View Single Post
Old 24-08-06, 11:19 AM   #1
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,016
Default Peer-To-Peer News - The Week In Review - August 26th, '06


































"Well, why not? It ain't worth nothing anyway." – Bob Dylan


"We see that Internet interest in a movie doesn’t necessarily translate to good box office." – Paul Dergarabedian


"These companies are sick of being pushed around. This is indicative of a huge paradigm shift in the industry in terms of what constitutes a star and how much power a star has." – Senior movie studio executive


"Overall, the box office is running solidly ahead of its disastrous performance in 2005, with no major movies left to be released in the summer season. Summer ticket sales now total $3.4 billion, up 7.6 percent over last summer’s total of $3.15 billion, according to Exhibitor Relations. Attendance is also up 4.36 percent over last summer." – Sharon Waxman


"Superparamagneticexpialidocious." – Michael Kanellos


"Hippie storage." – David Patterson


"We can see [hard drives with] 50 to 100 terabits being possible. We are three orders of magnitude from any truly fundamental limits." – Mark Kryder, Seagate CTO


"A square inch of 100-terabit material could hold as much data as 12,500 pickup trucks filled with books." – Michael Kanellos


"There are no market forces at work here, much as [FCC] Chairman Majoras wishes there to be." – Public Knowledge


"This is a confirmation of our warnings that once you let the camel’s nose under the tent, it takes 10 minutes for them to want to start expanding these programs in all different directions." – Jay Stanley, ACLU


"It's hard to tell who's losing the money -- the insurance company, the credit card company or the consumer -- but it's coming out of someone's pockets." – Dan Hubbard


"Only 10 percent of the respondents say their laptops had not been stolen." – Eric J. Sinrod


"Wake up, America--this is unacceptable." – Eric J. Sinrod


"(Research has shown that) if women could choose who they'd like to be impregnated by, they'd choose a rock star." – Daniel Levitin






















In this issue of the Peer-to-Peer Week in Review Bob Dylan says "why not?" to file-sharing, song publishers declare war on guitar tabs, Germany declares war on anonymizers, America sues Maine, Apple recalls batteries, personal firewalls are pointless and Kevin Mitnick gets hacked. And oh yeah, the Irish say they’ve solved our energy problems with a perpetual motion machine. All this and lots more. Hey, it’s just another week on the internet.

Enjoy,

Jack




















August 26th, '06







Confidential Data Really Is At Risk
Eric J. Sinrod

We have long heard about how confidential data can be at risk. Now, a new U.S. survey by the Ponemon Institute drives home the point with hard data. An astonishing 81 percent of companies and governmental entities report having lost or misplaced one or more laptops containing confidential business information within the last 12 months.

The survey, sponsored by data-protection specialist Vontu and aptly titled "Confidential Data at Risk," concludes that a main reason for corporate data security breaches is that many companies simply don't know where their sensitive or confidential business information resides. The survey goes on to summarize that "this lack of knowledge coupled with insufficient controls over data stores" poses "a serious threat to both business and governmental organizations."

The survey queried 484 information technology departments within U.S.-based corporate and governmental organizations. The answers to the survey questions paint a fairly bleak current picture. Only 10 percent of the respondents say their laptops had not been stolen. (Another 9 percent did not know.)

The corporate and governmental respondents generally agreed that electronic storage devices contain sensitive or confidential information that is unprotected, with 60 percent stating this to be the case for PDAs and other mobile devices, 59 percent for laptops, 53 percent for USB flash drives, 36 percent for desktops, and 35 percent for shared-file servers.

What's disturbing is that when asked how long it would take to determine what actual sensitive data was on a lost or stolen laptop, desktop, file server or mobile device, the most common answer was "never."

Unfortunately, it turns out this is not entirely surprising, given that 64 percent of respondents concede that their companies never have conducted a data inventory to determine the location of customer or employee information contained in various data stores.

Along these lines, 49 percent of respondents admit that business-related confidential information never has been inventoried as part of usual information technology control processes, and 48 percent state the same with respect to organizational intellectual property.

Wake up, America--this is unacceptable.

All prudent steps must be taken to account for and protect confidential data. The failure to take such steps can compromise the privacy of innocent employees and customers. What's more, it can jeopardize valued business relationships and lead to an organization's crown jewels--its intellectual property--walking out the door. Above all, there's the danger of legal liability.

Let's hope the next time such a survey is conducted, the results will be much improved. But it will take the dedicated efforts of U.S. companies and governmental organizations.
http://news.com.com/Confidential+dat...3-6108603.html





Napster on the Block?
Steve Rosenbush

Someday, I am sure, someone besides Steve Jobs at Apple Computer will figure out how to build a successful business around digital music. The new, legal Napster service, structured around the brand of the old, illegal Napster file-sharing system, is trying very hard, but victory is still a long way in the future. The most encouraging news in the earnings release that it issued August 2 was that its cash burn for the first fiscal quarter, which ended in June, fell to $9.6 million. That's down from a loss of $19.7 million in the first quarter of last year, although on a sequential basis it's modestly higher than the $9.3 million it lost in the fourth quarter of 2006. Revenues were $28.1 million, up 34 percent from the first quarter of 2006 and up 5 percent on a sequential basis from the fourth quarter of 2006.

CEO Chris Gorog attributed the growth to the launch of Napster's free-advertising supported service. It also offers an ad-free version for $9.95 a month, and a $14.95 a month vesion that allows subscribers to download unlimited amounts of music to MP3 players. They can access the music as long as they continue to pay the monthly fee. If they cancel their subsciption, they can't play the music anymore.

Gorog deserves credit for trying something new and narrowing the operating losses. But the company still has a long way to go before it really gains traction. Achieving profitability would be great, but that alone isn't enought to make it truly competitive. Apple's iPod has set a very high bar for success in the digital music market.

So it's no surprise that Gorog essentially put his company on the block. During a conference call he assured investors and analysts that "we do not have our heads in the sand" when it comes to M&A, and that the company has attracted "interest" and is weighing its options. Such a bold asseration is tantamount to putting a for-sale sign in the front yard.

The company faces two critical issues. The first is whether it has the right business model. The free version is similar to Internet radio. The $14.95 a month version is basically a music rental system. But it's not clear that a critical mass of people are all that interested in renting music from servies such as Napster or Yahoo!, which offers a similar product. The success of the iPod shows that people still get a thrill out of owning a collection of music. While it still costs 10 bucks or more to buy a CD online, the Web has made it possible to buy single tracks for less than a dollar. Such unbundling limits the appeal of renting. And even if Napster has the business model right, the success of iTunes and iPod reinforces the critical role of execution. You have to get the design and customer experience just right. Good luck figuring that one out.

Would anyone want to buy Napster? Other services do the same thing. And the flood of new entrants into the business shows that it isn't that hard to build one from scratch. Microsoft is building a new music player and music service called Zune.

Napster is a pretty good service, but the real differentiator is the brand. Just a few years ago, it had an underground allure. Now, as a revived public company with a legal business model, the company is having a challenging time, raising questions about just how valuable the brand can be, stripped of the file-sharing that made it what it was.

That notwithstanding, any number of media and Internet companies might find some value in Napster. If nothing else, an acquisition is a faster route to the market than building an online music service from scratch.

So the issue is going to be what kind of price it will fetch. The shares are trading at $2.71, down from a 52-week high of $5.17. It's hard to imagine that this company would fetch much of a premium to its market cap of $121 million.
http://www.businessweek.com/the_thre...er_on_the.html





Now the Music Industry Wants Guitarists to Stop Sharing
Bob Tedeschi

The Internet put the music industry and many of its listeners at odds thanks to the popularity of services like Napster and Grokster. Now the industry is squaring off against a surprising new opponent: musicians.

In the last few months, trade groups representing music publishers have used the threat of copyright lawsuits to shut down guitar tablature sites, where users exchange tips on how to play songs like “Knockin’ on Heaven’s Door,” “Highway to Hell” and thousands of others.

The battle shares many similarities with the war between Napster and the music recording industry, but this time it involves free sites like Olga.net, GuitarTabs.com and MyGuitarTabs.com and even discussion boards on the Google Groups service like alt.guitar.tab and rec.music.makers.guitar.tablature, where amateur musicians trade “tabs” — music notation especially for guitar — for songs they have figured out or have copied from music books.

On the other side are music publishers like Sony/ATV, which holds the rights to the songs of John Mayer, and EMI, which publishes Christina Aguilera’s music.

“People can get it for free on the Internet, and it’s hurting the songwriters,” said Lauren Keiser, who is president of the Music Publishers’ Association and chief executive of Carl Fischer, a music publisher in New York.

So far, the Music Publishers’ Association and the National Music Publishers’ Association have shut down several Web sites, or have pressured them to remove all of their tabs, but users have quickly migrated to other sites. According to comScore Media Metrix, an Internet statistics service, Ultimate-Guitar.com had 1.4 million visitors in July, twice the number from a year earlier.

The publishers, who share royalties with composers each time customers buy sheet music or books of guitar tablature, maintain that tablature postings, even inaccurate ones, are protected by copyright laws because the postings represent “derivative works” related to the original compositions, to use the industry jargon.

The publishers told the sites that if they did not remove the tablatures, they could face legal action or their Internet service providers would be pressured to shut down their sites. All of the sites have taken down their tabs voluntarily, but grudgingly.

The tablature sites argue that they are merely conduits for an online discussion about guitar techniques, and that their services help the industry.

“The publishers can’t dispute the fact that the popularity of playing guitar has exploded because of sites like mine,” said Robert Balch, the publisher of Guitar Tab Universe (guitartabs.cc), in Los Angeles. “And any person that buys a guitar book during their lifetime, that money goes to the publishers.”

Mr. Balch, who took down guitar tabs from his site in late July at the behest of the music publishers, added that, “I’d think the music publishers would be happy to have sites that get people interested in becoming one of their customers.”

Cathal Woods, who manages Olga.net, one of the pioneer free tablature sites, said he had run the site for 14 years with the help of a systems administrator, “and we’ve never taken a penny.” Mr. Woods, who teaches philosophy at Virginia Wesleyan College in Norfolk, said Olga.net had earned an undisclosed amount of money by posting ads on Google’s behalf, but he said that money had paid for bandwidth and a legal defense fund.

Anthony DeGidio, a lawyer for Olga.net, said he was still formulating a legal strategy, while also helping decide whether the site could pay licensing fees “in the event that that’s required.” For now, though, the site remains unavailable to users.

Because the music tablature sites are privately held, they do not disclose sales figures, and because industry analysts generally do not closely follow tablature sites, it is unclear how much revenue they generate. But with the Internet advertising market surging, almost any Web site with significant traffic can generate revenue.

Google also dabbles in tablature through its Google Groups discussion board service, in which guitar players trade tabs they have figured out by listening to the songs, or by copying tabs found elsewhere. A Google spokesman, Steve Langdon, said Google would take down music tablature from its Groups service if publishers claimed the materials violated copyright agreements and if Google determined that infringement was likely. Under the Digital Millennium Copyright Act, Web hosts may review, case by case, a publisher’s claims regarding instances of copyright infringement.

To hear music publishers tell it, though, the tablature sites are getting away with mass theft. Mr. Keiser, of the Music Publishers’ Association, said that before these sites started operating in the early ‘90s, the most popular printed tablatures typically sold 25,000 copies in a year. Now the most popular sell 5,000 copies at most.

But Mike Happoldt, who was a member of the ’90’s band Sublime and whose music is sold in sheet music books, said he sympathized with the tablature sites.

“I think this is greed on the publishers’ parts,” said Mr. Happoldt, who played guitar on Sublime’s hit “What I Got.”

“I guess in a way I might be losing money from these sites, but as a musician I look at it more as a service,” said Mr. Happoldt, who now owns an independent record company, Skunk Records. “And really, those books just don’t sell that much for most people.”

Assuming a tablature site musters the legal resources to challenge the publishers in court, some legal scholars say they believe publishers may have difficulty arguing their complaints successfully. Jonathan Zittrain, the professor of Internet governance and regulation at Oxford University, said “it isn’t at all clear” that the publishers’ claim would succeed because no court doctrine has been written on guitar tablature.

Mr. Zittrain said the tablature sites could well have a free speech defense. But because the Supreme Court, in a 2003 case involving the extension of copyright terms, declined to determine when overenforcement or interpretation of copyright might raise a free speech problem, the success of that argument was questionable. “It’s possible, though, that this is one reason why guitar tabs generated by people would be found to fit fair use,” Mr. Zittrain said, “or would be found not to be a derivative work to begin with.”

Doug Osborn, an executive vice president with Ultimate-Guitar.com said his site violated no laws because its headquarters were in Russia, and the site’s practices complied with Russian laws.

Jacqueline C. Charlesworth, senior vice president and general counsel of the National Music Publishers’ Association, would not comment on the legality of specific sites, including Ultimate-Guitar, but she said she had seen no international licensing agreements that might make free United States distribution of guitar tablature legal.

Online discussion boards have been thick with comments from guitar tablature fans, looking for sites that are still operating and lamenting the fate of sites they frequented. One user of the guitarnoise.com forums, who calls himself “the dali lima,” said he had no doubt that the music publishers would win the battle.

“Hopefully we will get to a place where the sheet music/tab will be available online just like music — $0.99 a song. The ironic thing might be that a service like that — with fully licensed music/tab offered at a low per song rate — might actually benefit guitar players by providing the correct music/tab and not the garbage that we currently sift through.”

A small handful of sheet music sites now sell guitar tablature. Mr. Keiser, of the Music Publishers’ Association, estimated that, including overhead costs, tablature could cost about $800 per song to produce, license and format for downloading.

Musicnotes, an online sheet music business based in Madison, Wis., is considering a deeper push into guitar tablature, said Tim Reiland, the company’s chairman and chief financial officer. The site has a limited array of tablature available now for about $5 a song, and it also offers tablature as part of $10 downloadable guitar lessons.

But Mr. Reiland said that with the music publishers “dealing with the free sites,” and a stronger ad market, his business might be able to lower the cost of its guitar tabs.

“Maybe we could sell some of the riffs to Jimmy Page’s solo in ‘Stairway to Heaven’ for a buck, since that’s really what the kids want to learn anyway,” Mr. Reiland said.

Low prices are only part of the battle, though, Mr. Reiland said. The free tablature sites often host vibrant communities of musicians, who rate each other’s tablature and trade ideas and commentary, and Musicnotes would have to find a way to replicate that environment on its site. Furthermore, these communities often create tablature for songs that have little or no commercial value, he said.

“Less than 25 percent of the music out there ends up in sheet music because sometimes it just doesn’t pay to do it,” Mr. Reiland said. “So the fact that someone comes up with a transcription themselves just because they love that song and want to share it with people, there’s some value to that.”

“I don’t have an answer for that,” Mr. Reiland added. “But I think the industry needs to play around with it, because it could be a nice source of revenue for songwriters, and for the community it could be a really good thing.”
http://www.nytimes.com/2006/08/21/te...gy/21ecom.html





Violent Video Games Ban in La. Blocked
Doug Simpson

A state law that would ban sales of violent video games to minors violates free speech rights and cannot be enforced, a judge ruled.

U.S. District Judge James Brady said the state had no right to bar distribution of materials simply because they show violent behavior. Brady issued an injunction, calling the law an "invasion of First Amendment rights" of producers, retailers and the minors who play the games.

"Depictions of violence are entitled to full constitutional protection," Brady wrote Thursday.

Louisiana is the latest in a string of states, including Minnesota, Illinois, California and Michigan, to have had similar bans blocked in the courts. A federal judge in Illinois this month ordered the state to pay more than $510,000 to three business groups - including the Entertainment Software Association, a plaintiff in the Louisiana case - for legal fees incurred in fighting a similar state law.

The association's president criticized Gov. Kathleen Blanco and state lawmakers for approving the law while struggling to recover from Hurricane Katrina.

"In the post-Katrina era, voters should be outraged that the Legislature and governor wasted their tax dollars on this ill-fated attack on video games," Douglas Lowenstein said in a statement.

Gov. Kathleen Blanco said in a statement late Friday she believes violent video games harm children.

"I'm calling on all parents to diligently monitor the video games that their children are allowed to play. If the courts can not protect our children, then we need to do it by rejecting the merchant of violence," the statement said.

The bill's sponsor, Democratic Rep. Roy Burrell, did not return a phone call.

Brady deflected the arguments by the state that video games should be treated differently from other forms of media because their interactive format can encourage violence.

"This argument has been rejected many times," Brady wrote, noting that other judges have ruled that movies and television also have interactive elements.

Brady also rejected the state's argument that video games depicting extreme violence can be "psychologically harmful" to minors.

"The state may not restrict video game expression merely because it dislikes the way that expression shapes an individual's thoughts and attitudes," he wrote.

Attorney General Charles Foti had not decided whether to appeal the ruling, a spokeswoman said.

The law sought to ban the sales of video games to minors if an "average person" would conclude that they appeal to a "morbid interest in violence." Sellers would face fines of up to $2,000, a year in prison or both for selling offending games.

The law also sought to ban sale of games to minors if the average person would conclude they depict violence that is "patently offensive" to an adult, and the games lack artistic, political or scientific value.
http://hosted.ap.org/dynamic/stories...08-26-00-18-07





Death by DRM

Microsoft Cuts ANOTHER Feature: Full HD Playback in 32bit Vista Goes
Dan Warne

Microsoft revealed today that no 32-bit versions of Windows Vista will be able to play back “next generation high definition protected content” (translation – studio-released BluRay and HD-DVD movies).

By far the majority of PCs use 32-bit processors, because despite AMD’s efforts to push 64-bit CPUs into the marketplace early, Intel’s first widely-promoted 64-bit CPU is the just-released Core 2 Duo.

PC users will now have to choose between a PC that can play high definition content (64 bit) versus one that can potentially run older devices that only have unsigned drivers available (32 bit).

“Signed drivers” are ones that have undergone a Microsoft quality-assurance process and received a digital certificate that certifies them as stable for installation on 64-bit Windows.

Microsoft’s move to drop support for playback of studio-released HD movies on Vista is likely to anger the large number of people who were hoping they could use their existing 32-bit PC with an upgrade version of Vista.

The surprising disclosure was made by Senior Program Manager Steve Riley during a presentation on Windows Vista security at Tech.Ed 2006 Sydney today.

“Any next-generation high definition content will not play in x32 at all,” said Riley.

“This is a decision that the Media Player folks made because there are just too many ways right now for unsigned kernel mode code [to compromise content protection]. The media companies asked us to do this and said they don’t want any of their high definition content to play in x32 at all, because of all of the unsigned malware that runs in kernel mode can get around content protection, so we had to do this,” he said.

Riley then attempted to pre-empt audience concerns over the newly imposed limitation by asking how many of the Tech.Ed attendees currently played high-definition movies at home.

“How many of you have a DVD player that you know can output a proper 1080 line non-interlaced?”

No-one raised their hands.

“OK… look around. By the time that stuff becomes popular, it’ll no longer be an issue because everyone will be running 64-bit Windows,” he said.

However, earlier in his presentation, Riley had explained why Microsoft had decided to let unsigned code run in 32-bit Windows, but not in 64-bit Windows.

“Imagine how difficult it would be for you [the Tech.Ed attendees] to update your environment. It would be a non-starter, right?”

“We can’t do that [lock out unsigned drivers from 32 bit Windows]. The app-compat hit, as we say in Microsoft, would be far too great if we did it in 32-bit Vista.”

In an interview hastily organised by Microsoft public relations staff after they learned APC was planning to run this story, Riley was at pains to point out that Blu Ray and HD-DVD were storage media and “you could put an MPEG-4 movie on them and play them on a 32bit Vista PC just fine.”

But he conceded that a commercially-produced BluRay or HD-DVD movie with next-generation high definition protected content wouldn’t play on a 32 bit PC.
http://www.apcstart.com/site/dwarne/...in-32bit-vista





Twango, a Great Sharing Site That Nobody Uses
Rafe Needleman

On Twango, multiple media types live together in harmony.

Twango is a nicely put together media-sharing site. It's somewhat unusual in that it's not focused on a particular media type, as YouTube is for video and Flickr is for photos. Rather, you can upload any file into Twango--video, photo, music, even documents such as PDF files. For each file, you get a YouTube-like page where others can comment on it.

Twango also has a clever organizational structure. In addition to letting you put keywords on files, you can also put any file into a channel. Channels are simply collections of files. You can have a family channel, a funny channel, and so on. What's cool is that you can put the same file in multiple channels, and each channel gets its own simple URL. Users can also add their own files to another user's channel (if the channel owner allows it), which makes channels useful for groups; you could set up a site for a group of travelers to collect all their trip photos. (Yes, you could also do this with Flickr and tags, but this is really much simpler.)

The service also has very flexible upload tools. You can upload using a Java-based drag-and-drop window, a downloadable Windows application, or directly via e-mail (each channel even gets its own address).

The site is free (for now), and everybody gets unlimited storage. The catch is that you can upload only 250MB a month.

Twango does not display all media in its own Web pages--I found that some audio, video, and document files opened up in their native applications instead of being played or displayed inside the browser. But that's about the only technological flaw I could find.

I like Twango. It's a clean sharing system that's easy to use and very flexible. It is also, however, one of way too many sharing sites, and it doesn't have nearly the juice of a top site such as YouTube. If you want your media to be discovered by the masses, it's not the site for you. If you want to share your videos and photos with friends and family, though, it's a decent choice.
http://reviews.cnet.com/4531-10921_7....html?tag=blog





Firefox Extension Promises Private P2P
Ed Oswald

AllPeers released a beta Thursday of what it called the most ambitious Firefox extension to date, a peer-to-peer application that would allow friends and family to share files and content between one another in a private setting.

Unlike the major P2P networks, AllPeers allows the sharing of files securely and privately.

The application has been released on Firefox's extensions Web site, and is compatible with Windows, Mac OS and Linux. The AllPeers backend uses BitTorrent in combination with what is calls a "darknet," where the computer user will remain anonymous while transferring files.

Its decentralized nature, however, will likely give the RIAA and MPAA fits, as the two groups have spent much of the last several years focusing on shutting down P2P networks. Without a centralized server on which to target, it could be near impossible to track what is being traded via AllPeers unless the groups infiltrate the small networks of individuals.

AllPeers project head and CEO Cedric Maloux stressed that the application was for private transfer only. "AllPeers is for sharing privately with friends and family; not for massively distributing files amongst strangers," he said.

The beta version still has several features missing that would make it into the final release of the software, including chat, comments, tagging, and support for external torrents. Maloux said bugs may be found across the service, which the developers would work out before the official launch.

"I am using AllPeers everyday and have stopped attaching files to email (this is soooo 2005)," Maloux wrote in a blog post describing the product. "I also love our ability to drag and share any picture off the web but my favorite feature has to be the ability to send a webpage to my friends just by drag and drop."

Those interested in the product can learn more by taking a product tour on the AllPeers Web site.
http://www.betanews.com/article/Fire...P2P/1156452762





EFF Founder Donates $15,000 to Freenet
Michael Ingram

The Freenet Project, which is dedicated to developing anonymizing P2P technology to promote free speech, has received a $15,000 donation from one of the founding members of the online rights group EFF.

“Prior to [the] donation, we were receiving about $2,300 per month, which was barely enough to pay Matthew Toseland, our only paid full time developer,” Ian Clark, architect and coordinator of the Freenet Project, told Slyck.com.

Along with five voluntary developers, Toseland has been working on the Freenet Project full time for the last 4 years. His work relies on donations, so $15,000 will ensure his continued development of the software as it moves towards a beta release of version 0.7.

The donation was made by John Gilmore, a philanthropist and outspoken civil libertarian. Gilmore made his fortune as the fifth employee of Sun Microsystems and a cofounder of Cygnus Solutions, who provided commercial support for Open Source software.

Gilmore, who has now taken early retirement to focus on social justice and Open Source software, is one of the founders of the popular online rights group Electronic Frontier Foundation (EFF).

Among many other projects, Gilmore helped start the highly controversial alt.* hierarchy on Usenet, which has earned a name for allowing discussions on subjects deemed socially unacceptable by many.

His interests in the use of technology to support privacy and free speech made Freenet a natural project to support. Developers and supporters of the Freenet Project argue that only with true anonymity can true freedom of speech be accomplished.

Anonymity on Freenet is achieved by caching data within the distributed resources of peers in the network. Peers then act as proxies for each other to handle requests and to transfer data. No peer knows what information they are caching for other users, or the original source. When uploading files, users do not know if it is to a proxy, or to the destined user.

Because data is passed through multiple peers who have limited upload and download bandwidth, Freenet is often criticized for being slow.

Version 0.7 is a major re-write, which will fundamentally change Freenet. Instead of being one network, Freenet will become a tool for creating interlinking darknets, whereby users only connect to trusted peers. The developers also hope to tackle other ongoing issues, such as speed, scalability and ease of use. Version 0.7 alpha was released in April 2006.
http://www.slyck.com/news.php?story=1271





Woman Fined For Downloading Two Movies
AP

A woman must pay more than $8,000 in fines for downloading two movies to her personal computer, a federal judge ruled Wednesday.

Cindy Childers has until Aug. 31 to contest the $6,000 fine plus $2,251 in attorneys' fees she was ordered to pay to Columbia Pictures Inc. and Warner Bros. Entertainment Inc.

The Motion Picture Association of America, Inc., an advocate of the film, home video and television industries, brought the federal suit against Childers in February.

The studios claimed the movies "Are We There Yet?" and "Million Dollar Baby" were used in June 2005 without their permission and distributed to the public online.

Childers has said the movies were downloaded without her knowledge, but because they were downloaded through her Internet service to her computer, the studios were holding her responsible.

