View Single Post
Old 20-02-08, 09:58 AM   #2
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,017
Default

5 Years After a Nightclub Fire, Survivors Struggle
Abby Goodnough



Savagely burned in the fire that incinerated the Station nightclub here five years ago next Wednesday, Linda Fisher has endured a dozen surgeries to salvage her arms, her hands, her face.

Ms. Fisher inhaled so much smoke that anguishing night that even now, she gets winded carrying a basket of laundry. Her thick scars keep her from sweating normally, and she has trouble distinguishing hot from cold.

Ms. Fisher feels lucky.

“There are survivors who have no ears, eyes, nose, hair,” she said.

But, like so many others who escaped the inferno, she also simmers with darker emotions.

The survivors are still waiting for their lawsuit against the Station owners and dozens of other defendants, the largest civil tort case in Rhode Island history, to play out in federal court. Many remain furious that one of the club’s owners was sentenced to community service and the other is expected to leave prison next year.

They also feel forgotten. At first, all kinds of help poured in for the roughly 200 injured survivors and families of 100 others who died in the disaster, one of the worst nightclub fires in the nation’s history. But that help has all but disappeared, even though many of the injured face more surgeries, cannot resume full-time work, and struggle to afford heating oil and other basics.

“People that were making $30,000, $40,000 a year had to take jobs making eight bucks an hour because they are so physically challenged,” said Todd King, a survivor who lives and works in North Carolina now and runs the Station Family Fund, a grass-roots nonprofit group that still raises money for the worst-off victims. “They can barely use their hands, and they’re exhausted all the time because their bodies have been put through war.”

Mr. King’s fund has run dry three times in recent years and now has $82,000 — enough to help the neediest survivors for about six months, he said. He is hoping that the fifth anniversary of the fire, on Feb. 20, will elicit more support, but he and other survivors have their doubts.

“Most people don’t understand that a burn injury is a life injury,” said Ms. Fisher, 38, who gets a Social Security disability payment of about $1,000 a month. “If they think about us at all, it’s probably, ‘They must be all better, so why aren’t they back to work?’ ”

Many believe the circumstances of their misfortune — that they were blue-collar folks gathered in a scruffy club to hear Great White, a has-been “hair metal” band from the ’80s — also help explain the lack of interest. The fire ignited when the band’s tour manager lit pyrotechnics on a small stage surrounded by highly flammable foam used as soundproofing.

“We were waitresses, house painters, contractors, strippers,” said Victoria Eagan, who escaped the fire with minor injuries but whose two best friends were badly burned. “If it had been people at the opera that night, there would have been a big difference.”

So far, tickets are selling poorly for a concert to benefit the Station Family Fund, planned for Feb. 25 in Providence. Dee Snider, the lead singer for the band Twisted Sister and the concert’s host, said country and Christian rock performers would join metal bands onstage to broaden the cause’s appeal.

“I’ve tried to get this away from being about hair bands, about heavy metal, and to make this a people issue,” Mr. Snider said. “Since nobody else is going to do it, it’s got to be musicians, all kinds of musicians, taking care of their own and reminding people this could have happened to anyone.”

Donovan Williams, a survivor who was burned over 70 percent of his body and was left legally blind, said he was counting on settlements from the lawsuit to really help people move on. Mr. Williams, who works in telephone sales, needs a ride to his job and cannot do quotidian things like opening jars and tying shoes.

“I’m all for moving on,” said Mr. Williams, 37, who spent 10 weeks in a coma and says he now sees as if looking through sunglasses with Vaseline on them. “The only thing I want is one of those huge TVs.”

A handful of defendants have settled, offering a tentative total of about $71.5 million. But with 300 plaintiffs and hefty lawyer fees, even a huge payout may not guarantee permanent comfort.

Ms. Eagan guessed that at most, an eventual settlement would help survivors and spouses of the dead — there are 23, and 65 children who lost one or both parents — to pay off their mortgages and provide for their families, even if they cannot resume work.
“I don’t think anyone is going to be made a millionaire and drive a Mercedes,” she said.

Two funds administered by the United Way and the Rhode Island Foundation raised almost $3.8 million for victims of the fire and their families, but gave out most early on. The state’s Crime Victim Compensation Program awarded grants averaging $8,800 to 222 claimants after the fire, but the government provided little else. A state request for federal disaster relief was denied on grounds that the fire did not meet the definition of a natural disaster.

Mr. King, Ms. Eagan and several other survivors started the Station Family Fund a few months after the fire, when they learned that one woman who escaped that night was losing her home. They sold thousands of shirts, held car washes, collected change outside grocery stores and organized benefit concerts, raising about $1 million over the last five years.

The group came under attack for accepting about $100,000 from Great White early on, with some survivors and relatives of the dead calling it blood money. The surviving band members — one died that night — are named in the lawsuit, but some, including Ms. Fisher, do not hold them responsible.

A longtime fan, she went to Pennsylvania to see the band perform again eight months after the fire and ended up joining the lead singer, Jack Russell, on stage. She wore a spaghetti-strap top so he could see her scars. Other disfigured survivors avoid going out in public, Ms. Fisher said, but she decided early on not to avoid the inevitable stares.

“I didn’t survive to sit home on the couch and cry,” she said.

On the anniversary of the fire, Ms. Fisher and other survivors will gather at a restaurant across from the former Station site, where a circle of ragged crosses form a makeshift memorial to the dead. Meanwhile, Ms. Fisher and Ms. Eagan are brainstorming about how to draw more support.

“We’ve been kicking around the idea of a black-tie ball, maybe at the Biltmore,” Ms. Fisher said, referring to the fanciest hotel in Providence. “A lot of the blue collar, average people who’ve already dipped into their pockets time and time again — you can only give so much.”
http://www.nytimes.com/2008/02/17/us...vivors.html?hp





Autism Breakthrough: Girl's Writings Explain Her Behavior and Feelings

Doctors Amazed by Carly Fleishman's Ability to Describe the Disorder From the Inside
John McKenzie

Carly Fleischman has severe autism and is unable to speak a word. But thanks to years of expensive and intensive therapy, this 13-year-old has made a remarkable breakthrough.

Two years ago, working with pictures and symbols on a computer keyboard, she started typing and spelling out words. The computer became her voice.

"All of a sudden these words started to pour out of her, and it was an exciting moment because we didn't realize she had all these words," said speech pathologist Barbara Nash. "It was one of those moments in my career that I'll never forget."

Then Carly began opening up, describing what it was like to have autism and why she makes odd noises or why she hits herself.

"It feels like my legs are on first and a million ants are crawling up my arms," Carly said through the computer.

Carly writes about her frustrations with her siblings, how she understands their jokes and asks when can she go on a date.

"We were stunned," Carly's father Arthur Fleischmann said. "We realized inside was an articulate, intelligent, emotive person that we had never met. This was unbelievable because it opened up a whole new way of looking at her." This is what Carly wants people to know about autism.

"It is hard to be autistic because no one understands me. People look at me and assume I am dumb because I can't talk or I act differently than them. I think people get scared with things that look or seem different than them." "Laypeople would have assumed she was mentally retarded or cognitively impaired. Even professionals labelled her as moderately to severely cognitively impaired. In the old days you would say mentally retarded, which means low IQ and low promise and low potential," Arthur Fleischman said.

Therapists say the key lesson from Carly's story is for families to never give up and to be ever creative in helping children with autism find their voice.

"If we had done what so many people told us to do years ago, we wouldn't have the child we have today. We would have written her off. We would have assumed the worst. We would have never seen how she could write these things how articulate she is, how intelligent she is," the grateful father added.

"I asked Carly to come to my work to talk to speech pathologists and other therapists about autism," said Nash. "What would you like to tell them? She wrote, 'I would tell them never to give up on the children that they work with.' That kind of summed it up."

Carly had another message for people who don't understand autism.

"Autism is hard because you want to act one way, but you can't always do that. It's sad that sometimes people don't know that sometimes I can't stop myself and they get mad at me. If I could tell people one thing about autism it would be that I don't want to be this way. But I am, so don't be mad. Be understanding."
http://abcnews.go.com/Health/story?id=4311223&page=1





Enclosed, But not Encrypted
Christiane Rütten

Cracking a crypto hard drive case

A new generation of inexpensive disk drive enclosures using hardware encryption and RFID keys do not fulfil the promises of their publicity. The adverts claim 128-bit AES hardware encryption, but they don't tell us how it is used.

The specifications of the 2.5in. Easy Nova Data Box PRO-25UE RFID[1] hard drive case by German vendor Drecom sound promising: hardware data encryption with 128-bit AES, access control via an RFID chip compact enough to carry around on your key ring and optional 160GB or 250GB hard disk capacity. Swiping the RFID chip along the case causes the integrated Innmax IM7206 crypto controller to reveal the drive as a USB 2.0 mass storage compatible device to the attached computer. This works under Linux and Mac OS X as well as Windows. There's no need for special drivers.

Look a little closer, and things don't look so good. Heise online's sister publication c't magazine has discovered that the encryption offered by this product was weak, and erroneously advertised as including "128-bit AES hardware data encryption". c't has since spoken with the manufacturers involved and can confirm that the encryption weakness discovered probably affects numerous similar products.

The first step in our analysis was visual inspection of the encrypted data on the medium. We began by taking out the included Samsung hard drive and connecting it to a normal USB SATA adapter. We immediately noticed that all sectors not overwritten by the partition table and FAT32 formatting were still full of the zero bytes the hard drive contained when shipped. While this does not represent a major cryptographic flaw, it does at least give attackers a rough idea of the volume of encrypted data on the hard drive.

Ideally, encrypted data should look like a random sequence. A phase-space plot helps us quickly determine the pseudo-randomness of data and hence the relative encryption quality of a given data volume. For a three-dimensional phase-space plot, the sequence a, b, c, d, e, f, etc. can be used as space coordinates (a-b, b-c, c-d), (b-c, c-d, d-e), (c-d, d-e, e-f), etc. Patterns in the plot created reveal recurring relations between subsequent sequences. In this phase plot, 50,000 16-bit random numbers would produce an unstructured cloud of dots.

Since some 30 per cent of the first 100kB of the encrypted hard drive are zeros, we can expect a third of these dots to be found on the plot's origin. The remaining two thirds at least should be distributed randomly across the plot if properly encrypted. Unfortunately, the distribution is anything but even:

A large part of the 35,000 non-zeros, which we would expect to find randomly distributed, are clumped together in four groups on the plot. If we take a closer look at the individual sectors in a hex editor, we find the same sequences repeated
00008e00 77 c8 54 35 ee 90 a9 6a dc 21 53 d5 7d 43 a6 aa |w.T5...j.!S.}C..|
00008e10 3f 86 4c 55 7e 0c 99 aa 39 18 32 55 72 30 64 aa |?.LU~...9.2Ur0d.|
...
00008fe0 fd 76 00 20 fa ed 00 40 f4 db 01 80 2d b7 03 00 |.v. ...@....-...|
00008ff0 5a 6e 07 00 b4 dc 0e 00 68 b9 1d 00 d0 72 3b 00 |Zn......h....r;.|

popping up in the following 512-byte block (200 hexadecimal):
00009000 77 c8 54 35 ee 90 a9 6a dc 21 53 d5 7d 43 a6 aa |w.T5...j.!S.}C..|
00009010 3f 86 4c 55 7e 0c 99 aa 39 18 32 55 72 30 64 aa |?.LU~...9.2Ur0d.|
...
000091e0 fd 76 00 20 fa ed 00 40 f4 db 01 80 2d b7 03 00 |.v. ...@....-...|
000091f0 5a 6e 07 00 b4 dc 0e 00 68 b9 1d 00 d0 72 3b 00 |Zn......h....r;.|

And again:
00009200 77 c8 54 35 ee 90 a9 6a dc 21 53 d5 7d 43 a6 aa |w.T5...j.!S.}C..|
00009210 3f 86 4c 55 7e 0c 99 aa 39 18 32 55 72 30 64 aa |?.LU~...9.2Ur0d.|
...
000093c0 4d 00 20 59 9a 00 40 b2 f1 01 80 64 e2 03 00 c9 |M. Y..@....d....|
000093d0 01 07 00 92 c7 0e 00 24 8e 1d 00 48 1c 3b 00 90 |.......$...H.;..|

And again:
00009400 77 c8 54 35 ee 90 a9 6a dc 21 53 d5 7d 43 a6 aa |w.T5...j.!S.}C..|
00009410 3f 86 4c 55 7e 0c 99 aa 39 18 32 55 72 30 64 aa |?.LU~...9.2Ur0d.|
...
000095e0 fd 76 00 20 fa ed 00 40 f4 db 01 80 2d b7 03 00 |.v. ...@....-...|
000095f0 5a 6e 07 00 b4 dc 0e 00 68 b9 1d 00 d0 72 3b 00 |Zn......h....r;.|

These regular repetitions continued, and the almost identical columns of numbers suggest that the 512-byte sectors of your drive are not in fact encrypted with AES, but merely with a constant 512-byte cipher block applied as an XOR (exclusive OR).

In contrast to the missing preformat of the entire disk, an XOR with an unchanging cipher block does represent a major cryptographic flaw – in fact, the open kind of flaw that, used in this way, is susceptible to what are known as "known plain-text attacks". XOR encryption works like this:

Ciphertext1 = plaintext1 XOR cipher block(key 1)
Ciphertext2 = plaintext2 XOR cipher block(key 2)
Ciphertext3 = plaintext3 XOR cipher block(key 3)


The same operations are used for decryption, only with the role of plaintext and ciphertext reversed:

Plaintextn = ciphertextn XOR cipher block(key n)

When the cipher block is the same for every sector, as above, the result is:

cipher block(key) = ciphertextn XOR plaintextn

for any block n. In other words, you only need to find a 512-byte sector with known plaintext to calculate the universal cipher block. Such attacks are therefore called "known plaintext attacks." To make matters worse, sector 67 consists almost completely of zeros if the first partition is formatted with FAT32:
00008400 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00008410 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00008420 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
...
000085d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
000085e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
000085f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 aa |..............U.|

As a result, you can get almost the entire encryption cipher just by reading sector 67 from the encrypted drive – after all:

cipher block(key) = ciphertextn XOR 0 = cipher block n

So if you take the output of: dd if=/dev/sdc bs=512 count=1 skip=67 | hexdump -vC, you have almost the entire 512-byte block you are looking for:
00008400 77 c8 54 35 ee 90 a9 6a dc 21 53 d5 7d 43 a6 aa |w.T5...j.!S.}C..|
00008410 3f 86 4c 55 7e 0c 99 aa 39 18 32 55 72 30 64 aa |?.LU~...9.2Ur0d.|
00008420 21 60 c8 54 42 c0 90 a9 41 80 21 53 82 00 43 a6 |!`.TB...A.!S..C.|
...
000085d0 01 07 00 92 c7 0e 00 24 8e 1d 00 48 1c 3b 00 90 |.......$...H.;..|
000085e0 fd 76 00 20 fa ed 00 40 f4 db 01 80 2d b7 03 00 |.v. ...@....-...|
000085f0 5a 6e 07 00 b4 dc 0e 00 68 b9 1d 00 d0 72 6e aa |Zn......h....rn.|

But we still don't have the last two bytes 6e aa right, which have to be XORed with 55 aa to produce the final result 3b 00. Now we know the entire 512-byte encryption cipher, which we can use to decrypt all other hard drive sectors.

Who would have expected that decryption would be so easy? Indeed, the bar is so low that even novice attackers will have no trouble getting over it. When decryption is possible at the lowest block level, any possible security provided by the RFID chip becomes completely worthless, so we didn't conduct any further tests.

heise Security has since received a statement from Innmax, the manufacturer of the IM7206[2] controller chip used, confirming our findings. The IN7206 merely uses AES encryption when saving the RFID chip's ID in the controller's flash memory. The company explained that actual data encryption is based on a proprietary algorithm. The company claims the IM7206 only offers basic protection and is designed for "general purpose" users. In contrast, the more expensive IM8202 controller chip is being designed for users with greater security requirements; they claim it will offer true 128-bit AES encryption for data – but the chip is still in the development phase.

Hard drive enclosure manufacturer Drecom also confirmed our findings and is busy working on a solution. Easy Nova product manager Holger Henke says that the improper label "128-bit AES Hardware Data Encryption" for Data Box PRO-25SUE was the result of Innmax's misleading formulation of its controller specifications. Henke says that a new Easy Nova case could be released by the end of the year with the improved IM8202 controller. For the time being, the company says it will continue to market the current module as providing "simple encryption."

The Easy Nova product isn't the only hard drive enclosure on the market that uses the IM7206. You should assume that other products based on the controller also suffer from the same flawed encryption. The following crypto hard drive enclosures also use the IM7206 and are therefore likely to be vulnerable to the same attacks:

STYSEN E08 RFID Security Mobile Disk [3]
DoTop RFID SATA to USB storage[4]
Agestar RFID Security External Enclosure SRB2A[5]
Silverstone Treasure TS01B[6]
Sharkoon Swift-Case Securita[7]

These manufacturers have been alerted, but we have yet to receive replies from them.

URL of this article:
http://www.heise-online.co.uk/security/features/110136

Links in this article:
[1] http://www.easy-nova.de/index.php?si...8&productID=28
[2] http://www.innmax.com/en/im7206.html
[3] http://www.stysen.com/eng/product/pr...id=1&sub_id=35
[4] http://www.dotop.com/dotop/en/produc...il.php?p_id=59
[5] http://www.agestar.com/english/products/srb2a.asp
[6] http://silverstonetek.com/products/p...s.php?pno=ts01
[7] http://www.sharkoon.com/html/produkt...ita/index.html





A Method for Critical Data Theft



John Markoff

A group led by a Princeton University computer security researcher has developed a simple method to steal encrypted information stored on computer hard disks.

The technique, which could undermine security software protecting critical data on computers, is as easy as chilling a computer memory chip with a blast of frigid air from a can of dust remover. Encryption software is widely used by companies and government agencies, notably in portable computers that are especially susceptible to theft.

The development, which was described on the group’s Web site Thursday, could also have implications for the protection of encrypted personal data from prosecutors.

The move, which cannot be carried out remotely, exploits a little-known vulnerability of the dynamic random access, or DRAM, chip. Those chips temporarily hold data, including the keys to modern data-scrambling algorithms. When the computer’s electrical power is shut off, the data, including the keys, is supposed to disappear.

In a technical paper that was published Thursday on the Web site of Princeton’s Center for Information Technology Policy, the group demonstrated that standard memory chips actually retain their data for seconds or even minutes after power is cut off.

When the chips were chilled using an inexpensive can of air, the data was frozen in place, permitting the researchers to easily read the keys — long strings of ones and zeros — out of the chip’s memory.

“Cool the chips in liquid nitrogen (-196 °C) and they hold their state for hours at least, without any power,” Edward W. Felten, a Princeton computer scientist, wrote in a Web posting. “Just put the chips back into a machine and you can read out their contents.”

The researchers used special pattern-recognition software of their own to identify security keys among the millions or even billions of pieces of data on the memory chip.

“We think this is pretty serious to the extent people are relying on file protection,” Mr. Felten said.

The team, which included five graduate students led by Mr. Felten and three independent technical experts, said they did not know if such an attack capability would compromise government computer information because details of how classified computer data is protected are not publicly available.

Officials at the Department of Homeland Security, which paid for a portion of the research, did not return repeated calls for comment.

The researchers also said they had not explored disk encryption protection systems as now built into some commercial disk drives.

But they said they had proved that so-called Trusted Computing hardware, an industry standard approach that has been heralded as significantly increasing the security of modern personal computers, does not appear to stop the potential attacks.

A number of computer security experts said the research results were an indication that assertions of robust computer security should be regarded with caution.

“This is just another example of how things aren’t quite what they seem when people tell you things are secure,” said Peter Neumann, a security researcher at SRI International in Menlo Park, Calif.

The Princeton researchers wrote that they were able to compromise encrypted information stored using special utilities in the Windows, Macintosh and Linux operating systems.

Apple has had a FileVault disk encryption feature as an option in its OS X operating system since 2003. Microsoft added file encryption last year with BitLocker features in its Windows Vista operating system. The programs both use the federal government’s certified Advanced Encryption System algorithm to scramble data as it is read from and written to a computer hard disk. But both programs leave the keys in computer memory in an unencrypted form.

“The software world tends not to think about these issues,” said Matt Blaze, an associate professor of computer and information science at the University of Pennsylvania. “We tend to make assumptions about the hardware. When we find out that those assumptions are wrong, we’re in trouble.”

Both of the software publishers said they ship their operating systems with the file encryption turned off. It is then up to the customer to turn on the feature.

Executives of Microsoft said BitLocker has a range of protection options that they referred to as “good, better and best.”

Austin Wilson, director of Windows product management security at Microsoft, said the company recommended that BitLocker be used in some cases with additional hardware security. That might include either a special U.S.B. hardware key, or a secure identification card that generates an additional key string.

