{"id":4396,"date":"2002-01-08T10:54:22","date_gmt":"2002-01-08T16:54:22","guid":{"rendered":"https:\/\/blog.socialmediaperformancegroup.com\/?p=4396"},"modified":"2002-01-08T10:54:22","modified_gmt":"2002-01-08T16:54:22","slug":"stratvantage-news-010802","status":"publish","type":"post","link":"https:\/\/stratvantage.com\/index.php\/2002\/01\/08\/stratvantage-news-010802\/","title":{"rendered":"StratVantage &#8211; The News \u2013 01\/08\/02"},"content":{"rendered":"<div id=\"bodyContent\">\n<div id=\"box\">\n<div id=\"box_inner\">\n<div id=\"text\">\n<div id=\"pages\">\n<div id=\"page1\" class=\"page\">\n<div class=\"page_content\">\n<h2 id=\"articleHeader\">\u00a0<b><i>Software Quality and Cyberterror Threats, Part 4<\/i><\/b><\/h2>\n<p>In the last three SNS issues, I discussed the huge task confronting Richard Clarke, the counter-terrorism expert in charge of the president&#8217;s <a href=\"http:\/\/www.iwar.org.uk\/cip\/resources\/bush\/executive-order.htm\" target=\"_blank\">Critical Infrastructure Protection Board<\/a>, made the assertion that security problems are really software quality problems, and examined some of the reasons why the software industry pays so little attention to these problems. I also took a look at the industry\u2019s response to the rising epidemic of worms and viruses. In this final installment, I consider some current forces militating against software quality and security, and look at two possible future scenarios.<\/p>\n<p>Let\u2019s focus for a moment on potential legal remedies for security bugs. In a perfect world, wouldn\u2019t we make software companies responsible for the quality of their products? This doesn\u2019t seem to be too much to ask. If Firestone makes truck tires that disintegrate, isn\u2019t it natural to hold them accountable? If a software defect allows a virus to cause a billion dollars of damage, shouldn\u2019t the vendor compensate the victims or at least be liable in some way?<\/p>\n<p>When you look at it, there\u2019s really no reason why software should be exempt from the kind of product quality legislation in place for things like tires, washing machines, cars, ladders, airplanes, and pretty much every other thing we buy. But then again, a far worse product, cigarettes, is not held to these standards, and so don\u2019t hold your breath waiting for this level of legal solution.<\/p>\n<p>In fact, things are headed in the exact opposite direction. The States are beginning to adopt a proposed standard body of law that addresses software and other electronic products. It\u2019s called UCITA, the Uniform Computer Information Transactions Act, and it was developed by the National Conference of Commissioners on Uniform State Laws (NCCUSL) in 1999. UCITA was designed to create a uniform commercial contract law for electronic products and attempts to be \u201ca cyberspace commercial statute.\u201d It covers shrink-wrap and click through licenses and gives them further strength as contracts.<\/p>\n<p>UCITA is supported by Software &amp; Information Industry Association (SIIA) whose 1,200 member companies represent most of the biggest software and content vendors around \u2013 AOL Time Warner, Apple Computer, LexisNexis, Nokia, Novell, Oracle, and Sun, for example. (Microsoft is conspicuously absent.) The association\u2019s interest in UCITA is consistent with another of their major initiatives, the SPA Anti-Piracy effort. In 2000, Virginia and Maryland became the first states to adopt UCITA.<\/p>\n<p>In a summary <a href=\"http:\/\/www.siia.net\/sharedcontent\/govt\/issues\/ucita\/summary.html\" target=\"_blank\">brief<\/a> on the SIIA site, one of the main advantages of UCITA for the software industry becomes apparent:<\/p>\n<p><b>UCITA rejects the &#8220;perfect tender&#8221; rule for commercial licenses. <\/b>One of the problems with Article 2 [of the Uniform Commercial Code] is that it requires delivery of goods that conform to the contract. Software is recognized as a product that cannot be made perfect and that it almost always will have bugs. The existence of bugs in software could violate the perfect tender requirement under Article 2. UCITA eliminates the perfect tender rule and replaces it with a substantial conformance standard. The perfect tender rule is retained for transactions involving consumers.<\/p>\n<p>What? \u201cSoftware is recognized as a product that <b>cannot be made perfect<\/b>\u201d? I\u2019m not ready to agree to that, are you? Yet on the other hand, most products can\u2019t be made perfect. I\u2019m reminded, for example, of the time a printer told me that if I wanted perfect registration (alignment of colors) on a printing job, I\u2019d have to pay more. One could argue that no product can be made perfect, so why is it necessary to grant software a special dispensation to be shoddy?