She could not be reached for comment late Wednesday.
http://hosted.ap.org/dynamic/stories...EAST&TEMPLATE=





Where Defendant Wiped Hard Drive in Violation of Court Order, Default Judgment Awarded RIAA in San Antonio, Texas

In Arista v. Tschirhart, in San Antonio, Texas, the judge awarded judgment to the RIAA because the defendant -- in violation of a court order directing her to produce her computer's hard drive for inspection -- had the hard drive "wiped" first, thus deleting song files that had been downloaded. The court noted that this "wiping" irreparably prejudiced the RIAA because the only evidence it had without the hard drive was "scant and piecemeal".
http://recordingindustryvspeople.blo...-drive-in.html





Universities Put Hollywood Ahead Of Students
Cory Doctorow

On the heels of yesterday's post about USC's lunatic copyright policy, many readers have written in with more examples of copyright lunacy on USC and other campuses, instances in which scholarship is being trumped by a desire to appease the entertainment industry, enforcing rules that don't take any account of the limits put on copyright by lawmakers in order to preserve public rights and especially the right of scholars and researchers to pursue their work.

USC has a pretty crummy track-record here: A USC student who was downloading copies of Larry Lessig's FreeCulture, a book distributed via BitTorrent and Grokster at the behest of its author, was censured by USC for installing the app. He got kicked off the campus network and told that he would not be allowed back on until he promised to uninstall all general-purpose file-sharing software. He wrote letters of protest to the university about this, but never heard back.

Draconian, indiscriminate measures against file-share are par for the course at USC, as is the black-hole treatment for people who get snared in the dragnet. Aram Sinnreich, a USC grad student studying file sharing, who was an expert witness at the Grokster court case, was censured for using BitTorrent, and never received a response to his letter, either.

USC's arch-rival UCLA is a somewhat better steward of its students' interests in the copyright wars, as reported by Cindy Mosqueda at Metroblogging LA, who notes that UCLA's approach is mostly one of warning students about the crazies down the raod in Hollywood and their willingness to destroy your life to prop up their business model, but does not extend to actively policing students on their behalf. This is affirmed in last spring's letter to students from the Dean and Archchancellor.

At the University of Michigan, the policy is not far off from USC's, but at least they've got the good sense not to describe the school's mission as "is to promote and foster the creation and lawful use of intellectual property," as USC did.

Australia's Queensland University of Technology, touted as Brisbane's answer to MIT, has sent out a completely bizarre letter to students warning them that even if you buy your music from iTunes, you can't play it on a university computer, thanks to Australia's out-of-date copyright laws (soon to be replaced with an even more out-of-date regime, thanks to the dumb Free Trade Deal the loathsome John Howard signed into law).

One thing that's becoming increasingly clear from these factors is that students often need as much protection from their universities as they do from the entertainment industry's slipshod copyright enforcer thugs. It might be time for activists to start delivering anonymous file-sharing tools that help students evade the campus cops so they can get their research done. (Thanks, Aram, Sean, Angela, Adrienne, Scott!))
http://www.boingboing.net/2006/08/25...s_put_hol.html





French Firms Target eBay in Anti-Counterfeit Drive
Nick Antonovics

A French industry group plans to file a complaint with prosecutors seeking damages from eBay Inc. and other Internet auction sites for the sale of counterfeit products on their Web pages, the group's chairman said.

Marc Antoine Jamet, chairman of France's Union of Manufacturers (Unifab), told Reuters that the complaint, due to be filed next month, also aims at forcing the sites to clamp down on product pirates.

"There is a continent which makes the fakes, which is China, and there is a continent where they are sold, and that is the Internet," he said.

Other auction sites in the firing line include those run by privately held iOffer.com, Yahoo Inc. and Japan's Rakuten Inc..

But the main focus is eBay, with which Unifab has held more than a dozen meetings in the last two years, Jamet said.

"We think eBay is perfectly capable of policing its site, but they offer to take action only after the fact. They refuse to act pre-emptively," he said.

"We think they have the IT to manage their sites, to track bank accounts and ownership."

EBay spokesman Hani Duzry said the company operates an anti-counterfeit goods program and constantly monitors auctions for blatantly infringing products and removes them.

Focus On eBay

"We don't allow counterfeit items on the site. It is against eBay policy. It is illegal. We are committed to working with copyright owners on this," Duzry said.

Ebay "makes it easy," he said, for any copyright owner to contact eBay to report infringing products in order to have eBay remove them.

Jamet said, however, that the firm had refused Unifab's request to pro-actively shut down merchants of counterfeit goods in the same way it agreed in 2001 to ban listings of Nazi memorabilia and from groups such as the Ku Klux Klan.

Unifab's complaint will contain concrete examples of counterfeit goods found for sale on the Internet, he said.

Leather goods maker Louis Vuitton, a unit of LVMH, the world's largest luxury goods group, last year found 235,000 examples of counterfeit articles on 340 eBay pages.

In one case, it tracked more than 100 copies of the same article being sold within one hour, said Jamet, who is also a senior executive at LVMH.

Other luxury goods companies are also targets of counterfeiters, while Unifab members in sectors from pharmaceuticals to spare car parts support the action, he said.

Unifab had decided to move now, he added, because the problem of counterfeit sales had exploded.

Three years ago, none of the French firms affected -- including big-name luxury goods makers such as LVMH, Hermes International and Chanel -- monitored Internet traffic.

Now, many have teams who have spent months gathering evidence and assembling a case.

"It's a huge phenomenon, which has multiplied by 25 times in the last five years," he said.

Seeking Fines, Damages

Jamet said Unifab would be asking prosecutors to seek damages and interest from the auction sites in relation to the alleged losses suffered by the firms. In the case of some luxury goods companies, these ran into millions of euros, he said.

Unifab also wants to prosecute the sites for providing the means to resell counterfeit goods, a charge the French luxury goods industry has successfully brought against shop owners in Beijing's silk market and on New York's Canal Street.

In addition, it is asking the French government to revise its laws on electronic commerce to make online auctioneers "co-responsible" for the goods that are sold on their sites, Jamet said.

Unifab believes its case has been strengthened by a Paris court's decision in June to fine online search engine Google (Nasdaq:GOOG - news) 300,000 euros ($385,000) over advertisements for counterfeit goods generated by its sites. Google had based its defense partly on the existing French e-commerce law.

France is home to much of the world's luxury goods industry and the French government has taken steps in the past three years to toughen its laws against counterfeiting.

The government tried last month to broker a friendly solution to the row between Unifab and the auctioneers, but it was rejected by the industry group which believed it did not go far enough.

Unifab estimates counterfeiting represents 5 to 9 percent of global trade, or 200 billion to 300 billion euros a year in lost earnings for manufacturers. Losses in France alone exceed 6 billion euros, it says.http://today.reuters.com/stocks/Quot...E-1.XML&rpc=66





Canada Sets Key Hearings On Online Music Sales
Larry LeBlanc

Hearings that could dramatically alter the way labels and publishers share online music revenue in Canada begin September 6.

The proceedings, before the Copyright Board of Canada in Ottawa, will mark the first time the federal-appointed tribunalconsiders rates for the online sale of music.

On April 28, CMRRA/SODRAC Inc. (CSI) filed its statement of case with the board. CSI is a joint venture of Montreal-based Society For Reproduction Rights of Authors, Composers and Publishers in Canada (SODRAC) and Toronto-based Canadian Musical Reproduction Rights Agency (CMRRA). They jointly represent 95 percent of music publishers operating in Canada.

CSI seeks tariffs in three categories of online music use: permanent downloads, limited downloads as provided by subscription services and on-demand music streams.

"These hearings will set the dynamics of our business for years," says CSI vice president David Basskin, who is also president of CMRRA.

For permanent downloads, CSI proposes a rate of 15 percent of the retail price with a maximum of 10 cents Canadian (9 cents) per track. For subscription services offering limited downloads, CSI proposes 8 percent of gross revenue.

CSI further proposes that services authorizing copying of musical works onto portable devices pay a minimum fee of $1.40 Canadian ($1.24) per subscriber per month, while services that do not allow portability pay a minimum of 60 cents Canadian (53 cents) per subscriber.

On-demand streaming services will be asked to pay 5.8 percent of gross revenue with a minimum monthly fee of 45 cents Canadian (40 cents) per subscriber.

Since Canada's first digital service opened in 2003 with the launch of Puretracks, online music services have been paying advances to publishers via CSI pending a tariff decision. CSI and the major labels declined to reveal the interim rate.

All Those Opposed

Parties that have filed an opposing joint statement notice -- not yet on the public record -- include the Canadian Recording Industry Assn. (CRIA); the Canadian Assn. of Broadcasters; Canadian telecommunication giants Bell Canada and Rogers Wireless; Napster; and Apple Canada.

According to sources, in the joint notice, multinationals in Canada, represented by the CRIA, have taken the view, similar to their U.S. counterparts, that their deals with digital services should be for sales of records rather than licenses for the recordings. They reportedly will seek to each oversee their own separate blanket licensing deals for the digital distribution of music.

Sources indicate that while Sony BMG Music Canada had pushed this strategy from the start of negotiations with CSI in 2003, EMI Music Canada, Warner Music Canada and Universal Music Canada only recently decided to follow suit. One source claims this was due to Basskin's "adversarial" approach in initial negotiations. Basskin refused comment on that claim.

The CRIA refused comment for this article, citing the pending hearings.

CSI, Basskin says, will aggressively seek protection of publishers' and songwriters' interests at the hearings. "Record companies do not have, and never will have, our interest at heart. Look at their history of mechanical licensing. Would you trust these people?"
http://today.reuters.com/news/articl..._US-CANADA.xml





Apple Recalls 1.8 Million Batteries, Citing Injuries
Connie Guglielmo and Ian King

Apple Computer Inc. is recalling 1.8 million Sony Corp. batteries used in its Macintosh notebooks, a week after Dell Inc. instituted a similar recall. The moves may cost more than $250 million, Sony said.

The batteries were used in iBook and PowerBook computers sold between October 2003 and August 2006, Cupertino, California- based Apple said. Sony doesn't anticipate any further recalls, the company said in a statement today.

``The batteries pose a fire hazard, and we want consumers to take this recall seriously,'' said Scott Wolfson, a spokesman for the U.S. Consumer Product Safety Commission, based in Bethesda, Maryland. ``We want them to take the batteries out of the laptops immediately.''

Problems with Sony batteries led Dell, the world's largest personal-computer maker, to initiate the biggest recall in consumer-electronics history. The decision by Apple is the second-largest recall ever after Dell and brings the number of affected notebooks to almost 6 million. Apple discovered nine incidents of batteries overheating, with two causing minor burns to Mac users.

Battery replacements for Dell and Apple notebooks will cost Sony 20 billion yen to 30 billion yen ($170 million to $257 million), the Tokyo-based company said in a statement. Apple doesn't expect the recall to have a ``material financial effect,'' company spokesman Steve Dowling said in an interview.

`Sony Responsible'

The recall doesn't affect notebooks with Intel Corp. chips that were released this year, Dowling said.

For Apple, ``it's an inconvenience but financially it's a non-event because Sony is responsible,'' Gene Munster, an analyst with Piper Jaffray Cos. based in Minneapolis. ``The key is that it doesn't impact Apple's Intel notebooks.''

Shipments of Macs are at their highest level in five years, fueled by demand for faster laptop models powered by Intel chips. Apple shipped more than 5.56 million notebooks during the time period covered by the recall. The company has sold more than 1 million machines in each of the past seven quarters.

Notebook shipments at Apple rose 61 percent in the quarter ended July 1 and accounted for 62 percent of Mac revenue.

Shares of Apple, also the maker of the iPod music player, rose 50 cents to $67.81 at 4 p.m. New York time in Nasdaq Stock Market composite trading. They have fallen 5.7 percent this year. Sony American depositary receipts fell $1.16, or 2.6 percent, to $43.26 in New York Stock Exchange trading.

Affected Computers

The safety commission said the recall affects 1.1 million Mac notebooks sold in the U.S. and 700,000 sold overseas. The machines were purchased at Apple's stores, through the company's Web site and at authorized resellers.

Affected notebooks were sold for $900 to $2,300, and some batteries were sold separately for about $130.

The units were assembled in Japan, Taiwan and China and contain Sony's lithium-ion batteries. Sony is the world's second- largest maker of consumer electronics behind Matsushita Electric Industrial Co.

The commission announced on Aug. 17 it was reviewing notebook batteries made by Sony three days after Round Rock, Texas-based Dell recalled 4.1 million batteries on concern that some may burst into flames. The batteries were made in Japan and assembled in China by Sony workers.

Dell told the safety commission that it learned of six cases since December in the U.S. of notebooks overheating or bursting into flames because of a problem in the fuel cells of the widely used lithium-ion batteries. No injuries were reported, Dell said.

Hewlett-Packard Co., the world's second-largest PC maker, and Gateway Inc., the third-largest PC maker in the U.S., have said their systems are not at risk.

Battery Replacement

Problems arise ``on rare occasions'' when short circuits occur within battery cells, according to the Sony statement. A short circuit should cause the battery to shut down. ``Under certain rare conditions'' it may lead to overheating and flames.

Apple's recall comes after the company on July 28 announced a replacement program for some Mac Book Pro notebook batteries. The machines have 15-inch screens and were sold between February and May. Apple instituted the recall citing ``performance issues'' with the rechargeable batteries and said the affected batteries don't pose a safety risk, according to company spokesman Dowling. He declined to say how many of those machines were affected and who manufactured the batteries.

Today's recall affects certain models of the iBook with 12- inch displays and PowerBook notebooks with 12-inch and 15-inch screens. Customers will receive a free battery replacement, Dowling said.

It may take as long as four to six weeks for a replacement battery to arrive, Apple says on its Web site. Instructions are posted at http://support.apple.com/batteryexchange . Customers can also call Apple at (1) (800) 275-2273.
http://www.bloomberg.com/apps/news?p...YsY&refer=home





Japan: Sony, Dell Must Probe Batteries
Hiroko Tabuchi

Japan's trade ministry on Thursday ordered Sony Corp. and Dell Inc. to investigate the trouble involving Sony batteries that caused Dell to recall 4.1 laptop computers last week because they were at risk of catching fire.

The ministry said Sony and Dell must report on their findings and say how they will prevent future problems by the end of August, or face a fine under Japan's consumer safety laws.

Lithium-ion batteries manufactured by Sony for Dell laptops imported to Japan overheated and caught fire in at least two separate instances in October and June, the Ministry of Economy, Trade and Industry said in a statement. No one was injured in those incidents, but the fires destroyed the machines, according to ministry official Atsuo Hirai.

The ministry also pointed to problems with battery cells supplied by Sony for Dell computers in other countries, and told the companies to investigate the safety of Dell models Latitude, Inspiron and Precision imported to Japan from April 2005.

The ministry also instructed other Japanese electronic makers to check the safety of their laptop batteries.

Battery packs contain cells of rolled up metal strips. Sony has said that during production, crimping the rolls left tiny shards of metal loose in the cells, and some of those shards can cause batteries to short-circuit.

Dell has already recalled batteries from affected models in Japan. Batteries powering Sony's Vaio laptops don't have the same problems, according to the Tokyo-based manufacturer.

The battery problems, which resulted in the largest recall of electronics-related products in U.S. history, have come as embarrassing news for Round Rock, Texas-based Dell, the world's largest PC maker, and for Sony, which has been trying to overhaul its electronics operations amid a slump in profits.
http://hosted.ap.org/dynamic/stories...08-24-08-21-35





Sony Refused Peer-To-Peer Patents

Sony cannot patent inventions in the UK that remove the anonymity of the peer-to-peer (P2P) user experience and put social networking at the heart of file-sharing.

The Patent Office ruled last week that the inventions are not eligible for patents.

Sony filed two patent applications for complementary inventions. One describes a means of exchanging information between computers or other devices in a network. The other describes ways of using that information.

The application for the "system and method for reviewing received digital content" describes building a web community.

When a P2P user downloads a piece of content from another user's computer, be it a song or a game or a movie, he normally knows nothing about that user – or where that user obtained the content. Sony's proposal would change that experience.

Sony describes a method for attaching a user history to content when it is shared among computers or other devices. When one user downloads a song, he can see who had it last and what he thought about it.

The patent application explains: "For example, the user, Clark Kent, may give a classic jazz music file a rating of '7' and include the user comment 'like cool man'. Also, instead of using his true identity ('Clark Kent'), Clark uses an alias, 'Superman.'" Clark may also choose to supply his email address.

Unlike social networking websites, Sony's proposal does not rely upon a centralised server. The thinking is that an accumulated history of users of the digital content could add value to the digital content itself, without requiring the file to be available for download from only one location. A user may also receive a credit towards the purchase of music when a subsequent user of an exchanged music file plays the song.

"Over time," suggests the application, "if a particular user consistently recommends interesting content before other users, then they will emerge as a kind of expert recommender."

Other possibilities include your PC determining which song to play based on a favourite list of another user having a common interest in music. And the user history information could be sold to marketers.

Sony-BMG has embraced P2P before: it partnered (http://www.playloudermsp.com/pressrelease_22aug05.html) with a British broadband-provider called Playlouder MSP last year to make its catalogue available on a P2P network in which subscribers can exchange music from participating record labels freely within the walled garden. A portion of the subscription fees compensates the rights holders.

The decision

Patent examiners initially objected that the inventions described computer programs and were not eligible for patent protection in the UK.

Sony's patent agent, Dr Jonathan DeVile, challenged this before Patent Office Hearing Officer Bruce Westerman. Dr DeVile said the examiners were wrong, that the inventions cannot be a program for a computer because, in operation, there are at least two computers involved, communicating over a network. Westerman disagreed.

"To be a participating member of the peer-to-peer community within which these inventions work, it would seem to me clear that each data processing device must contain all the functionality to act as a 'first user' and as a 'second user' or 'previous user'," wrote Westerman. "Therefore, in reality, each device has all of the software, whether or not all of it is in use at any one time."

The view of the patent examiners was upheld.
http://www.theregister.co.uk/2006/08...d_p2p_patents/





Asia Warms Up To Intellectual Property
Aaron Tan

As the relative value of intellectual property increases, Asian businesses are apparently beginning to take infringement issues more seriously.

During a panel discussion this week at the inaugural Global Forum on Intellectual Property here, industry experts generally agreed that Asian businesses do recognize the importance of IP as they compete in the global landscape.

Gordon Smith, chairman of U.S.-based business consultancy Aus, said there is market evidence that Asian companies recognize the value of intangible assets such as IP. For instance, he noted, a sample of 18 companies listed on the Singapore stock exchange stated that at least one-fifth of their total assets are in intangible form. That fraction is even larger at consumer-oriented tech companies, where intangibles comprise 75 percent of total assets.

"There was not a single one out of those 18 companies that did not have some portion of their (total) value in intangible assets," Smith said. "Investors are certainly recognizing it, and especially in the consumer high-tech industry, a large portion of intangible assets are represented by intellectual property."

Gordon McConnachie, board chairman of the Intellectual Assets Center in Scotland, said during the panel discussion that the value of IP goes beyond dollars and cents, and extends to the way some businesses make money from licensing their IP assets.

"It can add to the value of a company in the way it positions itself in the market," he said. "But ultimately, it affects people, their jobs, lives and countries."

McConnachie noted that in Asia, institutions such as Singapore's IP Academy and Indonesia's Society of Intellectual Capital, have already been set up to assist businesses in managing their IP assets. In China, there is also a "clear awareness" of the benefits of intellectual property among businesses.

In fits and starts
However, McConnachie noted, most intellectual property developments in Asia revolve around IP institutions, which are "sporadically" encouraging businesses to create inventories of IP assets.

"The key issue is education at the company level, and (businesses) have to realize that new rules are coming from the knowledge-based economy," McConnachie said. "They also have to understand how vital it is to systematically create, manage and leverage IP as part of the value of an organization."

While he acknowledged that major Asian companies are creating IP depositories and looking at ways to benefit from them, there is generally "no complete understanding of the true value of IP."

This view was shared by Jari Vaario, director of IP rights strategy program at Nokia, the world's top handset maker.

While Chinese businesses have progressed from the days when IP used to be viewed in the same way as "stealing a book is not a crime," Vaario explained that many of the IP developments in China are still copied from what is already available in the marketplace.

"In the telecommunications field, I would say that Chinese companies have been infringing on Nokia's patents," Vaario said. "There is no Chinese telecom company that does not infringe (on) some of Nokia's patents."

But with the entry of China into the World Trade Organization, Chinese companies now find themselves having to face counterparts in a global playing field that have established IP rights management. "This has put some pressure on them to respect IP," Vaario said.

Weerawit Weeraworawit of Thailand's Ministry of Commerce asserted that Asian companies do understand the value of IP--just not in a way that IP owners want them to understand it. Asian companies "know the value of trademarks and blockbusters, and that's why they choose the easy way out--copying," he quipped.

"It may sound paradoxical, but I'm optimistic about the value of IP in Asia," Weerawit said. "There is a certain level of entrepreneurial spirit (in recognizing IP), though in the wrong way: They have management skills in putting the counterfeit goods into the market, not only domestically but also internationally."

It is unfortunate that this entrepreneurial spirit has been misused, particularly since Weerawit--an associate judge of 10 years--noted that software piracy has been detrimental to Thailand. He recounted how a Thai software company's products were targeted by pirates the same day the software was launched.

"A lot of education is needed among the population at large to convince people that it's better to earn a living from our own creation and innovation than copying from someone else," Weerawit said.
http://news.com.com/Asia+warms+up+to...3-6108596.html





China Has Another Go At Knocking Off Pirates

CHINA has confiscated more than 8 million illegal CDs and DVDs as part of a 100-day crackdown on pirated movies and computer software, state press reported last week.

The campaign has had "remarkable success" and coincides with a rise in sales of authorised CDs and DVDs in major cities, the China Daily quoted the head of the National Copyright Association, Long Xinmin, as saying.

More than 89,000 shops and street vendors have been raided as part of the crackdown, which began on July 25, with 8.3 million CDs and DVDs seized, Xinhua news agency says.

Just over 3000 shops were closed and 9508 were punished for selling pirated goods, it says.

"We are giving shopkeepers a stern lesson to make it clear that selling pirated products will lead to strict penalties," says Liu Binjie, the vice-director of the State Press and Publication Administration.

"We will close every shop which we find is guilty of violations in the next two months."

The China Daily says the 100-day campaign was unprecedented in terms of its duration and number of government departments involved.

However, Chinese authorities regularly announce crackdowns, laws and other actions to rein in the nation's counterfeit industry with seemingly little effect, as pirated goods remain widely available.

The US has been a particularly sharp critic of China on piracy, charging Beijing of not doing enough to combat the problem.

The US government says pirated Chinese products are costing US companies tens of billions of dollars a year.
http://australianit.news.com.au/articles/0,7204,20177463^27317^^nbv^15306-15319,00.html





Tibetan Wi-Fi Website Attacked
Xeni Jardin

Organizers of a community wireless mesh-network project in Dharamshala, India, say their website was attacked on Thursday, following publication of a Wired News article about their work for Tibetan refugee settlements.

Speaking to Wired News via Skype, project founder Yahel Ben-David said that while the distributed denial of service, or DDoS, attack on the Tibetan Technology Center website appeared to come from IP addresses from a number of places around the world, they began immediately after scans from an IP address in China.

"There was no immediately evident single source for the attack, but it started right after an extensive series of China-based scans," said Ben-David.

The tibtec.org website was featured in a Wired News story published on Thursday about the group's efforts to build a wireless mesh network serving Tibetan exiles. The site is built with Drupal, and runs on Apache.

"It was down for over 30 minutes," said Ben-David. "I couldn't log in because thousands of http processes were running, demanding resources from the MySql database."

Network operations for the Dharamshala wireless mesh network are managed separately, with extensive access controls, and were not affected by the attack.

"It was definitely malicious, because this was not the behavior of a human user or cluster of human users," Ben-David added. "It was robot behavior -- reloading the same urls again and again, to access every possible piece of data in the database."
http://www.wired.com/news/technology...0,71617-0.html





FTC Chief Critiques Net Neutrality
Declan McCullagh

The head of the Federal Trade Commission on Monday expressed sharp skepticism toward proposed laws that would levy extensive Net neutrality regulations on broadband providers.

Deborah Platt Majoras, the FTC's Republican chairman, said extensive Net neutrality legislation currently pending in the U.S. Senate is unnecessary because there has been no demonstrated harm to consumers, that normal market forces would likely prevent any problems, and that new laws would cause more problems than they solve.

"I ask myself whether consumers will stand for an Internet that suddenly imposes restrictions on their ability to freely explore the Internet or does not provide for the choices they want," Majoras told a luncheon audience at the Progress and Freedom Foundation's annual conference here.

Majoras' comments come as the Senate is considering a massive legislative proposal to rewrite telecommunications laws. In June, a Senate panel narrowly rejected an amendment that would have slapped strict regulations on broadband providers. Sen. Ron Wyden, an Oregon Democrat, has said he'll try to block a floor vote on the measure unless that amendment is adopted.

The concept of network neutrality, which generally means that all Internet sites must be treated equally, has drawn a list of high-profile backers, from actress Alyssa Milano to Vint Cerf, one of the technical pioneers of the Internet.

It has also led to a political rift between big Internet companies--such as Google and Yahoo that back it--and telecom companies that oppose what they view as onerous new federal regulations. In the last few months, it has become a partisan issue, with Republicans siding with broadband providers. (All the Democrats on the Senate Commerce Committee voted for the unsuccessful amendment in June).

