Internet Workers


INTERNET
INTRIGUE



Reprinted from: Exotic Research Report (Volume 1, Issue 1; Jan/Feb/Mar 1996)

The Internet
One of the fastest growing areas of computer technology is the development of the Internet — a true information superhighway. To users its a Godsend, to security managers its a nightmare, and for corporate executives its a two-edged sword.

The Internet is a global computer network that virtually every computer in the nation can link up to. At first it was awkward and hard to use. Now, a number of companies are actively developing software to make it easier and easier to use.

As it becomes easier to use, a wider variety of products can be found on the feature known as the Worldwide Web—a kind of computer bazaar where one can find anything from valuable data to Playboy. It is so immense that one can easily get sidetracked by all of the interesting material found there. As one can imagine, this is causing a dilemma for corporate management.


A Corporate Dilemma
Many corporations have noticed a decrease in productivity once they have entered the Internet. It appears that many of the workers have discovered a new sport... surfing the Internet. This consists of wandering through the maze of screens and sites that make up the web.

An employee can look extremely busy on the Internet, while actually doing nothing worthwhile... at least on the surface. According to Webster Network Strategies—a company that sells software to block access to various Websites, the average worker wastes 1½ hours a day on the web. This causes consternation for the employer who wants maximum productivity.

However, companies are reluctant to unplug from this global network that provides time-saving access to information. In response, they are developing a number of strategies to combat this new threat to high productivity.

A number of companies are purchasing software that allows them to block access to certain websites. Others are monitoring their workers and logging the sites they visit. Such Draconian measures may have worked in the past, but the typical daytime user is a business professional who must be judicious about the use of his time (according to USA Today, surveys indicate that over two-thirds of the users are males; 81% under 45), and resent not being trusted and monitored. Many of the companies are monitoring usage and not informing the employees at this time.

The more technical savvy companies realize that their employees have had access to the Internet for less than a year and are in the familiarization stage with this new phenomenon. Like any new piece of software, the only way to get to know it, is to use it and play with it. Surfing the net is one way of familiarizing oneself with the Internet, and getting to know what is and isn't available. Sooner or later, one does reach a stage when it’s boring.


Windows 95... A Trojan Horse
One of a security department’s most important duties is safeguarding the company's data from others and loss of data through viral destruction. It doesn't make their job easier when software companies start writing viral routines designed to ferret out information on their networks. The latest offender is Microsoft.

Microsoft's latest operating system— Windows 95 —includes a small viral routine called Registration Wizard. It interrogates every system on a network, gathering intelligence on what software is being run on which machine. It then creates a complete listing of both Microsoft's and competitor’s products by machines which it reports to Microsoft when customers register their software over the net.

Customers must actively disable the routine if they don't want it to run.

Mike Conte (group manager for Microsoft's Personal Systems Division) defended their actions by stating:
    The Wizard presents three screens to the user, all with a chance to say to “no” to the program, with the last screen requiring a definite “yes” before the program activates the modem and sends the information to the company. (ISA Password, June 1995)

The problem is that many users are not computer literate enough to understand exactly what the software is doing... and it catches the unwary.


DoD Concerns
The commercial and private sector are not the only ones taken aback by Microsoft's “Trojan Horse.” The Defense Department has “security concerns” about the on-line Registration Wizard as well as “the general trend toward on-line registration and diagnostic assistance. Mike Conte addressed those concerns:
    We are very concerned about their concerns. But our experience has been that what people have heard about the Registration Wizard is much more dramatic than it really is. The program does not send anything to Microsoft that the user has not approved. They can see the information in a file called reginfo.txt. (ISA Password, June 1995)

DoD is still reluctant, despite these assurances, to give any firm the power and ability to run a scanning program on its huge installed base of computers. Microsoft insists that any systems administrator can disable the program, so there is no problem.

The privacy issue seems to have been sidestepped and not discussed. Perhaps that is the reason that so many companies and individuals are turning towards encryption as a means of protecting their data.


Encryption: Thorn in Government’s Side
Encryption is a sore spot with government officials who are trying to tie software export control rules to a national encryption policy. The proposals drafted by the Interagency Working Group on Encryption and Telecommunications become more burdensome and restrictive on businesses and private citizens with each revision.

The latest revisions require that software companies limit the strength of their encription keys to less than the encryption standard used worldwide. Further, they would like the encryption keys to be held in escrow, with an escrow agent.

To their credit the Business Software Alliance, a trade lobbying group have opposed such changes. They would like to see an end to the government’s intervention into a domestic issue. They want restrictions on currently available encryption software lifted and an automatic increase of two-bits in the encryption key length every three years.

In its attempt to write an encryption policy, the administration has been under fire for years from private individuals, civil libertarians and businesses. People resent having their data accessable to others, and for that reason encryption programs such as PGP (Pretty Good Privacy) are popular... and encryption is a growing industry.

Now, is a good time for government to realize that it is NOT entitled to be Big Brother... a third party to every conversation, or transaction that takes place.


Bastion of Freedom...
For better or worse, the Internet is here. It allows the computer user of today unparralled access to the world at large. With all of its shortcomings and risks, the Internet is a worthwhile endeavor in that allows the interchange of ideas and information. It is a bastion of freedom, and it should be kept that way!_SRE



TeslaTech,Inc -:- 296 East Donna Drive -:- Queen Valley, AZ 85218

Order Hotline: ( 520 ) 463-1994 -:- Editorial Office: ( 520 ) 463-1994


Home | Feedback | Events | Magazine | Radio | Books


Free JavaScripts provided by The JavaScript Source

Copyright © 2002 TeslaTech, Inc ALL RIGHTS RESERVED