P2P-Zone  

Go Back   P2P-Zone > Peer to Peer
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Peer to Peer The 3rd millenium technology!

Reply
 
Thread Tools Search this Thread Display Modes
Old 08-08-07, 10:18 AM   #1
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,013
Default Peer-To-Peer News - The Week In Review - August 11th, '07

Since 2002


































"The future of file sharing is bright." – Don Reisinger


"We met with members of the House and Senate judiciary committees this week, and while they all were supportive of small Webcasters, time after time we heard the IREA was not going to pass." – Rusty Hodge


"It's about vital civil liberties that are a foundation of a democratic society that need to be eroded or abolished in order to maintain a crumbling monopoly." – Rick Falkvinge


"Don’t misunderstand: I still get a kick out of 'Bonnie and Clyde,' but it’s accompanied by a twinge of unease, by the suspicion that, in some ways that matter and that have become too easy to dismiss, Bosley Crowther was right." – A. O. Scott




































August 11th, 2007





Judge Allows RIAA to Serve Subpoena on Defendant's Former Employer
Ray Beckerman

In Atlantic v. Shutovsky, pending in Manhattan, the Judge has issued an order ruling on a number of discovery issues. No written opinion was issued. Among the Court's rulings were the following:

-The plaintiffs were permitted to serve a subpoena on Mr. Shutovsky's former employer;
-The plaintiffs were permitted to take depositions of Mr. Shutovsky's wife and his brother;
-The court stayed defendant's discovery in support of his counterclaims for copyright misuse and declaratory judgment.
-Plaintiffs were required to produce all non-privileged documents or materials relating to any investigation and any sound files on their computer, and to produce a privilege log as to any claimed to be privileged.
-Plaintiffs did not have to turn over documents relating to their employees of 'online media distribution systems'.
-Defendant was required to provide the name and address of each person who used his computer during the three (3) years prior to commencement of the lawsuit.
-Defendant was required to produce all hard drives in his possession and control.
-Plaintiffs were required to furnish copies of copyright registrations for every song they assert was unlawfully downloaded.
http://recordingindustryvspeople.blo...bpoena-on.html





Oklahoma State Students Attack RIAA's Expert Witness
Eric Bangeman

For the most part, the RIAA's legal campaign against suspected file-sharers has gone along with a minimum of hassle from its perspective. For every case that makes it to the front page of Ars, there are likely hundreds that escape our notice—often due to the fact that most of them end up being settled.

The RIAA's relatively brief experiences with lawsuits against college students indicates that things are not going so smoothly with the music industry's attempts to sue this population. The latest bit of news from that front comes courtesy of Ray Beckerman and Oklahoma State University, where 11 "John Doe" students are attempting to quash the subpoena issued to OSU, requesting that it hand over the names of those using IP addresses fingered for file-sharing by Media Sentry, the RIAA's investigators.

The students make the usual arguments that the ex parte discovery (i.e., discovery taken against the subjects of a lawsuit without their knowledge) is improper, but they also attacked the RIAA's expert witness, Carlos Linares. An expert witness hired by the students has gone over (PDF) Linares' declaration supporting the case, taking issue with many of his statements. Jayson Street, the defendants' expert witness, is the chief information security officer for Strategem 1 Solutions. He lists his qualifications as having years of experience with network security and several certifications.

According to Linares, "users of P2P networks can be identified by their IP addresses because each computer or network device (such as a router) that connects to a P2P network must have a unique IP address within the Internet to deliver files from one computer or network device to another."

Street takes issue with that assertion, noting that a person "cannot be uniquely identified by an IP address." He goes on: "An IP address must be unique on a given network. However, networks of networks can have many duplicate addresses. A common technology called Network Address Translation is used to present a single IP address from one network as the only address for all computers behind the control point (such as a router)."

Street notes eight other errors or "facts without any supporting evidence" in Linares' declaration, concluding that the RIAA's claim that an IP address "uniquely identifies" a person is "an oversimplification" that demonstrates the record labels' attempt "to use technical terms to assign blame without evidence sufficient to identify the alleged file sharer."

After a federal judge ordered a P2P defendant to cough up the names of everyone who had used his computer over the past few years, I pointed out the difficulties inherent in trying to sue an IP address, which is essentially what the RIAA does. Although this case involves 11 college students instead of a single Verizon subscriber, the same principle holds true: the person whom the ISP or college identifies as being responsible for a given IP address at a particular point in time is not necessarily the person fingered by Media Sentry for sharing music on KaZaA.
http://arstechnica.com/news.ars/post...t-witness.html





Judge Overturns $1.5 Bln Ruling Against Microsoft

A U.S. judge reversed on Monday a jury's ruling that Microsoft Corp. had infringed patents held by Alcatel-Lucent and threw out a record $1.5 billion verdict against the world's largest software maker.

U.S. District Judge Rudi Brewster said in a 43-page order that the jury's damages could not stand because Microsoft had not violated one of the two patents related to MP3 music files at the heart of the case.

The judge also called into question the second patent claim in the case and said a new trial may be needed to determine the ownership of that patent.

Microsoft has claimed that it had already licensed the MP3 technology in question from German research organization Fraunhofer Gesellschaft for $16 million.

Microsoft and Alcatel-Lucent are locked in a number of patent disputes including a suit over the video-decoding technology in Microsoft's Xbox 360 video game console.

Alcatel-Lucent spokeswoman Mary Ward said the reversal was "shocking and disturbing" and the company planned to appeal the latest decision. Microsoft said it plans to issue a statement shortly about the decision.

(Reporting by Ritsuko Ando and Daisuke Wakabayashi)
http://www.reuters.com/article/ousiv...44894920070806





More Parties Join Google Copyright Lawsuit

English soccer's Premier League Ltd and music publisher Bourne & Co said on Monday that eight more parties have joined their lawsuit charging Google Inc and its YouTube online service with deliberately encouraging copyright infringement.

The new parties include the National Music Publishers' Association, which is the largest U.S. music publishing trade association, the Rugby Football League, the Finnish Football League Association and author Daniel Quinn.

Video programming owners have teamed up against YouTube, charging the top online video service with encouraging copyright infringement to generate public attention and boost traffic to its site.

Google has said it is abiding by existing law that protect Internet services from being liable for what is on their networks so long as they respond promptly to complaints.

MTV Networks owner Viacom Inc sued Google and YouTube in May for $1 billion for copyright infringement and demanded the removal of hundreds of thousands of Viacom video clips that were uploaded without permission by users.

"The clear and growing message to YouTube and Google is simple: their callous and opportunistic business model is contrary to right, contrary to law, and must and will be stopped," Premier League spokesman Dan Johnson said in a statement.

Robert Tur, the broadcast journalist who filmed the attack on Reginald Denny during the 1992 L.A. Riots, plans to withdraw his earlier suit against YouTube and join the proposed class action suit as a plaintiff.

The proposed class action complaint was originally filed in New York on May 4, 2007 in the U.S. District Court for the Southern District of New York.

Responding to the original suit in May, Google said: "These suits simply misunderstand the Digital Millennium Copyright Act, which balances the rights of copyright holders against the need to protect Internet communications and content."

Google did not have immediate comment on the new parties joining the suit.

(Reporting by Kenneth Li)
http://www.reuters.com/article/techn...41084820070806





Copyright Filtering A Technology Doomed To Failure, Some Critics Say

AT&T and NBC Universal have both recently advocated the use of Internet filtering technology to help weed out pirated content -- movies, TV shows, songs, music videos and more -- accessed for free by Web surfers without permission of the copyright owners.

Repeated attempts by movie and music industry representatives to halt the practice aren't working. They've filed thousands of lawsuits against alleged pirates, to little avail. Piracy is growing, and the entertainment industry says it's costing them billions of dollars a year.

That's why entertainment execs applauded when Internet service provider AT&T revealed that it would work with them to devise a filtering strategy.

Critics of filtering technology had a different reaction.

"The odds are long that this can be done," said Eric Garland, founder of the research firm Big Champagne.

Napster And Kazaa

He points to when the music file-sharing firm Napster was forced to shut down by court order in 2001 after two years of operation.

"People thought it would dramatically cut back on the (illegal) sharing of music," Garland said. "But what happened is (illegal sharing) grew even more, just taking a different form."

With the collapse of Napster, which enabled the exchange of music files through a centralized computer system, programmers developed peer-to-peer file-sharing systems such as Kazaa. With P2P, the content resides on the computers of millions of individuals who download the software that lets them share files across the Web.

Developers will surely try to subvert any filtering system. But the bigger problem, analysts say, is that trying to weed out pirated content could inadvertently zap the files of perfectly legal content.

According to advocacy group Public Knowledge, there are two types of filtration technology: content inspection and traffic analysis.

Content inspection looks inside the packet of data that is being transferred to determine if it's infringing copyright laws, Public Knowledge said in a recent report to the Federal Communications Commission.

That means Internet service providers could eavesdrop on all Web surfers, a troublesome idea to watchdogs of civil liberties.

Privacy A Concern

"Innocent people will have their privacy violated," said Fred Von Lohmann, an attorney for the Electronic Frontier Foundation, an Internet watchdog group.

The other method is called traffic analysis. Instead of looking inside data packets, it studies the nature of data traffic -- where the traffic is coming from and the application being used to send it. If it appears to be of a type a network operator wants to block, then the transfer is cut off.

Critics contend that both methods have flaws. If an Internet service provider, using traffic analysis methods, intends to block certain P2P-carried files, it likely will also block files that are perfectly legal.

The system blocks "all traffic transmitted in certain ways -- authorized and unauthorized copyright content, public domain works, fair uses and infringing material," Public Knowledge said.

And with the content inspection approach, pirates could subvert the system by encrypting their files so that filters can't identify them.

Most P2P technologies today don't encrypt their signal, but all of them could. And even if content inspection technology could be modified to decrypt those files, that would be a big concern for such fields as the financial industry and the military, which rely heavily on encryption.

"People are wasting their time thinking they might invent an effective filtering technology," said Art Brodsky, a spokesman for Public Knowledge. "It's a difficult and complex task."

It's not that EFF, Public Knowledge and others support the pirates. They want rights-holders and content creators to be paid for their work. But it can be done without drastically changing the nature of the Internet, they say. Among other things, they say ISPs should focus on providing Web users with a service that's more compelling than what the pirates offer.

"You can compete with free," Von Lohmann said. "Just look at the bottled water business, or Apple's iTunes business. You do that by offering customers a better value proposition."
http://money.cnn.com/news/newsfeeds/...1-18705807.htm





Police Arrest French Teen Over Potter Translation

Police arrested a teenager suspected of posting his own translation of the latest Harry Potter novel on the Internet weeks before the official French release, the book's publishers said on Wednesday.

The 16-year-old schoolboy, from the Aix-en-Provence region in southern France, was taken into custody by a police anti-counterfeiting unit and later released, said a spokeswoman for the Gallimard publishing house, which handles the French editions of the novels.

"Concerned that such acts of counterfeiting are threats to basic authors' and creators' rights, (author J.K. Rowling and Gallimard) immediately agreed to support the investigation as it was launched," spokeswoman Marie Leroy-Lena said in a statement.

"It is not a young person or a fan we are talking about here -- these are organized networks that use young people," she told Reuters by telephone.

"For the moment there is an ongoing investigation, and neither Gallimard nor Ms. Rowling has filed an independent lawsuit."

The newspaper Le Parisien reported earlier that the book's first three chapters appeared on the Web just days after the English-language edition of "Harry Potter and the Deathly Hallows" went on sale in late July. The paper said boy was arrested on Monday.

Police were not available for comment.

The official French language version of the book is scheduled for publication on Oct 26.

The seventh volume of the Harry Potter saga is the fastest selling book in history, publishers say, with about 11 million English-language copies sold in the first 24 hours.

Many French stores are selling the English-language version.
http://www.reuters.com/article/newsO...08150920070808





Chec please

Distributors Worry Over “Big Doh!” Following Simpsons Cinema Piracy
Marcel Bodnár

For the first time ever, a pirated blockbuster movie illicitly recorded in a Czech cinema on the day of its premiere has turned up on the black market. The copy of “The Simpsons Movie,” with Czech dubbing, recorded with a videocamera in a theater, appeared on the Internet just hours after its official release.

The Simpsons incident is not the only case that’s disturbed the Czech cinema industry this year. During the spring, a copy of director Jan Svžrík’s movie “Empties” (Vratné lahve) was leaked from the Ministry of Culture. Svžrík reported the case to the police, but it remains unsolved. These cases demonstrate growing trends in Internet copyright violations.

Movie copyright violations basically come in two varieties. First, of course, an existing DVD can be copied, with the resulting pirate DVDs then sold at marketplaces for a lower price than what the original DVD was purchased for. Second, a digital copy of a film can be downloaded from the Internet. While the first approach means the fraudster has to await the release of the movie on some kind of medium, like a DVD, the second approach is easier and speeds things up.
It’s recently become common practice for people with fast Internet connections to download a new movie in reasonable quality from the Web, rather than go and see it at a cinema or buy or rent it on DVD. Due to internationally staggered release dates, new movies are often available on the Internet before they are officially released in the Czech Republic. “It depends on the attractiveness of the movie. The more attractive the title, the sooner an illegal copy of it is on the Web,” said Ladislav Hrabž, CEO of film distributor Bontonfilm, the official Czech distributor of “The Simpsons Movie.” The usual way of unlawfully getting a movie onto the Internet typically involves either somebody recording the movie in a cinema with a handheld camera or stealing a copy of the film from the producer. The cinema approach, refered to by the name CAM, sometimes means less than perfect quality.

“As for quality, [“The Simpsons Movie”] is a typical CAM version. [Although some] people who have already seen this copy are saying that sound quality is satisfying for a sound version,” read a comment posted on peer-to-peer (P2P) and digital news site www.p2pnet.net after the Czech-dubbed Simpsons film arrived on the Internet so some people familiar with the black market obviously prefer to wait for the DVD release, after which computer pirates run off illegal digital copies. DivX or MPEG are the most common file formats for compressed films. Subsequently, these copies are placed on an Internet file hosting server, from which people can download them, or are shared via peer-to-peer (P2p) software. The avalanche is then unstoppable.

Little awareness of chain reaction

The damaging effects of each instance of illegal downloading spreads right down the line. Few people realize how their actions financially hit filmmakers, distributors, actors, directors and so on, quite apart from the fact that they are a violation of a legally founded copyright. “Piracy has recently been the biggest menace to our industry, and it can have fatal consequences,” Hrabž said. In 2006, film piracy overall cost the filmmaking industry around $6.1 billion (Kč 125 billion/€ 4.5 billion) worldwide, according to nonprofit organization Czech Anti-Piracy Union (ČPU). Follow-through effects would thus certainly have been felt in terms of reduced job opportunities, a lower amount of movies produced and lower-quality movies, it said.

“Illegal downloading is a trend that is rising on a yearly basis,” said Lenka Hekov, public relations manager for the ČPU. While in 2004, the illegal side of the Czech movie market was estimated by the ‰PU at approximately 28 percent, this year it extended to more than 40 percent. “Last year, the estimated financial damage caused to movie distributors [in this country] was more than K‹ 1 billion,” He‹kov‡ said.

How is it done?

Illegal Internet downloads are nowadays mostly carried out through P2P networks. When it originated, P2P was designed for the direct sending of files like documents and pictures between two users, so another central server to store the files was not needed. The technology helped to utilize network capacities better, a primary aim that nobody could argue with, but hackers soon discovered that P2P networks can also be deployed in sharing illegal material such copied movies, music and software. Subsequently, they created software for such uses. DC++, BearShare and BitTorrent are all externally presented as software for sharing legal digital material, but most of the traffic they make possible is actually illegal.

The second most widespread way of sharing illegal materials is through file hosting servers, such as the popular www.rapidshare.de. To make it feasible, there must be a third party server, with one user copying his material and publishing it for other users to download. These servers too were designed for legal materials, and illegal contents are constantly deletedŃbut with the amount of material placed on them measuring into the tens of terabytes, it is hard, if not utterly impossible, to locate everything that should be removed.

‘We try hard, but it’s not enough’

Although Czech courts are empowered to punish a copyright violation with as much as two years in prison or a K‹ 5 million penalty, it is usual that a convicted person receives a fine of just tens of thousands of crowns and, very rarely, just a suspended sentence. “It is unusual to send people to prison for these kinds of crime,” He‹kov‡ said.

Nevertheless, the number of copyright prosecutions is growing, though slowly. He‹kov‡ said about 500 cases were referred to the police last year compared to around 200 in 2002 and less than 400 in 2003. The referrals in 2006 led to 350 adjudications. Internet-based crimes made up quite a small proportion of the overall caseload, at less than 10 percent, the reason being that prosecuting a DVD-based case is that much easier. In a DVD-based case, hard evidence is provided by illegal copies found at a marketplace, but in an Internet-based case solid evidence can prove elusive. “We try hard, but [our efforts] are still not enough to reduce Internet piracy,” He‹kov‡ said.

The ČPU would like to see some legislative changes to make its task easier. “It would be very helpful if, for example, providers of Internet services were obliged to give us data about their clients in an incidence where illegal material is found on their server. Although providers often cooperate, this obligation is still not in place here,” Hekov said.

Music’s peak was back in ’98

As with the Czech film, software and games sectors, the domestic music industry also has plenty of players wincing at the pain caused by Internet piracy. “It was in 1998 that the music industry reached its peak. Today our sales have fallen to about one-third of the amount achieved in that year,“ said Tomä Filip, CEO of music publisher Universal Music. “Along with the financial losses caused, the possibilities for reinvesting finances into new prospective talents are limited. This eventually has an influence on the broadness of the musical spectrum,” said Petra ëikovsk from the International Federation of the Phonographic Industry (IFPI).

The growth in both pirated music CDs and digital music files disturbs Filip. “With CDs, the Czech market rate of legal to illegal copies is nowadays about 50:50, but where digital music is concerned the illegal rate is close to 100 percent,” he said. Some product protection efforts made by music producers and distributors have foundered on technical problems. “About five years ago, we tried to protect our CDs, but it ended up counterproductive because not all players were able to play them back,” Filip said.

The newest trend in the protection area is digital rights management (DRM), implemented with all kinds of music formats, but mainly MP3s. However, as with everything, DRM has its drawbacks. Not all MP3 players are able to replay music with DRM. “This is not a problem in Western countries, where iTunes and iPods are widespread. When somebody buys protected music through iTunes in these countries, they can simply play it on their iPod, which is fully compatible with DRM,” Filip said, adding that DRM has only been introduced to the Czech market relatively recently, meaning hardware compatibility problems are still evident.

Prevention better than cure

With faster and faster Internet connections penetrating more and more of the market, most filmmaking and music industry experts agree that most headway against copyright violation can be made by following the path of prevention. “We give lots of lectures at schools and film festivals,” Hekov from the ČPU said. “You have to explain to young people that downloading an illegal copy of a movie from the Internet is the same as, for example, stealing groceries, something which most of them will never do in their life.” More severe legislation and publicizing precautionary tales could also discourage people from entering into piracy. ëikovsk also talked of a third way of fulfilling a customer’s needs. “I think that a cure for some piracy would be well-working Internet stores with competitive prices and additional services, such as concert information [regarding the music they are purchasing],” she said.

But whether that proves to be the case or not, those leading the fight against piracy are all too conscious of two uncomfortable truths: The pirate never sleeps and, as long as something is free, it will always be cheaper than everything else.
http://www.cbw.cz/phprs/2007080625.html





'Simpsons Movie' Hits Snag in India
Nyay Bhushan

Another mega overseas weekend for "The Simpsons Movie" got little help from India as a number of the nation's leading multiplex chains refused to screen the film after a breakdown in negotiations with its distributor, Mumbai-based Warner Bros. India, which also handles 20th Century Fox product here.

A failure to agree on the number of showings for the film is at the heart of the issue according to exhibitors. Warner Bros. India declined comment.

Thanks to a previous agreement with New Delhi-based multiplex chains PVR Cinemas, Wave Cinemas and Satyam Cinemas, "The Simpsons Movie" opened Aug. 3 on a handful of screens in the city. But Mumbai-based chains Fame, Inox, Adlabs, Fun Republic, Cinemax, Movietime and Citypride boycotted the film nationwide.

"Warners was demanding that we book at least five or six shows but that was impossible considering we had major Indian films opening as well such as 'Gandhi My Father' and 'Cash,' " Vishal Anand, marketing manager for 50-screen chain Fun Republic, said in an interview Monday. "We decided to boycott the film altogether."

"Simpsons" was expected to be released in India on about 40 prints and industry estimates reckon that the boycott could amount to lost opening weekend revenue of about $75,000 (3 million rupees).

Moreover, the "Simpsons" boycott also led to the multiplex chains pulling Warners' "Harry Potter and the Order of the Phoenix," which was in its third week of a successful run.

But Anand confirmed that a deal was reached Monday following negotiations with 20th Century Fox Australia. "We are now opening the film from Tuesday with about three shows," he said.

The weekend snafu is being seen as an opportunity for Sony Pictures Releasing, which opened the animated film "Surf's Up" on Friday.
http://www.hollywoodreporter.com/hr/...9251e5d3?imw=Y





Can Hollywood Make a Bollywood Movie?
Anand Giridharadas

MUMBAI: An Indian woman in a flowing, beaded gown glides through a pond. As the drumbeats of the Indian countryside patter, a dancing phalanx of tunic-clad women twirls. A mosquito net brushes over the woman's lover. A silver anklet splashes into a pond.

These are scenes from the trailer of a forthcoming movie, "Saawariya." The film, whose Hindi title means beloved, has an Indian director and cast. It is melodramatic. Its characters speak Hindi and burst into eight song-and-dance routines. It is, in other words, vintage Bollywood - but for one thing.

It is brought to you by Hollywood.

The studio behind "Saawariya," Sony Pictures, is the first in what will become a wave of American studios to produce their own kaleidoscopic, song-and-dance Bollywood films. The American studios are keen to make money in India, but in a nation where $19 of every $20 spent at the box office goes to domestic films, the studios are deciding to join Bollywood, not try to beat it.

"The importing of American films into India is not filling a gap," Gareth Wigan, vice chairman of Columbia TriStar, the Sony division that produced the film, said by telephone from Los Angeles. "You're not bringing a dish to a bare table. You're bringing a dish to a table where you have to move a lot of other dishes to fit in, and that's not true in a lot of other countries."

And so begins a strange competition to make the best Bollywood film, pitting Hollywood, the world's most profitable industry, against India's own studios, the reigning masters of the genre, which make more movies and sell more tickets than any film industry in the world.

With movie audiences shrinking in America and swelling here, Hollywood wants to tap into India's market. But Indian-made films captured 95 percent of the country's box-office sales in 2006, according to PricewaterhouseCoopers. Domestic films are just as dominant in the United States, but they account for just 35 percent of the box office in France, 33 percent in Japan and 12 percent in Britain, according to 2005 data published by two scholars, David Waterman and Sang-Woo Lee.

"There is no country on the planet, other than India and the United States, that approaches that level of domestic business," Andrew Cripps, the president of Paramount Pictures International, said by telephone from Los Angeles. And so Paramount, too, is contemplating Indian productions.

Walt Disney has partnered with an Indian studio, Yash Raj Films, to make animated movies for Indians. The first film, "Roadside Romeo," due next summer, is a parable of Indian inequality, featuring a dog abandoned by rich owners in Mumbai and forced to brave its hungry streets.

And Warner Brothers is developing two Bollywood projects, including one song-and-dance smorgasbord, according to Richard Fox, the head of its international division. In a telephone interview, he said Warner would seek to earn a majority of its Indian sales from Bollywood productions. The studio plans three to six movies a year in the coming years, all with Indian talent.

"We're not coming to change anything," Fox said.

That is Hollywood's Indian mantra. Sanjay Leela Bhansali, the director of "Saawariya," was at first wary that Hollywood would trample him, and was surprised when Sony left him alone. At most, he said, Wigan would offer gentle, helpful suggestions for the script, which is based on Fyodor Dostoyevsky's short story "White Nights."

"There was no compromise asked of the film," Bhansali said, staring out at the Arabian Sea from his stylish north Mumbai apartment.

On Saturday, the International Herald Tribune was permitted to view the movie trailer, which had yet to be shown even to Sony executives.

Hollywood is now Bollywood's competitor, but local filmmakers say Hollywood is wise in attempting to mimic it, not supplant it.

"They're doing the right thing," Yash Chopra, one of Bollywood's most revered filmmakers, said in an interview. "To come to a country to make a film is either to understand the culture or break the culture."

Others doubt that U.S. executives grasp the nuances that entice Indian audiences. Tyler Cowen, the author of "Creative Destruction: How Globalization is Changing the World's Cultures," said it was unusual for Hollywood "to try to copy the native style so exactly."

"That is unusual for a reason," he said. "It usually doesn't work."

"Bollywood," whose name amalgamates Hollywood and Bombay, the former name for Mumbai, refers to Hindi-language movies made in Mumbai, which account for roughly one-fifth of India's 1,000 or so annual productions.

Cinema is booming in India as the middle class mushrooms and builders erect air-conditioned multiplexes in cities. PricewaterhouseCoopers expects India's film industry to expand to $4.4 billion a year in 2011 from $2.1 billion in 2006.

Hollywood wants more of that pie, whether through imported or locally made content, and this year it had surprising success with imports. Among other triumphs, "Spider-Man 3" made $17 million in India, becoming the most successful Hollywood film in the country's history.

Behind these successes is a trend toward dubbing films not just into Hindi, but also into regional languages like Bhojpuri and Telegu.

But dubbing cannot woo a billion Indians. Uday Singh, Sony's India chief, estimates that a Hollywood movie in English can attract five million viewers. Dubbing expands the upper limit to 30 million, still a mere fragment of India's population.

Now, with "Saawariya," Singh said his Los Angeles colleagues have accepted that only Bollywood fills the seats. He believes Sony will earn 90 percent of its Indian keep from Bollywood-style films.

Hollywood has gone native elsewhere, in France, Germany, Hong Kong and beyond - but never against a domestic industry with so vast and impassioned a following.

For millions of Indians without television sets, movies are the primary entertainment form - as they were for all Indians through the 1980s, when there was just one television channel. For big Indian families with diverging tastes that watch movies together, Bollywood packages romance, comedy, drama and action into a single serving.

Bollywood is interactive. Bhansali recalled taking his maid to one of his movies. During a musical number, she leaped from her seat and began dancing. "You sit down, you're embarrassing me," Bhansali recalled telling her. "I'm the director. People are looking at me."

She retorted that if he didn't want the movie enjoyed as it should be, he shouldn't have invited her.

Perhaps the greatest obstacle for Hollywood is that Bollywood is everywhere here. Actors' images are ubiquitous. Bollywood show tunes engross Indians. There is what might be called a music-industrial complex in India, hooking consumers to the songs on a soundtrack before the film is released.

Nightclub D.J.s play the songs. Phone companies release matching ringtones. MTV plays them incessantly. By the time the movie comes out, its songs are stuck in millions of heads, and watching it is the only path to closure.

"If you take all the pieces of Bollywood out of our lives - the celebrities on the billboards, the songs in the nightclubs, the stars on Page 3 - Indians would find their lives to be completely empty," said Shuchi Pandya, a jewelry merchandiser in Mumbai. "It's subconscious. Even if you don't enjoy Bollywood movies, it becomes a part of your life."
http://www.iht.com/articles/2007/08/.../bollywood.php





Hungary's New Tax Breaks, Facilities are Key Draws
Nick Holdsworth

Sweeping fields of sunflowers dotted here and there with the smaller enclosures of Chardonnay-producing vineyards roll away from a sun-baked hilltop that sits above this small village 16 miles northwest of Budapest.

The chalky soil is good for the grapes -- the white wines of Eytek are among the best in Hungary -- and the panoramic vista from the hilltop offers uninterrupted views of green below and blue above stretching to the Buda hills far on the horizon.

Once home to Soviet ballistic missile silos, today the hillside has been cleared of its Cold War contamination of bunkers, machine oils and munitions and a new world is taking shape.

On an 84-acre site that broke ground last September and is still under construction, Central Europe's latest new film studios are open for business, with Universal's "Hellboy 2: The Golden Army" shooting in its four complete soundstages (totaling a combined 69,000 square feet) and outdoors on its back lot since early June.

The studios are the brainchild of locally born property magnate Sandor Demjan, who owns the hillside and much of the land around it. Investors in the $127 million Korda Studios include Demjan, Hungarian-born Hollywood producer Andrew Vajna, financier Nathaniel Rothschild and Canadian businessman Peter Munk.

The studios are named after Hungarian-born filmmaker Alexander Korda, who built England's Denham Studios in the 1930s and is credited with reviving Britain's depressed pre-World War II film industry (he was knighted by Britain's King George VI in 1942 for his services to the film industry). When completed next year, the new studios at Eytek will boast the world's largest indoor water tank, with graduated depths of up to 20 feet and a clear height of 65 feet.

Dubbed the "superstage," today the 69,000-square-foot filming facility is just a shallow depression in the sun-baked clay and chalk construction site that surrounds the completed soundstages, props and facilities buildings where "Hellboy" -- starring Ron Perlman as the eponymous anti-hero -- will be filming until the autumn.

The developers brought forward the opening of the studios by three months to accommodate the Universal production, employing an army of 500 laborers on triple 24-hour shifts to finish in time.

"Hellboy's" backers are more than happy. "We had dates to hit and Korda was able to do that, which was fantastic, as otherwise we would be shooting in warehouses," executive producer Chris Symes says.

The decision to shoot at Korda was driven in part by Hungary's much-publicized new 20% tax break on production, Symes adds.

"We all know that studios are bottom-line businesses and costs are paramount," he says. "Hungary has a great advantage over other places because it is a very simple tax credit and that makes all the difference."

Laszlo Krisan, managing director and CEO of Korda Studios, says Demjan is already eyeing new opportunities -- in Russia.

"Mr. Demjan is in talks to participate in building new studios in Moscow. Although there are many studios in Russia, they are mainly for the domestic market. Mr. Demjan sees opportunities for studios aimed at the international market."
http://www.hollywoodreporter.com/hr/...0dadb378b33e3d





Brits Making it Big In Tinsel Town
James MacGregor

The number of Britons working in the American film industry has surged by 20% in the past five years. More than 30,000 actors, directors, writers and moneymen are living in Los Angeles alone, according to their unions. Flooded by applications, the LA office of the British Academy of Film and Television Arts has all but closed its doors to new members.

According to the Sunday Times, these Brits are not flying to LA for the sunshine, but to make movies and money - and are succeeding. Reel Britannia, The Sunday Times survey of British talent in the US film business, as judged by Hollywood insiders, shows a new generation has been making itself at home in Hollywood over the past three years, following the trail pioneered by the brothers Scott, Ridley and Tony, who according to their peers are the most powerful Britons in Hollywood today.

They achieved that position by creating a business empire on the back of blockbuster successes like Gladiator, Black Hawk Down and Man on Fire. Widening into television programmes and a studio business, took them through the leaner years between the big screen hits.

Some of their $500m (Ł250m) Hollywood box office success has been reinvested back home, allowing the Scotts to refurbish the Pinewood and Shepperton studios they own in Britain, winning back from Prague the filming of the next movie in the Bond franchise.

Australian actors and Mexican directors are generating headlines, but behind the camera are British directors and moneymen, designers and writers. The UK Film Council confirms that British directors made 19 of the 200 biggest films in the last six years, with more than half of the top 200 featuring British acting talent. The writers behind two of the three most successful Holly-wood-financed franchises in history - Star Wars, James Bond and Harry Potter - are Brits.

Batman producer Peter Guber puts it down to the internet. "The Brits were early adopters of the net, which has made their product and skills more available in niche markets than ever before," he said. "The buzz about the original version of The Office came through the net even before it was shown on the cable channel BBC America, prompting NBC to buy the format for its own version before it got stale - which is what killed earlier British sitcoms."

Other studios realised from The Office success that there was money in embarrassment. Enter Sacha Baron Cohen, whose Borat cost $18m to shoot and grossed $260m at the box office - and that was before DVD and television sales.

Eddie Izzard, now a leading man, followed, so did Simon Pegg and Steve Coogan who are being seen as "formatters" of comedies and comedy is becoming a leading British export.

HOW THEY WERE JUDGED

The UK Film Council produced a ‘long list' of 100 British actors, directors and other specialists principally employed in the American film industry, from which the Sunday Times jury considered 40 leading talents and split them into ‘above the line' (actors) and ‘below the line' (everyone else).

The jury voted on five criteria: past contribution, current status, talent, future prospects and liability (how easy they are to work with).

REEL BRITANNIA

Behind the camera

1 Ridley Scott, 69, and Scott Free Productions Tony Scott, 63

2 Peter Rice, 39 President, Fox Searchlight

3 Colin Callender, 55 President, HBO Films

4 Simon Fuller, 47 Chief executive, 19 Entertainment

5 Graham King, 45 Chief executive Initial Entertainment Group

6 Mark Burnett, 47 Chief executive, MBP production company

7 Sir Howard Stringer, 64 Chief executive, Sony Corporation

8 Nick Reed, 44 Literary/fi lm agent Bridget Jones, the Bourne Identity

9 Paul Greengrass, 51 Director United 93, The Bourne Supremacy

10 Guy Hendrix Dyas, 38 Designer Superman Returns, The Matrix

IN FRONT OF THE CAMERA

1. Kate Winslet, 31 five Oscar nominations since Titanic

2. Sacha Baron Cohen, 35 a cultural phenomenon

3. Christian Bale, 33 the modern Batman

4. Dame Helen Mirren, 62 Thespian royalty

5. Hugh Grant, 46 still the classic leading man

6. Jude Law, 34 overexposed, but respected

7. Rachel Weisz, 36 Looking for a second Oscar

8. Keira Knightley, 22 English beauty beloved by Pirates

9 Ralph Fiennes, 44 the constant actor and Oscar nominee

10. Daniel Craig, 39 Bonding with Hollywood

SUCCEEDING FROM HOME

1. J K Rowling, 42 author - Edinburgh

2. Tim Bevan, 50 and Eric Fellner, 47 Working Title - London

3. Richard Curtis, 50 writer-director - London

4. Catherine Zeta-Jones, 37 Oscar-winning actress - Bermuda

5. Dame Judi Dench, 72 Oscar-winning actress - Surrey

LEADING PLAYERS

Ridley and Tony Scott; producer Peter Rice of Fox Searchlight; Colin Callender, the most influential Briton in American television: Graham King who turned British TV series Traffic into an Oscar-winning movie; Paul Greengrass, who directed United 93, an account of the September 11 hijackings.
http://www.netribution.co.uk/2/content/view/1244/182/





Bloodthirsty New Book Incites a Bidding War
Robert Ito

The item up for bidding was, at first blush, unremarkable. It was an unfinished manuscript, 397 pages long, less than half of the planned book, as well as an outline detailing story arcs and plot points to come. The writer? Someone named Jordan Ainsley, whom no one had ever heard of — not readers, not book editors, certainly not anyone in Hollywood. Yet the biggest movie studios were being asked to pony up seven figures for the privilege of committing the book, sight half-unseen, to film.

And the studios promptly, and exuberantly, threw themselves into a bidding war.

For five days Sony Pictures, Warner Brothers, Universal Pictures and 20th Century Fox battled over the film rights to Mr. Ainsley’s novel “The Passage,” the first book of a planned trilogy about vampires born not of bat bites, but of medical experiments gone awry. The winning bid, made last month by Fox 2000 and Ridley Scott’s Scott Free Productions, was $1.75 million.

The auction is just the latest indicator of the lengths that studios will go to in search of their next franchise, at a time when it seems that all the biggest projects have already been done or spoken for.

“Fantasy has always been popular in Hollywood,” said Elizabeth Gabler, president of Fox 2000 Pictures. “And between the ‘Lord of the Rings’ films and the upcoming end of the Harry Potter series, everybody’s looking for what the next version of those movies will be.”

Recent fantasy book-to-film projects include “Stardust,” the years-in-the-offing Paramount release based on a Neil Gaiman mini-series for DC Comics, which opened yesterday, and “The Golden Compass,” a $150 million New Line film based on the first novel in Philip Pullman’s “His Dark Materials” trilogy, which opens in December.

While Fox’s bid was high for an unestablished, unpublished entity, it was hardly out of line, given other recent purchases. In May Warner Brothers — Harry Potter’s home studio — reportedly paid more than $1 million for the film rights to “Skulduggery Pleasant,” a children’s book about a skeleton who is a detective. Two years ago the Walt Disney Company and Jerry Bruckheimer Films spent $1.5 million for an unpublished fantasy novel by Ahmet Zappa.

All of this makes you downright nostalgic for 1998, when J. K. Rowling sold the film rights to both of the then-existing Potter books — the movies have since grossed more than $3.5 billion internationally — for a sum in the low seven figures.

Of course, banking on a fantasy franchise is not without its risks; the roster of bombs is enough to chill even the bravest of producer’s hearts. For every “Lord of the Rings” there’s a “Treasure Planet” — an animated Disney film that cost an estimated $140 million and sold less than $40 million of tickets domestically — with the potential losses magnified by often hyper-inflated budgets for special effects.

