View Single Post
Old 23-02-06, 10:22 PM   #1
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,018
Default Peer-To-Peer News - The Week In Review - February 25th, ’06


































"Questions of new technologies that share files completely anonymously across networks provoked defiant applause from the room." – D. Clark Denison


"We have seen no effect on the eDonkey traffic levels." – Andrew Parker


"Telstra does not shape file sharing traffic." – ISP spokesman


"I've downloaded maybe 50 songs [from iTunes], but I was always more likely to borrow CD's from my friends." – Alex Ostrovsky


"I could get the same amount of money from my parents, but that wouldn't tell me if my business plan or idea was a good one. That tells me my parents love me." – Jeff Mellen


"Copying of music and movies is more prevalent today than it was in 2001 when Napster was at its height. All the lawsuits against thousands of individuals as well as people maintaining sites like Razorback2 don't appear to be making a serious dent in peer-to-peer file sharing." – Fred von Lohmann


"Have you reached out to the family? I can ask it 10 more times if you refuse to answer it. You are under oath." – Rep. Tom Lantos, D, CA



































February 25th, ’06





Razorback Servers Seized
Thomas Mennecke

It appears that one of the largest eDonkey2000 communities is no more. Often occupied by over 1 million eDoney2000 users spread over several servers, Razorback2 is often regarded as the very lifeblood of this network. This morning, users of this server network found their community offline.

At this time, details are extremely scarce. However it is being reported the Federal Belgian Police have raided and seized Razorback2's servers. In addition, it is suspected the administrator of Razorback2 is currently in custody.

Razorback2 was an eDonkey2000 indexing server - very different in nature from an indexing site such as ShareReactor. Unlike indexing sites, Razorback2's index was only available through an eDonkey2000 client such as eMule. While it does not host any actual files or multimedia material, it does index the location of such files on the eDonkey2000 network. The legality of such indexing remains questionable, however this has not deterred copyright enforcement actions.

Giving credence to this report, the Razorback2 home page simply times out upon request. In addition, pinging the IP address of Razorback's home page and eDonkey2000 servers yields the same result. Only "fake" Razorback2 servers are online, communities designed by copyright enforcement entities to mimic yet deter unauthorized file-sharing.

The Belgian Federal Police homepage at this time have no information regarding this raid, however considering the magnitude of the situation this should change. One thing is certain; Razorback2 has been removed from the eDoneky2000 network. Most noticeably, the eDonkey2000 population has shrunk from its usual 3.5 million users to approximately 3 million users - an unusual departure from its average.

Update: Below is the MPA press release provided to Slyck.com:

BELGIAN & SWISS AUTHORITIES BREAK RAZORBACK2

World's Largest P2P Facilitator Put Out of Illegal Business

Brussels, Los Angeles-- In a joint operation today police and prosecuting authorities in Belgium and Switzerland shut down the infamous file-swapping network Razorback2. Razorback2 was the number one eDonkey peer-to-peer server facilitating the illegal file swapping of approximately 1.3 million users simultaneously. Razorback2 was operated as a commercial enterprise indexing over 170 million files including millions of copyrighted movies, software, games, TV programming and music with international and U.S. titles. The site was regularly used by people located all over the world, with the vast majority of users based in Europe.

"This is a major victory in our fight to cut off the supply of illegal materials being circulated on the Internet via peer-to-peer networks," said Motion Picture Association (MPA) Chairman and CEO Dan Glickman. "By shaving the illegal traffic of copyrighted works facilitated by Razorback2, we are depleting other illegal networks of their ability to supply Internet pirates with copyrighted works which is a positive step in our international effort to fight piracy."

Swiss authorities arrested the site's operator at his residence in Switzerland this morning and searched his home. At the same time, on the authority of a local magistrate, Belgian police seized the site's servers located at an Internet hosting center in Zaventem near Brussels. The operation conducted by Swiss and Belgian authorities aimed at cutting off a major supply and facilitator of illegal files to several popular illegal file swapping networks. By shutting down Razorback2, the ease with which pirates can obtain illegal content online will slow dramatically. Since November of 2004, authorities have closed down all of the major eDonkey servers in the United States, and now, Europe.

The operators of Razorback2 had clear financial motives. In addition to collecting "donations" from users, revenue was also generated through the sale of advertising on the site, usually promoting pornographic websites. In addition, the availability of offensive content will be inhibited. The operators of this eDonkey site chose not to exercise control over files being traded by users which including those containing child pornography, bomb-making instructions and terrorist training videos.

"Razorback2 was not just an enormous index for Internet users engaged in illegal file swapping, it was a menace to society," said Executive Vice President and Worldwide Anti-Piracy Director John G. Malcolm. "I applaud the Swiss and Belgian authorities for their actions which are helping thwart Internet piracy around the world."

Razorback2 posted statistics on its site regarding the number of uses online at any one time, reveling in its reputation as the world's largest P2P facilitator. Today, users attempting to connect to Razorback2 read the message "Razorback space 2.0 appears to be dead."

Chris Marcich, Senior Vice President and Managing Director of the MPA's European Office said: "We are very grateful to the Swiss and Belgian authorities for their cooperation and effective action in dealing with this particularly egregious enterprise and the individual profiting from it."

The MPA and its member companies, working with the local film industries, have a multi-pronged approach to fighting piracy, which includes educating people about the consequences of piracy, taking action against Internet thieves, working with law enforcement authorities around the world to root out pirate operations and working to ensure movies are available legally using advanced technology.
http://www.slyck.com/news.php?story=1102





Schwarzenegger Signs Tougher Law On Counterfeit CDs

California Governor Arnold Schwarzenegger has signed a new law cracking down on the sale of counterfeit CDs. The new law reduces the threshold for felony criminal sales of pirated CDs from 1,000 copies down to 100. "Intellectual property rights and creativity are bedrocks of the California economy," Schwarzenegger said after signing the bill, according to the Los Angeles Times. "This bill makes it easier for authorities to crack down on the rip-off artists who illegally copy and sell music CDs."

The Recording Industry Association of America (RIAA) and the National Association of Recording Merchandisers (NARM) both praised the decision, saying that lowering the threshold to 100 units will make it much more difficult for CD pirates to balance their need for illegal inventory with the risk of being caught and facing serious consequences.

"Every time a pirated CD is sold at a flea market, street-side table or retail outlet, the works of many talented artists, record label employees, writers, technicians, designers and producers are stolen,” said Mitch Bainwol, Chairman and CEO of the RIAA. “This law ensures that thieves threatening the livelihoods of those in the music industry will face much greater risk of being prosecuted and appropriately punished. This law will make thieves think twice about peddling stolen music.” He added, “It is critical that this activity be treated for what it is – dealing in stolen property and profiting from it. And that must come with serious consequences."

A statement from the RIAA and NARM says that in 2005, more than one million pirated music CDs were seized in California. More than 1,200 arrests were made related to those seizures. "Retailers who operate legally shouldn't have to deal with unfair competition from thieves,” said NARM President Jim Donio. “Independent stores like Dimple Records and major chains like Tower Records, both headquartered in Sacramento, and all the other companies who run businesses or have stores in the state of California welcome this important anti-piracy legislation."
http://www.fmqb.com/Article.asp?id=178771





British Police Unit Targets Film Piracy

A police unit dedicated to combating movie piracy and those responsible for the manufacture and distribution of pirated films has launched in London.

In partnership with the Federation Against Copyright Theft (Fact), the new unit will pursue individuals and groups profiting from the sale of fake DVDs.

"This will clearly send a message that this type of crime will not pay," said Det Chief Superintendent Nigel Mawer.

Fact's Ray Leinster called the creation of the unit "a unique development".

By targeting the financial gains at the heart of film piracy, the Metropolitan Police unit hopes to prevent the funding of criminal activities in other areas.

'Significant profits'

"This will assist Fact's capacity to address and confront the threats from organised networks which are making significant profits from film piracy," said Mr Leinster, director general of Fact.

"The creation of the unit is also proof of the increasing recognition of film piracy as a crime of significance amongst the law enforcement community."

The unit, which will initially operate for a one-year period, will work alongside Fact collating intelligence on crime trends and activities in film piracy.

UK-based Fact represents major British and US film companies, as well as media distributors and companies within the TV industry.

Initially set up in 1983 to deal with videotaped feature films, the organisation increasingly investigates copyright infringement involving DVDs and other digital formats.
http://news.bbc.co.uk/go/pr/fr/-/1/h...nt/4740668.stm





MPAA Sues Newsgroup, P2P Search Sites
John Borland

The Motion Picture Association of America said Thursday that it sued a new round of popular Web sites associated with movie piracy, including several that serve as search engines but do not distribute files themselves.

The lawsuits mark an expansion of the copyright holders' legal strategy in the file-swapping world, targeting sites that help make downloading easier, but aren't actually delivering the files or the swapping technology themselves.

It's also the first time the group has sued organizations that direct their members to the Usenet newsgroup system, an MPAA spokeswoman said. The movie group makes little distinction between a peer-to-peer network and the search engines that point to pirated works, saying that all facilitate the distribution of copyright works.

"Disabling these powerful networks of illegal file distribution is a significant step in stemming the tide of piracy on the Internet," John Malcom, MPAA director of Worldwide Antipiracy operations, said in a statement.

The issue of targeting search engines rather than actual file-swapping networks themselves has been a touchy one in Silicon Valley, because ordinary search engines such as Google and Yahoo also can be used to find pirated works.

The Digital Millennium Copyright Act protects search engines from liability for linking to pirated works, but only if the site operators don't know that the specific content is infringing, are not deriving financial gain from the links, and act quickly to remove the links when contacted by copyright holders.

Unlike a traditional search engine such as Google, the sites targeted Thursday are filled almost exclusively with links and references to copyright movies, software and music.

IsoHunt, one of the largest search engines targeted, does provide a copyright statement that says, "We respect copyright, and will filter such P2P links at your request."

The full list of sites sued Thursday include Torrentspy.com, IsoHunt, BTHub.com, TorrentBox.com, NiteShadow.com, Ed2k-It.com, NZB-Zone.com, BinNews.com and DVDRs.net.

Electronic Frontier Foundation attorney Fred von Lohmann said that the courts had not yet ruled on whether search tools could be held liable for copy infringement. Most relevant cases, such as record labels' suit against MP3Board several years ago, have been settled before the issue has come to trial, he said.

"We haven't had a case that really tests the case of whether providing an indexing service by itself an infringement," von Lohmann said.

Thursday's suits are part of a growing series of lawsuits, criminal and civil actions taken around the world, as the movie industry works to stamp out the still-strong growth of film and TV show swapping online.

The MPAA has had a string of successes targeting sites that distribute movies in the BitTorrent file format, shutting down popular hubs such as Suprnova, LokiTorrent, and others. Earlier this week, the Hollywood announced that it had collaborated with Swiss and Belgian police to shut down a major European server called Razorback 2, part of the eDonkey network, which was allegedly used by as many as 1 million people.

File-swapping traffic has continued to grow globally throughout the course of the legal actions, however. Net monitoring firm CacheLogic estimates that P2P still accounted for more than 60 percent of overall Internet traffic at the beginning of 2006, with video files accounting for about 60 percent of that data.

Traditional peer-to-peer software companies such as eDonkey and LimeWire have not been targeted by lawsuits in recent months. However, they have faced warnings from record labels and the MPAA that their turn could come soon if they continue to allow unregulated swapping online.

The MPAA previously announced an agreement with BitTorrent.com, the creators of the BitTorrent file-swapping technology who also run a file search engine. Under that agreement, BitTorrent agreed to take down links to feature films in its search tool.
http://news.com.com/MPAA+sues+newsgr...3-6042739.html





Are Usenet Fans Vulnerable To Copyright Lawsuits?
John Borland

In a new series of lawsuits, Hollywood studios for the first time are targeting companies that provide access to Usenet newsgroups.

This corner of the Internet, largely a leftover from the days before the Web exploded into the mainstream, rarely gets much attention. It's still primarily a forum for text discussions (and overwhelming amounts of spam), where techies help one another with Windows and driver problems, and animal lovers share cat stories.

But in the last few years, a handful of technologies have emerged that have made newsgroups a much more fertile place for downloading copies of movies, music and software. Here's a quick primer on what happens there and what the Motion Picture Association of America has done.

Q: What are newsgroups?
A: Also known as Usenet, newsgroups are one of the earliest forms of sustained conversation online. Initially started by Duke University graduate students in 1980, Usenet evolved over the years into thousands of individual newsgroups that focused on specific subjects such as dogs, science fiction authors, politics or pornography.

Readers post messages similar to e-mails to a specific group. All the content of that group is relayed through servers across the Net, and can be read with a newsgroup reader such as Forte's Agent, or inside some other Web browser and e-mail programs. Most ISPs subscribe to a newsgroup feed, though these are becoming harder to find. Google archives much of Usenet's traffic, all the way back to January 1981, at groups.google.com.

Another historical note: Before becoming a Web standby, the "frequently asked questions," or FAQ, format was widely popularized on newsgroups (though it didn't originate with them).

Q: What does this have to do with piracy?
A: Early on, people learned to send pictures, movies or even full software applications through Usenet groups by breaking the large files into small individual pieces and sending them separately. These large files, called "binaries," could be reconstructed by most newsgroup software, as long as all the pieces came through.

Q: Is this the same as file-sharing?
A: In a sense. Uploading a copyrighted file to a newsgroup is illegal, and the recording industry has targeted individual posters in the past (though largely before peer-to-peer networks emerged).

But unlike peer-to-peer networks, the files uploaded are stored in pieces on the Usenet servers around the world, not on individual computer users' hard drives.

Q: Isn't all this harder than using BitTorrent or eDonkey?
A: For most of Usenet's history, it has been much harder, and more inefficient. Big movie or software files can be broken into hundreds of individual pieces, for example, and if one or two get lost, it can make the whole movie or application unusable.

But in the last few years, several technologies have emerged to make this easier.

One, called Par files (shortened from Parity), lets big files be reconstructed even if some of the individual pieces are missing. Par files are used in other places where data transfer is unreliable, and they are becoming increasingly common on Usenet.

The other technology is an innovation similar, in a sense, to BitTorrent's torrent files. Dubbed NZB files (and created by a company called NewzBin), they automatically group together all the disparate pieces of a big binary file, allowing it to be downloaded and reconstructed with a single click.

Q: Who is the MPAA actually targeting?
A: With this round of suits, the MPAA is focusing on a small group of companies that search the Usenet feeds for movies, software, music and other files. Some of them provide the NZB files along with the search results, so the files can be instantly downloaded. Others simply provide an index of everything that's been posted to newsgroups.

Q: Are newsgroup search engines illegal, then?
A: That's a tricky question. The MPAA says all the sites they've sued are facilitating piracy. But the legal status of search engines has never quite been clarified, and indeed, Google itself is the largest newsgroup search tool in existence.

The Digital Millennium Copyright Act provides a legal shield, or "safe harbor" for search engines that meet a certain set of requirements, including the ability for copyright holders to request that links to copyrighted material be taken down.

BinNews, a Florida-based site that was sued on Thursday, contends that it doesn't provide direct links to files and in fact helps copyright holders find their works on Usenet so they can be removed. Its owner, a 31-year-old businessman named Joe (he declined to provide his last name), says he'll fight the lawsuit.

Q: Are people who have uploaded or downloaded copyrighted files from Usenet at legal risk?
A: The current lawsuits are targeting only the search engines and NZB file hubs. However, as with virtually every activity on the Internet, uploading and downloading files from Usenet does leave a trace that can be tracked back to the individual ISP and computer, if copyright holders dedicate enough resources to it.
http://news.com.com/Are+Usenet+fans+...3-6043057.html





RIAA Alters 'Sloppy' Testimony
p2pnet

Did RIAA spokesman Jonathon Whitehead deliberately switch the names of two completely different p2p applications in an attempt to con a judge hearing a p2p file sharing case?

No, says the RIAA (Recording Industry Association of America) in a plea to have Whitehead's testimony changed. It was a "clerical error".

Programming expert Zi Mei has been shredding Whitehead's evidence in Atlantic Recording v John Does 1-25, with Ty Rogers representing John Doe.

"He asserts that all Does are Gnutella users, directly contradicting earlier testimony, which included pages of Kazaa screenshots," said Mei last time around.

"This demonstrates that he either doesn't have a clue what he's talking about, or that he's simply inventing evidence and switching to Limewire after we totally destroyed him on the Kazaa stuff, hoping no one would notice.

"It's obvious that Mr. Whitehead doesn't know Kazaa from a kazoo either, or he's simply pretending he doesn't. The RIAA's 'investigative' techniques are sloppy and harmful, to say the least."

