View Single Post
Old 26-09-07, 08:38 AM   #2
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,016
Default

Apple: Firmware Update Likely to Make Unlocked iPhones "Permanently Inoperable"
Jacqui Cheng

Apple said today that a firmware update to the iPhone due to be released later this week "will likely result" in SIM-unlocked iPhones turning into very expensive bricks. "Apple has discovered that many of the unauthorized iPhone unlocking programs available on the Internet cause irreparable damage to the iPhone's software, which will likely result in the modified iPhone becoming permanently inoperable when a future Apple-supplied iPhone software update is installed," said Apple in a statement issued this afternoon.

Apple CEO Steve Jobs last week reiterated the company's stance on unlocked iPhones: Apple will work against them. "It's a constant cat and mouse game," Jobs said. At that time, we also said that we had reason to believe that the next update to the iPhone would brick iPhones that had been unlocked to use SIM cards from other GSM carriers, which Apple's press release has confirmed. Sources familiar with the matter have told Ars that the company did not decide to cause such irreparable damage to the iPhone intentionally, however, and Apple's statement appears to confirm this as well.

Apple says that it "strongly discourages" users from installing these unlocking programs, and that doing so violates users' iPhone software license agreements as well as voids their warranties. This is corroborated by individual user accounts of being turned away at Apple Stores after having various hacks installed on their iPhones. "The permanent inability to use an iPhone due to installing unlocking software is not covered under the iPhone's warranty," warns Apple.

So what are users of SIM-unlocked iPhones to do? Not run the latest software update, that's for sure. Users can instead pray to the hacking deities—the famed iPhone Dev Team that released the free software unlock, and iPhoneSIMfree, which released a commercial software unlock—to write applications that will undo the unlocks, as it were, if those users want to run the latest iPhone software. And then the teams get to start anew with their hacking efforts on the new firmware. What was that about a cat-and-mouse game again?
http://arstechnica.com/news.ars/post...noperable.html





Did Apple Violate Magnuson-Moss over iPhone Unlocks?
Christopher Price

Apple has today stated that unlocking the iPhone is an official warranty violation. Further, they have stated that future iPhone firmware updates may damage unlocked iPhones. However, Apple may have violated an important federal warranty law in doing so. Click read more for full analysis.

The newcomer to the wireless industry has consistently taken a closed policy to iPhone. AT&T, which generally provides SIM unlock codes to customers that have completed a certain portion of the contract, is saying that they are unable to with iPhone. They cite Apple as being unwilling to provide them with such codes. Apple also refuses to release a Software Development Kit (SDK) to enable developers to write software for the embedded version of Mac OS X inside of iPhone.

However, today's decision may put Apple in legal trouble. The Magnuson-Moss Warranty Act states that Apple cannot void a warranty for a product with third-party enhancements or modifications to their product. The only exception to this rule is if Apple can determine that the modification or enhancement is responsible damaging the product in question. While Apple has the opportunity to make further exemptions, we will explain how the exemptions Apple has made do not fully apply to this case.

The legal question is three-fold here: Is the SIM Unlock process that has become mainstream (anySIM/iUnlock, available from our iPhone encyclopedia entry) doing damage to iPhone? And, also, is Apple designing future software updates to do damage to iPhone when said SIM Unlock code is present? Finally, is Apple's limited warranty setup to prohibit such unlocks, as defined by federal law and the specific terms of the limited warranty itself? Unfortunately, the answers lie in complex legal and technical terms.

First, the status of SIM unlocks in and of themselves. Generally, phone manufacturers consider a phone successfully unlocked to maintain its warranty. A phone that has been unsuccessfully unlocked may lose its warranty if the phone cannot be repaired by re-flashing its firmware.

The SIM unlock process for iPhone relies on making a modification to Apple's baseband firmware. The baseband firmware is essentially the software that exists on the radio itself. It is independent of the embedded Mac OS X installation. While this is an unorthodox way of unlocking a phone, it appears to be the only viable software unlock solution; there is no evidence that Apple has implemented a way of entering a SIM Unlock code, similar to entering a PUK code. Apple left implementers with the only option of patching the firmware.

Does this do damage to iPhone? There is no evidence that it does. The part of the baseband that is modified only controls SIM unlocks. For Apple to void the warranty, they would have to provide clear technical evidence and documentation... something Apple has not yet provided. Until they do, this appears to be an initial violation of Magnuson-Moss. It's no different from putting a third-party part in a car that does not damage or inhibit any other part of the car. Furthermore, it is valid and has been ruled as not a DMCA violation by the U.S. Copyright Office, so there is no tainted hand argument either.

Apple does, however, have one card in their hand... they can require users that have SIM unlocked their iPhone, to re-lock them. The baseband firmware can be re-flashed and re-locked to AT&T's network. However, Apple is currently holding that any iPhone that has ever been attempted to unlocked has a voided warranty. In short, if Apple changes that position to simply requiring that the iPhone be re-locked to AT&T, they are back in compliance with the law.

The second question of updates from Apple damaging unlocked iPhones, is much more complicated. If an update can, unintentionally, do damage, is again a question Apple must answer before rendering iPhone's warranty void. And, Apple is legally required to prove it... at least on the civil grounds of more-likely-than-not. If Apple will release an update that intentionally detects the baseband modification, and then does damage iPhones that have it is more simple to answer; they could, but it's illegal for them to do so. Magnuson-Moss prevents Apple from intentionally voiding the warranty based on the presence of a modification. Extrapolating from that, it also prevents them from damaging other components of iPhone (such as Boot ROM or baseband components) simply because the modification has been detected (which an updater can detect by checksumming the baseband).

It is questionable if Apple can simply word in their warranty agreement that SIM unlocks are a voiding condition. This would be necessary for Apple to legally void warranties based on a SIM unlock, and under Magnuson-Moss, any term of iPhone's warranty that does so must be explicit and easy for the consumer to understand. Magnuson-Moss is vague on the implications of such a situation. It would be similar to stating that using a third-party ink jet cartridge voids the warranty of a printer. While Apple makes the statement of "a product or part that has been modified to alter functionality or capability without the written permission of Apple" voids the warranty, SIM unlock processes that are free and openly sourced, are not salient products, nor are they traditionally defined as a part. Furthermore, the SIM unlock can be reversed, and thus is not a permanent modification... in other words, Apple can remove it easily. Furthermore, any iPhones unlocked before said wording would still be entitled to warranty care... and Apple has no way of detecting exactly when an iPhone was unlocked.

The conclusion here is simple: Apple has, at least in a minor and reversible way, violated the Magnuson-Moss Warranty Act. Apple should take action to correct their policy, and require that iPhone customers seeking warranty service, return their iPhone's to locked condition. Apple could also release a software tool that aides in this process, though legally they are not required to... it would make the job of the Genius Bar easier to have such a tool in-house.
http://www.phonenews.com/content/view/2386/9/





Steve Jobs Girds for the Long iPhone War
Saul Hansell

There is something futile about the way Apple appears to be fighting some of its most ardent fans, those who want to use the full capabilities of the iPhone.

Thursday afternoon, Apple released the scheduled update to the iPhone software. And the gadget blogs confirm that it does, as Apple threatened, wreak havoc on modified iPhones. Some phones have indeed been “bricked.” In others, unofficial applications have been disabled. And there are worries that hacking the updated phone will be harder.

The result: Serious hackers will keep finding new ways to break in. Less technically inclined may well find themselves chastened into technological submission, assuming they can get their pricey toys to work at all. Will Apple really refuse to help people with iBricks?

Speaking in London last week, Steve Jobs, Apple’s chief executive, said the company is in a “cat and mouse” game with hackers.

“People will try to break in, and it’s our job to stop them breaking in,” he said.

David Pogue, our technology reviewer, received a cautionary message Wednesday night from a person familiar with Apple’s plans after he posted a video showing some unofficial, but entertaining, applications that can be installed on the iPhone. Take those applications off your phones now, David was warned, or a software update scheduled for Thursday afternoon could turn your phone into a brick. [David takes a closer look at the iPhone update here.]

On Monday, Apple had issued a press release warning of “irreparable damage” to iPhones that have been modified or unlocked from the AT&T network. It also threatened users that “the permanent inability to use an iPhone due to installing unlocking software is not covered under the iPhone’s warranty.”

This caused a scurry by hackers to develop software that will relock iPhones before software updates. It’s like kids at the slumber party turning out the lights and jumping under the covers each time mom thumps up the stairs.

Apple may well be justified using tough tactics against people who modify their phones so they no longer use the AT&T network. Apple stands to receive several hundred dollars for each phone over the course of two years from AT&T’s service fees.

Some people—actually a lot of people—don’t much like AT&T. Or they don’t want to pay AT&T’s roaming fees overseas and would rather use a local cellular company. And these people will always be looking for ways to defeat Apple’s locking system. The simple way to defuse this fight, of course, would simply be for Apple to sell an unlocked iPhone for, say, $300 more than the locked version.

But this gets at Apple’s propensity for control. The phone is, in some ways, a better experience on AT&T because of its links to voice mail and so on. But does that mean if Apple’s way is better it should always prevent people from using its products in some less optimal way?

Since the iPhone is a very sleek, capable handheld computer, people are going to want to run programs on it. They are going to want to hack and see what they can build. It’s a law of nature. And Apple might as well be fighting gravity.

Many other cell phones are locked down, of course. But few other phones capture the imagination of programmers the way the iPhone does.

Apple did allow for some application development inside its Safari browser. But it is not supporting Java or Flash, the two environments that allow the most flexible applications. And there is no official way to write applications that run on the phone’s operating system. Apple has said that it is worried that some applications could cause trouble for the AT&T network. But it’s hard to imagine that there isn’t a way to wall off and limit network usage without preventing people from developing well-mannered programs.

Apple essentially has two choices. Either it exposes most of the iPhone’s capabilities to developers. Or it will have to gird for an ever escalating war in which it will have to send ever more electronic brick-bombs to its best customers who don’t follow its strict rules.
http://bits.blogs.nytimes.com/2007/0.../index.html?hp





Interview With A Convicted Hacker: Robert Moore Tells How He Broke Into Routers And Stole VoIP Services
Sharon Gaudin

On his way to federal prison, the 23-year-old hacker says breaking into computers at telecom companies and major corporations was "so easy a caveman could do it."

Convicted hacker Robert Moore, who is set to go to federal prison this week, says breaking into 15 telecommunications companies and hundreds of businesses worldwide was incredibly easy because simple IT mistakes left gaping technical holes.

Moore, 23, of Spokane, Wash., pleaded guilty to conspiracy to commit computer fraud and is slated to begin his two-year sentence on Thursday for his part in a scheme to steal voice over IP services and sell them through a separate company. While prosecutors call co-conspirator Edwin Pena the mastermind of the operation, Moore acted as the hacker, admittedly scanning and breaking into telecom companies and other corporations around the world.

"It's so easy. It's so easy a caveman can do it," Moore told InformationWeek, laughing. "When you've got that many computers at your fingertips, you'd be surprised how many are insecure."

Pena, who is charged with acting as a legitimate wholesaler of Internet-based phone services as part of what the government called a "sophisticated fraud," fled the country a year ago and is wanted as a fugitive. Assistant U.S. Attorney Erez Liebermann said Pena allegedly stole and then sold more than 10 million minutes of service at deeply discounted rates, netting more than $1 million from the scheme.

Acting as the operation's technical muscle only netted Moore $20,000 of the haul, according to Moore.

The government identified more than 15 VoIP service providers that were hacked into, adding that Moore scanned more than 6 million computers just between June and October of 2005. AT&T reported to the court that Moore ran 6 million scans on its network alone.

However, the names of the companies Moore and Pena hacked into don't appear in the court documents--aliases are used instead--and Moore said he wasn't at liberty to identify them publicly.

Liebermann noted that one small telecom went out of business because of expenses the company incurred during the break-in. The company legitimately routed its own VoIP traffic through a larger telecom and was forced to pay the other company for the calls that Pena and Moore fraudulently sent through their network. "They had to eat the bill and were unable to remain in business," added Liebermann.

Default Passwords: A Hacker's Dream

Moore said what made the hacking job so easy was that 70% of all the companies he scanned were insecure, and 45% to 50% of VoIP providers were insecure. The biggest insecurity? Default passwords.

"I'd say 85% of them were misconfigured routers. They had the default passwords on them," said Moore. "You would not believe the number of routers that had 'admin' or 'Cisco0' as passwords on them. We could get full access to a Cisco box with enabled access so you can do whatever you want to the box. ... We also targeted Mera, a Web-based switch. It turns any computer basically into a switch so you could do the calls through it. We found the default password for it. We would take that and I'd write a scanner for Mera boxes and we'd run the password against it to try to log in, and basically we could get in almost every time. Then we'd have all sorts of information, basically the whole database, right at our fingertips." Keith Rhodes, chief technologist at the U.S. Government Accountability Office, said he's not surprised at all by what Moore says he found.

"Default passwords are a silly problem," said Rhodes, who is widely considered to be the federal government's top hacker. "But they were able to take a silly flaw and turn it into a business. ... It disappoints me, but I'm not surprised."

Kenneth van Wyk, principal consultant with KRvW Associates, said leaving default passwords up is a widespread and dangerous problem.

"It's a huge problem, but it's a problem the IT industry has known about for at least two decades and we haven't made much progress in fixing it," said van Wyk. "People focus on functionality when they're setting up a system. Does the thing work? Yes. Fine, move on. They don't spend the time doing the housework and cleaning things up."

It's also a problem for which the companies themselves are liable, Moore said.

"I think it's all their fault," he added. "They're using default passwords and their administrators don't even care. ... Anybody who has bad security, it's their fault. There are so many people out there who are malicious hackers who look for these vulnerable boxes. All this information is right on the Web and it's easy to find. They need to get more education and security in the VoIP industry. There were thousands of routers that were compromised in this, just from my scans alone."

Alan Paller, director of research at the SANS Institute, says it's not the companies' fault. He even says it's not IT's fault. The problem, he says, lies with the vendors.

"Products should be sold so the default password has to be changed first time they use it," said Paller. "It's all on the vendors. It's not about the user being careless. It's a silly thing for them to have to know to do."

Rhodes, however, says until vendors make it necessary to change the default password before a system or product will work, IT departments need to be given the time and resources to get it done.

"I have nothing but empathy for all the security personnel I've ever worked with," he said. "I've never met one yet who had enough people, enough time, enough support. ... It would take nothing to change a default password, but you need to actually have people who have the job to do that."

The Break In

Moore, who describes himself as a "mega geek" more upset about being banned from using a computer than actually going to prison, said his job in the operation largely was to write software that ran scans and brute-force attacks against Cisco XM routers and Quintum Tenor VoIP gateways. To do it, he said he used 2 gigs of information on corporate IP ranges that they bought for $800. He explained that he would first scan the network looking mainly for the Cisco and Quintum boxes. If he found them, he would then scan to see what models they were and then he would scan again, this time for vulnerabilities, like default passwords or unpatched bugs in old Cisco IOS boxes. If he didn't find default passwords or easily exploitable bugs, he'd run brute-force or dictionary attacks to try to break the passwords.

"We would go to telecom forums and other telecom sites that list company names and where they're from," he explained. "We'd look at foreign countries first. We'd take the name and IP range and then dump it into the scanner. ... Some of the Cisco versions, like IOS, were old and easier to get into."

Liebermann, the prosecutor, also noted that while Moore broke into telecoms so they could steal the VoIP service, he also hacked into countless other businesses so they could use the hijacked company connections to disguise the calls they were sending to the telecoms. With the VoIP connections in place, they simply needed corporate connections to mask their trail.

"He wanted me to look for [a network] with lots of traffic," said Moore. "Even if it was not a telecom, they might be connected to a telecom and then you could move through that connection to the telecom. ... [Pena] was taking legit calls that he had customers for and then rerouting the calls through rogue boxes."

And Moore didn't just focus on telecoms. He said he scanned "anybody" -- businesses, agencies and individual users. "I know I scanned a lot of people," he said. "Schools. People. Companies. Anybody. I probably hit millions of normal [users], too."

Tips From The Hacker

Moore said it would have been easy for IT and security managers to detect him in their companies' systems ... if they'd been looking. The problem was that, generally, no one was paying attention.

"If they were just monitoring their boxes and keeping logs, they could easily have seen us logged in there," he said, adding that IT could have run its own scans, checking to see logged-in users. "If they had an intrusion detection system set up, they could have easily seen that these weren't their calls."

The hacker said IT technicians also could have set up access lists, telling the network to only allow their own IP addresses to get in. "We came across only two or three boxes that actually had access lists in place," he added. "The telecoms we couldn't get into had access lists or boxes we couldn't get into because of strong passwords."

The GAO's Rhodes said if companies don't fix the small problems, they can open up gaping holes that hackers are ready to jump through.

"All it takes is one bad access point and they're in," he noted. "The weak link -- you find that one point and all the security unravels. ... I'm not surprised that someone going to prison said 70% are at risk. You only have to have one default password and all your security is at risk."
http://www.informationweek.com/news/...leID=202101781





Sources: Staged Cyber Attack Reveals Vulnerability in Power Grid
Jeanne Meserve

Researchers who launched an experimental cyber attack caused a generator to self-destruct, alarming the federal government and electrical industry about what might happen if such an attack were carried out on a larger scale, CNN has learned.

Sources familiar with the experiment said the same attack scenario could be used against huge generators that produce the country's electric power.

Some experts fear bigger, coordinated attacks could cause widespread damage to electric infrastructure that could take months to fix.

CNN has honored a request from the Department of Homeland Security not to divulge certain details about the experiment, dubbed "Aurora," and conducted in March at the Department of Energy's Idaho lab

In a previously classified video of the test CNN obtained, the generator shakes and smokes, and then stops.

DHS acknowledged the experiment involved controlled hacking into a replica of a power plant's control system. Sources familiar with the test said researchers changed the operating cycle of the generator, sending it out of control. Watch the generator shake and start to smoke »

The White House was briefed on the experiment, and DHS officials said they have since been working with the electric industry to devise a way to thwart such an attack.

"I can't say it [the vulnerability] has been eliminated. But I can say a lot of risk has been taken off the table," said Robert Jamison, acting undersecretary of DHS's National Protection and Programs Directorate.

Government sources said changes are being made to both computer software and physical hardware to protect power generating equipment. And the Nuclear Regulatory Commission said it is conducting inspections to ensure all nuclear plants have made the fix.

Industry experts also said the experiment shows large electric systems are vulnerable in ways not previously demonstrated.

"What people had assumed in the past is the worst thing you can do is shut things down. And that's not necessarily the case. A lot of times the worst thing you can do, for example, is open a valve -- have bad things spew out of a valve," said Joe Weiss of Applied Control Solutions.

"The point is, it allows you to take control of these very large, very critical pieces of equipment and you can have them do what you want them to do," he said.

Adding to the vulnerability of control systems, many of them are manufactured and used overseas. Persons at manufacturing plants overseas have access to control system schematics and even software program passwords, industry experts say.

Weiss and others hypothesize that multiple, simultaneous cyber-attacks on key electric facilities could knock out power to a large geographic area for months, harming the nation's economy.

"For about $5 million and between three to five years of preparation, an organization, whether it be transnational terrorist groups or nation states, could mount a strategic attack against the United States," said O. Sami Saydjari of the nonprofit Professionals for Cyber Defense.

Economist Scott Borg, who produces security-related data for the federal government, projects that if a third of the country lost power for three months, the economic price tag would be $700 billion.

"It's equivalent to 40 to 50 large hurricanes striking all at once," Borg said. "It's greater economic damage than any modern economy ever suffered. ... It's greater then the Great Depression. It's greater than the damage we did with strategic bombing on Germany in World War II."

Computer experts have long warned of the vulnerability of cyber attacks, and many say the government is not devoting enough money or attention to the matter.

"We need to get on it, and get on it quickly," said former CIA Director James Woolsey on Tuesday.

Woolsey, along with other prominent computer and security experts, signed a 2002 letter to President Bush urging a massive cyber-defense program.

"Fast and resolute mitigating action is needed to avoid a national disaster," the letter said.

But five years later, there is no such program. Federal spending on electronic security is projected to increase slightly in the coming fiscal year, but spending in the Department of Homeland Security is projected to decrease to less than $100 million, with only $12 million spent to secure power control systems.

Despite all the warnings and worry, there has not been any publicly known successful cyber-attack against a power plant's control system. And electric utilities have paid more attention to electronic risks than many other industries, adopting voluntary cyber-standards.

"Of all our industries, there are only a couple -- perhaps banking and finance and telecommunications -- that have better cyber-security or better security in general then electric power," Borg said.

And DHS notes that it uncovered the vulnerability discovered in March, and is taking steps with industry to address it.

While acknowledging some vulnerability, DHS's Jamison said "several conditions have to be in place. ... You first have to gain access to that individual control system. [It] has to be a control system that is vulnerable to this type of attack."

"You have to have overcome or have not enacted basic security protocols that are inherent on many of those systems. And you have to have some basic understanding of what you're doing. How the control system works and what, how the equipment works in order to do damage. But it is, it is a concern we take seriously."

"It is a serious concern. But I want to point out that there is no threat, there is no indication that anybody is trying to take advantage of this individual vulnerability," Jamison said.

Borg notes that industry will have to remain forever vigilant at protecting control systems.

"It will always be an ongoing problem. It's something we will have to be dealing with [for] lots of years to come," he said.
http://www.cnn.com/2007/US/09/26/pow...isk/index.html





ABN Amro Suffers P2P Data Breach
Frank Washkuch Jr.

A former employee of Citi's ABN Amro Mortgage group leaked the personal information, including Social Security numbers, of more than 5,000 customers via a peer-to-peer (p2p) file-sharing network.

The former employee reportedly compromised three spreadsheets containing more than 5,000 Social Security numbers.

Data-leak prevention vendor Tiversa traced the breach back to a Florida computer with BearShare software installed, according to an Associated Press report. The data was leaked from the former employee's home computer.

Tiversa Chief Operating Officer Christopher Gormley told SCMagazineUS.com today that his company investigated the incident after being called by a Wall Street Journal reporter, and found data — including names, Social Security numbers, amounts of loans and types of banks where loans had originated — had been leaked.

Citi spokesman Mark Rodgers referred questions today to a company statement saying that the financial services giant has taken actions to rectify the breach.

“Protecting customer information remains a priority at Citi, and we remain fully committed to physical, electronic and procedural safeguards to protect personal information,” the company said in a statement. “The customer information involved has been retrieved from the source computer. We are taking appropriate steps to identify, notify and protect the customers involved, including offering complimentary credit monitoring services.”

A Seattle man was arrested earlier this month in what is believed to be the first case against someone using p2p programs for identity theft.

Gregory Thomas Kopiloff, 35, stands accused of using Lime Wire, Soulseek and other file-sharing applications to steal personal and financial information from victims' PCs. He allegedly used stolen credit card information to go on an online shopping spree, according to a federal indictment filed in U.S. District Court in Seattle.

TD Ameritrade revealed this month that the names and contact information of 6.3 million customers were exposed after a company database was infiltrated. The Omaha, Neb.-based brokerage said it discovered the breach after customers told the company they received spam offering unsolicited investment advice.

Saying that p2p networks can enable access to “basically a treasure chest of personal information,” Avivah Litan, Gartner vice president and distinguished analyst, told SCMagazineUS.com today that financial institutions should use data-monitoring solutions to prevent breaches.

“There are definitely some technology solutions out there that enable banks to monitor all of the data that moves through the network. So Citi just didn't have the sense of urgency that they should have had in putting those systems in,” she said. “In this day and age, there aren't a lot of excuses for this sort of breach.”

Gordon Rapkin, president and CEO of Protegrity, told SCMagazineUS.com today that he is surprised the data wasn't encrypted.

“For one, what was the data doing on a computer and why wasn't it protected? And once you get past all those types of questions, the process question here is, what did Citi do to educate their users to the dangers?” he said. “This looks like [a case of] an uneducated employee who didn't realize the risks of associating a peer-to-peer network with sensitive corporate data.”

Steve Fossen, manager of threat research at Fortinet, told SCMagazineUS.com today that unmonitored use of file-sharing applications can open up networks to similar threats.

“Installing any sharing application opens up a large hole in your network, even stuff like messaging clients,” he said. “It's a policy issue. In many cases, [administrators] can install firewalls and stop networks traffic when it's about to go out.”
http://www.scmagazineus.com/ABN-Amro...article/35828/





Unisys Under Investigation for Cyber Attacks on Homeland Security Computers
AP

A top homeland security lawmaker has called for an investigation into possible cyber attacks on computer systems at the Homeland Security Department.

Rep. Bennie Thompson, D-Miss., said he believes Unisys Corp - the company that holds the $1.7 billion contract to build parts of the Homeland Security Department's computer network - is at fault for these network break-ins. Thompson chairs the House Homeland Security committee and asked the department's inspector general to investigate.

Thompson's investigation found that dozens of computers may have been compromised by hackers, but the incidents were not noticed until months after the attacks. Information taken from the department's systems was sent to a Web service that connects to Chinese Internet sites, and contractors gave misleading information to the department about the attacks, according to Thompson's findings.

"The department is the victim not only of cyber attacks initiated by foreign entities, but of incompetent and possibly illegal activity by the contractor charged with maintaining security on its networks," Thompson wrote in a Sept. 21 letter to the department's inspector general.

Homeland Security spokesman Russ Knocke would not comment on Thompson's allegations. But he said the Unisys contract is being subjected to a new round of competition that includes other contractors. While Unisys is not prohibited from competing, past performance will be considered in the contract award, he said. Unisys was awarded a one-year contract in 2006 with two one-year options.

"We are aware of, and have responded to, malicious cyber activity directed at the U.S. government over the past few years," Knocke said. "We take cyber security very seriously."

The FBI would not say whether it is investigating Unisys.

Unisys disputed the committee's findings, but company spokeswoman Lisa Meyer would not go into detail because of security concerns. The department's inspector general will decide in the next few days whether to pursue the investigation, a spokeswoman said Monday.
http://www.siliconvalley.com/news/ci_6984962





Terrorist Threat Risk Leaked on P2P Net

How did a confidential terrorist threat assessment of Chicago end up on Limewire?
Jaikumar Vijayan

Officials at consulting firm Booz Allen Hamilton Inc. are looking into how a Fox News reporter acquired a confidential terrorist threat assessment on Chicago over a public file-sharing network.

Larry Yellen, an investigative reporter with WFLD Fox News in Chicago, on Tuesday reported that he recently used a peer-to-peer (P2P) program called LimeWire to obtain the Booz Allen document. The firm authored the document in 2002.

George Farrar, a spokesman for Booz Allen, Thursday confirmed the incident and said the document was commissioned by the Federal Transit Administration (FTA) five years ago. It was one of 35 threat assessments of the nation's bus and rail systems that Booz Allen was commissioned to do by the agency.

"Essentially, yes, those were Booz Allen documents that were available on the Internet via a peer-to-peer file-sharing system," Farrar said. "What we don't know is from what system those documents made their way to the Internet."

Farrar said that after Booz Allen completed the threat assessment, it made the document available to numerous federal, state and private-sector entities and first responders as required under its contract with the FTA. It was then the responsibility of those entities to protect the documents, Farrar said.

"We investigated internally and didn't find the document on our computers," Farrar said. He also noted that employees at Booz Allen cannot connect to file-sharing networks at work. "We are continuing to investigate. We can't say definitely one way or the other," who the source of the leaked document was. But he said it is possible that the document was leaked from a computer belonging to one of the entities that got the report.

"We don't know what controls were put in place after the document left our hands. So far, we haven't been able to find evidence that it was from our computers," he said.

The Booz Allen incident again highlights what some analysts say is a growing problem: the easy availability of all sorts of government, personal and confidential information on P2P networks.

The situation is the result of information being leaked onto these networks by individuals who fail to take precautions for securing their computers during P2P sessions. Popular P2P clients such as Kazaa, LimeWire, BearShare, Morpheus and FastTrack are designed to let users quickly download and share music and video files. Normally, such clients allow users to download files to -- and share items from -- a particular folder on their system with other users on the network. But if the access these P2P clients have on a system is not controlled, it is easy to expose and share personal data with all other users on a file-sharing network.