The Princeton researchers acknowledged that in these advanced modes, BitLocker encrypted data could not be accessed using the vulnerability they discovered.

An Apple spokeswoman said that the security of the FileVault system could also be enhanced by using a secure card to add to the strength of the key.

The researchers said they began exploring the utilities for vulnerabilities last fall after seeing a reference to the persistence of data in memory in a technical paper written by computer scientists at Stanford in 2005.

The Princeton group included Seth D. Schoen of the Electronic Frontier Foundation, William Paul of Wind River Systems and Jacob Appelbaum, an independent computer security researcher.

The issue of protecting information with disk encryption technology became prominent recently in a criminal case involving a Canadian citizen who late in 2006 was stopped by United States customs agents who said they had found child pornography on his computer.

When the agents tried to examine the machine later, they discovered that the data was protected by encryption. The suspect has refused to divulge his password. A federal agent testified in court that the only way to determine the password otherwise would be with a password guessing program, which could take years.

A federal magistrate ruled recently that forcing the suspect to disclose the password would be unconstitutional.
http://www.nytimes.com/2008/02/22/te...gy/22chip.html





Face Value
Barbara Fister

My corner of the Internet has been abuzz over a muckraking article that recently appeared in The Guardian on the subject of Facebook. Tom Hodgkinson, the highly principled slacker behind The Idler and author of How to Be Free, makes some familiar complaints: online friends are a pale imitation of face-to-face relationships, Facebook encourages high-schoolish obsession with popularity, it prompts its members to reveal too much about themselves, and it uses that information for commercial gain. But the article goes further. Facebook is not just an American-owned company with global ambitions. According to Hodgkinson, it’s highly influenced by a “neocon activist” board member and funded by a venture capital firm that has ties to the CIA. Their ultimate aim: “an arid global virtual republic, where your own self and your relationships with your friends are converted into commodities on sale to giant global brands.”

Ironically, The Guardian helpfully provides a “share” link so you can send the article to all of your Facebook friends.

One of the most interesting responses to this article bubbled up on A-Librarians, a forum for anarchist and radical librarians. (Yes, I am, in case you’re wondering. And “anarchist librarian” is not an oxymoron. Look it up.) While other lists were debating whether the article’s claims were credible, or whether Facebook is valuable regardless, the members of this list were getting down to philosophical basics. Why does the concept of property so thoroughly infuse our understanding of rights? Are our conceptions of privacy dependent on owning one’s individual “self”? If we own our identity, is our public persona a form of intellectual property, as a trademark is?

I don’t know the answers to those questions, which relate not only to Facebook, but the debates over Google’s project to digitize great university library collections, and the fights over access to journal articles written by professors whose institutions can’t afford to gain access to them. But as a librarian who is in favor of sharing ideas freely, these debates made me rethink the fundamental relationship between the individual’s desire to share their thoughts and experiences with others and the commercial entities that provide the distribution channel for that act of sharing. It seems to me the crux of the problem is that the profit motive influences both sides of the equation – differently.

Corporations like Google and Facebook are worth a lot of money, which is a bit odd. They don’t create their content, and what’s there, they give away for free. They mediate the space where we go to express ourselves, and where find out what others think. Sure, we have to put up with a bit of advertising, but that’s just a minor irritant for something that’s free.

But there is a cost.

These corporations provide us with a space to play, engage with others, and make connections. We get to build our own identities in a public way. In return, we give them (perhaps without realizing it) a panopticon view of our lives, a chance to gather data on what we think, do, read, say, enjoy, and with whom we associate — our “communities of interest” in the parlance of the FBI, or “friends” in Facebook’s lexicon. It’s exceedingly valuable information because it can be sold to companies who want to follow trends and focus their advertising dollars on just those individuals most likely to respond. The more people involved, the more valuable the data.

The terms of this contract are never quite clear. The Facebook Terms of Use explain we’re allowing these companies to keep track of what we enter into these systems (our searches, the words we use in our Gmail messages, our profiles and connections at Facebook), but we can’t be sure exactly how that information gets used, because that’s a trade secret. They could tell us, but then they’d have to kill us.

Facebook embarrassed itself last fall by overestimating our enthusiasm for this exhibitionist social contract. They launched Beacon, a service that would send information about one’s online purchases to a Facebook member’s friends unless an obscure “opt out” box was checked quickly before it disappeared from sight. Their assumption was that everyone would enjoy sharing their shopping lists as much as their playlists — your friend Mike just bought Hanes underwear and thinks you might want to buy some, too! — but that idea hit an invisible barrier of resistance. Whoa, that’s going too far! We got cold feet when the commercial consequences of our sharing was made visible. The outcry, ironically mobilized through Facebook itself, forced them to back off.

But on the whole, the public is content to go along. Just give me a place to express myself to the world, and you can do ... whatever it is you do.

People trust these playful-seeming corporations to not do evil far more than they trust their government. In 2007, an ACLU poll found a majority of the public opposed warrantless wiretapping. Earlier, tens of thousands of people signed petitions opposing the government’s ability to track what they were checking out of libraries or buying at bookstores.

Libraries have always taken privacy seriously – not because it’s valuable in itself, but because it’s a necessary condition for the freedom to read whatever you want without risk of penalty. When the PATRIOT Act was passed, librarians checked to make sure their databases erased the connection between a book and its borrower as soon as the book was returned. That erasure, however, makes it harder to offer the kind of personalization, such as recommendations based on previous book choices, that the public increasingly expects from online systems. After all, it’s what they get from Amazon.

Suspicion of the government does not extend to corporations running the Web 2.0 playground. Those guys just seem so ... nice. And after all, if they give us the tools to tell people we read a good novel or like a particular band, why not let the company make a little money from it?

The complexities of private/public digital tradeoffs have been debated in many different contexts. Siva Vaidhyanathan has questioned why libraries, a public good, should partner with Google, a private corporation, to digitize their contents; aren’t we concerned that Google will control the most complete library in the world? Others defend the practice because – well, without Google’s deep pockets, it simply wouldn’t happen on so vast a scale. Besides, the books go right back on the library’s shelf once digitized. What’s the harm in sharing?

Let’s set aside the contentious copyright issue for the moment and concentrate on why Google is providing “free” resources. Unlike libraries, Google gets content for free, gives it away for free, and makes its money by being an enormous distribution channel for everything from physics research to 19th century scanned books to the latest YouTube video. By watching the traffic through those channels, they are able to provide highly-specific information on who’s interested in what. The more we use Google, the more information they accrue about what we’re using, and the more valuable that mountain of information becomes.

And, let’s face it: we have selfish motives, too. Social networking blurs self-expression and self-promotion. The idea of property and its exchange has so infiltrated our culture as a defining concept that many people do, in fact, think of their public persona as their brand. It’s important to “be out there.” Their lives grow more valuable as more people recognize and acknowledge their ideas, their tastes, and their interests.

This isn’t just a youthful obsession. Facebook has recently opened its service to everyone, regardless of school or college affiliation. A novelist I know was just advised by her agent to set up a Facebook profile to increase her online presence and engage in “relationship marketing” with potential customers. In other words, she’s expected to act as her own sock puppet so she can sell more books. Make friends and influence people.

Here’s the interesting paradox: The only way to increase the intellectual property value of your identity is to give it away. That’s the only way it can be shared, linked to and recognized by others. Trading a little personal information for a public platform, whether for personal expression or self-promotion (or both), seems a fair exchange.

Does this sound eerily familiar? It should.

As scholars, our ideas gain value as we make them public, and we have been historically myopic about the consequences of trading the rights to our ideas for access to distribution channels. This unexamined practice put us all over a barrel when publishers required the academy to ransom those ideas back through prohibitively expensive journal subscriptions for libraries. The personal advancement attached to making our ideas public only added to the problem; more publications translated into higher prestige. There was just too much stuff for libraries to buy back, and not enough budget. The Open Access movement is on track to significantly change the “terms of service” when it comes to scholarly communication. Though the battle’s far from over, we’ve made real progress.

But we’ve barely begun to examine the unintended consequences of the Faustian bargain we strike when we share content through privately-owned digital domains of the public sphere.

Tom Hodgkinson says we have a choice: we can help Facebook’s right-wing investors make a lot of money, or we can simply opt out of “this takeover bid for the world.”

But hold on – it’s our world. And we didn’t approach the problems of scholarly communication by ceasing to publish. We started by educating the community about the consequences and renegotiating the terms of our relationship with publishers.

Scholarly work isn’t the only form of communication worth fighting for. The privately owned digital public sphere is a fertile if febrile commons where millions of people play out their identities and share ideas. The bargains we used to routinely accede to in order to get our research published were easy to ignore because we personally benefitted from them. In fact, we didn’t read the fine print, and we didn’t anticipate the consequences. Something very similar is going on in social networking.

Scholars and librarians champion the value of free and open exchange of ideas for the public good. It’s time to take those values beyond the academy. If we made an effort to help the public understand the tradeoffs we make to be part of the digital social sphere, maybe we’d all think more critically about how our public identities are formed and exploited – for what they are worth.
http://insidehighered.com/views/2008/02/18/fister.





HBO Agrees To Air ‘Taxi To The Dark Side’ After Discovery Drops It For Being Too ‘Controversial’

Taxi to the Dark Side, a documentary about an innocent Afghan taxi driver tortured to death by U.S. officials at Bagram Air Base, has received wide critical acclaim since its debut in April at the Tribeca Film Festival. The New York Times’s A.O. Scott said, “If recent American history is ever going to be discussed with the necessary clarity and ethical rigor, this film will be essential.”

Earlier this month, ThinkProgress reported that the Discovery Channel broke its contract to broadcast Taxi prior to the 2008 elections. With plans to take the company public, executives were afraid the “film’s controversial content might damage Discovery’s public offering.”

In a press release on Thursday, HBO announced that it has bought the rights to Taxi and will show the film in September 2008. TP reader Tim received a similar response from “Viewer Relations” at Discovery Communications, who said that they may also show the film on cable in 2009:

Quote:
In its first, pay tv window, HBO will debut the film in September, 2008. We are proud that Taxi to the Dark Side will make its basic cable debut in 2009 on Investigation Discovery, the network dedicated to providing in-depth programs that challenge viewers’ perceptions on important issues shaping our culture and defining our world.
ThinkProgress spoke with an HBO spokeswoman who explained why the network picked up Taxi: “It’s a great film and HBO always goes after high quality docs.”

A source told ThinkProgress that Discovery agreed to the deal with HBO after intense public criticism — including from the netroots. Discovery executives were also reportedly anxious that if Gibney received the Oscar for best documentary feature, he would make a speech denouncing the network.

How convenient for Discovery that it is now willing to show the film on its own channel in 2009…after President Bush is out of office.
http://thinkprogress.org/2008/02/22/hbo-discovery-taxi/





Infrared LEDs Make You Invisible to CCTV Cameras



Cory Doctorow

This German exibition is showcasing bright infrared LED devices that overwhelm the CCDs in security cameras, allowing you to move through modern society in relative privacy. I used this as a gimmick in my story I, Robot -- now I want to own one!

The URA / FILOART developed device promises to the citizens of a more reliable protection against security measures of the state (and other Überwachenden).

In addition to monitoring purposes organised systems interaction between man and machine is still IR.ASC an additional interaction between machines dar. This absurd accumulation of technology is symptomatic, because although the entire expense of the protection measures for the alleged safety of citizens is made, the person slips on the importance scale of the current security plan ever deeper down.

http://www.boingboing.net/2008/02/20...ds-make-y.html





Blinding Flashlight Developed as New Law Enforcement Tool

California company, working with DHS funds, develops a blinding flash light which may well replace taser guns, pepper spray, and rubber bullets as law enforcement's non-lethal weapon of choice

Tasers are controversial. Pepper spray may backfire. Rubber bullets are not always effective -- and at times too effective, killing the people they hit. A new weapon under development by DHS may well become the less-than-lethal weapon of choice for law enforcement officers. Baltimore WJZ's Derek Valcourt reports that the device is called LED Incapacitator, and that it is a high-tech flashlight that flashblinds. "This is much different than just shining a bright flashlight in somebody's face," said Bob Lieberman, president of Torrance, California-based Intelligent Optical Systems (IOS), which works on the LED Incapacitator. "It's designed to give the user an advantage over a potential adversary without causing any long-term damage." DHS awarded IOS an $800,000 contract to develop the flashlight technology in hopes that all law enforcement officers would be able to use the weapon to subdue, but not kill, suspects who refuse to follow orders. When shined into someone's eyes, the strobing light disorients and even temporarily blinds them. The effect lasts long enough to give law enforcement officials an upper hand, allowing them to tackle and even handcuff suspects before they can harm anyone.

The device flashes LED lights at several specific frequencies. Before your brain has time to adjust to one frequency, the incapacitator flashes another. Add multiple colors, which the eyes read differently, and the human brain just can not keep up. In fact, if you look at the strobing lights long enough it can make you sick. "The natural human response, they are going to wince or squint or turn their face away," said Commander Sid Hale with the L.A. County Sheriff's Office, who helped the develop the incapacitator. "This is about the safest thing you can find and still be considered some type of force. This is about one step above screaming and yelling at the guy."

DHS officials hope they can outfit Secret Service agents, border patrol, Coast Guard, and air marshals with the devices. "In effect what you are trying to do is get the person to close their eyes and make it hard for them to keep being aggressive and coming at you," DHS's David Throckmorton told Valcourt. "For them it would be to stop a terrorist or whoever from advancing." Throckmorton points out most law enforcement officers already carry flashlights. "You don't want the agents to have to carry multiple devices out there. So you would use this as a replacement. It's dual purpose. It's a flashlight and then when you go into a higher power mode, it will incapacitate people," he said.

Lieberman says the device is safe and will not cause long-term damage to the eyes. "We've been very careful to design this so that the maximum permissible limit for human eye safety is never exceeded," he said. Human trials on the device are expected to begin soon at Pennsylvania State University's Institute of Non-Lethal Defense Technologies. If all goes well, IOS expects the flashlights will be available to the law enforcement community by the fall. The company even hopes a smaller size model will be sold on store shelves for personal security. With its strobe light effect, DHS officials say this less than lethal weapon may even be used one day for crowd control. Larger model lights could be used to stop riots, like the ones in College Park after the University of Maryland basketball games in 2002 and 2006. They could even be mounted on prison walls to stop inmate riots.
http://hsdailywire.com/single.php?id=5600





Finland Censors Anti-Censorship Site

Calls it child porn
Dan Goodin

Finnish police are blocking more than 1,000 legal websites, including one belonging to a well-known internet activist, under a secretive system designed to prevent access to foreign sites that contain child pornography, according to a group that advocates for individual rights online.

Among the estimated 1,700 destinations on the secret block list is lapsiporno.info, which has vocally criticized the Finnish censorship program, according to Matti Nikki, the site's creator and a long-time activist.

Of the 700 or sites that have been tested, only two are known to contain inappropriate images of children, said Tapani Tarvainen chairman of the Electronic Frontier Finland (EFFI). The remainder tend to be sites with adult-oriented themes, such as those offering legal porn, and forums for gay sex. In some cases, the sites - which include an online doll store, a Thai Windows advice forum and a computer repair service - have no visible link to porn or sex at all.

The program has its roots in a law passed in late 2006 that was narrowly drafted to filter only foreign websites that contained child porn. To critics, the inclusion of sites like Nikki's, which is located in Finland and contains no pornographic images of any kind, demonstrates the slippery slope that gets started once censorship is allowed.

What's more, the censorship system threatens sites that offer all kinds of content, including political forums blogs and message boards. That's because it requires Finnish internet service providers (ISPs) to block entire web servers, so a single user posting a single inappropriate link has the ability to get an entire service shut out. As a result, plenty of legitimate sites based in the US, Europe and elsewhere, are blocked solely because they share space with a bad actor.

"It's a bit harsh for the Finnish police to tag them as child porn, and it certainly will hurt the reputation of these businesses," Nikki wrote in an email to The Register. "To my knowledge, the censored sites haven't been notified by the police about the situation either."

Nikki fights back

Nikki has compiled a list of sites he's found to be blocked. It contains about 1,000 entries, but he says Finnish police have claimed there are about 1,700 addresses in all. Finnish officials refuse to reveal the criteria for an individual site to get added to the list. Even for those sites that learn they are being censored, there is no clear way for owners to get their site to get removed.

In 2005, Nikki attracted international attention when he analyzed the secret digital rights management rootkit that Sony BMG was installing on users' computers. More recently, he's been an outspoken critic of the Finnish government's censorship plan. Last Tuesday, the EFFI says, the Finnish National Bureau of Investigation (NBI) added his site to their list, but has refused to say why.

Three days later, Finnish police said they wanted to question him in connection with an investigation to determine whether he aided in the distribution of material violating sexual chastity.

"Without knowing any details, a good guess is that the police suspect that having a clickable link to a web site allegedly containing child pornographic images is equivalent to aiding the distribution of such images," the EFFI surmised in this blog post on the censoring of Nikki's site.

Officials from the NBI weren't available at the time of writing. Helsingin Sanomat reported here that agency official Lars Henriksson defended the program. He said the list includes sites with content that meets the definition of child pornography, including those with links that lead to such pages.

"This is not censorship", Henriksson told the publication.

The irony of the draconian sweep is how easy it is for the censorship to be circumvented. A simple change to the DNS setting of an operating system or router, in which a Finnish ISP's official internet protocol address is substituted with OpenDNS or another alternate provider, is all that's required to get around the block.

Not that this gives Nikki or people at the EFFI any comfort. They worry that officials are already expanding the reach of the law beyond what was contemplated when it was enacted. How long, they ask, until its used to block sites alleged to promote copyright infringement, gambling or racist views?
http://www.theregister.co.uk/2008/02...nsor_activist/





Supreme Court Rejects ACLU Challenge to Wiretaps
Nick Juliano

The Supreme Court rejected a challenge to the Bush administration's domestic spying program. However, the justices' decision Tuesday included no comment explaining why they turned down the appeal from the American Civil Liberties Union.

“Although we are deeply disappointed with the Supreme Court’s refusal to review this case, it is worth noting that today’s action says nothing about the case’s merits and does not suggest in any way an endorsement of the lower court’s decision. The court’s unwillingness to act makes it even more important that Congress insist on legislative safeguards that will protect civil liberties without jeopardizing national security," ACLU Legal Director Steven R. Shapiro said in a news release.

The setback comes as Congress spars with President Bush over whether to grant legal immunity to telecommunications companies. The ACLU and other groups say some 40 similar lawsuits pending against the private companies, rather than the government itself, are among the only means of oversight of Bush's warratnless wiretapping program.

“Congress enacted the Foreign Intelligence Surveillance Act intending to protect the rights of U.S. citizens and residents, and the president systematically broke that law over a period of more than five years," said Jameel Jaffer, Director of the ACLU’s National Security Project. "It’s very disturbing that the president’s actions will not be reviewed by the Supreme Court. It shouldn’t be left to executive branch officials alone to determine what limits apply to their own surveillance activities and whether those limits are being honored. Allowing the executive branch to police itself flies in the face of the constitutional system of checks and balances.”

The court said plaintiffs represented by the ACLU could not sue the government because they could not prove their communications had been warrantlessly monitored by the National Security Agency. Shapiro also called it a "Catch-22" scenario because records of who the government spied on were classified.

The ACLU wanted the court to allow a lawsuit by the group and individuals over the warrantless wiretapping program. An appeals court dismissed the suit because the plaintiffs cannot prove their communications have been monitored.

The government has refused to turn over information about the closely guarded program that could reveal who has been under surveillance.
http://rawstory.com/news/2008/Suprem...e_to_0219.html





Wiretapping Made Easy
Andy Greenberg

Silently tapping into a private cell phone conversation is no longer a high-tech trick reserved for spies and the FBI. Thanks to the work of two young cyber-security researchers, cellular snooping may be soon be affordable enough for your next-door neighbor.

In a presentation Wednesday at the Black Hat security conference in Washington, D.C., David Hulton and Steve Muller demonstrated a new technique for cracking the encryption used to prevent eavesdropping on GSM cellular signals, the type of radio frequency coding used by major cellular service providers including AT&T, Cingular and T-Mobile. Combined with a radio receiver, the pair say their technique allows an eavesdropper to record a conversation on these networks from miles away and decode it in about half an hour with just $1,000 in computer storage and processing equipment.

Hulton, director of applications for the high-performance computing company Pico, and Muller, a researcher for mobile security firm CellCrypt, plan to make their decryption method free and public. In March, however, they say they'll start selling a faster version that can crack GSM encryption in just 30 seconds, charging between $200,000 and $500,000 for the premium version.

Who will be the customers for their innovative espionage technique? Hulton and Muller say they aren't sure yet. But they plan to offer the method to companies that will integrate it with radio technology, not sell it directly to the law enforcement and criminal customers who will undoubtedly be interested in putting it to use. "We're not creating the technology that does the interception," Muller says. "All this does is crunch data."

