services now because the Transportation Security Administration is expected to issue a request for proposals late this month for its Registered Traveler program, in which travelers may voluntarily pay fees and submit to background checks to join a program that lets them jump the line at airports. It's estimated that $30 million in federal contracts await the companies hired to make this work.

The conference may also be the latest venue for the never-ending tussle between airports and airlines about landing fees. Airport executives often complain that airlines object to paying their fair share of unavoidable security costs while airline executives describe airports as monopolies that run inefficiently and sock airlines with their bills.
================================

37. Press Release - Aratek, CUST Collaborate to Set up Joint Lab - Jan 9, 2007

Source Next Contents

(SinoCast Via Thomson Dialog NewsEdge)CHONGQING, Jan 09, 2006 (SinoCast via COMTEX) --Aratek, a global biometric identification solution supplier, recently announced it has reached an agreement with Chongqing University of Science and Technology (CUST) to set up a joint laboratory.


Subject to the agreement, both sides will join hands in the establishment of the biometric identification joint lab, and a series of fields as talent training, scientific research teaching, application study and market expansion of biometric identification.

Meanwhile, they will jointly promote the application of biometric identification technology in the scientific research teaching and talent training in the western China.

The biometric identification joint lab, which will focus on the development of software and hardware products of biometric identification, is the core of the cooperation.

Aratek will offer genuine biometric identification software and hardware facilities, as well as related training and technical support, to the lab.

In addition, the two partners will pay close attention to talent training.

They aim to train the biometric identification talents of different levels accord with various kinds of demands inside and outside the university.
==========================

38. Press Release  - Dubai set to host Middle East’s largest security expo
- Jan 9, 2006

Source Next Contents

Intersec 2006, the largest international security and safety trade fair and conference in the region, has attracted the most phenomenal gathering of the world’s leading specialist suppliers and services ever seen in the Gulf area. After selling out over 2 months ago, the organisers, Messe Frankfurt, have extended the exhibiting area by 40% following the increasing local demand to exhibit.

Set for 29 - 31 January, exhibitor attendance has increased by a considerable amount compared to last year, with over 400 international exhibitors from across the globe, 78 of whom are UAE based. This rapid growth in exhibitors from the UAE has been attributed in part by the organisers to the growing maturity of the market here, with the UAE and Dubai firmly established as a safe and secure trading location.

Local exhibitors include some of the key players in the industry such as Al Falasi Group of Companies, who specialise in biometric security and verification solutions. Citytec cover all areas of security. Atlas Telecom offer a range of items and services including Image intensifiers, vehicle inspection devices and night vision instruments, while EMIRTEC will have their range of surveillance systems on display. FIREX and NAFFCO are manufacturers of fire fighting, fire protection and fire detection systems, Siemens who specialise in central command and control display, CCTV and access control among other areas, and Sanyo renowned experts in audio and video equipment will all be in strong attendance.

According to Ms Imke Huelsmann, Intersec's show manager, “the growth and success of Intersec is attributable to the increased number of international companies recognising the opportunities that exist in the Gulf area. Most GCC countries have major projects underway that require increased attention to security and safety needs.”

Many countries have been targets of terrorist attacks over the past year, including Iraq, Qatar, Jordan, Egypt, Lebanon, and Saudi Arabia. In addition, the war in Iraq and the increased terrorism threats posed by insurgents in that area shows that the need for heightened security and safety is imperative. The internationally acclaimed Intersec 2006 offers an extremely high level of education and awareness in all aspects of this field.

Another territory attracted to the show is Africa; many of its countries are investing in new homeland security, border control projects and national ID Cards. Across the globe awareness on security, be it associated with terrorism, tourism safety, or money laundering, has increased in recent years.

Intersec 2006 covers all possible areas of security and safety. As well as the presence of some of the most respected suppliers in the industry, there will be a host of international specialists in the area of Police, Security, Fire, Health and Safety. An estimated 8,500 visitors will attend this year’s event.
===========================

39.  Password Tools Lower Compliance Costs -
By Cameron Sturdevant - EWeek - Jan 9, 2006

Source Next Contents

Password management systems including single-sign-on tools such as RSA Sign-On Manager 4.5 can drastically reduce a number of IT costs, not the least of which are those associated with regulatory compliance. When single-sign-on tools are combined with two-factor authentication systems such as RSA's SecurID for Windows, compliance becomes almost a piece of cake.

In their recent book titled "Sarbanes-Oxley: IT Compliance Using COBIT and Open Source Tools" ($49.95, Syngress Publishing), authors Christian Lahti and Roderick Peterson outline a model password control policy. Many of their password suggestions can be handled by using a single-sign-on tool.

Further, single-sign-on software tools that are combined with two-factor authentication hardware tokens ensure that users can't write down all the information needed to access company systems because part of that information is constantly changing. During our tests of Sign-On Manager 4.5, we used SecurID for Windows tokens on which the passcode required at log-on time changed every minute.

One thing we've heard repeatedly from IT managers who have implemented user identity management systems-from federated identity tools to two-factor authentication systems-is that doing so drastically reduces the amount of paperwork needed to prove that the organization is always in control and able to account for user access to enterprise systems.

Instead of walking auditors through reams of change-request forms and showing how each of those forms is handled when an employee is hired, moved or fired, IT managers can instead show a relatively simple password enforcement policy. For savvy IT managers, this is a good way to demonstrate to the business side of the enterprise that IT not only can support business processes but also can reduce friction with auditors.

One other big advantage of using a password management system is a lessening of the threat of employee discipline. For example, the model compliance policy in "The Cost of Compliance" includes the hair-raising threat that "Any employee found to have violated this policy might be subject to disciplinary action, up to and including termination of employment."

Password management systems likely won't be of much help, at least in reducing compliance costs, if a consistently high value has been placed on organized preparation for external audits. Most financial institutions, which have been audited since time immemorial, will likely not see the same dramatic audit cost reductions as organizations such as hospitals, manufacturers or educational institutions.

And in cases where organizations do see password management systems having a big impact in reducing audit costs, it is likely that the very act of implementing the identity management tool will immediately suggest other cost-saving moves. For example, as soon as a password management project is even contemplated, the directory structure for user information comes to mind. Scrutinizing directories to see where they can be streamlined will likely lead in the direction of looking at the process whereby employees and consultants are onboarded and offboarded.

Are biometrics the answer to your password problems? Click here to read more.

By driving costs out of these areas, IT managers can show a commitment to keeping the cost of doing business low while demonstrating leadership in making the organization more agile and streamlined.

Technical Director Cameron Sturdevant can be reached at cameron_sturdevant@ziffdavis.com.

Check out eWEEK.com's Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzer's Weblog.

=================================

40. Russia Doesn't Deserve Its Reputation - An interview by Mikhail Zygar, Head of the European Commission in Russia Marc Franco tells Kommersant about the problems that hold Russia and the European Union back on their paths toward each other. - Kommersant - Jan 9, 2006

Source Next Contents

[Extract Only]

Franco: That problem arose not from the expansion of the EU, but from the breakup of the USSR in 1991, when Kaliningrad became an enclave. Yes, the issue of transit of people has been settled. People travel from Kaliningrad to the rest of Russia and back with simplified transit documents allowing for the crossing of the Polish and Lithuanian borders and obtainable with the tickets. One more problem is that there is no consulate in Kaliningrad of a country that belongs to the Schengen zone. That is, if a resident of Kaliningrad wants to go, for example, to Germany, he has to receive or his visa in Moscow or St. Petersburg. That problem will be solved next year too. Two consulates will be opening, those of Germany and Sweden, and they will be able to issue Schengen visas and to represent the interests of other countries and give out visas for them. When Lithuania and Poland join the Schengen zone, their consulates will be able to grant Schengen visas.

Kommersant: How realistic is a visa-free regime?
* * *
Franco: We are now working a simplified regime. It will be easier for those who travel for work - businessmen, journalists, scientist, athletes - to receive long-term visas. As for a visa-less regime, it would be necessary for Russia and the EU to trust each other's passports for negotiations to begin. The EU countries have to be sure of the authenticity of the documents that Russians use for travel, and Russia should trust European passports. New passports with biometric data are being introduced on both sides and that should reduce the risk of the use of false documents. In addition, it is very important that contacts and cooperation be established between the law enforcement structures of Russia and the EU. In the Schengen zone, the police exchange information about criminals. Since there is no internal border control, the police of various countries have to work together to be able to identify criminals.

Finally, there is one more principle moment - the agreement on the readmission that includes the return of illegal immigrants to the territory of the country they came from. It says in the agreement that, during the transitional period, three years from the moment of ratification, Russia will receive illegal immigrants who are Russian citizens. That's normal, it's worldwide practice. At the end of the transition period, Russia should take back all of the illegal immigrants who entered the EU through Russian territory. In that time, Russia should make similar agreements on readmission and extradition with other countries. Then, in three years, at the end of the transitional period, readmission will enter its final stage and Russia will begin to take all illegal immigrants automatically that had come through its territory.

Kommersant: Migration has been one of Europe's most pressing problems lately. The EU countries will most likely tighten up migration legislation. How will that be reflected din Russia?

Franco: Migration is a problem not only in the EU, but probably of al countries of the continent. We should admit that we worked badly on that problem before. It is the main challenge to politics in the coming years and a lot will have to be done to regulate it. There is no magic solution. It will have to be developed so that it doesn't go the way it did 40 or 50 years ago. Because the immigrants couldn't integrate. On one hand, the immigrants themselves don't want to integrate. On the other hand, society has to want them to integrate. Otherwise, the situation will be even more explosive. * * *
=======================================

41. CIOs prepare for new technology challenges - Information sharing, hurricane response will propel many 2006 IT programs - BY Michael Arnone and Dibya Sarkar - Federal Computer Week -  Jan. 9, 2006

Source Next Contents

Irresistible forces -- both natural and manmade -- carved the technology landscape that federal chief information officers must navigate in 2006.

The apocalyptic rage of Hurricane Katrina made CIOs take emergency preparedness and response -- and the technologies that make them possible -- more seriously. But other factors continue to alter the information technology environment. They include pressure from federal, state and local governments to share more information, particularly for first responders and law enforcement; the need to unify computer networks that are more secure and reliable against evolving, more dangerous security threats; and calls from Congress to spend money wisely.

The converging threats and responsibilities will require federal CIOs to juggle more responsibilities than ever, while contending with budget cuts made to pay for hurricane relief, the war on terrorism and other pressing needs. Federal Computer Week asked several CIOs and government watchdogs what technologies will matter to them in the next year and how they will pay for and implement them in the post-Katrina world.

NOAA's eye for an eye

The devastation caused by Katrina and the communications problems it exposed are driving much of the new technology at the National Oceanic and Atmospheric Administration.

NOAA will continue some major initiatives and launch others, said Carl Staton, NOAA's CIO. Several initiatives are related to tracking hurricanes or tornados and developing better climate models. For example, the agency is working on an unmanned aerial vehicle that would escort a hurricane for a long duration.

"It's conceivable that the UAV technology will allow such a vehicle to fly, say, over 60,000 feet and track the storm for as much as a week and continually gather measurements of pressure and wind, which would be a significant improvement in data availability... [and] result in a significant improvement in our forecast," he said.

Meanwhile, researchers from the agency's Geophysical Fluid Dynamics Laboratory in Princeton, N.J., are developing a prototype high-resolution computer model to simulate an entire season of hurricane activity. NOAA expects to implement the model in the next year or two.

NOAA officials also plan to expand integration of aerial imagery with commercial services, such as Google Earth. Another smaller initiative alters mobile radar trucks used by tornado chasers to temporarily replace radar communications destroyed in natural disasters.

Staton said NOAA will likely award the much-anticipated high-performance computing contract for next-generation research and development activities in the second quarter of 2006. Internally, the agency will deploy some high-end intrusion-detection systems, perform network consolidation to move toward a single NOAA network and consolidate Web servers.

DHS' to-do list

The Homeland Security Department has its own extensive list of improvements to make after Katrina, most notably in the Federal Emergency Management Agency.

DHS' inspector general will closely monitor how FEMA addresses its IT deficiencies, said Frank Deffer, DHS' assistant IG for IT. FEMA at first vociferously disagreed with the IG's September 2005 assessment that condemns the agency for being ill-equipped. But later information appears to confirm the IG's argument, Deffer said.

Finding better ways to share information, improve IT networks and manage essential programs should top the 2006 to-do list for Scott Charbo, DHS' CIO, and his employees, experts from DHS watchdog agencies say.

The IG's office will issue a report in several weeks on difficulties in managing DHS' older networks. DHS is moving toward a standard network platform for sensitive but unclassified information, called One Network, Deffer said. One Network will fix some of DHS' lingering IT problems, such as the lack of a global address list. The IG will look for DHS to set a schedule for the program in 2006.

In 2006 DHS must improve its information sharing with state and local partners through the Homeland Security Information Network, Deffer said. The network is a major effort to promote good communications and knowledge management among federal, state and local homeland security partners, he said. The IG office is still auditing the system and will publish its findings in the spring, he said.

DHS must improve management of its technology for checked baggage screening and radiation detection, said Norman Rabkin, managing director of homeland security and justice issues at the Government Accountability Office. The department must look at ways to move screening equipment out of airport lobbies and integrate the technology into existing baggage-handling lines to improve efficiency, even though that is more expensive, he said.

The department must resolve ongoing privacy and technical concerns about its Secure Flight program, which checks airline passengers against terrorist watch lists, Rabkin said. DHS must also ensure that it uses biometrics to verify the identities of participants in the U.S. Visitor and Immigrant Status Indicator Technology program, which screens foreign travelers to spot terrorists, and users of the Transportation Worker Identification Credential.

Watch over Sentinel

Perhaps no single federal technology program will get as much scrutiny in 2006 as Sentinel, the FBI's new investigative case management system. Then again, no other program has to overcome the reputation that it was a $170 million flop.

The FBI launched a program in May 2005 to develop Sentinel after pulling the plug on the Virtual Case File management system. VCF, which was never deployed because of ongoing cost and schedule overruns, was part of the FBI's Trilogy program to modernize the bureau's obsolete computer systems.

Another reason the FBI and Justice Department are concentrating on Sentinel is because the system will be the basis for all future federal investigative case management systems, said Vance Hitch, Justice's CIO. The department leads the Office of Management and Budget's case management line of business.

Justice's new Litigation Case Management System will be similar to Sentinel in technology and potential impact. It will replace eight or nine aging systems that must be dispensed immediately, Hitch said. The U.S. Attorney's Office will lead the program, and all Justice components will participate in the nationwide implementation, he said.

Hitch said the department expects to award both contracts in early 2006. The contracts will determine the schedules of both programs, which Justice will implement in phases. Sentinel is on target for completion by 2009, he said.

The FBI's move to a service-oriented architecture and the creation of Sentinel are getting the most attention these days, but the bureau is working on other tech issues, too, said Zalmai Azmi, the FBI's CIO. The FBI will focus on wireless technology in 2006. The bureau is seeking tools that can overlay multiple layers of classified information on geospatial maps. It also wants to create a national database for gang-related information this year.

Justice is working on several new systems and test programs to implement its national Law Enforcement Information Sharing Program for federal, state and local law enforcement partners, Hitch said.

The Regional Data Exchange, an internal tool that allows all department components to share structured and unstructured data, is critical to the program's success, Azmi said. The FBI wants to add four exchanges, including one with DHS and one in San Diego, in 2006 to one already operating in Seattle, he said. The U.S. Attorney's Office must approve the arrangements, he said.

The FBI is starting work on a National Data Exchange, which will serve as an index. Hitch said he expects to issue a procurement proposal for that program this year.

Justice will also devote more energy to internal IT projects. The department's Unified Financial Management System will bloom in 2006, and a procurement for the program is imminent, Hitch said.

Hitch expects to work hard to comply with Homeland Security Presidential Directive 12, which requires federal agencies to issue compliant identity cards to employees and contractors beginning Oct. 27, 2006.

===============================

42. The test of terrorism - Security concerns change life in labs - By HARVEY BLACK - Milwuakee Journal Sentinel - Jan. 8, 2006

Source Next Contents

Toxins and the fear of their misuse - especially since Sept. 11 - has changed life in the laboratory for many scientists.