Because the FTC shares enforcement authority with the Federal Communications Commission over certain types of deceptive practices by broadband providers, Majoras' remarks could nudge some senators who have been cautious supporters of Net neutrality to a more laissez-faire position.

Majoras also took a swipe at Google and other Internet companies that support extensive FCC regulation, saying she was surprised "at how quickly so many of our nation's successful firms have jumped in to urge the government to regulate." Business executives, she said, tend to talk a lot about the "free market" but then "turn to government to seek protection" when they're afraid of a marketplace disadvantage.

A new Internet Access Task Force at the FTC will evaluate Net neutrality proposals in detail, Majoras said, and present a report with its conclusions.

Comcast, which has opposed extensive Net neutrality regulations, welcomed Majoras's remarks, calling them "a major constructive contribution to the debate on network neutrality" that "properly places the burden of proof on those who believe government regulation is needed in this area."

The Public Knowledge advocacy group, which often supports additional regulation of large telecommunications companies, took issue with Majoras's comments, saying 98 percent of broadband customers receive their service from either the telephone company or the cable company. "There are no market forces at work here, much as Chairman Majoras wishes there to be," the group said in a statement.

Even if the Senate bill is never enacted (a version has been approved by the House of Representatives), federal agencies appear to have substantial power to punish broadband providers that block Web sites or engage in anticompetitive business practices. One small group of broadband providers, for instance, blocked voice over Internet Protocol (VoIP) calls but then quickly backed down in March 2005 when the FCC became involved.

Feds' existing Net neutrality enforcement

While the FCC subsequently changed how it treats broadband providers, it appears to retain authority to police similar wrongdoing.

In the Brand X case, U.S. Supreme Court Justice Clarence Thomas wrote that the FCC "remains free to impose special regulatory duties on facilities-based ISPs." FCC Commissioner Michael Copps said in May that the FCC has the power to ensure "there's not discrimination against (sites) that are not affiliated with the network owners."

Also, as the FTC told Congress in June, it has the power to regulate "anticompetitive, deceptive, or unfair" practices by practically any kind of broadband provider.

FTC Chairman Majoras said on Monday that her agency would use its existing power to police Net neutrality violations. "We will not hesitate to act," she said.
http://news.com.com/FTC+chief+critiq...3-6107913.html





Now Playing On The Net: War Propaganda
Greg Sandoval

Amid the home videos of dancing teens and sporting events on YouTube, a well-crafted, nine-minute video makes a direct appeal to Americans to oust the Bush administration.

"People of America, we wish to share with you our thoughts on the events we experienced," says the narrator of "Iraq--the truth?" The narrator claims to represent those opposing the U.S. in Iraq. "Despite the madness we have endured we see no harm in presenting you with the criminal nature of your newly elected emperor."

It's impossible to say for certain who created the video, but it's no doubt part of a growing and surprising trend at video-sharing sites. The democratization of online video through sites such as YouTube, Metacafe and Ogrish.com is allowing combatants on both sides of the battlefield to make their version of events public.

The Web offers any individual with Internet access the means to reach out to vast audiences with little or no regard for geographical borders. The number of people watching the propaganda videos is still small: About 14,000 people have viewed the "Iraq – the truth?" video, which was posted in May. By comparison, the most popular video currently on YouTube is "Tila Tequila," which has been watched more than 800,000 times.

But experts say such material could be a harbinger of the future.

"The enemy is taking propaganda straight to the American people," said Nancy Snow, associate professor at California State University at Fullerton and author of "Propaganda Inc." "You have to give them credit for utilizing the power of this new medium. They're using cheap technology, but today anybody with a video camera can make his own movie and broadcast it."

Bush administration officials have noticed. In a speech last February, U.S. Secretary of Defense Donald Rumsfeld said al-Qaida and other extremist groups have adapted faster than the U.S. to fighting information wars on the Web.

"There's never been a war fought in this environment before," Rumsfeld told the Council on Foreign Relations, according to a transcript of the speech. "Today we are fighting the first war in the era of e-mail, blogs, BlackBerries, instant messaging, digital cameras, the Internet...The U.S. government still functions as a five-and-dime store in an eBay world."

Propaganda, the practice of tailoring a message to sway opinion rather than to present impartial information, is not new to the Web. Sending e-mails to promote one political philosophy or another is as old as the Net. But when it comes to influencing opinions, video packs a greater emotional punch than text or photographs, said Snow, a former staffer at the U.S. Information Agency, which was once responsible for explaining U.S. foreign policy to the world.

The power of video to communicate ideas to large audiences has not been lost on politicians, corporations or the clergy in this country. Many have begun posting commercials or sermons on user-submitted sites.

Figuring out just how many people can be reached via online video is still unclear. San Mateo, Calif.-based YouTube, the largest of the video-sharing sites, attracts more than 16 million viewers per month and presents 100 million videos a day. The company was lauded recently for providing an unfiltered view of the fighting in Lebanon.

These sites are quickly becoming a bully pulpit from which any agenda can be pushed.

Combatants on the battlefield in Iraq post video clips of the war on sites such as Guba, YouTube and Ogrish.

Anyone performing a search of the word "Iraq" on YouTube can locate scores of clips about the war, including those that show Americans being attacked by snipers or with explosive devices. One clip shows what appears to be U.S. soldiers being shot by a sniper known as "Juba" or "Juma." The text and narration in these videos are rarely, if ever, in English.

In contrast, "Iraq - The Truth?" features very little graphic violence. The narrator speaks English as somber orchestral music plays in the background. He argues that the war in Iraq is unjust. There is also a veiled threat that the U.S. will face nuclear attack. He finishes by complimenting Americans on their ability to produce great leaders with a subtle suggestion that they violently overthrow the current administration.

"We believe that a nation which once gave the world John F. Kennedy, Benjamin Franklin, George Washington...will not fall short of giving true leaders of substance and dignity," the narrator says. "We advise you to take matters into your own hands."

Such material is unlikely to change the minds of anyone who strongly supports the war, Snow said. But for those people who are unsure or oppose the effort, the images may prove powerful.

Average American soldiers also have begun communicating their take on the war. It's a take that may not please the Pentagon.
Perhaps the best example of this is the controversial video called "Hadji Girl." The clip shows Joshua Belile, a U.S. Marine stationed in Iraq, singing a song about falling in love with an Iraqi girl before being ambushed by her family and being forced to kill them. Belile has reportedly said the song was meant as a dark joke but it enraged many Muslims.

There are countless videos that feature American weaponry. They often follow the same pattern: heavy-metal music plays while U.S. troops kick down doors or blast away with machine guns. Guns fire from a helicopter to pulverize a suspected insurgent position in Mosul, according to the text of one video. Another clip shows American servicemen watching insurgents on infrared cameras before gunning them down. There's the video titled "Iraq Airstrike" that appears to be taken by U.S. troops confronting an insurgent position. A bomb explodes on a building and the voices in the background whoop it up.

"Sucks to be your a--," one of the voices says. "See you in hell, dog. See you in hell."

A spokesman for U.S. Central Command said it does not have an official position on soldiers posting video clips to the Web as long as the images don't violate operational security. That means that a soldier can post a video as long as the content doesn't give away vital secrets, such as a unit's geographical position or troop strength.

"The military mission is supposed to be about rebuilding and peace," Snow said. "Some of those videos send messages that conflict with that."

But anyone blaming Web sites for hosting the material or who accuses them of aiding the enemy is misguided, said Hayden Hewitt, co-owner of Ogrish.com, a Web site that specializes in offering some of the bloodiest images on the Internet.

On Ogrish, scenes of Americans as well as insurgents being killed are available.

"We don't choose to take sides in any conflict," Hewitt said. "We show an un-sugarcoated view of war and one we think people should see. How can people make informed decisions about what's happening without seeing what's really going on?"

Hewitt said he expects video sites to emerge as unbiased information centers. People interested in learning about a conflict can log on to these sites to determine for themselves which side is telling the truth.

No longer, Hewitt said, will people rely only on their government or the media to tell them.
http://news.com.com/Now+playing+on+t...3-6108004.html





10 Stolen HCA Computers Contained Patient, Doctor, Worker Records
AP

HCA Inc. said 10 computers containing Medicare and Medicaid billing information and records of employees and physicians were stolen from one of the company's regional offices.

HCA officials won't say where or when the theft occurred because they believe that might help the thieves, who authorities believe were after computer hardware, not personal identity information.

``We don't want to tip them off they may have information that they might use to perpetuate identity theft,'' said HCA spokesman Jeff Prescott.

The Nashville-based for-profit hospital operator reports on its Web site that the FBI is investigating the incident.

The computers held thousands of files on Medicare and Medicaid patients treated at HCA hospitals in Colorado, Kansas, Louisiana, Mississippi, Oklahoma, Oregon, Texas or Washington state between 1996 and 2006.

The machines contained some patient names and Social Security numbers but no addresses or dates of birth.

Prescott said on Thursday the company had also discovered that the names and Social Security numbers of about 7,000 employees and physicians in four states -- Colorado, Kansas, Louisiana and Texas -- were on the computers.

He said the company is notifying those affected by letter.

Authorities believe the computers were stolen by a gang that has committed numerous break-ins in the same area, looking for computers to be sold for their hardware and not the data, according to HCA.

HCA has posted notices about the theft on hospital Web sites and in newspapers and will provide credit counseling to concerned patients.

HCA has created a call center, reached toll free at (800) 354-1036, to help affected patients with their concerns about the stolen computers.

HCA owns or operates 176 hospitals, 92 freestanding surgery centers and facilities for outpatient and ancillary services in 21 states, England and Switzerland.
http://www.siliconvalley.com/mld/sil...l/15298403.htm





A Move to Secure Data by Scattering the Pieces
John Markoff

Chris Gladwin, a software designer and businessman in Chicago, had time on his hands after selling his company, the online music store Music Now, in 2004. So he decided to digitize all of the music, photos and paper detritus that he had been meaning to organize for years.

After he was finished, he discovered that he had 27 gigabytes of data — equivalent to a library of 22,000 books — that he was eager to protect. “I wondered, ‘what are my options?’ ” he said, “and I realized that none of them were that good.”

But he had been reading histories of early encryption research, and he saw a germ of an idea in the work of cryptographers who kept information secure by dividing it into pieces and dispersing it.

So what began as a home improvement project culminated in a system called Cleversafe, with potential applications far beyond Mr. Gladwin’s memorabilia. For companies and government agencies trying to secure networked data, it offers a simple way to store digital documents and other files in slices that can be reassembled only by the computers that originally created the files.

The idea of distributed data storage is not new. But Cleversafe is significant because it is an open-source project — that is, the technology will be freely licensed, enabling others to adopt the design to build commercial products. That approach may contribute to Cleversafe’s potential to lower the cost of reliably storing data on the Internet.

“If we distributed data around the world this way, it would be a pretty resilient way to store data,” said David Patterson, a computer scientist at the University of California, Berkeley, who is a pioneer in designing distributed data storage techniques.

Mr. Gladwin contends that Cleversafe can store data at a lower cost and make it more secure than current Internet services. The group is counting on a continuing explosion of consumer digital data of all types, including new generations of high-definition still and video cameras that will create demand for secure and private backup capabilities.

Computer scientists argue that projects like Cleversafe are an indication that the broadband Internet will soon have the same impact on data storage that it has had on computing and communications technologies. Dozens of commercial Web storage services are already used to back up data safely. In addition, Amazon’s S3 and other services are intended to enable an array of digital Internet services to operate without any local storage capacity.

But the current design of such services generally involves making as many as five or more complete copies of the original data and storing them at multiple locations to ensure that information is not lost through a drive failure or other catastrophe. The Cleversafe design will cut the amount of storage space needed for secure backup by more than half.

Mr. Gladwin, 42, said he was deeply influenced by a seminal paper, “How to Share a Secret,” written in 1979 by Adi Shamir, a designer of the encryption algorithm known as public-key cryptography. The paper describes how a message can be broken into pieces and then reassembled from a subset of those pieces without revealing the message.

Mr. Gladwin developed a set of software routines that would copy the data stored on his PC into a large number of fragments, or slices. The mathematics of his solution had an additional benefit: the original data could be reconstructed from a majority of the slices. The design made it possible to retrieve a complete set of his original data even if some of the disks that held portions of the data failed or went offline.

The design of such “distributed file systems” is already a rich area of computer science research, and commercial systems are widely available in the software and data-storage markets. But Mr. Gladwin argues that his new standard offers security and efficiency features not easily available either to information technology managers or to individual computer users.

The experimental Cleversafe research grid is located at 11 storage sites around the world, but Mr. Gladwin is hoping that a commercial network will evolve, composed of tens of thousands or hundreds of thousands of storage sites that will be accessible at low cost.

The Cleversafe design could lead to a communal Internet storage system that Mr. Patterson called “hippie storage.” The idea is similar to SETI@Home, the shared computing system that allows PC users to contribute idle time on their machines to create a distributed supercomputer.

Today most distributed storage systems work by making multiple copies of data at multiple locations and then using various mechanisms to keep the copies synchronized. Examples include distributed file systems from Microsoft and Google as well as a system designed by software developers at Stanford known as Lockss — Lots of Copies Keep Stuff Safe — that is used to preserve the digital versions of academic journals.

The Cleversafe project uses a different approach based on dispersing data in encrypted slices rather than copying it. That approach shares some design similarities with a Berkeley research project known as OceanStore, which is also intended to create a globally distributed computer storage system.

“They’re not making a commercially implemented solution,” Mr. Gladwin said of the Berkeley project. “Our focus is something that people can use.”

A storage industry analyst said that such an approach had significant potential.

“The great thing about storage is that it’s always a moving target,” said Michael Dortch, principal business analyst at the Robert Frances Group, an industry consulting organization. “The I.T. industry is littered with the bodies of people who have said solution X will never fly.”

The Cleversafe project, with 25 employees, is housed on the campus of the Illinois Institute of Technology in Chicago. Mr. Gladwin said the school had been an ideal technology incubator because of the ready availability of student technical talent.

One company considering the Cleversafe software is Univa, a developer of grid computing software and systems. “The potential to be able to geographically distribute data over the Internet has very nice properties,” said Steve Tuecke, a founder and chief technology officer of Univa, in Lisle, Ill.

An early financial backer of the project, Stewart Alsop, argues that Cleversafe is an indication that the open-source software movement is shifting from merely reusing existing designs to becoming a force for innovation.

“Data storage on the Internet is one of the most brutally competitive markets in the world,” he said. “But nobody is using this architecture, and the logical benefits of this are remarkable.”
http://www.nytimes.com/2006/08/21/te...21storage.html





Minister of Justice Criticizes Anonymization Service
Robert W. Smith

The Minister of Justice of the German federal state of Schleswig-Holstein Uwe Döring (Social Democratic Party; SPD) has called for limits to be set -- in the interest of combating terrorism -- on anonymization on the Internet. The Independent State Center for Data Protection of Schleswig-Holstein (ULD), based in the state's capital of Kiel in northern Germany, should take the anonymization program it offers as a free download off the Internet immediately, Mr. Döring went on to say. "The spending of taxpayers' money on a project that makes it possible for terrorists and criminals of all kinds to commit crimes without being caught, cannot be countenanced," he stated. The ULD has rejected Mr. Döring's statements as unfounded.

The program developed with the help of several German universities (Technical University Dresden, Free University and Humboldt University Berlin) was still being supported by the German Federal Ministry of Economics and Technology, Mr. Döring said. "Something that at the time was created for legitimate data-privacy reasons, these days more or less amounts to an invitation to criminals operating in such areas as child pornography, say, or to terrorists, to get their hands on and use for their own ends." In these days of the War on Terror it was essential that the authorities obtain information fast, the politician from the Social Democratic Party stated. "Such programs are more or less designed to foil authorities' attempts to act swiftly," he declared.

The data protection center promptly rejected the minister's reasoning. "These conclusions are very difficult to comprehend," the head of the ULD Thilo Weichert said. "The project was carried out in close cooperation with the prosecuting authorities of both the German federal states and the federal government." If there was reasonable suspicion of a crime and if the German Code of Criminal Procedure provided for such an approach in the case in question, it was quite possible to register the IP addresses of computers, Mr. Weichert observed. Moreover, a district court had already in a legal dispute confirmed the legitimacy of AN.ON's offer. "The business community has also pointed out to us that for companies it is a very important tool for protecting themselves against industrial espionage on the Internet," he added.
http://www.heise.de/english/newsticker/news/77162





Wiretap Ruling Threatens Telecoms
Catherine Holahan and Dawn Kopecki

Businesses accused of helping the Bush Administration eavesdrop on customers could be in for a legal bruising

Telecommunications and Internet companies accused of working with the Bush Administration's domestic eavesdropping program could be in for more legal headaches, after a federal judge ruled Thursday that the warrantless wiretaps violated the constitution.
U.S. District Judge Anna Diggs Taylor in Detroit dealt a major blow to the White House in a 43-page opinion that said President George W. Bush exceeded his authority and that the program violated the First and Fourth Amendments protecting free speech and privacy. She ordered the National Security Agency to immediately halt a secret program that monitors telephone calls and e-mails of Americans that are in contact with suspected terrorists.

Future Fight.

The federal government plans to appeal the case, which appears headed for the Supreme Court. The American Civil Liberties Union, which brought the suit against the NSA, agreed to temporarily allow the wiretapping program to continue, while the Justice Dept. prepares to fight the court's decision at a hearing scheduled for Sept. 7.

U.S. Attorney General Alberto Gonzales said he was disappointed and that he and the administration "respectfully disagree" with the ruling, saying the program has been extremely effective and important to national security.

"I believe very strongly that the president does have the authority to authorize this kind of conduct in a time—particularly in a time of war," Gonzales told reporters at a press conference held shortly after the court's decision.

Political Talk.

Lawmakers quickly recast the decision as a partisan issue, ripe for debate in November's elections. Senate Democratic Leader Harry Reid of Nevada said the ruling was "the latest example of how the Bush Administration has jeopardized our efforts in the war on terror. The Administration's decision to ignore the Constitution and the Congress has come at the expense of the security of the American people." The subject line of an e-mail blast from the Republican National Committee read, "Liberal Judge Backs Dem Agenda to Weaken National Security."

Businesses accused of aiding the Bush administration in wiretapping could also be in for a legal bruising, say civil liberties groups that have sued telecom providers AT&T (T ), Verizon (VZ ), and BellSouth (BLS ) for allegedly helping the NSA. The ruling could set a precedent other courts can't ignore.

"Every phone company that is assisting the government in its illegal surveillance would want to think long and hard before it continues that agreement," says Ann Beeson, the ACLU's lead attorney in the case. "There are already lawsuits claiming that their cooperation for the past several years is illegal and now that the judge has declared it is illegal, their liability increases. The risk is much greater from a business perspective."

ACLU Advantage.

AT&T spokesman Walt Sharp declined to comment on the litigation, saying, "We're fully committed to protecting our customer's privacy, and beyond that, we don't comment on matters of national security." Verizon spokesman Eric Rabe said, "We believe that everything we've done here has been within the law."

He added that it was too soon to say whether the court's ruling will attract more litigation. "There have been all kinds of opportunistic lawsuits since this story became public…I've read the decision. But how it plays out, we'll have to wait and see." Officials at BellSouth did not return calls for comment.

The Electronic Frontier Foundation (EFF), a nonprofit advocacy group for digital rights, said the ACLU's victory strengthens the EFF's own case against AT&T, which is taking place in the U.S District Court for the Northern District of California. The federal government and others have tried to get that case and related lawsuits dismissed, based largely on arguments that laws prohibiting the disclosure of state secrets override all other legal claims.

Security's Weak Signal.

In the ACLU case, however, Judge Taylor rejected the government's argument that national security interests override the constitutional protections of journalists, lawyers, and others who brought the suit in Detroit, saying that "…public interest is clear in this matter. It is the upholding of our constitution."

"It was never the intent of the framers to give the president such unfettered control, particularly where his actions blatantly disregard the parameters clearly enumerated in the Bill of Rights," she wrote in her decision, which is the first to rule on the legality of the federal government's domestic surveillance program. "The Office of the Chief Executive has itself been created, with its powers, by the Constitution. There are no hereditary Kings in America and no powers not created by the Constitution."

AT&T and the government lost their motion last month to dismiss the EFF's case. The motion is being appealed, and a decision is expected by the end of the month. Cindy Cohn, legal director at the EFF, says that the recent ruling makes it more unlikely that AT&T and the government will win on appeal. "It is good that the federal courts are stepping up and recognizing our role in protecting our rights even in times when there are national security interests at stake," says Cohn. "The judge said we have an obligation under the constitution to protect people's rights even under an executive that claims national security."

Attention On AT&T.

The EFF singled out AT&T, relying on testimony and documents provided by a former employee. The group believes the employee makes a strong case that the company was directly involved in the NSA's wiretapping program (see BusinessWeek.com, 5/29/06, "The Snooping Goes Beyond Phone Calls").

The group also believes that other companies are involved, but Cohn says they do not have enough evidence to expand the suit (see BusinessWeek.com, 1/23/06, "The NSA: Security in Numbers").

Given the recent ruling, future claims are likely inevitable—not least because Judge Taylor left open the question of whether telecom and Internet companies were allowed to store data on customers. Taylor ruled that there was not enough evidence out in the open for her to make a decision regarding the matter and threw out that portion of the case.

The amount of data collected by Internet companies has recently been questioned by the EFF, as well as other civil liberties and privacy advocates. Time Warner's AOL (TWX ) recently revealed that it collects and stores search data for its clients for months. Though the data is stored under numbers corresponding to users, and not their names, the content of searches can be detailed enough to identify individuals.
http://www.businessweek.com/technolo...ier_bier_tpnun





Qwest on Data Retention Laws: Oops
Declan McCullagh

Broadband provider Qwest Communications International said Wednesday that it made a mistake when one of its lawyers endorsed federal legislation requiring Internet providers to keep records of customers' behavior.

Jennifer Mardosz, Qwest's corporate counsel and chief privacy officer, said in an interview with CNET News.com that she misspoke during a panel discussion organized by the Progress and Freedom Foundation in Aspen, Colo., the day before.

"I just completely misspoke there," Mardosz said. During the panel discussion, she said Qwest "absolutely" supports House of Representatives legislation sponsored by Rep. Diana DeGette mandating data retention--a requirement that Attorney General Alberto Gonzales said will aid in terrorism and child exploitation investigations.

"I associated (DeGette's) name with the female Colorado legislator that introduced the state legislation," Mardosz said. "That was just a pure and honest mistake that I made."

Mardosz said that instead of embracing data retention legislation, Qwest was skeptical of mandates from Congress. "There is no need for it, because companies are already doing the right thing," she said.

On Tuesday she said during the panel discussion: "We support legislation related to data retention." One industry source, who spoke on condition of anonymity because he was not authorized to speak to the press, said Qwest had backed the Colorado legislation earlier this year.

The original version of the Colorado bill required Internet providers to "maintain, for at least 180 days after assignment, a record of the Internet Protocol address" assigned to each customer. Violations could be punished by fines of up to $10,000 per incident. The language was subsequently changed.

Qwest's revised position brings it in line with other telecommunications companies, which say they are already required by law to cooperate with criminal investigations and have been generally skeptical of broad, new mandates. The Denver-based company has a market capitalization of $16.5 billion and says it has 784,000 wireless customers and 1.7 million DSL (digital subscriber line) customers.

DeGette's proposed legislation says any Internet service that "enables users to access content" must permanently retain records that would permit police to identify each user. The records could not be discarded until at least one year after the user's account was closed.

Rep. Joe Barton, the influential Republican chairman of the House Energy and Commerce Committee, has endorsed the concept of data retention and is expected to introduce a bill after the panel completes a series of hearings on child exploitation.
http://news.com.com/Qwest+on+data+re...3-6108926.html





US Sues Maine Officials For Probe On Verizon, NSA

The U.S. government sued Maine officials on Tuesday to block their demand that Verizon disclose whether it gave the government's spying program access to its customer data, documents showed.

The government's civil suit, submitted by the U.S. Department of Justice to a district court in Maine, said the Maine public utilities officials' attempts to obtain information on Verizon's involvement with the National Security Agency (NSA) were "invalid."

"The defendant state officers' attempts to obtain such information are invalid under the Supremacy Clause of the United States Constitution and are preempted by the United States Constitution and various federal statutes," the lawsuit said.

Kurt Adams, chairman of the Maine Public Utilities Commission, as well as two other regulatory officials, were named in the lawsuit.

Verizon's local subsidiaries were also named to prevent the company from responding to the Maine officials' demands for information.

"We're just in the middle here," said Verizon spokesman Peter Thonis.

The federal government has also sued the New Jersey Attorney General and Missouri utility regulators for serving similar subpoenas for information to AT&T Inc.

USA Today in May reported that AT&T, BellSouth Corp and Verizon had supplied customer call records to the NSA for an anti-terrorism program, sparking protests and class action lawsuits from privacy advocates.
http://www.washingtonpost.com/wp-dyn...082200718.html





AT&T Says Cooperation in NSA Spying Was Legal
Declan McCullagh

An AT&T executive on Tuesday offered a glimpse into how the company appears to have opened its networks to the National Security Agency.

James Cicconi, AT&T's senior executive vice president for external and legislative affairs, said there is a "very specific federal statute" that the company followed when cooperating with the NSA that provides "black and white authorization."

"We have simply complied with those laws," he said.

That's a slightly more detailed explanation than AT&T has publicly offered so far. In February, AT&T declined to answer related questions from CNET News.com. In May, an AT&T spokesman told News.com: "Without commenting on or confirming the existence of the program, we can say that when the government asks for our help in protecting national security, and the request is within the law, we will provide that assistance."