Hulton and Muller will likely make a tidy profit from the fruits of their research work, which they've personally patented. The companies they work for may profit less directly; Pico makes the high-performance processors necessary to do heavy-duty encryption work. CellCrypt makes software for encrypting mobile phone conversations, patching the security flaw that Hulton and Muller's research has uncovered.

As for the moral question of chipping away at the privacy of cell phone users around the world, Muller gives an answer common to security researchers: He and Hulton didn't invent the hackable technology; they just brought attention to its vulnerabilities.

In fact, Muller argues, GSM encryption was cracked--theoretically--in academic papers as early as 1998. "Active" radio interceptors, which impersonate cell towers and can eavesdrop on GSM phone conversations, have also been sold by companies like Comstrac and PGIS for years. (Active techniques, however, only allow eavesdropping from within about 600 feet and are easily detectable, Muller notes.) Undetectable, "passive" systems like the one that Muller and Hulton have created aren't new either, though previous technologies required about a million dollars worth of hardware and used a "brute force" tactic that tried 33 million times as many passwords to decrypt a cell signal.

All of that means, Hulton and Muller argue, that their cheaper technique is simply drawing needed attention to a problem that mobile carriers have long ignored--one that well-financed eavesdroppers may have been exploiting for years. "If governments or other people with millions of dollars can listen to your conversations right now, why shouldn't your next-door neighbor?" Muller says.

The new technique may serve as a wake-up call for mobile carriers, which have long been in denial about the vulnerabilities of GSM security, says Bruce Schneier, encryption guru and chief technology officer of BT Counterpane.

"This is a nice piece of work, but it isn't a surprise," he says. " We've been saying that this algorithm is weak for years. The mobile industry kept arguing that the attack was just theoretical. Well, now it's practical."

The GSMA trade association, which represents 700 GSM carriers around the world, didn't respond to a request for comment.

Although their exploit doesn't target the competing CDMA cellular technology used by carriers like Verizon and Sprint Nextel, Muller argues it's not necessarily less secure. GSM was only decrypted first because it's more popular worldwide: Few cell phone subscribers outside North America use CDMA carriers.

So how do Hulton and Muller ensure that their own phone conversations aren't intercepted? Muller responds to that question, posed by an audience member at Black Hat's gathering of hackers and security professionals, with a smile.

"We don't use phones," he says.
http://www.forbes.com/2008/02/21/cel...rss_popstories





U.S. Says Missed Intelligence After Spy Act Expired
Randall Mikkelsen

U.S. spy agencies have missed intelligence in the days since terrorism surveillance legislation expired, the Bush administration said on Friday, but Democrats accused it of fear mongering and blamed it for any gaps.

U.S. Attorney General Michael Mukasey and Director of National Intelligence Michael McConnell fired the latest shot in the administration's battle with Congress to obtain new legislation to wiretap terrorism suspects.

The officials told Congress telecommunications firms have been reluctant to cooperate with new wiretaps since six-month temporary legislation expired last weekend.

"We have lost intelligence information this past week as a direct result of the uncertainty created by Congress' failure to act," the two officials told House of Representatives Intelligence Committee Chairman Silvestre Reyes in a letter.

They urged Reyes, a Texas Democrat, to reconsider his opposition to legislation passed last week by the Senate.

But House Speaker Nancy Pelosi said Republican lawmakers and the administration had failed to participate on Friday in congressional staff negotiations over the bill, and noted President George W. Bush opposed extending the temporary act.

"The president and congressional Republicans have only themselves to blame," for any missed intelligence, said Pelosi, a California Democrat.

The measure passed by the Senate would provide retroactive lawsuit immunity to firms which cooperated with warrantless wiretaps that Bush authorized after the September 11 attacks.

Civil-liberties advocates oppose the immunity provision, and disagreement over the issue led to the collapse of efforts to pass a permanent overhaul of a 1978 surveillance bill that the administration says is obsolete.

Congress passed the temporary law last August in response to urgent administration warnings of gaps in U.S. intelligence capabilities.

The 1978 bill remains in effect, as do one-year wiretap authorizations made under the temporary law. But administration officials say the old bill is dangerously obsolete and their ability to collect new intelligence is hampered.

Mukasey and McConnell gave no details of the missed intelligence. They told Reyes, however, that some communications firms have balked at cooperating out of uncertainty over their legal exposure.

"In particular, they have delayed or refused compliance with our requests to initiate new surveillance of foreign intelligence targets," they said.

Democratic leaders of congressional intelligence and judiciary committees issued a statement that they were committed to passing new legislation and they urged Bush to support an extension of the temporary law.

Senate Majority Leader Harry Reid, a Nevada Democrat, said Bush was "crying wolf."

"No amount of fear mongering will change the fact that our intelligence collection capabilities have not been weakened since last week," Reid said.

(Editing by Sandra Maler)
http://www.reuters.com/article/busin...55854420080222





Reporter Visits Terror Watch List Center, Prevented from Seeing Map of Targets in America
Ryan Singel

National Public Radio correspondent Dina Temple-Raston got the first ever media tour of the Terrorist Screening Center, where 50 analysts follow-up on hits on the nation's sprawling terrorist watch lists, but right as she entered, the TSC shut down the "Big Board" a la Dr. Strangelove.

To get into the small, top-secret room where about 50 analysts from the FBI, Immigration and other agencies work, my escort has to punch a code into a small keypad and pull open a heavy steel door. He announces my presence by shouting a single word: "Uncleared."

With that signal, the flat screens in the cubicles around the room go dark. A giant, interactive map on a pull-down screen at the front of the office space switches to a nondescript picture of the center's logo. Flat screens show high-definition images of flowers and landscapes. Normally, the screen at the front of the office displays a large map of the United States sprinkled with dots, each dot representing the whereabouts of a terrorist or suspected terrorist in the continental United States. If I weren't in the room, it would look like the spy center in the movie Patriot Games.

"We pretty much are the one-stop-shop mechanism for any kind of terrorist encounter," Watch Commander Mike Ross says.

He says the terrorist-locator dots on the map in the room change color depending on how long it has been since a local law enforcement officer called in a positive encounter, or "hit." If you have ever wondered when you get pulled over in a traffic stop whether your name is being fed into a terrorist database, rest assured — it is. When the police officer puts your name and driver's license into his computer, he is linking to the TSC.

Last year, the center had more than 20,000 positive matches against the list, but little is known about the center's effectiveness.

The terrorist watch list now contains more than 500,000 entries, according to a recent ABC News report on a document that has since been pulled from the web.

Getting off the terrorist watch list is not a simple procedure, given the government won't confirm if a person is on a list or not, and the TSC doesn't take responsibility for names placed on the list by a law enforcement or intelligence agency.

But a traveler who suspects the watch list is wrongly snagging them at airports or the border can try to use DHS' online redress site, known as DHS TRIP.

The center is asking for a $1.3 million budget increase in 2008 to fund additional employees, including some who will vet names submitted to the agencies. The TSC also wants to station an agent at Chicago's O'Hare airport to help clear up mismatches. New York's JFK, Washington Dulles, Miami and Los Angeles already have such agents.

Currently the TSC employs 108 employees, including 17 FBI agents, with a budget of $103 million.

It's sad that Temple-Raston didn't come out with a snapshot of the big board, but you can read and listen to Inside the Terrorist Screening Center.

I wonder if the Terrorism Screening Center director had to warn her not to spy in the spying room?

From August http://blog.wired.com/27bstroke6/200...l#previouspost





Whistle-Blower Site Taken Offline
BBC

A controversial website that allows whistle-blowers to anonymously post government and corporate documents has been taken offline in the US.

Wikileaks.org, as it is known, was cut off from the internet following a California court ruling, the site says.

The case was brought by a Swiss bank after "several hundred" documents were posted about its offshore activities.

Other versions of the pages, hosted in countries such as Belgium and India, can still be accessed.

However, the main site was taken offline after the court ordered that Dynadot, which controls the site's domain name, should remove all traces of wikileaks from its servers.

The court also ordered that Dynadot should "prevent the domain name from resolving to the wikileaks.org website or any other website or server other than a blank park page, until further order of this Court."

Other orders included that the domain name be locked "to prevent transfer of the domain name to a different domain registrar" to prevent changes being made to the site.

Wikileaks claimed that the order was "unconstitutional" and said that the site had been "forcibly censored".

Web names

The case was brought by lawyers working for the Swiss banking group Julius Baer. It concerned several documents posted on the site which allegedly reveal that the bank was involved with money laundering and tax evasion.

The site was founded in 2006

The documents were allegedly posted by Rudolf Elmer, former vice president of the bank's Cayman Island's operation.

A spokesperson for Julius Baer said he could not comment on the case because of "pending legal proceedings".

The BBC understands that Julius Baer asked for the documents to be removed because they could have an impact on a separate legal case ongoing in Switzerland.

The court hearing took place last week and Dynadot blocked access from Friday evening.

Wikileaks says it was not represented at the hearing because it was "given only hours notice" via e-mail.

A document signed by Judge Jeffery White, who presided over the case, ordered Dynadot to follow six court orders.

As well as removing all records of the site form its servers, the hosting and domain name firm was ordered to produce "all prior or previous administrative and account records and data for the wikileaks.org domain name and account".

The order also demanded that details of the site's registrant, contacts, payment records and "IP addresses and associated data used by any person...who accessed the account for the domain name" to be handed over.

Wikileaks allows users to post documents anonymously.

Information bank

The site was founded in 2006 by dissidents, journalists, mathematicians and technologists from the US, Taiwan, Europe, Australia and South Africa.

It so far claims to have published more than 1.2 million documents.

It provoked controversy when it first appeared on the net with many commentators questioning the motives of the people behind the site.

It recently made available a confidential briefing document relating to the collapse of the UK's Northern Rock bank.

Lawyers working on behalf of the bank attempted to have the documents removed from the site. They can still be accessed.

Dynadot was contacted for this article but have so far not responded to requests for comment.
http://news.bbc.co.uk/1/hi/technology/7250916.stm





Judge Shuts Down Web Site Specializing in Leaks
Adam Liptak and Brad Stone

In a move that legal experts said could present a major test of First Amendment rights in the Internet era, a federal judge in San Francisco on Friday ordered the disabling of a Web site devoted to disclosing confidential information.

The site, Wikileaks.org, invites people to post leaked materials with the goal of discouraging “unethical behavior” by corporations and governments. It has posted documents said to show the rules of engagement for American troops in Iraq, a military manual for the operation of the detention center at Guantánamo Bay, Cuba, and other evidence of what it has called corporate waste and wrongdoing.

The case in San Francisco was brought by a Cayman Islands bank, Julius Baer Bank and Trust. In court papers, the bank said that “a disgruntled ex-employee who has engaged in a harassment and terror campaign” provided stolen documents to Wikileaks in violation of a confidentiality agreement and banking laws. According to Wikileaks, “the documents allegedly reveal secret Julius Baer trust structures used for asset hiding, money laundering and tax evasion.”

On Friday, Judge Jeffrey S. White of Federal District Court in San Francisco granted a permanent injunction ordering Dynadot, the site’s domain name registrar, to disable the Wikileaks.org domain name. The order had the effect of locking the front door to the site — a largely ineffectual action that kept back doors to the site, and several copies of it, available to sophisticated Web users who knew where to look.

Domain registrars like Dynadot, Register.com and GoDaddy .com provide domain names — the Web addresses users type into browsers — to Web site operators for a monthly fee. Judge White ordered Dynadot to disable the Wikileaks.org address and “lock” it to prevent the organization from transferring the name to another registrar.

The feebleness of the action suggests that the bank, and the judge, did not understand how the domain system works, or how quickly Web communities will move to counter actions they see as hostile to free speech online.

The site itself could still be accessed at its Internet Protocol address (http://88.80.13.160/) — the unique number that specifies a Web site’s location on the Internet. Wikileaks also maintained “mirror sites,” or copies usually produced to ensure against failures and this kind of legal action. Some sites were registered in Belgium (http://wikileaks.be/), Germany (http://wikileaks.de) and the Christmas Islands (http://wikileaks.cx) through domain registrars other than Dynadot, and so were not affected by the injunction.

Fans of the site and its mission rushed to publicize those alternate addresses this week. They have also distributed copies of the bank information on their own sites and via peer-to-peer file sharing networks.

In a separate order, also issued on Friday, Judge White ordered Wikileaks to stop distributing the bank documents. The second order, which the judge called an amended temporary restraining order, did not refer to the permanent injunction but may have been an effort to narrow it.

Lawyers for the bank and Dynadot did not respond to requests for comment. Judge White has scheduled a hearing in the case for Feb. 29.

In a statement on its site, Wikileaks compared Judge White’s orders to ones eventually overturned by the United States Supreme Court in the Pentagon Papers case in 1971. In that case, the federal government sought to enjoin publication by The New York Times and The Washington Post of a secret history of the Vietnam War.

“The Wikileaks injunction is the equivalent of forcing The Times’s printers to print blank pages and its power company to turn off press power,” the site said, referring to the order that sought to disable the entire site.

The site said it was founded by dissidents in China and journalists, mathematicians and computer specialists in the United States, Taiwan, Europe, Australia and South Africa. Its goal, it said, is to develop “an uncensorable Wikipedia for untraceable mass document leaking and analysis.”

Judge White’s order disabling the entire site “is clearly not constitutional,” said David Ardia, the director of the Citizen Media Law Project at Harvard Law School. “There is no justification under the First Amendment for shutting down an entire Web site.”

The narrower order, forbidding the dissemination of the disputed documents, is a more classic prior restraint on publication. Such orders are disfavored under the First Amendment and almost never survive appellate scrutiny.
http://www.nytimes.com/2008/02/20/us/20wiki.html?hp





Wikileaks Site Has a Friend in Sweden
David F. Gallagher

Why did lawyers for a bank in the Cayman Islands ask a judge in essence to turn off the domain name of the Wikileaks site? Perhaps because they could not get the site shut down by more traditional means.

Companies that believe they have some reason to have something taken off the Web routinely have their lawyers fire off letters to the Web hosting company of the site in question. In this case, Julius Baer Bank was interested in removing some of its internal documents that had ended up on Wikileaks, a site that exists to publish documents that someone would rather not see published. But Wikileaks had clearly planned ahead for this sort of thing. The records for the site’s I.P. address indicate that it is hosted by PRQ, based in Stockholm. PRQ’s home page offers clues that it’s not just another hosting company. It paraphrases a quote from Mike Godwin of the Electronic Frontier Foundation: “I worry about my children all the time. I worry that 10 years from now, they will come to me and say, ‘Daddy, where were you when they took freedom of speech away from the Internet?’”

As it turns out, PRQ is owned by two founders of the Pirate Bay, the BitTorrent tracker site that is Hollywood’s least favorite online destination. The Pirate Bay guys have made a sport out of taunting all forms of authority, including the Swedish police, and PRQ has gone out of its way to host sites that other companies wouldn’t touch. It is perhaps the world’s least lawyer-friendly hosting company and thus a perfect home for Wikileaks, which says it is “developing an uncensorable system for untraceable mass document leaking and public analysis.”

The bank’s lawyers may have asked PRQ to remove the documents and been laughed at, or they may have learned a little bit about the company and decided not to waste their time. (The lawyers are not responding to requests for comment, and PRQ has not replied to an e-mail query.)

The weak link for Wikileaks turned out to be Dynadot, the registrar for its domain name, based in San Mateo, Calif. In an innovative move, the bank got a judge to have Dynadot change the records for wikileaks.org so it would no longer direct Web surfers to the server in Sweden. This is a little like getting someone taken out of the phone book. But this being the Internet, people found other ways to get the number out there.
http://bits.blogs.nytimes.com/2008/0...end-in-sweden/





Wikileaks Judge Gets Pirate Bay Treatment
Dan Goodin

Analysis Every now and again, an event comes along and takes our breath away by reminding us just how far out of step the legal system can be with today's changing world. The latest example is last week's attempt by a federal judge in California to shutter Wikileaks, a website devoted to disclosing confidential information that exposes unethical behavior.

Almost a week after US District Judge Jeffrey White unequivocally ordered the disabling of the guerrilla outfit, it remains up, and its foot soldiers are as defiant as ever. More to the point, it continues to host internal documents purporting to prove that a bank located in the Cayman Islands engaged in money laundering and tax evasion - the same documents that landed it in hot water in the first place.

It remains doubtful that Wikileaks will ever be shut down. That's because the site is hosted by PRQ (http://prq.se/), a Sweden-based outfit that provides highly secure, no-questions-asked hosting services to its customers. It has almost no information about its clientele and maintains few if any of its own logs.

Oh yeah, PRQ is also run by Gottfrid Svartholm and Fredrik Neij, two of the founders of The Pirate Bay, the BitTorrent tracker site that, as a frequent target of the Hollywood elite, has amassed considerable expertise in withstanding legal attacks from powerful corporate interests.

Not that attorneys from the Julius Baer Bank and Trust, the bank accused of the misdeeds, haven't demanded PRQ disconnect the site.

"We have the usual small army of stupid lawyers that think we will piss our pants because they send us a scary letter," Svartholm said in a telephone interview. "We do employ our own legal staff. We are used to this sort of situation."

Also making a take-down difficult, Wikileaks maintains its own servers at undisclosed locations, keeps no logs and uses military-grade encryption to protect sources and other confidential information, according to an unidentified individual who answered a press inquiry sent to Wikileaks.

"Wikileaks certainly trusts no hosting provider," the person wrote.

There's a name for arrangements such as these. It's called "bulletproof hosting," and it's historically been used to insulate online criminal gangs against take-down efforts by law enforcers or private parties. As Wikileaks has demonstrated, the measure can also be used by those engaging in civil disobedience. Wikileaks uses a different term: "an uncensorable system for untraceable mass document leaking."

Farewell Smokestacks

All of this seems to have been lost on Judge White. Last Friday, he issued a sweeping court order that directed Wikileaks and a dizzying array of ISPs, DNS hosts and website server providers to suspend all Wikileaks websites. White went so far as to extend his directive to "all those in active concert or participation with the Wikileaks defendants ... and all others who receive notice of this order."

Given the number of internet users who have joined Wikileaks' cause since learning of the case, the order could easily extend to tens of thousands of people or groups, many of them well beyond the jurisdictional reach of White's San Francisco-based court.
Perhaps that's why the only practical effect his ruling had was to force a registrar by the name of Dynadot to suspend the Wikileaks.org domain name. The site remains reachable by accessing its IP address (http://88.80.13.160/wiki/Wikileaks) or alternate domain names such as Wikileaks.be (http://wikileaks.be/wiki/Wikileaks) and wikileaks.in (http://wikileaks.in/wiki/Wikileaks). That's akin to removing a person's name from the phone book but not disconnecting his phone.

White's lack of internet savvy was in further evidence when he directed that a copy of his order be emailed to Wikileaks within 24 hours of the issuance of his order. The only problem there was that the suspending of Wikileaks.org prevented the organization's email system from working.

It would appear White is still caught up in the age that preceded the internet, when trade secrets were generally written down on paper and a fair amount of effort was required to disseminate them. Back in this smokestack era, broad orders covering anyone involved even indirectly in the appropriation of trade secrets made sense because the orders frequently had the result of plugging the leak.

Not so in this case, where the internet is a central player. White's order has done little to stop the leak, and it can be argued that it has only made the leak bigger. A few days ago, nary a soul had heard of Julius Baer or Wikileaks. Julius Baer's alleged money laundering has since gone mainstream thanks to the order, which has generated an endless series of headlines and provoked the ire of censorship opponents who have begun spreading the internal documents on mirror sites and peer-to-peer networks.

There are also perceived shortcomings in White's order. Specifically, the directive disabling the entire site is perceived by some First Amendment lawyers as a clear violation of free speech. And his prohibition on the publishing of "any other new or additional yet unpublished documents and data" that might belong to Julius Baer, likely amounts to prior restraint, another constitutional no-no.

As Eric Goldman, a professor of Law at Santa Clara University and author of the Technology and Marketing Law Blog (http://blog.ericgoldman.org/), observes: "There's simply no good remedy once confidential information hits the internet, and that's very frustrating to judges who are used to solving problems." Judge White, welcome to the internet age.
http://www.theregister.co.uk/2008/02...proof_hosting/





Whistle While You Work

From government to big business, if you have a dirty secret, Wikileaks is your nightmare. David Leigh and Jonathan Franklin on the site a US court has tried to muzzle
David Leigh and Jonathan Franklin

A secretive Swiss bank landed an apparently novel censorship blow against the internet this week. Anyone who tried to call up wikileaks.org, a global website devoted to publicising leaked documents, found themselves frustrated. The site simply wasn't there any more.

The Julius Baer bank in Zurich succeeded in hamstringing the shadowy individuals behind the website by the simple trick of moving not against them, but against a US company that hosted their domain name.

