View Single Post
Old 04-07-07, 09:01 AM   #1
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,018
Default Peer-To-Peer News - The Week In Review - July 7th, '07

Since 2002


































"There is a small percentage of iPhone customers who have had a less than perfect activation experience." – Apple


"Playing relatively high bitrate VGA H.264 videos, our iPhone lasted almost exactly 9 freaking hours of continuous playback with cell and WiFi on." – Ryan Block and Chris Ziegler


"People don’t turn off their emotional responses while they’re fast-forwarding." – Carl Marci


"If you don’t know how much you’re paying for something, will you notice when the price goes up?" – David Leonhardt


"To have four down weekends in a row and have attendance lagging is a surprise. We need more movies with legs." – Paul Dergarabedian


"No, no, no, no." – Nancy Prager


"We’re elated." – Harvey Weinstein


"If they keep bringing in money hand over fist like this, how are we ever going to drive them out of business?" – Fieari


"I ♥ Explosives" – Dyno Nobel t-shirt given out at summer camp


































The Winter of My Internet

The spreading conviction that somehow a so-called closed private sector is better able to manage complex social systems than an open public sphere has mutated from a philosophy initially empirically based to one that is now among certain conservatives nothing much beyond a quasi religious mythology resting on little more foundation than the sweet addictive fog of think-tank gas.

If there are many well publicized examples of public sector blunders, and we’re talking about decisions made by elected officials in an open and well examined space, private sector advocates rarely acknowledge the profound disasters caused by private industry, like Enron, tainted pet food, lax security, chemical pollution, mercury poisoning, Bhopal, birth defects, toxic juice, exploding radial tires ad-infinitum, not to mention horrors leading to the creation of the F.D.A during and preceding a time when the country was hardly regulated at all. The fact is that job number one of the private sector is taking care of its own, and its “own” are its owners, not the greater community in which it operates. It is only lucky for us such a system has led to breakthroughs and benefits for some, because it is in and of itself no guarantee of either.

The present debate over the importance of unfettered Internet access brings this into high relief. Net neutrality, or the right to enter the taxpayer created web for our own purposes without prejudicial economic interference from the handful of private carriers we must now pass through isn’t something we’re going to keep because we think it’s a good idea, or even “important,” not when the levers of power are abused by these same private sector priests. To the contrary, it’s clear that no matter how many studies we commission or how baldly broadband companies abandon competition, net neutrality isn’t something that’s going to be guaranteed by market force but instead will only be maintained by law.

The United States has some of the worst Internet access speeds in the West and alarmingly the situation isn’t improving. This in a largely unregulated market, compared at least to the countries that are trouncing it. The average broadband subscriber’s download speed in the states is and has been for years slightly under 2 Mbs while in other countries it can be well over 40Mbs – some twenty times faster - and will soon surpass 100Mbs. In Japan for instance download speeds exceed 60Mbs. Compare that to AT&T’s “futuristic” uVerse plan. So new the company doesn’t yet offer it in most service areas but already so technically archaic it’s 90% slower than Nippon’s NTT. Far from closing the gap with their foreign competitors the private U.S. broadband industry is letting it widen. Distressed industry watchdogs call United States speeds “pathetic.” They aren’t kidding. Communications Workers of America President Larry Cohen cautioned the issue is dropping off the radar screen. "People don't pay attention to the fact that the country that started the commercial Internet is falling woefully behind," he warns. Perhaps it’s because disseminating the information is up to those who have a stake in keeping it quiet more than it is a general indifference among users.

It may have more to do with age than apathy in any event. Many older Internet users, especially those plugged in politically are moving relatively few packets, so the pokey speeds are probably adequate for them, while more active and bandwidth hungry younger customers don’t yet have a voice in the political forum and are nevertheless looked upon with trepidation by those who do, particularly those who view such exuberant usage as somehow detrimental to their narrow self-interests.

Internet habits like most are formed early in life so it’s inexcusable to society that these same bandwidth starved kids are going to inherit a third-class broadband system when they grow up, even though their often brilliant online inventiveness and where it’s carrying them (and by extension, all of us) has been superbly beneficial to America. We are fast approaching a crisis of competitiveness with Asia and Europe and it’s here that enlightened public policy is urgently needed. Such policies could flourish in a system like ours were it not co-opted by a powerful but small core of intellectually dishonest free-market fundamentalists who map a perverse brand of capitalistic dogma onto some unworkable nonsense they’ve sold as reality.

The unfortunate but inescapable fact is this so-called free and competitive broadband market isn’t working to serve society, but instead to enrich a handful of owners who learned long ago that the less it’s regulated the less competitive it becomes. Continuing free-market activities are demonstrably merging the carriers into fewer and fewer dangerously concentrated gatekeepers, reducing in market after market what choice and open access consumers once had.

This has to stop, and it’s not the stockholders who will end it. If we are going to have a truly Independent American Internet we must fight to liberate it ourselves.


















Enjoy,

Jack

















July 7th, 2007








Universal in Dispute With Apple Over iTunes
Jeff Leeds

Steven P. Jobs, the co-founder and chief executive of Apple, is an emerging force in the mobile phone business, thanks to the snaking lines of gadget fans who queued up last week to buy the iPhone. But now he faces a headache in an industry Apple already dominates — digital music.

The Universal Music Group of Vivendi, the world’s biggest music corporation, last week notified Apple that it will not renew its annual contract to sell music through iTunes, according to executives briefed on the issue who asked for anonymity because negotiations between the companies are confidential.

Instead, Universal said that it would market music to Apple at will, a move that could allow Universal to remove its songs from the iTunes service on short notice if the two sides do not agree on pricing or other terms in the future, these executives said.

Universal’s roster of artists includes stars like U2, Akon and Amy Winehouse.

Representatives for Universal and Apple declined to comment. The move, which comes after a standoff in negotiations, is likely to be regarded in the music industry as a boiling over of the long-simmering tensions between Mr. Jobs and the major record labels.

With the shift, Universal appears to be aiming to regain a bit of leverage — although at the risk of provoking a showdown with Mr. Jobs.

In the four years since iTunes popularized the sale of music online, many in the music business have become discouraged by what they consider to be the near-monopoly that Mr. Jobs has held in the digital sector — the one part of the music business that is showing significant growth. In particular, Mr. Jobs’s stance on song pricing and the iPod’s lack of compatibility with music services other than iTunes have become points of contention.

By refusing to enter a long-term deal, Universal may continue to press for more favorable terms from Apple or even explore deals to sell its catalog exclusively through other channels. If Universal were to pull its catalog from iTunes, Mr. Jobs would lose access to record labels that collectively account for one out of every three new releases sold in the United States, according to Nielsen SoundScan data.

But if Apple were to decide not to carry Universal’s recordings, the music company would likely sustain a serious blow: sales of digital music through iTunes and other sources accounted for more than 15 percent of Universal’s worldwide revenue in the first quarter, or more than $200 million. (Vivendi does not break out revenue from Apple alone).

If push came to shove and Universal decided to remove its catalog from iTunes, it might not necessarily instigate a broader insurrection against Apple. The second-biggest corporation, Sony BMG Music Entertainment, recently decided to sign a new one-year contract making its catalog available to iTunes, according to executives briefed on the deal. A spokeswoman for the company, a joint venture of Sony and Bertelsmann, declined to comment.

Some industry observers have cautioned against taking on Mr. Jobs directly. “When your customers are iPod addicts, who are you striking back against?,” said Ken Hertz, an entertainment lawyer who represents artists like Beyoncé and the Black Eyed Peas. “The record companies now have to figure out how to stimulate competition without alienating Steve Jobs, and they need to do that while Steve Jobs still has an incentive to keep them at the table.”

But other music industry executives say the major labels must take a harder line with Apple at some point if they are to recalibrate the relationship. In particular, they say, it is unfair for Mr. Jobs to exert tight control over prices and other terms while profiting from the iPod. Mr. Jobs, in February, noted that less than 3 percent of the music on the average iPod was bought from iTunes, leading music executives to speculate that the devices in many instances are used to store pirated songs. (Of course, users can also fill their players with songs copied from their own CD collections.)

Apple has now sold more than 100 million iPods, and the device’s ties to iTunes have helped make Apple the leading seller of digital music by a wide margin. The iTunes service accounts for 76 percent of digital music sales, and the contract talks come as it is on the rise — Apple recently surpassed Amazon.com to become the third-biggest seller of music over all, behind Wal-Mart and Best Buy, according to data from the market research firm NPD.

All of that has transformed Apple into a prominent gatekeeper, wielding influence as a tastemaker by highlighting selected artists on iTunes storefront, and as an architect of the underlying business dynamics.

Apple has stuck to a pricing system that charges a flat 99 cents for a song since iTunes started four years ago (except for the recent introduction of songs without copy protection, which carry a higher price). Mr. Jobs has long argued that a uniform system and low prices will invite new consumers and reduce piracy.

But some music executives have been chafing at the flat rate that Apple has insisted upon in its contracts with the big record labels, and they have been pressing publicly or privately for the right to charge Apple more for popular songs to capitalize on demand or, in the event of special promotions, to charge less. Edgar Bronfman Jr., the chairman of Warner Music Group, reinforced that idea at a recent investor conference, saying “we believe that not every song, not every artist, not every album, is created equal.”

In the backdrop of the pricing dispute is an investigation by European regulators who are studying the roles of the music companies and Apple in setting prices in certain international markets.

At the same time, Mr. Jobs has refused the industry’s calls for Apple to license its proprietary copy restriction software to other manufacturers. Music executives want the software to be shared so that services other than iTunes can sell music that can be played on the iPod, and so that other devices can play songs bought from iTunes.

Mr. Jobs has argued that sharing the software with other companies would increase the likelihood that its protections would be cracked by hackers, among other problems. Instead, he asked the music companies to drop their insistence on copy protection altogether. So far, only one of the four music companies, EMI, has made a deal to sell unrestricted music through iTunes.
http://www.nytimes.com/2007/07/02/bu...versal.html?hp





Apple's Next Big Thing: Tiny Prices for iTunes Albums
Ryan Block

Sounds like Apple's Next Big Thing isn't too big at all: lower prices for full albums on iTunes. Introduced with a minor manifesto discussing the powerful influence of indie music on the mainstream, it's pretty clear that Cupertino's finally ready to lower the barrier of entry not only for consumers, but musicians and indie labels looking to sell music on the iTMS. $5.99 and $6.99 will now get you some tasty tracks by the likes of Peter, Bjorn, & John and LCD Soundsystem -- some are even iTunes Plus (read: DRM-free). Take note: want a great way to keep your music business popular and relevant? Offer more music for less money. Hat tip, Apple.
http://www.engadget.com/2007/07/06/a...itunes-albums/





Russia Shuts Down Allofmp3.com
Tony Halpin

The music download website whose activities threatened to scupper Russia's entry into the World Trade Organisation (WTO) has been shut down.

The site, Allofmp3.com, was quietly closed as the Kremlin sought to end criticism from the United States that Russia was failing to clamp down on music and video piracy.

However, an alternative site run by the same Moscow company has already emerged. MediaServices says that mp3Sparks.com is legal under Russian law, using many of the same arguments advanced in support of allofmp3.com.

Customers found last week that allofmp3.com would not load on their computers, while others who went through its Russian web address were greeted by a message saying that it was closed "for maintenance". A former employee confirmed to The Times today that it had been shut down under pressure from the Russian authorities.

Susan Schwab, the US Trade Representative, singled out allofmp3.com during talks last year on Russian membership of the WTO and said that closure was a non-negotiable condition of entry.

She and German Gref, Russia's Minister of Trade and Economic Development, signed an agreement in October in which Moscow pledged to shut down the site, which contains one of the world's largest online collections of pirated music.

Russia also promised to target other Russian sites that distributed copyright material illegally. Allofmp3.com insisted that it was a legitimate business because it paid royalties to a Russian organisation that collected fees for distribution to copyright holders.

It argued that it was helping to prevent piracy by offering an alternative to free file-sharing sites. Western music companies refused to accept the fee, arguing that the Russian Multimedia and Internet Society had no right to represent their interests.

The site had been under investigation for two years by the Russian Interior Ministry. A bigger blow was struck in January, when Visa and MasterCard told MediaServices that they would no longer process payments for allofmp3.com.

The site had attracted 5.5 million subscribers buying songs for between 10 and 20 US cents each, compared with 99 cents at Apple’s American iTunes store and 79p in the UK.

Most customers were in Russia, but it was estimated to be the second most popular download site in Britain after iTunes. It was set up in 2000 by six computer programmers, who initially developed the site for their personal use then built it into a business earning a reputed $30 million a year.

The Mp3Sparks.com site looks virtually identical and claims to offer thousands of albums by popular artists for around 15 US cents per song. Bon Jovi's latest disc, for example, was on offer for $2.11.

MediaServices said that the site was registered with the Russian Licensing Societies, which it claimed had the right under Russian law to "grant licences and to collect royalties for the use of music without necessarily obtaining permission from the copyright owners".

The company's website said that it paid 15 per cent of proceeds to the licencing societies for distribution to copyright holders. It added that it was considering an additional payment of 5 per cent to performing artists, whether or not they owned the copyright, "despite no legal requirement to do so".

Nobody from MediaServices responded to attempts by The Times to establish how long the new site had been in existence and how it differed legally from allofmp3.com.

Russia and the US signed a bilateral agreement on Russian membership of the WTO last November after 12 years of negotiations. Russia is the only major economy that is not a member of the WTO, which has 149 members and aims to boost the global economy by lowering trade barriers.

Russia hopes to complete bilateral negotiations with other member states in time to enter the trade body at the end of this year.
http://www.timesonline.co.uk/tol/new...cle2016297.ece





AllofMP3.com Lets Buyers Use up Credits

Users of the shutdown AllofMP3.com site can still download music if they have existing credit with the online music store
Mitchell Bingemann

Although the controversial online music store AllofMP3.com was officially shutdown by the Russian Government this week for infringing copyright laws, customers from the site who have existing credit can still purchase songs through its downloadable windows desktop and smartphone client, allTunes.com.

According to the allTunes.com website, AllofMP3.com's six million existing accounts can still be accessed if users download the allTunes software client. Once downloaded, users can browse through its catalogue and download from the 778,861 available tracks.

A former AllofMP3.com user, who spoke to Computerworld on the condition of anonymity, purchased songs with his existing credit from the allTunes software client today and experienced no trouble doing so.

"The [allTunes.com] software allows you to browse their catalogue, do searches and make purchases. It's quicker than querying a website since it downloads the catalogue to your PC," he said. "I gave it a whirl already and it worked fine. The client downloaded, it grabbed the catalogue, I searched and grabbed a song."

In total, he said he has downloaded "a good dozen albums or so worth of music."

AllofMP3's six million users will no doubt be delighted they can use their leftover credit to purchase songs, but the site's longevity hangs in the balance. Just days after the Russian Government shut down AllofMP3.com, its sister site, MP3Sparks.com, suffered the same fate.

With song prices coming in at 2c per megabyte to download (around US$1-1.50 per album), the allTunes site offers much better value than the US$0.99 per song charge at Apple's iTunes. Unfortunately, the legal ramifications and copyright infringements are not so appealing.

Although an AllofMP3 executive claimed the site's practices were legal because it paid 15 percent of its song revenues to the Russian Multimedia and Internet Society (ROMS), recording artists have contended they never received any money from ROMS.

It appears allTunes.com takes the same approach as AllofMP3.com's revenue sharing model while still maintaining its services are above board.

"All materials in the Internet-Audit LLS projects are available for distribution via the Internet in accordance with license # LS-3М-P3М-06-13 of the Russian Multimedia and Internet Society. Under the license agreement, Internet-Audit LLS pays license fees for all materials subject to the Law of the Russian Federation "On Copyright and Related Rights," reads the site's Terms of Use.

AllofMP3.com was given its marching orders late last year after mounting pressure from the US, and when the promise of World Trade Organization (WTO) membership was dangled in front of the Russian Government.

Russia responded by modifying its laws to crack down on music piracy. The changes, which only came into effect at the start of July, rendered the activities of AllofMP3 illegal.

After Russia formally outlawed the site, major credit card companies like Visa and MasterCard stopped processing payments.

Although former AllofMP3 users can use existing credit from their personal accounts, customers wishing to inject additional funds into their account are presented with a message that reads: "Processing for this site disabled."
http://www.computerworld.com.au/inde...4;fp;16;fpid;1





Top Cheap Russian AllofMP3 Alternatives
enigmax

The Russian government has closed down AllofMP3 and those who are trying to access its sister site, MP3Sparks, may be disappointed that the site also seems to have disappeared. But never fear, those Russians have plenty of alternatives. We take a look at some of them.

There were roughly 6 million customers who, up until recently, were enjoying great value and service at AllofMP3 but following pressure from the United States over Russia’s World Trade Organization (WTO) membership, they are looking for alternatives. MP3Sparks.com seemed to be the answer but as of this morning, the site appears to have disappeared - it’s unknown if this is a temporary situation.

In the meantime, we thought we could take a look at some other Russian music sites, offering cheap music to the masses. In no particular order;

JustMusic

Just Music carry around 160,000 albums from 44,000 different artists. Prices vary according to the amount of credit you apply to your account and range between $0.11 and $0.15 per track. Tracks are available at 192kbps and they take major credit cards and PayPal.

LegalSounds

LegalSounds.com prices are $0.09 per song, full album downloads average $1 each. Music carried includes the US Top 100 Albums/Singles, European Top 100 Albums and UK Top 50. Tracks are available between 192kbps and 320kbps and they take major credit cards.

GoMusic

GoMusic claim to carry over 35,000 tracks. Prices are $0.19 per track and around $2 per full album. Tracks are available in various bitrates and they take major credit cards.

MP3 Skyline

MP3 Skyline appears to be offering a huge amount of music. The site claims a staggering 2.2 million tracks available from over 128,000 artists. Prices are around the $0.35 mark for single tracks and encoded at 192kbps. Major credit cards and PayPal are accepted, along with other payment options. They also have a free download of the day, currently ‘Seeing Red’ by Killing Joke.

MP3Fiesta

MP3 Fiesta hold nearly 67,000 albums from nearly 17,000 artists. Prices are around the $0.10 mark for single tracks with full albums coming in at roughly $1.00. Tracks are available from 192kbps and they take major credit cards and PayPal

MP3Sale

MP3 Sale boasts a cataolgue of over 90,000 albums from 23,556 artists. Prices are $0.15 for a single track with full albums around the $1.50 mark. Tracks are encoded at 192kbps and the site takes all major credit cards, PayPal and a wide range of other payment options.

iSound

iSound currently offer nearly 60,000 albums from 14,000 artists. Prices start at $0.11 per track up to a maximum of $0.15, depending on the amount fo credit deposited in your account. Tracks are encoded at a minimum of 192kbps. Major credit cards and PayPal are accepted.

MP3 Search

MP3 Search carry in excess of 41,000 albums from 32,000 artists. Prices start at $0.19 per track but it isn’t immediately clear at what bitrate they are encoded. The site accepts major credit cards.

Those wishing to get further details about these sites and many more with the same sort of business structure, should take a look at the comprehensive SongBoom.com. It has reviews of many sites, including the ones detailed above, plus a handy site comparison matrix.
http://torrentfreak.com/top-cheap-ru...-alternatives/





ISP Forced to Block and Filter Pirated Content on P2P Networks
Ernesto

A court in Belgium ruled that ISPs can be forced, and are obliged to, either block or filter copyright infringing content on P2P networks. Freedom of expression and privacy are not important in this regard. How exactly ISPs are supposed to block and filter copyrighted content remains a mystery.

It is not clear what methods the ISP (Scarlet) has to implement, but distinguishing copyright infringing and legal content on P2P networks such as BitTorrent is likely to be a tough job, if not, impossible.

The judge thought otherwise and, based on claims from a P2P expert, said that ISPs do have the technical means at their disposal to block or filter pirated content on P2P networks. The ISP in question was given six months to implement such measures.
In a response to this news Rick Falkvinge, the leader and founder of the Swedish Pirate Party, told TorrentFreak:

“this confirms what we’ve been saying all along: the record industry wants to abolish postal secrets and freedom of the press in order to maintain their crumbling monopolies. They are actually celebrating the fact that a third unaccountable party gets to inspect everything sent between any and all private individuals, and gets to destroy any undesired communication.”

The ruling by the Belgian court implements EU legislation, and iaccording to the IFPI, it sets an important precedent in the fight against piracy internationally. In a response to the decision IFPI Chairman and CEO John Kennedy said: “This is a decision that we hope will set the mould for government policy and for courts in other countries in Europe and around the world.”

Let’s hope not. And, can anyone explain to me how ISPs are supposed to filter copyright infringing content?
http://torrentfreak.com/isp-forced-t...-p2p-networks/





ISPs Face Down Tories on File Sharing
Chris Williams

ISPs have given David Cameron's call for them to block P2P music sharing short shrift, repeating their stance that they are not "the gatekeepers of the internet", as he insists.

ISPA, the industry trade association, told The Register it would be writing to the Conservative leader to explain its position.

In a speech to record industry bigwigs (http://www.theregister.co.uk/2007/07...ght_extension/) this week, Cameron said internet providers should be responsible for clamping down on piracy, comparing the problem to paedophilia and hate mongering.

He said: "ISPs can block access and indeed close down offending file-sharing sites.

"They have already established the Internet Watch Foundation to monitor child abuse and incitement to racial hatred on the internet. They should be doing the same when it comes to digital piracy."

A spokesman for ISPA said: "The Internet Watch Foundation is very focused in what it does and has taken a long time to get there working with the police. Unlike distributing images of child abuse, copyright infringement can be a civil offence.

"Any kind of blocking has to be the preserve of the courts."

The internet industry has consistently resisted years of attempts to turn it into a policeman for rights owners. The European E-commerce Directive recognises ISPs as "mere conduits" who are only liable if they attain "actual knowledge" of illegal content. The Conservatives appear to want to create a system which forces them to attain that knowledge.

In response to Cameron's comments, Malcolm Hutty, public affairs chief at Linx, the organisation which runs inter-ISP traffic, said: "Our technical experience shows that removal at source is the only effective solution: attempting to block traffic within the network is simply far too easy to get around for anyone who wants to.

"Blocking child abuse images may occasionally help protect users from inadvertently being exposed to such content, but this is quite different from preventing access to music sharing sites that users are actively seeking out."

Despite the industry's steadfastness on monitoring, Cameron's comments, combined with news that a Belgian ISP has been ordered to clean up (http://www.theregister.co.uk/2007/07...lgium_p2p_isp/) copyright-infringing material from its network, are likely to reignite the issue.

ISPA's policies on P2P and content liability are here (http://www.ispa.org.uk/press_office/page_62.html) and here (http://www.ispa.org.uk/press_office/page_58.html). Cameron's speech is here (http://www.conservatives.com/tile.do...obj_id=137437).
http://www.theregister.co.uk/2007/07...eron_p2p_isps/





Swedish Police About to Shut Down The Pirate Bay (again)
Ben Jones

With their ongoing failure to find evidence in The Pirate Bay server seizure fiasco, the Swedish Police now seem to be resorting to any methods they can to disrupt the activities of the popular torrent site. Their latest effort appears to be an attempt to block access to the site, at least by Swedish nationals, through putting the site on a child pornography blocklist

Piratebay administrator brokep got wind of this addition to the blocklist, which is maintained by the police, and which Swedish ISPs voluntarily use. He said in a response:

“If the police would find anything wrong - shouldn’t they first contact us, then bring us in for questioning regarding the content, ask for our help or bring us to court for our wrongdoings? By not acting this way it’s very clear what this is all about. It’s all about quieting a voice that is really uncomfortable for them since they don’t have any legal standpoint in doing it. It’s sabotage, it’s abuse of power given to them.”

This is not the first time, either; back in June, there were problems with an overzealous addition into the very same filter, with the site kopimi.com – after some discussions with the police, it was removed from the filter.

However, unlike kopimi, The Pirate Bay is not yet in the filter. Any entry into that list, would probably be updated at the various ISPs during the next week. The latest information, however, is that in a draft version of a press release from the police on this subject, they state “it’s not decided that we’ll put The Pirate Bay in the list - if the content is still there next week we’ll put them there”. In response to this, brokep states “So, come on! What content are you talking about? Still not a single contact attempt from the police”.

Rick Falkvinge, leader of the Swedish Pirate Party said in a response to the news: “This is a devastatingly ignorant abuse of the trust relationship between the Internet world and the Police that was created in order to stop child pornography. This is not worthy a democracy governed by law. The people who have made this decision cannot remain in our judicial system.”

The lack of clear, logical procedures based upon facts seems to be endemic when it comes to the Internet these days. In many cases, things are blown out of all proportion, in order to enact some changes on the internet, a system which was designed to be as resistant to any efforts to disrupt, and remove the information available on it as possible. The perversion of lists like these, removes the credibility of the lists, by making the contents of them ripe for suspicion.
http://torrentfreak.com/swedish-poli...te-bay-again/#





Music Biz Agrees: Stop Shooting Self in Foot
Andrew Orlowski

At the Norwegian summer resort of Kristiansand in Norway last week, representatives of all corners of the British (and global) music business came together to think the unthinkable.

That's unusual in itself. What's generally called the "music industry" consists of violently opposed parties: small labels against big labels; publishers against recording rights owners; managers against everyone else. Much time is spent screwing or suing one another. The past sure is tense.

Perhaps for the first time, the entire range of representatives - including the biggest and most powerful recording interests - looked into the abyss, and agreed that what they what they need to do is very different to what they've been doing for the past 15 years - ever since since the sudden growth of public computer networks represented by today's free-for-all internet.

The event was convened by music manager Peter Jenner. Today Jenner represents Billy Bragg, but his 40-year career in the industry began as Pink Floyd's first manager (representing Syd after the split), and launching the Harvest label. Today, Jenner is secretary general of the International Music Manager's Forum, the IMMF. Jenner has been using his contacts book and influence to cajole the industry into radical change: a process which began with his "Beyond the Soundbytes" report and conference last year. Reporting restrictions, under the Chatham House rule (http://www.chathamhouse.org.uk/index.php?id=14"), applied to all participants - so forgive your reporter for the generalities.

Out of Crisis

It's the dramatic fall in CD revenues - we don't have the official Q2 figures just yet, but they're said to be down 40 per cent year-on-year in some markets - that appears to have precipitated the change in thinking.

No Declaration or Manifesto was issued at Kristiansand. The event didn't even have a formal name. But a consensus looked forward to a post-physical media future, where music can flow more freely, and where creators can finally be rewarded from the wires and pipes over which music flows "anarchistically" today. While few readers will mourn the demise of the big, vertically integrated record label, the awkward fact remains that millions enjoy music today while cutting the creators out of the equation. The internet has concentrated power in the hands of a few owners in the telecoms and publishing industries - leaving originators with little option but to hope for fame, and beg for scraps.

At Kristiansand, attendees heard how the world may look pretty different, given concerted action. VC money or private equity could be the driver for the next waves of investment - where areas of expertise such as A&R, marketing and artists management are much looser than they are today.

We also heard concerns how business models will be able to sustain artist growth. Given that private equity or VC money is typically rapacious and shortsighted, the artists at the top of the tree looks set to prosper. Money follows the largest returns. Amateurs have never had it so good, with cheap production and marketing tools and new direct electronic distribution channels. But what about the pro performers who aren't ever going to be Madonna, and still want to sustain a career? It's a question without a clear answer so far.

• What consensus did emerge broadly favoured the following:Prosecuting end users is silly - when you can monetise them
• Since "piracy" today means "get free music", the future has to offer something that "feels like free"
• Vastly wealthier industries than the music business today profit from the demand for recorded music - without giving anything back. That isn't fair, and it's got to change
• Digital music services of the future need a better deal than the begrudging and piecemeal licenses offered so far by rights holders: but these have to be so attractive only the suicidal would want to turn it down.

What now?

"The era of levies is over," said one participant. "Government isn't going to step in and hand us a business."

History shows us almost every new technology affecting copyright owners is considered illegal to begin with, but eventually they all fall under an arrangement that addresses the needs of consumers and creators. This is a difficult balancing act: if the license proposition is unattractive, then either the technology is shunned, or it continues underground. Digital networks are far from the first "intangible" technology rights holders have encountered, but it has been one of the longest journeys to reach a state of agreement.

AT&T's recent decision to police its network (http://www.latimes.com/technology/la...ck=1&cset=true) for copyright violations using deep packet inspection suggests that network operators are dropping their objections to "common carrier" status. Of course, they'd much rather not be in the policing business, which is expensive and gains them no direct income: they would prefer to offer added value services you and I willingly want to pay for. But for that, they need the co-operation of the music industry.

Bendik Hofseth, the Norwegian composer musician who's on the board of the Norwegian Performing Rights Society TONO, and chairman of the Norwegian composer's association, played host at Kristiansand. He heads a new center to study emerging rights models and music business models at Kristensand's 15,000-student Agder University College. The research center promises to be a refreshing and long overdue European counterpart to the "cyberlaw" departments that have proved so lucrative for American academic business, but whose esoteric and abstract approach, rooted in US constitutional law, seems increasingly at odds with direction the rest of the world is taking.

Perhaps Kristiansand may be remembered as the place where sanity broke out.
http://www.theregister.co.uk/2007/06/27/kristiansand/





Digital Music Singles Flex Muscles, Kick Sand on Antiquated Album
Ken Fisher

Sales of digital music can't stop, won't stop. The upward trend keeps on headin' up, as Nielsen SoundScan reports that digital music sales are 50 percent stronger through the first half of this year as compared to the same period in 2006. So far, Nielsen SoundScan reports that 417.3 million digital music tracks have been sold this year. For those of you keeping score, that's the total number of music tracks and ringtones sold in 2005.

Don't expect the music industry to break out the champagne, though. Good news for digital sales means bad news for the traditional album, which is down another 15 percent. People simply aren't buying physical albums the way they used to, and we've argued before that this is a natural effect of digital music sales. You don't need to buy an album anymore to get one or two songs you might like.

Albums look to be headed into a serious decline, however. In 2006, album sales were also down, but in the same period year-over-year, the shrinkage was only 4 percent. This year's decline, so far, appears to show a quickening decline, slipping to 15 percent fewer sales.
Lessons learned?

Despite the tough times for albums, the music industry is slowly but surely learning the most important lesson of all: give consumers what they want, and they happily open their wallets. That could mean a business model change for the industry which has long since focused on the album as its revenue workhorse.

That may also help explain why companies like Universal are looking to aggressively renegotiate their contracts with the likes of Apple. Who controls the pricing is a major deal, especially at a time when singles are taking away big revenue business. I've been told by contacts in the business that the labels would like to see significantly higher prices for contemporary singles, and it's rather clear why. What ultimately matters in this industry isn't single sales or album sales, it's revenues, and the nature of the revenue stream is changing.

That's why we can ignore the equivocations over the data. The AP coverage of the report notes that when you count groupings of digital singles as albums (say, 10 singles = an album), albums sales are only down 8.9 percent. Two points on that. First, 8.9 percent is still a heck of a drop: twice that of last year for the same time period. Second, I'm not sure what this data tells us... except that when we arbitrarily count a collection of singles as albums, it looks like more albums have sold. But more albums didn't sell.

The real reason these calculations are being made is to try and size up the state of the music industry as a whole, and in most of the industry's history, that measurement has been made via album sales. It's wrong, however, to try and crib album sales with digital music data and claim it's the same thing.

Digital music sales are a new business and a new way of thinking about and interacting with content. The industry should be paying closer attention to its meteoric rise and less attention to the dying, arcane album. It should absolutely drop the rhetoric about how piracy is destroying the business, because the sea change in sales patterns shows that something else is is afoot. In fact, the explosion in digital music sales should be encouraging to the industry. It means that when users are sitting at a computer and looking for music, more and more each year are turning to legal download services.
http://arstechnica.com/news.ars/post...the-album.html





BSA Announces $1 Million Reward for Piracy Snitches
Ken Fisher

Do you work for a business that's pirating software for its own internal use? If so, you could be in for a windfall if you report it to the Business Software Alliance (BSA) in time. The BSA announced today that they are increasing their reward ceiling for accurate piracy reports to a big, fat $1,000,000. The increased reward amount is a special promotion which will be accompanied by radio and online ad campaigns; it will expire after October. After that, the reward returns to its regularly scheduled payload of $200,000.

Why the big bucks? The BSA believes that $1,000,000 might make even the most timid person don the daring cape of the whistleblower. "Businesses often have a million excuses for having unlicensed software on office computers. BSA is now offering up to a million dollars for employees who turn them in," said Jenny Blank, director of enforcement for BSA, in a statement.

Potential whistleblowers are often quiet for fear that they could not only lose their jobs but also get a reputation as a "snitch," making it difficult to find employment later. Now thanks to the BSA, some whistleblowers could trade in their jobs at piratical businesses for varying shots at a big jackpot. The only catch: you need to be aware of some serious piracy goin' down to qualify for the big payouts.

The reward one can qualify for is determined by the size of the settlement paid by the company pirating software, or the size of awarded damages in the instance of a dispute heading into court. To qualify for the $1 million, you'll need a settlement of more than $15 million.

The BSA also revealed that since 2005, when their rewards program was launched, nearly $22 million has been generated via settlements with businesses who were accused of pirating software. Based on that number, we don't think the BSA has ever paid out anything close to $1 million to a single whistleblower before, but the BSA has not returned our queries on this matter. Nevertheless, with $22 million in settlements so far, the BSA is looking for a major boost with this program, since the requisite $15 million settlement would nearly double their take to date.

Big rewards for big, scary numbers

According to a study conducted by the International Data Corps (IDC) and cited by the BSA, the software industry lost $7.3 billion last year to piracy. We criticized the IDC findings when they were released last year because they are based on questionable calculations and seat-of-your-pants methodologies that desperately try to assign dollar amounts to unknown data points. IDC has to guess at how much software is pirated, how much would have been purchased had it not been pirated, and what the relationship of legit sales to pirated installations is. Heck, even IDC has criticized the ways in which their studies are sometimes trumpeted, such as in 2004, when IDC criticized the BSA's rush to talk about total losses.

None of that is to say that piracy doesn't exist or that it doesn't hurt the industry, of course. We simply lament the fact that trumped-up numbers are being used to sway legislators and public opinion on an issue that is considerably complex.

Oh, and before you nefarious types get any ideas, the BSA requires that reports detail illegal software installs ordered by management, so secretly deploying pirated AutoCAD software across your enterprise desktops on your last day at work won't qualify.
http://arstechnica.com/news.ars/post...-snitches.html





Hollywood Hates Pirates, but Can it Use Them?
Greg Sandoval

Attorney Nancy Prager sees only thievery in file sharing. Don't even try to suggest anything otherwise to her.

Director Michael Moore's Sicko is coming off a glittering debut weekend at the box office. This despite the documentary's availability on the Web for the past two weeks--distributed widely over the Internet by file sharers who violate copyright law. Prager, a Washington, D.C.-based copyright attorney, was asked whether those who downloaded the movie could have helped ticket sales by spurring word-of-mouth sales.

"No, no, no, no," Prager seethed. "This is depressing. We're not seeing a rise in the peer-to-peer influence market. Anything positive they may bring is instantly canceled. These guys aren't just spreading their opinions. They're spreading the actual movies."

Ever since Sicko first appeared on the Web, CNET News.com has tracked the film's presence online and asked whether file sharing depresses ticket sales. Some in the file-sharing community hold that pirates often stir interest on the Web that migrates to the physical world in the form of ticket sales. The response from Hollywood studios is largely: we don't need thieves to help us market our films.