Passed in 2002, the Public Health Security and Bioterrorism Preparedness and Response Act requires scientists doing research on any of a number of bacteria, viruses and toxins meet a variety of strict security measures, as well as have employees pass a federal background check.

While some researchers say that the regulations are appropriate and reasonable, considering the potential for terrorism, others complain that the requirements impede their work on important issues.

"The constraints are reducing research effectiveness," says Caitilyn Allen, a professor of plant pathology at the University of Wisconsin-Madison, referring to her efforts to study a plant pathogen on the select agent list, which covers some 70 such organisms and toxins. They include a number of viruses, such as Ebola and bacteria responsible for diseases such as anthrax and plague.

Ralstonia solanacearum, race 3 biovar 2 can kill tomatoes when it infects the plant in warm, humid environments. One focus of her research is developing tomato strains that can resist the bacterium. Doing so, she says, can help Guatemalan farmers who are working to develop an export market for tomatoes as a way to boost their income.

"We scientists in the developed world have a moral obligation to do work that can benefit people in the developing world," she says. But installation of security equipment, such as biometric locks that read fingerprints - at an estimated cost of $150,000 - interferes with that research.

"Making Caitilyn do fingerprint scans to work with this pathogen just doesn't strike me as a good use of resources," says Tim Denny, a researcher at the University of Georgia.

He abandoned work on this bacterium because of the expense and restrictions of the new security regulations, saying the organism was not central to his research.
Document, document

Beyond the security hardware, which regulates entry to the lab, there is extensive paperwork required to document what happens to samples of the bacteria.

"I figure my technician spends 20 percent of her time on compliance issues. That's research money being spent on something other than research," Allen says.

Researchers also complain that the restrictions can limit who can do research on these agents.

"I can't just say, 'You're hired to work on this,' because it has to go through federal approval. That takes routinely from three months up to six to eight months," says UW-Madison researcher Gary Splitter, who has been working for three decades on brucellosis, an infectious livestock disease that can be transmitted to people.

Brucellosis was weaponized by the United States until the destruction of the stockpile in the 1970s.

The federal government requires background security checks by the Justice Department on those who work with select agents.

The time required to complete the background check as well as training a newcomer to the lab, can slow research significantly, says Splitter.

"I think it has the effect of driving professors out of the area (of working on select agents)," says Thomas Montville of Rutgers, who works with the bacteria responsible for making the deadly poison botulinum, another select agent.

He says his work on developing natural inhibitors to this poison, which can be found in canned foods, is suffering because of the length of time it takes to get students federally approved.

"The net effect of this legislation for the scientific community, as a whole, has reduced the amount of work going on, on this list of select agents, which should be studied intensively," says Adam Bogdanove, an Iowa State University scientist who is sequencing the genome of a rice-attacking bacterium that is on the select agent list.

Though he clearly decided it was important to continue his federal government- funded work on this organism, he says that five of his colleagues at the university decided not to continue their research on various select agents because of the restrictions and expense.

Jan Leach, a plant scientist at Colorado State University, abandoned research on this rice pathogen for similar reasons. She notes she had been able to work on it with no restrictions for the past 20 years.

She says that her colleagues outside the U.S. who study it, in hopes of better understanding and eventually combating pathogens that attack this important crop, are "stunned" at the restrictions imposed on U.S. researchers.

Overall restrictions appear to have had a significant effect. Less than half the laboratories predicted to work with select agents have registered to do so, according to Science magazine last year.

But Lee Ann Thomas, of the U.S. Department of Agriculture, which is one of the government agencies responsible for regulating select agents, disputes such arguments.

"I am not aware of significant numbers of researchers who have dropped out," she says. She adds that there is an increasing number of researchers wanting to work with select agents.
Some favor new rules

Other researchers sound relatively content with the restrictions.

"I think they're justified. We need these protections in place. Given the threat of bioterrorism, I think these things have to be in place so we know who has these agents," says David Wagner of the University of Northern Arizona, who works with the bacteria responsible for causing glanders, an infectious disease of horses that can be transmitted to people.

Similarly, Julie Coffield of the University of Georgia, who works with botulinum toxin, says the restrictions and equipment, such as fingerprint readers that control access, have made her feel more secure about her lab.

Thomas suggests that scientists who are unhappy with the select agent restrictions fail to recognize the consequences of a changed world.

"It is a community that has not been subject to regulations, but the world changed on 9-11 and subsequent to that," she says, adding that in the event a bioterror attack is launched using any of the select agents, "we will know who has it and who has been handling it appropriately. It does improve our emergency response abilities."

Governmental concern about these select agents extends to an unwillingness to release the names of researchers who are studying them.

That "information in the wrong hands could cause problems," says Von Roebuck, a spokesman for the federal Centers for Disease Control and Prevention, which also regulates select agents.

And at UW-Madison, James Tracy, an associate dean at the School of Veterinary Medicine, whose job it is to see that the university complies with the select agent regulations, will not reveal who works with them on campus.

"I will not go on the record as to what agents we do or don't have, simply to protect people," he says.
===========================

43. India Revives Fingerprint Plan to Combat Fraud:  - by Andy Mukherjee - Bloomberg.com - Jan 9, 2006


Source Next Contents

Jan. 9 (Bloomberg) -- India's stock market regulator has unearthed a scam, which it is now using as an excuse to revive an intrusive fingerprinting plan that may put off genuine investors.

According to the regulator, the fraud took place in June 2005 when one Roopalben Panchal made a bid for 1,050 shares of Yes Bank Ltd., a Mumbai-based lender that was selling stock to the public for the first time.

The bank's initial public offer was hugely oversubscribed; Panchal's application was unsuccessful. Yet, before the first day of trading on July 12, she managed to come into possession of almost a million shares, receiving 150 each from 6,315 people.

More than 98 percent of Panchal's selfless benefactors happened to have the same address as her sister.

After receiving the shares, Panchal sold 80 percent of the stock to five buyers, four of whom dumped their holdings on the market on the first day of trading. The return the shares sold? An astronomical 432 percent, annualized.

``It would take extreme naivete or suspension of disbelief to accept the intricacies of such convoluted transactions as a normal incidence of genuine dealings in securities,'' the Securities and Exchange Board of India, or Sebi, said in its Dec. 15 order. Sebi banned Panchal and her associates from subscribing to initial share sales until further order.

On Dec. 30, it reintroduced fingerprinting of investors.

The proposed fingerprinting of U.K. citizens for a national identity card plan has created quite a stir in that country. Critics have panned it as an assault on personal liberty. Many travelers to the U.S., too, have resented the post-Sept. 11 experience of being fingerprinted at airports.

Invasion of Privacy

What makes the Indian exercise more objectionable than both the American and British variants is that it has absolutely nothing to do with national security.

Until mid-2005, there was an 18-month-long Sebi-sponsored drive in India to create a biometrics-based investor identification system, which was being touted as a foolproof method for weeding out wrongdoers from the markets.

The regulator had ruled that anyone who wanted to trade securities valued at more than 100,000 rupees ($2,239) would need to quote their unique identification numbers. The drive was suspended after investors complained and a Sebi-appointed panel criticized it.

By the time registrations were suspended last July 1, fewer than 313,000 individuals had provided personal details for the biometric database. That's a fraction of the 7 million accounts used by investors to buy and sell shares.

IPO Rules

On Dec. 30, the regulator decided to resume registrations in the biometric database, though it is now compulsory only for those who wish to trade shares worth more than 500,000 rupees. The threshold will be gradually lowered, Sebi Chairman M. Damodaran told reporters in Mumbai.

The IPO fraud has thus become a pretext for reintroducing a draconian measure that serves no purpose -- no fraudster would be naive enough to commit manipulative trading under his own identification.

Sebi should instead have focused on changing the rules for allotment of IPO shares. The entire incentive for fraud exists because of a regulation that favors small investors.

Individuals who applied for shares worth more than 50,000 rupees were grouped together as ``non-institutional,'' and 25 percent of the Yes Bank IPO was reserved for them; those who invested less than that amount were put in the ``retail'' category and 25 percent of the shares were set aside for them.

Had Panchal applied in the non-institutional section, she would never have been able to corner as many as she did. That's because this segment was oversubscribed 43 times. She made a killing by getting her applications considered in the retail category, which was oversubscribed only 10-fold.

Google It

Since the Yes Bank IPO, it's become even worse: Reservation for small investors has gone up to 35 percent, from 25 percent.

``The system of cross subsidizing small investors in the allotment process is the root cause of the abuse,'' says Jayanth Varma, a former member of the Sebi board and a professor at the Indian Institute of Management in Ahmedabad.

``Today the technology exists,'' Varma says, ``to ensure that IPO allotments are made to all investors at the same market clearing price in a completely non-discriminatory manner. There is no need to reserve shares for some categories of investors.''

Google Inc.'s 2004 IPO has shown how the Dutch auction method can enable price discovery to be achieved not by investment bankers, but by direct bids from potential investors.

Database Security

Share trading has already gone paperless in India. Investors keep accounts with share depositories. The accounts are credited and debited with every purchase and sale of securities. In Panchal's case, the depository should have found it suspicious that a few thousand clients had the same address.

When information that already is being collected is not being properly analyzed, why bother asking for more? There are real concerns that thumb impressions could be stolen from the database and abused.

Fingerprinting would only harass honest investors; the crooks would learn to beat the system in no time.
============================

44. Leaving on a jet plane? Rules are changed again - By JILL SCHENSUL - North Jersey Media Group - Jan 8, 2006

Source Next Contents

Air passengers, pay attention.

The rules are changing.

Rule 1: Be good or be gone.

Recently, the captain of a Monarch Airlines flight from Manchester, England, to Tenerife, the Canary Islands, made an unscheduled stop on a tiny island en route, to ditch an inebriated passenger. The man had been swearing at the crew, according to the Daily Mail, after they refused him more alcohol.

This was just the most recent in a spate of airplane ousting incidents: a pair of brothers ditched in New Mexico, during a Southwest flight from Phoenix to Philly, and a United Airlines flight that diverted for a landing in Charlotte, N.C., after an unruly passenger lit a cigarette and urinated in the aisle.

Take heed. Behave yourself, unless you really didn't want to get where you were going to begin with.

Rule 2: Sharp objects bring tradeoffs.

As of Dec. 22, the list of objects banned from planes shrank, when the TSA decided it was OK to let people bring aboard not only their precious lighters (remember, no smoking, even out

side) but a variety of sharp objects such as nail clippers.

Instead, security will start performing more random searches of passengers and their stuff. Some days, at some airports, you may be required to remove your shoes, other days you won't be. The rule? There are no rules.

Rule 3: Forget about privacy.

As recent events have shown, the government will do whatever prying it takes in the name of national security. Don't start arguing if they ask at the airport for information about you, your friends and your relatives.

However, if you are willing disclose a variety of personal information, you can get in on the TSA's Registered Traveler program, which will be offered nationwide June 20.

The TSA will collect personal information including name, address, phone number and date of birth, along with biometric data, including fingerprints and/or an iris scan. A "security assessment" will include, according to the TSA, a check with law enforcement and intelligence sources along with a search for outstanding warrants.

Travelers who are sufficiently trustworthy after the checks will be able to breeze quickly through special security checkpoints after providing their credentials and biometrics scanning. A fee, not yet determined, will be charged for the privilege. For more information, go to tsa.gov/public.

Rule 4: Don't get used to low fares.

As Independence Air's recent demise reminds us, price hikes love a void.

When Independence arrived on the scene 18 months ago, offering fares as low as $29 one way, it forced other carriers on the same routes to reduce their fares, too.

Unfortunately, mismanagement, higher fuel costs and, ironically, competition from other low-fare carriers forced Independence out of the running, and analysts predict fares will go up to fill the void it left.

One rule that hasn't changed, at least for now, is protection for passengers if an airline folds. In November, Congress extended Section 145 of the Aviation and Transportation Security Act, which gave travelers holding tickets for a defunct airline certain rights.

It specified that airlines flying the same routes as the defunct airline are required to accommodate stranded passengers, on a space-available (standby) basis. The passenger pays a maximum of $50, one way, for a seat on the alternate airline, and has to make alternate arrangements within 60 days of the date service ceased.

Independence Air (flyi.com) says it will request permission from bankruptcy court to refund unused tickets. Passengers who charged their tickets can also request a refund from the issuing card company.

==============================

45. Diamelle Releases Java EE Platform-Based Low Cost Authentication Server to Deter Fraud and Identity Theft
Technology Uses Soft Tokens for Multi-factor Authentication
- SysCon Belgium - Jan 8, 2006

Source Next Contents

Diamelle Technologies which provides a comprehensive identity and access management enterprise solution, has announced the release of a low cost Authentication server with two factor authentication, aimed at the SMB market and high volume online applications.

Authentication with more than one factor is considered as strong authentication which is considerably more difficult to compromise as compared with single factor authentication. Two factor authentication, using one time passwords (OTP), requires the user to enter something they know, which is usually a PIN, and something they have; a physical device such as a token, smart cards with micro-processors, or biometrics such as finger print scanners.

The Diamelle solution uses something that every online consumer already has: a PC, a PDA, or a mobile phone. There are no manufacturing or distribution costs, just a simple one time software download.

The Authentication Server can be expanded to include Diamelle Technologies’ Enterprise Identity Management solution available for large corporations. The Diamelle IDM is an integrated, full featured product built on a Java Enterprise Edition (JAVA EE) platform with WS-I compliant web services to facilitate integration and provides authentication with Single Sign-on, authorization, user management, policy management, user self-service, audit, password management and delegated administration. Diamelle offers a seamless migration path from the Authentication server to the IDM solution.

Diamelle Authentication server has been built upon the Java EE platform utilizing a Service Oriented Architecture. The Diamelle product architecture emphasizes scalability, security, portability, platform independence, extensibility, business process mapping and easy systems integration. It is a powerful and flexible programming model which lowers implementation risks and cost of ownership and scales to millions of users. The solution can be deployed in a number of configurations where it can serve as the central identity manager for the enterprise or it may be deployed as part of an application, without creating a new footprint, as is often the case for ISVs or departmental solutions.

The use of the JAVA EE platform means that developers or administrators already working with JAVA EE app servers can leverage their existing knowledge. Competing products dating back to earlier times often have proprietary platforms without the same level of flexibility. Availability of Web Services and related technologies, simplifies integration with applications that use other technologies. Since SOAP toolkits are now available for a large number of platforms, the effort is greatly reduced and developers can leverage existing knowledge to achieve this goal.

The Diamelle Authentication server is available for immediate delivery. A promotional price is being offered during January 2006 where the Authentication Server for 500 users is available for $7,500-. Additional users licenses are available for $5- / user for 501 to 5000 user. 5001 to 10,000 users are $4- / user.

==============================

46. Drivers under USFJ must tell command of off-base incidents - Stars and Stripes -  January 8, 2006\

Source Next Contents

U.S. Forces Japan personnel must report off-base vehicle incidents to installation law enforcement officials, but punishment is often left to a commander’s discretion, even for minor infractions.

Air Force Col. James Brophy, USFJ’s provost marshal, said there are standard reporting procedures that outline the steps U.S. servicemembers and civilians should take following traffic accidents and violations, both on and off base.

If a military member, Defense Department civilian or dependent is involved in a wreck on base, they are required to notify security forces or military police immediately, according to Brophy. Vehicle accidents and citations outside the gates must be reported to base law enforcement officials at the closest U.S. military installation. That includes offenses for drunken driving, speeding and seat belt use.

If a driver isn’t arrested but is given a citation, he added, that gets forwarded to the home installation for action by the individual’s commander. It may result in a fine or appearance before local Japanese police. Commanders can impose additional points to the driver’s license as well.

In Japan, the police don’t distinguish between a vehicle’s driver and its owner in accidents or cases of misconduct, he said.

So if a U.S. servicemember is operating a car owned by his Japanese girlfriend and gets a ticket or winds up in an accident, “he will be held as the professional driver by the Japanese, regardless of who owns the vehicle. If they commit an infraction, say speeding, he’ll be given the citation - even if it’s his girlfriend’s car,” Brophy said.

Under USFJ guidelines, he must inform officials on base.

South Korean law enforcement officials provide traffic tickets to the nearest military provost marshal office, where the tickets are recorded in the Defense Biometric Identification System.

The MPs then send the tickets through the military postal system.

