Tuesday, May 1, 2001

Protecting against the emerging threat of PDA viruses

.KEYWORD threat
.FLYINGHEAD HANDHELD SECURITY
.TITLE Protecting against the emerging threat of PDA viruses
.FEATURE
.SPOTLIGHT FIGALT cover.gif
.SUMMARY Independent researchers at the University of Colorado have evaluated four of the leading anti-virus software programs for Palm devices and have issued their findings exclusively to PalmPower. In this very important article, they detail the factors increasing the vulnerability of PDAs to viruses, describe recent attacks on such devices, and discuss methods of delivery for viruses to a PDA. Finally, they will show you the best anti-virus solution available, based on their specific evaluation criteria.
.AUTHOR Jessica Lee, Nick Idler, Krista Casady, and Matthew Gundersen
Given the relative newness of the phenomenon, many businesses and individuals have not yet addressed the security threat of viruses attacking PDAs (Personal Digital Assistants). However, as mobile devices become an integral part of everyday life in the twenty-first century, the threat of attacks on these devices will grow.

Analysts at the Gartner Group (at http://www.gartnergroup.com) expect crippling viruses to begin attacking PDAs by the end of 2001. Ken Dulaney of the Gartner Group has declared that virtually all companies are "totally unprotected" from virus attacks on mobile devices.

Do Kim, lead engineer for McAfee’s Wireless Security Center, believes that many people will undergo substantial losses if they leave their PDAs unprotected. "Many people I know carry their lives on handheld devices. A lot of these devices contain very sensitive documentation," Kim says.

As a result, anyone who uses a PDA should be concerned. Businesses that use the devices for enterprise applications should be even more concerned. The damage that mobile viruses could inflict is enormous, especially since most handheld computers don’t have security for mobile applications.

.H1 Purpose
The threat of viruses infiltrating handheld devices will increase as the popularity and functionality of these devices continue to rise. This article will detail the factors increasing the vulnerability of PDAs to viruses and will describe recent attacks on such devices. The methods of delivery for viruses to a PDA (such as such as synchronization, infrared beaming, and network access) will be described in detail. Several solutions to protect users from attacks on Palm devices will be presented. The purpose of this article is to establish, based on specific evaluation criteria, which solution will provide the best virus protection for Palm OS-based devices and other handhelds in the next 18 months.

.H1 Scope
The three major operating systems for PDAs are the Palm OS, Windows CE, and EPOC. Research shows that the Palm OS comprises 80% of the U.S. market share. For this reason, this article will only address anti-virus solutions for the Palm OS. Given the rapid advancements typical of the PDA industry, we expect that the solution presented in this article will be relevant for an estimated period of 18 months.

.H1 Background
The evolution of handheld computers can be closely compared to the evolution of the personal computer. When PCs first began to gain widespread acceptance and sales skyrocketed, the public placed most of its emphasis on the benefits that PCs could bring to businesses and individuals. The threat of viruses wiping out mission-critical data and causing trillions of dollars in damages was never mentioned. PDAs are undergoing a similar experience as their sales increase. From 1998 to 1999, 1.3 million PDAs were sold in the U.S., a 73.8% increase in sales. Even more astonishing, from 1999 to 2000 U.S. sales of PDAs grew at an incredible 170% with 3.5 million units being sold. Overall, analysts at the Gartner Group expect worldwide sales of PDAs to exceed 33.7 million units in 2004, as shown in Figure A.

.FIGPAIR A Here are the projected worldwide PDA sales.

Similarly, Forrester Research (at http://www.forrester.com) believes that PDAs will play a vital role in the business economy as the mobile workforce increases from 35% to 57% of the total workforce in the next two years.

The reason devastating viruses have not hit PDAs yet is because their comparatively simple operating systems make it hard to write viruses that spread automatically. Also, most handheld devices don’t have hard drives, but instead use limited ROM (Read Only Memory) and RAM (Random Access Memory). Any preinstalled applications reside in ROM, where they aren’t susceptible to viral attacks. On the other hand, both third-party applications and user information are stored in RAM, where viruses can attack. [However, with the advent of devices like the HandEra 330, which support CompactFlash cards, including the IBM Microdrive, we are, in fact, starting to see hard disk technology become available for Palm OS devices. – Ed.]

The processing power of PDAs is much less than the processing power of a desktop computer. However, experts predict that the functionality of handheld computers will increase as the devices gain widespread acceptance, increasing the ability of viruses to attack.