“The Adventures of Baron Munchausen,” Terry Gilliam’s 1988 comedy-adventure movie about a world-traveling aristocrat, brought in just $8 million domestically. And 2001’s “Final Fantasy: The Spirits Within,” based on the video game about an alien invasion, made back less than a quarter of its $137 million budget in the United States, and $85 million over all.

The frenzy for the “Passage” film rights was unleashed even before the first pitch went out to the studios. Two weeks before the studio deal, Ellen Levine, a literary agent at Trident Media Group, had taken the manuscript to the country’s biggest publishing houses, including Random House and the Penguin Group. Ms. Levine chose to send out the book under the pseudonym Jordan Ainsley because the author, Justin Cronin, winner of the PEN/Hemingway Award for his 2001 short-story collection, “Mary and O’Neil,” was known more for midsize family dramas than for Stephen King-size thrillers.

“We weren’t trying to hide who he was, but I didn’t want him to be typecast as one kind of author, and I thought this had vast commercial potential,” Ms. Levine said.

The story, a futuristic fable about death row inmates transformed into vampires by a government-spawned virus, hit a nerve with publishers. A number tried to block their competitors with pre-emptive offers, some in the millions. The offers were summarily rejected, and the manuscript was put on the block at a “best bids” auction between four houses on July 3.

The winner for the United States rights to the trilogy was Ballantine Books, which New York magazine reported had paid $3.75 million, a figure that Mark Tavani, the book’s editor, said was “not correct, but in the ballpark.”

When the author’s identity was revealed to Libby McGuire, Ballantine’s publisher, she said that the company would publish the book under Mr. Cronin’s name. The first novel in the trilogy is to be released in the summer of 2009, with the others to be published in 2011 and 2013.

By the time Ms. Levine began shopping the manuscript to the studios two weeks later, much of Hollywood had already seen it. Scouts working for the studios, as is their wont with all similarly talked-about books, had gotten copies of Mr. Cronin’s work into the hands of producers at most of the major studios.

The auction for film rights was a shock for Mr. Cronin. “I’ve written several novels, never once thinking they could or should be movies,” he wrote in an e-mail message. “Which doesn’t mean it isn’t nice, now that it’s happened.”

As the studios and their partners (Ron Howard and Brian Grazer’s Imagine Entertainment, with Universal; Scott Rudin and Sam Raimi with Sony; and the screenwriter Akiva Goldsman with Warner Brothers) found out about the competition for the material, prices climbed.

Unlike the three-book deal signed by Ballantine, the fee paid by Fox is only for the first book of the planned trilogy. “There were reports that there was a certain amount of money, and that was for three books, but that is not true,” said Ms. Levine, who is currently shopping the trilogy to foreign publishers. (She said she had already sealed deals in seven other countries.)

Yet paying nearly $2 million for an unfinished book that nobody will see for another couple of years is not all that odd, at least not in Hollywood. For the studios, big payouts for properties based on outlines and concepts rather than on finished books or fully formed screenplays is not uncommon; many of the superhero movies of late have been sold on little more than a few comic books and the broadest of plot ideas.

And if the movie bombs?

“I’m sure in some year-end meetings, someone has to account for them, and someone loses a job,” said Amy Schiffman, vice president of books and literary properties at the Gersh Agency. “But every year the studios keep clamoring for more, now more than ever. There are a lot of Harry Potter wannabes in development, trying to get to be movies. The conventional wisdom of the studios now is, you risk more, you make more.”
http://www.nytimes.com/2007/08/11/movies/11vamp.html





I Have No Appetite for Shows with a Short Shelf-Life
Anthony Lilley

I used to quite like the BBC iPlayer. I dimly remember playing around with it and thinking that it had a nice feel, let me find programmes reasonably easily and had the suggestion that an archive of some depth might eventually be lurking in the background. That was about it, though. And this was, of course, a long time ago; before the public value test, the market impact assessment and the launch of more online video-on-demand services, like Joost, than you can shake a stick at.

Now I'm all for the BBC making available as much of its catalogue as possible in a way which makes sense for both the licence fee payer and the producer. But, as the iPlayer semi-launches I'm worried about what it is getting itself into.

Mark Thompson, the BBC's director general, said "the iPlayer is at least as big a redefinition of what TV can be . . . as colour television was 40 years ago." I'm afraid I don't agree. The statement confuses the general with the particular. The availability of full, high quality, on-demand access to content - including masses of archive from the BBC, when I want it, not limited by TV schedules reaching out from beyond the grave to determine how long I can watch something for - would, I agree, be a ground-shaking event. But that's not what has just happened, not at all.

What has just taken place is the slow release - some have called it a "shuffle out" - of a particular bit of software which, mainly, lets you watch last week's TV. I already have something for this task, it's called a PVR. Said software runs only on Windows, on a particular version of Internet Explorer and with, wait for it, Microsoft Media Player. Now, I'm no iconoclastic Linux moonbat, but I think this is symptomatic of faulty logic and a short-sighted approach.

At root is the question of motivation. What drives the iPlayer, content or technology? Obviously it's both, as it should be, but the balance is all-important and iPlayer is off-beam and falls short of succeeding at either. The superstitious might see this as a symbol of a wider confusion in the media sector.

In order to get the iPlayer launched, the BBC has had to assure rights holders that their precious IP would be safe from piracy and that other revenue streams would be unaffected. This is what video-on-demand blokes always say, regardless of the fact that it's basically not true and never can be. The problem is that content providers behave as if they genuinely believe it and set up services which are defined by restrictions. This is why we must suffer a "seven day catch-up service". So, courtesy of DRM, we now have TV programmes with use-by dates, like yoghurt. And, let's be honest, no amount of animated BBC graphics saying things like "three days left" is going to turn this particular bug into a feature.

And does the BBC really need its own platform to achieve this impossibly protective dream? What will the total cost of ownership be? To keep the iPlayer anywhere near the level of functionality of similar commercial offerings as they rapidly develop is going to cost millions of pounds every year and at some point demand more public value tests. Is this a good use of scarce licence-fees in the long run? If the iPlayer is a start, what's the endgame?

Nonetheless, praise where it is due to the BBC for aiming to broaden access to its often wonderful content - the current furore about truth and accuracy notwithstanding - but questions remain about how it has chosen to go about it.

If the BBC was minded to drive innovation in the market for video-on-demand software, assuming time hasn't eroded the innovation, it would now be open-sourcing as much of the code behind the iPlayer as possible - as it effectively did with Nicam audio. If its primary aim was to get content out as widely as possible, it would be spending at least as much cash on its open and creative archive projects and on syndication as it has put into the iPlayer, where the rights bill will be pretty significant.

Still, at least there is time to sort this out - not many people are using these broadcast catch-up services on their PCs yet - and remember, if they really want high quality content, some people get it from peer-to-peer or YouTube; seven day catch-up of Flog It anyone?
http://media.guardian.co.uk/site/sto...142180,00.html





Blockbuster to Buy Movielink Web Service
Gary Gentile

Video rental chain Blockbuster Inc. said Wednesday it is buying the digital movie download service Movielink, giving it the online foothold it has long sought to compete with rival Netflix Inc.

Terms of the deal were not disclosed.

Blockbuster, based in Dallas, said it will continue to operate Movielink as a stand-alone service and eventually make elements of the service available through Blockbuster.com.

Movielink was launched by five studios in 2002, marking the first time that a large supply of recent, popular films was available for rental on the Internet.

A call to Santa Monica-based Movielink was not immediately returned.

The privately held service has struggled to gain popularity, even as it allowed the purchase of films and signed licensing agreements with all major studios and a large number of independent film companies.

"Our acquisition of Movielink, with its associated digital content, is the next logical step in our planned transformation of Blockbuster," chairman and chief executive Jim Keyes said in a statement.

"Now, in addition to the entertainment content we provide through our stores and by mail, we have taken an important step toward being able to make movie downloading conveniently available to computers, portable devices and ultimately to the television at home," he said.

Blockbuster's Total Access service, which allows customers to receive DVD rentals through the mail, has about 3.6 million subscribers. Netflix has 6.7 million subscribers and also lets them download about 3,000 movie and TV titles directly to a personal computer.

Movielink was launched by the studios to stave off enormous losses coming from people downloading illegal copies of movies over the Internet. The company is owned equally by Sony Pictures Entertainment, Universal Studios, Paramount Pictures, Metro-Goldwyn-Mayer and Warner Bros.
http://www.wtopnews.com/index.php?nid=111&sid=1213493





Hackers Discover How to Download Streaming Movies from Netflix
Brad Linder

Earlier this year Netflix announced a new service that would allow you to watch a limited number of videos online instead of waiting for the DVDs to come in the mail. The service is free with your regular subscription. If you pay $17/month for access to 3 DVDs at a time, you can watch 17 hours of video per month. If you pay $5 per month for access to 2 DVDs per month, you can watch 5 hours of video online.

There's just one problem. You have to watch on Netflix's terms. The video player is browser based, and the movies are encoded using Windows Media DRM. If you want to begin a movie now and finish it later, you're out of luck. Or if you want to copy it to a portable device for viewing during your morning commute (on the train, not while driving, of course!), no soup for you.

Well, the smart folks over at the Rorta forums seem to have cracked the code, using Internet Explorer, Windows Media Player 11, FairUse4WM, and Notepad. The solution involves finding the URL of the video file, downloading it, acquiring the license key and then stripping the DRM. It's a bit involved, and will probably take longer than just sitting down and watching the movie. But hey, it's the principle of the thing, right?

Keep in mind, this hack will not let you download more than 17 hours of video per month, so it's not exactly going to be a great trick for starting your online video piracy empire.

Update: As several people have pointed out in the comments, you can indeed stop a Netflix "watch now" movie and start it again later, or fast forward to any point in a film to begin watching. Thanks!
http://www.tvsquad.com/2007/08/06/ha...-from-netflix/





Video Company TO Stream Movies, TV Shows for Free, But Legal, Technical Issues Pose Major Challenges
Troy Wolverton

BitTorrent is rolling out a service that could usher in a whole new era of television.

Beginning next month, the San Francisco video and media distribution company will offer some of its library of television and feature films - which include titles such as "Letters from Iwo Jima" and "24" - for free as streaming videos, supported by advertising.

While it's too early to know how consumers will respond to the new service, it and similar offerings on the way from BitTorrent rivals point to a potential revolution in how consumers access television and movies.

That's because the services are a lot closer to traditional television than previous Internet video offerings, making it more likely they'll be adopted by viewers.

Instead of having to pay for shows and wait 30 minutes or even hours to download them - like they might have to do with videos from iTunes, say - users will be able to watch them right away at no cost.

Internet-delivered video services such as BitTorrent's have largely been viewed as complementary to existing cable and satellite television services, supplementing them and reaching consumers who don't subscribe to these services.

But some analysts say offerings such as BitTorrent's could eventually replace cable or satellite television.

"It's inevitable that the traditional broadcasting infrastructure will be replaced by (Internet) infrastructure that's on-demand," said Aram Sinnreich, managing partner of Radar Research, a consulting firm that works with media and technology companies.

For all its revolutionary potential, BitTorrent's service will begin rather modestly. The company plans to quietly roll out the service starting with its top 10 titles.

The company doesn't plan to officially launch it until sometime in the third quarter, but eventually it plans to offer all of the 10,000 videos in its library as streams.

Meanwhile, BitTorrent will be experimenting with how to incorporate advertising into the videos, which will be embedded in Flash windows inside Web pages. In addition to ads offering consumers the option to buy a download of the video, the company plans to test watermark logos, as well as showing commercials before, after and during the videos.

BitTorrent's streaming service is only the latest development in the fast-moving world of digital video. Start-up Joost is already testing a similar streaming service with video from CBS, Sony pictures television and other providers.

Netflix got into the game earlier this year with a service that allows subscribers to watch streams of movies on their PCs rather than having a DVD sent to their house. Santa Clara-based Vudu is testing a service that would bypass PCs and stream rented or purchased movies from the Internet directly to a proprietary set-top box.

And that's not to mention the Web sites of major networks such as ABC and NBC, which stream recent episodes of many of their current television shows through their Web sites.

Those streaming services follow the older video download services offered by BitTorrent, Apple's iTunes, Akimbo and others. The big difference: A streaming video plays almost immediately; downloaded video does not start playing until a sizable portion of the file is stored on a viewer's machine.

The promise of such Internet-based video services is to offer something the cable and satellite networks don't: a universe of content available instantly at the touch of a button.

But don't cancel your cable service just yet. The promise is far from being realized.

One of the biggest challenges is to get the video off the PC-based Internet and onto consumers' big-screen TVs. Apple TV and similar products are attempting to bridge that gap. But home networking technology to tie such devices to PCs is still difficult to set up and often doesn't have enough bandwidth to ensure high-quality, high-resolution video.

Another challenge has to do with the licensing of content. Although digital distribution has the potential of offering viewers every video ever produced whenever they want it, today the reality is far from that. BitTorrent, for instance, lacks content from Sony and Walt Disney.

And such companies are going to have to contend with the sometimes arcane rules governing video distribution that determine when and where particular movies and television shows can be shown.

"A lot" of whether Internet-delivered video reaches its promise "is going to come down to licensing and pricing," said Mike McGuire, a media industry analyst for research firm Gartner.

Comcast doesn't see much of a threat from Internet-delivered video, said Andrew Johnson, a spokesman. Cable companies already provide most broadband connections to consumers' homes, he noted, so cable companies are poised to continue to be important players even if consumers get rid of their cable boxes.

And that seems unlikely, because people are going to continue to turn to traditional television for things like the Super Bowl, he said.

"Most folks are going turn on their flat-screen TV and look for (that programming) there," Johnson said. "That's definitely where the consumer seems to be right now."
http://www.mercurynews.com/business/ci_6514263





Google Is Closing Its Video Retailing Operation

After buying the video-sharing site YouTube nine months ago for $1.65 billion, Google plans to stop selling television shows on its homegrown video site.

The company will stop offering download-to-own and download-to-rent programs on Wednesday, according to an e-mail message sent to customers yesterday. Google started selling shows like ”Survivor” in January 2006.

Google’s decision to close the retail part of its video site indicates the company had less success selling content than attracting advertising spending, which accounts for 99 percent of revenue. The purchase of YouTube, where the videos are all free, catapulted Google from seventh to first among video-sharing providers on the Web.
http://www.nytimes.com/2007/08/11/te.../11google.html





The Internet's Next Big Thing: File Sharing
Don Reisinger

No, believe it or not, you're not reading that headline in a time traveling device, I actually said that the Internet's next big thing will be file sharing. And why will file sharing be so popular in the next few years even though organizations are doing everything possible to stop the spread of such "egregious" activities? Because organizations are doing everything possible to stop the spread of such "egregious" activities.

Sometimes I wonder if government officials and the RIAA cronies ever had mothers that taught them how to handle with things they didn't like. For example, when you were in school and kids ridiculed you for your looks or your taste in music, did calling the teacher over or telling mommy and daddy do you any good? Now what if you ignored those people? Did that work? I'll bet it did.

In an effort to eradicate those evil, awful, disgusting file sharing criminals, governments and organizations from around the world are united in the ideal that all-out brute-force tactics will take the day. And while it may have stopped Napster and LimeWire (to a small degree), has it stopped AllofMP3 who just moved to another domain? Did it stop the defendants in a recent German trial who were accused of "criminal damage" until the judge called the offense "petty"? Hate to break it to you so harshly, but trying to scare people into stopping file sharing isn't going to work. And the more you do it, the worse it'll get.

As I've mentioned before, I don't understand the urgency to eradicate file sharing. Independent artists allow for free downloads of their music and find a dedicated audience in the process. And before the self-righteous RIAA breaks into a song and dance claiming file sharing only hurts the artists, I'd like to ask them how much money artists get from a $.99 download of their music. Most studies estimate a nickel at best. Is that somehow more fair?

The future of file sharing is bright and has no bounds. It's as simple as that.

As the RIAA gains more funding and backing from its goons in Washington, it'll be given the proverbial ticket to go after little Johnny the ten-year old and Aunt Ethel the 80-year old because well, who will stop it? But what the RIAA and government officials don't realize is this plan will backfire.

People naturally gather around the underdog -- the group that stands up to the big bad guy and does so without reservation. AllofMP3 was just a start -- there will be a bunch more where that came from.

If the RIAA and governments from around the world took a step back and realized that the practices it currently employs are only leading to an ever-increasing instance of file sharing, it would quickly change tactics. There's a war on drugs and poverty. If you go downtown in almost any city in the world and hang out on a corner, I guarantee you will see both in a matter of minutes. Does that mean we should turn a blind eye? Of course not. But what it does mean is a so-called "war" on an issue in society doesn't work as well as planned and it certainly won't work against something that people feel is fine.

Ask anyone you know if they would rather pay $.99 for a song or have the same exact song for free and I think you know what the answer will be. Does that make them bad people? Not at all. Does that make them dislike the artist any less? Of course not. Will it make them go to a concert the next time that band is in town? You better believe it. The RIAA and governments are fighting the wrong enemy. It's not John and Jane Doe downloading the occasional song here and there who should be targeted, it's the music industry.

If you want to look at a business that is actually robbing artists of a living, look no further than the big record labels. As I mentioned earlier, artists barely make anything off of an iTunes download, while the record label laughs all the way to the bank. And yet, some people actually believe the propaganda when the RIAA comes out and claims we are taking money away from the artists who threw their blood, sweat and tears into a song. The record industry is upset because IT doesn't walk away with the money. Trust me, there's no other reason.

The future of file sharing is bright. And whether the record industry and government officials want to believe it or not, the tactics currently being employed will only make it worse. Believe what you will, but the RIAA is in for a rude awakening.
http://blogs.cnet.com/8301-13506_1-9...TheDigitalHome





Education 2.0: The College Student's Guide to File Sharing
Sean Hollister

College: You finally made it. But now that you're here, how should you spend your first few weeks at school?

Filling up the hard drive of your brand-new Toshiba R500 with loads of music and video files, that's how -- harnessing the full file-sharing power of a high-speed university-class network?

But how? Is it safe? Legal? Faster than asking your parents to burn a few DVDs and put them into their monthly care package?

Excellent questions -- the mark of a true student. Welcome to File Sharing 101.

How to Get What You Want

Assuming you've got your machine connected to the internet and cleaned of viruses and spyware, it's time to choose a network. Heard of Napster or BitTorrent? Both are peer-to-peer networks through which your computer, equipped with the proper software, can find files to download. The actual file transfers happen between your computer and other computers using protocols that distribute the file-sharing load among all the computers, or "peers," on the network.

There are several networks, and for each one, a wide variety of clients (the software that runs on your computer) that will let you connect and share files. Network choice is important because it determines how much privacy you have and how much you have to share in return for obtaining access. We recommend two: BitTorrent and Direct Connect, plus a third option -- one-click hosting services -- for the truly paranoid.

BitTorrent

As a true P2P network without a central server to be sued, raided by police or otherwise confiscated, there's little chance of BitTorrent ever being shut down. The protocol's great popularity means there's no shortage of juicy intellectual property to fill every last perpendicularly stored bit your hard drive has to offer.

Be prepared to Google for your content: Before you can start downloading, you'll need to find trackers (which list files that are available through BitTorrent), and most trackers are hosted on websites that are just as likely to be shut down as their centralized P2P counterparts. (One possible exception: The Pirate Bay, which is based in copy-friendly Sweden, has so far resisted legal efforts aimed at its destruction and has recently announced that it will revive Suprnova, an now-defunct search engine for torrent trackers.)

WIRED The more popular a file, the faster the download. Lots of legal content is available as well.

TIRED No anonymity -- anyone downloading the same file can see your IP address. No incentive to share content means niche files may never finish downloading. Ads (some for explicit content) plague many tracker sites. Many colleges block BitTorrent traffic.

Recommended clients: uTorrent (Windows) or Transmission (Mac)

How to get your content: Search the BitTorrent Download Guide, The Pirate Bay, TorrentBox, Torrentspy and TorrentReactor, or use Google searches with your search term plus the phrase filetype:torrent to locate files you can download.

Direct Connect

Relying on central hubs for indexing purposes, Direct Connect is somewhat risky business for college students who seek large quantities of internet content. Every new public hub you visit is one more that might reveal your queries and the files you're sharing. However, over a high-speed local area network (like the one running through the walls of your dorm) Direct Connect's weakness becomes its greatest strength. Set up a private hub with university-limited IP ranges and password protection, and you have yourself a bona fide darknet capable of transfer speeds that put BitTorrent to shame.

WIRED Serious darknet potential allows for speedy sharing and privacy -- outsiders need to be on the same LAN and have the password to snoop effectively. Simple search feature finds what you want fast, assuming it's there. You can browse through each user's shares individually. Get to know your dorm mates better using integrated chat.

TIRED Cut off from the outside, darknet content quickly gets stale. There's also the inherent dilemma of whom to invite: More users mean more shared files, but also a greater chance that the password will leak to the wrong individual. Direct Connect is slow and unsafe over the public internet.

Recommended clients: DC++ (Windows), Valknut (multiple platforms)

How to get your content: Set up your own hub and invite your friends to join, or bribe the existing nerd ringleaders with your HD DVD collection.

One-Click Hosting

When privacy is at a premium and download speed doesn't matter, it's hard to beat one-click hosting services like Megaupload, RapidShare and Sendspace. Upload your file to the server, send a friend the URL and you're done. Pick a hosting solution outside the United States, and you may even be able to evade the Digital Millennium Copyright Act.

WIRED Simple sharing has maximum privacy.

TIRED Registration is often required. Maximum file-size limits are common. It's often faster to carry a flash drive to your on-campus friends.

How to get your content: Reach out and IM someone you know.

Legal Risks

Legal interpretations may vary about what constitutes legitimate sharing of copyrighted content, and we're not lawyers. Sharing a few music clips with your friends may not violate copyright law, but distributing the latest Hollywood blockbuster to 30,000 other fans almost certainly does. So give some thought to your file sharing before you start. While one-click hosting is fairly private at the moment and darknets keep content away from prying eyes, it's all for naught if your university actively monitors traffic and is determined to shut down peer-to-peer activity.

We recommend you check your college's "acceptable use policy" and similar documents to determine their position on file sharing before engaging in potentially illegal activity, or at least make sure you save three grand, the going rate, in case you get caught.

For the legal perspective, go right to the source: the United States Copyright Office FAQ.

You may also want to read online piracy statements from the Recording Industry Association of America and the Motion Picture Association of America, as well as the Electronic Frontier Foundation's handy guide, How To Not Get Sued for File Sharing.
http://www.wired.com/print/software/...08/filesharing





GigaTribe Encrypted Private File Sharing Network Adds "Peer-to-Web" Feature
Eliot Van Buskirk

Sure, you could use YouSendIt to share large files with your friends, and BitTorrent to download stuff from strangers, but if you'd rather set up a private, encrypted file sharing ring with your friends and family (for the purposes of sharing home movies, image zips, and personally-composed-and-recorded music, of course), you might give Shalsoft GigaTribe a try.

This Windows-only application allows you to share the contents of individual folders on your PC with friends in your personal network using Blowfish encryption. John Carricaburu of Shalsoft claims that "since you're only sharing with people you know, there's hardly any risk of getting infected or fake files" (assuming, of course, that your friends aren't downloading and sharing them).

Gigatribe, which appears to be free of spyware, adware and viruses, is free to use, although a premium version ($4/month or $25 for a "lifetime subscription") allows you to download more than one file at a time, downloads from multiple sources when possible, and permits you to assign friends varied levels of access to your folders. The new "Peer-to-Web" feature allows you to access folders on your computer from any other PC.
http://blog.wired.com/music/2007/08/...ibe-encry.html





SpiralFrog Aims for End of Year Launch
Alex Veiga

SpiralFrog.com, an ad-supported Web site that allows visitors to download music and videos free of charge, has begun testing its service with plans to launch by the end of the year.

The New York-based company recently began allowing an unspecified number of users in North America to try out the site, which has about 700,000 tracks available for downloading, said SpiralFrog founder and Chairman Joe Mohen. QUIZ

The company plans to expand its "beta" test in the coming weeks and will launch the service in the United States and Canada after receiving feedback from users, advertisers and recording labels.

"We're really testing the user experience to make sure it satisfies the needs of demanding young consumers," Mohen said.

SpiralFrog lets users download audio tracks and music videos for free, but requires that they register and log on at least once a month to continue to play the content. Though free, the audio and video files carry copy protections like those found on tracks available for sale at Apple's iTunes Store and elsewhere.

It takes 90 seconds to download a track _ more for a video. During that time users are enticed to browse the site and, its advertisers hope, become exposed to more ads.

"The consumer is paying for the music with some time," Mohen said.

Downloads cannot be burned to a CD, but can be transferred to dozens of digital music players. The content, however, is not compatible with Apple's Macintosh computers or its market-leading iPod.

SpiralFrog aroused interest last fall after it announced licensing deals with Vivendi SA's Universal Music Group, the world's largest recording company, and performing right organization Broadcast Music Inc. But the company missed its early 2007 launch and instead underwent an executive shuffle that ended with the ouster of then-CEO Robin Kent.

Mohen blamed the launch delay on the time-consuming process of obtaining rights from music publishers, who will be getting 10 percent of ad revenues, and the need to expand its data storage and bandwidth capabilities.

"With SpiralFrog we have an entirely new business model," Mohen said. "In most cases we have to clear the publishing rights ourselves, and that takes a long time."

Mohen said SpiralFrog continues to hold licensing talks with other labels and hopes to have a catalog of around 1.5 million tracks at launch.
http://www.washingtonpost.com/wp-dyn...080801884.html





Peer to Peer Media Trading
Ken Drachnik

In this day of internet sharing, there remains quite a bit of "offline" content in the form of books and DVDs that we can't really share. However, two promising internet sites have developed online marketplaces that allow individuals to share / trade these old media bits using the internet. We have use 2 in my household and they seem to work quite well.

DVD Trading

The first one is peeflix.com which has developed a trading site for people to swap DVDs. They have created a marketplace that assigns a value to DVDs and then tracks who has them to trade and who wants them. Because they assign a value to each DVD you can also create a money account and buy the ones you want if you don't have any to trade. The nice thing about this is anyone can join and get a DVD at a good price. For example, my favorite movie "The 5th Element" is available used for $6! What a great deal. One of the many clever things they did is figure how to develop an envelope that you print from your computer that contains the receiver's address AND electronic postage. You just print out the two pages, fold them around your DVD ( you don't send the artwork), tape it and put it in the mail. It works like a charm. Oh, and I did I mention they are powered by GlassFish?

Book Trading

First there was Half.com which enabled the used book market to flourish - but that site quickly got overwhelmed by used book sellers ( who sell some nearly new books at quite steep discounts). We love Half.com but recently we found BookMooch.com. BookMooch is a similar peer to peer trading site that matches those who have books with those that want them. The big difference is that BookMooch does not establish a market or price for books - they are simply a matching service that assigns you points for each book you trade. There is no neat "print your own mailer feature" and you have to pay for postage and you get the same number of points for a 1st edition book as you would for the latest Spiderman comic book. Bookmooch doesn't charge anything for the trades so they must be supported by advertising. I"ll have to look more closely at their biz model. Hey, its a neat idea and when we posted 10 books, 9 were in immediate demand so now we can go get more books (at least the total mass of books in our book obsessed household might stay somewhat constant now!).
http://blogs.sun.com/draks/entry/pee..._media_trading





DOT Looks to Avoid Further P2P Leaks
Jaikumar Vijayan

The U.S. Department of Transportation is taking several steps to prevent further exposure of internal information, after more than 90 agency documents were exposed on a peer-to-peer network.

The documents were inadvertently exposed on a file-sharing network after the teenage daughter of a telecommuting DOT worker installed a P2P client on an agency PC containing the information.

Daniel Mintz, the department’s CIO, said the incident prompted the agency to quickly initiate several programs to mitigate the chances of a repeat occurrence involving more-sensitive data.

“P2P software poses a significant risk to departmental systems and networks as well as home computers,” Mintz said. “In many ways, this incident and the nature of the people involved illustrate the challenges” of dealing with P2P.

Steps taken by the department include the following:

• An increased emphasis on moving DOT employees from desktop configurations to secure laptops that feature encryption technologies compatible with Federal Information Processing Standard 140-2.

• Prioritizing the order in which telecommuting employees replace desktop systems with secure laptops.

• Conducting more awareness training programs outlining to new employees and telecommuting workers the risks of downloading and using P2P software.

• The creation of home desktop configuration guides to help telecommuters protect home PCs against inadvertent file-sharing.

• Installation of new centrally managed network security software that can better monitor the use of permitted software and detect the use of prohibited products such as P2P software.

• A review of security policies by the DOT CIO’s office and inspector general to identify other problems that need to be addressed to avoid P2P problems.
http://computerworld.com/action/arti...&intsrc=kc_top





Can Anyone Police File Sharing?
Andy Guess

Campus file sharing briefly hit prominence in Congress last week as colleges lobbied against a proposed amendment in the Senate to the Higher Education Act reauthorization that would have required universities to use “technology-based” systems to try to block illegal downloading activity. While the amendment was withdrawn, it may be revived in the House — and certainly the entertainment industry has no intention of letting the issue go away.

But as lobbyists for colleges and the recording industry worked furiously last week, the debate was over how to best police students, not whether they could be policed. Many regular downloaders today learned their habits long before college and will continue to share copyrighted works after they graduate. Interviews with students at a cross-section of colleges suggest that they view deterrents to file sharing as temporary nuisances, which in time they will figure out a way to get around. So who’s to say that lawmakers on the Hill or record labels in Los Angeles or administrators have any sway over whether students’ cravings for fresh music, readily available movies and the latest TV episodes can ever be stemmed?

“The response has not been to dampen students’ enthusiasm for downloading music,” said Fred von Lohmann, a senior staff attorney with the Electronic Frontier Foundation, an advocacy group that is critical of lawsuits targeting online music downloaders.

A 2006 survey by Illinois State University’s Digital Citizen Project found that peer-to-peer networks were used by up to 39 percent of rising college freshmen at Illinois State, and that they started downloading as early as the sixth grade. In college, just over a third of students say they download music illegally from peer-to-peer networks, and two-thirds of the downloaders don’t concern themselves over whether the music is copyrighted.

A common belief among downloaders is that sharing files can actually help artists by promoting their work and that there is nothing wrong with it. And this belief is held by today’s students, who have heard the lectures and seen (and ignored) the movie previews on the value of copyright. Alejandro Aguiluz, a student at Evangel University whose stated interests on Facebook include “File Sharing,” compared the practice with checking out books from a library.

The primary weapon wielded by university IT administrators is software that blocks certain types of file downloads on the campus network. One prominent example, CopySense by Audible Magic, has had some demonstrated success. The company’s CEO, Vance Ikezoye, testified to a House of Representatives panel last month that at one campus, peer-to-peer file sharing traffic dropped from 20 gigabytes per day to nearly zero in less than a week after installing the software — leading to a 71-percent drop in the number of users operating peer-to-peer network clients.

But some critics say that this approach — purchasing software that can stem the flow of copyrighted material over campus networks today while ignoring the potential effects on students’ downloading tactics tomorrow — will lead only to a tug-of-war between computer users and IT administrators, a virtual “arms race” that could cost universities millions of dollars while leading only to more sophisticated downloaders.

“I do think that efforts to stop music sharing on campus are futile and are almost certain to remain so,” von Lohmann said. “Some people have pointed to technologies that may be able to intercept file sharing using today’s technology, but as anyone knows who’s been following this, that will almost immediately result in changes and improvements by file-sharing vendors to make their applications ... less vulnerable to that kind of monitoring.”

As an example, von Lohmann said that a hypothetical university employing blocking software might see immediate drops in illegal activity, but it would only be a matter of time before peer-to-peer software clients began encrypting their transmissions in the same way a bank website might protect its users’ identities from theft online. If IT administrators tried to take the next step — banning encrypted network traffic — plenty of legitimate activities could also be curbed, he said.

“You can’t just legislate in a vacuum and assume that we’ll solve the problem today and not worry about what’s going to happen next week,” he said.

Von Lohmann advocates a system in which universities pay blanket licensing fees directly to record labels to cover their students’ existing download habits. Citing the relative failure of trial runs at college campuses by services such as Napster and Ruckus, von Lohmann said the concept could work because students wouldn’t have to worry about compatibility issues with their iPods or their files becoming unusable after graduation. Already, some surveys indicate that more students pay to download music legally than through unauthorized peer-to-peer networks, one likely side effect of the popularity of services such as Apple’s iTunes.

“Part of file sharing’s appeal was the kind of a-la-carte method of consuming music, and that’s what these online music services [like iTunes] now offered. That’s what they caught on about file sharing,” said Matthew Marco, a Web designer for the House of Representatives who graduated from the University of California at Irvine in 2004.

But lacking a concrete solution that could please both record labels and universities, students would continue to invent new ways to circumvent technological barriers as well as the law, von Lohmann suggested. Already, anyone wanting to find free music, movies, TV episodes or video games online doesn’t have to look far. The BitTorrent client offers quick downloads and access to troves of files at various online repositories; popular clients such as LimeWire and DC++ facilitate peer-to-peer connections between students sharing files and those looking to expand their collections. Piracy isn’t limited to the Internet at large, either: private “darknets” hosted by students on the local campus network — not accessible to outside users — have surged in popularity as well.

To cite one example of an evolving file-sharing protocol, DC++ — an open-source client for the peer-to-peer Direct Connect network — could be moving toward more encryption, according to one of the program’s developers. “The new protocol will have the capability to be wrapped in SSL/TLS (I’m unsure of which), but as of yet, we haven’t implemented that in the client. Mostly the encryption is to allow secure exchange of passwords and chat, but its effect upon traffic categorization is a nice benefit,” said Todd Pederzani, referring to a method of singling out and blocking peer-to-peer file traffic in computer networks, in an e-mail message. The implication is that one popular file-sharing client is moving toward potentially adopting measures — as von Lohmann predicted — that could be used to evade universities’ tactics for sniffing out unauthorized download traffic.

But von Lohmann doesn’t think the only possibility for students who share music will be an increasing technological sophistication. Students can easily swap files via shared hard drives or burned DVDs, and those methods are much harder to track. (Plus, it should be noted, YouTube has opened a new front in the pirating war, as millions of Internet users have found that their favorite songs and videos are often readily available for instant streaming in just a few clicks.)

Michael Carey, a student at Ohio University who used to operate a DC++ hub on campus, said a combination of the institution’s press coverage — as the recipient of the most notices from the Recording Industry Association of America — and the resulting well-publicized crackdown on peer-to-peer file sharing has successfully stemmed downloading activity to some extent. But, he added, “I think eventually it will pick back up when there’s a new way that’s harder to track.”

Still, the response at one campus likely hasn’t affected students’ overall willingness to download and share copyrighted music and other files. “I would say probably 50 percent of people I know use it on at least a semi-regular basis and probably 10-15 percent are very heavy into it,” said Brenton Wildes, who will be a sophomore at the University of Florida. Wildes said he used to download a large volume of files but that he now sticks only to legal services.

A File-Sharing Culture?

Why haven’t students and others who share files online responded to the legal and technical roadblocks designed to restrict their downloading to legal venues? Marco said he believes there is a social component to consider beyond the mere habit.

“You had people actually pushing music they liked,” he said; people could connect online, discover new music through each other’s online libraries and form communities that were highly specialized — similar to “early adopters” of new technologies.

His implication was that the music industry, in particular, would have to adapt to a “paradigmatic change” in how it assesses the value of artists, one that began with the rise of broadband Internet access and the success of Napster’s first incarnation. “It’s going to be the performance, the marketing, the licensing of the artist’s personality,” Marco said. As for various attempts to stem the flow of digital copyright infringement, he said, “I think it’s a waste of money because I think the paradigm has already shifted ... they show a kind of denial.”

Wildes agrees that the status quo is hardly desirable.

“The system we have now is not the ideal system,” he said. “First and foremost, it’s not legal, obviously, so they can come down on people for using it, and I think that a better way would be if the people behind these file-sharing programs and the people at the RIAA … got together and worked something out.”
http://www.insidehighered.com/news/2...03/filesharing





Schoolboards: Net Dangers Over-Rated; Bring Social Networks to School
David Cassel

The internet isn't as dangerous as people think, and teachers should let students use social networks at school.

That's the surprising new recommendation from the National School Boards Association — a not-for-profit organization representing 95,000 school board members — in a new study funded by Microsoft, News Corporation, and Verizon.

It warns that many fears about the internet are just overblown. "School district leaders seem to believe that negative experiences with social networking are more common than students and parents report," the study reports. For example, more than half the districts think sharing personal information has been "a significant problem" in their schools — "yet only 3% of students say they've ever given out their email addresses, instant messaging screen names or other personal information to strangers."

In fact, the Association and resesearchers at Grunwald Associates LLC surveyed 1,277 students online (between the ages of 9 and 17) — along with 1,039 parents, and 250 school district leaders "who make decisions on internet policy." And the students reported big differences from the adults' concerns. Only 20% said they'd seen "inappropriate" pictures on social networking sites in the last 3 months. (And only 11% of parents concur, even for the last 6 months.) Only 18% of the students said they'd seen "inappropriate" language, and just 7% reported they'd been "cyberbullied," or asked about their personal identity on a social networking site.