If an individual receives multiple citations, or doesn’t pay the ticket, the chain-of-command is alerted.

Before leaving Korea, personnel must deregister their vehicles and any unpaid tickets will be flagged.

The U.S.-South Korea Status of Forces Agreement contains a requirement that USFK authorities are alerted if a SOFA member “is detained, arrested or otherwise taken into custody,” according to a USFK response to query.
=============================

47. Report on FBI may strengthen lawsuit against agency By WILLIAM McCALL  -  Associated Press - KGW-TV (Oregon & Washington State - Jan 8, 2006

Source Next Contents

A Justice Department report that faulted the FBI for sloppy work may strengthen a lawsuit filed against the agency by a Portland man who was arrested after his fingerprints were mistakenly identified during the investigation into the 2004 Madrid train bombings.

Attorneys for Brandon Mayfield "don't have to argue a particular violation of Mayfield's religious rights or First Amendment rights," said Robert Precht, who represented defendants in the 1994 World Trade Center bombing in New York.

"They only have to argue the government engaged in blatant misconduct," said Precht.

Other legal experts agree that the Justice Department report does not undercut Mayfield's lawsuit - and may help it.

In the report released on Friday, Justice Department Inspector General Glenn Fine faulted the FBI for mistakenly matching a fingerprint found on a bag of detonators near the Madrid bombing site to those of Mayfield.

The report said no "intentional misconduct by FBI employees" was found, but said there were "performance issues by various FBI employees ... that helped cause the errors in the Mayfield case."

Mayfield was jailed for two weeks in May 2004 - even though Spanish investigators disagreed with the FBI's fingerprint analysis. The FBI acknowledged the mistake on May 24 and apologized to Mayfield.

He sued the Justice Department and the FBI in October 2004, claiming he was singled out because of his Muslim faith and that searches of his home and other locations were in violation of the Fourth Amendment of the U.S. Constitution, which protects against unreasonable search and seizure.

If Mayfield can show that FBI experts were under pressure to make an identification without being certain - which the FBI and the Justice Department have denied - then he may be able to establish a pattern of misconduct, Precht said.

He said the Justice Department report leaves open questions about the possibility of pressure on forensic experts.

"Once the government or the prosecutor's office or an (FBI) supervisor says we think this guy may be guilty, the whole machinery of government goes to work to find the evidence that supports that," Precht said. "People do these things naturally. That's why we have safeguards about the presumption of innocence."

Michael Greenberger, a University of Maryland law professor and director of its Center for Health and Homeland Security, said the delay in correcting the mistake may be ammunition for Mayfield to argue there was pressure.

"They should have figured out sooner those were not his fingerprints," Greenberger said.

Brian Roehrkasse, a Justice Department spokesman in Washington, D.C., said the agency could not comment on the pending lawsuit and he referred questions about the report to the FBI.

The agency, in a statement released with the inspector general's report, said Mayfield's mistaken arrest "was based on an extremely unusual confluence of events."

The FBI said it has changed its procedures at the recommendation of an international panel of experts in order to prevent a similar mistake.

Precht, who recently left the University of Michigan to return to private practice in New York, said the pressure on investigators and prosecutors is enormous once they believe they have the right suspect.

"This is a textbook example of people having assumed a person's guilt, and then they look for evidence to confirm it," Precht said.

Veteran trial lawyer Gerry Spence, who is representing Mayfield, has argued the FBI targeted the former Army officer because he is a convert to Islam.

The inspector general's report concluded that religion played no role in the initial, mistaken fingerprint identification because the FBI experts did not know Mayfield was a Muslim, or that his wife is Egyptian or that he represented other Muslims as an attorney.

The report noted, however, that "whether Mayfield's religion was a factor in the (FBI) laboratory's failure to revisit its identification and discover the error in the weeks following the initial identification is a more difficult question."

Elden Rosenthal, a Portland lawyer also representing Mayfield, said the case raises important issues of protecting constitutional rights during the government's war on terrorism.

"Those of us concerned about civil liberties always sound like we're talking about abstract concepts," Rosenthal said. "Here is a concrete example of why civil liberties should not be allowed to take a back seat to the war on terror."

In Mayfield's case, Rosenthal said the FBI won approval from a secret court established by the Foreign Intelligence Surveillance Act, or FISA, to plant electronic "bugs" in the Mayfield home and his law office, execute repeated "sneak and peek" searches of his home and office, and place wiretaps on his phones.

Despite the inspector general's conclusion the FBI could have gotten FISA approval for surveillance without the Patriot Act, the report found that changes made by the act permitted access to more information about Mayfield than could have been obtained without it, said Dave Fidanque, executive director of the Oregon chapter of the American Civil Liberties Union.

"The inspector general's report confirms for the first time that Mayfield's home, and probably his office, were 'bugged,'" Fidanque said.

Greenberger said the Mayfield case may provide the first opportunity to test whether Patriot Act provisions on surveillance and searches violate the Constitution.

"Everybody has been waiting for a case where these kinds of searches under the Patriot Act can be brought to a court's attention by somebody who has standing to raise it - and Mayfield has that standing," Greenberger said.

"There's a big, big constitutional issue here," he said.
=============================
48.  Watch-list for terror suspects - by Nicolette Burke -  in Canberra - The Courier Mail [Australia] - Jan 9, 2006

Source Next Contents

POTENTIAL terrorists and war criminals entering Australia will face heightened scrutiny, under a new watch-list to be set up this year.

The Department of Immigration and Federal Government security agencies are setting up a control centre to administer the Movement Alert List, which places a red flag next to the names of criminals, people with terrorist connections, and other undesirables.

Everyone applying for a visa to come to Australia will have their name checked against the database, which contains more than 400,000 people of interest.

They include terrorists, serious criminals, those involved in organised immigration rackets, people who have previously breached their visa conditions and those known to be carrying significant health risks.

More than 7000 of the people on the list are named as war criminals, particularly in the former Yugoslavia and Rwanda.

The new set-up will use better computing technology to analyse the names and pseudonyms of terrorists, many of whom have common or complex names.

Almost 10,000 people a day are checked against the alert list before coming to Australia.

In the past year the number of names on the list has increased by around 25 per cent.

A departmental spokesman said the new system was likely to be operating by June.

"Substantial improvements in name search algorithms, quality assurance of records, technical expertise and the MAL work environment will ensure that the risk of missing a genuine match is minimised," the spokesman said.

"The system enhancements include a change in the processing regime so that all applications are checked on MAL using the most rigorous name searching techniques at the earliest stage of application processing."

Late last year, a Muslim convert from Britain, Abdur Raheem Green, who has been named as a radical, was refused entry to Australia because he was named on the Immigration Department's Movement Alert List.

Mr Green, who has said Muslims "cannot live peaceably together" with Westerners, was due to make a series of speeches at mosques in Australia, but was stopped before boarding his flight to Australia from Sri Lanka.

The bolstered system will complement the Regional Movement Alert List, where travel documents are examined at the airport check-in counter, and passengers barred from boarding the flight if they are suspected of passport fraud.

New kinds of biometric information, including fingerprints, iris scans and photographs, will also be stored in the database to help protect Australian borders.

The collation of this information is currently on trial at Sydney airport, with a view to rolling out biometric testing nationally to prevent identity and passport fraud, which the Government has said has strong links to terrorist activity.

==============================

49. In reality, high tech beats no tech - By Bob Bong - Daily SouthTown [Illinois] - January 8, 2006

Source Next Contents

Business editor I can no longer pride myself for not owning a cell phone.

Not having a cell phone (or a pager) seemed a simple way to rebel against the technology creeping more and more into our lives.

My daughter changed all that when she gave cell phones to me and the wife for Christmas.

Mind you, the phones are as basic as you get. These are pay-as-you-go models with no fancy ring tones and no cameras.

As she presented them, my daughter said it was high time we left the Stone Age.

That got me thinking about how technology has become such a part of our lives; not that technology hasn’t been a part of society since some caveman rolled the first wheel. Appliances we take for granted, such as refrigerators and washing machines, are technology, after all.

But technology has been coming at us fast and furious in recent years. It took 25 years to go from Pong (the first video game) to Nintendo, but the original Xbox already has been replaced by Xbox 360.

At home, we have a programmable thermostat that has come in handy this winter in keeping heating bills under control. When we go to work and the house is empty, the thermostat is set at a chilly 60 degrees (a co-worker sets his at 58 during the day, but he’s from Minnesota, so we don’t pay him much mind).

About an hour before my wife gets home, the heat ratchets up to 66 degrees, before slipping back to 64 overnight. With natural gas prices about a third higher than last year, it’s a great tool. Who cares whether the house is cold when nobody’s home?

And we were shopping at Cub Food the other day when the checker asked us whether we wanted to sign up for the finger plan. It seems the grocery store chain is the first in the Chicago area to employ biometric systems at its stores.

Biometrics is something right out of James Bond stories, or “Star Trek.” At Cub, you sign up and then your designated finger becomes your new checkbook. You just place your finger on the screen and the money is transferred out of your account.

Some of the computer companies are working on using the same technology to safeguard your computer. You’d have to scan your finger to gain access to your computer files. Another system uses a scan of your eye’s retina to achieve the same kind of security.

A similar finger scan is being used to keep drunk drivers off the road. Drivers have to have their finger scanned to determine whether they are legally able to drive. If you test too high, the car won’t start.

Another version of that system requires drivers to blow into a testing device, which will determine whether the motorist is OK to drive.

Medical technology is a modern marvel. I had cataract surgery on both eyes and had new lenses implanted. A few weeks ago, when I went to renew my driver’s license, I passed the vision test without the glasses I have needed since I was a kid.

Medical technology also allows people who have lost a limb or some other body part to function in everyday life. Prostheses have advanced so far that some soldiers wounded in Iraq have asked to return to active duty after being outfitted with a new arm or leg.

The list of technological marvels also includes microwave ovens that are so small and cheap that we throw them away when they break.

The same goes for televisions, CD and DVD players and VCRs, if you still have one of those dinosaurs.

And we won’t even mention TiVo.
============================

 50. Tighter security on visas - By NICOLETTE BURKE - The Advertiser [Australia] Jan 9, 2006

Source Next Contents

POTENTIAL terrorists and war criminals entering Australia will face heightened scrutiny, under an improved "watch list" to be set up this year.

The Department of Immigration and Federal Government security agencies are setting up a control centre to administer the Movement Alert List, which places a red flag next to the names of criminals, people with terrorist connections, and other undesirables.

Everyone applying for a visa to come to Australia will have their name checked against the database, which already contains more than 400,000 people of interest.

They include terrorists, serious criminals, those involved in organised immigration rackets, people who have previously breached their visa conditions and those with health risks.

The new set-up will use better computing technology to analyse the names and pseudonyms of terrorists.

Almost 10,000 people a day are checked against the alert list before coming to Australia, and there has been a jump of 25 per cent in the number of names placed on the list in the last year.

A DIMIA spokesman said it was likely to be operating by June.

"Substantial improvements in name search algorithms, quality assurance of records, technical expertise and the MAL work environment will ensure that the risk of missing a genuine match is minimised," the spokesman said.

Biometric information, including fingerprints and iris scans, also will be stored in the database.

===============================

51. Day 3 at CES: What's Hot - By Richard Nass - Mobile Handset DesignLine - Jan 7, 2006   

Source Next Contents
 
This is day three at the Consumer Electronics Show (CES), and for me, it's getaway day. The crowds at the show just seems to get bigger and bigger each day. Just trying to walk the aisles became a chore.

So what did I see that was impressive, you ask? One of the more interesting products was a radio developed by Alereon that transmits both Bluetooth and Ultra Wideband (UWB) signals. In fact, the radio can dynamically switch between the two protocols, even while transferring a file.

SigmaTel is getting into the video business in a bigger way than it had in the past. They've develop an IC to code/decode/compress video on an iPod-like system. This will find a home in lots of coming players, assuming Apple's video iPod takes off as expected.

Analog Devices showed a Blackfin-based door lock, also known as a biometric security device. It works using fingerprint recognition.

And one of Freescale's customers is on the verge of shipping a ZigBee system to control the home. It operates the lighting and can monitor security cameras, all from an Internet connection

=================================

52. Experts weigh in on bank responses to FFIEC guidelines - Financial houses strengthen authentication with challenge questions, phone authentication and other means of outsmarting hacker sleuths - By Marisa Torrieri, - January 7 2006

Source Next Contents

Bank of America’s answer to the new federal guidelines isn’t a biometrics apparatus that detects a legit banker’s paw print or a hardware token that generates passwords on the fly. For now, it’s much simpler.

The Charlotte, N.C., national bank chain just started rolling out SiteKey, its free, new online security technology intended to better protect its 13.2 million online banking customers. The risk-based authentication software works behind the scenes, passing information back and forth between the user and bank. When logging on, customers select an image, write a brief phrase and select three challenge questions. When the customer signs in to online banking, they view their image and phrase before inserting their password -- confirming that they are at the real Bank of America site. If a customer uses a computer the bank doesn’t associate with them, SiteKey will issue a challenge question to confirm that it is the appropriate customer.

”We see this as [part of] an ongoing process,” says Betty Reiss, a spokeswoman for Bank of America’s online activities, adding that the upgrades will protect online bankers from phishing and other fraudulent activities.

The decision to install SiteKey to increase online security is based on months of market research involving focus groups, Reiss says. BOA’s potential customers favored the idea of a challenge question because of its convenience over other two-factor authentication methods. Additionally, the bank’s corporate headquarters favored the method because it was less costly to implement than other methods.

“It adds an added layer of authentication but doesn’t require an additional purchase in software,” Reiss says.

Like Bank of America, many banks and credit unions serving regular Jane Does (the “horizontal markets” composed of consumers) are charging full speed ahead to improve the security of online banking. The recent guidelines put out by the Federal Financial Institutions Council (FFIEC) sped up that process. In the recent guidelines, “Authentication in an Internet Banking Environment,” financial institutions are instructed to analyze risks of fraud attacks and enhance systems with some form of two-factor authentication.

The good news for the companies that make two-factor authentication products is that banks must do something to show they are evaluating risks of customers’ data being exposed to the wrong parties via their existing information technology in palace.

“The FFIEC guidance has had a huge impact of making people move,” says Stu Vaeth, chief security officer at Diversinet, a company that develops soft tokens and provisioning for two-factor authentication. “It’s putting a lot of the banks over the edge, saying, let’s do something now.’

Banks also want to do something because of the growing media attention to phishing, identity theft, and the risks related to online banking. The more their consumers read about online attacks, the more fear they have to do their banking outside of a branch setting, Vaeth says.

Since online banking costs a bank far less than branch-based activities, it’s easy to see why financial institutions are weighing their options, wallets in hand.


Great security versus keeping customers happy: How banks are handling the FFIEC guidelines for two-factor authentication

For the producers of two-factor authentication products, courting a U.S.-based bank is far easier today than in the past ... though still not a slam dunk. They must show that their software or other “solution” provides high level of security, is cheap to install, and won’t inconvenience customers. Cost and convenience are the biggest factors influencing banks’ investments, according to bank analysts and IT staff.

“The consumer I think is to blame in a lot of cases,” says Doug Graham, a security consultant for BusinessEdge Solutions, Inc. “They want their cake, and they want to eat it as well.”

The biggest challenge is making online banking more secure while inconveniencing consumers as little as possible. This challenge may explain the hesitancy for banks to start issuing hard tokens, or one-time passwords (OTP), says Vaeth, as they lack universal authentication.

Because of the lack of a single, authentication standard for all online transactions, you have to use multiple hard tokens for different transactions - you can’t use the same password to transfer money that you use to order goods from Amazon.com, for example. This is perhaps one the biggest reasons why the sale of OTP devices hasn’t exploded in America, says Vaeth.

“Hard tokens are less desirable for those who don’t want to carry around a necklace of tokens,” says Diversinet’s Vaeth, who doubles as a co-chair for the Initiative for Open Authentication’s (OATH) technical group. The organization, formed in February 2004, is one of a growing number of consortiums meeting to address the “necklace” problem by developing an open standard for strong authentication for any online application.

Although the larger 180 or so national institutions like Bank of America have been aware of the need to build to build stronger online security systems to deter fraud, smaller institutions with $5 billion or less in assets are still trying to figure out the best solution, says George Tubin, a security analyst with TowerGroup, who just authored a new report that interprets the FFIEC regulations (Tubin’s report endorses the risk-based authentication technologies such as that used by Bank of America, over hard tokens).