Because Cicconi was AT&T's general counsel before the merger with SBC Communications, he would have been responsible for reviewing the legality of cooperating with the NSA. A longtime Republican, Cicconi worked as deputy chief of staff to President George H.W. Bush and as an assistant to President Ronald Reagan. He's recently served as co-chairman of Progress for America, a prominent group devoted to electing Republican politicians.

Cicconi's remarks--in response to a question at the Progress and Freedom Foundation's annual summit here--seem to indicate that AT&T received formal authorization from the U.S. Department of Justice to authorize the program. The existence of such a letter has never been confirmed.

Cicconi may have been referring to an obscure section of federal law, 18 U.S.C. 2511, which permits a telecommunications company to provide "information" and "facilities" to the federal government as long as the attorney general authorizes it. The authorization must come in the form of "certification in writing by...the Attorney General of the United States that no warrant or court order is required by law."

If a letter of certification exists, AT&T could be off the hook in its lawsuits. Federal law says that a "good faith" reliance on a letter of certification "is a complete defense to any civil or criminal" lawsuit, including one brought against the company by the Electronic Frontier Foundation. (Other officials, including the deputy attorney general and state attorneys general, also are authorized to write these letters.)

In its class action lawsuit filed in January, the EFF alleged that AT&T violated federal wiretapping laws by cooperating with the NSA.

After EFF's lawsuit was filed, reports of a secret room in an AT&T building in San Francisco surfaced and have become central to the nonprofit group's litigation. A former AT&T employee, Mark Klein, has released documents alleging the company spliced its fiber optic cables and ran a duplicate set of cables to Room 641A at its 611 Folsom St. building. Redacted documents show that AT&T has tried to offer benign reasons for the existence of such a room.
http://news.com.com/AT38T+says+coope...3-6108386.html





Officials Seek Broader Access to Airline Data
Eric Lipton

United States and European authorities, looking for more tools to detect terrorist plots, want to expand the screening of international airline passengers by digging deep into a vast repository of airline itineraries, personal information and payment data.

A proposal by Homeland Security Secretary Michael Chertoff would allow the United States government not only to look for known terrorists on watch lists, but also to search broadly through the passenger itinerary data to identify people who may be linked to terrorists, he said in a recent interview.

Similarly, European leaders are considering seeking access to this same database, which contains not only names and addresses of travelers, but often their credit card information, e-mail addresses, telephone numbers and related hotel or car reservations.
“It forms part of an arsenal of tools which should be at least at the disposal of law enforcement authorities,” Friso Roscam Abbing, a spokesman for Franco Frattini, vice president of the European Commission and the European commissioner responsible for justice and security, said Monday.

The proposals, prompted by the recent British bomb-plot allegations, have inspired a new round of protests from civil libertarians and privacy experts, who had objected to earlier efforts to plumb those repositories for clues.

“This is a confirmation of our warnings that once you let the camel’s nose under the tent, it takes 10 minutes for them to want to start expanding these programs in all different directions,” said Jay Stanley, a privacy expert at the American Civil Liberties Union.

The United States already has rules in place, and European states will have rules by this fall, allowing them to obtain basic passenger information commonly found in a passport, like name, nationality and date of birth. American officials are pressing to get this information, from a database called the Advance Passenger Information System, transmitted to them even before a plane takes off for the United States.

But a second, more comprehensive database known as the Passenger Name Record is created by global travel reservation services like Sabre, Galileo and Amadeus, companies that handle reservations for most airlines as well as for Internet sites like Travelocity.

Each time someone makes a reservation, a file is created, including the name of the person who reserved the flight and any others traveling in the party. The electronic file often also contains details on rental cars or hotels, credit card information relating to travel, contact information for the passenger and next of kin, and at times even personal preferences, like a request for a king-size bed in a hotel.

European authorities currently have no system in place to routinely gain access to this Passenger Name Record data. Mr. Frattini, his spokesman said, intends to propose that governments across Europe establish policies that allow them to tap into this data so they can quickly check the background of individuals boarding flights to Europe.

“It is not going to solve all our problems,” Mr. Abbing said. “It is not going to stop terrorism. But you need a very comprehensive policy.”

American authorities, under an agreement reached with European authorities in 2004, are already allowed to pull most of this information from the reservation company databases for flights to the United States to help look for people on watch lists.

Members of the European Parliament successfully challenged the legality of this agreement, resulting in a ruling in May by Europe’s highest court prohibiting the use of the data after Sept. 30, unless the accord is renegotiated. European and American officials expect to reach a new agreement by the end of September.

But Mr. Chertoff said that in addition to simply reinstating the existing agreement, he would like to see it eventually revised so American law enforcement officials had greater ability to search the data for links to terrorists.

Under the current agreement, for example, the United States government can maintain Passenger Name Record data on European flights for three and a half years. But it is limited in its ability to give the data to law enforcement agencies to conduct computerized searches. Those searches could include comparing the passenger data to addresses, telephone numbers or credit card records on file for known or suspected terrorists, Mr. Chertoff said.

“Ideally, I would like to know, did Mohamed Atta get his ticket paid on the same credit card,” Mr. Chertoff said, citing the lead hijacker of the 2001 plots. “That would be a huge thing. And I really would like to know that in advance, because that would allow us to identify an unknown terrorist.”

Paul Rosenzweig, a senior policy adviser at the Homeland Security department, said the use of the passenger data would be negotiated with European authorities.

“We are handcuffed in what we can do with it now,” he said. “It would be a big step forward if we could identify ways in which we can use this information to enhance our ability to detect and prevent terrorism while at the same time remaining respectful and responsive to European concerns regarding privacy.”

But the proposals to expand access to this data will be likely to spur objections.

Graham Watson, the leader of the Liberal Democrat group in the European Parliament, said that given the previous opposition to the American use of the passenger record data, he expects the plan by Mr. Frattini will draw protests.

“I think that is unlikely to fly,” he said in an interview on Monday.

The problem, Mr. Watson said, is not a lack of information, but the unwillingness of individual European states to share with other countries data on possible terrorists so that it can be effectively used to block their movement internationally.

Mr. Stanley of the civil liberties union said that if Mr. Chertoff and Mr. Frattini continued in the direction they are headed, the government would soon be maintaining and routinely searching giant databases loaded with personal information on tens of millions of law-abiding Americans and foreigners.

But Stephen A. Luckey, a retired Northwest Airlines pilot and aviation security consultant, said those efforts were an essential ingredient in a robust aviation security system.

“Even with the best technology in the world, we will never be able to separate the individual from the tools he needs to attack us,” said Mr. Luckey, who helped airlines in the United States develop a screening system for domestic passengers. “You are not going to find them all. You have to look for the person with hostile intent.”
http://www.nytimes.com/2006/08/22/wa...=1&oref=slogin





3 Leave AOL in Search-Data Fallout
Anick Jesdanun

AOL's chief technology officer left the company and two other workers were fired in the aftermath of a privacy breach that involved the intentional release of more than 650,000 subscribers' Internet search terms.

Although AOL had substituted numeric IDs for the subscribers' user names, the search queries themselves contained Social Security numbers, medical conditions and other data that could be traced to an individual. In fact, The New York Times was able to trace user 4417749 to Thelma Arnold, 62, of Lilburn, Ga.

Maureen Govern, the technology chief, will be replaced on an interim basis by John McKinley, who had held that position before becoming AOL's president for digital services. The change takes effect immediately, according to a memo AOL Chief Executive Jonathan Miller sent to employees on Monday.

"This incident took place because some employees did not exercise good judgment or review their proposal with our privacy team," Miller said in a second memo. "We are taking appropriate action with the employees who were responsible."

The data release is among a series of breaches involving sensitive information in recent months. Unlike those resulting from computer hacking or missing laptops, however, the AOL data had been intentionally released as part of a program to assist academic researchers.

AOL, a unit of Time Warner Inc., apologized two weeks ago for what it termed a mistake made by a company researcher who had failed to properly seek clearances before releasing three months' worth of search data. Though the information was meant for researchers, it was released to a public site and quickly circulated once a blogger discovered it.

The company fired the researcher who released the data and that employee's direct supervisor, who reported to Govern, said one person familiar with the company's decisions. The person, who spoke on condition of anonymity because release of personnel information was not authorized, would not say whether Govern's departure was voluntary. The person also would not identify the two employees who were fired.

Although the search terms released were not directly tied to real names, many individuals type their own names to find out what's being said about them. They may later search for online mentions of their credit card or Social Security numbers and perhaps for prescription drug prices, revealing their medical ailments. All the searches for each user name were linked to the same numeric ID in the released data.

AOL removed the information from its site once senior executives learned of it, but by then copies already were widely available. Some people even created search sites just for the AOL data.

At least two groups have asked the Federal Trade Commission to investigate. In its complaint, filed last week, the Electronic Frontier Foundation accused AOL of breaking a promise to protect its subscribers' privacy.

Kevin Bankston, staff attorney with the EFF, said he hoped the breach would prompt Internet companies to be more forthcoming about what data they keep and for how long. Congress, he said, may need to intervene.

"Rearranging personnel is not going to get to the root of this problem, a problem which extends far beyond AOL and to the rest of the Internet industry," Bankston said. "As an industry, the search engines have been unacceptably tightlipped about what their practices are regarding search logs."

To prevent a recurrence, Miller said AOL will:

- Create a task force led by senior executives to review privacy and data-retention policies.

- Place additional limits on employee access to data, regardless of whether they are linked to individual accounts.

- Evaluate technologies designed to flag sensitive information. Under such a system, for instance, a 16-digit string might be assumed to be credit card number and kept out of research databases.

- Improve employee education and awareness on privacy.

The fallout occurs as AOL tries to lure more people to its search services and other free, ad-supported features to offset a revenue decline that's likely to accelerate as the company stops charging for AOL.com e-mail accounts and software.

AOL continues to rank fourth in search, behind Google Inc., Yahoo Inc. and Microsoft Corp.'s MSN, according to data released this week by Nielsen/NetRatings and comScore Media Metrix.

Shares in Time Warner closed unchanged at $16.50 in Monday trading on the New York Stock Exchange.
http://hosted.ap.org/dynamic/stories...08-21-17-46-28





AOL Moves to Increase Privacy on Search Queries
Tom Zeller Jr.

AOL announced the resignation of its chief technology officer yesterday, two weeks after the company came under intense criticism from privacy advocates for releasing hundreds of thousands of its customers’ Web search queries.

An AOL researcher who put the queries online and a manager overseeing the project were dismissed, according to an AOL employee who did not want to be identified because the company does not comment publicly on personnel matters.

AOL, a unit of Time Warner, also said it planned to enhance data-privacy protections, reconsider the length of time that it holds onto the millions of search queries that customers make every day and re-educate its own employees about the sensitivity of personal data.

“This incident took place because some employees did not exercise good judgment or review their proposal with our privacy team,” Jonathan F. Miller, the chief executive, wrote in an e-mail message to employees released yesterday afternoon. “We are taking appropriate action with the employees who were responsible.”

The technology officer, Maureen Govern, had been hired by the company just under a year ago to succeed John McKinley. Mr. McKinley, who has been running the company’s digital services division, will step back into his old post, according to Mr. Miller’s memo.

“I want to thank Maureen for her hard work during her time with AOL,” Mr. Miller’s announcement said, “and we wish her all the best as she pursues new opportunities.”

Kevin Bankston, a lawyer with the Electronic Frontier Foundation, a digital-rights group that has filed a complaint with the Federal Trade Commission over the data release, said the AOL shake-up would not address the underlying issue.

“Staffing changes aren’t going to get to the root of this problem,” Mr. Bankston said. “It’s a problem that reaches to the whole search industry, and not just AOL.”

Nearly 20 million discrete search queries, representing the personal Internet hunting habits of more than 650,000 AOL customers gathered over a three-month period last spring, were posted by a company researcher, Abdur Chowdhury, on a publicly accessible Web site late last month.

No user names were attached to the query data, which was intended for use by search engine researchers in academia. But word of the data — which provided an intimate, sometimes disturbing look into what Americans search for on the Web — spread through the blog circuit and immediately began raising questions about the sorts of privacy consumers were entitled to when they used search engines.

AOL removed the data and apologized for the mistake, saying the release was not approved by higher-ups within the company.

Within days, however, the data had been downloaded, reposted and made searchable at several Web sites. At least two of the AOL users have been identified by name in press accounts, and people have speculated about the identities of others on various Web sites.

The World Privacy Forum, a consumer advocacy group based in San Diego, also filed a complaint with the F.T.C. over the release, asking the agency to appoint an independent privacy board to oversee AOL’s future use of its consumer data.

“AOL’s internal policies and procedures have by all appearances failed and when that happens, it’s a good business practice to institute robust independent oversight,” Pam Dixon, the group’s executive director, said.

In his memo, Mr. Miller outlined several initiatives at the company, including the exploration of technologies that could be used to make more anonymous the query data used for research purposes. For example, it might use software to scan the query logs looking for strings of numbers that could represent Social Security or credit card numbers, so they could be removed.

Mr. Miller also said AOL would put in place new restrictions on access to customer data within the company, and was creating a task force charged with examining “how long we should save data, including search data.”

This has become a central question for a growing number of Internet companies — including search companies — that must balance consumer privacy with the desires of law enforcement, marketers and even some academics, who see value in holding on to information and making limited use of it.

Eric C. Jensen, a researcher at the Information Retrieval Laboratory at the Illinois Institute of Technology, which receives financing from AOL and where Mr. Chowdhury was an affiliate, said there were “a lot of questions out there in academia that can’t get addressed without this kind of data,” and that the company had acted rashly.

“Their response has served to inflame the situation rather than address the problem,” Dr. Jensen said, adding that “I think that rather than making scapegoats out of people, you could have explained what this data was for, and say, ‘yes, there’s a privacy discussion to be had here, so let’s try to figure it out.’ ”

Dr. Jensen, who said he had worked closely with Mr. Chowdhury on projects for AOL’s search team, also said he had been told that the posting of the data had been approved by all appropriate executives at AOL, including Ms. Govern. Mr. Chowdhury, through his lawyer, declined to comment.

Among the major search companies, Yahoo has been the leader in mining its users’ search histories for marketing purposes — trying to predict their desires and feed them highly specific advertisements.

The Justice Department has repeatedly signaled its strong interest, through continued conversations with Internet companies and members of Congress, in having the data retained to help it fight terrorism and child pornography, although no formal requirements are in place. “We’re continuing to make sure we’re looking at every aspect of the issue before we make any specific recommendations,” Tasia Scolinos, a Justice Department spokeswoman, said.

Query data from all four of the big search companies — Yahoo, Google, MSN from Microsoft and AOL — was subpoenaed by the Justice Department last year, as part of the agency’s efforts to enforce an online child pornography law.

Google, which was alone in resisting the subpoena in federal court, ultimately won the right to withhold its query data from the government, but was ordered to turn over information on Web site addresses returned in searches.

Privacy advocates celebrated that decision, but more recently they have warned Google, which stores every query it handles, that it was in danger of becoming the next AOL.

Steve Langdon, a Google spokesman, said his company did not anticipate changing course as a result of AOL’s mishap and personnel shake-up.

“Employees who have access to user data are very aware of the importance of its security and confidentiality,” Mr. Langdon said. “We regularly review privacy policies and practices and will always be working on ways to improve them, though we do not anticipate significant changes in the near term.”

Mr. Bankston suggested that this was the kind of response that he and other privacy advocates feared. “This is not just AOL’s problem,” he said. “This is an industrywide problem that needs industrywide solutions.”
http://www.nytimes.com/2006/08/22/technology/22aol.html





Researchers Yearn to Use AOL Logs, but They Hesitate
Katie Hafner

When AOL researchers released three months’ worth of users’ query logs to a publicly accessible Web site late last month, Jon Kleinberg, a professor of computer science at Cornell, downloaded the data right away. But when a firestorm over privacy breaches erupted, he decided against using it.

“Now it’s sitting there, in cold storage,” said Professor Kleinberg, who works on algorithms for understanding the structure of the Web and searching it. “The number of things it reveals about individual people seems much too much. In general, you don’t want to do research on tainted data.”

After the data was released for academic researchers like Professor Kleinberg to work with, many were torn, loath to conduct research with it as they balanced a chronic thirst for useful data against concerns over individual privacy.

It is one of the frustrations of being an academic researcher in a world that has grown highly commercial. Data is everywhere, but there is precious little of it for university researchers to work with. Raw data about people’s online behavior — the grist for many an academic researcher’s mill — remains locked up inside large companies, accessible only to a subset of corporate researchers.

The AOL incident has set off a flurry of divergent opinions in the academic community over the appropriateness of using the data for academic research.

Some see the data as too valuable to withhold altogether. “One of the biggest problems is trying to get real data,” said Christopher Manning, an assistant professor of computer science and linguistics at Stanford University.

Although the 650,000 AOL users were not personally identified in the data, the logs contained enough information to discern an individual’s identity in some cases.

AOL quickly withdrew the data from its research Web site, but not before it had been downloaded, reposted and made searchable at a number of Web sites. And on Monday, the company dismissed Abdur Chowdhury, the researcher who posted the data, along with another employee. Maureen Govern, AOL’s chief technology officer, resigned.

Academia has a longstanding disadvantage when it comes to raw data. While fresh data sets are routinely made available to researchers at large companies like Google, academia has largely made do with the same two sets of search data — one from Excite and one from Alta Vista — for nearly 10 years.

Meanwhile, a virtual eternity has elapsed and those two data sets have long outlived their usefulness. “The way people use search engines now is totally different,” Professor Kleinberg said. “Partly because what you expected to get out of a search engine back then was much less, so people didn’t try anything too fancy.”

While acknowledging “genuine privacy concerns,” Professor Manning said, “I think it’s fair to say that given researchers’ craving for data, having the AOL data available is a great boon for research.”

Professor Manning, who has downloaded a copy of the AOL data set but has no immediate plans to work with it, added that the trove of raw research material represented by the AOL data “obviates the need for anyone to worry about getting data for a while.”

William W. Cohen, an associate research professor in the machine learning department at Carnegie Mellon University, said the AOL query logs could be invaluable for researchers working in the field of personalization.

“Someone’s past search history can tell you a lot about what they’re interested in,” he said. Professor Cohen, who takes annual vacations near Charleston, S.C., used himself as an example.

“By knowing what someone searched for in the past, you can do a lot better at answering a query,” he said. “If you look at my recent searches, they might have something to do with vacation homes, Folly Beach and car rentals. So if I search for seafood restaurants, it’s more likely I’ll be looking for one in the Charleston area, and if I say ‘Charleston,’ it’s much more likely to be South Carolina than West Virginia.”

At the same time, Professor Cohen shares Professor Kleinberg’s view about the AOL query logs.

“I would feel personally uncomfortable looking too closely at searches showing things like marriages breaking up,” he said. “I don’t want to do research in order to see if my algorithms are working correctly, while delving into the details of people’s lives.”

Professor Cohen said that although he might eventually do research on the data set, “the privacy issues are something I’d have to think through very carefully.”

Companies occasionally mete data out to academic researchers. Microsoft has done this, but in a controlled fashion. Yahoo shares some statistical data with researchers who are approved case by case through an internal vetting program, according to Joanna Stevens, a company spokeswoman, but query data, she said, has never been distributed.

Asked about its policy, Google issued a statement that said, “Our current policy is not to release queries or personal data to researchers outside of the company.”

Oren Etzioni, a professor of computer science at the University of Washington, said that shortly after the news of the privacy violations surfaced, he had lunch with Dr. Chowdhury and two of Dr. Chowdhury’s colleagues.

Professor Etzioni said Dr. Chowdhury was horrified by what had happened. “He didn’t anticipate that this kind of data could be used to track down individuals.” Dr. Chowdhury declined to comment, at the advice of his lawyer.

The release of the AOL query logs coincided with a global conference in Seattle of information retrieval researchers, and it prompted heated discussions among those in attendance.

Among them was Jamie Callan, an associate professor in the school of computer science at Carnegie Mellon and chairman of the Association for Computing Machinery’s special-interest group on information retrieval, which organized the conference.

Professor Callan said that although no one disagreed on the importance of protecting privacy, “there’s also a strong belief that it is very important for the scientific community to have access to data of this kind in some anonymized form.”

The last similar case involved a set of hundreds of thousands of internal e-mail messages from Enron, posted in 2003 on the Federal Energy Regulatory Commission’s Web site, in connection with the agency’s investigation into the company.

Although some of the e-mail was relevant to the investigation, most of it was not. So hungry were researchers for a coherent body of e-mail messages to work with that they were able to set aside their concerns that the privacy of many people who had nothing to do with the Enron scandal was severely compromised.

“Researchers glommed onto it,” Professor Manning said. “It was enormously good for academic research for all kinds of things you might want to do, like social network analysis.”

Several research papers have emerged in the years since the Enron e-mail corpus was released, and it remains the only large body of actual e-mail in the public domain.

“It seems this AOL data is creating more of a stir,” Professor Manning said. Where the release of the Enron e-mail was justified as shedding light on corporate wrongdoers, “the AOL data is more like a real violation.”

Professor Etzioni and others say one partial solution to heightened privacy concerns could lie in more stringent “scrubbing” of data in a way that did not diminish its quality as a research tool. This could entail, for instance, replacing numbers that carry identifying information — like Social Security numbers and ZIP codes — with zeros, or replacing the word “New York” with “X17.” To a researcher, Professor Etzioni said, “it doesn’t matter so much that it’s New York as X17.”

Professor Kleinberg said he hoped that over time, the AOL incident would lead to “a richer, more informed discussion about what it means to create data sets that are clean and anonymized.”

Still, a freeze on all data distribution is likely to be in effect for the foreseeable future.

Professor Etzioni said that over lunch with the AOL researchers, he had mentioned that for his own research, he was interested in a data set containing queries starting with “Wh,” to signify that a question was being asked. Such data need not be tied to an individual to be useful as a research tool.

“We build technology that answers questions,” he said. “So we want to test it on actual questions people are asking.”

The AOL researchers told Professor Etzioni they would get approval from the company and send him a compact disc containing the question set.

But Professor Etzioni is not holding out much hope of receiving the data. “I don’t think that CD is in the mail,” he said, “and that’s too bad.”

Tom Zeller Jr. contributed reporting for this article.
http://www.nytimes.com/2006/08/23/te.../23search.html





Couple to AOL: Stop Searching For Spammer's Gold
Candace Lombardi

A small-town New England couple says AOL's search for a spammer's gold on their property must be stopped.

In May 2005, AOL won a $12.8 million lawsuit against Davis Wolfgang Hawke and two other men who AOL says made millions by targeting AOL members with spam offers for everything from penile implants and spying software to diet pills, according to court documents. Not long after, Hawke disappeared.

Hawke, a reputed member of a neo-Nazi group, was born Andrew Britt Greenbaum and changed his name to hide his Jewish heritage, according to his mother, who says she thinks he's in Belize.

Now AOL aims to collect, even if that means digging for gold on Hawke's parents' property in Medfield, Mass., located about 22 miles southwest of Boston.

That's not sitting well with Hyman and Peggy Greenbaum. Peggy Greenbaum says the couple had nothing to do with spamming and can't believe that their son would be "stupid" enough to bury gold bars on their property.

"We don't have an attorney. My husband is writing an objection, and I'm writing an objection to searching our property and also the interior of house--any kind of search," Peggy Greenbaum said in an interview with CNET News.com. "Not that we're hiding anything; it's just that we haven't been a part of any of Britt's spamming activities."

The Greenbaums may not have much of a say in the matter. In April, U.S. District Court Judge Nathaniel Gorton granted a motion giving AOL the right to any property that Hawke left with his parents or his grandparents.

AOL spokesman Nicholas Graham confirmed that the company has obtained a court order, but he would not say when or where, exactly, the company plans to search.

Sophisticated search planned

Peggy Greenbaum said she has not yet received a court order to specifically search her property, a four-bedroom home on almost 2 acres of wooded land. But she and her husband did receive a letter telling them to send a list of any effects Hawke left behind at their home. The list amounted to nothing more than some old furniture and his baby clothes, she said.

AOL plans to use sophisticated sonar and radar detection to determine if there is anything of significance on the property they search, Graham said. If the company finds something that "looks" like gold or platinum, then it will be ready to disrupt the soil. Graham said AOL plans to conduct any search in a professional manner, with an effort to make minimal disruption to the property and its owners.

"I don't think he buried any gold on our property because he's not that stupid. And I don't think AOL thinks he did, either," Peggy Greenbaum said.

Greenbaum does believe the gold or platinum bars exist, though. According to her, Hawke told his father that he had purchased gold, but not how much. While the notion of the purchase seemed strange, Hawke's parents chalked it up to their son's eccentric nature.

Greenbaum says her son, now in his late 20s, was never quite right mentally after an extended bout of physical abuse by school bullies, who targeted Hawke for being Jewish when they lived in the rural town of Lakeville, Mass., leaving him with a permanently damaged hand.

From receipts shown to her and her husband by AOL, Greenbaum believes that at least $365,000 in gold or platinum bars exists. But she doubts that her son buried anything on their property, because he knew his parents had plans to move.

"Before AOL even sued him, we weren't sure how long we were going to be here because the house is so big," his mother said. "I am hoping to move soon, but I don't want to move right away. I don't want people to think I'm moving because of...you know...all the publicity. My point is that Britt was fully aware of the fact that we planned to move, but that we weren't sure when."