U.S. authorities recently arrested a Seattle man on charges that he deliberately mined and harvested P2P networks for such data which he then used to commit ID theft -- the first time that anyone in the U.S. has been arrested on charges of committing ID theft over P2P networks.

In July, the House Committee on Oversight and Government Reform heard testimony from several witnesses about how everything from classified military documents to corporate data can be found on P2P networks. The leaked documents on P2P networks cited as examples at the hearing included the Pentagon's entire secret backbone network infrastructure diagram; contractor data on radio frequency manipulation to defeat improvised explosive devices in Iraq; and physical terrorism threat assessments for three major U.S cities.
http://www.pcworld.com/article/id,13...s/article.html





Anti-Piracy Technology For Sale On eBay For $1m
enigmax

In 2005, anti-piracy company Viralg burst onto the file-sharing scene promising to end 99% of all online piracy. Today, if you need a top secret piracy solution, have an eBay account, can collect in person and have $1,000,000 burning a hole in your pocket, you’re in luck.

Imagine the scenario - you’re the head of a multi-million dollar label, someone has convinced you that your business is losing money due to file-sharing. What do you do? Call in the Ghostbusters? Or do what lots of companies do and call in the likes of MediaDefender to help them. As no anti-piracy system can do anything other than make a very small impact on file-sharing, it’s a far from satisfactory solution.

Early in 2005, established anti-piracy company Viralg of Finland burst onto the P2P scene with a staggering claim: With their technology it was possible to end 99% of all file-sharing.

In 2004, Viralg listed Electronic Arts, Vivendi, Microsoft Game Studios, Sony Computer Entertainment, Atari, Nintendo, Codemasters and THQ as just some of their customers. They were among the nominees for the ICT Prize 2005 and the winner of the Venture Cup business plan competition.

The portfolio certainly made them appear impressive at the time, so when an eBay auction caught the eye today offering to sell Viralg’s technology for a cool $1,000,000, TorrentFreak became a little curious.

So what’s on offer? Looks like Viralg’s ‘intellectual property’ in the form of some patent applications:

Viralg supplies technology aimed at preventing sharing of illegal content such as music, movies, GPS maps, games and software from being shared over P2P networks such as Gnutella. Viralg technology is in widespread use by record companies in Finland (90% of customers) and in the other Scandinavian countries. Technology has generated turnover of over 500.000 US dollars. The patent applications for sale cover the necessary key technology for the only possible effective protection against illegal P2P sharing. Depending on the source illegal P2P causes damages of 4 to 12 billion US dollars to media companies per year.

So should likely buyers (unhappy MediaDefender customers perhaps?) invest in this technology?

Viralg claimed to be able to create a corrupted file but with a working hash, giving it the appearance of a genuine file. As people downloaded they got a selection of genuine and corrupt parts sent to them rendering the final file useless. Although partially effective on the FastTrack network (KaZaA [R.I.P] )years ago, Viralg’s offer of 40 hours of training to use the system still doesn’t cut it in today’s BitTorrent dominated file-sharing world.

Before Prince gets any fancy ideas about buying this for the Web Sheriff to use against The Pirate Bay, this outdated system is pretty useless against BitTorrent, which renders its ‘Patented Virtual Algorithm’, well - useless.

TorrentFreak spoke to Dr. Ir. Johan Pouwelse, researcher on P2P technology at Delft University of Technology, who explained why: “Bittorrent uses a separate hash for every 1-4 MByte. This means you can still exploit the weakness in the protocol by sending bad data. However, clients are now generally so smart that they only accept maximum 1 fake 1-4MB block from an IP address.”

Of course to corrupt lots of files, you need lots of presence on file-sharing networks (servers, accounts, the whole MediaDefender-style setup) so the $1m tag is just the tip of an enormous iceberg.

Maybe some of the sales statistics will tempt prospective buyers? The system has been running since 2003, and in that time it generated a turnover of $500,000. Potential buyers are likely to be more interested in the bottom line, especially now that the bottom has fallen out of the FastTrack network.

Anyone with a bulging bank balance needing a guarantee of being able to corrupt files on the FastTrack network (and is unaware that MediaDefender’s tools are available for free) should hurry over to the eBay auction right now, there’s not long left to go - for the auction or Viralg
http://torrentfreak.com/anti-piracy-...for-1m-070925/





Gmail Cookie Vulnerability Exposes User's Privacy
Liam Tung

Petko Petkov of "ethical hacking" group GNUCitizen has developed a proof-of-concept program to steal contacts and incoming e-mails from Google Gmail users.

"This can be used to forward all your incoming e-mail," Pure Hacking security researcher Chris Gatford said. "It's just a proof of concept at the moment, but what they're demonstrating is the potential to use this vulnerability for malicious purposes."

According to Gatford, attackers could compromise a Gmail account--using a cross-site scripting vulnerability--if the victim is logged in and clicks on a malicious link. From that moment, the attacker can take over the session cookies for Gmail and subsequently forward all the account's messages to a POP account.

"If someone picks up on this before Google fixes it--or if someone knew of the vulnerability before this guy published it--this could be very damaging to Gmail users," he added.

The problem is potentially compounded by Google's policy of retaining cookies for two years.

"Once you've managed to snarf a cookie, you can access (a user's) Gmail account without the password for the next two years," he said.

While the obvious risk is to the home user, many organizations could be exposed, since they do not filter employee e-mails sent from work to personal accounts, he added.

"People do use private accounts to store work information," IBRS security analyst James Turner said. "I've worked at one organization where this was implicitly expected, because the mail server at the time was so unreliable. But that scenario is certainly less than optimal.

"In an ideal world, an organization would be able to draw a line in the sand and say that corporate data does not pass this point. The current reality is that there are Gen-Y workers who are sharing information with each other on multiple alternative communication channels--Gmail and Facebook included."

One work-around is to use Gmail through Firefox and disable JavaScript. While this limits user access to many components of popular Web sites, it will protect against the potential threat.

Developers at many large enterprises are not aware of the power of cross-site scripting, said Pure Hacking's Gatford. "In the last year or so, (XSS vulnerabilities) have been used by attackers to grab cookie values and therefore gain access to normally password-protected sites."

"When you have organizations like Google spending countless man-hours reducing security vulnerabilities...you can imagine how bad the actual situation is for other organizations," Gatford said.

Gatford advised organizations to use resources such as the Open Web Application Security Project, or OWASP, which offers free tools to help write secure code and allow testing for XSS vulnerabilities.

Google was unavailable to comment.
http://www.news.com/Gmail-cookie-vul...3-6210353.html





Despite AOL’s Claim, AIM Worm Hole Still Wide Open
Ryan Naraine

There’s a nasty worm hole in America Online’s standalone AIM (instant messaging) software that won’t be patched until the middle of October.

AOL claims that the vulnerability, which allows a remote attacker to launch executable code without any user action, has been patched in the latest beta client but, as I’ve confirmed in a test with security researcher Aviv Raff (see screenshot below), fully patched versions of the beta is still wide open to a nasty worm attack.

Production copies of the software, which sits on tens of millions of desktops around the world, are also unpatched.

[SEE: Zero-day flaws surface in AOL, Yahoo IM products ]

In the demonstration, Raff simply sent me an IM to trigger the launch of the calculator application. The attack scenario works without the target clicking on a link and only requires that the AIM user is logged on and accepting incoming messages.

This vulnerability, first reported to AOL by researchers at Core Security more than a month ago, is caused by the way AIM supports the rendering of HTML content via an embedded Internet Explorer server control.

In an advisory issued after a lengthy back-and-forth with AOL security engineers, Core warned:

[AIM does] not properly sanitize the potentially malicious input content to be rendered and, as a result, an attacker might provide malicious HTML content as part of an IM message to directly exploit Internet Explorer bugs or to target IE’s security configuration weaknesses.

The attack scenarios outlined by Core includes:

 Direct remote execution of arbitrary commands without user interaction.
 Direct exploitation of IE bugs without user interaction. For example, exploitation bugs that normally require the user to click on a URL provided by the attacker can be exploited directly using this attack vector.
 Direct injection of scripting code in Internet Explorer. For example, remotely injecting JavaScript code into the embedded IE control of the AIM client.
 Remote instantiation of Active X controls in the corresponding security zone.
 Cross-site request forgery and token/cookie manipulation using embedded HTML.

AOL coordinated with Core on the release of the advisory on the understanding that the flaw was patched in the latest beta version but, as Raff discovered, the underlying vulnerability was never fixed.

“The problem with AOL’s patch is that they filter specific tags and attributes, instead of fixing the main cause of the vulnerability, which is locking down the local zone of their client’s web-browser control,” Raff said.

The scary thing in all this is that Core Security and Raff are not the only researchers finding trivial variations of this flaw. Earlier this month, a security researchers “Shell” and “Lone” issued a public warning for what appears to be a similar input sanitization bug.

Even worst, AOL has not seen it fit to fix the issue for its millions of users. Outside of proof that the flaw has not been fixed in beta updates, there really is no excuse for AOL to opt only to fix beta versions — which are generally frowned upon in many businesses that rely on AIM for inter-office communication.

AOL is on record as saying a comprehensive patch won’t be available until the middle of October.

In the meantime, if you’re using standalone AIM on desktops with valuable data, my best advice is to log off immediately and uninstall the product. Cross-platform IM clients like Trillian (Windows) and Adium (Mac) can fill in as replacements.

[ UPDATE: September 27, 2007 @ 3:17 PM] A statement from AOL’s Erin Gifford:

I spotted your post and wanted to let you know that as of today no AIM users are at risk. We were able to implement server side fixes that fully address all of the client vulnerabilities cited by Aviv Raff in his blog. Regardless of the AIM client our users are currently on, they are completely protected.

Aviv Raff responds:

They’ve added my adjusted proof-of-concept to their filters, but it took me 5 seconds to bypass it. Took them over 3 hours to add one filter, which I bypassed in 5 seconds. This is an endless cat and mouse game. And the cat can never win.
http://blogs.zdnet.com/security/?p=542





Ebay Hacked, User Info Posted

This morning a hacker posted the personal contact information and credit card data of 1,200 ebay users on the eBay.com Trust & Saftey forums. eBay pulled the Trust & Saftey forums off line, but not before one user made a video of the hacked forums and posted it on youtube.com. eBay response is on the eBay chatter page, and seems to try and down play this 'fraudster's' activity.
http://it.slashdot.org/article.pl?sid=07/09/26/144210





Is Cyber Crime Really the FBI's No. 3 Priority?
Brian Krebs

The Federal Bureau of Investigation says that its No. 3 priority is protecting the United States "against cyber-based attacks and high-technology crimes." Given the increasing pervasiveness and costs associated with such crime, FBI Director Robert Mueller should be commended for giving anti-cyber crime investigations such high status, second only to terrorism and espionage/counter intelligence investigations.

But according to an analysis by Security Fix, cyber crime remains a distant third priority for the federal law enforcement agency, at least in terms of resources applied to the problem.

That assessment is based on information from the Justice Department itself, based on a reading of a 203-page document justifying its fiscal year 2008 budget request to Congress.

The cyber portion of the 2008 request includes a request for $258.5 million in funding for some 659 field agents, a 1.5 percent increase over 2007 levels. That's 659 out of a total of 11,868 FBI agents nationwide, which would mean the FBI is on track to dedicate roughly 5.5 percent of its agents to cyber crime investigations. But as we'll see later, the true number may actually be lower.

To be clear, the FBI's cyber program encompasses everything from battling traditional cyber crime -- the kind of illegal activity you might associate with someone hacking into your PC or stealing your identity -- to illicit online activities that could potentially support terrorist activity.

Here's how the Bureau describes its cyber efforts (the text is from the DOJ '08 budget justification): "The FBI's Cyber Program consolidates Headquarters and field resources dedicated to combating cyber-crime under a single entity. This allows the Cyber Program to coordinate, supervise, and facilitate the FBI's investigation of those federal violations in which the Internet, computer systems, or networks are exploited as the principal instruments or targets of terrorist organizations, foreign government-sponsored intelligence operations, or criminal activity. Included under the purview of the Cyber Program are counterterrorism, counterintelligence and criminal computer intrusion investigations; intellectual property rights-related investigations involving theft of trade secrets and signals; copyright infringement investigations involving computer software; credit/debit card fraud where there is substantial Internet and online involvement; online fraud and related identity theft Investigations; and the Innocent Images National Initiative."

While the "Innocent Images National Initiative" is listed last in the excerpt above, it's by no means least among the FBI's cyber priorities. The initiative -- designed to catch sickos who enjoy looking at and facilitating child pornography -- claims the attention of roughly a third of the agency's cyber agents, according to the document.

I'm certainly not trying to take anything away from that important program, or suggest that fewer agents be dedicated to it. The drive to lock up child predators is one of few law enforcement imperatives that transcends national boundaries or politics. Experts say it is rare to find a form of crime which elicits such visceral and rapid reaction and cooperation from law enforcement officials around the world.

The main reason I single it out is that it clouds the agency's record on addressing the kinds of crimes that most people probably think about when they hear the words "cyber crime." According to the FBI, the Innocent Images program accounted for a major share of the FBI cyber crime convictions and "pre-trial diversions" in fiscal year 2006. For example, Innocent Images netted 1,018 convictions and plea agreements in 2006, whereas the Justice Department won 118 convictions or pleas for computer intrusion cases last year.

If we look at the number of agents the FBI has tasked to investigating illegal online activities of the sort that involve computer intrusions or the trade and/or sale of stolen business and consumer data (crimes increasingly committed by organized crime syndicates based overseas), then it appears that the FBI has requested a total of 427 agents to fight the cyber crime problem next year. So, assuming Congress grants its budget request, the FBI is on track to have about 3.6 percent of all of its active agents dedicated to its stated No. 3 priority.

Of course, the FBI is not the only agency fighting cyber crime. The U.S. Secret Service and the U.S. Postal Inspection Service both play critical roles. Also, none of this analysis should take anything away from the work being done by several industry-government partnerships, such as the National Cyber-Forensics & Training Alliance (NCFTA) in Pittsburgh and the Internet Crime Complaint Center (IC3) in West Virginia. Nor should it diminish the work the FBI does in tandem with various task forces that rely heavily upon state and local law enforcement officers to investigate identity theft cases that often have roots in cyber crime.

But this data does seem to raise the following question: If the FBI's third most-important priority claims just over 3.5 percent of its active agents, how many agents and FBI resources are dedicated to the remaining Top Ten priorities? The FBI says those priorities are, in the following order:

4. Combat public corruption at all levels.
5. Protect civil rights.
6. Combat transnational and national criminal organizations and enterprises.
7. Combat major white-collar crime.
8. Combat significant violent crime.
9. Support federal, state, county, municipal, and international partners.
10. Upgrade technology to successfully perform the FBI's mission.

Again, a major reason I want to call attention to these figures it to spark a debate over whether the FBI is dedicating enough resources to fighting cyber crime.

For his part, Paul Kurtz, a former White House cyber security adviser for the Bush administration, said absolutely not.

"I think that we need to dramatically increase the number of agents and analysts supporting the government's overall cyber investigative efforts," Kurtz said. "The FBI -- for what resources it has -- is not doing a bad job. But when we have as many problems going on as we have today, with China and Russia and organized crime and white-collar criminals getting involved in computer crimes, we don't have nearly enough agent workforce to take on this problem. And until we see a major increase, we're going to remain behind on fighting this problem."

But Jim Lewis, a senior fellow at the Center for Strategic & International Studies and director of its Technology and Public Policy Program, said you can throw all the FBI agents in the world at the cyber program without much improvement in the current situation if the U.S. cannot build stronger ties with foreign law enforcement agencies.

"When there are political or legal situations in other countries that keep you from using your resources efficiently, then adding more resources doesn't help you very much," Lewis said. "The FBI shouldn't be trying to do everything, but should focus mainly on the largest cyber criminal operations. The problem is that the level of cooperation we get from many countries is kind of dubious, and criminals will gravitate to places where they have the best chance of not getting caught."
http://blog.washingtonpost.com/secur...rd_p.html#more





Stealth Windows Update Prevents XP Repair
Scott Dunn

A silent update that Microsoft deployed widely in July and August is preventing the "repair" feature of Windows XP from completing successfully.

Ever since the Redmond company's recent download of new support files for Windows Update, users of XP's repair function have been unable to install the latest 80 patches from Microsoft.

Repaired installations of XP can't be updated

Accounts of conflicts with XP's repair option came to our attention after Microsoft's "silent install" of Windows Update (WU) executable files, known as version 7.0.600.381, was reported in the Sept. 13 and 20 issues of the Windows Secrets Newsletter.

The trouble occurs when users reinstall XP's system files using the repair capability found on genuine XP CD-ROMs. (The feature is not present on "Restore CDs.") The repair option, which is typically employed when XP for some reason becomes unbootable, rolls many aspects of XP back to a pristine state. It wipes out many updates and patches and sets Internet Explorer back to the version that originally shipped with the operating system.

Normally, users who repair XP can easily download and install the latest patches, using the Automatic Updates control panel or navigating directly to Microsoft's Windows Update site.

However, after using the repair option from an XP CD-ROM, Windows Update now downloads and installs the new 7.0.600.381 executable files. Some WU executables aren't registered with the operating system, preventing Windows Update from working as intended. This, in turn, prevents Microsoft's 80 latest patches from installing — even if the patches successfully downloaded to the PC.

I was able to reproduce and confirm the problem on a test machine. When WU tries to download the most recent patches to a "repaired" XP machine, Microsoft's Web site simply states: "A problem on your computer is preventing the updates from being downloaded or installed."
__________

Most ordinary Windows users might never attempt a repair install, but the problem will affect many administrators who must repair Windows frequently. Anyone who runs XP's repair function will find that isolating the cause of the failed updates is not a simple matter.

Beginning in July, it is not possible for Windows users to install updates without first receiving the 7.0.6000.381 version of nine Windows Update support files. (See my Sept. 13 story for details.) If Automatic Updates is turned on, the .381 update will be installed automatically. If AU is not turned on, you'll be prompted to let Windows Update upgrade itself before you can installing any other updates. Consequently, users are forced to get the silent update before they can attempt to install Microsoft's latest security patches.

The problem apparently arises because seven of the DLLs (dynamic link library files) used by WU fail to be registered with Windows. If files of the same name had previously been registered — as happened when Windows Update upgraded itself in the past — the new DLL files are registered, too, and no problem occurs. On a "repaired" copy of XP, however, no such registration has occurred, and failing to register the new DLLs costs Windows Update the ability to install any patches.

Registering DLL files is normally the role of an installer program. Unlike previous upgrades to WU, however, Microsoft has published no link to an installer or a downloadable version of 7.0.6000.381. Strangely, there's no Knowledge Base article at all explaining the new version. The lack of a KB article (and the links that usually appear therein) makes it impossible for admins to run an installer to see if it would correct the registration problem.

One possible fix is to install an older version of the Windows Update files (downloadable from Step 2 of Microsoft Knowledge Base article 927891) over the newer version. This involves launching the installer from a command line using a switch known as /wuforce.

That corrects the registration problem, although even in this case you must still accept the .381 stealth update (again) before you can get any updates. The fact that the /wuforce procedure solves the problem suggests that the installer for .381 is the source of the bug.

Manually registering files solves the problem

If you find that Windows Update refuses to install most patches, you can register its missing DLLs yourself. This can be accomplished by manually entering seven commands (shown in Step 2, below) at a command prompt. If you need to run the fix on multiple machines, it's easiest to use a batch file, as Steps 1 through 5 explain:

Step 1. Open Notepad (or any text editor).

Step 2. Copy and paste the following command lines into the Notepad window (the /s switch runs the commands silently, freeing you from having to press Enter after each line):

regsvr32 /s wuapi.dll
regsvr32 /s wuaueng1.dll
regsvr32 /s wuaueng.dll
regsvr32 /s wucltui.dll
regsvr32 /s wups2.dll
regsvr32 /s wups.dll
regsvr32 /s wuweb.dll

Step 3. Save the file to your desktop, using a .bat or .cmd extension.

Step 4. Double-click the icon of the .bat or .cmd file.

Step 5. A command window will open, run the commands, and then close.

The next time you visit the Windows Update site, you should not have any problem installing the latest patches.

In my articles in the last two weeks on the silent installation of the Windows Update support files, I stated that the stealthy upgrade seemed harmless. Now that we know that version .381 prevents a repaired instance of XP from getting critical patches, "harmless" no longer describes the situation. The crippling of Windows Update illustrates why many computer professionals demand to review updates for software conflicts before widely installing upgrades.

"I understand the need to update the infrastructure for Windows Update," says Gordon Pegue, systems administrator for Chavez Grieves Engineers, a structural engineering firm in Albuquerque, N.M. "But I think Microsoft dropped the ball a little bit communicating how the system works. Administrators should know these sorts of things, in case problems arise."

A Microsoft spokeswoman offered to provide an official response about the situation, but I received no reply by press time.

If you ever need to run the repair option on XP, first see the detailed description provided by the Michael Stevens Tech Web site.

I'd like to thank Windows Secrets contributing editor Susan Bradley for her help in bringing reports of this problem to light.
http://www.windowssecrets.com/2007/0...ents-XP-repair





PC Users Still Prefer XP to Vista
Josephine Moulds

It took took five years and $6bn (£3bn) to develop, but Microsoft's Vista operating system, which was launched early this year, has been shunned by consumers – with computer manufacturers taking the bizarre step of offering downgrades to the old XP version of Windows.

A note on the electronics retailer website Dabs.com reads: "If you're not ready for Vista, you can downgrade to Windows XP without affecting your Sony VAIO warranty and switch back to Vista at any time."

Dell took a similar line earlier this year when it brought back XP on a range of computers for its US customers in response to a deluge of online complaints.

The software giant launched the Vista operating system to great fanfare in January, at least a year late.

Because of Windows' market dominance the system was to be pre-loaded on the majority of new PCs and it was hoped that the release would drive sales of new computers. Microsoft says it has sold more than 60m Vista licences to date, but hardware sales have disappointed.

DSG International, which owns PC World and Currys, said it was forced to discount laptops after a lacklustre response to Vista.

Users complain that computers running Vista crash frequently and many of their favourite programmes such as Windows Mobile do not work with the new operating system.

Microsoft said: "We understand that our [original equipment manufacturer] partners are responding appropriately to a small minority of customers that have this specific request. But, as they have said before, the vast majority of consumers want the latest and greatest technology and that includes Windows Vista."
http://www.telegraph.co.uk/money/mai...24/cnpc124.xml





Why Microsoft Must Abandon Vista to Save Itself
Don Reisinger

While Vista was originally touted by Microsoft as the operating system savior we've all been waiting for, it has turned out to be one of the biggest blunders in technology. With a host of issues that are inexcusable and features that are taken from the Mac OS X and Linux playbook, Microsoft has once again lost sight of what we really want.

As we're more than aware, Vista Ultimate comes at a premium. For an additional $160 over the Premium SKU price, Ultimate gives you a complete backup and restore option, BitLocker Drive encryption, the ever so popular Windows Fax & Scan, and the "Ultimate Extras." But what started with a promise of "Extras" by summer, quickly turned into an apology from Microsoft and the eventual release of DreamScene and Windows Hold 'Em (among others) today. And while each of the "Extras" runs just fine, Microsoft's "Extras" blunder is just another reason why the company must abandon Vista before it's too late.

The first indication that Microsoft should abandon Vista is its poor sales figures. According to a recent report titled "Windows Vista Still Underperforming in U.S. Retail" from NPD, Vista sales are significantly behind XP sales during its early days. Even worse for Redmond, some are reverting to XP, citing issues with compatibility and overall design. And if that wasn't enough, Macs continue to surge and with the impending release of Leopard, Microsoft may be in for a rough holiday season.

With each passing day, it's becoming blatantly clear that Microsoft released Vista too early and the company's continual mistakes and promises that can't be kept are further annoying the Windows faithful.

Much talk has been given to Service Pack 1 and how this update should address many of the issues users have with Vista, but I simply don't agree. Will SP1 eliminate the ridiculous Microsoft licensing schemes? Will SP1 drop the price on the higher-end versions? Will SP1 eliminate the need for users to buy a new computer just to use the faulty OS?

SP1 will do nothing but fix the holes and issues we currently know about and create even more. As we all know from the days of Windows ME and even XP, Microsoft is not the best company at finding and addressing security issues, and chances are, Vista will be no different.

One significant problem that I have with Vista is its inclusion of new DRM, specifically the company's decision to install Protected Video Path. To prevent a person from copying (or in most cases, backing up) a movie, the operating system provides process isolation and if an unverified component is in use, the operating system shuts down DRM content. For the first time on any operating system, we're not even allowed to backup our favorite movies? Come on.

I also find it interesting that Microsoft decided to take the user access control concept from Mac OS X and make it much worse. Can someone please explain to me why I need to be asked if I wanted to do something entirely innocuous like open a third-party app from a well-known software company?

Never before have I seen such an abysmal start to an operating system release. For almost a year, people have been adopting Vista and becoming incensed by how poorly it operates. Not only does it cost too much, it requires more to run than XP, there is still poor driver support, and that draconian licensing scheme is a by-product of Microsoft picking on the wrong people.

The road ahead looks dangerous for Vista and Microsoft must realize that. With Mac OS X hot on its tail, Vista is simply not capable of competing at an OS level with some of the best software around. If Microsoft continues down this path, it will be Vista that will bring the software giant to its knees--not Bill Gates' departure.

Of course, categorically dumping an operating system is quite difficult and with millions already using the OS, chances are Microsoft won't find a good enough reason to do it. And while I can understand that argument, there's no reason the company can't continue to support Vista and go back to the drawing board for its next OS. Even better, go back to XP--it's not nearly as bad as Vista.

As a daily user of Mac OS X, Ubuntu and Vista, I'm keenly aware of what works and what doesn't. Mac and Linux work.

The time is up. Microsoft must abandon Vista and move on. It's the company's only chance at redemption.
http://www.news.com/8301-10784_3-978...?tag=nefd.only





Defense Lawyers Cringe at MediaDefender's Child-Porn Patrol Plans
Kim Zetter

New York state Attorney General Andrew Cuomo is raising the eyebrows of defense attorneys over his recently exposed plans to pay the controversial anti-piracy firm MediaDefender to gather evidence for child-porn prosecutions.

A law enforcement partnership with the peer-to-peer policing company raises questions about possible conflicts of interest and the integrity and security of evidence collected for criminal prosecutions, say attorneys.

"Generally it is not looked upon favorably when a prosecutor engages a private company to collect evidence in a case or to ... partner with in a criminal case," says San Francisco public defender Jeff Adachi. "This raises grave ethical concerns regarding the propriety of that relationship between the prosecuting authority and the private company, and it also could potentially show favoritism toward that company in the future," if the company broke a different law in New York and faced prosecution by the attorney general's office.

MediaDefender, a peer-to-peer policing firm that works with the entertainment industry to thwart the illegal trading of copyright works, became the target of hackers who stole and recently posted more than 6,000 of the company's internal e-mails online, along with a database, source code for its file-sharing tools and a recorded phone call between a MediaDefender employee and investigators with the New York attorney general's office.

The e-mails and the recorded phone call revealed that the attorney general's office planned to outsource certain steps in its evidence-collection process against New York child-porn violators to MediaDefender, a company based in Santa Monica, California.
Few specifics are known about the project, and MediaDefender did not return several phone calls seeking comment. The New York attorney general's office will not speak on the record about it.

But according to the e-mails, MediaDefender planned to unleash a peer-to-peer crawler to search unspecified file-sharing networks for child-porn videos and images based on keywords -- such as "young," "kids" and "taboo" -- provided by the AG's office.

Once suspected image files were found, the software would collect the IP address of the machines trading those files and filter for any addresses based in New York. The data MediaDefender collected would then be sent automatically to the AG's office, where investigators would analyze and investigate it, using a MediaDefender application to visit the IP addresses and download the suspect files.

It's unclear whether MediaDefender planned to download the suspected-child porn itself, or leave that to the AG's investigators. Jeffrey Lerner, spokesman for the New York AG's office, refused to comment on the record about whether MediaDefender was downloading child porn, due to "an ongoing investigation."

If the company knowingly downloaded child porn, it could run afoul of federal law, notwithstanding any arrangement it made with state authorities, legal experts say. Either way, several defense attorneys expressed surprise that a law enforcement agency would outsource any evidence collection to a private company.

