051309 Federal Interest And Social Security Metanomics Transcript

34
METANOMICS: FEDERAL INTEREST AND SOCIAL SECURITY: GOVERNMENT TAKES A SERIOUS LOOK AT VIRTUAL WORLDS MAY 13, 2009 ANNOUNCER : Metanomics is brought to you by Remedy Communications and Dusan Writer’s Metaverse. ROBERT BLOOMFIELD : Hi. I’m Robert Bloomfield, professor at Cornell University’s Johnson Graduate School of Management. Each week I have the honor of hosting a discussion with the most insightful and the most influential people who are taking Virtual Worlds seriously. We talk with the developers who are creating these fascinating new platforms, the executives, entrepreneurs, educators, artists, government officials who are putting these platforms to use. We talk with the researchers who are watching the whole process unfold. And we talk with the government officials and policymakers who are taking a very close look on how what happens in the Virtual World can affect our Real World society. Now naturally, we hold our discussions about Virtual Worlds in Virtual Worlds. How else could we find a very real place where a global community can convene, collaborate and connect with one another? So our discussion is about to start. You can join us in any of our live Virtual World studio audiences. You can join us live on the web. Welcome, because this is Metanomics. ANNOUNCER : Metanomics is filmed today in front of a live audience at our studios in Second Life.

description

Metanomics is a weekly Web-based show on the serious uses of virtual worlds. This transcript is from a past show. For this and other videos, visit us at http://metanomics.net.

Transcript of 051309 Federal Interest And Social Security Metanomics Transcript

Page 1: 051309 Federal Interest And Social Security Metanomics Transcript

METANOMICS: FEDERAL INTEREST AND SOCIAL SECURITY:

GOVERNMENT TAKES A SERIOUS LOOK AT VIRTUAL WORLDS

MAY 13, 2009

ANNOUNCER: Metanomics is brought to you by Remedy Communications and

Dusan Writer’s Metaverse.

ROBERT BLOOMFIELD: Hi. I’m Robert Bloomfield, professor at Cornell University’s

Johnson Graduate School of Management. Each week I have the honor of hosting a

discussion with the most insightful and the most influential people who are taking Virtual

Worlds seriously. We talk with the developers who are creating these fascinating new

platforms, the executives, entrepreneurs, educators, artists, government officials who are

putting these platforms to use. We talk with the researchers who are watching the whole

process unfold. And we talk with the government officials and policymakers who are taking a

very close look on how what happens in the Virtual World can affect our Real World society.

Now naturally, we hold our discussions about Virtual Worlds in Virtual Worlds. How else

could we find a very real place where a global community can convene, collaborate and

connect with one another? So our discussion is about to start. You can join us in any of our

live Virtual World studio audiences. You can join us live on the web. Welcome, because this

is Metanomics.

ANNOUNCER: Metanomics is filmed today in front of a live audience at our studios in

Second Life.

Page 2: 051309 Federal Interest And Social Security Metanomics Transcript

ROBERT BLOOMFIELD: Hi, and welcome again to Metanomics. Over a year ago,

Paulette Robinson, of National Defense University, appeared on Metanomics to talk about

her new initiative, the Federal Consortium for Virtual Worlds. She talked about the promise

Virtual Worlds held for federal agencies, but she also emphasized two challenges: the

government’s lack of familiarity with this new technology and the government’s strong and

understandable concern about cyber security. Today we’ll be getting an update from

Paulette on how effectively her consortium has been able to address these challenges, and

we’re also going to hear from Paulette’s colleague at National Defense University,

Rocky Young, an expert in cyber security, who has recently been doing some very

interesting work examining the vulnerabilities of Virtual Worlds.

Thanks to all of you who are attending Metanomics today, including those who are viewing

live on the web. Please do join in with your comments and your questions.

ANNOUNCER: We are pleased to broadcast weekly to our event partners and to welcome

discussion. We use ChatBridge technology to allow viewers to comment during the show.

Metanomics is sponsored by the Johnson Graduate School of Management at Cornell

University and Immersive Workspaces. Welcome. This is Metanomics.

ROBERT BLOOMFIELD: Before we get to our main guests, we’re going to take a few

minutes to pull back our usual focus on Virtual Worlds, to take a broader look at the state of

internet technology and policy. Just about every enterprise and every consumer relies on

the internet these days, but none quite so much as those who are exploring Virtual Worlds.

To us, the internet is an ocean we call home. Well, this season, we’ll be doing a fair bit of

Page 3: 051309 Federal Interest And Social Security Metanomics Transcript

oceanography and [earth?] time forecasting. Today we’re going to start in Washington, D.C.

because there are some major policy storms brewing there. To introduce us to the issues,

I’d like to welcome our new Washington correspondent, Sterling Wright, who will help us put

cyber security in the spotlight. Sterling, welcome to Metanomics.

STERLING WRIGHT: Hello, Robert. Thank you so much for having me.

ROBERT BLOOMFIELD: Yeah, my pleasure. I know you’ve been taking a close look at

S.773, the Cybersecurity Act of 2009, which was introduced on April 1st to the Senate

Committee on Commerce, Science and Transportation, by two moderate Senators,

Democrat John Rockefeller and Republican Olympia Snowe. As I understand it, the bill

draws heavily from a report by the Center for Strategic and International Studies, which

says, and this is a quote from their report from late 2008, “American’s failure to protect

cyberspace is one of the most urgent national security problems facing the new

Administration that will take office in January 2009. It is a battle fought mainly in the

shadows. It is a battle we are losing.” That sounds like pretty dramatic language. Are these

histrionics justified?

STERLING WRIGHT: Well, your delivery was certainly dramatic, Robert.

ROBERT BLOOMFIELD: I try.

STERLING WRIGHT: Well, let me tell you. In 2007, already the Departments of State,

Commerce, Homeland Security, the Defense Department, NASA and the National Defense

Page 4: 051309 Federal Interest And Social Security Metanomics Transcript

University suffered major intrusions by foreign entities. These were either foreign

intelligence services, militaries or criminal groups. Today the Department of Defense

computers are probed hundreds, if not thousands of times a day. The Department of State

said it has lost terabytes of information. The White House networks have been penetrated.

And intelligence sources claim that U.S. companies have lost billions in intellectual property.

These activities have continued to increase since then, so there’s a great deal of motivation

in Washington for the U.S. to become much more robust in addressing these threats, and,

more importantly or at least as importantly, in raising the public’s awareness of them.