Now, the RIAA has amended the "error" in its Second Whitehead Declaration in Atlantic v Does 1-25, "claiming that its previous version - saying that all defendants were users of Gnutella - was wrong, and that only 11 of the 25 were Gnutella users, while 14 were Kazaa users," says Ray Beckerman's Recording Industry vs The People."

"Whitehead said in his Second Declaration that ALL the Does were indeed Gnutella users," Mei told p2pnet.

"They're trying to downplay the maneuver by saying it should be allowed, and that this new information doesn't prejudice the defendant, but really, it just goes to show you how sloppy and irresponsible the RIAA are with their claims and statements."
http://p2pnet.net/story/8017





Big Three ISPs Say Peer-To-Peer OK
Andrew Colley

BROADBAND customers of Australia's largest ISPs can use peer-to-peer file- sharing services such as BitTorrent and Kazaa without being throttled by their ISP, at least for now.

Australia's largest internet providers say they are not limiting peer-to-peer file sharing traffic on their networks and have no immediate plans to impose restrictions on the activity.

However, some say they have the means to apply limits if that is required in the future.

Internet suppliers recently revealed that file- sharing traffic is restricted on two of Australia's best-known dedicated wireless data networks.

This prompted fears of the practice being adopted more widely.

Unwired, which markets its portable service to students, confirmed that it limited peer-to-peer traffic on some parts of its network to smooth the flow of data that it classes as real-time.

Two iBurst resellers, Independent Service Providers and BigAir, have defended the practice of prioritising some forms of internet traffic.

Australia's top three broadband providers, Telstra, Optus and iiNet say they don't differentiate between peer-to-peer and other forms of internet traffic.

"Telstra does not shape file sharing traffic," a Telstra spokesman says.

The only shaping Telstra does is to accounts that have gone over 10GB in a month, he says.

IiNet managing director Michael Malone said internet providers needed to ensure their networks were free of congestion, rather than differentiate between types of traffic.

IBurst and Unwired were trying to reduce their bandwidth bills, he said.

Peer-to-peer use was targeted because it was likely to involve "dodgy" activity, he said.

"From our point of view, if you tell a customer you're getting 2GB of downloads during the month, that's what we need to supply," he said.

Optus said it had the technical means to prioritise traffic on its network but that it would only use the technology in emergencies or "some other unforeseeable circumstance".

IBurst reseller Pacific Internet said fixed-line internet pricing plans were more appropriate than wireless plans for peer-to-peer users.

Broadband users are divided on the practice.

One broadband user who asked not to be named said deprioritisation of traffic was a reasonable way of addressing network congestion problems.

"Deprioritisation should be applied to applications that can tolerate reduced throughput and increased response times, including P2P," he said.

IBurst user Boyd Chan said ISPs should only use traffic prioritisation when it was "absolutely necessary".

"ISPs should be geared up with the necessary backhaul to support whatever amount of data at whatever time of the day to support their users," Mr Chan said.

Some ISPs are sceptical that limiting peer-to-peer file sharing traffic was feasible from a technical standpoint.

"It's technically very dodgy to do," Mr Malone said.
http://australianit.news.com.au/arti...E15306,00.html





MUTE P2P File Sharing Host Selection Weakness
Secunia Advisory

Gary Whetstone has reported a weakness in MUTE, which potentially can be exploited by malicious people to bypass certain security restrictions.

A design weakness in the MUTE client causes it to select hosts to connect to based on 10 random hosts that are retrieved from a single mWebCache. This can potentially be exploited to cause MUTE to connect to malicious hosts if the mWebCache has been populated with addresses of malicious hosts.

Successful exploitation discloses the identity of the MUTE client.

The weakness has been reported in 0.4.1. Other versions may also be affected.

Solution:
The weakness will reportedly be fixed in the next release.

Provided and/or discovered by:
Gary Whetstone

Original Advisory:
http://cvs.sourceforge.net/viewc.../...xt?view=markup
http://secunia.com/advisories/18980





I.B.M. Researchers Find a Way to Keep Moore's Law on Pace
John Markoff

I.B.M. researchers plan to describe an advance in chip-making on Monday that could pave the way for new generations of superchips. The development, which comes from materials research in the design of advanced lenses and related technologies, will make it possible to create semiconductors with wires thinner than 30 nanometers, one-third the width in today's industry-standard chips.

The advance potentially clears one of the biggest hurdles facing the progress of Moore's Law, the observation of Gordon E. Moore, a co-founder of the Intel Corporation, that the density of chips doubles roughly every two years. Mr. Moore made the observation about chip-making technology in 1965, and most semiconductor engineers now believe that the doubling rate will continue through at least the middle of the next decade.

Currently, the densest computer memory chips store 4 billion bits of information; the extension of Moore's Law might make possible a generation storing 64 billion bits by 2013. Such a chip could store roughly 2,000 songs based on today's storage standards.

The industry now uses advanced laser light sources to photo-etch wire lines that are finer than the wavelength of light itself. This is done by generating interference patterns that allow subwavelength resolution. But there had been a general consensus in the industry that this technology would fail below 40 nanometers, requiring a shift to X-ray light sources or other printing technologies.

A group of I.B.M. researchers who collaborated with a team from JSR Micro, an advanced materials company based in Sunnyvale, Calif., will present papers describing the advances at an industry technical conference on photolithography to be held in San Jose, Calif., beginning Monday.

The researchers have created the thinnest line patterns to date using deep ultraviolet lithography, the laser technology used to print circuits on chips. The research has yielded a set of ultrafine lines, each only 29.9 nanometers in width. (A nanometer is a billionth of a meter.)

I.B.M. technologists said the demonstration reduced the risk in the decisions being made by the industry as to which technologies to bet on as many as five years in the future.

"We would like to show a pathway to continue optical lithography," said Robert D. Allen, manager of lithography materials at the I.B.M. Almaden Research Center.

The industry has also been pursuing X-ray light sources as a path to the future. That technology, however, would require that the semiconductor manufacturing industry be drastically revamped. For example, using X-ray light sources would require the industry to use mirrors rather than optical lenses to focus the X-ray sources.

The advance also indicates that the industry has found a way to continue to extend the life of argon fluoride excimer lasers that generate the ultraviolet light used in the photolithographic process. Those lasers have a wavelength of 193 nanometers, yet they are now used commercially to create chips with components as fine as 65 nanometers.

The key to pushing the technology further is a fluid immersion process for conducting the light onto the material that is etched to form the circuit pattern.

The researchers discovered that they could enhance the resolving power of the light source by shifting to a lens made from a crystalline quartz material and exotic immersion liquids that have better refraction properties than those currently used by the industry.

"This is significant," said Fred Zieber, a semiconductor industry analyst at Pathfinder Research. He noted, however, there is more required to turn this into a commercial lithographic process.

The I.B.M. researchers performed their research on a custom piece of equipment they call Nemo, referring to the character in Jules Verne's novel "20,000 Leagues Under the Sea."
http://www.nytimes.com/2006/02/20/te...y/20chip.html?





US Government May Outlaw Rootkits
Eric Bangeman

Several months after the discovery that Sony included a dangerous rootkit on some copy-protected music discs, the reverberations are still being felt. Late last week, the US Department of Homeland Security said that if companies fail to clean up their act when it comes to rootkits, the government would take action. Although there is currently no legislation pending, the DHS said that new laws or other regulations "may be warranted" if companies continue to trample on the security of their customers' systems.

Last fall, a security researcher digging around in his system discovered a rootkit installed by a Sony disc and created by a UK company called First 4 Internet. At first, Sony brushed off the problem, but after several days of PR nightmares, the company caved in and announced it would stop using First 4 Internet's software and a few days later, decided to recall all infected discs.

Aside from raising the public awareness of the dangers of DRM—especially when companies are not forthright about its existence and functionality—Sony's monumental blunder led to the inevitable lawsuits and subsequent settlement.

What is not as widely known is that officials from the Department of Homeland Security met with Sony and read them the riot act, according to Jonathan Frenkel, direcdtor of law enforcement policy for the DHS's Border and Transportation Security Directorate. The DHS is concerned that the problem could recur, albeit on a larger scale. "It's a potential vulnerability that's of strong concern to the department," said Frenkel.

Despite the DHS's public warning, the problem of obtrusive DRM isn't likely to disappear anytime soon. MPAA and RIAA member companies are bound and determined to shove DRM down our throats, telling us that we need it in order to resist the temptation to become evil pirates. But DRM is not about piracy, it's about being able to charge multiple times for the same content.

At least Sony's blunder brought the issue of DRM into the public eye, with some results. SunnComm, a DRM software maker, said that future versions of its software would be better behaved. Based on the warnings emanating from the DHS, companies using DRM will have to learn to operate above-board if they want to avoid government intervention in the form of legislation. The threat of action is nice, but outlawing DRM that potentially compromises the safety of a user's system is a better solution. If such legislation was in place last year, tens of thousands of people wouldn't have had their PCs compromised by a rootkit from Sony.
http://arstechnica.com/news.ars/post/20060220-6217.html





Broadcast Treaty Has Potential To Grant Unwarranted "Protections"
Peter Pollack

The subject of an ongoing series of discussions between the World Intellectual Property Organization (WIPO), broadcasters, and representatives from a variety of nations, the WIPO Broadcast Treaty carries the promise of standardizing how certain types of intellectual property are treated around the world. It also presents the ominous threat of granting a powerful 50-year right of control to anyone who first broadcasts audio or video content.

A video featuring comments on the WIPO treaty by US Copyright Office head Marybeth Peters has recently surfaced. In it, she sheds some light on the fact that, although US broadcasters would love to see the additional control granted to them, at least some people in the government are not necessarily in agreement on the issue, and the topic is not yet decided. Because the WIPO Broadcast Treaty is not yet a hot-button issue, many people may not have heard much about it and a bit of background is in order.

For the purposes of our discussion, it should be noted that broadcasters are separate from content creators. Broadcasters are working to protect you (in theory) and themselves (most certainly) from evildoers who would steal a legitimate broadcast signal. They plan to institute this protection by gaining specific legal rights for themselves at the expense of the content creator and the fair use. If you've ever posted any kind of sound and video on the Internet, you could be affected by this provision of the Broadcast Treaty, should it be adopted.

First, let's try to envision an environment in which a person creates a work of audio and video. That person would then be considered the copyright holder. If that person licenses their work to a broadcaster, a contract would be created that enumerates exactly what the broadcaster is allowed to do, and for how long it can be done, e.g., the broadcaster has exclusive rights to broadcast the work for five years, etc. After the term of the contract, the copyright holder gets those rights back.

If that idea makes sense to you, take a look around, because that's essentially the situation we have in the United States right now. There are exceptions and nuances to copyright law that have been omitted for the sake of clarity, but the overall concept remains true.

In other parts of the world, the situation is somewhat different:

... nearly 50 years ago broadcasters in some countries got an additional right, layered on top of the copyright. Even if the material being broadcast was in the public domain, or the copyright holder had no objection to redistribution, the broadcaster was given a legal right to prevent it - a 20-year period of exclusivity. The ostensible reason was to encourage broadcasters to invest in new networks.

In the early days of broadcasting, governments often instituted regulations which affected the broadcasting environment in their country for many years to come. Some of these regulations were smart, some were foolish. In hindsight, the idea that broadcasters needed a 20-year copyright-like period to maintain control of a broadcast seems odd. The US had no such law, and American broadcast networks have thrived so much that many societies around the world—including our own—have spent much of the past half-century wringing their hands over the cultural influence of American broadcasting.

Nevertheless, US broadcasters have sometimes looked at their counterparts in countries with the 20-year protection law and wished that they were given similar rights. With the advent of the Internet, options are now being discussed that are analogous to the decisions made in the early years of broadcasting, and broadcasters are eyeballing an opportunity to make sweeping changes in the name of protecting intellectual property.

The proposed changes would institute the protection law in all countries which sign the Broadcast Treaty, increase its time span from 20 years to 50, and include audio and video content on the Internet under the definition of broadcasting.

In other words, suppose a TV show is shown on ABC. ABC would then get control over any and all rebroadcasts of that show for the next 50 years. Similarly, upload a personal video for hosting on YouTube or Google, and that web site would gain control over it for a half-century. Welcome to the future, Pomme and Kelly. [video]

Cheering on the protection provision in the Broadcast Treaty is DiMA, the Digital Media Association, which counts Apple, Microsoft, Yahoo, AOL, and Napster among its members and the MPAA and RIAA among its friends. DiMA argues that the proposed protection needs to be extended to webcasts, lest piracy run rampant, but they never get around to explaining why the protection is needed in the first place—even for traditional broadcast.

Equivalent legal protection against commercial theft of webcasts will be a win for all. Copyright owners and performers who receive royalties from webcasting will not lose money to which they are entitled. Producers will know that material they license for webcast cannot lawfully be retransmitted or commercially exploited without their permission. Investors will know that webcasters have a chance to protect their business and expand their own audience.

Silly me, I thought retransmitting copyrighted material was already against the law. I'm not sure how an illegal act can be prevented by making it more illegal, but giving broadcasters copyright-like control would be certain to at least have the effect of tangling fair use in an additional layer of bureaucracy while providing a new stream of licensing fees to broadcasters by making them effectively co-copyright holders.

Finally, Marybeth Peters weighs in as someone out of the ordinary: a government employee possessing the voice of reason:

"We actually do have in our communications law a signal protection provision. Theft of services. You can't basically steal a cable, um, signal without consequences. So, the concept that they have there, is already in the law of the United States as it exists. The question is, should you expand it out? I think the most controversial piece is, the scope of the right that's being created, and the position that the US took, well, if you are going to give that type of a right to a broadcast—theft of their signal—then you should look at all people who are similarly situated, including webcasters. Now, that has been totally rejected by the rest of the world.

[...]

"I actually think that, from what I've read, that Europe wanted to, Europe wanted to basically protect broadcasters when they simulcast. We don't see the difference, so if you're gonna go that far, then, we think you should go further. But, what I read in the cables, and when I talk to my people, um, there really has not been support for this broader, um, scope of a treaty...and, we'll see what's in the next two meetings. (Transcribed from the video by the author)"

The head of the US Copyright Office thinks that the support isn't there for additional broadcaster protection, and it isn't needed anyway. History seems to demonstrate that she's right, but there's no doubt that the money and the lobbying hammer will continue to come down on the side of big broadcasting and the Internet services. It's just a question of how hard and how soon.
http://arstechnica.com/news.ars/post/20060222-6237.html





Gutierrez: Pirated Software ''Unacceptable''
AP

Commerce Secretary Carlos Gutierrez says he knows from personal experience as a Kellogg's executive the adverse impact of China's lax enforcement of copyright laws.

In an Associated Press interview, Gutierrez said Wednesday that flagrant theft of U.S. copyrighted material by China was ''absolutely unacceptable'' and must be halted, starting with the Chinese government's widespread use of pirated computer software programs.

''It doesn't reconcile with a country that is going to host the Olympics and have that kind of worldwide recognition to be procuring government software that is pirated,'' Gutierrez said in the interview.

Gutierrez said the Chinese government's use of counterfeit software would be one of the top issues the Bush administration would raise in a series of mid-April meetings with the Chinese including the visit of Chinese President Hu Jintao to Washington on April 24.

''If China wants to be a legitimate player at the table, and they do, and they want the legitimacy that comes with being a large economy in a global environment, they need to play by these rules'' involving the protection of copyrighted material, Gutierrez said.

His comments come a week after the administration pledged tougher enforcement of unfair trade laws governing China with creation of a China enforcement task force in the office of U.S. Trade Representative Rob Portman.

The tougher approach is viewed as an effort to head off growing protectionist sentiment in Congress. Lawmakers have filed a number of bills that would impose economic sanctions on the country unless greater efforts are made to narrow a U.S. trade deficit with China that hit $202 billion last year, the largest imbalance ever recorded with a single country.

Pending legislation in Congress includes a proposal to impose 27.5 percent penalty tariffs on Chinese products unless China stops artificially depressing the value of its currency to gain trade advantages. Another bill would make China's normal trading privileges with the United States subject to annual review.

Critics of those bills contend they would drive up the cost of clothing, toys and appliances for American consumers without doing much to lower the trade deficit.

Gutierrez cautioned that the United States must ensure that whatever actions are taken with regard to China don't backfire.

''We don't want to do something that hurts our economy and hurts our workers because we are getting emotional,'' he said.

Gutierrez, who headed cereal giant Kellogg's before he joined President Bush's Cabinet last year, said he learned firsthand about the problems of protecting copyrights and patents in China when he lost a court case in 1996. The Chinese court ruled that Kellogg's did not have the right to keep competitors from using the famous rooster on rival corn flakes boxes.