"It is bizarre," says Martin Pinales, former president of the National Association of Criminal Defense Lawyers. "What they're doing is saying, 'We're going to make you a bounty hunter. We're going to pay you to go collect evidence so that in the future we can prosecute somebody.' But (MediaDefender doesn't) have the training of law enforcement."

Jeffrey Douglas, a criminal defense attorney in Santa Monica, California, finds other aspects of the MediaDefender law enforcement partnership disturbing. A private company that's under contract to collect information for law enforcement investigators has a financial incentive to produce results, he says.

"At the end of the contract, if they haven't made 'x' number of cases, are they going to lose their contract?" he asks. "The company knows there are certain expectations that they're going to accomplish, or they're not going to get another contract."

He also expressed concern about what could be described as a fishing expedition to net as many suspects as possible using less-than-accurate tools.

The e-mails between MediaDefender and the AG's office, for example, discuss sending the AG 1 gigabyte of "media data" daily, along with "a couple thousand New York IPs that our geo IP database identified using our software." An initial test MediaDefender conducted for the AG's office produced "a lot of false positives," according to one of the exposed e-mails.

"No software can determine whether a person (in a picture) is 17 or 18," Douglas says, so there are bound to be a lot of innocent IP addresses collected by MediaDefender and sent to the AG, before further investigation weeds out innocent suspects from actual lawbreakers.

San Francisco public defender Adachi says the relationship also conceivably gives MediaDefender the power to decide whom to collect evidence against and whom to let go.

"Say I ... find a web site that's run by my sister-in-law and decide that, 'Geez, I'm not going to turn that over,'" Adachi says. "There's no sworn duty by the private company (collecting evidence for law enforcement) to prosecute people in a fair, evenhanded manner."

On top of all these concerns is the issue of data security and the integrity of evidence against manipulation by intruders -- either inside or outside the company -- particularly in light of the hack of MediaDefender's internal e-mail. Of course, evidence on a law enforcement computer is at the same risk of being accessed and altered, but the e-mail breach at MediaDefender makes the danger all the more glaring.

"It is extremely difficult to protect the material under the best of circumstances," Douglas says. "The more computers it passes through and separate control centers that it passes through, the less likely it is that the integrity of the material will be maintained."

In the phone call between MediaDefender and the AG's office, an AG investigator tells MediaDefender that the "intelligence information" MediaDefender is sending them needs to be able to stand up in court, and that the AG needs to know that there's no chance that the data coming from MediaDefender was compromised, edited or modified.

Then there's the question of MediaDefender's own trustworthiness. Legal experts says the biggest risk for prosecutors in using a private company like MediaDefender to aid in catching child pornographers is that the company's stock-in-trade is deception: It specializes in introducing decoy "pirated" content onto file-sharing networks.

A blogger even discovered in July that the company was secretly operating a video-download site called MiiVi -- apparently as another way of injecting decoy files and tracking downloaders. The hacked e-mails show the company tried unsuccessfully to hide its connection with the site, and even relaunched it under another name after it was exposed.

Mark Rasch, a former Justice Department cybercrime lawyer and current managing director of technology for FTI Consulting, says if he were defending a child-porn suspect against evidence produced by a law enforcement agency that worked with MediaDefender, he would raise an obvious question.

"How do we know that MediaDefender didn't put these files on the computer first?" he says.
http://www.wired.com/politics/online...efender_police





Leaked E-Mails of Anti-Piracy Firm Raise Ethical Questions All Around

It is a nightmare scenario for any company. Your firm's dirty tricks are aired for world to see when months of your company’s private e-mails are posted to the Internet.

That's exactly what happened to MediaDefender who suffered a very public humiliation earlier this month when a hacker(s) broke into a MediaDefender employee's GMail account and posted nine months of company e-mails outlining the firm's nasty and deceitful anti-piracy practices.

A group calling itself MediaDefender-Defenders claimed responsibility for swiping the e-mails and making them publicly available. "By releasing these e-mails we hope to secure the privacy and personal integrity of all peer-to-peer users," MediaDefender-Defenders said.

The group first made the e-mails available as a digital download on peer-to-peer networks. Now the e-mails are available on multiple Web sites in an easy-to-read HTML format.

Who's the Bad Guy?

I'm having a hard time choosing who to side with. Hacking someone's e-mail account is bad enough. But MediaDefender-Defenders took it one step further releasing 6000 messages of a private company's e-mail to the Internet.

However, the more I learn of MediaDefender and its business practices the less sympathy I have for it.

MediaDefender business is to protect unauthorized downloads of content owned by record companies and Hollywood film studios. It protects copyrighted content from being illegally swapped online by intentionally seeding peer-to-peer networks with bogus decoy files designed to frustrate illegal file swappers.

According to e-mails leaked to the Internet MediaDefender even went so far as to create the Web site WiiVii.com that would pose as a pirate site that offered downloads of copyrighted movies and music but would actually track users who accessed it, then report their IP addresses back to MediaDefender.

Either way you slice it, both MediaDefender and its nemesis MediaDefender-Defenders are up to no good.

What Comes Around Goes Around

Despite its righteous rhetoric, MediaDefender-Defenders aren't the most righteous guys around. Sure, it fought the good fight to "secure the privacy and personal integrity of all peer-to-peer users" as it states. But I'm hesitant to put MediaDefender-Defenders on a vigilante pedestal.

Right now MediaDefender-Defenders seems like a creepy version of Charles Bronson's thuggish vigilante character in Hollywood movie Death Wish. The difference is MediaDefender hadn't broken any laws that I'm aware of.

If MediaDefender-Defenders is supposed to be celebrated than what for? Is it really that it secured the “privacy and personal integrity” of people who use peer-to-peer networks to rip off Hollywood and the music industry?

I'm even more disappointed with MediaDefender.

MediaDefender's tactics are very shady. The company's Website has no qualms in referring to its "practical, proven methods to thwart Internet piracy." Practical and proven perhaps, but they are hardly ethical.

The MediaDefender e-mails even discussed the possibility of infecting the computers of P2P users with crap-ware that would turn unsuspecting users PCs into zombies to upload decoy files to file-sharing networks.

Cold War Gets Frigid

Does neither side have concern for online integrity?

So who wins in the end?

P2P users are elated with MediaDefender-Defenders' actions. I can only imagine MediaDefender is only committed now to dreaming up new more dastardly ways to hurt file swappers. Neither side has much concern for its means to an end.
http://blogs.pcworld.com/staffblog/archives/005486.html





Feist Commercial Airs, Sales Soar
NeutralMilk

If you've watched any show at any time during the past couple of weeks, then you've definitely seen Apple's iPod Nano commercial featuring Feist's "1 2 3 4." Talk about "ad" nauseum!

Anyhow, ever since every person I know has asked me, "Hey, who is that?" and "What is that song?," the song (and her album, The Reminder) have been firing up the iTunes charts.

Currently, "1 2 3 4" is #4 on the singles chart and The Reminder is #7 on the album ranks.

If you live in a hole, here's the spot.

Here's the entire video for the song.
http://www.shoutmouth.com/index.php/...%2C_Sales_Soar

Worked for me. I saw it and acquired it, too – Jack.





Shareholders Approve Clear Channel Buyout
AP

Clear Channel Communications Inc. shareholders approved on Tuesday a $19.5 billion buyout of the nation's biggest radio station operator, more than 10 months after the deal was proposed.

The offer from a private equity group led by Thomas H. Lee Partners LP and Bain Capital Partners LLC was first announced in November but was sweetened several times after some large shareholders signaled they would oppose earlier offers.

The latest offer was $39.20 per share in cash or stock. Current shareholders could end up with as much as 30% of the new, privately held company.

"We are pleased with the outcome of today's vote," CEO Mark Mays said in a statement. "We look forward to completing this transaction with T.H. Lee and Bain as quickly as possible."

Of the shares voted, about 98% were in favor of the buyout of the San Antonio-based company in a preliminary tabulation, Clear Channel said. The company said more than 73% of the total shares outstanding and entitled to vote at the meeting were in favor the deal.

Two-thirds of shareholders were needed to approve the buyout, and previous offers of $37.60 and $39 per share were deemed too low by some and weren't expected to pass.

"It appears that all the stars have aligned," Stanford Group analyst Frederick Moran said before the vote. "We also think that the credit crunch and the shaky stock market environment over the summer causes more comfort on behalf of shareholders to approve the deal."

Clear Channel, which also has an interest in the outdoor billboard business, has been divesting some of its broadcasting operation. Its 56 television stations were sold in April, and sales deals have been reached on 402 of its radio stations. It plans to keep about 675 stations, mostly in larger metro areas.

The offer to allow shareholders to keep part of the newly private company is an unusual concession because private equity buyers pay a premium to get total control and fewer regulatory requirements than those required of public companies.

The company said Tuesday preliminary results showed shareholders of about 67.3 million shares of Clear Channel stock chose to receive shares in the new company. That is more than twice the 30.6 million shares -- or 30% of the outstanding capital stock of the new company -- that were allowed in the buyout agreement. Because of that, shareholders will get shares in the new company on a prorated basis, the company said.

The deal is expected to close before the end of the year. The buyers will also assume $8 billion in debt.

Clear Channel shares rose 22 cents to $36.98 in afternoon trading Tuesday.
http://www.hollywoodreporter.com/hr/...fa5694bd22814b





In Love With Pop, Uneasy With the World
A. O. Scott

IT was the last day of summer, but on the boardwalk here it seemed more like a perfect morning in early July: the Atlantic Ocean sparkled under a cloudless sky; the humid air was soothed by a soft, salty breeze. I looked down the empty beach, past the souvenir shops and snack bars with their fresh paint and new green awnings, toward the proud Victorian hulk of the old Casino, and felt that I had walked into a Bruce Springsteen song. (Oh, I don’t know. Maybe “Fourth of July, Asbury Park.” Or is that too obvious?)

The feeling, no less potent for being self-induced, had been with me all morning. Bright and early, me and my girl — my wife of nearly two decades, that is — had let the screen door slam, dropped off the kids at school and set out on the open road, blowing through the E-ZPass lanes on the Garden State Parkway in our Volvo station wagon. We had an advance copy of Mr. Springsteen’s new album, “Magic,” in the CD slot, and most of his back catalog in reserve on the iPod. And now we were driving down Kingsley, figuring we’d get a latte. One more chance to make it real. Tramps like us, baby!

Our purpose was not to fantasize but rather to observe the E Street Band in rehearsal, and then to hear what the man himself had to say about the new record, the coming tour and whatever else was on his mind. “Magic” is, musically, one of the most upbeat, accessible records he has made, even as its themes and stories make it one of his most political. Once again he is hitting the road as a presidential election heats up.

“I like coming out on those years,” he would tell me later, when we sat down to talk in a backstage dressing room after the rehearsal. “Whatever small little bit we can do, that’s a good time to do it.”

At an age when most rock ’n’ rollers, if they’re still alive, have become either tributes to or parodies of their earlier selves, Mr. Springsteen seems to have settled into an enviable groove, with new musical forms to explore and an existing body of work that never seems to get old, with plenty to say and an audience that hangs on his every word.

In which — as if it weren’t already obvious — I include myself. I’ve been listening to Bruce Springsteen for a long time, but I can’t pretend that he provided the soundtrack for my youth. I spent my teenage years in the thrall of punk rock and its various aftermaths and came to Springsteen late, past the stage of life when his great anthems of romance, rebellion and escape might have had their most direct impact. As a result, I associate his work with the sorrows and satisfactions of adulthood; it’s music to grow up to, not out of.

Mr. Springsteen’s best songs, it seems to me, are about compromise and stoicism; disappointment and faith; work, patience and resignation. They are also, frequently — even the ones he wrote when he was still in his 20s — about nostalgia, about the desire to recapture those fleeting moments of intensity and possibility we associate with being young.

Moments that tend, not coincidentally, to crystallize within a certain kind of popular song. A song, let’s say, like “Girls in Their Summer Clothes,” which arrives smack in the middle of “Magic” and which the E Street Band was in the middle of playing when my wife and I tiptoed through the doors of the Asbury Park Convention Hall. It was a little after 10; the band was about an hour into its morning rehearsal, preparing for a tour of North America and Europe that kicks off on Tuesday in Hartford.

The Convention Hall is a battered, pocket-size arena where, as a teenager, Mr. Springsteen saw bands like the Who and the Doors. This morning it was filled with a shimmery, summery sound, as if we had traveled back 40 years into the mid-’60s sonic landscape of Phil Spector, Brian Wilson and the Byrds. Steve van Zandt was strumming a 12-string guitar, and the vocal harmonies, the chiming keyboards, Clarence Clemons’s saxophone and Soozie Tyrell’s violin combined to produce a lush orchestral cushion for Mr. Springsteen’s voice, which swooned through a lyric as unabashedly romantic as the song’s title.

“I wanted one thing on the record that was the perfect pop universe,” Mr. Springsteen said, once the band had wandered off and he had finished an early lunch of granola with fresh fruit and soy milk. It was two days before his 58th birthday, and he looked trimmer and tanner than he had the last time I’d seen him, which was on the JumboTron video screen at Giants Stadium a few years back. “You know, that day when it’s all right there; it’s the world that only exists in pop songs, and once in a while you stumble on it.”

Not that “Girls in Their Summer Clothes” is untouched by melancholy. Its narrator, after all, stands and watches as the girls of the title “pass me by.” “It’s the longing, the unrequited longing for that perfect world,” Mr. Springsteen continued. “Pop is funny. It’s a tease. It’s an important one, but it’s a tease, and therein resides its beauty and its joke.”

And much of “Magic,” on first hearing, seems to unfold in a similar spirit. There is a brightness of sound and a lightness of touch that are not quite like anything else Mr. Springsteen has done recently. In the past five years he has released four albums of original material, a zigzag through new and familiar styles and idioms. “The Rising” (2002) brought the E Street Band back into the studio after a long hiatus (their sound updated by the producer Brendan O’Brien) and answered the trauma of 9/11 with the defiant, redemptive roar of solid, down-the-middle rock. With “Devils and Dust” (2005) Mr. Springsteen picked up the thread of Western stories and acoustic ballads that stretched back through other non-E Street projects like “The Ghost of Tom Joad” and “Nebraska” (as well as some parts of “The River”). “The Seeger Sessions,” released last year, was an old-time old-lefty hootenanny, with a big, unruly jug band rollicking through spirituals, union songs and Dust Bowl ballads.

All of those discs were infused with Mr. Springsteen’s bedrock populism, but none was quite what you would call a pop record. Pop, though, is the term he and his band mates use, again and again, to describe “Magic.” Mr. Van Zandt, who has been playing and arguing about music with Mr. Springsteen for 40 years (scholars cite Nov. 3, 1967, as the date of their first meeting), noted that in the past Mr. Springsteen’s more tuneful, playful compositions tended not to make it onto albums.

“It was nice on this one to start to be a little bit more inclusive,” he said in a telephone interview a few days after my visit to Asbury Park, “with a little bit more of the poppier side of things, without losing any of the integrity, or any of the high standards. That was a nice surprise, a nice change of pace to include those things and integrate them into the album, rather than having them be fun to record and then cast them aside.”

For his part, Mr. Sprinsteen said that in writing the songs for “Magic,” he had experienced “a reinfatuation with pop music.” “I went back to some forms that I either hadn’t used previously or hadn’t used a lot, which was actual pop productions,” he said. “I wrote a lot of hooks. That was just the way that the songs started to write themselves, I think because I felt free enough that I wasn’t afraid of the pop music. In the past I wanted to make sure that my music was tough enough for the stories I was going to tell.”

The paradox of “Magic” may be that some of its stories are among the toughest he has told. The album is sometimes a tease but rarely a joke. The title track, for instance, comes across as a seductive bit of carnival patter, something you might have heard on the Asbury Park boardwalk in the old days. A magician, his voice whispery and insinuating in a minor key, lures you in with descriptions of his tricks that grow more sinister with each verse. (“I’ve got a shiny saw blade/All I need’s a volunteer.”) “Trust none of what you hear/And less of what you see,” he warns. And the song’s refrain — “This is what will be” — grows more chilling as you absorb the rest of the album’s nuances and shadows.

You can always trust what you hear on a Bruce Springsteen record (irony, he notes, is not something he’s known for), but in this case it pays to listen closely, to make note of the darkness, so to speak, that hovers at the edge of the shiny hooks and harmonies. “I took these forms and this classic pop language and I threaded it through with uneasiness,” Mr. Springsteen said.

And while the songs on “Magic” characteristically avoid explicit topical references, there is no mistaking that the source of the unease is, to a great extent, political. The title track, Mr. Springsteen explained, is about the manufacture of illusion, about the Bush administration’s stated commitment to creating its own reality.

“This is a record about self-subversion,” he told me, about the way the country has sabotaged and corrupted its ideals and traditions. And in its own way the album itself is deliberately self-subverting, troubling its smooth, pleasing surfaces with the blunt acknowledgment of some rough, unpleasant facts.

“Magic” picks up where “The Rising” left off and takes stock of what has happened in this country since Sept. 11. Then, the collective experiences of grief and terror were up front. Now those same emotions lurk just below the surface, which means that the catharsis of rock ’n’ roll uplift is harder to come by. The key words of “The Rising” were hope, love, strength, faith, and they were grounded in a collective experience of mourning. There is more loneliness in “Magic,” and, notwithstanding the relaxed pop mood, a lot less optimism.

The stories told in songs like “Gypsy Biker” and “The Devil’s Arcade” are vignettes of private loss suffered by the lovers and friends of soldiers whose lives were shattered or ended in Iraq. “The record is a tallying of cost and of loss,” Mr. Springsteen said. “That’s the burden of adulthood, period. But that’s the burden of adulthood in these times, squared.”

In conversation, Mr. Springsteen has a lot to say about what has happened in America over the last six years: “Disheartening and heartbreaking. Not to mention enraging” is how he sums it up. But his most direct and powerful statement comes, as you might expect, onstage. It is not anything he says or sings, but rather a piece of musical dramaturgy, the apparently simple, technical matter of shifting from one song to the next.

On the Convention Hall stage, the band handled the new material as deftly as the chestnuts — after 35 years together, communication is pretty much effortless — pausing to work out an occasional kink or adjust the sound mix. But they must have gone over the segue from “The Rising” to their next number at least a half-dozen times.

“You’ve got to let that chord sustain. Everybody!” Mr. Springsteen urged. “It can’t die down.”

The guitarists had the extra challenge of keeping the sound going while changing instruments, a series of baton-relay sprints for the crew whose job was to assist with the switch, until a dissonant organ ring came in to signal a change of key and the thunderous opening of “Last to Die.” It’s not much of an exaggeration to say that Mr. Springsteen’s take on the post-9/11 history of the United States can be measured in the space between the choruses of those two songs. The audience is hurled from a rousing exhortation (“Come on up to the rising”) to a grim, familiar question: “Who’ll be the last to die for a mistake?”

“That’s why we had to get that very right today,” he said later. “You saw us working on it. That thing has to come down like the world’s falling on you, that first chord. It’s got to screech at the end of ‘The Rising,’ and then it’s got to crack, rumble. The whole night is going to turn on that segue. That’s what we’re up there for right now, that 30 seconds.”

But the night does not end there. Onstage, “Last to Die” is followed, as it is on the album, by a song called “Long Walk Home.” In the first verse, the speaker travels to some familiar hometown spots and experiences an alienation made especially haunting by the language in which he describes it: “I looked into their faces/They were all rank strangers to me.” That curious, archaic turn of phrase — rank strangers — evokes an eerie old mountain lament of the same title, recorded by the Stanley Brothers.

“In that particular song a guy comes back to his town and recognizes nothing and is recognized by nothing,” Mr. Springsteen said. “The singer in ‘Long Walk Home,’ that’s his experience. His world has changed. The things that he thought he knew, the people who he thought he knew, whose ideals he had something in common with, are like strangers. The world that he knew feels totally alien. I think that’s what’s happened in this country in the past six years.”

And so the song’s images of a vanished small town life (“The diner was shuttered and boarded/With a sign that just said ‘gone’ “) turn into metaphors, the last of which is delivered with the clarity and force that has distinguished Mr. Springsteen’s best writing:

My father said “Son, we’re

lucky in this town

It’s a beautiful place to be born.

It just wraps its arms around you

Nobody crowds you, nobody goes it alone.

You know that flag

flying over the courthouse

Means certain things are set in stone

Who we are, and what we’ll do

And what we won’t”

It’s gonna be a long walk home.

“That’s the end of the story we’re telling on a nightly basis,” Mr. Springsteen said. “Because that’s the way it’s supposed to be. And that’s not the way it is right now.”
http://www.nytimes.com/2007/09/30/ar...30scot.html?hp





Mistrial Declared in Spector Murder Case
Randal C. Archibold

The murder trial of the music producer Phil Spector ended on Wednesday in a mistrial after the jury, leaning heavily to convict him, could not reach a unanimous verdict.

The Los Angeles County district attorney’s office said it planned to retry the case.

Mr. Spector, 67, charged with second-degree murder in the killing of Lana Clarkson in his home in 2003, stared blankly forward as Judge Larry Paul Fidler of Superior Court ended the proceedings after the jury foreman had reported a 10-2 deadlock.

The impasse occurred after an earlier deadlock of 7-5 that jurors later said also tilted toward conviction. That impasse led the judge to take the unusual step of sending the jurors back to deliberate with new instructions, angering the defense.

Three jurors, speaking to reporters afterward, said the two holdouts gave credence to a defense assertion that the death of Ms. Clarkson, 40, a struggling actress, might have been a suicide rather than a murder.

The three jurors said the jury had also been troubled by the lack of large amounts of blood on Mr. Spector and the poor English of a witness, Mr. Spector’s driver, who said he had heard Mr. Spector say, “I think I killed somebody.”

Judge Fidler retained orders for silence, preventing lawyers and others in the case from speaking publicly. He set a hearing for Oct. 3.

Mr. Spector, the mastermind behind hits like “Da Doo Ron Ron” and “Be My Baby,” escorted by his wife, lawyers and bodyguards, left through an adjacent courtroom without saying a word, free on bail.

He joins Michael Jackson, O. J. Simpson and Robert Blake among celebrities whom Southern California prosecutors have failed to convict in high-profile criminal cases.

Alan Jackson, a lead prosecutor in the case, sat glumly in a courthouse hallway as a spokeswoman for the district attorney’s office reiterated the judge’s order barring him from speaking.

“We’re disappointed the jury was unable to reach a verdict in this case, and we will immediately begin preparations for a retrial,” the spokeswoman, Sandi Gibbons, said later at a news conference. She declined to comment further.

Mr. Spector was accused of killing Ms. Clarkson, whom he had met at a nightclub hours before she was found dead from a gunshot wound to her mouth in the foyer of Mr. Spector’s house in a Los Angeles suburb.

Prosecutors said Mr. Spector shot Ms. Clarkson in an alcohol-fueled rage after she had resisted his advances. They presented testimony from five other women who described similar threats by Mr. Spector.

The prosectors failed to present forensic evidence that placed the gun in Mr. Spector’s hand and relied instead on a spray of blood on his clothes.

The defense, portraying Ms. Clarkson as despondent over her career and finances, presented experts and scientific evidence to buttress their assertion that she had shot herself, intentionally or not. They said the pattern of blood indicated that Mr. Spector was too far away to have pulled the trigger.

One juror who declined to give his name said he voted to convict, because given “the totality of the evidence, what was the most plausible reason she could have died.”

Another juror suggested that a psychological profile of Ms. Clarkson by prosecutors might have indicated whether she had been suicidal.

The jury foreman said some jurors were troubled with the statement from Mr. Spector’s driver, Adriano De Souza, a Brazilian immigrant, who admitted having problems with English.

The case was remarkable for the virtual second chance the judge gave prosecutors after the jury reported a deadlock on Sept. 10, having deliberated for seven days.

Judge Fidler removed an instruction that they considered confusing, ruling that it misstated the law on second-degree murder, and read them new instructions that, to the fury of the defense, included a few situations in which Mr. Spector could have killed Ms. Clarkson.

Jean Rosenbluth, a former federal prosecutor and University of Southern California law professor who monitored the case, said there was little more prosecutors could have done.

Professor Rosenbluth said she doubted that jurors were impressed by Mr. Spector’s celebrity, as he was a behind-the-scenes figure and his fame had faded from the 1960s and early ’70s.

She suggested that the defense had succeeded in creating doubt about the prosecution case with expert witnesses and said prosecutors had erred in not pushing hard for the jury to consider a lesser charge of involuntary manslaughter.

“A lot people may say this is just like the other cases, but he was not acquitted,” Professor Rosenbluth said. “He was almost convicted. I think this says much more about money than celebrity and the resources money can buy when you are on trial.”

It was the first televised Los Angeles celebrity trial since the Simpson case in 1995, but it did not attract the following or frenzied coverage of that or other cases.

Mr. Spector has not been behind a hit in decades. He is best known in music circles for his Wall of Sound technique, marrying lush orchestral arrangements to guitars and other staples of pop music. A member of the Rock and Roll Hall of Fame, he collaborated with top rock stars, including the Beatles.
http://www.nytimes.com/2007/09/27/us/27spector.html





Kids Advocate: Show Not a 'Nation' of Laws
Ray Richmond

Well, "Kid Nation" premiered on schedule Wednesday night despite the vehement protestations of TV critics and child advocates, and the republic still stands. CBS no doubt got an audience bump from the summerlong controversy that shrouded the reality hour that finds kids age 8-15 recruited to create their own pioneer society from a barren ghost town in New Mexico. But starting now, it's on its own.

The ratings for the opener were solid, if unspectacular, with "Nation" winning the 8 p.m. hour with adults 18-49 and kids 2-11 with a 3.0 rating and 9 share, according to Nielsen Media Research overnight numbers.

Yet despite the seeming tameness of the debut, some who watched it are hardly appeased. And it should surprise no one that those ranks include Paul Petersen, the former child actor who played Jeff Stone on "The Donna Reed Show" in the early 1960s and who has spent most of his adult life crusading to assist onetime child stars who have fallen on tough times. The crown jewel of his efforts is A Minor Consideration, a nonprofit that Petersen formed in 1991 to provide emotional and financial assistance for "young performers past, present and future."

Petersen has not been shy in sharing his feelings about "Kid Nation." And watching it on Wednesday merely served to fuel his rage over a show that he calls "despicable," "shameful" and "a celebration of exploitation and abuse."

It is Petersen's contention that no matter the claims of CBS and creator-executive producer Tom Forman, "Kid Nation" is hardly representative of "reality," taking advantage of the less stringent child labor laws in New Mexico to hire child "performers" who were then "worked 17 hours a day for 40 straight days and paid the mighty fee of $5,000."

"Watching the show on Wednesday only reinforced my disgust and disdain," he says. "It could have been a worthwhile project if the production company had treated these children like the performers they were and allowed them to really do what we were told they were doing -- which is practice nation-building in a controlled setting."

What perhaps rankles Petersen most is how the production was mounted in New Mexico to avoid the more rigorous California child labor restrictions, a fact the producers don't deny.

"You have kids who were taken out of school for six weeks and weren't even provided with a tutor on-set," he charges. "Is that legal? Of course not. Yet somehow, they were able to get it waived. It's also standard industry practice that a parent has to be within sight and hearing of their child at all times during a shoot. It's the law in California. But they didn't bother with that.

"And then I saw on the first show how they're giving away a $20,000 award every week, which in essence turns children who aren't professional into rampant mercenaries. The level these people have stooped to was staggering," he says.

In his and CBS' defense, Forman has contended that the furor is entirely media-created and without merit and that all applicable laws that apply in New Mexico to working kids were adhered to. The network has stood behind the creator.

Petersen promises to keep sounding this particular alarm on behalf of kids "whose parents sold them out." And he's further perturbed by preparations being made for "Kid Nation 2" that's set to go before the cameras by year's end.

"We've got to stop this," he warns, "before more kids are victimized."
http://www.hollywoodreporter.com/hr/...50343dfab906ac





US Online Video Popularity Keeps Climbing
Juan Carlos Perez

People in the U.S. have steadily increased the amount of time they spend watching videos online, as Google’s YouTube remains by far their preferred video site, according to a study.

In July, almost 75 percent of U.S. Internet users watched videos online, up from 71.4 percent in March, according to comScore Networks.