There’s a sense within the broader population, when we think of cyber threats, we tend to

think of identity theft or pedophilia or something like this, but there is an increasing need to

inform the public of the threats from foreign players who many feel are intent on

undermining the U.S. economy and its defenses. So here in Washington, we’ve heard terms

like “a cyber 9/11” or “a cyber tsunami” or “a cyber Katrina” used to describe the potential for

damage. Some are even referring to the threat from cyberspace as the soft underbelly of

national security.

ROBERT BLOOMFIELD: Okay. Those sounds like pretty serious challenges that no doubt

call for some extraordinary measures. What do you see as some striking provisions in the

bill?

STERLING WRIGHT: Well, the bill is very sweeping in its initiatives. It calls for the

establishment of a Cabinet-level Cybersecurity Czar, who would be answerable to the

President. Although we have many of these czars being appointed now for various agencies

so that may not be the most pressing point. But what the bill also seeks to establish is

Page 5: 051309 Federal Interest And Social Security Metanomics Transcript

cybersecurity standards that would be mandated across all applicable government and

private networks. It would also confer new powers on the President and onto the Secretary

of Commerce.

ROBERT BLOOMFIELD: What are some of these powers? I understand--shutting down--

the President has some power to shut down internet traffic?

STERLING WRIGHT: Here’s the problem: Some of the language in the bill is extremely

broad and open-ended, and this is causing a lot of concern among civil and digital rights

groups. The Electronic Frontier Foundation, for example, and the Center for Democracy in

Technology have both raised issues with some of the provisions. You’re right, the Act calls

for the President to be given the power to shut down internet traffic in emergencies or to

disconnect any infrastructure systems or networks on the grounds of national security. And

the activists are concerned that the Act does not define these so-called emergencies.

Therefore, it is left solely up to the President to decide what merits pulling the plug. I don’t

see as much of a problem with this. It is more analogous, in my mind, to the President

grounding all aircraft on 9/11, and I’m not sure that one could have defined the emergency

of 9/11 ahead of time, but this is, nevertheless, a concern for some.

I think more than the powers conferred upon the President, what seems to be disturbing

people is that the Secretary of Commerce would be given access to all, quote, “relevant

data concerning our critical networks,” and this is the operable point, without, and I quote

again, “without regard to any provision of law, regulation, rule or policy restricting such

access.” So the privacy advocates fear that this would allow the Commerce Secretary

Page 6: 051309 Federal Interest And Social Security Metanomics Transcript

unrestricted access to our private data. Others have even raised the specter of unrelated

illegal activity being inadvertently uncovered, and these fear that such evidence could be

used against a defendant, for example, thereby undermining his or her Constitutional

protection against unwarranted searches.

ROBERT BLOOMFIELD: Well, you mentioned a term in there “critical infrastructure system

or network.” How is that defined?

STERLING WRIGHT: Typically, one would consider critical infrastructure as utilities,

transportation, public health, financial services, food distribution, this sort of thing. And I

think that, if language were inserted into the bill that simply or explicitly defined what

constitutes a critical infrastructure system, I think some of the opponents could be

assuaged. However, there are some who are arguing that the internet, as a whole,

constitutes our critical communication infrastructure, and these voices would like to see

limits defined in the Act, to assure that there are no loopholes left open which would allow

the government to reach into our private communications.

ROBERT BLOOMFIELD: And there are concerns about some user authentication

proposals as well?

STERLING WRIGHT: Yeah, there is a section that is proposing that user authentication be

studied, but at this point the bill only states that, within a year after its enactment, the

President or his or her designee, assuming his if this Act goes into effect shortly, that the

President shall review and report to Congress on the feasibility of an identity management

and an authentication program. Naturally, with the appropriate civil liberties and privacy

Page 7: 051309 Federal Interest And Social Security Metanomics Transcript

protections in place. And activists are concerned about this because although it is intended

to apply only to critical infrastructure, civil liberties groups fear that this will open the door to

anonymity on the internet as a whole being completely abolished and thereby threatening

not only privacy but also free speech.

ROBERT BLOOMFIELD: Parts of this really have a feel to me, as an accountant, of the

Sarbanes-Oxley Bill because this bill seems to be taking a lot of the power that is

traditionally held by private firms and placing it in government hands. So as I understand it,

the government would be overseeing private networks and mandating that government, not

industry, sets standards, attests to them and so on and so the comparison to

Sarbanes-Oxley. That was written in response to high-profile frauds like Enron and

WorldCom. And one of the most controversial parts was Section 404, which dealt with

internal controls. These have traditionally been viewed as a private matter for firms that

[AUDIO GLITCH] protecting themselves from employee misbehavior, but 404 basically said

you’re not doing a good enough job, and it imposed a lot of high-cost requirements, saying,

basically, government was going to set the standards for internal control and require

auditors to attest to that. Would you make the same argument here that private firms have

every incentive to protect their security, and we should just leave the matter in their hands?

STERLING WRIGHT: Well, let me clarify. The Act, as it’s currently written, would mandate

that, again, that the security standards are set for critical infrastructure. This would also

include software, and the government would be able to enforce those standards on all

developers and distributors and vendors. It would also legislate the sharing of security

information between the government and private entity. So I can understand that there

would be some concern over this from the private sector. Opponents argue that this could

Page 8: 051309 Federal Interest And Social Security Metanomics Transcript

stifle innovation, that if standardization of security were mandated across the board that the

systems would become less secure because only one protocol would have to be breached

by potential attackers.

But the fundamental issue at stake, I think, is that, among security and intelligence experts

in Washington, there is certainly the perception that the threat posed by cyber subversion is

a strategic issue that is on par with the proliferation of weapons of mass destruction and

global jihad. And it was these models of deterrence that were drawn upon in the CSIS study,

in order to craft recommendations for how the government should approach cybersecurity.

Certainly, the report’s authors--again, the report, not the bill--feel that it is the government

which needs to be responsible for overseeing this space, and they do not feel that voluntary

actions, which are most likely what is preferred by private industry, would go far enough.

They also argued that the reliance on market forces to date have fallen short, and, as a

result, the U.S. has been left vulnerable. So it’s possible that the open-ended broad,

sweeping language of this bill may simply serve to incentivize the private industry to move

more decisively on this front. There is certainly a concern against prescriptive mandates that

would inflate costs and stifle innovation or encroach on civil liberties.