Finally, most PDAs don’t presently make use of wireless connections. Yet, the Gartner Group predicts that in 2004, 40% of PDAs will use wireless technology for direct access to Web content and enterprise networks, therefore presenting a dangerous avenue for virus attack.

.H1 Recent attacks
The first virus to hit PDA devices was the Liberty Crack, also known as Palm.Liberty.A. This Trojan horse virus hides in a program that modifies the Liberty 1.1 emulator to illegally allow users to run Nintendo Game Boy games on the Palm OS. After the user runs the crack, Palm.Liberty.A will delete all files not preloaded on the PDA.

PalmOS/Vapor.741 is a second, but less malicious, Trojan horse virus, and it makes all application icons disappear. Although the programs are not deleted, the user must still resynchronize with a PC to restore the infected files. This virus never made it out into the general public.

A third virus, Palm OS/Phage.963, hit Palm devices on September 21, 2000. This virus specifically targets wireless units using the Palm OS. Unlike previous PDA viruses, which use file sharing, Phage also uses email as a direct means of transfer. After the virus enters the Palm device, it attacks all non-preloaded programs in the device. When the user tries to load an infected application, the screen displays a dark gray pattern and then closes the program. If a program is installed on the handheld, it will only be attacked if an infected program is run while the clean program is running.

The recent outbreaks of PDA viruses, such as the Liberty Crack and Phage, show that virus threats to PDAs are real, and that virus programmers are looking at PDAs as a potential playground for their viruses. We believe the PDA environment is, sadly, now ripe for viruses because of increased user dependence, interconnection, and applications.

.H1 Methods of delivery
In order for viruses to cause damage to Palm devices, the code must have an entry point to a PDA. Three methods of virus delivery have been identified: synchronization, infrared beaming, and network access.

.H2 Synchronization
Synchronization is the most prevalent method of transferring data. This functionality is used to synchronize desktop PC and device data in order to back up data, manage files, and install new device applications. All PDA operating systems have this functionality. The Palm’s synchronization application is HotSync. Although synchronization is convenient for users, it’s also the easiest way to deliver a virus to a user’s PDA.

Synchronization allows users to connect and manipulate data on PDAs from their desktop computers. With a single point of access to email, fax, and SMS (Short Message Service) functionality, viruses may send mail and manipulate files on the device from a desktop PC and vice versa.

.H2 Infrared beaming
Many of the popular PDAs available today are equipped with IR (infrared) ports. Infrared ports allow communication capabilities without the need of cables. IR ports can transfer data at a rate around 4 Mbps using the IrDA (Infrared Data Association) protocol. The IrDA is a point-to-point protocol data transmission standard. In most PDAs, the infrared signal has a range of 4 to 36 inches. PDAs with IR ports can be used to transmit data between two IrDA-enabled devices. For the purpose of this article, infrared beaming will be defined as the transfer of data between two PDAs.

Although the IR capabilities of PDAs enable the devices to seamlessly receive and send data, this means that the IR capabilities enable devices to easily receive and send potential viruses. Presently, PDAs are designed to trigger an incoming data alert message whenever the IR ports receive data. However, this message can be disabled, and malicious programs can be exchanged between devices without the user ever knowing. Although most users today don’t make use of the infrared transmission capabilities on their PDAs, analysts believe that infrared beaming will become widespread in the near future.

.H2 Network access
Of the three methods that viruses can use to attack PDAs, network access will pose the greatest threat for transferring viruses. In order to be susceptible to attack via network access, a user must have a PDA that is Internet and messaging capable. When emails with attached executable files are run on handheld devices, there’s a potential risk that the file contains harmful code.

Handheld devices generally contain pre-installed mail clients that are programmable. This means that malevolent software writers may only need to interface with existing mail clients rather than create their own network-capable agent. Viruses, however, aren’t limited to utilizing the programmability of the Web browser or mail client. They can also gain remote access to the Internet by opening listening server ports and then sending or receiving additional malicious programs.

Furthermore, according to the paper "Threats to PDAs," by Symantec Corporation at http://www.symantec.com/sarc/avcenter/reference/malicious.threats.to.pdas.html, the operating systems of handheld devices provide "libraries to applications to easily establish a connection with any other machine on the Internet and transfer data to and from that machine using the standard TCP/IP protocols." Although currently only 5-10% of all handheld users worldwide have wireless access, the number of people who own wireless handheld devices is expected to increase to 40% in 2004.