The monthly time spent watching videos went up to an average of 181 minutes per viewer in July from 145 minutes per viewer in March, according to comScore.

People in the U.S. are also watching more video clips. In July, the average user watched 68 clips, up from 55 clips in March.

Overall, almost 134 million U.S. Internet users watched a little over 9 billion video clips in July, up from 126.6 million people and a little over 7 billion clips in March.

In July, Google ranked as the top provider of video clips, serving up 27 percent of the total — almost 2.5 billion clips — most of them via YouTube, comScore said.

Yahoo nabbed a distant second place, serving up 4.3 percent of the clips. Fox Interactive Media, the News Corp. Internet division that includes MySpace.com, came in third with 3.3 percent. Viacom (3.1 percent) and Disney (2 percent) rounded out the top five.

Google also ranked first in July in unique video viewers with almost 68 million, followed by Fox Interactive (35.8 million), Yahoo (35.3 million), Time Warner Inc. (26.6 million) and Viacom (22.6 million), comScore said.

After years of unfulfilled promises, online video has taken off in a big way in the past year and a half, rapidly accelerating its momentum across a wide variety of sites.

The revolution is widely credited to YouTube and its video-sharing format, but now companies are prominently featuring videos in portals, news sites, blogs, social networks, online stores and film and television industry sites.

YouTube’s popularity can be attributed to several factors, including its ease of use — both for viewers and uploaders —, a strong community of millions of people who submit, view and share personal videos and an abundance of commercial clips from movies and television.

It is this last component of its popularity — the commercial clips — that have put YouTube at the center of the Internet industry’s struggle with video copyright protection, because many of those videos are copied and uploaded without their owners’ permission. A landmark legal action is currently under way, as Viacom pursues a copyright-infringement lawsuit against Google over the unauthorized appearance of its clips on YouTube.

In addition to copyright, other technical and operational issues are in flux, such as the options for generating revenue from video content, the best ways to use video for online advertising and the different alternatives of delivering the clips to viewers.

Another area of interest are video search engines, as well as alternate devices for online video beyond the PC, from small ones like cell phones to large ones like living-room home entertainment centers.

For example, currently the Web seems a vehicle primarily for short video clips, as evidenced by comScore’s finding that the average video clip duration in July was 2.7 minutes.
http://www.macworld.com/news/2007/09/13/video/





Google Video Blasted Over Piracy Claims
Clement James

Copyright watchdog files report alleging violations on Google Video.

A US-based copyright watchdog has sunk its teeth into Google by sending a report alleging copyright violations on Google Video to members of Congress.

The National Legal and Policy Center (NLPC) researched the extent of copyrighted material being hosted on Google Video earlier this summer and released a Top 50 list of apparently copyrighted movies.

But, in the latest spot-check of Google Video conducted from 10 to 18 September, the NLPC claims to have discovered 300 additional instances of apparently copyrighted films, including over 60 movies released this year.

Several popular summer releases including Shrek the Third, Oceans Thirteen, The Bourne Ultimatum and Knocked Up were easily found on the video sharing site.

The 300 apparently pirated films, along with many other copyrighted works, received more than 22 million views in the past year on Google Video, according to the NLPC.

This is despite Google's claim that it respects the rights of copyright holders, and provides tools to help identify and remove copyrighted intellectual property from the site.

"While Google faces numerous legal challenges related to the posting of copyrighted content on its video sharing websites, there is a growing chorus who believe that evidence of Google's seemingly indifferent attitude towards internet video piracy has resulted in a legitimisation or 'mainstreaming' of video piracy which will have broad and damaging implications for all intellectual property owners," said the letter to Congress signed by NLPC chairman Ken Boehm.

"Since [we originally identified evidence of copyright infringement] the number of apparently copyrighted movies being hosted by Google Video appears to have grown substantially.

"During the past two weeks, the NLPC again conducted random spot-checks of Google Video in an attempt to identify clearly copyrighted works that continue to be hosted on the site.

"What we found raises serious questions about Google's oft-stated commitment to prevent apparently copyrighted content from being hosted on its video sharing site."

The NLPC added that Google has been promising video filtering technology to screen for copyrighted content since at least the Autumn of 2006.

However, it appears that Google still had not implemented the promised technology either for its YouTube or Google Video sites.

The NLPC said that internet piracy theft cost nearly $2.3bn in lost revenue to the US film industry.
http://www.itnews.com.au/News/62054,...cy-claims.aspx





Reconstructing Iraq's Film Industry: Antonia Bird and Human Film in Jordan
Nicol Wistreich

When the United Nations imposed sanctions on Iraq in August 1990, the cinema industry went into steep decline. New equipment, film stock, and chemicals for film laboratories were forbidden under import rules and no new feature films were made until Mohamed Al Daradji's Oscar nominee Ahlaam in 2004. As producers Human Film prepare to make their second feature in the region, the British production company has traveled to Jordon to run a series of workshops to help train up the next generation of filmmakers in the region.

Supported by the Royal Film Commission of Jordan, the workshops will teach 23 filmmakers from both Iraq and Jordan the basics of directing, screenwriting, camera/technical, production and post-production. Next week the students will produce a film on 16mm or 35mm. The eight tutors include Antonia Bird (Priest, Face), and experts from the UK, Portugal, The Netherlands, Iraq and Canada. One of the key stipulations is that each country provides at least two female trainees. Richard Lawson of Kodak Dubai has supplied all the filmstock while The Gate in Lebanon is helping with processing.

"Each group consists of 5 students and the Jordanian student acts as the translator for the teacher - this has really made groups reliant on each other and already strong bonds and friendships have been created." Human Film's Isabelle Stead told Netribution. "It's amazing how much they are taking in".

Human Film is a remarkable company focused human resilience at the heart of tragedy, and is made up of Iraqi-born Mohamed, producer/writer Isabelle and Daniel Evans. The Leeds-based outfit is testament to film and art's ability to cross boundaries, right down to the make-up of the company. Mohammed told me in an interview, soon to be published here:

"To be honest we don't put religion in there. But I am Muslim. Danny, he is Christian. Isabelle is half-Jewish. And we never think about religion, at the end of the day, what is religion but about human beings learning to live in peace? What Islam , Christian and Jewish religions say is the same. The ten commandments: don't kill, don't kill, don't steal, don't lie, don't talk about people - religion is about human beings. All the religions are the same. So when my friend Danny goes on Sunday to the church and prays to God and when I go on Friday to the Mosque, and on Saturday she goes to the synagogue it's the same thing... Religion is something private, it's about you and your God."

The two weeks workshop came about after Mohamed did a Sundance workshop in 2006 with the Royal Film Commission of Jordan and spoke with them exploring the possibility of a workshop. Isabelle then went to shoot a short film in Jordan and the company decided this would be a good way for Iraqis and Jordanians to work together.

Human Film's work Iraq, alongside it's sister company Al Rafidain is perhaps the most notable since Oliver Reed's appearance in The Great Question, which documented the 1920 revolt against British rule. Reed played the part of an arrogant British officer murdered by the mob in a nationwide revolt now regarded as one of the most important steps towards eventual Iraqi independence. More information on the history of Iraqi cinemacan be found in an interesting Guardian article.
http://www.netribution.co.uk/2/content/view/1284/182/





Festival Shows Movies on Web at Same Time
Owen Gibson

The UK's largest independent film festival will this week become the first to simultaneously show its movies via the web, claiming the initiative could help establish a new revenue model for independent filmmakers.

The Raindance Film Festival in London has done a deal with broadband provider Tiscali to make six of its films available to all via the web at the same time as they premiere in London cinemas.

They include the feature-length documentary Flames in the Looking Glass, tracking the lives of three Indian transgenders living with Aids, the Scottish road trip The Inheritance, and a film about hip hop in Brighton called South Coast.

All the films will be made available from 9pm on the day they are first shown. On five nights, a selection of short films from aspiring film makers will also be aired. The festival's website will also host content from the previous night's screenings.

Alongside the screenings, Raindance also hosts a series of events. At one, aspiring film makers will pitch ideas to a panel of film grandees, including Nik Powell, Sally Caplan and Ewan McGregor.

Online video consumption has exploded as high speed broadband connections have proliferated.

Elliot Grove, who founded Raindance, said online distribution offered film makers new ways to fund their films. Online distribution would give aspiring film makers an opportunity to find an audience without having to go through the traditional Hollywood system.

The festival runs from September 26 to October 7.
http://www.guardian.co.uk/uk_news/st...175555,00.html





'Look' Spy-Cam Footage Looks Real, But Isn't
Martin A. Grove

Spy-cam stars: We may not realize it, but we're all movie stars thanks to the roughly 30 million surveillance cameras throughout the U.S. that capture each of us on film about 200 times daily.

That's the premise of writer-director Adam Rifkin's "Look," a fascinating feature that appears to be actual spy-cam footage strung together, but is really a fiction film spring-boarding off the idea that our comings and goings these days are anything but private.

Produced by Brad Wyman and Barry Schuler, "Look" won the Grand Jury Prize this summer at the CineVegas Film Festival and was recently acquired by the new distribution company Liberated Artists, which is releasing it Dec. 14 in New York and L.A. It was executive produced by Donald Kushner and Richard Bishop. None of "Look's" ensemble cast members are recognizable actors because that would have instantly shattered the illusion that what we're looking at are real people who are being surreptitiously filmed.

Rifkin is best known as a screenwriter with such credits as "Underdog," "Mousehunt" and "Small Soldiers." On the directing front, his credits include co-directing and starring in the mock documentary "Welcome to Hollywood," which featured cameos by John Travolta, Sandra Bullock and Will Smith.

After an early look at "Look," which I've been telling friends not to miss, I was happy to be able to focus on the making of the film with Rifkin. "We all, I think, are aware of it, but I don't think we think about it enough," Rifkin said about the cameras that record so much of what we do in public today. "I don't think most people are aware of it to the extent that it really permeates the culture. When I started thinking about the idea to make the movie, I started looking around everywhere I went and there were just cameras everywhere. Most of the time (when) you're sitting in a restaurant, you're shopping at a grocery store, you're changing in a changing room, you're in a public bathroom, you're just not thinking about it -- but they're everywhere. And interestingly the number of cameras is growing exponentially."

An indication of just how quickly the camera population is increasing is seen, according to Rifkin, in that "From the time we finished the movie to now those numbers have jumped even higher. We had to change the opening cards of our film before the film gets released because the original numbers were roughly 26 million surveillance cameras in the United States generating about four billion hours of footage a week and the average American was being captured 170 times a day. We just finished (the movie) this summer and we showed it for the first time to an audience at the CineVegas Film Festival, where we won the Grand Jury Prize, which was so exciting. The new numbers are every day the average American is captured by over 200 cameras and the numbers are just growing and growing (and the total camera population) is nearing 30 million, which is pretty scary -- or good, depending on how you look at it.

"I did not want to make a political statement with this movie. I did not want to take a stand and say, 'I think (having) surveillance cameras in every store and on every street corner is a good idea unilaterally or is a bad idea unilaterally.' I just kind of wanted the film to spark the debate because some people are very passionate about one side of that fence and other people are really passionate about the other side of that fence. And, if nothing else, I just think it's interesting for people to be aware of because since we started making the film and people have seen the film everybody says that they're more aware of cameras now than they've ever been and they start looking for them everywhere they go. If you allow it to make you feel so, it can make you feel a little paranoid."

When I asked how he'd obtained the surveillance footage used in the movie, Rifkin surprised me by replying, "Well, we created it. The movie is a narrative feature. The concept is that we followed several storylines that are all intersecting, but the movie is shot exclusively from surveillance cameras. But we created all the footage that was shot. It's very much a narrative film where the actors are portraying characters and they're saying lines from a script. We shot all the footage and then we degraded it in post to look as authentic as possible to surveillance footage.

"It was very important to us that we hold very, very true to the conceit that this movie is shot from angles that only would actually be surveillance camera angles. So there's no camera in the movie ever that is anywhere where an actual surveillance camera wasn't placed or would be placed. In most instances, where we shot the film we just put our cameras right next to whatever real surveillance camera happened to be there. And if were in a location that didn't happen to have surveillance cameras, we were very careful to only put the cameras where a surveillance camera would actually be."

Asked how he came up with the idea of making the film, Rifkin explained, "The original spark of the idea hit me when unbeknownst to me I had been photographed going through a yellow light. I thought it was a yellow light (but the police said it was red). The photograph came back and it was me and it was my car, it was my license plate number and I was in that intersection and I was making a very embarrassing expression because I was singing to the radio at that moment. And then I started thinking about there's a true-life case where a man was photographed at a red light cam and sitting next to him was a woman who was not his wife. And when that letter from the police department came to his home with the photograph of him in the car with another woman, his wife opened the letter. It ruined his marriage and he sued the city and it changed the law so now, I believe, the person in the passenger seat has to be blurred. But all those things started hitting me at the same time.

"I started thinking about that story. I started walking through a Target and I was looking around at the cameras on the ceilings and everywhere I went I realized I was being photographed from a different angle. As a filmmaker I started to think, if I were to obtain all these angles and start cutting them together that's coverage. That's like shooting a movie. I mean, granted the scene would be a particularly boring scene of me looking for a super-soaker for my nephew's birthday party, but I thought to myself, 'You know, (it's staggering) if you think about where all these cameras are on any given day and all the different cameras we pass in front of (in places like) grocery stores, banks, hospitals, elevators.'"

At that point Rifkin said he, "Started to look into where cameras were and weren't illegal and I learned that in (only) very, very few states is it illegal to put cameras in public bathrooms and public dressing rooms. In most states it's perfectly legal. So that raised my eyebrows, as well. And then I just started to think, 'If in a random city for a random week somebody were able to compile the millions and millions of feet of footage of all the surveillance cameras and if you were to be able to somehow manage to wade through all that footage to the three, four or five most interesting stories that happened that week and could follow them all, I wonder how much they would intersect, I wonder how dramatic they'd be, I wonder how funny they'd be. The cameras are just capturing life as it plays out, but the advantage the camera has that none of us has is that the camera sees all. The camera sees both sides of everybody's persona.

"I mean, everybody to a certain degree has a secret life and whether the extent of that secret life is you'll only pick your nose if you're alone in an elevator or that secret life is that you're having an affair on your spouse or that secret life is you are living a completely dual personality from the reality that people know as you, you may think you have this information hidden from all the people that you know, but the camera sees all. And that's kind of what the movie's about for me. At its core, to me it's a movie about the things people do when they think no one is watching."

About a year or so ago, he continued, "I said to Brad Wyman, who produced the movie, 'I've got this idea for a movie.' I told him about all the different cameras that exist and what I'd learned looking up some information about it. I said, 'What if we shot an entire movie entirely from the point of view of surveillance cameras?' And he said, 'I love it. Write it immediately. We'll get it made immediately.' So I wrote it really fast. He gave the script to a friend of his, who he's in business with on some other projects, named Barry Schuler. Now Barry Schuler is one of the creators of AOL. They had been looking for things to work on together. Barry read the script and loved it and said, 'I'm in. I want to finance this movie. I get it.'

"He comes from the tech world and he's got so many great philosophies on upsetting the apple cart in terms of how to disseminate information and media. He really was one of the architects of creating the Internet as we know it. He just saw this as an opportunity to have a lot of fun with the kind of stuff that just hits him right in his soft spot. So we all rolled up our sleeves and made the movie together. I think it turned out really good. The first audience that ever saw it was (at) CineVegas and it won. That was just in July. We were so thrilled and so excited."

As for the challenges of making the movie, he pointed out, "When I first thought about the idea, I thought this was going to be the easiest movie I've ever made. I thought, 'OK, we'll put a couple cameras in a couple corners in some rooms up by the ceiling and we'll have the actors come in and say their lines and we're done. We can go home by lunch every day, is what I thought.' I was so wrong. This was the hardest movie I've ever made. The reason being is that it had to feel 100% real. All my other movies relied so much on movie trickery to be able to fudge -- okay, if a line gets fudged here or if that didn't feel real I know I can compress the timing and I know I can do this and can do that. I couldn't do any of that (in this film). I had to believe that when I'm watching this film that it could be real footage and these could be real people that were actually captured.

"So it brought up a whole new form of challenges because where the cameras were set up was kind of out of our control. OK. We're in a 7-Eleven. There has to be one camera there, one camera there, one camera there. We can't mess with that. But how can we tell all these different scenes and tell the story in an interesting and compelling way when we know we can't move the camera and we can't cut in for close-ups. I mean, this is a character drama with no close-ups. That was very scary for me. I had to figure out ways that we could recognize the characters in other ways than seeing a close-up of their face and through working with the actors and with the performances and with the staging within the framework of the static camera angles, how to most interestingly get to know who they were, get to care enough about who they were and do it in some sort of way that's still visually interesting so you don't just tune out."

Everyone is familiar, he continued, "with the two minutes of surveillance footage on the news every other day, but to tell an entire narrative from the point of view of surveillance cameras and expect to be able to feel for the characters was a very scary challenge. I was shocked though by something that emerged that I did not expect. You know, movies are all about voyeurism. I mean, you're looking in on other people's lives. But with this movie, you're forced to continually be reminded that you are not living vicariously through the characters, as is the case with most films.

"You are a spectator into these people's lives so what it basically forces you to feel like is an accomplice sometimes in a good way and sometimes in a bad way. You're forced to be observing things that you sort of feel like you shouldn't be observing. You're looking at things that people don't know are being captured (on film) and, as a result, it's titillating. But it's also at times shameful because you're seeing things that you know you shouldn't be seeing. And that was kind of a neat thing that emerged that I didn't really expect was going to happen."

Real surveillance footage, he explained, "at times is so murky that to see it for two minutes is fine, but to see it for 90 minutes it can give you a headache. So we were very meticulous in creating different looks for different locations to make sure that the film could be watched and digested without giving everybody a headache. The look of every different surveillance camera is authentic to real footage we have researched. But certain locations (look different because) let's say we decided the police station has a higher caliber surveillance system or the mall has a higher caliber surveillance system so the quality of the image might be better whereas the 7-Eleven or the garage or the ATM machine cameras haven't been maintained as well so those cameras are maybe of a lesser quality. And that kind of helped give the film all different locations and all different looks."

Casting "Look" required a different process than is typically used in making a movie: "Usually, making any film we're always trying to get the biggest name actors to attach themselves to our material because obviously it ups the value of the film and enables the film to get seen by a wider audience. In this film because the intention was for it to feel real, it had to feel like these could be real surroundings and these could be real people. We made the decision early on that we did not want any actors of note. We did not want to recognize any faces. And wouldn't you know it, when we sent the script out to all the agents and said, 'Give us all your best actors that may be working but aren't known' more known actors that are big actors that we would have in any other instance be thrilled to have in our film, we had to pass on.

"And the more we passed, the more (those kind of) actors wanted to do it. It was a tough test of character for us all, I'll tell you that, because those things obviously guarantee a film getting more of an opportunity to be seen on the road. But I had to stick to my guns. I had to say no to so-and-so (because) we have to go with unfamiliar faces. And I think that paid off."

On the marketing front, he added, "The film doesn't come out until December so we're not showing it to reviewers yet, but we've started a series of screenings for political shows, political journalists and people that are not necessarily from the entertainment side of journalism (but) from the politics and social side of journalism. We feel that the film, though not a political film, has an inherently political issue in this privacy vs. security issue. And we're finding that, so far, all the different outlets we've been showing it to and the editors and reporters and journalists we've been showing it to have really sparked to that debate, which is really, really exciting.

"We just happened to luck out timing-wise. The movie happens to be about a topic that is on the front page of papers every day. We happened to finish the film at time when all the big cities are wanting more and more surveillance cameras on every street corner to stop crime. The whole situation in London with those doctors who were planning those bombs -- those things were all solved by the complex matrix of surveillance cameras they have there. We were all familiar with the iconography on the news every week of a child being abducted and the surveillance footage is so grainy and we can't see who the guy was who took her or the (footage of) the nanny hitting the baby. There's so many iconic images that are so (much) a part of the collective consciousness to do with this subject matter, I just feel that the timing is right, luckily for us, for this movie right now."

Filmmaker flashbacks: From Dec. 22, 1989's column: "Behind every successful movie there seems to be a story about how many years it took to be put together. The latest such story comes from Freddie Fields, whose production 'Glory,' directed by Ed Zwick and starring Matthew Broderick and Denzel Washington, got off to a fine start for Tri-Star last weekend.

"'A lot of projects suffer that difficulty of getting made,' Fields told me. 'This one certainly did. I suffered the problems of being turned down and rejected for reasons which at times I understood and at other times I became so frustrated about that -- that's what really kept me going.'

"What did they tell Fields? 'I would sit and tell the story and they'd be fascinated and maybe take a full meeting or even a second meeting,' he replies. 'But by the next day or within a short period of time when they got their feedback from their audience researchers they'd say, 'Listen, Freddie, here's the way it looks. Our researchers say, bottom line, who wants to see this movie? It's a period piece. Worse that just being a period piece, it's Civil War. And not only is it Civil War, but it's a Civil War piece about the first black regiment in history. Everything is working against this thin. There's nothing that says anybody wants to see this movie.'

"'So it was really basically that. It wasn't a disagreement that the story was fascinating. It was fascinating and fine, but who wants to see it? Then, of course, when those who did take the time to read the first draft, and many of them wouldn't, they also saw in their minds a very, very expensive picture costing $35 million or $40 million. It was impossible for them to believe, as I said at the time, that this picture could be done for anywhere from $15 million to $20 million, depending on the result that we wanted to get....'

"How did he get Tri-Star to make it? 'I kept hitting Jeff Sagansky three or four times,' says Fields. 'He started to feel what I felt. He then really was the one who sold it to David Matalon (then president of Tri-Star). David Matalon, then, became the champion of the film and still remains its champion. He got Victor Kaufman (then chairman) excited. They put me in touch with Ed Zwick, whom I'd never met before. They were very excited about Ed because they'd had a great experience with him on 'About Last Night.' We hit it off great. After we had our meetings I gave him the Kevin Jarre script and he said he wanted to do it.'"

Update: "Glory" went wide Feb. 16, 1990 with $2.7 million at 801 theaters ($3,350 per theater). It wound up grossing $26.8 million domestically, making it the year's 45th biggest movie. "Glory" did better on the awards front, winning Oscars for best supporting actor (Washington), cinematography and sound and also receiving nominations for best art direction-set decoration and film editing. Washington won the Golden Globe for best supporting actor and the film was honored with Globe noms for best motion picture -drama, director, original score and screenplay.
http://www.hollywoodreporter.com/hr/...153da8c2c8dd89





Art or Bioterrorism: Who Cares?
RU Sirius

The Emergency Response Team might have thought they'd stumbled upon an underground bioterrrorist's laboratory.

On May 11, 2004, 911 received a call from SUNY Buffalo University professor and artist Steve Kurtz reporting the death of Kurtz's wife Hope from heart failure. The responders entered the home where Kurtz worked on his projects for Critical Arts Ensemble (CAE) — projects which explore and critique bio-issues like our contemporary use of biotechnology for weapons programs, reproduction, and food. The responders noted a table with scientific equipment and peculiar substances that are an essential part of Kurtz' work.

The FBI detained and questioned Kurtz for 22 hours. His house — and his wife's body — were confiscated. Kurtz' entire street was quarantined while agents from numerous agencies, including Homeland Security and the Department of Defense, descended on his home in hazmat suits. Everything was confiscated – computers, books on bioweaponry, garbage, posters with "suspicious" Arabic lettering on them… everything.

After about two days, the authorities had tested the biological materials and declared that no toxic material had been found. On May 17, Kurtz was allowed to return to his home.

Whoops!

So did the authorities apologize to the grieving professor before busying themselves with pursuing real crimes and threats? Not on your life!

Despite the Public Health Commissioner's conclusions about the safety of Kurtz's materials, and despite the FBI's own field and laboratory tests showing they weren't harmful to people or the environment, the Justice Department still sought charges under the U.S. Biological Weapons Anti-Terrorism Act of 1989, as expanded by the USA PATRIOT Act — Prohibitions With Respect to Biological Weapons.

A federal grand jury rejected the charges, but instead handed down indictments with two counts each for "mail fraud" and "wire fraud." According to the CAE, the charges "concern technicalities" about how Kurtz obtained "$256 worth of harmless bacteria for one of CAE's art projects." (Robert Ferrell, former head of the Department of Genetics at the University of Pittsburgh's School of Public Health, and a collaborator on several of CAE’s projects, now facing charges along with Kurtz) In this interview, Kurtz characterizes the charges even more bluntly. "The Department of Justice can drop a major felony on someone for filling out a warranty card incorrectly and mailing it."

To bring more attention to the case, film director Lynn Hershman Leeson (Teknolust, Conceiving Ada) has released a unique new film, Strange Culture. Starring Tilda Swinton, Peter Coyote, Thomas Jay Ryan, and Josh Kornbluth — plus Kurtz himself — the film effectively communicates the story while also reinventing the documentary genre in Leeson's unique style.

Strange Culture was screened in the virtual world of Second Life as part of the 2007 Sundance Festival, a first for the festival. The film has also been screened in Los Angeles, Albequerque, Chicago, Buffalo, Seattle and Minneapolis and is just finishing up showings in San Francisco and San Rafael on September 27. The film has not gone into conventional release, but future showings are planned for New York City.

RU SIRIUS: Describe the project you were working on that caused you to have the materials that caused law enforcement officials to go nuts.

STEVE KURTZ: Three projects seemed to really bother law enforcement. Critical Art Ensemble was working on a biochemical defense kit against Monsanto’s Roundup Ready products for use by organic and traditional farmers. That was all confiscated.

We had a portable molecular biology lab that we were using to test food products labeled “organic” to see if they really were free of GMO contaminant. Or, when in Europe, to see if products not labeled as containing GMOs really had none. We'd finished the initiative in Europe and were about to launch here in the U.S. when the FBI confiscated all our equipment.

Finally, we were a preparing project on germ warfare and the theater of the absurd. We were planning to recreate some of the germ warfare experiments that were done in the '50s (which were so insane that they could only have been paid for with tax dollars). We had two strains of completely harmless bacteria that simulated the behavior of actual infectious diseases — plague and anthrax. To accompany these performances, we were in the middle of a manuscript on the militarization of civilian health agencies in the U.S. by the Bush administration.

Everything described was confiscated. We had to start from scratch on the project and the book. Happily, we did eventually do the experiments, and published the book — Marching Plague: Germ Warfare and Global Public Health.

RU: Would you say that originally, they authentically suspected they had found some sort of bioterror weapon, and once they realized they hadn't, they found other reasons to remain hostile?

SK: What I think they thought was that they had a situation, along with a vulnerable patsy, out of which they could manufacture a terrorism case. After all, the rewards that were heaped on the agents, prosecutors, and institutions that brought home the so-called “Lackawana Six sleeper cell” case — another railroad job — were witnessed by others in these agencies and noted. This made it too lucrative to pass up turning anything they could into “terrorism”.

They also had plenty of other reasons to be — and remain — hostile.

RU: Could you describe the scene of the raid? Did they use a lot of weaponized overkill?

SK: I really don’t know any more than anybody else about that. At the time of the real action, I was at the Yes Men’s compound in Troy, NY. (Due to the initial media circus, I was told by my lawyers to leave town for a few days.) From what I can tell from the news footage and the reports of neighbors, the entire alphabet soup of the federal investigative agencies was launched. Each took a turn entering my home wearing hazmat suits with guns drawn, and proceeded to do their “bioterrorism” exercises.

RU: Oh, I had the impression that the entire situation involving your wife's death, the discovery of the materials, and the raid all happened fairly instantly. Did this scene stretch out over days?

SK: It did stretch out a ways. Even though I was illegally “detained” for 22 hours the day after my wife’s death and they had confiscated my house, the raid didn’t begin. It took a few days for them to assemble all the troops and to obtain a search warrant.

RU: And did they think you were trying to avoid arrest since you were hiding?

SK: No. I was out of town on advice of my attorneys. I had already been in custody and released. They knew they only had to contact my lawyer and I would self-surrender.

RU: This must have all been a tremendous strain, coming as it did coupled with the death of your wife. Can you describe some of the thoughts and emotions you had around all this?