Not turning off customers was International Bank of Miami’s primary consideration when it decided to overhaul its infrastructure and use a voice-based biometric authentication system for high-end customers doing wire transfers or making account changes.

After upgrading desktop computers and back end systems, the company contracted with Diaphonics to install the voice authentication system, says Ray Guzman, the bank’s vice president of IT. Such a system enhances security for such customers. Now that the FFIEC made it clear that the bank needs to do more to amplify its security for the rest of its “few thousand” customers, Guzman is comparison shopping different soft token-based “solutions.”

“The biggest concern is customers,” Guzman says. “Will they accept the technology?”


What’s next for two-factor authentication, 2006 and beyond

Methods in place such as SiteKey are good deterrents for fraudsters today. But just as security for protecting customer information improves, so do the methods for circumventing a bank’s firewalls. And so, whatever banks are doing today may need an upgrade in the not-too-distant future.

In his report, the TowerGroup’s Tubin addresses a series of cyber threats that continue to emerge, including Trojan horses, Drive-by Downloads and DNS cache poisoning. Because of the growing level of sophistication, the TowerGroup recommends institutions to look beyond the FFIEC's minimum requirements and implement comprehensive authentication solutions to protect against the potential for enterprise-wide fraud within an institution.

One way of doing this is by offering multiple solutions to different customers, says Graham. For example, a bank using one vendor’s risk-based authentication technologies may find itself interested in another provider’s hard tokens for corporate-level bankers who conduct online transactions at multiple locations.

What is likely to happen is a growing number of banks offering a range of products for different customers - high-end users, corporate bankers and low-risk users. For example, a bank might offer an internal, behind-the-scenes risk management system for one customer, but give another customer an OTP to do mobile transactions from afar.

Products that allow cross authentication - customers to use a single solution to interact with multiple financial entities they have relationships with - will become more important in the future, says Graham.

Instead of multiple security devices, “the industry needs to come up with a solid solution where one single authenticator can be used to validate identity to multiple entities, or where trust relationships can be leveraged from one institution to another through the use of identity federation,” Graham says. “Simply put, we need to give the consumers one method of validating their identity, or authenticating to multiple sources.”
==========================

53. $80, fingerprints, eye scan to speed you to your plane - Starting this summer, some fliers can skip long security lines at the Indy airport - By Theodore Kim - Jan 7, 2006

 
Source Next Contents

Indianapolis International Airport on Friday became one of the first airports in the nation to adopt a new federal program that will allow frequent fliers and other travelers to get through airport security more quickly.

Known as the Registered Traveler Program, the initiative is meant to ease checkpoint hassles without compromising airline security. It is expected to begin here this summer.

Passengers who pay an annual fee of about $80, undergo a background check and submit biometric information -- their fingerprints and an iris scan -- will gain access to special screening lanes, airport Security Manager Reggie Baumgardner said.

Travelers who enroll in the program also will greatly reduce their chances of being subjected to a secondary security search. These passengers and their carry-on baggage still will be screened for weapons, explosives and other illicit materials.

The seven-member Indianapolis Airport Authority voted unanimously to hire a New York-based company, Verified Identity Pass, to put the program into place and oversee it. The initiative pays for itself through the fees collected from passengers.

"The goal here is to find the proverbial needle in the haystack," Verified's founder, Steven Brill, said in a telephone interview. "What we're doing is removing some of the hay. It has real security benefits."

Approval of the program here comes months after the federal Transportation Security Administration decided to expand the initiative nationally after successful pilot programs at five other airports.

A sixth, Florida's Orlando International Airport, has directed a longer-term experimental effort called "Clear." Verified Identity also administers that program.

The concept has raised questions of whether it infringes on civil liberties and might create an unfair caste system among passengers: those who can pay to get through security more quickly and those who cannot.

Industry experts, meanwhile, have said the program could create a potential security loophole because it would, in effect, create yet another entry point onto an airline for would-be terrorists.

The pilot programs, however, have met with generally favorable reviews from passengers. Such was the sentiment of frequent fliers Friday at the Indianapolis airport.

Matt Del Garbino, a 35-year-old personal trainer from Westfield, said he might join the program. He often travels to visit his fiancee, Diana McGinnis, who lives in the Los Angeles area.

Friday, it was McGinnis who made the four-hour flight to Indianapolis for the weekend.

"I'd definitely do it, too," the 35-year-old McGinnis said as she collected her luggage and received a hug from Del Garbino. "You get people who don't understand how to get through the security checkpoints."

Don Rice, 56, a sales manager and frequent traveler from Evansville, also liked the idea.

"It's often 6 a.m. and I'm often half-asleep when I'm going through security," Rice said. "And I always seem to be the random guy they'll pull out (for a secondary search). I'm for whatever makes it easier."
==========================

54. Boning up on a body's identity - ADRIAN MATHER - Jan 9, 2006 - The Scotsman [UK]

Source Next Contents

THE year is 1935 and in an isolated ravine in Dumfriesshire two young women have stumbled on a grisly scene.

Mutilated to hide their identities, the remains of two human bodies lie in a ditch wrapped in a Lancaster newspaper and left to rot in the wilderness.

The police are baffled. Both bodies - a 34-year-old woman and another in her 20s - have been dismembered and had their fingertips sliced off.

Over the next few days, 43 pieces of flesh and tissue are painstakingly recovered from the scene, leaving police with a decomposing jigsaw to solve.

The killer, back in England, is convinced he's safe from the law. After all, Dr Buck Ruxton has made every attempt to hide the fact that it was his wife and the couple's unfortunate nursemaid whom he had butchered in a jealous rage.

An Indian medical student called Gabriel Hakim before changing his name, Ruxton met wife Isabella while practising as a doctor in Edinburgh. The couple moved to England after the birth of their first child. Two more children followed.

But Ruxton became increasingly convinced that Isabella was having an affair. The couple's fights were common knowledge, as were Isabella's weekend trips away without her husband.

The jealous doctor even secretly followed her when she made a trip to Edinburgh with a male companion in September 1935.

Even though she and the man, a 25-year-old who worked in the Lancaster town clerk's office, booked into different rooms in a hotel, the doctor concluded his wife was being unfaithful and decided to kill her.

The grisly act was carried out on Isabella's return to the marital home - and the nursemaid, Mary Jane Rogerson, is believed to have walked in at the wrong moment. The prosecution at the trial concluded he killed her for fear that she would tell the authorities.

But even after Ruxton recklessly asked a patient for help to clean his bloodstained flat in Lancaster and was arrested by police, there was little evidence to link him with the crime - since no-one could identify either of the mangled bodies.

However, investigators had a new, groundbreaking scientific technique at their disposal to discover the truth. In Ruxton's landmark trial in 1936, they juxtaposed the remains of one of the recovered skulls on to a photo of the doctor's wife and proved it was a perfect match.

Combined with a number of incriminating fingerprints gathered at his house, this new type of "bone forensics" proved Ruxton had brutally killed his wife, and sent him to the prison gallows.

The presiding judge, Mr Justice Singleton, paid tribute to the forensics work, saying: "Never have I seen expert witnesses more careful."

THE damning evidence was the work of Professor James Brash, a scientist at Edinburgh University's forensic medical department - the 200-year-old institution which produced world-renowned figures such as Sidney Smith, founder president of the British Association of Forensic Medicine, and the two men reputed to be the inspiration behind Sherlock Holmes, Joseph Bell and Dr Henry Littlejohn.

And although it is exactly 70 years since the technique was first demonstrated in a British court, it remains a vital part of forensic work today. In investigations across the world, bones are analysed by experts in a bid to identify a victim and, ultimately, how and when they died.

The fascinating techniques, based on those pioneered 70 years ago, have captured the imagination of TV scriptwriters too. This week, a new US drama, Bones, begins on Sky One, based on forensic pathologist and best-selling author Kathy Reichs' crime novels. It follows an anthropologist and FBI agent team who solve crimes by identifying the long-dead bodies of missing persons by their bone structure.

Not that television programmes always show the real forensic anthropologists' work accurately.

"Because of programmes like CSI, you'd think that a scientist in a lab coat can just take a DNA sample and identify a body in a matter of minutes, but that isn't the case at all," sighs Edinburgh-based scientist Laura Sinfield.

"There are 61 million people in Britain and the national DNA database only has three million on it, so even if you manage to get a sample you still may not be able to find out anything about the person who it belongs to.

"That's why forensic anthropology is so important. "

Sinfield is one of Britain's 20 dedicated forensic anthropologists, who deal exclusively with identifying skeletal remains, assessing the of time and cause of death. A former PhD student with a keen interest in archeology, she has been working in the field of forensic anthropology for the past ten years. Her career has seen her studying human remains in Bosnian killing fields, as well as helping police in murder and suicide investigations across the country.

And she admits that, although the techniques used to identify human remains have become more sophisticated over the years, they still owe a great deal to James Brash's involvement in the Ruxton trial.

"You still have to look at the bones you've found, measure them and examine them thoroughly. When you see a modern-day facial reconstruction that has been created from studying a skull, it is really a continuation of the superimposed photo that was presented in the Ruxton case," she explains.

"In fact, we owe a lot to the Ruxton trial. Although some of the ideas had been developed in the United States, it was the first time that this kind of evidence had ever been used in a murder trial in Britain and it was truly groundbreaking.

"Nowadays, if there is any occasion where human remains have been found and there is no way of identifying the body, there will always be a pathologist or forensic anthropologist called to analyse the remains.

"If the body has been burned or it has decomposed, and if there are no teeth or fingerprints, we have to use what's left to build up a picture of what has happened. You need to work out the height, sex, race and age of the person before you can start trying to find out who they are."

Working out the height is probably the simplest - before the Second World War the only way was to lay out the skeleton and measure it.

But Sinfield says: "It was very unreliable. And it's also rare to find an entire skeleton in the first place. Nowadays you have to measure some of the longer bones, such as the arms and legs, and use that to try to determine what the person's height is." Age is trickier - a child's bones, because of the size, mean the age can be gauged quite accurately, but for adults it's the amount of wear and tear which gives the clearest indication - and this can differ in individuals.

Sex is determined by examining elements such as the pelvic bone and looking at where the muscles were attached at the neck. Race is by far the most difficult to tell, although some clues are given by the shape of the skull.

However, even if it's never going to be a story with a happy ending, identifying a body brings its satisfactions.

Sinfield explains: "I had a case a few years back when a skull was dredged up from the North Sea by a fishing boat. There weren't any other bones to work with, but by analysing it thoroughly I discovered that it was a man in his 60s - who the police later matched with a 61-year-old who had committed suicide in Durham two years earlier."

It's a piece of deduction that Brash would have been proud of. And Sinfield says there is one aspect of forensic anthropology that hasn't altered since the 1930s. "The ethos behind it has never changed. Whether it turns out to be a murder, a suicide or a missing person, as far as I'm concerned it's all about building up a picture of what happened, getting the facts right and learning the truth."

Bones, Thursday, Sky One, 10pm
==================================
55. A Fictional Story... Or A Premonition Of Things To Come? - Jim Downey's Rants & Raves - Digital Divide Network - Jan 9 2006

Source Next Contents

It was two AM when the knock came on the door. My dog began barking and my wife nudged me to go take care of whom ever had the audacity to knock on our door at that hour. I threw on my robe, put the dog in his crate, and went to answer the door. There was shouting and more hurried knocking coming from the other side. Before I could reach the door, it burst open. The glass to the sliding doors near the living room shattered. Suddenly there were 15 to 20 men, all masked and armed to the teeth, in my home. They were yelling and swearing at the top of their lungs, instructing me to drop to the floor and lay on my stomach. My wife bolted out of the bed and rushed out of the bedroom. A shot was fired in her direction. More yelling and swearing, this time directed at her. She, too, was being told to hit the floor. The dog was barking like a rabid watchdog.

The rush of armed bodies kept coming. One of them stepped onto the middle of my back. I cried out in pain and was hit for my effort. Suddenly, three men grabbed my arms, pulled them behind me, and fastened them together with something that cut into my wrists. I could feel pain in my wrists and blood dripping down over the wrists.

My wife was screaming and crying out. I was helpless to respond. I could not see her from my place on the floor. The dog yelped and stopped barking, and I heard whimpering from the direction of his crate. Without warning, I am lifted off the floor and practically dragged out to a black van that was fitted as a police vehicle. I could not see anything outside of the van. I heard my wife yelling. Suddenly, the van jerked, sped up and I was aware that I was being taken somewhere.

After riding in the back of the van, completely void of any views or communication, the ride stops. The door of the van is opened and I am dragged out and escorted to a large building. My surroundings are unfamiliar. I am pushed and nudged all the while. I am rushed through a process of getting my picture, fingerprints and paperwork completed. No one answers any of my questions or talks to me in any way except to get information from me or to give me commands. My questions regarding my wife’s whereabouts and safety go unanswered. My request for a lawyer goes unheeded. I am placed in a dark cell and the doors are slammed behind me. There are no other people in the cell areas. I can hear the sound of activity coming from other areas of this building. I sit on the cold metal bench that is permanently fixed to the wall. Whatever is restraining my hands is still cutting into the flesh of my wrists. I manage to lie down on the bench and fall asleep.

A loud crash awakens me. There are five men in my cell yelling and screaming at me. The torrent of their questions is disturbing and confusing. My attempts to ask about my wife and request a lawyer results in name-calling. Somewhere between my requests and all the yelling I hear one of them call me a goddamned terrorist. I am hoisted from the bench and pushed around the cell. The lights in the hall leading to the cell go dark and I am escorted out of the cell. I am placed in a room with a table and three chairs. The room is devoid of any décor, equipment or other furniture. My hands are cut free, only to be placed in actual handcuffs, which are then attached by a chain to the table. The men leave the room.

Some twenty or thirty minutes later a large man enters the room and sits across from where I am restrained. My inquiries as to why I am being held against my will are ignored, as are my requests for a lawyer, and my concerns about my wife. The man stares at me without saying a word. I begin to quietly say a prayer to my self. As the man notices my lips moving he slams his fists on the table and, with a torrent of profanity, tells me to shut my mouth. I tell him that I was praying. I receive a slap across my face. I continue my prayer in my head. Some time later I receive another slap across my face and a chastisement for my thoughts. I feel my face redden and sting in response to the slap. The man leaves the room. I am sitting alone in the room for what seems to be an eternity.

Without warning the lights in the room start to strobe and loud punk rock music is pumped into the room. I cannot reach my ears to cover them. The noise is loud enough, and annoying enough, that my head begins to pound. The strobe light causes me to feel a bit of nausea. The effect is disorienting. My mouth is dry and I am feeling the need to urinate.

After a long barrage, the music stops and the lights go out. I am alone and in the dark. While I am thankful that the music has stopped, the urge to urinate is now becoming significantly uncomfortable. The darkness, the pain from my stretched bladder, and the torrent of unanswered questions running through my mind are as disorienting and torturous as was the strobe light and music.

Again, without warning, the room is lit. Another man enters the room, unchains me and takes off the handcuffs. He instructs me to strip off my clothes. I resist this idea and request a lawyer. He shoves me into a corner and threatens me. Even with my own history of using profanity, the rush of swears coming out of him is offensive. He again instructs me to strip of my clothes. This time he adds a threat of bodily harm if I refuse to comply. I refuse. He rushes me. I strike back. My military and martial arts training give me the advantage. I throw him to the ground. Within seconds I feel an electrical current rushing through my body. I am being attacked with a tazer. I fall to the ground. The man I was struggling with gets up and kicks me. Another jolt of current is sent through my body. I am instructed to stand up and remove my clothing. I have no choice but to comply. I am now aware of several more people in the room, including a couple of women.

I ask that the women leave the room. Another burst of electricity is sent through my body. I drop to my knees. The group of people in the room begin to yell at me, shouting a variety of instructions to remove my clothing. I stand and start removing my clothes. I realize as I am removing my trousers that the pain from my bladder is now gone. During one of the zaps from the tazer my urinary sphincters released. I am embarrassed. The women in the room are now laughing and calling me names in reference to having wet myself. One of the men removes the tazer connections with several sharp yanks on the wires. There is a stabbing pain with each tug. Another man yells at me to hurry up the process of removing my clothes. I stand naked, completely exposed, cold and wet along my legs and crotch. My mind reels and I try to remove myself from the reality of what I am experiencing. I am again handcuffed and chained to the table. All of the others leave and the lights go out. I am alone in the dark, naked and overwhelmed. I begin to cry in response to the anger, embarrassment and frustration that I feel.