''I think today that wouldn't happen,'' he said, noting that Starbucks just won a case against a competitor using their logo in China.

U.S. companies contend that copyright piracy in China is costing them billions of dollars a year in sales, and that in some areas, 90 percent of the goods sold are counterfeit products.

Gutierrez indicated that unless improvements are made, the administration would consider bringing a copyright issue case against China before the World Trade Organization.

Portman suggested last week that the United States could soon bring WTO cases against China in the area of copyright piracy and China's high tariffs on U.S. auto parts. Treasury Secretary John Snow, meanwhile, indicated China could be branded a ''currency manipulator'' in a report to Congress in April unless the country does more to let its currency rise in value against the dollar.

During a wide-ranging interview, Gutierrez insisted that a Bush administration decision to turn over shipping operations at six major U.S. seaports to a state-owned business in the United Arab Emirates would not jeopardize America's security against terrorists.

''We are not turning over the security of our ports,'' he said of a deal that has touched off a furor in Congress and elsewhere.

Gutierrez said he would discuss ways to develop closer economic ties with Saudi Arabia, Bahrain and Egypt during a trip to the region later this week.

On another matter, he said the Commerce Department was involved in making sure that American companies will be able to cope with a possible outbreak of the bird flu by having them respond to questionnaires that ask about their plans for dealing with a possible epidemic.
http://www.nytimes.com/aponline/nati...=1&oref=slogin




Yahoo Exec: Labels Should Sell Music Without DRM
John Borland

Yahoo Music chief Dave Goldberg raised eyebrows Thursday at the Music 2.0 conference in Los Angeles with a proposal rarely heard from executives at large digital music services: Record labels should try selling music online without copy protection.

According to attendees, Goldberg pointed to the experience of eMusic, which offers its subscribers access to MP3 files without any digital rights management attached. Rights management restrictions have created a barrier for consumers, he said, making it a hurdle to transfer music to portable devices, and creating incompatibility between music services and MP3 players.

A Yahoo spokeswoman said that Goldberg was "basically trying to move the industry forward," and wanted to prompt industry-wide discussion "about what the consumer experience is."
http://news.com.com/2061-10799_3-604...2756&subj=news





The Click That Broke a Government's Grip
Philip P. Pan

The top editors of the China Youth Daily were meeting in a conference room last August when their cell phones started buzzing quietly with text messages. One after another, they discreetly read the notes. Then they traded nervous glances.

Colleagues were informing them that a senior editor in the room, Li Datong, had done something astonishing. Just before the meeting, Li had posted a blistering letter on the newspaper's computer system attacking the Communist Party's propaganda czars and a plan by the editor in chief to dock reporters' pay if their stories upset party officials.

No one told the editor in chief. For 90 minutes, he ran the meeting, oblivious to the political storm that was brewing. Then Li announced what he had done.

The chief editor stammered and rushed back to his office, witnesses recalled. But by then, Li's memo had leaked and was spreading across the Internet in countless e- mails and instant messages. Copies were posted on China's most popular Web forums, and within hours people across the country were sending Li messages of support.

The government's Internet censors scrambled, ordering one Web site after another to delete the letter. But two days later, in an embarrassing retreat, the party bowed to public outrage and scrapped the editor in chief's plan to muzzle his reporters.

The episode illustrated the profound impact of the Internet on political discourse in China, and the challenge that the Web poses to the Communist Party's ability to control news and shape public opinion, key elements to its hold on power. The incident also set the stage for last month's decision to suspend publication of Freezing Point, the pioneering weekly supplement that Li edited for the state-run China Youth Daily.

Eleven years after young Chinese returning from graduate study in the United States persuaded the party to offer Internet access to the public, China is home to one of the largest, fastest-growing and most active populations of Internet users in the world, according to several surveys. With more than 111 million people connected to the Web, China ranks second to the United States.

Although just a fraction of all Chinese go online -- and most who do play games, download music or gossip with friends -- widespread Internet use in the nation's largest cities and among the educated is changing the way Chinese learn about the world and weakening the Communist Party's monopoly on the media. Studies show China's Internet users spend more time online than they do with television and newspapers, and they are increasingly turning to the Web for news instead of traditional state outlets.

The government has sought to control what people read and write on the Web, employing a bureaucracy of censors and one of the world's most technologically sophisticated system of filters. But the success of those measures has been mixed. As a catalyst that amplifies voices and accelerates events, the Internet presents a formidable challenge to China's authoritarian political system. Again and again, ordinary Chinese have used it to challenge the government, force their opinions to be heard and alter political outcomes.

The influence of the Web has grown over the past two years, even as President Hu Jintao has pursued the country's most severe crackdown on the state media in more than a decade. The party said last week that Freezing Point would resume publishing, but Li and a colleague were fired, making them the latest in a series of editors at state publications to lose their jobs.

With newspapers, magazines and television stations coming under tighter control, journalists and their audiences have sought refuge online. The party's censors have followed, but cyberspace in China remains contested terrain, where the rules are uncertain and an eloquent argument can wield surprising power.

Dueling Views

They clashed from the start, two men named Li with conflicting ideas of what a newspaper should be.

One was the maverick editor Li Datong, 52, a tall man with a scholarly air who had spent his entire career at the China Youth Daily and helped turn the official organ of the Communist Youth League into one of the country's best papers. After the 1989 pro-democracy demonstrations in Tiananmen Square, he nearly lost his job for leading journalists in a petition drive seeking freedom of the press.

The other was the new editor in chief, Li Erliang, 50, short in stature and slick in manner, a favorite of the propaganda authorities who made his reputation running the party's official mouthpiece in Tibet. He was an outsider at the Daily, a product of the party apparatus who was sent in to get the paper's feisty staff under control.

One night soon after his arrival in December 2004, the new editor stopped the presses and tore out Li Datong's Freezing Point section because it contained an article criticizing the Chinese education system. The next morning, the chief editor went to Li Datong's office to explain, but Li was furious and refused to talk to him. He just kept writing, banging on his keyboard and ignoring his new boss, colleagues recalled.

Relations between the two men only got worse. The party's propaganda department had targeted Freezing Point in its media crackdown because it often published investigative reports that embarrassed officials, as well as essays on history, society and current events that challenged the party line. Colleagues said Li Erliang, who declined to be interviewed, tried to rein in the section to please his superiors. Li Datong, who spoke out after Freezing Point was suspended, said he fought to protect it.

"The propaganda department wanted to shut us down, and we were under a lot of pressure," he said. "They tried to get rid of our columnists and cut the size of the section and take away reporters, but we resisted."

Then, in August, Li Erliang proposed a point system for awarding bonuses to the paper's staff members. Reporters would receive 100 points if their articles were praised by provincial officials, 120 if praised by the propaganda department and 300 if praised by a member of the Politburo. Points would be deducted if officials criticized articles. Just one report that upset a party leader could mean loss of a month's salary.

The newsroom simmered with anger, reporters said. But Li Datong saw an opening to fight back. "The plan was just stupid," he said. "A newspaper can evaluate reporters that way, and many do, but it can't be so blatant about it."

Li holed up in his apartment, and two days later, emerged with a 13,000-word letter that denounced the point system, saying it would "enslave and emasculate" the paper, cause circulation to plummet and put the Daily out of business.

He also painted a damning picture of the propaganda apparatus. He described an official who measured photos of two party leaders before publication to make sure neither man would be offended. He wrote about a senior editor who resigned in protest over an obsequious column that compared President Hu's words to "a lighthouse beacon, pointing and illuminating the way for China's students." And he attacked the party's censors, questioning their legitimacy and alleging they favored publishers who showered them with gifts and banquets.

Li saved his harshest words for his new boss. But he crafted his letter carefully, citing the support of generations of party leaders for the paper's journalism and even quoting Karl Marx to make the case that editors should put readers first.

He showed the letter to a few colleagues and to the reporters on his staff. Then, on Aug. 15, at 10:09 a.m., he posted it on the newsroom's computer system. "I hoped it would have an impact," he said. "I never expected what happened next."

System of Censorship

Every Friday morning, executives from a dozen of China's most popular Internet news sites are summoned downtown by the Beijing Municipal Information Office, an agency that reports to the party's propaganda department.

The man who usually runs the meetings, Chen Hua, director of the Internet Propaganda Management Department, declined to be interviewed. But participants say he or one of his colleagues tells the executives what news they should keep off their sites and what items they should highlight in the week ahead.

These firms are private enterprises, and several, including Sina, Sohu and Yahoo! China, are listed on U.S. stock exchanges or have attracted U.S. investment. But because they need licenses to operate in China, they comply with the government's requests.

The meetings are part of a censorship system that includes a blacklist of foreign sites blocked in China and filters that can stop e-mail and make Web pages inaccessible if they contain certain keywords. Several agencies, most notably the police and propaganda authorities, assign personnel to monitor the Web.

The system is far from airtight. Software can help evade filters and provide access to blacklisted sites, and Internet companies often test the censors' limits in order to attract readers and boost profits. If an item isn't stopped by the filters and hasn't been covered in the Friday meetings, the government can be caught off guard.

That is what happened with Li Datong's letter. Minutes after he posted it, people in the newsroom began copying it and sending it to friends via e-mail and the instant messaging programs used by more than 81 million Chinese.

"We had to move quickly, before they started blocking it," recalled one senior editor, who spoke on condition of anonymity.

Pu Zhiqiang, a lawyer and advocate of journalists' rights, said he received a copy at 10:20 a.m., 11 minutes after Li posted the original. He forwarded it to 300 people by e-mail and sent it to others using Microsoft's MSN Messenger program. Then he began posting it on some of the bulletin board sites that have proliferated in China.

At 11:36 a.m., Pu put the memo on a popular forum called Yannan. Then he noticed that someone had posted a copy on another part of the site.

About the same time, the editors' meeting at the China Youth Daily ended and Li Erliang rushed back to his office. Colleagues said he contacted superiors in the propaganda department and the Communist Youth League after reading the memo.

Neither the government's censors nor the editors at the major Web sites had begun deleting the letter, yet. Some editors said they waited because it didn't challenge the party's authority or discuss subjects that were clearly off-limits, such as the Tiananmen Square massacre. At the same time, the official censors either failed to spot the memo or hesitated to act because they were worried that some senior officials might support Li Datong's views, editors said.

As they waited, the letter continued to spread.

At 12:17 p.m., it appeared on an overseas news site run by the banned Falun Gong spiritual movement, and minutes later on others managed by exiled dissidents. These sites are blocked in China, but many people access them using software that slips past the government's firewall.

By 1:30 p.m., a prominent blogger, Li Xinde, had downloaded the memo. He said he sent it using China's top instant messaging service, QQ, to more than 20 chat groups, each with 30 to 40 members. By 2 p.m., the memo had been posted on popular university Web sites.

The document was spreading so fast that many people received multiple copies. A writer in Anhui province said that when he went online to check his e-mail at 2:30 p.m., four friends immediately offered to send him the memo on MSN Messenger. But two copies were already in his inbox, including one that had been sent to 1,000 people.

Race in Cyberspace

It was midafternoon before someone in the party bureaucracy decided Li Datong's letter should be removed from Chinese cyberspace and government officials began calling executives at the major Web sites.

Some said they were contacted by the Beijing Municipal Information Office, others by its national-level counterpart, the State Council Information Office. None reported receiving a formal notice or any legal justification for the decision. As usual, they were just told to delete the offending material.

There are at least 694,000 Web sites in China, according to official statistics, and the party didn't try to contact them all. They called the most popular sites in Beijing first. Hours passed before some smaller bulletin board sites were notified. Forums with national audiences in other cities received calls only at the end of the day.

At a recent news briefing, Liu Zhengrong, a senior Internet affairs official in the State Council Information Office, declined to explain the legal basis for the orders, saying only that many comments about the China Youth Daily remained on the Web.

Even as Li's memo began disappearing from some Web sites, it went up on others the authorities had not contacted. Shortly before 10 p.m., it was posted on the popular Tianya forum. At 11 p.m., it became a featured item on Bokee, China's top blog and portal site.

Almost everywhere the letter appeared, users added hundreds of comments backing the reporters of the China Youth Daily. Inside the newsroom, spirits were buoyed. Some journalists posted notes on the internal computer system supporting Li Datong.

The next morning, officials continued calling Web sites, but readers started posting the memo on sites that had already removed it. Some Web site managers said they tried to drag their feet or leave copies on less prominent pages. One said the memo was viewed 30,000 times before he took it down.

But other Web sites added Li Datong's name to keyword filters used to block sensitive material from being posted.

At 2:15 p.m., Li Erliang distributed a rebuttal on the China Youth Daily's internal network. It was quickly leaked, too, triggering another wave of e-mails and postings.

Authorities were scrambling for a way to end the controversy. A few hours after Blog-City, an overseas blogging site, was blocked, the party announced in a rare retreat that it was ditching Li Erliang's point system.

"It was a breakthrough, and the Internet played a critical role," said Xu Zhiyong, a civil rights lawyer in Beijing. "If something is written well enough, they can't stop it from spreading. People will find a way to read it."

Freezing Point enjoyed a renaissance in the months that followed. Li Erliang appeared chastened, unwilling to risk another fight he might lose, reporters said.

But in January, propaganda officials finally shut down the section. Before doing so, they called executives from all the major Web sites to a special meeting and warned them not to allow any discussion of the action.

The news spread quickly anyway.

Researcher Jin Ling contributed to this report.
http://www.washingtonpost.com/wp-dyn...rss_technology





Congressman Quizzes Net Companies On Shame
Declan McCullagh

When the U.S. House of Representatives convened a hearing on Wednesday to talk about China and the Internet, it quickly devolved into an exercise in political speechmaking.

Not until nearly halfway through the event did any of the technology executives receive a chance to respond to a rapid-fire series of condemnations.

One exchange, though, with Rep. Tom Lantos, a California Democrat, stood out. Lantos, who is co-chairman of the Congressional Human Rights Caucus, quizzed executives from Google, Yahoo, Microsoft and Cisco Systems not about technical or legal details--but about their view of the morality of cooperating with China's ruling Communist Party. Lantos, a Budapest-born Jew who represents the southwest quadrant of San Francisco, is the only member of Congress who is a Holocaust survivor.

For their part, the four technology companies said compliance with censorship has been a difficult decision, but ultimately the cost of doing business in China and being able to provide even limited services to Chinese users. Google's German operation censors Nazi-related Web sites from search results. Microsoft pointed out that the U.S. Justice Department has prosecuted people involved in offshore gambling even when the casino site is in a location where it's perfectly legal. And the Digital Millennium Copyright Act has required Google to censor search results in the United States.

Following is a transcript, edited for clarity, of Lantos' exchange with Microsoft lobbyist Jack Krumholtz; Yahoo general counsel Michael Callahan; Google Vice President Elliot Schrage; and Mark Chandler, a vice president and general counsel of Cisco. (See related video excerpts.)

Rep. Tom Lantos: Can you say in English that you're ashamed of what your company and what the other companies have done?

Google: Congressman, I actually can't, I don't think it's fair for us to say that we're ashamed.

Lantos: You have nothing to be ashamed of?

Google: I am not ashamed of it, and I am not proud of it...We have taken a path, we have begun on a path, we have done a path that...will ultimately benefit all the users in China. If we determined, congressman, as a result of changing circumstances or as a result of the implementation of the Google.cn program that we are not achieving those results then we will assess our performance, our ability to achieve those goals, and whether to remain in the market.

Lantos, to Cisco: Is your company ashamed?

Cisco: (Begins to talk about products that Cisco sells.)

Lantos: Just answer me directly. The totality of the things that you and the other three companies have done, are you proud of it or are you ashamed of it?

Cisco: The products we provide in China are identical to the products we provide worldwide...What we have done is followed very closely the policies of our government, which are informed by human rights concerns and have been for 30 years now, in terms of providing what products are appropriate and not appropriate to provide to China and which users.

Lantos: I am asking a direct question. Is there anything you have done in the whole period you operated in China that the company ought to be ashamed of?

Cisco: We think that is a positive thing that we do throughout the world including China...My answer is I feel that our engagement is consistent with our government's goals.

Lantos, to Microsoft: Is your company ashamed?

Microsoft: We comply with legally binding orders whether it's here in the U.S. or China.

Lantos: Well, IBM complied with legal orders when they cooperated with Nazi Germany. Those were legal orders under the Nazi German system...Do you think that IBM during that period had something to be ashamed of?

Microsoft: I can't speak to that. I'm not familiar in detail with IBM's activities in that period.

Lantos: You heard (Rep. Christopher Smith's) speech (click for PDF). Assuming that his words are accurate, is IBM to be ashamed of their action during that period?

Microsoft: Congressman, I don't think it's my position to say whether IBM should be ashamed.

