[Vision2020] Washington Post: Beware: Spyware
Dick Schmidt
dickschmidt@moscow.com
Sat, 1 May 2004 09:23:25 -0700
This is a multi-part message in MIME format.
------=_NextPart_000_0053_01C42F5D.F47E2BF0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Tim,
This is a very interesting subject. I downloaded "Spyhunter" and it will =
tell you what spybots and cookies you have but you have to buy the =
software to get rid of spybots and I haven't parted with any coins yet =
to do that. The thing is that some of the things are "good spybots" such =
as your virus software sypbots which automatically update your virus =
program and I suppose Microsoft/windows looks for updates also. I go in =
and delete all the "temporary internet files" every day or so to get rid =
of the cookies you pick up from many websites. Does anyone have a better =
suggestion?
Dick Schmidt
----- Original Message -----=20
From: Tim Lohrmann=20
To: Art Deco aka W. Fox=20
Cc: vision2020@moscow.com=20
Sent: Friday, April 30, 2004 10:06 AM
Subject: Re: [Vision2020] Washington Post: Beware: Spyware
Wayne,
Interesting article.
I'm positive that anyone who goes on the web regularly has many of =
these "bugs" on their computer--so it's a good idea to have a =
scanning/quarantining program if you want to get rid of them.=20
I know you've got quite a bit of expertise in this area, so I've =
got a question for you.
What do you think of the freeware/shareware versions of "AdAware" =
and/or "Spybot Search & Destroy" programs?
I've run both of them and they both find "data-mining" bugs---but =
they seem to find different types of these spys.
Do you know what the difference is? Is it better to regularly(I've =
seen once a week recommended) run both of these or is there a better =
program that could be run once and pretty much get rid of everything?
Thanks for any help, TL
"Art Deco aka W. Fox" <deco@moscow.com> wrote:
FTC to Look Closer at 'Spyware'
Privacy Experts Warn of Dangers to Unwitting Consumers=20
By Yuki Noguchi
Washington Post Staff Writer
Monday, April 19, 2004; Page A04=20
A relatively new kind of software that resides in many computers and =
tracks its users' Web-surfing habits or triggers pop-up advertisements =
has come under scrutiny by federal regulators who have already cracked =
down on deceptive or misleading spam.
The Federal Trade Commission today is hosting a daylong workshop in =
Washington to discuss the effects of hidden software that may be used to =
control or spy on a computer without its user's knowledge.
So far most "spyware" and "adware" programs, often placed on Windows =
PCs by such downloaded programs as file-sharing programs, appear to have =
been used for the relatively benign purpose of tracking consumer =
preferences, said Howard Beales, director of the FTC's consumer =
protection division. The FTC is watching to see if criminals start =
making widespread use of this technology to steal credit-card and Social =
Security numbers of unwitting computer users, he said.=20
"So far [we] haven't thought that it warranted regulation," he said. =
Privacy experts and makers of anti-spyware software say the FTC's =
light-touch approach leaves too many consumers vulnerable to more =
unwanted advertising or even the addition of controls that consumers =
might not realize are on their computer.
"There's a number of concerns about spyware, which is that it takes =
away consumers' control over their computers," said Ari Schwartz, =
associate director of the Center for Democracy and Technology in =
Washington. "We consider privacy to be a control issue as well," and =
many spyware programs act as surveillance tools for advertisers without =
the users' consent, he said. In February, the group filed a complaint =
with the FTC arguing for stricter enforcement against two companies =
involved in using software for allegedly deceptive and unfair ads.=20
The software generally enters a person's computer when he or she =
downloads and installs free music or game programs, for example. Often, =
popular downloaded programs such as Kazaa and Grokster require users to =
agree to a licensing agreement that allows the addition of adware to the =
computer's hard drive, legal agreements that Beales and privacy experts =
concede many consumers do not fully read. Other, more underhanded =
spyware developers automatically install spyware without the knowledge =
or informed consent of the user, privacy experts and software makers =
said.