Online piracy is apparently becoming a priority to Hollywood, as the transferring of large digital files becomes less time-consuming and the quality of viewing improves. Already, billions of dollars are lost to illegal file sharing every year and the losses are certain to grow, according to the top U.S. movie studios.

So what can be learned from the Sicko controversy?

It is believed that tens of thousands of copies of Moore's documentary about the health care industry were downloaded without authorization during the past two weeks. The movie has also gone up on YouTube and Google Video, and was viewed by thousands before being removed. As the movie played on theater screens across the country this weekend, the film returned to Google Video and was watched more than 2,000 times.

Nonetheless, the movie opened in 441 theaters on Friday and earned an estimated $4.5 million for the weekend. That was good for ninth place at the box office. Pixar's Ratatouille was No. 1 with an estimated $47.2 million haul.

What is encouraging for Sicko's producers, the Weinstein Co., is that while the movie opened on relatively few screens, it averaged $10,204 per theater, according to a story in The Hollywood Reporter. The industry publication reported that only one other movie this weekend topped Sicko's per-theater average: Ratatouille, with $11,987.

If Moore's film has been harmed by file sharing, the damage is hard to find.

"File sharing has been going on for years now and yet the movie industry continues to see record profits and revenues," said Fred von Lohmann, an attorney with the Electronic Frontier Foundation, an advocacy group for Internet users. "Clearly file sharing is not killing the movie industry, far from it."

File-sharing buzz or buzz kill
After a slump in 2005, Hollywood saw revenue grow 11 percent to $25.8 billion last year, according to the Motion Picture Association of America, the trade group that represents the top movie studios.

Could file sharing have played any kind of role in the growth?

File sharers often argue that they are among the first to tell friends about a good movie. They say that this stimulates interest in people who don't share files. On the surface at least, this is the kind of buzz building that movie marketers are trying to ignite.

In a May 2005 report on movie marketing by The London School of Economics and Political Science, researcher David Lane found that the secret to stimulating ticket sales "is less about the film itself than about the success of pre-publicity and word-of-mouth recommendations."

Lane found that marketing techniques had changed in Hollywood in the past two decades and that what mattered most was "to get people talking about the film, creating prerelease interest and then to sell tickets--fast."

When Moore's documentary surfaced on the Web, it generated a host of news stories that served as free advertising. But there's no way to determine how many people learned about the movie from someone who downloaded a pirated copy.

What doesn't help support the premise that file sharing helped give Sicko a shot in the arm was that the movie drew mostly older audiences, according to published reports. Most file sharers are thought to be of college age.

"A Michael Moore film is going to be in the headlines no matter what it's about," said Gary Stein, an executive at Ammo Marketing, an advertising firm. "The news hounds were ready for a Sicko story and this one happened to be among the first to come out...You have to remember these aren't people that wake up in the morning and say to themselves, 'How am I going to get people to see this movie.' They get off on watching a movie for free."

And any measure of the effects that piracy has on a film must look at an entire theatrical run, said Prager, who represents independent music labels and has also negotiated movie deals. She points out that the financial performance of a documentary like Sicko may be particularly vulnerable to Internet piracy.

"This is not a big special-effects action movie that depends on the big screen," Prager said. "This is a film that people may be satisfied watching on their computers. That could really hurt the movie's sales."

In the end, nobody really knows what effects copyright infringement has on a movie's earning potential, said Jonathan Zittrain, professor of Internet Governance and Regulation at Oxford University. Zittrain does, however, see one benefit from the controversy.

"The real benefit of this kind of leakage," Zittrain said, "is that it pressures Hollywood to think outside of the box instead of hoping the Internet will just go away."
http://news.com.com/Hollywood+hates+...3-6194649.html





MPAA's Media Defender Sets up 'Fake' Site to Catch Pirates
George Gardner

Don't get caught up in the Motion Picture Association of America's (MPAA) latest sting. Media Defender, a company which does the dirty work for the MPAA, has been caught setting up 'dummy' websites in an attempt to catch those who download copyrighted videos - entrapment comes to mind.

The site, MiiVi.com, complete with a user registration, forum, and "family filter", offers complete downloads of movies and "fast and easy video downloading all in one great site." But that's not all; MiiVi also offers client software to speed up the downloading process. The only catch is, after it's installed, it searches your computer for other copyrighted files and reports back.

ZeroPaid, acting on a tip from The Pirate Bay, found MiiVi to be registered to Media Defender using a whois search. Shortly after, the registrar information was changed, but the address still reflects Media Defender's address at 2461 Santa Monica Blvd., D-520 Santa Monica, CA 90404.

Not 10 hours after the site was found to be registered to Media Defender, the site went dead. There's no telling how long it was up; however, the domain was registered on February 8, 2007.

Perhaps Media Defender won't use its own name on the registrar the next time around, but it just goes to show the lengths at which the MPAA is willing to go, to fight piracy.
http://tech.blorge.com/Structure:%20...catch-pirates/





MediaDefender Denies Entrapment Accusations with Fake Torrent Site
Jacqui Cheng

Antipiracy agency MediaDefender strongly denies recent claims that it set up an entrapment scheme in order to catch so-called pirates downloading illegal movies and software.

Earlier this week, the Motion Picture Association of America and antipiracy agency MediaDefender were allegedly caught red-handed when Internet sleuths traced a "fake" BitTorrent site back to the two groups. But MediaDefender told Ars Technica that the story has been blown far out of proportion and was started by sites like The Pirate Bay and TorrentFreak in order to slam MediaDefender's organization and software.

The soap opera that the entire brouhaha revolves around started like this. A web site called MiiVi allegedly offered full-length motion pictures for download and offered to install special client software on the user's computer to help speed up the downloads. However, the software did a little more than that: it also reportedly performed searches of the user's computer for other illegal software and reported its findings back to MediaDefender. Acting on a tip from The Pirate Bay, the online publication ZeroPaid began an "investigation" (a followup to Torrent Freak's article) and found that MediaDefender didn't make much of an effort to hide who was behind MiiVi. The whois records for MiiVi were clearly registered to MediaDefender with the company's address in California and administrative contact information within the company.

The initial article by ZeroPaid was picked up among members of the tech web immediately, which must have caused MediaDefender to realize that torrenters were a little brighter than they had previously thought. Shortly thereafter, the name in the whois record was changed, although MediaDefender's postal address remained intact. As of today, all of the whois contact information has been removed and it instead reflects anonymous Domains by Proxy information set up by GoDaddy. Since the MiiVi site's public exposure, it has since been taken down and replaced with a parked GoDaddy page.

MediaDefender's Randy Saaf told Ars Technica that while the company does own the domain to MiiVi, the story itself was completely made up. "MediaDefender was working on an internal project that involved video and didn't realize that people would be trying to go to it and so we didn't password-protect the site," Saaf said. "It was just an oversight from that perspective. This was not an entrapment site, and we were not working with the MPAA on it. In fact, the MPAA didn't even know about it."

If this is true, why did MediaDefender immediately remove all contact information from the whois registry for the domain? Saaf said that after everything hit the fan, the company decided to take everything on the site down because it was afraid of a hacker attack or "people sending us spam." Yes, spam.

The MPAA's Elizabeth Kaltman also chimed in to say that they had no involvement with MiiVi: "The MediaDefender story is false. We have no relationship with that company at all," she told Ars.

We may never know MediaDefender's true motive behind MiiVi, but Saaf insists that it was nothing more than an internal site for research and development purposes only. If true, however, does this mean that MediaDefender could be looking into such a scheme in the future? Our Magic 8-Ball says "Reply hazy. Ask again later."

Without a doubt, however, something isn't right with this story. If anyone has a copy of the application that was originally hosted on MiiVi, we'd love to get a look at it.
http://arstechnica.com/news.ars/post...rent-site.html





‘Transformers’ Movie-Cammer Facing Prison
enigmax

Following the announcement of a fresh anti-piracy drive and new, aggressive legislation, a man has been caught using a camcorder to record the latest ‘Transformers’ movie and is now facing 6 months in jail and a $5,000 fine.

The MPAA claims that New York is a pirate movie haven and with a claimed 43% of all camcorded movies originating from the city, it was just a question of time before Major Bloomberg’s and the MPAA’s anti-piracy campaign - coupled with new legislation - claimed its first scalp.

According to reports, police descended on the American Theater on East Avenue in Parkchester, after warning theater workers in advance that they were about to conduct a sting to arrest a known movie ‘cammer‘ at a sneak preview of the new movie ‘Transformers’.

After waiting until the end of the screening on Monday night, Kalidou Diallo, 48, was surrounded by seven plain clothes officers, arrested and subsequently charged with the new anti-piracy misdemeanor. He had been allegedly filming or ‘camming’ the movie, utilizing a hidden camera and digital recorder.

The manager of the American Theater, Justin Hill, said that the authorities knew that his theater was the source of the ‘cams’. “The movie companies … knew it was coming from our theater,” he said. “We were taking heat for it because we weren’t catching anyone.”

Under the previous law, getting caught meant up to 15 days in jail and $250 fine. The new measures signed in May 1, makes ‘camming’ a misdemeanor offense, which means that Diallo is facing a possible 6 months in jail, accompanied by a $5,000 fine.
http://torrentfreak.com/transformers...facing-prison/





Chatterbox

RECORD companies collected $728m in royalties from 51 countries in 2006, up by 8% on 2005, according to IFPI

If they keep bringing in money hand over fist like this, how are we ever going to drive them out of business? – Fieari

http://www.p2pconsortium.com/index.php?showtopic=13585





Arkansas Schools Ban P2P Filesharing
p2pnet.net

Warner Music, EMI, Vivendi Universal and Sony BMG have a unique theory: schools don’t exist to educate our young people: they’re primary product marketing and copyright enforcement divisions.

With that in mind, the Big 4 are having increasing success using their RIAA and threats of imminent legal action to blackmail American school staffs and administrations into compelling students to buy corporate product, and only corporate product.

It’s hard to believe this could actually be happening, but it is, and with the full knowledge and active support of the Bush administration and, sadly, what becomes de rigeur in the US inevitably spreads elsewhere, to one degree or another.

As part of its continuing implementation efforts, the RIAA has been hassling the Arkansas Public School Computer Network (APSCN),

Now, starting tomorrow (July 1} the state of Arkansas, “will deny all APSCN P2P traffic at the State Network’s Internet edge,” says the Arkansas Department of Education.

“This will not affect in-state network traffic but will solve the majority of problems relating to P2P traffic. Overall state network performance should be improved and state resources spent troubleshooting P2P related problems will be conserved.”

And the RIAA can pat itself on the back for a job well done on behalf of its masters.

“P2P applications are consuming Internet bandwidth for what is primarily personal use,” says the Department in memo COM-07-137 addressed to superintendents, co-op directors, all principals and technology/business administrators.

“These applications make it simple for anyone to download music, video or any other kind of file from anyone else on the Internet that has the same P2P application running. Far and away the bulk of the P2P bandwidth is used to share illegal copyrighted material,” it says.

“DIS has had to answer a considerable number of RIAA (Recording Industry Association of America) complaints in the past with a significant number of those complaints targeting APSCN IP addresses.”

The RIAA motto is, Hold Back the Future: Preserve the Past.
http://p2pnet.net/story/12644





Is RIAA's Linares Affidavit Technically Valid?
NewYorkCountryLawyer

In support of its ex parte, "John Doe," discovery applications against college students, the RIAA has been using a declaration (PDF) by its "Anti-Piracy" Vice President Carlos Linares to show the judge that it has a good copyright infringement case against the "John Does." A Boston University student has challenged the validity of Mr. Linares's declaration, and the RIAA is fighting back. Would appreciate the Slashdot community's take on the validity of Mr. Linares's "science."
http://ask.slashdot.org/askslashdot/.../0025236.shtml





Why Grandma, What Big Attorneys You Have
Robert X. Cringely

Just when you thought they can't get any slimier, the Recording Industry Association of America manages to squirm even deeper into the muck. The RIAA is being sued by a 44-year-old diabled Oregon woman whom it tried and failed to take down in its relentless pursuit of file swappers, real or imaginary. The Recordanistas withdrew their suit earlier this month after admitting they could find no evidence of file swapping on the woman's computer.

Now Tanya Andersen is striking back by suing the RIAA for malicious prosecution. Among other things, Andersen says the Big Bad Record Companies tried to coerce her into a settlement by threatening to drag her 10-year-old daughter into their offices for a deposition, and that one of its fanged minions called the girl's elementary school pretending to be her grandmother. (It was probably the drooling noises and the howling that tipped them off.)

Of course, this is just an allegation, and as usual the RIAA has not commented. But is there anything these guys wouldn't do? Rather than scare consumers away from illegal downloads, tactics like this are more likely to encourage them. Let a billion Bit Torrents flow.

Incidentally, there is no truth to the rumor Dick Cheney plans to assume control of the RIAA after his current job runs out. But it wouldn't surprise me a bit.
http://weblog.infoworld.com/robertxc...cgd=2007-07-02





RIAA Sued for Using Illegal Investigatory Practices
Ken Fisher

A grandmother targeted by the RIAA for file-sharing is striking back at the controversial music industry association, arguing that it has knowingly engaged in "one or more overt acts of unlawful private investigation" to further its case.

Ms. Crain, the defendant in an eight-month-old P2P lawsuit, had her fill of hot air when she escaped Hurricane Rita. When Mother Nature was bested by yet another "RIAA vs. Grandma" lawsuit, she decided it was time to strike back.

Crain says that she'd never even heard of file sharing before she was named in the suit, so when the RIAA came looking for a $4,500 payout, Ms. Crain lawyeredup and filed a counterclaim against the RIAA. The whole ball of wax is Sony vs. Crain, filed in Texas.

It has now come to light that the case is taking a new turn, as Ms. Crain's attorney has filed a motion to amend their counterclaims to include new allegations against the RIAA and its investigative partners. According to court documents, Ms. Crain "has become aware upon information and belief that [the RIAA] have illegally employed unlicensed investigators in the State of Texas and used the information thereby obtained to file this and other similar actions across the country."

At the heart of the issue is a Texas law which says that investigations companies must be licensed in order to collect evidence that can be used in a court. According to court documents, Ms. Crain says that MediaSentry—the company carrying out the investigations for the RIAA—was aware of this requirement, both in Texas and in several other states, and ignored it. The counterclaims even suggest that the RIAA encouraged this arrangement.

"[The RIAA and MediaSentry] agreed between themselves and understood that unlicensed and unlawful investigations would take place in order to provide evidence for this lawsuit, as well as thousands of others as part of a mass litigation campaign," reads the motion.

Ms. Crain's attorney argues that such actions constitute "civil conspiracy" under Texas law and led to her suffering much undue distress.

MediaSentry, the investigative company at the center of the allegations, is used by the RIAA, MPAA, and a handful of other groups to track and identify P2P users believed to be infringing copyrights. Should Ms. Crain prevail in her counterclaims, it could jeopardize the evidence collected by MediaSentry not just in Texas, but in other states where similar licensing provisions exist.

Earlier this month Tanya Andersen prevailed in her battle with the RIAA: a battle which also focused on issues of evidence. That victory came at the same time that we learned of another defendant suing the RIAA for fraud, conspiracy, and extortion.
http://arstechnica.com/news.ars/post...practices.html





Private-Eye Hackers Are Convicted

Cops accused of intercepting calls, hacking computers
BBC

Two police officers who moonlighted as private detectives have been convicted of bugging phones and hacking into computers on behalf of wealthy clients.

Jeremy Young and Scott Gelsthorpe set up Active Investigation Services and ran a service dubbed "Hackers Are Us".

One of their clients, waste millionaire Adrian Kirby, paid £47,000 for AIS to spy on environmental investigators.

Gelsthorpe, of Kettering, Northants, and Young, of Ilford, east London, were convicted at Southwark Crown Court.

US millionaire Matthew Mellon was acquitted of spying on his ex-wife, Tamara, founder of the Jimmy Choo shoe company.

Mellon, 43, from Belgravia, central London, was found not guilty of one charge of conspiracy to modify computer material.

Gelsthorpe, 32, was convicted of two counts of conspiracy to cause unauthorised modification of computer material.

He also admitted conspiring to defraud and cause criminal damage to property.

Young, 39, had already pleaded guilty at the start of the trial to the same offences.

Also convicted was David Carroll, 58, of Highgate, north London.

But two other men - Daniel Carroll, 36, from Westminster, London, and Maurice Kennedy, 58, of Barnet, north London - were acquitted.

In January, eight other men were sentenced after pleading guilty to conspiring to intercept phone calls or emails, or false accounting.

Kirby, who is on the Sunday Times Rich List, was jailed for six months.

AIS was set up in August 1999 by Young and Gelsthorpe, who were both serving Metropolitan Police officers at the time.

List of wealthy clients

Gelsthorpe, who had been in the job for six years, was still on active duty while Young was on sick leave for depression throughout the time he was involved with AIS and only resigned after he was arrested.

The pair made up fake names for themselves - Jamie Black and Sean Durney - to make their activities harder to trace.

AIS offered many of the typical private investigation services including surveillance at £25 to £50 per man per hour.

But they were dubbed "Hackers Are Us" in court for the "extras" they offered for a wealthy elite. They used illegal means to provide extra services for clients and had a price list for those services.

For £5,000, AIS would "monitor" - or hack into - an e-mail account.

For this, they used the expertise of Marc Caron, an IT specialist based in Phoenix, Arizona.

He used so-called Trojan horses, which infiltrate computers through a seemingly innocuous e-mail, website or programme, but then allow hackers access to everything on the machine.

Caron pleaded guilty in the US and will be sentenced on 28 June.

Tapped phones

They could also tap a landline telephone at a cost of £6,000 per month.

For this, they employed the services of Michael Hall. He was sentenced before this trial began after admitting a string of offences.

AIS also used firms of "blaggers". Put simply, these were con artists who impersonated someone in a official capacity to trick information from a subject. On at least one occasion, AIS asked a blagger to pretend to be a doctor in order to glean personal medical histories.

Gelsthorpe told the court that "seemed like fair play" to him.

Clients varied. Some were individuals - often suspicious spouses.

These were known as OTS enquiries - for "(A bit) On The Side".

Others were companies. They included a multi-million pound waste disposal company, a transport company and a prestige bathroom firm.

Surveillance operation

Subjects varied too and included local council officials and ordinary residents.

Among the computers targeted were official networks in government offices.

AIS was investigated by the Metropolitan Police's Anti-Corruption Command following a tip-off from BT.

Then in July 2004 they began three months of intensive surveillance into what they called AIS's "corporate espionage".

The firm's office was eventually raided on 29 September 2004 and a total of 27 people arrested.

Police later realised AIS had been planning to expand operations to Ireland.

'Blind faith'

Gelsthorpe denied all knowledge of the illegal activities. He claimed to be merely the office "gopher", but admitted paying no attention to legislation governing AIS's business practices.

He told the court he took it on "blind faith" that nothing untoward was going on despite having underwritten the business.

He denied knowing what Caron was up to on the other side of the Atlantic despite e-mails going to and from his account to Caron discussing computer hacking.

Gelsthorpe blamed Young for everything.

Young admitted breaking the law. His former receptionist Karen Coulson told the court he was a "good storyteller" who told lies and "would stretch the truth".

Even his own wife did not trust him, Ms Coulson said.

"When he wasn't in the office she would go through his things. She was pretty thorough, she wouldn't leave anything unturned. I knew she used to go through his e-mails, but she also found a SIM card hidden in a filing cabinet," she told the court.

Detective Inspector Kevin Hyland, from the Metropolitan Police's Ant-Corruption Team, said: "This case has highlights the concerns law enforcement agencies have long held about the illegal activity undertaken by some members of the private investigation community which remains unregulated."
http://news.bbc.co.uk/go/pr/fr/-/2/h...ws/6766841.stm





An Auction Site for Vulnerabilities
Tim Wilson

Discover a security flaw in a major application or system? You can't sell it on eBay. But starting this week, you can sell it on a new auction site that's not too much different.

WabiSabiLabi, whose marketplace opened for trading on Tuesday, is aiming to change the back-room market for security vulnerabilities and move it into the mainstream. Any researcher who finds a flaw can register to sell it on WSLabi's marketplace. WSLabi, a "neutral, vendor-independent Swiss laboratory," checks out the vulnerabilities and verifies their validity in its own labs before allowing them to be auctioned.

"This thing could definitely have legs," says Jeremiah Grossman, CTO of WhiteHat Security. "I've heard people talk about selling exploits for a while, auction-style or otherwise, but this is the first auction implementation I've seen. All this would take is a couple of successful transactions, and it could cause a big shift in the way we traditionally think about the vulnerability disclosure process."

There currently are four auctions going in the WabiSabiLabi marketplace, including a Linux kernel memory leak vulnerability that starts at 500 euros.

The marketplace's founders say they believe the "ethical disclosure" policy followed by many security researchers is costing them money. "The system introduced by 'ethical disclosure' has been historically abused by both vendors and security providers in order to exploit the work of security researchers for free," the auction site says.

"This happens only in the IT security field," the site states. "Nobody in the pharmaceutical industry is blackmailing researchers (or the companies that are financing the research) to force them to release the results for free under an ethical disclosure policy.

"In this view, WabiSabiLabi has a not-for-free-disclosure policy, explicitly aiming to reward researchers," the founders state. "The only free information available to both vendors and public will be the general information on each piece of security research listed on the marketplace, which will be enough to understand the issues introduced by each security research, without disclosing any sensible technical detail."

"Recently it was reported that although researchers had analyzed a little more than 7,000 publicly disclosed vulnerabilities last year, the number of new vulnerabilities found in code could be as high as 139,362 per year," said WSLabi CEO Herman Zampariolo, in a written statement. "Our intention is that the marketplace facility on WSLabi will enable security researchers to get a fair price for their findings and ensure that they will no longer be forced to give them away for free or sell them to cyber-criminals."

WSLabi states that the research can only be sold under the condition that "the provided security research material must not come from an illegal source/activity." The site does not say which country's laws it will use to define the term "illegal" -- Germany, for example, recently adopted legislation that essentially outlaws all unauthorized access of computers, even for security research.

Researchers who have seen the site say their first concern is who will be allowed to buy the vulnerabilities. WSLabi says it will "carefully evaluate" all potential buyers "to minimize the risk of selling the right stuff to the wrong people." But the site does not describe its process for doing the vetting, other than requesting a phone number and a faxed copy of an identity card.

"My main fear with this type of thing is that it is difficult to differentiate between a legitimate buyer and someone who simply wants to use the vulnerability for nefarious purposes," says Robert Hansen (a.k.a. RSnake), CEO of SecTheory LLC. "Many of the biggest players in the software industry have said time and time again that they will not buy vulnerabilities, in the same way that the U.S. does not negotiate with terrorists."

WSLabi says it will help researchers design the best-selling scheme and starting price for their discoveries, "enabling them to maximize the value of their findings. A piece of research that would currently sell to one company on an exclusive basis for $300 to $1,000 could sell for ten to twenty times more than this amount using the portal," the auction site says.

The site works much like eBay, with options for Dutch auctions, Buy Now, and a definite running time for each auction. Sellers can choose to sell exclusively to a single buyer or to multiple purchasers. WSLabi did not disclose how much it charges to test the vulnerabilities and act as a broker for each sale.

"I'd expect several researchers to give it a try," Grossman says.
http://www.darkreading.com/document....WT.svl=news1_1





One-Fifth of China’s Domestic Products Aren't Safe
AP

Nearly one-fifth of products made in China for domestic consumption failed quality and safety standards, the government said, while a state-run newspaper on Wednesday stressed the need to raise quality guidelines to meet international levels.

China’s dismal product safety record – both within and outside its borders – has increasingly come to light both in the local and foreign media as goods make their way through global markets. Major buyers such as the United States, Japan, and the European Union have pushed Beijing to improve inspections.

In the first half of 2007, 19.1 percent of products made for domestic consumption were found to be substandard, China’s General Administration of Quality Supervision, Inspection and Quarantine said in a statement posted on its Web site late Tuesday.

Canned and preserved fruit and dried fish were the most problematic, primarily because of excessive bacteria and additives, the agency said.

Though the survey covered many different products, it focused on food, common consumer goods, farming machinery and fertilizers.

Fears that China’s chronic food safety problems were going global surfaced earlier this year with the deaths of dogs and cats in North America blamed on pet food containing Chinese wheat gluten tainted with the chemical melamine.

U.S. authorities have also turned away or recalled toxic fish, juice containing unsafe color additives and popular toy trains decorated with lead paint. Chinese-made toothpaste has been banned by numerous countries for containing diethylene glycol, a toxic ingredient often found in antifreeze.

In an editorial Wednesday, the state-run China Daily newspaper said food exported by China sometimes did not meet standards of importing countries because of a difference in quality guidelines.

"This is not because the food itself was of low quality but because the standards we use may be lower," the editorial said. "It is becoming increasingly urgent to raise the food safety standards to international levels."

The official Xinhua News Agency quoted a top agency official as saying there were few problems with food exported to the U.S.

"Ninety-nine percent of food exported to the United States was up to safety standards over the past two years, which is a very high percentage," Li Yuanping, who is in charge of imported and exported food safety, was quoted as saying.

Yet, Chinese products continued being blocked, banned or recalled in the United States. Most recently, the FDA said it would detain Chinese catfish, basa and dace, as well as shrimp and eel after repeated testing turned up contamination with drugs that have not been approved in the U.S. for use in farmed seafood.

In response, China’s Administration of Quality Supervision, Inspection and Quarantine issued a number of new measures designed to ensure the quality of exported farmed seafood, telling its local bureaus to "fully understand the side effects and major loss of the U.S. decision to the Chinese seafood industry."

Besides stepped-up inspections and quarantine, the agency said it would post on its Web site the names of companies that violate regulations and ban them from export activities for two years.

Beijing has also taken other steps to clean up safety problems. Inspectors recently announced they had closed 180 food factories in China in the first half of this year and seized tons of candy, pickles, crackers and seafood tainted with formaldehyde, illegal dyes and industrial wax.

Authorities said most of the offending manufacturers were small, unlicensed food plants with fewer than 10 employees. State media has reported that 75 percent of the country’s estimated 1 million food processing plants are small and privately owned.

According to the survey released Tuesday, more than 93 percent of products made by large companies met standards, while only about 73 percent of products made by small companies met standards. The agency did not say how it defined the size of the companies.
http://www.newstimeslive.com/news/story.php?id=1058340





Companies in U.S. Increase Testing of Chinese Goods
Nelson D. Schwartz

General Mills, Kellogg, Toys “R” Us and other big American companies are increasing their scrutiny of thousands of everyday products they receive from Chinese suppliers, as widening recalls of items like toys and toothpaste force them to focus on potential hazards that were overlooked in the past.

These corporations are stepping up their analysis of imported goods that they sell, making more unannounced visits to Chinese factories for inspections and, in one case, pulling merchandise from American shelves at the first hint of a problem.

General Mills, which makes food products like Pillsbury dough and Chex cereals, is testing for potential contaminants that it did not look for previously, although it would not name the substances. Kellogg has increased its use of outside services that scrutinize Chinese suppliers and has identified alternative suppliers if vital ingredients become unavailable. And Toys “R” Us recently hired two senior executives in new positions to oversee procurement and product safety, mainly for goods made in China.

“We’re thinking in new ways about this,” said Tom Forsythe, a spokesman for General Mills. “We’re looking for things we didn’t look for in the past.”

A Kellogg spokeswoman, Kris Charles, confirmed that retailers had asked whether the company used ingredients from China that were banned by the Food and Drug Administration, including wheat gluten and soy protein.

The company had not, Ms. Charles said, but Kellogg took the extra step of scrutinizing the ingredients that it does import from China, like vitamins, honey, cinnamon, water chestnuts and freeze-dried strawberries. It also screened its Chinese suppliers for links to the recent pet food recall.

The discovery over the last few months of tainted or defective products from China — including toothpaste, tires, toys and fish — has prompted United States lawmakers to fault companies for compromising quality in their quest for inexpensive imports and higher profits.

If companies do not improve their safeguards and more tainted goods are found to be entering the United States, the safety of imports could take on a bigger political dimension, the lawmakers said.

“Food companies have been among the most resistant to informing the public about their ingredients,” said Senator Sherrod Brown, Democrat of Ohio, who has been a leading Congressional critic of China. “Now that’s more worrisome because these ingredients are coming from an unregulated environment.”

No fatalities or serious injuries from Chinese food products have been reported in the United States, although counterfeit Chinese glycerine has been linked to at least 100 deaths in Panama. In May, senior members of the Bush administration, including the secretary of agriculture, Mike Johanns, raised the food safety issue with Chinese officials during trade talks in Washington. And last week, in a step designed to reassure Western customers, the Chinese government said it had closed 180 food plants and identified 23,000 safety violations.

Although they affect only a fraction of imports from China, the rising tempo of alerts, including an F.D.A. restriction imposed on Thursday on sales of five types of Chinese-farmed seafood, has called attention to China’s sudden emergence as a major agricultural exporter. Between 2002 and 2006, F.D.A.-regulated imports of food from China rose from just over 100,000 shipments to nearly 235,000. Experts predict those shipments will reach 300,000 this year.

The spate of recalls and the rising volume of exports have highlighted another worry: the increasing dependence of the United States’s biggest food manufacturers on China for basic additives like apple juice, a common sweetener, and preservatives like ascorbic acid.

These little-known additives form the building blocks of many popular staples in American kitchens, keeping fruit from turning brown or providing the sweetness in breakfast bars. Food experts note, for example, that China supplies more than half of all the apple juice imported to the United States, up from a fraction a decade ago.

Other critical but common additives have followed an even sharper trajectory, according to Peter Kovacs, the former chief executive of NutraSweet Kelco and now a food industry consultant. More than 80 percent of ascorbic acid, better known as vitamin C and also used as a preservative, comes from China, Mr. Kovacs said. Chinese imports of xanthan gum, used to thicken dairy products and salad dressings, account for at least 40 percent of United States consumption.

“This is a problem for the whole food chain, but it was a blank spot,” Mr. Kovacs said. “They’re doing it now, but companies weren’t testing these additives before.”

Although Kellogg and General Mills disclosed these additional steps, they were reticent to provide additional details. And many food makers are nervous to discuss what is emerging as an issue that could threaten the trust of shoppers in long-established brands.

A spokesman for Sara Lee said executives were unavailable for comment, while J. M. Smucker did not return calls.

Not every company is altering its approach. In a statement, the agricultural giant Cargill said, “Our practices, which include fully vetting suppliers and conducting supplier audits, have not changed.”

Like many observers, Mr. Brown draws parallels between China today and the world described by Upton Sinclair in “The Jungle” a century ago. That depiction of the meatpacking industry led to the creation of the F.D.A.

Other legislators, including Representative Rosa L. DeLauro, Democrat of Connecticut, are calling for the creation of a new federal agency to oversee all food inspections. Such an agency would replace the current system, which splits responsibility among the F.D.A., the Department of Agriculture and other agencies.

“We haven’t had significant changes since the time of ‘The Jungle,’ ” Ms. DeLauro said. “It’s time to re-examine it because this is about prevention, not waiting for someone to die.”

Fusing fear of China’s growing economic power with worries about food safety, politicians like Mr. Brown and Senator Charles E. Schumer, Democrat of New York, have made it clear that food safety is an issue that resonates with voters.

“We’re saying to business, ‘You better protect yourself because right now neither the Chinese government nor the American government is doing a very good job of protecting you,’ ” Mr. Schumer said.

But consumers are not sure whom to trust.

“If you buy Cheerios, it’s a brand name, but you turn the box over, it doesn’t give you the list of where the ingredients are made from,” said Michael O’Brien, 59, as he shopped at a Food Emporium in Union Square in New York, referring to the General Mills cereal. “It absolutely concerns me because you never truly know the origin of your product.”

For the companies, the problem is two-fold: figuring out exactly what to test for and maintaining control over their network of suppliers, even as they turn to China for vast quantities of imports at lower prices.

Indeed, the discovery of the industrial chemical melamine in pet food earlier this year — and the likely death of thousands of animals as a result — alerted the food industry to potential dangers in the human food supply.

“What I’m seeing is that companies have recognized the importance of checking their suppliers,” said Dr. David Acheson, assistant commissioner for food protection at the F.D.A.

While the food industry has been in the spotlight lately, other sectors are also changing their approach to imports. Even before the toymaker RC2 Corporation recalled its popular Thomas & Friends trains because of high levels of lead, which can be poisonous if ingested, Toys “R” Us revamped its internal controls over procurement and product safety.

Late last year, Toys “R” Us hired Rick Ruppert from the clothing retailer The Limited as executive vice president for product development and global sourcing, a new position. Mr. Ruppert said the company has increased spending on safety and product development by about 25 percent in the last six months.

Toys “R” Us is also following the actions of its competitors more closely. After Target recalled about 200,000 Kool Toyz action figures because of sharp edges and lead contamination in November, Toys “R” Us discovered that the same Chinese company that manufactured those toys also made the Elite Operations figures in its stores. About 80 percent of the toys sold in the United States are made in China.

An outside testing company was called in to analyze the toys, and they were subsequently pulled from Toys “R” Us shelves when the tests confirmed similar problems. Toys “R” Us has also stopped doing business with the supplier, Toy Century Industrial Ltd. of Hong Kong.

More recently, after the Thomas recall last month, Toys “R” Us went back and had its own Imaginarium train line tested by an outside company. The toys proved to be safe.

“In the past we would have just reviewed prior test results,” Mr. Ruppert said. This time, “we just decided to take the next step: real-time, real-life review by an outside company.”

While the recent problems have raised concerns, it is still too early to know how widespread they are. But food industry officials sharply disagree with lawmakers like Mr. Brown and Ms. DeLauro, who warn of a looming crisis.

“The U.S. food industry has a tremendous track record,” said Pat Verduin, the chief science officer of the Grocery Manufacturers Association, which represents food makers. “We are learning what to test. I’m not so sure we would have tested for melamine in a wheat product two years ago.”

Kai Ma contributed reporting.
http://www.nytimes.com/2007/07/01/bu...mports.html?hp





Chinese Welder Killed By Exploding Phone

A security official in China says a welder working at an iron ore plant was killed when a Motorola cell phone exploded in his pocket.

The official blames the battery. Colleagues quoted by the Xinhua News Agency said it was apparently exposed to high temperatures.

But a Beijing spokesman for Motorola said it's "highly unlikely" that one of the company's products was involved. He thinks the cell phone or battery were fakes.

Motorola has sent a team of experts to the town in western China to help in the investigation.
http://www.local6.com/technology/13619507/detail.html





China Steps Up Its Safety Efforts
David Barboza

China made new public displays on Friday of its efforts to crack down on defective products, sentencing a former top drug safety official to death and disclosing an investigation into cellphone batteries after one reportedly exploded, killing a man when it pierced his heart.

The country, facing mounting international concerns about the quality and safety of goods made in China, has taken several well-publicized steps in recent months to show its determination to curb the production and export of unsafe or fraudulent products. It remains unclear, however, whether those steps will result in significant improvements in quality. Still, because its economic growth has been fueled in large part by exports, China has a strong incentive to make changes.

In southern Guangdong Province, one of the world’s biggest electronics manufacturing and exporting centers, Chinese regulators said that they had found batteries in Motorola and Nokia mobile phones that failed safety tests and were prone to explode under certain conditions.