Lantos, to Yahoo: Are you ashamed?

Yahoo: We are very distressed about the consequences of having to comply with Chinese law...We are certainly troubled by that and we look forward to working with our peers.

Lantos: Do you think that individuals or families have been negatively impacted by some of the activities we have been told, like being in prison for 10 years? Have any of the companies reached out to these families and asked if you could be of any help to them?

Yahoo: We have expressed our condemnation of the prosecution of this person, expressed our views to the Chinese government...We have approached the Chinese government on these issues.

Lantos: Have you reached out to the family? I can ask it 10 more times if you refuse to answer it. You are under oath.

Yahoo: We have not reached out to the families.

Microsoft: In the five cases where Microsoft has removed sites at MSN Spaces in China (not one involves) anyone being incarcerated, so I'm not aware of any families for us to reach out to.

Lantos, to Microsoft: Have the families been adversely affected?

Microsoft: Not to my knowledge.

Lantos: You have done a lot of work to prepare for this hearing; you wish this hearing had never taken place, we all understand that...Have you explored (contacting the families)? Have you taken the trouble? Have you reached out to the families that may have been adversely affected?

Microsoft: With respect to the blogger whose content was taken down on Dec. 30, we returned his content to him because that was his intellectual property.

Lantos, to Google: I'm asking you a direct question (about families)--I don't want your philosophy.

Google: We don't offer a service that puts anyone in that situation, and the best way we honor their situation is to ensure that we are not associated with a similar situation. We don't offer products that would put us in a position of putting people like that in danger.
http://news.com.com/Congressman+quiz...3-6040250.html





Google Has No License For China Service: Newspaper

Internet search giant Google Inc.'s controversial expansion into China now faces possible trouble with regulators after a Beijing newspaper said its new Chinese-language platform does not have a license.

The Beijing News reported on Tuesday that Google.cn, the company's recently launched service that accommodates the China's censorship demands, "has not obtained the ICP (Internet content provider) license needed to operate Internet content services in China."

The Ministry of Information Industry, which regulates China's Internet, was "concerned" and investigating the problem, the paper said.

Google has weathered criticism from United States lawmakers, international free speech advocates and Chinese dissidents for abiding by Chinese censors' demands that searches on its new Chinese service block links about sensitive topics, such as Tibet and the 1989 anti-government protests in Tiananmen Square.

A spokesperson for Google told the paper that it shared an ICP license with another, local company, Ganji.com -- a practice followed by many international companies in China, including Yahoo Inc.and eBay Inc..

Usually, foreign investors in Chinese internet services must hand over operation of the service itself to a Chinese partner, with the foreign investor receiving payment for technical support.

The paper said Google.cn's operations appeared to be different and the name Ganji does not appear in reports about the U.S. company's China activities.
http://money.iwon.com/ht/nw/bus/2006...=home&SEC=news





Google Denies Report on China Operation
Joe McDonald

Google Inc. denied a report Monday that its Chinese-language search engine, which has been criticized for blocking searches for politically sensitive material, is operating without a required government license.

The newspaper Beijing News reported that the ICP - or Internet content provider - license listed by Google.cn on its Web site belongs to a Chinese company, Ganji.com. It said the situation has "attracted the attention" of Chinese regulators.

"Google has a partnership with Ganji.com through which Google has the required license to operate Google.cn," said Google spokeswoman Debbie Frost in a written response to questions about the report.

A spokesman for China's Ministry of Information Industry, which regulates Internet use, said it was aware that Google.cn didn't have its own license. The spokesman, Wang Lijian, wouldn't say whether that was permitted by Chinese rules or give any other information.

Some other foreign Internet companies such as eBay Inc. also operate in China using the licenses of their local partners.

Google and other foreign competitors are eager to gain a share of China's fast-growing online industry, the world's second-largest after the United States, with more than 100 million people online.

Google launched Google.cn last year in an effort to increase its appeal to Chinese Web surfers. The company has a Chinese- language search site based abroad, but users complain that Chinese government filters slow access to it.

The Chinese government operates what is widely regarded as the world's most sweeping effort to monitor and limit Internet use, with all online traffic passing through state-controlled gateways and filters block access to foreign sites deemed subversive or pornographic.

Web sites in China are required to remove banned content.

Google and other U.S. Internet companies are under criticism from American lawmakers and free-speech advocates for cooperating with such controls.

Google.cn blocks searches for material on human rights, Tibet and other topics banned by the government. Yahoo Inc. has been accused of providing Chinese authorities with information that led to the jailing of two Chinese e-mail users, and Microsoft Corp. shut down the Web log of a Chinese user at the government's request. Network equipment maker Cisco Systems Inc. (CSCO) also has been accused of cooperating with Beijing.

At a hearing last week in Washington, Rep. Tom Lantos complained to executives of those companies that their actions were a "disgrace."

Technology companies have defended their actions in China, saying they have to obey Chinese law.
http://apnews1.iwon.com//article/200...=home&SEC=news





Google Rips Bush Administration's Search Request
Elise Ackerman

Google called the Bush administration's request for data on Web searches as ``so uninformed as to be nonsensical'' in papers filed in San Jose federal court Friday, arguing that turning over the information would expose its trade secrets and violate the privacy of its users.

The 21-page brief filed by the Mountain View search giant angrily dissected the government's claim that the search results would produce useful evidence regarding child pornography.

The Justice Department asked a federal judge to force Google to turn over the data last month, after Google refused to comply with an earlier subpoena. Government lawyers said the searches would help it defend the Child Online Protection Act, which was struck down as unconstitutional. The law is designed to keep children from sexually explicit material on the Internet.

The Justice Department has a week to submit a written response. A hearing is scheduled for March 13 in U.S. District Court in San Jose.

Google's struggle with the Justice Department has focused worldwide attention on the risk that Internet technologies will be used by governments for surveillance purposes -- and that the privacy of users could be compromised without their ever knowing it.
In justification of its demand of data from Google, the Justice Department revealed that it had requested -- and received -- similar data from Yahoo, Microsoft and AOL.

Google's resistance to the U.S. government has won the company praise from many of the people who use its service. At the same time, its stance toward the Justice Department subpoena has been contrasted with the company's recent decision to roll out a Chinese-language search service that complies with Chinese government censorship requirements.

Google, Yahoo, Microsoft and Cisco Systems came under withering criticism for their actions in China at a congressional hearing earlier this week.

While the government did not ask Google for information relating to the identity of its users, Google said people sometimes search for their social security numbers or for their credit card numbers or other personal data.

``What will the government do with this information?'' Google asked.

The ACLU also filed a 10-page brief supporting Google on Friday, saying that the government's explanation regarding why it needed the searches was ``too vague'' to justify a court order.

``The government is not entitled to go on a fishing expedition through millions of Google searches any time it wants, just because it claims it needs that information,'' ACLU staff attorney Aden Fine wrote in a statement. ``Google has rightly denied the government's demand.''

The ACLU sued to overturn the child protection act in 1998.

The Justice Department originally demanded on August 25 that Google turn over two months of search queries and all the Web addresses in Google's index. Government lawyers subsequently agreed to narrow the search, however, as both Google and the ACLU argued that they did not explain what they would do with the data.

``They say it's to measure how people use the Web, but they've never explained how this information would help them achieve the goal,'' said Christopher Harris, an attorney who helped draft the ACLU brief.

In order to revive the child pornography law, government lawyers must show that it is more effective at keeping pornography from children than existing technological filters.

In its brief, Google argued that simply knowing the Web addresses that exist in Google's index would not enable the government to determine which contained pornographic material since the content of a Web page can change every day. While Google's records would not help the government make its case for the law, it could help Google's competitors gain access to the company's confidential query data.

``They could conform their size and crawling metrics to Google's thereby generating search results that mimic Google's,'' the brief stated.

Google described the lengths it goes to protect its search algorithms from competitors, including not disclosing the number of computers it uses to run the search engine, the number of queries processed in a day, the type of browsers those queries are entered on and the nature of the search strings people type in. ``The very fact that the Government is so uninformed about the value of search and URL information and so dismissive of Google's interest in protecting it speaks volumes about why the Court should protect Google from this compelled disclosure,'' the company wrote.
http://www.mercurynews.com/mld/mercu...l/13901327.htm





Policing Porn Is Not Part of Job Description

Montgomery homeland security officers reassigned after library incident
Cameron W. Barr

Two uniformed men strolled into the main room of the Little Falls library in Bethesda one day last week and demanded the attention of all patrons using the computers. Then they made their announcement: The viewing of Internet pornography was forbidden.

The men looked stern and wore baseball caps emblazoned with the words "Homeland Security." The bizarre scene unfolded Feb. 9, leaving some residents confused and forcing county officials to explain how employees assigned to protect county buildings against terrorists came to see it as their job to police the viewing of pornography.

After the two men made their announcement, one of them challenged an Internet user's choice of viewing material and asked him to step outside, according to a witness. A librarian intervened, and the two men went into the library's work area to discuss the matter. A police officer arrived. In the end, no one had to step outside except the uniformed men.

They were officers of the security division of Montgomery County's Homeland Security Department, an unarmed force that patrols about 300 county buildings -- but is not responsible for enforcing obscenity laws.

In the post-9/11 era, even suburban counties have homeland security departments. Montgomery County will not specify how many officers are in the department's security division, citing security reasons. Its annual budget, including salaries, is $3.6 million.

Later that afternoon, Montgomery County's chief administrative officer, Bruce Romer, issued a statement calling the incident "unfortunate" and "regrettable" -- two words that bureaucrats often deploy when things have gone awry. He said the officers had been reassigned to other duties.

Romer said the officers believed they were enforcing the county's sexual harassment policy but "overstepped their authority" and had to be reminded that Montgomery "supports the rights of patrons to view the materials of their choice."

The sexual harassment policy forbids the "display of offensive or obscene printed or visual material." But in a library, which is both a public arena and a county workplace, the U.S. Constitution trumps Montgomery's rules.

At most public libraries in the Washington area, an adult can view pornography on a library computer more or less unfettered. Montgomery asks customers to be considerate of others when viewing Web sites. If others are put off, librarians will provide the viewer of the offending material with a "privacy screen."

Fairfax County forbids library use of the Internet to view child pornography or obscene materials or to engage in gambling or fraud. But Fairfax library spokeswoman Lois Kirkpatrick said, "Librarians are not legally empowered to determine obscenity."

D.C. library spokeswoman Monica Lewis said the system is working on guidelines for Internet use, but she added that recessed computer screens generally ensure patrons their privacy.

Although many library systems in the United States use filtering software, the D.C. and Fairfax systems do not, and Montgomery uses such software only on computers available to children. Leslie Burger, president-elect of the American Library Association, said the reality is that "libraries are not the hotbed of looking at porn sites."

Still, Montgomery plans to train its homeland security officers "so they fully understand library policy and its consistency with residents' First Amendment rights under the U.S. Constitution," Romer said in his statement.
http://www.washingtonpost.com/wp-dyn...66.html?sub=AR





Defamation Case Raises Issues of Fairness in Mexico
James C. McKinley Jr.

A roiling scandal here over the attempts of a state governor to jail a reporter has raised questions about whether the rich and powerful are using their influence with politicians to silence critics.

It began in December when a Cancún journalist who had written a book about child pornography and pedophile rings in the resort town was arrested with no warning and driven across the country to the state of Puebla. The writer, Lydia Cacho, was then charged under state law with defaming a textile businessman, Kamel Nacif, in her book, "The Demons of Eden." In her book, Ms. Cacho wrote that Mr. Nacif was a friend of Jean Succar Kuri, a man accused of pederasty in Cancún, and was paying for his legal defense.
Defamation and slander are criminal charges in Mexico, and Ms. Cacho was held briefly in jail before being released while state prosecutors began their investigation into the charges. In Mexico, with no grand jury system, an arrest can be made before the charges are substantiated.

Last week, however, someone gave an audiotape to a Mexican radio station and a national newspaper, La Jornada, that renewed the debate over Ms. Cacho's arrest. The recording carries an ugly conversation celebrating Ms. Cacho's arrest between two male voices that the journalists from the newspaper and the radio station said had been identified as the Puebla State governor, Mario Marín, and Mr. Nacif.

On the tape, the voice that is said to be the governor's tells the other man that he has dealt a blow to someone presumed to be Ms. Cacho, using an expletive to refer to her. "I told her here in Puebla the law is respected, and there is no impunity," the voice continues.

Governor Marín has denied in a statement that the voice on the tape is his. Mr. Nacif has not made a statement.

The tape is seen by journalists and politicians here, though, as fueling the worst suspicions about how wealthy people with ties to politicians can use Mexico's legal system, which lacks grand juries, juries or open trials, to harass their enemies.

The release of the tape to the news media has also fueled a political uproar. Governor Marín is from the Institutional Revolutionary Party, the machine that ruled Mexico for 70 years. He immediately became the target of attacks from other parties.

Rubén Aguilar, a spokesman for President Vicente Fox, denounced the statements on the tape as "brutal and undignified" and announced that the case might be assigned to a newly appointed special prosecutor for crimes against journalists.

Members of the lower house of Congress from the other two major parties passed a resolution on Tuesday demanding Governor Marín's resignation, then passed legislation calling for a congressional investigation, arguing that the governor had violated Ms. Cacho's constitutional rights and should be impeached. On Thursday, they voted to demand that he step down until the investigation was finished.

The Senate was about to pass even stronger legislation calling for Mr. Marín to step down, when the members of his party marched out of the session, denying the other parties a quorum. In the meantime, the party's candidate for president, Roberto Madrazo, suggested that the Fox administration was using scandal to hurt his campaign, though he later called for an investigation into Mr. Marín's role in Ms. Cacho's arrest.

For her part, Ms. Cacho has said the tapes confirm her worst fears that she had been arrested out of vengeance for her writings and not for any legitimate reason. She said that state officials had gone so far as to threaten her with beatings and rape when she was released from jail.

"I think the case against me will be dropped, because it was a vengeful act," she told La Jornada.
http://www.nytimes.com/2006/02/20/in...ge&oref=slogin





Read The Book For Free
Website copy

In a first-of-its-kind initiative, HarperCollins Publishers has made the full content of Go It Alone! available free for readers at this Web site. You can access the life-changing ideas in this book, at no cost, by clicking here.

Bruce Judson is a successful go-it-alone entrepreneur, a bestselling and award- winning author, and one of the nation's leading experts on marketing and entrepreneurship.

Judson's unique approach is to "battle test" his innovative ideas by founding real businesses based on his evolving principles. These practical tests of his theories, combined with his extensive research, then form the basis for his widely acclaimed books.
http://brucejudson.com/





Is Skype A Haven For Criminals?
Nate Anderson

From a law enforcement point of view, digital communication is a two-edged sword. On the one hand, it allows for the simple collection, sorting, and processing of massive amounts of information (such as in the FBI's Carnivore system), but on the other hand, it is much easier for users to encrypt their communications with almost unbreakable codes. Now that VoIP calls are becoming commonplace, governments around the world are struggling to adapt to the new technology, and Skype has found itself under extra scrutiny.

The reason is that Skype uses 256-bit, industry-standard AES encryption that is nearly impossible to break without the key. The Skype privacy FAQ explains the system this way:

"Skype uses AES (Advanced Encryption Standard) - also known as Rijndael - which is also used by U.S. Government organizations to protect sensitive, information. Skype uses 256-bit encryption, which has a total of 1.1 x 10^77 possible keys, in order to actively encrypt the data in each Skype call or instant message. Skype uses 1024 bit RSA to negotiate symmetric AES keys. User public keys are certified by the Skype server at login using 1536 or 2048-bit RSA certificates."

All Skype traffic is automatically encrypted end-to-end without requiring any user intervention, and this encryption is posing a problem to authorities who need (or want) to listen in on conversations. Skype executives state that their software is free of all backdoors, and a security researcher who saw some (but not all) of the code agrees. Still, the company claims that it "cooperates fully with all lawful requests from relevant authorities," which may mean that they turn over keys to governments upon request.

The call can also be tapped once it leaves the Skype system and enters the normal telephone network, so calls to a landline are inherently insecure. Still, strong AES encryption is enough to defeat real-time surveillance of telephone calls of the kind possibly used by the NSA. That doesn't mean that nothing can be gleaned from watching the traffic, which can be used to identify who the call is routed to and how long it lasts, but it does mean the contents of the call remain secure.

Rather than being a new issue for law enforcement, though, this is actually just a new version of an old problem: how to access encrypted data on a suspect's computer? Encryption algorithms have been good enough for some time to prevent all but the most determined brute force attacks, but there are obviously other ways of solving the problem. For the FBI, keyloggers are a popular choice; they obviate the need for backdoors or for sophisticated computer solutions. They simply steal the password. The same (metaphorical) approach may give them access to Skype calls; rather than breaking the encryption, they simply grab the key and decrypt the data.