Greenbaum said that, in addition to saying he had stashed his spam profits on her property, Hawke also bragged to a former girlfriend about burying assets on his grandfather's property, the Rocky Woods hiking reservation in Medfield and in New Hampshire's White Mountains. Greenbaum said she doesn't believe those stories, however. Hawke is "crazy as a June bug," according to Greenbaum, so there is no telling what was going on in his mind or where he has hid his fortune.

AOL says it considers this search business as usual.

"This particular defendant may have a colorful and outrageous history--there are some conditions that might make this case unique--but in terms of pursuing assets or property, that is not new," Graham said. "AOL has recovered a Porsche, as well as a Hummer and gold coins. This is simply a continuation of efforts that we have been known to conduct in the past and have been successful at."
http://news.com.com/Couple+to+AOL+St...3-6107253.html





Spammer's Kin To Allow Initial Search
Denise Lavoie

The grandparents of a notorious Internet spammer say they will allow AOL to do an initial search of their property to see if their grandson buried gold there.

Robert Davis, the 90-year-old grandfather of Davis Wolfgang Hawke, said that after initially opposing AOL's request to survey his land and possibly dig there, he and his wife decided to compromise to avoid an expensive legal battle with the company.

They will allow the company to use radar and sonar equipment to find out if anything is buried in their yard in Westwood, a Boston suburb.

Davis said if AOL detects anything underground and asks to dig up his yard, he may still oppose that. "I don't want them digging," he said.

The Internet company wants to search for valuables it believes may be buried there to satisfy a $12.8 million judgment it won in federal court last year. A default judgment was entered against Hawke, who didn't show up in court.

Hawke was accused of violating U.S. and Virginia anti-spam laws by sending massive amounts of unwanted e-mails to AOL's subscribers.

At the height of their activities, Hawke and his partners earned more than $600,000 a month by sending unwanted sales pitches over the Internet for loans, pornography, jewelry and prescription drugs, investigators believe.

AOL believes Hawke may have buried gold and platinum he acquired with his ill-gotten gains on his grandparents' property and his parents' property in nearby Medfield.

Davis doesn't believe his grandson buried anything of value on his land. "I think there's one chance in 10 million," he said.

Hawke's mother, Peggy Greenbaum, has maintained she intends to fight AOL's attempts to search her property.

Nicholas Graham, a spokesman for AOL, declined comment Tuesday.
http://hosted.ap.org/dynamic/stories...08-22-22-50-28





Crackberry - It's No Joke
Stuart Corner

BlackBerry developer Research in Motion has garnered considerable kudos from the addictive nature of its pioneering push email technology, but that could change with suggestions that technology addiction is no laughing matter and that employers could face liability for their employees' affliction.
According to Gayle Porter, an associate professor of management at the Rutgers University School of Business in New Jersey, employers who encourage non-stop work connections via technology may wind up with liability for encouraging addiction among their staff.

"Owing to vested interests of the employers and the ICT industry, signs of possible addiction - excess use of ICT and related stress illnesses - are often ignored," she says.

Porter is the co-author of a forthcoming study and suggests that that existing workplace legislation that places the onus on employers to protect their employees could be extended to cover the dangers of 'technology addiction'.

"Courts have long recognized the special duty of employers to protect their employees. That's why employers will warn workers of dangers that they might not foresee, and enforce rules for employee conduct that promote a safe workplace," Porter says.

"It may be unfeasible to regulate how much people use technology. However, it is reasonable to imagine a time when policy-makers recognize the powerful influence of employers that sometimes results in harmful excess among the workforce. The pressure for using technology to stay connected 24/7 may carry employer responsibility for detrimental outcomes to the employees."

Porter cites tobacco litigation in the United States as a model of how the law and legal strategies evolve over time to find harm. "Legal scholars describe tobacco litigation occurring in three waves, each of which moved plaintiffs closer to success," says Porter. "In the 1950s, the theories put forth laid the groundwork for the legal decisions in the 1990s onward."

She says that the element of employer manipulation is important to determining liability. "If people work longer hours for personal enrichment, they assume the risk," says Porter. "However, if an employer manipulates an individual's propensity toward workaholism or technology addiction for the employer's benefit, the legal perspective shifts. When professional advancement (or even survival) seems to depend on 24/7 connectivity, it becomes increasingly difficult to distinguish between choice and manipulation."

Porter is not aware of any current court cases examining the subject, but suggests that employers concerned for the health of their workers and their bottom lines should to keep an eye on the matter… and encourage employees to walk away from their Blackberries, email, and cellphones while on vacation.
http://www.itwire.com.au/content/view/5377/127/





UK to Get First City With High-Speed WiMax Coverage
Marc Jones

A British city known for its concrete cows is set to become one of the most technologically advanced in Britain after it said it would be the first UK town to boast a high-speed WiMax wireless broadband network.

Telecoms firm Pipex (PXC.L), in a joint venture with chip maker Intel (Nasdaq:INTC - news), is to blanket parts of Milton Keynes with WiMax, a medium-range sibling of the popular Wi-Fi technology covering kilometers rather than meters. Both use radio frequency rather than conventional wires to beam the Internet.

A source close to Pipex told Reuters the company would announce the launch of its plans in around four weeks.

Steven Jewell, head of IT for Milton Keynes, said WiMax would be rolled out across the city bit by bit.

"Milton Keynes will be probably the first place for a major proving roll-out of WiMax in the UK," Jewell told Reuters.

"Signals will be sent out into various parts of Milton Keynes -- it won't be the whole of Milton Keynes to start with."

Milton Keynes is famed in Britain for the black and white concrete cow statues which planners added when building the town in the 1970s.

For those looking to get on the Internet on the move, WiMax is seen as one of the main alternatives to the 3G networks for which mobile operators across Europe paid more than 100 billion euros ($128 billion) combined some six years ago.

U.S. firm Airspan Networks (Nasdaq:AIRN - news), the company which is testing WiMax for Pipex, is to provide the base stations for the Pipex-funded project.

"There is inward investment by Pipex on this occasion to pay for the base stations," said Jewell.

Network Plans

Pipex has said it plans to roll out WiMax in eight UK cities by 2008, led by networks in London and Manchester. It has declined to say how much the total project is expected to cost.

Roughly 95 kilometres north west of London, Milton Keynes lags behind most UK cities in terms of high-speed Internet access following decisions made during its rapid expansion in the 1980s to lay lower-quality aluminum cables rather than copper ones.

WiMax is seen as a way around the problem, giving its 220,000 inhabitants broadband access without relying on reluctant telecoms firms to fund the necessary cable upgrades.

Many mobile firms, still hurting after having to write off their huge 3G costs, are attempting to thwart WiMax in the hope of forcing people to use their 3G services so they can claw back some of their investment.

Earlier this month U.S. firm Sprint Nextel Corp. (NYSE:S - news) became the first major operator to put its money behind WiMax, committing to spend $3 billion to build a network after Motorola (NYSE:MOT - news), Samsung Electronics (005930.KS) and Intel agreed to develop WiMax based phones, devices and chips.

Samsung said it would embed WiMax in everything from TVs and MP3 players to camcorders in 2008, while Motorola said it would put the technology in its TV set-top boxes and phone handsets.
http://today.reuters.com/news/articl...c=66&type=qcna





Putting Google-Fi to the Test
Griffin Wright

Google launched its citywide Wi-Fi service here this week, and Wired News decided to put it to the test.

Our first stop: Off the freeway at the southwest end of town, and the coverage was not bad. Logging on within sight of one of the 380 Wi-Fi nodes placed on utility poles around the city, the connection speed fluctuated between 855 kbps and 1113 kbps for downloads and 144 kbps to 986 kbps on the upload side -- good enough to call up Google Maps and find directions to our next destination.

Rengstorff Park, closer to the heart of the city, seems a likely location for web surfing on lazy Sundays. Here the network produced download speeds of 899 kbps and uploads of 142 kbps under the shady trees. But there was a slight problem staying connected.

At a local Starbucks, which offers a competing T-Mobile Wi-Fi service for a fee, Google connection speeds came in low, at 131 kbps for downloading and 99 kbps for uploading.

Next up: The Mountain View Public Library, one of the few locations where Google installed an in-door Wi-Fi access point. A test of the coverage showed a download speed of 598 kbps and a 920 kbps upload speed -- the closest we got to Google's advertised 1 Mbps rate.

"People are really delighted that it’s working, and they are especially pleased with the signal," said Karen Burnett, the library's services director.

Google's new service is among dozens of proposed plans to blanket metropolitan areas throughout the U.S. with free wireless internet access. Some, like the one here, have been underwritten by corporations, while others are being financed by local governments. The projects have touched a raw nerve with communications companies like Verizon, AT&T and Qwest, all building out expensive upgrades to the old telephone networks, who see a potential impact on their profits. Lobbyists are working nationwide, seeking legislation that would impose regulatory and legal barriers for taxpayer-funded initiatives.

Ron Geary, Mountain View's deputy community development director, was involved in the negotiations with Google and has high hopes for the WiFi network. "This is a very technology-oriented community that’s looking forward to using it in a million ways," he said.

Residents interviewed Thursday offered mixed reactions. Significantly, the range of the network is restricted to the borders of Mountain View, and wireless internet users interviewed for this article said that as a result they are unlikely to use the service.

"I need ubiquity," said Davis Fields, a resident and independent marketing consultant. He said he needs internet access on the road because works throughout the Bay Area, so he will hold on to his T-Mobile account. Google’s service works best outdoors, but if indoor access improves, Fields said he might make more use of the network. "Eventually we might eliminate our line in our home," he said.

Bill Le Vesque was online at the downtown Starbucks, and had not heard of the program, but he had a similar reaction. "The problem is I can’t rely on it because I do a lot of business travel around the Bay Area," said Le Vesque, who also uses T-Mobile.

At The Posh Bagel downtown, the WiFi signal was weak, coming in at 131 kbps for downloading and 99 kbps for uploading. Businessman Gabriel Manjarrez and his colleagues here showed little enthusiasm for the whole concept of free Google WiFi.

"It promotes their service," Manjarrez said. "There is no such thing as a free lunch."
http://www.wired.com/news/technology...l?tw=rss.index





Web Surfing in Public Places Is a Way to Court Trouble
Susan Stellin

Any business traveler who has logged on to a wireless network at the airport, printed a document at a hotel business center or checked e-mail messages at a public terminal has probably wondered, at least fleetingly, “Is this safe?”

Although obsessing about computer security is a bit like worrying about a toddler — potential hazards lurk everywhere and you can drive yourself crazy trying to avoid them — the fact is, business travelers take certain risks with the things they do on most trips.

“If you go into the average hotel and sit down in the business center and have a look at their computer, I’m sure you’ll find some interesting things that people shouldn’t have left behind,” said Paul Stamp, a security analyst with Forrester Research.

“The first step companies need to do is to educate people about how valuable the data is and also how small the circles are in which they travel,” he said, noting how loudly many people discuss business on cellphones, without a thought for who may be nearby.

Or what may be in the air. Robert Vamosi, a senior editor with the online technology publisher CNET, said wireless networks at airports — or for that matter, hotels or cafes — are not as secure as most people think.

“Someone may have some software on their computer that allows them to look at all the wireless transactions going on around them and capture packets that are floating between the laptop and the wireless access point,” he said.

These software programs are called packet sniffers and many can be downloaded free online. They are typically set up to capture passwords, credit card numbers and bank account information — which is why Mr. Vamosi says shopping on the Web is not a great way to kill time during a flight delay.

“Where I’d draw the line is putting in your bank account information or credit card number,” he said, adding that checking e-mail messages probably is not that risky, but if you want to be cautious, change your password once you are on a secure connection again.

That said, if you gain access to your corporate network through a V.P.N., or virtual private network, you are safer using public hot spots, because your data is encrypted as it travels between Gate 17 and your office’s server, where it is decoded before going to its destination.

In other words, your communications are automatically encoded by software on your computer so the data looks like gibberish to anyone trying to intercept it. If your company does not offer a V.P.N. for employees working away from the office, there are services you can subscribe to for about $10 a month that do the same thing.

Michael Sellitto, a graduate student studying international security at Harvard, said that even though he encrypted any sensitive data on his laptop, he planned to sign up for a service like HotSpotVPN to add another level of security when he is traveling, especially when using poorly protected networks at cafes and hotels.

“The problem is, the really good people have written sniffer programs so that the less-sophisticated people have access to the same technology,” Mr. Sellitto said. “Say a Microsoft Word document gets transmitted. The sniffer program will collect that and someone could open it up on their computer.”

While it is hard to say how likely it is that someone is lurking on a public network, many public networks do not have adequate security.

Last fall, InfoWorld magazine published an article about a security researcher who managed to collect more than 100 passwords, per stay, at hotels with lax security (about half the hotels she tested).

Gathering reliable statistics about security breaches is notoriously difficult, since companies are reluctant to reveal this information. Still, the most recent computer crime and security survey, conducted annually by the Computer Security Institute with the Federal Bureau of Investigation, found that the average loss from computer security incidents in 2005 was $167,713 per respondent (based on 313 companies and organizations that answered the question).

As Jim Louderback, editor of PC Magazine, noted, the statistics may not matter given the problems one data breach can cause.

“Even if it’s 1 or 2 percent,” he said. “You don’t want to run that risk.”

Using a public computer can also mean courting trouble, because data viewed while surfing the Web, printing a document or opening an e-mail attachment is generally stored on the computer — meaning it could be accessible to the next person who sits down. (To remove traces of your work, delete any documents you have viewed, clear the browser cache and the history file and empty the trash before you walk away.)

“You also run the risk that somebody has loaded a program on there that can capture your log-ins and passwords,” Mr. Louderback said, recalling an incident a few years ago when a Queens resident was caught installing this type of “key logger” software on computers at several Kinko’s locations in New York.

One way to foil these programs, which record what you type and can send the transcript to a hacker, is to use a password manager like RoboForm. This $30 software encrypts all your user names and passwords for various Web sites, then enters the data at the click of a mouse when you are prompted to log in.

There is a mobile version that can be stored on a flash drive that plugs into a U.S.B. port — making your passwords secure and portable.

There are also simple measures you can take to protect your hardware, like using a cable lock to secure your laptop in a hotel room or even a cafe (in case you leave the table for any reason), and making sure you lock your computer bag in the trunk rather than leaving it on the back seat.

For travelers who do carry around sensitive data, it is worth looking into programs like Absolute Software’s LoJack for Laptops, which can help recover a missing computer. The software reports its location when connected to the Internet — and some versions can even be programmed to destroy data if a computer is reported lost or stolen.

But perhaps the most common snoop that business travelers encounter is someone nearby “shoulder surfing” to see what is on a laptop, out of curiosity or mere boredom.

To foil prying eyes, 3M sells a Notebook Privacy Filter, a plastic film that makes it impossible to view a laptop screen from an angle.

Trevor Stromquist, a sales analyst for a manufacturing company in Minneapolis, has been using one for the last two years to dissuade nosy neighbors on the road, but he has noticed an added benefit back at the office.

“To be honest, it’s kind of a nice thing when you’re sitting in one of those long drawn-out meetings,” he said. “You can do what you need to do and no one will notice.”
http://www.nytimes.com/2006/08/22/te.../22secure.html





Military Research Aims To Develop Self-Configuring, Secure Wireless Nets

Researchers develop military-grade intelligent wireless net.
Ryan DeBeasi

Government, corporate and academic researchers are working on a network that would be able to configure itself, intelligently cache and route data, and allow for fast and reliable sharing of data, all while maintaining military-grade security.

The project is called Knowledge Based Networking and is under development by the Department of Defense Research Projects Agency (DARPA). Researchers from schools including Northeastern, Virginia Tech, Lehigh University have been involved with the project, as have defense contractors including BBN Technologies and General Dynamics.

Academic concepts such as artificial intelligence and Tim Berners-Lee’s “Semantic Web,” combined with technologies such as the Mobile Ad-hoc Network (MANET), cognitive radio, and peer-to-peer networking, would provide the nuts and bolts of such a network. Although the project is intended for soldiers in the field, the resulting advances could trickle down to end users. “Military networks are going to converge as closely as we can to civil technologies,” says Preston Marshall, the program manager of DARPA’s Advanced Technology Office.

Marshall says that current technology is “dominated by wireless access, not really wireless networking.” Instead of using access points to connect wireless devices to a wired network, a Knowledge Based Network would be a decentralized MANET.

“The thing that’s fundamentally different in a wireless environment is that the links are fairly unreliable… nodes join and leave the network more or less randomly,” says David Passmore, research director for the Burton Group. MANETs would be able to route traffic through this ever-changing set of peers to a networked device or the Internet.

Such networks would have no single point of failure. Conversely, current wireless networks can be can be shut down by removing the access point. Passmore imagines that MANETs might even be formed by computers in moving vehicles but adds that “the routing protocols we have with IP are wholly inadequate to that kind of a situation.” More experimentation needs to be done before MANET technology can be standardized and mass-produced, he says, but the Knowledge Based Networking initiative might provide incentive for military contractors to work on the technology.

The ideal MANET would not only choose the best paths for routing packets but would also pick the best radio frequency to use. This would be made possible by so-called “cognitive radio” technology.

Bruce Fette, chief scientist at General Dynamics C4 Systems, explains that cognitive radio “is able to understand the spectrum activity, the network activity and the user activity and select and use the right waveforms, frequencies, and protocols to efficiently support the user and the network.” Such a system would avoid interference, either from other wireless networks or from enemies who want to disrupt communications. It would also understand and obey the local regulations on wireless spectrum use. Fette says such a system will be tested in Ireland next year.

Although work is still being done on the artificial intelligence component of this technology, the underlying software-defined radios (SDRs) that allow networks to change signals on the fly are currently being used by the military and others.

By generating the signal in software and then transmitting it with hardware, an SDR can transmit and receive anything from 802.11 wireless network data to proprietary radio communications to television signals. Fette adds that users could upgrade SDR systems through software rather than hardware, making it easy to add new features and types of signals. He says that while SDRs are not widely used, commercial SDR products have been developed – indeed, the theme for the SDR Forum’s 2005 conference was “Software Defined Radio is Available Now,” and Fette says that his company has been producing SDRs for the military since 1998. The GNU Software Radio project, which provides free SDR software aimed at hobbyists, was launched in the same year.

A Knowledge Based Network would make decisions about more than wireless spectrum, and Marshall envisions intelligent nodes that could automatically optimize the network. He notes that if a connection spans reliable and unreliable parts of a network, there could be performance issues: if a packet makes it through the reliable region but is dropped in the unreliable part, it would have to be resent through the entire connection. A Knowledge Based Network would automatically break this connection into two smaller connections, one across the reliable region and one across the unreliable region.Then, if data is lost across the unreliable part, it would only need to be re-sent along that region of the network. Marshall estimates that this technique could increase bandwidth tenfold.

Marshall also speaks of a network that would take note of frequently accessed data and save copies on the edge of the network for quick access: “If one soldier needs a piece of map data… the guys around him will need it too.” He imagines a dynamic, peer-to-peer version of the caching that companies like Akamai perform. Artificial intelligence could even decide which protocols to use.

Such an intelligent network would not only understand how to move data; it would also be able to understand what the data meant to users. This idea is based on Tim Berners-Lee’s concept of the “Semantic Web,” which called for Web pages to include machine-readable data in addition to content intended to be read by people. Software “agents” would use this data to understand the meaning of documents instead of simply searching for keywords. In one presentation, Marshall says the Semantic Web would allow users to “access information by content or type rather than by network address.”

Although Passmore is all for “intelligent routing of traffic,” he is leery of adding too much intelligence to the network. Products such as Cisco’s Application Oriented Network recognize different types of traffic and treat it differently, prioritizing some types over others and integrating security features into the network. He fears these systems could impede the deployment of new services and lead to vendor lock-in. “What has made the Internet so successful is because it’s a bunch of dumb pipes,” he says. “Once you start embedding too much knowledge… you lose all your flexibility… There’s 30-plus years of experience that tells you that dumb networks are better than smart networks.”

As with all networks, security will likely be an important issue in Knowledge Based Networking. Passmore notes that with MANETs, there is the additional risk of “routing algorithms being controlled or taken over by the enemy or by some hacker,” but otherwise, the security risks are “the same issues that we’re all familiar with, like denial of service.” Marshall says that Knowledge Based Networks will use a technology similar to SSL, adding that “we’ll probably keep the security work a little more isolated” from the rest of the project.

The plan for a self-configuring and -managing network holds promise for more than just the Department of Defense. Corporate IT departments could likely benefit from wireless networks that optimize themselves to increase bandwidth and avoid interference from the break room microwave, and Passmore imagines cheap, easy-to-use MANET hardware becoming available to consumers for home use.

Although Knowledge Based Networking could push some major advances in wireless technology along, Marshall admits that the project is not with out its risks: “being DARPA, we could always be wrong, too,” he says. “We’re allowed.”
http://www.networkworld.com/news/200...t-network.html





SecureWorks Admits to Falsifying MacBook Wireless Hack
David Chartier

Remember those hackers in the Washington Post story who claimed to have hacked a MacBook's wireless drivers to gain control of it? Then remember the follow-up story where the author, Brian Krebs basically, um, how shall I say: 'slightly falsified' his way through backing up the original story with excuses that the flaw does exist in Apple's drivers, but Apple 'leaned' on them not to publicize this so they decided to use a 3rd party card? Finally, remember how, in the original article, David Maynor, one of the hackers, is quoted saying "We're not picking specifically on Macs here, but if you watch those 'Get a Mac' commercials enough, it eventually makes you want to stab one of those users in the eye with a lit cigarette or something." Boy, that sure doesn't betray any sense of 'I am going to lie, cheat and steal to prove whatever I want' bitterness, does it?

Sounds like SecureWorks, the company who sponsored all this Mac hackery, is finally fessing up to their falsification and admitting that they, in fact, did not find the flaw in Apple's drivers, and that they used a 3rd party card and software to facilitate the exploit. As icing on the cake part of a 'responsible disclosure policy,' they aren't releasing the name of the manufacturer of said 3rd party magic hacking tools. Three cheers for truth (and discretion) in journalism.

Now let's make one thing clear: we at TUAW aren't advocates of the 'Macs are flawless! Long live the prefection that is Apple!' philosophy that naysayers of this experiment are coming under fire for. We are, however, advocates of finding true vulnerabilities on the quest to make the Mac even more solid and secure. The problem here is that this experiment was not one of those quests for truth - it was a quest for, in the words of Mr. Colbert: truthiness. We're genuinely sorry you're annoyed by the commercials, Mr. Maynor (believe me: not everyone loves them), but that's why some genius some time ago invented the ability to change TV channels. Give that remote a whirl some time - it might make your life (and ours) a whole lot easier.
http://www.tuaw.com/2006/08/18/secur...wireless-hack/





Why Home Firewall Software is a Leaky Dike
Dirk Averesch

A chain is only as strong as its weakest link. That's doubly true when it comes to protecting computers that are connected to the internet. Anyone who thinks that a virtual firewall is enough to protect a PC from the dangers of the internet -- such as hacker attacks and unwanted contact with damaging programs -- is making a mistake.

That level of safety requires a combination of several protective measures. Firewall software for home use is not much more than a leaky dike.

"It's dangerous to view a firewall as some sort of PC airbag," warns Professor Stefan Wolf, who teaches applied computer sciences at the Polytechnic University of Lippe and Hoexter, Germany.

The so-called personal firewall programs commonly used with home PCs are not comparable to the powerful firewalls used in companies or public organisations.

Those organisations can afford special computers assigned exclusively to guarding the PCs in the network. A home computer must attempt to maintain its own firewall while performing its normal functions.

A recent test in the Munich-based computer magazine PC Professionell showed that the software often causes more problems than it solves. Not one of the six firewall programs the magazine tested, regardless of whether commercial or freeware, could prevent all attempts from the test programs at establishing outgoing connections between the PC and the internet.

Many firewalls were even quickly switched off within the simulation. In the most serious cases, damaging software was able to circumvent the firewall in sending sensitive data, from personal surfing histories to passwords and credit-card numbers, to the hacker.

Browsers are particularly susceptible, since they are inherently allowed to make a connection with the internet.

"If the attacker takes advantage of errors in the browser, then the best firewall won't help at all," says Wolf. Getting proper protection from personal firewall programs requires that programmers know the ins and outs of all ports between the operating system and browser and be able to work absolutely error-free.

Surfers are better advised to take more achievable steps, such as keeping their operating system, browser and other programs constantly up to date. This is because software makers, like hackers, are usually spurred to action only in reaction to published security gaps, Wolf says. This is why anti-virus software armed with the most current virus signatures is the crucial last-gap defence on any computer.

"Desktop firewalls, as they are also called, are practically extraneous, presuming that you adhere to the basic rules of safe surfing," is the word at the German Federal Agency for Security in Information Technology (BSI) in Bonn.

IT security cannot be achieved through individual pieces of software, but rather must be constructed through the interplay of various factors.

This means first and foremost preventing viruses and damaging software from getting on the computer in the first place. "Surfing habits are hence important for security," says Wolf. Most dangers emerge through surfing and downloads from questionable websites.

"The primary gateway into the browser is JavaScript," Wolf explains. Users should deactivate the program language in their browser, or use browser extensions to define which web sites are to be trusted to execute JavaScript.

"It's not convenient, but it is much safer," he says.

Proper e-mail handling is another important preventative measure beyond the reach of firewalls. "Attached files should be scanned by a virus program prior to opening, and you should think twice before clicking unfamiliar links," Wolf warns.

For reasons of convenience, many users simply use the default administrator account for daily PC use. Yet this can allow a virus to gain full control of the computer, magnifying the potential for major damages by a successful attack.