Motorola and Nokia — two of the world’s biggest mobile phone makers — denied the batteries were theirs, suggesting they were counterfeit.

The batteries had labels that said they were manufactured by Motorola and the Beijing operation of Sanyo of Japan. Also on Friday, the state-run news media said that a former high-ranking official at the top food and drug watchdog agency in China had been sentenced to death for corruption and approving counterfeit drugs.

The former official, Cao Wenzhuang, was in charge of drug registration approvals at the state Food and Drug Administration until 2005. He was accused of accepting more than $300,000 in bribes from two drug companies and helping to undermine the public’s confidence.

Mr. Cao’s sentence was handed down by the No. 1 Intermediate Court in Beijing less than two months after the same court sentenced Zheng Xiaoyu, the former head of the agency, to death for accepting $850,000 in bribes to help steer drug companies through various approval processes.

Mr. Cao, however, was given the death sentence with a two-year reprieve, a lighter penalty that might allow him to have his sentence commuted to life in prison.

For years, China’s role as the world’s factory floor seemed to usher in an age of lower and lower prices, helping to tame inflation around the globe and powering one of the greatest economic growth stories in history.

The dark side of that boom, however, has been a culture of counterfeiting or copying high-end Western products.

Counterfeit products have been produced here since the country’s economic reforms began to take hold in the early 1980s, and things like Gucci bags, counterfeit DVDs and Windows operating systems can still be purchased on the streets of big cities.

But now, perhaps for the first time, cheap and sometimes counterfeit products from China are beginning to look hazardous, increasingly dangerous and even deadly.

China’s state-controlled news media reported Thursday that a 22-year-old man in western China was killed in June after his Motorola cellphone exploded in his shirt pocket. The man was reportedly a welder and the heat associated with the job could have touched off the explosion.

In a statement from its headquarters in Schaumburg, Ill., Motorola said that its preliminary review of the incident “suggests that it is highly unlikely that a cellphone caused this accident.” A company spokeswoman added that the low levels of electrical energy in a cellphone make it “improbable” that the death in China could have been caused by a faulty battery.

The company said it was cooperating with Chinese officials to determine the cause.

Yang Bo-ning, a spokesman for Motorola in Beijing, said that all the batteries tested “were not Motorola genuine batteries; they were fakes.” He added that the companies distributing those batteries “are not our suppliers.”

Nokia officials said they were investigating and trying to determine whether any of the substandard batteries affected Nokia phones.

Nokia officials said that they did not manufacture batteries in China and that the company had no business ties with the Chinese distributors named in the safety tests.

“We are confident this is a counterfeit product,” said Eija-Riitta Huovinen, a Nokia spokeswoman in Finland.

The lithium-ion batteries used in today’s small, yet powerful, cellphones are half the weight of nickel batteries. But lithium is a volatile metal and batteries can become a fire hazard under certain conditions if there are flaws in the battery manufacturing process. The computer makers Dell and Apple recalled millions of lithium batteries used in notebook machines last year, after a few notebooks burst into flames.

Until about 2001, nearly all lithium-ion batteries for notebook computers, video camcorders and cellphones, were produced in Japan, according to industry analysts. But in the last few years, dozens of independent Chinese lithium ion battery makers have begun production — often making counterfeit batteries. These third-party producers often sell lithium batteries for one-third or one-fourth the cost of Japanese producers, analysts say. But attention to manufacturing processes, materials and testing can be substandard, increasing safety risks.

“Lithium is a hard-to-tame metal and even a little moisture seeping into the battery during the manufacturing process can be a fire hazard later,” said Richard Doherty, research director of the Envisioneering Group, a consulting firm.

The reports about the batteries are the latest in a series of high-profile recalls and public relations disasters for China that seem to be playing into the hands of the country’s critics and big corporations worried about protecting their intellectual property.

Exports of tainted pet food ingredients earlier this year touched off one of the biggest pet food recalls in American history after as many as 4,000 cats and dogs were killed or injured, according to American regulators.

Later, there were worldwide recalls of Chinese toothpaste laced with a mislabeled industrial chemical from China called diethylene glycol that was found to be responsible for nearly 200 deaths in Haiti and Panama.

And a few weeks ago, an American company recalled about 450,000 Chinese-made tires because they did not contain a safety feature that could prevent tire treads from splitting and falling apart. The recall occurred after a lawsuit linked the tires to an accident in Pennsylvania in 2006 that resulted in two deaths.

In response, China has taken numerous steps to reassure global investors, customers and consumers at home that “Made in China” is not a warning label.

Even as the government has insisted that most of its products are safe and of high quality, regulators have announced efforts to rewrite food safety regulations, introduce a national recall system and overhaul the nation’s top drug watchdog.

Officials have also dispatched over 30,000 inspectors on a nationwide sweep to find substandard foods, drugs and consumer products.

This week, the government announced the results of some of its inspections, and they were startling: nearly 20 percent of the nation’s food and consumer products were found to be substandard or tainted.

Food was laced with industrial chemicals, formaldehyde, industrial wax and dangerous dyes; baby clothes were contaminated with dangerous chemicals, children’s snack food had excessive amounts of preservatives; and old food waste was repackaged and sold as new.

Worried about a backlash from Western consumers, global corporations are now upgrading their own inspections, particularly in the aftermath of a recall by the RC2 Corporation of Illinois of its popular Thomas & Friends toy railway sets after they were found to have been coated with lead paint.

Companies are also preparing for possible class-action lawsuits.

“Big companies are doing two things: they’re considering alternative sources for products and ingredients from China, just in case China is closed off or American consumers reject their products,” said Gene Grabowski, a senior vice president at Levick Strategic Communications, a Washington-based consulting firm that advises consumer product companies. “And the more immediate concern is that a lawsuit would be filed, and so they want to have their legal liability situation in place and manageable.”

In Guangdong Province, investigators are looking into how the substandard batteries made their way to the market and whether they could have entered the export market, appearing to be identical to Motorola and Nokia goods.

“We approached the Guangdong authorities and then did our own tests,” said Mr. Yang at Motorola. “These were not our batteries. There are lots of counterfeits. Every year we seize thousands of counterfeit batteries and counterfeit battery labels.”

Guangdong regulators could not be reached for comment. Sanyo officials also could not be reached late Friday.

Nokia and Motorola, however, say they are concerned about the substandard goods.

“We take all issues involving counterfeiting very seriously because counterfeiting has the potential to affect the good name and reputation of our products,” said Ms. Huovinen of Nokia.

Kevin J. O’Brien in Berlin and Steve Lohr in New York contributed reporting.
http://www.nytimes.com/2007/07/07/bu...s/07china.html





Assault and battery

iPhone Spin Goes Round and Round
Joe Nocera

By Wednesday morning, the iPhone tom-toms were beating in earnest.

They’d been building for some time, even before Apple’s chief executive, Steven P. Jobs, announced at the Macworld conference that his company was months away from unleashing its “revolutionary” hand-held device, a machine that combined cellphone, music and Internet.

It sounds so prosaic when I phrase it like that, but on the Macworld stage that January morning, Mr. Jobs screened an iPhone demo, and it was dazzling — so beautiful and elegant it could have been designed by the gods. Who had ever seen such a gorgeous screen? Or such amazing functionality in so slim a package? Or so many sweet new touches?

Yesterday evening, the “Jesus phone,” as some technology bloggers call it, finally went on sale, with a hefty price tag of $499 or $599, depending on whether you buy a 4-gigabyte or an 8-gigabyte iPhone. But it was Wednesday, really, that the iPhone hype began building to its Jobs-orchestrated crescendo. That was the day the first reviews were published. There were only four of them, for Apple had allowed only four select reviewers, including Walter S. Mossberg of The Wall Street Journal and David Pogue of The New York Times, to take iPhone test drives.

They all raved. “A beautiful and breakthrough computer,” wrote Mr. Mossberg and Katherine Boehret, his Wall Street Journal aide de camp. “It does things no phone has ever done before,” wrote Mr. Pogue.

But Mr. Pogue also pointed out that “it lacks features found even on the most basic phones,” and in the course of his review he listed a number of drawbacks. It didn’t have voice dialing. AT&T’s cellular network was so slow for Internet access it made you long for dial-up. Mr. Mossberg wrote that you have to switch to a different keyboard view — the iPhone has two — every time you want to insert a comma or period. How annoying is that?

But deep in Mr. Pogue’s review came the paragraph that stopped me in my tracks. Pointing out that the iPhone, unique among cellphones, doesn’t have a removable battery, Mr. Pogue wrote: “Apple says the battery starts to lose capacity after 300 to 400 charges. Eventually, you’ll have to send the phone to Apple for battery replacement, much as you do now with an iPod, for a fee.”

Huh? That couldn’t be, could it? Did Apple really expect people to mail their iPhones to Apple HQ and wait for the company to return it with a new battery? It was bad enough that the company did that with the iPod — but a cellphone? Cellphones have become a critical part of daily life, something we can barely do without for an hour, much less days at a time. Surely, Mr. Jobs realized that.

Didn’t he?

When you do what I do for a living, this sort of question is usually pretty easy to clear up. You ring up a company spokesman, and get an answer. But at Apple, where according to Silicon Valley lore even the janitors have to sign nondisclosure agreements, there is no such thing as a straightforward answer. There is only spin.

“Apple will service every battery that needs to be replaced in an environmentally friendly matter,” said Steve Dowling, an Apple spokesman. He went on: “With up to 8 hours of talk time, 6 hours of Internet use, 7 hours of video playback or 24 hours of audio playback and more than 10 days of standby time, iPhone’s battery life is longer than any other smartphone.”

This response didn’t even attempt to answer the question I’d asked him, which was how Apple planned to service its batteries. But never mind. This is another Apple innovation: the robotic spokesman, who says only what he’s been programmed to say.

With Apple taking the position that the battery replacement issue was not something it needed to share with reporters — much less buyers of the iPhone — I went elsewhere in search of answers. I talked to design experts, battery wonks, technology geeks, and Mr. Mossberg of The Journal, the dean of technology reviewers.

One thing I wanted to know was why Apple had made a cellphone without a removable battery in the first place; it seemed like such an extreme act of consumer unfriendliness. If the iPod was any guide, batteries were inevitably going to run down. With most cellphones, when the battery has problems, you take it to a store, buy a new battery, let the salesman pop it in, and start using it again. Why wasn’t Apple willing to do that?

“It is about assured obsolescence,” said Rob Enderle of the Enderle Group, a technology consulting firm. “That is why they don’t have a replaceable battery in the iPod. But the problem here is that the iPhone will run out of battery life before the two-year service contract runs out.”

“Steve Jobs has always worshipped at the altar of closed systems,” mused Mark R. Anderson of Strategic News Service, a technology newsletter. “Go back to the original MacIntosh. To get into the Mac computer required factory-only tools.” He added, “I don’t think it serves the consumer.”

Larry Keeley, the president of the innovation and design firm Doblin Inc., had another theory.

“The real issue is that Steve and Jonathan Ive” — Apple’s design chief — “have decided to emphasize sexiness and a different basic experience” over such ho-hum consumer needs as a replaceable battery. He was convinced that it was primarily a design issue; indeed, he thinks Apple is using a lithium polymer battery in the iPhone, which can be stretched into different shapes — and thus can be tucked into an extremely thin space.

The iPhone, Mr. Keeley said, “has been designed with a lot of consumer sacrifice problems,” not just the battery but AT&T’s sluggish network, which Mr. Jobs chose because a faster network would — how’s this for circular logic? — drain the battery too fast.

On the other hand, those who have drunk from the iPhone Kool-Aid were not remotely bothered by the removable battery issue. My assumption was that if the battery does indeed last for 300 to 400 charges, it will probably start to lose its capacity in about a year, at least for heavy users. Of course the iPhone warranty also lasts a year, so if my calculation is right, it means that the batteries will need to be replaced just as the warranty runs out. Meaning that iPhone customers will have to pay for a new battery instead of getting it free — just like the iPod.

But maybe I’m being too conspiratorial. Tim Bajarin of Creative Strategies, a well-respected technology consultant, told me, “I think this is much ado over nothing.” Yes, he said, there would be heavy users who had to recharge their iPhones every day, but most people would get two full years out of their batteries. So it would at least last as long as the service contract.

“All I can tell you,” Mr. Mossberg said, “is that 100 million people bought an iPod without a replaceable battery.” He quickly added, “If they had made it with a replaceable battery, it would have been better.”

Still, Mr. Mossberg was knocked out by what he has seen of the iPhone battery so far — “I watched ‘Pirates of the Caribbean,’ which runs two and a half hours, three times! On a phone! Can you imagine doing that on a Treo?” (What I really can’t imagine is watching “Pirates of the Caribbean” three times.)

One of the battery experts I talked to, Robert L. Kanode, the chief executive of Valence Technology, a small company that is developing a new kind of lithium battery, said that the technology has advanced so much — as has the ability of companies like Apple to manage power inside their devices — that it was “perfectly possible that it will get you to two years.”

So maybe it will get two years. But let’s think about what that means. Those who are dismissive of the battery issue are saying, essentially, that when the two years are up, and the battery needs to be replaced, customers will purchase a new and improved iPhone instead. That’s why it is a nonissue for them — they are buying into the idea of assured obsolescence. If all you want is a new battery after two years — and don’t lust after whatever new phone gadget Mr. Jobs has come up with by then — then you’re just not with it.

Besides, don’t most cellphone users get a new phone within two years? The answer, of course, is yes. But most cellphone purchases are heavily discounted — costing $100 or less — and are tied to an extension of the service contract. Is Apple really going to play that game? I’m betting the answer is no. Buying a new iPhone is going to be an expensive proposition for the foreseeable future — which of course is great for Apple’s bottom line, but not so great for its customers.

And what about the people who have early battery problems? Or those who are such heavy users of their iPhone that they need a new battery after a year? The question remains, What are they supposed to do? Go without a cellphone while Apple is replacing the battery? From where I’m sitting, this is classic Apple behavior. It is perfectly happy to sell you the coolest $599 device you’ve ever seen. Just don’t expect them to be especially helpful when it runs into problems.

Then again, maybe there is a different explanation. Maybe Apple itself hasn’t figure out what to do about the battery replacement issue — and is avoiding admitting that by not saying anything. Yesterday morning, when I got into the office, I found a voice message from an Apple public relations hand named Jennifer Bowcock. Mr. Dowling was away, and she wanted to see if she could answer my battery questions.

So I asked her the same question I’d been asking Mr. Dowling: how was Apple going to handle battery replacement? “I’ll look into that and get back to you,” she said cheerily. I could hear someone standing next to her say: “We’re not talking about that.”

An hour later, she sent me an e-mail message. “You asked why the iPhone does not have a removable battery,” it began. “With up to 8 hours of talk time, 6 hours of internet use, 7 hours of video playback, 24 hours of audio playback and 10 days of standby time, iPhone’s battery life is longer than any other smartphone.”

I give up. Have a great launch, Mr. Jobs.
http://select.nytimes.com/2007/06/30.../30nocera.html





86 It

Apple’s battery replacement service will cost $79, plus $6.95 shipping and should take three business days. In addition, rental phones will be available for an extra $29.00 plus a refundable $600.00 deposit and any taxes. – Jack.





Hey, that’s my carrier

D.Telekom's Mobile Unit Clinches iPhone Deal: Paper

Deutsche Telekom's mobile phone unit T-Mobile clinched a deal to bring Apple Inc's iPhone handset to Germany, according to a report in a German daily.

Without citing sources Rheinische Post said in a preview of a story to be published on Wednesday that T-Mobile is expected to sell the iPhone exclusively with a T-Mobile contract for around 450 euros ($612) starting Nov 1.

Deutsche Telekom and T-Mobile were not immediately available for comment.

The iPhone, which comes with an in-built iPod, web browser and e-mail software, went on sale in the United States on Friday.

Apple has signed up top U.S. telecoms operator AT&T Inc. in an exclusive deal for at least two years to sell the phone in the United States, where customers willing to sign a two-year contract are expected to pay $500 to $600 for a handset.

In Europe, Britain's Vodafone Group, Deutsche Telekom, Paris-based France Telecom and Spain's Telefonica have been tipped as potential partners for Apple.
http://www.reuters.com/article/techn...83260920070703





iPhone-Free Cellphone News
David Pogue

Man, oh man. How’d you like to have been a PR person making a cellphone announcement last week, just as the iPhone storm struck? You’d have had all the impact of a gnat in a hurricane.

But hard to believe though it may be, T-Mobile did make an announcement last week. And even harder to believe, its new product may be as game-changing as Apple’s.

It’s called T-Mobile HotSpot @Home, and it’s absolutely ingenious. It could save you hundreds or thousands of dollars a year, and yet enrich T-Mobile at the same time. In the cellphone world, win-win plays like that are extremely rare.

Here’s the basic idea. If you’re willing to pay $10 a month on top of a regular T-Mobile voice plan, you get a special cellphone. When you’re out and about, it works like any other phone; calls eat up your monthly minutes as usual.

But when it’s in a Wi-Fi wireless Internet hot spot, this phone offers a huge bargain: all your calls are free. You use it and dial it the same as always — you still get call hold, caller ID, three-way calling and all the other features — but now your voice is carried by the Internet rather than the cellular airwaves.

These phones hand off your calls from Wi-Fi network to cell network seamlessly and automatically, without a single crackle or pop to punctuate the switch. As you walk out of a hot spot, fewer and fewer Wi-Fi signal bars appear on the screen, until — blink! — the T-Mobile network bars replace them. (The handoff as you move in the opposite direction, from the cell network into a hot spot, is also seamless, but takes slightly longer, about a minute.)

O.K., but how often are you in a Wi-Fi hot spot? With this plan, about 14 hours a day. T-Mobile gives you a wireless router (transmitter) for your house — also free, after a $50 rebate. Connect it to your high-speed Internet modem, and in about a minute, you’ve got a wireless home network. Your computer can use it to surf the Web wirelessly — and now all of your home phone calls are free.

You know how people never seem to have good phone reception in their homes? How they have to huddle next to a window to make calls? That’s all over now. The free router is like a little T-Mobile cell tower right in your house.

Truth is, the HotSpot @Home phones work with any Wi-Fi (802.11b/g) router, including one you may already have. But T-Mobile’s routers, manufactured by D-Link and Linksys, have three advantages.

First, you turn on the router’s encryption — to keep neighbors off your network — by pressing one button, rather than having to fool with passwords. Second, these routers give priority to calls, so that computer downloads won’t degrade your call quality. Third, T-Mobile’s routers greatly extend the phone’s battery life. The routers say, in gadgetese, “I’m here for you, any time,” just once, rather than requiring the phone to issue little Wi-Fi “Are you there?” pings every couple of minutes.

T-Mobile was already a price leader in the cellphone game. But the HotSpot @Home program can be extremely economical, in four ways.

SAVING NO. 1 It’s not just your calls at home that are free; you may also get free calls at your office, friends’ houses, library, coffee shops and so on — wherever Wi-Fi is available. You can access both unprotected and password-protected Wi-Fi networks (you just enter the password on the phone’s keypad).

The phone has a built-in Search for Networks feature. Once you select a wireless network, the phone memorizes it. The next time you’re in that hot spot, you’re connected silently and automatically.

There’s one big limitation to all this freeness: these phones can’t get onto any hot spot that require you to log in on a Web page (to enter a credit card number, for example). Unfortunately, this restriction rules out most airports and many hotel rooms.
There’s one exception — or, rather, 8,500 of them: T-Mobile’s archipelago of hot spots at Starbucks, Borders and other public places. In these places you encounter neither the fee nor the Web-page sign-in that you would encounter if you were using a laptop; the words “T-Mobile Hot Spot” simply appear at the top of your screen, and you can start making free calls.

The cool part is that, depending on how many calls you can make in hot spots, the Wi-Fi feature might permit you to choose a much less expensive calling plan. If you’re a heavy talker, you might switch, for example, from T-Mobile’s $100 plan (2,500 minutes) to its $40 plan (1,000 minutes). Even factoring in the $10 HotSpot @Home fee, you’d still save $600 a year.

SAVING NO. 2 T-Mobile’s billing system isn’t smart enough to notice handoffs between Wi-Fi and cellular networks. So each call is billed according to where it begins. You can start a call at home, get in your car, drive away and talk for free until the battery’s dead.

The opposite is also true, however; if you begin a call on T-Mobile’s cell network and later enter a Wi-Fi hot spot, the call continues to eat up minutes. If HotSpot @Home catches on, therefore, the airwaves will reverberate with people coming home and saying, “Hey, can I call you right back?”

SAVING NO. 3 When you’re in a hot spot, T-Mobile has no idea where you are in the world. You could be in Des Moines, Denmark or Djibouti. So this is a big one for travelers: When you’re in a hot spot overseas, all calls to United States numbers are free.
SAVING NO. 4 T-Mobile’s hope is that you’ll cancel your home phone line altogether. You’ll be all cellphone, all the time. And why not, since you’ll now get great cell reception at home and have only one phone number and voicemail? Ka-ching: there’s an additional $500 a year saved.

Have T-Mobile’s accountants gone quietly mad? Why would they give away the farm like this?

Because T-Mobile benefits, too. Let’s face it: T-Mobile’s cellular network is not on par with, say, Verizon’s. But improving its network means spending millions of dollars on new cell towers. It’s far less expensive just to hand out free home routers.

Furthermore, every call you make via Wi-Fi is one less call clogging T-Mobile’s cellular network, further reducing the company’s need to spend on network upgrades.

In principle, then, HotSpot @Home is a revolutionary, rule-changing, everybody-wins concept. But before you go canceling lines and changing calling plans, consider a few small flaws.

At the moment, you have a choice of only two phones: the Nokia 6086 and Samsung t409. Both of these are small basic flip phones (both $50 after rebate and with two-year commitment). They sound terrific; over Wi-Fi, in fact, they produce the best-sounding cellphone calls you’ve ever made. But the screens are small and coarse, and the features limited. Fortunately, T-Mobile intends to bring the HotSpot @Home feature to many other phones in the coming months.

The Wi-Fi sucks power, too; these phones get 6.5 hours of talk time on the cell network, but only 4 hours over Wi-Fi.

Finally, T-Mobile eventually intends to price the service at $20 a month, or $30 for family plans. Only people who sign up during the introductory period (now through an unspecified end date) will be offered the $10 price, or $20 for families.

Even at the higher price, you could still come out ahead. With HotSpot @Home, T-Mobile has taken a tremendous step into the future. Most phone companies cower in fear when you mention voice calls over the Internet (Skype, Vonage and so on). After all, if the Internet makes the price approach zero, who will pay for phone service?

But T-Mobile has found a way to embrace and exploit this technology to everyone’s benefit. The result is a smartly implemented, technologically polished, incredibly inexpensive way to make over your phone lifestyle.
http://www.nytimes.com/2007/07/05/te...s/05pogue.html





All the News That’s Fit to Print Out
Jonathan Dee

When news broke on May 8 about the arrest of a half-dozen young Muslim men for supposedly planning to attack Fort Dix, alongside the usual range of reactions — disbelief, paranoia, outrage, indifference, prurience — a newer one was added: the desire to consecrate the event’s significance by creating a Wikipedia page about it. The first one to the punch was a longtime Wikipedia contributor known as CltFn, who at about 7 that morning created what’s called a stub — little more than a placeholder, often just one sentence in length, which other contributors may then build upon — under the heading “Fort Dix Terror Plot.” A while later, another Wikipedia user named Gracenotes took an interest as well. Over the next several hours, in constant cyberconversation with an ever-growing pack of other self-appointed editors, Gracenotes — whose real name is Matthew Gruen — expanded and corrected this stub 59 times, ultimately shaping it into a respectable, balanced and even footnoted 50-line account of that day’s major development in the war on terror. By the time he was done, “2007 Fort Dix Attack Plot” was featured on Wikipedia’s front page. Finally, around midnight, Gruen left a note on the site saying, “Off to bed,” and the next morning he went back to his junior year of high school.

Wikipedia, as nearly everyone knows by now, is a six-year-old global online encyclopedia in 250 languages that can be added to or edited by anyone. (“Wiki,” a programming term long in use both as noun and adjective, derives from the Hawaiian word meaning “quick.”) Wikipedia’s goal is to make the sum of human knowledge available to everyone on the planet at no cost. Depending on your lights, it is either one of the noblest experiments of the Internet age or a nightmare embodiment of relativism and the withering of intellectual standards.

Love it or hate it, though, its success is past denying — 6.8 million registered users worldwide, at last count, and 1.8 million separate articles in the English-language Wikipedia alone — and that success has borne an interesting side effect. Just as the Internet has accelerated most incarnations of what we mean by the word “information,” so it has sped up what we mean when we employ the very term “encyclopedia.” For centuries, an encyclopedia was synonymous with a fixed, archival idea about the retrievability of information from the past. But Wikipedia’s notion of the past has enlarged to include things that haven’t even stopped happening yet. Increasingly, it has become a go-to source not just for reference material but for real-time breaking news — to the point where, following the mass murder at Virginia Tech, one newspaper in Virginia praised Wikipedia as a crucial source of detailed information.

So indistinct has the line between past and present become that Wikipedia has inadvertently all but strangled one of its sister projects, the three-year-old Wikinews — one of several Wikimedia Foundation offshoots (Wikibooks, Wikiquote, Wiktionary) founded on the principle of collaboratively produced content available free. Wikinews, though nominally covering not just major stories but news of all sorts, has sunk into a kind of torpor; lately it generates just 8 to 10 articles a day on a grab bag of topics that happen to capture the interest of its fewer than 26,000 users worldwide, from bird flu to the Miss Universe pageant to Vanuatu’s ban on cookie imports from neighboring Fiji. On bigger stories there’s just no point in competing with the ruthless purview of the encyclopedia, which now accounts for a staggering one out of every 200 page views on the entire Internet.

The tricky thing is, the process by which Wikipedia usually, eventually gets things right — the notion that mistakes in a given entry, whether intentional or unintentional, will ultimately be caught and repaired as a function of the project’s massive, egalitarian oversight — doesn’t seem as if it would work when people are looking for information about events unfolding in real time. How on earth can anyone be trusted to get the story right when any version of the story is only as accurate, or even as serious, as the last anonymous person to log on and rewrite it?

Nothing is easier than taking shots at Wikipedia, and its many mistakes (most often instances of deliberate vandalism) are schadenfreude’s most renewable resource. But given the chaotic way in which it works, the truly remarkable thing about Wikipedia as a news site is that it works as well as it does. And what makes it work is a relatively small group of hard-core devotees who will, the moment big news breaks, drop whatever they’re doing to take custody of the project and ensure its, for lack of a better term, quality control. Though Wikiculture cringes at the word “authority,” in a system where a small group of people has the ability to lock out the input of a much larger one, it’s pure semantics to call that small group’s authority by any other name. Still, the only way to install yourself in that position of authority on Wikipedia is to care about it enough. So who are the members of this all-volunteer cadre, and why should it matter so much to them whether Wikipedia is any good at all?

Jimmy Wales, the founder and watchmaker-god of Wikipedia, isn’t completely sure who they are either, but that’s fully in keeping with the radically decentralized culture of the project itself. (Wikipedia last did a survey of its own users in 2003, and it has no plans for another one.) He did bristle when I suggested that they tended to be in their early 20s or even younger — editing encyclopedia entries, he said, is “not a young person’s hobby” — but after we traded stories for a while, he admitted that his own evidence was as anecdotal as my own.

“I’m always traveling and meeting Wikipedians everywhere,” he said, “but there’s probably some bias in the sample that I get, in that the very youngest may not be able to go out and meet us on a Thursday night for a beer because they have school the next day. So I may get a bit of a skew.”

Wales is a soft-spoken man with the unnerving focus of a person who sees something nobody else in the room sees. The word that comes up most often in his conversation is “interesting,” and that’s as good a key as any to understanding the mind-set of someone who has put in motion a public project so vast that he no longer has any real power over it. Not that such power is anything he covets. In his former life he made a killing as an options trader in Chicago, but his manner is much more monastic than that might suggest. We met at his rather shockingly modest hotel just south of Times Square, and while I could not source this statement well enough to satisfy an ardent Wikipedian, I would feel comfortable wagering that he is the only person on Time magazine’s list of the World’s 100 Most Influential People to have recently passed a night in that particular fleabag.

Wales’s own modesty sets the tone for the whole enterprise; still, Wikipedia does feature — though many users will deny it zealously — a kind of rudimentary institutional hierarchy. Among the 4.6 million registered English-language users are about 1,200 administrators, whose “admin” status carries a few extra technical powers, most notably the power to block other users from the site, either temporarily or permanently. Those nominated for adminship must answer an initial series of five questions, after which other users have seven days to register their approval or disapproval. Above the admin level are the cheekily named “bureaucrats,” who are empowered to appoint the admins and will do so if they deem a user consensus has been reached (the magic number is somewhere around 70 percent approval). There is also a level above the bureaucrats, called stewards, of whom there are only about 30, appointed by the seven-person Wikimedia Foundation board of directors. The higher up you go in this chain of authority, the humbler the language they use to describe their status: they compare themselves frequently to janitors or, more tellingly, to monks. There is an unmistakably religious tone to this embrace of humility, this image of themselves as mere instruments of the needs and will of the greater community. (The encyclopedia’s guiding principles are known as the Five Pillars.) The level of devotion to this ideal can get a little cultlike: one admin insisted to me that the vote by which he was elevated was not a vote at all but a “community consensus,” though he allowed that the means by which this consensus was reached did have “votelike tendencies.”

Though Wales is right that there are plenty of devoted Wikipedians out there who are upward of 25 years old, most of those who do the hard-core editing on a breaking news story seem to be at the younger end of the spectrum. Part of the reason for that may be that high-school and college students are much more likely than older folks to have six or eight hours at a stretch to devote to something on the spur of the moment. But there is also something uniquely empowering — for better or for worse — about Wikipedia, in that there is no real organizational ladder to climb: since everyone contributes behind screen names (which may or may not match their real ones), questions of age, appearance, experience and so forth don’t color the discussion. The only way to achieve a degree of authority in the world of Wikipedia is to show sufficient devotion to it, and that can happen in relatively short order. Gracenotes, for instance, was considered for admin status in part for his work on the Fort Dix story, and in part as a simple consequence of the fact that he will often, after his homework is done and his church responsibilities are fulfilled, spend six hours or more a night cleaning up errors in the encyclopedia. An amateur programmer and calculus buff who lives near Poughkeepsie, N.Y., he became seriously involved with Wikipedia just about eight months ago, after his parents ordered him out of a different online community of which they did not approve.

When you’re talking about Gracenotes and those Wikipedians like him — people who, though they work very hard, generally do so without leaving their bedrooms — what does “news” even mean? The presentational difference is that Wikipedia’s version of events comes in the form of one constantly rewritten, constantly updated, summary article, rather than a chronological series of articles, each reflecting new developments, as newspapers and even most news sites do. But much more significant than that, no Wikipedia article contains any attempt at actual reporting — in fact, original research is forbidden.

The rule, according to Wales, is “not out-of-context absolute” — if he, or some other trusted Wikipedia user, happened to be present at some catastrophic event and took a picture of it, that picture wouldn’t necessarily be removed from the site — but in general, he explained, “it’d be too easy to be hoaxed. And anyway, an encyclopedia is really not where you should go for that. Britannica doesn’t publish original research. An encyclopedia is the condensation of received wisdom.”

For real-time received wisdom, there’s pretty much one place to go in today’s world, and that’s Google. Thus Gruen fleshed out the Fort Dix story entirely by searching sources on Google and its offshoot, Google News. During the editing frenzy on May 8, he told me, “There was one dispute where somebody thought we should be using the word ‘alleged’ a lot more than we were, because it was, like, how do you know they were really planning on doing it? But I was kind of against too much use of ‘alleged,’ because, well, I don’t know, I just kind of felt that the F.B.I. was a pretty reliable source.” At which point thousands of dead journalism professors turned over in their graves.



But even when Wikipedia’s function is journalistic, its aim is not; rather than report the news, the goal is to act as a kind of phenomenally fast, bias-free digest of what others have already reported elsewhere. On a big news day, Wikipedia functions like a massive, cooperative blog — except that where most blogs’ function is to sieve news accounts through the filter of strong opinion, Wikipedia’s goal is the opposite: it strives to filter all the opinion out of it. With 10 or 20 or 50 pairs of eyes on every available news account, if one fact, or one loaded word — “terror,” say — appears in one of those accounts but not the others, Wikipedia’s own version will almost always screen it out. Not exactly investigative journalism, but it doesn’t pretend to be; it relies on others for that.

Natalie Martin, a 23-year-old history major at Antioch College in Ohio, was granted admin status last winter after contributing to the site for about nine months. She thought at one point in her life that she wanted to be a journalist, she said, “but then I decided that my only real interest in newspapers is fixing all the comma mistakes.” Martin works at the circulation desk of a local library — a job that often leaves her attention less than fully engaged, in which case she logs onto Wikipedia and looks for errors. Her usual M.O. is to check the “recent changes” page, a running log of the most recent edits made anywhere on the site, no matter how large or small. It gives you some sense of the project’s scale to learn that the roughly 250 most recent changes to the English-language Wikipedia were made in the last 60 seconds.

On a normal day, she told me, much of her work involves finding and instantly reverting vandalism, usually profanity from bored schoolchildren. Messing with a Wikipedia page requires no hacking skills whatsoever; thus vandalism is pandemic there. Though the admins are loath to give vandals special attention in any form, the fact is that there are some who earn their grudging admiration, if only for their sense of humor. Stephen Colbert, in his fake-newsman persona at least, has been a regular tormentor of the site, urging his viewers to change a given fact en masse; when the words “Colbert Alert” appear on the admins’ chat forum, 20 or more of them will rush to the ramparts of a targeted page. And users with a mind-boggling amount of time on their hands can sometimes raise their defacement to conceptual levels — for instance, Willy on Wheels, a legendary Wikipedia user whose vandalism consisted of adding the words “on wheels” to the headlines of literally thousands of entries. Uncountable hours were spent deleting those two graffitilike words from all over the site. He or she even spawned numerous copycats, and to this day, anyone whose user name contains the phrase “on wheels” runs the risk of having his or her editorial privileges summarily revoked.

On April 16, though, Martin’s routine vandal-catching and grammar-policing was altered by news of the shootings at Virginia Tech. By the time she got to the site, a few hours after the shooting itself, the brand-new “Virginia Tech Massacre” page had already been contributed to or vandalized hundreds of times, but she took control and has personally made more than 200 edits to the story. “It happened rather quickly,” she said, “and there were maybe a dozen people that were paying very close attention: information would break, and we would talk about how it should be phrased, how the gun-politics stuff should be phrased in a way that’s neutral and doesn’t use some of the loaded terminology that each side tends to use. I was not online when the name of the gunman was released, but I imagine somebody went and added it to the page within 30 seconds. Because that seems to be what happens.”

She and that dozen or so others decided to use one of their technical privileges as admins to “semiprotect” the page, meaning they have locked out any would-be contributions from anonymous users or users with registered accounts less than four days old. (The more seldom invoked “full protection” prevents anyone but admins from editing a page.) They made the decision, Martin said, because the level of vandalism was “just ridiculous. Sometimes it’s not malicious, it’s people who want to put in their opinion, or they put in ‘Go Virginia Tech!’ or something like that, which is sweet but really inappropriate in this particular venue. People liked to append the word ‘evil’ in front of the name of the perpetrator, and that’s again, like, O.K., sure, I don’t know or care if he’s evil, really, I don’t even know what that means, but it doesn’t belong in an encyclopedia.”