Estimating how many computers carry spyware or adware is difficult, =
in part because many consumers do not know they have it, said Nate =
Elliott, an analyst with Jupiter Research. Some companies consider =
"cookies," which are small data files that Web sites can place on a =
computer to store information about a user's online activity, to be a =
form of software, but cookies are not programs and cannot control =
computer functions.
Last week, Internet service provider EarthLink Inc. and anti-spyware =
software maker Webroot Software Inc. said a three-month audit of =
slightly more than 1 million computers found 29.5 million pieces of =
spyware, or nearly 28 per computer. Almost 24 million of these items, =
however, were cookies.
"We think the problem is bigger than anyone understood," said David =
Moll, chief executive of Webroot of Boulder, Colo. In particular, =
"drive-by" downloads, which occur when Web sites exploit weaknesses in =
Microsoft's widely used Internet Explorer browser to install spyware and =
adware surreptitiously, are increasingly a problem, he said.
Roger Thompson, vice president of product development of Pest Patrol =
of Carlyle, Pa., said: "The issue is that there is no line between good =
behavior and bad behavior." Although a minority of spyware is used for =
"malicious" purposes, "it opens a back door that allows computers to be =
updated by the hacker and accept commands to log keystrokes, read files, =
or turn on the Web cam," he said.
Federal and state legislators have taken notice. U.S. Sens. Conrad =
Burns (R-Mont.), Ron Wyden (D-Ore.), and Barbara Boxer (D-Calif.) have =
introduced legislation that would prohibit the installation of software =
on a computer without notice and consent, and would require easy ways to =
remove it. Utah enacted legislation last month, and state legislatures =
in California and Iowa are considering action.
While some software installers are sneaky or fraudulent, the bigger =
problem may be that consumers neglect to read the fine print before =
loading programs, said David Sorkin, a professor at the John Marshall =
Law School in Chicago. "It's pretty hard to install controls beyond that =
contract."
TechNews.com Home
=A9 2004 The Washington Post Company
-------------------------------------------------------------------------=
-----
Do you Yahoo!?
Win a $20,000 Career Makeover at Yahoo! HotJobs
------=_NextPart_000_0053_01C42F5D.F47E2BF0
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2800.1400" name=3DGENERATOR></HEAD>
<BODY bgColor=3D#ffffff>
<DIV>Tim,</DIV>
<DIV> </DIV>
<DIV>This is a very interesting subject. I downloaded "Spyhunter" and it =
will=20
tell you what spybots and cookies you have but you have to buy the =
software to=20
get rid of spybots and I haven't parted with any coins yet to do that. =
The thing=20
is that some of the things are "good spybots" such as your virus =
software=20
sypbots which automatically update your virus program and I suppose=20
Microsoft/windows looks for updates also. I go in and delete all the =
"temporary=20
internet files" every day or so to get rid of the cookies you pick up =
from many=20
websites. Does anyone have a better suggestion?</DIV>
<DIV> </DIV>
<DIV>Dick Schmidt</DIV>
<DIV> </DIV>
<DIV>----- Original Message ----- </DIV>
<BLOCKQUOTE=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; =
BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV=20
style=3D"BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: =
black"><B>From:</B>=20
<A title=3Dtimlohr@yahoo.com href=3D"mailto:timlohr@yahoo.com">Tim =
Lohrmann</A>=20
</DIV>
<DIV style=3D"FONT: 10pt arial"><B>To:</B> <A title=3Ddeco@moscow.com=20
href=3D"mailto:deco@moscow.com">Art Deco aka W. Fox</A> </DIV>
<DIV style=3D"FONT: 10pt arial"><B>Cc:</B> <A =
title=3Dvision2020@moscow.com=20
href=3D"mailto:vision2020@moscow.com">vision2020@moscow.com</A> </DIV>