I put my head down on the desk and begin to talk to myself in a quiet whisper. I remind myself of my boot camp experiences. I recall my training as a fleet marine corpsman. I seek memories of survival training experiences. I recite the “Lord’s Prayer,” seeking some solace and rest through my connection with God. I fall asleep.

The door opens and the lights go on. A single person enters carrying a yellow jumpsuit and some flip-flop sandals. I am unchained and released from my handcuffs. The person offers the jumpsuit and sandals. I take them. As I open up the jumpsuit to accommodate putting it on, I notice the word “TERRORIST” is written on the back and front of the jumpsuit. I ignore it just so I can put on something warm and preclude any future embarrassment and exposure. The person, who I can now identify as a man dressed in a suit, asks me to take a seat. He pulls a bottle of water from his suit coat pocket and offers it to me. As I open it and drink from it, I realize how thirsty I was.

The man introduces himself as a member of a federal task force on domestic terrorism and a FBI agent. I ask him for a lawyer. He tells me that since I am being held as a suspect of terrorism under the Patriot Act, I am not entitled to a lawyer. He informs me that all of my belongings from my home have been packed up, moved to a warehouse, and are being carefully examined for evidence of my collusion with Al-Qaeda operatives. Expressing my anger and frustration, I yell at him that I am not a terrorist. I reference my military record, my honorable discharge from two branches of the service, and my citizenship. He gets up and leaves.

A short time later the room is filled with several people, including the two women. I recognize them most of them as having been present when I was attacked with the tazer. I am instructed to stand up and remove the jump suit. The bottle of water is confiscated. I am barraged with orders and profanity. I remove the jumpsuit and, once again, stand before them naked and exposed. The jumpsuit and water are taken out of the room. The group begins to question me in rapid-fire succession. I don’t even have time to run the questions through my mind before another question hits me like a brick wall. Somewhere in the process I become aware of questions regarding phone calls to a close friend named Mohammed, who lives in Canada. Then there are questions about e-mails to my friend Elsa, a Christian missionary teacher and lay preacher living in Bahrain. Then I am asked about my past visits to my friend Massoud in Qatar. My reason for working as a teacher in Bahrain and Saudi Arabia were also brought up. I could not answer the questions because they came too fast and there wasn’t time to answer. I decided to just shut up. Shortly after I shut up, the group left the room, and the lights went out. I found the chair and sat down, still naked, still exposed. I remained in the room for a long time, alone and vulnerable, thoughts racing through my mind.

Why did they want to know about Mohammed? He’s a teacher that I met while teaching in Bahrain. He lived in Toronto and we stay in touch. I visited him several times since 1997. Elsa is a British citizen that I also met while I was in Bahrain. She was a missionary. Why would they want to know about her? Massoud is a business owner that I met though Bader, a friend that had immigrated to American just after the fall of Iran to the Ayatollah Khomeini. Bader became a naturalized citizen after having sought asylum here I the states. These were my friends. None of them had anything to do with terrorism.

My thoughts were interrupted when the light went on and the same man in the suit returned. He gave me the same jumpsuit to put back on. As soon as I had the jumpsuit buttoned up, another person came in with a tray of food. I sat down and the FBI guy let me eat while he asked questions. I answered only the questions that I felt were innocuous, or were common knowledge.

He asked me about e-mails I sent to Massoud, Mohammed, Bader and Elsa. He asked me about my trip to India in 1995. And then he asked about the jaunt I took to Pakistan that same year. I told him about visiting India as part of my exploration of the region while on vacation from teaching in Bahrain and Saudi Arabia. I told him about visiting Mohammed and Monsoor, another teaching colleague and friend, in Karachi and Islamabad. He inquired about my blog and my political opinions expressed in my writings. The questions involved every aspect of my life. I only answered in limited fashion. I informed him that I felt I was being illegally held, that I wanted a lawyer, and that I wanted to know what was happening to my wife. He became obviously irritated. I finished my food as fast as I could.

He got up, picked up the tray, and left the room. As soon as he left the strobe light and loud punk music filled the room. I found a corner of the room, sat down, put my hands over my ears and closed my eyes. I don’t know how long this assault lasted, but the room went dark and silent at some point in time. I sat in the dark for a long time. Then the door opened, the lights went on, and I was instructed to stand up. I was handcuffed and escorted out of the room. I was led to another cell area, just as isolated as the previous cell, but this was lit with high intensity lighting. There was no bench or furniture of any kind. There was a bucket in the corner. The cell door was closed behind me after I was nudged through the doorway.

I sat in a corner, away from the bucket. I could smell feces and urine coming from the bucket. It had been in the bucket for some time and the odors filled the room. I tried to ignore the stench. Closing my eyes, and holding my hands over them, I tried to shut out the over-stimulation of the high intensity lighting. I was in the room, alone, without water, food or comfort for a long time. I occasionally got up to relieve my bladder. I eventually had to use the bucket for a bowel movement, but there was no toilet paper. I had to deal with the discomfort of going without the amenities of daily hygiene. No one came to look in on me.

It was not until I was totally exhausted that I was able to sleep. But without the use of my CPAP machine, it was not a restful sleep. My sleep apnea kept me from getting any real rest. Still, no one came to look in on me. At times I got up and walked around, just to keep my muscles from aching and cramping. Each time I reached a point of exhaustion I would drop off into an un-restful sleep. The odors from the bucket only bothered me when I used it to relieve myself and the use would stir up its contents. I measured time the best way I could by keeping track how full the bucket was getting. Still, I had no idea how long I had been in this cell, how long I had been left alone, or when I had last eaten. I was thirsty and my throat was parched. My nostrils were dried out and that made my breathing more difficult during those periods when I did sleep. I had not taken any of my blood pressure medications since just before going to bed on the night that these folks had raided my home.

My thoughts ventured to my wife and my dog. I wondered what was happening to them. I broke down into tears several times, wondering if my wife was suffering or being treated in the same manner they were treating me. I wondered what they did to my dog. Was he being held at a kennel? Had they left him alone in his crate? Again, I became exhausted and fell into yet another un-restful sleep.

I was awakened by the sound of people approaching the cell. The door opened and I was escorted back to the room where I had been attacked with the tazer. I was instructed to sit down and I was chained to the table. I realized at that moment that I had been handcuffed all the time I had been in the brightly lit cell with the nauseating bucket. I sat alone for a long time, then the strobe light and music began. My mind was reeling and I screamed for it to stop, but it continued for some time.

The door opened, the strobe light and music stopped, and a man that I had not seen before came into the room. I was again questioned about all the things the FBI man had asked me. I was also asked about various files and writings that were found on my computers that were confiscated from my home. The man refused to answer any of my questions regarding my wife, my dog, or anything to do with time or date. My requests for a lawyer were ignored. After a long period of questioning the man got up and left.

A short while later the same group of people that I had struggled with before entered the room, including the two women. I was unchained and released from the handcuffs. They instructed me to remove the jumpsuit. After complying with the request, everyone but the two women left the room. I was instructed to stand against the rear wall, facing the women. I stood there while the women made comments about my appearance, smell and lack of hygiene. I tried to ignore them, but I knew that their presence was embarrassing and frustrating. After an eternity of embarrassment, they left. Another man, this one dressed in military police garb, entered the room and placed me in handcuffs. He escorted me to an area where there were toilets and showers. I was allowed to clean myself up, brush my teeth with a bare toothbrush, and shower. I was given a clean jumpsuit, this one without the label “TERRORIST” on it.

After cleaning up and showering, I was escorted to a cell that had a bench, a working toilet, and a small window that allowed some natural light. I could see that it was daytime, but I could not tell if it was morning or afternoon. I lied down on the bench and drifted off to yet another un-restful sleep, not knowing how long I had been held, or how long I would be held. I did not know why I was being held. I did not have any contact with my friends, family or colleagues. I had not been able to call my job and let them know what was happening. I did not know where my wife was, or how she was being treated. I had done nothing wrong. I was not a terrorist and I had no contacts with terrorists. Yet, I was a prisoner without recourse, with all my rights being denied, and being deprived of all the basics of daily living.
--------------
The foregoing story is fictional. However, given the realities of domestic spying, indefinite detention of accused persons, denial of legal representation, wiretapping and data mining, and the broad powers that are being claimed and exercised by the Bush administration, it could become reality. Our Constitutional rights are under assault in the name of power, control and an exaggerated sense of danger. The terrorists that seek to do us harm are winning the war against terror because they have provided those with a fascist ideology to create climates where we are not only deprived of our fundamental liberties and rights, but many of us are convinced that these folks are right to do so. We must understand that what George W. Bush has done is exactly what our forefathers and framers of the Constitution feared. Liberty, justice and rights are under attack in these United States of America, and it is our own leaders that are attacking.

Please pass this along… We need to get the word out and tell our leaders that we want a reasonable level of security, but not at the complete sacrifice of our privacy, rights, liberties justice and our first principles
=======================

56. She Gives Bodies Their Faces Back - Coroners in L.A. and Orange counties turn to the Huntington Beach artist when seeking an ID. 'It's amazing how close she gets,' says one. - By Susana Enriquez, Los Angeles Times - Jan 9, 2006

Source Next Contents

Marilyn Droz draws dead people.

During her three hours with a corpse, she looks at the hair follicles to help her establish a missing hairline. She analyzes clothing to help determine the person's build. She pulls out a ruler and measures the distance between the eyes, nose and mouth. She peels back the eyelids and lips to see the eyes and teeth.

 "They're like putting complicated puzzles together," said Droz, 59.

Droz is the person the coroners in Los Angeles and Orange counties turn to when they can't identify a body. Through her sketches, she erases injuries and decomposition.

"You need something that looks alive, that isn't going to be disturbing to the family when they see the person in the newspaper," Droz said. "Putting up the actual picture of someone [dead] is going to be more disturbing to a loved one, as opposed to a portrait."

The Huntington Beach resident is among a handful of artists who work for law enforcement agencies around the country drawing bodies, said Karen Taylor, a forensic art instructor at the FBI Academy in Virginia who has sketched thousands of John and Jane Does.

Droz works mostly with the LAPD and several Orange County police departments drawing composite sketches of criminals. Postmortem drawing is a niche within the field of forensic art that requires an understanding of anatomy, Taylor said.

Although some agencies release photographs of the deceased, others consider the practice taboo.

"It seems to us to be more dignified to do it in a hand drawing," said Bruce Lyle, Orange County's assistant chief deputy coroner. "If we have a better option, why not use it? Why push the issue?"

Lyle said counties interpreted the laws that govern the release of coroner photos differently.

In Orange County, the coroner releases photos only for trials and teaching forensics. The coroner's website has nearly 50 John and Jane Does dating from 1970, 16 of which were drawn by Droz.

A sketch depicting how a person may have looked is helpful, Lyle said, because the Doe may not be recognizable because of injuries, exposure to extreme temperatures, decomposition or scavenging insects or animals.

If the person is missing a nose, Lyle said, Droz can draw one, based on other features. To keep a corpse's odor at bay, she dabs medicated ointment below her nostrils.

The Los Angeles County coroner's office, which has hundreds of Does on its website, posts photographs unless the person was shot in the head or the body is extremely decomposed, said coroner's investigator Gilda Tolbert.

In those situations, the agency posts descriptions of the person's clothing, jewelry and tattoos, or they call Droz, who has helped in the identification of several of the county's Does.

This week, Droz got a message from Tolbert saying a John Doe she had sketched in July had been identified. In that case, Droz reconstructed the face of the teenage boy, whose skeleton was found in the chimney of a vacant South Los Angeles building in March.

A woman who saw the drawing called and said the boy resembled her nephew, who had been missing since 1977. DNA testing proved it was him.

"It's amazing how close she gets," Tolbert said. "She's good."

Droz sketched her first John Doe in 1981, a man who had been shot with a hunting arrow in Huntington Beach. "I'm sure I was terrified," she said.

In the years that followed, she drew a John Doe who was found in a plastic bag floating in a pond and another who was burned after he was killed. Because she was able to see past the swollen and charred faces of the men and sketch something remarkably close to what they looked like before they died, both were identified.

"It feels good when you know you helped a family have closure," Droz said. A few years ago, the family of a Brea man asked for her drawing as a keepsake.

Although her work with the dead has diminished because of the advent of a statewide automated identification system that stores criminals' fingerprints, Droz still sketches about five per year.

Many Does, she said, remain unidentified because they are transients from out of state or undocumented immigrants.

A recent subject was Orange County's latest John Doe.

In October, the Asian man, estimated to be 16 to 29 years old, was killed when hit by a car on Pacific Coast Highway in Huntington Beach.

As she reviewed her sketch months later, she realized she had accidentally drawn him with a lazy eye.

"It looked right to me when I was doing it," she said. "You can get so intent on getting the bone structure and the hairline right and then mess up on something simple, like centering the eye."
=======================

57. Press Release - Ministry launches biometric payment pilot  - Jan 6, 2006

Source Next Contents

(BNamericas.com Via Thomson Dialog NewsEdge)Bolivia's finance ministry began on Friday (Jan 6) a pilot program using a biometric system to govern salary payments to its employees, with the first user being finance minister Waldo Gutirrez, treasury director Liliana Riveros told BNamericas.


The system has proved necessary because regular payment by depositing checks in employees' accounts is subject to various forms of fraud, such as employees claiming extra checks using false identities.

In March or April, when the pilot program is concluded, the biometric system will be used to pay out the salaries of some 200,000 civil servants and 160,000 pensioners, who will identify themselves by fingerprint in order to receive their salary or pension.

The system uses Identix hardware along with applications developed internally at the ministry in order to reduce the overall system cost, said Riveros.

Some 30 biometric scanners are currently in place at government agencies, but when the system is fully operational it will include 56 points of payment nationwide, many with multiple scanners. This is by virtue of a contract signed between the Bolivian government and three private banks, which have also made a significant investment in the system, said Riveros.

The biometric system is designed to ensure transparency in the disbursement of public funds by avoiding fraud, thus allowing the country to take a great leap forward in the modernization of the government, Gutirrez was quoted as saying in local daily Los Tiempos.

In addition, it is expected to reduce waiting times, speed up the process of authorizing payments and lower printing and logistics expenses.

===========================
58. Are we heading for a serious identity crisis? - by David Berlind - ZD Net - Jan 9, 2006

Source Next Contents

If you've been following our series on Digital Restrictions Management (DRM) [sic], then you know that DRM is wall-building material when it comes to turning the Internet into a bunch of segregated nets or "walled-gardens."  Apple has it's walled garden consisting of the iTunes Music Store (as a source of content) and compatible end-user devices (iTunes software, iPods, etc.).  Microsoft has it's walled-garden with it's own sources and compatible devices.  Sony.  Now Google.  And so on.  In a 'bout of may the best stovepipe win, the DRM-politico structure of the industry is returning the industry to the stovepipe structure that the Internet's core protocol (TCP/IP) once promised to eliminate.  The situation has folks like Doc Searls — one of the more sane voices that I've heard in this digital age — thoroughly depressed.  Simply put, DRM is a vendor lock-in control point.  With patents to back the various flavors up, DRM is potentially the key to the next monoculture (should one win) — a monoculture that is far more dangerous and that stretches its tentacles into far more of society than just the computing parts.  Telecommunications for example.  Your cell phones.  Your stereos and televisions.  Your car.

This is nothing new for the computer industry.  For ever and ever, vendors have worked their way up from the bottom of the most popular software stacks looking for a control point that makes them the toll-taker.  TCP/IP withstood the assault to be extended in a proprietary fashion.  Going up a layer in the stack, so too has the Web (HTTP).  Although a layer higher where the applications (the browsers) sit, havoc has been wrough (yielding what is essentially incompatible Webs).   DRM is just another one of those control points in another laye of the "stack."  Own the control point, and the rest of the stack follows.  At CES last week, Google co-founder Larry Page summed it up rather nicely.  "It" being the key to winning the masses over to one form of DRM or the other — perhaps giving one DRM provider the keys to the stack.  In response to a question about the Google-specific DRM that will no doubt be a part of Google distribution pacts like the one the search giant inked with CBS, Page said:

There are a bunch of details about that; I remember some of them, but they're not important.  What we've seen with iTunes is that having a pretty good user experience is important.