Dynadot, the California resellers who collect a few dollars by this internet trade, submitted to a legal injunction ordering the name to be deleted. Yet however wise this scheme may have appeared at the time to the Swiss bank's Los Angeles lawyers, Lavely & Singer, it has now backfired in a big way.

The injunction blew up a gale of debate about internet freedom, and sprayed the bank's secret documents all over the net. It has also thrust into prominence an obscure group of dreamers and programmers who want to provide what they call an "untraceable and uncensorable" leaking machine, to be used by dissidents worldwide.

Those behind Wikileaks include Tibetan, Chinese and Thai political campaigners, an Australian hacking author, and Ben Laurie, a mathematician living in west London who is on the advisory board.

Wikileaks is not the first site of its kind. John Young, a New York architect, has been posting leaked intelligence documents on his Cryptome site for some years. But since its launch in late 2006, Wikileaks has had an impressive record.

When Northern Rock collapsed last autumn, print media in London were gagged by a judge's order from re-publishing its leaked sales prospectus. It was Wikileaks that kept the prospectus before the public, along with the text of some threatening "not for publication" letters from the British lawyers, Schillings.

In the US, Wikileaks also made headlines last November with the publication of secret documents, including the 238-page manual Standard Operating Procedures for Camp Delta, a document that even the US military grudgingly admitted was genuine. The Guantánamo document, including descriptions of everything from transferring prisoners to evading protocols of the Geneva convention, was a comprehensive guide to day-to-day operations at the controversial prison.

Wikileaks landed an even bigger coup last August with a previously secret 110-page draft report by the international investigators Kroll, which revealed allegations of massive corruption in Kenya. The family of former Kenyan leader Daniel Arap Moi were reported to have siphoned off more than £1bn.

The reason Wikileaks has now enraged the Zurich bank is that pages have been posted detailing the bankers' most intimate trade secret: the way they hide the funds of their ultra-rich international clients in offshore trusts. This sort of material is very hot stuff. In Germany, the federal intelligence service recently paid an informer almost £4m for a disc containing similar details from a Liechtenstein bank. That led to raids on hundreds of suspected tax evaders, the disgrace of prominent businessmen, and a diplomatic collision with the tiny tax haven.

The person Baer describes as a disgruntled former employee at their own Cayman Islands office has similarly made off with a large quantity of internal records. A handful of these have made their way on to the Wikileaks site, which advertises that individuals can leak with the confidence they won't be discovered, thanks to the site's cryptographic protection.

The files tell some interesting stories. One of Margaret Thatcher's life peers allegedly salted away more than $100m (£50m) in a secret trust, for example. The late Lawrence Kadoorie, a Hong Kong millionaire, was ennobled in 1981 by the former British prime minister. He had built up the family's fortunes through China Light and Power, which provides Hong Kong with its electricity, and through a chain of hotels. According to the files, the Baer bank ran an anonymous company, registered in the British Virgin Islands and called Seneford Investments. A nominee director was based in a second tax haven, the Cayman Islands. But the real owner of Seneford Investments, it is claimed, was Kadoorie's family trust. In 1998, the documents listed six bank accounts for the company, in Switzerland and elsewhere. They held a total of $113m. There is no suggestion that this was illegal.

Kadoorie's son, Sir Michael, who still has major interests in the Hong Kong companies, did not respond yesterday to invitations from the Guardian to comment.

The other bank records posted by Wikileaks describe equally elaborate structures husbanding millions of pounds for Spanish financiers, Greek ship-owners, Chinese expatriates and wealthy New Yorkers. Although the leaker hints that tax frauds and bribery may lie behind some of these other accounts, he does not give enough detail to provide proof.

Wikileaks itself admits that some of the documents might be fabricated, and the whole affair might have only been seen as a curiosity, had the Baer bank not called in their lawyers. The federal judge Jeffrey White in San Francisco not only ordered removal of the domain name, but banned further circulation of the documents. As a result, they reappeared on Wikileaks "mirror" sites, hosted in the UK, Belgium and the Christmas Islands. It even transpired that the deleted main Wikileaks site could be accessed, slightly less conveniently, by using its IP number (88.80.13.160) instead of the domain name.

Bloggers, online columnists and websites decried the bank's move as they launched a counterattack and lobbied in favour of Wikileaks' right to anonymously publish secrets. Less than a week after the court decision, a Google search for the court case turned up 69,000 hits. Four hours later, the tally was 78,000.

A further hearing on February 29 may well overturn the original decision.

The Zurich bank says: "It was the sole objective of Julius Baer to have legally protected documents removed from Wikileaks. We brought legal action against the website only after our initial efforts proved unsuccessful. In the course of taking such action, the bank has been made the subject of serious defamatory allegations. Such allegations are based on forged and stolen documents and are unequivocally denied. We have always sought to act in the best interests of our clients and shall continue to do so."

Who are Wikileaks? Although the project makes a feature of the anonymity of its volunteers, the minds behind it are not hard to find. One prominent driving force is Julian Assange, a much-travelled Australian programmer and author who has a flamboyant mane of silver hair. Before riding his motorcycle across Vietnam, he co-wrote a book about computer hackers.

"He's a pretty standard modern geek with a thing about dissidents," says the British encryption expert Ben Laurie, who advised the group on encryption. "He's quite techie and he can write code."

One of Assange's early schemes was to develop what he called "deniable cryptography". The idea was to help dissidents resist giving away secrets under torture. Texts would be encrypted in layers, so that even if a victim were forced to reveal a password, the torturer would not realise there was a second layer of information, hidden by a second password.

Assange then turned up in London and proposed the Wikileaks scheme for "an open-source, democratic intelligence agency". Laurie said: "I thought it was all hot air at first." But he became enthusiastic. He advised on an encryption system, first developed by the US Navy, which uses a chain of three separate servers, and ensures leakers can post documents anonymously.

Laurie is an international consultant on internet security. Earlier he set up a business that bought two military bunkers, at the abandoned US base at Greenham Common, and at an old RAF radar station in Kent. His company rents them out to firms and banks who want to protect their servers from attack. The Kent bunker is deep underground: "The radar operators were supposed to survive 30 days after a nuclear strike."

Some of his subversiveness may have rubbed off from his father, Peter Laurie, who wrote a cult book in the 1970s called Beneath the City Streets, which traced networks of secret government bunkers and tunnels.

Fresh off a flight from Washington, he answers the door to his rambling house in Acton in bare feet, and willingly explains why he approves of Wikileaks, while pointing out he is not personally responsible for any of their legally controversial deeds: "I have a long-term interest in privacy on the internet. It provides enormous opportunities for surveillance and this is not a good thing. Also, this is an interesting technical problem: how do you reveal things about powerful people without getting your arse kicked? Whistleblowing is a practice which should be encouraged.

"I'm really quite surprised at Wikileaks' success. They've done a lot of interesting stuff. It seems people are prepared to take the risk."

Another member of the advisory board is an American former draft resister, CJ Hinke. Speaking from his home in Thailand, he said: "Wikileaks is a decentralised phenomenon, and that means there are volunteers in dozens of countries. These volunteers form a very loose network so that, in fact, government can't home in on anybody and take drastic action against them."

In Thailand, Wikileaks has focused on efforts to block access to websites critical of the government. "The minute Wikileaks was announced, we sent them a huge trove of secret documents," said Hinke, founder of Freedom Against Censorship Thailand.

The documents included detailed lists of blocked sites, including all references to The King Never Smiles, a book published by Yale University Press. "Ordinary people come across things that governments or companies or individuals would prefer to keep secret. I think it is possible for almost everybody to expose these kind of events."

The wikileakers share the same belief in the "wisdom of crowds" that lies behind Wikipedia, the online encyclopaedia. Their theory is that their leaked documents will be self-verifying, thanks to the scrutiny of thousands of pairs of eyes. Some may wonder whether it's quite as easy as that.

Laurie cautions that Wikileaks' vaunted encryption is not completely unbreakable. Codebreakers such as the US National Security Agency could probably crack it, he says. "If my life was on the line, I would not be submitting [documents] to Wikileaks."
http://www.guardian.co.uk/theguardia...3/internet.usa





Look Before You Leak
Robert X. Cringely

I bet you thought people banked in the Cayman Islands because they serve fruity cocktails with tiny parasols in them while you're waiting for your checks to clear. Well, you're only partly right. The other reason people keep accounts in the Caymans is to avoid paying taxes and/or to launder their ill-gotten gains.

For many of us this is not news -- or at least it wouldn't be, if not for the brain-dead actions of one such bank and the magistrate they duped into being their monkey.

Swiss Bank Julius Baer used its legal muscle to convince a U.S. judge to close down the WikiLeaks.org domain, because the site contains documents that allegedly show Baer is exchanging its clients' dirty old dineros for fresh clean ones with just a hint of mint.

Some background: WikiLeaks.org exists so anonymous whistle blowers around the globe can document human rights offenses, corporate malfeasance, nuclear accidents, and the like. The world gets to see what nasty things those in power have been up to, while the leakers get to live their lives without being waterboarded (or worse).

Because WikiLeaks operates anonymously across several jurisdictions, Julius Baer couldn't figure out how to sue the site directly for copyright infringement. So last Friday the bank found a friendly judge, who ordered the site's California hosting company (Dynadot) to turn off the WikiLeaks.org domain. According to Wired News, WikiLeaks was only notified of the hearing by e-mail a few hours before it was scheduled to happen, and didn't have time to muster its squad of pro bono attorneys.

Personally, I don't think Baer was overly concerned the world would know its Cayman branch (allegedly) exists to launder money and avoid taxes. I think the bank didn't want its rich, extremely powerful, allegedly money laundering/tax evading clientele to be exposed. Bad for business, you know.

But the bank's solution is so mind-bogglingly stupid, you have to wonder if these guys need help getting their pants on each morning.

First, this is exactly the kind of story bloggers and Net-centric journos crave. Big nasty corporation stomps all over plucky public-serving underdog. Who can resist that plot line?

Second, the equation Bank Julius Baer = Money Laundering is now firmly cemented in the minds of everyone who has encountered this story, regardless of whether it's true.

Trois: The documents in question, which might have been quickly forgotten alongside the 1.2 million others on the site, are now hotter than the Paris Hilton sex video. Dozens of mirror sites have sprung up, and Cryptome.org and PirateBay have squirreled away copies of the docs for any interested parties.

Oh, and by the way, the judge's order failed to shut down the site. The IP numbers (88.80.13.160) still work, as do its Belgian and Christmas Island domains. Or they would, only last time I checked the sites were overwhelmed with traffic from people with a sudden keen interest in Cayman Islands banking.

It's a fascinating study in how the courts and high-powered corporations still manage to shoot themselves in the feet when they try to manipulate the Net. (Remember: The Internet is not a dump truck, it's a series of tubes.) But it's also an illustration of why things like NSA wiretaps and efforts to throttle network traffic must be opposed.

Tap the Net backbone, and you make it much harder to post documents to places like WikiLeaks anonymously. (If you think those taps will only be used to identify terrorists, you're living in a fantasy world.) Suddenly the planet becomes a lot more dangerous for whistle blowers.

But this story also touches on both telecom immunity and Net neutrality. Say you're an AT&T employee who wants to post evidence revealing how the company deployed illegal wire taps. What's to keep your friendly telecom provider from killing those bits before they ever reach their destination? This is the kind of thing that will happen when ISPs are asked to become traffic cops, as the recording and movie industries have proposed.

As crypto-wonk Bruce Schneier has eloquently stated, this ain't about security, it's about control. Corporations and governments have an insatiable appetite for it. But I think we're all better off when they go hungry.
http://weblog.infoworld.com/robertxc...aks_money.html





Judge May Hold Reporter in Contempt
Hope Yen

A federal judge said Tuesday he will hold a former USA Today reporter in contempt if she continues refusing to identify sources for stories about a former Army scientist under scrutiny in the 2001 anthrax attacks.

U.S. District Judge Reggie B. Walton said reporter Toni Locy defied his order last August that she cooperate with Steven J. Hatfill in his lawsuit against the government. Walton indicated he would impose a fine until she divulged her sources, but that he would take a few more days to decide whether to postpone the penalty as she pursues an appeal.

The judge is also considering whether to find former CBS reporter James Stewart in contempt.

''I will order she provide the sources of information,'' Walton said during a hearing, as Locy, dressed in black, looked grim and slowly shook her head in disagreement.

''I don't like to have to hold anyone in contempt,'' the judge added, but when it comes to cases where a person says his reputation was destroyed because of stories published about him, ''the media has to be responsible.''

Both Locy, who is also a former Associated Press reporter, and her attorney, Robert C. Bernius, declined to comment after the hearing.

Walton did not immediately indicate the amount of the fine. Hatfill's attorneys have asked Walton to initially fine Locy $1,000 per day and to prohibit media corporations from paying the fines for her to force compliance. The proposed daily fine would have increased to $2,000 after a week and continue to increase $1,000 every week.

In Stewart's case, Walton said he would take a few weeks to consider the reporter's claim that divulging his sources was no longer necessary since several law enforcement officials had already acknowledged talking to reporters in the case about information similar to what Stewart reported.

Hatfill, who worked at the Army's infectious diseases laboratory from 1997 to 1999, was publicly identified as a ''person of interest'' in the 2001 anthrax attacks. He is suing the Justice Department, accusing the agency of violating the federal Privacy Act by giving reporters information about the FBI's investigation of him.

Walton previously ordered five journalists to reveal all of their sources. Stewart and Locy refused, saying Hatfill was partly to blame for news stories identifying him as a suspect after his attorney provided details about the investigation.

During Tuesday's hearing, Bernius also argued that Locy could not remember who gave her information specifically about Hatfill and that she should not be forced to disclose the names of roughly 10 FBI and Justice Department officials who spoke to her generally about the anthrax investigation.

That immediately drew a skeptical response from Walton.

''I'm not suggesting that Ms. Locy would not be truthful, but it would be convenient for reporters in this type of situation to say 'I don't remember' and then be off the hook,'' Walton said. ''That would be one way to avoid the serious consequences of the law.''

Walton's move is the latest in a handful of cases nationwide, most notably in Washington, in which reporters have been held in contempt for failing to reveal confidential sources.

In 2004, U.S. District Judge Thomas Penfield Jackson fined five reporters $500 a day each for refusing to identify their sources for stories about Wen Ho Lee, a former nuclear weapons scientist once suspected of spying. After Jackson postponed the fines pending appeals, news organizations including The AP eventually agreed to pay Lee $750,000 as part of a $1.6 million settlement of his privacy lawsuit against the government after the U.S. Supreme Court declined to hear appeals in the case.

More recently, last year nearly a dozen of Washington's best-known journalists took the stand during the CIA leak criminal trial, most of them unwillingly under court order by Walton, to recount confidential interviews. In that case, New York Times reporter Judith Miller was sent to jail for 85 days after refusing to disclose her sources.
http://seattletimes.nwsource.com/htm...yndication=rss





Jack Thompson Served With Order to Show Cause by State Supreme Court
Chris Peredun

Thompson given until March 5th to prove that he has not "abused the legal system"

Whenever a tragedy occurs, it is virtually a given that Florida attorney Jack Thompson is making a beeline for the nearest media outlet to voice his predictable opinion that video games were the cause of the violent outburst, and has made several attempts to use the legal system to further his cause; however, the Florida Supreme Court appears to be striking back.

GamePolitics, who has had no shortage of communication with Thompson in the past, is reporting that Thompson himself has forwarded the Florida Supreme Court's "Order to Show Cause" that was sent to Thompson's office earlier this week, and has posted the following excerpt from the email exchange:

Quote:
02/19/2008 ORDER-SHOW CAUSE
TO: JOHN BRUCE THOMPSON
It appears to the Court that you have abused the legal system by submitting numerous frivolous and inappropriate filings in this Court.

Therefore, it is ordered that you shall show cause on or before March 5, 2008, why this Court should not find that you have abused the legal system process and impose upon you a sanction for abusing the legal system, including, but not limited to directing the Clerk of this Court to reject for filing any future pleadings, petitions, motions, letters, documents, or other filings submitted to this Court by you unless signed by a member of The Florida Bar other than yourself.
The phrase "numerous frivolous and inappropriate filings" stands out to any member of the gaming community familiar with Mr. Thompson's less-than-stellar record in attempting to sway the gaming industry. Mr. Thompson's vitriolic response was both equally amusing and confusing, as he the eggs on the very court that serves him the notice:

Quote:
This is the single greatest gift that any court has ever given me in my 31 years of practicing law. I shall now, through a new federal lawsuit, deconstruct The Florida Bar ... This court has threatened Thompson. He does not threaten back. He hereby informs this court that he will see it in federal court.
The Florida court is looking forward to this appearance.
http://www.dailytech.com/Jack+Thomps...ticle10819.htm





Pirate Bay Mysteriously Reappears on Yahoo
Chloe Lake

YAHOO search has resumed linking to file-sharing website The Pirate Bay without explaining why the site disappeared from its search results earlier this week.

The Pirate Bay, based in Sweden, is the world's largest source of BitTorrent files and has repeatedly faced international legal action for linking to pirated material.

Yahoo began removing direct links to The Pirate Bay from its search results earlier this week. A search for the words "pirate bay" returned a list of other websites that mentioned the The Pirate Bay, such as Wikipedia, but no link to the website itself.

The Pirate Bay contains a database of torrent files, which contain information needed to share larger files such as movies and music with other people. The website has argued that since the torrent files themselves do not contain copyrighted material, it is not illegal to store them.

File-sharing blog TorrentFreak first reported that the website had disappeared from Yahoo's search results on February 18.

On Wednesday, The Pirate Bay reappeared in search results on Yahoo7 Australia after a request for information was sent to the company by NEWS.com.au.

The Pirate Bay has since reappeared on the websites of Yahoo US and Yahoo UK as well – but no reason for the turnaround has been given.

A spokesperson for Yahoo7 Australia said they were "unable to comment" on the removal of direct links to the website.

The Pirate Bay co-founder "Brokep" said Yahoo's filtering of search results was "dangerous".

"Yahoo should let the governments decide, not themselves," he told TorrentFreak.

"It’s dangerous when companies take the law into their own hands.”

The Pirate Bay has been a major target for anti-piracy bodies the Recording Industry Association of America (RIAA), the Motion Picture Association of America (MPAA) and the International Federation of the Phonographic Industry (IFPI).

It is currently facing legal action in Sweden and pressure in Denmark, where a court ordered local internet service provider Tele2 to block all access to the website.

Filtering of search results by companies such as Yahoo and Google is a controversial issue which many claim has serious implications for free speech.

Earlier this month a Chinese university professor who lost his job after founding a democratic political party said he planned to take legal action against Yahoo and Google in the US for censoring his website from search results in China.
http://www.news.com.au/technology/st...014239,00.html





Opera CTO: How to Fix Microsoft's Browser Issues

Embrace the standards, nicely, or get out of browsers
Håkon Wium Lie

If there was a functioning market for web browsers and operating systems, the past few weeks would have seen two announcements from Microsoft. After a firestorm of criticism from the web design community about Internet Explorer 8's misguided mode switching proposal, Redmond would have publicly backed down. Second, Microsoft would have bowed to 90,000 users demanding that Windows XP continue to be sold.

There were no such announcements. Why? Because Microsoft, with its dominating position in the web browser and operating system markets, acts like a monopoly.

A monopoly doesn't have to consider its customers' wants or needs. In a functioning market, vendors must consider such things in order to compete successfully. But the market isn't functioning.

Microsoft's failure to respond to its customers' outcry shows that it is time to call on established antitrust laws that allow governments to impose sanctions on a vendor that has a dominant position in a market. The purpose of these sanctions is to ensure competition and innovation and thereby create a market in which consumers are heard.

Recently, the European Commission opened several investigations into Microsoft's dominant position. As a regulatory body, they could decide to impose sanctions and while Microsoft might ignore their frustrated customers, they would have a harder time ignoring the European Commission.

So, what should the European Commission demand from Microsoft?

In the area of web browsers, Opera Software has proposed a specific kind of remedy - that Microsoft only be allowed to distribute standards-compliant browsers. Microsoft's IE is bug-ridden and the company, despite its vast resources, has shown little interest in fixing problems that cost web designers time and sleep. IE dominates the web due to its being bundled with Windows. This forces web designers to prioritize coding for IE. Coding for standards-compliant browsers becomes a secondary consideration.

Microsoft is keenly aware of this and therefore has little interest in improving their support for standards. They will never become standards compliant unless forced by someone in a position to demand a change, something that users and customers are not. Requiring standard compliance would greatly lessen Microsoft's monopolistic stranglehold in the web browser market, would delight web developers everywhere and would, ironically, make IE a better product.

So, if the web community could impose requirements on Microsoft's browser, what would they be? Here is my list:

1. Support Acid2 and Acid3, by default. Acid2 is a well-known test and the follow-up Acid3 is being finalized. The tests must be passed by default. That is, users or authors should not have to select "standards mode", which is guaranteed to minimize the impact of standards.