SK: I think all adults know the feelings of intense grief and depression that are brought about by the loss of a loved one. My feelings were in no way unique. But when you spice it with the adrenalin and the hyperanxiety of being attacked by the full weight of federal forces, which in turn causes all your survival instincts to really kick in, you have a bad trip from which you are not going to come down for a long time. In my case, it was six months or so before I started feeling anything approaching normal. This close proximity to mortality stemming from two different extremes (loss and attack) creates a feedback loop that turns your brain into static. Patterns of thought, emotion, and behavior deconstruct and seem to lose any identifiable point of origin. I was a zombie— an animated organic mass with modest brain function.

RU: Have you run into particularly Kafkaesque scenarios given this cases' attachment to The Patriot Act and Homeland Security?

SK: The case has been a hyperreal, bureaucratic grind, but I have yet to wait endlessly in any hallways not knowing why I was there or what I was charged with.

RU: Explain a little bit more about the project you were planning around these materials related to biological warfare and theater of the absurd.

SK: We did the projects. You can see them at our website at critical-art.net. We just recreated a couple of the experiments that different militaries did to see if germs were viable candidates for weaponization.

For the British Plague experiments, Critical Art Ensemble went to the Isle of Lewis in Scotland where they had originally been done. The British tests started south of this location and were land-based, but the results were so appallingly bad from a military perspective that they began to believe that the only way infectious disease could possibly be of use militarily was as a tactical ship-to-ship weapon. To test this idea they moved to an even less populated area (the Isle of Lewis). They put a bunch of monkeys and guinea pigs on a pontoon and started shooting germs at them in both powder and wet forms from about a mile away — a very difficult shot in the blustery weather of Northern Scotland.

The infection rates were again poor, and included a fishing vessel that unsuspectingly sailed through the experiment. The British Navy had to follow the vessel to make sure it didn’t land or make physical contact with other ships until they were sure no one on the boat was infected. No one was. The only conclusion reached from this experience was to move the test to the colonies — in this case, the Bahamas.

Critical Art Ensemble did the same thing, only we recreated the harmless simulant tests (not the actual plague tests), and only used guinea pigs overseen by the SSPCA — no monkeys. Our results were just as bad, so it seems as if we reliably replicated the test. CAE went to the end of the world to shoot bacteria at guinea pigs.

Can there be a more absurdist gesture than that? Well yes — one: Bush reinitiating a failed germ warfare program at public expense and at the cost of civilian interests in world and national health policy. The Bush administration is usurping public civilian agencies (such as the CDC and countless universities) and using them to play out the administration’s fantasies of a terrorist germ warfare attack. The resources to study infectious diseases are limited, and it's criminal to use them for a remote “what could be” scenario at the expense of real, ongoing health crises like AIDS, TB, hepatitis, malaria, and other diseases that are killing millions every year.

RU: I never thought of CAE as a really obscure project, since I'd read various manifestos or statements by you and seen stuff about you here and there. And yet, outside the avant-garde art community, very few people know about this bizarre and outrageous case. Do you think this says something about our cluttered and diffuse culture.

SK: I think you have stated the situation as well as I can. Information is ubiquitous and overwhelming. Only so much can be processed in a day. And when you think of how many outrages are occurring each day because of the war and the current U.S. constitutional crisis, who has time to follow one of the many ridiculous court cases brought by the Department of Justice?

One has to be motivated by a very direct interest in the case to take notice, no matter how precedent setting the case might be. In my case, the Department of Justice is attempting to completely implode civil and criminal law, but if you are not in the arts and sciences, there’s too many other events and situations to worry about.

RU: Is there some way we can make it more difficult for arbitrary authority to pick off people who are on the so-called fringes?

SK: I have no idea. The FBI has been a Dr. Jekyll/Mr Hyde type of institution from its inception. While I am happy for its work against organized crime, for example, I have always been completely outraged by its continuous assault on those individuals and sometimes entire communities (as with the current attack on peoples of Islamic faith) who openly express ideological difference. The FBI has worked against socialists and communists from the 20s through the 60s, and against the equal rights movements of the same period.

The COINTELPRO operations of the 60s and 70s are basically back, so exercising our rights is more risky than ever, but it’s for that very reason we must. Rights are won and kept through struggle, and in our struggle to preserve our Constitution, it pains me to say that the FBI is and has always been one of the anti-democratic enemies.

RU: What do you think abour Lynn Hershman's film, Strange Culture?

SK: It’s inspirational and well worth seeing. It has brought awareness about the case to new audiences.

RU: Did you participate in the creative direction at all?

SK: No.

RU: What kind of effect do you expect from it?

SK: Exactly what it’s doing — bringing an awareness of the case to people and communities that otherwise would not hear about it.

RU: According to the CAE defense fund FAQ, you were originally charged under prohibitions on biological weapons, but a grand jury instead handed down indictments related to "wire fraud" and "mail fraud." And then it also states that the terrorism charges could come back to haunt you.

I wonder how your attorneys are coping with all this. Are they simply trying to get across the absurdity of the whole mess, or are their any legal fine points?

SK: What they have been arguing in motion hearings is that the Department of Justice is making an absurd interpretation of the mail fraud law. The DoJ has thrown away its guidelines (which state my case should not be prosecuted) and interpreted the law in a way that is unique for my situation.

My co-defendant Bob Ferrell and I are the first citizens to ever be indicted for mail or wire fraud because we supposedly broke a material transfer agreement. The “defrauded” parties do not believe we did anything to harm them — the crime is a DoJ fantasy that they hope to prove. We’ll see at trial if rationality prevails.

If it doesn’t, the case will set a precedent that will mean that the Justice Department can drop a major felony on someone for filling out a warranty card incorrectly and mailing it. This will be a major tool for them. Talk about being able to pick off people at will!
http://www.10zenmonkeys.com/2007/09/...ism-who-cares/





Judge Rules Parts Of Patriot Act Unconstitutional

Download Judge's Ruling (.pdf)
AP

A federal judge ruled Wednesday that two provisions of the USA Patriot Act are unconstitutional because they allow search warrants to be issued without a showing of probable cause.

U.S. District Judge Ann Aiken ruled that the Foreign Intelligence Surveillance Act, as amended by the Patriot Act, "now permits the executive branch of government to conduct surveillance and searches of American citizens without satisfying the probable cause requirements of the Fourth Amendment."

Portland attorney Brandon Mayfield sought the ruling in a lawsuit against the federal government after he was mistakenly linked by the FBI to the Madrid train bombings in 2004.

The federal government apologized and settled part of the lawsuit for $2 million after admitting a fingerprint was misread.

But as part of the settlement, Mayfield retained the right to challenge parts of the USA Patriot Act.

Mayfield claimed that secret searches of his house and office under the Foreign Intelligence Surveillance Act, or FISA, violated the Fourth Amendment's guarantee that "the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause ..."

Aiken agreed with Mayfield, repeatedly criticizing the government.

"For over 200 years, this Nation has adhered to the rule of law -- with unparalleled success. A shift to a Nation based on extra-constitutional authority is prohibited, as well as ill-advised," she wrote.

She said that by asking her to dismiss Mayfield's lawsuit, the U.S. Attorney General's office was "asking this court to, in
essence, amend the Bill of Rights, by giving it an interpretation what would deprive it of any real meaning. This court declines to do so."

Elden Rosenthal, an attorney for Mayfield, issued a statement on his behalf praising the judge, saying she "has upheld both the tradition of judicial independence, and our nation's most cherished principle of the right to be secure in one's own home."
http://cbs5.com/breakingnewsalerts/l...269191331.html





Missouri: Police Stake Out Brett Darrow Home

A young Saint Louis, Missouri motorist faces trouble with local police upset at the national attention his September 7 video of an out-of-control officer has drawn to ongoing problems within area law enforcement agencies. On Sunday, Brett Darrow filmed a Saint Louis Metropolitan Police Department cruiser staking out his home.

"It was the first time I've seen it," Darrow told TheNewspaper. "But my neighbor said he's seen a lot of police down our dead end street since all of this happened."

When Darrow walked outside to his 1997 Nissan Maxima, he noticed two officers sitting in a marked squad car, numbered 65. There is little question as to why the officers were there.

"As I got into the car, he started to pull up the street and he and his partner just stared me down," Darrow explained.

The patrol car drove away as Darrow started his car and followed. Because his camera had been set to capture night-time footage, the first 45 seconds of the video is obscured. It does, however, capture the police car making questionable turning maneuvers in order to get away. Members of the police community are on the record regarding their desire to stake out Darrow's home and harass the twenty-year-old. In late June, users of St. Louis CopTalk, an unofficial forum for Saint Louis area law enforcement, posted Darrow's home address along with messages containing apparent death threats in retaliation for the young motorist's taping of a DUI roadblock in November and a traffic ticket in June. One CopTalk user repeating the address wrote, "Every copper, City and County, should etch this little punks [sic] name in their [sic] memory. Brett Darrow, [address deleted], city of St. Louis." (View screen capture of post)

This month, however, scandals within the Saint Louis Police Department which otherwise would have been a local story, gathered national attention and fueled additional resentment. Some $40,000 in cash turned up "missing" from the police evidence room on September 17. The city of St. George was forced to fire Sergeant James Kuehnlein for his threat to "come up with reasons" to "lock up" Darrow. An investigation into whether Kuehnlein's actions merit criminal charges is under way. Darrow met on Monday with a Saint Louis County Police Department detective.

"I quickly learned that this was about finding something I did wrong and not the officer," Darrow said.

Despite the official harassment, Darrow has been comforted by an unexpected level of support from the general public. Motorists who recognized him from various television interviews have stopped to thank him or give him the "thumbs up." A judge also dropped charges from the June traffic stop after a Saint Louis police officer failed to show up at a trial where Darrow had been prepared to defend himself with video evidence.
http://www.thenewspaper.com/news/19/1988.asp





Police Wiki Lets You Write the Law
Arjun Ramachandran

It's said the powerful write their own laws, but now everyone can.

Due to a new wiki launched by New Zealand police, members of the public can now contribute to the drafting of the new policing act.

NZ Police Superintendent Hamish McCardle, the officer in charge of developing the new act, said the initiative had already been described as a "new frontier of democracy".

"People are calling it 'extreme democracy' and perhaps it is," he said.

"It's a novel move but when it comes to the principles that go into policing, the person on the street has a good idea ... as they are a customer," he said.

"They've got the best idea about how they want to be policed."

NZ Police were reviewing the old Policing Act, from 1958, which had become "anachronistic" and was "written for a completely different age, not policing of today", Superintendent McCardle said.

But drafting new legislation "shouldn't just be the sole reserve of politicians", he said, so the wiki was created to invite input from members of the public.

Social networks strategist Laurel Papworth, who writes a blogs on how online communities change the way society operates, said "participatory legislation" was a "great idea".

"It empowers the voters to have a voice not just a vote, so that they are actually contributing to the dialogue and not just voting on the outcome," she said.

But input into the NZ Police Act wiki was not being limited to New Zealand voters, Superintendent McCardle said.

"The wonderful thing about a wiki is we can open it up to people all around the world - other academics and constitutional commentators interested in legislation - and make the talent pool much wider," he said.

Comment on whether the idea could work for NSW Police was being sought from Police Minister David Campbell.

But Ms Papworth said Australian governments had recently opened up to the public more through the use of online technology, such as forums and blogs.

But she was not aware of the use of wikis to invite public contribution to legislation.

Superintendent McCardle laughed off a suggestion that the initiative invited would-be criminals to write loopholes into the act to be exploited once it became law.

"We have been asked if we are worried about it being defaced, but wikis generally haven't been defaced internationally - people generally are constructive and productive," he said, referring to the success of Wikipedia, the popular wiki encyclopedia.

The wiki version of the Policing Act will be viewed by New Zealand parliamentarians, before an official bill is introduced into Parliament, Superintendent McCardle said.
The police act wiki can be found here: http://wiki.policeact.govt.nz
http://www.stuff.co.nz/4215797a10.html





Run Away the Ray-Gun is Coming : We Test US Army's New Secret Weapon
Michael Hanlon

"Where do I put my finger? There ... OK? Nothing's happening ... is it on?"

"Yes, it's on. Move your finger a bit closer."

"Er ... ow! OW!" Not good. I try again. "OWWW!" I pull my hand away sharpish. My finger is throbbing, but seems undamaged.

I was told people can take it for a second, maximum. No way, not for a wimp like me.



I try it again. It is a bit like touching a red-hot wire, but there is no heat, only the sensation of heat. There is no burn mark or blister.

Its makers claim this infernal machine is the modern face of warfare. It has a nice, friendly sounding name, Silent Guardian.

I am told not to call it a ray-gun, though that is precisely what it is (the term "pain gun" is maybe better, but I suppose they would like that even less).

And, to be fair, the machine is not designed to vaporise, shred, atomise, dismember or otherwise cause permanent harm.

But it is a horrible device nonetheless, and you are forced to wonder what the world has come to when human ingenuity is pressed into service to make a thing like this.

Silent Guardian is making waves in defence circles. Built by the U.S. firm Raytheon, it is part of its "Directed Energy Solutions" programme.

What it amounts to is a way of making people run away, very fast, without killing or even permanently harming them.

That is what the company says, anyway. The reality may turn out to be more horrific.

I tested a table-top demonstration model, but here's how it works in the field.

A square transmitter as big as a plasma TV screen is mounted on the back of a Jeep.

When turned on, it emits an invisible, focused beam of radiation - similar to the microwaves in a domestic cooker - that are tuned to a precise frequency to stimulate human nerve endings.

It can throw a wave of agony nearly half a mile.

Because the beam penetrates skin only to a depth of 1/64th of an inch, it cannot, says Raytheon, cause visible, permanent injury.

But anyone in the beam's path will feel, over their entire body, the agonising sensation I've just felt on my fingertip. The prospect doesn't bear thinking about.

"I have been in front of the full-sized system and, believe me, you just run. You don't have time to think about it - you just run," says George Svitak, a Raytheon executive.

Silent Guardian is supposed to be the 21st century equivalent of tear gas or water cannon - a way of getting crowds to disperse quickly and with minimum harm. Its potential is obvious.

"In Iraq, there was a situation when combatants had taken media as human shields. The battalion commander told me there was no way of separating combatants from non-combatants without lethal force," Mr Svitak tells me.

He says this weapon would have made it possible because everyone, friend or foe, would have run from it.

In tests, even the most hardened Marines flee after a few seconds of exposure. It just isn't possible to tough it out.

This machine has the ability to inflict limitless, unbearable pain.

What makes it OK, says Raytheon, is that the pain stops as soon as you are out of the beam or the machine is turned off.

But my right finger was tingling hours later - was that psychosomatic?

So what is the problem? All right, it hurts, but then so do tear gas and water cannon and they have been used by the world's police and military for decades.

Am I being squeamish?

One thing is certain: not just the Silent Guardian, but weapons such as the Taser, the electric stun-gun, are being rolled out by Britain's police forces as the new way of controlling people by using pain.

And, as the Raytheon chaps all insist, you always have the option to get out of the way (just as you have the option to comply with the police officer's demands and not get Tasered).

But there is a problem: mission creep. This is the Americanism which describes what happens when, over time, powers or techniques are used to ends not stated or even imagined when they were devised.

With the Taser, the rules in place in Britain say it must be used only as an alternative to the gun. But what happens in ten or 20 years if a new government chooses to amend these rules?

It is so easy to see the Taser being used routinely to control dissent and pacify - as, indeed, already happens in the U.S.

And the Silent Guardian? Raytheon's Mac Jeffery says it is being looked at only by the "North American military and its allies" and is not being sold to countries with questionable human rights records.

An MoD spokesman said Britain is not planning to buy this weapon.

In fact, it is easy to see the raygun being used not as an alternative to lethal force (when I can see that it is quite justified), but as an extra weapon in the battle against dissent.

Because it is, in essence, a simple machine, it is easy to see similar devices being pressed into service in places with extremely dubious reputations.

There are more questions: in tests, volunteers have been asked to remove spectacles and contact lenses before being microwaved. Does this imply these rays are not as harmless as Raytheon insists?

What happens when someone with a weak heart is zapped?

And, perhaps most worryingly, what if deployment of Silent Guardian causes mass panic, leaving some people unable to flee in the melee? Will they just be stuck there roasting?

Raytheon insists the system is set up to limit exposure, but presumably these safeguards can be over-ridden.

Silent Guardian and the Taser are just the first in a new wave of "non-lethal" weaponry being developed, mostly in the U.S.

These include not only microwave ray-guns, but the terrifying Pulsed Energy Projectile weapon. This uses a powerful laser which, when it hits someone up to 11/2 miles away, produces a "plasma" - a bubble of superhot gas - on the skin.

A report in New Scientist claimed the focus of research was to heighten the pain caused by this semi-classified weapon.

And a document released under the U.S. Freedom of Information Act talks of "optimal pulse parameters to evoke peak nociceptor activation" - i.e. cause the maximum agony possible, leaving no permanent damage.

Perhaps the most alarming prospect is that such machines would make efficient torture instruments.

They are quick, clean, cheap, easy to use and, most importantly, leave no marks. What would happen if they fell into the hands of unscrupulous nations where torture is not unknown?

The agony the Raytheon gun inflicts is probably equal to anything in a torture chamber - these waves are tuned to a frequency exactly designed to stimulate the pain nerves.

I couldn't hold my finger next to the device for more than a fraction of a second. I could make the pain stop, but what if my finger had been strapped to the machine?

Dr John Wood, a biologist at UCL and an expert in the way the brain perceives pain, is horrified by the new pain weapons.

"They are so obviously useful as torture instruments," he says.

"It is ethically dubious to say they are useful for crowd control when they will obviously be used by unscrupulous people for torture."

We use the word "medieval" as shorthand for brutality. The truth is that new technology makes racks look benign.
http://www.dailymail.co.uk/pages/liv...icle_id=482560





IBM Software to Scan Chicago Streets
Robert McMillan

The City of Chicago is developing a futuristic video surveillance system designed to scan city streets looking for everything from bombs to traffic jams.

For the past few years Chicago has been rolling out thousands of video surveillance cameras linked by fiber-optic cables. This Operation Virtual Shield system is intended to give the city's emergency response coordination agency the ability to remotely keep track of emergencies in real time.

Now, with the help of IBM Corp., Chicago's Office of Emergency Management and Communications (OEMC) is looking to expand the system's capabilities so that IBM's software can analyze the thousands of hours of video being recorded by Operation Virtual Shield.

"That's really going to just throw our camera network into hyperdrive," said Kevin Smith, a spokesman with the OEMC. "Ultimately I think what this software might be able to do is simply recognize suspicious behavior and alert our operations people and, at times, our crime detections specialists as to what it sees."

The software could recognize a package that had been left in a public park or a car parked where no car is supposed to be, Smith said.

IBM has been pushing a similar technology called Smart Surveillance System within the retail industry as a tool to fight shoplifting. The Smart Surveillance System was spun out of IBM's T.J. Watson Research Center earlier this year.

Now IBM is talking to a number of cities about rolling out similar projects, according to Sam Docknevich, a Digital Video Surveillance National Practice Leader with IBM. However none is as advanced as the Operation Virtual Shield effort. "Chicago is definitely the leading example of the value of integrating video from multiple organizations and using it to enhance public safety," he said.

OEMC's Smith would not say how much the city is spending on the project or when it expects IBM's video analytics capabilities to go live.

The trick will be to make the analytics software work in a useful way. "The challenge is going to be teaching computers to recognize the suspicious behavior," said Smith. "Once this is done this will be a very impressive city in terms of public safety."
http://security.itworld.com/4357/070...an/page_1.html





Wide-Angled Gigapixel Satellite Surveillance

High resolution images taken by satellite or aircraft are great - but the field of view in such pictures is tiny. To monitor a large area, the images have to be tiled like pieces in a jigsaw puzzle before a full picture can be built up.

This can cause problems: vehicles can end up appearing more than once if they move from one image to the next between exposures, for example. Such errors creep into virtual globes like Google Earth and Microsoft Virtual Earth and online mapping tools.

So a group of researchers at Sony and the University of Alabama have come up with a wide-angle camera that can image a 10-kilometre-square area from an altitude of 7.5 kilometres with a resolution better than 50 centimetres per pixel.

The trick is to build an array of light sensitive chips that each record small parts of a larger image and place them at the focal plane of a large multiple-lens system. The camera would have gigapixel resolution, and able to record images at a rate of 4 frames per second.

The team suggests that such a camera mounted on an aircraft could provide images of a large city by itself. This would even allow individual vehicles to be monitored without any danger of losing them as they move from one ground level CCTV system to another.

The camera could have military applications too, says the team. Mounted on the underside of an unmanned aerial vehicle, the gigapixel camera could provide almost real-time surveillance images of large areas for troops on the ground.
http://www.newscientist.com/blog/inv...satellite.html





Navy to Mask Coronado's Swastika-Shaped Barracks


SWASTIKA?: The buildings, constructed in the 1960s, are on the Coronado amphibious
base and serve as a barracks for Seabees. From the ground, or even adjoining buildings,
the configuration cannot be seen. Nor are there any civilian or military landing patterns
that provide such a view. But Google Earth shows the shape clearly.


Tony Perry

The U.S. Navy has decided to spend as much as $600,000 for landscaping and architectural modifications to obscure the fact that one its building complexes looks like a swastika from the air.

The four L-shaped buildings, constructed in the late 1960s, are part of the amphibious base at Coronado and serve as barracks for Seabees.

From the ground and from inside nearby buildings, the controversial shape cannot be seen. Nor are there any civilian or military landing patterns that provide such a view to airline passengers.

But once people began looking at satellite images from Google Earth, they started commenting about on blogs and websites about how much the buildings resembled the symbol used by the Nazis.

When contacted by a Missouri-based radio talk-show host last year, Navy officials gave no indication they would make changes.

But early this year, the issue was quietly taken up by Morris Casuto, the Anti-Defamation League's regional director in San Diego, and U.S. Rep. Susan Davis (D-San Diego).

As a result, in the fiscal year that begins Oct. 1, the Navy has budgeted up to $600,000 for changes in walkways, "camouflage" landscaping and rooftop photovoltaic cells.

The goal is to mask the shape. "We don't want to be associated with something as symbolic and hateful as a swastika," said Scott Sutherland, deputy public affairs officer for Navy Region Southwest, the command that is responsible for maintaining buildings on local bases.

The collection of L-shaped buildings is at the corner of Tulagi and Bougainville roads, named after World War II battles.

Navy officials say the shape of the buildings, designed by local architect John Mock, was not noted until after the groundbreaking in 1967 -- and since it was not visible from the ground, a decision was made not to make any changes.

It is unclear who first noticed the shape on Google Earth. But one of the first and loudest advocates demanding a change was Dave vonKleist, host of a Missouri-based radio-talk show, The Power Hour, and a website, www.thepowerhour.com.

In spring 2006, he began writing military officials, including then-Defense Secretary Donald Rumsfeld, calling for action.

That August, he received a response from officials in Coronado, who made no promise to take action and said, "The Navy intends to continue the use of the buildings as long as they remain adequate for the needs of the service."

In December, the now-defunct San Diego Jewish Times wrote about the buildings and the controversy. Soon Casuto and Davis got involved.

Casuto began an on-and-off dialogue with the chief of staff to Rear Adm. Len Hering, commander of Region Southwest. He said that several members of the Jewish community had complained to him.

"I don't ascribe any intentionally evil motives to this," Casuto said, referring to the design. "It just happened. The Navy has been very good about recognizing the problem. The issue is over."

Davis, who is Jewish, is also pleased with the Navy's decision.

During a discussion with military officials on other issues, Davis had mentioned the Coronado buildings and suggested that rooftop photovoltaic arrays might help change the overhead look. The base gets 3% of its power from solar energy and has been looking to increase that percentage.

Reached in Versailles, Mo., vonKleist, the talk-show host, said he was ecstatic.

"I'm concerned about symbolism," he said. "This is not the type of message America needs to be sending to the world."
http://www.latimes.com/news/local/la...la-home-center





Burmese Government Clamps Down on Internet
Mike Nizza

Burmese bloggers are now reporting that they are running into significant hurdles to getting the word out on the government’s crackdown.

“Burma is blacked out now!,” one blogger announced from Yangon, the country’s main city. More details from the post:

Internet cafes were closed down. Both MPT ISP and Myanmar Teleport ISP cut down internet access in Yangon and Mandalay since this morning. The Junta try to prevent more videos, photographs and information about their violent crackdown getting out. I got a news from my friends that last night some militray guys searched office computers from Traders and Sakura Tower building. Most of the downtown movement photos were took from office rooms of those high buildings. GSM phone lines and some land lines were also cut out and very diffficult to contact even in local. GSM short message sending service is not working also.

As protests built to more than 100,000, the government apparently allowed internal reports until three days into the crackdown, raising fears that it planned to intensify measures that left 9 dead on Thursday.

It also had immediate effects on the information flow out of the country. “Exile groups and human rights organizations who are in touch with people inside Myanmar said they had less news today than before about clashes,” Seth Mydans of The New York Times reported from Bangkok.

A blogger we wrote about on Thursday, Ko Htike, is also having major problems because of the internet cuts, losing the ability to put out a major part of his reporting so far.

He said he’s not “able to feed in pictures of the brutality by the brutal Burmese military junta,” but he still hoped to find “other means.” He also seemed sick of all the attention he’s been receiving lately from The Lede and other news outlets:

(Journos!! please don’t ask me what other means would be??). I will continue to live with the motto that “if there is a will there is a way”.

Michelle Malkin brings more bad news for Burmese bloggers:

Several popular dissident blogs had already gone dark the past few days before the “damaged underwater cable” shut down Internet accesss.

The fate of one prolific Burmese blogger, Moezack, is unknown. The entire blog has been wiped.

The government’s explanation, according to an official interviewed by Agence France-Presse, blames an extraordinarily timed bout with technical difficulties. “The Internet is not working because the underwater cable is damaged,” the official said.

Still, several sources from inside Burma continued to provide frequent updates; you can find them on several sites we mentioned on Thursday and Cbox, which is aggregating developments in matter-of-fact bulletins that paint vivid, scary pictures.

“The Police Station at South-Okkalarpa is being burnt down,” one entry says.

More Web sites are referred by an anonymous Burmese blogger writing to Global Voices today. The post carries more fears of the price the bloggers may pay for trying to document the uprising:

Information flow out of the country has been strictly monitored and even the amateur photographers are warned to be very careful as the Junta is hunting down the sources.
http://thelede.blogs.nytimes.com/200.../index.html?hp





Burma Cyber-Dissidents Crack Censorship
Stephanie Holmes

Burma's bloggers are using the internet to beat censorship, and tell the world what is happening under the military junta's veil of secrecy.

Images of saffron-robed monks leading throngs of people along the streets of Rangoon have been seeping out of a country famed for its totalitarian regime and repressive control of information.

The pictures are sometimes grainy and the video footage shaky - captured at great personal risk on mobile phones - but each represents a powerful statement of political dissent.

"It is amazing how the Burmese are able through underground networks to get things from outside and inside," says Vincent Brussels, head of the Asian section of press freedom organisation Reporters Without Borders.

"Before, they were moving things hand-to-hand and now they are using the internet - proxy websites, Google and YouTube and all these things."

On the inside

The use of the internet as a political tool is one of the most marked differences between the latest protests and the 1988 uprising, which was brutally repressed.

Thanks in part to bloggers, this time the outside world is acutely aware of what is happening on the streets of Rangoon, Mandalay and Pakokku and is hungry for more information.

Burmese-born blogger Ko Htike, based in London, has transformed his once-literary blog into a virtual news agency and watched page views rise almost tenfold.

He publishes pictures, video and information sent to him by a network of underground contacts within the country.

"I have about 10 people inside, in different locations. They send me their material from internet cafes, via free hosting pages or sometimes by e-mail," he told the BBC News website.

"All my people are among the Buddhists, they are walking along with the march and as soon as they get any images or news they pop into internet cafes and send it to me," he said.

Ko Htike is one of a number of Burmese online activists, almost all based beyond the country's borders.

Reporters without Borders describe how a guide for cyber-dissidents provided to young Burmese was seized upon, copied and feverishly disseminated among a growing group of the young, politically active and computer-literate.

Bloggers are teaching others to use foreign-hosted proxy sites - such as your-freedom.net and glite.sayni.net - to view blocked sites and tip-toe virtually unseen through cyberspace, swapping tricks and links on their pages.