Page is 100 percent correct.  What Apple has proven with the way it has integrated its iTunes Music Store with the Internet, iTunes software (for Windows or OS X) and its iPods (and to some extent the iTunes phones from Motorola) is that if you can build an absolutely pristine user experience, people will take whatever drug goes with it no questions asked.  Today, Fairplay — Apple's form of DRM — is that drug.  And it's very addicting.  Most people who are addicted to Fairplay-protected content (purchased through the iTunes Music Store) have no idea how difficult it will be to exit Apple's walled garden should they choose to do so down the road (for example, if the latest greatest coolest hippest device that everyone must have  isn't sprinkled with Apple's holy water).

DRM is rough stuff.  But what most people don't realize is that even rougher than DRM (if you ask me), is the layer in the stack that lies just below it.  The foundation on which the DRM walled gardens sit. The identity layer. Today, DRM is invariably based on your identity: some key token or combination of tokens like your e-mail address and a credit card that affirms your uniqueness from everyone else out there in userland.  And if you think all the different DRM schemes are incompatible with other, try imagining the identity management systems that lie underneath them.  In referring to the un-interwinable nature of Windows, Sun CEO Scott McNealy used to refer to Microsoft's platforms as a hairball.  One that couldn't be disentangled. The various DRM schemes and the identity systems to which they're bound are the new hairballs; in some ways, an identity crisis in the making.

But lest you think that this is the only pending crisis that's routed in our idenity, there are others.  They've always been there, but the light bulb really went off when I started getting suggestions for discussion topics for the upcoming Mashup Camp that Doug Gold and I are organizing (by the way, although it's still very much under construction, Mashup Camp's Web site is up and running).  Mashups are a new breed of software that play the starring role in what I'm calling the uncomputer. Or for some, maybe it's Computer 2.0.  Many refer to it as Web 2.0, but I don't buy that because HTTP — the protocol that makes the Web tick — hasn't changed in years.

When the proposed discussion topics started rolling in (there are already 14), one of them was yelling "hello" at me. Not "hello" like "Hi there big fella."  It was more like "Hellooooooo… did you not see me crossing the friggin' street!"  Identity?  What does identity have to do with mashups?  As it turns out, a lot.  Sure, most of the current breed of mashups have no concept of identity.  But, the mashup ecosystem is just getting started.  Judging by some of the Mashup Camp attendees that I've been in touch with, there's real interest in mashing up mission critical enterprise applications — the kind where identity management is a pre-requisite.  That got me to thinkin'.  What happens if the two systems a developer is trying to mash together into an identity-aware mashup use two completely different identity management schemes?  Back in the 1999/2000 timeframe, when one of my responsibilities was to oversee the integratation of Web sites like job matchmaker Dice.com into ZDNet (two sites that are identity-aware), reconciling their incompatible namespaces was an impossible task that require a significant amount of custom development.  Now, I'm just trying to imagine this sort of integration — mashup style — for the masses (of mashup developers) and I don't see identity aware systems getting bolted together as easily as the first wave of mashups were hooked up. 

Let me rephrase: Is DRM simply a blade on the identity management system razor and are there a whole bunch of other blades that we're not paying attention to?
===========================
59. Fake fingers no match for scanner's electronic nose - New Scientist - by Celeste Biever - Jan 10, 2006

Source Next Contents
Fingerprint scanners can be fooled by fake fingers made of silicone, so experts are working on an e-nose that can identify the aroma of human skin

FINGERPRINT scanners, increasingly used for everything from improving security at airports to preventing cellphone theft, can be fooled by fake fingers made of silicone, gelatine and even Play-Doh. Biometrics experts are working on ways to beat the fraudsters, and one of the latest takes a sensuous approach: an "electronic nose" that can distinguish the unique aroma of human skin.

Electronic noses are often used to monitor pollution and to determine whether food is spoilt. They contain a metal oxide film the electrical properties of which change when certain gas molecules pass over it. Different metal oxides react to different gases.

Now Davide Maltoni at the University of Bologna in Italy suggests placing noses inside fingerprint scanners, next to the optical device that images the fingerprint, to detect the volatile molecules exuded by human skin. To test the idea, he used an off-the-shelf electronic nose based on a single metal oxide ...

==============================
60. We lost the war. Welcome to the world of tomorrow - Du Chaos Computer Club by  Frank Rieger - Jan 10, 2006


Source Next Contents

Losing a war is never a pretty situation. So it is no wonder that most people do not like to acknowledge that we have lost. We had a reasonable chance to tame the wild beast of universal surveillance technology, approximately until september 10th, 2001. One day later, we had lost. All the hopes we had, to keep the big corporations and “security forces” at bay and develop interesting alternative concepts in the virtual world, evaporated with the smoke clouds of the World Trade Center.

Just right before, everything looked not too bad. We had survived Y2K with barely a scratch. The world’s outlook was mildly optimistic after all. The “New Economy” bubble gave most of us fun things to do and the fleeting hope of plenty of cash not so far down the road. We had won the Clipper-Chip battle, and crypto-regulation as we knew it was a thing of the past. The waves of technology development seemed to work in favor of freedom, most of the time. The future looked like a yellow brick road to a nirvana of endless bandwith, the rule of ideas over matter and dissolving nation states. The big corporations were at our mercy because we knew what the future would look like and we had the technology to built it. Those were the days. Remember them for your grandchildren’s bedtime stories. They will never come back again.

We are now deep inside the other kind of future, the future that we speculated about as a worst case scenario, back then. This is the ugly future, the one we never wanted, the one that we fought to prevent. We failed. Probably it was not even our fault. But we are forced to live in it now.

Democracy is already over

By its very nature the western democracies have become a playground for lobbyists, industry interests and conspiracies that have absolutely no interest in real democracy. The “democracy show” must go on nonetheless. Conveniently, the show consumes the energy of those that might otherwise become dangerous to the status quo. The show provides the necessary excuse when things go wrong and keeps up the illusion of participation. Also, the system provides organized and regulated battleground rules to find out which interest groups and conspiracies have the upper hand for a while. Most of the time it prevents open and violent power struggles that could destabilize everything. So it is in the best interest of most players to keep at least certain elements of the current “democracy show” alive. Even for the more evil conspiracies around, the system is useful as it is. Certainly, the features that could provide unpleasant surprises like direct popular votes on key issues are the least likely to survive in the long run.

Of course, those in power want to minimize the influence of random chaotic outbursts of popular will as much as possible. The real decisions in government are not made by ministers or the parliament. The real power of government rests with the undersecretaries and other high-level, non-elected civil servants who stay while the politicians come and go. Especially in the bureaucracies of the intelligence agencies, the ministry of interior, the military, and other key nodes of power the long-term planning and decision-making is not left to the incompetent mediocre political actors that get elected more or less at random. Long term stability is a highly valued thing in power relations. So even if the politicians of states suddenly start to be hostile to each other, their intelligence agencies will often continue to cooperate and trade telecommunication interception results as if nothing has happened.

Let’s try for a minute to look at the world from the perspective of such an 60-year-old bureaucrat that has access to the key data, the privilege to be paid to think ahead, and the task to prepare the policy for the next decades. What he would see, could look like this : ?

First,

paid manual labor will be eaten away further by technology, even more rapidly than today. Robotics will evolve far enough to kill a sizeable chunk of the remaining low-end manual jobs. Of course, there will be new jobs, servicing the robots, biotech, designing stuff, working on the nanotech developments etc. But these will be few, compared with today, and require higher education. Globalization continues its merciless course and will also export a lot of jobs of the brain-labor type to India and China, as soon as education levels there permit it.

So the western societies will end up with a large percentage of population, at least a third, but possibly half of those in working age, having no real paid work. There are those whose talents are cheaper to be had elsewhere, those who are more inclined to manual labor. Not only the undereducated but all those who simply cannot find a decent job anymore. This part of the population needs to be pacified, either by Disney or by Dictatorship, most probably by both. The unemployment problem severely affects the ability of states to pay for social benefits. At some point it becomes cheaper to put money into repressive police forces and rule by fear than put the money into pay-outs to the unemployed population and buy the social peace. Criminal activities look more interesting when there is no decent job to be had. Violence is the unavoidable consequence of degrading social standards. Universal surveillance might dampen the consequences for those who remain with some wealth to defend. ?

Second,

climate change increases the frequency and devastation of natural disasters, creating large scale emergency situations. Depending on geography, large parts of land may become uninhabitable due to draught, flood, fires or plagues. This creates a multitude of unpleasant effects. A large number of people need to move, crop and animal production shrinks, industrial centers and cities may be damaged to the point where abandoning them is the only sensible choice left. The loss of property like non-usable (or non-insurable) real estate will be frightening. The resulting internal migratory pressures towards “safe areas” become a significant problem. Properly trained personal, equipment, and supplies to respond to environmental emergencies are needed standby all the time, eating up scarce government resources. The conscript parts of national armed forces may be formed into disaster relief units as they hang around anyway with no real job to do except securing fossil energy sources abroad and helping out the border police.

Third,

immigration pressure from neighboring regions will raise in all western countries. It looks like the climate disaster will strike worst at first in areas like Africa and Latin America and the economy there is unlikely to cope any better than the western countries with globalization and other problems ahead. So the number of people who want to leave from there to somewhere inhabitable at all costs will rise substantially. The western countries need a certain amount of immigration to fill up their demographic holes but the number of people who want to come will be far higher. Managing a controlled immigration process according to the demographic needs is a nasty task where things can only go wrong most of the time. The nearly unavoidable reaction will be a Fortress Europe : serious border controls and fortifications, frequent and omnipresent internal identity checks, fast and merciless deportation of illegal immigrants, biometrics on every possible corner. Technology for border control can be made quite efficient once ethical hurdles have fallen.

Fourth,

at some point in the next decades the energy crisis will strike with full force. Oil will cost a fortune as production capacities can no longer be extended economically to meet the rising demand. Natural gas and coal will last a bit longer, a nuclear renaissance may dampen the worst of the pains. But the core fact remains : a massive change in energy infrastructure is unavoidable. Whether the transition will be harsh, painful and society-wrecking, or just annoying and expensive depends on how soon before peak oil the investments into new energy systems start on a massive scale as oil becomes to expensive to burn. Procrastination is a sure recipe for disaster. The geo-strategic and military race for the remaining large reserves of oil has already begun and will cost vast resources.

Fifth,

we are on the verge of technology developments that may require draconic restrictions and controls to prevent the total disruption of society. Genetic engineering and other biotechnology as well as nanotechnology (and potentially free energy technologies if they exist) will put immense powers into the hands of skilled and knowledgeable individuals. Given the general raise in paranoia, most people (and for sure those in power) will not continue to trust that common sense will prevent the worst. There will be a tendency of controls that keep this kind of technology in the hands of “trustworthy” corporations or state entities. These controls, of course, need to be enforced, surveillance of the usual suspects must be put in place to get advanced knowledge of potential dangers. Science may no longer be a harmless, self-regulating thing but something that needs to be tightly controlled and regulated, at least in the critical areas. The measures needed to contain a potential global pandemic from the Strange Virus of the Year are just a subset of those needed to contain a nanotech or biotech disaster.

Now what follows from this view of the world ? What changes to society are required to cope with these trends from the viewpoint of our 60-year-old power brokering bureaucrat ?

Strategically it all points to massive investments into internal security. Presenting the problem to the population as a mutually exclusive choice between an uncertain dangerous freedom and an assured survival under the securing umbrella of the trustworthy state becomes more easy the further the various crises develop. The more wealthy parts of the population will certainly require protection from illegal immigrants, criminals, terrorists and implicitly also from the anger of less affluent citizens. And since the current system values rich people more then poor ones, the rich must get their protection. The security industry will certainly be of happy helpful assistance, especially where the state can no longer provide enough protection for the taste of the lucky ones.

Traditional democratic values have been eroded to the point where most people don’t care anymore. So the loss of rights our ancestors fought for not so long ago is at first happily accepted by a majority that can easily be scared into submission. “Terrorism” is the theme of the day, others will follow. And these “themes” can and will be used to mold the western societies into something that has never been seen before : a democratically legitimated police state, ruled by an unaccountable elite with total surveillance, made efficient and largely unobtrusive by modern technology. With the enemy (immigrants, terrorists, climate catastrophe refugees, criminals, the poor, mad scientists, strange diseases) at the gates, the price that needs to be paid for “security” will look acceptable.

Cooking up the “terrorist threat” by apparently stupid foreign policy and senseless intelligence operations provides a convenient method to get through with the establishment of a democratically legitimized police state. No one cares that car accidents alone kill many more people than terrorists do. The fear of terrorism accelerates the changes in society and provides the means to get the suppression tools required for the coming waves of trouble.

What we call today “anti-terrorism measures” is the long-term planned and conscious preparation of those in power for the kind of world described above.

The Technologies of Oppression

We can imagine most of the surveillance and oppression technology rather well. Blanket CCTV coverage is reality in some cities already. Communication pattern analysis (who talks to whom at what times) is frighteningly effective. Movement pattern recording from cellphones, traffic monitoring systems, and GPS tracking is the next wave that is just beginning. Shopping records (online, credit and rebate cards) are another source of juicy data. The integration of all these data sources into automated behavior pattern analysis currently happens mostly on the dark side.

The key question for establishing an effective surveillance based police state is to keep it low-profile enough that “the ordinary citizen” feels rather protected than threatened, at least until all the pieces are in place to make it permanent. First principle of 21st century police state : All those who “have nothing to hide” should not be bothered unnecessarily. This goal becomes even more complicated as with the increased availability of information on even minor everyday infringements the “moral” pressure to prosecute will rise. Intelligence agencies have always understood that effective work with interception results requires a thorough selection between cases where it is necessary to do something and those (the majority) where it is best to just be silent and enjoy.

Police forces in general (with a few exceptions) on the other hand have the duty to act upon every crime or minor infringement they get knowledge of. Of course, they have a certain amount of discretion already. With access to all the information outlined above, we will end up with a system of selective enforcement. It is impossible to live in a complex society without violating a rule here and there from time to time, often even without noticing it. If all these violations are documented and available for prosecution, the whole fabric of society changes dramatically. The old sign for totalitarian societies - arbitrary prosecution of political enemies - becomes a reality within the framework of democratic rule-of-law states. As long as the people affected can be made looking like the enemy-”theme” of the day, the system can be used to silence opposition effectively. And at some point the switch to open automated prosecution and policing can be made as any resistance to the system is by definition “terrorism”. Development of society comes to a standstill, the rules of the law and order paradise can no longer be violated.

Now disentangling ourselves from the reality tunnel of said 60-year-old bureaucrat, where is hope for freedom, creativity and fun ? To be honest, we need to assume that it will take a couple of decades before the pendulum will swing back into the freedom direction, barring a total breakdown of civilization as we know it. Only when the oppression becomes to burdensome and open, there might be a chance to get back to overall progress of mankind earlier. If the powers that be are able to manage the system smoothly and skillfully, we cannot make any prediction as to when the new dark ages will be over.

So what now ?  ? Move to the mountains, become a gardener or carpenter, search for happiness in communities of like minded people, in isolation from the rest of the world ? The idea has lost its charm for most who ever honestly tried. It may work if you can find eternal happiness in milking cows at five o’clock in the morning. But for the rest of us, the only realistic option is to try to live in, with, and from the world as bad it has become. We need to built our own communities nonetheless, virtual or real ones. The politics & lobby game

So where to put your energy then ? Trying to play the political game, fighting against software patents, surveillance laws, and privacy invasions in parliament and the courts can be the job of a lifetime. It has the advantage that you will win a battle from time to time and can probably slow things down. You may even be able to prevent a gross atrocity here and there. But in the end, the development of technology and the panic level of the general population will chew a lot of your victories for breakfast.

This is not to discount the work and dedication of those of us who fight on this front. But you need to have a lawyers mindset and a very strong frustration tolerance to gain satisfaction from it, and that is not given to everyone. We need the lawyers nonetheless.

