[Vision2020] Washington Post: Beware: Spyware

Dick Schmidt dickschmidt@moscow.com
Sat, 1 May 2004 09:23:25 -0700


This is a multi-part message in MIME format.

------=_NextPart_000_0053_01C42F5D.F47E2BF0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Tim,

This is a very interesting subject. I downloaded "Spyhunter" and it will =
tell you what spybots and cookies you have but you have to buy the =
software to get rid of spybots and I haven't parted with any coins yet =
to do that. The thing is that some of the things are "good spybots" such =
as your virus software sypbots which automatically update your virus =
program and I suppose Microsoft/windows looks for updates also. I go in =
and delete all the "temporary internet files" every day or so to get rid =
of the cookies you pick up from many websites. Does anyone have a better =
suggestion?

Dick Schmidt

----- Original Message -----=20
  From: Tim Lohrmann=20
  To: Art Deco aka W. Fox=20
  Cc: vision2020@moscow.com=20
  Sent: Friday, April 30, 2004 10:06 AM
  Subject: Re: [Vision2020] Washington Post: Beware: Spyware


  Wayne,
      Interesting article.
      I'm positive that anyone who goes on the web regularly has many of =
these "bugs" on their computer--so it's a good idea to have a =
scanning/quarantining program if you want to get rid of them.=20
      I know you've got quite a bit of expertise in this area, so I've =
got a question for you.
      What do you think of the freeware/shareware versions of "AdAware" =
and/or "Spybot Search & Destroy"  programs?
      I've run both of them and they both find "data-mining" bugs---but =
they seem to find different types of these spys.
      Do you know what the difference is? Is it better to regularly(I've =
seen once a week recommended) run both of these or is there a better =
program that could be run once and pretty much get rid of everything?
     Thanks for any help, TL


  "Art Deco aka W. Fox" <deco@moscow.com> wrote:
    FTC to Look Closer at 'Spyware'
    Privacy Experts Warn of Dangers to Unwitting Consumers=20
    By Yuki Noguchi
    Washington Post Staff Writer
    Monday, April 19, 2004; Page A04=20


    A relatively new kind of software that resides in many computers and =
tracks its users' Web-surfing habits or triggers pop-up advertisements =
has come under scrutiny by federal regulators who have already cracked =
down on deceptive or misleading spam.

    The Federal Trade Commission today is hosting a daylong workshop in =
Washington to discuss the effects of hidden software that may be used to =
control or spy on a computer without its user's knowledge.

    So far most "spyware" and "adware" programs, often placed on Windows =
PCs by such downloaded programs as file-sharing programs, appear to have =
been used for the relatively benign purpose of tracking consumer =
preferences, said Howard Beales, director of the FTC's consumer =
protection division. The FTC is watching to see if criminals start =
making widespread use of this technology to steal credit-card and Social =
Security numbers of unwitting computer users, he said.=20

    "So far [we] haven't thought that it warranted regulation," he said. =


    Privacy experts and makers of anti-spyware software say the FTC's =
light-touch approach leaves too many consumers vulnerable to more =
unwanted advertising or even the addition of controls that consumers =
might not realize are on their computer.

    "There's a number of concerns about spyware, which is that it takes =
away consumers' control over their computers," said Ari Schwartz, =
associate director of the Center for Democracy and Technology in =
Washington. "We consider privacy to be a control issue as well," and =
many spyware programs act as surveillance tools for advertisers without =
the users' consent, he said. In February, the group filed a complaint =
with the FTC arguing for stricter enforcement against two companies =
involved in using software for allegedly deceptive and unfair ads.=20

    The software generally enters a person's computer when he or she =
downloads and installs free music or game programs, for example. Often, =
popular downloaded programs such as Kazaa and Grokster require users to =
agree to a licensing agreement that allows the addition of adware to the =
computer's hard drive, legal agreements that Beales and privacy experts =
concede many consumers do not fully read. Other, more underhanded =
spyware developers automatically install spyware without the knowledge =
or informed consent of the user, privacy experts and software makers =
said.

    Estimating how many computers carry spyware or adware is difficult, =
in part because many consumers do not know they have it, said Nate =
Elliott, an analyst with Jupiter Research. Some companies consider =
"cookies," which are small data files that Web sites can place on a =
computer to store information about a user's online activity, to be a =
form of software, but cookies are not programs and cannot control =
computer functions.