ROBERT BLOOMFIELD: Okay. Well, I think we’re going to have to leave it there as a

cliffhanger, as we wonder what’s going to happen with this bill as it moves through, how

private industry is going to respond, especially the big corporate powers, not just tech, but

the industries. I’m sure the electric utility industry, for example, is going to have a lot to say

on this since they’re certainly going to be viewed as critical infrastructure. And I’m glad to

know that you’re going to be coming back to talk more about policy issues as the season

Page 9: 051309 Federal Interest And Social Security Metanomics Transcript

goes on. So thanks a lot, Sterling Wright, for talking with us about the Cybersecurity Bill.

STERLING WRIGHT: Delighted to be here, Robert. Thank you so much.

ROBERT BLOOMFIELD: Okay. I guess Sterling will be back next week when we discuss

some more policy issues. Next week we’re going to have a legal expert on Virtual Worlds as

our main guest, James Gatto, of the Pillsbury law firm, a colleague of Ben Duranske for

those of you who know him. He’s been on Metanomics a number of times, so I’m looking

forward to that.

Our main guests today are Paulette Robinson and Robert Rocky Young. Paulette is

assistant dean for teaching at the Information Resources Management College of National

Defense University. But, for our purposes, her most salient credential is that she has

organized the Federal Consortium for Virtual Worlds which supports federal government

employees and contractors that are interested in exploring the use of Virtual Worlds in

government. Robert Rocky Young is director of the National Defense University Information

Assurance Lab and teaches Information Assurance at the IRM College. So, Paulette,

Rocky, both of you, welcome to Metanomics.

ROBERT YOUNG: Oh, great. Thanks for having me. I apologize if my avatar’s been down.

I’m at a conference, and I lost my WiFi.

ROBERT BLOOMFIELD: Okay. Well, I understand these things happen. And, Paulette,

welcome.

PAULETTE ROBINSON: Thank you very much.

Page 10: 051309 Federal Interest And Social Security Metanomics Transcript

ROBERT BLOOMFIELD: So before we get started, I’m sure both of you want to make

some kind of disclaimer that everything you say here is just your own opinion. It doesn’t

represent an official position of your college or the federal government. Paulette, you have

anything to add to that disclaimer?

PAULETTE ROBINSON: No, that’s pretty much right.

ROBERT BLOOMFIELD: Okay. Just wanted to make sure we did that. So now let’s start

with you. You were on Metanomics way back in January of ’08 so well over a year ago, and

NDU was just starting to build a presence in Second Life. The Federal Consortium for

Virtual Worlds had held, I believe, only one conference at that point. Can you give us an

update on how the Consortium has progressed since then? Growth and so on.

PAULETTE ROBINSON: Well, since I was last here, probably, we had a November

meeting in 2007, that had about 200 there and about 300 or 400 online. In April of 2008, we

had our first big meeting. It was a two-day conference, and we had on the campus almost

400, and we had online over 1,000 in Second Life. So it was interesting to see how many

people were there. We had vendors that came in and showed the different parts of what’s

happening in Virtual Worlds. We had panels and--was represented, so it was really a very

enlightening kind of conference. There were over 1,000 people. We now have over 1,000

people in our database that are not only government but industry and academics because

all together is when we’re going to make a difference. We have people from all the 12

Cabinet agencies, so we have a full complement of government represented at different

Page 11: 051309 Federal Interest And Social Security Metanomics Transcript

levels in the Consortium so it’s really moved along.

[AUDIO GLITCH] projects this year at our conference, we had a government poster session

where we had over 30 government projects that were showing what they’re doing in

different Virtual Worlds. We streamed out [six?] different Virtual Worlds and had over 1,000

that were attending. We’re still taking the numbers so I can’t give you exactly, online. So we

really had an interesting mix of people that joined us on our program.

ROBERT BLOOMFIELD: Well, I’ll say I was there. I had a great time. It was incredibly

informative. Now last time when you were on the show, there was a question by

Malburns Writer, a fairly regular attendee of Metanomics, and, in response to his question,

you said the following: “If you talk to high-level administrators, you would think Second Life

is a foreign land. I think they’re stunned.” And so now I see you are actually nominated for

the 2009 Intergovernmental Solutions Award, and you’re talking about the growth of the

Consortium. Is it safe to assume that high-level government administrators are more familiar

with Virtual Worlds and are more ready take it seriously?

PAULETTE ROBINSON: I think they’re more familiar with them. I know that one of the

Senate Subcommittees had met in Virtual Worlds, one of them from Commerce, so there is

more of an awareness. How seriously they take them, I think that’s not across the board, but

several understand immediately. I think educators, training officers automatically see the

power of it. And now that we have a new Administration, I think there’s also a renewed

interest of finding ways to collaborate and communicate online. So I think there’s a renewed

interest in what Virtual Worlds can do. But there’s still always the problem with security so

Page 12: 051309 Federal Interest And Social Security Metanomics Transcript

that has to be fixed before there’s a real interest. Although, at every conference I go to, I ask

the audience, “So how many of your children are in Club Penguin or Webkinz?” And about a

third raise their hands, so I think some these new administrators are becoming acquainted

with what a Virtual World is through their children or grandchildren.

ROBERT BLOOMFIELD: Yeah, I believe that. Now, on security, which you just mentioned,

I understand the U.S. Department of Agriculture, of all places, is providing a solution.

PAULETTE ROBINSON: Yes, we’re working closely with the USDA and the CIO there to

create a trusted-source hosting solution that will be hosted at their data center in Kansas

City. We’re using eAuthentication level 2 to ensure identity. So one of the problems is, who

is in the space? Are they who they say they are? The second problem is, for all these Virtual

Worlds, ports have to be open, and it depends on how many ports so the Enterprise

versions of Virtual Worlds--and this is not like Second Life in the public spaces which offer a

different kind of security problem. We would then be able to provide secure IP’s that we

would ask CIOs to open to very specific IP’s for these Virtual Worlds. That’s still being

worked out with those as well as the USDA, but we do have the prototype up. We have a

couple of vendors that are integrating eAuthentication for this prototype, to see how it’s

going to work.

So we have a lot of hope. There’s many federal agencies that were at the conference that

are interested in investing in the next stage, to be able to do something that’s multi-agency.

Enterprise versions work well behind the firewall within an agency so then you don’t expose

yourself to the same issues that have to be solved with interagency dialogue, and that’s

Page 13: 051309 Federal Interest And Social Security Metanomics Transcript

what I’m trying to work on. I want multiple agencies being able to talk to each other.

ROBERT BLOOMFIELD: You mentioned a couple. You said you’re working with a couple

vendors, that’s what ProtoSphere and Forterra?

PAULETTE ROBINSON: Yes.