Martin was self-deprecating about her reasons for devoting so much time to Wikipedia — spending your leisure time hunting down strangers’ spelling errors does, she said, “feed interesting character traits” — but when pressed she offered a rationale that might seem disingenuous if it weren’t echoed by so many of her colleagues: pride of ownership. Virginia Tech, she said, “was one of the more visited pages for a few days, and I know that for myself and probably for some other people there was a desire to put our best face out to the world. A lot of people did go to the page just to look and see, and it was important to me that they see something very good, very professional and put together, not covered in vandalism, not excessively long, not excessively editorialized, just the best that we could do with the limited information that we had.”

Martin’s main comrade on the day of the Virginia Tech shootings was a fellow admin she has never met: “I don’t know his real name,” she says, “but his handle would be Swatjester.” Swatjester turns out to be Dan Rosenthal of Palm Beach Gardens, Fla.; Rosenthal, who is 24, graduated in April from Florida State University, a little later than planned, because the National Guard unit of which he was a member was deployed for the initial invasion of Iraq and stayed there for a year. He is now the national legislative director of a war-veterans’ organization, doing everything from answering questions about pending legislation to helping suicidal vets find mental-health treatment. In the fall he will start law school at American University in Washington. On top of all that, he is such a devoted Wikipedian — editing and resolving disputes on the site eight hours a day or more, with a watch list that has ballooned to 4,000 articles — that he recently made a pop-in visit to Wikimedia’s modest headquarters nearby in St. Petersburg and left with an unpaid internship in legal affairs. His parents, he told me, are only marginally happier with this pursuit than they were back when he spent hours each day playing video games.

I visited Rosenthal’s student apartment in Tallahassee, where he was living with his three roommates; the place mushroomed with musical instruments and video games and unwashed dishes, just like any student habitat, and maybe for that reason, Rosenthal will often take his laptop to a local cigar bar and fulfill his admin duties there while having a Scotch. On the afternoon we met, though, we settled for a quiet sushi restaurant in a local strip mall with a wireless connection. “I’m trying to teach myself to eat more slowly,” he said with a smile. “It’s an Army thing. I’m used to having 20 seconds to eat, and if you talk that means you’re finished.”

You might think, having experienced the Iraq war himself, he would be tempted to correct mistakes or look for N.P.O.V. (“neutral point of view”) violations on Wikipedia’s many war-related stories, but he’s far too much of a true believer in the project to allow himself to do it. “In the beginning,” he told me, “when I didn’t quite understand all the rules, I got a little bit involved with it, but as I started to learn the system better, I just don’t edit that kind of thing anymore. It sets a bad precedent.”

He logged on and took me through an average editing session; unsurprisingly, everything went by at about the speed of light, but a few things about Wikisociety, as he called it in a moment of professed weakness (“I hate putting ‘Wiki’ in front of everything”), did become clear. For one thing, it’s a myth that any entry, no matter how frivolous, can find a place on Wikipedia — or, rather, the myth is that anything that goes on there stays on there. The presence of (in one admin’s embarrassed phrase) “five million Pokémon articles” notwithstanding, a great many entries are deemed unworthy even of Wikipedia’s catholic attention and are deleted within days, hours or even minutes. There are elaborate criteria for deletion or, in extreme cases, immediate deletion (“patent nonsense,” for instance, is grounds for the latter). But another extraordinary aspect of Wikipedia is its almost fanatical transparency: every change made to every article, no matter how small, is preserved and easily accessible forever. Exceptions can be made in rare cases, as when a vandal adds to a page somebody’s home phone number or — as in a recent controversy that left the more diligent admins exhausted — open-source buccaneers start randomly inserting the legally controversial HD/DVD de-encryption code into articles all over the site.

By the time we finished our lunch, 96 new pages had been nominated for deletion already that day — the backlog can grow to as many as 800 — and Rosenthal delivered the death blow to a few others while we sat there. “Take this guy,” he said. “ ‘Self-proclaimed write-in candidate for U.S. president.’ This article’s gonna get deleted. There’s no hope for it.”

There is a rough philosophical divide among admins between “deletionists” and “inclusionists,” and Rosenthal, even though he has never actually met anyone from Wikipedia outside the office staff in St. Petersburg, is on the site so often that he has a pretty good idea who’s who. He associates certain user names with certain political biases, and he recalls an online dustup with someone called Slimvirgin over whether the Animal Liberation Front was a terrorist organization. Personalities can become so pronounced in these debates that some even achieve fame of a sort on snarky Wikipedia anti-fansites like Encyclopedia Dramatica, where Slimvirgin has been thoroughly pilloried. “It’s disgusting on one level,” Rosenthal said, “but it’s also funny how the encyclopedia has gotten to be more about the community behind it. And like any community, it has its drama. For people that don’t understand it and don’t have an inclination to get involved in it, it’s pretty daunting.”

Wikipedia’s morphing into a news source, Rosenthal said, “is an inevitable step. Because the software is absolutely perfectly suited to that. And the rules, I’m sure unintentionally, are perfectly suited to it, with the emphasis on verifying and the neutral point of view.” As for Wikinews, he offered, with brutal kindness, that it was a good place for news that “doesn’t make Wikipedia’s radar.” Even Wales admitted, with something of a wince, that on any substantial news story, Wikinews is pretty well consigned to redundancy by its more successful sibling. “It’s something that the Wikinewsies have at times, I’ve felt, been a little prickly about,” Wales said. “But it’s just the sheer volume of people, also the sheer audience. Wikipedia derives a certain degree of authority and trust in the mind of the reader by avoiding original research and citing sources. And for whatever flaws there are in the model — you pick up the newspaper once a week and you’ll see some horrible thing from Wikipedia — if you read it generally throughout, you’ll find it’s pretty good; and you’ll recognize that there is a process here that does a pretty good job of getting at something important.”

The massive energy generated by that sense of the project’s importance is certainly alive in Rosenthal. “For me,” he said, “it really comes down to the advancement of human knowledge. I see heaps of praise being put on Google and Yahoo and Microsoft for being different, and they’re all just search engines. It’s nothing different. But this is something that’s never been attempted before. It’s just so unconventional, and it works. And it’s completely for the betterment of humanity. There’s no downside to it. I think that’s incredible. And I don’t want to see people take this thing that is 100 percent beneficial by itself and turn it into something negative by putting on whatever vandalism they like, or libeling someone, or whatever the effect is.”

[F]or something alternately heralded and feared as a harbinger of some brave new world, Wikipedia has a lot of old-fashioned trappings; in fact, within its borders it generates its own special brand of kitsch. Users get news about the site via a mocked-up newspaper called The Wikipedia Signpost; the series of high-tech discussion forums on which the admins communicate is called the Village Pump, and a forum for Wikinews is dubbed the Water Cooler. And users salute their peers, on a purely informal basis, by awarding one another special citations called Barnstars — a term derived from the decorative good-luck charms used to commemorate successful barn-raisings two or three centuries ago. “For being kind and simple in the face of my very stupid mistake,” reads one of the citations on Martin’s own user page, “I hereby award you this Random Acts of Kindness Barnstar .” It’s enough to set your teeth on edge.

But the kitsch is also a key to something, because in the end what’s most encouraging about Wikipedia isn’t all that’s new about it but all that isn’t. It is in some ways a remarkably old-school enterprise; for one thing, it is centered almost entirely on the carefully written word.

“The classic question I get at conferences,” Wales said, “is, ‘Do you think Wikipedia will remain text, or will it be more and more video in the future?’ I think it’s pretty hard to beat written words. Especially for collaboration, because words are the most fluid medium for shaping and reshaping and collaboratively negotiating something. It’s kind of hard to do with video, and I don’t think that’s just a technical barrier.”

And then there is the notion of the neutral point of view. It’s easy to forget how far out of fashion that idea has fallen, particularly in the Wild West milieu of the Internet. The N.P.O.V. is one of Wikipedia’s Five Pillars. When asked why that neutrality is something whose value they’ve internalized so deeply, some of the admins I talked to used a rather neutral word themselves: information freed from opinion, they said, is “useful,” where information burdened by it is not. But it doesn’t take much digging to see that the question has a moral component as well.

There was, of course, already a Jerry Falwell article on Wikipedia, but the day of his death in May saw a predictable spike in traffic. When I first logged on, I didn’t have to scroll far before coming across an obvious bit of teenage vandalism, concerning an unprintable cause of death that the writer evidently felt would, if true, have meted out a certain poetic justice. That bit of editorializing, a matter of fewer than a dozen words in all, was gone from the page in two minutes.

“I’m actually surprised it took that long,” Sean Barrett, a Los Angeles-based I.T. consultant and Wikipedia admin, told me. “I went to the Falwell page myself as soon as I heard that he was dead; high-profile things like that, breaking news, we’ve learned to be proactive. I’m sure hundreds of administrators put Jerry Falwell on their watch list.”

But it wasn’t just the longtime admins who were hashing out the complexities of how to give this polarizing figure his neutral due. A furious dialogue went on all day on the discussion page that shadows that (and every) Wikipedia entry; one comment from a user named Shreveport Paranormal read, in part: “Despite my personal dislike of him, the man did just pass away. . . . This is a place that is supposed to give accurate information. . . . The only way we can keep to the purpose of Wikipedia is to remain unbiased.” Not that extraordinary a sentiment, perhaps, until you take into account that Shreveport Paranormal (according to his user profile) is a teenager, and Roman Catholic, and gay. And that he had been a Wikipedia user, at that point, for two days.

Wikipedia may not exactly be a font of truth, but it does go against the current of what has happened to the notion of truth. The easy global dissemination of, well, everything has generated a D.I.Y. culture of proud subjectivity, a culture that has spread even to relatively traditional forms like television — as in the ascent of advocates like Lou Dobbs or Bill O’Reilly, whose appeal lies precisely in their subjectivity even as they name-check “neutrality” to cover all sorts of journalistic sins. But the Wikipedians, most of them born in the information age, have tasked themselves with weeding that subjectivity not just out of one another’s discourse but also out of their own. They may not be able to do any actual reporting from their bedrooms or dorm rooms or hotel rooms, but they can police bias, and they do it with a passion that’s no less impressive for its occasional excess of piety. Who taught them this? It’s a mystery; but they are teaching it to one another.
http://www.nytimes.com/2007/07/01/ma...KIPEDIA-t.html





Brit Fumes Over Wikipedia, Lava Lamps

Drops the C word
Cade Metz

Is Wikipedia running a censorship board? John Barberio thinks so. After more than two years as an active contributor to the free online encyclopedia, the 27-year-old Oxfordshire man recently left the project over the behavior of its "OTRS volunteers," unpaid administrators who act on reader complaints about the site's content.

"I dislike using the scary C word, but OTRS are acting as a censorship board," he says. "And worse, they appear to be acting as an inept, heavy-handed amateurish censorship board." Others who have had brushes with Wikipedia's "Open-source Ticket Request System" are saying much the same thing.

To illustrate his point, Barberio points to Wikipedia's article on the lava lamp, which OTRS volunteers recently suppressed for almost two weeks - without explanation. From June 18 to July 2, anyone looking for information about the world's most famous novelty item was met with a blank page.

"No information on what exactly was wrong with the article was divulged," Barberio explains. "I've read over it trying to figure out what the offending part may have been, but can't work it out. It's still unclear what the issue was - or what steps could be taken to correct it. It certainly seems all too easy to get an article 'protectively blanked.'"

Wikipedia's OTRS is used to field email complaints about site content. Incoming messages are monitored by a group of volunteers, who assess the value of each complaint and act accordingly. As they weigh a complaint, they may "blank out" the article in question, so that no one can read it. Then, if they decide a complaint has merit, they'll edit the article.

On the surface, OTRS volunteers can't do anything you or I couldn't do. "They have no special power within Wikipedia," site founder Jimmy "Jimbo" Wales told The Register. But there's no denying these volunteers have a certain political pull above and beyond the Average Joe. Saying that OTRS volunteers have no special power, Barberio retorts, is "kind of like saying The CEO and the Janitor have the same privileges because they both have the same set of keys to the building."

"OTRS volunteers don't have additional extra privileges in the sense that the Wikipedia software doesn't let them do special things," he explains. "But they do have access to secret information, and they can demand that their actions not be reverted by other administrators 'until discussion is settled.'" If you go against their demands, your own privileges could be removed.

When we asked Wales if OTRS volunteers would ever blank out out an entire page while a complaint is under review, he said it was "pretty routine."

"When we have a complaint, we try to immediately remove the information that's the subject of the complaint - pending resolution of the complaint," he explained. "That's standard process across hundreds of articles every day."

This sort of thing is hardly unreasonable. There needs to be a means of policing content on the site. But Barberio is adamant that the process needs to be more transparent. If someone suppresses an article about lava lamps for two weeks, they should give sufficient reason. "It's not acceptable to blank a page out and never give a reason why."

Barberio acknowledges there will be cases where OTRS volunteers would be justified in keeping a complaint secret. If a person claims they're being libeled by a Wikipedia article, for instance, it stands to reason their identity shouldn't be divulged. But this was far from the case with the lava lamp article. Wales insisted that the reason for suppressing the article was posted to its "talk" page, but there doesn't seem to be a link between those discussions and the OTRS action.

As Wales says, OTRS volunteers are chosen because they're "respected members of the Wikipedia community." But Barberio believes that the community has become far too insular. "It's getting very combative over there," he says. "There are groups of admins who generally do not get along with anyone they consider an outsider." Are you having problems with Wikipedia community? Do let us know.
http://www.theregister.co.uk/2007/07...rs_volunteers/





Rockers, Royals to Honor Princess Diana
Jill Lawless

Rockers and royals, including Rod Stewart, Elton John and Princes William and Harry, were taking the stage at London's Wembley Stadium on Sunday to remember Princess Diana almost 10 years after her death in a Paris car crash.

The concert, organized by Diana's sons, falls on what would have been her 46th birthday. The princess died Aug. 31, 1997, along with her boyfriend Dodi Fayed and their driver when their Mercedes crashed inside the Pont d'Alma tunnel while media photographers pursued them.

The memorial concert features music from some of Diana's favorite acts, including Tom Jones and 80s chart-toppers Duran Duran. Younger performers include Kanye West, P. Diddy, Joss Stone and Lily Allen.

The two princes were scheduled to address the 65,000-strong crowd from the stage at some point during the show.

In an interview with the British Broadcasting Corp., William, 25, acknowledged being nervous.

"We'll probably be gibbering wrecks by the end of it," he said.

Security for the event was being reevaluated after the discovery of two unexploded car bombs in central London on Friday and an attack on Glasgow airport in Scotland on Saturday that involved a Jeep Cherokee in flames slamming into the main terminal.

Police said they believed Saturday's attack was linked to the car bombs, and Britain raised its terror alert to "critical" -- the highest possible level. At least 450 officers were to be on duty to police the Diana concert.

The show also includes a performance by the English National Ballet and songs by Andrew Lloyd Webber in honor of Diana's love of dance and theater.

Diana is remembered for her glamour, for her extensive charity work and for her tempestuous marriage to Prince Charles, heir to the British throne. The pair married in 1981 in a ceremony watched by millions around the world, but divorced in 1996 after admissions of adultery on both sides.

William said the concert was a chance for people to "remember all the good things about her because she's not here to defend herself when she gets criticized."

"After 10 years, there's been a rumbling of people bringing up the bad, and over time people seem to forget -- or have forgotten -- all the amazing things she did and what an amazing person she was," William said in the interview, which was recorded earlier this month and broadcast Friday.

Tickets for the concert cost $90, with proceeds going to causes Diana supported, including land mine and AIDS charities.

Harry, 22, said the brothers had asked John to play "Candle in the Wind," the song he played at Diana's funeral in Westminster Abbey. Originally about Marilyn Monroe, its lyrics were reworked in tribute to Diana, and it became a worldwide No. 1 hit in 1997.

A memorial service is also planned in London on Aug. 31, the anniversary of Diana's death.
------

On the Net:

http://www.concertfordiana.com
http://www.courant.com/news/nationwo...,7462185.story





Electronica That Rocks, à la Française
Will Hermes

ONE of the most blogged-about sets at this year’s Coachella Valley Music and Arts Festival in Southern California took place on a stage dominated by towering Marshall amplifier stacks and a huge illuminated cross. When the dark-clad musicians let loose with a familiar hammering riff, the fans erupted in roars, punching their fists in the air and barking out lyrics.

No, the group wasn’t a heavy-metal revival act — not exactly. Justice is a French D.J. duo at the forefront of a new school of electronic music far removed from the genteel soundtracks one commonly hears in W Hotel lobbies and design-conscious restaurants. The music is harder and hookier, as apt to inspire slam-dancing as hip shaking. It’s more like rock, which effectively dislodged dance music early this decade as the hipster soundtrack of choice.

“Our crowd is more a rock crowd,” said Gaspard Augé of Justice, who is still surprised that fans sometimes stage-dive at its gigs. Young audiences, he suggested, “just want more fun in electronic music, more hedonism.”

So in a year that has seen indie rockers like Bright Eyes and the Shins releasing conservatively tuneful CDs that parents might borrow from their kids, rowdy electronic music seems to be seeding a new underground. “People are dancing again,” said Tom Dunkley of GBH, the New York company behind Cheeky Bastards, a weekly club event that has embraced the new sound. When Justice and several like-minded D.J.’s performed at a Cheeky Bastards event in Manhattan in March, Mr. Dunkley said, the demand for tickets was “crazy, completely unusual.”

Justice’s debut full-length CD, whose provocative “title” is a simple cross icon, arrives July 10 via the Vice Records label. The duo had a video added on MTV (extremely rare these days for an electronic act) and has just finished a remix of “LoveStoned” for Justin Timberlake. And it has emerged amid the ever-growing influence of Daft Punk, the Parisian D.J. duo that pioneered the harder, faster approach that characterizes Justice’s music with its thrillingly crude electro-house debut, “Homework,” in 1996. The rapper Kanye West sampled a track from that album for his hit “Stronger”; this summer Daft Punk will embark on its first major tour in a decade, a multimedia extravaganza that will come to Keyspan Park at Coney Island on Aug. 9.

Some American acts, like LCD Soundsystem and Ghostland Observatory, have been channeling this new sound, as have cutting-edge artists elsewhere. (In recent recordings and live shows, Bjork has been adding noise to her usual dance beats.) But for the past couple of years France has served as its most exciting incubator, on indie labels like Kitsuné, Institubes and especially Ed Banger, which signed Justice and whose name suggests its M.O. (Try pronouncing “headbanger” with a Parisian accent.) And despite some tut-tutting by fans of minimalist techno and other esoteric electronic styles, the new headbanging aesthetic has found an audience.

The members of Justice — Mr. Augé, 27, and Xavier de Rosnay, 24 — met in Paris. Mr. Augé was a Metallica fan who once played in an experimental post-rock group. Mr. de Rosnay was a fan of hip-hop and pop. Justice was effectively born in 2003 when the pair, on a lark, refashioned a song for a remix contest promoted by a college radio station in Paris.

“You could download the separate tracks: guitar, drums and other things,” Mr. de Rosnay said via phone from Paris, explaining their remix process. “But we were working without music software: just a sampler, a sequencer and a synthesizer. So we downloaded just the voice on the chorus, because there was not space enough for more than eight seconds of sound on our sampler.”

The remix, a radical reshaping of “Never Be Alone” by the British rock group Simian, lost the contest (no one seems to recall who won) but netted the duo a deal with the nascent Ed Banger label in 2003. Eventually retitled “We Are Your Friends” to echo its shouted refrain, the track became a club and Internet phenomenon. To top it off a striking video clip for the song, which looked like the aftermath of a college keg party as dreamed by Michel Gondry, won the award for best video at last year’s MTV Europe Music Awards, trumping even the Evel Knievel-themed flamboyance of “Touch the Sky” by Kanye West (who, characteristically, threw a tantrum over the outcome).

“We Are Your Friends” isn’t on Justice’s new album, but there are plenty of other signs of the members’ fusion-minded taste, from a pixilated take on Parliament-Funkadelic (“New Jack”) to the kiddie-disco singalong single “D.A.N.C.E.,” which seems to have struck a chord: A leaked version was so widely remixed by Internet sample-jackers that Vice posted alternate versions on its blog.

The album also includes the vocal-less single “Waters of Nazareth” from the group’s self-titled EP, which made numerous best-of lists last year. The new version begins with a serrated sputtering of electronic noise; when a 4/4 kick-drum beat comes in, the noise becomes a simple, brutish melody. It mutates as the beats fragment, like chips of wood from the blade of a buzz saw, and is replaced by a churchy organ riff on the bridge; then the two melody lines combine, skidding back into pure modulating noise again at the end.

As with the best garage rock or heavy metal — as well as ’80s electro, the synthesizer-heavy urban dance style Justice frequently echoes — there is beauty in the relentless primitivism.

As for the cross-icon title, Mr. Augé said it was inspired, in part, because “it was a potent pop symbol in the ’90s, with people like Madonna and George Michael using it.” Of course it’s also a common heavy-metal motif, a connection also suggested by Justice’s crudely gothic black-and-silver cover art (not to mention those awe-inspiring Marshall stacks, which, it should be noted, are merely stage props).

Both members of Justice have worked as graphic designers, and visual presentation is an important part of Ed Banger’s aesthetic. So is a sense of playfulness, whether it’s the shameless potty mouth of Uffie, a female American rapper of sorts best known for the campy gangsta track “Pop the Glock,” or the way DJ Mehdi mixes old-school hip-hop and electro with bits of hair-metal guitar. (Both acts appear on the recent compilation “Ed Rec Vol. 2,” released in America via Vice.)

“I’ve never worked with a group that’s so fully formed,” said Adam Shore, the general manager of Vice Records, referring to the Ed Banger crew. “They’ve got the music, the art, the aesthetic, the amazing videos, and they’re kind of a traveling party.”

Ed Banger’s multimedia sensibility, not to mention its sound, has a clear antecedent. The label is run by Pedro Winter, who, in addition to making music as Busy P, has for many years managed Daft Punk, the duo of Thomas Bangalter and Guy-Manuel de Homem-Christo. Like Justice, Daft Punk played Coachella, in 2006; its set was a spectacle of lights and video with the duo, in the guise of robots, triggering electronics atop a sort of neon pyramid.

Daft Punk is not directly involved in Ed Banger, but you can hear its influence on the label. And Mr. Bangalter’s superlative remix of DJ Mehdi’s “Signature” turns a teasing snippet into what might be the most ecstatic dance track you’ll hear this year. The duo’s influence persists elsewhere too.

“Daft Punk were my heroes when they released the ‘Homework’ album,” said Thomas Turner of the young Austin synth-rock band Ghostland Observatory. “That really influenced my view on music.”

Mr. Bangalter, who spoke from Los Angeles last month during a break from tour rehearsals, is amused that, at 32, he is considered an elder statesman to a new generation of electronic musicians. And unlike the scene veterans who reject the rockist attitude of Justice and its peers, Mr. Bangalter appreciates the music on its own terms.

“Most of these people were like 6 or 7 years old” during electronica’s first wave, he said. “It’s not really their history. So they are starting from scratch maybe. From more of a blank slate.”

Or as Justice’s Mr. Augé put it, “We just don’t care about respecting the rules.”
http://www.nytimes.com/2007/07/01/ar...ic/01herm.html





Baby it’s hot outside

Songs for an Overheated Planet
Ben Sisario

THEY will come from the highest ranks of the pop aristocracy tomorrow, filling stages on seven continents. As part of Live Earth, a planetwide series of concerts meant to encourage all people to live, consume and vote eco-responsibly, they will use their fame to persuade a global audience that climate change is not only an urgent problem but one they can help solve. Madonna. The Police. The Red Hot Chili Peppers. Dave Matthews, Bon Jovi, Kanye West, Metallica. And Nunatak.

Nunatak?

Even for the superstars playing Live Earth — which begins in Sydney, Australia, at 10 Eastern time tonight (noon Saturday in Sydney) and proceeds westward to Japan, China, Germany, Britain, South Africa and Brazil, ending tomorrow at Giants Stadium — the size of the crowd will be especially huge. Organizers of the concerts, boasting an elaborate “media architecture” of television, satellite radio and Internet broadcasts throughout the world, say they expect to reach two billion people.

But perhaps none will have as great a leap into fame as Nunatak, made up of five British scientists at a research station in Antarctica, which at this time of year — it’s winter there, when no ships or even planes can reach them — has a population of 22. When not studying marine biology or weather patterns, they play Blur and Nirvana covers and some originals in a spare room next to stores of sleds and tents. Their last gig, at a colleague’s birthday party, did not quite prepare them for what lies ahead.

“The last time we played, we played to 17 people,” said Roger Stilwell, a 34-year-old field assistant who plays bass in the band. “Suddenly we find ourselves playing to half the world.”

For former Vice President Al Gore, one of the principals behind Live Earth, the stakes are much higher than entertaining a big audience. His ambition is to “create a critical mass of opinion worldwide,” he said in a telephone interview from London this week, “that will push the world across a tipping point beyond which political and business and civic leaders across the spectrum will begin offering genuinely meaningful solutions to the climate crisis. I think that’s a realistic hope, and it’s greatly needed.”

Mr. Gore and his partner in Live Earth, the veteran live-event producer Kevin Wall, know it will not be easy. Live Earth joins a long history of mega-events in which the spectacle can sometimes overshadow the cause, and promises made under the spotlights can be hard to keep in the long term. Two years ago, after the Live 8 concerts — held on the 20th anniversary of Live Aid, the granddaddy of the modern worldwide charity superconcert — the leaders of the Group of 8 nations pledged to double their aid to Africa by 2010. But recently Bono’s advocacy group, DATA (Debt, AIDS, Trade, Africa), issued a report saying that most of the rich nations had already fallen far behind in their commitments.

Mr. Wall, who worked with Bob Geldof on Live 8 and Live Aid, says the disappointments of the big concerts of the past have taught him the importance of holding onto a mass audience’s interest long after regular programming has returned to television.

“You can’t solve a problem in one day,” Mr. Wall said. “At Live 8, unfortunately, the big campaigns that could have followed, with the e-mail addresses and the people that joined, weren’t executed on. On this we won’t allow that to happen.”

His answer is to make Live Earth, which took six months to pull together, a “launch event” for what he says will be a three- to five-year campaign of education and grass-roots activism. The locations of the concerts represent the global significance of climate change — Nunatak’s involvement allows Live Earth to say it is on all seven continents — though the event has had difficulties in some parts of the world. Late last month Istanbul’s show was canceled, in part because of lack of interest, and this week the authorities in Brazil withdrew permission for a concert on the beach in Rio de Janeiro, citing security concerns, though organizers said yesterday that the decision had been overturned and the event would go on as planned.

Last week Mr. Wall and Mr. Gore unveiled a seven-point pledge they want people around the world to take, ranging from a demand for an international treaty to reduce greenhouse emissions to a promise to plant trees. It’s a nonbinding pledge of course, and tomorrow concertgoers and fans at home can make their affirmation by a conspicuously easy method: text message.

To announce intentions to change the world is to invite criticism, and Live Earth has already been hit by a predictable series of analytical arrows. Environmental bloggers questioned the need for big, energy-gorging concerts. News reports pointed out that performers would be making trips around the world in exhaust-spewing jets, and that some of them (Kanye West, Sheryl Crow) have songs in S.U.V. commercials.

And the ratio of political effectiveness to celebrity glitz is not always clear. Reebee Garofalo, a professor of media and technology at the University of Massachusetts, Boston, who has written about music’s role in mass movements, noted that many big charity events, like the concerts for Nelson Mandela, had tangible success; Mr. Mandela himself acknowledged the importance of music to the worldwide anti-apartheid movement.

But the event itself will fundamentally be about entertainment. “The people going are going to hear the music,” Professor Garofalo said. “So the question then becomes: How do you use that event to promote the growth and expansion of a political movement that involves collective action?”

Proceeds will go to the Alliance for Climate Protection, a nonprofit group founded by Mr. Gore. Tickets for Giants Stadium, with the Police, the Dave Matthews Band, Kelly Clarkson, Akon, Smashing Pumpkins, Roger Waters, Fall Out Boy, Kanye West and others, are still available, from $83 to $348.

Unlike Live 8, the Tibetan Freedom Concerts and the Amnesty International tours of the ’80s, Live Earth focuses less on governments and world leaders than on ordinary people. An array of media will offer middle-class lifestyle tips to conserve energy and reduce waste. Live Earth has produced some 60 short films and 30 public service videos on these topics with Hollywood stars like Cameron Diaz and Will Ferrell, and chocked its Web site (liveearth.org) and a new book, “The Live Earth Global Warming Survival Handbook,” with more information and guidance.

“In a funny way,” Mr. Gore said, “it’s probably easier to imagine change at the grass-roots level enduring than it is to expect political leaders to make changes in the absence of a political base of support for those changes.”

The organizers are hoping that the nuts and bolts of the shows themselves will be influential. They have created a concert “green standard” of alternative energy sources and waste recycling, and say they will be closely monitoring every drop of fuel and pound of garbage. Wind and solar power will be used in Tokyo, for example, and the power generators at Wembley Stadium in London will run on 99 percent biodiesel fuel, a spokesman said. Giants Stadium is to use recyclable concessions products and compost organic waste.

In these efforts Live Earth is tapping into a slowly growing trend in the music industry. Big festivals like Bonnaroo and Lollapalooza have developed extensive green programs like using energy-efficient lights and recycled water and paper products. Live Nation, the country’s biggest concert promoter, has a similar pilot program in the San Francisco area and is planning to expand it nationally later this year.

But for many musicians at Live Earth, the concerts are less about parts per million than the urgency of the overall message.

“The climate change situation is the No. 1 problem facing humanity,” said Flea, the bassist of the Red Hot Chili Peppers, in an e-mail message this week while on tour in Europe. “If it is not addressed globally, then all other attempts to reduce human suffering shall be for naught.”

To get to Live Earth in London, the Chili Peppers will play three shows in three countries over 24 hours. (Tonight: Paris. Tomorrow afternoon: Live Earth. Tomorrow night: Denmark.) But even given their passion for the cause, it took some glad-handing from Mr. Gore to persuade them to do it.

Mr. Gore said he went to the Grammy Awards in February to do some recruiting for Live Earth, and sat in the Chili Peppers’ dressing room discussing their thorny tour schedule. The band still had not agreed to play when Mr. Gore and Queen Latifah presented the award for best rock album.

“We opened the envelope, and lo and behold it was the Chili Peppers,” he said. “And they came onstage, and the confetti fell down, and after I gave them the award a couple of them took me aside on the stage and whispered to me, ‘We’re in.’ I just thought that it was a very neat way to get the news.”
http://www.nytimes.com/2007/07/06/ar...ic/06eart.html





Learning Guitar for Free (for Now) on YouTube
Frank Langfitt

Let's say you want to learn to play guitar — but you don't have the time or money for lessons.

Why not try YouTube? A number of people teach guitar on the video-sharing Web site, offering lessons for free.

In the past few months, two teachers have posted around 200 videos that demonstrate everything from basic strumming techniques to the opening riff of "Sweet Home Alabama." So far, people around the world have watched the videos a total of more than 3.5 million times.

One of the teachers is David Taub, who lives in San Diego and often appears wearing a flannel shirt and a backwards baseball cap. A one-time bar band rocker from New Jersey, he opens each video with the same line: "What's up, good people!"

His most popular video, a simplified version of the Eagles' "Hotel California," has been viewed more than 125,000 times.

The other teacher is Justin Sandercoe, who lives in London, where he teaches guitar and plays with a famous pop singer. He's a mellow presence with an impish grin. Among his song lessons is an acoustic version of Britney Spear's "Hit Me Baby One More Time" that is surprisingly affecting.

The teachers play slowly and use close-ups, showing each finger movement. If you don't get it at first, you can hit replay. It's like having a teacher with endless patience.

The lessons are informal and feel home-made. Sandercoe sometimes appears sitting on his floor, with his hair matted at different angles. Taub's lessons are mostly unedited and include moments like his golden retriever eating his guitar pick.

Taub sees the videos, at least in part, as a marketing tool for his paid instructional Web site, NextLevelGuitar.com. His videos emerged last year as an experiment when one of his students, Tim Gilberg, shot video of Taub teaching.

"We filmed about 10 minutes in his backyard," Gilberg recalls. "I put it up on Google. Then I forgot about it. Basically, two months later I went to see how many visitors we had. There were about 6,800 visitors, and I was like: Wow!"

Then they posted the videos to YouTube, and the audience took off.

On the free videos, Taub teaches the basic chords to popular songs, but he holds off explaining some of the riffs so he can drive people to his site. After playing a riff from Sheryl Crow's "If It Makes You Happy," he stops playing and says, "But if you want to learn that, you're going to have to go to our full site for the lead lines, okay?"

Gilberg says the Web site has hundreds of members after only six weeks.

Justin Sandercoe also has a teaching Web site — justinguitar.com. He has a few ads and takes donations through Paypal to cover the site's hosting fees. But Sandercoe doesn't charge visitors; he says he sees the site as more of a public service.

"I like the idea of being able to deliver quality guitar lessons to people who can't afford lessons, or who are in places where there's not that kind of access to somebody who can teach them the right stuff," he says.

When Sandercoe was growing up in Tasmania, it wasn't easy for him to find great teachers. He hopes his videos will help kids in places like Sri Lanka or India who may not be able to learn otherwise.

Sandercoe now has fans around the world, who often e-mail him with questions and requests for specific lessons. One is Linda Dumitru, who lives in the Netherlands and used to pay $26 for a half-hour lesson. But she stopped, she says, because she couldn't afford it. Then one day she typed "Johnny B. Goode" into YouTube and found one of Sandercoe's videos.

Now, she plays along to his videos in her apartment after dinner. Dumitru says Sandercoe's laid-back approach makes her want to learn. She talks about him as if he were a helpful, next-door neighbor.

"Every time he comes, he says: 'Hi, I'm Justin.' He says, 'Don't worry if you have trouble with the chords, because everybody has problems with it.'"

She adds: "It's like he understands you. He knows what you're going through."

When Sandercoe isn't teaching, he plays with Katie Melua, a star in Europe, so he's used to some attention. But his work on the Internet is raising his profile in ways he didn't expect.

"I got recognized on a bus the other day," he says, sounding amazed. "I literally went into town to do a bit of shopping, and I was on the way back and this kid goes: 'Are you Justin, the guy who teaches from YouTube?'"

But if learning pop songs for free online sounds too good to be true, it may be.

John Palfrey, executive director of the Berkman Center for Internet and Society at Harvard Law School, says most of the songs Sandercoe and Taub teach are under copyright. He thinks it's only a matter of time before a licensing company orders YouTube to take them down.

"There's a very strong argument that the re-use of well-known chords in the sequence the instructor played them would be a violation of the copyright," Palfrey says.

Sandercoe doesn't think he's doing anything wrong. After all, he says, he rarely plays the songs all the way through. But Palfrey says all it takes is a few notes.

And although Sandercoe sees his Internet teaching as a public service, he has benefited from it.

Since he put his Web site up last year, he has developed a long waiting list for the lessons he teaches in person. And both he and Taub say that's still the best way to learn.

If someone tells Sandercoe to take down his song lessons, he says he will. But his most valuable videos are the ones that teach guitar basics — things like strumming, scales and finger-picking.