The FCC ruled last year that VoIP providers need to offer backdoors into their systems for wiretapping reasons, but Skype isn't based in the US and so is not subject to the rule. It is subject to the EU's new Data Retention Directive, though, which may require them to retain call logs and decryption keys for a period of time. If so, real-time monitoring of Skype calls would still be out, but after-the-fact review of recorded calls from people of interest might well be possible for the government.
http://arstechnica.com/news.ars/post/20060217-6206.html





Internet Calls, Even if You're Not Close to Your Computer
John Biggs

Skype, the program for making online phone calls, generally requires users to be tethered to a computer and an Internet connection. The VoSKY Call Center changes that equation, adding some interesting new options to the mix.

The Call Center, which costs $69.95 and is available at VoSKY's Web site, www.vosky.com, works with an Internet-connected Windows PC. When you attach an ordinary landline phone, you can use it to make calls to regular phones over the Internet at a reduced rate using the SkypeOut service, or make calls directly to other online Skype users, a free service.

The system can also forward incoming Skype calls to other phones — including mobile phones — and notify you when a specified Skype user appears online by ringing your phone.

The Call Center, which draws its power from the PC's U.S.B. port, even works the other way if you connect it to your regular phone line at home. When out and about, you can call your home phone and route your call onto the Internet through the Call Center, meaning you can make Skype calls from anywhere.

It appears to be getting easier every day to reach out and touch someone through the Internet.
http://www.nytimes.com/2006/02/23/te...in&oref=slogin





Sony BMG Names New CEO to Replace Lack
Matt Moore

Sony BMG Music Entertainment Names Rolf Schmidt-Holtz As Its New CEO to Replace Andrew Lack

The chief executive and chairman of the board are trading hats in a shake-up at Sony BMG Music Entertainment, the powerhouse record company behind such pop stars as Britney Spears, OutKast and Travis Tritt.

Rolf Schmidt-Holtz, who had been chairman, is replacing CEO Andrew Lack, who becomes chairman of the board. The swap, announced Friday and effective immediately, follows months of criticism of Lack's tenure as CEO, including investor discontent over spiraling fees paid to artists and a scandal over copy protection software in Sony CDs.

The unit was formed after Sony Music Entertainment and BMG, the music unit of Guetersloh, Germany-based Bertelsmann, formally combined their businesses. Sony and Bertelsmann each own half of the company.

Following the change, Schmidt-Holtz will assume overall management responsibility, while Lack "will lead the company's public policy and industry initiatives, and assume operating responsibility and oversight for the theatrical film business of Sony BMG," a joint statement said.

"I am extremely pleased to take on this new leadership role with the company and to continue to help Sony BMG accelerate its tremendous growth and performance," Lack said. "Rolf and I are fortunate to have a roster of extraordinary artists and a top-notch team of creative executives around the world."

The company operates several labels, including Columbia, RCA, Jive and LaFace, and its artist roster features Aerosmith, Jessica Simpson and Alicia Keys, among others.

Schmidt-Holtz was BMG's chief executive from 2001 until the merger in mid-2004 and has been chairman of the merged company's board since then. He will relocate to New York and will take up oversight of Sony BMG's theatrical film business.

Because of the swap, he resigned from Bertelsmann's executive board, the company said.

"With this management change Rolf and Andy are now aligned in positions that will take advantage of the significant progress the company has already made, as well as their formidable business skills and respective management experiences," Sony Chairman and CEO Howard Stringer said.

Bertelsmann CEO Gunter Thielen said Schmidt-Holtz "has impressively proven his flair for the creative and economic aspects of success in the music business."
http://biz.yahoo.com/ap/060210/germa...y_bmg_ceo.html





Can Surround Sound Save MP3?
Eliot Van Buskirk

Ever since computers picked up the handy ability to play decent-sounding music, fans have overwhelmingly defaulted to the MP3 format for audio files because it sounds pretty good, doesn't take up much space and (perhaps most importantly) works with more devices than any other digital audio format.

It may seem as if the venerable MP3 standard is here to stay, but it faces attack from a number of angles. First, it doesn't sound as good, byte-for-byte, as files purchased from iTunes Music Store (in the AAC format) or any of the Microsoft-compliant stores.

Second, the CD rippers/encoders that most people use -- iTunes and Windows Media Player -- have encouraged users to rip to AAC and WMA over the years. Third, only one major online music store, eMusic, proffers songs in the MP3 format, and it lacks most major releases. Fourth, geeks who love MP3 for its wide compatibility can now choose from preferable open-source alternatives such as Ogg Vorbis.

Finally, today's faster connections and more capacious hard drives have audiophiles turning to lossless codecs such as FLAC and those offered by Apple Computer and Microsoft.

Thomson, the entity that licenses the MP3 format to the world (it's not free or open source, as some suspect), tried to update MP3 for the first time in 2001, to the mp3Pro format. That effort failed. Only RCA -- owned by Thomson -- added mp3Pro support to its MP3 players, and consumers mainly ignored it.

In its second attempt to shepherd the MP3 format into the future, Thomson's MP3 Licensing Group unveiled a new format last year, a surround-sound version of the MP3 format imaginatively called MP3 Surround.

MP3 Surround files are essentially ordinary MP3s with an additional layer of information that tells compatible players where to place sounds. New devices designed to support the format deliver rich and accurate surround sound -- whether through a 5.1-channel system or simulated through a pair of stereo headphones. The format adds minimal overhead, consuming just 15 additional bits per second. And it is backward compatible, so MP3 Surround files will play on any device that supports plain-vanilla MP3, sans surround.

During my tests, MP3 Surround performed well enough to warrant serious consideration among device manufacturers and music fans. The songs sounded more expansive and present than their stereo counterparts, and I didn't hear any additions to the sound that marred the experience. I used Shure E3c earbuds for testing, so the surround effect is evidently not dependent on having full-size headphones.

In order for you to hear MP3 Surround today, you'll need a computer with the playback software installed (available on all4mp3.com). But computer playback is no longer enough. If a digital audio format is to succeed these days, it'll need support on a wide array of home and portable devices.

Several promising avenues for MP3 Surround home playback loom on the horizon. According to Rocky Caldwell, general manager of Thomson's MP3 Licensing Group, any DVD player could be upgraded with firmware to decode MP3 Surround files and pass the bits through to a 5.1 amplifier using a digital connection. RCA plans to release a player that comes standard with that capability later this year.

Because home theater-in-a-box units already have six channels of amplification, a manufacturer could include MP3 Surround support right out of the box. Caldwell told me Thomson is leveraging the strong relationships it forged with manufacturers to add MP3 Surround support to next year's devices.

The third possibility could be the most promising: Caldwell said "a major Japanese consumer-electronics manufacturer" will be releasing a device similar to the Xbox that might include MP3 Surround support natively. Needless to say, the integration of MP3 Surround into the Sony PlayStation 3 would be a huge shot in the arm to the new format, especially because so many PS3s will be purchased by tech-savvy types and connected to surround-sound systems.

On the portable front, Thomson would need to add MP3 Surround support to as many devices as possible that have the processing power to decode the files. Caldwell asserted that any portable video player would have the required processing power of 150 mips and could be upgraded to support MP3 Surround through a firmware update. The company will almost certainly have its RCA division create an MP3 player that supports MP3 Surround, but that won't be enough (as it discovered through its RCA-only mp3Pro experience).

Considering the lopsided nature of today's MP3 player market, Thomson would also need to convince Apple to put MP3 Surround on the iPod. Apple has never permitted any company to install third-party software on the iPod, but according to Caldwell, Thomson has a very close relationship with Apple.

MP3 Surround faces some stiff competition in this arena from SRS Labs' Wow plug-in (already found on Samsung MP3 players among others), Dolby Laboratories' Dolby Headphone technology (already found on some Sony Vaios), and Plantronics' Volume Logic (once the subject of a petition to force Apple to add support for it to the iPod, it's now available as an iTunes add-on for $20). None of these offer exactly what MP3 Surround does, but all of them are positioned close enough to capture the market for enhancing sound on portable audio devices.

Thomson has an ace up its sleeve when it comes to device integration: The new licensing fee for MP3 Surround is -- zero! Developers and manufacturers can add MP3 Surround for free (as long as they were already paying for MP3). This gives Thomson a considerable advantage over the other companies Apple might tap for such a project.

Even if MP3 Surround makes it onto enough hardware to succeed, one large question remains: Where is MP3 Surround music going to come from? Piracy-paranoid record labels would never consider selling their music in the MP3 Surround format because it lacks the digital-rights-management protection that prevents users from sharing (or in some cases even playing) their files. Fraunhofer once issued a press release announcing a version of the MP3 format that included DRM capabilities, but that never came to light.

According to Caldwell, MP3 Surround can succeed without the labels' cooperation. "MP3 never had major-label content, and seems to have been relatively successful. On the other hand, Super Audio CD and DVD-Audio both had major label content, and millions, if not tens or even hundreds of millions of dollars, spent promoting it and they haven't succeeded, (among other reasons) because they don't address the convenience issue."

Assuming the labels won't sell you MP3 Surround songs, you could try turning DVD-A or SA-CD recordings currently on the market into MP3 Surround files. That would require considerable technical sophistication, and either illegal software or tedious real-time recording (from a DVD-A/SA-CD player into a 5.1-capable soundcard's input).

Using software available on the all4mp3.com site, you could also choose to batch-process your own files to create backward-compatible 5.1 simulations that consume 15 bps more disk space than untreated stereo MP3s. But that process is quite time-consuming, and doesn't create true MP3 Surround files, since it only starts with two channels of data.

Thomson desperately needs a good source for MP3 Surround files to surface, whether that's a legitimate MP3 Surround store, a renegade application for converting DVD- A and SA-CDs directly into MP3 Surround files, or a file-sharing network where people can download pre-converted MP3 Surround files.

If that happens, MP3 Surround could succeed for the same reason that MP3 did and still does: its overwhelming compatibility. MP3 Surround files play just fine on MP3 players that don't support the "surround" part of the file, and users with MP3 Surround equipment will be able to enjoy the exact same surround-sound file on their headphones and 5.1 systems for enhanced sound.

If people have MP3 Surround files on their hard drives, you can bet manufacturers will fall over themselves to add MP3 Surround support to their 2007 lines of MP3 players.
http://www.wired.com/news/columns/0,70230-1.html





Intel to Open Technology Center in Gaza
AP

Intel, the world's largest semiconductor company, is planning to build the first information technology education center in the volatile Gaza Strip.

The Intel Information Technology Center of Excellence is intended to provide IT training to Palestinians and stimulate development of high-tech industry in an area where half the labor force is unemployed. The center is being developed in conjunction with Washington, D.C.-based American Near East Refugee Aid and the Islamic University of Gaza.

"We don't want to discount the tension in the area ... but from our perspective, we view it as something that can have a positive impact," said Intel spokesman Chuck Mulloy. "If you talk to the leaders of the Palestinian Authority, this is exactly the kind of thing they want. They want education, they want paths to improve the economic well-being of their citizens."

Intel has had a presence in Israel for more than three decades, but over the past few years has launched an initiative to also expand its investments in the Arab world.

The center is the company's first large project in the Palestinian territories, an area where American corporate involvement is rare.

It will be staffed primarily by Palestinians and will be located a couple of miles outside Gaza City in an area staked out to become a technology park with the Intel center as its anchor, said Peter Gubser, president of ANERA. Construction is expected to begin in about two months, with completion a year later.

The cost to build and equip the center will only be about $1 million, Gubser said, because a dollar goes a lot farther in the Middle East.

Though the security situation in Gaza is not good, Gubser believes the willingness of Intel to be an American corporate pioneer in the Gaza Strip may encourage other American corporations to follow.
http://apnews1.iwon.com//article/200...=home&SEC=news





BlackBerry Addicts Win Reprieve In Patent Row
Philippe Naughton and agencies

American BlackBerry addicts have been spared an immediate dose of cold turkey after a federal judge in Virginia stopped short of pulling the plug on the devices in a long-running row over technology patents.

The relief could be shortlived. US District Judge James Spencer said that there was no doubt Canadian firm Research in Motion Ltd (RIM), the makers of the BlackBerry, had infringed patents belonging to the privately- held NTP Inc.

He said that he would issue a final decision on an injunction "as soon as reasonably possible".

More than three million Americans use the gadgets popularly dubbed the CrackBerry, to stay in touch with their e-mails while on the move. The devices, popular in Congress and widely used in the White House, also function as mobile phones and personal organisers and allow basic web browsing.

The device's success, however, has been played out against a backdrop of legal hostility between RIM and NTP over infringement which has been dragging through the courts for more than four years.

The two companies reached a tentative settlement of $450 million early last year, but the deal fell through. In the meantime, RIM has been challenging the validity of the patents at the US Patent and Trademark Office - but that process has been lagging behind the legal action and RIM today faced the possibility that it would be told either to reach a financial settlement or switch off the devices.

Last month, the US Supreme Court rejected a bid by RIM to review the patent dispute, instead handing the case back to Judge Spencer at the US District Court in Richmond, Virginia. The judge, who has appeared sympathetic to NTP's arguments so far, could yet decide to issue an injunction preventing further use of the patented technology.

The patent row covers only use of the machines in the United States, where NTP was granted a series of patents on wireless e-mail in the early 1980s.

UK and other European users would, theoretically, be unaffected by any shutdown and could continue thumbing away on commuter trains and in City champagne bars, but with so much business going through the United States a ruling against RIM could have larger economic implications.

In the run-up to today's hearing, the war of words between the companies continued to heat up.

NTP, based in Arlington, Virginia, put out a statement saying that RIM had "utilised its money, power and political influence to overcome its complete defeat in the court system and to inappropriately influence the US Patent Office process".

RIM, meanwhile, said that if push came to shove it could use other technology not covered by NTP's patents, technology that it is already trialling successfully.

"We’ve got dozens of customers using it and we haven’t had one complaint," said Jim Balsillie, RIM's joint CEO.

"Our approach is very simple. We need something reasonable where it gives us the scope to run our business. But the truth of it is, all they’re trying to do is jig a timing game, because these patents will go in the garbage. The chance of them surviving is zero. Like they’re gone."

Analysts say that there is little chance of a BlackBerry blackout because even if the Virginia District Court found against RIM, it would either stump up the cash for a settlement - which could cost it as much as $1.5 billion - or introduce the new technology.

NPT will continue to push for the court to come to a judgment as quickly as possible. "Win, lose or draw, this is (a case in which) fast justice is better than slow justice," said Don Stout, the NTP co-founder.
http://business.timesonline.co.uk/ar...056976,00.html





Facing Pressure, White House Seeks Approval for Spying
Sheryl Gay Stolberg and David E. Sanger

After two months of insisting that President Bush did not need court approval to authorize the wiretapping of calls between the United States and suspected terrorists abroad, the administration is trying to resist pressure for judicial review while pushing for retroactive Congressional approval of the program.

The administration opened negotiations with Congress last week, but it is far from clear whether Mr. Bush will be able to fend off calls from Democrats and some Republicans for increased oversight of the eavesdropping program, which is run by the National Security Agency.

The latest Republican to join the growing chorus of those seeking oversight is Senator Lindsey Graham of South Carolina.

In an interview on "Fox News Sunday," Mr. Graham, a former military prosecutor whose opinion on national security commands respect in the Senate, said he believed there was now a "bipartisan consensus" to have broader Congressional and judicial review of the program.

"I do believe we can provide oversight in a meaningful way without compromising the program," he said, "and I am adamant that the courts have some role when it comes to warrants. If you're going to follow an American citizen around for an extended period of time believing they're collaborating with the enemy, at some point in time, you need to get some judicial review, because mistakes can be made."

Four other leading Senate Republicans, including the heads of three committees — Judiciary, Homeland Security and Intelligence — have said they would prefer some degree of judicial oversight. Their positions, if they hold, could make the negotiations more difficult.

The White House is hoping that talks will lead to legislation to approve the program, much as Congress eventually approved Abraham Lincoln's suspension of habeas corpus during the Civil War. Mr. Bush expanded on his defense of the program in Tampa, Fla., on Friday, saying he believed that he had to take extraordinary steps in a time of war.

"Unfortunately, we're having this discussion," he said of the debate over wiretapping. "It's too bad, because guess who listens to the discussion: the enemy."

He added: "The enemy is adjusting. But I'm going to tell you something. I'm doing the right thing. Washington is a town that says, you didn't connect the dots, and then when you do connect the dots, they say you're wrong."