Furthermore, the numbers got even smaller when the students were asked about more worrisome situations. Only 4% of the students said they'd ever had an online conversation that made them uncomfortable, and only 2% said an online stranger tried to meet them in person. In fact, after surveying 1,277 students, the researchers found exactly one who reported they'd actually met a person from the internet without their parents' permission — and described this as "0.08 percent of all students."

"Only a minority of students has had any kind of negative experience with social networking in the last three months," the study concludes. "Even fewer parents report that their children have had a negative experience over a longer 6-month period."

The researchers concluded that the vast majority of students "seem to be living by the online safety behaviors they learn at home and at school." Many students even reported that they were using the social networks to discuss their schoolwork or other education-related topics.

Yet fear of safety for children continues to haunt policy — both at school boards and the national level. (In May, a Senate resolution was co-sponsored by Barack Obama and Joe Lieberman highlighting how dangerous they thought the internet could be.) The National School Boards Association found strict controls had taken hold at most schools over student internet access.

84% of school districts have rules against online chatting in school
81% have rules against instant messaging in school
62% prohibit blogging or participating in online discussion boards at school.
60% prohibit sending and receiving email in school
52% prohibit any social networking sites in school

"Students and parents report fewer recent or current problems, such as cyberstalking, cyberbullying and unwelcome personal encounters than school fears and policies seem to imply," the study notes.

In light of these findings, they're recommending that school districts may want to "explore ways in which they could use social networking for educational purposes" — and reconsider some of their fears. It won't be the first time educators have feared a new technology, the study warns. "Many schools initially banned or restricted Internet use, only to ease up when the educational value of the Internet became clear. The same is likely to be the case with social networking.

"Safety policies remain important, as does teaching students about online safety and responsible online expression — but student may learn these lesson better while they're actually using social networking tools."

Social networking may be advantageous to students — and there could already be a double standard at work? 37% of districts say at least 90% of their staff are participating in online communites of their own — related to education — and 59% of districts said that at least half were participating. "These findings indicate that educators find value in social networking," the study notes, "and suggest that many already are comfortable and knowledgeable enough to use social networking for educational purposes with their students."

In fact, 76% of parents expect social networking will improve their children's reading and writing skills, or help them express themselves more clearly, according to the study, and parents and communities "expect schools to take advantage of potentially powerful educational tools, including new technology."

"Clearly both district leaders and parents are open to believing that social networking could be such a tool — as long as there are reasonable parameters of use in place. Moreover, social networking is increasingly used as a communications and collaboration tool of choice in business and higher education. As such, it would be wise for schools, whose responsibility it is to prepare students to transition to adult life with the skills they need to succeed in both arenas, to reckon with it."Ultimately what's holding them back is a fear of the unknown, the report suggests. It urges school board members to explore social networks, for one simple reason.

"Many adults, including school board members, are like fish out of water when it comes to this new online lifestyle."
http://tech.blorge.com/Structure:%20...rks-to-school/





Why Are People Accused Of Copyright Infringement?
Brian Scott

When you hear about people caught of copyright infringement, many different things can happen to them. First, copyright infringement is both a civil and criminal crime, so people caught of copyright infringement are likely to get both sued and tried in criminal court. Because of the nature of copyright laws, if and when people are caught of copyright infringement, it’s likely they will get repercussions from far and wide.

People are always looking for others violating copyright laws. Copyright owners and/or agents surf the Internet, so they may find the violations themselves. Usually, if someone finds a person violating their copyright rights, they’ll notify the person or entities involved and ask they permanently remove the content, if it’s available on the Internet. They do this by either asking the person directly to take it down, or demanding the website server to take it down (which they will, immediately, and probably suspend the account). If the person or entity hosting the violation doesn’t take it down, more serious actions will be taken, such as a lawsuit or criminal charge.

People caught for copyright infringement do not automatically go to jail, although some entities like major television, music, movie publishers and distribution channels may lead you to believe otherwise. For example, many people are caught for copyright infringement at YouTube.com, but they only need to take down the material. In many cases, YouTube.com will take the material down before the poster (the person who put the copyrighted information on the site to begin with) has a chance to see the warning.
Other times, a work will be present on a peer to peer file sharing service, such as Kazaa or Napster, and the host of said service will blame the end user (you!). So, even if you found a file on a file sharing service, such as Kazaa, doesn’t mean the copyright is open for you to take it. Many people caught of copyright infringement have been found through these peer to peer networks, and it has been found that the user who downloads the material gets charged and not the file sharing service. Be careful, if you are ever to use a peer to peer service such as Kazaa (or bit torrent, which is the code/program for another type of peer to peer file distribution tool) that you’re only downloading, and sharing, items that aren’t copyrighted works -- or you could be punished severely.

Sometimes, people are caught of file sharing from their IP addresses -- because they download something from a secure site, their servers can track your IP address (your unique location on the Internet, four sets of numbers, separated by periods, with at most three numbers in each set -- i.e. 216.239.51.100 which is the IP address of Google.com). So even if you think you’ve bypassed the copyright law, you can still be found years later by tracing that IP address.

There are many ways to find people caught of copyright infringement. You can search through Google.com or look through newspaper databases. One thing, however, remains the same in all these cases -- people are downloading, sharing, or in some other way using copyrighted materials. The problem is, especially in the Internet age, is that even if you’re using something anonymously, you can still be tracked -- and prosecuted -- for the infringement. Be careful, in all you download or use, have the rights to use the item --sometimes it’s as simple as asking permission that will keep you from getting sued or sent to jail.
http://www.arabia.com/article.cfm/id/175769





Johnson & Johnson Sues Red Cross Over Use of Red Cross

Johnson & Johnson, the pharmaceutical company that uses a red cross as its trademark, sued the American Red Cross yesterday, demanding that it stop using the red cross symbol on products it sells to the public.

Johnson & Johnson said it has had exclusive rights to use the trademark on certain commercial products for more than 100 years. It said that the Red Cross is supposed to use the symbol only in connection with nonprofit relief services.

The suit, filed in U.S. District Court in New York, marked the breakdown of months of behind-the-scenes negotiations.
http://www.journalnow.com/servlet/Sa...=1037645509161





Why Is Hollywood Making A Sequel To The Napster Wars?

Shutting down Napster was a huge blunder for the record companies, leading to the collapse of the entire industry. Now, movies and TV studios are looking to repeat the failure by going after YouTube, says columnist Cory Doctorow.

Hollywood loves sequels -- they're a safe bet if the franchise is already successful. But you'd have to be nuts to shoot a sequel to a disastrous flop.

The Napster debacle was the entertainment industry's biggest-ever flop. That disaster took place six years ago, when the record industry succeeded in shutting down the pioneering file-sharing service. Record companies show no signs of recovery.

The disastrous thing about Napster wasn't that it it existed, but rather that the record industry managed to kill it.

Napster had an industry-friendly business-model: raise venture capital, start charging for access to the service, and then pay billions of dollars to the record companies in exchange for licenses to their works. Yes, Napster kicked this plan off without getting permission from the record companies, but that's not so unusual. The record companies followed the same business plan a hundred years ago, when they started recording sheet music without permission, raising capital and garnering profits, and then working out a deal to pay the composers for the works they'd built their fortunes on.

Napster's plan was plausible. They had the fastest-adopted technology in the history of the world, garnering 52,000,000 users in 18 months -- more than had voted for either candidate in the preceding U.S. presidential election! -- and discovering, via surveys, that a sizable portion would happily pay between $10 and $15 a month for the service. What's more, Napster's architecture included a gatekeeper that could be used to lock out nonpaying users.

The record industry refused to deal. Instead, it sued, bringing Napster to its knees. Bertelsmann bought Napster out of the ensuing bankruptcy. Later, Universal followed the same patttern when it killed MP3.com in the courts, then brought home the corpse on the cheap, running it as an internal project.

After that, the record companies had a field day: practically every venture-funded P2P company went down, and the record companies made millions of dollars.

But the record companies weren't ready to replace these services with equally compelling alternatives. Instead, they fielded inferior replacements like PressPlay, with limited catalog, high prices, and anti-copying technology (digital rights management, or DRM) that alienated users by the millions by treating them like crooks instead of customers. These half-baked ventures did untold damage to the record companies and their parent firms.

Just look at Sony: It should have been at the top of the heap. It produces some of the world's finest, best-designed electronics. It owns one of the largest record labels in the world. The synergy should have been incredible.

Instead, Sony's portable players -- the MusicClip and others -- were so crippled by anti-copying technology that they couldn't even play MP3s, and the music selection at Sony services like PressPlay was anemic, expensive, and equally hobbled. Sony isn't even a name in the portable audio market anymore -- today's Walkman is an iPod.

Of course, Sony still has a record label -- for now. But sales are falling, and the company is reeling from the 2005 "rootkit" debacle, where it deliberately infected eight million music CDs with a hacker tool called a rootkit, compromising more than 500,000 U.S. computer networks, including military and government networks, all in a (failed) bid to stop copying of its CDs.

The public wasn't willing to wait for Sony and the rest to wake up and offer a service that was as compelling, exciting, and versatile as Napster. Instead, they flocked to a new generation of services like Kazaa and the various Gnutella networks. Kazaa's business model was to set up offshore, on the tiny Polynesian island of Vanuatu. Kazaa bundled spyware with its software, making its profits off fees from spyware crooks. Kazaa didn't want to pay billions for record industry licenses -- it used the international legal and finance system to hopelessly snarl the RIAA's members through half a decade of wild profitability. The company was eventually brought to ground, but the founders walked away and started Skype and then Joost.

Meantime, dozens of other services had sprung up to fill Kazaa's niche -- AllofMP3, the notorious Russian site, was eventually killed through intervention of the U.S. Trade Representative and the WTO, and was reborn practically the next day under a new name.

It's been eight years since Sean Fanning created Napster in his college dorm room. Eight years later, there isn't a single authorized music service that can compete with the original Napster. Record sales are down every year, and digital music sales aren't filling in the crater. The record industry has contracted to four companies, and it may soon be three if EMI can get regulatory permission to put itself on the block.

The sue-'em-all-and-let-God-sort-'em-out plan was a flop in the box office, a flop in home video, and a flop overseas. So why is Hollywood shooting a remake?

Napster: The Sequel

YouTube, 2007, bears some passing similarity to Napster, 2001. Founded by a couple guys in a garage, rocketed to popular success, heavily capitalized by a deep-pocketed giant. Its business model? Turn popularity into dollars and offer a share to the rightsholders whose works they're using. This is a historically sound plan: cable operators got rich by retransmitting broadcasts without permission, and once they were commercial successes, they sat down to negotiate to pay for those copyrights (just as the record companies negotiated with composers after they'd gotten rich selling records bearing those compositions).

YouTube '07 has another similarity to Napster '01: it is being sued by entertainment companies.

Only this time, it's not (just) the record industry. Broadcasters, movie studios, anyone who makes video or audio is getting in on the act. I recently met an NBC employee who told me that he thought that a severe, punishing legal judgment would send a message to the tech industry not to field this kind of service anymore.

Let's hope he's wrong. Google -- YouTube's owner -- is a grown-up company, unusual in a tech industry populated by corporate adolescents. Google has lots of money and a sober interest in keeping it. It wants to sit down with A/V rightsholders and do a deal. Six years after the Napster verdict, that kind of willingness is in short supply.

Most of the tech organizations with an interest in commercializing Internet audio and video have no interest in sitting down with the studios:

Some are nebulous open source projects like mythtv, a free hyper-TiVo that skips commercials, downloads and shares videos, and is wide open to anyone who wants to modify and improve it

Some are politically motivated anarchists like ThePirateBay, a Swedish BitTorrent tracker site that has mirrors in three countries with noninteroperable legal systems, where they respond to legal notices by writing sarcastic and profane letters and putting them online

Or out-and-out crooks like the bootleggers who use P2P to seed their DVD counterfeiting operations.

It's not just YouTube. TiVo, which pioneered the personal video recorder, is feeling the squeeze, being systematically locked out of the digital cable and satellite market. Their efforts to add a managed TiVoToGo service were attacked by the rightsholders who fought at the FCC to block them. Cable/satellite operators and the studios would much prefer the public to transition to "bundled" PVRs that come with your TV service.

These boxes are owned by the cable/satellite companies, who have absolute control over them. Time Warner has been known to remotely delete stored episodes of shows just before the DVD ships, and many operators have started using "flags" that tell recorders not to allow fast-forwarding, or to prevent recording altogether.

The reason that YouTube and TiVo are more popular than ThePirateBay and mythtv is that they're the easiest way for the public to get what it wants -- the video we want, the way we want it. We use these services because they're like the original Napster: easy, well-designed, functional.

But if the entertainment industry squeezes these players out, ThePirateBay and mythtv are right there, waiting to welcome us in with open arms. ThePirateBay already has announced that it is launching a YouTube competitor with no-plugin, in-browser viewing. Plenty of entrepreneurs are looking at easing the pain and cost of setting up your own mythtv box. The only reason that the barriers to widespread adoption of BitTorrent and mythtv exist is that it hasn't been worth anyone's while to capitalize projects to bring those barriers down. But once the legit competitors of these services are killed, look out.

The thing is, the public doesn't want managed services with limited rights. We don't want to be stuck using approved devices in approved ways. We never have -- we are the spiritual descendants of the customers for "illegal" record albums and "illegal" cable TV. The demand signal won't go away.

There's no good excuse for going into production on a sequel to The Napster Wars. We saw that movie. We know how it turns out. Every Christmas, we get articles about how this was the worst Christmas ever for CDs. You know what? CD sales are never going to improve. CDs have been rendered obsolete by Internet distribution -- and the record industry has locked itself out of the only profitable, popular music distribution systems yet invented.

Companies like Google/YouTube and TiVo are rarities: tech companies that want to do deals. They need to be cherished by entertainment companies, not sued.


(Thanks to Bruce Nash and The-Numbers.com for research assistance with this article)
http://www.informationweek.com/story...leID=201400131





Video-Sharing Site Based in S.D. Sues Universal

Veoh Networks, a San Diego video-sharing site, has filed a lawsuit in federal court against Universal Music Group after receiving threats of legal action for copyright violations.

Veoh is not seeking damages but is seeking a declaration that it has not infringed on any Universal Music Group copyrights under the safe harbor provisions of the Digital Millennium Copyright Act.

Veoh has created a video-sharing site using peer-to-peer technology. The company has music videos posted on its site – some of which presumably contain music from Universal artists.

The company, which counts among its investors ex-Disney Chief Executive Michael Eisner, said it was notified in July by Universal that the music label was considering suing Veoh because it was “massively infringing” on its copyrights.

The lawsuit claims Universal did not provide any details about the alleged infringement that would allow the company to investigate.

“It is unfortunate that UMG prefers to take actions that are designed to stifle innovation, shut down new markets and maintain the status quo instead of working to change and evolve models for today and the future,” said Steve Mitgang, CEO of Veoh.

Universal had previously threatened to sue the video-sharing site YouTube, which is owned by Google, but the two sides struck a licensing deal before any legal action was taken.

“Universal Music Group is enthusiastic about using technology to build communities, as evidenced by our deal with YouTube,” the company said yesterday.

“But that's not what Veoh is all about. Rather, its about trying to build a business on the backs of our artists and songwriters without fairly compensating them for the use of their works,” Universal said.
http://www.signonsandiego.com/news/b...-1b10veoh.html





Universal Threatens To Sue Retailers for Selling Amy Winehouse Import
Eliot Van Buskirk

You've been able to buy imported music at record stores for as long as I can remember. But Universal, in an attempt to sell as many copies of Amy Winehouse's latest album as possible, has put the kibosh on U.S. sales of CDs of her earlier album, Frank, which is only currently available here as an EU import (Universal will release a US version on November 7th), sending a letter to music retailers indicating that it would sue store owners who continued selling imports of the album.

The familiar irony here is that this strategy will send interested parties -- the ones who are still in the habit of buying CDs, no less -- to peer-to-peer networks or their friend's CD burner. By the time the album goes on sale in the US, much of Winehouse's U.S. fanbase will have obtained the album in some other way. One merchandiser quoted in the article acknowledged that probability:

"We are selling physical product that the customers want, and they are trying to stop us... In the meantime, it is flowing freely throughout the world over the Internet through the (peer-to-peer) sites."

It's pretty hard to manufacturer music scarcity these days, but Universal seems determined to try.

As for people who don't use P2P or have friends with CD burners, the label seems more interested in getting them to buy one Amy Winehouse album than in striking while the iron is hot, and allowing them to become even bigger fans by discovering her earlier stuff.
http://blog.wired.com/music/2007/08/...sal-threa.html





Universal Music Will Sell Songs Without Copy Protection
Jeff Leeds

Signaling another departure from the music industry’s tenuous belief in its longtime antipiracy strategy, the Universal Music Group plans to sell a significant portion of its catalog without the customary copy protection software for at least the next few months, according to people with knowledge of the situation.

Universal, the world’s biggest music conglomerate, is set to announce that it will offer albums and songs without the software, known as digital rights management, through existing digital music retail services like RealNetworks and Wal-Mart, nascent services from Amazon.com and Google, and some artists’ web Wites, these people said.

But the music is not expected to be offered D.R.M.-free through Apple’s iTunes, the leading music service, they said.

The use of copy protection software has become a major bone of contention in the digital music business, where iTunes accounts for the vast majority of download sales. The record labels generally have required that retailers place electronic locks to limit copying of music files.

But Apple’s proprietary D.R.M. does not work with most rivals’ devices or software — meaning that music sold by competing services cannot play on Apple’s popular iPod. Some record executives say they believe the stalemate has capped the growth of digital music sales, which the industry is relying on more heavily as sales of plastic CDs slide.

The offer of Universal’s music under the new terms is being framed as a test, to run into January, allowing executives to study consumer demand and any effect on online piracy. If Universal decides to adopt the practice permanently, it will probably pressure other record companies to follow suit. That could stoke a wider debate about how to treat intellectual property in the digital era. Universal’s artists include the Black Eyed Peas and 50 Cent.

The effort is likely to be seen as part of the industry’s wider push to increase competition to iTunes and shift leverage away from Apple, which wields enormous clout in determining prices and other terms in digital music. A month ago, Universal notified Apple that it would not agree to a new long-term contract to sell music through iTunes.

Steven P. Jobs, Apple’s chief executive, made his position on copy protection software clear in February, when he posted a statement on the company’s Web site calling on the record companies’ to abandon their insistence on D.R.M., which he argued had largely failed to resolve the industry’s piracy woes.

So far, only one of the four major music companies, the EMI Group, embraced a wholesale shift away from the usual D.R.M.. EMI, which releases music by artists like Norah Jones and Coldplay, first struck a deal with iTunes, in which songs without copy protection (and with better audio quality) would be sold at a higher price — $1.29 instead of the usual 99 cents for the restricted songs.

EMI has said the results so far have been promising. Under Universal’s arrangements with digital retailers, at least some of its new music will be sold in unprotected form for 99 cents, executives briefed on the plan said.
http://www.nytimes.com/2007/08/10/business/10music.html





Research Targets the Holy Trinity of Audio Streaming: Quality, Security, and DRM
John Timmer

As the movie and music industries cope with rampant piracy on the Internet, they've resorted to means ranging from sophisticated digital watermarks to armies of bored workers to detect copies of their material online. Researchers at the University of Ottawa are publishing a paper in the International Journal of Advanced Media and Communication in which they describe a system that can serve live audio streams while performing resampling, live embedding of watermarks, data authentication, and quality of service validation. We take a look at whether this will change the face of streaming media, or simply provide more of the same DRM.

Although transcoding has already been solved, the paper provides a good introduction of past work on the remaining three problems: watermarking, QOS, and data integrity checks. It describes efforts that have addressed each of these issues but suggests that the earlier work fell short by viewing them in isolation. They also note that many of the watermarking efforts, while looking good on paper, have never been tested in the real world because they were not accompanied by actual implementations. With the review done, they announce that they plan to correct these shortcomings.

The system they propose is a three-layer watermark based on private keys and integrated into the processes of transcoding and downsampling that normally take place on the server end of audio streams. They worked with ITU-T G7.11 coded audio, a standard that's used for VoIP, although they promise to turn their attention to MP3s next. The system is buffer-based: a fixed amount of raw audio data is read into a single memory buffer and then processed before being sent out to recipients. The first layer of watermarking occurs once the audio is transcoded. A private key is used to select individual units of audio data within the buffer; the least-significant bit of that unit is replaced by a bit from the watermark to create the first layer.

With that process completed, the software excludes a predetermined set of bits from the data. The private key is tacked on to the end of what's left, and a hash value is calculated for this data. The excluded bits are then replaced by the data from this hash value. Low-information content bits are used here in order to avoid interfering with the audio. As this second layer of watermarking is dependent upon the audio data itself, it serves as a security measure, allowing recipients to determine if any of the streamed data has been changed en route.

The final layer of watermarking allows for the quality of the stream to be registered. To accomplish this, the authors embed a small, simple watermark (a black square) into the larger watermark image used in layer one. This allows each buffer to have a QOS value assigned to it, and helps discriminate between cases of dropped packets and instances of intentional data modification. As a bonus, this step can be performed once, and the results cached for use in all further operations.

To check how well this works, the authors tested both the quality of the resulting audio and the performance of the system in terms of both audio quality and speed. Across a number of different output settings, the typical decrease in audio quality was only four percent. The authors ascribe this to the fact that most of the bits being replaced were the least significant, and all of the replacements had even odds of matching the audio information they were replacing.

The researchers implemented the watermarking in Java and ran it without hotspot optimizations, reasoning that this left significant headroom for performance improvements if needed. Tests were run on 3.4GHz Pentium4's. On the server side, the performance was impressive, with most steps taking a fraction of a millisecond; only the hash value computation added more than 10 milliseconds to the process. Extracting the data on the client end and comparing it to the watermarks was a bit more expensive but still clocked in at under 200 milliseconds, a figure the authors term "soft realtime."

Although all of the results look good and represent an interesting approach to a series of related problems, it's unlikely that these methods will be appearing in a device near you in the near future. Any computer, PDA, or audio player on the receiving end of these streams will have to be provided with both a private key and a copy of the watermark data in order to perform these validation steps. In other words, there's no significant difference between this and any of the other (currently incompatible) forms of DRM already out there.

It doesn't seem to help the content providers significantly, either, as this watermark is no more likely to survive any further transcoding on the user's end than any other, meaning only a subset of pirated material might be easier to identify. More importantly, in the absence of universal DRM, nothing will prevent users from playing watermarked material on existing devices. In the end, this technique appears most suited to specialized applications in secure communications.

(International Journal of Advanced Media and Communication, Volume 1:4. p. 386.)
http://arstechnica.com/news.ars/post...y-and-drm.html





Senators to SoundExchange: Don't Use Negotiations to Demand DRM
Nate Anderson

The two senators who introduced the Internet Radio Equality Act have strong words for SoundExchange as it embarks on negotiations with webcasters over royalty rates: don't use the proceedings as a means of mandating DRM.

Senators Sam Brownback (R-KS) and Ron Wyden (D-OR) issued a statement late last week applauding the fact that SoundExchange decided not to enforce the controversial new royalty rates on July 15. But they warned that the group's negotiations with Internet broadcasters need to remain limited in scope.

"While we strongly support a negotiated solution," said the senators, "we will not allow the minimum fee issue to be used to force an agreement that mandates DRM technology and fails to respect the established principles of fair use and consumer rights."
As we've reported earlier, SoundExchange is pushing for DRM on audio streams to combat streamripping. In return, it is holding out the promise of concessions to small webcasters (though not to large ones, who will apparently still be required to pay the new per-stream rates).

The point of the senators' statement was to put pressure on SoundExchange by threatening to push hard for the Internet Radio Equality Act if SoundExchange doesn't drop the DRM request. This may be a threat with little muscle behind it, though, as Wired is now reporting that the Act has almost no chance of clearing the House, effectively rendering it dead.

Wired also wonders if SoundExchange is exceeding its legal mandate to spend the funds it receives only on administration of royalties, settling financial disputes, and licensing rights. The organization is also involved in lobbying, but it's certainly not trying to hide the fact. SoundExchange is the first listed sponsor of the MusicFIRST coalition, which sent Judy Collins to testify before Congress last week.

SoundExchange even went so far as to tout its involvement with the group on a conference call announcing the formation of MusicFIRST. If it's operating outside the lines of its Congressionally-sanctioned mandate, it certainly doesn't seem bothered by that fact.
http://arstechnica.com/news.ars/post...emand-drm.html





Webcast Royalty Bill Talks Lose Steam
FMQB

The proposed federal bill that would reset music royalty rates to a more affordable price for Internet radio broadcasters is losing steam in the House of Representatives. The negotiations are still happening, but chances of the Internet Radio Equality Act (IREA) being approved are fading, according to Wired. It looks like instead of lowering the Internet royalty rate, Congress may prefer to let the royalty-distributing group SoundExchange negotiate individual deals with Webcasters.

"We met with members of the House and Senate judiciary committees this week, and while they all were supportive of small Webcasters, time after time we heard the IREA was not going to pass," Rusty Hodge, founder of Webcaster SomaFM, told Wired.

On the bright side, SoundExchange has proposed changes that could relieve small and custom-streaming sites from royalties they could not possibly afford, at least for now. A small Webcaster deal could be done by early September when Congress goes back into session. But the deal on the table hasn't changed since SoundExchange made an offer in May to charge them 10 percent of gross revenue under $250,000, or 12 percent of gross revenues over $250,000, with a revenue cap at $1.25 million. Webcasters are apprehensive about the deal because of a provision that would shift Webcasters from the percentage rate to the higher per-stream rate once they exceed certain usage caps, notes Wired.

"That's the sticking point," said Hodge. "In our optimistic projections, SomaFM won't hit the revenue cap for a couple years, (but) when we hit it, our royalties would go from $150,000 a year to over $2 million a year."

Meanwhile, last week, Senators Ron Wyden (D-OR) and Sam Brownback (R-KS) said they were "troubled by the lack of negotiating progress being reported" and promised to take action to push the IREA bill forward if agreements are not made by September 3. "The fact is online radio services do not have enough revenue to support what will amount to unprecedented royalties," they said in a statement. "The $500 per channel minimum fee alone will deliver an over $1 billion annual windfall to record companies, a windfall that is not justified by any business or equity considerations. We feel the Senate must take action, and we will make every effort move the Internet Radio Equality Act to the floor."
http://fmqb.com/Article.asp?id=452483





Webcast Royalty Bill, Negotiations Hit Impasse
Eliot Van Buskirk

A federal bill that would reset music royalties at a more affordable rate for thousands of internet radio stations is losing steam in the House of Representatives, raising new fears for the future of webcasting.

First-time webcasting fees proposed by recording industry royalty-administration group SoundExchange took effect last month, setting off a wave of protests and last-minute negotiations aimed at reducing the hit for smaller webcasters and capping rates for sites that support hundreds of customized stations.

Negotiations are ongoing, but chances of broad legislative relief in the form of the Internet Radio Equality Act, or IREA, are fading fast, according to several people familiar with the effort. Rather, Congress appears resolved to let SoundExchange and the various strata of webcasters negotiate individual settlements.

"We met with members of the House and Senate judiciary committees this week, and while they all were supportive of small webcasters, time after time we heard the IREA was not going to pass," said Rusty Hodge, founder of webcaster SomaFM.

A legislative setback could make it harder to dislodge the new fees, which took effect last month after a federal appeals court refused to postpone the payment deadline. With the threat of congressional backlash fading, SoundExchange could find little incentive to budge from its current position.

The importance of legislative pressure in the negotiation process was underscored late Thursday. In a joint statement, Sens. Ron Wyden (D-Oregon) and Sam Brownback (R-Kansas) said they were "troubled by the lack of negotiating progress" and promised to take action to push the IREA bill forward if agreements are not made by Sept. 3. Given the lack of support in the House, however, the chances of the bill becoming law currently look remote.

SoundExchange has already proposed changes that could relieve small and custom-streaming sites from charges they could not possibly afford to pay, at least in the short term. Many expect a small-webcaster deal to be done by early September, when Congress goes back into session. But the deal on the table hasn't changed since SoundExchange extended an offer in May to charge them 10 percent of gross revenue under $250,000, or 12 percent of gross revenues over $250,000, with a revenue cap at $1.25 million.

Webcasters say they are wary of the deal because of a provision that would shift webcasters from the percentage rate to the higher per-stream rate once they exceed certain usage caps.

"That's the sticking point," said SomaFM's Hodge. "In our optimistic projections, SomaFM won't hit the revenue cap for a couple years, (but) when we hit it, our royalties would go from $150,000 a year to over $2 million a year. "

For larger webcasters, such as custom-streaming site Pandora, coming to terms could take longer. Talks are ongoing over a proposal to cap per-station fees, but Tim Westergren, co-founder of Pandora, said there has been "no material change -- we're in a slow negotiation process now."

Reaching a settlement with SoundExchange could take even longer for the largest webcasters, which have been given no hint of a deal beyond the current Copyright Royalty Board rates. In the absence of any alternative, they will likely seek to strike deals directly with the major labels rather than accepting SoundExchange's mandatory license.
http://www.wired.com/entertainment/m...EA_faces_music





SoundExchange, Caught Lobbying, Says Lobbying Bar Does Not Apply
Eliot Van Buskirk

SoundExchange, the music industry's digital-royalty collection agency, has been on a roll.

A federal appeals court recently rejected a plea from webcasters to postpone the deadline for a new royalty scheme that sets the stage for SoundExchange to begin levying billions of dollars from internet radio stations in the coming decades. It already collects a tidy sum from satellite radio and now it has set its sights on U.S. terrestrial radio stations, which currently pay no broadcast performance royalties. If it wins there, its power could grow exponentially.

This reflects a well-known law of any bureaucracy: Once authority is created, it works inevitably to expand its sphere of influence, grabbing for more power and bigger budgets. With each success, its appetite only grows.

Knowing well the dangers, legislators sought to restrict SoundExchange's ability to spend the money it collects on behalf of artists and labels. Section 114(g)(3) of the Copyright Act explicitly limits how the nonprofit can spend the money it collects, approving just three carefully circumscribed activities:

"(A) the administration of the collection, distribution, and calculation of the royalties;

"(B) the settlement of disputes relating to the collection and calculation of the royalties; and

"(C) the licensing and enforcement of rights with respect to the making of ephemeral recordings and performances subject to licensing under section 112 and this section, including those incurred in participating in negotiations or arbitration proceedings under section 112 and this section, except that all costs incurred relating to the section 112 ephemeral recordings right may only be deducted from the royalties received pursuant to section 112."

So it came as quite a surprise when a source familiar with SoundExchange told me on condition of anonymity that the group is engaged in lobbying and public relations activities, in apparent violation of the law cited above.

A little fact-checking showed that SoundExchange registered the MusicFirstCoalition.org domain on May 9, 2007; that it is a member of the organization; and that SoundExchange supports musicFIRST financially, although it has not disclosed the extent of its spending. (When asked about it, SoundExchange spokesperson Richard Ades called that information "proprietary.")

Here's what's not proprietary: The musicFIRST Coalition (Fairness In Radio Starting Today) is a public relations group that launched on June 14, 2007 with the sole mission of implementing a sound recording performance royalty on terrestrial radio stations. It is comprised of labels, managers and artists, including Hall & Oates, Jay-Z, Celine Dion and various artists' and labels' organizations, including the RIAA. SoundExchange is listed as a sponsor on the homepage of the organization's web site.

Asked about the legality of the lobbying expenditures, SoundExchange Executive Director John Simson dodged the question. "Clearly the Broadcasters (CQ) will do or say anything so as not to pay artists for their work," he wrote in an e-mail. "We welcome a full and open debate before Congress on ending the unfair free ride given over-the-air radio and the granting to artists the long overdue right to be paid for their recordings when they are played."

Michael Huppe, general counsel for SoundExchange, was more helpful on the legal question. He said the funding was a legitimate use of its members' money. "Funding provided by SoundExchange to musicFIRST is authorized by copyright owners and performers who have chosen to become members of SoundExchange. These contributions come only from our members and not from non-member royalties, and were unanimously approved by the SoundExchange board," Huppe replied when asked about its support of musicFIRST.

In the end, however, SoundExchange could not point to a specific statute that allows them to contribute to musicFIRST.

Jessica Litman, a law professor at the University of Michigan, could not point to any legal grounds for SoundExchange's move, saying, "I'm not aware of any statute that authorizes the contribution."

Shoshana Zisk, a music attorney in San Francisco, said, "Upon reading Copyright Act Section 114(g)(3), it would appear that funding a lobbying or PR organization (such as musicFIRST) is a violation of this provision."

Whether or not SoundExchange's lobbying efforts prove to be illegal, its presence as an advocate in this debate undercuts its role as neutral administrator of royalty fees set and approved by the Copyright Royalty Board.

Artists and labels well deserve compensation for radio performance broadcasts. The United States is one of the few countries that exempts radio from these fees (music authors and publishers alone get paid), a tribute to the power and political muscle of the industry. That power is now fading, in part due to the rise of the internet, and so radio giants like Clear Channel seem vulnerable for the first time in decades.

Yet SoundExchange's interest in the outcome is as clear as the interest of the artists and labels it represents. If new fees are approved for terrestrial radio and SoundExchange is appointed to administer those fees, it will instantly become a much bigger player in the music industry. Given that it already has expertise in collecting similar fees for satellite and internet play, SoundExchange stands a good chance of winning this appointment.

With more power would come greater status and bigger paychecks for its officers and directors. Even if the agency were only acting in the interests of artists and labels, it would appear to have a direct stake in the fight. And that creates the appearance of a conflict of interest, whether or not there is in fact a conflict.

That's why Congress intended to keep SoundExchange out of the lobbying business. In keeping with the spirit of the law, SoundExchange should immediately sever its ties to musicFirst and any other lobbying group it funds or assists, and fulfill its role as a neutral administrator of fees.
http://www.wired.com/entertainment/m...?currentPage=1





Cox's Robert Neil Talks Radio Royalties
FMQB

Robert Neil, President/CEO of Cox Radio, recently spoke to Fox News about his view of the proposed new royalty rates for radio, in which stations would have to pay artists for playing their music. "The reality is that if radio doesn't play their music, they're not gonna sell their recordings," said Neil. "And if we have to pay tons of money to do that, then what you're going to see is fewer and fewer music stations because nobody is willing to pay it. It would be absolutely deadly to small radio stations. It's just silly. It's absolutely silly. There's no other word to describe it."

Neil also told Fox's Roger Friedman that the symbiotic relationship between radio stations and record companies was built on the structure of free airplay in exchange for free music. "The songwriters may make a million dollars over a lifetime on their royalties," he said. "But the performers made a hundred million dollars up front on record sales and concerts. Now they’re coming back and telling us to pay them. We won’t."

On Tuesday this week, a House subcommittee hearing was held on the matter, with Rep. Howard Berman (D-CA) vowing to begin fighting for the royalty. "I will come right out and indicate my bias -- I have supported the expansion of the performance right for over 20 years, with two caveats," he said. "One is that by extending this right it does not diminish the rights and revenues of the creators of musical works and second, that terrestrial broadcasters, large and small, remain a viable source of music."

The NAB has vehemently opposed the royalty, which it has labelled a "performance tax." Speaking on its behalf at the hearing was Radio Board Second Vice Chair Chester Warfield Jr., President/COO of ICBC Broadcast Holdings. Warfield said, "There is no justification for changing a system that has worked for the music industry as a whole for so many years. The United States has the most prolific and successful music industry that is the envy of all the world. Upsetting the careful balance that Congress struck by imposing a performance tax on local radio broadcasters would be a shift of seismic proportions. For over 80 years, Congress has not seen fit to alter this mutually beneficial policy, and there is no reason to do so now."
http://fmqb.com/Article.asp?id=451596





Diebold Voting Machines Vulnerable to Virus Attack

An analysis of Diebold's source code shows that a hacker with access to a single voting machine could use a virus to affect an election.
Sumner Lemon

Diebold Election Systems Inc. voting machines are not secure enough to guarantee a trustworthy election, and an attacker with access to a single machine could disrupt or change the outcome of an election using viruses, according to a review of Diebold's source code.

"The software contains serious design flaws that have led directly to specific vulnerabilities that attackers could exploit to affect election outcomes," read the University of California at Berkeley report, commissioned by the California Secretary of State as part of a two-month "top-to-bottom" review of electronic voting systems certified for use in California.

The assessment of Diebold's source code revealed an attacker needs only limited access to compromise an election.

"An attack could plausibly be accomplished by a single skilled individual with temporary access to a single voting machine. The damage could be extensive -- malicious code could spread to every voting machine in polling places and to county election servers," it said.

The report, titled "Source Code Review of the Diebold Voting System," was apparently released Thursday, just one day before California Secretary of State Debra Bowen is to decide which machines are certified for use in California's 2008 presidential primary elections.

The source-code review identified four main weaknesses in Diebold's software, including: vulnerabilities that allow an attacker to install malware on the machines, a failure to guarantee the secrecy of ballots, a lack of controls to prevent election workers from tampering with ballots and results, and susceptibility to viruses that could allow attackers to an influence an election.

"A virus could allow an attacker who only had access to a few machines or memory cards, or possibly to only one, to spread malicious software to most, if not all, of a county's voting machines," the report said. "Thus, large-scale election fraud in the Diebold system does not necessarily require physical access to a large number of voting machines."