.H1 Software solutions
Software solutions provide a way to protect PDAs against viruses that have been or will be delivered through one or more points of entry. Anti-virus software solutions utilize either a database or a behavioral method of protection.

In this article, we’ll perform a critical comparison of four products offered by McAfee Corporation (at http://www.mcafee.com), Symantec Corporation (at http://www.symantec.com), and Finjan Software (at http://www.finjan.com). All of the vendors’ products will be analyzed based on the criteria of effectiveness, durability, size restriction, release date, price, ease of use, and company reputation. The scoring works as follows:

.BEGIN_LIST
.BULLET Effectiveness scores how many methods of virus delivery (i.e., synchronizing, infrared beaming, and network access) the software works to protect against. One point will be given for every method protected against.
.END_LIST

.BEGIN_LIST
.BULLET Durability evaluates the length of time before the software needs to be maintained to protect against new viruses. Products that are proactive in detecting future viruses will be given a three. Conversely, products that are reactive will be given a one because they require updates.
.END_LIST

.BEGIN_LIST
.BULLET Size restriction considers the software file size in relation to the file space on the device. This is an important criterion due to the limited space on a PDA.
.END_LIST

.BEGIN_LIST
.BULLET Release date refers to the date a full-version of the product first became available. Products with earlier release dates will be ranked higher because of increased consumer evaluation and subsequent revisions.
.END_LIST

.BEGIN_LIST
.BULLET Price is the estimated or suggested retail price for each product.
.END_LIST

.BEGIN_LIST
.BULLET Ease of use describes how uncomplicated the software is to install, configure, and update. Products that are easier to use will be given higher scores.
.END_LIST

.BEGIN_LIST
.BULLET Company reputation, though weighted the lowest, is still relevant (though subjective) because a reputable company is more likely to produce a product that consumers feel is reliable and trusted.
.END_LIST

Based on the above criteria, the anti-virus product receiving the highest total score will be deemed the best solution.

.H1 Database solutions
Database solutions use a database of known virus signatures that can be identified by characteristic byte patterns. When the anti-virus program is run, these specific byte patterns are compared to files, boot records, memory, and other locations where executable code is stored to see if any viruses are present. When new viruses are created and discovered, anti-virus companies create patches and updates for the databases to distribute to customers. Database solutions have traditionally been used for desktop computers and are now being used for PDAs. Anti-virus programs of this type are very effective at catching viruses that are defined in their databases. However, the database method has two limitations when used with Palm devices.

The first limitation of the database method is that it simply protects users against known viruses rather than proactively defending against new ones. When new viruses are created, it takes hours or even days for anti-virus companies to create patches and updates. This "lag" time allows the malicious programs to do tremendous damage before the new patch or update is released.

The second limitation of the database solution is that PDAs have limited file space compared to their PC counterparts. Therefore, the large databases that currently work for PCs may not fit on a PDA. Presently, the databases containing PDA viruses are relatively small because the number of known PDA viruses is also small. However, when the number of PDA viruses increases dramatically, the size of the anti-virus database for PDAs could quickly become too big to be stored on the device itself. Despite these limitations, McAfee and Symantec are both implementing a database solution for handheld devices, understandable, since that’s the architecture of their desktop-based solutions.

.H2 McAfee VirusScan Wireless
McAfee VirusScan Wireless (at http://mcafeestore.beyond.com/Product/0,1057,3-18-ML100108,00.html) protects users’ computers against viruses that may reside on a PDA resulting from unprotected synchronization. Its primary purpose is to protect corporate networks against viruses brought into the office by an employee via their PDA. The software doesn’t run on the device itself, rather it’s loaded on a user’s PC and uses virus definitions in the database to automatically scan all files as they’re passed to and from a PDA for known viruses when a user synchronizes.

VirusScan Wireless fulfills its primary purpose by protecting the network and the PDA during synchronization, but the program doesn’t protect PDA users from downloading viruses directly to their handheld device via infrared beaming or network access (which makes the "wireless" part of the product name something of a misnomer). To keep the software current, it must be maintained through either automatic or manual updates, making the product less durable.

For Palm OS-based devices, VirusScan Wireless consists of both PC-resident and PDA-resident components. The piece of the product that goes on the PDA takes up only 3K of file space. This is very small compared to other software that resides on the PDA. Given the huge amounts of storage space on PCs today, the minimum system requirement of 10MB of hard-disk space is practically negligible. No matter how many new viruses appear, computers will be able to handle the extra storage space requirements.