2. Support the underlying specifications. The Acid tests are written to help browser vendors who act in good faith, and they do not guarantee compliance with the underlying specifications. Microsoft must commit to implementing the underlying specifications of the Acid2 and Acid3 tests.

3. Provide documentation. Lack of documentation on how IE implements standards has been a problem for web developers. For each specification Microsoft implements, it must provide a detailed list of limitations, bugs and extensions. The list must be publicly available.

4. Drop mode switching. Documents that trigger standards mode in IE6 or IE7 (or almost standards mode, as per the documentation in Wikipedia and on Microsoft's site) shall continue to trigger standards mode in the future. No new magic switches can be introduced.

5. Commit to interoperability. It is important to ensure that Microsoft remains committed to supporting web standards, even beyond Acid2 and Acid3. If two or more major web browsers, in official shipping versions, add standards-related functionality that's generally considered useful to the progress of the web, and described in a publicly available specification, Microsoft must add the same functionality.

Microsoft will surely claim that it's impossible for them to develop a browser that complies with the proposed requirements. However, other browsers have played by these rules for years. If Microsoft can't live up to the standards of the web, I suggest they leave the browser business.

What would be on your list?
http://www.theregister.co.uk/2008/02...s_reform_plan/





Microsoft to Share More Technical Secrets
Steve Lohr

Seeking to satisfy European antitrust officials, Microsoft said on Thursday that it would open up and share many more of its technical secrets with the rest of the software industry and competitors.

Microsoft executives, in a conference call, characterized the announcement as a “strategic shift” in the company’s business practices and its handling of technical information. They also portrayed the moves as only partly a nod to the continuing challenge Microsoft faces from Europe’s antitrust regulators.

The broader goal, they said, is to bring Microsoft’s flagship personal computer products — the Windows operating system and Office productivity programs — further into the Internet era of computing. Increasingly, people want a seamless flow of documents, data and programming code among desktop PCs and the Internet, especially as they make the shift from using software on a PC to using services on the Web.

“These steps are being taken on our own,” said Steven A. Ballmer, Microsoft’s chief executive. The move, he said, was a recognition of Microsoft’s “unique legal situation,” but it was also the company’s effort to adapt to “the opportunities and risks of a more connected, more services-oriented world.”

Microsoft’s first step will be to put on its Web site 30,000 pages of technical documentation detailing how its Windows desktop and Microsoft server programs communicate and share information. Until now, that information was treated as a trade secret and was available only under a special license.

Ray Ozzie, Microsoft’s chief software architect, said that by sharing more information, Microsoft would make it easier for others to write Internet programs that tap into personal information on a PC.

That, Mr. Ozzie added, should bring new sets of Web services that, for example, might match a person’s calendar information with a doctor’s schedule. Then smart software could make an appointment. At home, he noted, someone’s digital collection of music, movies and family photos would be more easily shuffled to different devices and screens.

“The Internet opens up a world of potential innovation,” Mr. Ozzie said. “And I think we’ve just scratched the surface.”

Microsoft announced other plans to open up its technology, like allowing developers to add more non-Microsoft document formats to its Office word processing and spreadsheet programs. Microsoft also made commitments to increase its support for industry standards and work with open-source software developers.

European regulators and others have long accused Microsoft of using its dominance in PC operating systems and software to lock out competitors. Last October, after a nine-year confrontation and a ruling against the company by Europe’s second-highest court, Microsoft agreed to share information with rivals on terms it had long resisted. Then, after fresh complaints from Microsoft’s competitors, the European antitrust regulators last month announced that they were opening new investigations of the company.

The new inquiry focuses partly on whether Microsoft has withheld essential information from competitors that want to make products that work smoothly with its Office programs. The Office products were not part of the previous European action against Microsoft.

After the Microsoft announcement on Thursday, the European Commission issued a skeptical statement. The commission said it “would welcome any move towards genuine interoperability,” or allowing software programs from different companies to work smoothly together. But the commission noted that “today’s announcement follows at least four similar statements by Microsoft in the past on the importance of interoperability.”

Asked about the commission’s statement, Bradford L. Smith, Microsoft’s general counsel, said that the company’s moves were “qualitatively and quantitatively different from anything we’ve done in the past.”

“People will test us not just by our words but by our actions,” Mr. Smith added.

The industry is taking a wait-and-see stance on Microsoft’s plan. Linux, an open-source competitor to Windows, stands to benefit from Microsoft’s more open posture. Regulators and competition are “forcing Microsoft to change the way it does business,” said James Zemlin, executive director of the Linux Foundation, a nonprofit consortium.

The change comes as Microsoft is trying to buy Yahoo, a huge deal that, if it proceeds, will be closely scrutinized by antitrust officials worldwide. The European regulators typically take a harder line than their American counterparts in challenging takeovers.

“To get the deal approved, Microsoft has to convince the European regulators that it has changed its spots on interoperability, no longer acting like a proprietary monopoly,” said Ken Wasch, president of the Software and Information Industry Association, a trade group that includes Microsoft competitors like I.B.M., Oracle, Sun Microsystems and Red Hat.

Microsoft is also trying to win approval from an international standards body for its new document format, Office Open XML. Microsoft contends its format is “open,” meaning files in the format can be created and read by anyone.

A different format standard for Internet-based computing, the OpenDocument Format, is supported by I.B.M., Google, Oracle and other Microsoft rivals. They assert that the proposed Microsoft standard is complex and layered with the company’s own features, making it effectively a corporate standard instead of a truly open one.

Last September, Microsoft failed to win enough support for its standard from the International Organization for Standardization. But the standards body will review that decision in proceedings that begin next week.
http://www.nytimes.com/2008/02/22/te...gy/22soft.html





EU Regulators Skeptical on Microsoft's Plan to Share Technology
AP

European Union regulators are expressing skepticism over Microsoft's latest offer to share more information about its products and technology.

The EU said in a statement Thursday it has seen four other similar statements in the past from the world's largest software maker.

Earlier Thursday, Microsoft announced it will be publishing technical information about its products to ensure interoperability with rivals' offerings. It won't make software developers obtain a license or pay royalties or other fees.

The EU also said it would welcome any move toward "genuine interoperability." And regulators added they'll continue to check if Microsoft is complying with antitrust rules.
http://www.siliconvalley.com/news/ci_8325169





Maybe Microsoft Should Stalk Different Prey
Randall Stross

OVER the years, Microsoft has pummeled countless rivals, including the superheavyweight I.B.M. But it has never faced a smaller foe as formidable as Google. The tale of the tape gives Microsoft a $100 billion advantage in market capitalization, but it counts for little: Google appears to be its superior in strength, speed, smarts.

Having exhausted its best ideas on how to deal with Google, Microsoft is now working its way down the list to dubious ones — like pursuing a hostile bid for Yahoo. Michael A. Cusumano, who has written several books about the software industry and about Microsoft, is not impressed with Microsoft’s rationale for its Yahoo offer. He said the bid seemed to be a pursuit of “an old-style Internet asset, in decline, and at a premium.”

Determined to match Google in search and online advertising, Microsoft has managed to overlook a plain-vanilla strategy, the oldest one in the book: build on its own strengths. What it does best is to sell software to corporations, for all sorts of applications, visible and not so visible, at a handsome profit.

If Microsoft thinks this is the right time to try a major acquisition on a scale it has never tried before, it should not pursue Yahoo. Rather, it should acquire another major player in business software, merging Microsoft’s strength with that of another. This is more likely to produce a happier outcome than yoking two ailing businesses, Yahoo’s and its own online offerings, and hoping for a miracle.

For an illustration of how Microsoft could select targets more judiciously, Mr. Cusumano, who is a professor at the Sloan School of Management at the Massachusetts Institute of Technology, pointed to the Oracle Corporation’s strategic acquisitions and its prudent use of capital to “roll up firms with similar products and customers to its own.” With impressive regularity — 13 strategic acquisitions in 2005, another 13 in 2006 and 11 in 2007 — Oracle has picked up key products and customers while avoiding an “oops” slip, venturing too far away from its core business, or paying too much. At no point along the way has it acted in a fit of desperation.

Last month, Oracle pulled in another major prize, BEA Systems, a leading software company, for about $8.5 billion. You’ve probably never heard of BEA: it’s doubly obscure, producing the behind-the-scenes infrastructure that large companies use to build behind-the-scenes software systems for their entire business, or “enterprise software.” Both Oracle and BEA are based in Silicon Valley, but their side of the street is not lit by klieg lights and does not get the same attention as the Googles and Yahoos.

And, to be honest, it’s not much fun hanging out on the enterprise side of the software business. BEA says its software helps organizations “ensure that business processes are optimally defined, managed, executed and monitored.” Unless you’re playing Business Jargon Bingo, it’s hard to sit still and remain attentive. You have to admire Oracle’s ability to remain focused on the business that serves business and to not be distracted by the buzz of the Web crowd gathered across the street.

Microsoft does business software well. Approximately half its revenue comes from business customers for its e-mail infrastructure, database systems, developer tools, Office productivity applications and other mainstays. It has also assembled, through acquisitions, a fledgling line of enterprise software that it calls Microsoft Dynamics. Microsoft would like Dynamics to be viewed as competing head to head with the No. 2 name in enterprise software, Oracle, or the No. 1, SAP of Germany. For the moment, however, Microsoft Dynamics’ parity with those big names is nothing more than wishful aspiration.

Professor Cusumano has a suggestion: Rather than acquire Yahoo, Microsoft should pursue SAP.

It’s not an outlandish idea. The two companies held merger talks in late 2003, and perhaps since then, too. Microsoft is in an enviable position: it is a nearly universal presence in corporate data centers, and large enterprise customers are arguably the best customers a software company can have. Clients pay very dear prices for the complex, semicustomized software that runs their business. And once they’ve got their systems running — a process that can take years to complete — they aren’t inclined to change vendors lightly.

A few dozen well-paying Fortune 500 customers may actually be more valuable than tens of millions of Web e-mail “customers” who pay nothing for the service and whose attention is not highly valued by online advertisers.

Today, SAP’s market capitalization is about $59 billion, and a sizable premium to get a deal done would send its price well north of that. Microsoft cannot put both SAP and Yahoo in its shopping cart, deals that together might run well over $120 billion. Microsoft must pick one or the other.

Suppose that Lawrence J. Ellison, the chief executive of Oracle, were the head of Microsoft and was doing the shopping. Which deal would he choose? Past experience suggests that it would not be Yahoo. That acquisition would bring little but duplication headaches — and no large enterprise customers.

It’s amusing to note that the most Larry-like choice, Microsoft’s acquiring of SAP and leaving it alone as an autonomous division to avoid a cross-cultural integration fiasco, is the course that would be most discomfiting to Oracle. Frank Scavo, president of Computer Economics, an information technology research firm, in Irvine, Calif., said that “a Microsoft-SAP combination would be Oracle’s worst nightmare.”

Google would not be happy with a conjoined Microsoft and SAP, either. It has made a pro forma expression of its own opposition to a Microsoft-Yahoo merger, but we can speculate that it may be cheering that deal on. Working in Google’s favor are the hostile nature of Microsoft’s bid, the colossal potential for integration problems, and organizational paralysis in, and exodus of talent from, Yahoo.

But were Microsoft to turn and head in SAP’s direction, Google would have reason for concern. Whatever strengthens Microsoft is bound to influence, later if not sooner, its continuing competition with Google. For its own part, Google is keen to expand its foothold inside large companies. Last year, it acquired Postini, whose software filters corporate e-mail. Google has not done so well with corporate customers on its own, however. Google Apps has conspicuously failed to win adoption quickly.

If Microsoft is to rededicate its attention to its most valuable assets, business customers, a prerequisite is dropping its ill-advised bid for Yahoo. And to find the best acquisition strategy, ask, “What would Larry do?”

If Microsoft tries to fight Google with wobbly legs, scared witless, it will lose.
http://www.nytimes.com/2008/02/24/business/24digi.html





EU, U.S. Vow Crackdown on Computer Counterfeits

EU and U.S. senior officials said on Friday they would crack down on counterfeiting of computer components after they seized over 360,000 fake items in just two weeks in a joint operation at the end of last year.

Integrated circuits and computer components of over 40 trademarks including Intel, Cisco and Philips, worth more than $1.3 billion, were seized during the operation, the officials said.

"Traffickers and counterfeiters have become much more sophisticated ... They are no longer confining themselves to trafficking in some of the traditional goods we used to see them in, such as footwear or handbags," U.S. Customs and Border Protection Assistant Commissioner Dan Baldwin said.

"There are increasing numbers with high-tech goods, goods that impact our critical infrastructure," Baldwin told reporters after talks with European Union counterparts in Brussels.

Integrated circuits are used in a wide range of products including computers, aircraft, cars and telecommunications.

U.S. and EU officials said both sides of the Atlantic would work with importers to see how the fakes entered their markets, launch criminal investigations and take up the matter with China, where most of the fakes came from.

"We've identified a pretty significant problem, a fairly high risk for critical infrastructure," Baldwin said. "There will be criminal investigations."

Officials could not say at this stage if the importers knew they were trading counterfeit products and whether the problem came from a few factories or was more widespread.

But he warned the problem could affect all producers and said the industry needed to cooperate better to help them identify fakes.

John Pulford, a European Commission official responsible for customs risk management, said some fakes also came from Taiwan and Hong Kong and that most arrived by air, through couriers.

The first EU-U.S. customs operation took place in several German airports including Frankfurt and Leipzig, in France's Roissy-Charles-de-Gaulle airport and in Britain's Heathrow, as well as a number of hubs in the U.S., the officials said.

Pulford said it was only one of the many intellectual property rights problems the EU had with China.

According to the Organization for Economic Co-operation and Development, the trade in pirated consumer goods has reached $200 billion a year, equivalent to 2 percent of world trade, with many fake items coming from China.

(Reporting by Ingrid Melander, editing by Will Waterman)
http://www.reuters.com/article/busin...85388920080222





Say What You Will (Requiem for a TV News Career)
Chez Pazienza

Maybe this was always the way it had to be.

When I was 19, I broke into the offices of WVUM -- the radio station at the University of Miami -- live, during an installment of my weekly radio show. I raided a file cabinet and my crew and I proceeded to read the minutes of that week's executive board meeting on the air, paying special attention to a recurring topic of conversation among my apparently exasperated supervisors -- a series of incidents which, collectively, were referred to as "The Chez Situation."

The board as a whole was less-than-pleased with, for example, my insistence on jokingly pointing out to my audience the fact that WVUM's faculty adviser seemed to be waging and winning a valiant war against sobriety, and as such deserved congratulations all-around. There was also my insinuation that one of the station's sponsors, a club which had just opened on South Beach, would likely be closed in two weeks then renamed and reopened two weeks later. (In fact, it took about a month to close.)

I regularly ignored the program director's God-awful musical "suggestions," choosing instead to play whatever I felt like hearing.

I ridiculed the University's decision to replace the garbage cans on campus with new, attractive, and extraordinarily expensive stone receptacles immediately after making an announcement that tuition for the coming year would be skyrocketing.

I poked fun at the frat boys.

I advocated mischievous insurrection.

I occasionally threw out a few low-level swear words on-air.

I was kind of a punk kid, and I admit it.

Yet, despite the all of this, I remained on the air simply because even though my superiors may have been irritated by the fallout from my juvenile antics, they usually found the antics themselves eminently entertaining. I was good at what I did; I had a voice and I wasn't the least bit afraid to use it, consequences be damned -- or not considered at all. Being exactly who I was, for whatever reason, seemed to be more important to me than any other consideration.

When I got into television, I did my best to bury my inner-revolutionary. For 16 years I've been a successful producer and manager of TV news, cranking out creative, occasionally daring content on good days and solid, no-frills material on the days in between. I've won several awards and for the most part can say that I'm proud of what I've done in the business, particularly since I never intended to get into it in the first place; by the time college was over, I was playing steadily in a band and fully believed sleeping on floors and subsisting on beer and Taco Bell to be an entirely noble endeavor. I wound up working at WSVN in Miami only after the band imploded, taking my dreams of rock n' roll glory with it. Since those earliest days, I've come to understand that the libertine, pirate ship mentality I found so seductive during my time in a rock band is pretty much a staple of most newsrooms, particularly at the local level. What's more, it's accompanied by a slightly better paycheck (although often only slightly).

Over the past several years though, something has changed. Drastically. And I'm not sure whether it's me, or television news, or both.

With the exception of the period immediately following 9/11, which saw the best characteristics of television journalism shocked back into focus and the passion of even the most jaded and cynical of its practitioners return like a shot of adrenaline to the heart, the profession I once loved and felt honored to be a part of has lost its way.

I say this with the knowledge of implied complicity: I continued to draw a salary from stations at the local level and national networks long after I had noticed an unsettling trend in which real news was being regularly abandoned in favor of, well, crap. I may not have drank the Kool-aid, but I did take the money. I may have been uncomfortable with a lot of what I was putting on the air, but I was comfortable in the life that it provided me. I just figured, screw it, most people don't like their jobs; shut up and do what you're told, or at least try to. Besides, I told myself, what the hell else do you know how to do?

That attitude began to change in April of 2006 -- when I found out that I had a tumor the size of a pinball inside my head.

I was working for CNN at the time, a job I had been proud to accept three years earlier as CNN was in my mind the gold-standard of television journalism. I readily admit that it was Time-Warner's medical plan that provided me the best care possible for the removal of the tumor and during my subsequent recovery, but following my operation, what had been clawing at my insides for years finally began to come to the surface. TV news wasn't the least bit fulfilling anymore, and I either needed to get out of it once and for all or find an outlet for my nascent iconoclastic tendencies.

So I started a blog.

I did it mostly to pass the time, hone my writing skills, resurrect my voice a little, and keep my mind sharp following the surgery. As is the case with many online journals, not a soul other than myself and a few close friends and family were even aware of what I was doing, much less read my stuff regularly. I thought nothing of returning to work at the end of my medical leave while continuing to write online. Really, who the hell knew who I was? Who cared what I had to say?

As it would turn out, over time, more than a few people.

My admittedly worthless opinions on pop culture, politics, the media and my personal past were quickly linked by sites like Fark, Gawker and Pajiba and I found my readership growing exponentially. During this time, I still didn't consider telling my superiors at CNN what I was doing on the side, simply because, having never been provided with an employee handbook, I hadn't seen a pertinent rule and never signed any agreement stipulating that I wouldn't write on my own time. I hadn't divulged my place of work and wasn't writing about what went on at the office. The views expressed on my blog, Deus Ex Malcontent, were mine and mine alone. I represented no one but myself, and I didn't make a dime doing it.

For 20 months after starting DXM, I continued to work as a producer on American Morning, one of many charged with putting together the show. During that time, I received consistently favorable reviews (while in Atlanta I was told that I was well on my way to becoming an executive producer) and, more importantly, neither my credibility nor objectivity was ever called into question. Like anyone who considers him or herself a respectable news professional, whatever my personal opinions were, they were checked at the door when I walked into work. Having grown up in a household in which the highest ideals of journalism were never more than a conversation away -- my father was an old-school investigative reporter -- I knew full well that you couldn't avoid having opinions and viewpoints, but you never let them get in the way of your journalistic responsibility

As far as CNN knew, I was a valued employee, albeit one with almost no say in the day-to-day editorial decisions on American Morning. This held true even as I began contributing columns to the Huffington Post, giving my writing more exposure than ever before.

Then, last Monday afternoon, I got a call from my boss, Ed Litvak.

Ed, seeming to channel Bill Lumburgh from Office Space, informed me of that which I was already very well aware: that my name was "attached to some, uh, 'opinionated' blog posts" circulating around the internet. I casually admitted as much and was then informed of something I didn't know: that I could be fired outright for this offense. 24 hours later, I was. During my final conversation with Ed Litvak and a representative from HR, they hammered home a single line in the CNN employee handbook which states that any writing done for a "non-CNN outlet" must be run through the network's standards and practices department. They asked if I had seen this decree. As a matter of fact I had, but only about a month previously, when I stumbled across a copy of that handbook on someone's desk and thumbed through it. The Week in Review is edited and published by Jack Spratts. I let them know exactly what I had thought when I read the rule, namely that it was staggeringly vague and couldn't possibly apply to something as innocuous as a blog. (I didn't realize until later that CNN had canned a 29-year-old intern for having the temerity to write about her work experiences -- her positive work experiences -- in a password-protected online journal a year earlier.) I told both my boss and HR representative that a network which prides itself on being so internet savvy -- or promotes itself as such, ad nauseam -- should probably specify blogging and online networking restrictions in its handbook. I said that they can't possibly expect CNN employees, en masse, to not engage in something as popular and timely as blogging if they don't make themselves perfectly clear.

My HR rep's response: "Well, as far as we know, you're the only CNN employee who's blogging under his own name."

It took self-control I didn't know I had to keep from laughing, considering that I could name five people off the top of my head who blogged without hiding their identities.