Virtual space

The internet has also become a virtual space for political groups who could not openly express their shared views in public.

Ko Htike met his network of citizen journalists in an internet forum which was rapidly disbanded after initial contact had been made.

Such forums are also used as a space to alert bloggers whenever new content - stills or video - arrives.

"We normally use internet chat rooms, like Yahoo Messenger," Ko Htike said. "If they find it difficult, they call me. They don't say anything, they just give links or a code, they don't mention anything about it."

Analysts agree that, although internet access is currently at less than 1% of the population, the current regime underestimated its potential.

CENSORSHIP IN BURMA
Burma ranks 164 of 168 states on press freedom
0.56% of population has internet access
25,000 people have official email addresses (2005)
Two state-controlled internet providers
"Pervasive" filtering of political websites
Sources: Reporters Without Borders, OpenNet Initiative

The regime stopped focusing on policing its virtual borders after a power struggle which resulted in the ousting of former Prime Minister Khin Nyunt in October 2004, explains Mr Brussels.

"Khin Nyunt was a military intelligence guy, he had a big network of spies and people were quite wise about all these kind of controls. After he was removed, they no longer have much knowledge in this area," he said.

"There has been the opportunity for people on the inside to use their skills. These are young journalists and geeks, they know how to by-pass the blocking and the censorship."

Despite retaining total control of the country's only two internet providers and severely limiting internet usage - anyone who fails to register a computer with a state-sanctioned internet provider faces a 15-year prison term - Ko Htike says the current crisis has made the leadership highly aware of the threat posed by bloggers.

False information

He described how he has received personal e-mails - and protesters within Burma have received mobile phone text messages - spreading false information and rumours, for example about military crackdowns on protesters.

PROTESTS MOUNT
15 Aug: Junta doubles fuel prices, sparking protests
5 Sept: Troops injure several monks at a protest in Pakokku
17 Sept: The junta's failure to apologise for the injuries draws fresh protests by monks
18-21 Sept: Daily marches by monks in Burmese cities gradually gather in size
22 Sept: 1,000 monks march to the home of Aung San Suu Kyi in Rangoon
23 Sept: Up to 20,000 march in Rangoon
24 Sept: New Rangoon march draws at least 50,000 and 24 other towns join in

He is convinced these are spread by the Burmese authorities, trying to both influence protesters and hijack his website to spread government propaganda.

"Many people are reading my blog so if I put through fake news on the site it will affect people. They [the government] can see the hits, they can see that people are looking at my site... that means they are scared so they are trying to manipulate me, to use people power," Ko Htike said.

Compared with China's virtual and physical controls on internet use, however, Burma's systems are pretty unsophisticated, experts say.

"The Burmese government has a very repressive filtering regime... but it can be a bit inconsistent - one of the internet service providers blocks only international sites, the other only regional ones," said Ian Brown, a research fellow in internet privacy and security based at Oxford University's Internet Institute.

Burma's bloggers are adept at exploiting the loopholes.

"It is really important; people want to know what is going on in Burma," said Ko Htike.

Through his cyber-network he also aims to protect those who risk their lives to feed his blog, now banned inside the country.

"I monitor the news on Burma and I can keep updating my site. If something happens then we can warn them. We can do something, we can keep people aware."

Are you in Burma? Have you witnessed the protests? What is the mood like in the country? Send us your comments and experiences.

You can send pictures and video to: yourpics@bbc.co.uk or to send via MMS please dial +447725100100.

If you have a large file you can upload here. Read the terms and conditions

At no time should you endanger yourself or others, take any unnecessary risks or infringe any laws.

Name
Your E-mail address
Town & Country
Phone number (optional):
http://news.bbc.co.uk/go/pr/fr/-/2/h...ic/7012984.stm





Dan Rather Stands by His Story

His lawsuit will attempt to show that CBS tried to suppress the report on Bush's National Guard Service and the Abu Ghraib abuses.
Sidney Blumenthal

Dan Rather's complaint against CBS and Viacom, its parent company, filed in New York state court on Sept. 19 and seeking $70 million in damages for his wrongful dismissal as "CBS Evening News" anchor, has aroused hoots of derision from a host of commentators. They've said that the former anchor is "sad," "pathetic," "a loser," on an "ego" trip and engaged in a mad gesture "no sane person" would do, and that "no one in his right mind would keep insisting that those phony documents are real and that the Bush National Guard story is true."

If the court accepts his suit, however, launching the adjudication of legal issues such as breach of fiduciary duty and tortious interference with contract, it will set in motion an inexorable mechanism that will grind out answers to other questions as well. Then Rather's suit will become an extraordinary commission of inquiry into a major news organization's intimidation, complicity and corruption under the Bush administration. No congressional committee would be able to penetrate into the sanctum of any news organization to divulge its inner workings. But intent on vindicating his reputation, capable of financing an expensive legal challenge, and armed with the power of subpoena, Rather will charge his attorneys to interrogate news executives and perhaps administration officials under oath on a secret and sordid chapter of the Bush presidency.

In making his case, Rather will certainly establish beyond reasonable doubt that George W. Bush never completed his required service in the Texas Air National Guard. Moreover, Rather's suit will seek to demonstrate that the documents used in his "60 Minutes II" piece were not inauthentic and that he and his producers acted responsibly in presenting them and the information they contained -- and that that information is true. Indeed, no credible source has refuted the essential facts of the story.

Most cases of this sort are usually settled before discovery. But Rather has made plain that he is uninterested in a cash settlement. He has filed his suit precisely to be able to take depositions.

In his effort to demonstrate his mistreatment, Rather will detail how network executives curried favor with the administration, offering him up as a human sacrifice. The panel that CBS appointed and paid millions to in order to investigate Rather's journalism will be exposed as a shoddy kangaroo court.

Rather's complaint has already asserted a pattern of network submission to administration pressure, beginning with the Abu Ghraib story. In early 2004, Mary Mapes, a producer for "60 Minutes II" with more than two decades of experience, uncovered the torture at the Abu Ghraib prison in Iraq. Her sources were sound and the evidence incontrovertible, but according to Rather's complaint, "CBS management attempted to bury" the story. In a highly unusual move, then CBS News president Andrew Heyward and then senior vice president Betsy West personally intervened to demand editing changes and ever more "substantiation."

Rather's suit states that "for weeks, they refused to grant permission to air the story" and "continued to 'raise the goalposts,' insisting on additional substantiation." Even after Mapes gained possession of some of the now-infamous photographs of the torture of prisoners at Abu Ghraib (a full set of which was later obtained and posted by Salon), the news executives suppressed the story, "in part," according to Rather's suit, "occasioned by acceding to pressures brought to bear by government officials."

Gen. Richard Myers, then chairman of the Joint Chiefs of Staff, called Rather at his home, sources close to the case told me, telling him that broadcasting the story would endanger "national security." Myers explained to Rather that U.S. soldiers, just then poised for an assault on Fallujah, would be demoralized and suggested that Rather and CBS might threaten the outcome of the battle and the soldiers' safety.

Only when Seymour Hersh, investigative reporter for the New Yorker, relying on different sources from Mapes', unearthed the Abu Ghraib story and CBS executives learned that the magazine was about to scoop the network did they grudgingly permit it to be aired. "Even then," Rather's suit states, "CBS imposed the unusual restrictions that the story would be aired only once, that it would not be preceded by on-air promotion, and that it would not be referenced on the CBS Evening News." Feeling forced against their will to broadcast a story they knew was accurate, CBS's executives did everything within their power to ensure the public would pay as little attention to it as possible by prohibiting any mention of it. CBS's self-censorship set the stage for its reaction to the Bush National Guard story.

The widely accepted account that Mapes and Rather's original piece on Bush and the Guard was unproved and discredited has been based on the notion that the documents revealed were false. But three years after the heated controversy exploded, these premises appear very uncertain in the cold light of day.

Upon graduation from Yale in 1968, George W. Bush was accepted into the Texas Air National Guard, known as the "Champagne Unit" for serving as a haven for the privileged sons of the Texas elite seeking to escape duty in Vietnam. Through carefully placed calls made by Bush family friends, Bush was edged ahead of a 500-man waiting list. Then, after failing to complete his required hours of flight, he requested transfer to a unit in Montgomery, Ala. But there is no proof that he ever performed any of his service there; he refused to take a physical and was grounded. Ordered to return to his Houston base, he simply disappeared. Yet he was honorably discharged in 1973, though there is no proof that he had fulfilled his obligation.

During the 2000 campaign, the Boston Globe reported a number of discrepancies in Bush's National Guard record. However, the rest of the national press corps virtually ignored the Globe's stories, instead preferring to swarm around fictions about Al Gore helpfully stoked by the Bush campaign. Bush refused to make public his military records, in contrast to his principal primary opponent, Sen. John McCain, who had released his. But the press collectively let the matter pass. Nonetheless, the gaps in Bush's service as reported by the Globe had not been answered and hung in the air, if anyone cared to pursue them.

After breaking the Abu Ghraib story, Mapes, who lived in Texas and had reported on Bush when he was governor, began looking into the National Guard episode. By then, Sen. John Kerry, a decorated Vietnam War hero who was awarded the Silver and Bronze stars, had emerged as the Democratic candidate. The Bush operation arranged for funding a front group called Swift Boat Veterans for Truth to mount a smear campaign that Kerry had been dissembling all these years about his medals. Kerry's campaign, like Gore's, chose not to dignify obvious lies by responding, and the press lagged behind the story as it gained traction. Discrediting Kerry's greatest biographical asset was calculated to compensate for Bush's hidden liability. In February 2004, the Washington Post followed on the Boston Globe articles of 2000, and its reporters were unable to find anyone that could corroborate Bush's claim that he had served at an Alabama air base in 1972. To an aggressive journalist like Mapes it seemed logical to examine Bush's National Guard story, which remained a mystery.

The opaque story was partly illuminated by a piece in Salon, written by Mary Jacoby, on Sept. 2, 2004. Offering extensive documentation, including photographs and letters, Linda Allison, who had housed Bush during his missing year, explained that his drunken misbehavior was creating havoc for his father's political aspirations and that the elder Bush asked his old friend Jimmy Allison, a political consultant from Midland, Texas, now living in Alabama, to handle the wastrel son. "The impression I had was that Georgie was raising a lot of hell in Houston, getting in trouble and embarrassing the family, and they just really wanted to get him out of Houston and under Jimmy's wing," Linda Allison told Salon. During the time the younger Bush was under the watchful eye of the Allisons, he never went to a National Guard base or wore a uniform. "Good lord, no. I had no idea that the National Guard was involved in his life in any way," said Allison. She did, however, remember him drinking, urinating on a car, screaming at police and trashing the apartment he had rented.

On Sept. 8, "60 Minutes II" broadcast its story. It featured former Texas Lt. Gov. Ben Barnes, a Democrat, who disclosed that just before George W. Bush would be eligible for the draft, a mutual friend of then Rep. George H.W. Bush asked him to help procure the younger Bush a spot in the "Champagne Unit." Barnes appeared on camera, saying: "It's been a long time ago, but he said basically would I help young George Bush get in the Air National Guard. I was a young, ambitious politician doing what I thought was acceptable. It was important to make friends. And I recommended a lot of people for the National Guard during the Vietnam era -- as speaker of the House and as lieutenant governor. I would describe it as preferential treatment."

Then Rather, acting as correspondent, introduced new material drawn from the files of Col. Jerry Killian, Bush's squadron commander: "'60 Minutes' has obtained a number of documents we are told were taken from Col. Killian's personal file. Among them, a never-before-seen memorandum from May 1972, where Killian writes that Lt. Bush called him to talk about 'how he can get out of coming to drill from now through November.' Lt. Bush tells his commander 'he is working on a campaign in Alabama ... and may not have time to take his physical.' Killian adds that he thinks Lt. Bush has gone over his head, and is 'talking to someone upstairs.'"

Another Killian memo contained the coup de grâce: "I ordered that 1st Lt. Bush be suspended not just for failing to take a physical ... but for failing to perform to U.S. Air Force/Texas Air National Guard standards. The officer [then Lt. Bush] has made no attempt to meet his training certification or flight physical."

Within minutes of the conclusion of the broadcast, conservative bloggers launched a counterattack. The chief of these critics was a Republican Party activist in Georgia. Almost certainly, these bloggers, who had been part of meetings or conference calls organized by Karl Rove's political operation, coordinated their actions with Rove's office.

Questioned for the "60 Minutes" story, White House communications director Dan Bartlett had not denied the story but simply characterized it as "dirty." The right-wing bloggers raised questions about the authenticity of the Killian documents, arguing that typewriters of the time lacked the specific superscript in the documents, that the proportional spacing was wrong and the font anachronistic, and that therefore they were likely fabricated on a computer. Various handwriting and typewriter experts weighed in, some challenging the documents' authenticity. The press almost uniformly took the absence of a universal opinion of experts as proof of the documents' falsity. Because they could not be proved with complete certainty to be authentic, they must be counterfeit.

While the battle over the authenticity experts and assorted inconclusive sources continued, CBS interviewed Marian Carr Knox, who had been Col. Killian's assistant when the memos were allegedly produced. She didn't recall typing them and didn't believe Killian had written them (though various handwriting experts had verified his signature), but she also asserted, "The information in here is correct."

Under fire, CBS executives reeled backward. On Sept. 20, Heyward issued an apology: "Based on what we now know, CBS News cannot prove that the documents are authentic, which is the only acceptable journalistic standard to justify using them in the report. We should not have used them. That was a mistake, which we deeply regret." And Rather chimed in: "If I knew then what I know now -- I would not have gone ahead with the story as it was aired, and I certainly would not have used the documents in question." With these self-abasing mea culpas (Rather claims in his complaint that his statement was "coerced"), the veracity of the story about Bush's past seemed to be settled in his favor. But the underlying facts of the story were not discredited; nor was the authenticity of the documents resolved.

The day after these apologies CBS announced the creation of a review panel to determine "what errors occurred." Two Bush family loyalists, Richard Thornburgh, former attorney general in the elder Bush's administration, and Louis Boccardi, former executive editor and CEO of the Associated Press, were chosen to head the internal investigation. Thornburgh had been the subject of critical Rather reports, while Boccardi felt close and indebted to the elder Bush for being helpful as vice president in gaining the release of AP reporter Terry Anderson, held hostage for six years in Lebanon. Lawyers in Thornburgh's firm with no background in journalism and media performed the real work of the panel and wrote its final report.

As the panel called witnesses, Sumner Redstone, CEO of Viacom (CBS's owner), declared his interest in the 2004 election. "I look at the election from what's good for Viacom. I vote for what's good for Viacom. I vote, today, Viacom," he said. In fact, Viacom had a number of crucial issues before the Federal Communications Commission, including loosening media ownership rules. "I don't want to denigrate Kerry," said Redstone, "but from a Viacom standpoint, the election of a Republican administration is a better deal. Because the Republican administration has stood for many things we believe in, deregulation and so on. The Democrats are not bad people ... But from a Viacom standpoint, we believe the election of a Republican administration is better for our company."

Rather believed that the panel would conduct a fair-minded inquiry. But he learned that neither he nor Mapes would be allowed to cross-examine witnesses. They heard from some researchers on the "60 Minutes II" staff that before they had been questioned, a CBS executive had told them that they should feel free to pin all blame on Rather and Mapes. CBS had told Rather to cease investigating the story and had even hired a private investigator of its own, Erik Rigler. Rather and Mapes discovered that Rigler's investigation had uncovered corroboration for their story. Rather's complaint states that "after following all the leads given to him by Ms. Mapes, he [Rigler] was of the opinion that the Killian Documents were most likely authentic, and that the underlying story was certainly accurate." But rather than probing Rigler on his findings, the panel, to the extent its lawyers questioned him in a single telephone call, "appeared more interested whether Mr. Rigler had uncovered derogatory information concerning Mr. Rather or Ms. Mapes, as to which he had no information," according to the Rather complaint. Rigler's report was suppressed, never presented to the panel, and remains suppressed by CBS. Nor did the panel fully question James Pierce, the handwriting expert consulted by "60 Minutes" who insisted that the signature on the documents was surely Killian's.

When Mapes appeared before the panel, she was harshly questioned at length about her use of the word "horseshit." On the issue of the special privileges granted to those sons of wealth in the "Champagne Unit," Thornburgh asked her, "Mary, don't you think it's possible that all these fine young men got in on their own merits?"

When it came to the merits of the facts the panel elided them. It never addressed the facts at all. Instead it criticized the "60 Minutes" team for failing to "obtain clear authentication" of the Killian documents, among other "errors," though it admitted it could not prove one way or another whether they were inauthentic. Mapes and three other producers were dismissed. "60 Minutes II" was abolished. And on the day after Bush's reelection, Rather was unceremoniously fired. His contract had called for him to continue as anchor for an additional year and then to serve as a correspondent for "60 Minutes" and "60 Minutes II," but that promise was not honored. CBS believed that by severing its link with Rather it could put the whole incident behind it and begin a new happy relationship with the ascendant Republicans.

An article by James Goodale, former vice chairman and general counsel of the New York Times, in the New York Review of Books on April 7, 2005, and his subsequent exchange with Thornburgh and Boccardi, went little noticed. Goodale found the panel's report filled with flaws, lacking a factual basis, revealing an absence of due diligence and due process, and substituting empty legal concepts and language for any understanding of the actual gritty practice of journalism. Goodale determined that the "underlying facts of Rather's '60 Minutes' report are substantially true." He observed, "Since the broadcast, no one has come forward to say the program was untruthful."

Goodale's summation rejected the report and left its credibility in tatters: "The rest of the report, which is directed to the newsgathering process of CBS, is flawed. The panel was unable to decide whether the documents were authentic or not. It didn't hire its own experts. It didn't interview the principal expert for CBS. It all but ignored an important argument for authenticating the documents -- 'meshing.' It did not allow cross-examination. It introduced a standard for document authentication very difficult for news organizations to meet -- 'chain of custody' -- and, lastly, it characterized parts of the broadcast as false, misleading, or both, in a way that is close to nonsensical. One is tempted to say that the report has as many flaws as the flaws it believes it has found in Dan Rather's CBS broadcast."

But Goodale's magisterial and experienced voice seemed to be a faint cry in the wilderness. Who, after all, cared anymore?

In November 2005, Mapes published a memoir, "Truth and Duty," containing her memo to Thornburgh and Boccardi that they had failed to include in the appendix of the panel's report, although they reproduced many other memos and documents. Mapes' argument was that the Killian documents "meshed" with the facts in precise and nuanced ways. "The Killian memos, when married to the official documents, fit like a glove," she wrote. "There is not a date, or a name, or an action out of place. Nor does the content of the Killian memos differ in any way from the information that has come out after our story ... In order to conclude that the documents are forged or utterly unreliable, two questions must be answered: 1) how could anyone have forged such pristinely accurate information; and 2) why would anyone have taken such great pains to forge the truth?" But Mapes' book, like Goodale's article, was all but ignored.

Rather has always been an uncomfortable figure, sometimes abrasive, sometimes strangely inappropriate or baffling, given to rustic rhetoric at odd moments, and sometimes and suddenly lapsing into teary sentimentality or bursts of patriotic doggerel. Since his confrontations as the correspondent covering the Nixon White House, conservatives have targeted him as a symbol of the despised "liberal media." However idiosyncratic, Rather stood for the remnants of CBS's tradition of speaking truth to power, as Edward R. Murrow did finally about Sen. Joseph McCarthy and Walter Cronkite did finally about the Vietnam War and Watergate. The corporate unease with Murrow's outspokenness, leading to the cancellation of his weekly program, "See It Now" (depicted in the recent film "Good Night, and Good Luck"), was little different from the unease with Rather a half-century later. At last, the corporation's necessity for demonizing Rather coincided with the long-standing conservative demonizing.

When CBS replaced the edgy Rather with the sugary Katie Couric as anchor of the "Evening News," it imagined it had solved its problem, its "errors." The news would get softer, the Republicans in control of the White House and Congress would be nicer, Viacom would grab more media, and ratings would climb. Thus, dismissing Rather would yield untold dividends. Unfortunately for CBS's visionaries, none of that has worked out as planned. Couric simply lacks basic journalistic instincts and skills, and the "CBS Evening News" is at rock bottom in ratings and sinking farther.

Rather could have simply allowed the statute of limitations to run out, lived off his millions, and faded away. But the incident ate at him. On one level, the Bush National Guard story is about Bush and the National Guard. On another, of course, it is about Rather's reputation. But on yet another it is about CBS's overwhelming desire to please the Bush White House and censor itself. The White House campaign against Rather has been so successful that many in the national press corps behave as though in mouthing its talking points they are demonstrating their own independent thought.

On Sept. 20, the day after he filed his suit, Rather said, "The story was true." Rather's suit may turn into one of the most sustained and informative acts of investigative journalism in his long career. He is not going gentle into that good night.
http://www.salon.com/opinion/blument...n_rather_suit/





Boulder High Students Walk Out During Pledge, Recite Own Version
AP

About 50 Boulder High School students walked out of class Thursday to protest the daily reading of the Pledge of Allegiance and recited their own version, omitting "one nation, under God."

The students say the phrase violates the constitutional separation of church and state.

They also say the daily reading of the pledge over the school public address system at the start of the second class takes away from education time and is ignored or mocked by some students.

A state law passed in 2004 requires schools to offer the opportunity to recite the pledge each day but does not require students to participate.

The protesting students, members of the Student Worker Club, want administrators to hold the pledge reading in the auditorium during each of the school's two lunch periods for any students who want to participate.

Otherwise, they said, they plan to walk out each Thursday when the pledge is read and recite their version, which omits the reference to God and adds allegiance to constitutional rights, diversity and freedom, among other things.

"Boulder High has a highly diverse population, not all of whom believe in God, or one God," said Emma Martens, a senior and president of the club, which has about a dozen members.

"We didn't think it was fair for the whole school to have to listen to it. It's almost religious oppression," she said.

Principal Bud Jenkins told the Camera newspaper on its Web site Thursday the pledge will not be moved, but added he was proud of the students for standing up for their beliefs.

It was not immediately clear what discipline, if any, the protesting students would face.
http://www.denverpost.com/ci_7016257#





When Jim Crow Came to Town, With Eviction Notices
Manohla Dargis

There are ghosts haunting Marco Williams’s quietly sorrowful documentary “Banished,” about the forced expulsion of black Southerners from their homes in the troubled and violent decades after the Civil War. Dressed in what looks like their Sunday best, in dark suits and high-collar dresses, they stare solemnly into an unwelcoming world. A couple ride in a cart along a pretty country road, and others stand awkwardly before houses with peeling paint. There are few smiles. Photography was then a serious business, though being a black landowner, part of a fragile, nascent Southern middle class, was more serious still.

It’s stunning how loudly the dead can speak, and with such eloquence. I couldn’t help comparing these images with those in one of my own photo albums of a large family of stern-looking Midwesterners dressed in what looks like their Sunday best. The rough, ill-fitting suits and somber dresses look similar to those in the documentary, and the simple clapboard house looming behind this family recalls comparable homes in “Banished.” There are, once again, few smiles, though in one photo my grandfather, then around 12, looks as if he’s trying to keep one in check.

Unlike the young men in Mr. Williams’s documentary, my grandfather raised a family and ran a business not far from where his photographs were taken — an upstanding white citizen in a nearly all-white land. The young black men in “Banished” never had the chance to take root. Some were falsely accused of molesting white women and were lynched. We see a few of these dead in other photographs, hanging from trees and lampposts, their bodies sometimes surrounded by a visibly excited white crowd. (A crude sign under one corpse warns not to wake him.) As Mr. Williams explains, his measured voice-over calm as ever, lynching was an instrument of terror, used against blacks as a means of control and “racial cleansing.”

Mr. Williams isn’t one for hysterics or histrionics, even when seated across from a Ku Klux Klan leader who says he wouldn’t be happy if this African-American director moved in next door. The Klan leader lives in a nice-looking house adorned with white supremacist banners in Forsyth County, Ga., which in 1912 brutally expelled an estimated 1,000 of its black residents. Mr. Williams guides us through this terrible history, often while strolling on camera through the scene of the crime, talking to white residents and dredging up memories. He also uncovers some repellent images of a white mob trying to stop a peaceful, interracial civil rights march in the county in 1987. The marchers sing “We Shall Overcome.” The mob throws rocks.

There is so much more to the story than can be told by this 87-minute movie, which only casts glances at Reconstruction, the question of reparations and the bitter, enduring, living legacy of slavery. Although Mr. Williams somewhat overstates his case when he says that racial cleansing has “remained hidden,” there’s no denying that this ugly chapter deserves more than an occasional well-meaning documentary. (A national day of mourning might be a good start.) The 1997 fiction film “Rosewood” recounted one such expulsion that took place in central Florida in the 1920s, and journalists, activists and descendants, including those who appear in “Banished,” have dug into the archives and sifted through the evidence. Mr. Williams has done his own part to shed needed light, though I wish he had dug longer, harder.

In late 2006 The News & Observer in Raleigh, N.C., published a series about an 1898 white riot to destroy a political alliance between blacks and poor whites in Wilmington, N.C., where the literacy rates for black men were higher than those for whites. One agitator, a former Confederate soldier and the future mayor of Wilmington, vowed that he and other like-minded whites would never surrender “even if we have to choke the Cape Fear River with carcasses.” What followed was a coup d’état, possibly the only time that a municipal government was toppled in American history. Black residents were murdered; the local black newspaper was torched, and survivors exiled. Reconstruction died, and Jim Crow moved right in.


BANISHED


Opens today in Manhattan.


Directed by Marco Williams; written by Maia Harris and Mr. Williams; director of photography, Stephen McCarthy; edited by Kathryn Barnier and Sandra Christie; music by David Murray; produced by Mr. Williams and Ms. Harris. At the Film Forum, 209 West Houston Street, west of Avenue of the Americas, South Village. Running time: 87 minutes. This film is not rated.
http://movies.nytimes.com/2007/09/26/movies/26bani.html





Best Buy Adds Disclaimer To Secret Website

In response to being sued and humiliated on the internet over their "secret website," reader MK says Best Buy has added a disclaimer that warns customers that the in-store kiosk doesn't display the same prices as the public website.

For those of you new to this issue, Best Buy was caught using a duplicate website to fool customers who tried to compare internet prices with in-store prices.

Customers who asked why the price was higher in the store were often told that "the sale must have ended" in the time it took them to drive to the store. They were then told to "check the website" to see for themselves, then were shown an identical-looking website that displayed different "in-store" prices.

We think Connecticut Attorney General Richard Blumenthal said it best back in May (right after he sued Best Buy):
"Best Buy gave consumers the worst deal - a bait-and-switch-plus scheme luring consumers into stores with promised online discounts, only to charge higher in-store prices," Blumenthal said.

"The company commonly kept two sets of prices - one on its Internet site and an often higher set on its in-store, look-alike, available on kiosks. The in-store site was an Internet look-alike, commonly with higher prices, which were charged to consumers. Best Buy broke its promise to give the best price - an Internet version of bait-and-switch - a technological bait-and-switch-plus.

"Best Buy used in-store kiosks to conceal lower online prices and renege on its price match guarantee. Consumers seeking bargains were led to believe that lower online prices had expired or never existed. Best Buy treated its customers like suckers, not patrons to be prized."
We hope this disclaimer puts a stop to that sort of behavior.
http://consumerist.com/consumer/upda...ite-303124.php





Knocked Off by a Bargain

A consumer reporter learns the whole world is a street corner when he shops online for a set of earphones and finds a price too good to be true.
David Colker

I make my living writing about scams.

Check-cashing schemes, Nigerian frauds, fake Viagra -- I've covered them all. And in the back of my mind was always the sense that the victims must be a bit greedy or stupid.

Like me.

My comeuppance came this year when I went shopping online for high-end earphones and ended up with a fake.

And I don't mean crude knockoffs. I thought I was getting a brand-name product at a bargain price by being a smart shopper, just like my flea-market-loving mom taught me.

Lately, fake merchandise has become a genuine menace, moving far beyond the bogus Rolexes and Louis Vuitton handbags that have been sold for decades with a wink and a nod. Counterfeit toothpaste showed up in discount stores in June and fake wine has been popping up at auctions. In May, the Food and Drug Administration warned about counterfeit versions of the Xenical weight-loss drug purchased by consumers online.