    Last week, Internet service provider EarthLink Inc. and anti-spyware =
software maker Webroot Software Inc. said a three-month audit of =
slightly more than 1 million computers found 29.5 million pieces of =
spyware, or nearly 28 per computer. Almost 24 million of these items, =
however, were cookies.

    "We think the problem is bigger than anyone understood," said David =
Moll, chief executive of Webroot of Boulder, Colo. In particular, =
"drive-by" downloads, which occur when Web sites exploit weaknesses in =
Microsoft's widely used Internet Explorer browser to install spyware and =
adware surreptitiously, are increasingly a problem, he said.

    Roger Thompson, vice president of product development of Pest Patrol =
of Carlyle, Pa., said: "The issue is that there is no line between good =
behavior and bad behavior." Although a minority of spyware is used for =
"malicious" purposes, "it opens a back door that allows computers to be =
updated by the hacker and accept commands to log keystrokes, read files, =
or turn on the Web cam," he said.

    Federal and state legislators have taken notice. U.S. Sens. Conrad =
Burns (R-Mont.), Ron Wyden (D-Ore.), and Barbara Boxer (D-Calif.) have =
introduced legislation that would prohibit the installation of software =
on a computer without notice and consent, and would require easy ways to =
remove it. Utah enacted legislation last month, and state legislatures =
in California and Iowa are considering action.

    While some software installers are sneaky or fraudulent, the bigger =
problem may be that consumers neglect to read the fine print before =
loading programs, said David Sorkin, a professor at the John Marshall =
Law School in Chicago. "It's pretty hard to install controls beyond that =
contract."




    TechNews.com Home


    =A9 2004 The Washington Post Company


-------------------------------------------------------------------------=
-----
  Do you Yahoo!?
  Win a $20,000 Career Makeover at Yahoo! HotJobs 
------=_NextPart_000_0053_01C42F5D.F47E2BF0
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2800.1400" name=3DGENERATOR></HEAD>
<BODY bgColor=3D#ffffff>
<DIV>Tim,</DIV>
<DIV>&nbsp;</DIV>
<DIV>This is a very interesting subject. I downloaded "Spyhunter" and it =
will=20
tell you what spybots and cookies you have but you have to buy the =
software to=20
get rid of spybots and I haven't parted with any coins yet to do that. =
The thing=20
is that some of the things are "good spybots" such as your virus =
software=20
sypbots which automatically update your virus program and I suppose=20
Microsoft/windows looks for updates also. I go in and delete all the =
"temporary=20
internet files" every day or so to get rid of the cookies you pick up =
from many=20
websites. Does anyone have a better suggestion?</DIV>
<DIV>&nbsp;</DIV>
<DIV>Dick Schmidt</DIV>
<DIV>&nbsp;</DIV>
<DIV>----- Original Message ----- </DIV>
<BLOCKQUOTE=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; =
BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
  <DIV=20
  style=3D"BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: =
black"><B>From:</B>=20
  <A title=3Dtimlohr@yahoo.com href=3D"mailto:timlohr@yahoo.com">Tim =
Lohrmann</A>=20
  </DIV>
  <DIV style=3D"FONT: 10pt arial"><B>To:</B> <A title=3Ddeco@moscow.com=20
  href=3D"mailto:deco@moscow.com">Art Deco aka W. Fox</A> </DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Cc:</B> <A =
title=3Dvision2020@moscow.com=20
  href=3D"mailto:vision2020@moscow.com">vision2020@moscow.com</A> </DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Sent:</B> Friday, April 30, 2004 =
10:06=20
  AM</DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Subject:</B> Re: [Vision2020] =
Washington=20
  Post: Beware: Spyware</DIV>
  <DIV><BR></DIV>
  <DIV>Wayne,</DIV>
  <DIV>&nbsp;&nbsp;&nbsp; Interesting article.</DIV>
  <DIV>&nbsp;&nbsp;&nbsp; I'm positive that anyone who goes on the web =
regularly=20
  has many of these "bugs" on their computer--so it's a good idea to =
have a=20
  scanning/quarantining program if you want to get rid of them. </DIV>
  <DIV>&nbsp;&nbsp;&nbsp; I know you've got quite a bit of expertise in =
this=20
  area, so I've got a question for you.</DIV>
  <DIV>&nbsp;&nbsp;&nbsp; What do you think of&nbsp;the =
freeware/shareware=20
  versions of "AdAware" and/or&nbsp;"Spybot Search &amp;=20
  Destroy"&nbsp;&nbsp;programs?</DIV>
  <DIV>&nbsp;&nbsp;&nbsp; I've run both of them and they both find =
"data-mining"=20
  bugs---but they seem to find different types of these spys.</DIV>
  <DIV>&nbsp;&nbsp;&nbsp; Do you know what the difference is? Is it =
better to=20
  regularly(I've seen once a week recommended) run both of these or is =
there a=20
  better program that could be run once and pretty much&nbsp;get rid=20
  of&nbsp;everything?</DIV>
  <DIV>&nbsp;&nbsp; Thanks for any help, TL</DIV>
  <DIV>&nbsp;</DIV>
  <DIV><BR><B><I>"Art Deco aka W. Fox" &lt;deco@moscow.com&gt;</I></B>=20
  wrote:</DIV>
  <BLOCKQUOTE class=3Dreplbq=20
  style=3D"PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #1010ff 2px =
solid">
    <META content=3D"MSHTML 6.00.2800.1400" name=3DGENERATOR>
    <STYLE></STYLE>