Released in August of 2000, McAfee VirusScan Wireless was one of the industry’s first full version virus security solutions offering protection from viruses transferred via PDA devices. The software is priced at $29.95 on the McAfee Web site. The VirusScan Wireless software was developed for use by non-technical consumers and is easy to install and use. Directions for setting what to scan, scheduling updates, or even deleting the application altogether take just a few simple steps.

McAfee VirusScan Wireless software uses the same scanning and detection engine that the company claims protects 60 million desktops around the world. McAfee claims to hold two times the corporate anti-virus market share (44%) than its closest competitor. Many consumers trust McAfee to protect their PCs from viruses, and it’s likely that this will continue with PDAs. A summary for VirusScan Wireless can be found in Table A.

.BEGIN_TAB_TABLE A VirusScan Wireless summary
.TAB_TABLE_WIDTH 30% 70%
.TAB_TABLE_ROW Effectiveness Protects against synchronization
.TAB_TABLE_ROW Durability Continual updates required
.TAB_TABLE_ROW Size restriction 3K on PDA
.TAB_TABLE_ROW Release date Full version: August 2000
.TAB_TABLE_ROW Price $29.95
.TAB_TABLE_ROW Ease of use Point and click installation, configuration, and updates
.TAB_TABLE_ROW Company reputation Market leader with 60 million users
.END_TAB_TABLE

.H2 Symantec AntiVirus 2001 for Palm OS
Symantec Corporation, known for its Norton AntiVirus software for desktop computers, is also entering the PDA virus protection software business through the introduction of Symantec AntiVirus 2001 for Palm OS (at http://www.symantec.com/nav/nav_pal/features.html). By redesigning the Norton AntiVirus scanning engine to meet the specifications and requirements for the Palm OS, Symantec believes they offer a very competitive solution for protecting PDAs from viruses.

Symantec AntiVirus 2001 for Palm OS resides directly on the PDA. Therefore, it protects users from viruses entering from synchronization, infrared beaming, and network access. The product has limited durability, as it requires frequent updates using the LiveUpdate function included in the software. Symantec AntiVirus 2001 achieves a small file size of 50K through what they call "microengine technology". The microengine and virus definition database are similar to the design of Norton Antivirus for desktop computers. However, the database still has the potential to outgrow its device space as the number of viruses increases.

Symantec’s product has been available to the public since March 2001. Currently, Symantec AntiVirus 2001 can be downloaded from Symantec’s Web site for $39.95. Installing and configuring the software is as easy as downloading and running the program. As for updating, Symantec has secured patents for its microdefinition system, allowing LiveUpdate to run up to four times faster than the previous version. LiveUpdate resides on your desktop, and when you HotSync your PDA with the desktop, LiveUpdate automatically updates virus definitions from Symantec’s Web site. Microdefinition works by only sending new virus definitions since your last update.

Symantec has been providing anti-virus solutions for the past 15 years through its Norton anti-virus packages, capturing 25% of the market share. This experience adds value as Symantec evaluates potential solutions for anti-virus software in PDAs. A summary for Symantec AntiVirus 2001 can be found in Table B.

.BEGIN_TAB_TABLE B Symantec AntiVirus 2001 summary
.TAB_TABLE_WIDTH 30% 70%
.TAB_TABLE_ROW Effectiveness Protects against synchronization, infrared beaming, and network access
.TAB_TABLE_ROW Durability Continual updates required
.TAB_TABLE_ROW Size restriction 50K on PDA
.TAB_TABLE_ROW Release date Full version: March 2001
.TAB_TABLE_ROW Price $39.95
.TAB_TABLE_ROW Ease of use Point and click installation, configuration, and updates
.TAB_TABLE_ROW Company reputation 25% market share
.END_TAB_TABLE

.H1 Behavioral solutions
Behavioral anti-virus software scans for viruses based on behavior rather than on known virus signatures. Thus, behavioral anti-virus software is proactive rather than reactive in terms of identifying malicious programs. Viruses are detected regardless of whether they have a known signature or if the virus is brand new, obviating the need for updates. Finally, behavioral anti-virus software allows companies to develop programs that won’t continually swell in size as the number of viruses increases. Finjan Software is creating a behavioral-based solution for PDA viruses and McAfee Corporation has released Guard Dog for Palm.