And even in the digital age, no one holds a copyright on those things.

UPDATE: YouTube Guitar Lessons Pulled in Copyright Spat

Thousands of guitar students lost a valuable resource last week. The most popular guitar teacher on YouTube saw his more than 100 videos yanked from the site. The reason: a music company accused him of copyright infringement for an instructional video on how to play a Rolling Stones song.
http://www.npr.org/templates/story/s...oryId=11778602





Can Cryptography Prevent Printer-Ink Piracy?
Erica Ogg

In the computer printer business, everyone knows the big money comes from the sale of ink cartridges.

Most of these cartridges are made by printer manufacturers and sell for a substantial premium. Some come from unauthorized sources, sell for substantially less and attract the attention of antipiracy lawyers.

Cryptography Research Inc. (CRI), a San Francisco company, is developing chip technology aimed at helping printer manufacturers protect this primary source of profit. The company's chips use cryptography designed to make it harder for printers to use off-brand and counterfeit cartridges.

"We're not saying we can end piracy, but our system is designed to recover from failure," said Kit Rodgers, CRI's vice president of business development.

Not all ink-cartridge remanufacturing is illegal--much of it is, in fact, legitimate--but pirated ink-cartridge technology cuts substantially into original manufacturers' profits.

There are three main ways the $60 billion-a-year worldwide printing industry loses money:

• Used cartridges get refilled and sold as "new"-- instead of as remanufactured.

• Cartridges get illegally replicated through reverse engineering.

• Printers get hacked or physically altered to use any type of ink.

Although solid figures on counterfeiting are impossible to determine, it's estimated to cost the industry at least $3 billion a year, according to the Image Supplies Coalition, a lobbying group formed to fight piracy and cloning in the ink and toner industry.

Cryptography is a method of encrypting data so that only a specific, private key can unlock, or decrypt, the information. It's used in everything from credit cards to digital media. CRI plans to create a secure chip that will allow only certain ink cartridges to communicate with certain printers.

Although this concept isn't new, CRI said its chip will be designed for use in standard fabrication processes, eliminating the need for a special--and more expensive--manufacturing process. CRI also said that the chip will be designed that so large portions of it will have no decipherable structure, a feature that would thwart someone attempting to reverse-engineer the chip by examining it under a microscope to determine how it works.

"You can see 95 percent of the (chip's) grid and you still don't know how it works," Rodgers said. There also are other, secret elements CRI won't reveal for security and competitive reasons.

Skillful hackers can eventually crack almost any code thrown at them and then exploit it for commercial purposes. Once antipiracy encryption is hacked on a product such as high-definition DVDs, for example, it's cracked forever and the discs can be copied and played using the hack. CRI takes a different tack with its protection scheme: its chip generates a separate, random code for each ink cartridge, thus requiring a would-be hacker to break every successive cartridge's code to make use of the cartridge.
"We want to make sure you can't repeat the same attack," said Benjamin Jun, CRI's vice president of technology. "If (hackers) have to rebreak it over and over, it's not as good a business model."

The chip, called CryptoFirewall, is not in use in this industry yet, but it's been widely deployed in the pay-TV sector, where 25 million set-top boxes have a similar technology from CRI embedded, the company said. CRI will also soon debut a similar copy-protection feature for Blu-ray video discs. The printer technology will be available in early 2008, according to CRI.

Counterfeiting and piracy are all but impossible to eradicate, but CRI hopes to at least minimize the financial damage they cause. Today, there are 123 million desktop inkjet printers and 25.6 million laserjet printers in use in the U.S., according to InfoTrends.

In terms of making and selling hardware, printers themselves are one of the least profitable sectors. Often the manufacturers are willing to sell their printers at a loss with the goal of making money on sales of ink. Hewlett-Packard, the biggest PC maker in the world, actually makes the most profit from its printer business: 46 percent of its total earnings in the most recent fiscal quarter were generated by its Imaging and Printing Group. And ink is a key.

As mentioned, remanufacturing cartridges isn't necessarily a problem. There are plenty of companies that refill cartridges and resell them, offering many consumers and businesses cheaper alternatives to the cartridges sold by printer manufacturers.

"There's absolutely nothing wrong with that; it's an accepted part of a competitive industry," according to Tuan Tran, vice president of marketing and sales for HP's supplies business. "That is a legal competition in our minds."

About 11 percent of the money spent on inkjet cartridges and 25 percent of the money paid for monochrome laserjet cartridges goes to companies that resell cartridges they did not manufacture, according to John Shane, director of marketing at InfoTrends.

"The vast majority of that is perfectly legal. Most people believe (the U.S. market for illegal cartridges is) a lot smaller than the illegal market, say, in China," Shane said.

When faced with competition from counterfeiters, HP's Tran said, companies like HP are forced to turn to their "primary weapon" in fighting patent violations, the legal system.

"There are other folks who want to avoid the (proper) process altogether and design a cartridge to work with an HP printer," he said.

In a high-profile 2003 case, Lexmark International, the company that makes printers for Dell, took printer-supplies specialist Static Control Components to court for selling a chip that allowed Lexmark printers to accept any kind of ink cartridge. Lexmark ultimately lost the case, but it hasn't stopped others from trying fiercely to protect their business.

Just last month, HP's German subsidiary accused a Swiss print supplier, Pelikan Hardcopy, of using its patented ink formula and last week filed a separate suit claiming the company is selling remanufactured cartridges labeled as new. In 2005, HP sued another cartridge refiller, Cartridge World, for using an ink formula that it said infringed on its patents.

There are other, less litigious ways to keep counterfeiters at bay. HP uses a holographic security label on its ink cartridges to identify them as legitimate HP products.

InfoTrends' Shane also noted that the printing quality of printer manufacturers' cartridges holds up longer over time when the cartridges are used with the corresponding printers, whose technical specifications can present problems for remanufacturers and counterfeiters.

But a technology like CRI's at least has the potential to cut down on future legal fees and weed out counterfeiters early on in the manufacturing process. The idea is intruiguing to printer makers, although companies like HP say they will wait and see until CRI's chip is actually available.

"If there was a technology that enabled us to protect our intellectual property, absolutely, any company would be interested in it," Tran said.
http://news.com.com/Can+cryptography...3-6193424.html





Exxon Hacks the Yes Men

One day after the Yes Men made a joke announcement that ExxonMobil plans to turn billions of climate-change victims into a brand-new fuel called Vivoleum, the Yes Men's upstream internet service provider shut down Vivoleum.com, the Yes Men's spoof website, and cut off the Yes Men's email service, in reaction to a complaint whose source they will not identify. The provider, Broadview Networks, also made the Yes Men remove all mention of Exxon from TheYesMen.org
before they'd restore the Yes Men's email service.

From: The Yes Men <people @ theyesmen.org>
Subject: Yes Men booted by Exxon; need sysadmin badly
Sender: send26-proxypeople @ theyesmen.org

June 28, 2007
FOR IMMEDIATE RELEASE

EXXON HACKS THE YES MEN
Yes Men badly need sysadmin, server co-location

Contact: people@theyesmen.org

One day after the Yes Men made a joke announcement that ExxonMobil
plans to turn billions of climate-change victims into a brand-new
fuel called Vivoleum, the Yes Men's upstream internet service
provider shut down Vivoleum.com, the Yes Men's spoof website, and cut
off the Yes Men's email service, in reaction to a complaint whose
source they will not identify. The provider, Broadview Networks, also
made the Yes Men remove all mention of Exxon from TheYesMen.org
before they'd restore the Yes Men's email service.

The Yes Men assume the complainant was Exxon. "Since parody is
protected under US law, Exxon must think that people seeing the site
will think Vivoleum's a real Exxon product, not just a parody," said
Yes Man Mike Bonanno. "Exxon's policies do already contribute to
150,000 climate-change related deaths each year," added Yes Man Andy
Bichlbaum. "So maybe it really is credible. What a resource!"

After receiving the complaint June 15, Broadview added a "filter"
that disabled the Vivoleum.com IP address (64.115.210.59), and
furthermore prevented email from being sent from the Yes Men's
primary IP address (64.115.210.58). Even after all Exxon logos were
removed from both sites and a disclaimer was placed on Vivoleum.com
on Tuesday, Broadview would still not remove the filter. (The
disclaimer read: "Although Vivoleum is not a real ExxonMobil program,
it might as well be.")

Broadview did restore both IPs on Wednesday, after the Vivoleum.com
website was completely disabled and all mention of Exxon was removed
from TheYesMen.org.

While this problem is temporarily resolved, the story is far from
over. Meanwhile, though, two bigger problems loom, for which we're
asking your help:

1. THE YES MEN'S SERVER NEEDS A NEW HOME.

Broadview Networks provides internet connectivity to New York's
Thing.net and the websites and servers it hosts, including the Yes
Men's server. Thing.net has been a host for many years to numerous
activist and artist websites and servers.

At the end of July, Thing.net will terminate its contract with
Broadview and move its operations to Germany, where internet
expression currently benefits from a friendlier legal climate than in
the US, and where baseless threats by large corporations presumably
have less weight with providers. At that time, the Yes Men and two
other organizations with servers "co-located" at Thing.net will need
a new home for those servers. Please write to us if you can offer
such help or know of someone who can.

2. THE YES MEN NEED A SYSADMIN.

The Yes Men are desperately in need of a sysadmin. The position is
unpaid at the moment, but it shouldn't take much time for someone who
knows Debian Linux very well. It involves monitoring the server,
keeping it up-to-date, making sure email is working correctly, etc.
The person could also maintain the Yes Men's website (which will be
updated next week), if she or he wants.

Thing.net also needs a sysadmin: someone living in New York who knows
Linux well. The Thing.net position involves some money and the
rewards of working for an organization that has consistently and at
great personal risk supported groups like the Yes Men over the years.

THE YES MEN AND THING.NET THANK YOU!
http://www.infoshop.org/inews/articl...70628201953222





More on Intel Anti-Cheat Technology Revealed
Charlie Demerjian

AS OUR OWN pink and green striped Ferret pointed out the other day, Intel is working on an anti-cheat technology. As is common at Research@Intel day, this is a research project and far from prime time.

The technology, as it is currently proposed has two parts, a communications component and a keyboard and mouse detection piece. It is envisioned that this would lie in the chipset or possibly the firmware, but the demo is strictly software. The game also needs to participate in the scheme in order for it all to work.

The concept is simple, the chipset records all input from the keyboard and mouse, and the game does the same. If the two don't match, something is giving inputs to the game that should not be, and you are 'cheating'. This is how most of the common hacks out there work.

As was said earlier, this could catch game cheats as well as click fraud, but could also help notify users of spyware and trojans. In general, if something emulates input, this should flag it.

I have my doubts about it's real world effectiveness, anything that is a standard defense is vulnerable to a standard crack. To make matters worse, the more effective it is, the higher priority it is to crack, be it for fame or for money.

In the end, I think this may do some good, but I don't think it will be foolproof. The internet is very good at breeding a better class of fools far quicker than the hardware update cycle.
http://www.theinquirer.net/default.aspx?article=40535





15 Free Security Programs That Work
Preston Gralla

From the moment you switch on your PC, your system faces countless Internet-borne dangers, including spyware attacks, viruses, Trojan horses, home-page hijackers, and hackers trying to weasel their way into your system. And the Internet isn't the only source of trouble. Anyone with access to your PC can invade your privacy by prying into which Web sites you visit -- and learning a great deal more as well.

But fighting back is easy. We've found 15 great pieces of software -- firewalls, spyware busters, antivirus software, rootkit killers, and general Internet security tools -- designed to protect you against any dangers that come your way. They're free, they're powerful and they're easy to use. So what are you waiting for? Start downloading.

Preventing and Eliminating Malware

From firewalls to antivirus software to tools for combatting rootkits and spyware, here are some great downloads to protect your system against malicious attacks.

ZoneAlarm
Check Point Software's ZoneAlarm may well be the most popular free firewall on the planet, and the most recent release (finally) protects Vista machines. Arguably, ZoneAlarm is the product that made everyone conscious of the need for firewall protection. It's extremely easy to use, and its method of configuring outbound protection is particularly useful. Whenever a program tries to make an outbound Internet connection, ZoneAlarm announces it with a pop-up alert. You can then permit or disallow the connection, on a one-time basis or permanently. Configuring your level of protection is a simple matter of moving a few sliders. Though the free version of the software is exclusively a firewall, Check Point also offers for-pay security suites. But if all you're looking for is a firewall, stick with the free version.

Comodo Firewall Pro
ZoneAlarm is extremely popular, but that doesn't automatically make it the best free firewall you can find. One formidable contender is Comodo Firewall Pro, which independent testing site Matousec rated as the top firewall. Matousec found that Comodo offered the highest level of antileak protection, one measure of a firewall's effectiveness. Comodo offers true two-way firewall protection, is highly configurable, and (unlike most other firewalls) provides a great view of your system and your Internet connection.

Avast
Tired of dealing with bloated, overpriced security suites that bog down your system and cost an arm and a leg, when all you want is antivirus software? Then get Avast, a superb antivirus program that's free for home and personal use. Because it's a lean piece of software, it imposes a relatively light burden on system resources and RAM. Despite this, it kills viruses in their tracks and has plenty of extras, including live scanning to prevent viruses from infecting your PC in the first place. Avast can scan regular and Web-based e-mail for viruses, too, and it protects against instant messaging viruses, peer-to-peer dangers and more.

AVG Anti-Rootkit
One of the most feared types of malware is the rootkit -- malicious software that many types of antimalware can't detect. Not uncommonly, bad guys use rootkits to hide Trojan horses, which can then be used to take over your PC without your knowledge. AVG Anti-Rootkit's sole purpose is to find and kill rootkits. Run it and it scans your PC, sniffing rootkits out and removing any it finds. (Note that this utility doesn't work with Windows Vista.)

Spyware Blaster
Some of the nastiest kinds of spyware -- autodialers, home page hijackers, and others--install themselves as ActiveX controls. Spyware Blaster protects you against them, blocking the installation of ActiveX-based malware and other types of spyware, and eradicating tracking cookies that might otherwise invade your privacy. The program works with Firefox, Opera or Internet Explorer, and it prevents your browser from being diverted to dangerous sites. One particularly nice touch is the utility's System Snapshot, which (as you'd expect) takes a snapshot of your PC; if your computer gets infected later on, you can revert to the clean version.

Assessing risks to your system

Is it safe or isn't it? Whether you're asking this question about your own system, a site you'd like to visit, or a link you're tempted to click, you need the right tools to help you understand the level of risk involved. These utilities appraise the situation and deliver an informed assessment of where you stand.

AOL Active Security Monitor
Not being a big fan of AOL in general, I was initially leary about downloading and using this free tool. But this simple, straightforward application looks at the security of your PC, reports on what it finds, and makes recommendations. It checks to see if you have antivirus software installed and, if so, whether the definitions are up to date. Then it does the same for antispyware, tests whether you have a firewall enabled, and checks for peer-to-peer software that could pose a danger. The monitor doesn't have any protective capabilities itself, but it warns you if you need some. Be aware, however, that the software doesn't work with Windows Vista. And take its recommendations with a grain of salt: It touts for-pay AOL software such as the AOL Privacy Wall over free software that may be better. Still, if you're looking for some quick security recommendations, it's worth the download.

McAfee SiteAdvisor
On the Web, unlike in the real world, it can be hard to recognize a bad neighborhood when you're wandering around in it. There are no boarded-up windows, no empty storefronts, no hard-looking men lounging on corners or in doorways. In fact, the prettiest and most inviting Web site may harbor all kinds of malware. That's where the McAfee SiteAdvisor comes in. It warns you when a Web site that you're about to visit -- or are already visiting -- may be dangerous. You install it as an Internet Explorer toolbar or as a Firefox plug-in. Then when you search with Google or some other search engine, it displays color-coded icons next to each search result, indicating whether the site in question is safe (green), questionable (yellow), or clearly unsafe (red). It checks sites for downloads that may be dangerous, and for evidence that they will send you spam if you give them your e-mail address. The toolbar offers similar reports about the sites you're currently visiting.

LinkScanner Lite
This is another good tool for determining whether a Web site harbors dangerous content. Open LinkScanner Lite and type in a site URL, and the utility checks the site for dangerous scripts, bad downloads, and other hazardous content. It also warns you about phishing sites and other potentially fraudulent online operations, and it integrates with search sites in much the same way that McAfee Site Advisor does, putting icons next to search results to indicate whether they are dangerous or not. Unlike Site Advisor, though, it doesn't check whether sites harbor adware or spyware.

Internet Threat Meter
Every day, it seems, new threats hit the Internet. Symantec's Internet Threat Meter keeps you informed about the latest arrivals and includes a link to a Symantec site where you can get more information and find fixes. The program runs as a nifty little widget in Windows XP, or as a Sidebar Gadget in Windows Vista, gathering data about the latest threats and reporting the results to you.

Trend Micro HijackThis
Like it or not, no single antispyware program can detect and eradicate all spyware. Consequently your favorite antimalware utility doesn't fully protect you. If you suspect that you've been victimized by spyware, but you haven't been able to track down the source of the trouble using your usual diagnostic software, give HijackThis a try. It thoroughly analyzes your Registry and file settings, and creates a log file reporting its results. If your system is infected with spyware, that file will contain clues about the particular type you're dealing with. Though an expert can analyze the log to try to track down the problem, you shouldn't try to do any advanced analysis yourself unless you possess relevant expertise. Instead, simply upload the log file to a HijackThis Web site, and ask the community there to analyze it for you.

Covering your tracks and cleaning up

Encrypting private information, disabling potentially harmful scripts, and cleaning up accumulated detritus are all ways to strengthen your security. These downloads help you keep things safe and orderly.

Kruptos 2
Worried that someone may gain access to your most private files? Kruptos 2 uses powerful, 128-bit encryption to scramble files and folders so that only you can read them. It's particularly useful for USB flash drives and portable storage devices, which you can encrypt in the entirety. Kruptos 2 also lets you create self-extracting, encrypted archives; shred deleted files so that all traces of them vanish from your hard disk; and even disguise the filename when you encrypt a file.

Transaction Guard
This freebie from commercial security vendor Trend Micro is actually two pieces of security software in one. First, it's a spyware detector and eradicator that monitors your system in real-time for spyware and kills any it finds. Second, it introduces a "secret keyboard" to ensure that passwords and other sensitive information aren't stolen over the Internet. When you visit a site that asks for a password, instead of typing in the password, you enter it on the secret keyboard, which copies the password to the clipboard, from which it gets pasted directly into a Web form. The software runs as an ActiveX control in the System

CCleaner
When you surf the Web, you pick up many traces of your Internet activity. Your PC swells up with temporary Internet files, a history list, cookies, autocomplete entries, and lots more. In addition, programs create temporary files, file lists, and other bits of effluvia. Windows itself constantly monitors what you do, and records information about it in logs. In fact, a snoop could easily gather a great deal of information about you from stuff that's junking up your PC. CCleaner rids your system of all such traces. Not only does it enhance your privacy, but you'll regain hard disk space as well. When I used this utility for the first time, it deleted a whopping 835MB of files.

NoScript
Among the biggest dangers you face when surfing the Web are boobytrapped Java and JavaScript scripts and applets. Evil doers can disguise these harmful pieces of code as useful tools, or can hide them completely while they perform their nasty routines. Unfortunately, there's no practical way for you to separate the good ones from the bad ones. But NoScript, a free Firefox extension, prevents all JavaScript and Java applets from running, except on sites that you designate as safe. The extension presents you with a list of safe sites, which you can add to. NoScript tells you when it has blocked Java or JavaScript on a site. For added protection, this remarkably powerful and flexible tool also blocks Java, Flash, and other plug-ins on sites you don't trust.

File Shredder 2
Delete a file and it's gone from your PC, right? Wrong. Even after you delete a file and flush it from your Recycle Bin, special software can re-create it. Of course, in general, you'd like files to stay deleted when you throw them away. File Shredder 2 overwrites any file or folder with a random string of binary data--multiple times. You have a choice of five different shredding algorithms, and using the program is a breeze: Just choose your files, tell the program to shred them, and they'll be gone forever.

All links on original site - Jack
http://www.computerworld.com/action/...icleId=9026125





Yakety-hack

Talking Trojan Taunts Victims
John Leyden

Malware authors have developed a talking Trojan capable of taunting its victims even as it goes about its work trashing their PCs.

The BotVoice-A Trojan (http://www.pandasoftware.com/com/vir...panda=empresas) informs victims that their Windows PCs have been infected as it deletes files. The malware uses Windows text reader to play the following message:
You has been infected I repeat You has been infected and your system files has been deletes. Sorry. Have a Nice Day and bye bye.

The comments are continuously deleted as the Trojan attempts to delete the entire content of the computer's hard disk, according to an analysis of the malware by anti-virus firm Panda Software.

Even if BotVoice-A only deletes a portion of files it can still render Windows PCs unusable. Changes the malware makes to the Windows registry mean that installed programs will fail to run. BotVoice-A Trojan also disables Windows registry editor, making the process of undoing these changes doubly difficult.

The Trojan spreads via a variety of means, such as by exploiting vulnerabilities to infect visitors to infected websites and by posing on media files on P2P networks
http://www.theregister.co.uk/2007/07/03/talking_trojan/





Building a BitTorrent Box
Ross

Why?

While most of our time on the Internet is spent IM’ing, e-mail, or just browsing the Web, you may run in to situations when you need to do some powerful file transfers. If you use a laptop, you’re use to getting up, suspending your laptop, and running out the door all of the time. But, sometimes you know you just need something dedicated to get work done. You’ll need a solution to retrieve files and serve data when you need it. In this guide, you’ll learn how to set a small headless Ubuntu server used to retrieve BitTorrent files, while even saving them to a external USB hard drive that can be disconnected on the go. You even discover how to remotely administer your server from the Web using SSH, VNC, and an inuitive HTML UI, while being able to retrieve files while you’re away from home.

This tutorial takes for granted you have a spare computer laying around. Building a computer is out of the scope of this article.

The OS Installation
Installing Ubuntu

We’ll be doing a basic Ubuntu Linux installation. Ubuntu is free operating system based on the [1] Gnome desktop and the [2] Linux kernel. But, “Isn’t this suppose to be a headless server?” you may ask. Why don’t we just do a server installation? Well, you could, but you spend more time later on installing the X-server packages needed to configure our BitTorrent client. Besides, you’re not tweaking this out to be a uber-efficient web host for thousands of people. This is targeted mainly towards those who simply need a private file host and BitTorrent client. Anything you don’t need, you can remove later.

Ubuntu can be downloaded from the [3] official Ubuntu website. If the computer you’ll be using is a slower model, you might what to consider using the alternative text-mode installer available instead of the live CD on the site. What your are downloading is an ISO, an image of a CD. This image needs to be burned to a blank CD. Depending upon what operating system you’re using, you can either either a number of applications in Windows to get the job done ([4] CD Burner XP, [5] ISO Recorder), or you can use a simple command in Linux (if the file is in your home directory) to do it:

cdrecord ubuntu-7.04-desktop-i386.iso

Reboot your computer while the CD is in the drive. Select to install Ubuntu, and the setup process is extremely simple. You’ll be asked about what language you’ll want to use, and to setup a user account. The hardest part can be the partitioning, but if all you’ll be using this for is a BitTorrent box, you can just choose to use guided partitioning on to wipe the entire drive. Once the installation has finished, reboot and login using the newly configured user name and password. Now, you’re set to begin configuring the software.

Creating the “Headless” Server

Once the tutorial is finished, you should be able to disconnect the monitor from this computer, and never have to physically touch it again. If you need to configure anything, you’ll be able to do so via a console (SSH) or a remote desktop (VNC). You can leave the monitor and its peripherals connected if you like if its easier, because you now have a fully functional computer with an awesome operating system. If you want to create a headless server, browse through the menus at the top to “Applications->Accessories->Terminal”. From there, type these commands in:

sudo apt-get install openssh-server tightvncserver
sudo update-rc.d gdm remove

Note: You can add the GUI to start again at boot with this command:

sudo update-rc.d gdm defaults

Using these steps, you are installing a few remote administrative packages, and removing the GUI from starting when the computer is turned on. Now record the computer’s IP address somewhere handy by entering the following command:

ifconfig eth0

You’ll want to copy down the address in the “inet addr” field. The next time you restart your computer, you’ll be able to login that IP using SSH with your user name and password. You can use the regular SSH client built into Linux, or use a popular client like [6] Putty if you have a different operating system.

If you’d like to use a graphical interface, there a several clients you can use to connect to the VNC session, such as [7] RealVNC. Once you’ve logged in via SSH, you can always start a remote desktop session (if needed) using VNC:

vncserver -geometry 800×600

And kill it using:

vncserver -kill :1

Depending on how you want to work on the server is your choice. First, you can use SSH to connect via a console to enter commands. Secondly, if you want to configure it using a remote desktop, you can use VNC. Or, you can still use the computer as a regular desktop and finish the configuration locally. All of the steps from now on can be done one of those three ways. Note, when we need to configure Azureus, you will have to use a graphical interface to do so. Now you’re set to configure the software needed to build the BitTorrent box.

Configuring the External Hard Drive (Optional)

After the installation is done, you can optionally add an external hard drive to make it easier to move your data. We’ll be using a service called “[8] autofs” to automatically detect your hard drive and make it ready to share on the network each time you plug it in. To install autofs, use this command:

sudo apt-get install autofs

Once that finishes, you’ll want to connect your external hard drive and find out what device Ubuntu assigns it. After plugging in the hard drive wait a few seconds and then enter this command:

dmesg | tail

You should see something very similar to this:

[47820.164000] sdb: Write Protect is off
[47820.164000] sdb: Mode Sense: 03 00 00 00
[47820.164000] sdb: assuming drive cache: write through
[47820.164000] SCSI device sdb: 398297088 512-byte hdwr sectors (203928 MB)
[47820.168000] sdb: Write Protect is off
[47820.168000] sdb: Mode Sense: 03 00 00 00
[47820.168000] sdb: assuming drive cache: write through
[47820.168000] sdb: sdb1
[47820.184000] sd 4:0:0:0: Attached scsi disk sdb
[47820.184000] sd 4:0:0:0: Attached scsi generic sg2 type 0

The line “[47820.168000] sdb: sdb1” is what you’ll want to pay attention to. This tells us that Ubuntu is assigning the device to “sdb”, and it’s partition is labeled as “sdb1″. “1″ being the first and only partition on the disk. Next, we’ll what to find out what kind of partition is on the disk. Enter this into the console:

sudo fdisk -l /dev/sdb

The “System” column will display what kind of partition it is. Take note on what type of partition it is for the following instructions. If it’s “HPFS/NTFS”, you’ll want to use the “ntfs-3g” driver. If it contains “FAT”, you’ll use the “vfat” driver. Finally, if it’s “Linux”, you can just use the “auto” driver. Note, if it is a NTFS partition, you will have to manually install the new NTFS read/write drivers by using:

sudo apt-get install ntfs-3g

Next, we’ll want to add this information to the autofs service. Use to following command to edit to autofs master configuration file:

sudo nano /etc/auto.master

Note: You can replace “nano” with your preferred text editor. To save a file in nano, use the keyboard shortcut Ctrl+O. To exit, press Ctrl+X.

Now, find the line containing:

#/misc /etc/auto.misc

Change it to:

/misc /etc/auto.misc –timeout=60

Save it and edit the autofs “miscellaneous” configuration file next by entering this command:

sudo nano /etc/auto.misc

Add this to the bottom of the file:

external -fstype=ntfs-3g :/dev/sdb1

Remember to replace “ntfs-3g” with the type of driver you found earlier in this section. Note, if you are using “ntfs-3g”, you might want to append “,force” , making it “-fstype=ntfs-3g,force”. This makes it easier to use uncleanly unmounted drives. This maybe a little risky, but it makes it so much easier to troubleshoot.

Finally, restart the autofs service:

sudo /etc/init.d/autofs restart

Now, every time anything tries to find files in the “/misc/external” directory, Ubuntu will attempt to automatically mount that drive to be used.

The BitTorrent Client
Installation

Now for the heart of your BitTorrent box. We’ll be using the [9] Azureus BitTorrent client because it has a huge plug-in base, and we can configure it to run in a silent service mode without needing the GUI. The first thing you’ll want to do is to download the Azureus client and find a simple place to keep it in. You’ll need to install the Azureus dependencies, download the client, and retrieve the plugins. Enter the following commands to do so:

sudo apt-get install sun-java5-jre libswt3.2-gtk.java
mkdir ~/software
cd ~/software
mkdir azureus
cd azureus
wget \
http://prdownloads.sourceforge.net/a...4.jar?download \
-O Azureus2.jar
wget http://azureus.sourceforge.net/cvs/log4j.jar
wget http://azureus.sourceforge.net/cvs/commons-cli.jar
wget http://nerdica.com/wp-content/uploads/2007/06/azureus
wget http://nerdica.com/wp-content/upload...06/azureus-gui
mkdir ~/bin
mv azureus-gui ~/bin/
chmod +x ~bin/azureus-gui

Log out and then log back in for the new program files in your ~/bin/ directory to be recognized. Then edit the service configuration file:

sudo nano ~/software/azureus/azureus

Replace “(your user name)” with your actual user name. Do the same with the azureus-gui launcher:

sudo nano ~/bin/azuereus-gui

Save it, and then move it to it proper location using this command:

sudo mv ./azureus /etc/init.d/azureus
Plug-in Configuration

Now we’ll want to open up Azureus to edit a few configuration options to get everything in place, and to install the web UI for remote administration. Enter this command to open Azureus:

azureus-gui

Follow the simple setup wizard until the application has reached the main window. Once the initial configuration is done, you can now close the program by browsing to “File->Exit”. Next we’ll install the [10] HTML Web UI plug-in. Enter the following commands do download and install it:

wget http://azureus.sourceforge.net/plugi...ebui_0.7.6.jar
mkdir .azureus/plugins/azhtmlwebui
mv azhtmlwebui_0.7.6.jar .azureus/plugins/azhtmlwebui/

You can now use and Internet Browser such as Firefox to browse straight to the HTML Web UI whenever the Azureus service is running to download torrents. You can do so by entering the IP address of the BitTorrent Box, followed by the port “6886″. For example:

http://1.1.1.1:6886/

You can add new BitTorrents by browsing to the “Upload” tab, and you can monitor all of your BitTorrents by browsing to the “Downloads” tab. You can tweak a few bandwidth settings by clicking on “Options”. Enjoy your sleek, easy accessible Azureus Web UI.

Now, if you have an external hard drive configured, you can setup Azureus to to move all completed torrents to the external hard drive. That can be set by reopening the Azureus GUI (azureus-gui). Browse the menu to “Tools->Options”. Then, browse the left menu to “Files->Completion Moving”. Check the widget labeled “Move completed files (after download)” and change the directory to “/misc/external”. If you do not have an external hard drive to use, just leaves all those options as the default.

If you’d like, you can also configure a user name and password to use for the Web UI. Browse the left menu to “Plugins->HTML Web UI”. At the bottom of the configuration panel are options to set up a user name and password.

Save your configuration by clicking “Save” at the bottom of the panel and exiting Azureus.

Starting the Service at Boot

Now that everything is set, you’ll want to make sure Azureus start up with your computer boots. Do this by adding the service to the Ubuntu runlevels at boot and shutdown with the following commands:

sudo cp ~/software/azureus/azureus /etc/init.d/
sudo chmod +x /etc/init.d/azureus
sudo update-rc.d azureus defaults

Now, Azureus will start when the server is booting. If you what to manually stop and start the service, you can do so by entering:

/etc/init.d/azureus stop
/etc/init.d/azureus start

Note: Azureus is now running in a completely silent mode. You will not see the Azureus icon in the icon tray of Gnome when the computer boots. If you ever need to configure Azureus, make sure to stop the service and then open the GUI to do so.

You can also find out about more of this section of the tutorial by visiting the [11] AzureusWiki (copyrighted under the [12] GFDL) page about it.

Hamachi
Installation

[13] Hamachi is a VPN software used to easily create small personal networks that will burn through just about any firewall. The Linux client is available on their [14] website. You’ll want to set this up so it will be much easier to connect to the Samba share hosting all of your files. Installing Hamachi is about the same as configuring Azureus. You’ll have to download the software, and then configure it to run at boot. You’ll begin by download the software package and extracting it somewhere useful. Enter the following commands to do so:

cd ~/software
wget http://files.hamachi.cc/linux/hamach...-20-lnx.tar.gz
tar xvfz hamachi-0.9.9.9-20-lnx.tar.gz
wget http://nerdica.com/wp-content/upload...amachi_service \
-O hamachi-0.9.9.9-20-lnx/

Next, install the software

cd hamachi-0.9.9.9-20-lnx
sudo make install
sudo ./tuncfg/tuncfg

Then you’ll want to add a new Hamachi service to the server. First, you need to start by adding a new driver to be loaded when the computer starts. Edit Ubuntu’s modules configuration file to do so:

sudo nano /etc/modules

Append “tun” to the end of the file. Hamachi uses the “tun” module to be able to create a fake network device.

Now, we’ll add the new Hamachi service configuration. Download the Hamachi service configuration file and add it to the the proper runlevel as follows:

sudo cp ~/software/hamachi_service /etc/init.d/
sudo chmod +x /etc/init.d/hamachi_service
sudo update-rc.d hamachi_service defaults

Configuration

Next, you’ll want to create and join a network to join. First, you’ll start be creating a Hamachi account to use. Enter the following commands to create and account, and to go online:

hamachi-init
hamachi start
hamachi login
hamachi set-nick MyUserName

Make sure you replace “MyUserName” with a nick you would like to be identified by. Then, create a network to share you data with these few Hamachi commands, while replacing MyNetwork and MyPassword with your personal new network preferences:

hamachi create MyNetwork MyPassword
hamachi go-online MyNetwork

Now you have Hamachi completely set up for private LAN use. After you reboot, Hamachi will start automatically and connect to your network. If you ever want to reconfigure Hamachi for new networks, do so as root:

sudo hamachi join NewNetwork NewPassword

The last thing you’ll need to do is record your Hamachi IP for safe-keeping. You can do so by entering the following into a terminal:

ifconfig ham0

Copy down the address listed in the “inet addr” field.

Samba

Now, to finally be able to download your BitTorrents and to share them across your personal network. We’ll be using [15] Samba, a implementation of the Windows SMB service for Linux. Samba allows you to not only copy files, but to stream them on the fly.

Installation

To begin, enter the following command to install the Samba package.

sudo apt-get install samba smbfs

Next, you’ll need to create a user account to access the Samba share. Do so by adding the user name to the Samba user list:

sudo smbpassword -a (your user name)

Replace “(your user name)” with your personal user name. Enter in your password twice when it asks.
Next, you’ll have to edit the Samba configuration file. Do so by entering the following:

sudo nano /etc/samba/smb.conf

Find the line with:

; security = user

And uncomment it by removing the semicolon like so:

security = user

Now you’ll want to add an entry to share the directory where all of your downloaded BitTorrents have moved to. You can do so by appending an entry like so at the bottom of the “smb.conf” file:

[Downloads]
comment = Contains Azureus Downloads
path = /misc/external
browseable = yes
valid users = (your user name)
writable = yes

If you did not configure the external hard drive, the default directory Azureus hold transfers is in the “/home/(your user name)/Azureus Downloads/” directory. Remember to replace “(your user name)” with your personal user name. Also, you’ll have to leave the entire directory in quotes, because it contains a space. Replace “/misc/external” with that if needed. Now to test the Samba configuration file and to restart the Sambe service by entering the following:

sudo testparm
sudo /etc/init.d/samba restart

Once all parts of this tutorial are complete, you should be able to browse to the Hamachi IP (”http://5.x.x.x:6886″) address of the BitTorrent box to send and queue BitTorrent files. Use your file manager, you can browse to the Samba share to pick them up later. In Ubuntu you can browse your downloads by going to “Places->Connect to Server”. Once the dialog box pops up, change the server type to “Windows share”, and enter in the login information for your server. In Windows, you can open Windows Explorer, type the address of your server into the URL bar (”\\5.x.x.x”), and browse your files.