    <DIV><FONT size=3D4><FONT face=3DArial><STRONG>FTC to Look Closer at =
'Spyware'<!--plsfield:stop--></A><BR></STRONG><FONT size=3D3>Privacy =
Experts=20
    Warn of Dangers to Unwitting Consumers</FONT></FONT><FONT size=3D3> =
</FONT>
    <P><!-- THIS JAVASCRIPT COMES FROM WASHTECH SITE FOR TESTING =
--><!--SCRIPT LANGUAGE=3D"JavaScript" =
SRC=3D"http://www.washtech.com/scripts/adcode.js"></SCRIPT-->
    <SCRIPT language=3DJavaScript=20
    =
src=3D"http://media.washingtonpost.com/wp-srv/washtech/javascript/adcode.=
js"></SCRIPT>

    <SCRIPT language=3DJavaScript><!--
setupAdCode("sitename=3Dwpni.washtech","pagename=3Dsoftware")
//--></SCRIPT>
<!-- END OF WASHTECH AD CODE PREPARATIONS --><FONT =
size=3D2><!--plsfield:byline--><I>By Yuki =
Noguchi</I><BR><!--plsfield:credit--><I>Washington Post Staff=20
    Writer</I><BR><FONT color=3D#cc0000><!--plsfield:disp_date-->Monday, =
April 19,=20
    2004; Page A04 </FONT></FONT>
    <P><!--plsfield:description--><NITF>
    <P>A relatively new kind of software that resides in many computers =
and=20
    tracks its users' Web-surfing habits or triggers pop-up =
advertisements has=20
    come under scrutiny by federal regulators who have already cracked =
down on=20
    deceptive or misleading spam.</P>
    <P>The Federal Trade Commission today is hosting a daylong workshop =
in=20
    Washington to discuss the effects of hidden software that may be =
used to=20
    control or spy on a computer without its user's knowledge.</P>
    <P>So far most "spyware" and "adware" programs, often placed on =
Windows PCs=20
    by such downloaded programs as file-sharing programs, appear to have =
been=20
    used for the relatively benign purpose of tracking consumer =
preferences,=20
    said Howard Beales, director of the FTC's consumer protection =
division. The=20
    FTC is watching to see if criminals start making widespread use of =
this=20
    technology to steal credit-card and Social Security numbers of =
unwitting=20
    computer users, he said. </P>
    <P>"So far [we] haven't thought that it warranted regulation," he =
said. </P>
    <P>Privacy experts and makers of anti-spyware software say the FTC's =