Uh-huh, as far as you know.

When I asked, just out of curiosity, who came across my blog and/or the columns in the Huffington Post, the woman from HR answered, "We have people within the company whose job is specifically to research this kind of thing in regard to employees."

Jesus, we have a Gestapo?

A few minutes later, I was off the phone and out of a job. No severance. No warning (which would've been a much smarter proposition for CNN as it would've put the ball effectively in my court and forced me to decide between my job or the blog). No nothing. Just, go away.

Right before I hung up, I asked for the "official grounds" for my dismissal, figuring the information might be important later. At first they repeated the line about not writing anything outside of CNN without permission, but HR then made a surprising comment: "It's also, you know, the nature of what you've been writing."

And right there I knew that CNN's concern wasn't so much that I had been writing as what I'd been writing. Whether a respected and loyal CNN producer of four years, like myself, could've gotten off with a warning had I chosen to write about, say, my favorite pasta sauce recipes, who knows. I'm dead sure though that my superiors never concerned themselves with my ability or inability to remain objective at work, given my strong opinions; they worried only about an appearance of bias (specifically, a liberal bias), and apparently they worried about it more than any potential fallout from firing a popular blogger with an audience that was already large and was sure to grow much larger when news of his firing put him in the national spotlight.

It's probably right about now that I should make something perfectly clear: I'm not naive -- I always understood that CNN, like any big company, might be apt to fire whoever it damn well pleases so long as the law remains intact at the end of the day.

Should they have fired me though?

Probably not, and only arrogant myopia would make them think otherwise.

As soon as the official word came down, I picked up the phone and called a friend of mine named Jacki Schechner. CNN junkies will recognize her as a former internet reporter for the network, one who pulled double-duty on American Morning and The Situation Room -- that is until the day she was taken out into the figurative woods without any warning and given the Old Yeller treatment. CNN's willingness to fire someone like Jacki tells you everything you need to know about how backward the network's thinking is when it comes to new media. It pays more lip-service to bloggers and their internet realm than any other mainstream media outlet, but in the end that's really all it is -- lip-service. Jacki was not only popular in internet circles, she had forged personal relationships with most of the big names in the blogosphere and knew her stuff inside and out. Inevitably though, CNN -- particularly American Morning -- chose to wear down and ultimately piss away this asset in favor of an on-air acquisition that fell right in line with the tried-and-true "TV" sententia: Veronica De La Cruz. The network never considered for a minute that new media might behave differently than television -- that the regular rules might not apply.

And that's the problem.

As far as CNN (and to be fair, the mainstream TV press in general) believes, it still sits comfortably at the top of the food chain, unthreatened by any possibility of a major paradigm shift being brought to bear by a horde of little people with laptops and opinions. Although the big networks recognize the need to appeal to bloggers, they don't fear them -- and that means that they don't respect them. Corporate-think dictates that the mainstream television press as a monstrous multi-headed hydra is the ultimate news authority and therefore is in possession of the one and only hotline to the ghosts of Murrow and Sevareid. Sure those bloggers are entertaining, but in the end they're really just insects who either feed off the carcasses of news items vetted through various networks or, when they do break stories, want nothing more than to see themselves granted an audience by the kingmakers on television.

This, of course, is horseshit.

During my last couple of years as a television news producer, I watched the networks try to recover from a six year failure to bring truth to power (the political party in power being irrelevant incidentally; the job of the press is to maintain an adversarial relationship with the government at all times) and what's worse, to pretend that they had a backbone all along. I watched my bosses literally stand in the middle of the newsroom and ask, "What can we do to not lead with Iraq?" -- the reason being that Iraq, although an important story, wasn't always a surefire ratings draw. I was asked to complete self-evaluations which pressed me to describe the ways in which I'd "increased shareholder value." (For the record, if you're a rank-and-file member of a newsroom, you should never under any circumstances even hear the word "shareholders," let alone be reminded that you're beholden to them.) I watched the media in general do anything within reason to scare the hell out of the American public -- to convince people that they were about to be infected by the bird flu, poisoned by the food supply, or eaten by sharks. I marveled at our elevation of the death of Anna Nicole Smith to near-mythic status and our willingness to let the airwaves be taken hostage by every permutation of opportunistic degenerate from a crying judge to a Hollywood hanger-on with an emo haircut. I watched qualified, passionate people worked nearly to death while mindless talking heads were coddled. I listened to Lou Dobbs play the loud-mouthed fascist demagogue, Nancy Grace fake ratings-baiting indignation, and Glenn Beck essentially do nightly stand-up -- and that's not even taking into account the 24/7 Vaudeville act over at Fox News. I watched The Daily Show laugh not at our mistakes but at our intentional absurdity.

I mentioned calling Jacki Schechner -- so what did she tell me?

"Think about how frustrated and disillusioned most of the American Morning staff is."

Not simply frustrated and disillusioned, but outright miserable.

And then she reminded me that in the past year-and-a-half, nearly 20 mid to high-level people have left American Morning; many of them quit with no other job to go to -- they just wanted out of the business. That speaks goddamned volumes, not simply about the show but about the state of the entire profession.

CNN fired me, and did it without even a thought to the power that I might wield as an average person with a brain, a computer, and an audience. The mainstream media doesn't believe that new media can embarrass them, hurt them or generally hold them accountable in any way, and they've never been more wrong.

I'm suddenly in a position to do all three, and I know now that this is what I've been working toward the last few years of my career.

Awhile back I was watching a great documentary on the birth of the punk scene, it closed with former Black Flag frontman and current TV host Henry Rollins saying these words: "All it takes is one person to stand up and say 'fuck this.'"

I truly hope so, because I'm finally doing just that.

And I should've done it a long time ago.
http://www.huffingtonpost.com/chez-p..._b_87282.html?





Milestones

BBC Ends English Shortwave Service in Europe
Doreen Carvajal

The BBC World Service, which started its scratchy shortwave transmissions to listeners cut off by “desert, snow and sea” 75 years ago, ended its last English-language shortwave services in Europe on Monday.

The British public broadcaster has been reducing its shortwave transmissions over the last seven years, eliminating services to North America and Australia in 2001 and South America in 2005. Last March, the BBC started reducing European transmissions, finally cutting off a transmitter on Monday that reached parts of Southern Europe.

“There comes a point where the shortwave audience in a given region becomes so small that spending money on it can no longer be justified,” the broadcaster said in a statement.

The quiet ending for the service was a contrast with its celebrated arrival. Seventy-five years ago, King George V helped promote the new technology from his small study in the British royal family’s Norfolk retreat, Sandringham. In a speech written by the poet Rudyard Kipling, the king extolled radio as a way to reach out to men and women isolated by snow and sea.

“Through one of the marvels of modern science, I am enabled this Christmas Day to speak to all my people throughout the empire,” the king said.

The abdication speech of Edward VIII was broadcast on shortwave, as was news of the Hindenburg airship’s explosion and Hungarian Free Radio’s last anguished call for aid as Russian tanks rumbled into Budapest.

But modern modes of communication have been squeezing out shortwave services in Western countries, where programming is available on FM radio, on the Internet and on iPods with wireless connections.

“Europe is very developed and so is America,” said Michael Gardner, a spokesman for BBC World Service. “Shortwave is not the best way of reaching those audiences there. They all have FM, AM stations close by. Some of them have satellites, or they can pull it down on their TV screens and there are alternatives online. There are lots of ways of interacting with the BBC.”

Simon Spanswick, chief executive of the Association for International Broadcasting in London, said that the move by the BBC “probably sounds the death knell for traditional analog shortwave broadcasting in the developed world.”

Shortwave transmissions remain an important media outlet in Africa and Asia, he noted. Since 2006, the BBC World Service shortwave audience has grown by 7 million people, or 7 percent, to 107 million, about 58 percent of the BBC’s total radio audience.

All of the world’s largest international broadcasters, based in the United States, France, Germany, England and the Netherlands, are cutting back on shortwave or reviewing the deployment of their resources.

Andy Sennitt, a media specialist with the Dutch public broadcaster, Radio Netherlands Worldwide, said that he got his start 30 years ago working on BBC shortwave broadcasts and had mixed feelings about the end of the transmissions.

“For die-hard shortwave listeners, this is negative,” he said. “What they don’t understand is the huge cost of powering transmitters. The cost of diesel fuel has doubled.”
http://www.nytimes.com/2008/02/19/bu...ia/19beeb.html





iPlayer Usage Effect - A Bandwidth Explosion
Dave Tomlinson

There’s been a lot of talk in the media about the BBC’s iPlayer in the past few weeks with stories on The Register such as this and this, The Guardian here and here, ThinkBroadband, Screendigest, ZDNet, and hundreds more on other places too, some of which are linked here.

There’s also been lots of talk about the availability of iPlayer, there’s news about plans for the Mac version and a US version too is apparently on the way.

We, though, can give a different perspective, a bit of insight on things and maybe explode a few myths. Here’s just a few headlines:

• 5% growth in total average usage since 1st December
• 66% growth in volume of streaming traffic since 1st December
• 2% growth in the number of customers using their connection for streaming since 1st December
• 72% growth in the number of customers using over 250MB of streaming in a month since December
• 100% growth in the number of customers using over 1GB of streaming in a month since December
• Cost of carrying streaming traffic increased from £17,233 to £51,700 per month

So how did we get to these headlines? Well, through our traffic management systems we get a lot of visibility of how our customers are using their connections. We classify iPlayer as streaming so when customers look at the View My Broadband Usage tool they can see the split of traffic types and see how much streaming they’ve used. From our reports we can see that in detail across all our customers and spot patterns and trends as well as providing invaluable data about how the network performs and how customers use the Internet.

A few stats first, 23,441 of our customers used over 250MB of streaming (download only) in January, with a mean of 947MB between them. That’s up from 13,569 customers that did more than 250MB in December (with a mean of 856MB) and going back a year 12,225 did over 250MB with a mean of 781MB in January 2007.

6,083 customers streamed more than 1GB of data in January 2008 (2.2GB mean) against 3,045 in December (2.1GB mean) and 2,253 in January 2007 (2.1GB mean).

We’ll cover off some more stats below but the summary is that more people are streaming and streaming more.

Previous posts we’ve made have focussed on changing usage habits and new applications such as the aforementioned iPlayer.

This post is kind of about putting those together and looking at the effect that new applications are having on usage and where this is leading us.

We’ve been doing a lot of analysis of customer usage of late, trying to understand in ever more detail about how our customers are using their connections and also when they are using their connections.

One thing we’ve noticed is that the mean usage is on the way up and in particular the type of usage is streaming and it’s being used more in an evening.

I’ll illustrate this firstly with a little data. Each month we produce a breakdown of usage and supply it to the PlusNet usergroup (November and December’s data is here).

Just using one of the figures, the mean usage per customer over the past few months is as follows:

June 2007 6.40GB
July 2007 6.54GB
August 2007 6.46GB
September 2007 6.35GB
October 2007 6.61GB
November 2007 6.55GB
December 2007 6.42GB
January 2008 6.74GB

It’s not unexpected to see a small decrease in June, September, November as those months only have 30 days and also in December because of Christmas but the January increase is certainly a noticeable increase whichever month you compare it to. Note that the BBC launched the iPlayer on Christmas day and have been heavily promoting on TV ever since.

When you break that usage down though into different protocols, it’s streaming that’s seeing the big increase.

The following graph shows mean streaming usage (download only) across the past 3 months (1st November to 31st January) in MB per hour per customer for 5 hours of the day (each line represents a particular hour).

As you can see in early November on average customers that were using streaming used around 2 - 2.5MB per hour but by the end of January that had increased to 3 - 4MB per hour.

There’s also a graph of the number of customers that used streaming in each particular hour.

We can also compare this to web browsing/instant messenger traffic with again both the MB per hour per customer and number of customers using that type of traffic per hour.

The web traffic over the same time period is roughly static in terms of MB per hour per customer and the number of customers using that type of traffic increasing a little in line with customer growth (apart from a dip at Christmas).

(Note, this data is taken from the Ellacoya traffic management systems and will include any customer that used any amount of streaming in each hour whether that was 1 byte or 1GB or any other amount).

For another bit of comparison here are the usage graphs for P2P and Usenet and gaming. The P2P and Usenet graphs “spike” because when the network is quieter such as Friday and Saturday nights or over Christmas when there’s more bandwidth available for these types of application. Also again the graphs include anyone that did at least 1 byte of P2P or Usenet during each hour and Usenet will include text as well as binary usage.

We also have a split of the streaming usage into each of the different products.

This graph is showing streaming over the last 2 months for one particular hour (6 - 7pm).

As you’d probably expect, BBYW 3 and 4 have the highest usage but there’s a general increase across each account type.While this graph shows the same time period but the number of customers on each product type using streaming.

What’s quite telling is that not only is there an increase over the last 2 months of customers using streaming but that there’s an increase on Broadband Plus and Premier as well as BBYW which are both accounts we no longer sell and as such the total number of customers on these products is declining.

Here’s another breakdown of the usage. Just looking at residential accounts, in November 174,779 customers had usage in streaming, using a total of 33,189GB which works out as a mean of 190MB per customer for the month.

In December 177,093 customers had usage in streaming, using a total of 31,859GB or a mean of 180MB per customer for the month. This was likely reduced from November because of Christmas.

However, in January 181,108 customers had usage in streaming, with a total of 52,970GB or a mean of 292MB per customer for the month.

That’s a total increase of 66% in January against December, 60% against November. Per customer the increase is 62% up in January against December and 54% up against November. (A combination of natural customer growth and more existing customers using streaming that hadn’t previously would account for the higher increase in the total above the per customer figure).

Ian’s spoken earlier about future developments in set top boxes and particularly of relevance here are the boxes (and TVs themselves) that can combine streaming over the Internet along with Freeview, etc. At the moment the majority of this growth in traffic will be down to iPlayer (with some 4OD, Sky Anytime and Joost thrown in) and likely most people will be watching it on their PCs. We can only imagine what the growth will be like when that majority shifts from the PC to the TV.

The growth though of this type of traffic does add a couple of factors to our product design, we design each of our products around a certain amount of usage and make assumptions about how that usage is used. For example, Broadband Your Way Option 2 has a usage allowance of 8GB which is counted over the hours of 8am to midnight. It may be though that a large percentage of the customers on BBYW Option 2 use more of their 8GB than before (or go over the 8GB and buy additional usage) and use that extra usage in the evening.

This ties perfectly in with the myth of unlimited broadband. On BBYW, as customers use more, the revenue we receive will increase. The amount of additional usage (along with customer numbers and mix of product) is one of the factors we use in determining the amount of capacity we require so we factor in the extra revenue gained from customers using more due to something like iPlayer and provision the capacity necessary.

We aren’t saying that the growth of streaming isn’t a scary proposition, and where there’s one thing there’s bound to be another thing on the horizon (set top boxes, Project Kangaroo from BBC, ITV and Channel 4, iTunes movie rentals and HD movies to name just a few of things that are on the way) but it’s got to be even more scary for some.
http://community.plus.net/blog/2008/...dth-explosion/





Study: More US Broadband has $134 Billion Economic Impact

An increase of 7 percent broadband adoption would mean $134 billion for the US economy, a study says.
Grant Gross

A modest increase in U.S. broadband adoption would have an annual economic impact of US$134 billion, according to a study released Thursday.

A 7 percent increase in broadband adoption would create 2.4 million jobs across the U.S., would save $662 million in health-care costs and $6.4 billion in vehicle mileage, among other savings, according to the study, released by Connected Nation, a nonprofit group focused on improving broadband adoption across the U.S.

A broadband stimulus package would pump nearly as much money into the U.S. economy as an economic stimulus package recently passed by the U.S. Congress, said Brian Mefford, Connected Nation's CEO. A proposal being considered as part of a farm bill before Congress would allow immediate depreciation for investment in broadband infrastructure and "provide a jolt to the nation's economy in the near term," Mefford said.

Some lawmakers and conservative think tanks have opposed calls to create a wide-ranging national broadband policy, Mefford said. However, the Connected Nation model, patterned after a program in Kentucky, focuses more on broadband adoption and local needs than huge, government-funded programs, he said. "It's a consensus-type approach," Mefford said.

The ConnectKentucky model that spawned Connected Nation is "bringing in jobs," said Mark McElroy, Connected Nation's chief operating officer and senior vice president for communications. Through ConnectKentucky, the state has adopted broadband 7 percent faster than it would have without the program, according to the organization.

The Connected Nation study estimates the U.S. would gain $92 billion in new wages from the 2.4 million jobs created through broadband growth. Using broadband for health-care services has saved an average of more than $200 per person per year in Kentucky, and residents there drove more than 100 fewer hours per month because of transactions done online, according to the study.

In addition to the health-care and mileage savings, U.S. residents would save 3.8 billion hours a year by conducting transactions online, at a cost-savings of $35.2 billion, according to the study.

Kentucky was one of the lowest states in the nation for broadband adoption when ConnectKentucky began in 2002, Mefford said. In January 2004, only 60 percent of Kentucky residents had access to broadband; at the end of 2007, 95 percent did, according to the study.

Several Kentucky businesses have benefited from the increased access, according to Connected Nation. Geek Squad, the Best Buy subsidiary, moved its headquarters to Bullitt County, Kentucky, in late 2006 because of the broadband availability, according to Connected Nation.

The U.S. government should focus on public-private partnerships to extend broadband to the remaining areas that do not have it, many of them being low-population rural areas, Mefford said. "These remaining areas are extremely difficult to reach."

Three bills now in Congress, the Connect the Nation Act, the Broadband Data Improvement Act and the Broadband Census of America Act, would replicate parts of the ConnectKentucky model on a national scale.

Not everyone is a fan of ConnectKentucky, however. Public Knowledge, a digital rights group, has raised concerns that ConnectKentucky is "nothing more than a sales force and front group" for telecom provider AT&T, said the group's communications director, Art Brodsky, in a January blog post. Officials that set up ConnectKentucky "ignored municipal utilities, competitive telephone companies and Internet service providers," Brodsky wrote.

Connected Nation has denied that it's a front for AT&T, saying the company has provided less that 1 percent of the organization's revenues.

Connected Nation's focus is on increasing broadband adoption, not on who provides the broadband, Mefford said Thursday. "This is not a 'Field of Dreams' kind proposition," he said. "You don't just string wires or create wireless footprints and think that economies are going to magically turn themselves around. The impact does not occur until we have people using the technology."
http://www.computerworld.com.au/index.php/id;18916991





U.S. Telecom Growth Seen Slower than Global Industry

The U.S. telecommunications industry will grow at a slower rate than the global industry in the coming years as the wireless and wired markets mature, the Telecommunications Industry Association said on Friday.

According to a study commissioned by the TIA, the U.S. telecom industry will grow at an average annual rate of 7.2 percent in the period 2008-2011, reaching $1.3 trillion in 2011, compared with an average rate of 10 percent, reaching $3.6 trillion, for the rest of the world.

Growth in the U.S. industry will accelerate to 9.3 percent in 2008 from 8.3 percent in 2007, partly due to spending on network upgrades and a government spectrum auction. Growth is expected to moderate in the following years, the report said.

"License fees associated with the 700 MHz auction will boost revenue in 2008, and the absence of that revenue will lead to a sharp drop in 2009," it said.

The biggest U.S. telephone companies are Verizon Communications Inc and AT&T Inc.

While the authors of the study said industry growth could slow in an economic downturn, particularly if enterprise customers cut spending, they did not assume a severe economic impact on the telecom sector in their forecasts.

"In contrast with 2000 and 2001, telecom is not at the heart of the downturn," said Arthur Gruen of Wilkofsky Gruen Associates, which conducted the study.

Gruen, in a conference call with reporters, also said that while telecom is not immune, he is "not expecting a meltdown or anywhere near that."

He noted that even though the U.S. economic outlook has worsened since the research for the study was carried out in the fall and summer of 2007, enterprises have not shown any signs of slowing down spending on installing new phone systems.

The study expects the strongest 2008-2011 growth in the Asia-Pacific region, with a 13 percent annual advance, followed by 11.1 percent for the Middle East and Africa and 10.5 percent for Latin America.

European growth will be just ahead of the United States at 7.5 percent annually, while Canada is expected to be the slowest region with 5.4 percent annually.

According to the study, about 35 percent of U.S. wireless service revenue will come from data services such as mobile Web surfing in 2011, up from 16 percent in 2007.

With Web traffic for services such as Internet video soaring, the study found that in wired networks "current capacity will soon be unable to support bandwidth demand."

This is in contrast with the commonly held view in 2003 that "there would be excess network capacity for the foreseeable future."

(Reporting by Sinead Carew; editing by John Wallace)
http://www.reuters.com/article/busin...55854420080222





Super-Speed Internet Satellite Blasts Off in Japan

Japan launched a rocket Saturday carrying a satellite that will test new technology that promises to deliver "super high-speed Internet" service to homes and businesses around the world.