But two days before Mr. Bush spoke, the White House opened the door to talks in the hope of avoiding a full-scale Congressional investigation. According to lawmakers involved in the discussions, a number of senior officials, including Harriet E. Miers, the White House counsel, and Andrew H. Card Jr., the chief of staff, began contacting members of the Senate to determine what it would take to derail the investigation.

The White House has refused to discuss those talks. Trent Duffy, a deputy press secretary, said the administration "does not want to negotiate in the media."

But some lawmakers have given glimpses of the conversations, including Senator Olympia J. Snowe, Republican of Maine, a member of the intelligence panel who was prepared to vote with Democrats on Thursday to open an inquiry until the White House agreed to negotiate.

Ms. Snowe, who favors some kind of judicial review, characterized the talks as a "fundamental shift" in the debate. "I think there has been a quantum leap," she said in an interview, adding that senators were "really trying to wrestle the best way to craft a measured bill."

The chairman of the Senate Intelligence Committee, Pat Roberts of Kansas, has said he would prefer to see the program brought under the authority of the Foreign Intelligence Surveillance Court. Mr. Roberts also says he is concerned that in an era of fast-paced electronic surveillance, the court may not be able to issue warrants quickly enough to meet the needs of the program.

Without offering specifics, Mr. Roberts spoke in an interview last week of "streamlining FISA" and said the N.S.A. would have to be involved in those negotiations.

Complicating the effort to reach a deal is the difficulty of surmounting the president's No. 1 objective: that no discussion make public the technology underlying the spying effort.

The Senate Intelligence Committee has given the administration two weeks to negotiate. If the White House does not demonstrate a good-faith effort, members say, the Democratic proposal for a full-scale inquiry will be back on the table at the panel's next meeting on March 7.

Republican leaders of the House Intelligence Committee have also agreed to some kind of inquiry, but there is a dispute about how broad it should be. Representative Peter Hoekstra, Republican of Michigan and the committee chairman, was traveling in Asia on Sunday and could not be reached for comment.

With Congress in recess for the next week, reaching an agreement on any legislation that contains concrete details seems unlikely. As Senator Mike DeWine, Republican of Ohio, said: "People are all over the place. We don't have a consensus."

Mr. DeWine is calling for legislation that would explicitly authorize the wiretapping and exempt it from the 1978 law that created the intelligence court to review classified applications for wiretapping inside the United States. The White House has embraced that concept, because it would take away the uncertainties of judicial review.

Mr. DeWine said he would also create small subcommittees of the Senate and House intelligence committees, with "professional staff," to oversee the program. "The key is oversight," he said.

It is unclear how Mr. DeWine's idea could turn into legislation without describing the surveillance program in some detail, which Mr. Bush has opposed.

Senate Democrats, meanwhile, are still demanding an inquiry. They also say that writing legislation will be impossible without knowing all the facts.

Senator John D. Rockefeller IV, Democrat of West Virginia and his party's senior member on the intelligence panel, said, "No member of the Senate can cast an informed vote on legislation authorizing, or, conversely, restricting, the N.S.A.'s warrantless surveillance program when they fundamentally do not know what they are authorizing or restricting."

Senator Arlen Specter, Republican of Pennsylvania, has drafted legislation that would require the FISA court to review the constitutionality of the eavesdropping program. Mr. Specter says he is sympathetic to the administration's concern that briefing lawmakers could lead to leaks, which is why he wants to turn the matter over to the courts.

But he insists that the eavesdropping must be subjected to a rigorous constitutional review and has said that anything short of that would be "window dressing."
http://www.nytimes.com/2006/02/20/politics/20nsa.html?





U.S. Reclassifies Many Documents in Secret Review
Scott Shane

In a seven-year-old secret program at the National Archives, intelligence agencies have been removing from public access thousands of historical documents that were available for years, including some already published by the State Department and others photocopied years ago by private historians.

The restoration of classified status to more than 55,000 previously declassified pages began in 1999, when the Central Intelligence Agency and five other agencies objected to what they saw as a hasty release of sensitive information after a 1995 declassification order signed by President Bill Clinton. It accelerated after the Bush administration took office and especially after the 2001 terrorist attacks, according to archives records.

But because the reclassification program is itself shrouded in secrecy — governed by a still-classified memorandum that prohibits the National Archives even from saying which agencies are involved — it continued virtually without outside notice until December. That was when an intelligence historian, Matthew M. Aid, noticed that dozens of documents he had copied years ago had been withdrawn from the archives' open shelves.

Mr. Aid was struck by what seemed to him the innocuous contents of the documents — mostly decades-old State Department reports from the Korean War and the early cold war. He found that eight reclassified documents had been previously published in the State Department's history series, "Foreign Relations of the United States."

"The stuff they pulled should never have been removed," he said. "Some of it is mundane, and some of it is outright ridiculous."

After Mr. Aid and other historians complained, the archives' Information Security Oversight Office, which oversees government classification, began an audit of the reclassification program, said J. William Leonard, director of the office.

Mr. Leonard said he ordered the audit after reviewing 16 withdrawn documents and concluding that none should be secret.

"If those sample records were removed because somebody thought they were classified, I'm shocked and disappointed," Mr. Leonard said in an interview. "It just boggles the mind."

If Mr. Leonard finds that documents are being wrongly reclassified, his office could not unilaterally release them. But as the chief adviser to the White House on classification, he could urge a reversal or a revision of the reclassification program.

A group of historians, including representatives of the National Coalition for History and the Society of Historians of American Foreign Relations, wrote to Mr. Leonard on Friday to express concern about the reclassification program, which they believe has blocked access to some material at the presidential libraries as well as at the archives.

Among the 50 withdrawn documents that Mr. Aid found in his own files is a 1948 memorandum on a C.I.A. scheme to float balloons over countries behind the Iron Curtain and drop propaganda leaflets. It was reclassified in 2001 even though it had been published by the State Department in 1996.

Another historian, William Burr, found a dozen documents he had copied years ago whose reclassification he considers "silly," including a 1962 telegram from George F. Kennan, then ambassador to Yugoslavia, containing an English translation of a Belgrade newspaper article on China's nuclear weapons program.

Under existing guidelines, government documents are supposed to be declassified after 25 years unless there is particular reason to keep them secret. While some of the choices made by the security reviewers at the archives are baffling, others seem guided by an old bureaucratic reflex: to cover up embarrassments, even if they occurred a half-century ago.

One reclassified document in Mr. Aid's files, for instance, gives the C.I.A.'s assessment on Oct. 12, 1950, that Chinese intervention in the Korean War was "not probable in 1950." Just two weeks later, on Oct. 27, some 300,000 Chinese troops crossed into Korea.

Mr. Aid said he believed that because of the reclassification program, some of the contents of his 22 file cabinets might technically place him in violation of the Espionage Act, a circumstance that could be shared by scores of other historians. But no effort has been made to retrieve copies of reclassified documents, and it is not clear how they all could even be located.

"It doesn't make sense to create a category of documents that are classified but that everyone already has," said Meredith Fuchs, general counsel of the National Security Archive, a research group at George Washington University. "These documents were on open shelves for years."

The group plans to post Mr. Aid's reclassified documents and his account of the secret program on its Web site, www.nsarchive.org, on Tuesday.

The program's critics do not question the notion that wrongly declassified material should be withdrawn. Mr. Aid said he had been dismayed to see "scary" documents in open files at the National Archives, including detailed instructions on the use of high explosives.

But the historians say the program is removing material that can do no conceivable harm to national security. They say it is part of a marked trend toward greater secrecy under the Bush administration, which has increased the pace of classifying documents, slowed declassification and discouraged the release of some material under the Freedom of Information Act.

Experts on government secrecy believe the C.I.A. and other spy agencies, not the White House, are the driving force behind the reclassification program.

"I think it's driven by the individual agencies, which have bureaucratic sensitivities to protect," said Steven Aftergood of the Federation of American Scientists, editor of the online weekly Secrecy News. "But it was clearly encouraged by the administration's overall embrace of secrecy."

National Archives officials said the program had revoked access to 9,500 documents, more than 8,000 of them since President Bush took office. About 30 reviewers — employees and contractors of the intelligence and defense agencies — are at work each weekday at the archives complex in College Park, Md., the officials said.

Archives officials could not provide a cost for the program but said it was certainly in the millions of dollars, including more than $1 million to build and equip a secure room where the reviewers work.

Michael J. Kurtz, assistant archivist for record services, said the National Archives sought to expand public access to documents whenever possible but had no power over the reclassifications. "The decisions agencies make are those agencies' decisions," Mr. Kurtz said.

Though the National Archives are not allowed to reveal which agencies are involved in the reclassification, one archivist said on condition of anonymity that the C.I.A. and the Defense Intelligence Agency were major participants.

A spokesman for the C.I.A., Paul Gimigliano, said that the agency had released 26 million pages of documents to the National Archives since 1998 and that it was "committed to the highest quality process" for deciding what should be secret.

"Though the process typically works well, there will always be the anomaly, given the tremendous amount of material and multiple players involved," Mr. Gimigliano said.

A spokesman for the Defense Intelligence Agency said he was unable to comment on whether his agency was involved in the program.

Anna K. Nelson, a foreign policy historian at American University, said she and other researchers had been puzzled in recent years by the number of documents pulled from the archives with little explanation.

"I think this is a travesty," said Dr. Nelson, who said she believed that some reclassified material was in her files. "I think the public is being deprived of what history is really about: facts."

The document removals have not been reported to the Information Security Oversight Office, as the law has required for formal reclassifications since 2003.

The explanation, said Mr. Leonard, the head of the office, is a bureaucratic quirk. The intelligence agencies take the position that the reclassified documents were never properly declassified, even though they were reviewed, stamped "declassified," freely given to researchers and even published, he said.

Thus, the agencies argue, the documents remain classified — and pulling them from public access is not really reclassification.

Mr. Leonard said he believed that while that logic might seem strained, the agencies were technically correct. But he said the complaints about the secret program, which prompted his decision to conduct an audit, showed that the government's system for deciding what should be secret is deeply flawed.

"This is not a very efficient way of doing business," Mr. Leonard said. "There's got to be a better way."
http://www.nytimes.com/2006/02/21/po...age&oref=login





Germany Weighs if It Played Role in Seizure by U.S.
Don Van Natta Jr.

This article was reported by Don Van Natta Jr., Souad Mekhennet, and Nicholas Wood, and was written by Mr. Van Natta.

For more than a year, the German government has criticized the United States for its role in the abduction of a German man who was taken to an American prison in Kabul, Afghanistan, where he said he was held and tortured for five months after being mistaken for a terrorism suspect.

German officials said they knew nothing about the man's abduction and have repeatedly pressed Washington for information about the case, which has set off outrage here. At a meeting in Berlin last December, Chancellor Angela Merkel demanded an explanation from Secretary of State Condoleezza Rice over the incident.

But on Monday in Neu-Ulm near Munich, the police and prosecutors opened an investigation into whether Germany served as a silent partner of the United States in the abduction of the man, Khaled el-Masri, a German citizen of Arab descent who was arrested Dec. 31, 2003, in Macedonia before being flown to the Kabul prison.

The action came after a two-and-a-half-hour meeting at police headquarters in which Mr. Masri told the police that he was "90 percent" certain that a senior German police official was the interrogator who had visited him three times inside the prison in Kabul but had identified himself only as "Sam." The German prosecutors said Monday that they were also investigating whether the German Embassy in Skopje, Macedonia, had been notified about Mr. Masri's kidnapping within days of his capture there, but then had done nothing to try to help him.

Mr. Masri's case has come to symbolize the C.I.A. practice known as extraordinary rendition, in which terror suspects are sent to be interrogated in other countries where torture is commonly used. In broadening its criminal inquiry into the abduction of Mr. Masri to the activities of its own government, German prosecutors are trying to determine whether the German government worked secretly with the United States in the practice.

"I feel deceived and betrayed by my own country," Mr. Masri, a 42-year-old unemployed car salesman from Neu-Ulm, said in an interview.

The German police official identified as "Sam" denied that he had visited Mr. Masri in Afghanistan and said he was "on holiday" at the time in Germany, but that he could not remember exactly where. The man was present on Monday at the police station, where Mr. Masri picked him out of a 10-person lineup. After speaking with him, Mr. Masri said that his voice was similar but that his hair style was different.

Martin Hofmann, a prosecutor in Munich, said Monday that his office would not "assume that this man is Sam" but would "go forward with our investigation."

A senior German official familiar with the case said that Mr. Masri was "at best mistaken" and that the police official "cannot be Sam."

The New York Times is withholding the official's name at the request of Germany's intelligence services because he often does undercover intelligence work. He frequently gets "sensitive" assignments and helps clean up "dirty work" for the German foreign intelligence service, said one of his longtime colleagues, who spoke on condition of anonymity.

A senior Macedonian government official who was directly involved in Mr. Masri's detention told The Times that not long after Mr. Masri's capture, Macedonian officials notified the German Embassy in Skopje. C.I.A. officers in Macedonia conducted the interrogation of Mr. Masri, according to Macedonian officials.

August Stern, the Munich-based federal prosecutor who is leading Germany's criminal investigation of Mr. Masri's kidnapping, said his investigators were trying to determine whether the German Embassy had been told about Mr. Masri's capture, and then sent a German agent to the American prison in Kabul to talk with him. Mr. Stern and other senior police officers and prosecutors said they would try to interview the officials in the embassy in Skopje in coming weeks.

August Hanning, secretary of state for the Ministry of the Interior, denied in an interview that any member of Germany's secret services had visited Mr. Masri while he was held captive. "He has never been to Afghanistan," Mr. Hanning said of the German police official.

Two senior German officials, who spoke on condition of anonymity because of the case's sensitive nature, denied that Germany's Embassy had been told about Mr. Masri's capture. "The German Embassy in Skopje was not informed by Macedonian authorities while German citizen el-Masri was in custody in Macedonia," a Foreign Office spokesman said. Another official said Germany did not learn about Mr. Masri's detention until May 31, 2004, when the American ambassador to Germany at the time, Daniel Coats, informed German officials about Mr. Masri's capture and eventual release.

"According to our investigation, I am convinced that German officials did not have any knowledge before his release," the official said.

Later this week, the German government is expected to turn over a report to Parliament about Mr. Masri's case.

Meanwhile, investigators at the Council of Europe, led by Dick Marty, a Swiss lawmaker, are looking into whether there was quiet cooperation between the C.I.A. and its counterparts in European countries, including Germany, Italy and Sweden, where suspected terrorists were kidnapped and sent to third countries for interrogation.

In Italy, the authorities in June charged 23 C.I.A. agents with the abduction of a terrorism suspect from the streets of Milan. Italian officials insist that they did not know about the procedure, but some elected officials in Italy said the Americans must have tipped off their counterparts in the Italian intelligence agency.

European officials have been sharply critical of the C.I.A.'s rendition program. In particular, German officials have rebuked the United States for playing a role in the abduction of one of their citizens and then transporting him to Afghanistan on a chartered C.I.A. plane.

"I have no explanation for the whole case," a senior German official said. "To bring such a man like el-Masri from Europe to Afghanistan and to ask him some questions and six months later, the explanation is that it's a terrible error is not very convincing. To me there are still a lot of questions."

Manfred R. Gnjidic, Mr. Masri's lawyer, said he is convinced that Germany "stood by like a little school boy, watching what was going on with my client and doing nothing."

After more than five months in captivity, the United States released Mr. Masri without filing charges. His case was first disclosed in The Times in January 2005.

At the meeting last December in Berlin between the German chancellor and Ms. Rice, the kidnapping of Mr. Masri was discussed privately, but the two leaders seemed to disagree about the substance of that conversation afterward.

Ms. Merkel said the Bush administration had admitted that it had mistakenly abducted Mr. Masri. But Ms. Rice declined to discuss with reporters anything about the case. She said only that she had pledged to Ms. Merkel, "When and if mistakes are made, we work very hard and as quickly as possible to rectify them."

In Washington, a senior State Department official said Monday that the department would not comment on Mr. Masri's case, noting that it was a matter of litigation in both Germany and the United States. In late 2003, Mr. Masri left his family in Ulm for a trip to Macedonia. Macedonian and German officials said he was arrested at a border checkpoint on Dec. 31, 2003, because his name was on an Interpol terror watch list. But they said the name referred to another Khaled el-Masri.

Mr. Masri was then held in a hotel in Macedonia for several weeks, where he was questioned by the C.I.A., according to senior Macedonian and American officials. A senior Macedonian official said the German Embassy was notified about Mr. Masri within days of his capture. "Unofficially, they knew," the official said of the Germans.

A C.I.A. spokesman declined to comment.