ROBERT BLOOMFIELD: ProtonMedia and Forterra. How about Second Life for the trust

it’s source-hosting?

PAULETTE ROBINSON: Well, Second Life has the unique problem of having ranges of

ports that have to be opened. So even though you would take it behind the firewall, unless

they get it down to a couple of ports, it would be extremely difficult to secure, or more

difficult, and it would be difficult to take CIOs from the governments and convince them to

open up ranges of ports. And I don’t blame them. So an Enterprise solution really has to be

where they run over port 80 or only a few ports as a solution because of the need to protect

the network.

ROBERT BLOOMFIELD: Okay. Despite the fact that Second Life is working on their--I

guess it’s code-named Nebraska, their behind the firewall solution, it still isn’t going to work

for you?

PAULETTE ROBINSON: Well, not for a multi-agency. It probably would work well for

behind the firewall if it’s just within an agency where they’re not going out and opening up

Page 14: 051309 Federal Interest And Social Security Metanomics Transcript

ports. But nowadays, most of the government problems are really multi-agency based, so

unless you run like an internal chat tool in 3D or that kind of workspace or training space, it’s

not going to solve the problems that we need in terms of a robust environment that has a

sense of presence that we can work in across the government.

ROBERT BLOOMFIELD: Okay. That was mostly focusing on the [behind?] firewall

trusted-source hosting. But there are a lot of federal agencies that are working on what I

understand government types call forward-facing projects, public relations, outreach, and

they want anyone to be able to go into the World. I know that there are a lot of these now in

Second Life: NOAA, NASA, Air Force, Team Orlando, which I actually had a great talk with

at the conference. So how are they dealing with the government security issues, while still

using Second Life in what’s largely an unsecured environment?

PAULETTE ROBINSON: Well, they have to go either go home and work on them, or their

CIO has agreed, or their person that mitigates risk for them has set up an enclave off the

network that allows one or two stations to work on Second Life because that’s part of their

job. But that’s really rare. Most people that are working in Second Life, from their

government desktop, cannot do it from their government desktop. They have to go home, on

their home computer, and work on it because they also have to download a client, which, in

most federal agencies like any other corporate enterprise, they have a desktop image that is

regulated for security and for manageability and integration, so most of them work at home

or on their own private computers.

ROBERT BLOOMFIELD: Okay. Well, really distinguishes between the day job and the

moonlighting there, huh.

Page 15: 051309 Federal Interest And Social Security Metanomics Transcript

PAULETTE ROBINSON: Yeah. Probably not moonlighting. They just tele-work or find some

other way to do the work.

ROBERT BLOOMFIELD: Right. Now, Rocky, I’d like to bring you into the conversation. So

thanks so much for joining us. It sounded like you were saying you had a bit of wireless

problem. So I don’t know what we’ll be seeing on our screens, but we have you on your

Blackberry. Is that right?

ROBERT YOUNG: Yes, I’m on my Blackberry. I’m at the National 2009 OpSec Conference

down in San Antonio, where we’re actually educating the people on cybersecurity down

here.

ROBERT BLOOMFIELD: Well, it won’t be the first time we filmed an empty chair on

Metanomics. It’s the content that drives everything. Your specialty is security, and I guess

first I’m wondering what do you see as being the primary risks of having federal agencies

using both the public Worlds and the private Worlds, the trusted-source hosting solutions?

What is the exposure that the federal agencies and the people who are doing this have?

ROBERT YOUNG: Well, you know that on security, we’re always the “no” men. We’re

never the “yes” men. We’re always saying security. But I agree with Paulette that the

forward-facing and some of the things that you’re talking about for doing some type of

publicity or something like the Air Force trying to bring people in, that’s great. The issue is

that people are having to do it day to day. They’re having to use Second Life, in their job,

and they’re a federal employee, the recommendation that Paulette had said and what we’ve

Page 16: 051309 Federal Interest And Social Security Metanomics Transcript

built at _____ is an enclave. It’s a specialized area that will not bring the problems from

Second Life and/or these Virtual Worlds onto our government systems which might be your

production government system doing your national war-fighter job or maybe doing IRS tax

returns; I’m not sure what your job may be.

And Paulette’s agreement with the multi-agency, all of our problems are becoming multi

because we’re so interconnected. Our networks have no boundaries anymore. So in order

for us to make sure that we don’t have a [problem?] that say DOD brings in, it doesn’t bleed

over to your EPA and your FAA and your DOT. Some of the agents are doing exactly what

you said. It’s all bound to the software, the compliance and the server, and, as Paulette had

said, we have the HBSFO(?) [base?] security system in the Department of Defense. It’s

actually locked down for a specific reason, to protect us to the best of its abilities again. And

[AUDIO GLITCH] people on these systems doing these things, and the issue is, we have

government people now, insiders, that actually are doing things that they’re not supposed to

do. We know appropriate use of the network. We know appropriate function.

Our worry is that as they get into Second Life and these other 3D Virtual Worlds, that

sometime they forget that they’re at work. They may accept something that they wouldn’t

normally do in the other world. But it’s all down to the software and evaluating the code and

evaluating what that server-client relationship, what it has allowed in and out. And as

Paulette said that the ports, what ports are we opening, and we watch them closely. Can we

monitor what’s going on in this Virtual World? And the identity management looks huge for

Paulette and for everyone else. Am I talking to who I really think I’m talking to? Do you have

a federated ID or some way to say that, yes, you are indeed speaking to Dr. Rocky Young.

Page 17: 051309 Federal Interest And Social Security Metanomics Transcript

No one has taken over the avatar. No one is misrepresenting or social engineering you to

get information out of you.

There’s so many ways to do social networking, and Paulette works through all of those at

IRMC. And I just want to be person who says, “I want you all to go into these Virtual Worlds

as security professionals, but I want you to understand the risks when you go into them and

accept that risk that something could happen.” And, as long as you’re aware and you accept

it, then you’re standing there when they reference it so that E-9/11 and these other, you

know, the E-Pearl Harbor that may happen. We’re not saying, “Gee whiz! We never thought

of this,” or, “Gee whiz! I had no idea this could happen.

ROBERT BLOOMFIELD: I was at your talk in Washington, D.C., at Fort McNair, and you

said some fairly terrifying things about the use of Twitter and Skype and a lot of other things

that are kind of meat and potatoes to a lot of us who spend so much time collaborating by

distance. Could you clarify for us a little what you see as the risks of those tools? And then

is there something about Virtual Worlds that makes them more of a concern?

