HTML VersionForward to a FriendPrint this E-mail
Advertisement
advertising




October 13, 2004
Cyber-Security Deputy Chief or Chief Deputy?

For a minute there Tuesday, it seemed like Homeland Security Secretary Tom Ridge had drained all controversy from the cyber-security debate. According to one of our sources, and then an Associated Press wire report, Ridge told an industry group that advises the White House that the U.S. cyber-security chief's role should be elevated to that of assistant secretary.

That, of course, is exactly what everyone in the computer security world has been wanting to hear. For too long now, the position has been relegated to one of relative unimportance. That placement has prevented other people who acted as cyber-security point man from getting the authority to insist on securing the nation's critical computer networks from outside attack. It also has turned the position into one of the least enviable in the department. Note, for example, the most recent brain-drain moment when security executive Amit Yoranquit the job this month.

As things turn out, Ridge wasn't quite on the money, said Homeland Security spokesman Brian Roehrkasse. As The Washington Post reported, "Roehrkasse said that despite Ridge's comments, final details on the title and responsibilities of the elevated position had not been decided."

Instead of being a new assistant secretary -- on a level equivalent to the National Cyber Security Division chief's boss -- the job title will be "deputy assistant secretary," an anonymous source told The Post. Ah yes, a title that combines guts and glory...

For the time being, Andy Purdy, a longtime deputy to the deputy in the cyber-security division, will serve as interim ... deputy.

Hawking Spyware

The Federal Trade Commission has defined the apex of "online chutzpah," and its name is Sanford Wallace. The one-time "spam king" who in the 1990s pioneered the use of bulk e-mail in trying to ruin our online lives is back again. This time he, along with two companies, is facing FTC charges that he duped Internet users into buying anti-spyware programs by installing spyware on their computers without their consent.

The spyware, the FTC said in its lawsuit, would open the computer's CD-ROM tray and display a message on the monitor that read: "FINAL WARNING!! If your cd-rom drive(s) is open you DESPERATELY NEED to rid your system of spyware pop-ups IMMEDIATELY!" Consumers who responded to the message were prompted to buy programs called Spy Wiper or Spy Deleter for about $30 each.

The lawsuit, filed last week in the U.S. District Court in New Hampshire, does not say whether the anti-spyware programs really cleaned up other spyware software. Sometimes spyware pop-up ads urge people to download anti-spyware programs that in turn insert ... you guessed it, spyware, on their computers. There is also no word yet on how many victims bought into the scheme.

The House of Representatives, meanwhile, passed two bills that would punish spyware purveyors with fines and up to five years in jail. Those bills still require Senate approval and so far the Senate's leading spyware man, Conrad Burns (R-Mont.), favors legislation of his own.

Old Line State's Hard Line on E-Voting

Maryland elections officials face a lawsuit from a group of electronic voting activists who insist on their right to monitor polling places on Election Day. The group, TrueVoteMD, had an agreement with the state attorney general's office to monitor the use of touch-screen voting machines throughout Maryland. The AG's office broke the agreement after learning that the group also wanted to post volunteers outside the polls to warn voters about the dangers of the machines. The only problem? There's a law that says people can't "electioneer" and "campaign" within 100 feet of the polling place. TrueVoteMD co-founder Linda Schade insists this isn't what they're doing. Now it's up to a federal judge in Baltimore.

Robert MacMillan, washingtonpost.com Tech Policy Editor

Advertisement
Get your news just the way you like it. Add your favorite columnists and topics to a washingtonpost.com newsletter delivered to your in-box each morning. It's a free and easy way to make sure you never miss a thing. Personalize your e-mail today and enjoy customized articles tomorrow.