The report warned that a paper trail of votes cast is not sufficient to guarantee the integrity of an election using the machines. "Malicious code might be able to subtly influence close elections, and it could disrupt elections by causing widespread equipment failure on election day," it said.

The source-code review went on to warn that commercial antivirus scanners do not offer adequate protection for the voting machines. "They are not designed to detect virally propagating malicious code that targets voting equipment and voting software," it said.

In conclusion, the report said Diebold's voting machines had not been designed with security as a priority. "For this reason, the safest way to repair the Diebold system is to reengineer it so that it is secure by design," it said.

The Diebold source-code review and several other documents, including a review of source code used in other voting systems, had earlier been withheld from release by the Secretary of State, even as other reports related to the review of voting machines were released on July 27.

An explanation posted on the Secretary of State's Web site on July 27 noted the source-code review and other reports had been submitted on time. "Their reports will be posted as soon as the Secretary of State ensures the reports do not inadvertently disclose security-sensitive information," the Web site said.

The delayed release of the source-code review meant that David Wagner, an associate professor of computer science at the University of California at Berkeley and an author of the report, was not able to present his findings at a public hearing held on July 30 to discuss the results of the voting system review.
http://www.pcworld.com/article/id,135461/article.html





It's Not Over for Coulter
Jose Lambiet

When it comes to GOP twig Ann Coulter and her Palm Beach voting snafu, the fat lady has yet to sing.

While most expected the conservative pundit to be off the hook for good when the Palm Beach County Sheriff's Office punted a voting fraud probe in April, the Florida Elections Commission now is investigating.

Coulter, a constitutional lawyer, voted in the wrong precinct in a Palm Beach town election in February 2006 after registering at an address that wasn't hers.

The Coulter voting saga is now known as FEC Case No. 07-211. The investigator assigned, Tallahassee's Margie Wade, wouldn't confirm she caught the case; FEC complaints are supposed to be confidential.

Still, Page Two is told Coulter already has been notified she's under investigation.

Who filed? WPB campaign consultant Richard Giorgio, whose stable of candidates includes mostly Democrats. His two-pronged complaint against the prolific boob-tube pontificator accuses her of false swearing and fraud.

"I actually saw her vote at St. Edward's (Church), and she looked in a hurry,"?Giorgio said. The church is reserved for voters from the north side of the island, while Coulter lives south near Worth Avenue.

"I didn't realize that she had tried to vote somewhere else and was turned back. This was willful. Anyone else would have been prosecuted."

But Coulter hasn't been, even after Palm Beach cops, the PBC supervisor of elections and sheriff's office looked into it. Coulter hired Republican 2000 election recount lawyer Marcos Jimenez to rep her and refused to talk.

He did not return calls.

According to FEC rules, Wade has subpoena powers and could force Coulter to sing.

So, what does best-selling author Coulter risk? The FEC could impose $2,000 in fines. And it could refer the case to the Florida Department of Law Enforcement or the state attorney's office for criminal prosecution.

The decision is left to the commission, whose seven members all were appointed by former Republican Gov. Jeb Bush.
http://www.palmbeachpost.com/localne...jose_0801.html





Vote-Swapping Web Sites are Legal, Appeals Court (Finally) Says
Declan McCullagh

It took seven years, but a federal appeals court has finally vindicated the creators of vote-swapping Web sites that let Al Gore and Ralph Nader fans support their chosen candidates in the 2000 presidential election.

The purpose of the sites, which included the now-defunct voteswap2000.com and votexchange2000.com, was to let a Nader supporter in a state where George Bush might win "swap" his vote with a Gore supporter in a state like Texas where Republican victory was practically assured.

There was no actual way to enforce the swap. But the killjoys who inhabit government bureaucracies were nevertheless unamused and came up with the bizarre claim that operating a vote-swap site was a criminal act. California Secretary of State Bill Jones even threatened to prosecute voteswap2000.com and votexchange2000.com (which immediately shut their virtual doors in response).

Fortunately, the site operators--Alan Porter, Patrick Kerr, Steven Lewis, and William Cody--had the means to force the issue and take the state of California to court. They met with little luck before a federal district judge.

But on Monday, the 9th U.S. Circuit Court of Appeals ruled (PDF) that "the websites' vote-swapping mechanisms as well as the communication and vote swaps they enabled were constitutionally protected" and California's spurious threats violated the First Amendment. The 9th Circuit also said did not decide whether the threats violated the U.S. Constitution's Commerce Clause.

Here's the key graf: "Both the websites' vote-swapping mechanisms and the communication and vote swaps that they enabled were...constitutionally protected. At their core, they amounted to efforts by politically engaged people to support their preferred candidates and to avoid election results that they feared would contravene the preferences of a majority of voters in closely contested states. Whether or not one agrees with these voters' tactics, such efforts, when conducted honestly and without money changing hands, are at the heart of the liberty safeguarded by the First Amendment."
http://news.com.com/8301-10784_3-9755958-7.html





One small bit for a man, one gigabyte for mankind

Digitized Apollo Flight Films Available Online

Arizona State University partners with NASA to digitize original films
Press Release

Nearly 40 years after man first walked on the Moon, the complete lunar photographic record from the Apollo project will be accessible to both researchers and the general public on the Internet. A new digital archive - created through a collaboration between Arizona State University and NASA's Johnson Space Center in Houston - is making available high-resolution scans of original Apollo flight films. They are available to browse or download at: http://apollo.sese.asu.edu.

The digital scans are detailed enough to reveal photographic grain. Created from original flight films transported back to Earth from the Moon, the archive includes photos taken from lunar orbit as well as from the lunar surface. This is the first project to make digital scans of all the original lunar photographs from NASA's Apollo missions.

"This project fulfills a long-held wish of mine. It'll give everyone a chance to see this unique collection of images as clearly as when they were taken," says Mark Robinson, professor of geological sciences in ASU's School of Earth and Space Exploration, part of the College of Liberal Arts and Sciences.

Robinson leads the ASU side of the Apollo image digitizing project. Separately, he is the principal investigator for the Lunar Reconnaissance Orbiter Camera, or LROC (http://lroc.sese.asu.edu) - a suite of three separate, high-resolution imagers on board NASA's Lunar Reconnaissance Orbiter, due for launch in October 2008.

The reason the original Apollo images have been so seldom accessed is that they are literally irreplaceable. Between 1968 and 1972, NASA made sets of duplicate images after each Moon mission came back to Earth, placing the duplicate sets in various scientific libraries and research facilities around the world.

As a result, these second-generation copies (and subsequent copies of copies) are what scientists and the public have seen. The copied images are unsharp and over-contrasty compared to the originals, which have remained in deep-freeze storage at the Johnson Space Center. Even many lunar scientists have not seen or worked with them.

The Apollo digitizing project goes back to the original flight films and scans them in high-resolution detail to reveal their subtleties.

Robinson explains, "We worked with the scanner's manufacturer - Leica Geosystems - to improve the brightness range that the scans record." In technical terms, a normal 12-bit scan was increased to 14-bit, resulting in digital images that record more than 16,000 shades of gray.

"Similarly," says Robinson, "to get all the details captured by the film, we are scanning at a scale of 200 pixels per millimeter." This means, he says, the grain of the original film is visible when scans are fully enlarged. The most detailed images from lunar orbit show rocks and other surface features about 40 inches (1 meter) wide.

Combining high resolution and wide brightness range produces very large raw image files, notes Robinson. For example, in raw form, the scans of the Apollo mapping (metric) camera frames, each 4.7 inches square, are 1.3 gigabytes in size.

"That's bigger than most people want to look at with a browser," says Robinson, "even if their browser and internet connection are up to the job." So the Web site uses a Flash-based application called Zoomify, which lets users dive deep into a giant image by loading only the portion being examined. Links are available at the site for downloading images in several sizes, up to the full raw scan.

The project will take about three years to complete and will scan some 36,000 images. These include about 600 frames in 35 mm, roughly 20,000 Hasselblad 60 mm frames (color, and black and white), more than 10,000 mapping camera frames, and about 4,600 panoramic camera frames.

"These photos have great scientific value, despite being taken decades ago," says Robinson.

He adds, "I think they also give everybody a beautiful look at this small, ancient world next door to us."
http://www.spaceref.com/news/viewpr.html?pid=23141





Circuit City Subpoenas CheapAssGamer

The latest CAGcast brings word that electronics retailer Circuit City has served CAG Productions with a subpoena. CAG Productions is responsible for popular video game shopping community CheapAssGamer.com, which has 100,000 registered members. The retail giant wants CAG to turn over all personal information about registered forum member Speedy1961, who has been posting weekly CC ads prior to their release on the site. Speedy has also posted them on DVDtalk.com, and that site appears to have received legal action as well. The subpoena mentions one CheapAssGamer thread in particular, which prior to E3, revealed that the PS3 would get a price drop. That same thread also included pricing for games at Circuit City as well as game prices at Target and Best Buy. From the thread:

* GAMERS / MOVIE AFFICIANADOS: Please note $100 Price Break on Playstation 3 Game System which brings the price down to $499.99 // Remember that you can get 5 free Blu-Ray DVDs with purchase of any Blu-Ray Player / Game system by going here: http://www.bluraysavings.com/

This was wedged in between details about the Wii and other details. As mentioned aboved, information about Best Buy and Target was also noted. CAG Productions CEO David Abrams (AKA "CheapyD") has hired a lawyer. "The CAG community's trust and respect is very important to me, so I've hired legal representation to deal with the situation," Abrams tells Kotaku.
http://kotaku.com/gaming/not-cheap/c...mer-288081.php





US Bloggers Set for Journalistic Shield
OUT-LAW

A US bill that would shield journalists, including bloggers, from revealing their sources has cleared the House Judiciary Committee, an important stage in becoming law. There is already legislation in the UK which protects journalists and bloggers.

The US Free Flow of Information Act protects journalistic sources generally, but does include several exceptions regarding terrorism, national security, imminent death and trade secret leaks.

The US case has been championed by Republican Rich Boucher in the wake of several recent high profile federal court cases in which journalists were threatened with or actually forced to serve time in jail if they did not overturn confidential sources.

More than 30 US states already have shield laws on the statute books, and the new bill is an attempt to provide the same protection at the federal level.

There were concerns that the initial version of the bill would apply to all bloggers – but now the definition of a journalist has been narrowed.

The modified bill which passed the committee on 2nd August included a provision that limits its protections to those who make "financial gain or livelihood" from their journalism.

This essentially means that most individual bloggers, who may make a small income from Google adverts, seem unlikely to get protection – though this will depend on how broadly the courts interpret "financial gain".

The US Society of Professional Journalists pushed to keep the definition as broad as possible. A spokesman said: "While it's important to distinguish responsible journalists from casual bloggers, the more narrow the language defining who is a journalist, the less impact the bill will have."

Boucher told the committee that "the best information about corruption in government or misdeeds in a private organisation will come from someone on the inside who feels a responsibility to bring that information to light." He argued that such whistle-blowers will not come forward unless they know their confidentiality will be respected.

More than 40 US media companies and journalism bodies agreed. In supporting the bill, the Newspaper Association of America, said: "The journalist is becoming the first stop, rather than the last resort, for civil litigants and prosecutors attempting to obtain the identity of confidential sources."

The Bill will need approval from the House of Representatives and Senate before it becomes law.

In the UK, the Contempt of Court Act 1981 protects journalists and uses language that is likely to extend this protection to bloggers. It states: "No court may require a person to disclose, nor is any person guilty of contempt of court for refusing to disclose, the source of information contained in a publication for which he is responsible, unless it be established to the satisfaction of the court that disclosure is necessary in the interests of justice or national security or for the prevention of disorder or crime."

One of the highest profile UK cases under this Act was in 1983 when the Guardian newspaper was forced to reveal Sarah Tisdall as the source of leaked documents detailing when American cruise missile nuclear weapons were due to arrive on British soil. The Guardian's argument that it was protected by the Act was rejected.

Journalists are also expected to comply with the National Union of Journalists' Code of Conduct which states that journalists must "[Protect] the identity of sources who supply information in confidence and material gathered in the course of [their] work".

See: The US bill (http://thomas.loc.gov/home/gpoxmlc110/h2102_ih.xml)
http://www.theregister.co.uk/2007/08...eld/print.html





Five Journalists Honored with Yankee Quill Award

QUINCY, Mass. (AP) -- Five New England journalists, including a Pulitzer Prize-winning columnist and a TV reporter at the center of the national debate over confidential sources, are the recipients of the 2007 Yankee Quill Award for their contributions to improving journalism in the region.

The award is presented annually by the Academy of New England Journalists through the auspices of the New England Society of Newspaper Editors. It is considered the highest individual honor awarded by fellow journalists in the region.

This year's recipients are:

- Eileen McNamara, a Pulitzer-Prize winning columnist at The Boston Globe and currently a professor of journalism at Brandeis University;

- James Taricani, an investigative reporter for WJAR-TV, Providence, R.I., who was punished by the courts for refusing to disclose a secret news source;

- Larry McDermott, publisher of The Republican, Springfield, Mass., and president of the Massachusetts Newspaper Publishers Association;

- Barbara Walsh, an award-winning reporter at The Eagle-Tribune in Lawrence, Mass., and the Portland Press Herald/Maine Sunday Telegram;

- Michael Donoghue, a sportswriter at The Burlington, Vt., Free Press and executive director of the Vermont Press Association.

They will receive the Yankee Quill award on Oct. 25 during the joint conference of the New England Society of Newspaper Editors and the New England Newspaper Association at the Quincy Marriott.

McNamara will be honored as an advocate for the highest standards of ethics in the newsroom, with a passion to correct social injustice and provide a voice to the voiceless. She served 20 years as a reporter with United Press International and The Boston Globe before becoming a Globe columnist in 1996. One year later, she won the Pulitzer Prize for commentary "for her many-sided columns on Massachusetts people and issues." McNamara, who retired from the Globe earlier this year, is now a full-time professor at Brandeis University.

Taricani has won numerous awards for his aggressive reporting in Rhode Island, including Emmy awards and the Edward R. Murrow award. He will be honored for his role as an advocate for journalists' rights and a defender of the First Amendment. In 2004, Taricani was sentenced to six months of house confinement for refusing to divulge the source of an FBI videotape showing a politician's aide taking a bribe. The judge said he did not send Taricani to jail based on his fragile health - a heart transplant in 1996 and pacemaker in 2001. Since then, he has been a tireless advocate for a federal shield law.

McDermott will be honored for his extraordinary work on public-access issues in Massachusetts. Before being named CEO and publisher of the Springfield papers, he was executive editor, editor and associate publisher of the newspaper. Since 1998, McDermott has served as co-chair of the Massachusetts Supreme Judicial Court's Judiciary-Media Committee, which was established to improve relations between the judiciary and the media. As editor and publisher in Springfield, he has insisted on excellence in reporting and has pushed the public's right-to-know in a series of precedent-setting court cases.

Walsh, now a freelance writer, was a major contributor to the Pulitzer Prize won by The Eagle-Tribune in 1988 for a series of stories on convicted murderer Willie Horton and Massachusetts' flawed prison furlough system. While at the Portland papers, her work was honored with numerous awards, from the Casey Medal for Meritorious Journalism to the Anna Quindlen Award for Excellence in Journalism. Walsh will be honored as a feisty project reporter who writes about important public matters and issues and whose works has changed society for the better.

Donoghue, a staff writer for 37 years who moved to sports in 1998, is also an adjunct journalism professor at St. Michael's College and president of the National Sportscasters and Sportswriters Association. Donoghue is being honored for his leadership role on right-to-know and free press issues in Vermont as a practicing journalist and as head of that state's press association. Donoghue is a member of the New England Press Association Hall of Fame.
http://hosted.ap.org/dynamic/stories...08-10-14-51-19





US Public Sees News Media as Biased, Inaccurate, Uncaring: Poll

More than half of Americans say US news organizations are politically biased, inaccurate, and don't care about the people they report on, a poll published Thursday showed.

And poll respondents who use the Internet as their main source of news -- roughly one quarter of all Americans -- were even harsher with their criticism, the poll conducted by the Pew Research Center said.

More than two-thirds of the Internet users said they felt that news organizations don't care about the people they report on; 59 percent said their reporting was inaccurate; and 64 percent they were politically biased.

More than half -- 53 percent -- of Internet users also faulted the news organizations for "failing to stand up for America".

Among those who get their news from newspapers and television, criticism of the news organizations was up to 20 percentage points lower than among Internet news audiences, who tend to be younger and better educated than the public as a whole, according to Pew.

The poll indicates an across the board fall in the public's opinion on the news media since 1985, when a similar survey was conducted by Times Mirror, Pew Research said.

"Two decades ago, public attitudes about how news organizations do their job were less negative. Most people believed that news organizations stood up for America... a majority believed that news organizations got the facts straight," Pew said in a report.

The Washington-based Pew Research Center describes itself as a nonpartisan "fact tank" that provides information on the issues, attitudes and trends shaping America and the world.
http://rawstory.com/news/afp/US_publ..._08092007.html





'Ring of Steel' Coming to New York
Manav Tanneeru

In 2005, about two weeks after 52 people in London were killed in bombings targeting the English city's mass transit system, terrorists decided to strike again.

A police CCTV camera observes people walking in central London.

Similar to the July 7 attacks, they chose the city's transit system -- three subway trains and a double-decker bus -- as the targets. But this time, four homemade bombs stuffed into backpacks did not fully explode. One person was injured.

About a day later, photographs of four suspects were broadcast on television. Their images had been captured on surveillance cameras near the sites of the attempted attacks.

The remarkable speed of that investigation was repeated in June this year when terrorists attempted to detonate two car bombs in London.

Aided by surveillance cameras, British investigators began unraveling the plot later that day and tracked the suspects to Glasgow, Scotland. Several suspects were soon arrested.

Police officials credited the "Ring of Steel" -- a network of thousands of surveillance cameras that line London's intersections and neighborhoods -- for providing license plate numbers, suspects' image and other important clues in investigations.

New York City, specifically lower Manhattan, the site of two terror attacks, will have a similar system in place by the decade's end if it gets the needed funding.

Police officials say the surveillance cameras can help combat crime and terrorism, perhaps even deter it. Civil liberties advocates say such systems are a threat to privacy rights and another step for a society creeping toward a constant state of surveillance.

The implementation of the plan, called the Lower Manhattan Security Initiative, will require about $90 million, New York City Police Commissioner Ray Kelly said. It will cost about $8 million a year to maintain.

The city so far has raised about $25 million. Part of it has come from the Homeland Security Department and the rest from city coffers.

Kelly said the money being spent on the system is well worth it. "The 1.7 square miles of lower Manhattan are arguably one of the most valuable and sensitive pieces of real estate in the world," he said during a telephone interview.

The area includes the New York Stock Exchange, the Mercantile Stock Exchange, the Brooklyn Bridge, and the site where the World Trade Center once stood and where the Freedom Tower is being built.

The system has four components: license plate readers, surveillance cameras, a coordination center and roadblocks that can swing into action when needed. The primary purpose of the system is deterrence, and then an investigative tool, Kelly said.

The license plate readers will be in place by the end of the year. The rest of the plan is scheduled to be completed during the next two years.

New York City already has many cameras located in its airports, banks, department stores and corporate buildings. The city's law enforcement uses them when needed as part of a public-private partnership, Kelly said.

Such partnerships can be found in many cities across the United States, including Washington D.C.; Atlanta, Georgia; Baltimore, Maryland; and Chicago, Illinois.

Baltimore police officials told CNN the city had 500 cameras and crime was reduced by 17 percent in neighborhoods where they are located.

"The feedback from the community has been fantastic, and in fact, most people want cameras in their neighborhoods," said Maj. Dave Engel of the Baltimore Police Department.

Atlanta Police Deputy Chief Peter Andresen said the city had applied for federal funding to implement a surveillance camera system of its own. Atlanta has a public-private partnership in several of its neighborhoods that gives police access to cameras, he said.

He recalled a drug deal being busted because someone monitoring a camera grew suspicious of two cars idling in a parking lot with their hoods up for a long time.

"We feel that [the cameras] go a long way toward preventing crime," he said.

But Steve Swain, who served for years with the London Metropolitan Police and its counter-terror operations, doubts the power of cameras to deter crime.

"I don't know of a single incident where CCTV has actually been used to spot, apprehend or detain offenders in the act," he said, referring to the London system. Swain now works for Control Risk, an international security firm.

Asked about their role in possibly stopping acts of terror, he said pointedly: "The presence of CCTV is irrelevant for those who want to sacrifice their lives to carry out a terrorist act."

Kelly disagreed, pointing out that it is practically impossible to know what has been deterred. "We don't know acts that may have been planned that -- because of the surveillance and deterrence systems that are in place -- did not go forward."

Swain does believe the cameras have great value in investigation work. He also said they are necessary to reassure the public that law enforcement is being aggressive.

"You need to do this piece of theater so that if the terrorists are looking at you, they can see that you've got some measures in place," he said.

Privacy advocates said they are concerned about the possible abuse of surveillance power.

Donna Lieberman, the executive director of the New York Civil Liberties Union, said she was alarmed by the prospect of government and law enforcement officials having records of a person's daily activities.

"It wasn't that long ago that J. Edgar Hoover was up to his dirty tricks using government spying to interfere with lawful dissent, undermine critics and pursue an unlawful agenda," she said.

However, police officials repeatedly note there is no expectation of privacy in a public area and it is not a constitutional right.

A majority of Americans said they approved of the use of surveillance cameras by nearly a 3 to 1 margin in a recently published ABC News/Washington Post poll.

Jeffery Rosen, a professor at George Washington University and the author of two books on privacy issues, said the poll reflected the fact that "the arguments against the cameras tend to be abstract, whereas people's desire for security is understandable and immediate."

"But I think many people can understand life would be different in a world where, literally, government authorities could click on pictures of you at any point in the day and retrace your movements 24/7," he said.

Lieberman said privacy is not a quaint notion despite a rapidly changing world.

"Technology is an unstoppable train," she said. "The question is whether we can maximize the benefits and minimize the harms."
http://www.cnn.com/2007/TECH/08/01/n...nce/index.html





Congress Approves Sweeping Survellance Powers
Timothy B. Lee

The House, in a rush to get out of town and fearful of being branded as soft on terrorism, approved legislation on Saturday that gives the Bush administration new authority to engage in warrantless surveillance. The Senate approved the legislation on Friday.

The White House began a full-court press for the legislation last week after the secret court charged with reviewing foreign surveillance reportedly limited eavesdropping on communications between two foreign parties that pass through the United States. The White House and House Minority Leader John Boehner charged that Congress would be putting Americans in danger if it didn't pass legislation overruling the decision before the August recess.

But the hastily-enacted legislation, dubbed the Protect America Act, does more than permit the interception of foreign-to-foreign communications. It permits warrantless surveillance "directed at a person reasonably believed to be located outside of the United States." There is no language specifically restricting surveillance activities to communications originating outside of the United States.

No meaningful oversight

Nor will the process have meaningful judicial oversight. Before undertaking surveillance activities, intelligence officials would need to obtain a certification from the Attorney General and the Director of National Intelligence—both subordinates of the president—that there were "reasonable procedures" in place for ensuring that the eavesdropping "concerns" persons located outside the United States, and that the foreign intelligence is a "significant purpose" of the surveillance activities. That certification would only be reviewed after the fact, and only to determine if the procedures were, in fact, "reasonable." A single certification could approve a broad surveillance program covering numerous individuals, and no judge would review the list of individual targets.

Moreover, the requirement that surveillance "concern" non-U.S. persons could plausibly permit spying on the relatives, friends, and business associates of a foreign target. Indeed, the administration might argue that the only way to obtain all information regarding foreign targets is to conduct dragnet surveillance of American communications and sift through them to find relevant information.

The legislation empowers the administration to "direct" individuals to "provide the government with all information, facilities, and assistance necessary" to carry out foreign surveillance. These quasi-subpoenas would not be subject to judicial review before they were issued. The targets of such orders—who will typically be telecom company executives, not terrorism suspects—have the option of appealing the order to the FISA court, but given the broad scope of surveillance activities authorized by the legislation, it seems unlikely that such challenges would succeed. Moreover, the legislation offers legal immunity to those who comply with such orders, so telecom providers will have little incentive to resist them.

A couple of small bright spots

The legislation has two bright spots from a civil liberties perspective. First, as the president noted in his statement on the legislation, it does not provide "meaningful liability protection to those who are alleged to have assisted our Nation following the attacks of September 11, 2001"—in plain English, it doesn't give telecommunications carriers a free pass for any laws they might have broken over the last six years. That means that the legislation is unlikely to block lawsuits now in progress against telecom companies for violating their customers' privacy.

Second, the provisions sunset after six months, giving Congress the opportunity to reconsider the legislation later in the year. Yet even the sunset provision comes with a loophole: foreign surveillance that had been approved before the sunset date would remain in effect until expiration, which could be as long as a year. With less than 18 months remaining in his term, President Bush will have the opportunity to put in place surveillance programs that will remain in effect until the day he leaves office.

The legislation was opposed by a majority of Democrats, and Speaker Pelosi has vowed to revisit the legislation when Congress reconvenes in September. We hope the Democrats will show more backbone the second time around, but you'll forgive us if we don't hold our breaths.
http://arstechnica.com/news.ars/post...ce-powers.html





Court Secretly Struck Down Bush Spying: Report

A U.S. intelligence court earlier this year secretly struck down a key element of President George W. Bush's warrantless spying program, The Washington Post reported in its Friday edition.

The decision is one reason Congress is trying to give legal authorization to the spying program in fevered negotiations with the Bush administration this week, the Post reported.

The intelligence-court judge, who remains anonymous, concluded that the government had overstepped its authority by monitoring overseas communications that pass through the United States, the Post said, citing anonymous government and congressional sources.

The Bush administration expanded its surveillance efforts after the September 11, 2001, hijacking attacks, without court oversight. The court was allowed to review the program in January.

The surveillance court judge's ruling has prevented the National Security Agency from monitoring foreign telephone calls and e-mails that travel through the United States, the Post reported.

House Minority Leader John Boehner, an Ohio Republican, mentioned the court setback on Fox News on Tuesday, drawing a rebuke from House Democratic Caucus Chairman Rahm Emmanuel.

A Boehner spokesman said he did not reveal classified information.

The Democratic-led Congress hopes to reach a deal with the White House in the next few days that would expand the government's power to eavesdrop on telephone calls and e-mail from abroad.

The effort would modernize the 1978 Foreign Intelligence Surveillance Act, which requires court approval to monitor communications with people inside the United States.

The White House wants to bypass the court when spying on overseas foreigners, whether they are communicating with a U.S. citizen or not. Democrats object.
http://www.reuters.com/article/newsO...20721820070803





Govt. Looks for Leaker on Warrantless Wiretaps

The controversy over President Bush's warrantless surveillance program took another surprise turn last week when a team of FBI agents, armed with a classified search warrant, raided the suburban Washington home of a former Justice Department lawyer. The lawyer, Thomas M. Tamm, previously worked in Justice's Office of Intelligence Policy and Review (OIPR)—the supersecret unit that oversees surveillance of terrorist and espionage targets. The agents seized Tamm's desktop computer, two of his children's laptops and a cache of personal files. Tamm and his lawyer, Paul Kemp, declined any comment. So did the FBI. But two legal sources who asked not to be identified talking about an ongoing case told NEWSWEEK the raid was related to a Justice criminal probe into who leaked details of the warrantless eavesdropping program to the news media. The raid appears to be the first significant development in the probe since The New York Times reported in December 2005 that Bush had authorized the National Security Agency to eavesdrop on the international phone calls and e-mails of U.S. residents without court warrants. (At the time, Attorney General Alberto Gonzales said of the leak: "This is really hurting national security; this has really hurt our country.")

A veteran federal prosecutor who left DOJ last year, Tamm worked at OIPR during a critical period in 2004 when senior Justice officials first strongly objected to the surveillance program. Those protests led to a crisis that March when, according to recent Senate testimony, then A.G. John Ashcroft, FBI Director Robert Mueller and others threatened to resign, prompting Bush to scale the program back. Tamm, said one of the legal sources, had shared concerns about he program's legality, but it was unclear whether he actively participated in the internal DOJ protest.

The FBI raid on Tamm's home comes when Gonzales himself is facing criticism for allegedly misleading Congress by denying there had been "serious disagreement" within Justice about the surveillance program. The A.G. last week apologized for "creating confusion," but Senate Judiciary Committee chair Sen. Patrick Leahy said he is weighing asking Justice's inspector general to review Gonzales's testimony.

The raid also came while the White House and Congress were battling over expanding NSA wiretapping authority in order to plug purported "surveillance gaps." James X. Dempsey of the Center for Democracy and Technology said the raid was "amazing" and shows the administration's misplaced priorities: using FBI agents to track down leakers instead of processing intel warrants to close the gaps. A Justice spokesman declined to comment.
http://www.msnbc.msn.com/id/20121795/site/newsweek/





America Under Surveillance

Granted new power to spy inside the U.S., the Bush administration may be doing more than eavesdropping on phone calls -- it could be watching suspects' every move.
Tim Shorrock

In the pre-dawn hours of Sept. 1, 2005, a U-2 surveillance aircraft known as the Dragon Lady lifted off the runway at Beale Air Force Base in California, the home of the U.S. Air Force 9th Reconnaissance Wing and one of the most important outposts in the U.S. intelligence world. Originally built in secret by Lockheed Corp. for the Central Intelligence Agency, the U-2 has provided some of the most sensitive intelligence available to the U.S. government, including thousands of photographs of Soviet and Chinese military bases, North Korean nuclear sites, and war zones from Afghanistan to Iraq.

But the aircraft that took off that September morning wasn't headed overseas to spy on America's enemies. Instead, for the next six hours it flew directly over the U.S. Gulf Coast, capturing hundreds of high-resolution images as Hurricane Katrina, one of the largest storms of the past century, slammed into New Orleans and the surrounding region.

The U-2 photos were matched against satellite imagery captured during and after the disaster by the National Geospatial-Intelligence Agency. Relatively unknown to the public, the NGA was first organized in 1996 from the imagery and mapping divisions of the CIA, the Department of Defense and the National Reconnaissance Office, the agency that builds and maintains the nation's fleet of spy satellites. In 2003, the NGA was formally inaugurated as a combat support agency of the Pentagon. It is responsible for supplying overhead imagery and mapping tools to the military, the CIA and other intelligence agencies -- including the National Security Agency, whose wide-reaching, extrajudicial spying inside the United States under the Bush administration has been a heated political issue since first coming to light in the media nearly two years ago.

The NGA's role in Hurricane Katrina has received little attention outside of a few military and space industry publications. But the agency's close working relationship with the NSA -- whose powers to spy domestically were just expanded with new legislation from Congress -- raises the distinct possibility that the U.S. government could be doing far more than secretly listening in on phone calls as it targets and tracks individuals inside the United States. With the additional capabilities of the NGA and the use of other cutting-edge technologies, the government could also conceivably be following the movements of those individuals minute by minute, watching a person depart from a mosque in, say, Lodi, Calif., or drive a car from Chicago to Detroit.

Prior to Katrina, the NGA had been used sporadically during domestic crises. Its first baptism of fire came after the 9/11 terrorist attacks, when the agency collected imagery to help in the recovery efforts at the World Trade Center and the Pentagon. But the storm of 2005 triggered NGA activity on a scale never before seen inside the borders of the United States. "Hurricane Katrina changed everything with what we do with disasters," John Goolgasian, the director of the NGA's Office of Americas, told Salon. In New York after 9/11, the NGA had only a handful of people on the ground, but "with Katrina, we put a lot of people down in the theater," he said, using a term usually reserved for overseas military battlegrounds. The agency now deploys its staff on a regular basis to hurricane zones and also provides assistance to law enforcement agencies during events such as the Super Bowl, the baseball All-Star Game and political conventions.

On one level, the engagement of the NGA and the U-2 flights over the Gulf Coast during Katrina were commendable efforts to use America's vast surveillance powers for the safety and support of its citizens. But at the same time, the incident apparently marked the first time in history that U.S. intelligence agencies created to spy on foreign countries were deployed to collect extensive information on the U.S. "homeland." Their role during Katrina is just one aspect of an enormous domestic surveillance infrastructure put in place by the Bush administration ever since the Sept. 11 terrorist attacks sparked a radical restructuring and expansion of America's intelligence system. Although the full scope of domestic surveillance under Bush remains elusive, we now know from press accounts, lawsuits, and Attorney General Alberto Gonzales and other top Bush officials' descriptions and denials that the NSA has been involved in multiple domestic surveillance programs -- in apparent violation of federal law -- including spying on Americans' telecommunications and Internet traffic, as well as data mining.

In December 2004, the NSA and the NGA announced the signing of an agreement to share resources and staff and to link their "sources, data holdings, information infrastructure, and exploitation techniques." The document spelling out the agreement itself is classified. But in a press release the NGA explained that the pact allows "horizontal integration" between the two agencies, defined as "working together from start to finish, using NGA's 'eyes' and NSA 'ears.'"

The collaboration makes it possible for the agencies to create hybrid intelligence tools that enhance the ability of U.S. forces in combat. By combining intercepts of cellphone calls with overhead imagery gathered by unmanned aerial vehicles (UAVs), for example, intelligence analysts can track suspected terrorists or insurgents in Iraq in real time. Last November, NGA director Robert B. Murrett disclosed that it was through such technology that the U.S. military was able to locate and bomb the safe house where Abu Musab al-Zarqawi, the leader of al-Qaida in Iraq, was staying in June 2006. "Eventually, it all comes down to physical location," he told reporters. When NSA and NGA data are combined, he added, "the multiplier effect is dramatic."

Nine months prior, during Hurricane Katrina, the NGA's sophisticated surveillance tools, which can create three-dimensional maps, helped first responders identify hospitals, schools and areas where hazardous materials were stored in the Gulf Coast region. And in an unprecedented move, the NGA distributed thousands of unclassified images of stricken areas, via the Internet, to the public. "People could actually see their houses," said retired Air Force Gen. James R. Clapper, the NGA director at the time of Katrina. In an interview with Salon before his appointment in April as undersecretary of defense for intelligence, Clapper said that the NGA's work during the hurricane was "the most graphic example in my 40 years of intelligence of coming to the direct aid of people in extreme circumstances."

The purpose and utility of such intelligence tools in a disaster area, or in a war zone, are clear. But given the Bush administration's highly secretive, aggressive policies in the war on terror, what's to stop the NGA and the NSA from collaborating on other types of real-time surveillance at home?

This past Saturday, Congress approved legislation expanding the ability of the National Security Agency to eavesdrop, without warrants, on telephone calls, e-mail and faxes passing through telecommunications hubs in the United States when the government suspects terrorists may be involved. The legislation, which expands the 1978 Foreign Intelligence Surveillance Act, or FISA, was negotiated between the White House and lawmakers in response to a federal court ruling this summer determining that the NSA's past eavesdropping had violated the law. Mike McConnell, the retired Navy admiral who was appointed last January as the nation's second director of national intelligence, told Congress that the ruling drastically reduced the ability of the NSA to track terrorists, while Bush warned that, because of the ruling, the government was "missing a significant amount of foreign intelligence that we should be collecting to protect our country."

The fear of Democratic leaders that their party might be further accused of being soft on terrorism apparently prompted them to vote for the new FISA legislation -- handing new unilateral surveillance powers to the executive branch while significantly diminishing judicial oversight. Civil liberties groups and lawmakers opposed to the legislation believe the changes will make it easier for the government to spy on U.S. citizens, because the more loosely defined FISA statute now allows warrantless surveillance of people communicating with others who are "reasonably believed to be outside the United States." During the House debate last Saturday night, Rep. Zoe Lofgren, D-Calif., described the bill as an enormous loophole that will grant the attorney general the ability to "wiretap anybody, any place, any time without court review, without any checks and balances."

President Bush signed the measure into law on Sunday.

The NGA, which has a staff of 14,000 and an estimated budget of about $2.5 billion (the actual amount is classified), buys most of its imagery from commercial satellite vendors, but it also relies on highly classified overhead photography captured by the National Reconnaissance Office's fleet of military satellites. According to David H. Burpee, the NGA's director of public affairs, the agency operates under strict oversight rules that ban it from collecting imagery over the United States without a formal request from a "lead" domestic agency coordinating efforts during a disaster. In the case of Katrina, the NGA's assistance was requested by the Federal Emergency Management Administration. In a statement to Salon, Burpee said that the NGA collects intelligence "in accordance with Constitutional law, federal law, and executive policies such as Executive Order 12333." (That order, signed in 1981 by President Reagan, includes a mandate for federal agencies to cooperate with the CIA and other intelligence agencies.) Any questions involving domestic operations would have to be directed to the lead agency requesting NGA support, Burpee added.

It is unclear how the latest changes to FISA might affect other intelligence agencies besides the NSA. But the zeal with which McConnell and Bush pursued the new legislation unbridling the NSA -- which could presumably tap the NGA for assistance with operations at home, just as it does in the war zones -- raises stark questions about the administration's intentions with domestic intelligence.