"John Q Public doesn't need administrator rights and should log in as such only when installing software," says Wolf.

The worst thing that can happen to a computer user is the loss of personal data. This is because tainted systems can be reinstalled at any time, but deleted data is usually gone forever.

Backups are the safe way to go, Wolf recommends. "All important data should be regularly burned to CD or stored on a USB stick," Wolf says.

Users who still prefer a firewall should first check whether they are using a router with firewall functionality. If so, then no firewall is needed, including the one build in to Windows XP, reports PC Professionell.

The configuration of a personal firewall is usually more than most users can handle anyway. To understand the system's warning, the user must understand the meaning of IP addresses, host and client names as well as ports, the BSI reports.

Most lay users instead use the comfortable auto configuration settings offered by personal firewalls. This lets the software follow its own ideas about which data packets can pass through the virtual wall and which are to be filtered out.

According to the BSI, this can quickly lead to "security critical misconfigurations". Filter rules should hand set to allow only absolutely necessary access from the computer to the internet.

The rules should aslo be regularly inspected and non-necessary ports locked down.
http://www.mg.co.za/articlePage.aspx...insight_tech/#





Viruses and Spyware Cost Users $7.8 Billion

Consumers paid as much $7.8 billion over two years to repair or replace computers that got infected with viruses and spyware, a Consumer Reports survey found.

That figure was down from a similar survey a year ago. Still, it suggests that people are paying large sums to cope with the flood of malicious viruses and other programs that can slow computers or render them inoperable.

"There is a very high national cost to this," said Jeff Fox, technology editor of the consumer magazine. "People think they're invincible, even when this kind of money is involved."

In a nationwide survey, the magazine found that unwanted commercial e-mail, known as spam, is the biggest computer-security problem. But viruses are the most expensive, with people paying $5.2 billion in 2004 and 2005 to repair or replace afflicted machines, the survey found.

Infections of spyware, a type of software that can track computer users' habits or collect sensitive information about them, declined slightly in the past six months, the survey found. But such infections caused almost 1 million U.S. households to replace their computers, the survey found.

Losses from phishing scams, which are fake e-mails and Web pages that request sensitive data such as bank-account passwords, increased five-fold from the previous survey, with people telling the magazine that such scams cost them $630 million in 2004 and 2005. That's an average loss of $850 per incident.

"Phishing scams are worse than they've ever been," Fox said. "The bad guys are getting very sophisticated."

Some experts caution, however, that surveys in which people are asked about financial losses can produce overestimates.

"The numbers could possibly be inflated by the way the questions are phrased, especially in an area in which most people aren't very articulate," said Robert Lichter, who runs a statistical center at George Mason University in Fairfax, Va.

Other organizations that monitor Internet fraud complaints also point to growth in cybercrime. Internet-related complaints made up nearly half of all fraud complaints received by the Federal Trade Commission in 2005, with people claiming losses of $335 million.

And financial losses reported to the Internet Crime Complaint Center, a joint effort of the FBI and the National White Collar Crime Center, tripled in 2005, to $183 million, compared with the previous year.

"It's hard to tell who's losing the money -- the insurance company, the credit card company or the consumer -- but it's coming out of someone's pockets," said Dan Hubbard, vice president of security and research for Websense Inc.

While attacks used to be mostly nuisances, they have become more threatening, said Dave Cole, director of security response at Symantec Corp., a leading computer security company. Many of today's spam and phishing attacks target consumers' personal information with the intention of stealing money or in some cases, identities.

The Consumer Reports survey of 2,000 households found that 20 percent of respondents didn't have antivirus software and that 35 percent didn't use spyware-blocking software.
http://www.newsfactor.com/story.xhtml?story_id=45613





DNS Could Slow Broadband Service
Marguerite Reardon

A broadband provider's claim of superfast speeds may only be as good as its weakest link, which could be its domain name server software.

A report issued Thursday by Nominum, a company that sells domain name system (DNS) server software, indicated that some broadband service providers need to bulk up their DNS servers to ensure that broadband users actually get all the benefits of their high-speed connections.

"We hear stories about carriers spending billions of dollars to build new fiber-to-the-home networks or 3G (third-generation) wireless networks," said Paul Mockapetris, inventor of the DNS architecture and chairman and chief scientist at Nominum. "But broadband providers should also spend some money adding more DNS capability. Pure bandwidth doesn't solve the problem if the DNS servers can't respond quickly."

DNS functions as the "phonebook" of the Internet, mapping text-based domain names such as www.cnet.com to the numerical Internet Protocol addresses used by computers. Internet users typically use the DNS service run by their service provider.

When DNS servers are running slow or when they drop queries, people experience Web pages loading slower, delays in sending and receiving e-mails, and poor response times when they're trying to play interactive video games.

More than 48 million American households have broadband access today, according to the Leichtman Research Group. To entice consumers to use their service, phone companies and cable operators have focused a lot of attention and marketing dollars on convincing potential customers that their service is the fastest. Verizon Communications is spending $20 billion over the next few years to build a fiber-to-the-home network called Fios, which it claims provides the fastest Internet access network in the United States.

In the survey commissioned by Nominum and conducted by VeriTest in April, Verizon's Fios network and its DSL (digital subscriber line) service actually had the worst response times of any broadband provider measured. According to VeriTest data, the Verizon Fios service had an average DNS response time of about 180 milliseconds. By contrast Comcast, which is a Nominum customer, had the fastest response time of roughly 40 milliseconds.

Bobbi Henson, a Verizon spokeswoman, said the company has been upgrading and tweaking its DNS servers over the past several months. She also said the company has conducted its own tests with VeriTest, which show very different results.

"We would dispute that we have the slowest DNS look-ups in the industry," she said. "We conduct our own studies monthly. We are always looking at the overall performance of our DNS servers and tweaking them to improve performance."

At the end of the day, all the broadband providers in the report had response times in either tens or hundreds of milliseconds, hardly enough time for the average user to even notice, said Joe Laszlo, an analyst at Jupiter Research. He acknowledged that upgrading networks to increase raw bandwidth takes the bottleneck out of one part of the network, and inevitably exposes flaws in other parts of the network. But he said he doesn't believe DNS is the biggest culprit in noticeably slowing Internet service.

"So much of the perceived performance of a service depends on how fast your browser in your computer can process Web pages or how quickly your graphics card can render images," he said. "Slow DNS response times could impact the speed of the service, but I don't think it's the No. 1, No. 2 or even No. 3 issue that creates noticeable delays for users."
http://news.com.com/DNS+could+slow+b...3-6106936.html





Verizon Imposes New Service Surcharge

Verizon Communications Inc. is imposing a new surcharge on high-speed Internet service just as customers were set to receive lower bills thanks to a decision last year to deregulate the service.

In a recent notice to customers, the telecommunications company said it would begin imposing the surcharge for all new digital-subscriber line customers, and on current DSL customers with monthly plans. Customers on an annual plan will start paying when their plan expires.

The surcharge will initially be $1.20 a month for customers with service up to 768 kilobits per second and $2.70 per month for customers with faster DSL service, according to the company.

The fee comes as a government fee on DSL customers for the Universal Service Fund is being phased out. For customers with service up to 768 kpbs, the fee was $1.25 a month, and for customers with service of up to 3 Mbps, the fee was $2.83 a month, according to Verizon. Customers will no longer pay such charges effective Aug. 14, New York-based Verizon said.

Bobby Henson, a Verizon spokeswoman, cited "new costs that we've developed over the past year as we've been developing and delivering this standalone DSL service. That service doesn't have the benefit of the revenue that was coming in from voice."

Verizon was among the companies that had pushed for the Federal Communications Commission to deregulate DSL service, which the commission did in August 2005. Under the ruling, DSL was considered to be an information service. Information services are generally exempt from universal service payments that are included in telephone bills. The FCC, however, mandated that DSL providers continue to contribute to universal service for 270 days in order to give the agency time to develop broad reform of the system.
Henson said the decision to impose the new surcharge now "is not related at all to USF." She said she "would strongly disagree" with criticisms that Verizon was in effect diverting to its own coffers money that had previously supported the Universal Service Fund.
http://hosted.ap.org/dynamic/stories...08-21-18-03-29





Cable Industry May Need To Spend Heavily On Upgrades
Peter Grant

Cable-television operators may require another round of multibillion-dollar network upgrades to keep up with rivals in the fast-growing high-speed Internet hookup business, a report from the industry's research arm suggests.

Its conclusions underscore the challenges posed by the rapid growth of broadband video from popular sites such as YouTube and Google, and the looming threat of a planned $20 billion rollout of high-capacity fiber lines by U.S. phone giant Verizon Communications Inc.

While its findings are most significant for the $70 billion-a-year cable-TV industry, the report could trigger strategic ripples as phone and satellite companies weigh potential repercussions to their businesses. During the late 1990s, the need to alter cellphone networks to handle high volumes of digital calls cost billions and triggered industry consolidation.

The report, which has been reviewed by The Wall Street Journal, warns that at present growth rates cable operators' existing technology may not be able to compete efficiently with Verizon on Internet services. "At some point, optimization of the (cable) network becomes more expensive than simply deploying" fiber directly to homes, the report warns.

Cable Labs is funded and run by all the major operators whose chief executives sit on its board. The consortium has been instrumental in new technology services that companies have been rolling out, such as high-speed Internet hookups and phone. It also was highly involved in the cable industry's last major upgrade, starting in the mid-1990s, in which it spent over $60 billion to offer digital services like video-on-demand.

The report is one of many advisory studies done by Cable Labs for its owners. Ultimately the decision on whether to invest in upgrades is up to individual cable operators.

But the report, dated July 31, raises the specter that cable operators may have to sharply boost spending on wiring in the future. Companies for several years have been trying to assure investors that big outlays for big network upgrades are over, leaving cash flow for share repurchases and other purposes.

The report is inflaming some cable executives who insist existing networks can meet future broadband demands. "I wholly disagree with the conclusions," says Mike LaJoie, chief technology officer of Time Warner Inc.'s cable division. Its assumptions "are not reflective of what our reality is." Says Dave Fellows, chief technology officer at Comcast Corp.: "This report does not reflect our view."

In response to inquiries, Cable Labs issued a statement noting that the 60-page report "postulates a very speculative scenario" and that "no major investment is needed for cable to effectively compete."

The report comes with broadband use rising sharply as millions of homes add high-speed Internet connections. Cable and telephone companies are battling fiercely to convince consumers they're the best provider of these and other telecommunications services. Phone-operator Verizon, for one, plans to leapfrog cable companies with a controversial upgrade of its networks to stretch to homes fiber optic cables, which have much greater broadband capacity than cable networks. The New York-based phone giant is expected to spend $20 billion over 10 to 15 years to string fiber to homes across the U.S. The costly strategy is partly to blame for stunting its share price but, if successful, could put it ahead of cable rivals in selling services such as faster games and better-quality video.

Cable Labs predicts that for the next few years, cable companies should be able to offer customers the same quality video service as Verizon's so-called "fiber to the premises," or FTTP, network even though fiber has greater bandwidth potential. But it cautions that, if Internet traffic continues increasing at a high rate, the cost of providing the same quality service as Verizon may become so great, that it may be less expensive to string fiber to homes as well. The prospect of hefty new investments likely won't sit well with Wall Street investors. Cable companies already are seeing low return on capital and return on equity compared with S&P 500 companies, according to Craig Moffett, an analyst with Sanford C. Bernstein, who hasn't seen the report. The industry's returns using current capital outlays are "extremely attractive," he says.

It is still far from clear whether another wave of increased capital spending will prove necessary. New bandwidth-saving technology and declining hardware costs might make it possible for cable companies to match Verizon without bringing fiber to homes. The growth in demand for broadband capacity may taper off as fewer households add high-speed Internet, or if the popularity of Web-based video declines. Also, some cable companies are planning eventually to switch its analog channels to digital, freeing up capacity.

The report doesn't estimate how much it would cost cable operators to lay fiber to the home, but it likely would be far less than the industry's last upgrade, which cost more than $60 billion.

Cable and phone companies have been in a technological arms race since the late 1990s when both began rolling out high-speed Internet connections. More recently, they have been getting into each other's primary businesses, with cable operators launching phone service, and phone companies offering TV.

So far cable operators have been winning the war. They have a greater broadband market share thanks to more flexible technology. Major cable companies have about seven million phone subscribers while phone companies have fewer than 100,000 TV subscribers.
Verizon is the only major phone company that is trying to compete by upgrading its entire network with fiber. Other companies, such as AT&T Inc., are trying to get by with less expensive network upgrades. A few are deploying fiber in areas where new homes are being built, at a rate of about 1.9 million per year, according to the Cable Labs report.

This may be a concern, the report states, because fiber networks "can deliver orders of magnitude more broadband data capacity than today's typical (cable) networks." Cable networks are a mix of coaxial cable and fiber.

The report points out that it's not clear what the future traffic growth patterns will be but that "current trends in ... video services indicate that content providers and users are experimenting with applications now that will drive expectations for higher capacity."

Critics of the report say that some of its assumptions are inaccurate partly because Cable Labs doesn't have access to certain cable company data. Mr. LaJoie, for one, says that Time Warner is confident that it will be able to compete with Verizon using its current network. "Unless we start sending hot pepperoni pizzas (over the Internet) given the profiles in growth we see no reason to go fiber all the way to the home," he says.
http://www.nwfdailynews.com/articleA...endheavily.php





Consumer Group Slammed For Creating 'Test' Viruses
John E. Dunn

A consumer magazine has been condemned for possibly adding to the virus problem by creating a series of "test" viruses just to review antivirus scanners.

In an act that has long been considered technical taboo, U.S. consumer affairs organization, ConsumerReports.org, decided to generate 5,500 "test" viruses to run, under lab conditions, against 12 leading antivirus software products.

The organization's own website describes the methodology used: "To pit the software against novel threats not identified on signature lists, we created 5,500 new virus variants derived from six categories of known viruses, the kind you’d most likely encounter in real life." The organization said it had enlisted the help of Independent Security Evaluators (ISE), an external consultancy located in Baltimore, to help design the tests and ensure they matched real-world conditions.

The magazine itself reckons the world's total virus population to be around the 100,000 mark, which makes the new variants a sizable increase in one fell swoop.

While the viruses are not expected to pose any threat to companies or individuals, their creation of viruses is still controversial. "The AV community has always been very strongly opposed to the creation of new malware for any purpose," said John Hawes of Virus Bulletin in a blog on the issue. "There's just no need for it - plenty of new viruses are being written all the time, why would anyone in a responsible position want to add to the glut?"

Graham Cluley, of UK-based Sophos Plc., echoed his concern. "When I read about what ConsumerReports has done I want to bash my head against a brick wall. With over 185,000 viruses in existence was it really necessary for this magazine to create 5,000 more? It's a bit like Fire Monthly Magazine testing fire stations by lighting umpteen fires around the country and seeing who is the fastest at putting them out.

"It's irresponsible behavior, and will be frowned upon by the antivirus industry. Leave antivirus testing to the independent testing bodies with expertise in the field."

David Emm, senior technology consultant at Kaspersky Lab, based in Moscow, also questioned the methodology: "It's not actually clear that Consumer Reports has created new viruses. If this is what they did … with several other test bodies who are very experienced in conducting tests, why does Consumer Reports feel the need to conduct tests themselves, especially if they do not intend to make the results publicly available?

"If, on the other hand, they did actually create new viruses, we would not approve. After all there are many, many thousands of viruses in existence already and we're adding around 200 new signatures to our database every day, why the need for someone to create new ones?" Emm said.

ConsumerReports.org is the online wing of the well-known Consumer Reports brand set up in 1993 by the publisher Consumer’s Union. The organization has so far been unavailable for comment.
http://www.computerworld.com/action/...leId= 9002499





Level 3 Signs Agreement With MySpace.com

Fiber network operator Level 3 Communications Inc. has signed a multi-year agreement to transmit Internet content, including video, for the popular social networking site MySpace.com, Level 3 announced Friday.

Level 3, which offers Internet capacity in 82 markets, will initially support MySpace in some markets, the company said in a statement.

"We selected Level 3 because of the proven performance of its network and Level 3's ability to support increasing high bandwidth demand," Aber Whitcomb, chief technology officer of MySpace, said in a joint statement issued by Level 3.

MySpace's video site had 20 million visitors last month, trailing Yahoo Inc.'s site, which had 21 million, according to comScore Media Metrix. Last month, MySpace.com was the seventh most visited site online with 43.5 million, according to media-research company Nielsen/NetRatings

Level 3, which reported a loss of $201 million for the quarter ending June 30, has been on a buying spree. Its revenue jumped 71 percent over the same quarter the previous year to $819 million from $371 million, partly on its acquisition of WilTel Communications, ICG Communications and Progress Telecom. It closed its $1.1 billion cash-and-stock acquistion of privately held TelCove Inc. last month and expects to close its purchase of data transport services company Looking Glass this quarter.

Level 3's stock closed up 4 cents at $3.76 in Friday's trading on the Nasdaq.
http://hosted.ap.org/dynamic/stories...08-18-21-28-42





In Nashville, Sounds of Political Uprising From the Left
Theo Emery

Country music videos flashed on a television set at the Idle Hour, a Music Row bar where a Crock-Pot of beef stew simmered for hungry musicians.

Sitting at a table in early August, Bobby Braddock, the longtime songwriter, lamented the conservatism of the country music industry that was demonstrated when the lead singer of the Dixie Chicks became a target of fury three years ago after saying she was ashamed that her band and President Bush shared the same home state.

Asked whether his recent song “Thou Shalt Not Kill” would have airplay, Mr. Braddock said, “Oh, never.”

“Something political will not get played on country radio unless it’s on the conservative side,” he added. “If you show both sides, it’s not good enough. It’s got to be just on the right.”

Country music, the genre of lonely hearts and highways, lost jobs and blue-collar woes, has become a cultural battleground. Conservatism is widely seen as having the upper hand, a red-state answer to left-leaning Hollywood.

Democrats on Music Row, the country music capital here, have grown frustrated with that reputation. A group of record-company executives, talent managers and artists has released an online compilation of 20 songs, several directly critical of Mr. Bush and the Iraq war.

The price for the set is $20, with most of the proceeds going to the group, which calls itself Music Row Democrats and is using the money to support local and national candidates who share its values.

Bob Titley, a former manager of Brooks & Dunn and a co-founder of Music Row Democrats, has no illusions that the songs will shoot to the top of the charts. Rather, Mr. Titley said, he hopes to use them as fund-raisers and to change the image of country as strictly Republican music.

“My hope would be that they would play this music at campaign rallies,’’ he said, “and when the volunteers are out on a hot day driving door to door, they’ll put it in their cars to keep themselves pumped up and in a good mood.”

The songs include Mr. Braddock’s “Thou Shalt Not Kill” and “Big Blue Ball of War” by Nanci Griffith. Another longtime songwriter, John Scott Sherrill, contributed “You Let the Fox Run the Henhouse,” and former Vice President Al Gore speaks a few words at the end of “Al Gore,” which was written by Robert Ellis Orrall and includes the line, “President Gore lives on my street.”

Many singers and songwriters who contributed are not household names outside Nashville, but their work is recorded by many big stars, including Toby Keith, LeAnn Rimes and Travis Tritt.

The songwriter Darrell Scott contributed “Goodle U.S.A.” Faith Hill had recorded it under a different name and without the line “It’s like Joe McCarthy was our acting president.”

Mr. Scott recently recorded a new song, “W Cheese,” in a basement studio at Famous Music on Music Row. One verse ends, “They filled our plate with freedom fries, red, black and blue, white lies/And a helping, heaping, hating size of stinkin’ W cheese.”

“I’ve never thought of myself as very political,” he said. “It just seems like in the current environment even I have to write about it.”

Chris Willman, a senior writer at Entertainment Weekly magazine and the author of “Rednecks & Bluenecks: The Politics of Country Music” (New Press, 2005), said that although the members of Music Row Democrats had industry credibility, few were in the limelight.

“They have a tough row to hoe in convincing people that country music is really, seriously Democrat friendly,” Mr. Willman said.

Though Music Row occupies a small patch of Nashville, it looms large over the city’s culture. When the lead singer of the Dixie Chicks, Natalie Maines, said at a concert in London in March 2003, “We’re ashamed the president of the United States is from Texas,” the reaction was fierce and swift.

Country stations stopped playing the group’s songs. Talk-radio hosts urged listeners to complain about Ms. Maines’s remarks. And a Nashville audience of 18,000 booed the host of a music awards show who urged forgiveness.

None of that was lost on Music Row. Democratic songwriters say that they have since hesitated to express political views, for fear of being “Dixie Chicked.”

Record company executives said they were leery of discussing their opinions, to avoid damaging artists they represent.

“I felt like at the time of the Dixie Chicks, as outraged as I was at the whole thing, I couldn’t say anything, because I’d put artists that I’m associated with in jeopardy,” said Luke Lewis, co-chairman of the Universal Music Group. “They might not go on the radio or a lot of other places.”

At the same time, the Republican Party’s use of country music at political events and the popularity of patriotic songs like Toby Keith’s “Courtesy of the Red, White and Blue (the Angry American)” and Darryl Worley’s “Have You Forgotten?” rankled industry liberals.

Music Row Democrats started in late 2003 with a meeting of more than 20 label executives and songwriters. It says it now has 1,200 members from the Nashville music industry and 1,100 others.

James Stroud, Mr. Lewis’s co-chairman at Universal and a Republican, said that many Music Row Democrats were “dear friends,” but that he disagreed with their using music for political ends.

“I don’t think we need to use music to influence, or try to influence, a big bloc of people when all they want to do is just listen to the music,” Mr. Stroud said. “You start fooling with that, and you’re going to start having some failure.”

Mr. Keith’s publicity agent, Elaine Schock, said his conservative reputation was a result of the times. He is a lifelong Democrat, Ms. Schock said, and the perception of him as conservative is a “myth.”

“I think when you have a war,” she said, “people want you to be on one side or the other.”

The singer and songwriter Chely Wright has felt the heat of crossfire, but she said she was not affected by it. Ms. Wright’s song “Bumper of My S.U.V.,” about a confrontation over a Marine sticker on her vehicle, earned praise from conservatives and scorn from liberals. The daughter of a military family, Ms. Wright says she has no allegiance to Democrats or Republicans.

She recently recorded “I Ain’t Gettin’ Any Younger,” which opens with, “The cost of crude keeps going up/More precious now than gold.”

It ends by asking “Why it makes somebody mad/That a baby named John Doe/Might get to have two loving dads.”

Ms. Wright said: “When one does say anything less than, ‘Ooh baby, ooh baby, I love you,’ in a song, in my format, out of this town, you really put yourself out there as a bit of a lightning rod. I can’t have those fears.”
http://www.nytimes.com/2006/08/19/wa...nashville.html





With a Change at KZLA-FM, Country Radio Says Adios to Los Angeles
Jeff Leeds

When Kathy Schneider turned on her favorite radio station, KZLA-FM, on Thursday morning, she heard the usual mix of Tim McGraw, Faith Hill, Kenny Chesney and other country artists. Two hours later, when she returned to her car, the song playing at KZLA’s spot on the dial was one she did not recognize. It was not an unfamiliar country tune, but a different genre altogether.

At first she thought something had happened to the transmission tower, but the pop and R & B hits kept pumping out of her speakers. Then an announcer welcomed listeners to the re-engineered station, now known as Movin’ 93.9.

“The frustrating part was that everything seemed fine at 20 minutes before 10, then you get back into your car, and they’ve changed everything,” said Ms. Schneider, 38, a customs broker from the Northridge section of Los Angeles. “I’m not only angry at the change, but how they changed it.”

The abrupt switch — Keith Urban’s “Tonight I Wanna Cry” followed by a brief silence and the rising beat of the Black Eyed Peas’ “Let’s Get it Started” — left Los Angeles, the nation’s No. 2 radio market, with more than 10 million people, without an area-wide country music station, even as the genre remains a potent force on the Billboard sales charts. It joins New York, the biggest radio market, which has been without a major country station since 1996, and San Francisco, the nation’s No. 4 market, which lost a major country station in 2001.

Paradoxically, Los Angeles consistently ranks as one of the top two markets for country album sales (it accounts for roughly 3 percent of all country sales so far this year) and plays host to the genre’s biggest touring acts. Thursday marked the first night of a sold-out three-night stand by Mr. McGraw and Ms. Hill, country’s power couple, at the Staples Center arena.

But the station’s corporate parent, Emmis, which is based in Indianapolis, concluded that even having the city’s only country station — billed as “America’s most listened-to country station” — was no longer worth it, and that it could do better. The switch to what it calls “rhythmic pop contemporary” was dictated by economic common sense: a country station that draws predominantly white listeners aged 25 to 54 could no longer stay afloat in an ethnically diverse megalopolis. KZLA’s ratings and ad sales had been declining, and a $2 million marketing blitz last spring had not reversed the trend.

“Country is a tough format to do in a market that is an ethnic melting pot,” said Rick Cummings, Emmis’s president of radio. “The appeal of the format is fairly limited when it comes to ethnicity.” In Los Angeles, he said, stations that cater mostly to white listeners are “playing for less than 25 percent of the marketplace on a good day.”

And while country music may draw a more diverse audience in cities like Houston, he added, it simply does not in Los Angeles, where Latino listeners have a wealth of choices for entertainment in both English and Spanish.

But that is little consolation to fans like Karen Oliver, 41, a merchandise manager at DreamWorks Studios. She had her alarm set to the station and listened all day at work at her desk and on the way home. “Personally, right now I’m at a loss,” Ms. Oliver said in a telephone interview from her office. “I don’t even have CD’s spinning; I’m too upset.”