Two senior Macedonian officials said the Americans had asked to have Mr. Masri detained in Macedonia for 23 days. "We consider the Americans as our partners," a senior Macedonian official said. "We cannot refuse them."

Mr. Masri said he had pleaded with his captors to let him go. "Call the German Embassy," Mr. Masri said he had repeatedly told them. "I'm a German citizen. Please tell them I am here!"

"They don't want to talk to you," he said one of his captors had replied.

In a recent interview, Mr. Masri said: "I thought it was strange that they kept telling me the Germans didn't care about me. Now I know why they said that — because it was true."

At the hotel, Mr. Masri said he had been asked whether he was a member of Al Qaeda. But he was struck by the many questions he was asked about his time in Germany. He said the questions had led him to suspect that the Germans were cooperating with the Macedonians.

A German official disputed that assertion, saying Germany often shared information with their American counterparts about suspected terrorists. But the official acknowledged that the German police had not considered Mr. Masri to be an "important" suspect.
Publicly, Macedonia has denied that Mr. Masri was held illegally. "There is nothing the ministry has done illegally," Hari Kostiv, the minister of interior at the time and later the prime minister, said in an interview. "The man is alive and back home with his family. Somebody made a mistake. That somebody is not Macedonia."

By late January 2004, Mr. Masri was sent to Afghanistan, where he said he was held and beaten over the next five months.

For Mr. Masri, one of the biggest mysteries was the identity of the interrogator who identified himself as Sam, and who spoke fluent German. He visited three times during Mr. Masri's final month at the Kabul jail.

During the first meeting, Mr. Masri said he had asked the man if he was from Germany, but the man declined to answer. Mr. Masri said he had asked him, "Do the Germans know I'm here?"

"He said he did not want to answer," Mr. Masri said. "I asked him if my wife knew I was there. Sam said she doesn't know. He then said, I shouldn't ask questions, I should only answer them."

During their second meeting, the man was no longer belligerent, Mr. Masri said, bringing him cookies, chocolates and a copy of the German newsmagazine Focus. The man also asked if Mr. Masri wanted "anything from Germany."

"I said, 'Nothing, thank you,' " Mr. Masri said.

In their last meeting, a week before Mr. Masri's release, the man told him that he would be returning home soon. The last time Mr. Masri saw Sam, the interrogator was speaking with a man who he believed was an American. Soon afterward, Mr. Masri was released.

On Dec. 12, 2005, Mr. Gnjidic, the lawyer for Mr. Masri, received an e-mail message from a German journalist named Frank Kruger, who suggested that Sam might be a German police official. Earlier this month, Mr. Gnjidic said he had obtained a videotape of the police official that convinced Mr. Masri that he was Sam. On Monday, after meeting the man at police headquarters, Mr. Masri said he was 90 percent certain that the police official was Sam.

"The man was very nervous, and he could not look at me into my eyes," Mr. Masri said. "The hair is different, but the voice sounded very similar."

"For me, it is very important that we know who this man was," he said.

Mr. Gnjidic said he found it hard to believe that other than the prosecutors in Munich, no one in the German government has sought Mr. Masri's testimony about his ordeal. "The scandal for me is that the Germans did nothing when they heard a German had been captured," he said. "They should have protested very hard and tried to stop this."

Don Van Natta reported from Munich for this article, Souad Mekhennet from Neu-Ulm and Munich, and Nicholas Wood from Skopje.
http://www.nytimes.com/2006/02/21/in...ge&oref=slogin





EU Approves Landmark Data Retention Law

European Union justice ministers Tuesday approved a controversial new law requiring telecom operators to store phone and Internet data to help fight terrorism.

The so-called data retention directive has been the subject of a heated political debate in Brussels for over a year, with supporters saying it is needed to track down terrorists, pedophiles and criminal gangs, and civil liberties campaigners arguing it is an intrusion on basic rights.

Under the directive, telecom operators in all 25 EU states will be required to keep records of all phone calls and Internet communications for a period of six months to two years.

The measure already has the backing of the European Parliament, which succeeded in watering down the original proposal. European Commission vice-president Franco Frattini said the compromise was "not perfect" but hailed the directive's adoption as a "victory for democracy, a victory for our EU citizens, and a victory for the fundamental rights the European Union and its constituting 25 member states are based upon."
http://www.upi.com/SecurityTerrorism...1-104633-9768r





Whitehall Branded Internet 'Villain of the Year'
Rhys Blakely

The British Government has been named "Villain of the Year" by a group of the world's largest internet companies after pushing through laws across Europe that will force firms to store more information on their customers' web and telephone use.

At an awards ceremony in London last night, the Internet Service Provider Association said the Government had used its presidency of the European Union in 2005 to push through EU-wide data retention laws that will force ISPs and telecoms companies "to retain more data for longer without proper impact assessment".

The association’s members, which include telecoms providers such as BT as well as internet giants such as Google, Yahoo and Microsoft, are already among the biggest repositories of personal data in the world.

Under the legislation, which was given final approval in Brussels this week, they will keep details of their European customers' telephone calls and internet use for up to two years.

Previously ISPs in Britain had operated under a voluntary code included in the 2001 Anti-terrorism, Crime & Security Act. The code suggested that subscriber information be stored for 12 months and web activity information – which includes logs of web pages visited – for just four days.

The Government has argued that such information is a crucial weapon in the fight against terrorism. Its support for the new EU measures measures followed the London bombings in July.

However, an ISPA spokesman told Times Online: "There are strong concerns that these data retention measures would be used for wider purposes than just terrorism.

"There is lot of confusion here, on issues such as data protection and human rights. It is not simply a matter of costs."

The body has suggested that data could potentially be made available to groups other than the security forces, in moves that could breach people’s privacy.

In America, Google recently confronted the White House over attempts to have the internet company hand over search data to the authorities, a row which once again brought online privacy concerns to the fore across the world.

The industry is also concerned ober the financial impact of the fresh legislation. One large internet service provider in the UK told Times Online it estimated the cost at £26 million to set up a system to retain data and another £9 million a year in administration costs.

Peter Cullen, Chief Privacy Strategist at Microsoft, told Times Online last year that globally, political debate has "frequently and increasingly resulted in vague and conflicting legislation" which "was not protecting consumers and was not flexible enough for business".
http://business.timesonline.co.uk/ar...056974,00.html





Finally, there is an Alternative to the Internet

NetAlter(TM) is a Patent Pending innovation based on a unique "Information, Communication and Computational" (ICC) architecture which will provide a robust alternative to the current Internet.
Press Release

Mumbai, India, February 23, 2006 --(PR.COM)-- NetAlter is a radically superior System and Method which will offer "Safe and Smart surfing environment," "Super Fast Intelligent Deep Wide P2P Search," "Robust protection against Virus and Piracy," "GRID Supercomputing for every desktop," "Active Collaboration," "Protected Peer-to-Peer Personal Network" and more.

Users of applications based on NetAlter system will be able to download software, share files and information, create personal network and conduct online business without having to worry about surfing speed, junk information, unwanted advertisements, piracy, virus, spam and the myriad of other issues that presently plague the internet.

Following are some of the features that NetAlter will offer over the current Internet:

Secured Gateway to Smart Environment

Present Internet is a highly unorganized, read-only system where there are heterogeneous identities, standards and application interfaces resulting in frustration for the average internet user.

The NetAlter System offers a unified, user friendly visual interface based on standardized core browser technology, which can be customized to end-user requirement.

The NetAlter browser offers all-in-one functionality such as Multi Role (NetAlter Active, NetAlter Developer, NetAlter Service Provider, NetAlter Subscriber), Multi User, Multi tasking, Multi Language, support to Multi Collaboration and Sharing, Multiple Communication Channels (TCPIP/HTTP/Wireless, etc), Multi Platform and a variety of Styles, etc.

NetAlter will have a central controlling authority that coordinates the activity of certified channel nodes, to ensure that the Information provided by Individuals and organizations is verifiable, uniquely identified and organized.

A salient feature of NetAlter is its "Always Connected" mode which automatically switches to an alternate communication channel, when you're disconnected from the Internet.

NetAlter also offers end-users the ability to customize their browser container; giving them the option to block unwanted advertisements and display only selected advertisement channels.

The data on NetAlter is organized on the basis of semantic web which provides an intelligent organization of data based on a vertical as well as horizontal hierarchical classification.

This enables the NetAlter Browser to make available an active explorer that lists the current as well as new source of data in a vertical and horizontal organization, and is easily located and precisely searchable.

Domain names registration and associated litigation is history in the NetAlter System.

When a company releases their products and services on NetAlter, they are automatically placed under relevant classification, publicly broadcasted and easily accessible.

NetAlter provides a user friendly, wizard based interface, using which, NetAlter subscribers can select the application or service of their choice at the time of setup.

Akin to adding and removing programs in an operating system, users can easily subscribe or unsubscribe to applications and services at any given point of time.

NetAlter adheres to the service oriented application architecture (SOA).

Robust Protection from Virus and Piracy

Present Internet has become a heaven for spreading virus, illegal copying of software, music and information. End Users are also concerned about their privacy and security of personal information.

NetAlter is based on technology that is free from current Internet viruses and security vulnerabilities and offers comprehensive protection for Intellectual Property.

Each new service or product, published and distributed on NetAlter, is protected using a highly secured and encrypted unique Package or Product Key. Once a product or service is approved, certified and distributed on NetAlter, there is no scope for duplication of the same.

NetAlter also provides a centralized inventory of products and services and auditing of their usage pattern.

Superfast and Intelligent Search

Present Internet Search gives you very few options for obtaining a detailed or precise search result and indexes only about 30-40% of available information.

NetAlter Search will be Super Fast, Powerful and Visually Appealing; delivering surgically precise results.

It enables deep search of not just published content but also those available on local computers, private domains, intranets, databases, etc. by enabling artificial intelligence (AI), GRID Supercomputing, P2P and several other cutting edge technologies.

Users will have multiple advanced search options synchronized with an active explorer based on a detailed Ontology and Taxonomy hierarchical classification.

A salient feature of NetAlter Search is that if offers a period wise, geographical location wise, domains wise and field specific search with options to segregate search results on the basis of new or modified as well as archived data.

Information searched on NetAlter will be stored locally in database form and can be made available for offline search as well as further statistical analysis and comparison.

NetAlter Search also provides a system wide search encompassing understanding of user keywords and listing resources from every possible source in the NetAlter system.

Grid Supercomputing and Active Collaboration

Present Internet is based on outdated Client Server technology that wastes the resources of client & server computers and contributes to unnecessary network traffic, slowing down the Internet. Present Internet Websites also crash when there is a surge of hits. The online collaboration facilities available at present are limited in scope and functionality.

NetAlter provides the power of GRID based supercomputing in a democratic enterprise to the end user by distributing application processing over free resources available in a supercomputing GRID.

For this, NetAlter has developed a unique democratic system and method, wherein each NetAlter user can determine how much supercomputing power they require to access from the GRID, by simply sharing a proportionate percentage of their own local resources to this GRID.

When a user subscribes to this technology, applications and functions available on NetAlter execute at supercomputing speed.

NetAlter is a completely new System and Method which offers all the facilities and incentives for active collaboration between different entities such as Personal Networks, Communities, Enterprise, etc.

It provides a user-friendly, wizard based interface enabling Individuals, Groups and Business to easily create their own Personal Network or Intranet, using a highly secured Peer to Peer technology, which also provides safeguard for Intellectual Property Rights.

Similarly, NetAlter also provides developers with a unique platform to share their development work with other developers by licensing their software modules on NetAlter and earn royalty or license fees.

This is just a preview of what NetAlter has to offer. There are many more exciting features that NetAlter will deliver. To learn more about NetAlter, visit www.netalter.com.

About NetAlter Software Limited

NetAlter is a System and Method for which patent application has been filed via PCT in 126 countries including USA and India.

After 8 years of R&D and over 60 man years of vigorous research, a System and Method has been developed, that can be truly considered as an alternate to the current Internet system.

NetAlter Software Limited is a Mumbai based Indian unlisted company holding complete marketing rights over the NetAlter System and Methods and also the entity which will provide license rights for development of innovative solutions for NetAlter system.

NetAlter Software Limited is also the principal research and development arm of White Vision Software Limited which develops and markets copyrighted, user friendly software for social segment such as Matrimonial Hotline®, Community Hotline®, Web Manager®, etc.

Founded by IT entrepreneurs Yogesh Rathod and Rajesh Rathod, NetAlter Software Limited is the fastest growing R&D hub for cutting edge software solutions.

Our registered office details follow:

NetAlter Software Limited. #3 & 4, Sai Smruti,

Behind Deep Mandir Theatre,

Mulund (West),

Mumbai -- 400080, India.
# (91-022) 2592- 8553 (Fax) (91-022) 2591- 0141
http://www.pr.com/press-release/7116





BitTorrent Launches Free, Downloadable Music and Film Trailers From South by Southwest 2006
Press Release

SAN FRANCISCO--(BUSINESS WIRE)--Feb. 21, 2006--BitTorrent Inc., developer of the world's most popular peer-to-peer (P2P) application, today announced it will be supporting the 20th Annual South by Southwest (SXSW) Music and Media Conference and 13th Annual SXSW Film Conference and Festival. To highlight the hundreds of musical acts from around the globe and emerging talents in independent film-making, SXSW and BitTorrent will offer free downloads. The music compilation and movie trailer package will be available on both www.sxsw.com and www.bittorrent.com. SXSWeek takes place March 10 - 19, 2006 in Austin, Texas.

With its highly efficient P2P publishing tool for delivering large files on the Internet, BitTorrent will enable consumers to quickly download a

compilation of songs by artists playing at SXSW, including The Secret Machines, Giant Squid, Clap Your Hands Say Yeah, Boyskout and hundreds of others. Similarly, SXSW will be offering a collection of movie trailers from this year's schedule of SXSW Films, which includes over 50 world premieres. With BitTorrent as a publishing platform, it significantly lowers transfer costs and offers increased speed and effectiveness for the downloader.

"With the amount of bandwidth it takes to make such massive digital files available over the Internet to SXSW fans worldwide, we would simply not be able to do it effectively without BitTorrent," said Scott Wilcox, Chief Technology Officer of SXSW. "This will be the second year that BitTorrent is offering its software and services to make sure that the voices and the work of the independent artist community are available for the whole world to enjoy."

"South by Southwest has become an important and globally recognized venue for indie artists to showcase their work," said Ashwin Navin, president of BitTorrent Inc. "BitTorrent, as the free and open standard for cooperative distribution technology, is a natural fit for what everyone hopes to achieve at the festival, and bring the expression to a global audience."

South by Southwest Music and Media Conference (SXSW) 2006, in its twentieth year, will take place March 15 - 19, 2006. The SXSW Film Conference and SXSW Interactive Festival, both in their thirteenth year, will take place March 10 - 14, 2006 with the Film Festival running from March 10 - 18, 2006 in Austin, Texas. For more information, visit www.sxsw.com.
http://home.businesswire.com/portal/...&newsLang =en





With a Few Clicks, You, Too, Can Start to Change Your Life
Virginia Heffernan

Television has historically defined itself against work. The sedentary television rules the living room in view of a fat sofa — those great monuments of domestic leisure. The evening news marks the end of the workday; prime time exists as an alternative to plays and movies; and those lucky enough to be sick or jobless get to watch talk shows and soaps.

Watching television is so much the opposite of work, in fact, that it's hardly even a purposeful act: If you spend Saturday and Sunday watching television, you can credibly say you spent the weekend doing nothing at all.

But now we find ourselves in the midst of the long-anticipated convergence of Internet and television, and a weird thing is happening: people are watching television during the workday, in offices, at their computers, sitting up straight in unupholstered desk chairs. They're watching fake ads or clips from "Saturday Night Live" that show up in e-mail in-boxes. And they're watching with their fingers on keyboards, toggling between "Lost" or lusty Colin Farrell and Excel spreadsheets.

No wonder, then, that the latest programmers — people trying to create sustainable, popular, commercial Internet television — are incorporating workday attitudes of diligence, can-doism, detail-orientation and, above all, procrastination into new shows. AOL's self-improvement series, "AOL Coaches," is available only at aol.com/ coaches, and if you want to tune in at the office, you might just get away with it. The series is broken into installments that aren't even called episodes: they're "workshops," and each one of them includes plenty of opportunities to study, memorize, check off boxes and even take little tests. It has the look and feel of real work, and all the virtuous fun of finally doing your expenses.