<\/p>\n<p>What\u2019s worse, UCITA, the so-called \u201cself help\u201d provision, allows software developers to leave back doors and time bombs in their software as a means to enforce their copyrights or the length of software use. This provision opens such a Pandora\u2019s box of potential security problems that even the framers of UCITA have <a href=\"http:\/\/www.infoworld.com\/articles\/uc\/xml\/02\/01\/03\/020103ucsecurity.xml\" target=\"_blank\">reversed<\/a> themselves and are trying to address this brain-dead provision. Yet another provision, the \u201cautomatic restraint\u201d provision also authorizes back doors and time bombs, with even fewer restraints than the self help provision.<\/p>\n<p>The problems with UCITA also include the prevention of vendor liability, even through gross negligence, for security vulnerabilities, and an implied prohibition against reverse engineering of any kind. Even worse, UCITA applies to content delivered through software as well. Imagine being prohibited from disparaging a movie review you read on AOL, or even from quoting from it.<\/p>\n<p>Free software advocate Richard Stallman <a href=\"http:\/\/www.eff.org\/IP\/DRM\/UCITA_UCC2B\/20000131_fight_ucita_stallman_paper.html\" target=\"_blank\">sums up<\/a> this disaster of a law thusly:<\/p>\n<p>We generally believe that big companies ought to be held to a strict standard of liability to their customers, because they can afford it and because it will keep them honest. On the other hand, individuals, amateurs, and good samaritans should be treated more favorably. UCITA does exactly the opposite. It makes individuals, amateurs, and good samaritans liable, but not big companies.<\/p>\n<p>Is this the kind of future we want, one in which software vendors face no real incentive to deliver bug-free, secure software, one in which software gets less and less reliable, one in which researchers who currently point out software flaws are muzzled and arrested?<\/p>\n<p>In that future, software quality will continue to decline. After all, the law says it can\u2019t be perfected, so why try? In that future, the network will be overrun by berworms that make the Code Red worm and other recent malware look like a walk in the park in comparison. In that future, the jails will overflow with legitimate and illegitimate software researchers, script kiddies and superhackers, and penniless college students who ripped off music they couldn\u2019t have afforded to buy anyway. But, hey, it\u2019s not all bad. Software and content vendors will prosper. We\u2019ll just have to be happy with what they give us.<\/p>\n<p>Can we afford such a future in the post-9\/11 world? Do you want critical infrastructure systems full of security flaws just waiting for terrorists to exploit them? Do you want the mission critical systems of your organization running on software created by corporations that have no liability for errors? Are we going to acquiesce and allow bad laws like DMCA and UCITA to tilt the playing field overwhelmingly in the direction of large software corporations?<\/p>\n<p>Or are we going to recognize that software quality is a matter of national security? Are we going to regard as unpatriotic any software vendor that does not make security its highest priority? Are we going to fight for our right to fair and reasonable use, including the ability to analyze software to determine its quality and security?<\/p>\n<p>The choice is ours. It\u2019s an enormous choice, yet most people aren\u2019t aware of the issues. You can help by forwarding this series of articles (<a href=\"http:\/\/www.stratvantage.com\/news\/112801.htm\" target=\"_blank\">part 1<\/a>, <a href=\"http:\/\/www.stratvantage.com\/news\/120601.htm\" target=\"_blank\">part 2<\/a>, <a href=\"http:\/\/www.stratvantage.com\/news\/121901.htm\" target=\"_blank\">part 3<\/a>,<a href=\"http:\/\/www.stratvantage.com\/news\/010802.htm\" target=\"_blank\">part 4<\/a>) to decision-makers you know, or by pointing them to the work of Bruce Schneier, Richard Stallman, the Electronic Frontier Foundation, or virtually any other security expert around. You can also support the work of the 26 state Attorneys General and <a href=\"http:\/\/www.cpsr.org\/program\/UCITA\/ucita-fact.html\" target=\"_blank\">others<\/a> that oppose UCITA<\/p>\n<p><b><i>Briefly Noted<\/i><\/b><\/p>\n<ul>\n<li><b>Shameless Self-Promotion Dept.<\/b>: StratVantage has launched a new service, CTOMentor\u2122, designed to allow Chief Technology Officers and other technical leaders to get rid of the Guilt Stack, that pile of magazines you\u2019ll get around to reading someday.CTOMentor is a subscription advisory service tailored to customers\u2019 industry and personal information needs. Four times a year CTOMentor provides a four-hour briefing for subscribers and their staffs on the most important emerging technology trends that could affect their businesses. As part of the service, subscribers also get a weekly email newsletter, Just the Right Stuff\u2122, containing links to the Top 10 Must Read articles needed to stay current. These and other CTOMentor services will let you Your Inbox\u2122.