Music industry executives lamented the loss of their primary outlet for promoting new country music to fans in what has been a huge country market in terms of CD sales. The Country Music Association released a statement saying it was “deeply concerned” about the switch, and expressed hope that another radio company might turn an existing station to the format.

Joe Galante, who runs the Nashville division of the music giant Sony BMG Music Entertainment, said labels could continue to promote music in cities without country stations through cable outlets like Country Music Television and various Internet sites. “I honestly think it’s unfortunate for this to happen,” he said, “but I don’t think it’s a serious blow against the format. We have survived it, for as many times as it’s happened.”

Cindy Chang contributed reporting from Los Angeles for this article.
http://www.nytimes.com/2006/08/19/ar...ic/19radi.html





Forum Follies

Teens Don't Think CD Copying is a Crime
patrixmyth

Let me stake out a consumer viewpoint...

Perhaps you've got some talent that is vaguely interesting to me...

I don't owe you anything, but I choose to SUPPORT your expression by listening/reading/watching and sharing the news with others...

At some point in the process you are just pleased as hell that anybody cares at all...

Soon your art is broadcast over airwaves onto my property, into my car, on commercials between my kids cartoons, on my elevator and your excerpts are slipped into the pages between jumk mail that's dropped in my mailbox uninvited. You sell your services to advertisers/promoters who are trying to take my money. Your clothes line is produced by third world sweatshops and sells for 3X more than the generic brand. You are trying to sell me a perfume with your name on it (and some pimple cream too) and you have a commercial on the air urging me to imbibe addictive substances so I can get a "free" mp3. You sell pictures of your frigging baby to the news media.

Do I protect your financial interests when my friend asks to copy a song? Probably not...

Wait, you're not THAT artist? You're struggling, selling CDs at your show and living at home waiting for your big break? Ah, then, nevermind, because nobody is copying your damn CD!

ART is not some magic invisible soul cream. If you are selling your art, then you are selling your thoughts. Good luck to you on that, but don't cry about how people are stealing your thoughts. That's just crazy talk. Unless someone steals the plastic you bought and put your thoughts on, then they didn't steal anything from you. A law may say that its theft to listen/read/watch your creativity uninvited, but laws also once valued some people at a fraction of the value of others. Laws are just constructs of the general consensus, and that consensus is changing.
http://yro.slashdot.org/yro/06/08/19/0342256.shtml





Campaign Targets Web Crimes Against Kids
Jamie Stengle

Attorney General Alberto Gonzales announced a new public service campaign Monday that will warn teenage girls against posting information on the Internet that could put them at risk of attack by child predators.

"Every day, these predators are looking for someone to hurt," Gonzales said at the 18th annual Crimes Against Children Conference in Dallas. "Every day, we must educate parents and children about the threat."

About 2,700 law enforcement officials from around the world are attending the conference, which runs through Thursday.

"We want the front line professionals to be able to go back to their communities to protect the children in their communities," Gonzales said. "This conference brings folks together from all parts of the world and gets them talking with each other."

A third of this year's 180 workshops are focusing on Internet crime, said Lynn Davis, president and CEO of the Dallas Children's Advocacy Center, which is hosting the conference with the Dallas Police Department.

The ad campaign by the Department of Justice, in partnership with the National Center for Missing & Exploited Children and the Ad Council, will begin running early next year.

"It's all part of the ongoing effort to educate the public about this very serious threat," Gonzales said.

According to a Justice Department study, one in seven children using the Internet has been sexually solicited and one in three has been exposed to unwanted sexual material. One in 11 has been harassed.

One that warned about the dangers online was developed in 2004, giving advice to parents on how to protect their children from Internet predators. A second series of ads released in 2005 warned teen girls about forming online relationships with people they don't know.
http://hosted.ap.org/dynamic/stories...08-22-01-01-37





Using Nearly Nude Pictures, Child Sex Sites Test Laws
Kurt Eichenwald

In the photograph, the model is shown rising out of a bubble bath, suds dripping from her body. Her tight panties and skimpy top are soaked and revealing. She gazes at the viewer, her face showing a wisp of a smile that seems to have been coaxed from off-camera.

In just over seven months, the model has become an online phenomenon. She has thousands of fans from around the world, membership lists show, who pay as much as $30 a month to see images of her. According to the posted schedule, new photographs of her — many clearly intended to be erotic, all supposedly taken that week — are posted online every Friday for her growing legions of admirers.

The model’s online name is Sparkle. She is — at most — 9 years old.

Sparkle is one of hundreds of children being photographed by adults, part of what appears to be the latest trend in online child exploitation: Web sites for pedophiles offering explicit, sexualized images of children who are covered by bits of clothing — all in the questionable hope of allowing producers, distributors and customers to avoid child pornography charges.

In recent months, an array of investigations of the child pornography business — by the Justice Department, state and local law enforcement and Congress — have contributed to wholesale shutdowns of some of the most sexually explicit Internet sites trafficking in child images. But they have been rapidly replaced by a growing number of these so-called model sites, Internet locations that offer scores of original photographs of scantily clad under-age children like Sparkle, often posed in ways requested by subscribers.

More than 200 of the sites have been found by The New York Times through online advertising aimed at pedophiles, and a vast majority focus mostly on one child. Almost all the children appear to be between the ages of 2 and 12.

Based on descriptions in online customer forums and in Web pages showing image samples, the children are photographed by people who have frequent access to them. The sites often include images of “guests”: children who are described as a friend of the featured child, but who appear for only a day. The sites say the children come from different parts of the world, including the United States.

Based on the images and wording from online advertisements, the sites show toddlers wearing tight thongs, and slightly older children posing evocatively while wearing makeup and feather boas. There is even a site that offers images of girls and boys who appear to be 5 or 6 years old, wearing just diapers.

In online conversations observed by The Times over four months, pedophiles portrayed model sites as the last of a shrinking number of Internet locations for sexual images of minors.

”I considered the authors of those sites as leaders of a rebellion movement for child porn,” a man calling himself Heartfallen wrote in an online site for pedophiles, discussing the decline in the number of sites featuring images of naked minors. “They’ve vanished. There is much less freedom on the Internet now. We still have a rebellion made up of nonnude child modeling sites. But are they going to suffer the same fate as their predecessors?”

The secretive world of child exploitation is in the spotlight because of an arrest last week in the 1996 murder of JonBenet Ramsey, a 6-year-old beauty pageant princess. The suspect was a fugitive from charges of possessing child pornography and had exhibited a fascination with the sexual abuse of children.

While many of the recently created sites are veering into new territory, the concept of for-pay modeling sites using children has been around for years. They first appeared in the late 1990’s, when entrepreneurs, and even parents, recognized that there was a lucrative market online for images of girls and boys.

Sites with names like lilamber.com emerged, showing photographs of children, usually modeling in clothes or swimsuits. Their existence set off a fury of criticism in Congress about possible child exploitation, but proposed legislation about such sites never passed.

The sites that have emerged in recent months, however, are markedly different. Unlike the original sites, the newer ones are explicit in their efforts to market to pedophiles, referring to young children with phrases like “hot” and “delicious.” The children involved are far younger, and the images far more sexual, emphasizing the minors’ genitals and buttocks.

Some modeling sites have already attracted the attention of law enforcement. Earlier this year, prosecutors obtained a guilty plea on child pornography charges from Sheila L. Sellinger, then of Shoals, Ind., who had been selling illegal photographs of her 10-year-old daughter on a modeling Web site. Last month, Ms. Sellinger was sentenced to almost 12 years in prison.

Ms. Sellinger, who earned thousands of dollars a week from the pornographic yet clothed images of her daughter, cooperated with law enforcement, leading to the arrest of two men who had been assisting her with her site and had been running several more, court records show.

To attract subscribers, central marketing sites, called portals, list scores of available modeling sites that accept money in exchange for access to children’s images. The portals promote the busiest sites, ranking them by the number of hits they receive.

Such a marketing approach proved effective for some online child pornography businesses that have disappeared over the last year, including those that offered illicit videos of children generated by Webcams.

The Times did not subscribe to any sites, which it first saw referenced in online conversations among pedophiles. The Times followed a link posted in those conversations to forum postings and images on freely accessible pages of the modeling sites. Because those sites appeared to be illegal, The Times was required by law to report what it had found to authorities. Federal law enforcement officials were notified in July about the sites.

Posing as Traditional Agencies

In contrast to their advertising, many of the sites portray themselves on their main pages as regular modeling agencies trying to find work for their talent. But executives in the legitimate modeling business said that virtually everything about the sites runs contrary to industry practice. Most child images for genuine agencies are password-protected, the executives said, with access granted to companies and casting agents only after a check of their backgrounds.

These executives said that real modeling agencies would refuse to use the types of sexualized images of children sought by pedophiles, not only because they are exploitative and illegal, but also because they would be bad business.

Such images on an agency Web site would drive away many parents who might be seeking representation for their child, executives said; indeed, most photographs of child models are nothing more than head shots. And the legitimate agents provide the phone numbers, addresses and names of their executives so potential clients can contact them; most of the sites aimed at pedophiles not only provide little or no means of contact, but even hide the identities of the owners behind anonymous site registrations.

“These are clearly not bona fide companies, and it’s obvious these are just Web sites for people to go on and view children in an unhealthy manner,” Bonnie Breen, chief booker for the Bizzykidz Agency, a prominent modeling agency for children based in London, said when provided with a description of the emerging modeling sites.

Despite repeated statements on the sites that they are lawful, they may well run afoul of American law. While the issues are far from settled — thus leading to the attempts by Congress to clarify the law — courts have worked over the last two decades to define standards for what constitutes potentially illegal images of children.

Under law, for an image that does not involve a child engaged in a sex act, a court must find that it entails “lascivious exhibition of the genitals or pubic area” of a minor to determine that it is child pornography. As a result, courts have ruled that images of naked children were not automatically pornographic, and thus not illegal, while also holding that the mere presence of clothing on a photographed child was not, in itself, adequate to declare the image lawful.

Instead, the courts often apply a six-pronged test, developed in a 1986 case called United States v. Dost, to determine whether an image meets the “lascivious exhibition” standard. That test — which requires a court to examine the child’s pose and attire, the suggestiveness and intent of the image and other factors —includes one standard on whether the child is naked. However, no single standard under Dost is absolute, and courts must continuously examine potentially illegal images while considering each part of the test.

The leading precedent on child pornography involving clothed minors is a federal case known as United States v. Knox, which involved a pedophile who obtained erotic videos of girls. In that 1994 case, the Federal Court of Appeals upheld the conviction of the pedophile, Stephen Knox, saying explicitly that clothing alone did not automatically mean that images of children were legal.

“The harm Congress attempted to eradicate by enacting the child pornography laws is present when a photographer unnaturally focuses on a minor child’s clothed genital area with the obvious intent to produce an image sexually arousing to pedophiles,” the court’s ruling says. “The rationale underlying the statute’s proscription applies equally to any lascivious exhibition of the genitals or pubic area whether these areas are clad or completely exposed.”

While adult pornography has some First Amendment protections, there are no such protections for child pornography. Still, some experts have expressed discomfort, in general, at criminalizing clothed pictures of minors.

“This is a difficult area,” said Michael A. Bamberger, a First Amendment specialist at Sonnenschein Nath & Rosenthal, based in New York, who filed a brief on behalf of a booksellers’ group in the Knox case. “The whole history of the exception from First Amendment protections for child pornography is based on the harm to the child. But there is in my view a free speech issue with respect to designating photographs of persons under the age of 18 who are clothed as child pornography.”

But Mr. Bamberger expressed uncertainty about whether his concerns applied when told details of the model sites found by The Times. “To me, it sounds as if you are really talking about nude equivalents, almost like cellophane clothing, and that’s not clothing at all.”

Applying the Legal Standards

To distinguish between illegal images and, say, photographs of children posing in underwear for a store catalog, the court said it had to apply the Dost standards and review a range of facts, like the nature of the images and whether the marketing was intended to appeal to pedophiles.

For example, the court noted, a potential customer could know the images of minors were illegal if they were marketed with statements proclaiming that they would “blow your mind so completely you’ll be begging for mercy.” Explicit listing of the children’s ages, along with sexually loaded terms like “hot,” could also be used as evidence of illegality, the court said.

The modeling sites reviewed by The Times incorporated many such references to encourage viewers to subscribe.

That is true for one of the most successful collections of sites, according to some portal rankings, run by an entity called PlayToy Entertainment. On its central site, PlayToy holds itself out as a company that helps children start modeling careers. There is, however, no phone number, address or prominent e-mail address available for companies that might seek to hire the girls or for parents who might want their children to be models.

The central PlayToy site originally located by The Times contained links to as many as six sites featuring little girls. In recent days, the central site has been redesigned, removing the links to the girls’ individual sites.

Those sites still exist, however, including the one for the girl called Sparkle. Another site features a prepubescent girl named Lolly — a widely used online code word for pornographic images of girls. There are even sexualized images of a girl called Baby, who appears younger than 5 and whose photographs seem to go back as far as her second birthday or earlier, when she was still in diapers.

The marketing makes clear that this is no typical modeling company.

“Call 911 before viewing!!!” proclaims the site for Sparkle, which shows her in a thong so revealing that she appears to be naked below the waist. The ad for the site uses words that echo those cited in the Knox decision, reading, “Only 9 years old! Hot!”
Other PlayToy sites are more explicit. “Feel her breathe on your face, take a gentle touch from your screen, open your mind and push the limits,” reads the site for the girl called Lolly. “If you are ready to handle this trip, PlayToy Lolly is calling.”

An advertisement for another PlayToy site, featuring a girl called Peach, declares, “A peach has never looked so delicious.**8 years old**.”

The site includes a picture of the young girl wearing a tank top pulled off one shoulder. Directly below that is a purple emblem with the company name and the words, “Nonnude website: 100% legal.”

But experts said that assurance was almost certainly not true. Based on the ages of the children, the marketing words and customer comments on the PlayToy sites described to him by The Times, a lead lawyer in the Knox case said that the subscribers had plenty of reason to worry.

“They shouldn’t have any comfort that they are not breaking the law,” said Edward W. Warren, a partner from the Washington office of Kirkland & Ellis who helped to argue Knox as a representative of 234 members of Congress who joined the case. “This sounds worse and more graphic and more grotesque than what we were dealing with, particularly given how young the children are.”

The assurance by the company that the sites are lawful is irrelevant to any potential prosecution, experts said. Indeed, in the Knox decision, the court held that defendants could be found guilty if they were aware of the “general nature and character” of images that they bought involving clothed children in sexual poses.

“The child pornography laws would be eviscerated if a pedophile’s personal opinion about the legality of sexually explicit videos was transformed into the applicable law,” the court held.

In their comments on PlayToy’s site, which can be viewed without registering with the company, the subscribers make clear that they are aware these are sites for pedophiles, not legitimate modeling clients.

“I think it would be awesome to have the models start off fetchingly clothed, and then strip down to tops or panties (or thongs!!),” a customer calling himself head2fat wrote on the forum.

Another client, calling himself ludwig66, instead requested that the girls appear in stockings, “ending up removing them to reveal bare feet and legs.” And still another customer, calling himself littlefeet, asked the site owners to pose the girl known as Baby in bare feet with her toes pointed, “so all of those beautiful wrinkles show!!!”

While PlayToy’s management and its members repeatedly assure themselves online about the legality of their images, they did not hesitate to post images from known child pornography sites. For example, when Ms. Sellinger was arrested this year for selling photos of her daughter, PlayToy members — and even the site operator — posted messages of dismay, referring to both mother and daughter by name. They also composed a photographic homage to the girl in the forum discussion, using images from the site that had been deemed illegal.

Following the Money

PlayToy’s sites have been online since October, company records show. But in that short time, the records show, 6,000 people have subscribed to view the images of the girls. Each subscriber is paying $30 a month for each site; that means the operators have collected a minimum of $180,000 in that short time, assuming every subscriber bought only one site for one month.

The cash has been collected either by credit card — processed through a company called Advanced Internet Billing Services, or through Western Union payments — as well as through an online money system called e-gold.

Attempts to learn the identities of the people behind PlayToy suggested many possible locations. Payments through Western Union were processed through Ukraine. An administrative e-mail address suggested the company was based in Russia. Using a commercial software program, The Times traced messages sent by the PlayToy sites back to servers in Germany and obtained what is known as the Internet protocol address of that online host.

An examination of the registration documents for the sites’ names led to a company that is essentially a front, permitting its name to be used as the registrant by people who wish to remain anonymous.

The Times then obtained business records about the site prepared by someone involved in its operation.

If true, the records show the name, address, telephone number and other personal information of a man in Florida who is involved in running the site. An e-mail address listed in the records was traced to postings that appeared in pedophile conversation sites, including comments praising child pornography and images of young girls in thongs. Because of the possibility of identity theft, The Times has elected not to publish the name of that man or of associates who also appear to be involved in the business.

The Florida man did not return a voice mail message left on his cellphone or respond to an e-mail message.

Still, even if the operators of PlayToy are positively identified and compelled to shut their sites, the growing business of model sites would probably continue to thrive. PlayToy’s many subscribers, a large number of whom identify themselves on the site as living in America, could simply drift over to other model sites, all offering similar fare.

There, on each of those hundreds of competing sites, the subscribers will find at least one other little girl who, every few days or so, is dressed in panties or thongs, placed in a bathtub or posed on a bed, while a nearby adult snaps pictures for the delight of a paying audience of thousands.
http://www.nytimes.com/2006/08/20/bu...rtner=homepage





Microsoft Adds 'One-Click' Sex Offender Report Tool
Quentin Reade

Young people using Windows Live Messenger or MSN Messenger to chat online with friends can now make a report to police with one click if they are concerned their online 'buddy' is a sex offender.

Microsoft has partnered with the Child Exploitation and Online Protection (CEOP) Centre – the UK's first dedicated organisation focused on tackling child sex abuse – to introduce the safety element to the UK's most popular instant messenger product.

The move sees the incorporation of a new Messenger tab and features the CEOP Centre's distinctive “report abuse” icon which links users in the UK directly to online police services. This allows young people and adults to report suspicious behaviour and instances of inappropriate contact of a sexual nature they have encountered whilst chatting in the virtual environment.

Also, through the icon and link to the CEOP web site, people from anywhere in the world can access the Virtual Global Taskforce (VGT) – an international alliance of law enforcement agencies – of which the CEOP Centre is the UK's representative.

The tab will appear on both MSN Messenger, and its replacement, Windows Live Messenger. As well as a 'one click' link through to a report to the police, each week, CEOP and Microsoft will provide a new safety tip as part of the tab, for example, how to safeguard your personal details or to how to spot a potential threat.

Jim Gamble, chief executive of the CEOP Centre and chair of the VGT said:
“What Microsoft and the CEOP are doing today is saying is 'enough is enough'. By working together in a very clear and tangible way we can safeguard children from online sexual predators.

“Behind the report abuse button will sit police and intelligence officers who have been specially trained to tackle child sex abuse. We will tell you how to capture information and how to seize online discussions and then proactively do all we can to track down the perpetrator.

“CEOP is an integral part of the VGT and therefore by working with MSN in this way we are offering users access to a global police response. If you make a report as a UK citizen then we at CEOP will investigate. If you make a report as a user from other countries then our counterparts in the US, Australia, Canada or Interpol will take the matter further. That is a truly global response to a worldwide issue.”
http://www.webuser.co.uk/news/news.php?id=92834





Google Prosecuted In Brazil To Hand Over User Data
Stan Beer

Google is in danger of being shut-down in Brazil and faces a possible US$61 million fine for refusing to hand over user information associated with one of its social networking sites.

The problem is that the Sao Paulo based federal prosecutor's office alleges that pages on Google's Orkut social networking site are used to promote child porn and other criminal activity. So the prosector wants a federal judge to order Google Brazil to hand over the data on users associated with those pages.

Google maintains that as the data is housed on a server in the US, the request should be made to Google headquarters in the US.

Meanwhile Google in Brazil is using the defence that it has already handed over all the information that is able to and does not have the data about Orkut users that is being requested.

The Brazilian case highlights an issue that has been brewing for sometime over the information that search engine and other internet companies keep on their databases about their users.

The recent blunder made by AOL in which the internet company erroneously published 20 million search requests made by 658,000 users demonstrated that a detailed level of information can be obtained on even anonymous users simply by grouping together unique user ID numbers.

Early this year, Google successfully defended a subpoena from the US Department of Justice to hand over its data in another child porn investigation case.

No doubt, Google wants to use the same US laws to protect itself from the Brazilian legal system. The problem is that Brazil, like many other countries, may decide that data associated with websites that target audiences in its jurisdiction also falls within its jurisdiction, especially in criminal investigation cases.

Brazil is by no means a totalitarian regime but its privacy laws differ from those of the US. If a Brazilian judge decides that Google must hand over data or pay a hefty fine and shut down its local operations then it sets a dangerous precedent for Google.

What happens if the Chinese Government makes a similar demand of Google China to hand over data in an attempt to track down dissidents? Google may hold the Chinese user data on US servers but Chinese law may require that it hand over data or have its Chinese office censured and shut down.

The same thing holds true for Yahoo, Microsoft and any social networking site that chooses to operate in jurisdictions where privacy of the individual is not paramount in the legal system.
http://www.itwire.com.au/content/view/5372/53/





Smart Care via a Mouse, but What Will It Cost?
Steve Lohr

THE electronic medical record seems an example of pure progress, a technology that yields only winners. So it has been cast as a geeky hero in health care policy circles.

Michael O. Leavitt, the secretary of health and human services, recently said the rollout of electronic health records was “the most important thing happening in health care.”

Major technology corporations like I.B.M., General Electric and Microsoft, as well as a crowd of specialist companies, including Cerner, Epic Systems and Eclipsys, are all chasing what they see as a fast-growing, multibillion-dollar opportunity to sell health information technology to hospitals, clinics and doctors.

Congress is joining the bandwagon. Last month, the House of Representatives passed a bill to promote the adoption of the computer hardware and software necessary to generate and share digital patient records. The House bill and a previously passed Senate version are scheduled to go to a conference committee next month. Politicians across the spectrum of the health policy debate, from Senator Hillary Rodham Clinton, Democrat of New York, to Bill Frist of Tennessee, the Senate Republican leader, are united on this issue.

The technology itself is simply a software storehouse of a person’s medical history, including chronic conditions, medical tests, drug prescriptions, diagnoses and doctors’ comments. Yet bringing pen-and-ink patient records and prescriptions into the computer age is seen as a vital step toward modernizing the nation’s inefficient, paper-clogged health system. Various studies say that it should reduce medical errors and costs, saving lives and saving dollars — about $80 billion a year, according to the RAND Corporation.

Yet even the technological optimists expect turmoil from the information revolution they see coming in health care. Electronic patient records woven into a national digital network will help identify cost-saving opportunities, they say, but when combined with the emerging field of genomics, the records will also open the door to personalized medicine, new treatments — and, ultimately, more care. While that is by no means a bad thing, it is also not the hoped-for fix for the nation’s rising health care bill.

“All the new information tools have enormous promise,” said Dr. Brian L. Strom, a professor at the University of Pennsylvania School of Medicine, “but they will not necessarily drive down the overall cost of health care.”

The full effect of health-information technology is years away, because only about 20 percent of physicians now use electronic medical records. But the policy and corporate push is under way and accelerating.

Digital files are a building block in the creation of far more efficient markets in health care, medical experts say. That is what the enthusiasm is really about: not computers and software, but health information that can be easily shared, searched, measured and analyzed to determine what treatments and drugs are most effective, and at what cost.

But efficient markets can be ruthless and unpredictable, threatening incumbent powers and producing losers as well as winners. An information revolution in health promises to be powerfully disruptive for some lucrative businesses in the industry, according to medical experts and economists, and could lead to more spending on health care instead of less.

“Information is a dual-edged sword, especially in health care,” said David M. Cutler, a health economist at Harvard. “Better information might blow apart some of the blockbuster markets in the pharmaceutical industry, for example. But it might also increase demand for other drugs in smaller, more focused markets.

“And if better information really helps us understand what is happening in health care,” Mr. Cutler added, “it could well lead to more care for more people and higher costs for the system as a whole.”

The technology backbone for more efficient health care markets is being called the “national health information network.” Such a network — with patient records stripped of their personal identifiers — is intended to someday allow doctors, nurses, researchers and ordinary people to track the outcome of various therapies, drugs and devices.

The idea is that they could tap into a public Web site to sift through health databases that are based on millions of records, updated regularly. Clever software would help them to understand what works and what doesn’t — and to seek answers about side effects, recovery times and vitamin regimens. A result, health experts say, is that fewer decisions about how to treat patients would be based on studies by drug companies and medical device makers, as they often are now.

“The technology is just an enabler so we have shareable, useable information,” said Dr. David J. Brailer, the architect of the Bush administration’s health information technology policy.

A GLIMPSE of the potential impact of a national health information network is found in smaller-scale networks already operating around the country. These are mainly at so-called integrated health systems that combine hospitals, clinics, laboratories, doctors and nurses, and serve a metropolitan area or region. Some, like the Veterans Affairs health system and Kaiser Permanente, the health maintenance organization, are also insurers and well as health care providers.

The integrated health systems have been leaders in adopting electronic records. They have the data, systems and incentives to measure the therapeutic effectiveness and cost-benefit tradeoffs in health care.

Modern computer technology, to be sure, is hardly foolproof. It can magnify privacy problems, and the recent loss of computer files of personal data, including medical records, at the V.A. underline that nettlesome issue. And electronic records will not cure other problems: Kaiser recently suffered a black eye when it paid a $2 million fine for administrative foul-ups and long waits at a kidney transplant center in San Francisco, which it closed in May.