Although behavioral anti-virus solutions for the Palm OS help overcome major limitations of the database approach, they have their own limitations. Some behavioral programs require a higher level of technical expertise to install and configure. Another limitation for behavioral anti-virus solutions is that virus creators can invent clever ways to defeat the behavioral monitoring program, which degrades the concept of not needing patches or updates.

.H2 Finjan software
Finjan Software is one of the first companies to introduce anti-virus software for computers that’s purely based on behavioral monitoring. Finjan’s software uses a proactive monitoring technique to "sandbox" programs and to monitor their behavior. Like a child’s sandbox, where he or she can play in a defined, protected space, the technical term "sandbox" is used to describe placing programs in a defined or protected space, often so they won’t interact with or damage other parts of the system, and so other parts of the system won’t interact with or damage them.

Any program that violates a security policy is instantly blocked before the program is allowed to do any damage. The company calls their software "first-strike security" because it doesn’t require a known signature file but can detect malicious programs by monitoring the behavior of incoming code. Finjan’s software can detect viruses during the first few hours of a new attack, which is when devices are most vulnerable.

Finjan’s software for PDAs will reside on the device and protect against synchronization, infrared beaming, and network access. As with other behavioral solutions, Finjan’s software is very durable as maintenance will only be required when new behavioral searching technology warrants a new version. Although Finjan’s anti-virus software resides on the PDA, size is not a major concern because the software won’t increase in size with an increase in viruses. Finjan doesn’t expect to release a full-scale version of their product until the end of 2001. As a result, Finjan’s product will not have been as thoroughly evaluated and revised as products that are currently available.

Finjan has yet to announce how much their product will cost consumers. However, their desktop software costs $59.95 and sales associates at the company expect a similar price for their Palm OS software. Ease of use for Finjan software might also be a concern. Since the software will require users to help define the security policy, users must have a fairly high level of technical expertise or have additional technical support in order to make the software work properly. Finally, Finjan’s company reputation is not as substantial as some of its competitors, as demonstrated by a market share of less than one percent in the anti-virus software market. A summary for Finjan can be found in Table C.

.BEGIN_TAB_TABLE C Finjan summary
.TAB_TABLE_WIDTH 30% 70%
.TAB_TABLE_ROW Effectiveness Protects against synchronization, infrared beaming, and network access
.TAB_TABLE_ROW Durability Updates are not required
.TAB_TABLE_ROW Size restriction Predicted small size on PDA, which will not expand
.TAB_TABLE_ROW Release date Full version: 4th quarter 2001
.TAB_TABLE_ROW Price Estimated $59.95
.TAB_TABLE_ROW Ease of use Point and click installation but difficult configuration
.TAB_TABLE_ROW Company reputation Limited with less than 1% market share
.END_TAB_TABLE

.H2 McAfee Guard Dog for Palm
Similar to Finjan’s anti-virus software, McAfee Guard Dog for Palm (at http://www.mcafee.com/wireless/guarddog/guarddog.asp) employs behavioral monitoring to detect viruses that have been introduced to the PDA. Guard Dog for Palm runs constantly in the background to monitor the behavior of installed applications, preventing suspicious activities that haven’t been authorized. If a program attempts to make any sort of changes to a PDA that violates a security policy, Guard Dog for Palm alerts the user and asks if it should allow or prevent the action.

Unlike McAfee’s Wireless VirusScan, Guard Dog for Palm resides on your PDA. It’s an effective anti-virus solution because it protects the PDA against all three methods of virus delivery. Guard Dog for Palm is also a durable solution because it can protect you from future viruses as well as known viruses. This solution only takes up 36K on the PDA and, since it’s a behavioral-based solution, the size won’t expand as the number of viruses increases.

Guard Dog for Palm has been available since the fourth quarter of 2000 to those who subscribe to McAfee’s Wireless Security Center. An annual subscription for the Wireless Security Center costs $29.95. To install Guard Dog for Palm, you need to download the program to a PC and then use HotSync to transfer the program to your PDA. Configuration is merely choosing whether to scan or trust applications that are installed on the PDA. Thus, Guard Dog is very easy to use. As previously stated, McAfee is a highly reputable company and is known for their superior quality products. A summary for Guard Dog for Palm can be found in Table D.