The Internet opens up new vistas for hunting down the lowest possible price. And for getting scammed.

"It used to be that counterfeits was what you saw on a street corner in New York," market researcher Lauren Freedman said. "Now the whole world is a street corner."

When the Sennheiser CX-300 earphones arrived, they looked perfect. The black earbuds were adorned with company logos, the asymmetric cord was just the right length and the silver plug fit an iPod perfectly. They came in a snazzy Sennheiser package with text in six languages.

I had wanted a set of these earphones ever since I gave them a rave review last year in The Times. They sounded great and fit snugly in the ear. Perfect for gym workouts, just in case I ever got back to the gym.

List price -- $79.99. But only a fool pays list. Amazon.com had them for about $65.

I wasn't about to stop there. On the same Amazon product page was a link to Amazon Marketplace, where anyone can put an item up for sale. That's where the CX-300s were being offered for less than $25.

A drop from list price of more than 66% raised a warning flag, even though the seller with the best price, Wifipro, had a positive customer feedback rating. I wrote him an e-mail asking: Was the product, at his price of $24.99, used, refurbished or damaged?

Wifipro's reply: "These units are brand spanking new in factory blister pack, not returns, not used and not refurbished.

"They are a beautiful product at an unbelievable price."

I was sold. The price was so good, I almost felt like a bandit.

Indeed, it was a "beautiful product." But only, as it turns out, if you admire the work of counterfeiters.

Counterfeit electronic products have a history of being so obviously flawed that they're jokes. For example, U.S. Customs and Border Protection officials in Long Beach recently displayed seized packs of what was intended to look like Duracell batteries, except that the label read "Dinacell."

These days, no one in the industry is laughing much.

"I've seen fakes with our case, our logo, our address, even our instruction booklet, all faithfully reproduced, " said Lou Lenzi, a senior vice president for product management at Audiovox Corp., which makes a variety of electronics.

When the CX-300s arrived from Wifipro, I removed the medium-size cushions from the earbuds and tried replacing them with the smaller ones included in the package to better fit my ears.

But they wouldn't stretch over the earbuds, no matter how much I pulled on them. I figured someone else must have run into the same problem, so I did a search on the Web.

That's when I first came across a site: "How to spot fake Sennheiser cx300."

Still no worries. The fake depicted was a crude copy. But further digging made it clear there were several different fakes in circulation.

Finally, I happened upon a posting from a man who had bought a set identical to mine, also at a huge discount. He had sent a picture to Sennheiser and got a reply that the earphones "are almost certainly fake."

My heart sank. Now I knew what it was like to get cheated online. It was made worse by the fact that I thought myself so clever for getting such a bargain.

I sent the earphones to Sennheiser's experts, who said they were among the best counterfeits they had seen.

There was a clue, right on the front of the package.

"Look on the front where it says 'Blocks Outside Noise,' " said Uwe Sattler, technical director at Sennheiser. Under that, in the German translation, was the word Aussengerauche.

"They forgot the umlaut -- the two little dots -- over the second 'a,' " Sattler said.

Ah, the mystery of the missing umlaut. If I had been the German version of one of the Hardy Boys, I might have caught it.

"The fakes," said Jeff Alexander, Sennheiser's U.S. marketing chief, "are getting so much better."

And not just of Sennheiser products. Counterfeits of Audiovox's universal remote controls, sold under the RCA brand, have been cropping up worldwide.

"It used to be that you needed a very sophisticated facility to produce something like that," Lenzi said, "but now the technology is so widely available."

The counterfeiters start with reverse engineering to study the design and components, he said. Then, plastic injection machines and circuit board printers can be programmed to make a clone. Up to a point.

The emphasis is on appearance, not functionality. "It only has to be in good-enough operating condition to function, at least some," Lenzi said.

The counterfeit CX-300s varied greatly in audio quality. Andy Ukasick of Milwaukee bought a pair on EBay that he learned were fakes.

"They sounded terrible," he said in an interview. "No better than what you could pick up for $3."

Ian Moore of Chester, England, who got his on Amazon Marketplace, fared better. "The sound was good, but not what you expect from Sennheiser," he said. "There was no real bass."

Moore sent an e-mail to the seller, questioning the product's validity. He immediately got a reply from a Mr. Hussain, offering a full refund.

"Then I knew they were fakes," Moore said. "You expect the seller to say, 'How dare you.' But he was very apologetic."

Ukasick also got a quick refund from his seller -- Wifipro.

Iset out to find the man behind the moniker, Sidney Jacobs. It wasn't hard -- his name and return address were on the package the earphones arrived in. He operates his business in Southern California, only about 30 miles from my home.

Jacobs, 66, wasn't trying to hide. His picture was in his EBay seller's profile, where he described himself as a "Vietnam-era Vet" who had worked for large corporations. "I have said goodbye to the business suits, stuffed shirts and power ties," Jacobs wrote.

According to comments left on EBay and Amazon Marketplace, buyers started to identify the earphones as counterfeit in July, shortly after Jacobs began selling them. At first, he made fun of doubters.

"This is a very sick person," Jacobs wrote in response to negative feedback from an EBay buyer.

It was time to give Jacobs a call. He said that to start his online sales company, he bought Sennheiser earphones from an offshore distributor which he declined to identify. I told him that Sennheiser confirmed that the earphones he sold me were counterfeit. Jacobs didn't express shock but blamed the distributor.

"I had asked about the legitimacy of the products," Jacobs said, "and they said 'Yes, yes. They're the real thing.' "

Jacobs said he didn't know there might be a problem until several buyers questioned the authenticity of his earphones. Jacobs said they all got refunds. And with word getting around the Web about fake CX-300s, he prepared a note for customers. It was sent to potential buyers who specifically asked by e-mail if the earphones he was selling were the real thing.

"My products are in original factory package," said the note. "They look great and sound great. That being said, I will not guarantee with 100% certainty that they are genuine."

No such warning appeared on his selling sites.

Jacobs said he couldn't send the earphones back to the distributor. And he had a tale of woe -- a son still living at home, a mother-in-law with serious health problems.

"I have several thousand dollars invested in these items," Jacobs said. Besides, he was never completely convinced all his earphones were counterfeit. He pointed out that most of his customers, as evident in his feedback, were happy with the earphones they had received at a huge discount.

Jacobs asked if his name could be kept out of the newspaper. I told him no.

Finally, the specter of being identified as the seller of counterfeit goods outweighed the financial loss.

"You have put fear in my heart," Jacobs said. The earphones had to go.

"I am removing them immediately," he said, typing frantically in the background. "There, they are gone." Shortly after we spoke, $24.99 plus $4.99 for shipping was returned to my credit card account.

That was a surprise. I never asked for a refund, between feeling slightly sorry for the guy and fretting about my journalistic ethics -- after all, I was getting a story out of it.

Of course, counterfeits are still out there. Plenty of sellers still offer CX-300s at prices as low as $15 on the Internet.

I used to love to find bargains like that. Getting scammed was a good lesson, but it also took some of the fun out of the hunt.

"You know the old saying about, 'If it's too good to be true it probably isn't'?" said Freedman, the e-commerce analyst. "Well, it's true."

My mom used to say that, too. It was the part of her shopping lesson I relearned the hard way.
http://www.latimes.com/business/la-f...la-home-center





Real iTunes Killer: Review of Amazon's DRM-Less Music Download Store
Danny Mendez

Amazon's long awaited DRM-less music download store just hit the web, and, for a moment there, I thought it might have become vaporware. Thankfully, that didn't turn out to be the case, giving me a chance to put the store through its paces. Here's my review of the Amazon MP3 Download Store.

Amazon is going out on a limb here, offering DRM-less MP3 tracks at 256kbps at $0.89 per song. DRM-less music download stores have been done before, but they usually lack in music selection. Amazon is looking to change the music download world by giving users the opportunity to do anything they want with their music while offering a huge selection of both popular and unpopular/underground artists, but does it do this well?

Selection: What does it offer?

Because of my past experience with DRM-less music stores, I was expecting disappointment when I started searching for artists. Boy, I couldn't have been more wrong.

Amazon turned up multiple albums for nearly every artist I typed into the search box, and, for the few that it didn't find, it offered physical CDs for purchase through Amazon's traditional store.

Some of the artists I found include: Immortal Technique, Barry White, Kanye West, Sublime, Snoop Dog, NWA Minus the Bear, Psycostick, Royksopp, Sinai Beach, Yellowman, Madonna, Eminem, Paul Oakenfold, Pink Floyd, Guns N' Roses, Underoath, Maroon 5, The Rolling Stones, He is Legend, Johnny Cash, and more.

Unfortunately, and this would be expected from any download store, I was unable to find a significant amount of the much smaller bands that I listen to; however, the MP3 Download Store is still in beta form with new content being added every day. Regardless, the selection is overall impressive.

Pricing: Is it worth it?

Pricing for an individual song is $0.89 as opposed to iTunes, which offers singles at $0.99 a piece. Albums range anywhere from under two dollars to over over $20.

Generally, I found pricing to be the same as or less than what is offered in the iTunes store. For example, DJ Tiesto's Just Be goes for $6.99 on Amazon's MP3 Download Store, but it goes for $9.99 at the iTunes store. However, Paul van Dyk's Global costs $12.99 at both stores. Never did I find an album to be more expensive at the Amazon store and I wouldn't expect it as Amazon is strongly going after value.

An added benefit of downloading your music via Amazon as opposed to iTunes is the lack of DRM. Most of iTunes' music comes encoded with DRM, preventing you from using YOUR music on anything other than an iPod or the computer to which the music is registered.

iTunes music also comes in AAC format at 192kbps, a music format that is not supported on many other devices. Amazon's music comes in MP3 format at 256kps, a format that is largely supported on other devices and the higher bitrate provides for better sound quality. In fairness, I should note that Apple offers a small portion of their content DRM-free at 256kbps AAC, but that only applies to any music from the record label EMI.

The Download Experience

In order to download music via Amazon, you first have to install the Amazon download manager, which is required for albums but not for singles. The installation was really easy on my iMac, which only required a few clicks and not even a drag-and-drop to the Applications folder. I'm sure the process would have been just as easy on a Windows machine.

Similar to iTunes, Amazon lets you preview most tracks before you download them. This came in really hand as I searched for an album to purchase.

I found Pauk van Dyk's Global, tested it, and went through with the purchase. I already had an Amazon account, so all I had to do is click the "Buy MP3 album with 1-Click" and it was mine. When you purchase an album, your computer downloads a very small file. Normally, you can open this file automatically in the Amazon download manager without it touching your desktop, but I accidentally downloaded it directly to my desktop. I simply double clicked the file, and the manager opened up.

The time it took to download the songs took a bit longer than expected. I was expecting it to be just as quick as iTunes, but that was not the case. Although, faster than anything I've ever experienced downloading via P2P, the slower-than-iTunes download speed could have been attributed to my college network being on overhaul around this time of the day, mid afternoon. Either way, it took about 10-15 minutes to download Global, which consists of 10 eight minute songs. As each song finished downloading, the download manager placed the files conveniently in their correct artist and album folders in my iTunes music folder.

Here's the Deal

The Amazon MP3 Download Store is absolutely great. Even in it's beta stage I can confidently call it the best online download store - period.

Simply the fact that it offers its vast selection of music without DRM makes it better than iTunes, and iTunes doesn't stand a chance when it comes to pricing. There's also no monthly fee, a feature that gives eMusic great value but forces you to pay the fee up front every month, which could easily go to waste as my problem with eMusic is that I could hardly find anything of interest to me.

Apple better act quick if it wants to keep up because, as of today, all that's going for the iTunes Store is its popularity. DRM on music is dead, and any company that doesn't understand that is going to get left in the dust. But those that embrace the changing times are going to be looking at a profitable future.
http://tech.blorge.com/Structure:%20...ownload-store/





An Oracle Part Man, Part Machine
George Johnson

IN the 12th century A.D., when the Arabic treatise “On the Hindu Art of Reckoning” was translated into Latin, the modern decimal system was bestowed on the Western world — an advance that can best be appreciated by trying to do long division with Roman numerals. The name of the author, the Baghdad scholar Muhammad ibn Musa al-Khwarizmi, was Latinized as Algoritmi, which mutated somehow into algorismus and, in English, algorithm — meaning nothing more than a recipe for solving problems step by step.

It was the Internet that stripped the word of its innocence. Algorithms, as closely guarded as state secrets, buy and sell stocks and mortgage-backed securities, sometimes with a dispassionate zeal that crashes markets. Algorithms promise to find the news that fits you, and even your perfect mate. You can’t visit Amazon.com without being confronted with a list of books and other products that the Great Algoritmi recommends.

Its intuitions, of course, are just calculations — given enough time they could be carried out with stones. But when so much data is processed so rapidly, the effect is oracular and almost opaque. Even with a peek at the cybernetic trade secrets, you probably couldn’t unwind the computations. As you sit with your eHarmony spouse watching the movies Netflix prescribes, you might as well be an avatar in Second Life. You have been absorbed into the operating system.

Last week, when executives at MySpace told of new algorithms that will mine the information on users’ personal pages and summon targeted ads, the news hardly caused a stir. The idea of automating what used to be called judgment has gone from radical to commonplace.

What is spreading through the Web is not exactly artificial intelligence. For all the research that has gone into cognitive and computer science, the brain’s most formidable algorithms — those used to recognize images or sounds or understand language — have eluded simulation. The alternative has been to incorporate people, with their special skills, as components of the Net.

Go to Google Image Labeler (images.google.com/imagelabeler) and you are randomly matched with another bored Web surfer — in Korea, maybe, or Omaha — who has agreed to play a game. Google shows you both a series of pictures peeled from the Web — the sun setting over the ocean or a comet streaking through space — and you earn points by typing as many descriptive words as you can. The results are stored and analyzed, and through this human-machine symbiosis, Google’s image-searching algorithms are incrementally refined.

The project is still experimental. But the concept is not so different from what happens routinely during a Google search. The network of computers answering your query pays attention to which results you choose to read. You’re gathering data from the network while the network is gathering data about you. The result is a statistical accretion of what people — those beings who clack away at the keys — are looking for, a rough sense of what their language means.

In the 1950s William Ross Ashby, a British psychiatrist and cyberneticist, anticipated something like this merger when he wrote about intelligence amplification — human thinking leveraged by machines. But it is both kinds of intelligence, biological and electronic, that are being amplified. Unlike the grinning cyborgs envisioned by science fiction, the splicing is not between hardware and wetware but between software running on two different platforms.

Several years ago, SETI@home became a vehicle for computer owners to donate their spare processing cycles for the intense number-crunching needed to sift radio-telescope data for signs of extraterrestrial life. Now a site run by Amazon.com, the Mechanical Turk (www.mturk.com), asks you to lend your brain. Named for an 18th-century chess-playing automaton that turned out to have a human hidden inside, the Mechanical Turk offers volunteers a chance to search for the missing aviator Steve Fossett by examining satellite photos. Or you can earn a few pennies at a time by performing other chores that flummox computers: categorizing Web sites (“sexually explicit, “arts and entertainment,” “automotive”), identifying objects in video frames, summarizing or paraphrasing snippets of text, transcribing audio recordings — specialties at which neural algorithms excel.

(Not all of these Human Intelligence Tasks, or HITs, as Amazon calls them, involve serving as a chip in some entrepreneur’s machine. Hoping to draw more traffic to their sites, bloggers are using the Mechanical Turk to solicit comments for their online postings. In some cases you get precisely 2 cents for your opinion.)

In his 1950 paper “Computing Machinery and Intelligence,” Alan Turing foresaw a day when it would be hard to tell the difference between the responses of a computer and a human being. What he may not have envisioned is how thoroughly the boundary would blur.

How do you categorize Wikipedia, a constantly buzzing mechanism with replaceable human parts? Submit an article or change one and a swarm of warm- and sometimes hot-blooded proofreading routines go to work making corrections and corrections to the corrections.

Or maybe the mercurial encyclopedia is more like an organism with an immune system of human leukocytes guarding its integrity. (Biology too is algorithmic, beginning with the genetic code.) When the objectivity of Wikipedia was threatened by tweaking from special interests — a kind of autoimmune disease — another level of protection evolved: a Web site called WikiScanner that reports the Internet address of the offender. Someone at PepsiCo, for example, removed references about the health effects of its flagship soft drink. With enough computing power the monitoring could be semiautomated — scanning the database constantly and flagging suspicious edits for humans to inspect.

No one but a utopian would have predicted how readily people will work for free. We’re cheaper than hardware — a good thing considering how hard we are to duplicate.
http://www.nytimes.com/2007/09/23/we...=1&oref=slogin





Victorious RIAA Defendant Gets Attorneys' Fees, Turns to Class-Action Plans
Eric Bangeman

Calling the RIAA's case unjustified "as a reasonable exploration of the boundaries of copyright law," a federal magistrate judge late last week awarded former RIAA defendant Tanya Andersen attorneys' fees for her nearly two-and-a-half-year fight against a copyright infringement lawsuit.
RIAA spends thousands to obtain $300 judgment

Andersen is a disabled single mother living in Oregon with her now 10-year-old daughter. In February 2005, she was sued by the record labels, which accused her of using KaZaA to distribute gangster rap under the handle "gotenkito." From the outset, she denied all wrongdoing, and in October of that year, filed a countersuit against the record industry, accusing it of racketeering, fraud, and deceptive business practices.

The RIAA continued to press its legal claims against Andersen, despite any evidence other than an IP address tying her to the alleged infringement. Andersen even provided the name, address, and phone number of the person she believed was responsible for the "gotenkito" account. Inexplicably, the RIAA chose not to contact him for over two years, then chose to take his denial at face value, choosing instead to continue prosecuting the case against Andersen.

Throughout its prosecution of the case, Andersen accused the RIAA of underhanded investigative tactics. These included what Andersen describes as inappropriate attempts to contact her daughter. In one instance, the RIAA's investigators allegedly contacted her elementary school, posing as a relative in an attempt to speak with then-eight-year-old Kylee Andersen about the alleged infringement. Even the RIAA's own forensic investigator reported that he could not find "any evidence whatsoever" that Andersen had used KaZaA.

In June of this year, the RIAA finally came to the conclusion that it had an unwinnable case and decided to drop the case prior to its going to trial. The parties stipulated to a dismissal with prejudice—unusual for the RIAA, since it made Andersen the prevailing party and eligible for attorneys' fees. Andersen dismissed her counterclaims without prejudice (meaning she can refile them) after she filed a malicious prosecution lawsuit against the RIAA.

In his order awarding Andersen attorneys' fees, US Magistrate Judge Donald C. Ashmanskas noted that he had to make a decision on this case "without ever addressing the merits of the claims or the counterclaims." Despite that, Judge Ashmanskas noted that there had been a "material alteration of the legal relationship of the parties," and that with the sole exception of attorneys' fees, Andersen had gotten "all the relief available to a defendant of a claim for copyright infringement."

Judge Ashmanskas also cited the RIAA's admission that the "evidence uncovered during discovery proved inconsistent and inconclusive," a fact for which the labels could provide no explanation. He concludes that the RIAA lacked the prima facie evidence to support the claims of infringement.

"Whatever plaintiffs' reasons for the manner in which they have prosecuted this case, it does not appear to be justified as a reasonable exploration of the boundaries of copyright law," wrote the judge. "Copyright holders generally, and these plaintiffs specifically, should be deterred from prosecuting infringement claims as plaintiffs did in this case."

While Andersen's attorney adds up the bills, Andersen is seeking class-action status for her malicious prosecution lawsuit. Saying that the RIAA "has engaged in a coordinated enterprise to pursue a scheme of threatening and intimidating litigation in an attempt to maintain its music distribution monopoly," Andersen wants to make a class from those who have been wrongfully sued by the RIAA; if successful, the RIAA could find itself locked in a long and costly legal battle.
http://arstechnica.com/news.ars/post...ion-plans.html





Not Much Anonymity for Unprotected File-Sharers

UC Riverside researchers examine peer to peer networks

The same technology that allows easy sharing of music, movies and other content across a network also allows government and media companies easy access to who is illegally downloading that content.

In a paper called “P2P: Is Big Brother Watching You?” (PDF) three University of California, Riverside researchers show that a substantial number of people on file sharing networks, approximately 15 percent, are there to troll for illegal file sharing activity on behalf of the recording industry or the government.

Graduate student Anirban Banerjee, and computer science professors Michalis Faloutsos and Laxmi Bhuyan, decided to find out whether file-sharers are always being observed. Over 90 days in mid-2006 they recorded file-sharing traffic on Gnutella, a common fire-sharing network.

“We found that a naïve user has no chance of staying anonymous,” said Banerjee. “One hundred percent of the time, unprotected file-sharing was tracked by people there to look for copyright infringement.”

However, the research showed that “blocklist” software such as (PeerGuardian, Bluetack, and Trusty Files) are fairly effective at reducing the risks of being observed down to about 1 percent.

Peer to Peer networks, known as “P2P,” allow users to quickly and without cost, share movie, music and other digital files located on their individual PCs with other network users. In September 2003, the Recording Industry Association of America (RIAA) filed the first of thousands of lawsuits that targeted individuals who illegally offered copyright-protected music through P2P networks, but the action did not seem to diminish the numbers of people who shared files. The film industry is taking a similarly aggressive stance on prosecution.

“P2P: Is Big Brother Watching You?” was named “best paper” at the Networking 2007 conference of the IFIP (International Federation for Information Processing) in Atlanta, GA, and was published among the conference proceedings.

Since that time, the study has been the subject of some discussion at www.digg.com and www.torrentfreak.com, two popular technology-based social networking sites.

“Of course no one is suggesting that illegal downloading is a good idea,” Faloutsos said. “But the P2P technology is here to stay and these industries would be better off trying to find ways to provide affordable and convenient alternatives that would allow computer users to download their products legally,” said Faloutsos.
http://www.newsroom.ucr.edu/cgi-bin/display.cgi?id=1673





Downed Blogger Murray Vows to Continue Usmanov Attacks
Chris Williams

Former UK ambassador to Uzbekistan Craig Murray has vowed to carry on making allegations against billionaire Arsenal shareholder Alisher Usmanov, despite attempts to silence him and his supporters.

Murray told The Reg: "If the man believes he was libelled then he should take me to court."

Murray's blog was deleted by its host on Friday after threats from Usmanov's UK legal team. It's expected to reappear in the early hours of tomorrow on an overseas server, and will repeat the charges that drew heavy fire from specialist libel firm Schillings.

The ex-diplomat says he has contacted Schillings to ask for clarification of which specific aspect of his allegations they contest, but has not received a response. "They say my book [Murder in Samarkand] is 'grossly libellous and defamatory', yet it has been widely available for a year and has sold 25,000 copies, without their actually taking any legal action," he added.

Murray's criticism of Usmanov stems from his rise in Uzbekistan following the collapse of communism to become one of Russia's richest men. He denies the accusations. His profile in the UK has skyrocketed since he followed Chelsea chairman and fellow oligarch Roman Abramovich into football investment.

Murray's blog entry about Usmanov, made September 2, were picked up by many political and Arsenal websites which later also received complaints from Schillings. It became the third-highest hit on Google for the search "usmanov", but was quickly removed from Murray's site after the first legal letter.

Tim Ireland, who runs the political site Bloggerheads.com, which was downed along with Murray's site, has slammed Fasthosts' action (http://b-heads.blogspot.com/), and denied the claim that they refused to comply with takedown requests after he repeated Murray's allegations.

Fasthosts says it acted according to standard industy practice and has declined to answer Reg questions.

Ireland said Fasthosts has so far failed to provide copies of two of the three complaints made by Schillings. "We don't have any of the correspondence despite multiple requests," he said.

The third complaint was made weeks after the September 2 post was removed. The takedown meant the Google robot instead indexed another piece Murray had penned in October 2005 that included the name.

On contact from Fasthosts, site administrator Clive Summerfield suspended the site and wrote back to Fasthosts to suggest that it, Schillings, Ireland and Murray liase on what was acceptable. Fasthosts responded by pulling the plug on his two dedicated servers on Friday.

Bloggerheads and crsigmurray.co.uk were part of a small stable of sites run by Summerfield. This connection explains the deletion of Tory mayoral hopeful Boris Johnson's site, despite it having no involvement in the Usmanov affair. The action also downed the website of the London Bach Society and an independent record label.

The new hosting has been arranged separately from the rest of Summerfield's sites - Murray believes that Usmanov's lawyers are trying to make him back down by attacking others.

We asked Murray if he intends to stay on Usmanov's back. He replied: "There is room on Usmanov's back for an awful lot of people. You could get even more on his stomach, and possibly lose some under the overlap of his chins."

We think that's a "yes".
http://www.theregister.co.uk/2007/09...manov_defiant/





Intellectual Property Laws Abused in Quest to Shutdown Lowes-Sucks.com
Jacqui Cheng

The tagline for home improvement superstore Lowe's may be "Let's Build Something Together," but that "something" sure isn't good PR when it comes to dealing with public criticism online. One angry customer was so dissatisfied with Lowe's work and customer service that he was spurred into putting up a web site called Lowes-Sucks.com in order to air his grievances. Lowe's was unhappy with this public display of dissatisfaction and took a "creative" approach to getting him to take it down—accusations of trademark infringement. After a bit of back and forth, Lowe's has relented by making an offer to settle out of court, but has suddenly fallen silent upon the customer's counteroffer.

Let's back up a little bit. Lowe's customer and Ars Technica reader, Allen Harkleroad, had a fence installed at his home by a Lowe's "professional." Upon further inspection, however, Harkleroad discovered that the $3,500 job came complete with what he considered to be shoddy workmanship. Fence posts were loose, parts became easily disjointed, and the gate door did not fully close, among other things. Harkleroad said that his dogs were able to escape several times, and that when he complained to customer service, he was told that the installer would need to come back out to fix the fence. When he called the installer, he said that Lowe's had to tell him to go fix the fence. Harkleroad decided that he would refuse to pay the remainder of his balance until the situation was fixed, but Lowe's was having none of that. The billing department told him that it wasn't their problem and proceeded to turn Harkleroad's account over to collections.

It was at this point that Lowes-Sucks.com was born, but Lowe's was having none of that either. Last week, Harkleroad received a cease-and-desist letter from the company, accusing him of unauthorized use of the company's intellectual property on his site. "Your use of the Lowe's Marks and your registration of www.Lowes-sucks.com is unauthorized by LF, distorts the goodwill of LF's federally-registered trademarks, and constitutes infringement of LF's trademark rights," reads the letter signed by Lowe's trademark manager Rebecca Green. Part of the problem with this accusation is that Harkleroad's site contains absolutely no logos, graphics, or other "marks" from Lowe's, and otherwise would not be identifiable as being related to Lowe's at all except for the name in the URL and the content of the site itself (which is unlikely to be mistaken for the company's official web site).

Harkleroad also points out that the infringement notice failed to identify the alleged trademark infringements, and fails to recognize that the site is a parody. "I also might remind you that USC 15 1125(a) is in correct [sic] in regards to your claim of infringement, you need to come up with something better than that. Better go grab that US Code book you are referring from and find something that you believe matches more closely," wrote Harkleroad in response to the letter.

At that point, the Electronic Frontier Foundation (EFF) hopped on Harkleroad's side to provide legal counsel and help defend him against what he claims were abuses of the law in an attempt to bully him—the story was also picked up by a number of online news outlets. Suddenly, Lowe's attorneys made Harkleroad an offer on Monday to settle the issue out-of-court, which Harkleroad discussed optimistically on his site. "My thanks to Lowe's for allowing us to (possibly) come to a mutually acceptable agreement for both parties, that is of course if this all gets finalized as I do believe it will. If it does this will be the last post or comment I make about the issue on this web site," he wrote.

But that's apparently where the story has ground to a halt once again. Harkleroad tells Ars that he and his attorney made a counteroffer to the settlement, and have since not heard back. "I think they are thinking that for the most part the issue is over," he told us. He has declined to comment on the details of the offer and counteroffer, but Harkleroad says that he has not heard any word back for several days.