<DIV style=3D"FONT: 10pt arial"><B>Sent:</B> Friday, April 30, 2004 =
10:06=20
AM</DIV>
<DIV style=3D"FONT: 10pt arial"><B>Subject:</B> Re: [Vision2020] =
Washington=20
Post: Beware: Spyware</DIV>
<DIV><BR></DIV>
<DIV>Wayne,</DIV>
<DIV> Interesting article.</DIV>
<DIV> I'm positive that anyone who goes on the web =
regularly=20
has many of these "bugs" on their computer--so it's a good idea to =
have a=20
scanning/quarantining program if you want to get rid of them. </DIV>
<DIV> I know you've got quite a bit of expertise in =
this=20
area, so I've got a question for you.</DIV>
<DIV> What do you think of the =
freeware/shareware=20
versions of "AdAware" and/or "Spybot Search &=20
Destroy" programs?</DIV>
<DIV> I've run both of them and they both find =
"data-mining"=20
bugs---but they seem to find different types of these spys.</DIV>
<DIV> Do you know what the difference is? Is it =
better to=20
regularly(I've seen once a week recommended) run both of these or is =
there a=20
better program that could be run once and pretty much get rid=20
of everything?</DIV>
<DIV> Thanks for any help, TL</DIV>
<DIV> </DIV>
<DIV><BR><B><I>"Art Deco aka W. Fox" <deco@moscow.com></I></B>=20
wrote:</DIV>
<BLOCKQUOTE class=3Dreplbq=20
style=3D"PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #1010ff 2px =
solid">
<META content=3D"MSHTML 6.00.2800.1400" name=3DGENERATOR>
<STYLE></STYLE>
<DIV><FONT size=3D4><FONT face=3DArial><STRONG>FTC to Look Closer at =
'Spyware'<!--plsfield:stop--></A><BR></STRONG><FONT size=3D3>Privacy =
Experts=20
Warn of Dangers to Unwitting Consumers</FONT></FONT><FONT size=3D3> =
</FONT>
<P><!-- THIS JAVASCRIPT COMES FROM WASHTECH SITE FOR TESTING =
--><!--SCRIPT LANGUAGE=3D"JavaScript" =
SRC=3D"http://www.washtech.com/scripts/adcode.js"></SCRIPT-->
<SCRIPT language=3DJavaScript=20
=
src=3D"http://media.washingtonpost.com/wp-srv/washtech/javascript/adcode.=
js"></SCRIPT>
<SCRIPT language=3DJavaScript><!--
setupAdCode("sitename=3Dwpni.washtech","pagename=3Dsoftware")
//--></SCRIPT>
<!-- END OF WASHTECH AD CODE PREPARATIONS --><FONT =
size=3D2><!--plsfield:byline--><I>By Yuki =
Noguchi</I><BR><!--plsfield:credit--><I>Washington Post Staff=20
Writer</I><BR><FONT color=3D#cc0000><!--plsfield:disp_date-->Monday, =
April 19,=20
2004; Page A04 </FONT></FONT>
<P><!--plsfield:description--><NITF>
<P>A relatively new kind of software that resides in many computers =
and=20
tracks its users' Web-surfing habits or triggers pop-up =
advertisements has=20
come under scrutiny by federal regulators who have already cracked =
down on=20
deceptive or misleading spam.</P>
<P>The Federal Trade Commission today is hosting a daylong workshop =
in=20
Washington to discuss the effects of hidden software that may be =
used to=20
control or spy on a computer without its user's knowledge.</P>
<P>So far most "spyware" and "adware" programs, often placed on =
Windows PCs=20
by such downloaded programs as file-sharing programs, appear to have =
been=20
used for the relatively benign purpose of tracking consumer =
preferences,=20
said Howard Beales, director of the FTC's consumer protection =
division. The=20
FTC is watching to see if criminals start making widespread use of =
this=20
technology to steal credit-card and Social Security numbers of =
unwitting=20
computer users, he said. </P>
<P>"So far [we] haven't thought that it warranted regulation," he =
said. </P>
<P>Privacy experts and makers of anti-spyware software say the FTC's =
light-touch approach leaves too many consumers vulnerable to more =
unwanted=20
advertising or even the addition of controls that consumers might =
not=20
realize are on their computer.</P>
<P>"There's a number of concerns about spyware, which is that it =
takes away=20
consumers' control over their computers," said Ari Schwartz, =
associate=20
director of the Center for Democracy and Technology in Washington. =