In Conclusion

After completing this tutorial, you now have a fully functioning BitTorrent box configured to share its downloads across a secure, private network. You can even copy your downloaded files straight off the USB external hard drive, if you have one. Once you have a [16] Hamachi client configured on you personal desktop or laptop, you can connect to the BitTorrent box no matter where you are. There are many things you can do after this point. You can use it to share music, movies, and other personal data. You can use port forwarding on a router to give open access to your BitTorrent box across the Internet. With these simple tools, you are now able to download and share data however you like.


URLs in this post:
[1] Gnome desktop: http://www.gnome.org/
[2] Linux kernel: http://www.linux.org/
[3] official Ubuntu website: http://www.ubuntu.com/getubuntu/download
[4] CD Burner XP: http://www.cdburnerxp.se/
[5] ISO Recorder: http://isorecorder.alexfeinman.com/isorecorder.htm
[6] Putty: http://www.chiark.greenend.org.uk/~s.../download.html
[7] RealVNC: http://www.realvnc.com/
[8] autofs: http://freshmeat.net/projects/autofs/
[9] Azureus: http://azureus.sourceforge.net/
[10] HTML Web UI: http://azureus.sourceforge.net/plugi...in=azhtmlwebui
[11] AzureusWiki: http://www.azureuswiki.com/index.php...sSwingUIAtBoot
[12] GFDL: http://www.gnu.org/copyleft/fdl.html#TOC1
[13] Hamachi: https://secure.logmein.com/products/hamachi/default.asp
[14] website: http://files.hamachi.cc/linux/
[15] Samba: http://us3.samba.org/samba/
[16] Hamachi client: https://secure.logmein.com/products/hamachi/list.asp

http://nerdica.com/?p=30





Closer Look at P2P Technology

Bittorrent is almost part of the online media establishment, but why has it become so successful?
Kelvyn Taylor

The internet was invented to allow people to easily share files and information. But ever since the original Napster launched in 1999, file sharing has had a bad name.

This is due to the fact that people quickly realised they could easily find and download files that they weren’t supposed to, such as illegally copied music mp3s.

But public demand for the capabilities unleashed by Napsters’s peer-to-peer technology (P2P) spawned a whole host of ‘me-too’ products and protocols, including Kazaa, Grokster and Gnutella.

Many of these have now gone to the wall; the Napster brand was reborn as a (non-P2P) legitimate music download service, Kazaa seems to be in virtual hibernation and Grokster was infamously closed down by the US Supreme Court.

But there’s one open source P2P technology – called Bittorrent – that has survived and prospered, even though it’s just as open to abuse as any file-sharing technology. Invented in 2001 by programmer Bram Cohen, it was developed as a way to efficiently distribute large files without the need for a dedicated file server. This reason alone helped it to become a popular – and legal – way to make Linux distributions available for download.

You might consider it a niche application, but an awful lot of people are using it – more than 150 million according to www.bittorent.com. Statistics published by Cachelogic (www.cachelogic.com) in 2004 showed that Bittorrent traffic accounted for more than 35 per cent of all web traffic worldwide. Bittorrent.com itself is currently ranked in the top 2,000 websites according to the website monitoring service Alexa.

Smart moves
In 2005 Bittorrent Inc. (the company that Cohen and partner Ashwin Navin created in 2004) neatly distanced itself from the shady side of P2P by doing a deal with the Motion Picture Association of America (MPAA), and agreeing to remove any illicit copyrighted works from Bittorrent’s commercial site.

Since then, Bittorrent.com has started offering paid-for legal TV and movie downloads. In 2006 it signed a breakthrough deal for online movie distribution with Warner Brothers. It now seems to be going from strength to strength, featuring video, music, TV and game content from top media brands such as 20th Century Fox, MTV, Paramount and Eidos.

Bittorrent, the technology, remains open source and is available for anyone to develop an application around, which is another reason it’s remained so popular, But how does it work, and just what makes it so suited to sending digital movies or huge Iso files around the world? To answer this, first we need to step back and look at some of the basics of P2P technology.

Peer pressure
There are two main ways to share a file between lots of users. The traditional and familiar client-server method is to put the file on a central server and allow multiple clients (PCs) to access it directly.

There’s no need for any communications between the clients – all they need to do is talk to the server. But this means that the server has to be able to cope with delivering multiple copies of the file to lots of clients simultaneously, otherwise the server becomes a bottleneck. For sharing via the relatively low-bandwidth internet this can obviously be a major problem, leading to high costs and congestion at the server.

A peer-to-peer architecture simply does away with the central server and allows any PC connected to the network (a peer) to act as both a client and a server. Peers can then communicate directly with each other to obtain the files they need. This gives several benefits, the most important being data redundancy and no need for massive bandwidth on any one peer machine. A peer can limit peer connections or file downloads depending on how much bandwidth it has available.

Napster used a proprietary P2P protocol to organise the downloading between peers and added a central server to register and validate users and store an index of what files were available on which clients.

It then wrapped it all up in an easy-to-use application that enabled users to search for a particular file or even chat to other Napster users.

Napster wasn’t ‘true’ P2P, but a centralised P2P system, because it relied on a central server for most administrative tasks, and didn’t fully use the computing power of the peers.

A ‘pure’ P2P architecture doesn’t need any central servers at all, sharing all the indexing and admin tasks between the clients as well. Such an architecture is often called a decentralised (or fully distributed) P2P network. Examples that are still going strong are the Gnutella and Edonkey networks. The once popular Kazaa, created by the inventors of Skype, was also a decentralised network.

As we’ll see below, Bittorrent falls between these extremes, adding new and unique twists that make it a hybrid between ‘pure’ P2P and a traditional client-server architecture.

Naming names
In any discussion of P2P, it’s easy to get muddled between application and protocol names, so let’s clear a few names out the way first. Napster was an application based on its own proprietary protocol, Kazaa software used the Fasttrack protocol and Gnutella is the name of the protocol. Edonkey is also a protocol.

For any particular protocol, many client applications are usually available, offering a variety of different features. For example, Gnutella clients include Limewire, Bearshare and Morpheus. Emule is the most popular Edonkey client.

Confusingly, Bittorrent is the name of the file-sharing protocol, the company, the associated website and the ‘official’ free software client, but there are dozens of alternative Bittorrent clients available, such as Utorrent and Azureus. For the purposes of this feature we’ll use ‘Bittorrent’ for the protocol or client and ‘Bittorrent.com’ for the company.

Torrents, seeds and trackers
From day one, Cohen designed Bittorrent and its interface to be easy to use, reliable, give fast downloads and avoid the problem of unfair P2P behaviour. In a normal P2P network, once a client has downloaded a file, it has no further incentive to make that file available to other clients. So the P2P network becomes reliant on a few generous clients and becomes very slow and inefficient.

In Bittorrent terminology, clients that are downloading are called ‘leechers’, whereas clients that are actively uploading are called ‘seeds’. A P2P network with only leechers wouldn’t work for obvious reasons.

Bittorrent tries to prevent this behaviour by forcing clients to do simultaneous downloads and uploads and using other tit-for-tat tricks in the protocol. The easiest way to explain this is to look at how you go about downloading a file in practice.

To download a file via Bittorrent, you first need a Bittorrent client. Probably the best one to start with is the official free client from Bittorrent.com. Although it’s a commercial website, you don’t have to register and there’s lots of free content that you can use to see how it all works.

Divide and conquer
The key to Bittorrent is its unique way of dividing files into small chunks called ‘pieces’ (typically around 256KB) to download.

A ‘torrent’ file is a small file (typically a few kilobytes) containing metadata that enables a client to download a file (or a collection of files) over the Bittorrent network.

When a torrent file (with an extension of .torrent) is created, an index of the source file’s pieces and data integrity information (an SHA1 hash number) for each piece is generated so that clients can verify they have received uncorrupted data. The protocol subsequently breaks these pieces into 16KB sub-pieces, to queue up TCP transfers (pipelining) and ensure maximum use is made of bandwidth.

To start a P2P download you first need to find a torrent file for the content you’re after. You can do this via Bittorrent.com’s search engine or any of the torrent search sites, of which Torrentspy is probably the largest. Be aware that outside the commercial sites, Linux and open source download sites such as www.distrowatch.com and http://sourceforge.net, there’s no way to tell whether you’re downloading legal content or not. And if you’re not sure, it’s best to assume the worst.

Torrent files don’t contain any of the actual file data; the metadata in the torrent file describes how many pieces of the file need to be downloaded, how big they are plus error-checking information to ensure you’re not downloading junk. The file also contains information on the ‘tracker’ for this file.

Trackers are Bittorrent’s way of letting downloaders find each other. They’re not involved in downloading the files, and they store no files themselves. In theory, anyone can run a tracker, but normally users rely on publicly available free tracker servers.

Many clients now support trackerless torrents, using DHT (distributed hash table) technology. In this scheme, each client effectively becomes its own tracker, so you don’t need one of these tracker server. The downside is that it only works while your PC is turned on.

Swarming
When a file’s made available via a torrent file and clients start sharing it, this is known as a swarm. The tracker provides all the members of the swarm with the IP addresses and TCP port numbers of a random selection of other members. Each client then tries to get the full collection of pieces from other clients, which is where the ingenuity of Bittorrent lies.

As soon as you’ve collected a few pieces of the file, the Bittorrent client makes these available to all the other members of the swarm, so you’re forced to simultaneously download and upload data to get the complete file.

This not only stops most of the usual problems of ‘greedy’ leechers, but also makes downloads faster the more clients there are in the swarm. With a healthy swarm, it’s quite easy to saturate all your available download bandwidth, even though each of the swarm members may only be uploading tiny amounts of data.

It’s like downloading from a super-fast web server, but without the need for high-end server hardware. This is why it’s such a popular way to distribute large files such as Linux distributions, but so unpopular with ISPs trying to maintain ‘fair’ contention of user bandwidth.

There are downsides to Bittorrent’s approach. Clients with a complete version of the file available to upload become seeds. The more seeds and leechers available for a particular torrent, the more efficient the downloading process. This tends to make torrents die out rapidly, with large swarms and fast downloads when a popular torrent first appears, but dying out to a trickle over time.

Looking ahead
We’ve already touched on one innovation – trackerless torrents – but there are several other possibilities waiting in the wings.

One is the idea of Bittorrent media streaming. Streaming is notoriously demanding on server resources for decent quality content, particularly video, so the idea is to try and leverage the power of the swarm to do the task cheaply.

Some companies are now starting to roll out streaming solutions based on Bittorrent or other P2P protocols.

Another technique called Similarity Enhanced Transfer (SET) claims to be able to speed up downloads by exploiting the fact that identical files are often labelled differently, and tries to spot identical data in different files. Again, there’s no implementation of this yet.

Of more practical interest is the incorporation of Bittorrent clients in hardware such as routers and Nas storage devices. In 2006, Bittorrent announced partnerships with Asus, Planex and Qnap to produce such hardware, and you can see one of the Qnap models in our Nas group test on page 97. We’ve also seen a Bittorrent client built in to the Excito Bubba home server we reviewed in our August 2007 issue.

P2P comes in from the cold
There was a time when to mention Bittorrent in polite company wasn’t a good idea. P2P is still viewed as the seedy side of the web, even though you can find P2P file sharing built into Windows Live Messenger, and Skype is a massive P2P-based VoIP service from the creators of Kazaa. But few pundits ever foresaw the bizarre twists that have led to us now seeing Warner Brothers and Paramount logos on the Bittorrent home page.

Of course, there’s nothing to stop the Bittorrent protocol from being used for illicit purposes, but that’s not the fault of the technology. The biggest story now is the ongoing fight between the torrent search sites, content pirates and the authorities, which is heading slowly but surely for a big showdown. Whatever the outcome, we predict that you’ll be hearing a lot more of Bittorrent and other P2P technologies over the coming months.

Bittorrent and security
Downloading via Bittorrent isn’t intrinsically any more dangerous than downloading an ordinary file from a website – which these days is perhaps cold comfort.

However, because you’re not downloading a single file from one computer, but lots of verified pieces from different computers, it’s much harder for malicious users to sneak in corrupted, pornographic or virus infected files; a practice Kazaa users were notorious for.

If the original file contains malware, there’s no way to check until you’ve downloaded it, though. Standard anti-virus and anti-spyware programs are sufficient protection, but there are other security aspects of Bittorrent to be aware of.

Any P2P application requires peers to be able to connect directly to your PC. If you’re using a firewall, this means enabling port forwarding for the relevant TCP ports (see here for an explanation of how ports work).

Many routers now have pre-configured settings for applications such as Bittorrent (see screenshot for an example). If your router supports Universal Plug and Play (Upnp), clients such as the official Bittorrent one, can do all the configuration for you automatically. A decent SPI (stateful packet inspection) firewall will also help ensure your safety.

Bittorrent needs these ports open to upload to other peers, but downloading will still work. You won’t get the best performance, though, as other peers may start to ‘snub’ you for not offering uploads.

Finally, you should be aware that when you’re connected to a public torrent tracker and performing either uploads or downloads, your IP address is easily viewable by the whole Bittorrent world via the client software. It’s not designed to be anonymous, so if that concerns you, then either use private trackers or avoid Bittorrent altogether.
www.computeractive.co.uk/2193584





P2P Traffic Shifts Away From Music, Towards Movies
Eric Bangeman

One of the stated goals of the music industry's barrage of lawsuits against P2P users has been to cut down on peer-to-peer traffic. Ars talked to Eric Garland, cofounder and CEO of Big Champagne Online Media Management to get a sense of whether the RIAA's efforts are bearing fruit and to find out what other trends the media measurement company has seen over the last several months.

As it turns out, P2P-based music sharing has remained relatively flat over the past year. During May 2006, Big Champagne reported just shy of 9 million simultaneously connected unique peers sharing music on the popular P2P networks. One year later, that number had increased only slightly to 9.35 million. "There have been years when we have seen double-digit percentage growth," Garland told Ars. "Compared to that, the last 12 months have been rather flat." In fact, on a month-by-month basis, traffic during 2007 has been flat, and almost all of the growth Big Champagne has seen falls within the margin of error.

It could be that the threat of lawsuits are keeping people from popular P2P networks like Limewire, driving them instead to a legal outlet like the iTunes Store. It might also be that the market has reached saturation. "It's like e-mail," said Garland. "For a number of years, the population using e-mail was increasing dramatically. Once everyone who wanted e-mail had e-mail, growth flattened out."

The news for the motion picture and television industries is not so good. BitTorrent has become far more popular: "We've seen real, dramatic growth in BitTorrent usage," notes Garland. That has resulted in a greater average population of seeders and leechers per torrent. In May 2006, the average torrent had 817,588 people participating. 12 months later, that figure had jumped to 1,357,318 seeders and leechers: a 66 percent year-over-year growth rate.

Curiously enough, Big Champagne is also noticing an increase in music traffic on BitTorrent. "It's the most popular place to download albums," said Garland. Big Champagne has recently noticed an increased number of torrents consisting of rips of HD discs. "There's a quite small, but active population that's downloading the HD features," according to Garland. But when it comes to HD content, TV shows are by far more popular.

The oldest online source for illicit files is Usenet, and Garland says his company has seen more activity there as well. Big Champagne's analysis of Usenet traffic is limited to title-specific analysis, but that venue is "surging," says Garland. "There's increasing interest in and use of newsgroups."

Garland also believes that the population of darknets is on the rise but notes that it's difficult to get a holistic view of what's going on with "underground" networks. He doesn't see a large-scale migration to darknets happening anytime soon, however. "Most people are satisfied by what they find on P2P, even though some of them have had bad experiences with it such as lawsuits and malware," he said. "People are creatures of habit and loath to change."
Same as it ever was

Overall, file-sharing is as popular as ever, and BitTorrent is leading the way as people increasingly look for movies, TV shows, and full albums. Two of the more popular torrent sites, TorrentSpy and IsoHunt, have recently announced plans to begin filtering copyrighted content from their trackers using a hash-based system. Although those two sites are likely to see a dip in traffic if copyrighted content is removed, there are plenty of other torrent sites up and running, including the infamous Pirate Bay.
Big Champagne's data also points out the difficulty that content creators are having in controlling the spread of file-sharing. Despite the hundreds of lawsuits filed by the RIAA, music traffic has yet to show any downward movements. And although IsoHunt and TorrentSpy have plans in place to filter out copyrighted content, that's not likely have much of an effect on overall BitTorrent traffic.

What used to be music industry's problem is becoming the movie and television industry's problem, and it may take some drastic changes to how the studios and networks do business to bring changes about. So far, the industries have shown little or no inclination to do so, setting themselves up for a protracted battle that there are few indications that they can win.
http://arstechnica.com/news.ars/post...ds-movies.html





Online File Sharing Company Launches Its Free File Sharing Service
Press Release

Online file sharing provider, Driveway (http://www.driveway.com) recently announced the introduction of its free file sharing solution that helps individuals share files effortlessly.

Driveway is a free online file sharing service. Using an Internet enabled computer, users can upload/share files with others. This entirely eliminates the need for complicated registration steps since one can share files by simply logging onto http://www.driveway.com
One cannot but help wonder how file sharing can be made so simple and uncomplicated using the Parkit(TM) links - even for large files of upto 500 MB!

What's more users can enhance their favorite email providers such as Gmail, Hotmail with the power of Driveway - for free.

Driveway creates a short user-friendly Parkit (TM) link that can be posted anywhere including on emails and blog postings.

Says, Ms. Kokila C, a Technical Manager at Driveway, "Sharing files has never been this easy, convenient and effortless. It's the simple concept of "Share it, email it!" One cannot but help wonder how file sharing can be made so simple and uncomplicated using the Parkit(TM) links - even for large files of upto 500 MB!"

Explains Mr. Gokula Prakash H, a Senior Graphics Designer/Architect at Driveway; "Typically most popular email services that are around today have a maximum limit on the size of files one can upload. Driveway helps break this size limit barrier by creating Parkit(TM) links to files of size ranging from a few odd MB to almost 500 MB! This eliminates redundancy and improves file accessibility - irrespective of the size of the file."

The Driveway Advantage
Driveway offers a simple solution to upload or share multiple files with your contacts, anywhere in the world. You can upload, share and download files for viewing and even delete them. Recipients receive an e-mail containing the link with which they can download and use to view the file(s). The core philosophy behind Driveway is to make file sharing simple and remove restrictions on the size of files that are to be shared.

Further information at http://www.driveway.com
http://www.prweb.com/releases/2007/7/prweb537721.htm





Analysis: The White Lies ISPs Tell About Broadband Speeds
Art Reisman

In a recent PC Magazine article, writer Jeremy Kaplan did a fantastic job of exposing the true Internet access speeds of the large consumer providers.

He did this by creating a speed test that measured the throughput of continuous access to popular Web sites like Google, Expedia, and many others. Until this report was published, the common metric for comparing ISPs was through the use of the numerous Internet speed test sites available online.

The problem with this validation method was that it could not simulate real speeds encountered when doing typical Web surfing and downloading operations. Plus, ISPs can tamper with the results of speed tests -- more on this later.

When I saw the results of PC Magazine's testing, I was a bit relieved to see that the actual speeds of large providers was somewhere between 150 Kbit/s and 200 Kbit/s. This is a far cry from the two, three or even four megabit download speeds frequently hyped in ISP marketing literature.

These slower results were more in line with what I have experienced from my home connection, even though online Internet speed tests always show results close, if not right on, the advertised three megabits per second. There are many factors that dictate your actual Internet speed, and there are also quite a few tricks that can be used to create the illusion of a faster connection.

Before I continue, I should confess that I make my living by helping ISPs stretch their bandwidth among their users. In doing this, I always encourage all parties to be honest with their customers, and in most cases providers are. If you read the fine print in your service contract, you will see disclaimers stating that "actual Internet speeds may vary", or something to that effect. Such disclaimers are not an attempt to deceive, but rather a simple reflection of reality.

Guaranteeing a fixed-rate speed to any location on the Internet is not possible, nor was the Internet ever meant to be such a conduit. It has always been a best-effort mechanism. I must also confess that I generally only work with smaller ISPs. The larger companies have their own internal network staff, and hence I have no specific knowledge of how they deal with oversold conditions, if they deliberately oversell, and, if so, by how much. Common business sense leads me to believe they must oversell to some extent in order to be profitable. But, again, this isn't something I can prove.

A matter of expectations

How would you feel if you pumped a gallon of gas only to find out that the service station's meter was off by 10 percent in its favor? Obviously you would want the owners exposed immediately and demand a refund, and possibly even lodge a criminal complaint against the station. So, why does the consumer tolerate such shenanigans with their ISP?

Put simply, it's a matter of expectations.

ISPs know that new and existing customers are largely comparing their Internet-speed experiences to dial-up connections, which often barely sustain 28 Kbit/s. So, even at 150 Kbits/s, customers are getting a seven-fold increase in speed, which is like the difference between flying in a jet and driving your car. With the baseline established by dial up being so slow, most ISPs really don't need to deliver a true sustained three megabits to be successful.

As a consumer, reliable information is the key to making good decisions in the marketplace. Below are some important questions you may want to ask your provider about their connection speeds. It is unlikely the sales rep will know the answers, or even have access to them, but perhaps over time, with some insistence, details will be made available.

Five Questions to Ask Your ISP

1.) What is the contention ratio in my neighborhood?

At the core of all Internet service is a balancing act between the number of people that are sharing a resource and how much of that resource is available.

For example, a typical provider starts out with a big pipe of Internet access that is shared via exchange points with other large providers. They then subdivide this access out to their customers in ever smaller chunks -- perhaps starting with a gigabit exchange point and then narrowing down to a 10 megabit local pipe that is shared with customers across a subdivision or area of town.

The speed you, the customer, can attain is limited to how many people might be sharing that 10 megabit local pipe at any one time. If you are promised one megabit service, it is likely that your provider would have you share your trunk with more than 10 subscribers and take advantage of the natural usage behavior, which assumes that not all users are active at one time.

The exact contention ratio will vary widely from area to area, but from experience, your provider will want to maximize the number of subscribers who can share the pipe, while minimizing service complaints due to a slow network. In some cases, I have seen as many as 1,000 subscribers sharing 10 megabits. This is a bit extreme, but even with a ratio as high as this, subscribers will average much faster speeds when compared to dial up.

2.) Does your ISP's exchange point with other providers get saturated?

Even if your neighborhood link remains clear, your provider's connection can become saturated at its exchange point. The Internet is made up of different provider networks and backbones. If you send an e-mail to a friend who receives service from a company other than your provider, then your ISP must send that data on to another network at an exchange point. The speed of an exchange point is not infinite, but is dictated by the type of switching equipment. If the exchange point traffic exceeds the capacity of the switch or receiving carrier, then traffic will slow.

3.) Does your provider give preferential treatment to speed test sites?

As we alluded to earlier, it is possible for an ISP to give preferential treatment to individual speed test sites. Providers have all sorts of tools at their disposal to allow and disallow certain kinds of traffic. It seems rather odd to me that in the previously cited PC Magazine test, which used highly recognized Web sites, the speed results were consistently well under advertised connection speeds. One explanation for this is that providers give full speed only when going to common speed test Web sites.

4.) Are file-sharing queries confined to your provider network?

Another common tactic to save resources at the exchange points of a provider is to re-route file-sharing requests to stay within their network. For example, if you were using a common file-sharing application such as BitTorrent, and you were looking some non-copyrighted material, it would be in your best interest to contact resources all over the world to ensure the fastest download.

However, if your provider can keep you on their network, they can avoid clogging their exchange points. Since companies keep tabs on how much traffic they exchange in a balance sheet, making up for surpluses with cash, it is in their interest to keep traffic confined to their network, if possible.

5.) Does your provider perform any usage-based throttling?

The ability to increase bandwidth for a short period of time and then slow you down if you persist at downloading is another trick ISPs can use. Sometimes they call this burst speed, which can mean speeds being increased up to five megabits, and they make this sort of behavior look like a consumer benefit. Perhaps Internet usage will seem a bit faster, but it is really a marketing tool that allows ISPs to advertise higher connection speeds – even though these speeds can be sporadic and short-lived.

For example, you may only be able to attain five megabits at 12:00 a.m. on Tuesdays, or some other random unknown times. Your provider is likely just letting users have access to higher speeds at times of low usage. On the other hand, during busier times of day, it is rare that these higher speeds will be available.

In writing this article, my intention was not to create a conspiracy theory about unscrupulous providers. Any market with two or more choices ensures that the consumer will benefit. Before you ask for a Congressional investigation, keep in mind that ISPs' marketing tactics are no different than those of other industries, meaning they will generally cite best-case scenarios when promoting their products. Federal regulation would only thwart the very spirit of the Internet, which, as said before, has always been a best-effort infrastructure.

But, with the information above, it is your job as a consumer to comparison shop and seek answers. Your choices are what drive the market and asking questions such as these are what will point ISPs in the right direction.
http://www.pcmag.com/article2/0,1895,2155140,00.asp





Agency Urges Caution on Net Neutrality

The chairman of the Federal Trade Commission on Wednesday recommended against additional regulation of high-speed Internet traffic.

Deborah Platt Majoras said policymakers should proceed cautiously on the issue of "net neutrality," which is the notion that all online traffic should be treated equally by Internet service providers.

In a statement issued Wednesday, Majoras said that without evidence of "market failure or demonstrated consumer harm, policy makers should be particularly hesitant to enact new regulation in this area."

In separate remarks before a lawyers' group Wednesday, Majoras said the agency was unaware of any market failure or consumer harm in the high-speed Internet market, according to a written copy of her speech.

Majoras' comments provide support for telecommunications companies such as AT&T Inc. and Comcast Corp., which oppose so-called net neutrality regulation. They would like the option of charging customers more for transmitting certain content, such as live video, faster or more reliably than other data.

Supporters of net neutrality rules, including consumer groups and content providers such as Google Inc., are concerned that Internet access providers could slow or block content in the absence of such rules, particularly as Internet providers offer their own services, such as Internet phone calls.

Majoras also said the agency's report concludes that such competition concerns can be addressed by antitrust law.

The Federal Communications Commission and Department of Justice have jurisdiction over high-speed Internet access, while Congress has considered legislation that would mandate network neutrality.

The agency also said in its report that certain practices that would discriminate among Internet traffic, such as prioritizing some data or providing exclusive deals to content providers, "can benefit consumers" as well as harm them.

The report grew out of a workshop the agency held in February on Internet access and net neutrality issues.
http://www.businessweek.com/ap/finan.../D8Q1SNT82.htm





Ex-CIA Man Exposes Hysteria Of Car "Bomb" Terror

London car bombs would not have killed anyone, government using terrorist tactics by hyping fear to morph society
Paul Joseph Watson

Countering the frothing rabid hysteria that is being whipped up by a fervent media in response to three failed car "bomb" attacks in the last few days in the UK, ex-CIA agent Larry Johnson joined Keith Olbermann to underscore the truth behind the madness - that the so-called bombs were primitive at best and would not have killed anybody.

Watch the video.

In the immediate aftermath of the discovery of a Mercedes parked outside a London night club containing up to 60 litres of petrol and a similar second vehicle, authorities claimed that the bombs would have caused "carnage" had they been detonated, killing hundreds of people.

A burning Jeep that was driven into a terminal building at Glasgow Airport yesterday was also believed to contain petrol, but failed to explode beyond simply burning out the interior of the vehicle.

The truth about the "deadly" car bombs that led to airports and other transit systems being closed across the country as well as the UK terror threat level being raised to critical is that they displayed an almost laughable level of proficiency and would not have killed anyone.

"This is not one of the truck bombs or car bombs we see going off in Iraq - what's really striking about this today is that you had two non-bombs in London when we had at least five bombs in Baghdad in which U.S. soldiers were killed in one of those so I think it's just out of proportion - this was an incendiary, this was not a high explosive," said Johnson.

Johnson said that had the gas been ignited properly, there would have been a loud boom that would have split the tank but that no projectiles would have even exited the vehicle.

"If someone was within 20, 30 feet of it they would have ear damage but not much more," said Johnson.

Johnson contrasted how the media glaze over deadly car bombings in Iraq which occur every day "And then you have a non-event in London and we're going to battle quarters and beginning to give the hairy eyeball to every Muslim."

Olbermann called the terrorists, "the graduating Al-Qaeda bomb squad that need remedial work" while attacking the concept that we're fighting them in Iraq so as to not have to fight them over here."

He also called out the so-called counter-terrorism experts who have hyped this non-event on television to enhance the profile of the counter-terror companies that they head up.

As Johnson outlines, fewer than 50,000 people worldwide have died as a result of terror attacks since the 60's, and as we recently highlighted, accident causing deer, swimming pools and peanut allergies have all proven more deadly than international terrorism.

The true extent of the damage that could have been caused by these recent attacks pales in comparison to the overblown exaggerated hype that the authorities have claimed and that the media has willingly parroted.

Similar attacks were a staple of the 60's and 70's but the government and the media downplayed them because they were of minimal threat to anyone and to hype such non-events was handing a propaganda victory to the terrorists.

Since the very definition of terrorism is to influence government policy not by the attack itself but by hyping fear of new attacks, the government of Gordon Brown is engaging in terrorism by strongly intimating that fresh attacks are inevitable.

Brown came to power with an agenda to push through new anti-terror laws including wiretaps being admissible in court and extending the 28-day detention without charge law to 90 days. Though such proposals failed under Blair and Brown was expecting a fight to get them passed, expect them to breeze through Parliament with little opposition following the outright panic that has been generated as a result of recent events.
http://www.prisonplanet.com/articles...eshysteria.htm





Lieberman Uses Foiled British Terror Plot To Push For Greater U.S. Domestic Spying

Appearing on ABC’s This Week, Sen. Joseph Lieberman (I-CT) used the foiled terror attempts in London to call for greater domestic spying here in the United States. Lieberman said, “I hope these terrorist attacks in London wake us up here in America to stop the petty partisan fighting going on about…electronic surveillance,” in apparent reference to the Senate Judiciary Committee’s subpoenas for documents related to Bush’s NSA warrantless wiretapping program.

Lieberman claimed, “We’re at a partisan gridlock over the question of whether the American government can listen into conversations or follow email trails of non-American citizens.” This is false; the NSA spying program covered the surveillance of American citizens. The “gridlock” exists over whether the administration will cooperate with Congress by explaining why it feels current law is inadequate and why President Bush decided to ignore the law in authorizing a spying program that almost led to mass resignations at the Department of Justice.

Liebermen went further in his calls for greater domestic spying. “The Brits have got something smart going. … They have have cameras all over London. … I think it’s just common sense to do that here much more widely.” Watch it:

In the same interview, Lieberman said of the situation in Iraq, “The surge is working.” He refused to say whether he would back a withdrawal if Gen. Petraeus reports in September that progress is not being made.

Also, Lieberman reaffirmed his previous statements that Democratic candidates do not have “strong and muscular” approaches to foreign policy. Today, he said, “I would say that Democratic candidates, in the larger questions of American security, have been disappointing.”

UPDATE: In Aug. 2006, Lieberman seized on a terror plot in Britain to criticize Ned Lamont’s opposition to the war in Iraq.

UPDATE II: Atrios recalls Lieberman’s claim that a “complete withdrawal is possible by late 2007 or early 2008.”
http://thinkprogress.org/2007/07/01/...omestic-spying





Romney, Torture, and Teens

The former governor's connections to abusive "tough love" camps
Maia Szalavitz

When Republican presidential candidate Mitt Romney said he’d support doubling the size of the prison at Guantanamo Bay, he was trying to show voters that he’d be tough on terror. Two of his top fundraisers, however, have long supported using tactics that have been likened to torture for troubled teenagers.

As The Hill noted last week, 133 plaintiffs filed a civil suit against Romney’s Utah finance co-chair, Robert Lichfield, and his various business entities involved in residential treatment programs for adolescents. The umbrella group for his organization is the World Wide Association of Specialty Programs and Schools (WWASPS, sometimes known as WWASP) and Lichfield is its founder and is on its board of directors.

The suit alleges that teens were locked in outdoor dog cages, exercised to exhaustion, deprived of food and sleep, exposed to extreme temperatures without adequate clothing or water, severely beaten, emotionally brutalized, and sexually abused and humiliated. Some were even made to eat their own vomit.

But the link to teen abuse goes far higher up in the Romney campaign. Romney’s national finance co-chair is a man named Mel Sembler. A long time friend of the Bushes, Sembler was campaign finance chair for the Republican party during the first election of George W. Bush, and a major fundraiser for his father.

Like Lichfield, Sembler also founded a nationwide network of treatment programs for troubled youth. Known as Straight Inc., from 1976 to 1993, it variously operated nine programs in seven states. At all of Straight’s facilities, state investigators and/or civil lawsuits documented scores of abuses including teens being beaten, deprived of food and sleep for days, restrained by fellow youth for hours, bound, sexually humiliated, abused and spat upon.

According to the L.A. Times, California investigators said that at Straight teens were “subjected to unusual punishment, infliction of pain, humiliation, intimidation, ridicule, coercion, threats, mental abuse… and interference with daily living functions such as eating, sleeping and toileting.”

Through a spokesperson, Lichfield has dismissed the similar charges against WWASPS to The Hill as “ludicrous,” claiming that the teens who sued “have a long history of lying, fabricating and twisting the story around to their own benefit.”

Straight would use virtually identical language in its denials: In the 1990 L.A. Times article cited above, a Straight counselor downplayed the California investigators’ report by saying, “Some kids get very upset and lie and some parents believe them.” Both Straight and WWASPS have repeatedly called their teen participants “liars” and “manipulators” who oppose the programs because they want to continue taking drugs or engage in other bad behavior.

Curiously, however, both programs regularly admitted teens who did not actually have serious problems. In 1982, 18-year-old Fred Collins, a Virginia Tech student with excellent grades, went to visit his brother, who was in treatment for a drug problem at Straight in Orlando, Florida.

A counselor determined that he was high on marijuana because his eyes were red (this would later turn out to have been due to swimming in a pool with contacts on). He did admit to occasional marijuana use, but insisted he was not high at the time, nor was he an addict. Nonetheless, he was barraged with hours of humiliating questions, strip-searched, and held against his will for months until he managed to escape.

He won $220,000 in a lawsuit he filed against the program for false imprisonment, intentional infliction of emotional distress, assault, and battery. Ultimately, Straight would pay out millions in settlements before it finally closed. However, to this day, there are at least eight programs operating that use Straight’s methods, often in former Straight buildings operated by former Straight staff. They include: Alberta Adolescent Recovery Center (Canada), Pathway Family Center (Michigan, Indiana, Ohio), Growing Together (Florida), Possibilities Unlimited (Kentucky), SAFE (Florida), and Phoenix Institute for Adolescents (Georgia).