    light-touch approach leaves too many consumers vulnerable to more =
unwanted=20
    advertising or even the addition of controls that consumers might =
not=20
    realize are on their computer.</P>
    <P>"There's a number of concerns about spyware, which is that it =
takes away=20
    consumers' control over their computers," said Ari Schwartz, =
associate=20
    director of the Center for Democracy and Technology in Washington. =
"We=20
    consider privacy to be a control issue as well," and many spyware =
programs=20
    act as surveillance tools for advertisers without the users' =
consent, he=20
    said. In February, the group filed a complaint with the FTC arguing =
for=20
    stricter enforcement against two companies involved in using =
software for=20
    allegedly deceptive and unfair ads. </P>
    <P>The software generally enters a person's computer when he or she=20
    downloads and installs free music or game programs, for example. =
Often,=20
    popular downloaded programs such as Kazaa and Grokster require users =
to=20
    agree to a licensing agreement that allows the addition of adware to =
the=20
    computer's hard drive, legal agreements that Beales and privacy =
experts=20
    concede many consumers do not fully read. Other, more underhanded =
spyware=20
    developers automatically install spyware without the knowledge or =
informed=20
    consent of the user, privacy experts and software makers said.</P>
    <P>Estimating how many computers carry spyware or adware is =
difficult, in=20
    part because many consumers do not know they have it, said Nate =
Elliott, an=20
    analyst with Jupiter Research. Some companies consider "cookies," =
which are=20
    small data files that Web sites can place on a computer to store =
information=20
    about a user's online activity, to be a form of software, but =
cookies are=20
    not programs and cannot control computer functions.</P>
    <P>Last week, Internet service provider EarthLink Inc. and =
anti-spyware=20
    software maker Webroot Software Inc. said a three-month audit of =
slightly=20
    more than 1 million computers found 29.5 million pieces of spyware, =
or=20
    nearly 28 per computer. Almost 24 million of these items, however, =
were=20
    cookies.</P>
    <P>"We think the problem is bigger than anyone understood," said =
David Moll,=20
    chief executive of Webroot of Boulder, Colo. In particular, =
"drive-by"=20
    downloads, which occur when Web sites exploit weaknesses in =
Microsoft's=20
    widely used Internet Explorer browser to install spyware and adware=20
    surreptitiously, are increasingly a problem, he said.</P>
    <P>Roger Thompson, vice president of product development of Pest =
Patrol of=20
    Carlyle, Pa., said: "The issue is that there is no line between good =

    behavior and bad behavior." Although a minority of spyware is used =
for=20
    "malicious" purposes, "it opens a back door that allows computers to =
be=20
    updated by the hacker and accept commands to log keystrokes, read =
files, or=20
    turn on the Web cam," he said.</P>
    <P>Federal and state legislators have taken notice. U.S. Sens. =
Conrad Burns=20
    (R-Mont.), Ron Wyden (D-Ore.), and Barbara Boxer (D-Calif.) have =
introduced=20
    legislation that would prohibit the installation of software on a =
computer=20
    without notice and consent, and would require easy ways to remove =
it. Utah=20
    enacted legislation last month, and state legislatures in California =
and=20
    Iowa are considering action.</P>
    <P>While some software installers are sneaky or fraudulent, the =
bigger=20
    problem may be that consumers neglect to read the fine print before =
loading=20
    programs, said David Sorkin, a professor at the John Marshall Law =
School in=20
    Chicago. "It's pretty hard to install controls beyond that =
contract."</P>
    <P></P></NITF><BR clear=3Dall>
    <CENTER><A href=3D"http://www.technews.com/">TechNews.com =
Home</A></CENTER>
    <P></P>
    <P>
    <CENTER>=A9 2004<!--plsfield:end--> The Washington Post=20
    Company</CENTER></FONT></DIV></BLOCKQUOTE>
  <P>
  <HR SIZE=3D1>
  <FONT face=3Darial size=3D-1>Do you Yahoo!?<BR><A=20
  =
href=3D"http://pa.yahoo.com/*http://us.rd.yahoo.com/hotjobs/hotjobs_mail_=
signature_footer_textlink/evt=3D23983/*http://hotjobs.sweepstakes.yahoo.c=
om/careermakeover">Win=20
  a $20,000 Career Makeover at Yahoo! HotJobs=20
</A></FONT></BLOCKQUOTE></BODY></HTML>

------=_NextPart_000_0053_01C42F5D.F47E2BF0--