"We=20
consider privacy to be a control issue as well," and many spyware =
programs=20
act as surveillance tools for advertisers without the users' =
consent, he=20
said. In February, the group filed a complaint with the FTC arguing =
for=20
stricter enforcement against two companies involved in using =
software for=20
allegedly deceptive and unfair ads. </P>
<P>The software generally enters a person's computer when he or she=20
downloads and installs free music or game programs, for example. =
Often,=20
popular downloaded programs such as Kazaa and Grokster require users =
to=20
agree to a licensing agreement that allows the addition of adware to =
the=20
computer's hard drive, legal agreements that Beales and privacy =
experts=20
concede many consumers do not fully read. Other, more underhanded =
spyware=20
developers automatically install spyware without the knowledge or =
informed=20
consent of the user, privacy experts and software makers said.</P>
<P>Estimating how many computers carry spyware or adware is =
difficult, in=20
part because many consumers do not know they have it, said Nate =
Elliott, an=20
analyst with Jupiter Research. Some companies consider "cookies," =
which are=20
small data files that Web sites can place on a computer to store =
information=20
about a user's online activity, to be a form of software, but =
cookies are=20
not programs and cannot control computer functions.</P>
<P>Last week, Internet service provider EarthLink Inc. and =
anti-spyware=20
software maker Webroot Software Inc. said a three-month audit of =
slightly=20
more than 1 million computers found 29.5 million pieces of spyware, =
or=20
nearly 28 per computer. Almost 24 million of these items, however, =
were=20
cookies.</P>
<P>"We think the problem is bigger than anyone understood," said =
David Moll,=20
chief executive of Webroot of Boulder, Colo. In particular, =
"drive-by"=20
downloads, which occur when Web sites exploit weaknesses in =
Microsoft's=20
widely used Internet Explorer browser to install spyware and adware=20
surreptitiously, are increasingly a problem, he said.</P>
<P>Roger Thompson, vice president of product development of Pest =
Patrol of=20
Carlyle, Pa., said: "The issue is that there is no line between good =
behavior and bad behavior." Although a minority of spyware is used =
for=20
"malicious" purposes, "it opens a back door that allows computers to =
be=20
updated by the hacker and accept commands to log keystrokes, read =
files, or=20
turn on the Web cam," he said.</P>
<P>Federal and state legislators have taken notice. U.S. Sens. =
Conrad Burns=20
(R-Mont.), Ron Wyden (D-Ore.), and Barbara Boxer (D-Calif.) have =
introduced=20
legislation that would prohibit the installation of software on a =
computer=20
without notice and consent, and would require easy ways to remove =
it. Utah=20
enacted legislation last month, and state legislatures in California =
and=20
Iowa are considering action.</P>
<P>While some software installers are sneaky or fraudulent, the =
bigger=20
problem may be that consumers neglect to read the fine print before =
loading=20
programs, said David Sorkin, a professor at the John Marshall Law =
School in=20
Chicago. "It's pretty hard to install controls beyond that =
contract."</P>
<P></P></NITF><BR clear=3Dall>
<CENTER><A href=3D"http://www.technews.com/">TechNews.com =
Home</A></CENTER>
<P></P>
<P>
<CENTER>=A9 2004<!--plsfield:end--> The Washington Post=20
Company</CENTER></FONT></DIV></BLOCKQUOTE>
<P>
<HR SIZE=3D1>
<FONT face=3Darial size=3D-1>Do you Yahoo!?<BR><A=20
=
href=3D"http://pa.yahoo.com/*http://us.rd.yahoo.com/hotjobs/hotjobs_mail_=
signature_footer_textlink/evt=3D23983/*http://hotjobs.sweepstakes.yahoo.c=
om/careermakeover">Win=20
a $20,000 Career Makeover at Yahoo! HotJobs=20
</A></FONT></BLOCKQUOTE></BODY></HTML>
------=_NextPart_000_0053_01C42F5D.F47E2BF0--