Sembler has never admitted to the problems with Straight's methods. In fact, when he recently served as Ambassador to Italy, he listed it among his accomplishments on his official State Department profile. Although all of the programs with the Straight name are closed, the nonprofit Straight Foundation that funded them still exists, though under a different name. It's now called the Drug Free America Foundation, and it lobbies for drug testing and in support of tougher policies in the war on drugs.

One of the plaintiffs in the current case against WWASPS, 21-year-old Chelsea Filer, spoke to me when I was researching a TV segment on the industry. She told me that she was forced to walk for miles on a track in scorching desert heat with a 35-pound sandbag on her back. “You were not allowed to scratch your face, move your fingers, lick your lips, move your eyes from the ground,” she said. When she asked for a chapstick, “They put a piece of wood in my mouth and I had to hold it there for two weeks. I was bleeding on my tongue.”

Why was Filer subject to such punishment? “I had less interest in school and more interest in boys and my mom was worried about me,” she says, explaining that her mother believed that the program was nothing more than a strict boarding school.

Because she has attention deficit disorder, Filer was unable to consistently follow the exacting rules, and repeated small violations were seen as ongoing defiance. “It broke my heart that my mom had no belief in me,” she says, describing how, because WWASPS had told her mother to dismiss complaints as “manipulation,” her mother ignored her pleas to come home.

“I’m not a bad kid,” she continued, “I never used drugs, I was never in trouble, I have no criminal record. I know my mom was worried about me—but so many times I told her that this is too much. I would gladly have gone to prison instead.”

WWASPS is linked with facilities Academy at Ivy Ridge (New York), Carolina Springs Academy (South Carolina), Cross Creek Programs (Utah), Darrington Academy (Georgia), Horizon Academy (Nevada), Majestic Ranch Academy (Utah), MidWest Academy (Iowa), Respect Camp (Mississippi), Royal Gorge Academy (Colorado), Spring Creek Lodge (Montana), and Tranquility Bay (Jamaica).

Although it has settled several lawsuits out of court, the organization has never publicly admitted wrong-doing. However, the U.S. State Department spurred Samoa to investigate its Paradise Cove program in 1998 after receiving “credible allegations of physical abuse,” including “beatings, isolation, food and water deprivation, choke-holds, kicking, punching, bondage, spraying with chemical agents, forced medication, verbal abuse and threats of further physical abuse.” Paradise Cove closed shortly thereafter. That same year, the Czech Republic forced the closure of WWASP-linked Morava Academy following employees’ allegations that teens were being abused.

The former director of the Dundee Ranch Academy Program in Costa Rica went to local authorities after seeing medical neglect and other severe abuse, although human rights abuse charges were ultimately dropped against the owner, Robert Lichfield’s brother Narvin. That program closed in 2003.

Police in Mexico have shut down three WWASP-linked facilities: Sunrise Beach (1996), Casa By The Sea (2004) and High Impact (where police videotaped the teens chained in dog cages).

In 2005, New York’s Eliot Spitzer forced WWASP to return over $1 million to the parents of Academy at Ivy Ridge students, because the school had fraudulently claimed to provide legitimate New York high school diplomas. He fined Ivy Ridge $250,000, plus $2000 in court costs. A civil suit has been filed for educational fraud in New York as well, by a different law firm.

Straight's Sembler currently heads the Scooter Libby Defense Fund, in addition to his work for Romney, and has worked tirelessly to keep the Vice President's former Chief of Staff out of prison, even after his conviction on charges of perjury and obstruction of justice. After all, if running programs that impose these kinds of "treatments" on American teenagers is not a prison-worthy offense, why should lying to a court be?

The Romney campaign is aware of the WWASP suits, and should be familiar with the Straight suits. If not, it's worth asking: Does Romney support these types of tactics for at-risk youth? Or does he take the line the organizations founded by his fundraisers take—that these dozens of lawsuits are merely from bad kids who make up lies?

Coming from the man who wants to double the size of Guantanamo, these aren't insignificant questions. If Romney doesn't believe the aggressive tactics he supports for use against enemy combatants ought to be used against troubled teens and youth drug users, he should say so, and show he means it by removing these men from his campaign.
http://www.reason.com/news/show/121088.html





US Appeals Court Orders Dismissal of Spying Suit
AP

A US appeals court on Friday ordered the dismissal of a lawsuit challenging President George W. Bush's domestic spying program, saying the plaintiffs had no standing to sue.

The 2-1 ruling by the 6th US Circuit Court of Appeals panel was not on the legality of the surveillance program, but it vacated a 2006 order by a lower court in Detroit. That court had found the post-911 warrant less surveillance aimed at uncovering terrorist activity to be unconstitutional, violating rights to privacy and free speech and the separation of powers.

The American Civil Liberties Union led the lawsuit on behalf of other groups including lawyers, journalists and scholars it says have been handicapped in doing their jobs by the government monitoring.

The case will be sent back to the US District judge in Michigan for dismissal.
http://www.jpost.com/servlet/Satelli...e%2FSho wFull





In Italy, CIA Agents Were Undone By Their Cell Phones
Matthew Cole

The CIA needs to get a Q. James Bond's gadget guru surely would have warned the agency about how easy it is to track calls made via cell phone. Now 25 of its agents are facing trial in absentia in Milan, Italy, this summer — undone by their pathetic ignorance of technology. It seems that cellular data exposed their operation to carry out the "extraordinary rendition" (read: illegal abduction) of an Egyptian cleric suspected of terrorist involvement from a Milan street in 2003.

Cell phones communicate with nearby transmission towers when making and receiving calls. As many criminals know, tower location is recorded with the billing data. The spooks apparently didn't realize this and left a trail of cellular footprints at the crime scene. When an Italian prosecutor pulled the records of phones in the area at the time, the plot became apparent. He was able to identify the agents (by alias), where they had stayed, and even calls they made to northern Virginia (where CIA headquarters is), the US consulate in Milan, a US Air Force base in Aviano, and each other. The cleric, Abu Omar, has been released. But should the operatives — likely back in the States — be found guilty, they won't be able to travel anywhere Interpol operates. Maybe they can telecommute.

How They Did It

Coordinating the abduction
The CIA's snatch team used unsecured mobile handsets to communicate during the kidnapping. By zeroing in on phones in the area that were unusually active at the time of the grab — many calling each other — authorities were able to identify the handsets involved. Soon they knew the agents' aliases, where they had stayed, and who else they had called.

Checking in with headquarters
One of the agents participating in the abduction used his cell phone to call Robert Lady, the CIA station chief in Milan. This provided Italian investigators with the first undeniable link to CIA involvement. Lady has been forced to leave Italy and is now among those facing charges.

Planning the escape
Several phones involved in the operation called an Air Force base in Aviano, both before and immediately after the event. Among the numbers dialed: the mobile phone of a commanding officer at the base. This revealed the getaway. Italian authorities believe the cleric was held at Aviano before being flown to Egypt, where he claims to have been tortured.
http://www.wired.com/politics/securi...e/15-07/st_cia





RIM Unconcerned by BlackBerry Bugging Software
Brett Winterford

Mobile device manufacturer Research in Motion (RIM) is unconcerned about a new release of software that aims to compromise the security of a BlackBerry device.

As reported yesterday, the latest version of legal spying software FlexiSPY enables remote third parties to bug the voice calls, log SMS and mobile e-mail messages and track the location of a BlackBerry user.

Ian Robertson, senior manager of security and research at RIM, said users need not be particularly worried about the capability of FlexiSPY.

"While it's the subject of some debate, I don't consider it a virus nor a Trojan, as it does require conscientious effort from the user to load the program," he said.

Robertson said an average user that maintains good hygiene would never see the software loaded onto their device without their knowledge.

There are some basic steps, he said, that users can take to protect themselves.

First, a user should set a password for their device so that nobody else can physically load the application. "This is the same for any device, be it a laptop or a smartphone," he said.

Second, the user should only load applications from known and trusted sources.

"With those two methods alone, no surreptitious software can be inadvertently loaded onto the device," he said.

Finally, the BlackBerry service comes with a built-in software firewall. "If it isn't enabled already, be sure to have it switched on," Robertson said.

The firewall would, in the case of FlexiSPY being active, prompt the user that something is trying to access the device.

"It would say something like -- this application wants to make a connection to the device -- cancel or allow?"

Robertson said that it is not entirely true that the FlexiSPY application works without the user knowing they are being spied upon.

"There are ways you can tell if the program is loaded onto the device," he said. "First, the control panel for the application makes use of SMS messages, which don't appear like regular messages. Second, the application is visible if one views the files loaded onto the device."

That's assuming of course, that a user has the technical nous to understand their BlackBerry's control panel.

Robertson said that despite the marketing of sinister applications such as FlexiSPY, BlackBerry users are protected.

"We provide a fantastic platform and rich controls to allow security to be tailored to meet an organisation's needs," he said. "There are over 250 IT policies and complete application control -- far and away beyond anything else in this space."

Concerned users can read white papers on protecting their BlackBerry from malware here.
http://www.zdnet.com.au/news/securit...9279555,00.htm





Top Secret: We're Wiretapping You
Ryan Singel

It could be a scene from Kafka or Brazil. Imagine a government agency, in a bureaucratic foul-up, accidentally gives you a copy of a document marked "top secret." And it contains a log of some of your private phone calls.

You read it and ponder it and wonder what it all means. Then, two months later, the FBI shows up at your door, demands the document back and orders you to forget you ever saw it.

By all accounts, that's what happened to Washington D.C. attorney Wendell Belew in August 2004. And it happened at a time when no one outside a small group of high-ranking officials and workaday spooks knew the National Security Agency was listening in on Americans' phone calls without warrants. Belew didn't know what to make of the episode. But now, thanks to that government gaffe, he and a colleague have the distinction of being the only Americans who can prove they were specifically eavesdropped upon by the NSA's surveillance program.

The pair are seeking $1 million each in a closely watched lawsuit against the government, which experts say represents the greatest chance, among over 50 different lawsuits, of convincing a key judge to declare the program illegal.

Belew's bout with the Terrorist Surveillance Program began in 2004, when he was representing the U.S. branch office of the prominent Saudi Arabian charity Al-Haramain. Formerly one of the largest charities in Saudi Arabia, Al-Haramain worked to spread a strict view of Islam through philanthropy, missionary work and support for mosques around the world.

Federal officials were investigating the Ashland, Oregon, branch of the group for alleged links to terrorism, and had already frozen the charity's U.S. assets. Belew was one of several lawyers trying to keep Al-Haramain off a U.S. Treasury Department watch list -- an effort that sent much paperwork flying back and forth between the attorneys and the Treasury Department's Washington D.C. headquarters across the street from the White House.

On Aug. 20, 2004, fellow Al-Haramain attorney Lynne Bernabei noticed one of the documents from Treasury was marked "top secret." Bernabei gave the document to attorneys and directors at Al-Haramain's Saudi Arabia headquarters, and gave a copy to Belew. The document was a log of phone conversations Belew and co-counsel Asim Ghafoor had held with a Saudi-based director for the charity named Soliman al-Buthi.

Al-Buthi was a Saudi government employee who volunteered as coordinator for Al-Haramain's North American branches, including the Oregon branch. In a telephone interview with Wired News, al-Buthi says he's now general manager for the environmental department of the city of Riyadh, working on an anti-bird flu project. He denied having any links to terrorism, now or in 2004. "I feel that Islam is best spread by wisdom not by arms or violence," al-Buthi says.

Despite al-Buthi's claims of innocence, al-Buthi and Al-Haramain's American branch were added to the government's public list of terrorists on Sept. 9, 2004, just weeks after the government turned over the call log to the charity's attorneys. It's not clear when officials realized they'd given a highly classified document to an organization they considered terrorist, but the FBI showed up at Belew's office in October and demanded the call log back, advising the lawyer not to attempt to remember the document's contents.

By then, Belew had given a copy of the document to Washington Post reporter David Ottaway, who had been writing about how the government investigated and listed individuals and groups suspected of funding terrorism. Ottaway did not report on the classified call log, and when the FBI called, the Post dutifully handed over its copy.

That might have been the end of it. But in December 2005 The New York Times revealed that the government had been spying on Americans' overseas communications without warrants, and Al-Haramain's lawyers realized why the FBI had been so adamant about getting the document back.

"I got up in the morning and read the story, and I thought, 'My god, we had a log of a wiretap and it may or may not have been the NSA and on further reflection it was NSA," says Thomas Nelson, who represents Al-Haramain and Belew. "So we decided to file a lawsuit."

The lawyers retrieved one of the remaining copies of the document -- presumably from Saudi Arabia -- and used it to file a complaint in U.S. District Court in Oregon in February of last year. They sought damages from the government of $1 million each for Belew and Ghafoor, and the unfreezing of Al-Haramain's assets, because that action relied on the allegedly illegal spying.

The lawsuit is poised to blow a hole through a bizarre catch-22 that has dogged other legal efforts to challenge the Bush administration's warrantless surveillance.

Since the 2005 Times story, and subsequent acknowledgment of the surveillance by the Bush administration, some 50-odd lawsuits have sprung up around the NSA program, taking on the government and various telecom companies who are allegedly cooperating in spying on their customers, including BellSouth, Verizon and Sprint.

Justice Department and phone company lawyers have asserted that the plaintiffs in those cases don't have legal standing to sue, because they have no proof that they were direct victims of the eavesdropping. At the same time, the government claims it doesn't have to reveal if any individual was or was not wiretapped because the "state secrets privilege" permits it to withhold information that would endanger national security.

The tangible document makes Belew's case uniquely positioned to cut through that thicket, says Shayana Kadidal, an attorney with the Center for Constitutional Rights, which represents individuals being held in Guantanamo Bay. The center is also suing to stop the surveillance, but lacks Belew's concrete evidence of monitoring -- arguing instead that the possibility of being monitored hampers its legal work.

"The government's line is that if you don't have evidence of actual surveillance, you lose on standing," says Kadidal. "Out of all the cases, this is the only one with evidence of actual surveillance."

That evidence also gives the courts enough to rule immediately on whether the president had the authority to spy on Belew and Ghafoor without a court order, said Jon Eisenberg, one of Belew's lawyers. "We know how many times he's been surveilled," Eisenberg told a judge last month. "There is nothing left for this court to do except hear oral arguments on the legality of the program."

The Justice Department isn't ready to concede that the two attorneys were swept into the NSA's extrajudicial surveillance. "The government has never confirmed or denied whether plaintiffs were surveilled, much less surveilled under the Terrorist Surveillance Program," spokesman Dean Boyd wrote in an e-mail to Wired News.

But if the document is a harmless memo unrelated to NSA surveillance, it's unexpectedly agitating government spooks.

Soon after the lawsuit was filed, the document was whisked out of the courthouse and into a Justice Department-controlled secure room known as a Secure Compartmented Information Facility in Portland, Oregon. According to government filings, it remains classified top secret and contains "sensitive compartmented information" -- meaning information that concerns or is derived from intelligence sources, methods or analytical processes, according to the defense and intelligence communities' own definition.

Even the lawyers who filed the document with the court are no longer allowed to see it; instead, they've been permitted to file declarations, under seal, based on their memory of its contents.

Other aspects of the case also support the plaintiffs' interpretation of the document. Last year, U.S. District Judge Garr King in Portland examined the document and read classified briefs filed by the Justice Department. Then he ordered the government to meet with the plaintiffs to discuss turning over more documents in discovery. It's not likely the court would have permitted the case to continue if the evidence didn't, in fact, indicate that the pair had been under surveillance.

And if the surveillance had been court ordered and lawful, King would have been obliged to dismiss the lawsuit. Under the Foreign Intelligence Surveillance Act, or FISA, targets of counter-intelligence or counter-terrorism surveillance can only sue the government when no warrant has been issued. Lawyers for Belew and Ghafoor seize on this point. "If there was a FISA warrant, the whole case would have crumbled on the first day," Nelson says. "Its pretty obvious from the government's conduct in the case, there was no warrant."

Justice department lawyers have argued that, even if the pair of lawyers were monitored, judging the president's authority to do so requires looking at the specific reasons why the duo were surveilled. And those facts would be national secrets that would tip off terrorists, so no court can ever rule on the program.

"This is not to say there is no forum to air the weighty matters at issue, which remains a matter of considerable public interest and debate, but that the resolution of these issues must be left to the political branches of government," Justice Department lawyers wrote in a brief on the case.

But the government has a new, and not necessarily friendly, judicial audience for its no-judges-allowed argument. In August, a special court ordered Belew's lawsuit to be consolidated into a single proceeding comprised of 54 other NSA-related lawsuits, before U.S. District Court Chief Judge Vaughn Walker in San Francisco.

Walker has presided over the year-old class-action lawsuit brought by the Electronic Frontier Foundation against AT&T for the phone company's alleged cooperation with the NSA program. The judge made waves in July when he issued a landmark ruling that allowed the AT&T case to proceed, despite the government's claim that the suit must be thrown out because it involved national secrets. Walker ruled that the state-secrets privilege did not apply to the entirety of the case, because the government had admitted the program existed. (Walker recently rejected a motion filed by Wired News seeking the unsealing of evidence in the case.)

The government has appealed that state secrets decision to the 9th Circuit Court of Appeals, and asked the judge to put a stop to all 55 cases pending that appeal. But Walker, a libertarian-leaning Republican, has kept the cases moving, noting that any decision from the appeals court is likely to wind through the court system up to the Supreme Court -- a process that could take years.

Belew's lawsuit, his lawyers submit, is a chance to short circuit that process entirely.

In a hearing in early February, Eisenberg told Walker that the classified document sets the Belew case apart from the other cases, because the judge has enough evidence to decide whether the warrantless surveillance was illegal, without waiting for the 9th Circuit to decide the state secrets issue.

"You need only read the statutes to decide, 'Does the president have the right to do this without a warrant?'" Eisenberg said.

Walker is expected to rule in March on whether to stay the case or set a hearing date, and the document will likely be moved, under guard, from the Portland secure facility to San Francisco, where Walker can review it.

In the meantime, the NSA program is undergoing changes.

In a separate lawsuit last August, Michigan U.S. District Court Judge Anna Diggs Taylor found the NSA surveillance program unconstitutional and illegal -- a decision that's now under appeal in the 6th Circuit. Facing that ruling and growing political pressure, in early January, Attorney General Alberto Gonzales essentially announced the end of the warrantless spying, saying the NSA program will continue, but would begin getting "innovative" court orders from the foreign intelligence court.

With the program now reformed, the Justice Department has asked for several of the lawsuits against the government to be dismissed as moot.

Al-Buthi is now a "specially designated global terrorist," according to the Treasury Department, and he's under indictment in the United States for failing to declare $150,000 in travelers checks raised to help Chechnyan refugees when he last flew out of the country. He told Wired News that he had always declared money when entering the United States, but wasn't aware he needed to do the same when leaving. He says he's been interrogated twice by Saudi officials and cleared of any wrongdoing.
http://www.wired.com/science/discove...urrentPage=all





Me and my shadow

Forget about the WGA! 20+ Windows Vista Features and Services Harvest User Data for Microsoft - From Your Machine!
Marius Oiaga

Are you using Windows Vista? Then you might as well know that the licensed operating system installed on your machine is harvesting a healthy volume of information for Microsoft. In this context, a program such as the Windows Genuine Advantage is the last of your concerns. In fact, in excess of 20 Windows Vista features and services are hard at work collecting and transmitting your personal data to the Redmond company.

Microsoft makes no secret about the fact that Windows Vista is gathering information. End users have little to say, and no real choice in the matter. The company does provide both a Windows Vista Privacy Statement and references within the End User License Agreement for the operating system. Combined, the resources paint the big picture over the extent of Microsoft's end user data harvest via Vista.

Reading Between the EULA Lines

Together with Windows Vista, Microsoft also provides a set of Internet-based services, for which it has reserved full control, including alteration and cancellation at any given time. The Internet-based services in Vista "coincidentally" connect to Microsoft and to "service provider computer systems." Depending on the specific service, users may or may not receive a separate notification of the fact that their data is being collected and shared. The only way to prevent this is to know the specific services and features involved and to either switch them off or not use them.

The alternative? Well, it's written in the Vista license agreement. "By using these features, you consent to the transmission of this information. Microsoft does not use the information to identify or contact you."

The Redmond company emphasized numerous times the fact that all information collected is not used to identify or contact users. But could it? Oh yes! All you have to know is that Microsoft could come knocking on your door as soon as you boot Windows Vista for the first time if you consider the system’s computer information harvested. Microsoft will get your "Internet protocol address, the type of operating system, browser and name and version of the software you are using, and the language code of the device where you installed the software." But all they really need is your IP address.

What's Covered in the Vista License?

Windows Update, Web Content, Digital Certificates, Auto Root Update, Windows Media Digital Rights Management, Windows Media Player, Malicious Software Removal/Clean On Upgrade, Network Connectivity Status Icon, Windows Time Service, and the IPv6 Network Address Translation (NAT) Traversal service (Teredo) are the features and services that collect and deliver data to Microsoft from Windows Vista. By using any of these items, you agree to share your information with the Redmond Company. Microsoft says that users have the possibility to disable or not use the features and services altogether. But at the same time Windows update is crucial to the security of Windows Vista, so turning it off is not really an option, is it?

Windows Vista will contact Microsoft to get the right hardware drivers, to provide web-based "clip art, templates, training, assistance and Appshelp," to access digital software certificates designed "confirm the identity of Internet users sending X.509 standard encrypted information" and to refresh the catalog with trusted certificate authorities. Of course that the Windows Vista Digital Rights Management could not miss from a list of services that contact Microsoft on a regular basis. If you want access to protected content, you will also have to let the Windows Media Digital Rights Management talk home. Windows Media Player in Vista for example, will look for codecs, new versions and local online music services.

The Malicious Software Removal tool will report straight to Microsoft with both the findings of your computer scan, but also any potential errors. Also, in an effort to enable the transition to IPv6 from IPv4, "by default standard Internet Protocol information will be sent to the Teredo service at Microsoft at regular intervals."

Had Enough? I Didn't Think So!

Microsoft has an additional collection of 47 Windows Vista features and services that collect user data. However, not all phone home and report to Microsoft. Although the data collection process is generalized across the list, user information is also processed and kept on the local machine, leaving just approximately 50% of the items to both harvest data and contact Microsoft. Still, Microsoft underlined the fact that the list provided under the Windows Vista Privacy Statement is by no means exhaustive, nor does it apply to all the company's websites, services and products.

Activation, Customer Experience Improvement Program (CEIP), Device Manager, Driver Protection, Dynamic Update, Event Viewer, File Association Web Service, Games Folder, Error Reporting for Handwriting Recognition, Input Method Editor (IME), Installation Improvement Program, Internet Printing, Internet Protocol version 6 Network Address Translation Traversal, Network Awareness (somewhat), Parental Controls, Peer Name Resolution Service, Plug and Play, Plug and Play Extensions, Program Compatibility Assistant, Program Properties—Compatibility Tab, Program Compatibility Wizard, Properties, Registration, Rights Management Services (RMS) Client, Update Root Certificates, Windows Control Panel, Windows Help, Windows Mail (only with Windows Live Mail, Hotmail, or MSN Mail) and Windows Problem Reporting are the main features and services in Windows Vista that collect and transmit user data to Microsoft.

This extensive enumeration is not a complete illustration of all the sources in Windows Vista that Microsoft uses to gather end user data. However, it is more than sufficient to raise serious issues regarding user privacy. The Redmond company has adopted a very transparent position when it comes to the information being collected from its users. But privacy, much in the same manner as virtualization, is not mature enough and not sufficiently enforced through legislation. Microsoft itself is one of the principal contributors to the creation of a universal user privacy model.

The activation process will give the company product key information together with a "hardware hash, which is a non-unique number generated from the computer's hardware configuration" but no personal information. The Customer Experience Improvement Program (CEIP) is optional, and designed to improve software quality. Via the Device Manager, Microsoft has access to all the information related to your system configuration in order to provide the adequate drivers. Similarly, Dynamic Update offers your computer's hardware info to Microsoft for compatible drivers.

Event Viewer data is collected every time the users access the Event Log Online Help link. By using the File Association Web Service, Microsoft will receive a list with the file name extensions. Metadata related to the games that you have installed in Vista also finds its way to Microsoft. The Error Reporting for Handwriting Recognition will only report to Microsoft if the user expressly desires it to. Through IME Word Registration, Microsoft will receive Word registration reports. Users have to choose to participate in the Installation Improvement Program before any data is sent over at Microsof.

Ever used a print server hosted by Microsoft? Then the company collected your data through Internet Printing. Network Awareness is in a league of its own. It does not premeditatedly store of send directly information to Microsoft, but it makes data available to other services involving network connectivity, and that do access the Redmond company. Via Parental Controls, not only you but also Microsoft will monitor all the visited URLs of your offspring.

Hashes of your Peer Name tied to your IP address are published and periodically refreshed on a Microsoft server, courtesy of the Peer Name Resolution Service. Every time you install a Plug and Play device, you tell Microsoft about it in order to get the necessary device drivers. The same is the case for PnP-X enabled device, only that Windows Update is more actively involved in this case.

The Program Compatibility Assistant is designed to work together with the Microsoft Error Reporting Service, to highlight to Microsoft potential incompatibility errors. For every example of compatibility settings via the Compatibility tab, Microsoft receives an error report. The Program Compatibility Wizard deals with similar issues related to application incompatibility. File properties are sent to Microsoft only with the item that they are associated with.

You can also volunteer your name, email address, country and even address to Microsoft through the registration process. A service such as the Rights Management Services (RMS) Client can only function in conjunction with your email address.

All the queries entered into the Search box included in the Windows Vista Control Panel will be sent to Microsoft with your consent. The Help Experience Improvement Program also collects and sends information to Microsoft. As does Windows Mail when the users access Windows Live Mail, Hotmail, or MSN Mail. And the Windows Problem Reporting is a service with a self explanatory name.

But is this all? Not even by a long shot. Windows Genuine Advantage, Windows Defender, Support Services, Windows Media Center and Internet Explorer 7 all collect and transmit user data to Microsoft. Don't want them to? Then simply turn them off, or use alternative programs when possible or stop using some services altogether. Otherwise, when your consent is demanded, you can opt for NO.

What Happens to My Data?

Only God and Microsoft know the answer to that. And I have a feeling that God is going right now "Hey, don't get me involved in this! I have enough trouble as it is trying to find out the release date for Windows Vista Service Pack 1 and Windows Seven!"

Generally speaking, Microsoft is indeed transparent – up to a point – about how it will handle the data collected from your Vista machine. "The personal information we collect from you will be used by Microsoft and its controlled subsidiaries and affiliates to provide the service(s) or carry out the transaction(s) you have requested or authorized, and may also be used to request additional information on feedback that you provide about the product or service that you are using; to provide important notifications regarding the software; to improve the product or service, for example bug and survey form inquiries; or to provide you with advance notice of events or to tell you about new product releases," reads a fragment of the Windows Vista Privacy Statement.

But could Microsoft turn the data it has collected against you? Of course, what did you think? "Microsoft may disclose personal information about you if required to do so by law or in the good faith belief that such action is necessary to: (a) comply with the law or legal process served on Microsoft; (b) protect and defend the rights of Microsoft (including enforcement of our agreements); or (c) act in urgent circumstances to protect the personal safety of Microsoft employees, users of Microsoft software or services, or members of the public," reveals another excerpt.

And you thought that it was just you... and your Windows Vista. Looks like a love triangle to me... with Microsoft in the mix.
http://news.softpedia.com/news/Forge...ft-58752.shtml





Dell Warns of Vista Upgrade Challenges

Upgrading from Windows XP to Vista poses significant challenges for IT departments, warns Dell, as it softens its sales stance on the OS

Dell has taken the unusual step — for a PC vendor of its size — of toning down its sales pitch for Microsoft's Vista operating system and warning businesses of the migration challenges that lie ahead for them.

The step is particularly unusual because one of the issues the hardware vendor is warning business about is the extra hardware they will need to buy.

"They need to be looking at the number of images they will be installing and the size of these images," said Dell's European client services business manager, Niall Fitzgerald, on Wednesday. "A 2GB image for each user will have a big impact."

In the past, Microsoft had suggested that a 1GB image was fine for Vista, but Fitzgerald said image sizes of 2GB and larger will be likely.

As a result, said Fitzgerald, Dell is "stepping back" from telling people they must upgrade. "We are set up to give people all the guidance and support they need for this," he said. "We are not here to promote Microsoft and tell people they should buy it. We can show them the advantages of Vista and what they need to put in place to begin to move across."

Application migration is a key area, Fitzgerald said, echoing comments from Gartner on the size of the issue and the need for considerable testing. "You have to allow time for testing," he said. "Vista is big and complex and there is a lot to it. It requires a lot of testing. You can't just shut off XP on Friday and start Vista on Monday morning. There will be training. There are things to learn."

Overall the challenges will be significant and "should not be underestimated", added Fitzgerald. However, he still thinks that business should go ahead with the migration and not wait for Microsoft to release its first service pack.

Last month, Microsoft passed 40 million sales of Vista, but most of those appear to be to consumers rather than businesses, which have been slow to upgrade.

While Fitzgerald accepted that some business are holding back from migrating to Vista, he denied that there is a widespread feeling that it is better to wait for Service Pack 1. "I have heard that, and I don't buy it," Fitzgerald said. "It used to be a thing people did, and it might have been the case with, say, Windows 2000, but not now."
http://news.zdnet.co.uk/software/0,1...9287855,00.htm





Microsoft to Spend $1.15 Billion for Xbox Repairs
Eric A. Taub

In what may be one of the costliest consumer warranty repairs in history, Microsoft announced on Thursday that it would spend up to $1.15 billion to repair failing Xbox 360 game machine consoles.

While the company would not say how many units were failing, Robbie Bach, president of Microsoft’s entertainment and devices division, said that there have been an “unacceptable high number of repairs.” The majority of Xbox 360 owners, he said, have not experienced hardware failure.

Company officials said that Microsoft had sold 11.6 million Xbox 360 units by the end of June, shy of the 12 million units the company had predicted. The Xbox 360, which first went of sale in November 2005, is currently the best-selling game machine in the United States, according to NPD, a market research firm.

The size of the anticipated repair bill suggests that a third to as many as half of the machines are flawed.

Microsoft, based in Redmond, Wash., said it would take a charge of $1.05 billion to $1.15 billion against earnings in the quarter ended June 30. Consumers know they have a problem if three red flashing lights appear on the console. Gamers on online forums have been referring to the event as “the Red Ring of Death” because the machine then shuts down.

The company declined to explain the nature of the failure, but said that it was not caused by a single problem in the console, which it said contained 1,700 components and 500 million transistors. The company also said there were no health or safety concerns involved. The problem began to appear over the last three to four months, Mr. Bach said, after “significant usage” of the consoles. He said the company has taken steps to correct the problem in new devices.

Microsoft said it would extend the warranty of the game console to three years to customers worldwide. Previously, products sold in the United States were covered by a one-year warranty, while Xbox 360 units sold in Europe had a two-year warranty.

In addition, customers who have had their consoles repaired because of the “three flashing lights” problem will be reimbursed for the cost of the repairs.

Microsoft has succeeded in establishing the Xbox brand against the better known Sony PlayStation and other game machines. The Xbox and its successor, the Xbox 360, was the software maker’s first major foray into hardware. Although sales are small relative to the rest of Microsoft’s revenue, the Xbox has been an important venture for the company and was viewed by many analysts as Microsoft’s attempt to compete with the likes of Sony and Apple for control of electronics and entertainment within homes.

The device can be used to access the Internet and view movies. Microsoft said its entertainment and devices division reported an operating loss of $315 million on $929 million in revenue for the three-month period that ended in March, and analysts have estimated that the company lost about $6 billion getting a foothold in the game machine industry.

A new Xbox 360 with a 20-gigabyte hard drive sells for about $400, but other versions cost about $300.

The announcement comes on the eve of the E3 Media and Business Summit, the video-game industry’s major trade show, to be held next week in Los Angeles. “This is bound to affect discussions between Microsoft and its developers and retailers,” said Richard Doherty, a partner in the research company Envisioneering Group.
http://www.nytimes.com/2007/07/06/business/06soft.html





MS: Dancing as Fast as it Can to Try to Get Away From GPLv3
Groklaw

Want to laugh? Microsoft Says It Is Not Bound by GPLv3" -- they think they can so declare, like an emperor, and it becomes fiat. It's not so easy. I gather Microsoft's lawyers have begun to discern the GPL pickle they are in. In any case it won't be providing any support or updates or anything at all in connection with those toxic (to them) vouchers it distributed as part of the Novell deal. What a surprise. Novell, still the Microsoft handmaiden, will pick up Microsoft's slack:
This means that Novell will support those technologies licensed under GPLv3, he said, noting that for those customers who obtain their Linux via a certificate from Microsoft in the future, Novell will provide them with a regular SLES subscription, regardless of the terms of the certificate provided by Microsoft.

What are friends for but to try to escape the consequences of the GPL hand-in-hand? So they are backing out too. Well, folks, how do you like dealing with companies that back out of their commitments? You will not get, I gather, what your voucher said you would. Well, well.

These two -- I can't decide if it's an elaborate dance like a tango or more like those games where you place a cloth with numbers on the floor and you have to get into a pretzel with your hands and feet to touch all the right numbers. Whichever it is, Novell and Microsoft keep having to strike the oddest poses to try to get around the GPL. If they think this new announcement has succeeded, I believe they will find they are mistaken.

In other words, not to put too fine a point on it, GPLv3 worked.

Microsoft has partially backed out, then, from the Novell deal, and so has Novell, although they PR it with an emphasis on the parts that remain. That was the purpose of the clause. Novell is sticking to Microsoft like barnacles on the bottom of a boat, even when offered a chance to swim away to safety.

The interoperability work continues, they say, blah blah, but nobody ever minded that, except for the attempted killing off of ODF. The world has been begging and hoping for interoperability with Microsoft for as long as I can remember. The EU Commission ordered it. So interoperate away, by all means, boys.

Of course, just between you and me and the lamp post, I don't think they really mean it, not with respect to ODF, not 100%, or if they do, I've seen no such indications. They'd rather do a translator they've already told us will not work 100% than work with ODF, the international standard that already exists, to make one responsible standard we all can use that will work 100%. No, no, instead of true, two-way interoperability, the whole world has to make do with annoying translators that don't really work so perfectly and are not so user-friendly, so Microsoft can keep its secrets. That's fine, secrets. Just don't call it an open standard if it isn't fully documented and allows for proprietary extensions. And I wouldn't call it interoperability, either. But that's me.

You know what I love about the GPL? Regular lawyers can't understand it. We've seen that over and over. I think it is so different from what they are used to, they can't get their heads around it, brainiacs though they may be. It seems unnatural to them, and I guess they can't believe it means what it says. But it means it. And if they think this is the end of their GPLv3 difficulties, it's not:
Microsoft also said July 5 that its agreement with Novell, as well as those with Linux rivals Xandros and Linspire, were unaffected by the release June 29 of GPLv3 by the Free Software Foundation.

Guess again. Maybe you should reexamine GPLv2 while you are learning on the job. IANAL, but I think those latter deals are probably in violation of v2 as well as v3. Hey, don't go by me. Ask your lawyer. But the bottom line is this: You can't disrespect other peoples' intellectual property and just walk away. As I believe they are going to find out.

Here is the Microsoft statement in full:

**************************

Microsoft Statement About GPLv3

A Microsoft statement about GPLv3.