Talent and Ethics

Some of us sold their soul, maybe to pay the rent when the bubble bursted and the cool and morally easy jobs became scarce. They sold their head to corporations or the government to built the kind of things we knew perfectly well how to built, that we sometimes discussed as a intellectual game, never intending to make them a reality. Like surveillance infrastructure. Like software to analyze camera images in realtime for movement patterns, faces, license plates. Like data mining to combine vast amounts of information into graphs of relations and behavior. Like interception systems to record and analyze every single phone call, e-mail, click in the web. Means to track every single move of people and things.

Thinking about what can be done with the results of one’s work is one thing. Refusing to do the job because it could be to the worse of mankind is something completely different. Especially when there is no other good option to earn a living in a mentally stimulating way around. Most projects by itself were justifiable, of course. It was “not that bad” or “no real risk”. Often the excuse was “it is not technical feasible today anyway, it’s too much data to store or make sense from”. Ten years later it is feasible. For sure.

While it certainly would be better when the surveillance industry would die from lack of talent, the more realistic approach is to keep talking to those of us who sold their head. We need to generate a culture that might be compared with the sale of indulgences in the last dark ages : you may be working on the wrong side of the barricade but we would be willing to trade you private moral absolution in exchange for knowledge. Tell us what is happening there, what the capabilities are, what the plans are, which gross scandals have been hidden. To be honest, there is very little what we know about the capabilities of todays dark-side interception systems after the meanwhile slightly antiquated Echelon system had been discovered. All the new stuff that monitors the internet, the current and future use of database profiling, automated CCTV analysis, behavior pattern discovery and so on is only known in very few cases and vague outlines.

We also need to know how the intelligence agencies work today. It is of highest priority to learn how the “we rather use backdoors than waste time cracking your keys”-methods work in practice on a large scale and what backdoors have been intentionally built into or left inside our systems. Building clean systems will be rather difficult, given the multitude of options to produce a backdoor - ranging from operating system and application software to hardware and CPUs that are to complex to fully audit. Open Source does only help in theory, who has the time to really audit all the source anyway...

Of course, the risk of publishing this kind of knowledge is high, especially for those on the dark side. So we need to build structures that can lessen the risk. We need anonymous submission systems for documents, methods to clean out eventual document fingerprinting (both on paper and electronic). And, of course, we need to develop means to identify the inevitable disinformation that will also be fed through these channels to confuse us.

Building technology to preserve the options for change

We are facing a unprecedented onslaught of surveillance technology. The debate whether this may or may not reduce crime or terrorism is not relevant anymore. The de-facto impact on society can already be felt with the content mafia (aka. RIAA) demanding access to all data to preserve their dead business model. We will need to build technology to preserve the freedom of speech, the freedom of thought, the freedom of communication, there is no other long-term solution. Political barriers to total surveillance have a very limited half-life period.

The universal acceptance of electronic communication systems has been a tremendous help for political movements. It has become a bit more difficult and costly to maintain secrets for those in power. Unfortunately, the same problem applies to everybody else. So one thing that we can do to help societies progress along is to provide tools, knowledge and training for secure communications to every political and social movement that shares at least some of our ideals. We should not be too narrow here in choosing our friends, everyone who opposes centralistic power structures and is not geared towards totalitarism should be welcome. Maintaining the political breathing spaces becomes more important than what this space is used for.

Anonymity will become the most precious thing. Encrypting communications is nice and necessary but helps little as long as the communication partners are known. Traffic analysis is the most valuable intelligence tool around. Only by automatically looking at communications and movement patterns, the interesting individuals can be filtered out, those who justify the cost of detailed surveillance. Widespread implementation of anonymity technologies becomes seriously urgent, given the data retention laws that have been passed in the EU. We need opportunistic anonymity the same way we needed opportunistic encryption. Currently, every anonymization technology that has been deployed is instantly overwhelmed with file sharing content. We need solutions for that, preferably with systems that can stand the load, as anonymity loves company and more traffic means less probability of de-anonymization by all kinds of attack.

Closed user groups have already gained momentum in communities that have a heightened awareness and demand for privacy. The darker parts of the hacker community and a lot of the warez trading circles have gone “black” already. Others will follow. The technology to build real-world working closed user groups is not yet there. We have only improvised setups that work under very specific circumstances. Generic, easy to use technology to create fully encrypted closed user groups for all kinds of content with comfortable degrees of anonymity is desperately needed.

Decentralized infrastructure is the needed. The peer-to-peer networks are a good example to see what works and what not. As long as there are centralized elements they can be taken down under one pretext or another. Only true peer-to-peer systems that need as little centralized elements as possible can survive. Interestingly, tactical military networks have the same requirements. We need to borrow from them, the same way they borrow from commercial and open source technology.

Design stuff with surveillance abuse in mind is the next logical step. A lot of us are involved into designing and implementing systems that can be abused for surveillance purposes. Be it webshop systems, databases, RFID systems, communication systems, or ordinary Blog servers, we need to design things as safe as possible against later abuse of collected data or interception. Often there is considerable freedom to design within the limits of our day jobs. We need to use this freedom to build systems in a way that they collect as little data as possible, use encryption and provide anonymity as much as possible. We need to create a culture around that. A system design needs to be viewed by our peers only as “good” if it adheres to these criteria. Of course, it may be hard to sacrifice the personal power that comes with access to juicy data. But keep in mind, you will not have this job forever and whoever takes over the system is most likely not as privacy-minded as you are. Limiting the amount of data gathered on people doing everyday transactions and communication is an absolute must if you are a serious hacker. There are many good things that can be done with RFID. For instance making recycling of goods easier and more effective by storing the material composition and hints about the manufacturing process in tags attached to electronic gadgets. But to be able to harness the good potential of technologies like this, the system needs to limit or prevent the downside as much as possible, by design, not as an afterthought.

Do not compromise your friends with stupidity or ignorance will be even more essential. We are all used to the minor fuckups of encrypted mail being forwarded unencrypted, being careless about other peoples data traces or bragging with knowledge obtained in confidence. This is no longer possible. We are facing an enemy that is euphemistically called “Global Observer” in research papers. This is meant literally. You can no longer rely on information or communication being “overlooked” or “hidden in the noise”. Everything is on file. Forever. And it can and will be used against you. And your “innocent” slip-up five years back might compromise someone you like.

Keep silent and enjoy or publish immediately may become the new mantra for security researchers. Submitting security problems to the manufacturers provides the intelligence agencies with a long period in which they can and will use the problem to attack systems and implant backdoors. It is well known that backdoors are the way around encryption and that all big manufacturers have an agreement with the respective intelligence agencies of their countries to hand over valuable “0 day” exploit data as soon as they get them. During the months or even years it takes them to issue a fix, the agencies can use the 0 day and do not risk exposure. If an intrusion gets detected by accident, no one will suspect foul play, as the problem will be fixed later by the manufacturer. So if you discover problems, publish at least enough information to enable people to detect an intrusion before submitting to the manufacturer.

Most important : have fun ! The eavesdropping people must be laughed about as their job is silly, boring, and ethically the worst thing to earn money with, sort of blackmail and robbing grandmas on the street. We need to develop a “lets have fun confusing their systems”-culture that plays with the inherent imperfections, loopholes, systematic problems, and interpretation errors that are inevitable with large scale surveillance. Artists are the right company for this kind of approach. We need a subculture of “In your face, peeping tom”. Exposing surveillance in the most humiliating and degrading manner, giving people something to laugh about must be the goal. Also, this prevents us from becoming frustrated and tired. If there is no fun in beating the system, we will get tired of it and they will win. So let’s be flexible, creative and funny, not angry, ideologic and stiff-necked.

=========================

61. Press Release - Frost & Sullivan - Need for Enhanced Homeland Security to Promote Uptake of Security Technologies - Jan 10, 2006

Source Next Contents

LONDON, January 10 /PRNewswire/ -- Recent terrorist attacks across Europe have underlined the urgent need for the European Union (EU) to enhance its security capabilities, particularly at its borders. This is driving the implementation of security technologies at major entry/exit points with demand for biometric identification/authentication systems, radio frequency identification (RFID) and explosive detection systems projected to surge over the next decade.

"Technologies that can increase security capabilities and supply chain efficiency as well as reduce costs at the same time are poised to experience significant demand growth over the next ten years," notes Frost & Sullivan (http://defense.frost.com) Research Analyst Friso Buker.

For instance, biometrics will be more widely deployed at airports for passenger processing and electronic access control, as the technology provides an opportunity to reduce labour costs while at the same time maintaining, or even potentially increasing, security capabilities.

By 2014, the European homeland security technologies market (comprising biometrics, screening, RFID, unmanned aerial vehicles (UAV) and closed circuit television (CCTV) technologies) is set to amass nearly EUR874.0 million.

Airports are expected to display significant demand for identification/authentication and screening technologies from 2005-2014. Seaports will exhibit notable uptake of screening technologies and particularly, tracking technologies. Borders will generate the lowest level of demand for screening technologies in the first half of 2005-2014. However, the overall border demand will increase in the second half of this period, spurred on by the growing importance of UAVs.

The need to improve air travel security and facilitate economical and effective air passenger processing will promote the uptake of security technologies, especially biometrics. The passage of key legislation along with standardisation efforts by industry associations are expected to provide further impetus to the biometrics market. Most EU national governments have already begun biometric procurement programmes, with companies receiving several sizeable contracts for biometric technologies.

Government receptivity is playing a central role in the more widespread implementation of biometric systems. At the same time, the establishment of standards and safeguards is supporting public awareness and acceptance of biometric technologies. Even as the biometric industry undergoes significant changes over the next ten years, manufacturers of RFID will benefit from their expanded use at European seaports.

For companies keen to leverage emergent growth opportunities in the European homeland security market, a prospective pitfall that must be avoided is to use the US homeland security experience as a template for entering the European market. The EU market is unique, in terms of both overall security requirements and security funding.

"The level of funding, the number of stakeholders, the identification of decision-makers and the selection of strategic partnerships: all these, and more, are necessary to prevent failure in this expanding market," explains Mr. Buker. "Without a true understanding of the hurdles that they need to overcome, market participants will struggle to achieve competitive success."

As the market expands, small industry participants are likely to be taken over by different types of industry participants that, in turn, are likely to be acquired by other companies that may not have existing expertise in the homeland security market, but are looking to gain a foothold in this lucrative industry.

Strategic partnerships and alliances with regional leaders will advance the prospects of potential market participants. Moreover, an in-depth understanding of the regional market along with its particular business idiosyncrasies will advance revenues in the long term.

If you are interested in a virtual brochure, which provides manufacturers, end-users, and other industry participants an overview of the latest analysis of the European Homeland Security - A Market opportunity analysis (B447), then send an e-mail to Srividhya Parthasarathy, Corporate Communications, at sparthasarathy@frost.com with the following information: your full name, company name, title, telephone number, fax number and e-mail address. Upon receipt of the above information, an overview will be sent to you via e-mail.

Background

Frost & Sullivan, a global growth consulting company, has been partnering with clients to support the development of innovative strategies for more than 40 years. The company's industry expertise integrates growth consulting, growth partnership services and corporate management training to identify and develop opportunities. Frost & Sullivan serves an extensive clientele that includes Global 1000 companies, emerging companies, and the investment community, by providing comprehensive industry coverage that reflects a unique global perspective and combines ongoing analysis of markets, technologies, econometrics, and demographics.

===================
62. Press Release - Former META Group Analyst Mike Rothman Launches Security Incite - Jan 10, 2006

Source Next Contents

New analyst firm unveils 2006 views on information security and provides businesses with thought-provoking analysis.

ATLANTA (PRWEB via PR Web Direct) January 10, 2006 -- Former META Group analyst Mike Rothman today launched Security Incite, a new analyst firm founded to offer bold, thought-provoking and irreverent analysis of the information security market. Coinciding with the launch of Security Incite, the firm has published predictions and trends for the information security business in 2006. These “Security Incites” are available on www.securityincite.com and reflect the belief that the key macro-trend in security is simplification.

Security Incite aims to bring technology research back to its roots—objective and end-user centric. Offering a number of annual subscription packages starting at the reasonable price of $1,350, Security Incite provides detailed analyses of top-of-mind information security issues. In addition to offering monthly reports to subscribers, Security Incite also launched the Security Incite Rants (SI Rants) blog, available at www.securityincite.com, providing timely analysis of vendor and industry news to help wade through the morass of daily news and announcements about information security.

“The existing premium priced research model consisting of short research notes, vendor quadrant rankings, and infrequent conversations with analysts is not doing the job,” said Mike Rothman, president and principal analyst of Security Incite. “End users are struggling. They need more detailed information to help make their high profile security initiatives successful. Security Incite provides detailed, action oriented research to help subscribers make better decisions, execute more effectively, and save time and money.”

End User Driven Incite:

Central to the company’s research model is The Incite Network, a group of end users and VARs that provide early warning intelligence on key issues of protecting corporate information. By discovering, analyzing and sharing advice on key attack vectors and hacking techniques while sharing best practices on how to protect those areas, The Incite Network helps to make the Internet a safer place. As an added benefit, Incite Network members get free access to Security Incite research.

Another unique Security Incite innovation is a community driven research agenda. Weekly, via a polling capability on www.securityincite.com, the community determines which announcement and news items get thorough analysis. Quarterly, the community helps to refine the Security Incite research agenda, offering direction on the topics included in detailed monthly reports.

"Maintaining adequate security has gotten much harder over the past five years," continued Rothman. "Users are confused and continue to throw money at the problem with abysmal results. Security Incite helps subscribers wade through the noise, focus on what’s important, spend judiciously, and ultimately execute those high-profile projects successfully.”

2006 Security Incites and Predictions:

As part of its ongoing research and analysis, the firm has published its 2006 predictions and trends for the information security business, focusing on the belief that the key macro-trend in security is simplification.

“Whether talking about consolidating functions on a single hardware platform, or embracing increasing homogeneity of infrastructure equipment, the pendulum is swinging back towards integrated security offerings and a select few dominant players,” said Rothman. “In times of unprecedented complexity, increasingly narrow solutions are frustrating users, who are clamoring for simple security solutions. Vendors that focus on simplicity will win.”

First report will be on Identity Management:

Security Incite’s first detailed report will focus on the identity management (IDM) market. This report will provide an overview of the IDM market, and help subscribers to select the right product and set the proper scope and expectations to ensure compelling ROI and improved security. The report will also present best practices for implementation and profile the key vendors in the IDM space in order to streamline and accelerate IDM initiatives. The report will be available in early February.

Members of the press will be offered full access to Security Incite reports and Webcasts by registering in the press section of Security Incite’s Web site. In addition, Mike Rothman is available to comment on current events and announcements in the information security market.

About Security Incite:

Security Incite is an industry analyst firm specializing in the information security market. By providing bold, thought-provoking and irreverent analysis through the “Security Incite Rants” blog and publishing detailed reports examining a different area of security each month, Security Incite helps subscribers protect their information assets more effectively by making better decisions. With research driven by The Incite Network, a proprietary group of sources, Security Incite provides timely, accurate, and above all else, actionable research. For more information, visit www.securityincite.com.

===============================
63. Press Release - Wave Systems on Winning Team with Operational Research Consultants, Inc. for U.S. GSA Blanket Purchase Agreement Award  - Jan 10, 2006

Source Next Contents

LEE, Mass.--(BUSINESS WIRE)--Jan. 10, 2006--Wave Systems Corp. (Nasdaq: WAVX - www.wave.com) announced today that the company is teamed with Operational Research Consultants, Inc. (ORC), a wholly owned subsidiary of WidePoint Corporation (OTC BB: WDPT), in connection with the first Blanket Purchase Agreement award issued under the new U.S. General Services Administration (GSA) "Authentication Products and Services" Category Special Item No. (SIN) 160 32, part of existing IT Schedule 70 (the "ORC ACES BPA"). The ORC ACES BPA is an indefinite delivery/ indefinite quantity (ID/IQ) program that has total ceiling value of $100 million.

Under the BPA award ORC will provide certified credentialing for identity management solutions to federal, state and local governments. In connection with an agreement between ORC and Wave, Wave expects ORC to provide federal government authorized Access Certificates for Electronic Services (ACES) capability, in combination with Wave's Embassy(R) Trust Suite secure software technology for use with compliant public key infrastructures. The terms upon which Wave will participate in the project are subject to the completion of a subcontract to be entered into between Wave and ORC.