A close look at the NSA programs suggests that the Bush administration is casting the widest net possible. To date, President Bush and administration officials have acknowledged only a narrow aspect of domestic spying -- referred to as the Terrorist Surveillance Program -- which they admitted, in the wake of media reports, included the warrantless wiretapping of phone calls. But in May 2006, USA Today reported on a program that involved the NSA's gaining access to huge customer databases maintained by AT&T and other telecommunications providers. In another alleged program, discovered by AT&T technician Mark Klein and disclosed in a lawsuit against the telecom provider filed by the Electronic Frontier Foundation, the NSA attached what amounts to an electronic hose to AT&T Internet data lines in San Francisco and other cities and diverted global Internet traffic and phone calls to a special room, where calls and messages were analyzed with powerful computers to find clues to terrorist cells. A Salon report in June 2006 uncovered what appeared to be a nexus for such activity in a secret room at an AT&T facility in St. Louis.

Then, last month, the New York Times disclosed that a dispute in 2003 between the White House and the Justice Department over NSA operations involved a potential fourth program using "computer searches through massive electronic databases" that contained the records of tens of thousands of domestic phone calls and e-mails. McConnell acknowledged multiple programs, albeit without specifics, in a July 31 letter to Arlen Specter, the ranking Republican on the Senate Judiciary Committee. "A number of these intelligence activities were authorized in one order" by Bush shortly after 9/11, McConnell wrote. With regard to the administration's Terrorist Surveillance Program, he added: "This is the only aspect of the NSA activities that can be discussed publicly, because it is the only aspect of those various activities whose existence has been officially acknowledged." Many FISA experts, such as James Dempsey of the Center for Democracy and Technology, have concluded that the NSA was running at least three domestic surveillance programs, including data mining. "I think the TSP was an after-the-fact name given to an activity, or a set of activities, or a whole subset of activities" by the NSA, Dempsey said.

After 9/11, the paradigm for domestic law enforcement shifted radically, by making it the duty of the government to use its intelligence resources to help law enforcement agencies preempt attacks before they happened, beyond the traditional practice of gathering evidence to prove that a crime had already occurred. The idea that the U.S. homeland was now a battleground (or a "theater") first took hold in 2002, when the Pentagon established the U.S. Northern Command in Colorado to provide command and control of military efforts within U.S. borders. Northcom was given two primary responsibilities: providing military security during national emergencies, including terrorist attacks and natural disasters; and protecting important U.S. military bases in the 50 states. As part of the Pentagon's domestic security mission, former Secretary of Defense Donald Rumsfeld created the Counter-Intelligence Field Activity (CIFA) in 2002. But CIFA soon became a weapon against anyone suspected of harboring ill-will against the Bush administration and its policies. CIFA was caught spying on antiwar groups, Quakers and other organizations. Even though Clapper and his boss, Secretary of Defense Bob Gates, have expressed concerns about CIFA's reach, the agency remains an integral part of the Pentagon's counterterrorism efforts.

The link between Pentagon-driven intelligence operations and the homeland was underscored during the Katrina crisis by the NGA's deployment to New Orleans of a special vehicle called a Mobile Integrated Geospatial-Intelligence System, or MIGS, which is loaded with equipment that allows NGA analysts to download intelligence from U-2s and U.S. military satellites. The vehicles were first deployed by the NGA in Iraq and Afghanistan, and later to the Gulf Coast. "They're pretty much the NGA in a Humvee -- very military," said Goolgasian, the NGA official. "But it kind of sticks out like a sore thumb if you're driving into an urban area" in the United States. As a result, the NGA has painted its domestic vehicles blue and renamed them Domestic MIGS, or DMIGS.

Military, intelligence agency and police work is also coming together in numerous "fusion centers" around the country in a joint program run by the Department of Justice and Department of Homeland Security that has received little public attention. At present, there are 43 current and planned fusion centers in the United States where information from intelligence agencies, the FBI, local police, private sector databases and anonymous tipsters is combined and analyzed by counterterrorism analysts. DHS hopes to create a wide network of such centers that would be tied into the agency's day-to-day activities, according to the Electronic Privacy Information Center. The project, according to EPIC, "inculcates DHS with enormous domestic surveillance powers and evokes comparisons with the publicly condemned domestic surveillance program of COINTELPRO," the 1960s program by the FBI aimed at destroying groups on the American political left.

It doesn't take much imagination to see how powerful technologies, when combined with secretive, growing interagency collaboration, could be misused in a domestic context. In recent years many U.S. cities have deployed sophisticated video cameras throughout their downtown areas that track activity 24 hours a day. And U.S. intelligence and law enforcement agencies now have at their disposal facial recognition software that can identify one person among thousands in a large crowd. Combine that with the awesome eavesdropping power of the NSA and the ability of the NGA to capture live imagery from satellites and UAVs, and the result could be an ability to track any individual, in real time, as he or she moves around.

John Pike, the director of GlobalSecurity.org, said the NGA is unlikely to be called upon for surveillance of an individual inside the United States. "NGA imagery is not what you would use to track people," he said. But as the intelligence infrastructure, including the kinds of local camera-surveillance systems that proved so useful in identifying the perpetrators of the London subway bombings, expands in the United States, it raises the specter of a nationwide surveillance web. "These networks are going to get denser and going to cover more area over time," Pike said. "At some point in time somebody's going to drop in an automated face-print recognizer, and then they're off to the races. Anybody who is currently wanted by the authorities, well, there's just going to be parts of the country where such a person could not enter."

The expanding role of U.S. intelligence agencies on the home front raises serious issues, according to Army Lt. Gen. Russel L. Honoré, the commanding general on the scene in the Gulf Coast during Hurricane Katrina. Last fall, during a national conference on geospatial intelligence, he said, "Most of our capability [in the military] is kept on the classified side because that's the best way to fight the enemy." But the situation in the Gulf Coast, as the lines blurred, was complicated by conflicting policy directives. There were some people in government saying, "You're not going to use the intel stuff on us," Honoré recalled, while others were saying just the opposite: "Why aren't you using that intel stuff to tell us what's going on down there?" And then, there were people sitting back, saying, "They can't do that inside the United States," he said, adding, "This is one of the things government has to work out."

In light of the mounting revelations about the Bush administration's domestic spying, civil libertarians no doubt strongly agree.
http://www.salon.com/news/feature/20...urce=whitelist





Reported Drop in Surveillance Spurred a Law
Eric Lichtblau, James Risen and Mark Mazzetti

At a closed-door briefing in mid-July, senior intelligence officials startled lawmakers with some troubling news. American eavesdroppers were collecting just 25 percent of the foreign-based communications they had been receiving a few months earlier.

Congress needed to act quickly, intelligence officials said, to repair a dangerous situation.

Some lawmakers were alarmed. Others, jaded by past intelligence warnings, were skeptical.

The report helped set off a furious legislative rush last week that, improbably, broadened the administration’s authority to wiretap terrorism suspects without court oversight.

It was a surprising victory for the politically weakened White House on an issue that had plodded along in Congress for months without a clear sign of urgency or resolution. A flurry of talk in the last three weeks on intelligence gaps, heightened concern over terrorist attacks, burdensome court rulings and Congress’s recess helped turn the debate from a slow boil to a fever pitch.

For months, Democrats had refused to give the administration new wiretapping powers until the White House agreed to turn over documents about the National Security Agency program to eavesdrop on some Americans’ international communications without warrants.

The White House refused to back down, even after Congressional subpoenas were issued. The administration ultimately attracted the support it needed to amend the Foreign Intelligence Surveillance Act from moderate Democrats who felt pressed to act before the recess.

For the White House and its Republican allies, the decision by the Democratic-controlled Congress to act quickly was critical to safeguarding the country this summer as intelligence officials spoke of increasing “chatter” among Qaeda suspects.

To many Democrats who opposed the action, it was a reflection of fear mongering by the White House, and political capitulation by some fellow Democrats.

“There was an intentional manipulation of the facts to get this legislation through,” said Senator Russ Feingold of Wisconsin, a Democrat on the Intelligence Committee who voted against the plan.

The White House, Mr. Feingold said Friday in an interview, “has identified the one major remaining weakness in the Democratic Party, and that’s its unwillingness to stand up to the administration when it’s making a power grab regarding terrorism and national security.”

“They have figured out that all they have to do is start talking about an imminent terrorist threat, back it up against a Congressional recess, and they know the Democrats will cave,” he added.

Representative Jane Harman, Democrat of California, said the White House “very skillfully played the fear card.”

“With the chatter up in August,” Ms. Harman said, “the issue of FISA reform got traction. Then they ran out the clock.”

A White House official said the push was driven by genuine concerns by Mike McConnell, director of national intelligence, for the government’s ability to conduct terrorist surveillance.

“There was no real argument on the need for a fix” between Democrats and Republicans, the White House official said. “He’s a straight shooter.”

The prelude to approval of the plan occurred in January, when the administration agreed to put the wiretapping program under the oversight of the Foreign Intelligence Surveillance Court. The court is charged with guarding against governmental spying abuses. Officials say one judge issued a ruling in January that allowed the administration to continue the program under the court’s supervision.

A ruling a month or two later — the judge who made it and its exact timing are not clear — restricted the government’s ability to intercept foreign-to-foreign communications passing through telecommunication “switches” on American soil.

The security agency was newly required to seek warrants to monitor at least some of those phone calls and e-mail messages. As a result, the ability to intercept foreign-based communications “kept getting ratcheted down,” said a senior intelligence official who insisted on anonymity because the account involved classified material. “ We were to a point where we were not effectively operating.”

Mr. McConnell, lead negotiator for the administration in lobbying for the bill, said in an interview that the court’s restrictions had made his job much more difficult.

“It was crazy, because I’m sitting here signing out warrants on known Al Qaeda operatives that are killing Americans, doing foreign communications,” he said. “And the only reason I’m signing that warrant is because it touches the U.S. communications infrastructure. That’s what we fixed.”

In April, Mr. McConnell began talking with lawmakers in classified meetings about that “intelligence gap” and alluded to it publicly, too. At the time, the administration proposed sweeping measures to “modernize” the foreign surveillance law, a much broader proposal in some respects than what Congress approved.

The proposal was considered dead on arrival by some Democrats, who argued that the administration was overreaching and asking Congress to legislate blindly without access to documents on the legal history and operations of the program.

Attorney General Alberto R. Gonzales’ s political problems, including questions about truthfulness in testimony on the eavesdropping, helped stall any action, in part because the administration wanted him to have oversight of the broadened wiretapping authorities.

When the administration proposed its revisions in April, “everyone kind of laughed at us,” said a Justice Department official who insisted on anonymity. “We got bludgeoned. People just said: ‘Are you kidding? We’re not even going to consider it.’ ”

The administration’s classified briefings on the “intelligence gap” grew more urgent. In May, members of the Intelligence Committees began hearing about specific cases in which eavesdroppers could not intercept certain communications, said Representative Heather A. Wilson, Republican of New Mexico.

By June and early July, Ms. Wilson said Friday in an interview, the scope of what intelligence officials were missing had grown “frighteningly large.”

“I begged my colleagues to act,” she said. “They did nothing for six weeks. They weren’t going to act unless they were forced to. So we started raising the pressure.”

Some Democrats reacted skeptically to the closed-door briefings by Mr. McConnell and other intelligence officials. Intelligence Committee members acknowledged that they learned in May that the secret court ruling had caused some problems, but it was not until last month that the administration reported the gaps.

“They changed that story,” a Democratic Congressional aide said, amid talk about a backlog in warrant applications.

By mid-July, Mr. McConnell’s briefings, coupled with the release of a new National Intelligence Estimate on terrorism, set the tone for a series of talks between the White House and Mr. McConnell’s office and Democratic Congressional leaders.

After learning of the intelligence problems, Senator John D. Rockefeller IV, Democrat of West Virginia and chairman of the Senate Intelligence Committee, contacted the White House to discuss repairing them. On July 12, the White House chief of staff, Joshua B. Bolten, discussed the problem with the Senate majority leader, Harry Reid of Nevada, a senior White House official said.

At first, some Democratic leaders favored amending the surveillance law in September. Mr. McConnell pressed for an immediate repair.

Two weeks later, the administration lowered its sights, slimming its original 66-page proposal to 11 pages and eliminating some of the controversial plans like broad immunity from lawsuits for telecommunications companies that aided eavesdropping.

Congressional Democrats effectively agreed to try to forge a narrow bill to address the foreign problem that Mr. McConnell identified. But they were at odds over a critical detail, the court oversight.

Democratic leaders did not demand that the security agency seek individual court warrants for eavesdropping. But they did want the court to review and approve the agency procedures soon after surveillance began.

The administration, however, wanted the attorney general and the director of national intelligence to approve the surveillance, with the court weighing in just to certify that no abuses occurred, and only long after the surveillance had been conducted.

The talks intensified in the days before the recess last weekend, highlighted by proposals and counterproposals in calls between Mr. McConnell and the Democratic leadership.

By Aug. 2, the two sides seemed relatively close to a deal. Mr. McConnell had agreed to some increased role for the secret court, a step that the administration considered a major concession, the White House and Congressional leaders said.

But that night, the talks broke down. With time running out, the Senate approved a Republican bill that omitted the stronger court oversight. The next day, the House passed the bill.
http://www.nytimes.com/2007/08/11/wa.../11nsa.html?hp





Gingrich Calls War on Terror "Phony"

ABC News' Joe Kildea Reports: Newt Gingrich, former Republican House Speaker, called the war on terror "phony" in a speech to a group of young conservatives in Washington, D.C. on Thursday.

The potential GOP presidential candidate told attendees of the National Conservative Student Conference that "We’re about to enter the seventh year of this phony war…and we’re losing."

Gingrich added, "None of you should believe we are winning this war. There is no evidence that we are winning this war."

Instead of the current strategy to fight terrorism, Gingrich said we should focus on energy independence. "We have to have a national energy strategy, which basically says to the Saudis, 'We’re not going to rely on you.'"

Gingrich also attacked the current administration and former Republican Congressional leadership in saying "We were in charge for six years…I don’t think you can look and say that was a great success."

In a recent ABC News/Washington Post poll, Gingrich received 7 percent support for the Republican presidential nomination, putting him fifth, just behind former Massachusetts Governor, Mitt Romney. While speaking to the Aspen Institute on Friday, Gingrich did not rule out an '08 White House run.

"If at some point down the road there is so much pressure for me to run, I will run. But I have zero interest in being one of 12 people given 30 seconds to answer non-questions," he said.

The National Conservative Student Conference is an annual event for college students sponsored by the Young America's Foundation held at Washington's George Washington University.
http://blogs.abcnews.com/politicalra...ch-calls-.html





Court Rules Against FBI for Raiding Jefferson's Congressional Office; Lawyer Promises to Clear Indicted Rep.'s Name
Michael Roston

A district court ruled that the Federal Bureau of Investigation's 2006 raid of the Congressional office of embattled Louisiana Democratic Representative William Jefferson was unconstitutional. The court will also require the FBI to return all privileged materials seized to Jefferson.

"The review of the Congressman's paper files when the search was executed exposed legislative material to the Executive," according to the ruling from the US Appeals Court for the District of Columbia Circuit, reports AP's Matt Apuzzo.

Jefferson was indicted in June on 16 counts stemming from a public corruption investigation. He pleaded not guilty on all charges, and his trial is set for January 2008.

The FBI referred all questions to the Justice Department, which had not yet replied at press time.

Jefferson's attorney expressed his satisfaction with the ruling in a statement released to RAW STORY.

"We are pleased with the DC Circuit’s ruling that the unprecedented search conducted by the FBI violated Congressman Jefferson’s rights under the Speech or Debate clause of the United States Constitution," Trout stated. "[T]he court ruled that the Congressman had an absolute right to review his records first and shield privileged legislative material from review by the executive branch."

Trout went on to take a shot at the Justice Department, implying that it had broken the law.

"Today’s opinion underscores the fact that the Department of Justice is required to follow the law, and that it is bound to abide by the Constitution," he said.

And, he made it clear that Jefferson had no plan to back down, stating that, "We are confident that as this case moves forward, and when all of the facts are known, we will prevail again and clear Congressman Jefferson’s name."
http://rawstory.com/news/2007/Court_...ding_0803.html





Citing Four-Day Old Surveillance Law, Bush Seeks Dismissal of Lawsuit Challenging NSA Spying
David Kravets

Four days after President Bush signed controversial legislation legalizing some warrantless surveillance of Americans, the administration is citing the law in a surprise motion today urging a federal judge to dismisss a lawsuit challenging the NSA spy program.

The lawsuit was brought by lawyers defending Guantanamo Bay prisoners. The lawyers and others alleged the threat of surveillance is chilling their First Amendment rights of speech, and their clients' right to legal representation.

Justice Department lawyers are asking (.pdf) U.S. District Judge Vaughn Walker to toss the case, citing the new law -- which says warrantless surveillance can continue for up to a year so long as one person in the intercepted communications is reasonably believed to be located outside of the United States.

The motion is set to be heard in federal court in San Francisco this afternoon. THREAT LEVEL will be there.

The government said the new Protect America Act of 2007 requires the government to notify the secret Foreign Intelligence Surveillance Court "as soon as practicable" when somebody is being spied upon, but does not require its immediate authorization.

The government has maintained all along that electronic eavesdropping was legal, and said the newest legislation provides "an additional basis for dismissal."

The Center for Constitutional Rights, the plaintif in the lawsuit, is expected to argue today that the new law violates the Fourth Amendment's requirement that judges approve warrants for surveillance.

"Congress has ceded further power to an administration that has done nothing but abuse its power and betray the trust of the American people, center attorney Shayana Kadidal said. "Congress has given the president and attorney general virtually uncheckmed power to spy on international calls of Americans without any oversight or accountability from the courts."

Cindy Cohn, director of the Electronic Frontier Foundation, said the latest legislation does not apply to another eavesdropping case in which her group accuses AT&T of cooperating with the National Security Agency to make all communications on AT&T networks available to the spy agency without warrants. That case will be argued before the San Francisco-based 9th U.S. Circuit Court of Appeals on Thursday.

"This new law does not apply to this dragnet style of eavesdropping, and if it did, it's not retroactive," Cohn said.
http://blog.wired.com/27bstroke6/200...-four-day.html





Scan This Guy's E-Passport and Watch Your System Crash
Kim Zetter

A German security researcher who demonstrated last year that he could clone the computer chip in an electronic passport has revealed additional vulnerabilities in the design of the new documents and the inspection systems used to read them.

Lukas Grunwald, an RFID expert who has served as an e-passport consultant to the German parliament, says the security flaws allow someone to seize and clone the fingerprint image stored on the biometric e-passport, and to create a specially coded chip that attacks e-passport readers that attempt to scan it.

Grunwald says he's succeeded in sabotaging two passport readers made by different vendors by cloning a passport chip, then modifying the JPEG2000 image file containing the passport photo. Reading the modified image crashed the readers, which suggests they could be vulnerable to a code-injection exploit that might, for example, reprogram a reader to approve expired or forged passports.

"If you're able to crash something you are most likely able to exploit it," says Grunwald, who's scheduled to discuss the vulnerabilities this weekend at the annual DefCon hacker conference in Las Vegas.

E-passports contain radio frequency ID, or RFID, chips that are supposed to help thwart document forgery and speed processing of travelers at U.S. entry points. The United States led the charge for global e-passports because authorities said the chip, which is digitally signed by each issuing country, would help distinguish official documents from forged ones.

But Grunwald demonstrated last year at the BlackHat security conference how he could extract the data on a passport chip, which is read-only, and clone it to a read-write chip that appears the same to an e-passport reader. Now Grunwald says he was able to add data to the cloned chip that would allow someone to attack the passport reader.

He conducted the attack by embedding a buffer-overrun exploit inside the JPEG2000 file on the cloned chip that contains the passport photo. Grunwald says he tested his exploit on two passport readers that were on display at a security conference he attended.

Buffer-overrun vulnerabilities occur when coding errors in software allow an attacker to overflow a section of memory dedicated to storing a fixed amount of data. Carefully exploited, they often permit the hacker to execute his own instructions on the vulnerable computer, essentially taking over the device -- though Grunwald has not attempted that level of compromise on e-passport readers.

If a reader could be compromised using Grunwald's technique, it might be reprogrammed to misreport an expired passport as a valid one, or even -- theoretically -- to attempt a compromise of the Windows-based border-screening computer to which it is connected.

He won't name the vendors that make the readers he crashed, but says the readers are currently in use at some airport entry points. He says there's no reason to believe that readers made by other vendors would be any more secure.

"I predict that most of the vendors are using off-the-shelf (software) libraries for decoding the JPEG2000 images (on passports)," which means they would all be vulnerable to exploit in a similar manner.

A second vulnerability in the design of the passport chip would allow someone to access and clone a passport holder's fingerprint.

The International Civil Aviation Organization, the United Nations body that developed the standards for e-passports, opted to store travelers' fingerprints as a digital photo, no different than if you were to press the tabs of your fingers against a flatbed scanner. As a result, it's possible to seize the image and use it to impersonate a passport holder by essentially hijacking their fingerprints. Japanese researchers several years ago demonstrated the ability to make false fingerprints using gelatin material that could be placed over a finger.

To access any data on the passport, the attacker would need to unlock it using a machine-readable code printed on the passport's face. Additionally, the International Civil Aviation Organization recommends that issuing countries protect biometric data on the e-passport with an optional feature known as Extended Access Control, which protects the biometric data on the chip by making readers obtain a digital certificate from the country that issued the passport before the equipment can access the information.

That certificate is only valid for a short period of time, but the chips contain no onboard clock to handle the digital certificate's expiration, which makes them vulnerable as well, says Grunwald. "It's a basic mistake," he says.

The U.S. State Department had no immediate comment Tuesday. Grunwald's DefCon talk, "First We Break Your Tag, Then We Break Your Systems," is scheduled for Friday.
http://www.wired.com/politics/securi...7/08/epassport





Microchips in Humans: High-Tech Helpers or Big Brother Surveillance?
AP

CityWatcher.com, a provider of surveillance equipment, attracted little notice itself -- until a year ago, when two of its employees had glass-encapsulated microchips with miniature antennas embedded in their forearms.

Sean Darks, the chief executive of Citywatcher.com, points to the VeriChip implant he has in his arm.

The "chipping" of two workers with RFIDs -- radio frequency identification tags as long as two grains of rice, as thick as a toothpick -- was merely a way of restricting access to vaults that held sensitive data and images for police departments, a layer of security beyond key cards and clearance codes, the company said.

"To protect high-end secure data, you use more sophisticated techniques," Sean Darks, chief executive of the Cincinnati-based company, said. He compared chip implants to retina scans or fingerprinting. "There's a reader outside the door; you walk up to the reader, put your arm under it, and it opens the door."

Innocuous? Maybe.

But the news that Americans had, for the first time, been injected with electronic identifiers to perform their jobs fired up a debate over the proliferation of ever-more-precise tracking technologies and their ability to erode privacy in the digital age.
To some, the microchip was a wondrous invention -- a high-tech helper that could increase security at nuclear plants and military bases, help authorities identify wandering Alzheimer's patients, allow consumers to buy their groceries, literally, with the wave of a chipped hand.

To others, the notion of tagging people was Orwellian, a departure from centuries of history and tradition in which people had the right to go and do as they pleased without being tracked, unless they were harming someone else.

Chipping, these critics said, might start with Alzheimer's patients or Army Rangers, but would eventually be suggested for convicts, then parolees, then sex offenders, then illegal aliens -- until one day, a majority of Americans, falling into one category or another, would find themselves electronically tagged.

Thirty years ago, the first electronic tags were fixed to the ears of cattle, to permit ranchers to track a herd's reproductive and eating habits. In the 1990s, millions of chips were implanted in livestock, fish, pets, even racehorses.

Microchips are now fixed to car windshields as toll-paying devices, on "contactless" payment cards (Chase's "Blink," or MasterCard's "PayPass"). They're embedded in Michelin tires, library books, passports and, unbeknownst to many consumers, on a host of individual items at Wal-Mart and Best Buy.

But CityWatcher.com employees weren't appliances or pets: They were people, made scannable.

"It was scary that a government contractor that specialized in putting surveillance cameras on city streets was the first to incorporate this technology in the workplace," says Liz McIntyre, co-author of "Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID."

Darks, the CityWatcher.com executive, said his employees volunteered to be chipped. "You would think that we were going around putting chips in people by force," he told a reporter, "and that's not the case at all."

Implants in humans spark outrage

Yet, within days of the company's announcement, civil libertarians and Christian conservatives joined to excoriate the microchip's implantation in people.

"Ultimately," says Katherine Albrecht, a privacy advocate who specializes in consumer education and RFID technology, "the fear is that the government or your employer might someday say, 'Take a chip or starve."'

Some critics saw the implants as the fulfillment of a biblical prophecy that describes an age of evil in which humans are forced to take the "Mark of the Beast" on their bodies, to buy or sell anything. Others saw it as a big step toward the creation of a Big-Brother society.

"We're really on the verge of creating a surveillance society in America, where every movement, every action -- some would even claim, our very thoughts -- will be tracked, monitored, recorded and correlated," says Barry Steinhardt, director of the Technology and Liberty Program at the American Civil Liberties Union in Washington D.C.

In design, the tag is simple: A medical-grade glass capsule holds a silicon computer chip, a copper antenna and a "capacitor" that transmits data stored on the chip when prompted by an electromagnetic reader.

Implantations are quick, relatively simple procedures. After a local anesthetic is administered, a large-gauge, hypodermic needle injects the chip under the skin on the back of the arm, midway between the elbow and the shoulder.

John Halamka, an emergency physician at Beth Israel Deaconess Medical Center in Boston, Massachusetts, got chipped two years ago, "so that if I was ever in an accident, and arrived unconscious or incoherent at an emergency ward, doctors could identify me and access my medical history quickly." (A chipped person's medical profile can be continuously updated, since the information is stored on a database accessed via the Internet.)

Hazards and benefits

But it's also clear to Halamka that there are consequences to having an implanted identifier. "My friends have commented to me that I'm 'marked' for life, that I've lost my anonymity. And to be honest, I think they're right."

Indeed, as microchip proponents and detractors readily agree, Americans' mistrust of microchips and technologies like RFID runs deep. Many wonder:

Do the current chips have global positioning transceivers that would allow the government to pinpoint a person's exact location, 24-7? (No; the technology doesn't yet exist.)

But could a tech-savvy stalker rig scanners to video cameras and film somebody each time they entered or left the house? (Quite easily, though not cheaply. Currently, readers cost $300 and up.)

What's the average lifespan of a microchip? (About 10-15 years.) What if you get tired of it before then -- can it be easily, painlessly removed? (Short answer: No.)

How about thieves? Could they make their own readers, aim them at unsuspecting individuals, and surreptitiously pluck people's IDs out of their arms? (Yes. There's even a name for it -- "spoofing.")

The company that makes implantable microchips for humans, VeriChip Corp., of Delray Beach, Florida, concedes that's a problem -- even as it markets its radio tag and its portal scanner as imperatives for high-security buildings, such as nuclear power plants.

"To grab information from radio frequency products with a scanning device is not hard to do," Scott Silverman, the company's chief executive, says. However, "the chip itself only contains a unique, 16-digit identification number. The relevant information is stored on a database."

VeriChip Corp., whose parent company has been selling radio tags for animals for more than a decade, has sold 7,000 microchips worldwide, of which about 2,000 have been implanted in humans.

The company's present push: tagging of "high-risk" patients -- diabetics and people with heart conditions or Alzheimer's disease.

In an emergency, hospital staff could wave a reader over a patient's arm, get an ID number, and then, via the Internet, enter a company database and pull up the person's identity and medical history.

To doctors, a "starter kit" -- complete with 10 hypodermic syringes, 10 VeriChips and a reader -- costs $1,400. To patients, a microchip implant means a $200, out-of-pocket expense to their physician. Presently, chip implants aren't covered by insurance companies, Medicare or Medicaid.

For almost two years, the company has been offering hospitals free scanners, but acceptance has been limited. According to the company, 515 hospitals have pledged to take part in the VeriMed network, yet only 100 have actually been equipped and trained to use the system.

Some wonder why they should abandon noninvasive tags such as MedicAlert, a low-tech bracelet that warns paramedics if patients have serious allergies or a chronic medical condition.

"Having these things under your skin instead of in your back pocket -- it's just not clear to me why it's worth the inconvenience," says Westhues.

Silverman responds that an implanted chip is "guaranteed to be with you. It's not a medical arm bracelet that you can take off if you don't like the way it looks..."

In fact, microchips can be removed from the body -- but it's not like removing a splinter.

The capsules can migrate around the body or bury themselves deep in the arm. When that happens, a sensor X-ray and monitors are needed to locate the chip, and a plastic surgeon must cut away scar tissue that forms around the chip.

The relative permanence is a big reason why Marc Rotenberg, of the Electronic Privacy Information Center, is suspicious about the motives of the company, which charges $20 a year for customers to keep one its database a record of blood type, allergies, medications, driver's license data and living-will directives. For $80 a year, it will keep an individual's full medical history.
http://www.cnn.com/2007/TECH/science....ap/index.html





Congressman Slams Yahoo's "Despicable Practice" in China, Vows to Investigate
Nate Anderson

This can't be good news for Yahoo: the head of the House Foreign Affairs Committee is now calling the company's actions in China "despicable" and promises that his staffers will investigate whether a senior vice president from the company misled Congress in testimony last year.

In a strongly-worded statement, Rep. Tom Lantos (D-CA) condemned Yahoo's decision to turn over the e-mails of journalist Shi Tao to Chinese authorities, but he was even more upset about a recent news story indicating that Yahoo did in fact have some knowledge about the focus of the investigation. Yahoo senior vice president and general counsel Michael Callahan told Congress last year that the company "has no information about the nature of the investigation."

The human rights group Dui Hui revealed that Yahoo did know the case was about "providing state secrets to foreign entities," a charge that they claim is routinely brought against dissidents and democracy advocates. Partially as a result of the e-mails turned over by Yahoo, Shi Tao was sentenced to 10 years in prison. He has now joined a US lawsuit against Yahoo over the issue.

"Covering up such a despicable practice when Congress seeks an explanation is a serious offense," said Lantos. "For a firm engaged in the information industry, Yahoo sure has a lot of secrecy to answer for. We expect to learn the truth, and to hold the company to account."

Reporters Without Borders praised Lantos' statement, saying, "Yahoo's confused statements must finally be clarified. It is time the US corporation recognized its mistakes and accepted the consequences." According to Dui Hua, Yahoo has been identified as playing a verified role in at least four cases in China. In each case, the government obtained a conviction.

Lantos promised to put his committee staff to work investigating the issue but stopped short of saying that he would hold additional hearings or would call Yahoo executives back to testify.

Yahoo is conceding no ground in the war of words, though. Jim Cullinan, a company spokesman, tells Ars that Yahoo's testimony was truthful and that it will work with Lantos' investigation into the matter. "Yahoo! has been candid about the challenges of doing business in markets like China, including where local subsidiaries of U.S. companies must comply with local laws," Cullinan said. "We believe deeply in human rights, and our senior executives have condemned punishment of any activity internationally recognized as free expression, whether in China or anywhere else in the world."
http://arstechnica.com/news.ars/post...vestigate.html





Inspector General Finds Lax Computer Security by IRS Employees
Jim Abrams

IRS employees ignored security rules and turned over sensitive computer information to a caller posing as a technical support person, according to a government study.

Sixty-one of the 102 people who got the test calls, including managers and a contractor, complied with a request that the employee provide his or her user name and temporarily change his or her password to one the caller suggested, according to the Treasury Inspector General for Tax Administration, an office that does oversight of Internal Revenue Service.

The caller asked for assistance to correct a computer problem.

The report said that by failing to question the identity of the caller the employees were putting the IRS at risk of providing unauthorized people access to taxpayer data that could be used for identity theft and other fraudulent schemes.

“This is especially disturbing because the IRS has taken many steps to raise employee awareness of the importance of protecting their computers and passwords,” said Inspector General J. Russell George.

Only eight of the 102 employees contacted either the inspector general's office or IRS security offices to validate the legitimacy of the caller.

The report said the IRS took measures to improve security after two similar test telephone calls in 2001 and 2004. “However, the corrective actions have not been effective,” it said.

The IRS agreed with recommendations from the inspector general that it should take steps to make employees more aware of hacker tactics such as posing as an internal employee and to remind people to report such incidents to security officials.

The IRS has nearly 100,000 employees and contractors with access to tax return information processed on about 240 computer systems and more than 1,500 databases.
http://www.signonsandiego.com/news/n...rsecurity.html





Stolen Yale Computers had Thousands of Social Security Numbers
AP

Two computers stolen from Yale University last month contained the Social Security numbers of about 10,000 current and former students and about 200 faculty and staff members, university officials said Wednesday.

Yale officials said they notified those affected, but have not received any reports that the data on the stolen machines have been misused.

"As it explained in the notification letters, the university does not believe that this incident presents a significant danger of identity theft because the crime was almost certainly aimed at obtaining hardware for sale — not at exploiting the data that were on the computers," Yale said in a statement. "Moreover, both of the computers were password-protected, and one was protected by multiple password levels, which would require considerable computer savvy to bypass."

The computers and other electronic equipment were stolen July 17 from the Yale College Dean’s Office. No arrests have been made, said university spokesman Tom Conroy.

Yale reconstructed the computers’ files from backup tapes and discovered a group of files that listed the names and Social Security numbers of about 10,000 current and former students and about 200 current and former members of the faculty and staff.

Yale ceased using Social Security numbers for student identification purposes in June 2005, but the files predated that change in policy. Neither of the machines contained financial account information.

The university has set up a response team to answer questions and deal with any issues that might arise.

"Yale takes the protection of personal information very seriously and regrets any possibility that such information would be exposed," the university said. "The university is taking additional measures to ensure that residual files containing Social Security numbers, such as the files on the stolen computer, are eliminated or encrypted."
http://news.newstimes.com/news/updat...e=news_updates





Privacy Winning Search Engine War
Vidura Panditaratne

Privacy is emerging as the real winner of the Internet search engine war as companies aggressively compete with one another by offering stronger protections for user records, a report published today by the Center for Democracy and Technology (CDT) concluded.

The report notes that until recently, most of the major Internet search engines kept detailed and potentially personally identifiable records of their customers' searches for as indefinitely.

But today the companies are trying to outdo each other in privacy protection by announcing steps to delete old user data, strip the personally identifiable information out of stored search records, and, in one case, give users the option to have all of their search records deleted.

CDT's Search Privacy Practices report details and compares the revamped privacy policies of the five largest search providers Google, Yahoo!, Microsoft, Ask.com and AOL while offering recommendations for both the industry and lawmakers for how to strengthen privacy protections even further.

"We hope this signals the emergence of a new competitive marketplace for privacy," CDT President Leslie Harris said. "By themselves, these recent changes represent only a small step toward providing users the full range of privacy protections they need and deserve, but if this competitive push continues it can only stand to benefit consumers."

The report acknowledges that there are legitimate reasons for companies to retain some search records for a limited time, but recommends that companies continue to actively seek new ways to give users greater control over their personally identifiable data.

The report also argues that industry self-regulation, while vital, is only one part of the solution.

"It's encouraging to see the nation's largest Internet companies taking search privacy seriously," said CDT Deputy Director Ari Schwartz. "Now it's time for Congress to do its part by passing a robust federal law that brings our consumer privacy protections up to the level that users expect."
http://pressesc.com/news/97208082007...rch-engine-war





Search Google Anonymously:
WebBlurb

When you make a search on Google, your ip address, the time, and what you searched for is stored in their database forever and this information can be used in a court of law against you. Google will willingly allow authorities to consult their database, they already did as you can see in the video below. When you search on Google through Googlonymous, it is Googlonymous that goes on Google and does the search for you, the only ip address that Google will see, is the ip address of the server of Googlonymous. Googlonymous does not keep any record who searched for what. So this way, it is completely impossible to retrieve your identity. You can search for whatever you want without a care in the world, 100% anonymously.

Click play on the video below to see a fascninating documentary showing the dangers of searching on Google.
http://googlonymous.com/





NEC and Hitachi Team to Water-Cool Hard Drives
Todd Haselton

Score one for water-cooling fanatics. NEC and Hitachi just announced a partnership focused on developing a liquid cooling system for hard drives. Let's take a look at how liquid cooling typically works, why it's attractive, and how Hitachi and NEC plan to liquid cool a hard drive.

In most run-of-the-mill liquid cooling kits, water is pumped across a cooling plate that's clamped on top of a CPU, much like a standard CPU fan is. The water is pumped across the plate, which is filled with mini-ridges to help dissipate the heat, and then out through another hose, also attached to the plate. From here, the now-warmed liquid travels up to a reservoir, then to a radiator with fans that cools the liquid down and sends it back across the processor again. It's a relatively simple process, and some water-cooling fanatics also choose to water-cool their video cards. But what's the allure to water-cooling?

Hitachi and NEC are developing the water-cooled hard drive systems for desktop computers mainly to reduce noise levels to 25 decibels, 5 decibels quieter than a whisper. To do this, NEC and Hitachi actually wrap the hard drive in "noise absorbing material and vibration insulation." Further, the companies have chosen to use a low-speed radiator fan to keep decibel levels down in the radiator also. Creating a quieter hard drive isn't the only focus though, as the companies also hope to keep the hard drives cooler.