.BEGIN_TAB_TABLE D Guard Dog for Palm summary
.TAB_TABLE_WIDTH 30% 70%
.TAB_TABLE_ROW Effectiveness Protects against synchronization, infrared beaming, and network access
.TAB_TABLE_ROW Durability Updates are not required
.TAB_TABLE_ROW Size restriction 36K on PDA, which will not expand
.TAB_TABLE_ROW Release date Full version: 4th quarter 2000
.TAB_TABLE_ROW Price $29.95
.TAB_TABLE_ROW Ease of use Point and click installation and configuration
.TAB_TABLE_ROW Company reputation Market leader with 44% market share
.END_TAB_TABLE

.BEGIN_KEEP
.H1 Conclusion
Based on the analysis of the four solutions presented, we believe McAfee Guard Dog for Palm will provide the best protection against viruses on the Palm OS for the next 18 months. As shown in Figure B, McAfee Guard Dog for Palm either matched or outperformed its competitors in all but one of the criteria listed.

.FIG B Here are the final scores.

Therefore, Guard Dog for Palm received the highest overall score based on the weighted dimensions. Businesses and individuals should feel assured that McAfee Guard Dog for Palm currently provides the best protection for their PDAs.

Due to the rapidly changing nature of the PDA industry, advancements in technology will render current anti-virus technology obsolete. Research already indicates that many anti-virus software vendors are attempting to create their own behavioral-based solutions for PDAs, which may challenge the market position of McAfee Guard Dog for Palm. Similarly, advancements in PDA hardware will continually improve, making criteria such as size less of a factor. Finally, it should be noted that PDAs are not the only mobile devices being threatened by virus attacks. Viruses will also strike other mobile devices, such as cellular phones, as these devices grow in functionality and popularity.

.BEGIN_SIDEBAR
.H1 Product availability and resources
For more information on the IBM Microdrives, visit http://www.storage.ibm.com/hardsoft/diskdrdl/micro/.

For more information on Gartner Group, visit http://www.gartnergroup.com.

For more information on Forrester Research, visit http://www.forrester.com.

For more information on Liberty from Gambit Studios, visit http://www.GambitStudios.com.

For the article, "Give me Liberty, or gime me, um, a Game Boy, in the September 2000 issue of PalmPower, visit http://www.palmpower.com/issues/issue200009/emulator001.html.

For the paper, "Threats to PDAs," by Symantec Corporation, visit http://www.symantec.com/sarc/avcenter/reference/malicious.threats.to.pdas.html.

For the article, "Symantec Offers Early Look At World’s First Anti-Virus Technology Residing Directly On the Palm OS Platform," in Wireless Developer Network, Sept. 7, 2000, visit http://www.wirelessdevnet.com/news/2000/251/news7.html.

For information on Palm.Vapor, visit http://www.sarc.com/avcenter/venc/data/palm.vapor.html.

For information on PalmOS/Vapor.741, visit http://www.canada-av.com/sensible/home.nsf/af5d930290b144e5852568c900171f3c/21763636425669d085256962007fc3a7?OpenDocument.

For information on Finjan Software, visit http://www.finjan.com.

For information on McAfee Corporation, visit http://www.mcafee.com.

For information on Symantec Corporation, visit http://www.symantec.com.

For information on McAfee VirusScan Wireless, visit http://mcafeestore.beyond.com/Product/0,1057,3-18-ML100108,00.html.

For information on Symantec AntiVirus 2001 for Palm OS, visit http://www.symantec.com/nav/nav_pal/features.html.

For information on Guard Dog for Palm, visit http://www.mcafee.com/wireless/guarddog/guarddog.asp.

For more information about Palm computers, visit http://www.palm.com.

.H1 Bulk reprints
Bulk reprints of this article (in quantities of 100 or more) are available for a fee from Reprint Services, a ZATZ business partner. Contact them at reprints@zatz.com or by calling 1-800-217-7874.
.END_SIDEBAR

.BIO Nicholas Idler will graduate in May 2001 from the University of Colorado with an M.S. in telecommunications engineering and a B.S. business administration–information systems. He plans to work as a technical consultant for Accenture. Matthew Gundersen will be graduating May 2001 with a Masters in telecommunications, dual degrees in business administration of information systems and management, and a minor in Computer Science. He’ll be starting with Accenture in the fall as an analyst consultant in the process division. Krista Casady will be graduating in December 2001 with an undergraduate degree in information systems and a Master’s degree in telecommunications. Jessica Lee will be graduating in December 2001 with a BA in information systems and an MS in telecommunications. She’s looking into a career in consulting, but is open to new opportunities.
.DISCUSS http://powerboards.zatz.com/cgi-bin/webx?50@@.ee6f3f3
.END_KEEP