ROBERT YOUNG: The big issue with your Skype and your other tools, it’s a voice of our

[PCHK technology?], and we can gather that, unless you’re going to encrypt it. And

normally, for us to pass through the Virtual Worlds, you can’t have as much encryption; it

slows things down. It causes problems. It depends on what you’re doing in the Virtual World.

Say that you’re my adversary, or I wanted to take your job or immerse you, and the biggest

thing is reputation. Your reputation can be destroyed in seconds in any online avenue. The

issue is, if I can gather all the conversations about you and you’re doing something

Page 18: 051309 Federal Interest And Social Security Metanomics Transcript

inappropriate in a Virtual World, you’re a government employee. I know who you are even

though you say you’re someone else. I could actually use that to blackmail you.

And there are tools that we can use in the Virtual Worlds to build some bots to actually

gather all the traffic that’s going on in the room, find all your movements, to record

everything you do, and I would blackmail you with it. Now if you put it on a different

[forums?], that I’m not talking to a government employee, you have to worry about you

family, your daughter. I have a ten-year-old daughter. The big issue is what is she doing in

that Virtual World? Who’s following her? With Twitter, we can tell exactly where you are

because you’re going to tell us in that 140 characters, “I’m here, I’m doing this. I’m here, I’m

doing that.” It links back to your phone. It links through the Virtual Worlds. There are ways

for us to find out exactly where you are. So it’s like we can do E-stalking if we want to. Now

that’s not a big concern for me. I’m a 6’-5” [AUDIO GLITCH]. But for someone, like a

ten-year-old girl, for the E-bowling and things like that, Twitter and some of these other

technologies, they all combine in, and you get so much information about people.

On your cameras, you actually get [AUDIO GLITCH] data on every picture. So say you load

up a picture into Second Life, that you took of yourself. There can actually be GPS

coordinates in that data of that picture that will tell me where you live or where it was taken.

It can actually have information in the picture, and it’s all under Digital Forensics, if your

listeners have an interest. In the information that goes with that camera, that photo, that

picture, I can find out GPS coordinates. I can find out with the WiFi access points where it

was loaded. And, if you’re dumb enough to load in your email address or register it,

sometimes that is in the photograph information. For me, it’s really awareness--

Page 19: 051309 Federal Interest And Social Security Metanomics Transcript

ROBERT BLOOMFIELD: So here we’re not really talking about hacking. We’re not talking

about who’s trying to carve their way into your system, it’s really just people unwittingly

giving away all the information that others might want.

ROBERT YOUNG: All that, yeah, for a social [aspect?], yes. Now, I didn’t even delve into

the hacking. Every time you accept something from someone else in a Virtual World, which

we were just demo-ing Virtual Worlds to a bunch of students before I leave the room. Every

time you accept a piece of code from a [AUDIO GLITCH] accessing whatever they give you,

and you don’t know what that piece will do. It may be making you dance. It may be making

you have butterfly wings, but you don’t know what that tool or that piece of code really does.

Maybe it’s actually installing a route kit on your system at the same time that it’s making you

dance. Maybe it’s copying every one of your conversations or it’s going in and looking for

your password file on your core drive. There are a lot of things that, when you accept

something in a Virtual World. I tell my daughter when someone says, “Knock, knock,” in

Second Life or when we’re in someplace, you do not say, “Who’s there?” because you are

opening a communication between you and them, and you can accept things from them or

they can push things to you. [AUDIO GLITCH], our avatar into sandboxes, and, in the

sandboxes in Second Life, we watch what they’re doing and what they’re building and what

they’re making, to try to get insight into what they’re doing.

The big danger is the code. That when you’re in this Virtual World, and you accept an MP3

from someone in these Virtual Worlds or in these social working sites, we with

MP3Stego--MP3Stego, it’s _____ triplets out there; go look it up--you can load things in

Page 20: 051309 Federal Interest And Social Security Metanomics Transcript

MP3’s, and the MP3 still plays the music. So why not, if I’m targeting you, offer you a free

MP3 of Biance’s new song? And don’t tell anyone that I gave it to you because it’s

copyrighted music. You’re not going to tell Mom and Dad that you took that MP3 and loaded

it into the system, but that’s actually bringing malware into the system. And, if I can’t get you

electronically, maybe I just hand out free music at the bus stop where I know your kid is, and

that’s how I’ll get into your system.

ROBERT BLOOMFIELD: It looks like Dusan Writer, through our web audience chat has,

you know, he--my advice on all this is to do what I do: Make your life so boring that no one

wants to steal any of your identity or know anything about you. It seems to me that a lot of

what you’re saying--I mean, to some extent, there’s just some common sense here, but

some of it also sounds like basically if you want to have any sort of public profile, you’d be

putting yourself at risk. How do you balance trying to remain secure and protected, while still

having a [AUDIO GLITCH]?

ROBERT YOUNG: You have a bit of a risk [acceptance?]. You have to assess the risk and

accept it. If you’re going to put your face out there, you’re going to put your images out

there, we build a fake email address for every one of our avatars, that only that email

address is used with it. So you kind of build, like you said, that common sense. And you

don’t put personal pictures of yourself out there, of your kids and stuff. The issue is, I still

want you to go into Second Life. I want you to do these things, but I want you to be aware of

the dangers that are out there. Because many times people that jump into computers, like

my mom is 65, she doesn’t understand when someone IM’s her and that they can actually

push code to her and actually take her system out.

Page 21: 051309 Federal Interest And Social Security Metanomics Transcript

And we all have bank accounts, right? We all are using online banking. And there’s a tool

called SSL split that you need to look at about “man in the middle” attacks, with SSL. We

think that we’re secure when we log onto our online banking. Well, go look into that tool, and

you’ll see that we’re not so secure. I want everyone to know that, “Hey, you need to be

aware of yourself.” There needs to be this my own checklist, to make sure that I’m ready to

go into Second Life, what I’m ready to put out there and that risk acceptance because any

time you put yourself out there, there’s going to be some risk, as Paulette will tell you. But it

depends, if someone is in these Virtual Worlds actually portraying themselves as something

they are not, a terrorist or something, trying to find out about Sergeant Snuffy’s deployment

to Afghanistan or Iraq, now we’re talking about Real World operation security, OpSec. So

that’s that I have.