The rocket carrying the WINDS satellite -- a joint project of the Japan Aerospace Exploration Agency (JAXA) and Mitsubishi Heavy Industries -- lifted off its pad at 5:55 p.m. (0855 GMT).

If the technology proves successful, subscribers with small dishes will connect to the Internet at speeds many times faster than what is now available over residential cable or DSL services.

The Associated Press said the satellite would offer speeds of up to 1.2 gigabytes per second.

The service initially would focus on the Asia-Pacific region close to Japan, a JAXA news release said.

"Among other uses, this will make possible great advances in telemedicine, which will bring high-quality medical treatment to remote areas, and in distance education, connecting students and teachers separated by great distances," JAXA said.

The rocket was launched from Japan's Yoshinobu Launch Complex at the Tanegashima Space Center.
http://edition.cnn.com/2008/TECH/02/23/japan.satellite/





Silicon Valley Losing Middle-Wage Jobs
John Markoff

Silicon Valley is in danger of creating its own digital divide.

The California region is losing its middle-class work force at a significant rate, according to an annual report that tracks the economic, social and environmental health of the region that is the nation’s technology heartland.

The 2008 Index of Silicon Valley — which this year was sponsored by Joint Venture: Silicon Valley Network, a public-private partnership, and the Silicon Valley Community Foundation, a nonprofit — found that from 2002 to 2006, middle-wage jobs fell to 46 percent of the work force, from 52 percent.

At the same time, while the percentage of higher-end jobs rose slightly — to 27 percent from 26 — lower-wage jobs expanded to 27 percent, from 22 percent of the work force. In all, more than 50,000 middle-income jobs have disappeared over the four years measured by the study.

The vanishing jobs — defined as those paying $30,000 to $80,000 — represent workers who had been in the lower part of the white-collar pyramid, including secretaries, clerks and customer support representatives. The picture was blurred, however, by growth in some blue-collar, middle-income professions like electricians and plumbers, and several white-collar areas like computer support technicians.

The consequence of the shift may undercut some of the basic mechanisms of the Valley economy, according to the authors of the report, by making upward mobility more difficult.

“If you lose the middle, it’s harder to support the top,” said Doug Henton, an economist at Collaborative Economics, a research and consulting firm in Mountain View, Calif., that helps prepare the annual report.

The short-range outlook for the region appears to be more positive, with the overall pace of job gains outpacing the nation’s.

For example, for the first time since 2001, when the dot-com sector was imploding, median household income rose. Silicon Valley added 28,000 jobs, for an increase of 1.7 percent in 2007. Over all, the region is far more wealthy than the rest of the country, with per capita income 57 percent higher than the national average.

Despite fears of losses in the wake of the Sept. 11 attacks, the region continues to see a healthy in-flow of talent from outside the United States. More than 17,000 foreign citizens moved to the region last year, reversing a decline since the number peaked in 2001 at above 30,000.

Forty-eight percent of the households of the region speak a language other than English in the home.

Reflecting the changing boundaries of what is defined as Silicon Valley, this year the authors of the report added all of San Mateo County’s work force. It was the first change to the definition of the region by the study, which was first published in 1995. By moving the northern border of the Valley past the San Francisco airport, the area now reflects more of the biotechnology orientation of companies like Genentech. The region does not include San Francisco.

Venture capital investment continued to climb at a healthy clip during 2007, rising by 11 percent. Sixty-two percent of the so-called clean tech venture investment for California was invested in Silicon Valley during the year.

The Valley continues to stand apart because it is a center of technical innovation, said Russell Hancock, president of Joint Venture. But he also said it was unlikely that the region would be unaffected by a recession or the subprime mortgage crisis.

Still, the researchers behind the study said the Valley was distinguished by the flexibility of its economy and its ability to adapt to changing conditions.

“What we’re talking about is a Valley that continues to reinvent itself, and it’s not in any one sector,” Mr. Henton said.

One notable category in which the region lags behind its international competitors is home broadband networks. Only 51 percent of the region has access to broadband Internet — defined as more than 200 kilobits per second. In contrast, 65 percent of the households in Japan and 94 percent in South Korea are wired to at least that speed.
http://www.nytimes.com/2008/02/19/te.../19valley.html





Honest To Blog: Juno is the Most Successful Indie Film in Six Years; DVD Details
Peter Sciretta

Fox Searchlight’s Juno has now grossed over $143.1 million worldwide ($125M domestic), making the film the most successful independent movie since 2002’s My Big Fat Greek Wedding (which grossed $241.4M domestically). Playing on 1,865 screens, the film continues to make over $6 million weekly. Variety also reports that “Juno also has the distinction of being the only film this year to remain on the top-10 box office chart every weekend since its debut.”

Now one could argue that Juno isn’t a independent movie because it was produced by a mini major movie studio. One could also argue that the film was made for next to nothing ($7.5 million) and was distributed in a platform release which depended on word of mouth. Either way, that argument is for another day, everyone who is anyone considers it an indie.

Fox Searchlight has announced that the little film that did will hit DVD store shelves on April 15th 2008. Fox Searchlight will release the film in 1-disc and 2-disc special edition versions, and on Blu-ray disc. The single disc release will include the film in 1.85:1 anamorphic widescreen, English Dolby Digital 5.1, an audio commentary by director Jason Reitman And writer Diablo Cody, 11 deleted scenes, a gag reel, a Cast & Crew Jam (whatever that means), and screen tests. The 2-disc special edition will include all of the previously mentioned features, plus 4 featurettes (Way Beyond “Our” Maturity Level: Juno – Leah – Bleeker, Diablo Cody Is Totally Boss, Jason Reitman For Shizz, and Honest To Blog! Creating Juno). The Blu-Ray release will include a English 5.1 DTS HD Lossless Master Audio, everything in the two disc special edition, a Fox Movie Channel Presents: Juno World Premiere and Fox Movie Channel Presents: Casting Session featurettes.

Meanwhile, And The Winner Is’ Scott Feinberg is predicting a Juno win for Best Picture and Diablo Cody for Best Screenplay.
http://www.slashfilm.com/2008/02/19/...s-dvd-details/





In a Corrupt World Where the Violent Bear It Away
Dave Kehr

HE has 60 titles to his credit, ranging from one-reel shorts to international epics, with an Academy Award-wining documentary along the way (the 1947 feature “Design for Death”). But Richard Fleischer remains among the least known and least honored of major American filmmakers, in part because of the sheer volume of his output. Even the most conscientious critic has a hard time picking through the many impersonal projects — films like “Doctor Dolittle” with Rex Harrison (1967), or the 1980 remake of “The Jazz Singer” with Neil Diamond — to uncover the core of his achievement.

Fleischer, who died in 2006, still has not been given a major New York retrospective, but three of his best films will be turning up in the next couple of weeks. The annual Film Comment Selects series at Lincoln Center will include his “10 Rillington Place” (1971) and scandalous “Mandingo” (1975) this week, while “Violent Saturday,” his 1955 color and CinemaScope film noir, will begin a weeklong run at Film Forum on Feb. 29.

Systematically chosen or not, these three films represent a fairly wide range of Fleischer’s meticulous work. Filmed in England and set in the dim, drab postwar London that David Cronenberg recreated for “Spider,” “10 Rillington Place” (Thursday and Feb. 24 at the Walter Reade Theater) belongs to a series of films that Fleischer devoted to serial killers, a term that had barely entered the language when he made his first, “Follow Me Quietly,” for RKO in 1949. His “Compulsion,” based on the Leopold and Loeb “thrill kill” murder of a Chicago schoolboy, appeared in 1959, and “The Boston Strangler” followed in 1968, with Tony Curtis as a plumber accused of the rape and murder of a series of women.

Unlike the current strain of serial killer films, from “The Silence of the Lambs” to “Saw IV,” Fleischer’s don’t invite the spectator to identify surreptitiously with the power and impunity of the murderer, but neither are they simple expressions of moral outrage. They focus, with sober detachment, on the details of crime and the working of the criminal mind, expressing no more shock than would a documentary on the functioning of the Ford assembly line.

Fleischer’s killers are ordinary men (or boys, in the case of “Compulsion”), physically undistinguished and almost faceless (literally so in the case of the haunting “Follow Me Quietly,” in which a detective constructs a blank-faced dummy to take the place of the murderer, a phantom stalker known as “the Judge”). They blend easily into Fleischer’s carefully observed backgrounds, none more smoothly and deceptively than John Reginald Christie (Richard Attenborough) of “10 Rillington Place,” the London landlord (and real-life figure) who raped and murdered several women and allowed the husband of one victim (played by a young John Hurt) to be hanged in his place.

Violent death may seem a strange preoccupation for the son of Max Fleischer, the pioneering animator who produced “Betty Boop” and the best of the “Popeye” cartoons (directed by Dave Fleischer, Max’s brother and Richard’s uncle). But animation has always had its morbid, nightmarish component, and seldom more than with the Fleischers. (There are few films more disturbing than the Fleischers’ “Snow-White” of 1933, with its chorus of “St. James Infirmary Blues.”)

Whereas his father and uncle worked in fantasy, Richard Fleischer became one of the earliest un-self-conscious realists of American film. With extensive location work (perhaps mandated by minuscule budgets), Fleischer’s RKO B-movies — “Bodyguard” (1948), “The Clay Pigeon” (1949), “Trapped” (1949, made on loan to Eagle-Lion), “Armored Car Robbery” (1950) and “The Narrow Margin” (1952) — function as documentaries on a lost Los Angeles, given tension and style by Fleischer’s constant reframing of the action and elaborate camera movements.

At first “Violent Saturday,” the first of Fleischer’s many films for 20th Century-Fox, seems like a simple extension of the RKO noirs into widescreen color. Its setting is a Midwestern mining town laid out in an open, horizontal space that contrasts with the urban canyons of the RKO films. But here Fleischer is less interested in the aberrations of a single personality than in the unhealthy interactions of an entire society.

The town is a coiled spring of sexual and social tensions: a bank president (Tommy Noonan) who moonlights as a peeping Tom; a millionaire’s son (Richard Egan) whose wife is openly carrying on an affair; a mine engineer (Victor Mature) whose son is ashamed of him for failing to serve in World War II. When the criminals appear (Stephen McNally, J. Carrol Naish and Lee Marvin) with the intent of knocking over the local bank, they seem like projections of the town’s inner anxieties. The violence they trigger is harsh and cleansing, a deliverance as much as a judgment.

For the French critic Jacques Lourcelles, one of Fleischer’s most articulate admirers, the recurring theme of his work is society slipping into decadence. That theme is as apparent in “Violent Saturday” as in Fleischer’s matinee classic “The Vikings” (1958), the Gilded Age melodrama “The Girl in the Red Velvet Swing” (1955) or even in his 1973 science fiction film “Soylent Green,” with its grim vision of an end-times America. But Fleischer’s most provocative film on this theme is the still potent “Mandingo” from 1975 (Feb. 23, Walter Reade Theater), an anti-“Gone with the Wind” that treats the pre-Civil War South as a swamp of degradation for white masters and black slaves alike.

Rattling around a tumble-down Tara of peeling plaster and near-empty rooms, James Mason (Captain Nemo in Fleischer’s children’s classic “20,000 Leagues Under the Sea”) presides over a human breeding farm. He is as occupied with finding a suitable stud for his prize female slave as with finding a bride who will give his lame son (Perry King) the male heir he requires.

The treatment of humans as so much chattel, to be bought, sold and cruelly abused regardless of their social position, makes “Mandingo” a thinly veiled Holocaust film that spares none of its protagonists. When “Mandingo” was released, many critics erupted with rage over its aggressively tasteless portrayal of the slave-owning South, which seems in retrospect both a desired and appropriate response. More than a portrait of social decadence, “Mandingo” is Fleischer’s last great crime film, in which the role of the faceless killer is played by an entire social system.
http://www.nytimes.com/2008/02/17/movies/17kehr.html





The Dreamer as Tapehead
A. O. Scott

In its sweet, lackadaisical way, Michel Gondry’s “Be Kind Rewind” illuminates the pleasures and paradoxes of movie love. Its two main characters, a pair of Passaic, N.J., loafers named Mike and Jerry, are devotees of the Hollywood mainstream, paying tribute to well-worn classics like “Ghostbusters,” “Driving Miss Daisy,” “Rush Hour 2” and “The Lion King.” The way they express this affection lands Mike and Jerry in a spot of copyright trouble, but they (and Mr. Gondry) provide a welcome reminder that even the slickest blockbuster is also a piece of handicraft, an artifact of somebody’s nutty, unbounded ingenuity and the potential object of somebody else’s innocent, childlike fascination.

Mike (Mos Def) works in a shabby video store whose owner, Mr. Fletcher (Danny Glover), has not yet made the leap to DVD. His business threatened by the dubious improvements of a city-backed redevelopment scheme, Mr. Fletcher sneaks away on a mysterious trip, leaving the blundering, well-intentioned Mike in charge of his stock of battered VHS cassettes. Jerry (Jack Black), an avant-garde auto mechanic and tireless tinkerer, suffers an accident that magnetizes his body, causing him to accidentally erase all the tapes.

So when a loyal customer named Miss Falewicz (Mia Farrow) shows up for her daily rental, Mike and Jerry must improvise. They do what anyone would: hurriedly reshoot famous movies using a camcorder, various local characters and some common household objects.

Of course, not everyone would or could figure out how to turn pizza pies and cardboard boxes into special effects. Mr. Gondry is a highly skilled and practiced professional, a visual magician responsible for such enchantments as “Eternal Sunshine of the Spotless Mind” (in collaboration with Charlie Kaufman), “Dave Chappelle’s Block Party” (with Dave Chappelle) and “The Science of Sleep” (all by himself). But as tricky and refined as his techniques may be, the spirit in which he deploys them is delightedly amateurish and winningly democratic. In the world of his films drab city neighborhoods are zones of oddity and wonder, their possibilities waiting to be unlocked by accident or whim. Daily life is a series of art projects waiting to happen.

“Be Kind Rewind” is pervaded by an easy, occasionally antic good humor. Like “The Science of Sleep,” it meanders occasionally toward melancholy or misunderstanding, but for the most part avoids conflict or intense feeling. In their speech patterns and styles of behavior, Mos Def and Mr. Black seem like a couple of overgrown 12-year-olds, and Alma (Melonie Diaz), the young woman who joins their cinematic enterprise, seems less like a potential love interest than a girl given permission to enter the secret clubhouse.

In any case, Mr. Gondry’s shaggy-dog neighborhood chronicle is really a loose frame for Mike and Jerry’s creations, and for the exquisite black-and-white Fats Waller biopic that turns out to be their masterpiece. Miss Falewicz, who has never seen “Ghostbusters,” is glad to be fooled by the clumsy, highly foreshortened version that Mike and Jerry send her home with. But their way of remaking movies — called “Sweding” for no very compelling reason — catches on even with customers who know better, and before long lines are forming around the block.

And why not? At the “Be Kind Rewind” Web site (bekindmovie.com), Mr. Black’s voice defines Sweding as “putting YOU into the thing you like,” and there is a quiet strain of populist defiance buried in Mr. Gondry’s wonder cabinet. Commercial pop culture is, too often, understood as a top-down enterprise, its expensive, disposable products passively consumed by the public.

And yet at the same time that stuff is capable of inspiring a deep and durable sense of ownership. The movies we love belong in some profound way to us, and part of us lives inside them. Sweding is Mr. Gondry’s way of making that rather abstract sense of connection literal, of suggesting that even if we are not strictly speaking the owners and authors of the movies we like, well, then, perhaps we should be.

It goes without saying that this is a naïve, utopian point of view. The travestied films in “Be Kind Rewind” are the intellectual property of large corporations (as is Mr. Gondry’s movie), and you can be sure that teams of lawyers were consulted and paid before the Sweding went very far. But “Be Kind” hardly pretends otherwise. Instead it treats movies as found objects, as material to be messed around with, explored and reimagined. It connects the do-it-yourself aesthetic of YouTube and other digital diversions with the older, predigital impulse to put on a show in the backyard or play your favorite band’s hits with your buddies in the garage.

And the deep charm of Mr. Gondry’s film is that it allows the audience to experience it with the same kind of casual fondness. It is propelled by neither the psychology of its characters nor the machinery of its plot, but rather by a leisurely desire to pass the time, to see what happens next, to find out what would happen if you tried to re-enact “Ghostbusters” in your neighbor’s kitchen. It’s inviting, undemanding and altogether wonderful. You’ll want to see it again, or at least Swede it yourself.

“Be Kind Rewind” is rated PG-13 (Parents strongly cautioned). It has some swearing and Sweded sex and violence.

BE KIND REWIND

Opens on Friday nationwide.

Written and directed by Michel Gondry; director of photography, Ellen Kuras; edited by Jeff Buchanan; music by Jean-Michel Bernard; production designer, Dan Leigh; produced by Mr. Gondry, Julie Fong and Georges Bermann; released by New Line Cinema. Running time: 1 hour 41 minutes.

WITH: Jack Black (Jerry), Mos Def (Mike), Danny Glover (Mr. Fletcher), Mia Farrow (Miss Falewicz), Melonie Diaz (Alma), Chandler Parker (Craig), Irv Gooch (Wilson), Arjay Smith (Manny), Marcus Carl Franklin (Kid 1), Blake Hightower (Kid 2) and Amir Ali Said (Kid 3).
http://movies.nytimes.com/2008/02/22/movies/22rewi.html





Film Group Sues China Web Site Accused of Aiding Online Movie Piracy
AP

A Hollywood group said Friday it is suing a popular Chinese Web site over film piracy, expanding a legal battle over use of the Internet by China's thriving industry in product copying.

The Motion Picture Association accused Xunlei Networking Technology Co. of allowing users of its file-sharing service to download hundreds of movies from other Web sites despite repeated warnings. The group said it is seeking 7 million yuan, or about $1 million.

Industry groups say explosive growth in Internet use in China is fueling unlicensed copying. Pirate Web sites offer free music, movies, software or games to attract users and make money from advertising or online commerce.

Popular Chinese Web sites also have been sued over accusations that they link to sites that carry pirated music.

MPA accused Xunlei of allowing users of its peer-to-peer, or P2P, service to download copies of movies including "Spider-Man 3," "War of the Worlds" and "Miami Vice." It accused Xunlei of continuing to allow violations after the group's lawyers sent 78 warnings.

"These actions demonstrate that copyright holders can and will vigorously defend their property by any legal means," Frank Rittman, the MPA's Asia-Pacific vice president, said in a statement.

"P2P piracy is a huge problem in China, which if left unattended will threaten the continued development of legitimate online services supported by copyright owners," Rittman said.

A woman who answered the phone at Xunlei's headquarters in the southern city of Shenzhen and refused to give her name said no one was available to comment.

The MPA also has filed a series of lawsuits against Chinese vendors of illegally copied DVDs. The group says it has been awarded 2 million yuan ($280,000) since 2006.

Entertainment and games are among the most valuable attractions for Web sites in China, which has 210 million people online, the second-largest population of Internet users after the United States.

In November, the MPA sued a Chinese Web site, Jeboo.com, that it accused of providing pirated copies of 13 recent Hollywood films to a Shanghai Internet cafe.

A music industry group, the International Federation of Phonographic Industries, won a suit in December against Yahoo Inc.'s China arm, which it sued over links to outside sites with pirated music. The group has filed a similar suit against Chinese search engine Baidu.com Inc.

China is a leading source of unlicensed copies of goods ranging from movies and music to sporting goods and medications.

Beijing has imposed tougher penalties and launched repeated crackdowns, but companies say violations, driven by a booming Chinese economy, are expanding faster than enforcement.

The Motion Picture Association is the international arm of the Los Angeles-based Motion Picture Association of America. Its members are Walt Disney Co.'s Buena Vista Pictures Distribution, Paramount Pictures Corp., Sony Pictures Entertainment Inc., Twentieth Century Fox Film Corp., Universal City Studios LLLP and Warner Bros. Entertainment Inc.
http://www.siliconvalley.com/news/ci_8273136





Another Look At The 'Does File Sharing Equal Stealing?' Question
Mike Masnick

Jon Healy, whose writing for the LA Times I admire quite a bit, has written up a very balanced discussion concerning whether or not file sharing equals theft. He links to some of my writings on the subject, as well as pointing to the views of two Nobel Prize winning economists, F.A. Hayek and Milton Friedman, who both point out that copyright is not property, and treating it as such causes problems. He then presents the entertainment industry's view, which (of course) is that copyright is no different than traditional property. Then he brings in legal scholar Mark Lemley (of whose work I'm also a fan) who tries to bridge the gap by noting that copyright isn't property, but that infringing it "is wrong, and should be punished." However, Lemley also points out that most people recognize copyright isn't traditional property, and the entertainment industry's insistence that they're the same works against the industry, as most people recognize immediately that this argument is false, taking away credibility.