Published: July 5, 2007

Microsoft is not a party to the GPLv3 license and none of its actions are to be misinterpreted as accepting status as a contracting party of GPLv3 or assuming any legal obligations under such license.

While there have been some claims that Microsoft’s distribution of certificates for Novell support services, under our interoperability collaboration with Novell, constitutes acceptance of the GPLv3 license, we do not believe that such claims have a valid legal basis under contract, intellectual property, or any other law. In fact, we do not believe that Microsoft needs a license under GPL to carry out any aspect of its collaboration with Novell, including its distribution of support certificates, even if Novell chooses to distribute GPLv3 code in the future. Furthermore, Microsoft does not grant any implied or express patent rights under or as a result of GPLv3, and GPLv3 licensors have no authority to represent or bind Microsoft in any way.

At this point in time, in order to avoid any doubt or legal debate on this issue, Microsoft has decided that the Novell support certificates that we distribute to customers will not entitle the recipient to receive from Novell, or any other party, any subscription for support and updates relating to any code licensed under GPLv3. We will closely study the situation and decide whether to expand the scope of the certificates in the future.

As always, Microsoft remains committed to working with the open source software community to help improve interoperability for customers working in mixed source environments and deliver IP assurance. Our partnerships with Novell and other Linux platform and desktop providers remain strong and the IP bridge we built with them, embodied in our collaboration agreements, remains intact. In particular, our technical and business collaboration with Novell continues to move full steam ahead, including our joint development work on virtualization, standards-based systems management, identity interoperability and document format translators. In addition, the patent covenants offered by Microsoft and Novell to each other’s customers are unchanged, and will continue to apply in the same way they did previously.
http://www.groklaw.net/article.php?s...70705205728953





Feds Snub Open Source for 'Smart' Radios
Anne Broache

Mobile-gadget makers are starting to take advantage of software-defined radio, a new technology allowing a single device to receive signals from multiple sources, including television stations and cell phone networks.

But a new federal rule set to take effect Friday could mean that radios built on "open-source elements" may encounter a more sluggish path to market--or, in the worst case scenario, be shut out altogether. U.S. regulators, it seems, believe the inherently public nature of open-source code makes it more vulnerable to hackers, leaving "a high burden to demonstrate that it is sufficiently secure."

If the decision stands, it may take longer for consumers to get their hands on these all-in-one devices. The nascent industry is reluctant to rush to market with products whose security hasn't been thoroughly vetted, and it fears the Federal Communications Commission's preference for keeping code secret could allow flaws to go unexposed, potentially killing confidence in their products.

By effectively siding with what is known in cryptography circles as "security through obscurity," the controversial idea that keeping security methods secret makes them more impenetrable, the FCC has drawn an outcry from the software radio set and raised eyebrows among some security experts.

"There is no reason why regulators should discourage open-source approaches that may in the end be more secure, cheaper, more interoperable, easier to standardize, and easier to certify," Bernard Eydt, chairman of the security committee for a global industry association called the SDR (software-defined radio) Forum, said in an e-mail interview this week.

The Forum, which represents research institutions and companies such as Motorola, AT&T Labs, Northrup Grumman and Virginia Tech, urged the FCC to back away from that stance in a formal petition (PDF) this week.

Those concerns were endorsed by the Software Freedom Law Center, which provides legal services to the free and open-source software community, staff attorney Matt Norwood said in an interview this week.

Still, in a white paper released Friday, the group says there's also good news for its developers in the FCC's rule: because it focuses narrowly on security-related software, it appears that programmers would not be restricted from collaboration with hardware makers on the many other kinds of open-source wireless applications. (Many 802.11 wireless routers that are under the FCC's control already rely on open-source systems for network management.)

Software-defined radios--also known as "smart" or cognitive radios--are viewed by some as the foundation for the next generation of mobile technology. Traditional radios use electronic hardware to process signals--for example, to transform a particular type of radio waves into a radio station's musical broadcast or to screen out interference.

Expanding radio's scope
But software-defined radios put the brains of the operation into software that manages the signals being sent or received by the radio hardware. With that approach, new software downloads, as opposed to more labor-intensive hardware changes, could let radios do more than ever before.

Imagine, for instance, a single gadget that can deliver TV shows, terrestrial radio stations, cell phone calls and broadband, depending on how it's programmed; or a cell phone equipped with the intelligence to detect the strongest signals in a particular area and change the phone's settings to subscribe to them, regardless of whether they belong to a GSM, CDMA or some other type of network.

Although the software-defined radio industry has generally found welcoming treatment on the FCC's part so far, some security experts said the agency's recent take on open-source software is unjustified.

"Obscurity works best when the hackers can't test their attacks," said Peter Swire, an Ohio State University law professor who has written about the tensions between closed and open approaches to computer security. "For software like this, used in distributed devices, there should be no extra burden on open source."

There's also no clear evidence that the number of vulnerabilities in open-source software differs dramatically from that of proprietary software, said Alan Paller, director of research for the SANS Institute, which provides computer security training. (Some earlier studies have found that the generally more intensive scrutiny of open-source code can help keep its quality higher and vulnerabilities lower.)

"They should be defining it as software with reliable maintenance or software without reliable maintenance--that's the fundamental security issue," Paller said in a telephone interview. "If I don't have somebody I can call when I find out there's a vulnerability in my software, I'm dead."

Already in military use
The term software-defined radio hasn't exactly made it into public consciousness yet, but the technology has been gaining traction in military and public safety spheres. Perhaps the highest-profile example is the Pentagon's Joint Tactical Radio System project, which is designed to give soldiers in the field the ability to shuttle voice, data and video across multiple networks.

Commercial offerings, however, remain in the early stages. About three years ago, the FCC awarded its first specialized software-defined radio license to a small firm called Vanu. That company went on to produce the first commercially available base station that can support multiple wireless standards--GSM, CDMA, iDEN and others--from a single piece of hardware, which it markets as a more cost-effective, time-efficient approach. According to the FCC, some CDMA mobile phone networks and wireless local area network devices are also using the technology in some form.

The new FCC rule, prompted in part by a petition last June from Cisco Systems, builds on software-defined radio ground rules established in 2001 and 2005.

The FCC has always worried that the technology's flexible nature could allow hackers to gain access to inappropriate parts of the spectrum, such as that used for public safety. So the regulators required manufacturers to submit confidential descriptions showing that their products are safe from outside modifications that would run afoul of the government's rules. Cisco's petition asked the regulators to clarify how use of open-source security software, whose code is by definition public, fit into that confidentiality mandate.

In response, the FCC decreed that open-source security software, too, cannot be made public if doing so would raise the risk that the FCC's rules could be sidestepped. Then the commission added: "a system that is wholly dependent on open-source elements will have a high burden to demonstrate that it is sufficiently secure to warrant authorization as a software-defined radio."

In its filing this week, the SDR Forum asked the FCC to allow radio makers to discuss their code in public, as long as they weren't intending to encourage rule-breaking. The group also urged a neutral stance on the security of open-source software, arguing that "academic inquiry and industry discussion coupled with a market test," not regulators, should decide.

The Cisco representative who petitioned the agency for the rule changes was not available for an interview with CNET News.com this week. Robert Pepper, the company's senior technology policy director, said he believed Cisco was comfortable with the new rule. An FCC spokesman said the commission had received and would review the SDR Forum's filing, but it was unclear when it would respond.

The FCC's latest move isn't the first time the open-source side of software radio has faced potential limits.

A few years ago, the agency issued rules that would have made it illegal to manufacture TV tuners and PCs that did not support the controversial "broadcast flag," an anticopying regime backed by the entertainment industry.

A federal appeals court threw out the rules. But if left in place or revived by Congress, they would threaten the ability of consumers to build their own unrestricted radio signal receivers, using the likes of a free software radio toolkit known as GNU Radio.

An attorney for the Software Freedom Law Center, which provides legal services to free and open-source software developers, said the regulators could have done far worse in their latest rule: the FCC acknowledged that the open-source platform may have "advantages," such as lower costs and development time, and it didn't outright ban open-source applications.

"I was gratified at least to see they've moved away from...all the rhetoric a few years ago about how the GPL is a virus and free software is un-American," said Software Freedom Law Center's Norwood.

The lingering concern from the manufacturers' side is that as long as the FCC discourages open discussions of security tactics, consumers will encounter delays or fewer choices in the new gadgets--or products laced with bugs that could have been caught with more collaboration.

The SDR Forum has cited the Secure Socket Layer (SSL), a widely used technique for securing e-commerce transactions, and the National Institute of Standards and Technology (NIST)'s public hash algorithms as evidence that open processes often yield the most highly successful security techniques.

Without similar freedoms for software radio makers, "there may be some people that will shy away or may delay some (software radio) pieces that go out there because they have this extra burden they have to go through," said Bruce Oberlies, chairman of the SDR Forum's regulatory committee.
http://news.com.com/Feds+snub+open+s...?tag=nefd.lede





Report: Carlyle May Bid for Virgin Media

The Carlyle Group private equity firm is in discussions with Virgin Media Inc. over a potential bid for the British cable TV company, The New York Times reported Sunday.

The talks are preliminary and may not lead to a bid, the Times said on its Web site, citing a person familiar with the negotiations that the newspaper didn't name.

The offer for Virgin Media, whose largest investor is Richard Branson, would be worth about $19.6 billion including debt, the person said, placing it among the largest ever in Britain.

A spokeswoman for Virgin Media declined to comment. A message was left Sunday evening seeking comment from The Carlyle Group.

Virgin Media, formed by a merger this year between Branson's Virgin Mobile and cable operator NTL Inc. (nasdaq: NTLI - news - people ), reported its seventh consecutive quarterly loss in May after subscribers defected to rival BSkyB.

Virgin Media lost customers earlier this year after it stopped airing basic BSkyB channels, dropping popular programs such as "Lost," "24," and "The Simpsons," as the result of a battle over fees during negotiations to renew a distribution agreement.

BSkyB has long dominated pay TV in Britain, accounting for around 70 percent of the country's pay-TV subscribers. But the arrival of Virgin Media has threatened a shake-up of the status quo, and relations between the two have become increasingly rancorous in recent months.
http://www.forbes.com/feeds/ap/2007/...ap3875347.html





The Six Stages of E-Mail
Nora Ephron

Stage One: Infatuation

I just got e-mail! I can’t believe it! It’s so great! Here’s my handle. Write me! Who said letter writing was dead? Were they ever wrong! I’m writing letters like crazy for the first time in years. I come home and ignore all my loved ones and go straight to the computer to make contact with total strangers. And how great is AOL? It’s so easy. It’s so friendly. It’s a community. Wheeeee! I’ve got mail!

Stage Two: Clarification

O.K., I’m starting to understand — e-mail isn’t letter-writing at all, it’s something else entirely. It was just invented, it was just born and overnight it turns out to have a form and a set of rules and a language all its own. Not since the printing press. Not since television. It’s revolutionary. It’s life-altering. It’s shorthand. Cut to the chase. Get to the point.

And it saves so much time. It takes five seconds to accomplish in an e-mail message something that takes five minutes on the telephone. The phone requires you to converse, to say things like hello and goodbye, to pretend to some semblance of interest in the person on the other end of the line. Worst of all, the phone occasionally forces you to make actual plans with the people you talk to — to suggest lunch or dinner — even if you have no desire whatsoever to see them. No danger of that with e-mail.

E-mail is a whole new way of being friends with people: intimate but not, chatty but not, communicative but not; in short, friends but not. What a breakthrough. How did we ever live without it? I have more to say on this subject, but I have to answer an Instant Message from someone I almost know.

Stage Three: Confusion

I have done nothing to deserve any of this:

Viagra!!!!! Best Web source for Vioxx. Spend a week in Cancún. Have a rich beautiful lawn. Astrid would like to be added as one of your friends. XXXXXXXVideos. Add three inches to the length of your penis. The Democratic National Committee needs you. Virus Alert. FW: This will make you laugh. FW: This is funny. FW: This is hilarious. FW: Grapes and raisins toxic for dogs. FW: Gabriel García Márquez’s Final Farewell. FW: Kurt Vonnegut’s Commencement Address. FW: The Neiman Marcus Chocolate Chip Cookie recipe. AOL Member: We value your opinion. A message from Hillary Clinton. Find low mortgage payments, Nora. Nora, it’s your time to shine. Need to fight off bills, Nora? Yvette would like to be added as one of your friends. You have failed to establish a full connection to AOL.

Stage Four: Disenchantment

Help! I’m drowning. I have 112 unanswered e-mail messages. I’m a writer — imagine how many unanswered messages I would have if I had a real job. Imagine how much writing I could do if I didn’t have to answer all this e-mail. My eyes are dim. I have a mild case of carpal tunnel syndrome. I have a galloping case of attention deficit disorder because every time I start to write something, the e-mail icon starts bobbing up and down and I’m compelled to check whether anything good or interesting has arrived. It hasn’t. Still, it might, any second now. And yes it’s true — I can do in a few seconds with e-mail what would take much longer on the phone, but most of my messages are from people who don’t have my phone number and would never call me in the first place. In the brief time it took me to write this paragraph, three more messages arrived. Now I have 115 unanswered messages. Strike that: 116.

Stage Five: Accommodation

Yes. No. No . No . Can’t. No way. Maybe. Doubtful. Sorry. So Sorry. Thanks. No thanks. Not my thing. You must be kidding. Out of town. O.O.T. Try me in a month. Try me in the fall. Try me in a year. NoraE@aol.com can now be reached at NoraE81082@gmail.com.

Stage Six: Death

Call me.

http://www.nytimes.com/2007/07/01/opinion/01ephron.html





Google Losing "Gmail" Trademark Cases
IFP

A court in Germany today banned Google from using the name "Gmail" for its popular webmail service following a trademark suit filed by the founder of G-Mail.

Daniel Giersch (33), started using the name G-Mail in 2000, four years before Google released "Gmail".

"Google infringed the young businessman's trademark that had been previously been registered," said the Hanseatic Higher Regional Court in its judgement.

"As far as the Hanseatic Higher Court is concerned, the legal situation is unambiguous to the extent that it has not allowed an appeal to the Federal Court of Justice," said Giersch's lawyer Sebastian Eble, from the office of Preu Bohling & Associates.

The lawyer claimed that it was It is a legendary victory, because for many Daniels fighting "Googliaths," confidence and financial means run out in the long course of battle.

The battle for the trademark has dragged on for three years and has been fought in a number of State jurisdictions.

Google has filed lawsuits against Giersch in Spain, Portugal and Switzerland.

"Google has announced, at least in writing, to 'fight' my client abroad for as long as it takes before he drops the legal claims lodged in Germany," Eble confirmed.

But a court in Switzerland threw out Google's case and now Giersch will file a suit to prohibit Google from using the name in that country.

"I have made it clear since the beginning that I will never sell the name," Giersch said. "It is my sole intention to realise my idea for a hybrid mail system. I am absolutely convinced of its success. Neither "G-mail" nor myself are for sale."

After the Google lawsuits have ended, Giersch hopes to focus his energies into the further development of "G-mail," which he touts as a new "standard of communication on the Internet."

"My hybrid mail system 'G-mail' is an ingenious blend of innovative and well-tried communications solutions," he said. "It
is subject to the principles of the sanctity of the post. Google, on the other hand, scans the content of e-mails to blend in adverts. Criticism about this from data protectors that Google has to deal with harms my business. My employees and I are involved in mix-ups on an almost daily basis."
http://pressesc.com/01183582507_gmail





South Koreans Connect Through Search Engine
Choe Sang-Hun

Park Hye Ran, a 15-year-old high school student, wanted to know the shortest route from a bus terminal in the southern port city of Busan to a fish market to the east.

That is precisely the kind of question that Cho In Joon, 50, a seller of lottery tickets in Busan, loves to answer.

Sitting at a computer installed at his street kiosk, Mr. Cho posted a reply for Ms. Park — and for other Naver.com users who might one day ask the same question — with instructions on where she should switch trains, which station exit she should take and how long it would take to walk from there to the market. He even attached a map of the market area.

Thanks to Mr. Cho and tens of thousands of other volunteer respondents, Web users in one of the world’s most-wired countries seldom “Google” anything. They “Naver” it.

Tapping a South Korean inclination to help one another on the Web has made Naver.com the undisputed leader of Internet search in the country. It handles more than 77 percent of all Web searches originating in South Korea, thanks largely to content generated by people like Ms. Park and Mr. Cho, free of charge.

Daum.net, another South Korean search portal, comes in second with a 10.8 percent share, followed by Yahoo’s Korean-language service with 4.4 percent.

Google, the top search engine in the world, barely registers in the country’s online consciousness, handling just 1.7 percent of South Korean Web searches, according to KoreanClick, an Internet market research company.

“No matter how powerful Google’s search engine may be,” said Wayne Lee, an analyst at Woori Investment and Securities, “it doesn’t have enough Korean-language data to trawl to satisfy South Korean customers.”

When NHN, an online gaming company, set up the search portal in 1999, the site looked like a grocery store where most of the shelves were empty. Like Google, Naver found there simply was not enough Korean text in cyberspace to make a Korean search engine a viable business.

“So we began creating Korean-language text,” said Lee Kyung Ryul, an NHN spokesman. “At Google, users basically look for data that already exists on the Internet. In South Korea, if you want to be a search engine, you have to create your own database.”

The strategy was right on the money. In this country, where more than 70 percent of a population of 48 million use the Internet, most of them with high-speed connections, people do not just want information when they log on; they want a sense of community and the kind of human interaction provided by Naver’s “Knowledge iN” real-time question-and-answer platform.

“When people I have never met thank me, I feel good,” Mr. Cho, the lottery ticket seller, said. “No one pays me for this. But helping other people on the Internet is addictive.”

Each day, on average, 16 million people visit Naver — the name comes from the English words neighbor and navigator — keying 110 million queries into its standard Google-like search function. But Naver users also post an average of 44,000 questions a day through Knowledge iN, the interactive Q.&A. database. These receive about 110,000 answers, ranging from one-sentence replies to academic essays complete with footnotes.

The format, which Naver introduced in 2002, has become a must-have feature for Korean search portals. The portals maintain the questions and answers in proprietary databases not shared with other portals or with search engines like Google. When a visitor to a portal does a Web search, its search engine yields relevant items from its own Q.&A. database along with traditional search results from news sites and Web pages.

Naver has so far accumulated a user-generated database of 70 million entries. Typical queries include why North Korea is building a nuclear bomb, which digital music player is best, why people have cowlicks and what a high school boy should do when he has a crush on a female teacher.

Naver lacks the full-time editorial oversight found on Wikipedia, the free online encyclopedia, and some entries are of dubious veracity and attract vigorous rebuttals. But many respondents, eager to build and maintain an online reputation, do careful research to provide useful answers.

NHN, which employs 27,000, is now the most profitable Internet company in South Korea. The company posted 299 billion won, or $325 million, in profit on 573 billion won in sales last year. It has a market value of more than $8 billion.

The company still runs its popular online gaming site, but its search engine, which sells advertisements and search-generated links to commercial Web sites, generated 52 percent of its revenue last year.

When Daum, Naver’s largest local competitor, began making a big push into the Korean search market last year, it turned to its 6.7 million virtual Internet cafes, which are not physical structures but online user groups built around shared interests.

The cafes create pools of material supplied by people who, for example, went to the same school, support or oppose a free trade agreement with the United States or share an interest in hiking in the mountains. The biggest of the cafes have up to three million members.

By opening its cafes to its search engine, Daum’s market share increased by nearly 30 percent in two years. It took in 22.8 billion won in ad revenue in the first quarter of this year, up 42 percent from a year ago.

Google, which started its search service in the Korean language in 2000, introduced an upgraded Korean-language service in May.

The new version deviates from Google’s celebrated bare-bones style. In South Korea, people prefer portal sites that resemble department stores, filled with eye-catching animation and multiple features.

“It’s obvious to me that Korea is a great laboratory of the digital age,” Eric E. Schmidt, the chairman of Google, said in Seoul at the introduction of the new search service.
http://www.nytimes.com/2007/07/05/te.../05online.html





A Rat Chef Leads Way at Box Office
Brooks Barnes

The rodents of “Ratatouille” and the fireworks of “Live Free or Die Hard” joined at the box office this weekend to narrowly reverse Hollywood’s recent slump, good news for studios as they near the summer movie season’s midway mark.

Pixar’s “Ratatouille,” about a rat who becomes a chef, sold $47.2 million in tickets, enough to make that animated movie No. 1. The revival of a Bruce Willis franchise, “Live Free or Die Hard,” sold an estimated $33.2 million over the weekend (for a total of $48.2 million since it opened Wednesday). “Evan Almighty” ($15.1 million) was No. 3, followed by “1408” ($10.6 million) and “Fantastic Four: Rise of the Silver Surfer” ($9 million).

The performances — along with a healthy per-screen average for the Weinstein Company’s documentary “Sicko” — delivered a 1 percent increase in box office revenue for the weekend over last week, according to Media by Numbers. The last four weekends notched declines of up to 12 percent.

“We’re elated,” Harvey Weinstein said. “It’s been a rough year for documentary.” Michael Moore’s “Sicko” grossed $4.5 million on 441 screens.

The summer box office isn’t shaping up as Hollywood had hoped, despite record-setting releases like “Spider-Man 3.” From May 1 to yesterday, box office revenue climbed 2 percent over the same period last year, to $1.89 billion, according to estimates. But attendance fell 1.4 percent during that period, compared with the same time last year.

“To have four down weekends in a row and have attendance lagging is a surprise,” said Paul Dergarabedian, president of Media by Numbers. Gridlock is an issue. Films are losing audiences as one or more big-budget movies are released every weekend. “We need more movies with legs,” Mr. Dergarabedian said.

Walt Disney’s Pixar is hoping “Ratatouille” falls into that category. Despite its No. 1 rank, “Ratatouille” has some work to do. Its gross was low in comparison with other Pixar blockbusters. Last summer’s “Cars,” for instance, posted a $60 million opening. Chuck Viane, Pixar’s president for distribution, said “Ratatouille” had performed in line with expectations. “It’s like saying Steven Spielberg has to make ‘E.T.’ every time,” Mr. Viane said. “Every movie is different.”
http://www.nytimes.com/2007/07/02/movies/02offi.html





SoundExchange and DiMA Negotiating New Minimum Online Radio Fees
Eliot Van Buskirk

The Copyright Royalty that set the new online radio royalty rates apparently didn't understand that webcasters such as Pandora and Live365 offer thousands of streams, each of which would cost $500 a month under the new rates, killing both sites immediately.

SoundExchange issued a press release saying that it would be willing to limit this minimum-per-channel charge to $2,500 per month until 2008.

DiMA responded immediately that it would agree to this, but only if the term for the new arrangement were extended to 2010 -- or, preferably, forever. Said DiMA head Jon Potter,

"A billion-dollar 'minimum fee' is equally absurd in 2006, 2007, 2008, 2009 or 2010. It should be eliminated – period."

Whatever they decide on, it will have to happen soon, because the new rates go into effect in 16 days. It'd be a shame to see Pandora, Live365, and other multi-stream webcasters eliminated.
http://blog.wired.com/music/2007/06/...xchange-a.html





Media Rights Technologies Petitions Librarian of Congress to Revoke Statutory Broadcasting Licenses
Press Release

Today, Dr. James H. Billington, Librarian of Congress was petitioned by Media Rights Technologies (MRT) to revoke all statutory internet broadcasting licenses granted under Section 114 of U.S. Copyright law for webcasters who are in violation of that section by willfully distributing their content as an interactive service. These webcasters, including Yahoo, Clear Channel, iTunes, Napster, Rhapsody, MSN Music, Pandora, and Live 365, all enable the public to receive program transmissions that can be unlawfully recorded and deaggregated for purposes of redistribution.

CEO Hank Risan, states: "Every broadcast delivered from these services can easily be stream-ripped by the public, downloaded to a user's hard drive on a song by song basis and uploaded onto iPhones and P2P networks. This type of piracy is in clear violation of the performance rights granted to these distributors of copyrighted material under Section 114. MRT believes that the Librarian of Congress will exercise his fiduciary duty and put a stop to this rampant form of digital piracy by immediately revoking their licenses."
http://www.broadcastnewsroom.com/art....jsp?id=158272





Lasers Speed up Hard Drives by 10,000 Percent
Matt Loney

Researchers in the Netherlands say they have come up with a way of using lasers to speed up magnetic hard drives -- and they expect to have a prototype by 2010.

A paper published by Daniel Stanciu of the Institute for Molecules and Materials at Radboud University Nijmegen describes a method of using ultrarapid pulses of polarised light to heat up areas on a hard disk and, crucially, using the same light to change the polarity of those areas. The polarity of the disk storage medium is reversed by reversing the polarity of the laser pulses, according to a report in Science.

Stanciu was not available for comment, but in the abstract accepted for publication by the Physical Review Letters, he wrote, "We experimentally demonstrate that the magnetisation can be reversed in a reproducible manner by a single 40-femtosecond circularly polarised laser pulse, without any applied magnetic field."

This optically induced, ultrafast magnetisation reversal, he said, was previously believed impossible, and it is the combined result of femtosecond laser heating of the magnetic system to just below the Curie point, and circularly polarised light simultaneously acting as a magnetic field.

Similar effects have previously been used in magneto-optical storage devices, but those used a magnetic field applied by conventional means, not by the laser.

According to Science, Stanciu expects to see a working prototype within a decade.
http://www.builderau.com.au/news/soa...9279612,00.htm





In a Bid for Dow Jones, an Entrepreneur Again Finds Murdoch as Rival
Brad Stone

In the continuing saga of Rupert Murdoch’s quest for Dow Jones & Company, perhaps the strangest turn is the rival offer from Brad Greenspan, a former chief executive of Intermix Media, the onetime parent company of the social networking service MySpace.

The 34-year-old Internet entrepreneur, based in Los Angeles, leads an investment group (although he won’t divulge his backers) that he says is willing to spend $1.25 billion to buy 25 percent of Dow Jones for $60 a share.

The News Corporation is offering the same price for all 85 million shares, but Mr. Greenspan believes his bid guarantees editorial independence for The Wall Street Journal and presents potential opportunity for investors who hang onto their shares.

“There’s a lot of upside for the company, the shareholder and the stock based on rolling out and executing the online strategy that I’ve outlined,” Mr. Greenspan said in an interview.

Mr. Greenspan has already had a colorful, even turbulent career in business, one punctuated by fallouts with partners and by lawsuits. And while Mr. Greenspan styles himself as a founder of MySpace, there are fundamental disagreements over his role in the company, as there are over other aspects of his career.

The bankers representing the Dow Jones controlling shareholders, the Bancroft family, appear to be taking his offer seriously, however. On Thursday, Mr. Greenspan met with representatives of Merrill Lynch and Goldman Sachs, which represent the Bancroft family.

But Mr. Greenspan’s bid is unusual for several reasons, not the least of which is that he has sparred with Mr. Murdoch before.

Mr. Greenspan owned 10 percent of Intermix Media when it was purchased by the News Corporation for $580 million in July 2005. He bitterly fought the deal and attempted to mount a rival bid. Later, he claimed that the company was worth more, and subsequently filed a lawsuit in California state court against Intermix and its management, charging that they undervalued MySpace and ignored competing bids.

Although a judge dismissed the case in December (Mr. Greenspan is considering an appeal) the market, at least, has confirmed his essential judgment. News Corporation got a bargain when it picked up the social networking site, and the deal is now viewed as one of the smartest in Internet history.

But Mr. Greenspan insists his attempt to outmaneuver Mr. Murdoch this time is not personal.

“It’s a business transaction and I see a huge upside for the investors I’m bringing into this,” he said. “And I love the Wall Street Journal brand.” But there were also unique forces at work behind the scenes of the News Corporation’s acquisition of Intermix, some of them set into motion by Mr. Greenspan.

In the late 1990s, Mr. Greenspan founded Intermix, then known as eUniverse, a loose collection of online businesses engaged in entertainment and online marketing. While he led eUniverse, he purchased an online marketing company called ResponseBase. Two of its employees, Chris DeWolfe and Tom Anderson, are now considered the co-founders of MySpace and work for the News Corporation.

But Mr. Greenspan says he directed the effort inside eUniverse to create a clone of Friendster, an early social networking site, although at least one former board member at Intermix has disputed that account.

In 2003, Nasdaq delisted Intermix, saying that the company had failed to comply with accounting regulations. That same year the company received an infusion of capital from venture capitalists. Deep disagreements with the board followed, and Mr. Greenspan left the company, waging a proxy battle the following year to try to regain control.

In April 2005, the New York attorney general, Eliot Spitzer, sued Intermix for putting the difficult-to-remove advertising software known as spyware onto the computers of Internet users without their permission. The looming investigation, and the shareholder lawsuits against Intermix that followed, added pressure for the company’s board to sell the firm. (Intermix settled with Mr. Spitzer’s office that year for $7.5 million.)

Mr. Greenspan concedes that the spyware business started under his watch.

“In hindsight it was an area that was probably not as consumer-friendly as we could have been, compared to our other products we were working on,” he said. But he says Intermix’s spyware problem worsened after he left.

In mounting his offer to Dow Jones, Mr. Greenspan has talked about putting together an online financial channel using the company’s assets.

“I have the credibility for knowing how to create great assets and what’s going to be the next big thing,” he said. He has also emphasized his belief in the editorial independence of The Journal.

Mr. Greenspan has, in the past, made his views clear about news articles that he disagrees with. In March, this reporter wrote an article about MySpace’s increasingly restrictive policy on third-party software tools. The article did not mention yet another lawsuit that Mr. Greenspan has filed against the News Corporation, claiming the company was restricting free speech on the site by blocking such software. Mr. Greenspan wrote in an e-mail message, “How did you miss the boat so badly?”

Asked about the e-mail message now, Mr. Greenspan said he may have been “cranky” that day.
http://www.nytimes.com/2007/07/02/bu...span.html?8dpc





Is Intellectual Property the Key to Success?
Jeffrey Tucker

One of the greatest tragedies of intellectual property law is how it generates intellectual confusion among successful businesspeople. Many are under the impression, even when it is not true, that they owe their wealth to copyrights, trademarks, and patents and not necessarily to their business savvy.

For this reason, they defend intellectual property as if it were the very lifeblood of their business operations. They fail to give primary credit where it is due: to their own ingenuity, willingness to take a risk, and their market-based activities generally. This is often an empirically incorrect judgment on their part, and it carries with it the tragedy of crediting the state for the accomplishments that are actually due to their own entrepreneurial activities.

Certainly there is no shortage of narratives ready to back up this misimpression. Countless business histories of the US observe how profits come in the wake of patents and thereby assume a causal relationship. Under this assumption, the history of American enterprise is less a story of heroic risk and reward and more a story of the decisions of patent clerks and copyright attorneys.

As a result, many people think that the reason the United States grew so quickly in the 19th century was due to its intellectual property protection, and assume that protecting ideas is no different from protecting real property (which, in fact, it is completely different).

A clue to the copyright fallacy should be obvious from wandering through a typical bookstore chain. You will see racks and racks of classic books, presented with beautiful covers, fancy bindings, and in a variety of sizes and shapes. The texts therein are "public domain," which isn't a legal category as such: it only means the absence of copyright protection.

But they sell. They sell well. And no, the authors are not misidentified on them. The Bronte sisters are still the authors of Jane Eyre and Wuthering Heights. Victor Hugo still wrote Les Miserables. Mark Twain wrote Tom Sawyer. The much-predicted disaster of an anti-IP world is nowhere in evidence: there are still profits, gains from trade, and credit is given where credit is due.

Why is this? Quite simply, the bookstore has gone to the trouble of bringing the book to market. It paid the producer for the book and made an entrepreneurial decision to take a risk that people will buy it. Sure, anyone could have done it, but the fact is that not everyone has: the company made the good available in a manner that suits consumer tastes. In other words, with enterprise comes success. It is no more or less simple than that. IP has nothing to do with it.

So it would be in a completely free market, which is to say, a world without IP. But sometimes businessmen themselves get confused.

Let's consider the case of an ice-cream entrepreneur with a hypothetical brand name Georgia Cream. The company enjoys some degree of success and then decides to trademark its brand name, meaning that it now enjoys the monopoly on the use of the name Georgia Cream. And let's say that the company creates a flavor called Peach Pizzazz, which is a great success, so it copyrights the recipe such that no one can publish it without the company's permission. It then realizes that the special quality of its ice cream is due to its mixing technique, so it applies for and achieves a patent on that.

So this company now has three monopolies all sewn up. Is that enough to ensure success? Of course not. It must do good business, meaning that it must economize, innovate, distribute, and advertise. The company does all these things and then goes from success to success.

If you suggest to the founder and CEO that we should get rid of intellectual property law, you will elicit a sense of panic. "That would completely destroy my business!" How so? "Anyone could just come along and claim to be Georgia Cream, steal our recipe for Peach Pizzazz, duplicate our mixing technique, and then we'd be sunk."

Do you see what is happening here? A small change that would threaten the very life of the business is indirectly being credited, by implication, for being the very life of the business. If that were true, then it would not be business prowess that made this company, but government privilege, and that is emphatically not true in this case. The repeal of intellectual property legislation would do nothing to remove from the business its capacity to create, innovate, advertise, market, and distribute.

The repeal of IP might create for it an additional cost of doing business, namely efforts to ensure that consumers are aware of the difference between the genuine product and impersonators. This is a cost of business that every enterprise has to bear. Patents and trademarks have done nothing to keep Gucci and Prada and Rolex impersonators at bay. But neither have the impersonators killed the main business. If anything, they might have helped, since imitation is the best form of flattery.

In any case, the costs associated with keeping an eye on imitators exists whether IP is legally protected or not. To be sure, some businesses owe their existing profits to patents, which they then use to beat their competitors over the head. But there are costs involved in this process as well, such as millions in legal fees.

Big companies spend millions building up warchests of patents that they use to fight off or forestall lawsuits from other companies, then agree to back down and cross-license to each other after spending millions on attorneys. And no surprise, just as with minimum wage or pro-union legislation, the IP laws don't really hurt the larger companies but rather the smaller businesses, who can't afford million-dollar patent suit defenses.

The Internet age has taught that it is ultimately impossible to enforce IP. It is akin to the attempt to ban alcohol or tobacco. It can't work. It only succeeds in creating criminality where none really need exist. By granting exclusive rights to the first firm to jump through the hoops, it ends up harming rather than promoting competition.

But some may object that protecting IP is no different from protecting regular property. That is not so. Real property is scarce. The subjects of IP are not scarce, as Stephan Kinsella explains. Images, ideas, sounds, arrangements of letters on a page: these can be reproduced infinitely. For that reason, they can't be considered to be owned.

Merchants are free to attempt to create artificial scarcity, and that is what happens when a company keeps it codes private or photographers put watermarks on their images online. Proprietary and "open-source" products can live and prosper side-by-side, as we learn from any drug store that offers both branded and generic goods inches apart on the shelves.

But what you are not permitted to do in a free market is use violence in the attempt to create an artificial scarcity, which is all that IP legislation really does. Benjamin Tucker said in the 19th century that if you want your invention to yourself, the only way is to keep it off the market. That remains true today.

So consider a world without trademark, copyright, or patents. It would still be a world with innovation — perhaps far more of it. And yes, there would still be profits due to those who are entrepreneurial. Perhaps there would be a bit less profit for litigators and IP lawyers — but is this a bad thing?
http://www.mises.org/story/2632
JackSpratts is offline   Reply With Quote