It’s like what are you using it for? What [AUDIO GLITCH] people you are? Are you doing

inappropriate things that could be used maybe to blackmail you? And, really, it’s more like

your digital presence, are you ready to jump headfirst in this pool? Or do you just dip your

toes in, see how it is and not put everything out there? A good example is, my niece had her

prom this weekend, and all of a sudden, on Facebook, all of her pictures are out there. And I

showed her how you can get that [AUDIO GLITCH] those pictures by copying them and

downloading them. So these are the big things. It’s just awareness. I really do want you to

go into Virtual Worlds. I don’t want to be the security guy that stifles everybody and say,

“No, don’t do it. Just go into your house, and sit in a dark closet, and you’ll be safe.”

ROBERT BLOOMFIELD: And, Paulette, in light of all of these issues, how is this coloring

Page 22: 051309 Federal Interest And Social Security Metanomics Transcript

not just what agencies are doing in Virtual Worlds, but how you make the pitch and just sort

of comfort to agencies that are just starting to explore it, that this is a reasonable thing to do

and the risks that it carries are appropriate?

PAULETTE ROBINSON: I think it’s what you want a Virtual World to do for you, so it’s

really deciding what type of outcome you want and how you want to use it and then sitting

down and having a discussion about what the risk is and how to mitigate the risk. So for

most agencies that want to do information delivery to the public and be public facing,

Second Life has become probably the predominant Virtual World that they’re using. So we

have created an IRM college-government center in Second Life, where anyone in the

government can use this center free for meetings and for streaming conferences, that type

of thing. They’re not doing the business of government particularly in there, but they are

meeting more informally across agencies and having conference meetings. Like MuniGov

just had a meeting there. We streamed our entire conference, that type of thing.

So I think there are ways that government’s using it. The Air Force’s pilot--they’ve done

rapid prototyping in there. So if I want to look at something very quickly, as long as it’s not

classified, there’s interesting ways to get public opinion on government buildings, on certain

types of initiatives I think you could get some interesting input. Public diplomacy: The State

Department uses it. William [May?], over at the State Department, is doing interesting

things. NASA’s got some real cool stuff. Eric’s in the back, Eric Hackathorn from NOAA.

He’s done some interesting work for the public, to just use it as an educational mechanism,

so I think that works really well. They don’t do it off of government networks unless special

arrangements have been made with their CIO or they work from home. So they just try to

Page 23: 051309 Federal Interest And Social Security Metanomics Transcript

make it work for them.

ROBERT BLOOMFIELD: I actually see Eric chatting away in the audience. Hi, Eric. A

couple things: First a shout out. I really liked Eric’s--he had a poster at the Consortium

conference at Fort McNair about the “goverati,” like the literati, but the people who know

about government, which I do view as an incredibly helpful resource, because just dealing

with policy and government types for a couple days made me realize I really don’t

understand sort of the intricacies of how things get done within and between agencies. And

then the other thing, I wanted to ask you to respond to something that Eric is saying in chat,

which is, he says, “Rather than getting caught up in the details, it’s really a change in

philosophy and orientation trying to be more open. It’s a cultural shift to openness,” he says,

“that we need to support.” And so one question, Paulette, I have for you is: The Obama

Administration has certainly been vocal about wanting transparency. Do you see that in

action, and do you think it’s going to translate into funding and formal support for these sort

of public Virtual World projects?

PAULETTE ROBINSON: I think, from my observation, this year our conference was

different in that people were ready to invest money in Virtual Worlds and what they could be

used for, for a variety of reasons: education and training, analytical workspaces, a variety of

things. In the past, I think there has been a reluctance to use them simply because there

was a worry about what type of information can be made public and what couldn’t be made

public.

With Obama coming into office and his Administration, because they’ve used social media

Page 24: 051309 Federal Interest And Social Security Metanomics Transcript

and software and communication, they’re encouraging people in the government to find

ways to use it. And one of the things we’re all grappling with is secure ways to use that,

where we protect the citizens’ data, but also get input from the citizens. So what Virtual

Worlds are going to offer for the citizen in transparency, I think, at the first level, we have to

find a way to secure it to do government work.

But the next stages of this is really going to be outward facing Virtual Worlds that are

secure, that we can bring citizens in to do the business of government and also to help

inform the public. So I think it’s going to be a mixture of Wikis and blogs and Virtual Worlds

and ways to communicate with the public. And now that there’s more of a willingness to

entertain this, I’ve seen money starting to be put toward those efforts.

ROBERT BLOOMFIELD: I don’t want to put you too much on the spot, but when you talk

about money, can you give us a sense of what you think the funding might be over the next

year or two? I know you’ve been working a lot with training in and between federal agencies.

Can you give us a sense of how many users you think might get involved in Virtual Worlds

through the government?

PAULETTE ROBINSON: One of the issues are is making sure it’s a secure environment,

that we don’t risk--where there isn’t any network risk to the agency and to the data that we

are responsible for. So once this is put in place, I think, for example, there’s interest in

building IT security course for the government. We’re all required in the government to take

a basic IT security on what phishing is and what spam is and what to avoid and what to

work on. And so every agency pretty much is developing their own. And, quite frankly,

Page 25: 051309 Federal Interest And Social Security Metanomics Transcript

they’re pretty boring. They’re just really pretty boring. So one of the possibilities is creating

IT security that’s interesting and interactive in a Virtual World and then making it available to

the entire government so we get economies of scale. So once that happens, you’ll have

thousands of people in these Virtual Worlds. So I think you’re going to start seeing that kind

of process happening.

We have ethics training that all of us are required to take, and that too is pretty boring. So

when that becomes possible in a Virtual World, where it’s interactive and more interesting, I

think you’re going to see everybody want to come onboard. So we’re going to have

economies of scale, in terms of different kinds of use cases. We’re creating a community of

practice for the chief financial officer community in Virtual Worlds so they’ll have a

knowledge base and be able to work together on complex problems. But it’ll be in a secure

place.

ROBERT BLOOMFIELD: If everyone in the government is going to need some sort of

cybersecurity training and they’re finding it more interesting to do this in Virtual Worlds, I

mean you’re probably then talking tens, hundreds of thousands of people coming into Virtual

Worlds to do that.

PAULETTE ROBINSON: That’s correct.

ROBERT BLOOMFIELD: Okay.