Healy comes out on the balanced side himself, suggesting that infringement is close enough to theft. He does so by comparing it to "theft of service" for cable companies, and noting that "you're still acquiring something of value without paying for it, and you're doing it without the seller's permission." This is a commonly used argument, and seems reasonable at a first pass, but I'd like to address why it's incorrect. Just because you acquire something of value for free (and without the original seller's permission) it doesn't automatically make it "theft." Let's run through some examples:

• I go to the pizza shop and they offer me a free soda with two slices. The soda has value, but I just got it for free, and did so without Coca-Cola granting permission. I don't think anyone would claim this is stealing or even wrong or immoral.
• My friend lets me borrow a book, which I read. The book has value. I got it for free, without the permission of the book author or publisher.
• I get on a train and pick up the newspaper that a passenger left behind. The newspaper has value. I got it for free, without the newspaper company granting permission. I don't think anyone would claim that's stealing.
• I go to the beach. The people sitting next to me are playing music on their stereo, that I can hear. The music has value, but I just got it for free, without the permission of the record label.
• I go see "Shakespeare in the Park." I get to see something of great value for free, without permission of William Shakespeare.
• Verizon sees that Sprint is going to announce an "all you can eat plan" and decides to introduce its own similar plan. Verizon got that idea for a bundle from Sprint for "free" and certainly without Sprint's permission. Yet, we call that competition, not stealing.

You can come up with your own examples. Now I'm sure people will start picking apart each of these examples. They'll say things like in the pizza/soda example, the pizza shop has implicit permission to resell the soda at any price they deem reasonable, since they paid for it in the first place. But, if that's the case, then we have another problem for those who claim that copyright is real property -- because the same thing isn't true with copyrighted material. Those who insist that copyright is the same as real property break their own rule by also insisting that they retain perpetual rights to the good, even after it's been sold. If copyright were like real property, after the creator sold it, the buyer could do whatever they want with it, including giving it out for free. Yet, it clearly is not like that. Coca-Cola sold soda to the pizza shop and the pizza shop can do whatever they want with it, including giving it out for free. So, if the entertainment industry wants to keep insisting that copyright is just like real property, and therefore infringement is theft, then they should also agree to let anyone who has bought their works do whatever they want with them, including give them away for free.

In fact, each "but, this is different because" explanation for the examples above can easily be turned around to prove the point that copyright is different than real property -- because it applies the same rules differently and deals with fundamentally different types of goods or services. What it really comes down to, yet again, is that this is a business model problem. For years, an industry that relied on artificial scarcity is discovering that it's hard to keep that artificial barrier in place. It can't pretend something is scarce when it's really infinite -- and trying to limit it will only backfire in the long run. What you need to do, instead, is figure out new business models that embrace the infinite nature of the goods, and focus on selling additional scarce goods, preferably additional scarce goods that are made even more valuable by freeing up the infinite good.
http://www.techdirt.com/articles/200...14250290.shtml





File ‘Sharing’ or ‘Stealing’?

The semantic debate over whether copyright infringement is theft.
Jon Healey

A few days ago I came across an Op-Ed submission that called for file sharing to be decriminalized. The editors here decided not to run it, but it intrigued me for a couple of reasons. First, the author, Karl Sigfrid, is a member of the Swedish Parliament from the Moderate party — a pro-business party that's akin to this country's Libertarians (except in Sweden they're more than just a fringe group). Second, although he covered much of the same ground earlier this year in a Swedish paper, Sigfrid's new piece added another provocative contention: that unauthorized downloading isn't actually theft. Here's an excerpt:

Quote:
In "The Fatal Conceit: The Errors of Socialism", the economist and Nobel Prize winner F.A. Hayek explains the difference between conventional property rights and copyright. While the supply of material resources is limited by nature, the supply of an immaterial good [is] unlimited, unless the government limits the supply by law…. A later Nobel Prize winner, Milton Friedman, describes copyright as a monopoly that decreases supply to a level below the optimal level. Copyright and the regulations that follow from it should, according to Friedman, be described primarily as a limitation of free speech.
In essence, Sigfrid is saying that something in unlimited supply can't be stolen. His position is a variation on a theme advanced by Mike Masnick of Techdirt.com, among others: that the entertainment industry's aggressive copyright-enforcement efforts spring from an outdated, analog-era notion of scarcity. Under this view, copyright holders are helped, not harmed, by file sharing and other online distribution pipelines; they just haven't adapted their business models to take advantage of the new opportunities. Supporters of this view include musicians, authors and filmmakers who say that that file sharing helped bring the exposure they needed to sell their works.

These aren't just academic arguments. They're ammunition in a battle that's raging online to shape the way the public thinks about copyrights. The first salvo was fired by the original Napster, which defined itself as a file-sharing network. That won the semantic high ground by defining unauthorized downloading as "sharing," not "copying" or "duplicating." The implication was that users of these networks were merely being generous with something they possessed, not usurping the rights of copyright holders.
Record labels, music publishers and movie studios contend that copyrights are indeed property, entitled to the same protection as a home or a car. To counter the notion of "sharing," they've advanced an equal powerful metaphor: downloading as theft. "When you go online and download songs without permission, you are stealing," the Recording Industry Assn. of America says on its website. "Piracy is theft, and pirates are thieves, plain and simple. Downloading a movie off of the Internet is the same as taking a DVD off a store shelf without paying for it," adds the Motion Picture Assn. of America. The imagery has been echoed by the news media, lawmakers and college administrators. It's even found its way into the online term-paper site FratFiles.com, which offers a model essay, "Illegal downloading 'is' stealing" (yes, there are shortcuts even for ethics assignments).

Nice image, but it's not a perfect fit. As Sigfrid noted, there's a fundamental difference between intellectual property (copyrights, patents, trademarks) and real property (houses, cars, plasma TVs): The latter is tangible and limited in supply, the former is not. "Copyright infringement is not 'theft' in the same way that taking a CD from a store is theft," said Mark Lemley, a copyright expert at Stanford University Law School. "If I take your physical property, I have it and you no longer do. If I copy your song, I have it, but so do you."

Legal scholars aren't the only ones making that point. You'll see it again and again in discussions online about the propriety, morality and economic impact of file sharing. To Lemley, that suggests the entertainment industry's choice of metaphors has backfired. "Let me be clear: copyright infringement is wrong, and should be punished," he wrote in a recent e-mail. "But simplistic statements that infringement is 'just like' stealing a CD, or using a room in my house, are wrong. They are also counterproductive, because people instinctively know they are wrong, and so they are likely to ignore histrionics of this sort."

So what's the right metaphor? Unauthorized downloading may not be larceny, but it still seems to fit under the broad notion of theft. Even though the copies cost nothing to produce, the data in them has value. Downloaders acquire that value without paying for it. Some say they're not causing any real losses because they buy new copies of the downloaded files they like. But that rationalization wasn't persuasive to Supreme Court Justice Stephen Breyer, who flatly declared in his concurring opinion in MGM vs. Grokster, "Deliberate unlawful copying is no less an unlawful taking of property than garden-variety theft."

The downloading-isn't-stealing faction makes much of the fact that infringements don't deprive copyright owners of their works. But that deprivation is not an essential element in every kind of theft. If you splice into your neighbor's cable wire and get 150 channels for free, you're not diminishing the available supply of cable TV or depriving anyone else in the neighborhood of it. But you're still acquiring something of value without paying for it, and you're doing it without the seller's permission. That's calledtheft of service.

Don't expect Hollywood to start likening illegal downloading to stealing cable, though, no matter how well the shoe fits. Cable pirates are heroes in some quarters, not pariahs, and the cable operators' image problems rival those of the RIAA and the MPAA.
More important, copyright owners want the public to view unauthorized downloading as shoplifting because they want intellectual property to be as respected by society just as much as real property is. But there's more at issue here than just the propriety of file sharing. The imagery associated with infringement also affects debates over other aspects of copyrights, such as how long they should last and who should be responsible for stopping piracy. Likening them to real property tilts the debate by making copyrights seem immutable, when in fact they have a specific social goal: "to promote the progress of science and useful arts," as the Constitution states in Article I. Achieving that goal means balancing the interests of content creators against the public's, which is a much more complicated task than erecting a legal barrier to five-fingered discounts.
http://www.latimes.com/news/opinion/...,5092348.story





RIAA Reminds Me of The Mafia, says Musician
enigmax

Former Dead Kennedys vocalist Jello Biafra has torn into the RIAA, likening them to the mafia, threatening to leave a horse’s head in the beds of old women and children alike, whilst destroying the education of student file-sharers. Don’t even get him started on the media: “Goebbels would be proud” he said.

Born Eric Reed Boucher in 1958, Jello Biafra is no stranger to controversy. He first became well known as songwriter and lead vocalist with the band Dead Kennedys. The band split in 1986 but 1998 saw the start of a six year battle over the royalties to the band’s music. No doubt this was a miserable experience, so maybe Biafra’s outburst this week was to be expected.

In a translated interview with Norway’s Aftenposten entitled “Goebbels Would Be Proud”, Biafra tells us a little bit about how he feels about the RIAA, big record labels and even the media. He isn’t pulling any punches either.

“I have two different opinions on file-sharing” says Biafra, drawing a metaphorical line in the sand - with good (small labels) on one side, and bad (big labels) on the other.

“You may take from the big labels,” he orders, “because the only thing they do is steal from both the artists and the audience.” Not many would disagree with you there, Jello.

The ‘good’ side are the small guys, explains Biafra to potential file-sharers: “Don’t take from the smaller, independent labels. Then fantastic bands would have to surrender way too early, because they can’t afford it,” he says, whilst completely forgetting that popularity fills concerts and downloads are a good way to achieve that these days. According to MAMA Group who manage the Kaiser Chiefs and Franz Ferdinand, future profit is there to be unlocked - and it lies in the live concert. Popularity through free downloads could be the key to these, time will tell.

“Support the independent labels, but the big ones –fuck’em. Anyways, I haven’t found anything in many years which come from a large label worth buying” says Biafra, as he tosses aside his attacks on singular big labels and gets his teeth into the collective might of the RIAA:

“The RIAA reminds me most of the Godfather,” Biafra says, tipping his head to the side and changing his voice to Marlon Brando mode:

“We will sue you. If you want out of this without going to court, we can make an arrangement: Give us $5000. If not, you will find a horses head in your bed.”

Suddenly he is back to being Jello Biafra again, and talks about why RIAA action against file-sharers is wrong: “They are doing this to 12 year old girls, they are doing it to 80 year old women, and they do it to students. There are plenty of examples that show people having to quit school because they had to give all their money to the recording industry instead,” he says gravely.

Biafra then explains that he doesn’t do any downloading himself as he doesn’t have a computer before launching himself at the media: “It’s so dumb, that even the American edition of CNN is just a bunch of right-twisted parrots babbling about the primary elections, letting the war in Iraq pass in silence. Then it is up to the artists to fill the void.”

Then, in a final show of support for the small guy, Biafra concludes: “When smaller performers express their political views they are gagged. But when Mel Gibson or Arnold Schwarzenegger does it, then it’s okay. Because they fit better into the media profile.”

“Goebbels would be proud.”

For those who haven’t seen it yet, here’s a RIAA training video, that may give some insight into the organization.

Many thanks to Håvard
http://torrentfreak.com/riaa-reminds...-mafia-080222/





Requiem for an Apple

Cease and Desist
DrmBytes

Well, I'm guessing Apple did not like the requiem project that was posted in Technical as the site host received a C&D letter demanding that all downloads be removed from the site. Until further notice, no links are to be posted anywhere on the site to programs that can strip DRM from any of Apple's music or videos. Any user who does so will get the link removed and a warning from us. Any further infraction will get you banned permanently. The site will remain open for now and we won't have a problem as long as we abide by the C&D.

However, on a more personal level this just pisses me off. In no way has this site ever promoted piracy. Those of you who've attempted to discuss such topics know that we take a very heavy handed approach. This was partly to protect us but also because we feel that artists should be compensated for their work. We truly believe that people should be able to free the music they've legally purchased from the shackles of DRM. So, we've attempted through the years to keep a balance of fair use.

Apparently with requiem the balance has been broken in Apple's eyes. This is really a shame...for them. Because I can no longer remove the DRM from songs I purchase legally from iTunes, I am boycotting the iTunes store and purchasing all my future music from vendors who no longer shackle their music with the chains of DRM. I suggest you do the same. We've complied with the C&D and removed all DRM breaking software from the site. But they can't force us to purchase DRM'd music from their store. I've been a long time fan of Apple and iTunes. But this latest move just plain pisses me off. So, I can no longer support them.
http://hymn-project.org/forums/viewt...?p=17241#17241





Buying The DVD: Unhelpful And Unethical
J.J. King

These last few years P2Pers have got used to TV entertainment ‘our way’: unfucked, de-loused, delivered efficiently in economical, good-looking codecs. Because we rarely turn it on, it’s been easy to forget just how cynical, unsatisfying and downright venal television, as a distribution medium, has become.

Whether it’s the stupor-inducing gambling channels dedicated to parting fools from their money, the late-night pseudo-porn selling premium-rate phone sex, or the corrupt ‘competition’ call-ins plaguing the UK’s prime-time (even that Holy of Holies, the BBC), there’s the unavoidable sense that TV is on the rocks. Anyone who’d have you believe filesharers are the only scourge afflicting an industry that would otherwise be healthy is smoking crack, in the business, or both.

This is why Tape It Off The Internet seemed like such a good idea until you actually started trying to use it. There are just not enough good shows being made to justify something as complicated and involved as TIOTI. Enter all your favorites and share them with strangers ‘just like you’ and discover… what? That there are only seven good shows in the world at any one time, you were already watching six of them, and they’re all in the Pirate Bay’s Top 100 anyway. When you strip away the hours of dross and advertising, the truth is that the world’s mighty entertainment infrastructure is only capable of producing half a dozen hours of passable content a week. Maybe it’s because they spend the rest of their time on lawsuits.

One of these rare hours is The Wire. If by some small chance you’re not mainlining it already, think yourself lucky. You have four back seasons to enjoy, of what is quite possibly the last great show television will produce before it’s entirely superseded by — well, by whatever is coming around the way.

I’m not sure anyone has ever attempted to make a show of this scope: The Wire’s by-all-accounts-not-very-nice creator David Simon (Homicide, The Corner) has said his theme over the series’ five years has been ‘the decline of the American empire’ — which means decay of its cities through poverty, of traditional jobs, of the education system, of the police force and of the media. For those getting restless at the back, the show’s also got the slickest, nastiest drug slingers you’ll see on screen and is so realistic that the Baltimore Police have apparently complained it reveals too much about how crimes are — or are not — solved; apparently real thugs love it as well.

Find it and download it — though probably David Simon doesn’t want you to and neither does HBO, which has been actively poisoning Torrents of its other shows. Tell everyone you know about it. Maybe those of them still rocking TVs will raise the show’s increasingly dismal viewing figures.

Or maybe that’s no longer the point. While I sympathise with the plight of the David Simons, David Milchs (Deadwood, John from Cincinnati) and Joss Whedons (Firefly) of this world, and would like to help them in future endeavors, I specifically do not sympathise with the plights of the craven, dim-witted, played-out producers that surround them on all sides. And by ‘playing fair’ and buying the DVD or the cable package, besides the fact that most of our money is not going to the creators and their families, aren’t we really saying we accept the meshwork of shit in order to get the two or three gems that occasionally sift through it? Aren’t we signalling the industry that there’s something we still find acceptable about their way of doing business?

Now I suppose this could seem a bit extreme to some. But again and again in blogs and comments about shows like The Wire you hear ‘I’d pay for this if…’ — if it wasn’t DRM’ed all to hell like HBO’s own online offering, if it was freely shareable, good to be watched whenever, wherever, on whatever, without constant interruption by adverts. The kicker is that we’re not only unable legally to liberate and re-distribute shows from the broken, corrupt mechanisms of television and DVD distribution: we also have no way of supporting creators like David Simon and crew outside of it.

This means that right now, people still stupid or unfortunate enough to sit in front of TVs watching months-old shows or paying massive cash-or-attention premiums for the new ones are heavily subsidising us P2Pers. This is genuinely immoral, because we’re really exploiting people less fortunate than ourselves. Instead, we should be helping them out of the wasteland, and thinking of new ways to get the creators we like creating outside the prison of mass distribution. It cannot be that we are able to figure out how to make GNU-Linux - a world-class operating system — together, but not to make a dozen decent shows a year.

The irony is that TV series really feel like they’re coming into their own, just as the media that spawned them is dying. From the ‘high art’ of Deadwood and John From Cincinnati to the epic modern-day myth of Lost to the (dare I call it) Beckettian dark comedy of Trailer Park Boys, the drawn out tales of our series (often consumed a ’season’ at a time: I know at least three people waiting for The Wire to finish before downloading it) are an undeniable core of our emerging P2P culture.

We are the most passionate viewers ever, talking and writing profusely about the media we love, analysing, promoting, hosting free screenings… And they need us as much as we need them — all of these shows, without exception, enjoy their primary life on the networks, through our blogs, comments, reviews, remixes and fan fiction. Lost in particular has learned that incorporating online feedback can make a great (if utterly Shaggy Dog) story.

Can we find a way to get the shows we want made without buying the goddamn DVD? I remember this guy talking really sensibly a couple years ago about how Joss Whedon could get to make another season of Firefly, and we got this project back up his musings. Why didn’t Whedon try it? Because someone else owned his ideas? Perhaps it could have worked otherwise, and maybe it could work for the future. If you’ve got ideas, throw them in the comments box below. And if you have time in between catching up on The Wire, read this by the venerable guru of Wired magazine, Kevin Kelly — I’m going to try to get him into the next installment of STEAL THIS FILM. See you around. I’ll be back in two weeks to pick up the pieces.
http://torrentfreak.com/buying-the-d...thical-080221/





'DVD Jon' Frees Your Media with DoubleTwist
Erica Ogg

The man notorious for cracking the DVD code, and Apple's FairPlay DRM, is looking to make a legitimate business out of his expertise.

Beginning Tuesday, the first product from his company, DoubleTwist Ventures, will enter open beta. Called DoubleTwist, it's a free desktop client that essentially allows any kind of music, photo, or video file to be shared between a long list of portable media players, and through Web-based social networks.

Instead of iTunes songs or videos taken with a Nokia N95 remaining locked on the phone, DoubleTwist software allows for dragging, dropping, and syncing of different media formats no matter the device.

The idea, according to DoubleTwist founder and CEO Monique Farantzos, is that media files should be more like e-mail. It shouldn't matter what service you create the file in, or on what type of hardware, it all should work together seamlessly, she says.

Farantzos recruited DVD Jon, or Jon Lech Johansen, and the two have been working with about 10 others for the past eight months on the DoubleTwist software. Johansen says DoubleTwist allows him to bring the success he's found to a wider audience.

"It's one opportunity to write something for your Web site for use by a couple thousand geeks," he said in an interview. But with DoubleTwist, the idea is to hide all the complexity of making easy transfers of files from the user so that even non-techie types will understand. "The goal is to make something your parents can use," he said.

It works like this: When a device is plugged into a PC (Windows XP and Vista only right now, Mac OS X coming soon), DoubleTwist launches and recognizes all the media files on the device. Any file can be selected, dragged, and dropped into DoubleTwist to be synched up to a separate device, or shared with other users you've "friended" who also use DoubleTwist.

By adding Facebook compatibility (with OpenSocial platforms next on their list), DoubleTwist users can share media through the social network. A Facebook application called TwistMe will allow users to drag and drop media content into a box on a fellow user's Facebook profile. The friend will then see the shared files show up in his DoubleTwist desktop client.

Social-network compatibility is key to enable real sharing of media between users, Farantzos said. "It closes the loop between the Web, devices, and the desktop."

DoubleTwist also recognizes and imports all iTunes playlists and will read instantly which ones are protected by digital rights management technology. The software automatically plays the song files in the background (sans volume) and re-records them as MP3 files so they can be transferred to any device. Note: DoubleTwist only does this for songs you own or are authorized to play in iTunes.

Farantzos says they're not picking on any one particular brand of DRM, especially since the entire industry, led by Amazon, is leaning toward a DRM-free policy.

"Digital media is dominated by two players, Windows Media and iTunes, and they each have their own agenda...we see ourselves as the Switzerland of digital media. We are format and device agnostic."
http://www.news.com/8301-10784_3-9873241-7.html

















Until next week,

- js.



















Current Week In Review





Recent WiRs -

February 16th, February 9th, February 2nd, January 26th

Jack Spratts' Week In Review is published every Friday. Submit letters, articles, press releases, comments or questions in plain text English to jackspratts (at) lycos (dot) com. Submission deadlines are Thursdays @ 1400 UTC. Please include contact info. The right to publish all remarks is reserved.


"The First Amendment rests on the assumption that the widest possible dissemination of information from diverse and antagonistic sources is essential to the welfare of the public."
- Hugo Black
JackSpratts is offline   Reply With Quote