\n<p>As part of its launch, CTOMentor is offering a two part white paper on peer-to-peer technology: <i>Peer-to-Peer Computing and Business Networks: More Than Meets the Ear<\/i>. Part 1, <i>What is P2P?<\/i>, is available for free on the CTOMentor <a href=\"http:\/\/www.ctomentor.com\/p2p\/index.html\" target=\"_blank\">Web site<\/a>. Part 2, <i>How Are Businesses Using P2P?<\/i>, is <a href=\"http:\/\/www.ctomentor.com\/p2p\/part2.htm\" target=\"_blank\">available<\/a> for $50.<br \/>\n<a href=\"http:\/\/www.ctomentor.com\/\" target=\"_blank\">CTOMentor<\/a><\/li>\n<li><b>Wireless Security Fixed:<\/b> As <a href=\"http:\/\/www.stratvantage.com\/news\/082901.htm\" target=\"_blank\">previously<\/a> reported in SNS, the Wired Equivalent Privacy (WEP) standard built into 802.11b wireless LANs is a joke. So RSA Security and Hifn have developed a technology called \u201cfast packet keying\u201d and announced that their solution has been accepted by the IEEE standards body. The technology generates a unique RC4 key for each data packet sent over the wireless LAN. Geez, it better be fast if it\u2019s going to do that! RSA says the solution can be distributed as a software or firmware patch by wireless LAN vendors, allowing their customers to quickly update the existing vulnerable equipment. Thanks to Alert SNS Reader David Dabbs for the pointer.<br \/>\n<a href=\"http:\/\/www.rsasecurity.com\/news\/pr\/011217-2.html\" target=\"_blank\">RSA<\/a><\/li>\n<li><b>Another Bad Trademark Granted:<\/b> Well, now I\u2019m going to try to trademark the word \u201cthe.\u201d If there\u2019s a more brain-dead section of government than the US Patents and Trademarks Office, I\u2019d like to see it. Now there\u2019s a legal battle being waged over who has the right to use the word \u201cEntrepreneur.\u201dEveryone who uses this word is now subject to a lawsuit from the media group that publishes Entrepreneur Magazine. Minnesota Entrepreneurs President Ed Palmer notes the irony of the situation. \u201cYes, I know \u2014 how could this be?An organization that purports to support entrepreneurs sues entrepreneurs?Quite perverse, yet true. By the way, long before this trademark was filed for, The Minnesota Entrepreneurs were engaged in using the name. What\u2019s up with this trademark?\u201d<br \/>\n<a href=\"http:\/\/www.entrepreneurs.com\/free2.html\" target=\"_blank\">MN Entrepreneurs<\/a><\/li>\n<li><b>Spin Doctors*: <\/b>TheCalifornia NanoSystems Institute, a joint effort of The University of California at Los Angeles and University of California at Santa Barbara, recently reported that it can now electronically control the &#8220;spin&#8221; of an electron. This breakthrough could mean extremely fast, dense, low heat electronics, since changing the spin takes an infinitesimal amount of energy compared to moving the charge in a wire back and forth, according to the company.<br \/>\n(*That headline was inevitable, wasn\u2019t it?)<br \/>\n<a href=\"http:\/\/www.smalltimes.com\/document_display.cfm?document_id=2710\" target=\"_blank\">Small Times<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"background\"><\/div>\n<\/div>\n<div id=\"extra__ui__basics\"><\/div>\n<div id=\"extra__ui\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0Software Quality and Cyberterror Threats, Part 4 In the last three SNS issues, I discussed the huge task confronting Richard Clarke, the counter-terrorism expert in charge of the president&#8217;s Critical Infrastructure Protection Board, made the assertion that security problems are really software quality problems, and examined some of the reasons why the software industry pays &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/stratvantage.com\/index.php\/2002\/01\/08\/stratvantage-news-010802\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;StratVantage &#8211; The News \u2013 01\/08\/02&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-4396","post","type-post","status-publish","format-standard","hentry","category-sns"],"_links":{"self":[{"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/posts\/4396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/comments?post=4396"}],"version-history":[{"count":0,"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/posts\/4396\/revisions"}],"wp:attachment":[{"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/media?parent=4396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/categories?post=4396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/tags?post=4396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}