The current headliner in the "AOL Coaches" series is Star Jones Reynolds, a lawyer and co-host of "The View" on ABC. Like many of the self-styled life coaches on the site, Ms. Jones Reynolds has a book to promote: something called "Shine," about falling in love. ("Shine" is packaged for sale on Amazon with a book about Laci Peterson's murder.) Having married, Ms. Jones Reynolds now qualifies as an expert on life's sweetest reward, and here she is on the screen, in what looks like an animated headshot, jabbering solemnly under stalactites and chandeliers of AOL graphics and toolbars. She's cited as a "love coach," though her wisdom is directed entirely at women looking for romance, and her workshop is called "Is He the One?"

Ms. Jones Reynolds's insight into love is almost exhaustingly ordinary; the script is so bland that it's hard even to tell which of her proud premarital disciplines — weight loss? chastity? — she's trying to hawk. I did learn that you should get acquainted with someone before having sex with him. Rarely does her advice rise to the level of women's-magazine truisms. (She encourages viewers to look for men who love their mothers and are supportive.) Only when she champions "a like-minded guy with whom you can be equally yoked" does the language achieve a little Biblical snap, and the bad men who should be avoided — mother-haters who refuse prenups — seem to be, by implication, unchristian.

The workshop offers a short quiz on love, which I took. It was harsh. It was called "Are there any deal-breakers?" and — laboriously clicking on answers that turned orange when I chose them — I got half the questions wrong. I didn't realize that if a man has no credit card, you have to "run," and I didn't know that you also have to run if you have a single doubt about whether a guy is the one. Yikes. I did know that you can't change a man — that mighty platitude I learned from Mademoiselle when I was 7 — but I was surprised to discover that new research apparently shows you can "soften" him somehow.

Ads for AOL radio ("Don't Surf in Silence") periodically interrupted Ms. Jones Reynolds's inquiry into his being the one. A pushy medley that combined Nirvana and Madonna — not kidding — didn't harmonize well with the svelte attorney's soothing smooth-jazz D.J. voice.

Trudging through her workshop was generally an unpleasant experience. The talking, animated head-and-shoulders image of her was so stylized — stiff hair, poreless skin, out-of-synch sound — that it seemed at times like a cartoon. If it was enhanced somehow, as it appeared to be, it might as well have been an animated cartoon and not film at all; in the future, I don't see why some of these coaches should even bother to film their stand-ups. Someone could make these creatures in a lab.

But Ms. Jones Reynolds turned out to be the exception on the "AOL Coaches" program. Many of the other coaches — coaches rather than just celebrities by trade — were superb: original, specific, energetic, even inspiring. As the bruiser success sergeants, for example, including Stephen Covey and Tom Peters, strutted manfully around my screen, I was ready to become the C.E.O. of Me, develop Brand Me, and get off the Road of Mediocrity.

John Gottman, the relationship clairvoyant who says he can predict who's getting divorced after watching couples for three minutes, was a revelation. Don't do harsh set- ups, he instructed, and that coded command came as big news. Ninety-six percent of conversations end the way they start, it seems; even if you get nice in the middle, a nasty start-up means you'll close in fury. Riveting. Not handsome or histrionic enough for regular television, Mr. Gottman has a muted style and bookish manner that's ideal for this form. With these figures surrounded by so much text — often talking points come up screen right — they come to seem like moving book illustrations. More than once a coach seemed like a hallucination, as if the portrait of a syndicated columnist had come to life in a newspaper and begun to speak from the page.

"AOL Coaches" lets you print out parts of the presentations of its coaches. It's less like television entertainment, and more like a teleconference; the papers are take- aways. Having watched every coach on the site, and some more than once — they were addictive somehow — I printed out piles of good advice and packed it into a binder for further study.
http://www.nytimes.com/2006/02/21/ar...ib&oref=slogin





Web Services Upend Old Ideas About the Little Guy's Role
Steve Lohr

The old story of technology in business was a trickle-down affair. From telephones to computers, big companies came first. They could afford the latest innovations, and they reaped the benefits of greater efficiency, increased sales and expansion into distant markets. As a technology spread and costs fell, small businesses joined the parade, though from the rear.

Now that pattern is being challenged by a bottom-up revolution, one fueled by a second wave of Internet technologies like the search services from Google, Yahoo and Microsoft and software delivered as a utilitylike service over the Web.

The second-generation Internet technologies — combined with earlier tools like the Web itself and e-mail — are drastically reducing the cost of communicating, finding things and distributing and receiving services online. That means a cost leveling that puts small companies on equal footing with big ones, making it easier for upstarts to innovate, disrupt industries and even get big fast.

The phenomenon is a big step in the democratization of information technology. Its imprint is evident well beyond business, in the social and cultural impact of everything from blogs to online role-playing games. Still, it seems that small businesses, and the marketplace they represent, will be affected the most in the overall economy. Long- held assumptions are suddenly under assault.

Fortune Below 500

One truism has been that while small businesses represent a huge market — companies with fewer than 500 employees, the government reports, account for half the nation's economic output and 60 to 80 percent of all new jobs — it is highly fragmented and hard to reach.

So big companies typically shunned the small-business market, and Silicon Valley start-ups tended to sidestep it, instead devising business plans focused on either the consumer or the large-corporate market. But Salesforce.com, which supplies customer tracking and management software online, has shown how to create a thriving business by selling first to small businesses.

"Our company was based on building momentum from the bottom up, and using the Web as we do drastically reduces the cost of sales and service," said Phill Robinson, senior vice president for marketing.

Today, the company has more than 18,000 customers and sales of more than $300 million a year. Its only problem seems to be growing pains, as the company's network went down a couple of times in the last two months. Many start-ups are trying to follow in the footsteps of Salesforce by offering software as an online service to reach smaller companies.

I.B.M. makes its living catering to the costly needs of its Fortune 500 clientele. But last year, it began offering small businesses Web-based software services like filtering for e-mail spam and viruses, starting at less than $2 per employee a month.

"I.B.M. could not afford to touch this market years ago," said James M. Corgel, general manager of services for small and medium-size businesses. "But as we automate more, we can afford to sell to the small-business market."

Creating More Gazelles

Students of small business have often noted that the most economically significant companies are the "gazelles," small businesses that become dynamic fast-growing companies. The new Web-based technologies could foster a proliferation of gazelles, stimulating job creation and wealth across the economy.

"In principle, this should lower barriers to the entry and growth of innovative small enterprises," said Frederic M. Scherer, an economist and professor emeritus at the John F. Kennedy School of Government at Harvard University.

That principle is being widely practiced these days. Take the example of Bella Pictures, a three-year-old business in San Francisco. Its goal is to transform the enterprise of wedding pictures from a local craft of mixed quality into a national business of consistently high quality and personalized service. It has grown rapidly, and last wedding season, May through October, Bella shot photographs at 1,300 weddings.

Bella's 150 freelance photographers and 50 consultants in a dozen cities are linked in a virtual network. Every job, assignment, bride and mother-of-the-bride preference is entered into a Web-based customer relationship management program. Bella markets itself by buying keywords, like "wedding photography," on search engines like Google and Yahoo to bring customers to its Web site, bellapictures.com.

Bella solicits photographers on Craigslist, the online bulletin board, and photographers submit portfolios through the Web, too. All photographs are taken with digital cameras.

The technology behind Bella, said Tom Kramer, the president and a founder, has become available and affordable only in the last few years. Sophisticated customer- and job-tracking software, he said, used to be available only as million-dollar software applications, with hefty annual maintenance fees. Today, its Web-based equivalent is a pay-for-use service from Salesforce, which costs Bella a couple of thousand dollars a month. Web searching, online listings and the spread of digital photography, he added, are all crucial tools for Bella.

"Our business wouldn't have been possible five years ago," he said.

More Growth on Tap

The new technology is also giving small businesses the freedom to pursue new strategies. Brooklyn Brewery, founded in 1988, took a new path less than three years ago. The company wanted to build its beer into a larger regional brand. So it sold the trucks and storage facilities that it had used mainly in the New York area, and hired independent distributors to deliver its beer up and down the East Coast.

To become a regional business, the company wanted most of its employees to work outside Brooklyn, promoting its beer in new markets. It invested about $20,000 in a computer network so that its 15-person sales force, spread from Massachusetts to Georgia, could tap in from notebook computers for information on everything from sales leads to poster art for tavern promotions.

The strategy has paid off. Sales at the 27-person company have grown nearly 30 percent over the last couple of years to about $10 million in 2005, said Eric Ottaway, the general manager, who expects sales to rise about 15 percent this year. The growth has come without adding to his four-person administrative staff, Mr. Ottaway said.

Brooklyn Brewery farms out the maintenance of its computer network to a services company, Quality Technology Solutions of Morris Plains, N.J., which typically works for larger businesses. But it can make money on a smaller account like the beer maker because of the Internet and features that Microsoft has added to its Small Business Server software, which enables remote updating, troubleshooting and bug fixes, said Neil Rosenberg, president of Quality Technology Solutions. Mr. Rosenberg's experts can now monitor and tweak the brewery's computers from New Jersey.

"So I don't have to schlep a technician to Brooklyn for 80 to 90 percent of the problems," he said.

I.B.M., the giant of the technology services business, is not sending consultants to Cole Harford in Overland Park, Kan., either. Last year, Cole Harford, a distributor of restaurant supplies like napkins and plastic cups, started using a couple of I.B.M. Web-based software programs that monitor Cole Harford's e-mail for spam and viruses, blocking malicious code from reaching its 75 desktop and notebook personal computers. The service has been remarkably effective, said Laurel Johnson, the information technology director at Cole Harford, and it costs less than $5 a month per user.

Previously, Ms. Johnson said, she and an assistant used to spend two days a week wrestling with virus and spam troubles. Today, those problems take only four hours a month of her time, so she is planning to finally tackle a long-delayed project to automate the company's four warehouses.

Providing a Second Wind

The new Web technologies have also given a second life to languishing small businesses. Until a few years ago, the Newark Nut Company, a retail and wholesale vendor of nuts, candy and other snacks, was struggling in a declining urban neighborhood. But in 2003, Jeffrey Braverman decided to leave behind his six-figure salary at a private investment company in Manhattan and help revive his family's business.

Mr. Braverman pushed the business online, studied Web marketing and bought keywords on search engines. Since then, the company's employment has tripled to 12 people, Mr. Braverman said, and sales have tripled into millions of dollars a year. The business, now called Nutsonline.com, recently relocated to Linden, N.J.

Search technology, he said, can really open the door to wider markets for small companies. Far-flung customers can find a company's products, while keyword advertising makes marketing more specific and affordable. "It's just been phenomenal what Google has done for our business," said Mr. Braverman, who is 25.

Smaller businesses have now taken the lead in spending on information technology. Small and medium-size businesses — those with fewer than 1,000 employees — account for half of all spending on hardware, software and services in the United States, and their spending grew 35 percent faster last year than the overall market, according to IDC, a research firm. That trend, said Ray Boggs, an IDC analyst, is expected to continue for the next few years as small businesses become more eager and adept at using new Web technology.

JotSpot is a Silicon Valley start-up betting on the small-business market. It offers collaborative work spaces online where people can share and edit Web-based documents and databases for project management, help desks, recruiting, product development and other tasks.

JotSpot calls them "do-it-yourself applications." Anyone can create up to 20 Web pages shared by five people, at no cost. For more pages and larger groups, the monthly fees start at $9.

"The sweet spot for us is small businesses up to 200 people," said Joe Kraus, a co-founder and the chief executive of JotSpot. "The rise of software as a Web service, combined with search marketing, has totally changed the economics of supplying and selling technology to small businesses."
http://www.nytimes.com/2006/02/21/bu...=1&oref=slogin





That Which We Call a Blog...
Dan Mitchell

THE rise of blogging is often cast in black-and-white terms: blogs versus the "MSM" (the derisive term some bloggers apply to the mainstream media).

But things may shake out more along the lines of journalism versus armchair yammering. Both can be, and are, presented on Web sites that call themselves blogs. Both have been presented in the mainstream media all along.

"The State of the Blogosphere" presented at sifry.com this week by David L. Sifry, the founder of Technorati, a leading blog search site, shows just how complicated things have become. According to Mr. Sifry's data, mainstream media sites, as measured by the number of blogs linking to them, are trouncing news-oriented blogs by a growing margin. Bloggers link to The New York Times Web site about three times as often as they link to the technology-oriented Boingboing.net. Only four blogs show up in the top 33 sites.

But it isn't the data or the rankings that matter most here. More interesting is that it's becoming hard to tell what is a blog and what is mainstream media.

Mr. Sifry calls Boingboing a blog — and so it is. But it also does some original reporting, and has professional journalists on its staff. And oddly, Mr. Sifry calls Slashdot (slashdot.com), a technology site with material created mostly by users, a mainstream site.

Meanwhile, more and more mainstream media sites are blogging. In the end, users are most likely drawn to sites for the quality and trustworthiness of the material presented.

The report also shows that while blogs may present no real threat to top news organizations, niche publications are far more vulnerable. "This realm of publishing, which I call 'The Magic Middle' of the attention curve," Mr. Sifry writes, "highlights some of the most interesting and influential bloggers and publishers that are often writing about topics that are topical or niche. And what is so interesting to me is how exciting, informative and witty these blogs often are. I've noticed that often these blogs are more topical or focused on a niche area, like gardening, knitting, nanotech, MP3's or journalism."

This Book Brought to You By For the first time, a major publisher is offering a book online at no cost to readers, supported by advertising. HarperCollins is selling the book, "Go It Alone! The Secret to Building a Successful Business on Your Own" by Bruce Judson, through Mr. Judson's site, brucejudson.com. An alert poster at MetaFilter.com noted that the publisher's page for the book did not mention the free version. Despite the cheesy title, Mr. Judson, a fellow at the Yale School of Management, won accolades from Library Journal and others for his book.

Unpaid Shills Wanted Sony BMG, fresh from being exposed by a blogger for planting stealth, and potentially dangerous, antipiracy code in some of its CD's, is seeking interns to plug its artists online. The interns will promote artists in Web communities where many people go specifically to share music without the influence of corporate marketers. "Do you blog, have lots of friends at your MySpace page, and love music?" its ad at entertainmentcareers.net asks. Epic Records, a Sony BMG imprint, "is looking for skilled, motivated interns to promote artists on social networking sites like MySpace, Purevolume, Facebook and others." The ad doesn't say whether the interns will identify themselves to their online "friends" as agents of Sony BMG. But they'll get college credit (for this unpaid job, Sony BMG only wants applicants eligible for that) and a bullet point for their résumés, so what's the difference?

If Dogs Run Free The mundane, inhumane, toxic world of humans trapped in gray cubicles is artfully, and unfavorably, compared with the mindless, free, happy world of dogs romping in a park in a short film on a Web site that features several films by Mitchell Rose (mitchellrose.com). Another short, surprisingly poignant film depicts "a man and a 22-ton John Deere excavator" who "dance a dance of discovery, fulfillment and eventually, the loss that any diesel-based relationship must suffer."
http://www.nytimes.com/2006/02/18/te...ine.ready.html





Techies Converge To Talk Mashups
Daniel Terdiman

Hundreds of technologists, reporters and investors are expected Monday morning in Mountain View, Calif., for MashupCamp, the first conference devoted to discussions about the custom programs that come from merging multiple application program interfaces.

In the wake of last year's launch of Google Maps and the slew of applications like HousingMaps--a blending of the mapping service and Craigslist housing listings--that quickly followed, many people have been focusing on mashups.

Now that interest will coalesce as about 300 people arrive at Mountain View's Computer History Museum for two days of meetings, panel discussions and hard-core networking among those who seek to develop mashups and those providing the APIs behind them.

Among the companies that are supporting MashupCamp--a nonprofit event in which anyone who signed up had the opportunity to organize a talk--are Google, Yahoo, Microsoft, Sun Microsystems, Adobe Systems, Amazon.com and Salesforce.com.

MashupCamp co-organizer David Berlind is executive editor of business technology for ZDNet.com, which is owned by CNET News.com parent company CNET Networks.

In any case, the idea behind the event is that as an increasing number of companies make their APIs publicly available, more and more developers will come along to create mashups. Those in attendance--and dozens more who were unable to sign up in time to get in--will have the unique chance to network among each other and hopefully, Berlind said, figure out the next stage of the mashup ecosystem.

It's important to have an event like MashupCamp "because all the other events so far under the rubric of Web 2.0 have been executive-level events," Berlind said. "But we've never really before had an event where the actual developers of the mashups get together with the API architects to talk through what's going on."

At the end of the event, attendees will vote for the best mashup. The winner will receive a Sun Niagra server.

And while those in attendance will surely be working on creating all kinds of free and publicly available mashups, Berlind said the companies and developers alike will also be thinking beyond shareware, software that can be tried without cost.

"The real elephant in the room is what's the business model," he said.
http://news.com.com/Techies+converge...html?tag=st_lh
JackSpratts is offline   Reply With Quote