According to Hitachi and NEC, the cooling cold plate they're planning to use is the most efficient plate ever used for heat conduction, which means they'll be able to cool the hard drives quicker and more efficiently. The cooling plate technology uses a series of fine ridges, similar to the ones in CPU cooling plates, that are just 0.09mm in width, and through which anti-freeze liquid will travel. Since water-cooling technology is relatively old, we imagine Hitachi and NEC set out to create a quieter hard drive, and the best way to achieve this was to wrap it in the noise-absorbing material. Since that material likely heated the drives more, the most practical option was to water-cool the drives.
http://arstechnica.com/news.ars/post...rd-drives.html





Can You Hear Me NOW?

115 Calls To Verizon, And FIOS Still Doesn't Work

Poor Jason. Eight months after ordering Verizon FIOS, he is still without decent phone, television, or internet service, though not for lack of effort on his part:

I have spoken with 115 service representatives and 44 supervisors over a period 64 hours combined on the phone with Verizon. I have been hung up on 37 times, placed on hold a total of 21 hours, and been promised callbacks, which I did not receive, a total of 18 times. It has been 8 months since I ordered the service, and I still have not been given a single resolution.

My story starts back in December of 2006, when I moved into a house with a Verizon FIOS ONT present on the back of my home. I looked up the current offerings on the FIOS website and decided to go with the three in one (Phone, 15/5 Internet, TV) one bill package. What I've gotten is not remotely what was ordered, and has cost me greatly in time, money, and patience.

I have spoken with 115 service representatives and 44 supervisors over a period 64 hours combined on the phone with Verizon. I have been hung up on 37 times, placed on hold a total of 21 hours, and been promised callbacks, which I did not receive, a total of 18 times. It has been 8 months since I ordered the service, and I still have not been given a single resolution.

I have tried to cancel my service, only to be promised a prompt resolution by another supervisor, who told me to not worry about the billing issues until I received a correct bill will all three services included on one bill. That was a month and a half ago. Yesterday I received two bills, one for my phone service, with a credit of $189.00, and an Internet / TV bill with a balance of $1,195.00. Then, as I walked in the door from checking my mail, the TV service is disconnected.

To date, I have never, not once, had the long distance service I requested, nor call waiting. It took one and a half months to get a working dial tone, which had nothing to do with the premises, it was "simply an account flag that had not been set". My HDTV channels are not the ones I ordered. My internet service is constantly up and down, requiring a daily reboot of the ActionTec wireless router supplied by Verizon.

I've gone to the Attorney General, the BBB, and now I'm going to the Consumerist. If my services are not repaired / corrected / or removed with a refund of all money paid to Verizon since December, I will be taking this matter to small claims court.
When escalating forty-four times still fails to produce results, sue. Before filing, try launching the feared Executive Email Carpet Bomb to warn the Verizon suits that their telecommunications empire is about to dance the small claims tango.
http://consumerist.com/consumer/can-...ork-287336.php





Pearl Jam Censored by AT&T, Calls for a Neutral 'Net
Nate Anderson

A bit of heavy-handed censorship of a Pearl Jam concert by AT&T this weekend led the band to fire off an open letter to fans—a letter in which Pearl Jam railed against media and ISP consolidation and called for readers to support network neutrality.

The incident happened during a Lollapalooza webcast over at AT&T's "Blue Room" media showcase. Pearl Jam's performance of their big 90's hit "Daughter" morphed into the melody from Pink Floyd's "The Wall," and Eddie Vedder served up a pair of anti-Bush lyrics to the tune. "George Bush, leave this world alone," he sang. "George Bush, find yourself another home."

Fans at the event got to hear the words in all their glory, but in the webcast, the lines were censored—AT&T made the decision to silence them, apparently believing that they would prove offensive to listeners. When Pearl Jam found out about the censorship, the band posted a strongly-worded message on its web site.

"This, of course, troubles us as artists but also as citizens concerned with the issue of censorship and the increasingly consolidated control of the media," wrote the band. "What happened to us this weekend was a wake-up call, and it's about something much bigger than the censorship of a rock band."

In Pearl Jam's view, it's a wake-up call for network neutrality advocates. The same sort of censorship could take place on any Internet content, and what could be done about it an a world where the only real option is... the cable company?
The fallout

Public interest groups agree and are already chiming in on the incident. Public Knowledge points out all the ways that AT&T has gotten into the content filtering business. "AT&T is really getting into its role as content nanny in a big way. First, it starts monitoring all sorts of conversations for the National Security Agency," writes Art Brodsky. "Then it promises to work with the movie studios and NBC to come up with some super software to tag copyrighted material that flows through its network, regardless of how that content is used. Now it puts 'content monitors' on its Webcasts."

Save the Internet, a vocal proponent of network neutrality in DC, sent a statement to Ars that reads, in part, "The moral of this story is put Net Neutrality permanently into law and never trust AT&T at their word. The company acts in bad faith toward the public interest and will do whatever it can to pad it's bottom line—including sacrificing its users' freedom to choose where they go, what they watch, and whom they listen to online."

AT&T sees things a bit, well, differently. Company spokesperson Brad Mays tells Ars Technica that the company does monitor broadcasts for profanity, as Blue Room is available to all ages, but that the censorship was a "mistake by a webcast vendor and contrary to our policy. We have policies in place with respect to editing excessive profanity, but AT&T does not edit or censor performances."

The company especially objects to making this incident part of a larger rallying cry for network neutrality, and we can see their point. This wasn't the company monitoring, degrading, or censoring someone else's content flowing across its IP networks; it was an act of content censorship of AT&T's own programming. It's much like the censorship that routinely takes place on television, and "network neutrality" enters the picture only because this particular show was streamed over the 'Net.

But as the Internet becomes a vital communications pipe into the home, network neutrality and traditional concerns over media concentration are becoming intertwined. FCC Commissioner Michael Copps recently drew a parallel between media consolidation and network neutrality because both traditional media and Internet access lines are increasingly owned by a few massive corporations. Given that level of control, Copps believes that safeguards are needed to make sure that people can continue to access a wide variety of viewpoints and information.

Pearl Jam appears to feel the same way. "AT&T's actions strike at the heart of the public's concerns over the power that corporations have when it comes to determining what the public sees and hears through communications media," they write.
http://arstechnica.com/news.ars/post...utral-net.html





Has AT&T Censored Artists Before?
Eliot Van Buskirk

Amid allegations that AT&T censored a Pearl Jam show on Sunday comes an accusation that AT&T's Blue Room series has removed artists' political statements from its webcasts in the past. The company has to delete profanity during the all ages shows, but apologized for deleting Eddie Vedder's anti-Bush sentiments: "We're upset too, and embarrassed by this mistake which is totally against our policy -- of never, ever censoring political speech."

However, an email sent this morning to Wired News, the Chicago Sun Times, the LA Times, and the Wall Street Journal alleges that AT&T censored the Flaming Lips and the John Butler Trio during previous webcasts:

"I read your article about this and it makes me so angry that AT&T say this is a one time mistake.

"They did the same thing on the webcasts from Bonnaroo in June during the John Butler Trio show when he was talking about the lack of response from our government during Katrina, and also during the Flaming Lips show when the lead singer was talking about how much George Bush had screwed up. I was at both of those live shows and saw the webcasts later. The sound did not cut out at any other time - only when someone was talking about George Bush or the goverment in a negative way.

"It was not a mistake, it is full out censorship."

I have calls in to management for the John Butler Trio and the Flaming Lips, and have asked AT&T for a response verbally and via email, and will hopefully be able to confirm or deny this soon (neither show is still posted on the site).

In the meantime, if you saw either show online or in person and remember the political opinions being included or not, please leave a comment.
http://blog.wired.com/music/2007/08/...t-censore.html





Federal Effort on Web Obscenity Shows Few Results
Neil A. Lewis

Tom Rogers, a retired Indianapolis detective, toils away most days in his suburban home office reviewing sexual Web sites and other Internet traffic to see whether they qualify as obscene material whose purveyors should be prosecuted by the Justice Department.

His work is financed by a Justice Department grant initially provided through a Congressional earmark inserted into a spending bill by Representative Frank R. Wolf, Republican of Virginia.

The grant, about $150,000 a year, has helped pay for Mr. Rogers and another retired law enforcement officer in Reno, Nev., to harvest and review complaints about obscene matter on the Internet that citizens register on the Justice Department Web site.

In the last few years, 67,000 citizens’ complaints have been deemed legitimate under the program and passed on to the Justice Department and federal prosecutors.

The number of prosecutions resulting from those referrals is zero.

That may help explain why no one — not Justice Department officials, not Mr. Wolf, not even the religious antipornography crusader who runs the program — seems eager to call the project a shining success.

The department Web site invites citizens to report material that they believe is obscene so it can be investigated and, perhaps, prosecuted. Clicking on the site to make a report takes the user to ObscenityCrimes.org, which is run by Morality in Media, the grant recipient.

Morality in Media is a conservative religious group that has worked since 1962 to “rid the world of pornography” and whose headquarters is, improbably, on the Upper West Side of Manhattan.

Morality in Media has received two annual grants from Mr. Wolf’s earmarks and is hoping that Justice Department officials decide on their own to award a third, as Mr. Wolf’s ability to obtain an earmark for the program has apparently waned with the Democrats’ control of Congress.

Department officials, however, seemed less than keen to talk about ObscenityCrimes.org. Spokesmen for the criminal division said officials there had nothing to do with the program, which they had been obliged to start because of the earmark.

In the seven years of the Bush administration, the department has prosecuted about 24 obscenity cases, several centered on film producers who failed to keep proper records showing that their models were not minors.

Although the Justice Department seems not to take ObscenityCrimes.org very seriously, the Web site suggests that prosecutors scrutinize the complaints so carefully that it warns people considering filing a complaint that false statements could expose the filer to federal criminal prosecution.

Would-be complainants are also advised not to trawl for obscene Web sites, noting that “men are particularly vulnerable to pornographic addiction.” Identifying Internet smut, the site advises, is best left to professional law enforcement personnel.

The president of Morality in Media, Robert W. Peters, expressed disappointment with the department’s failure to act on any of his group’s complaints and acknowledged that he understood why some people might say the program had been of little value.

“We’d like to see some prosecutions that arose from the complaints submitted to the Web site,” Mr. Peters said in an interview. “But it’s ultimately up to the Justice Department, and I can’t tell the Justice Department what to do.”

Like the outlook of many antipornography campaigners, Mr. Peters’s combines disappointment in the government’s performance and optimism that the situation will soon change. Mr. Peters said he was confident that officials would eventually assume their responsibility and go after what he described as a prime threat to society, the growth on the Internet of sexual material involving consenting adults.

Child pornography is dealt with through separate laws that have been upheld by the courts, which have had far greater difficulty in evaluating when adult sexual material may be classified obscene and prosecutable.

Stephen G. Bates, a Harvard-trained lawyer and journalism professor, said he was appalled when he discovered that the Justice Department was outsourcing a search for obscenity.

Although sexual material may be distasteful to many, it is not necessarily obscene, which the Supreme Court defined in 1973 as material that, taken as a whole, lacks artistic merit, depicts certain conduct in a patently offensive manner and violates contemporary community standards.

Professor Bates, who teaches at the University of Nevada, Las Vegas, filed a Freedom of Information Act request that helped him discover the program by ObscenityCrimes.org.

In an op-ed article last month in The Washington Post and other newspapers, Mr. Bates said Morality in Media’s religious cast, the sensitivity of the constitutional issue of free speech and the outsourcing together made “a mockery of the First Amendment, chilling freedom of expression.”

Mr. Wolf would not comment. Over several days, his aides said he was too busy to do so.
http://www.nytimes.com/2007/08/10/us/10obscene.html





Veto for Parents on Web Content

INTERNET service providers will be forced to filter web content at the request of parents, under a $189 million Federal Government crackdown on online bad language, pornography and child sex predators.

The Prime Minister, John Howard, said that the Government would increase funding for the federal police online child sex exploitation team by $40 million, helping investigators to track those who prey on children through chat rooms and sites such as MySpace and Facebook.

In a separate development, convicted sex offenders in NSW will have to register their email address with police as part of State Government efforts to stop them using the internet to prey on children.

Mr Howard will also confirm a previous announcement that the Government will pay $90 million to provide every household that wants it with software to filter internet content.

Those unable to install the software or who have concerns about their children's internet use will be able to get advice by phone, another proposal previously suggested by the Government.

The more efficient compulsory filtering of internet service providers (ISPs) was proposed in March last year by the then Labor leader, Kim Beazley. At the time, the Communications Minister, Helen Coonan, and ISPs criticised his idea as expensive.

Three months later Senator Coonan announced the Government's Net Alert policy, which promised free filtering software for every home that wanted it. She also announced an ISP filtering trial to be conducted in Tasmania. That trial was scrapped.

Today Mr Howard will hail the ISP filtering measure as a world first by any Government, and is expected to offer funding to help cover the cost. Parents will be able to request the ISP filter option when they sign up with an ISP. It will be compulsory to provide it.

The measures will come into effect by the end of this month.

The NSW Police Minister, David Campbell, will refer to cabinet the plan to force sex offenders to register their email addresses. Mr Campbell met representatives of the social networking site MySpace on Wednesday.

The Premier, Morris Iemma, is thought to favour the idea. If cabinet agrees, the requirement will be incorporated into the Child Protection (Offenders Registration) Act, which the Police Ministry is reviewing.

People on the NSW Child Sex Register already have to notify police of their address, phone number, place of work and any changes to those details.

Last month US authorities revealed more than 29,000 convicted sex offenders had profiles on MySpace, which have since been removed. Many US state attorneys-general want laws that would require children to get permission from their parents before joining such sites, and would require those sites to verify the parents' age and identity.

Rod Nockles, MySpace's Australian director of safety and security, acknowledged it would be possible for convicted sex offenders to register on MySpace using a different email address.

About 26 per cent of Australia's 3.8 million MySpace users are under 18.

MySpace has written to all state and territory governments, and the Commonwealth, asking them to create a national child-sex offender database that requires email addresses.

The NSW Government was the first to respond.
http://www.smh.com.au/news/web/veto-...530535350.html





Community Broadband Act Would Overturn Bans on Municipal Broadband
Eric Bangeman

A bill introduced into the House of Representatives this week will attempt to spur broadband development in the US by overturning existing state bans on municipal broadband deployments. Titled the Community Broadband Act of 2007, the bill is cosponsored by Rep. Rick Boucher (D-VA) and Rep. Fred Upton (R-MI).

Currently, laws in Arkansas, Florida, Missouri, Texas, and a handful of other states prevent cities and towns from installing and operating their own broadband networks. Most of those laws were enacted in the wake of heavy lobbying from the telecommunications industry, which doesn't want to see competition coming from local governments.

Last year's attempted rewrite of the Telecommunications Act contained a similar provision but never made it to the floor of the Senate for a vote. With the state of broadband in the US a hot topic of discussion lately, both on Capitol Hill and around the country, Reps. Boucher and Upton may be able to find allies in Congress a bit more easily this time around. The congressmen are hopeful that, should it be passed, the Act would lead to more—and better—broadband options for US citizens.

"By partnering with private industry, community broadband networks offer the promise of increased economic development and job creation, nowhere is that more important than in my home state of Michigan," said Rep. Upton in a statement. "At the end of the day, we will foster even more competition and choices for consumers across the nation."

Many of the state bans that would be overturned by the Community Broadband Act were strongly backed by the telecoms, and they have a history of digging their heels in whenever cities and towns start taking about solving their broadband woes themselves. That said, AT&T is reacting cautiously to the bill. "We look forward to reading the bill and we commend Reps. Boucher and Upton for their efforts to promote broadband services for all consumers," AT&T spokesperson Brad Mays told Ars Technica. "AT&T is currently involved in several municipal broadband projects, and we are always looking for opportunities to bring the benefits of broadband to consumers."

One example of the telecoms' resistance to municipal broadband came last summer from Qwest, the number three telecom in the US. So far, the company has shown little to no inclination to match Verizon and AT&T's fiber deployments. But when Seattle—which is smack-dab in Qwest territory—started getting serious about building its own fiber network, the telecom resisted—despite CEO Dick Notabaert's admitting that his company had no plans of its own for a fiber deployment. The story has been the same in other places, including Philadelphia and New Orleans.

The telecoms have historically argued that municipalities that own and operate—or even build and lease—broadband networks could give themselves preferential treatment. The Act anticipates that argument with a section on "competition neutrality." Public providers would be banned from giving themselves any "regulatory preference," which should create a level playing field for all broadband providers. Municipalities interested in getting into the broadband business would also have to solicit feedback from the private sector on planned deployments.

The Community Broadband Act looks like a good bill, as it attempts to eliminate barriers that currently exist to meaningful competition and better service in many parts of the country. Should the bill pass and the upcoming 700MHz spectrum auction end in a way that leads to a viable third broadband pipe, there would be reason to think US broadband policy is taking a turn for the better.
http://arstechnica.com/news.ars/post...broadband.html





US Rejects Device to Send Net Service
AP

The government gave a failing grade to a prototype device that Microsoft Corp., Google Inc., Dell Inc., and other technology companies said would beam high-speed Internet service over unused television airwaves.

In an 85-page report, the Federal Communications Commission said the devices submitted by the coalition could not reliably detect unused TV spectrum and could cause interference.

The FCC's chairman, Kevin Martin, on Tuesday said the agency still would like to find a way to transmit high-speed Internet service over the unused airwaves.

Edmond Thomas, who represents the coalition, said the companies are convinced the spectrum can be used without causing interference to TV and wireless signals.

"We intend to work with the FCC in order to identify the discrepancies in their tests with the tests we've done," Thomas, a former FCC chief engineer, said yesterday.

The coalition -- which also includes Hewlett-Packard Co., Intel Corp., EarthLink Inc., and Philips Electronics North America Corp. -- said it will work with the FCC to resolve any questions.

The companies say the unlicensed and unused TV airwaves, known as "white spaces," would make Internet service accessible and affordable, especially in rural areas, while spurring innovation.

TV broadcasters oppose the use of white spaces because they fear interference with television programming and problems with a federally mandated transition from analog to digital signals in February 2009.
http://www.boston.com/business/techn...d_net_service/





Smarter Routers Mean Better Online Video
Elinor Mills

When Larry Roberts was overseeing the building of the ARPAnet, the precursor to today's Internet, he and his team were looking for a way for disparate university and government computers to communicate.

Forty years later, with millions of people watching YouTube videos daily, making voice calls and swapping files over peer-to-peer networks, the Internet could do with an upgrade.

On Monday, Roberts plans to launch a new company, Anagran, that sells next-generation networking equipment that will allow service providers to give the network the performance boost it needs.

"The Internet [infrastructure] has pretty much been the same technology since it was started in 1969," he said. "The Internet wasn't built for video and voice."

Back then, researchers decided the best way to send data over a network was to slice it into different chunks, or packets. That's fine for file sharing, email and even instant messaging. But voice and video, where the packets need to stream uninterrupted, are causing traffic jams on the Internet.

Videos often have interruptions or delay, causing an annoying freeze-frame effect. Conversations can sound choppy with words getting dropped, and hiccups in downloading Web pages and sending email are commonplace.

"I need much faster Internet access. When I ask for something on the Web, I want that to happen in a fraction of a second instead of 10 seconds, Roberts said. "This will let the Web operate in fractional second times."

With broadband connections growing rapidly the problem is only going to get worse.

If the Internet were like a motorway, with cars flowing like packets, the sliproads would be routers, which determine which path data should take between networks. The new Anagran FR-1000 Flow Routers add the ability to distinguish between packet and streaming data. They offer special "fast lanes" on to the motorway via metered sliproads and on to the motorway itself for time-critical data like video and voice, Roberts said.

The routers, which will typically cost between $50,000 and $100,000, have built-in "intelligence" that can reduce delay and packet loss and improve the throughput by eight times, according to Roberts. The routers are three times less expensive than existing routers of similar capability and capacity and use about 80 per cent less power, he added.

Because they can distinguish between the different types of traffic, the service providers will be able to offer tiered services at different prices, Roberts said.

The FR-1000 Flow Routers also will allow service providers to offer a sort of busy signal for video and voice so that people could be alerted if the network were too swamped.

"Today packet networks don't know how to give a busy signal the way the traditional voice network does when everyone tries to call their mother on Mother's Day; they are designed to just slow down," he said. "When you slow down video and voice it destroys it."

Improving the reliability of the Internet will mean that governments will be able to use it for emergency services like 999 calls. That could prevent communications outages during disasters, like what happened to the mobile phone network during last week's bridge collapse in Minneapolis, Roberts said. He said he has been in discussion with the federal government since Hurricane Katrina two years ago.

Mobile voice communications are moving to the Internet as well, which will only mean more traffic on the network. "People with laptops can totally destroy all the voice users," Roberts said.

In addition, the routers will help accelerate the adoption of telemedicine, remote surgery and video conferencing, he said.

There is indeed demand in the market for a solution to the voice and video problem and service providers will need to upgrade their networks soon, said David Vorhaus, a research associate at Yankee Group Research. He said, however, he wasn't sure if companies would choose to replace their existing packet routers with all new Flow Routers or if they would use a combination of new and old technology.

Because of Roberts' involvement, Anagran, which has received $28m in funding, has a legitimacy that many start-ups lack, Vorhaus said.

"The fact that it is his company and he does have such credibility out there, I think it's certainly going to generate a lot of interest and discussion," he added. "This is his baby; he's been working on it for years."

In the meantime, Roberts said he marvels at how large the Internet has grown and how it has come to permeate all aspects of society.

"The Internet is vastly bigger than I imagined it would be," he said, adding that he was somewhat shocked when he saw Web addresses start to appear on the sides of commercial trucks.

"The biggest surprise is video," he said. "We couldn't see how it was going to be workable. [The Internet] isn't well-designed for it."
http://news.cnet.co.uk/software/0,39...9292055,00.htm





Two More Republicans Join YouTube Debate
UPI

The number of Republican presidential hopefuls willing to debate on live TV and the YouTube Internet site has doubled from two to four.

Following the initial debate featuring Democrats last month, willingness to participate in the format among Republicans was thin, the Washington Post reported.

A Sept. 17 date for Republicans to answer videotaped Internet questions from voters on live television was originally set, but unidentified party sources told the Post it will now likely be in November or December.

Initially, only two of the 10 GOP presidential hopefuls agreed to participate -- Sen. John McCain of Arizona and Rep. Ron Paul of Texas, but former Govs. Mike Huckabee of Arkansas and Tommy Thompson of Wisconsin have also reportedly agree to appear.

Two weeks ago, several conservative bloggers launched an effort called "Save the Debate" calling for Republican contenders to better the Democrats' performance last month in an Internet statement.

"Attend the YouTube debate, and you may get a tough question or two," the statement said. "Don't attend, and millions of Americans will wonder if you were too afraid to answer questions from the Internet, just as Democrats were afraid to go on Fox News."
http://www.upi.com/NewsTrack/Top_New...e_debate/9790/





Slap in the Facebook: It's Time for Social Networks to Open Up
Scott Gilbertson

Damn the Facebooks and the MySpaces. The last time we checked, there was this thing called the internet that had 6 billion users. It's time to take our personal data out of Mr. McGregor's little gardens and put it back where it belongs -- free and open on the open web.

Social networks like Facebook and MySpace are taking the web by storm because they make it easy to manage your personal data and keep in touch with people you know. But to get value out, you have to put something in -- photos, contacts, appointments, lists of your interests and your blog musings.

Therein lies the rub. When entering data into Facebook, you're sending it on a one-way trip. Want to show somebody a video or a picture you posted to your profile? Unless they also have an account, they can't see it. Your pictures, videos and everything else is stranded in a walled garden, cut off from the rest of the web.

Like locked cell phones and copy-protected music, Facebook is on the wrong side of the open-network debate. Facebook is a sealed bubble. Facebook users are locked into Facebook, just as iTunes locks music fans to Apple's iPod.

This serves companies' business interests, but not the wider interests of consumers. AOL, Yahoo and Microsoft have their own, proprietary instant-messaging systems. They're all good, but they'd be better if they worked together. The iPhone would be better if it could also be used on Verizon's and Sprint's networks, and Facebook would be better if you could link to friends' pages on MySpace and Bebo. Social networking should be based on open standards, just like e-mail.

Some social networking companies are starting to build open platforms that allow your personal data to be exported and put to use anywhere you like.

On Monday, the contact management service Plaxo will launch a new social network called Pulse. Offering a customizable profile page, the service will allow Plaxo subscribers to manage their interpersonal relationships and show off their interests.

In many ways, Pulse will offer the same all-your-data-in-one-place approach as Facebook, but with one crucial difference: It's not walled off. Anything put into Plaxo can be retrieved and used elsewhere, and any data made public will be accessible across the wider internet: Viewers will not need a Plaxo account. The service will be rather limited initially, but it's a step in the right direction.

However, Pulse is no panacea. What the internet needs is a way to take the features of the popular social networks and make them available to the world at large.

For the last couple of weeks, Wired News tried to roll its own Facebook using free web tools and widgets.

We came close, but we ultimately failed. We were able to recreate maybe 90 percent of Facebook's functionality, but not the most important part -- a way to link people and declare the nature of the relationship.

Hey Kids, Let's Put On a Show

It's entirely possible to replicate most of the features of Facebook without getting sucked into its black hole, but the single most important element is missing.

At this point, "friend" relationships remain unique to the social networks. The web still lacks a generalized way to convey relationships between people's identities on the internet. The absence of this secret sauce -- an underlying framework that connects "friends" and establishes trust relationships between peers -- is what gave rise to social networks in the first place. While we've largely outgrown the limitations of closed platforms (take e-mail or the web itself), no one has stepped forward with an open solution to managing your friends on the internet at large.

We would like to place an open call to the web-programming community to solve this problem. We need a new framework based on open standards. Think of it as a structure that links individual sites and makes explicit social relationships, a way of defining micro social networks within the larger network of the web.

One possibility is the microformat XHTML Friends Network, or XFN, which defines relationships between linkers and linkees.

Trouble is, the data format doesn't yet offer any tools for managing friends. While a snippet of code placed in a web page can convey who you know -- and how you know them -- as yet there are no tools to put the information to good use, like automatically pulling in calendar events from of all your friends' websites.

Some developers are beginning to offer easy-to-use tools that can create XFN code (WordPress and Movable Type both offer blank templates that can be filled in), but use of XFN isn't yet widespread.

Such a "micronetwork" standard may sound daunting or even impossible, but nearly all the tools we've mentioned so far started small. Blogging grew from a few people trying to easily publish web content on a daily basis. Del.icio.us started with one person looking for a way to manage his bookmarks from any machine. Even Facebook started with a few college friends looking for a better way to plan their social lives.

Eventually, an open network will emerge. Let's make it happen sooner rather than later.

Make Your Own Facebook

With a little savvy, anyone can create a page that includes all of the fun stuff found in a Facebook profile.

Start by setting up a blog. Say what's on your mind. Unlike your blog on Facebook or MySpace, everyone will be able to read it.

From there, you can pull in your photos from Flickr or Zooomr and show off your impeccable musical taste by creating a profile at iLike or Last.fm. You can share your web bookmarks using del.icio.us or Ma.gnolia and publish a list of your most recent reads using Shelfari or LibraryThing.

All of these services have open APIs, making it easy for third-party developers to build widgets for displaying data stored there. As a result, many such tools exist.

Need to keep up-to-date with your friend's activities? Pull in a feed from their blog or from their Twitter account. The Upcoming group calendar service has a dead-simple code generator that will create a widget listing all the events you plan to attend, as well as those your friends are interested in.

Like to chat? Meebo offers an embeddable widget for instant messenger chatting, and jaxtr does the same for SMS. You can even drop in a Skype button that lets your friends call you with one click.

One of Facebook's best features is its comprehensive feeds that show what everybody's up to (called News Feeds and Mini-Feeds), but you can build such a thing yourself. Create an account with one of the many feed-mixing services like Yahoo's Pipes, FeedShake or FeedBlendr. Plug in all the feeds from the various sources you want to track and paste the resulting URL into a widget on your site. Voilŕ.

Need a site? The free blogging software from WordPress will let you embed these widgets and RSS streams. WordPress also has a thriving plug-in ecosystem, so it's likely a developer somewhere has done much of the dirty work for you.

An even easier option is to use a customizable homepage from Pageflakes or Protopage. Pageflakes in particular allows you to build a customized page that aggregates a lot of varied content just like Facebook, which you can then publish publicly (Pageflakes calls this a Pagecast). And beyond a simple user registration, Pageflakes doesn't lock in any of your personal data.
http://www.wired.com/software/webser...urrentPage=all
JackSpratts is offline   Reply With Quote
Old 08-08-07, 10:19 AM   #2
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,013
Default

Average PC is a Smorgasboard for a New MP3-Eating Trojan
Jacqui Cheng

It's no secret that people like to collect music on their PCs, with music files taking up more and more hard drive space as time goes on. Recent data from Comscore says that as of April of this year the typical computer in the US contains an average of 880 MP3 files, taking up roughly 3GB of hard drive space. Compared to the average number of Word documents (197), PDFs (100), and Excel files (77), music files make up the single most common type of file found on an average computer by a long shot.

But that very hobby could bite an avid MP3 collector in the butt if a new worm makes its way into their computers. A newly-uncovered worm called W32.Deletemusic does exactly what its name implies—it goes through a PC and deletes all MP3 files in sight. And that's it. Simultaneously low-threat and highly annoying, the worm makes its way from computer to computer by spreading itself onto all attached drives of a given PC, including flash drives and removable media. If that media is then removed and inserted into another computer, it continues its music-eating rampage on the new host.

This isn't the first time such a worm has gone after MP3 files. Nopir-B made its rounds some two years ago and posed as DVD copying software, according to security firm Sophos. When users tried to run it, Nopir-B scolded them for participating in piracy and proceeded to delete all MP3s from their computers. Similarly, last year's Erazer trojan deleted not only MP3 files, but AVIs, MPEGs, WMVs, and ZIP files as well in a "crusade" against piracy.

Of course, these worms don't take into account the fact that many MP3 files may not be pirated at all—they could be legitimate downloads, ripped from CDs, or even recorded by users themselves. And while losing an entire music collection that you've dedicated so much time into ripping, labeling, and organizing can be devastating, there is no real payload for the worm's efforts. Such foresight isn't exactly the forte of these trojan-writers, according to Sophos' Graham Cluley. "The authors of this worm are more likely to be teenage mischief makers than the organized criminal gangs we typically see authoring financially-motivated malware these days," he said in a statement seen by IDG News Service.

A quick poll among the Ars Technica staff shows that not only do we all have a disproportionate number of MP3 files compared to the national average, some of us would be quite a bit more inconvenienced than others if we were to get bitten by the W32.Deletemusic bug. The number of music files on our computers ranged from the low end of 1,400 all the way up to a staggering 35,000, and we're sure that some of our readers could probably give those numbers a run for their money. And that's why Cluley advises that users should turn off any autorun functionalities on their computers to prevent the worm from spreading.

W32.Deletemusic affects computers running Windows 2000/95/98/Me/NT/Server 2003/Vista/XP.
http://arstechnica.com/news.ars/post...ng-trojan.html





Storm Worm's Virulence May Change Tactics
Erik Larkin

The swiftly spiking onslaught of the Storm Worm may signal an upcoming change in how its creators intend to wield their weapon.

I caught up with Joe Stewart, senior security researcher at managed security company SecureWorks, at the Black Hat conference. He says that since June 1st, his company has blocked a boggling 20 million attack e-mails carrying the Storm Worm payload. That's up from just over 70,000 attacks seen during the longer span from the beginning of the year through the end of May.

"It's getting out of hand," Stewart says.

And that's just from the networks they're seeing. Mail security company Postini recently said that the during the most recent Storm Worm flood, it saw 120 million attack e-mails in the span of five days.

The misnamed Storm Worm isn't actually a worm; it's a bot, used to corral infected computers together into a network called a botnet, which can then be issued commands by a central criminal controller. One common command is to send vast amounts of spam.

For example, "sending out billions of e-mails per day is effortless" for the Storm Worm botnet, Stewart says.

From the number of infected machines he's found, Stewart estimates that the Storm botnet could comprise anywhere from 250,000 to 1 million infected computers. And that raises questions, along with eyebrows.

"Why do you need a botnet that big?" he asks. "You don't need a million [infected computers] to send spam."

For spam, a million-strong botnet might be overkill. But botnets can do much more - like launching denial-of-service attacks. These attacks aim to overwhelm a Web site or Internet server by sending it a constant stream of garbage data at a particular Web site or Internet server.

Garbage data from one source isn't hard to deal with. But multiply that by a million, and you're talking about a raging deluge.

The Storm Worm is capable of launching DoS attacks, and has already been used for them. So the huge rise in the malware's spread may mean that its creator is getting ready to expand his revenue stream and rent out his botnet for powerful DoS attacks.

The good news is that if you're smart, it's not hard to avoid becoming a Storm Worm victim. So far, the bot spreads as e-mail attachments sent to addresses harvested from infected machines. There's a good chance you've seen it already, in the guise of a fake news story or a supposed e-greeting card.

If you were smart enough to avoid opening those attachments, and are smart enough to continue to avoid all unexpected attachments in the future, you'll likely stay safe from the Storm Worm. Unfortunately, as the malware's continued spread proves, there are plenty who aren't so smart.
http://www.networkworld.com/news/200...virulence.html





Consumer Reports on 'State of the Net': It's a Jungle Out There
Paul McNamara

A “State of the Net” survey due out Monday from Consumer Reports, the most widely trusted name in consumer protection, makes clear that Americans continue to have ample cause to distrust Internet interactions … yet many remain woefully ignorant in terms of protecting themselves – and their children -- from the most obvious dangers.

The combination has cost consumers $7 billion over two years, according to Consumer Reports. (It also reminds us that IRS employees are hired from the same gene pool in which we all swim.)

The sweeping study does include nuggets of good news, however, including a contention that less spam is hitting consumer inboxes.

In addition to the survey, a related Consumer Reports test of nine security software suites finds that one from Trend Micro offers the best combination of performance and price.

Among the survey findings:

Computer viruses have prompted 1.8 million households to junk their PCs over the past two years, while spyware has claimed another 850,000 machines in just the past six months.

Not surprisingly given those numbers, 17 percent of PC users lack any virus protection and a third of respondents fail to guard their machines against spyware.

Extrapolating from the survey results, some 650,000 people have bitten on a spam-promoted product or service offerings over the past six months (and there’s no way that they all live in Florida).

Five percent of those surveyed who have children under the age of 18 report that their kids have inadvertently been exposed to pornography through spam, while the Consumer Reports press release made no mention of how many kids opened smutty spam on purpose.

While lawmakers continue to hound MySpace 24/7, we learn that not all parents are worried sick over the notion that Junior or Missy may be divulging too much 411 online: Among respondents whose kids go online, 13 percent of the youngsters registered on MySpace failed to meet the site’s 14-year-old age minimum, and 3 percent were younger than 10. As the press release notes: “And those were just the ones the parents knew about.”

The September issue of Consumer Reports includes all of the gory details.
http://www.networkworld.com/community/node/18117





Hackers: Social Networking Sites Flawed
Jordan Robertson

Social networking Web sites such as MySpace.com are increasingly juicy targets for computer hackers, who are demonstrating a pair of vulnerabilities they claim expose sensitive personal information and could be exploited by online criminals.

The flaws are being demonstrated this week at the Black Hat and Defcon hacker conferences, which draw thousands of people to Las Vegas each year for five days of training and demonstrations of the latest exploits.

Black Hat, the more genteel of the two events with heavy industry sponsorship and big admission fees, ended Thursday with some 4,000 attendees. Defcon, larger and more roguish, started smoothly Friday, without any of the registration problems that irked fire officials last year and caused lengthy delays. Organizers said more than 6,800 people attended the first day, with more expected Saturday.

There was a moment of drama in the afternoon when organizers received a tip that an undercover NBC producer was covertly filming some of the sessions. The woman was identified during one of the presentations, and she hustled away from the convention site without comment.

An NBC spokeswoman said the network doesn't comment on its newsgathering practices. Defcon organizers said NBC had been offered press credentials but declined.

Infiltrating password-protected social networking sites has been an increasingly fruitful area of study for hobbyists and professional computer security researchers.

One hacker, Rick Deacon, a 21-year-old network administrator from Beachwood, Ohio, says he's discovered a so-called "zero-day" flaw — or a problem that hasn't been patched yet — in MySpace that allows intruders to commandeer personal Web pages and possibly inject malicious code.

Deacon is scheduled to present his findings Sunday. So far, it only affects older versions of the Firefox Web browser and does not affect Internet Explorer, he said.

The attack uses a so-called "cross-site scripting" vulnerability, a common type of flaw found in Web applications that involves injecting code onto someone else's Web page.

The vulnerability could not be independently verified, but experts said these types of attacks are a particular problem for social networking sites, where it's difficult to police the content of the millions of posts each day.

Deacon said the flaw he discovered requires that a user click on a link that leads to a Web page where the computer's "cookie" information is stolen. Deacon said he discovered the problem several months ago along with several other researchers and alerted MySpace, but the company didn't fix the problem.

"Facebook and MySpace both patch things that they find, but it's like a sandbox," Deacon said. "There's so much. And there are probably hundreds more cross-site scripting vulnerabilities there. There's no way they can find them all."