The BPA recognizes ORC as a fully operational ACES and Shared Services Provider (SSP) as well as a provider of Homeland Security Presidential Directive (HSPD-12) products and services. Further, the BPA also recognizes the ORC team as the only provider of Personnel Identity Verification (PIV) ready solutions for HSPD-12 products and services. The combined products of ORC and Wave offer HSPD-12 ready solutions for both "logical" and "physical" security.

"ORC is working with Wave to make trusted computing solutions embedded with External Certificate Authority (ECA) and ACES digital certificates available to all branches of government," said Daniel Turissini, president of ORC. "The combination of Wave's Embassy software technology integrated with ORC's Trusted Third Party services provides another tool to ensure high levels of Information Assurance technologies in the ongoing efforts to protect personal information within the federal government."

"Authenticating a computer user into a network by using methods more secure than passwords is a continuing effort for network administrators within government and enterprises," said Steven Sprague, president and CEO, Wave Systems. "With the ORC ACES BPA, government administrators will now have easy access to Class 3 PKI certificates that can be used within a Trusted Computing-based framework: a network of personal computers secured by industry standard Trusted Platform Modules and Wave's powerful and secure software technology."

==========================

64. Press Release - 2AB Inc. Announces Open Source Plans for jLock Scalable JAAS - Jan 10, 2006

Source Next Contents

BIRMINGHAM, Ala.--(BUSINESS WIRE)--Jan. 10, 2006--2AB Inc., provider of Access Management Solutions for Distributed Business, announces plans to Open Source jLock, a scalable implementation of the Java Authentication and Authorization Service (JAAS) with advanced features for application-level security. Licensing options for the source provide a choice between the GNU Public License (GPL) and a commercial license.

jLock provides Java developers a robust, scalable solution to the fine-grain access control requirements of business applications. jLock supports the standard JAAS APIs while allowing support for ACL-list, role-based, rules-based and entitlement-based access policies. jLock also supports the ability to securely communicate and establish the login context of the original user on the server side of a distributed application. User and access policy management tools remove the burden of embedding access policy and allow policy to be developed, managed, evolved and audited without modification to the business logic.

The open source plans includes the JAAS implementation, the iLock Security Center Service and the standard edition of the jLock Administrative tools. This complete offering provides a scalable implementation of JAAS with graphical Identity Management of Users, Groups and Roles.

2AB will continue to offer and support the jLock Power Edition product. Current commercial licensees of jLock will be provided access to the source immediately. General availability of the open source version is planned before the end of 1st quarter.

About 2AB:

2AB is a provider of Access Management Solutions for Distributed Business(SM). Providing standards-based tools that make access management simple to understand and easy to use by business developers is a key goal of their access management products. 2AB's products enable customers to meet the fine-grain access control requirements of federal privacy and confidentiality legislation while maintaining consistent, auditable access control policy across an enterprise that includes diverse technology. Founded in 1997, 2AB is privately held and headquartered in Shelby County, Alabama. For more information, please see http://www.2ab.com.
==========================

65. Press Release - (Euronext Brussels) - Supercom announces the award of a tender for a biometric passport issuing and control system for a western European country  - Jan 10, 2006

<>Source Next Contents

Project implementation expected to start in the first quarter of 2006

Qadima, Israel, January 10, 2006– SuperCom (OTCBB: SPCBF.OB; Euronext: SUP), a leading provider of smart card and electronic identification (e-ID) solutions, today announced an award of a tender to provide the technology for a biometric passport issuing and control system for a country in western Europe. The implementation of the project is expected to start during first quarter of 2006.

The contract is for the implementation of a biometric passport issuing and control system, and includes a six-year contract for maintenance and support.

Mr. Eli Basson, SuperCom’s Vice President of International Projects and Solutions said, “This is an important contract for SuperCom, establishing a relationship with another European Government as a client and validates SuperCom’s Magna platform for ID projects.”

Mr. Avi Schechter, SuperCom’s Chief Executive Officer, added, “We believe that this type of E-passport solution will be adopted by more and more governments globally, and we see this win further strengthening our position in this market in which we expect to play an important role.”

About SuperCom:

SuperCom, Ltd. provides innovative solutions in smart-card and e-ID technologies to the commercial and government sectors.  The Company offers a wide range of standard and customized smart-card-based solutions for physical and logical security, education, corrections facilities and air & seaports.  It is also a leader in the manufacturing of secure and durable documents such as national identity cards, passports, visas, drivers’ licenses and vehicle registration to improve homeland security, governmental efficiency and document ease of use. Headquartered in Israel, SuperCom has subsidiaries in the US and Hong Kong.  For more information, visit our website at www.supercomgroup.com.

Safe Harbor
This press release contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended.   These statements are subject to known and unknown risks, uncertainties and other factors that may cause our actual results, performance or achievements to be materially different from any future results, performance or achievements expressed or implied by such forward-looking statements.  Statements preceded or followed by or that otherwise include the words “believes”, “expects”, “anticipates”, “intends”, “projects”, “estimates”, “plans”, and similar expressions or future or conditional verbs such as “will”, “should”, “would”, “may” and “could” are generally forward-looking in nature and not historical facts. Forward-looking statements in this release also include statements about business and economic trends.

You should consider the areas of risk described under the heading “Forward Looking Statements” and those factors captioned as “Risk Factors” in our periodic reports under the Securities Exchange Act of 1934, as amended, or in connection with any forward-looking statements that may be made by us and our businesses generally,

All information in this release is as of January 2006.  Except for our ongoing obligation to disclose material information under the federal securities laws, the Company undertakes no duty to update any forward-looking statement to reflect subsequent events, actual results or changes in the Company's expectations.  The Company also disclaims any duty to comment upon or correct information that may be contained in reports published by the investment community.

This press release and other releases are available on www.supercomgroup.com.
========================

66. Press Release -  UPEK Enables Fingerprint Authentication Security for Rugged Mobile Computing Leader Itronix; Itronix GoBook VR-1 Integrates UPEK TouchStrip Fingerprint Authentication Solution for Secure Authentication of Semi-Rugged Notebooks

Source Next Contents

 EMERYVILLE, Calif.--(BUSINESS WIRE)--Jan. 10, 2006--UPEK(R), the leader in biometric fingerprint authentication solutions, today announced that Itronix, a General Dynamics Company (NYSE:GD), is embedding UPEK's TouchStrip Fingerprint Authentication Solution in select GoBook VR-1 semi-rugged notebooks. The GoBook VR-1, offering durability, performance and connectivity in the semi-rugged segment, incorporates UPEK biometric fingerprint technology for "access gate keeping." UPEK's fingerprint authentication hardware and software securely authenticate users at the power-on and operating system levels. The GoBook VR-1 targets the semi-rugged market: professional "road warriors" and in-vehicle environments such as police cars. To be integrated into the GoBook VR-1, which meets the fully rugged military standard (MIL-STD 810-F) for vibration, humidity and temperature, UPEK's TouchStrip Fingerprint Authentication Solution passed rigorous qualification testing for durability and reliability.

"Our customers require secure authentication in a wide range of environments," said Matthew Gerber, senior vice president of product line management for Itronix. "Itronix is committed to the semi-rugged computing market and will continue to add new capabilities such as fingerprint authentication solutions to enhance the GoBook product line's security, durability and mobility."

"We are pleased to work with Itronix, which has demonstrated leadership in the rugged notebook market," said Greg Goelz, VP of marketing, UPEK. "They have innovated mobile computing by successfully delivering a notebook that meets a high level of durability, mobility and security standards."

About UPEK

UPEK, Inc., the global leader in biometric fingerprint security solutions, offers integrated end-to-end solutions including comprehensive design & integration services to the world's leading consumer and industrial products companies. UPEK solutions enable the strongest fingerprint authentication security available, packaged for high user convenience and rapid integration into existing products and network architectures.

UPEK biometric security products enable a wide range of applications including password replacement for PCs and applications, centralized management for corporate network security, secure mobile transactions, protection of portable data, identity verification for government and military applications, and physical access control.

=======================

67. Press Release -p Time America Forms New Subsidiary; NetEdge Devices, LLC to Provide Advanced Data Collection Device  - Jan 10, 2006

Source Next Contents

SCOTTSDALE, Ariz.--(BUSINESS WIRE)--Jan. 10, 2006--Time America, Inc. (OTCBB:TMAM) has formed a subsidiary company, NetEdge Devices, LLC, which will manufacture and distribute a new line of advanced data collection devices that track and display critical labor information across a variety of industries.

Headquartered in Scottsdale, Ariz., NetEdge Devices will offer its TA7000 family of data collection devices as a private label solution to software application development companies, systems integration providers and value-added resellers. The TA7000 device tracks time and attendance information, which can be easily integrated into a company's human resources system including payroll. The device can also serve as the front end interface for other corporate systems, such as employee self services, enterprise resource planning (ERP), manufacturing resource planning (MRP), and security/access control.

Unlike most devices currently on the market, the TA7000 data collection series has a truly open architecture that enables OEM partners to fully control, develop and integrate their own proprietary applications into the device.

"Since we unveiled our time clock series this summer, we have received a significant amount of interest from our resellers and partners who are seeking a private label relationship," said Thomas Bednarik, president and chief executive officer of Time America. "By forming the NetEdge subsidiary, we are creating a separate focus for the TA7000 series in order to target a diversified number of prospective industries."

Jon Weiss, vice president of business development for Time America, will lead the NetEdge business alliance and OEM program. With more than 18 years of experience in marketing enterprise resource planning (ERP), and manufacturing and warehouse solutions, Mr. Weiss will be responsible for the sales of NetEdge products to the OEM channel.

Commenting on the abilities of the TA7000 series, Mr. Weiss said: "Not only does the TA7000 line meet traditional time and attendance inputs, but it also serves as a kiosk for workers without computers to access Employee Self Services such as schedules and benefit accruals via a color touch screen using fingerprint biometrics for security."

About NetEdge Devices, LLC

A wholly owned subsidiary of Time America, Inc. (OTCBB:TMAM), NetEdge Devices manufactures, markets and sells a series of technologically advanced data collection devices that increase operational efficiency and decrease cost in labor management practices within corporations and organizations. For more information on NetEdge Devices or the TA7000 terminal series, please contact Jon Weiss at jonw@netedgedevices.com or visit the Company website at www.netedgedevices.com.

About Time America, Inc.

Time America, Inc. has been a leader in providing innovative workforce management since 1988. Our software and data collection solutions enable companies to transform employee time and labor data into information that improves payroll processing and workforce productivity. The Deloitte Technology Fast 500 has honored Time America as one of the 500 fastest growing technology companies in North America. For more information, please visit the Time America Web site at www.timeamerica.com.

===========================

68. ID technology talk on cards for Society - Edinburgh Evening News - Jan 10, 2006

Source Next Contents

THE Edinburgh branch of the British Computer Society is to host a debate on the technologies behind the Government's plans for identity cards.

The trade-off between security and privacy as a result of new biometric technology - which identifies features particular to an individual - will be explored by speaker Gavan Duffy, of IT firm The Generics Group.

The talk takes place at the Royal Pharmaceutical Society on York Place at 6.30pm tomorrow.

===================================

69. Press Release - Logicalis Announces Top Technology Trends to Watch in 2006; Software-as-a-Service Tops This Year's List of Top Customer Trends, Ripple Effect Will Hit Software and Hardware Vendors - Jan 10, 2006

Source END Contents

BLOOMFIELD HILLS, Mich.--(BUSINESS WIRE)--Jan. 10, 2006--This year enterprise technology will become more about the "fabric" and less about the "fashion," predicts Jeff Reed, industry guru and chief technology officer for Logicalis, a global provider of high-performance technology solutions. According to Reed, corporate enterprises are going to spend their IT budgets on technologies that help extend their business, which means a focus on back office processes, not hot products.

Reed's biggest prediction? That the on-demand software model, known as software-as-a-service, will see escalating corporate adoption, especially in SMB and mid-market companies. Long term, this trend has the potential to cause a ripple effect in the industry, decreasing the need for both corporate software and hardware purchases. Reed says to watch for shifting priorities among software and hardware vendors as the trend of software-as-a-service sweeps away old business models.

Reed oversees the technology deployment for Logicalis' customers, representing a wide range of industries -- including financial services, manufacturing, healthcare and retail. He says it's just that perspective that has helped him develop some important IT trend predictions for 2006.

These trends are more like waves that have been approaching the enterprise shore for some time and are going to crest in 2006, sometimes with unsettling force for those who are not prepared. Based on Reed's assessment of customer IT priorities, he has developed The Logicalis Top Technology Trends to Watch in 2006:

Software-as-a-service will become a corporate standard. Driven by a common sense, pay-as-you-go approach to software needs, Logicalis believes that 2006 will finally be the year when the ability to purchase hosted software, such as customer relationship management applications, email and enterprise resource planning packages, is fully embraced by corporations.

"Software-as-a-service represents a profoundly different business model for the enterprise IT community," says Reed. "Some examples are Microsoft Live, Salesforce.com and MySAP, just to name a few. This will be a win for customers, but it may cause some pain for vendors as the model turns some traditional enterprise servers and applications into a utility play."

Service-oriented architecture will be the glue that binds. Web services and service-oriented architecture, which serve to expose and link data sources among partners, will continue to be prevalent in the enterprise as companies increase their ability to integrate back office systems to suppliers and partners in order to drive revenues.

Reed comments, "By exposing their data and making application programming interfaces (APIs) readably available to the rest of their supply chain, companies can drive down costs and inefficiencies." Furthermore, this trend will drive the adoption of "software-as-a-service" as companies are able to expose critical data to outside vendors who can then integrate it in to applications that don't need to be inside the corporate firewall.

Software will become more "verticalized." Corporate IT will benefit from a renewed focus on vertical industry-specific solutions and business processes by large enterprise software companies like IBM and HP. IBM WebSphere is already being used to develop industry-specific portals. And HP OpenView is being enhanced to drive actual business processes

"This 'verticalization' of enterprise software will also increase the pace of M&As in the software industry," says Reed. "Keep an eye on service-oriented architecture (SOA) companies like BEA and Tibco. These represent solid acquisition targets for the IBMs of the world."

Security & Compliance will become more important, and more complex. SEC regulations for public companies, privacy regulations for industries such as healthcare and the increasing use of mobile devices and IM at work will continue to place an enormous strain on enterprise IT resources for security and storage. Couple this with the fact that the current Internet architecture is inherently "insecure," and security will remain a focus for the IT world.

"Secure email archival and retrieval for compliance will be top of mind for many companies. Enterprise workers will require more network-level and application-level secure data access," comments Reed. "Watch for companies like EMC and Cisco to provide more secure storage and network access, and IBM and Microsoft and HP to provide more identity management and enterprise-wide authentication."

2006 will be all about access. The consolidation of voice, video and data networks coinciding with the explosion of powerful mobile devices -- combined with the trends above -- will begin to remove any remaining barriers to the "virtual corporation."

"We're seeing more converged devices on the horizon that will directly connect end-users with corporate data," predicts Reed. "Dual mode VoIP-over-WiFi-cell-phones from companies like Motorola and continued Blackberry and Treo penetration will ensure real-time, multi-channel access to corporate network assets."

"And maybe a few new industry acronyms," jokes Reed.

For more information about trends shaping the industry and how your company can benefit from Logicalis' point of view, visit www.us.logicalis.com

About Logicalis

Logicalis is a global provider of high-performance technology solutions. Logicalis and its affiliated companies employ 1,000 people worldwide, including highly trained service specialists who specify, design, deploy and manage IT infrastructure to meet the needs of over 5,000 corporate and public sector customers. Logicalis maintains strong partnerships with technology leaders such as HP, IBM, Cisco and EMC.

Logicalis is a part of Logicalis Group, a division of Datatec Limited (JSE:DTCJ), a $3 billion business listed on the Johannesburg Stock Exchange. With its international headquarters in the UK, Logicalis Group will have annualized global revenues of approximately $700 million from operations in the U.S., UK, Germany and South America. In North America, Logicalis' annualized revenues will amount to some $450 million, with nearly 400 employees in the U.S. For more information, visit www.us.logicalis.com.
=====================
End of this Issue - Return to Top