ROBERT YOUNG: I would agree with Paulette wholeheartedly because the training right

Page 26: 051309 Federal Interest And Social Security Metanomics Transcript

now is really boring for information security. And, if you could make it interactive, to have

someone walk into an environment and see laptops secure; it’s the other things. And I think

Paulette’s totally correct about using the Virtual Worlds for training. We’re using it for

biological and other explosions, what can happen in this environment, what happens when

you have a nuclear biological incident. And we’re using it for training of soldiers. As they’re

going into these cityscapes, they can actually figure things out, do assessments. So for

training and education, I think it’s wonderful, and it’s a great way to--behind the firewall we

can actually set up an environment that’s secure and use it, and, as Paulette has said, as

we do shares between the agencies and the CIOs, maybe it’s going to be an intranet

between the dot.gov and the dot.mil so we can do it securely and work together. I think

you’ll see a major explosion, like she said, economy of scale. If I can use the ethics training

throughout the entire federal government, then we’d all be able to do the same exact thing.

But it’s going to be that question of getting it somewhere where it’s secure, where I can’t

hack into it in the middle of your ethics training, something unethical occurs because I made

it happen.

ROBERT BLOOMFIELD: Paulette, we have a question from Fleep Tuque, Chris Collins,

from the state of Ohio, “For academic institutions who want to collaborate with government

on Virtual Worlds research, what office is the best place to contact and look for more

information?”

PAULETTE ROBINSON: At the moment, my group’s become sort of the hub for federal

government and doing work in Virtual Worlds. One of the reasons we have academics in the

Federal Consortium is because we believe that they provide an interesting venue for

Page 27: 051309 Federal Interest And Social Security Metanomics Transcript

research and helping us reflect on what’s best practices. There are a variety of agencies

doing work with universities. Our particular--our instance in Second Life was created by a

university, and we’ve gotten a couple of papers. I’m co-editing a special issue of the Journal

for Virtual Worlds Research, where we’re going to be accepting some research papers, but

also some project type of papers. If somebody’s interested, they can contact me. Some of

the federal government projects are looking for research partners as well, so they can join

the Consortium in our Wiki and asks those kinds of questions in the Wiki.

ROBERT BLOOMFIELD: Okay. Great. We’re coming toward the end of our hour. Rocky, I

don’t know how much you can talk about this, but I’d love to hear a little bit more about your

lab at the college and how you’re using it to learn more about the security of Virtual Worlds.

Can you give us a sense of what goes on in that lab?

ROBERT YOUNG: Sure. Actually, we’re looking into many of the Virtual Worlds, including

Second Life, There.com, some of the other PlayStation Virtual Worlds. And what we do is,

we go in with our avatar, Betwinda, and we actually go in and try to get people to hack us,

and we try to capture what happens, look at the code, evaluate it. And just ten [minutes?]

ago, we released students here. We actually reviewed the dangers of Virtual Worlds, what’s

out there, so they’re aware of the Virtual World, and, like you said, we actually told them

what a Virtual World was. They didn’t know. So we brought them into the lab, but we do not

feel safe enough to let students venture into Second Life alone because I cannot control the

content. We went into a couple places. We did go to IRMC, which is a protected island. We

have our own island that Paulette manages and runs and took them there to show them

what was going on.

Page 28: 051309 Federal Interest And Social Security Metanomics Transcript

But then we took them out in the wild and showed that, within like three to five seconds,

people were actually already offering up tools. And I said, “Now we could look at this and

see what’s actually in this code and try to figure out what it is. But when you accept

something, hopefully, you’ll see a message that you accept it.” That’s what we’re trying to

show them. Was it a route kit that was passed to you? Was it just a piece of digital clothing?

Or was it just a sound or an action? And that’s a big thing is, don’t be hyper-paranoid, but

also be aware that, when you accept something, it’s no different than expecting something

that someone’s baked for you. If you don’t know who it is, you’re not going to accept

something that you don’t know what it is and eat it. So we just tell [AUDIO GLITCH] take a

bit of a chance. But we are using Second Life and a bunch of the other Virtual Worlds.

Forterra is going to give us one World that we can actually put behind the firewall and bring

students in securely. We also have a World of Warcraft, like a Virtual World, that we’re

bringing students in to show them a little more fun. Because we don’t want security to not be

fun. We really enjoy it. So we bring them into World of Warcraft and show them, like on

eBay how you can buy gold levels and how you can buy different levels and how there is an

entire market out there of cyber crime going on in some of these Virtual Worlds. So it’s kind

of an awareness thing for them and also to know, if their kids are out there, you need to

keep an eye on what they’re doing in Virtual Worlds, and if they’re using the same systems

that you’re using for banking and for your tax returns and for all your private pictures, you

may be actually loading route kits and other things, unknowingly, to them, of course, but

unknowingly be loading malware or a home system that you use for everyday use. In the

laboratory, all of our systems are scrubbed. We use virtual machines. We bring up a virtual

Page 29: 051309 Federal Interest And Social Security Metanomics Transcript

machine. We launch into the Virtual World, and then we have a bit of protection between us

and the actual clients of a relationship.

ROBERT BLOOMFIELD: We have a member of the audience, Al Supercharge, who feels

quite confident that the Second Life viewer cannot install a route kit. Do you want to respond

to that?

ROBERT YOUNG: Sure. I would need to know who he was before I starting telling him

exactly how we know what it can do, and then we could exchange credentials, and then I

would tell him how it did it. Because that’s the big thing is, when your adversary’s using new

tools against you, you don’t run out and say, “Hey, we found this neat thing. We know it,”

because we want to do the same exact thing to them. We want to watch what they’re doing,

to see how they’re using the tool against us. You don’t put all your cards on the table. When

someone’s using a tool against you, you watch what the tool’s doing. That’s the same thing

we do. We get it into a network. We load what we need. We put a back door, and we

observe and find out what we’re going to do.

My thing is now the kids are being hacked, actually the young children, because their Social

Security numbers are still clean and so are their bank accounts because they haven’t had

them yet. So now you need to look at your kids are being the targets, not you. Your Social

Number’s already out there. A bot collected it years ago. And your credit card numbers are

already out there. But your kids are new clean accounts that are being collected and kept.

ROBERT BLOOMFIELD: Interesting. So time for one more question for each of you, and I

don’t know, Rocky, if you can answer this, but you used the words, “if you’re doing it to us,

Page 30: 051309 Federal Interest And Social Security Metanomics Transcript

we want to try it on you.” Sonja Strom has a question, “Does the U.S. government use

Virtual Worlds to gather information about people? And what’s going on in other countries?”

And I guess I’m wondering more generally: Is your role looking at cybersecurity at all more

offensive than simply defensive?