Still, the potential for market-disrupting cost savings is illustrated by what Kaiser and the V.A. have done in their drug management programs with statins, cholesterol-lowering drugs. Statins are the largest prescription drug category in the United States, with sales of $16 billion last year, according to IMS Health, a research group; Lipitor ($8.4 billion), from Pfizer, and Zocor ($4.4 billion), from Merck, took 80 percent of the market.

In recent years, Kaiser and the V.A. have been using generic lovastatin for many of their patients taking statins, saving millions of dollars. At Kaiser, for example, its research pharmacists and cardiologists had been looking at closely at using the generic even before Merck’s Mevacor, the brand name for lovastatin, lost its patent protection in 2001. Kaiser’s research on safety and effectiveness concluded that lovastatin could generally be used as an alternative.

Lovastatin is less potent than Zocor or Lipitor, so Kaiser doctors prescribe higher doses of lovastatin for equivalent potency. Patients have regular blood tests to monitor their cholesterol levels, which become part of their electronic medical records. Alerts are sent to patients and doctors if tests are missed or cholesterol levels rise.

Doctors are still free to prescribe Lipitor and Zocor, and they do for patients who need the strongest statins. But nearly 90 percent of patients, according to Kaiser’s research, can reach their cholesterol-lowering goals with lovastatin. (Zocor lost its patent protection in June, further opening the statin market to lower-priced generics.)

The V.A. also makes extensive use of lovastatin. These kinds of programs can be carried out confidently only at places with the resources to conduct research, monitor individual patients and track outcomes across patient populations using electronic medical records. “This has to be driven by the clinical data, not merely cost savings,” said Joseph J. Canzolino, associate chief consultant for pharmacy benefits management at the V.A.

Ideally, electronic patient records and a national health information network would someday give doctors everywhere the information to make similar prescribing decisions and to track their patients closely, if they chose. “Can you imagine the savings if what we do here were done across the country?” said Dr. Ambrose Carrejo, a drug use manager at Kaiser. “We’re talking billions of dollars in savings.”

Imagine, too, the potential impact on blockbuster products like Lipitor, the world’s largest-selling prescription drug. “The whole blockbuster model relies on prescribing a drug for a whole lot of people who don’t really need it,” said J. Mark Gibson, deputy director of the Center for Evidence-Based Policy at the Oregon Health and Science University, which conducts independent reviews of the effectiveness of drugs and medical treatments.

“So much of the information doctors get now comes from studies paid for by the companies that are looking for positive outcomes,” Mr. Gibson said. “The more independent information you can generate, analyze and distribute, the more the blockbuster model is in doubt.”

Lipitor, according to Dr. Gregg Larson, vice president of cardiovascular medical at Pfizer, is a blockbuster by merit. Hundreds of clinical trials, Dr. Larson said, have found the benefits of Lipitor as a particularly potent cholesterol-lowering drug that reduces the risk of cardiovascular disease and strokes. “The evidence demonstrates that not all statins are the same,” he said.

Whether more data threatens blockbuster drugs or not, there are likely to be cases in which more information is likely to generate more prescriptions, more care and more health care spending. A wave of genetic research, for example, is under way, and someday a person’s genomics information will be included on his or her electronic health record. Genomics holds the promise of personalizing treatments to make them more effective and to reduce unwanted side effects.

CONSIDER the anti-clotting drug warfarin, sold by Bristol-Myers Squibb under the brand name Coumadin. The drug is extremely useful in treating patients with heart and circulatory problems. But it can also be tricky to get the dose right so that a patient gets the blood-thinning benefits without dangerous side effects, like internal bleeding or strokes. Personal-injury lawyers closely watch the use of warfarin, and many doctors are leery of prescribing the drug.

Medical researchers at a number of clinics and universities have identified gene types that appear to determine how an individual metabolizes warfarin. If the early research is confirmed in broader studies, it will be possible to tailor dosages by gene types to minimize the toxic side effects. “We could make warfarin a lot safer with genetic testing,” said Dr. Michael Caldwell, a researcher at the Marshfield Clinic, an integrated health system in northern Wisconsin, which has a genetic research program.

But improved safety would also likely mean a lot more prescriptions for warfarin, since studies have concluded that only about half the people who might benefit from the drug are taking it. Yet those prescriptions, in an era of personalized medicine, might well be individually tailored doses. If the old blockbuster business model is endangered, so is the standard pill, in 10-, 20- or 100-milligram doses.

The electronic medical record, for all its promise, is no silver bullet for the nation’s health system. Placing too much faith in technology, skeptics warn, could be counterproductive. Dr. David Himmelstein, a physician and associate professor at the Harvard Medical School, said: “It encourages the belief that we don’t need real reform, all we need is computers.”
http://www.nytimes.com/2006/08/20/bu...ey/20info.html





Watching the Fireworks (but Keeping Them Outside)
Anne Eisenberg

LAST August, a week after the Rodzons moved into their new two-story home in Delran, in southern New Jersey, the house was struck by lightning and badly damaged. It was four months before the family could return to its rebuilt house, which now had a new feature: a professionally installed lightning protection system. “If it happened once, it can happen again,” Kevin Rodzon said of the strike.

It’s high season for buying both the equipment that monitors lightning and the equipment that protects against its damaging effects on buildings or their contents: things like costly computers, security systems, and home entertainment centers vulnerable to electrical surges that may invade through a telephone or cable line, among other entry routes. The electronics of the backyard, from pet fences and watering systems to garage door openers and well pumps, can also be zapped and destroyed without a proper defense.

To protect his home, which has four bedrooms, Mr. Rodzon chose a modern, unobtrusive system that he said was scarcely noticeable from the street. “It doesn’t take away from the look of the house,” he said.

The slender lightning rods are only a foot high and three-eighths of an inch in diameter. To make the installation even more discreet, the mounting for the lightning rods is fastened to trusses in the attic and the cables are run inside, said Ian Fawthrop, president of Lightning Prevention Systems, the company in West Berlin, N.J., that installed Mr. Rodzon’s system. The cost, including surge protection, was about $2,000.

Nowadays, there are many ways to provide extensive protection for homes and their contents, provided that people are willing to foot the bill. “It’s a science now,” said Parker M. Willard Sr., president of Boston Lightning Rod, in Dedham, Mass. “Our systems are 100 percent fail-safe if installed properly.”

Boston Lightning Rod, like many other companies, uses a two-part approach. Along the ridge and other prominent areas of the roof, Mr. Willard said, are the bases for the exterior defense: lightning rods, called “air terminals,” connected by cable and properly grounded. The second, interior line of defense is surge suppression to protect a home’s consumer electronics and appliances if secondary lightning enters through water pipes or electrical, telephone or cable lines. In addition to surge arrestors at the main electrical panel, he recommended protection at each outlet for electronics, like stereo speakers, to guard against the small surges that get past the main panel.

Mr. Parker said both types of protection were essential. “If it’s just exterior, or just surge, you’re kidding yourself.” The total cost will vary, he said, but expenses will typically run about $2,500 for a four-bedroom colonial or three-bedroom ranch.

As people add electronic devices to their households, they should consider the quality of surge suppressors that will support the devices, said Edward J. Rupke, senior engineer at Lightning Technologies, an engineering consulting firm in Pittsfield, Mass. The company, among other assignments, tests surge suppressors for manufacturers to make sure that they are working properly.

“We find a wide range of quality in surge-suppression devices,” he said — for example, among power strips that are intended to protect many devices that are plugged into them. “Instead of spending $5 or $10” he said, consumers “should probably be spending up to $50 for a good-quality power strip.”

Consumers who are buying equipment that is highly vulnerable to lightning, like underground electric dog fences, should check whether surge suppression is included in the package. “Talk to the vendor to make sure good lightning protection is built in,” he advised.

As well as installing surge suppressors and other gear to protect their property, many people buy equipment to monitor storms as they mass in the distance. Ed Florimont, president and chief executive of Fantasy Island Amusement Park on Long Beach Island, N.J., has a range of equipment to keep an eye on the weather hundreds of miles away, long before the first sign of lightning. “We have just about anything you could think of for tracking weather,” he said. “I’m interested in the weather just for itself, as well as for business.”

Lightning detection devices vary from weather radios that broadcast warnings to PC-based systems that plot lightning strikes in displays on desktops or laptops, said Richard Kithil Jr., chief executive of the National Lightning Safety Institute, a nonprofit group in Louisville, Colo., that offers consulting and classes on lightning safety.

Charles Ryan has a detection system on his home computer in New River, Ariz., north of Phoenix, that typically displays lightning activity in a range of 300 miles, sometimes farther, and tracks it as it comes closer. “The display is virtually instantaneous,” he said. “At night, I can pick up lightning, sometimes at a 1,000-mile range.”

Mr. Ryan uses a hardware-software combination made by Boltek, in Welland, Ontario. A computer card slides into the PC, which is connected by cable to a roof antenna that picks up radio signals emitted by lightning. These signals are processed by software that calculates the distance and direction of the strikes, then plots the information in a radarlike display on his screen. Mr. Ryan’s home is at the center of the display; the concentric rings give relative information on distances. Yellow dots represent strikes within range; red crosses are new strikes. The system, called StormTracker, includes an antenna, computer card and cable, and costs about $500.

Mr. Ryan bought an additional software program, Lightning/2000 ($180), from Aninoquisi, in Huntland, Tenn., that enhances the StormTracker display. The program can, for example, break down the types of lightning strikes into cloud-to-ground, cloud-to-cloud and intracloud, said Mark Mears, president of the company.

STORMTRACKER and other lightning-detection programs kick into action only after lightning occurs, because they measure the electromagnetic radiation generated by the lightning itself. But there are devices, called electric field mills, for people who want to know when there is potential for a storm well before the first strikes. Boltek makes a version ($2,000) that can be mounted in the yard and connected by fiber optic cable to a home computer. The device has an alarm to alert people when the local electric field becomes strong, meaning that lightning is imminent. “A friendly female voice warns you,” said John Gilmour, one of the owners of Boltek.

Mr. Ryan, a longtime weather enthusiast, said that watching nearby lightning had its charms, but that he liked the excitement of observing distant storms grow, using the display on his desktop to provide safe but thrilling entertainment.

“I get to see what’s going on as storms develop in the high country, late in the afternoon,” he said, and then see them move closer, as new strikes appear on the monitor and others fade away. “You can even draw a box around the heart of the storm” as it is plotted on the screen, he said, “and see the storm moving, growing and changing.”
http://www.nytimes.com/2006/08/20/bu...lightning.html





At Some Publishers, Nonbusiness Is Going Strong
Richard Siklos

THESE are twitchy times in publishing, with a constant drip of dreary news from media titans about softening profits and flattening advertising revenue from newspapers and magazines.

One reason for this, of course, is the shift of ad dollars and readers’ attention to the Internet. And why not? It’s interactive, accessible and offers a sea of free information. But perhaps most vexing to publishers are the online rivals that at first blush do not appear commercially motivated. Instead, these companies start from a position of how best to make themselves useful to the communities they serve. And then, down the line, they figure out ways to make — or, in the case of that Google gang, mint — money.

But what if oldfangled print magazines took this idea and made it their own? As it turns out, there is a clutch of magazines that have been quietly going about their business — or, rather, nonbusiness — for years. And, lately, two in particular seem to be thriving in these turbulent times: AARP The Magazine and Consumer Reports.

These are not, let it be said, the glitzy magazines that most people normally chat about at cocktail parties or dissect in blogs. Rather, these are solid but quaint titles that offer the inside scoop on why Sally Field is “tiny, talented and terrific at 60” (AARP), or take a white-knuckle road test of “cheaper brands” of breakfast cereals “that match the big names” (Consumer Reports).

Yet there is something to be gleaned from their stealthy success. I say stealthy, by the way, not because these companies are under the radar — they are actually aggressively competitive — but they exist under the aegis of not-for-profit organizations: respectively, AARP (formerly the American Association of Retired Persons) and Consumers Union. Both are powerful lobbying groups in Washington.

In the case of AARP, the people on the business side of the magazine are actually part of a for-profit unit within the organization, while the editors of the magazine work in the main no-profit zone. Go figure.

There are similar set-ups at the magazines Smithsonian and National Geographic and their parent groups. The Smithsonian has lately attracted attention over whether its business ventures are straying too far from its museum mandate and over the eye-popping salaries its top administrators and editors have drawn.

Consumers Union, by contrast, is entirely nonprofit and it eschews any business relationships — in particular, selling advertising in its magazines or Web sites — that could call the integrity of its vaunted product ratings into question.

AARP bills itself as the “world’s largest circulation magazine,” and it is true by a wide margin because of the expanding base of boomer readers as well as the organization’s focus on people who are interested in what James H. Fishman, the group publisher of AARP The Magazine, calls “living your life better after 50.”

Six times a year, the magazine is shipped to 22 million homes representing 37 million AARP members. They receive the magazine as part of their $12.50 annual membership, which also gets them a regular bulletin. The magazine is even segmented among three editions — 50’s, 60’s and 70-plus — to make it more helpful to readers and marketers.

In the new issue, Ms. Field graces all three covers. But, for instance, the 50’s edition has a special report to “Add 10 (Healthy) Years to Your Life.” The other two covers are less specific, instead promising readers “Amazing Secrets” to “Live Longer.” For whatever reason, an article on Eugene Levy gets a blurb on the 50’s cover, while Ann-Margret and Sir Richard Branson get mention on the 60’s and 70’s versions.

So what kind of business does this add up to? AARP, according to the financial statements of its parent organization, increased advertising revenue by 37 percent, to $106 million, in 2005, from $77.6 million in 2003. Just as important, the magazine plays a central role in promoting AARP and affiliated products like insurance, from which the organization makes $300 million a year in royalties. Then there is $84 million in federal and other grants, as well as $55 million in contributions. This, of course, is not the sort of thing that shows up on the ledgers at Time Inc. or Meredith.

According to the Publishers Information Bureau, ad pages at AARP The Magazine were up 13.6 percent during the first seven months of 2006, when the industry over all was basically flat, compared with the same period of 2005. The September-October issue with Ms. Field on the cover is, at 140 pages, the biggest the company has published for the 50’s category — the back cover is a beer ad, for Michelob Ultra, and Mr. Fishman said cosmetics companies in particular had fueled the magazine’s growth.

“We don’t do anything that does not first respond to our social impact agenda,” Mr. Fishman said, but he added that any magazine needed to be entertaining to succeed. “Information like this can’t be a pill.”

A similar ethos guides the publisher of Consumer Reports. Despite its disdain for advertising and the growth of all kinds of user-generated ratings for products saturating the Internet, readers apparently value the $60 million a year the magazine spends at its 400-acre site in Yonkers, N.Y., on buying and testing products.

And — here’s what has the for-profit crowd salivating — in the last three years, the number of subscribers to consumerreports.org has doubled, to 2.43 million, a vast majority of whom are paying $26 a year to gain access to the organization’s database and archive. John Sateja, senior vice president for information products at Consumer Reports, said that only 500,000 or so of the Web’s subscribers were also subscribers to the print magazine — and they pay $19.95 for the Web site on top of their print subscriptions.

The magazine, meanwhile, has managed to slowly increase its print sales both via subscription and newsstand in recent years, and now counts 4.3 million sales per issue, up from 3.8 million in 2003. A few weeks ago, the company added a new magazine, ShopSmart, to its lineup. Basically, it is a breezier version of Consumer Reports for busy female shoppers, aimed squarely at mainstream shopping magazines like Lucky from Condé Nast and Shop Etc. from Hearst. Unlike those magazines, which practically celebrate the mix of editorial and advertising, ShopSmart promises no ads and “no hype.”

OF course, the accepted business models of publications like Lucky and even many newspapers make me question whether we live in a blurry age when readers would really feel that paid product plugs in Consumer Reports would really spoil the broth. Mr. Sateja said the company did poll its readers on that question and the response remained adamantly ad-averse. “As far as working for a nonprofit, the one refreshing thing is that we basically always try to do the right thing,” he said. “We are concerned about the consumer — we’re not only about profits.”

And yet, business has never been better. Before print media start falling holus-bolus into the arms of circling private-equity owners, maybe they ought to look into this whole not-for-profit thing.
http://www.nytimes.com/2006/08/20/bu.../20frenzy.html





CBS Is All Katie, but Rivals Aren’t Standing By
Jacques Steinberg

To reintroduce Katie Couric to the country as a serious yet still accessible evening news anchor on Sept. 5, CBS has embarked on an image campaign worthy of a presidential candidate.

The network’s efforts will put her face on the front of every city bus in New York next month as part of a promotion that would cost in excess of $10 million if the national television commercials featuring her were bought by an outsider.

For all the maligning of the evening news as a dinosaur lurching toward extinction, the prize CBS is pursuing remains among the most lucrative and high-profile in television: the biggest share of the nearly 25 million viewers who still tune in to the three main news broadcasts each night, and the bulk of the nearly $400 million spent each year by advertisers trying to reach them.

Unlike her two main rivals, Brian Williams of NBC and Charles Gibson of ABC, Ms. Couric does not enjoy the incumbent’s advantage of already doing the news each weeknight — though they, too, have hardly sat idle.

Little wonder that CBS, which is paying Ms. Couric an estimated $15 million annually, has been convening focus groups at its research center in Las Vegas and other places to ask viewers such questions as how she will fare in a matchup against Mr. Williams, the leader in the Nielsen ratings, and Mr. Gibson, whose program is in second place.

The network would not say whether the “CBS Evening News,” mired at No. 3 in the ratings for more than a decade, was able to raise its standing in that most recent internal polling. Regardless, it has used those responses from viewers, including the attributes they seek in an anchor, to help shape Ms. Couric’s broadcast.

Meanwhile, like local party leaders, news anchors from the top 48 CBS affiliates were flown to New York this month for a two-day junket in which each was given 10 minutes to interview Ms. Couric — all told, she talked for more than eight hours — for individual segments that will be broadcast prominently on each local station.

Though far more subdued, Mr. Williams and Mr. Gibson have nonetheless been making similar efforts, some of them mischievous in tone, to retain the viewers they have and woo others.

Beginning around Sept. 1, an image of Mr. Williams, four stories tall, will loom over the CBS Broadcast Center in Manhattan from a banner at West 57th Street and 10th Avenue. (Alongside will be another featuring Matt Lauer and Ms. Couric’s replacement as his partner on the “Today” show, Meredith Vieira.)

Still, the defection of Ms. Couric from “Today,” the top-rated morning program for more than a decade, is being taken so seriously at NBC that her former boss on the program, Jeff Zucker, now chief executive of NBC Universal Television, has been gathering executives for regular meetings intended to guard against complacency, in both the evening and morning time slots.

At ABC, Mr. Gibson — who was moved from “Good Morning America” to “World News” in late May, after the network abandoned a two-anchor format — is being reintroduced himself, in an advertising campaign with its own vaguely presidential tag line: “Your Trusted Source.”

The line is intended not only as a dig at Mr. Williams (who assumed the anchor chair at NBC less than two years ago) and Ms. Couric, but also as a way to link Mr. Gibson to Peter Jennings, who led the ABC newscast for more than two decades before his death in August 2005. (The slogan of the last campaign featuring Mr. Jennings, as he had prepared to go up against Mr. Williams in his rookie year, was “Trust Is Earned.”)

Having worked within the same news division as Mr. Williams and competed for years against Mr. Gibson in the morning, Ms. Couric, by virtue of her decision to occupy the 6:30 p.m. slot at CBS, has heightened the already spirited competition among the three news divisions.

On a recent afternoon at NBC, one former colleague wondered, with obvious relish, whether Ms. Couric would seek to install a “Today”-style couch on the CBS set — for the record, she will not — and another suggested that Ms. Couric had hired her personal gastroenterologist as her program’s new medical correspondent. (She did not; while a sometime guest on “Today,” the new CBS reporter, Dr. Jonathan LaPook, is not her doctor, she said, though he did refer her to the doctor who gave her a colonoscopy.)

When asked about one another in separate interviews, the three anchors mostly sought to highlight their rivals’ strengths, though a certain bristling was evident.

“Katie comes into the job with a good understanding of the anchor-viewer relationship,” Mr. Williams said, when asked in early August about Ms. Couric in his office at 30 Rockefeller Plaza, not far from the “Today” set. “But evening news viewers are different.”

When Mr. Gibson was asked — in an interview just before he presented a live report on the British terrorism arrests on Aug. 10 — whether he had any special plans for the broadcast of Sept. 5, he questioned why a reporter was asking about that date.

“I didn’t even know it was Sept. 5 she was starting,” he said, with apparent seriousness. “Her beginning the show is not an event in this newsroom.”

Then, noting that his arrival on “World News” full time on May 29 had preceded Ms. Couric’s at CBS by more than three months, he added, “This is not like a shakedown cruise.”

And how does Ms. Couric size up her competition?

In a telephone interview last week, she said, “Clearly we don’t want to be rubber-stamping everything they do.”

Among the elements she hopes will set her program apart, she said, is the weeding out of the austere delivery she often detects among correspondents on CBS’s evening news program — and those of her rivals — in favor of a more relaxed approach.

“It hasn’t gotten to Ron Burgundy levels,” she said, invoking the robotic, self-absorbed newscaster played by Will Ferrell in the 2004 movie “Anchorman.” “But the ability to just talk to people and communicate in simple language that we use in conversation is something that can be done to a greater extent.”

Ms. Couric’s debut will offer evening news viewers the starkest choice among anchors, at least demographically, in the four-decade history of the half-hour evening news format: a 63-year-old man (Mr. Gibson), a 47-year-old man and the first woman to fly solo behind an anchor desk.

And for all three networks, the arrival of Ms. Couric, 49 — the most established star to take the helm of an evening newscast — represents perhaps the last chance for such programs to make a broad case for their relevance, in an age when news video is instantly available on the Internet. On Thursday, CBS announced that Ms. Couric’s program would be shown simultaneously on the Web, a first for the evening news.

The promotions supporting Ms. Couric are the most exhaustive undertaken by CBS News, the network’s executives said, and comparable only to the promotions mounted in recent years for prime-time shows like “CSI.”

Whether the hype will have any long-term effect remains to be seen. Typically, the pecking order among network newscasts has changed glacially, a function not just of who has delivered the news but also of the popularity of the local newscasts that precede them.

In many respects, Ms. Couric’s retooling of the “CBS Evening News” will appear comfortably familiar.

She will sit at a desk finished in ginger root maple laminate — lighter than the mahogany model used by Dan Rather and later Bob Schieffer, but still a desk — atop bright red and blue carpeting, with a 15-foot projection television to her left. Nearby are areas for her to stand and to accommodate chairs for live interviews.

One way she thinks she might stand out from her competitors, she said, is that she will assume that many viewers have already scanned the headlines of the day, giving her license to jettison some stories entirely or to dispense with others in a digest. Doing so, she said, could free up valuable time — no small thing in a broadcast that is actually 22 minutes — to add depth and context to those issues she deems worthy.

“We’ll have correspondents working less on ‘news of the day’ stories and focusing on longer takeouts, if you will,” she said.

At least at the outset, Ms. Couric will give over as many as 90 seconds each night to a segment titled “Free Speech,” in which ordinary Americans, as well as scholars and sometimes even comedians, will be allowed to sound off. Mr. Schieffer will deliver a weekly essay in this slot, probably on Wednesdays.

Neither Mr. Williams nor Mr. Gibson said he felt inclined to follow suit, saying there was ample commentary on cable news and talk radio.

On average this year, Mr. Williams’s broadcast has beaten ABC’s by nearly 800,000 viewers each night, drawing a total audience of 8.8 million versus 8 million for ABC, with CBS lagging at 7.3 million, according to Nielsen Media Research. Though the race between NBC and ABC has been far closer among viewers ages 25 to 54, a bellwether for advertisers — NBC’s lead there is a slim 100,000 — Mr. Williams said he did not plan to change anything come Sept. 5.

“It wouldn’t make sense elsewhere in business for the leading product to make alterations because a product was joining the fray,” he said.

Among the ways Mr. Williams’s broadcast has evolved in the 20 months since he succeeded Tom Brokaw is that it has sought to leaven his marked sobriety with an occasional nod to his sense of humor. At times, he even answers viewer e-mail on the air.

At other times, though, efforts to make the broadcast (and its associated Web site) even more about Mr. Williams can appear to border on the self-reverential. On July 17, for example, the 10th anniversary of the explosion of TWA Flight 800 over Long Island Sound, Mr. Williams chose to mark the occasion by showing extended footage of how he had reported the crash live as an anchor on MSNBC, then in its third night of existence.

“It sounds like it’s being said absent modesty,” Mr. Williams said, when asked to explain that editorial choice. “That became a bit of a television touchstone that many, many summer viewers associated with that night.”

Like Mr. Williams, Mr. Gibson said he did not expect to make major revisions in his broadcast, which recently shortened its name to “World News,” from “World News Tonight,’’ to reflect its electronic ubiquity.

He said he might emphasize some subjects of personal interest, like the controversy over performance-enhancing drugs in sports, or broadcast nine correspondent segments on some nights when Mr. Williams might do seven.

But in the end, he suggested, all three broadcasts, including Ms. Couric’s, will effectively be following a template set decades ago.

“I know there’s a lot going to be made about the fact that the CBS thing is changing,” Mr. Gibson said. “It’s an evolutionary thing for CBS, too.

“Is there something special about her?” he added, referring to Ms. Couric. “I don’t know. I’ll let you determine that.”
http://www.nytimes.com/2006/08/20/us...rtner=homepage
JackSpratts is offline   Reply With Quote