A MySpace spokeswoman declined to comment specifically about Deacon's presentation. The company said in a statement that "it's our responsibility to have the most responsive, solely dedicated 24-7 safety and security team, and we do."

In a separate demonstration, Robert Graham, chief executive of Atlanta-based Errata Security, showed a program for snooping on the computers on public wireless networks to steal the "cookie" information and hijack e-mail accounts and personal Web pages on social networks.

In his Black Hat presentation, he took over the e-mail account of an audience member using Google Inc.'s Gmail service. Graham said his program demonstrates the vulnerability of public wireless connections.

"Everyone has gotten into their minds that passwords over WiFi are toxic, so let's fix that, and they have," Graham said. "What I'm saying is that everything else is just as toxic."

Graham's demonstration would not have worked if the audience member had been using the encrypted version of Gmail.

Google declined to comment specifically on the presentation but said the company is expanding its capacity to enable automatic encryption for all Gmail users.
http://news.yahoo.com/s/ap/20070806/...ulnerabilities





Hackers Click Locks Open at Conference in US

Hackers gathered in Las Vegas on Saturday showed ways to crack electronic key-card systems and deadbolt locks used at security-sensitive places including the White House and the Pentagon.

"If you can't physically protect your computer, you are screwed," said Zac Franken, a hacker who engineered a way to outwit door locks relying on key cards.

"Most people think that computers inside buildings are secure. How many computers do you see left logged on at night?"

Franken's creation was among the real-world lock-cracking revelations made at the DefCon hackers conference, where a room is devoted to the "sport" of lock picking.

Medeco deadbolt locks relied on worldwide at embassies, banks and other tempting targets for thieves, spies or terrorists can be opened in seconds with a strip of metal and a thin screw driver, Marc Tobias of Security.org demonstrated for AFP.

"This is incredible; it's unreal," Tobias said while showing the ease with which the locks can breached.

"Medeco has one of the best designed locks in the world, but with this kind of attack it's all irrelevant."

US-based Medeco is owned by ASSA ABLOY Group, a Swedish conglomerate that describes itself as the world's leading manufacturer and supplier of locks. Medeco officials could not be reached for comment Saturday.

"This is not the only company," Tobias said. "There are lot of them; lots of deadbolts with similar weakness."

Tobias said he notified Medeco by email repeatedly during the past two months about cracking their deadbolt locks and hasn't gotten a reply.

Tobias says he refuses to publish details of "defeating" the locks because they are used in places ranging from homes, banks and jewelers to the White House and the Pentagon. He asked AFP not to disclose how it is done.

"This can cause a lot of trouble," Tobias said. "They need to fix this. If you have one of these on your house or wherever you'd better be concerned."

Franken is equally protective of the simple electronics he uses in a device that can be spliced into wires connecting key card readers to computer systems that control door locks on many businesses.

"The access control system is inherently insecure," Franken said. "I just walk up, pop off a cover held on by two screws, put my device in and we're away."

Easy targets for the "physical hack," involving manipulating hardware instead of computer software, are electronic key scanner pads at doors where workers step outside for cigarette breaks, according to Franken.

Once the device is spliced into place, encoded cards can be used to command it to replay the last valid entry code or have the system deny access to people with legitimate cards, Franken demonstrated.

"Basically, I can now lock all the valid users out while I can still get in," Franken said. "There is no patch for this."

Tobias advocates for a "Hogwarts School for Reality," which like the fictional school of magic made famous in the "Harry Potter" novels would aim to inspire children to act creatively -- in this case by applying technology to security needs on and offline.

"It's no difference breaking into a lock or a computer," Tobias said.

"If you can get past locks you get to the computers. This is the real world; we need the real world Hogwarts."
http://www.physorg.com/news105532486.html





Point and Click Gmail Hacking at Black Hat
Humphrey Cheung

I’ve just received an email that says “I like sheep”, but it wasn’t sent by my friend – it was sent by a hacker posing as my friend. At the Black Hat security convention, Robert Graham, the CEO of errata security, surprised attendees by hijacking a Gmail session on camera and reading the victim’s email. He went even further by demonstrating the attack to us in person, taking over another journalist’s Gmail account and then sending us sheep-loving emails.

The attack is actually quite simple. First Graham needs to be able to sniff data packets and in our case the open Wi-Fi network at the convention fulfilled that requirement. He then ran Ferret to copy all the cookies flying through the air. Finally, Graham cloned those cookies into his browser – in easy point-and-click fashion - with a home-grown tool called Hamster.

The attack can hijack sessions in almost any cookie-based web application and Graham has tested it successfully against popular webmail programs like Google’s Gmail, Microsoft’s Hotmail and Yahoo Mail. He stressed that since the program just uses cookies, he only needs an IP address and usernames and passwords aren’t required.

“I see ten people’s cookies on my screen, I just need to click on the guy’s IP address and I’m in. Once you get someone’s Google account, you’d be surprised at the stuff you’d find,” said Graham.

Graham gave us a first-hand demonstration of the attack in the press room. George Ou, Technical Director of ZDNet and author of the blog “Real World IT” , bravely volunteered to be the victim by making a new Gmail account called getmehacked@gmail.com. Ou logged onto Black Hat’s wireless network and emailed me a prophetic message, “Hey Humphrey, I'm about to be hijacked.”

While Ou was typing, Graham was running Ferret and sniffing all the cookies that were being sent from Ou’s laptop and Google. Graham then clicked on Ou’s IP address and Gmail page, complete with Ou’s recently sent message on the screen. We photographed both Graham’s and Ou’s laptop at that time and posted it to the picture gallery. You’ll see that the contents are exactly the same.

Reading email is one thing; sending email is much more exciting. Graham typed out a short message, “I like sheep” and sent it to my account. A short moment later, my Outlook popped with that message. Interestingly enough, that message also appeared on Ou’s screen.

But if that wasn’t scary enough, Graham told us that he can even log in the next day or possibly several days later into the Gmail account. “I can just copy the data to a file and replay it later. I’ve been able to log into Gmail accounts one day later,” said Graham.

Since the attack relies on sniffing traffic, using SSL or some type of encryption (like a VPN tunnel) would stop Graham in his tracks. However, many people browsing at public wireless hotspots don’t use such protections.

“You’re an idiot if you use T-Mobile hotspot,” said Graham.

You would think that Graham would be having lots of fun testing out his tools. After all, the ability to read and send other people’s email with impunity would be enough power to send most people (especially at Black Hat) through the roof, but Graham says that isn’t so.

“I’m not having too much fun because I usually can’t send emails that say ‘I like sheep’”, said Graham. Not wanting to break the law, his victims have usually been his friends or co-workers, but that’s about to change because of the free-fire nature of the upcoming Defcon convention’s wi-fi network.

“People expect to be hacked at Defcon, so I’m going to have a blast there,” Graham said. He added that the Hamster tool will be released in the next few days.
http://www.tgdaily.com/content/view/33207/108/





Undercover Reporter Outed, Flees DefCon Conference

The DefCon security conference is buzzing after an undercover NBC-Universal reporter fled the building after being publicly exposed for using a spy camera to film attendees.

DefCon organizer Jeff Moss called out Michelle Madigan, an Associate Producer for NBC-Universal, from stage during the "Tactical Exploitation" session.

"It came to our attention that a reporter might be here with a hidden pinhole camera," Moss told the crowd, which he said left two options. One was to let her corner some 13-year-old kid and get him to admit to hacking. The other was to escort her away.

Amidst clapping and jeering from the crowd, Madigan quickly left, followed by a good-sized crowd of reporters and attendees. And ironically, became the big story she had hoped to capture.

According to a senior security staff member who goes by the name Priest, a number of unnamed attendees tipped off conference staff about Michelle Madigan's plans to use a hidden camera at the conference. All of us press signed an agreement to not take photos or video without express permission, so using a hidden camera is a major rule-breaker.

"We knew from the moment she took off," Priest said.

Another Defcon 'goon,' or security person, who wants to stay anonymous says he asked Madigan if she wanted press credentials when she arrived, but she turned him down. He asked if she wanted to see the press rules and regulations, and she again said no. Amazingly, he says Madigan then said she had to go to the bathroom and put on a hidden camera.

Not the most adept attempt at going undercover. Her hidden camera was inside a black bag Madigan carried over her shoulder, the security person says. The bag is visible in the image above.

According to the security person, it was "painfully obvious that [Madigan] was panning her purse around the room."

Basically, Madigan badly screwed up here. She didn't only violate DefCon's clear rules - she crossed the line for journalistic ethics. She's got no sympathy here in the press room as I write this.

Ironically, the drama may bring to light some similarities between the hackers and the reporters here to cover them.

"Ten percent of you guys, just like ten percent of us, have given you all a bad name," says Priest. "The criminal element is a very small element of this community."
http://blogs.pcworld.com/staffblog/archives/005078.html





Middle America, Meet The Hackers
Andy Greenberg

Don't try to hack the hackers.

That's what Dateline NBC's Associate Producer Michelle Madigan learned at this year's DefCon, the largest gathering of hackers, crackers and security professionals in the world. Going undercover, she hoped to reveal cybercriminals talking openly about their illegal exploits. Instead, the sting backfired: A conference organizer outed her in a room filled with thousands of her would-be targets.

The crowd, usually a friendly group despite some vampirish clothes and complexions, wasn't pleased. As a few chanted "burn the witch," Madigan scurried out of the Riviera Hotel to her car, with about 150 hackers-turned-hecklers in pursuit.
In Pictures: Hacking Outside The Box

DefCon's inhospitable treatment of Madigan wasn't just because she was missing a press badge, says one conference spokesman who goes by the handle "Priest." She had also missed the point. By focusing on the bad apples, Priest says, Madigan was glossing over DefCon's true spirit: smart people getting together to mess around with technology.

"Middle America thinks we're stealing your social security numbers, raping your children and breaking into your bank account," he says. "The reality is, we are the ultimate explorers. We see a technology, and we want to know how it works."

That exploration goes well beyond invading the closed corners of the Internet. DefCon's more than 6,000 attendees hack everything: their cars, to increase horsepower and remove pesky safety and emissions controls; their brains, using biofeedback receptors attached to videogames to relieve anxiety disorders; even the war in Iraq. One Navy engineer gave a presentation detailing the nine months he spent hacking insurgent bombs, jamming their radio frequencies to prevent detonation.

"The people who built the Mars rovers are hackers," says Jeff Moss, also known as "Dark Tangent," the hacker who has organized DefCon for the last 15 years. "We generally like hacks that aren't nefarious, that involve figuring something out from the ground up. That's what we try to reward here."

That kind of harmless hacking was channeled into a variety of competitions at the conference, including a lockpicking contest and a game of capture the flag, in which teams earned points by stealing bits of each other's data.

Of course, DefCon still attracts some true "black hat" hackers, bent on learning the newest tools for illegal intrusion, sabotage, espionage and credit card theft. And what attracts cybercriminals also attracts cybercops; any attendee who can verify the identity of an undercover cop wins an "I Spotted the Fed" T-shirt.

But as the danger of online crime shifts from amateur hackers to organized cybergangs in Eastern Europe and Asia, the Feds are increasingly cooperative with DefCon's shenanigans. This year, at least six federal employees revealed themselves in press conferences and panel discussions. More bizarrely, two federal agents were married during the conference's closing ceremony.

In fact, DefCon's species of armchair hackers are more of a distraction for law enforcement than a real menace, says Jim Christy, director of future exploration at the Department of Defense's Cyber Crime Center. He's more focused on the potential for major attacks on critical infrastructure or government Web sites, like the kind that rattled Estonia's government Web sites in May, or the "Titan Rain" attacks that penetrated the U.S. Department of Commerce and Department of State computers in past years.

"Run-of-the-mill individual hackers are just noise as we try to focus on the real problem," he says. "We have to investigate every threat, but we're often dealing with ankle biters."

When DefCon's hackers do venture into the illegal, it's often based on impulses that are more libertarian than malicious, says a hacker known as "Dead Addict," another of DefCon's organizers. "We simply don't take the law as a moral compass," he says.

Dead Addict, a lanky 34-year-old dressed in all black and a bowler hat, points out that he began using the Internet in the early '90s, even before the advent of Internet service providers. At the time, only users with university connections could legally connect. He, and many others without university accounts still found ways to borrow access, essentially breaking the law. In that sense, Dead Addict argues, Internet culture has always bent, and sometimes broken, the legal rules.

That's not to say that true cybercrime doesn't hold a certain temptation. Though Dead Addict now works for a major technology company, he says he was once offered a job with a so-called "online pharmacy."

"I politely declined," he says. "But if I'd taken that job, I'd probably be basking on some tropical beach right now."

Dead Addict says that many of the hackers that gave DefCon its renegade reputation in earlier days have now grown up and, like himself, launched legitimate careers in security with big-name tech companies. But a lucrative day job leaves DefCon's hackers to focus on what Dead Addict says is the original sense of hacking.

"It's about a passion for technology. It's thinking about what technology can do, rather than what it was originally intended to do," he says. "It's about a bunch of people with time on their hands saying, 'Wouldn't it be cool if ...?'"
http://www.forbes.com/2007/08/06/sec...?partner=links





How to Bring Down Internet Explorer With Six Words

Thanks to Kelly Yancey, who found a Japanese Blog that discussed an interesting bit of HTML, it reminds me of the Doctor Who special called ‘The Christmas Invasion’, where the Prime Minister destroys the retreating Sycorax spaceship, much to the Doctor’s annoyance.

The Doctor: Don’t challenge me, Harriet Jones. ‘Cause I’m a completely new man. I could bring down your Government with a single word.
Harriet Jones: You’re the most remarkable man I’ve ever met. But I don’t think you’re quite capable of that.
The Doctor: No, you’re right. Not a single word.
[pause]
The Doctor: Just six.
Harriet Jones: I don’t think so.
The Doctor: Six words.
Harriet Jones: Stop it!
The Doctor: Six.
[approaches Alex, whispering in his ear]
The Doctor: Don’t you think she looks tired?

How to bring down IE with six words…

… or more specifically five HTML tags and a CSS declaration.
<style>*{position:relative}</style><table><input /></table>

In short, it sends Internet Explorer down in flames. IE is not known for great CSS support at the best of times, I suppose here that some piece of badly written code within IE did not expect the wildcard and so IE is going round in an infinite loop, causing a memory error or buffer overrun or one of these other horrible things that languages without inbuilt memory management are susceptible to.

Kelly reported that it was only IE6, however, I tested in IE7 and had a similar effect.

Houston we have a problem.
http://commandline.org.uk/2007/how-t...ith-six-words/





All links at source

Pure Java™, Pure Evil™ Popups
Giorgio

Imagine you’re a web advertiser.
Imagine you can open a popup window from a web page defeating any popup blocker.
Imagine this popup can invade the whole desktop, full screen.
Imagine this popup has no title bar, no menus, no toolbar, no location bar, no border and no buttons. No mean to close it.
Imagine user can’t move or minimize this popup. It will go away only when the browser is killed or your show is done…

Now imagine you’re a phisher.
Imagine you can use this almighty popup to draw anything you want. A fake browser or — why not? — a whole fake desktop to collect user’s data.

Impossible wet dreams of clueless evildoers?
No, it’s just 100% Pure Java™ Reality.

If you’re using Opera or a Gecko-based browser, a similar full screen evil can be performed with just a few JavaScript lines. No need to compile and host any applet, thanks to the LiveConnect technology.

I’ve notified Sun on 29-Jul-2007.
My bug report has been evaluated and publicly disclosed by Sun yesterday (06-Aug-2007) as a request for enhancement.
Update (08-Aug-2007):

Looks like responsibly filing a bug in the Sun’s bug tracker, religiously waiting one week for its classification by Sun engineers and having it finally published by Sun itself as a non-security-related RFE is not enough to go public. I should have known that security reports should be submitted to security-alert at sun dot com to be properly handled. When Maarten Van Horenbeeck (SANS ISC) did it, Sun requested him to request me “to keep the issue confidential, and hold the blog post, till Sun has completely fixed it and is ready to issue a Sun Alert to warn users“. At that time, my post had already been read and commented by many “hackers” supporting full disclosure. Therefore, I respectfully answered (directly to security-alert at sun dot com, with SANS in CC) explaining why retracting it would have been useless, but apologized for my mishandled report and offered any other help, including my promise to use security-alert at sun dot com instead of the regular bug tracker for future responsible disclosures. I received no answer yet, but in the meanwhile my bug report has been reclassified and made inaccessible. I still wonder why should I have known better than a Sun Bug Tracker employee what the proper channel for a security report was…

Will this take more or less than ten days to be fixed?

In the meanwhile, NoScript is your friend

Demos
Applet based, works in any browser
JavaScript based, works in Opera and Gecko-based browsers
http://hackademix.net/2007/08/07/java-evil-popups





Bloggers Consider Forming Labor Union
Ashley M. Heher

Do bloggers need their own Norma Rae?

In a move that might make some people scratch their heads, a loosely formed coalition of left-leaning bloggers are trying to band together to form a labor union they hope will help them receive health insurance, conduct collective bargaining or even set professional standards.

The effort is an extension of the blogosphere's growing power and presence, especially within the political realm, and for many, evokes memories of the early labor organization of freelance writers in the early 1980s.

Organizers hope a bloggers' labor group will not only showcase the growing professionalism of the Web-based writers, but also the importance of their roles in candidates' campaigns.

"I think people have just gotten to the point where people outside the blogosphere understand the value of what it is that we do on the progressive side," said Susie Madrak, the author of Suburban Guerilla blog, who is active in the union campaign. "And I think they feel a little more entitled to ask for something now."

But just what that something is may be hard to say.

In a world as diverse, vocal and unwieldy as the blogosphere, there's no consensus about what type of organization is needed and who should be included. Some argue for a free-standing association for activist bloggers while others suggest a guild open to any blogger — from knitting fans to video gamers — that could be created within established labor groups.

Others see a blogger coalition as a way to find health insurance discounts, fight for press credentials or even establish guidelines for dealing with advertising and presenting data on page views.

"It would raise the professionalism," said Leslie Robinson, a writer at ColoradoConfidential.com. "Maybe we could get more jobs, bona fide jobs."

But not everyone is on board.

"The reason I like blogging is that it's very anarchistic. I can do whatever I want whenever I want, and oh my God, you're not going to tell me what to do," said Curt Hopkins, the founder of the Committee to Protect Bloggers.

"The blogosphere is such a weird term and such a weird idea. It's anyone who wants to do it," Hopkins said. "There's absolutely no commonality there. How will they find a commonality to go on? I think it's doomed to failure on any sort of large scale."

About 11 percent of American Internet users have created Web pages or blogs for others while eight percent have created their own online journals or Weblogs, according to the Pew Internet & American Life Project.

With pages focused on everything from bird watching to celebrity footwear, more than 120,000 blogs are created every day and more than 58,000 new posts are made each hour, according to data from Technorati, which tracks more than 94 million blogs worldwide.

Few bloggers are paid for their posts, and even fewer are able to make a living doing the work. But many say they often devote as much energy and time to their online musings as they do to their salaried careers.

While bloggers work to organize their own labor movement, their growing numbers are already being courted by some unions.

"Bloggers are on our radar screen right now for approaching and recruiting into the union," said Gerry Colby, president of the National Writers Union, a local of the United Auto Workers. "We're trying to develop strategies to reach bloggers and encourage them to join."

Unsurprisingly, there's decidedly less support for a union movement among conservative bloggers.

Mark Noonan, an editor at Blogs for Bush and a senior writer at GOP Bloggers, said he worries that a blogger union would undermine the freewheeling nature of the blogosphere, regardless of its political composition.

"We just go out there and write what is on our mind, damn the critics," he said. "To make a union is to start to provide a firm structure for the blogosphere and that would merely make the blogosphere a junior-league (mainstream media). ... Get us a union and other 'professional' organizations and we'll start to be conformist and we'll start to be just another special interest."

But that's not how Kirsten Burgard sees it.

Sitting at a panel titled "A Union for Bloggers: It's Time to Organize" at this week's YearlyKos Convention for bloggers in Chicago, Burgard said she'd welcome a chance to join a unionized blogging community.

"I sure would like to have that union bug on my Web site," said Burgard, a blogger who uses the moniker Bendy Girl.

Madrak hopes that regardless the form, the labor movement ultimately will help bloggers pay for medical bills. It's important, she said, because some bloggers can spend hours a day tethered to computers as they update their Web sites.

"Blogging is very intense — physically, mentally," she said. "You're constantly scanning for news. You're constantly trying to come up with information that you think will mobilize your readers. In the meantime, you're sitting at a computer and your ass is getting wider and your arm and neck and shoulder are wearing out because you're constantly using a mouse."
http://news.yahoo.com/s/ap/20070806/...CLvrwARiFk24cA





‘Fake Steve’ Blogger Comes Clean
Brad Stone

For the last 14 months, high-tech insiders have been eating up the work of an anonymous blogger who assumed the persona of Steven P. Jobs, Apple’s chief executive and one of the world’s most famous businessmen.

The mysterious writer has used his blog, the Secret Diary of Steve Jobs, to lampoon Mr. Jobs and his reputation as a difficult and egotistical leader, as well as to skewer other high-tech companies, tech journalists, venture capitalists, open-source software fanatics and Silicon Valley’s overall aura of excess.

The acerbic postings of “Fake Steve,” as he is known, have attracted a plugged-in readership — both the real Mr. Jobs and Bill Gates have acknowledged reading the blog (fakesteve.blogspot.com). At the same time, Fake Steve has evaded the best efforts of Silicon Valley’s gossips to discover his real identity.

Meanwhile, on the other side of the country, Daniel Lyons, a senior editor at Forbes magazine who lives near Boston, has been quietly enjoying the attention.

“I’m stunned that it’s taken this long,” said Mr. Lyons, 46, when a reporter interrupted his vacation in Maine on Sunday to ask him about Fake Steve. “I have not been that good at keeping it a secret. I’ve been sort of waiting for this call for months.”

Mr. Lyons writes and edits technology articles for Forbes and is the author of two works of fiction, most recently a 1998 novel, “Dog Days.” In October, Da Capo Press will publish his satirical novel written in the voice of the Fake Steve character, “Options: The Secret Life of Steve Jobs, a Parody.”

Unlike the off-the-cuff ramblings on his blog, “Options” is a well-plotted satire that imagines Apple’s chief executive grappling with his real-life stock option backdating troubles and getting help, and bad advice, from friends like Larry Ellison, Bono and Al Gore.

The book, in part, led to Mr. Lyons’s unmasking. Last year, his agent showed the manuscript to several book publishers and told them the anonymous author was a published novelist and writer for a major business magazine. The New York Times found Mr. Lyons by looking for writers who fit those two criteria, and then by comparing the writing of “Fake Steve” to a blog Mr. Lyons writes in his own name, called Floating Point (floatingpoint.wordpress.com).

Mr. Lyons said he invented the Fake Steve character last year, when a small group of chief executives turned bloggers attracted some media attention. He noticed that they rarely spoke candidly. “I thought, wouldn’t it be funny if a C.E.O. kept a blog that really told you what he thought? That was the gist of it.”

Mr. Lyons says he recalled trying out the voices of several chief executives before settling on the colorful Apple co-founder. He twice tried to relinquish the blog, but started again after being deluged by fans e-mailing to ask why Fake Steve had disappeared.

Though many speculators have guessed Fake Steve was an Apple insider, Mr. Lyons says he has never interviewed Mr. Jobs nor written a story about the company. “I have zero sources inside Apple,” he said. “I had to go out and get books and biographies to learn about a lot of the back story.”

Mr. Lyons said writing as Fake Steve became addictive. He developed a unique lexicon and catalog of insults for the character. Bill Gates is Beastmaster, and Eric E. Schmidt, Google’s chief executive, is Squirrel Boy.

Last month, when a reader asked Fake Steve about Apple’s succession plan, he replied: “My plan at this time is to live forever and to remain in charge here, though perhaps with fewer restrictions on my power. The truth is, I am not human — I am a man-god, son of Zeus, born to mortal woman but fathered by the ruler of the gods, lord of thunder.”

Mr. Lyons receives around 50 e-mail messages a day through the blog, many with ideas for posts, and says the site had 700,000 visitors last month. Recently someone claiming to be Mr. Jobs’s daughter, Lisa, wrote to tell him, “You don’t sound at all like my father, but your blog is hilarious.”

The guessing game around his identity was intense, with speculation centering on a variety of plugged-in journalists, former Apple employees and even Mr. Jobs himself.

Over the last year, Forbes’s publisher, Richard Karlgaard, even got into the act, speculating about Fake Steve’s identity on Forbes.com several times. At one point he wrote: “The guessing game has begun. Who is writing it? Send me your guesses. I’ll gladly buy the most expensive iPod for the first to identify Fake Steve Jobs.”

Mr. Lyons said he felt bad and later revealed himself to his bosses and colleagues.

Mr. Karlgaard said he had a good laugh and holds no grudges. “I think it is the most brilliant caricature of an important part of American culture that I’ve seen,” he said. “We’re really proud that he’s one of ours.”

Forbes had planned to move the Secret Diary to Forbes.com in September, although it may now accelerate the move.

The Fake Steve saga calls to mind the guessing game behind “Primary Colors,” the political roman ŕ clef written in 1992 by Joe Klein, then a Newsweek writer. Newsweek reacted differently, however, firing Mr. Klein when he allowed other writers at the magazine to speculate on the book’s author without tipping them off.

Mr. Lyons clearly used the Fake Steve persona to further some of his own interests and positions. For example, articles in other business publications and their journalists were a frequent target of criticism from Fake Steve, while Forbes got off comparatively easy.

Fake Steve also had it in for the devout fans of the open-source operating system Linux, calling them “freetards.” Mr. Lyons has written several articles for Forbes in which he has been critical of the cultlike aura around the free software movement and its founder, Richard Stallman.

He said that he never intended his blog to be mean-spirited and that he is a fan and customer of Apple. “If I really thought the Apple guys were going to find this guy and kill him, I wouldn’t want to do it. I was kind of hoping it would be puckish and fun. I think the guys in the Valley like the fact that it makes them into fictional characters. It’s a comic strip.”

Asked whether he was worried that he would be called to account for some of Fake Steve’s stinging, personal posts, Mr. Lyons chuckled and said, “Yes.”

As for Mr. Jobs himself — the real one — he did not seem all that interested when told the identity of his online doppelganger. He said in an instant message conversation that he had no interest in reading Mr. Lyons’s novel.

John Markoff contributed reporting.
http://www.nytimes.com/2007/08/06/te...y/06steve.html





Matt Damon Gets Best Box-Office Return on Salary

Hollywood actors regularly earn millions of dollars per movie, but are they worth it?

Apparently some are.

A Forbes magazine survey published on Monday showed Matt Damon offers the best box-office return on his salary, more than twice that of Tom Hanks and Tom Cruise.

For every dollar "The Bourne Ultimatum" star was paid for his last three roles, the films returned $29 in gross income.

Jennifer Aniston was the top-ranked actress, making No. 5 on the list with a gross income return of $17.

Damon's first two outings in the Bourne trilogy have so far grossed around $850 million worldwide at the box office and in DVD sales, Forbes said. The latest installment opened last weekend, taking $70.2 million at the U.S. box office.

Aniston's rank was mainly the result of her role in "The Break Up," which grossed around $288 million worldwide.

Aniston's ex-husband Brad Pitt came in at No. 2, earning $24 for every dollar of his salary, while Aniston's former boyfriend Vince Vaughn grabbed third spot with $21, tying with "Pirates of the Caribbean" star Johnny Depp.

"The biggest stars in Hollywood are not the actors that deliver the biggest returns," Michael Ozanian, Forbes senior editor, said in a statement.

The survey found movies starring Hollywood heavyweights Hanks, Cruise and Will Smith averaged $12, $11 and $10 in gross income respectively for every salary dollar.

Funnymen Adam Sandler, Will Ferrell and Jim Carrey ranked near the bottom with Sandler bringing in $9 in gross income, and Ferrell and Carrey $8.

"American comedies don't translate as well as action flicks to foreign audiences," Forbes said.

Coming in at the bottom of the list was Oscar-winner Russell Crowe, whose past three movies -- "A Good Year," "Cinderella Man" and "Master and Commander" -- all disappointed at the box office and earned an average gross income of only $5 for each $1 of the Australian's salary.

Forbes.com calculated the net revenue for a film by adding the worldwide box office and U.S. DVD revenues and then taking away the budget. The net revenue was divided by an actor's total compensation to produce gross income. The average gross income of an actor's past three movies produced their return.
http://www.reuters.com/article/enter...42283420070806





"Bourne" Grosses $70 Million to Top Box Office

The amnesiac assassin Jason Bourne is back, and this time he clobbered Homer Simpson.

"The Bourne Ultimatum," the third movie in the espionage action series starring Matt Damon as a one-time CIA hit man searching for his past, grossed $70.2 million its opening weekend to rank as North America's top film at the box office, according to studio estimates on Sunday.

That tally marks the biggest first weekend ever for a movie in the month of August, surpassing the $67.4 million opening posted by "Rush Hour 2" the same weekend in 2001, according to "Bourne" distributor Universal Pictures.

The latest "Bourne" total also far exceeded the debut ticket sales generated by the first two films in the franchise.

By comparison, "The Bourne Identity" opened at No. 2 with $27.1 million in June 2002, and the "The Bourne Supremacy" landed at No. 1 in July 2004 with $52.5 million.

Those two films went on to gross nearly $485 million worldwide combined.

Last week's domestic box office champion, "The Simpsons Movie," a feature-length version of the long-running TV cartoon, slipped to second place in its second weekend with $25.6 million in U.S. and Canadian ticket sales.

Despite its 65 percent dropoff from week to week, "The Simpsons," from 20th Century Fox, has now racked up about $128.6 million domestically.

Universal Pictures is a division of NBC Universal, which is controlled by General Electric Co., while News Corp. owns 20th Century Fox.
http://news.yahoo.com/s/nm/20070805/...boxoffice_dc_2





MPAA: Damage Caused By Uploader Can’t Be Measured in Money. Now Give Us Money
enigmax

According to the MPAA, a file-sharer who uploaded three movies to the internet caused damage so great it caused them an ‘irreperable injury that cannot fully be compensated or measured in money’. Despite cash being completely inadequate to solve this 3-movie download armageddon, the MPAA is having a go anyway - demanding damages, costs and fees.

The MPAA just filed a lawsuit alleging that a resident of Rome made illegal copies of, and also uploaded - three movies to the internet using an “online media distribution system”, probably BitTorrent.

According to the report, no address was given for Mr James Wilson - the man accused by the MPAA of ‘willful and intentional’ copyright infringement. According to them, he made unauthorized copies of just three movies - ‘Hide and Seek’, ‘House of Wax’ and ‘Robots’ and uploaded them to the internet.

According to the lawsuit, the Plaintiffs (Warner Brothers and Twentieth Century Fox), “bring this action to stop defendant from copying and distributing to others over the Internet unauthorized copies of the Plaintiff’s copyright motion pictures”

Noting that there was no financial motivation to the infringement it continues: “Defendant’s infringements allow Defendant and others to unlawfully obtain and distribute for free unauthorized copyright works that the plaintiffs spend millions of dollars to create and/or distribute”

The MPAA knows a thing or two about drama, it’s their business after all, so when assessing the trouble Mr Wilson had caused them by sharing 3 movies, they told it straight: “Defendant’s conduct is causing, and unless enjoined and restrained by this Court will continue to cause, the Plaintiffs great and irreparable injury that cannot be compensated or measured in money”

Of course, that doesn’t stop the MPAA trying to measure the costs: aside from demanding that any copies of the movies are destroyed (3 DVDRs I guess) they want substantial damages and costs for bringing the legal action.

Incidentally, the movie ‘House of Wax’ was also listed in the 2005 MPAA press release(.pdf) proclaiming the demise of EliteTorrents- so when the MPAA talks about ‘injury that cannot be compensated or measured in money’ I wonder if they’re thinking of how the last 6 months have been for Scott McCausland, sitting in prison.

And he shared just one movie.
http://torrentfreak.com/mpaa-damage-...give-us-money/





Dancing Ballmer Subjected to Zune Dance Therapy

Steve's happy feet stomp all over iPod ads
Joe Fay

If you’re sitting at your desk, staring out of the window and wishing you were running around in the sun, spare a thought for one Microsoft employee who will soon be doing just that. Permanently.

The japester appears to have used an internal Microsoft website to direct, well, just about anyone to this re-reinterpretation of Steve Ballmer’s infamous monkeyboy dance. Or is it a re-reinterpetation of Apple's iPod advertising campaign? In these mashed-up days, it's hard to tell.

As our informant says, “Who says Microsoft "ain't down" with the web2.0 kids.”

Well, the Web 2.0 kids for a start probably.

Just for added August-ness, the same page throws up this.

Which should be a joke, but feels just a little too real for our comfort.

Bootnote

Thanks to Reg reader Richard for the tip off.
http://www.theregister.co.uk/2007/08/01/ballmer_dances/





Windows XP SP3 Leaked
Peter White

Robin Hood was revered because he stole from the rich and gave to the poor. And while it's not quite the same thing, there isn't a whole lot of sympathy being thrown towards Microsoft when it was heard that a testing release of Windows XP SP3 was leaked and is floating around the internet now. Everyone loved watching Mel Gibson prove he's an idiot. Everyone loved watching Kramer lose his mind. And everyone loves when things don't go as planned for Microsoft. We love when people who seem to have everything together show that they don't. Plus this Windows leak is an hilarious slap in the face to Steven Sinofsky's little attempt at complete secrecy. It's so fitting that he'd be unsuccessful at keeping things secret, since he looks a bit like a really terrible magician.

SP3 was given to a limited pool of testers in July, after being repeatedly delayed. It was originally planned to be release in 2005. Boy, did that ever go well. The leaked version of SP3 is not quite the finished product, or even a completed Beta, but that hasn't stopped it from becoming an incredibly popular torrent download. It comes in at around 340 Mb and can be found pretty much everywhere. But then again, you'd never download something illegally like this, would you?
http://www.downloadsquad.com/2007/08...xp-sp3-leaked/





Judge Says Unix Copyrights Rightfully Belong to Novell
John Markoff

In a decision that may finally settle one of the most bitter legal battles surrounding software widely used in corporate data centers, a federal district court judge in Utah ruled Friday afternoon that Novell, not the SCO Group, is the rightful owner of the copyrights covering the Unix operating system.

In the 102-page ruling, the judge, Dale A. Kimball, also said Novell could force SCO to abandon its claims against I.B.M., which SCO had sued. Judge Kimball’s decision in favor of Novell could almost entirely undermine SCO’s 2003 lawsuit against I.B.M.

The ruling could remove the cloud over open-source software like Linux, an operating system loosely modeled on the proprietary Unix. The unresolved ownership has been seen as a limiting factor in the willingness of computing managers for businesses large and small to adopt open-source software, which can be adapted freely by software developers and can be legally shared or modified by end users.

“It was argued that this was supposed to suggest riskiness in open source, but it turns out that the open-source world was rock solid from the beginning,” said Eben Moglen, a professor of law at Columbia University and the founding director of the Software Freedom Law Center, which advocates open-source software.

SCO’s shares declined by 1 cent, to $1.55, in after-hours trading. The company’s stock reached $19.41 after the lawsuit against I.B.M. was filed in 2003.

In that suit, SCO said I.B.M. had violated a contract by copying code from the Unix operating system to Linux, an open-source operating system that is distributed free and that I.B.M. uses on some of its computers.

SCO had said that Linux was an unauthorized derivative of Unix, which it said it had purchased from Novell in 1995.

“The court’s ruling has cut out the core of SCO’s case and, as a result, eliminates SCO’s threat to the Linux community based upon allegations of copyright infringement of Unix,” said Joe LaSala, Novell’s senior vice president and general counsel.

Executives for SCO did not immediately return phone calls on Friday evening.

The Unix operating system, which has become popular with some independent-minded PC users as well as in the corporate world, was developed by AT&T researchers at Bell Labs beginning in 1969. During the 1970s, the operating system became highly influential in academic computing and in computer science departments.

In the ’80s, it had a significant impact in the computer workstation and minicomputer markets, although it never gained a significant foothold in the personal computer business until Steven P. Jobs brought a version of Unix with him when he returned to Apple Computer in 1997. Some PC makers have begun to offer versions of Linux instead of Microsoft’s Windows operating systems.

Open-source software advocates said the ruling vindicated the open-source approach to software development.

“This is a meaningful message in terms of people adopting open-source software,” said James Zemlin, executive director of the Linux Foundation, a nonprofit consortium formed to foster the operating system. “This says that Linux is a safe solution and people can choose it with that in mind.”

Several legal experts said that minor legal questions might still remain in SCO’s suit against I.B.M., related to promises that I.B.M. may have made in a failed joint development effort.
http://www.nytimes.com/2007/08/11/te.../11novell.html





Nokia to Tuck in Microsoft DRM Software

Mobile phone giant Nokia will start to use Microsoft's copy protection software to boost the use of wireless entertainment, like music and videos, the two companies said Monday.

Microsoft's technology enables people who use Nokia cell phones to share protected pieces of content--like music, games or videos--between phones, PCs and other devices.