ROBERT YOUNG: I can’t really answer that question because, remember, I teach at the

National Defense University. I’m in Information Assurance. I’m a professional. I have

credentials and all that. I would never do anything illegal in the Virtual Worlds. What we do

is watch, but the question that you asked is perfect. Wouldn’t you do that exactly if on your

adversary, if you were a government and you knew things were being done to you? Would

you not do the same thing and watch on the other side? If you don’t know your enemy and

you don’t know how to defend against the attacks that are happening to your network, how

could you ever possibly defend? If you don’t know what the heck they’re doing, how could

you defend? That’s like trying to screw a light bulb in. If you’ve never see a light bulb, how

can you possibly know how to screw it in?

ROBERT BLOOMFIELD: Okay. Thank you. And, Paulette, my last question for you, and we

talked about this a little in the pre-interview, is, I’ve been dealing with Virtual Worlds, it

started out as a small part, just sort of a sideline of the research and teaching that I was

doing and over the last couple years has grown like kudzu or bamboo, and it really

establishes a foothold. I’m wondering, for you personally as an assistant dean at NDU, and

NDU more generally as an organization that is doing inter-agency training, how do you see

Virtual Worlds taking hold? Again, in your personal life and in the college as a whole.

Page 31: 051309 Federal Interest And Social Security Metanomics Transcript

PAULETTE ROBINSON: Well, in my personal life, I find Virtual Worlds one of the most

exciting places. I am also sitting for teaching, learning and technology so I’m responsible for

appropriately integrating technology into our courses in ways that help to facilitate students

learning. I think Virtual Worlds are incredibly interesting, in terms of from an instructional

design point of view and engaging students. I think it’s incredibly interesting, in terms of

using technology for analytical workspaces and doing our work in the future. So I find myself

more and more involved in Virtual Worlds. I personally believe that Virtual Worlds will be the

interface for the web, and it’s not going to be that far down the road.

And I think it’s a responsibility for me and others and the government, as well anyplace else,

particularly the government, to not let this happen to us, that we really can interact with the

citizens in ways where we can meet them, where they gather information. It’s taken over--I

like the kudzu metaphor--it’s really taken over a life of its own in my life because I value and

am committed to it. And so I am like a cheerleader. I’ve been cheering away, and the band’s

been following along.

ROBERT BLOOMFIELD: Well, go, team, go! And we’re glad to have you. The only thing is,

that makes it sounds like you’re on the sidelines when actually I think you’ve taken the ball

and started running with it.

PAULETTE ROBINSON: That’s pretty much what I’ve done.

ROBERT BLOOMFIELD: Thanks so much to both of you for coming on, and I look forward

to having you come on again in another year and tell us where you are then.

Page 32: 051309 Federal Interest And Social Security Metanomics Transcript

PAULETTE ROBINSON: It’s been a pleasure.

ROBERT YOUNG: Thanks so much.

ROBERT BLOOMFIELD: Thank you. Okay, now it’s time for my regular closing comment,

Connecting The Dots. And today the dots I want to connect are the ones that define the

outer boundaries of Metanomics. Our challenge is to define those boundaries broadly

enough that we can remain an influential voice for our community, people who are taking

Virtual Worlds seriously, as that community grows, as the technology grows and as it, like

kudzu, starts taking over more and more aspects of not just technology, but of our work and

social lives. On the other hand, we still need to be narrow enough that we’re not attempting

to be all things to all people or, even worse, trying to become experts in everything. There

are countless podcasts and webcasts about the internet as a whole, but I’m proud to say

there’s still only one Metanomics, and we want to keep that position as a leading voice in

this growing industry.

The heart of Metanomics remains, I think, as I defined it back in September of 2007:

business and policy in the so-called Metaverse of Virtual Worlds. What is a Virtual World?

Every conference I have attended and Paulette, as well, includes a heated debated on the

definition of a Virtual World. Does it need three dimensions? Does it need avatars? Does it

have to have commerce? Are games Virtual Worlds, or are they something different? These

debates are more of a blessing than a curse for Metanomics, and I take, personally, a very

broad perspective on this. As long as someone has a reasonable justification for calling a

platform a Virtual World, Metanomics is going to be there to take a good look at it, try to

Page 33: 051309 Federal Interest And Social Security Metanomics Transcript

understand who’s taking it seriously and what they are getting out of it.

But it’s more than just defining Virtual Worlds. We also need to decide when we should be

spending time on the business and policy of the internet as a whole, as we did earlier today

with the Cybersecurity Act, and, more generally, looking broadly at social movements that

might be affected by technology. As I mentioned at the top of the hour, just about every

enterprise and consumer relies on the internet, but none quite so much as those of us who

are exploring Virtual Worlds. To us, and especially to people who have immersed

themselves in Worlds like Second life, the internet is an ocean we call home. So we won’t

be covering just any internet technology. We’re going to continue to view this ocean through

the lens of our particular school of fish.

So for example, for many users of Virtual Worlds, social networking sites, like Twitter, Plurk

and Facebook, are really just an integral component of their businesses and their personal

lives. And we can’t understand how these people are taking Virtual Worlds seriously, without

understanding how they’re using these new technologies. From today’s conversation with

Paulette and Rocky, you can see that there are a variety of cybersecurity issues that are of

particular interest to Virtual World users, and we’re going to continue taking a close look at

the practices and policies that can protect us from tropical storms and determined sharks.

And, finally, we’ll be casting our policy net more broadly than that. We can’t understand the

business case for Virtual Worlds, without understanding, for example, the recent energy bill,

which may make carbon emissions far more costly than they are now. Whether that’s a

boon for Virtual Worlds is, I think, a more open question than many Virtual World users

Page 34: 051309 Federal Interest And Social Security Metanomics Transcript

seem to think. Sure, traveling is expensive, but Virtual Worlds have their own carbon

footprint, and I don’t think we yet have a good handle on just how big those feet are. So this

is going to be an exciting season for Metanomics as we grow into the new resources

Remedy Communications is bringing to bear. So I invite you all to come on in. The water’s

fine.

That’s all we have for this week.

Join us next week when we take a look at some legal issues, with James Gatto, of Pillsbury

law firm. We’re going to look at topics, including current patent battles. Some of you may

know of the Worlds.com, a battle going with NC Soft. We’re going to talk about terms of

service, intellectual property rights, protections for children. And relevant to what we’ve

discussed today, the legal liability that Virtual World developers, as well as users, might face

due to breaches of security and other failures.

Thanks to all of our staff members and volunteers who help us pull this off every week. This

is Robert Bloomfield signing off. Take care. And, we’ll see you all next Wednesday.

Document: cor1058.doc

Transcribed by: http://www.hiredhand.com Second Life Avatar: Transcriptionist Writer