E-VOTING: PROMISE OR PERIL?
'A Massive Experiment' In Voting
On Nov. 2, some 6 million Washington-area voters will use touch-screen machines, a key test of a new technology that will play a major role in deciding what promises to be a very close presidential election.
Interactive Map: How Metro Area Residents Will Vote
Conspiracy Theorists Fan Flames
Ohio Firm Finds Itself in Crosshairs
Exhibit Stuffed With Voting History
Local Elections Have Colorful Past

More News and Features

Campaign '04
E-Voting Group Sues Maryland Elections Board (washingtonpost.com, Oct. 12)

FEC May Regulate Web Political Activity (AP, Oct. 13)

Van Hollen Is Caught Off Guard; Name Is Used by Foe's Web Sites (Post, Oct. 12)

Urging Fact-Checking, Cheney Got Site Wrong (Post, Oct. 7)

Crime Online
FTC Sues Spyware Suspects (washingtonpost.com, Oct. 12)

Computer Users Face New Scourge: Spyware (Post, Oct. 10)

House Approves Spyware Bills (Post, Oct. 8)

Cyber-Security
Cyber-Security to Get Higher-Profile Leader (Post, Oct. 13)

Purdy Tapped as Cyber-Security Director (washingtonpost.com, Oct. 7)

Microsoft Releases New 'Critical' Patches (washingtonpost.com, Oct. 12)

Copyright in the Digital Age
Piracy Bill's Language Protects DVD Movie Filters (Post, Oct. 9)

Supreme Court Refuses to Hear Internet Piracy Case (AP, Oct. 12)

Privacy
Va. Panel Contemplates 'Smart' Driver's Licenses (Post, Oct. 7)

Telecom Policy
Monthly Bill Fatigue: Service Add-Ons Nibble at Incomes (Post, Oct. 10)

Antitrust Watch
Monti Reflects On Evolution Of Antitrust (Post, Oct. 7)

Government IT
Lockheed to Run Post Office Networks (Post, Oct. 11)

STAYING SAFE ONLINE
Computer Naivete Costs a Bundle
A comment from my daughter marked the start of a large headache, one that launched an odyssey that has taken $800 and roughly 48 man-hours over nearly three weeks to end. – By Kathleen Day
A Digital Doctor Treats Computer Contamination
Take Care to Guard Your Windows
Computer Users Need a Good Backup Plan
Skepticism Is the Message for E-Mail
When to Leave What Closed
Geek Speak

MORE RESOURCES FOR PROTECTING YOUR COMPUTER

Security Beyond Antivirus Programs (October 3, 2004)

How to Fix the JPEG Photo Flaw (October 1, 2004)

How to Avoid the Latest 'MyDoom' Worm (July 26, 2004)

How to Remove the 'Sasser' Worm (May 11, 2004)

Don't Pass on the Patches (April 19, 2004)

Fine-Tuning Your Firewall (April 5, 2004)

How to Deal With Spyware (March 28, 2004)


spacer
Tech Policy E-Letter Archive
More Stories

spacer
Tech Policy Section
spacer
Main Page
spacer
Cybercrime
spacer
Cybersecurity
spacer
Digital Rights/Piracy
spacer
E-Politics
spacer
FCC / Telecom Policy
spacer
Government IT
spacer
Internet Governance / ICANN
spacer
Internet Taxes
spacer
Privacy
spacer
Spam
spacer

spacer
Politics
Web Bug from http://media.washingtonpost.com/wp-srv/globalnav/images/spacer.gif
Politics and Campaigns News
spacer
Terry Neal: Talking Points
spacer
Dan Froomkin: White House Briefing
spacer
Howard Kurtz: Media Notes
spacer
Stephen Barr: Federal Diary
spacer
National Security
spacer
Bush Administration
spacer
Supreme Court
spacer
Federal Page
spacer
Editorials/Op-Eds

Advertisement

E-Mail Newsletter Services
To sign up for additional newsletters or get help, visit the E-mail Preferences Page.
•   To unsubscribe, visit the E-mail Preferences Page (do not reply to this e-mail).
•   For feedback, send mail to [EMAIL PROTECTED].
•   For advertising information, send mail to [EMAIL PROTECTED].
•   To subscribe to the print edition of The Washington Post newspaper, click here.

    Privacy Policy

© 2004 The Washington Post Company


Reply via email to