Harkelroad's attorney, EFF staff attorney Corynne McSherry, acknowledged that the two parties are in discussions about a settlement, but declined to provide details as the "discussions are confidential." She did, however, point out that the courts have been clear that "gripe sites like this are protected—in fact, they want people to speak freely and share information about their experiences with various companies." She said that trademark holders sometimes lose sight of the point of trademark law, which is to protect consumers and provide them with good information about a company's product. Sites like Lowes-Sucks.com provide information on someone's consumer experience, she said, which is not only allowed under trademark law, but protected by the First Amendment. "There is no legal question here that they don't have a trademark claim," McSherry told Ars.

This isn't the first time companies have attempted to use some arbitrary aspects of intellectual property law to silence public criticism online. Universal Music Group sent DMCA takedown notices to YouTube over a highly critical video of rapper Akon was posted by Michelle Malkin—eventually the EFF got involved and the clip was restored to YouTube. The EFF also filed a lawsuit against "paranormalist" Uri Geller for sending DMCA takedown notices over videos that were not created by him, but by another company that had created a documentary that was critical of his work and posted it to YouTube.

So what is the lesson to be learned in all of this? While Harkleroad's case with Lowe's is not quite over, it appears as if the company is backing off of its trademark infringement claims (Harkleroad notes on his web site that the issue of officially retracting the claim is still being worked out between the attorneys). But the attempt to even make such a claim is still troubling, given the Internet's availability as a public soap box, where nearly anyone with grievances to air is allowed to do so. In another case where Viacom "mistakenly" misused the DMCA to have a parody taken down, the company agreed as part of its settlement with the EFF to educate its reviewers about fair use and promised not to challenge the use of its content if it is "creative, newsworthy, or transformative." The EFF isn't exactly known for backing down over cases like this, so we look forward to hearing about whatever resolution may come out of the Lowe's case. Harkleroad told us that if the two are unable to come to a resolution, he is still willing to take the case to court in Georgia.
http://arstechnica.com/news.ars/post...sucks-com.html





Quake Fears, Ancient Finds Have Europe-Asia Tunnel on Nonstop Delay
Julian Smith

In the fifth and sixth centuries AD, Constantinople was the center of the world. Built at the mouth of the Bosporus Strait, it connected the Black Sea to the Mediterranean and linked Europe and Asia. The commerce, politics, and culture of much of the planet swirled around the basilicas and markets. Named for the first Christian Roman emperor, the city was the capital of Byzantium and the prize of marauding armies, from Crusaders to Huns.

The region is still a crossroads. But now it's Istanbul, not Constantinople — a megalopolis of 10 million people that straddles East and West. And everyone has a car. Two traffic-clogged bridges cross the Bosporus, and auto exhaust chokes the streets and eats away historic architecture. The city has aboveground rail lines and a vestigial subway system, but hardly anyone rides them. So a decade ago, the Turkish government announced that it would fulfill the ancient dreams of sultans, with an ambitious plan to dig a tunnel under the strait.

In fact, the Turks are trying to remake how people get around — and through — the city. The $3 billion Marmaray Project (named for the body of water just outside the strait and the Turkish word for rail) will consist of 48 miles of new railroad, 37 rebuilt train stations aboveground and three new ones below, and eight miles of tunnel connecting Istanbul's western, European side to the Asian east. Most of that underground rail line will be chewed through bedrock by digging machines wider than a 747. But one mile will be different, immersed beneath the shifting bed of the Bosporus. It'll be the deepest such tunnel in the world, under 180 feet of water and 15 feet of earth, made of 11 steel-and-concrete sections that can be as long as 440 feet and weigh 18,000 tons.

When it's finished in 2012 — currently two years behind schedule — the project will change how the continents connect. Rail travelers (and rail cargo) currently have to transfer to a ferry for a three-hour journey across the city; that'll drop to less than two hours. Ideally, the tunnel will also relieve some of the pressure on those bridges. And when the Marmaray Project is integrated into a planned railway through Azerbaijan, Georgia, and Turkey, you'll be able to hop on a train in London, wave at the Hagia Sofia, and step off days later in Beijing.

The project is ambitious enough to worry even the most experienced engineers, but its location could give a seismologist night sweats. All this work is taking place just 12 miles from the North Anatolian Fault, Eurasia's version of the San Andreas. Since AD 342, it has seen more than a dozen huge quakes that each claimed more than 10,000 lives. Two in 1999 together killed 18,000 people. Worse, over the last century the tremors have marched steadily west, toward Istanbul and the strait.

There's another problem: The hub of this tunnel system sits on one of the greatest historic treasures of the classical world. In 2005, the dig ran into the remains of a fourth-century Constantinople port, Portus Theodosiacus. It's smack on top of what'll be an underground station on the new train line. Researchers are rushing to preserve the find, including what seems to be the only Byzantine naval vessel ever discovered, and that's preventing the contractors from starting in earnest.

Delays to the tunnel's progress are expensive — $1 million a day in lost revenue. Yet Turkey can't afford to run roughshod over the delicate archaeological discovery. The country has been trying to get into the European Union for decades, and destroying priceless ancient artifacts doesn't exactly endear you to the Western world. Steen Lykke, project manager for Avrasyaconsult, the international consortium that's overseeing construction, sums it up: "I can't think of any challenge this project lacks."



"You see this?" Claus Iversen, Avrasya consult's supervisor of marine works, waves a yard-long piece of rebar curved at one end like a shepherd's crook. His voice echoes inside a half-built tunnel section as he picks his way over the steel lattice that makes up the floor and part of the walls. "We have two guys in a building over there making a million of these. One bends, the other welds."

Here at the Tuzla Shipyard just outside the city, construction workers will insert huge ballast tanks into each completed segment and cap their ends with steel doors — waterproof bulkheads. Then the segments will be put on barges and floated out to the Sea of Marmara.

Once they're in position, the barge crews wait for the current to slow to less than 5 feet per second — any faster and they won't be able to safely drop the tunnel segment. When they're ready, the crews will angle the segment into the current (making it slightly more streamlined) and flood the tanks. The segment will sink, bound to the barge by steel cables that the crew controls like puppeteers. "My friends joke that I'm building concrete submarines," Iversen says.

On the bottom, divers will release the cables after the segment is in place and connect it by hand to the ones already sunk. Inside the tunnel, workers will pump the water out of the ballast tanks and dismantle them, along with the steel bulkheads. There are only two segments in place so far, and they are connected to the surface by a 6-foot- diameter access hatch. All the pieces of the doors and the tanks will get carried out that way, making room for two parallel train tracks.

Meanwhile, digging the parts of the tunnel under the city isn't going smoothly. Much of the substrate is either soft or rotten. "We don't talk about the rock as solid," Lykke says. "It's more like bricks piled at an angle with grease in between them." Avrasya consult is using just about every tunnel- digging technique humans have invented to make the project work — even the controversial New Austrian Tunneling Method. Designed for unstable soil, it involves using spray-on concrete called shotcrete to solidify the ground around the tunnel. Tunnels dug this way have an unnerving tendency to collapse during construction, as one did in Munich in 1994, killing four and injuring 27. There haven't been any problems yet in Istanbul.

Even more ominous than the frequency of earthquakes along the 745-mile-long North Anatolian Fault is the pattern. At their most basic, quakes happen when two moving sides of a fault squeeze together. As stress builds, the fault ruptures and the ground shakes. Most of the time that relieves the stress and the fault quiets down, like champagne going flat after a dramatic cork-popping. Sometimes, though, a temblor relieves stress on one part of the fault but increases it farther down the line. The Week in Review is edited and published by Jack Spratts. Geologists call this process stress transfer, and it can lead to a string of tremors repeating like seismic dominoes. That might be why quakes along the New Anatolian have been getting closer and closer to Istanbul over the last 100 years. Since the 1939 Erzincan earthquake in eastern Turkey (magnitude 7.9), Big Ones have been migrating west. Geologists calculate that the chances of the city getting hit by a quake topping 7.0 in the next 30 years are as high as 77 percent.

The tunnel's engineers are preparing for the worst. Squishy, waterlogged soil like the stuff they're digging through can liquefy during a quake, basically turning to quicksand. So builders are infusing the sand layers with a thin mortar of industrial grout down to 80 feet below the seabed. The walls of the tunnel will have both a steel shell, often used in the US, and a waterproof concrete layer, which is popular in Europe. Each is independently watertight. The whole thing will be long and narrow enough to flex "like a straw in gel" during a tremor, Lykke says.

The underwater tube will connect at both ends to tunnels being bored from each side of the city; they are supposed to be done next year. At the joint between rock and water will be a giant rubber and steel gasket that'll let the structure shift without breaking during a quake. And if everything goes to hell and the tunnel gets breached, floodgates at these joints will slam down to isolate the tube and keep the train stations on either side from filling with water. The Marmaray builders say their design will withstand a 7.5 quake, bigger than the one that all but leveled Kobe, Japan, in 1995.

"Tunnels are like buildings with very thick walls," says Geoffrey King, director of the tectonics lab at the Centre Nationale de la Recherche Scientifique's Institut de Physique du Globe de Paris. "That's the ideal way to earthquake-proof a building." Of course, he adds, no system is perfect. "I wouldn't like to be in such a tunnel during an earthquake."

The hub of the Marmaray Project is mostly underground, the size of three football fields. Yenikapi Station will be the second stop on the European side, just over a mile from Istanbul's historic Blue Mosque in the old center of the city. The tunnel-boring machines start at Yenikapi, pass by Sirkeci Station — the deepest one, where builders are using the New Austrian method — and then hit the water.

Before construction started, archaeologists surveyed the site to see what was there. This is Istanbul, after all — a 2,700-year-old city where you can't bury a cat without unearthing something older than the US. The builders expected a few artifacts, maybe an old foundation or two. But in 2005, they found a shipwreck. Then they found a massive limestone block. And stumbled upon another. And another — a line of 20 blocks extending 80 feet. It was the remains of mighty Portus Theodosiacus, lost for 1,000 years and, experts agree, the greatest nautical archaeological find in modern history.

Today, station contractors work on the foundations in carefully prescribed areas, alongside hundreds of hard-hat-wearing archaeological workers swinging picks and pushing wheelbarrows amid thousands of years of history. "It's a virtual museum of ancient shipbuilding technology," says Cemal Pulak of Texas A&M and the Institute of Nautical Archaeology. He's an expert in early wooden-shipbuilding techniques and a researcher on the dig. On a walk through its maze of trenches, platforms, flooded pits, and dirt paths, he stops briefly to point at an orange sliver poking out of the dirt. "Hmm," he says, "human bone."

The scope of artifacts is overwhelming. Some date back to the 6th millennium BC, the oldest settlements ever uncovered in Istanbul. Pottery fragments, shells, and pieces of bone litter the ground. Blue milk crates full of everything from amphorae to horse skulls are stacked head-high near trailers that serve as temporary offices. And somewhere in a storage facility are nine human heads, found in a bag.

But the most important discoveries have been ships — fishing boats, transport vessels, cargo carriers, and what seems to be a Byzantine warship, the first ever found, all from the 7th to 10th centuries. Most of the wrecks are incredibly well- preserved, thanks to oxygen-squelching sand and silt that filled the harbor. But extracting and preserving them is an arduous process involving years of injections of polyethylene glycol, a stabilizing polymer. "All the lignins and tannins have been leached out," Pulak says, standing in front of an ancient wooden hull. "If you just dried it out, it would turn to dust."

The engineers are getting impatient with all this history. The dig forced Yenikapi Station to be redesigned, which meant pushing back other elements of construction. "Honestly, is this an archaeology project or are we tunneling?" Iversen says. "We have meetings sometimes where we end up talking about the archaeological dig for half the time." When he tells locals about the new completion date for the project, they often respond with a cynical "Yeah, yeah." Contractors wonder why they should heed the construction schedule when the excavations have already caused years of delays. "Lots of equipment is just sitting around," he says.

Archaeological field manager Metin Gökçay says there is no time limit on their work, although my interpreter's eyebrow rises as he translates this. "The work comes first," G k ay says. "I know how to deal with people." He's about to retire, he says, so he doesn't have to worry about getting fired.

The project is byzantine — there's no other word for it. And all that complexity means tensions are high. Access to the site, once open to reporters, has become more and more restricted. It took me months to get permission to talk to the scientists; the government appears terrified of being publicly embarrassed.

Under the pressure, the archaeologists are barely keeping it together. Pulak says his group is "almost on nonspeaking terms" with another team from Istanbul University's conservation department, which he thinks is too inexperienced at digging up ships. The squabbles have gotten too much for him. He says this summer is likely his last season at the dig. He's heading home to teach, fleeing a project marked by "lots of politics and lots of egos."

Turkey must finish the tunnel, but it can't just bulldoze the ancient port. The country's bid to enter the European Union — pending for 40 years, since even before it was called the EU — has been held up in large measure by questions about human rights and democracy. Showing sensitivity to other cultures by honoring the heritage the past represents is good PR on that front. But to prove it is a Western-style state, Turkey also has to display a certain facility with high tech and big engineering, which means completing the project. Indeed, one of the main arguments against admitting Turkey to the EU has always been that the country isn't exactly in Europe. Geographically speaking, though, if you build the tunnel, the country is suddenly at least as tightly connected to the mainland as the UK is.

Historically sensitive modernization is not impossible. Greece managed to build a metro through the heart of Athens, remodeling that classic metropolis without destroying its foundations. But in Turkey, the outcome of this tug-of-war between past and present is still uncertain.

None of that tension is visible on the surface waters of the Bosporus. Instead, there's just the day-to-day action of one of the world's busiest shipping lanes. Boats and ships of every sort — ferries, cargo ships, tankers, fishing boats, luxury yachts — pass back and forth. Cruise ships the size of skyscrapers rest in port. And 800 feet off the Asian side, there's a small yellow platform, metal, surrounded by a heavy railing lined with flashing yellow lights and fitted with a warning bell the size of a basketball. In the center is the access shaft to the tunnel. It's the only way in or out, and it's so far from the shore that it feels like a shipping accident waiting to happen. "We're used to the North Sea," Iversen says. "Always, safety first."

Until the tunnel borers meet the water, the platform is the only link between the tunnel and the surface world. And right now that connection feels awfully vulnerable.
http://www.wired.com/science/planete...15-09/ff_quake





Magna Carta Is Going on the Auction Block
James Barron

The 2,500 words fill a page that is a couple of inches shorter than this one, but almost as wide. The faded letters in Latin are unreadable in places. Something that looks like a scraggly, russet-colored tail hangs from the bottom.

It is the document that laid the foundation for fundamental principles of English law. Angry colonists complained long before the Boston Tea Party that King George III had violated it. The men who drafted the United States Constitution and the Bill of Rights borrowed from it.

It is Magna Carta, agreed to by King John of England in 1215 and revised and reaffirmed through the 13th century. The tail dangling off the page is a royal seal.

And it is about to go on sale.

Sotheby’s, which today is expected to announce plans to auction it in New York in mid-December, estimates that the document will sell for $20 million to $30 million. It is the only copy in the United States and the only copy in private hands. Sotheby’s says the 16 others are owned by the British or Australian governments or by ecclesiastical or educational institutions in England.

Until last week, this copy was on display in the National Archives in Washington, steps from the Declaration of Independence and the Constitution. But it was only on loan from a foundation controlled by the Texas billionaire Ross Perot, who bought it in 1984 for $1.5 million.

The foundation told the archives this month that it had decided to end the loan and take back Magna Carta. Its departure came so suddenly that the archives did not have time to remodel the display case or fill it with some of the nine billion documents from the archives’ own collection.

“This is surprising,” said Lewis L. Neilson Jr., the chancellor of the National Society Magna Charta Dames and Barons, a nonprofit group in Philadelphia that promotes awareness of Magna Carta, the literal translation of which is “Great Paper.” “It provides a real rallying point for emphasizing the importance of individual liberty and the rule of law, and it will be curious to see what happens to it and who’s interested in purchasing it and what they do with it.”

The Perot Magna Carta dates to 1297 and was endorsed by King Edward I. The National Archives said that of the 17 original versions that still exist, 4 are from the reign of John; 8 are from Henry III; and 5 are from Edward I. Mr. Neilson said that some jurists consider the Perot Magna Carta to be the most important one because it was the one that was entered into the statute books in England.

Trudy Renna, the only employee of the Perot Foundation identified on its tax return, said in a telephone interview last week that the foundation decided to sell Magna Carta to “have funds available for medical research, for improving public education and for assisting wounded soldiers and their families.”

The tax return listed the foundation’s assets as $56.9 million at the end of last year and its contributions as $9.08 million, including more than $4 million for medical research at the University of Texas Southwestern Medical Center at Dallas. Mr. Perot is listed as president of the foundation and also as a director. Seven of the nine other directors are his wife, Margot; their five children; and his sister, Bette Perot.

Mr. Perot, the onetime independent candidate for president of the United States, bought it from relatives of James Thomas Brudenell, the Earl of Cardigan, who led the charge of the Light Brigade in 1854, during the Crimean War. The copy was said to have been in the family’s possession since sometime in the Middle Ages.

But later generations were apparently unaware of its importance. The National Archives in Washington said it was “discovered” in 1974 during an inventory at the family’s estate at Deene Park in England. The National Archives said it came into the family’s hands through Edmund Brudenell, who served as attorney general under Richard II in the 14th century, or through Sir Robert Brudenell, who was chief justice of common pleas under Henry VIII in the 16th century.

By the time Mr. Perot bought the copy, it had been on the market for four years, and at least one deal had fallen through before Mr. Perot came along. At the time, Mr. Perot said he was “amazed” that it had been for sale.

“It was like someone said ‘Mona Lisa,’ ” he said at the time.

He sent it to Philadelphia in 1987 during the observance of the Constitution’s bicentennial, and then to the National Archives.

It will be sold by David N. Redden, a Sotheby’s vice chairman who sold a copy of the Declaration of Independence for a hammer price of $7.4 million in 2000. That copy had been tucked behind a $4 flea-market painting. The buyers were the television producer Norman Lear, who created shows like “All in the Family” and “Maude,” and the Internet entrepreneur David Hayden.

Mr. Redden was also one of the auctioneers at the sale of items from Jacqueline Kennedy Onassis’s estate in 1996. That auction included a $574,500 humidor from President John F. Kennedy and a $415,000 rocking chair.

Mr. Redden arranged the Magna Carta auction quietly, so quietly that Sotheby’s did not tell its own employees why it was changing arrangements for other auctions. James Zemaitis, the director of Sotheby’s 20th-century design department, said he was asked to give up a room at Sotheby’s headquarters on York Avenue at East 72nd Street that he had reserved for a pre-auction exhibition of his own.

“All they told me was: ‘David Redden is selling this really important document, the most important document of all. Can you give up this room for us?’ ” he recalled. “And I’m like, ‘Sure, but what is he selling, the Magna Carta?’ ”
http://www.nytimes.com/2007/09/25/nyregion/25magna.html





A Street Performer Crusades for the First Amendment
Anemona Hartocollis

What is the purpose of the First Amendment?

That was the question before a judge in Manhattan Criminal Court yesterday, as a street performer named Reverend Billy, a k a William Talen, faced charges of harassing police officers in Union Square Park by reciting the First Amendment to the Constitution.

Mr. Talen — the white-suited, blond-pompadoured leader of the mock Church of Stop Shopping who is perhaps best known for his crusade against Starbucks — was arrested June 29. He had joined a protest against the city’s new permit requirements for the monthly Critical Mass bicycle rally and proposed restrictions on photographers and filmmakers in public places.

He was charged with two counts of second-degree harassment, under a statute originally intended for use against stalkers. He was accused of following a group of officers while repeatedly reciting the 40-odd words of the First Amendment through a megaphone, the kind commonly used by cheerleaders.

After his arrest, Mr. Talen said, he was jailed for 20 hours, first in a Gramercy Park precinct house, then in the underground Manhattan Detention Complex, popularly known as the Tombs, where he felt compelled to live up to his stage name by ministering to the less fortunate. In the precinct house, he said, he provided pastoral counseling to a young man who was crying after he was arrested for carrying a joint in his pocket. In the Tombs, one of the medical attendants recognized him and offered to put him in a “special” cell, which turned out to be for mental patients, Mr. Talen said.

In court yesterday, the prosecutor told Judge Tanya Kennedy that Mr. Talen’s offense had been to shout the familiar lines beginning with “Congress shall make no law” while standing just three feet from the officers, and to ignore their requests to stop. The prosecutor, Mary Weisgerber, said his behavior was “obnoxious” by any standard.

“That’s not true,” Mr. Talen piped up.

Outside of court, Mr. Talen — who says that his lungs are like bullhorns because he has had operatic training — maintained that he was about 15 feet from the officers and that his account was supported by a videotape of the episode that has been preserved on YouTube.

Such findings of fact — three feet or 15 feet? — may someday go to a jury.

Yesterday’s hearing turned on a more scholarly question: Does reciting the First Amendment serve a legitimate purpose?

Mr. Talen, 57, appeared in court looking, as he put it, more like a Puritan than a preacher in a black suit and a white shirt, a reversal of his usual outfit, and his blond hair lank instead of puffy. His wife, who is Reverend Billy’s theatrical director and who goes by the name Savitri D., was at his side.

His lawyers, Norman Siegel and Earl Ward, told Judge Kennedy that the law defined harassment as engaging in a course of conduct that is not only “alarming” and “annoying” but “which serves no legitimate purpose.”

Mr. Siegel argued that there could hardly be a more legitimate place than a protest rally to recite the First Amendment, with its lines barring Congress from “abridging the freedom of speech” and guaranteeing the rights “of the people peaceably to assemble.”

The Court of Appeals, the state’s highest court, has ruled that for a course of conduct to have “no legitimate purpose” it must have no thoughts or ideas besides threats, intimidation or “coercive utterances,” Mr. Siegel said in a written brief.

The courts have found that it is not a crime for a husband to call his wife crude and vulgar names, Mr. Siegel said, quoting a case in which a judge ruled that “the registering of displeasure with another person is protected speech.”

If swearing at one’s wife can serve a legitimate purpose, Mr. Siegel said, reciting the First Amendment at a protest rally can, too. “We respectfully submit that reciting the 44 words of the First Amendment, you have a First Amendment right to do that,” Mr. Siegel added.

Mr. Siegel asked Judge Kennedy to dismiss the charges, saying this was a “quintessential” case of a prosecutor acting without a basis in the law.

Under the charges, Mr. Talen could be sentenced to up to 15 days in jail.

Ms. Weisgerber told the judge that she needed more time to formulate a response. Judge Kennedy gave the district attorney’s office until Oct. 15 to respond in writing and set a court date for Nov. 14. If the prosecution misses that deadline, Judge Kennedy said, she will grant the motion to dismiss the charges.
http://www.nytimes.com/2007/09/26/ny...=1&oref=slogin





Backstage: Sleepy Teenagers and a Grape or Two
Guy Trebay



Milan

“Flavia, Michaela, Janeta, Shannon, Valentina, Marcelina, Kim,” the fashion producer Alessandra Marabini-Baiocchi was chanting here Thursday morning, calling roll for a last-minute rehearsal of the spring 2008 Dsquared show.

It was 7:45 a.m., and the rain drumming on the roof of a tent set up on the Milan fairgrounds was like a bass beat behind a soundtrack built around “Umbrella,” the monster dance single by Rihanna, the designers’ special “secret” guest.

“Umbrella, ella, ella, eh, eh, eh,” Rihanna’s voice hiccupped on the soundtrack as Ms. Marabini-Baiocchi attempted to corral a herd of sleep-deprived and BlackBerry-hypnotized creatures from Brazil, Belarus, Poland, Canada and wherever else fantastical figures with tiny heads and coltish legs are found.

“Girls, we try the finale now,” Ms. Marabini-Baiocchi said, and Flavia, Michaela, Janeta, Shannon, Valentina, Marcelina, Kim and a dozen others obediently formed a queue, looking only the slightest bit like suburban 1950s housewives, thanks to the shower caps they’d been given to protect their roller-set hair.

And as they stood there — because that is a lot of what models do when they are not sitting around being prodded, poked, combed, painted, photographed and interviewed by Japanese magazine people about what exact shade and brand of lipstick they prefer — the Brazilian model Flavia Oliveira, who has an upturned nose and sexily short upper lip, talked about how she gets through the runway season.

“I did 28 shows in New York, and 8 in London and 13 here already,” Ms. Oliveira said. “I try to sleep enough and eat a lot of sushi — a lot, a lot, a lot — and meat. And I don’t freak out, even though yesterday I found out that they canceled me at Dolce & Gabbana.” Two seasons ago she would have freaked out, she went on. “Now I’m not going to be crying because, you know, I still love them, I already did that show, and maybe I’m just not the face of the season for them right now.”

And just then, the very-identical-twin designers, Dean and Dan Caten — né Catenacci, originally of Willowdale, Ontario, and now of Milan — danced past, exaggeratedly pony-stepping onto the set, which was tricked out to look like a set designer’s idea of an American grease-monkey’s garage, complete with hydraulic jacks, industrial shelving and two muscle cars with Italian license plates.

“Looking beautiful, girls,” said Dean Caten, or maybe it was Dan, and then Katherine Ensslen, who carries the Oz-like title of director of makeup artistry for M.A.C. cosmetics, a sponsor, came by and warned: “We have to start with the makeup, my dears. It was supposed to be five minutes, and it was not five minutes.”

And Ms. Marabini-Baiocchi directed the models to stride down the runway and back, then had them repeat this action before giving them the release signal so that they could bolt to the makeup area and slump into folding chairs.

And there the makeup team set about painting the teenagers from Belarus, Brazil or wherever to give them a look that the beauty director Val Garland characterized as fierce Fellini flick. “Think 1970s, think late night, think Sophia Loren at her best, with a cigarette and her hair messed up,” Ms. Garland said. “She’s got a dog with a diamond collar and money to burn.”

And then Ms. Ensslen came around and said, “O.K., guys, keep the speed up.” And the makeup people started drawing the cat eyes on the models just a little slower, because that is what the Spanish proverb says to do when you are in a hurry: slow down. And then the manicurists from EzFlow Nail Academy knelt beside models like Michaela Kocianova, two manicurists per girl, applying white-tipped glue-on nails that would be torn off by Ms. Kocianova, who was now yawning extravagantly, and all the others two seconds after the show.

And Dan, or was it Dean, Caten came by helping some workers shoulder a folding screen into the makeup area to shield Rihanna from the cameras when she finally emerged from her trailer. And Dan, or was it Dean, Caten said to his brother, “Are you going to help?” And when his brother ignored this request by taking the opportunity to check for some lint on his blazer, Dan, or was it Dean, Caten snapped: “Oh, never mind. Shut up!”

Nobody paid any attention to this, of course, because circus nerves are normal backstage, and Janeta Samp, a Polish model, wandered past the fraternal snit, her eye fixed on the catering table, which is where most of the young women get their sustenance during these days. “Sometimes we ask the driver to stop and get a sandwich,” said Ms. Samp, who went at a single strawberry with more deliberation than most people put into a five-course meal. “But mostly we eat whatever is backstage, a yogurt, a cookie. You know, whatever — a grape.”

And the Catens walked past again, at what by now was 9:15, both with their heads tossed back and laughing as at the end of a wild night and not the beginning of a very long workday, an impression not diminished by their flutes of Mumm.

And following them were a dozen cameras and Rihanna and her bodyguards and manager, who kept busy informing even those who had not asked that Rihanna would not be posing for pictures. And as they walked, the Caten twins were describing for their television-camera retinue the imaginary woman they saw when they first sat down at the drawing board.

“She’s got her hair done, she’s got her nails done, she’s glamorous and a little messy,” one of the brothers said. “She can drink all she wants, and she doesn’t have to worry.” And why is that? “Because she’s got a driver,” Dan, or was it Dean, Caten replied.
http://www.nytimes.com/2007/09/28/fa...s/28DIARY.html

















Until next week,

- js.



















Current Week In Review





Recent WiRs -

September 22nd, September 15th, September 8th, September 1st

Jack Spratts' Week In Review is published every Friday. Submit letters, articles and press releases in plain text English to jackspratts (at) lycos (dot) com. Submission deadlines are Thursdays @ 1400 UTC. Please include contact info. Questions or comments? Call (617) 939-2340, country code U.S.. The right to publish all remarks is reserved.


"The First Amendment rests on the assumption that the widest possible dissemination of information from diverse and antagonistic sources is essential to the welfare of the public."
- Hugo Black
JackSpratts is offline   Reply With Quote