Nokia, the world's largest cell-phone maker, will license Microsoft's PlayReady digital rights management (DRM) technology, and build it into its S60 software, the most widely used software platform in the cell-phone industry.

Nokia's S60 software, built on U.K.-based Symbian's operating system, is used extensively in Nokia's lineup, but also in advanced cell phones of LG Electronics and Samsung Electronics.

Its closest rival is Microsoft's own Windows Mobile, but analysts said the deal should benefit both.

"It is in both (companies') interest that there is compatibility between the two and content can flow between devices," said Geoff Blaber, senior analyst at consultancy CCS Insight.

In 2005 the two companies signed their first cooperation agreement to put Windows Media player on to Nokia phones, raising eyebrows as the two had been fierce competitors in the mobile software industry.

As cell phone prices fall, handset vendors are looking for new revenue from potentially lucrative software operations, while at the same time Microsoft is looking for new revenue from the mobile space.

In June, Nokia said it would reshape its whole organization to better focus on software and services.

Nokia said it expects many S60 and its lower-tier Series 40 phones, which are also included in the deal, using PlayReady technology to hit the market in 2008.

"This takes it to a huge portfolio of Nokia devices," CCS's Blaber said. "The deal makes perfect sense for Nokia. There isn't so comprehensive a DRM solution available for mobile space."

The companies said they expect the deal to widen the entertainment offering on cell phones.

Entertainment services--games, music, TV, adult content and gambling--would grow to $38 billion by 2011 from around $18.8 billion in 2006, according to research firm Informa.

Music has been the main driver for mobile entertainment so far, the breakthrough of mobile television broadcasts is expected to give the market a new boost.

"This is a new thing and developing at a rapid clip. Can it get better and move to the mainstream? Absolutely. Nokia and Microsoft, being large influential companies, are trying to push the ball forward," Chadd Knowlton, general manager for content access and protection at Microsoft, told Reuters.

"Mobile television, that's going to be much more mainstream than today's entertainment features," Knowlton said. Microsoft and Nokia said they would also work together to enhance and simplify consumer access to digital content using mobile devices.

"This partnership will enable a very broad range of content to be available for consumers," said Sebastian Nystrom, a director at Nokia's technology unit.

Nokia is widely expected to launch an online music and mobile content store, a rival to Apple's iTunes, in coming months, using technology gained from last year's acquisition of U.S. digital music distributor Loudeye.

Nystrom declined to comment on the possible effect the Microsoft deal could have on services built on the Loudeye acquisition, but said: "Overall, PlayReady will be the key component in offering such services to consumers."
http://www.reuters.com/article/techn...64683520070806





China's iClone
Dan Koeppel

The little gadget was bootleg gold, a secret treasure I'd spent months tracking down. The miniOne looked just like Apple's iPhone, down to the slick no-button interface. But it was more. It ran popular mobile software that the iPhone wouldn't. It worked with nearly every worldwide cellphone carrier, not just AT&T, and not only in the U.S. It promised to cost half as much as the iPhone and be available to 10 times as many consumers. The miniOne's first news teases—a forum posting, a few spy shots, a product announcement that vanished after a day—generated a frenzy of interest online. Was it real? When would it go on sale? And most intriguing, could it really be even better than the iPhone?

I made a hastily arranged flight to China to find out. Ella Wong, a marketing manager at Meizu, the Chinese company building the new phone, had invited me to come to the annual Hong Kong Electronics Fair only days before it began this April. We had been trading e-mails for weeks, negotiating access to the miniOne and the operation that produced it. Meizu cloned Apple's iPod Nano last year, establishing itself as a significant force in a music-player market far larger than Apple's: international consumers who had little access to either Macintosh computers or the iTunes music store. The miniOne was going to be on display at the fair, and Jack Wong, Meizu's CEO, would also be there. If I made a good impression, I would be invited to the company's headquarters and research facility on the mainland. "You'll be warmly welcome," Wong wrote me.

My journey was more than a pilgrimage born of techno-lust (though there was an element of that as well). Nearly every type of product can be—and is—cloned in China, sometimes so well that the ripped-off manufacturers inadvertently service the fakes when warranty claims come in. Cloners make air conditioners with the LG brand name in the country's remote west, along what was once the old Silk Road trading route. But cloners don't have to sell their wares under the same brand name: In Anhui province, near the Yangtze River, one of China's biggest auto manufacturers builds a part-for-part replica of a top-selling Chevrolet model, then slaps a new badge on the car. In the south, one cloning operation didn't just copy a technology company's product line—it duplicated the entire company, creating a shadow enterprise with corporate headquarters, factories, and sales and support staff.

But the miniOne represents the vanguard of this cloning revolution. Meizu isn't aspiring merely to copy the designs of a Western manufacturer on the cheap. The company plans to give the miniOne capabilities beyond the original. Does this signal the start of something bigger in China—the years of reverse engineering serving as a de facto education for the engineers who will soon transform China into a design and engineering powerhouse? Is China on the cusp of going legit?

Several hours after I arrived at the Hong Kong Electronics Fair, I finally found Meizu's (maddeningly unlisted) booth and asked for Ella Wong. She was sitting at a table, talking to a pair of potential customers. When she finished, I introduced myself. "Thanks for making this happen," I said. "Would this be a good time to start talking about the miniOne, or to make arrangements to meet Jack Wong?" I handed her a business card and a stack of magazines with stories I'd written. She thumbed through a few pages and smiled. "The phone? Mr. Wong? Oh, that may not be possible," she said. Silence. What about our e-mails, the conversations, the invitation? She was struggling to be polite. It isn't customary in China to be forced into an outright yes or no. "Come back," she said, "maybe in September."

Counterfeit Road
Sitting in a ground-to-a-halt taxi during rush hour along Beijing's third ring highway (five encircle the city; many more are under construction) gives a visitor plenty of time to rubberneck. The cars are familiar: Volkswagen, Honda and Toyota all have a presence here. But even vehicles with unfamiliar names cut recognizable silhouettes. There's a small SUV, emblazoned with the Laibao brand name, that looks like a twin sister to Honda's CR-V. Although the Geely Meerie is copied from a Mercedes C-class, it costs only 120,000 yuan, or about $15,000.

But at the sweet spot of the Chinese car market are vehicles that sell for around $5,000, just shy of the average middle-class Chinese family's annual income. When you're stuck in traffic, you're surrounded mostly by the ruler in that category: the Chery QQ.

The QQ is a part-for-part reproduction of a car known, depending on where it is sold, as the Chevy Spark or the Daewoo Matiz (the genuine vehicle is built as part of a joint venture between General Motors and the Korean company). Sparks are sold all over the world—in the U.S., an upgraded $10,500 variant called the Aveo is cheaper than any other car you can buy. But when the $5,000 QQ first appeared in 2003, GM—and American officials—were astonished. "If you didn't have name tags on the cars, you couldn't tell them apart," said Congressman James Sensenbrenner of Wisconsin after a 2004 trip to China. "It's such a good knockoff that you can pull the door off the Spark and it fits on the QQ, so close that the seals on the doors match right up."

The ability to clone such technologically sophisticated products is a recent development in China. A report issued by the consulting firm A.T. Kearney breaks the growth of China's cloners into five distinct periods. The first, in the 1980s, was primitive, consisting mostly of cheap textile knockoffs like Mickey Mouse shirts. The second, starting around 1990, still involved clothing and accessories, but with enough authenticity—high-quality Nike and Reebok fakes led the way—to be accepted as handy substitutes by thrift-conscious Westerners. By the middle of that decade, Chinese copiers had moved from basic trademark infringement into low-end technology products: Duracell batteries and DVDs. From there, the study says, an era of "advanced technology piracy" began. Functionally close-to-the-mark products like Callaway golf clubs and counterfeit automotive safety glass appeared in 1998. By the millennium, piracy had reached levels of refinement that saw China offering functional duplicates of Intel processors, Viagra tablets and Bosch power tools.

In many ways, this is similar to the path industrial powerhouses like Japan and South Korea have taken. China has gone from making only cheap, toss-away goods, like budget toys and portable CD players, to creating alternatives to nearly every one of the West's most admired brands. But China is unique in that—as with its modernization in general—it's doing so at an accelerated pace, going from shoddy to quality in little more than a decade.

How to Clone Anything
The easiest way to clone a product is to use a "ghost shift": A factory contracted to make legitimate goods moves to 24-hour operation, churning out copies—some made with inferior materials, and others exactly the same, designed to be sold on the black market—from midnight to morning.

The only problem with ghost shifts is that they can't run full time. In the mid-'90s, developers began to build shadow factories—identical plants, often constructed from the same blueprints legitimate manufacturers used to launch their ventures. Sometimes the plans were sold by managers at the genuine facilities. Other times, local officials and organized crime conspired to create a second set of blueprints.

As technology companies became aware of the extent of the cloning problem, many began to use selective outsourcing. Less-secret components would be built in China, while more proprietary items, like circuit boards, might be manufactured domestically. Even so, sometimes a company's products are cloned even if it has no working relationship with China at all. The Thomas G. Faria Corporation, an American company that builds dashboard gauges for boats and military Humvees, discovered an entire plant in China dedicated to cloning its product, even though it had never done any manufacturing overseas, or even outside of Connecticut, where it is based. The clones were found all over the world, and although they worked poorly, they looked the part. "These clones bear our name and address," David Blackburn, the company's CEO, told the U.S. China Economic and Security Review Commission. "The label . . . contains our catalog part number and the initials of a calibrator, as well as a final tester."

Cloners look for opportunity first, and manufacturers often give it to them, often in the form of a hot product that is released in a limited number of markets. Desire spreads worldwide, and the cloners are ready to fill any gaps that emerge in supply or distribution. (That's what's happening now with the iPhone, which for nearly a year will be sold in North America only.)

In November 2005, LG Electronics, a Korean company that is the world's third-largest mobile-phone maker, released a device that in many parts of the world was as anticipated as the iPhone was here. The "Chocolate" features a slide-out keypad, a large color screen and a very Apple-like navigation wheel; it plays music as readily as it makes calls and sends text messages. LG has sold 10 million of them worldwide—the same quantity Steve Jobs has set as the initial iPhone goal.

LG's phone began to sell out as soon as it was released, but it took four months for the Korean electronics giant to release a version for China. By then, it was too late: A doppelgänger Chocolate had hit the market first, and had become the preferred choice for Chinese shoppers. Quality wasn't an issue. The fake phone was "exactly like the real one in design," a company spokesperson told Chosun Ilbo, Korea's largest daily newspaper. "Chinese people think it's LG electronics that manufactures the fakes."

Last year, fed up with a torrent of bootleg cellphones that was costing the company a billion dollars a year, Samsung hired investigators to trace the phones back, through multiple supply channels, to their manufacturers. The results of that investigation, along with analysis done by independent researchers, uncovered some of the technical strategies undertaken by reverse-engineering operations.

The cloners start by deciding what phones would be most profitable to clone. They then learn everything they can about the device. They attend trade shows, furiously snapping photos of not-yet-released products until someone notices and shoos them away. They will be first in line to buy the new product whenever it hits stores. And they will look for shortcuts, such as a patent filed in China that can act as the beginning of an actual production guide.

The cloners hire a team of between 20 and 40 engineers to begin decoding the circuit boards. At the same time, coders start to develop an operating system for the phone with a similar feature set. (The typical cloner either uses off-the-shelf code, writes something entirely new, or modifies a publicly available Linux-based system.) Both processes take about a month. By then, ancillary items—plastic casings, accessories, manuals and packaging—are ready as well. Full production begins at another factory, one that is already building phones, within about eight weeks from the time the engineers are hired. After a run of about 30,000 units, the cloners move the operation to a new facility in order to avoid detection.

Samsung was impressed by the efficiency of the cloners, so much so that the company offered them jobs. The cloners said no. Earning about $1.25 per phone, the cloners said, they found it easier and more profitable to make fakes. The only known result of the investigation? Samsung now takes care to release products in China shortly after they come out in Korea. Its only defense is to give cloners a smaller window of opportunity.

Company Copy
In 2006, NEC, one of the 25 biggest consumer-electronics firms in the world, went public with the results of a two-year investigation. The company had been receiving complants about products it didn't even make: DVD players, cellphones, MP3 players. Investigators from International Risk, a private security firm employed by NEC, ultimately uncovered a shadow version of the company operating out of corporate offices in China, with ties to more than 50 manufacturing facilities. "On the surface, it looked like a series of intellectual-property infringements, but in reality a highly organized group has attempted to hijack the entire brand," says Steve Vickers, the former Hong Kong police inspector who was in charge of the investigation for International Risk. Executives had their own NEC business cards and e-mail addresses. They had marketing plans and distribution networks in place. Some "company" facilities even had electronic signs bearing huge, lighted NEC logos. Most bold of all, the bogus NEC actually charged the manufacturers it worked with royalties on its designs.

The investigation led to raids last year on 18 of the manufacturing sites and the seizure of nearly 50,000 fake products. Yet the factories themselves are still operating, just not using the NEC name. The ringleaders of the scam have yet to be caught; like the Samsung copiers, they are thought to still be making fakes.

Death to the Bootleggers
The Chery QQ demonstrates more than just the skill of modern cloning. It also illustrates the danger. Easy-fit doors and rearview mirrors aside, there are differences—scary differences—between the Spark/Matiz and the QQ. As news of the copycat car spread last year, a German automotive club conducted and videotaped a comparative crash test between the two vehicles. When the Matiz hits the barrier, the front end crumples. The rear of the car bucks upward and then thuds back to the ground. An impact chart shows serious yet nonfatal injuries to both the driver's and passenger's head and legs (the chart distinguishes impact with color: the redder the deadlier). The Chery hits the obstacle at the same speed. The rear end of the car lifts higher than the Matiz and begins to rotate. The driver-side door pops open. Hood, engine and roof crumple into the passenger compartment. The frame buckles, bringing the vehicle flat to the ground. On the impact chart, the driver's head, neck and chest are brown and red: not survivable.

Over the past few months, concern over the safety of Chinese copies, as well as legitimate products with Chinese ingredients or brand names, has become more real to consumers in the U.S. In June, the FDA warned consumers about Chinese-made toothpaste, millions of tubes of which were on-sale in the U.S. The substance in the toothpaste—diethylene glycol, a toxic component of antifreeze—had been used as a substitute for glycerin, a common sweetener. A similar substitution killed about 100 people in Panama last year.

Ironically, well-publicized, embarrassing cases like this could actually provide some of the impetus necessary to vault China into the sixth stage of cloning—making better-than-real products. "If Western-style controls are put in place, that's just another way the infringers will learn how to do a better job of what they do," says Danny Friedmann, a Dutch intellectual-property expert who runs a blog called IP Dragon.

Although there have been legal victories against cloners, most of the time they have been minor and fleeting. Last year, Sony won a lawsuit against a Guangzhou company that was copying the company's camcorder batteries. In another of the most watched cases, Prada, Chanel, Gucci, Burberry and Louis Vuitton sued Beijing's organized "Silk Market," one of the city's most well-visited locales for fake goods, and shut it down. Despite the low monetary damages—$75,000 for Sony, and $12,500 in the Silk Market affair—the victories were hailed by some as part of a growing recognition in China that counterfeiting needs to be halted. The cases demonstrated the "strong resolve of the Chinese authorities in protecting intellectual-property rights," says Tan Loke Khoon, head of the intellectual-property practice in Hong Kong and China at the law firm Baker & McKenzie, which brought the two lawsuits.

But on my visit to Beijing, the Silk Market hadn't just reopened. It had expanded, turning itself from a seedy array of tiny stalls into a full-fledged modern shopping mall: a forbidden city of fakes. That's part of the dilemma in "fixing" the counterfeit problem, Friedmann says: "There's an impression that China is strongly controlled by the central government. The truth is that there's power everywhere. China is filled with 'little emperors' who can do whatever they want."

Yet when a cloner is brought to justice—especially if the case makes headlines, embarrassing the Chinese authorities—punishment can be both swift and harsh. On May 29, Zheng Xiaoyu, the former head of China's FDA, was sentenced to death after taking the equivalent of $850,000 in bribes. The bribes were given in part to secure the approval of a counterfeit antibiotic that later killed 10 people in 2006. The Chinese court said the sentence was warranted and that Zheng had "endangered public life and health," as well as "the efficiency of China's drug monitoring." According to Jiang Zhipei, a Chinese supreme-court justice specializing in intellectual-property cases, punishments like this show that "the judicial system is working actively to make people aware of how important this is." Zheng was executed on July 10.

Growing Beyond Fakes
The end of Chinese cloning will come when Chinese products become good enough to stand on their own, just as Japan's did in the 1970s and Korea's did in the 1980s. The difference is that China is moving much faster toward this goal than Korea or Japan ever did. Less than a year ago, the Chery QQ was junk. On July 3, Chery and Chrysler announced an agreement to build Chery vehicles that will wear the Dodge badge. Chrysler will sell the cars in Eastern Europe and Latin America beginning next year, and in 2009 will bring them to Western Europe and North America. The deal grew from Chery's plan to improve quality by outsourcing engineering and design to Western companies. There's little doubt that Chery will learn from its new partners.

An important factor in this transformation is China's improving consumer economy. Just as the Chery deal made the news, the Beijing government instituted a nationwide minimum wage. Although the move was made as a response to rising food prices, it increases production costs for Chinese manufacturers, forcing them to move away from rock-bottom products. In cities, Chinese paychecks have already risen fast enough to create a thriving consumer class. As those consumers demand better products, China's manufacturers will begin to develop items that meet export standards.

Take, for example, the iPhone. The key to its simple interface is a screen that responds to several touches at once. It makes rapid text entry possible and allows keyboard-and-mouse-type navigation through Web pages and the phone's built-in applications. The screen is built by a German company called Balda, but the technology itself, licensed to Apple's supplier, is neither American nor European. It was originally developed to aid in the rapid input of Asia's huge, character-based alphabets. It comes from China.

The Next iClones
Copies of the iPhone are now dividing into two categories: the inspired-bys and the wholesale duplicates. The first category includes work-alikes manufactured by well-known cellphone makers, like HTC—one of the largest manufacturers of smartphones—and Sun Microsystems. HTC announced that it will be bringing its "Touch" model to the U.S. this fall. In May, Sun CEO Jonathan Schwartz followed in the footsteps of Steve Jobs (and Meizu's Jack Wong) by displaying his own one-off version of a touchscreen prototype at a software-developers convention. Sun's chairman, Scott McNealy, had no qualms about making the iPhone comparison: "We have our own shirtsleeve version of Steve Jobs announcing a phone," he told the audience.

The number of duplicates is also growing. Although Meizu may have gone silent because of fears of an Apple lawsuit—after my visit in Hong Kong, they stopped responding to my e-mails and phone calls—other companies are moving ahead. A few days before Apple's launch, an online video surfaced depicting a sleek new product called the P168. The phone came in a black box, marked with both the iPhone and the Apple logos. The video showed the phone being unpacked and operated (the start-up screen also featured the Apple branding). There were features that the iPhone didn't have, such as the ability to operate on two different networks at once; six speakers; and, addressing a major prerelease complaint about the iPhone, a removable battery. I asked my translator if she could find one on the street. They weren't available in Beijing—yet—but a few weeks later, a friend discovered one in Guangzhou. The manufacturer of the P168 wouldn't comment for this story, but the hardware was real, and it worked.

Neither the miniOne, the P168 nor even HTC's model are likely to carry the mystique or quality of the iPhone. But that's not really the point. Those phones will be available to millions more consumers than Apple's product, at a lower price. The rest of the world will accept the clones as if they were the original. That will make them no different than a flood of Chinese products—cars, pharmaceuticals, food, appliances—that are emerging from the shadows and climbing the learning curve to the point that they will no longer be clones at all. They'll be the real thing.
http://www.popsci.com/popsci/technol...cbccdrcrd.html





U.S. Supports Patent Ruling in a Setback for Qualcomm
Matt Richtel

In a decision watched closely by the mobile phone industry, the Bush administration let stand an earlier ruling that requires Qualcomm to pay licensing fees to its competitor Broadcom.

Qualcomm, which makes chips used in many mobile phones, has argued that the ruling, made in June by the U.S. International Trade Commission, could lead to a ban on the importation of millions of new phones that use power management technology covered in a patent controlled by Broadcom.

But serious disruption in the phone market is unlikely, said Susan Schwab, the U.S. trade representative, in upholding the ruling Monday.

Schwab noted that since the June ruling, two major mobile phone carriers had reached agreements to pay licensing fees to Broadcom, allowing them to bring the latest phones into the country.

Schwab also noted that Broadcom had agreed to give a royalty-free license to public safety organizations using new phones, a move that she said ameliorated Qualcomm's claim that Broadcom's demand for fees could hamper public safety. The decision is a blow to Qualcomm, which makes chips for phones used on mobile phone networks operated by Verizon Wireless, Sprint and AT&T. Qualcomm has argued that the licensing fees of $6 a phone that Broadcom demanded were prohibitively expensive.

Broadcom, a chip maker, has countered that Qualcomm is using its power management technology without paying royalties. Broadcom has sued Qualcomm over the issue, but the suit was stayed pending a decision by the trade representative.

Lou Lupin, general counsel for Qualcomm, said the company planned to appeal for an emergency stay of the ruling. He said Qualcomm's argument that the June ruling would hamper public safety appeared to have been at least partly undermined by Broadcom's agreements with the two mobile carriers. Verizon reached a deal with Broadcom last month. The other company has not been publicly identified.

David Rosmann, vice president for intellectual property litigation at Broadcom, said the company would seek an immediate enforcement of the ruling that would bar the importing of phones with unlicensed Broadcom technology. Rosmann said such a ban would probably affect fewer than 10 percent of phones, and only new models that are not yet on the market.

Qualcomm loses patent rights

Qualcomm said a U.S. judge has ruled that the company has waived its rights to enforce certain patents asserted against Broadcom related to a video compression standard, Reuters reported from New York on Tuesday.

The court held that Qualcomm had deliberately concealed two patents from the standard-setting body responsible for developing the H.264 video standard and therefore was precluded from enforcing the patents, Qualcomm said. The company plans to appeal the decision. http://www.iht.com/articles/2007/08/...ogy/patent.php





'Bionic Woman' and 'Cavemen' Top New Shows Among TV Watchers

NBC and ABC newbies outpace competition in three critical categories
Chandra Williams

Consumer research and consulting firm OTX (Online Testing eXchange) issued a press release today outlining which of the broadcast networks' new Fall 2007 shows are currently generating the most awareness, interest (in terms of definite intent to watch), and buzz among potential U.S. viewers aged 18 to 49. Although the data doesn't hold true for every demographic, it does indicate which freshmen series networks are doing a better job of promoting to audiences, as well as which new shows are resonating most with the public.

I am not surprised in the least that the Peacock Network's Bionic Woman ranks first on two scales, awareness and intent to view. But, considering all of the negative criticism and predictions coming from assorted TV critics and bloggers, I do find it odd that ABC's sitcom Cavemen leads the pack when it comes to buzz; I haven't heard a kind word about the show yet. Maybe people just want to gauge for themselves if the series is as bad as many who have viewed early cuts are claiming.

Other Fall 2007 rookies that have scored big with Americans include CBS' controversial reality offering Kid Nation (third in awareness and buzz, and tied for fifth in intent to watch), ABC's imaginative crime dramedy romance Pushing Daisies (fourth in awareness and buzz, and tied for fifth in intent to watch), CBS' Latino family drama Cane (fifth in awareness and tied for fifth in intent to watch), and Fox's next adapted Gordon Ramsay reality concoction Kitchen Nightmares (third in intent to watch and tied for fifth in buzz).

Noticeably absent from every metric are ABC's upscale male-oriented drama Big Shots, CBS' vampire crime drama Moonlight, The CW's coming-of-age sitcom Aliens in America, Fox's Kelsey Grammer and Patricia Heaton-led sitcom Back to You, and NBC's fantasy drama Life.

Below are all of the tabulated results released.


Top 10 New Shows | Awareness

Bionic Woman (NBC)
Cavemen (ABC)
Kid Nation (CBS)
Pushing Daisies (ABC)
Cane (CBS)
Next Great American Band (FOX)
K-Ville (FOX)
Journeyman (NBC)
The Big Bang Theory (CBS)
Reaper (CW)
Gossip Girl (CW)
Chuck (NBC)

Top 5 New Shows | Buzz

Cavemen (ABC)
Bionic Woman (NBC)
Kid Nation (CBS)
Pushing Daisies (ABC)
Kitchen Nightmares (FOX)
Private Practice (ABC)

Top 5 New Shows | Intent to View (Will Definitely Watch)

Bionic Woman (NBC)
Cavemen (ABC)
Kitchen Nightmares (FOX)
Private Practice (ABC)
Cane (CBS)
Pushing Daisies (ABC)
K-Ville (FOX)
Kid Nation (CBS)
Reaper (CW)
Next Great American Band (FOX)
Journeyman (NBC)
The Big Bang Theory (CBS)

Story





Judge Blocks Anna Nicole Smith Surgery Video
Steve Gorman



A two-hour video of buxom stripper-turned-heiress Anna Nicole Smith undergoing breast augmentation surgery has been blocked from distribution by a California judge.

The estate of the late tabloid celebrity, who died of an accidental overdose of prescription drugs in February aged 39, won a court order barring a plastic surgeon in Texas from selling or circulating videos of procedures he performed on Smith in 1994.

Court documents from the case, including the judge's ruling made on Friday, were posted on the Internet by the Web site CelebTV.com. Smith's death, and the haggling over custody of her child, sparked a media frenzy in the United States.

A lawsuit filed by her estate's executor, Howard K. Stern, accused the Houston physician, Dr. Gerald Wayne Johnson, of taping the surgery without Smith's consent and sending copies to a Los Angeles-based memorabilia dealer, Thomas Riccio.

The suit says Johnson's wife and Riccio agreed to share in proceeds generated from a planned release of the footage to various media outlets.

The exact nature of the surgery was not specified in the lawsuit. But a June 2007 letter signed by Johnson and attached as an exhibit said he performed "breast augmentation reconstructive surgery" on Smith in October 1994, the year she married billionaire oil tycoon J. Howard Marshall.

The letter also says his office "routinely records all such procedures with the knowledge of the patient" and that he retains "all rights to this video which is our policy to keep confidential during the patient's lifetime."

If the patient dies, Johnson wrote, "it is then up to my sole discretion as to how and when I will disseminate or make public any or all of the images within the video we have produced."

Johnson's lawyer could not immediately be reached for comment.

Last month, Stern won a separate court order barring Riccio from distributing the surgery video, and Riccio has complied, Stern's lawyer, Vivian Thoreen, told Reuters on Wednesday.

She said the Johnsons were believed to have retained copies of all the footage and Friday's court order requires them to turn over all the material to Stern.

"We believe it's an estate asset," Thoreen said.
http://news.yahoo.com/s/nm/20070809/...ole_video_dc_1





Britney Spears Desperate To Do Playboy
Diana Barbarich

Britney Spears is reportedly keen on posing for a Playboy spread.

News of the World are claiming that the toubled pop-tart is desperate to do a nude spread for the mag.

The mother-of-two, who is on the verge of losing custody of her two-children - was offered US $1 million to pose nude for the mag during the height of her pop career.

Earlier this month Spears had a meltdown on the set of her OK! Magazine photo shoot.

The Toxic singer reportedly left the shoot wearing US $10,000 worth of borrowed designer items.
http://www.entertainmentwise.com/news?id=18012105





Playboy Mansion at Center of Sexual Assault Claim

The Los Angeles Police Dept. said on Wednesday it was investigating an allegation of sexual assault at the Playboy Mansion, the famed site of unabashed hedonism for more than 30 years.

News reports said the alleged incident took place at the weekend during a pajama party hosted by Playboy magazine's 81-year-old founder, Hugh Hefner, who has lived and worked at the expansive property since 1971.

According to Playboy.com, the annual Midsummer Night's Dream bash was attended by the likes of socialites Paris and Nicky Hilton, movie director Garry Marshall, rock star Dave Navarro and Oscar-winning actor Martin Landau.

An LAPD statement said detectives had started their investigation into "a possible sexual assault" on Monday.

"For reasons of law and confidentiality that are critical aspects in investigations of this type, no additional information will be released at this time," the statement said.

A spokesman for Playboy Enterprises Inc., the adult-entertainment firm that owns the mansion and published the flagship magazine, also declined comment.

The mock-Tudor mansion sits on a lush six-acre (2.4-hectare) lot that Hefner bought for $1.05 million according to Playboy.com.

Located in the chic suburb of Holmby Hills, the estate has hosted thousands of parties over the years, drawing guests who luxuriate in the freewheeling atmosphere. These days, it is often rented out as a corporate entertainment venue.
http://www.reuters.com/article/newsO...40505520070809





Authorities Drop Investigation of Reported Sex Assault at Playboy Mansion
AP

Authorities dropped an investigation into a reported sexual assault at Hugh Hefner’s Playboy Mansion because of insufficient evidence, prosecutors said Friday.

The case was submitted to county prosecutors, and no charges will be filed, the Los Angeles Police Department said in a statement.

The investigation was launched Monday into claims that a 22-year-old woman might have been raped while unconscious, officials said. The allegation involved a 17-year-old boy.

"She recalls at one point having sexual intercourse with the minor and pushing him away," said Sandi Gibbons, a district attorney’s spokeswoman.

Authorities could not corroborate the woman’s statement, Gibbons said. The woman also has claimed memory loss and declined to pursue the case, officials said.

Rob Hilburger, West Coast publicity director for Playboy Enterprises, said police told the company Friday that the investigation had ended.

"Safety and security at the mansion remain a priority, not only for those who live there, but for all invited guests," Hilburger said. "We thank the LAPD for their quick and thorough investigation into this matter."

The Playboy Mansion is in the wealthy Holmby Hills area of West Los Angeles
http://thetrack.bostonherald.com/mor...icleid=1016652





Virtual Sex Machine Spawns Lawsuit
Phil Davis

Kevin Alderman didn't bring sex to "Second Life." He just made it better.

The 46-year-old entrepreneur recognized four years ago that people would pay to equip their online selves — which start out with the smooth anatomy of a Barbie or Ken doll — with realistic genitalia and even more to add some sexy moves.

Business at Eros LLC has been brisk. One of his creations, the SexGen Platinum, has gotten so popular that he's now had to hire lawyers to track down the flesh-and-blood person behind the online identity, or avatar, that he says illegally copied and sold it.

The $45 SexGen animates amorous avatars in erotic positions. It is software code, written in the scripting language of "Second Life" and placed in virtual furniture and other objects. Avatars click on the object and choose from a menu of animated sex acts.

Alderman filed a civil lawsuit in U.S. District Court in Tampa, Fla., last month alleging an avatar named "Volkov Catteneo" broke the program's copy protection and sold unauthorized copies. Alderman, who runs his business from home in a Tampa suburb, allows users to transfer his products, but prohibits copying.

"We confronted him about it and his basic response was, 'What are you going to do? Sue me?'" Alderman said. "I guess the mentality is that because you're an avatar ... that you are untouchable. The purpose of this suit is not only to protect our income and our product, but also to show, yes, you can be prosecuted and brought to justice."

Catherine Smith, director of marketing for "Second Life" creator Linden Lab, said she knew of no other real-world legal fight between two avatars.

However, Linden Labs itself has been sued more than once by subscribers over seizures of virtual property. In 2005, Japanese media reported that a Chinese exchange student was arrested for stealing virtual items from other players in an online game, "Lineage II."

"Second Life" isn't a game. There are no dragons to slay or other traditional game objectives. San Francisco-based Linden Lab describes it as "an online digital world imagined, created & owned by its residents."

Linden Lab provides a free basic avatar, a 3-D virtual representation of the user in male or female form. Everything else costs real money. A 16-acre virtual island costs $1,675 plus monthly maintenance fees of $295. Virtual money, called Lindens, can be exchanged with real dollars at an average rate of about 270 Lindens per $1.

Avatars can be equipped with flowing gowns and tiny tattoos, and users with programming and Photoshop skills can reshape themselves into a virtual Greta Garbo or just about any shape imaginable. With a little cash, users can also have people like Alderman transform the avatars for them.

At Alderman's "Second Life" shop, shoppers can try out a dragon bed powered by one of his SexGen engines. Along with programmers and designers, he employs a sales staff who hang around the shop like real salespeople to pitch the perfect sex toys. He is investing in a $25,000 motion-capture suit, a low-end version of one used to create digital characters in movies, to create more realistic sex moves for "Second Life" avatars.

As customers demand more real life in their "Second Life," though, these virtual creations can collide with reality.

"Virtually every aspect of real life is getting duplicated, and all the laws that can be applied to the real world are being applied in 'Second Life,'" said Jorge Contreras Jr., an intellectual-property attorney in Washington, D.C.

Last year, "Second Life" was rocked by a scandal over users who had modified their avatars to look like children and simulated pedophilia. Last month, Linden Lab shut down gambling in "Second Life" after concerns arose that virtual games of chance might violate U.S. gambling laws when members cashed in Lindens for real money.

Now comes Alderman's SexGen suit, which was filed July 3 and seeks unspecified damages. It accuses the unknown owner of the Catteneo avatar of violating copyright and trademark protections by copying, distributing and selling copies of Alderman's software.

Alderman's attorney, Francis X. Taney Jr. of Philadelphia, said the lawsuit has gotten a lot of attention because it involves sex, but is fundamentally about long-established law.

"It's a piece of software and software is copyrightable," Taney said. "It's also expressed in graphics, which also are copyrightable. There is some sizzle. People like to say it's really far out there, but at the end of the day I equate it to basic intellectual property principles."

Unlike many popular online worlds, such as "World of Warcraft," Linden Lab grants its users broad rights to create and sell content with few restrictions. Users can install copy protection and seek U.S. copyright and trademark protections, all of which Alderman did for the SexGen software.

"Whenever you create a situation where people are buying and selling things and potentially misappropriating them from their rightful owners, it is only a matter of time before the legal system gets called in," said Fred von Lohmann, a senior staff attorney at the Electronic Frontier Foundation in San Francisco. "This seems like a relatively straightforward case. It sounds like there is a real copyright issue."

Taney believes he knows who Catteneo is in real life, but is confirming it through subpoenas of records of eBay Inc.'s PayPal payment service as well as chat logs and trade history in "Second Life." He said Linden Lab and PayPal turned over their records, and he is preparing another round of subpoenas.

"We're proceeding carefully," Taney said. "This guy has claimed the information he gave to Linden was bogus. We are looking for ways to cross check and corroborate the information."

Catteneo, who did not respond to several interview requests sent through the "Second Life" messaging system, will likely have a hard time hiding.

"There is a whole lot less anonymity online than people think," von Lohmann said. "There are over 20,000 people who have been sued for downloading music. They may have felt anonymous, but they're weren't."

Alderman is unlikely to be the last to drag an avatar into court as the designers in "Second Life" try to protect their creations in the same way clothing designers such as Gucci try to eliminate realistic knockoffs

In recognition of the growing legal issues "Second Life" is likely to generate, the country of Portugal recently set up an arbitration center in the virtual world, though it has no power to enforce its decisions.

The legal issues may be similar offline and online, but von Lohmann said the trials could be a lot more interesting.

"In a virtual world, you have the ability to gather evidence you don't have in the real world," he said. "Everything that happens in 'Second Life' is reflected on computer servers. Depending on how long they keep the records, you could actually replay the event as it happens."
http://sfgate.com/cgi-bin/article.cg...f084453D13.DTL





Courtney Loves Responds to Lily Allen Comments
Nme

Courtney Love has spoken out about on alleged comments Lily Allen made about her on MySpace.

The comments were widely reported, but Love said Allen claimed they were down to the fact that her MySpace site was hacked into.

Allen allegedly wrote: "I am not bfs (best friends) w/ (with) C (Courtney) Love, one night with her made me realise why Kurt (Cobain killed himself."

Posting on Myspace.com/courtneylove, Love wrote: "Thanks to Lily Allen for her lovely apologising for having had her MySpace broken into.

"I wouldn't pick on me if I was Miss Lily, as it wouldn't take TOO much to swat, but we've known each other far too long, like each other far too much and if she was gonna say something nasty she has the acerbic wit and intelligence to say something cutting, that would actually really hurt, not some cliched hoary old chestnut some obsessed blogger would say.

"She tells me her MySpace was broken into - even if I REALLY think she did blog it mindlessly some 8am after being up far too long for a young healthy woman I don't care and I appreciate and accept her thoughtfulness for apologising for what was printed, if she is telling the truth and it really doesn't much matter - everyone slams everyone early in their careers, (Sonic Youth)'s Kim Gordon still slams me, I mean how much more boring can you get? (than Kim Gordon - slam!) Does anyone care?"
http://music.yahoo.com/read/news/45594662





How Did Elvis Get Turned Into a Racist?
Peter Guralnick

ONE of the songs Elvis Presley liked to perform in the ’70s was Joe South’s “Walk a Mile in My Shoes,” its message clearly spelled out in the title.

Sometimes he would preface it with the 1951 Hank Williams recitation “Men With Broken Hearts,” which may well have been South’s original inspiration. “You’ve never walked in that man’s shoes/Or saw things through his eyes/Or stood and watched with helpless hands/While the heart inside you dies.” For Elvis these two songs were as much about social justice as empathy and understanding: “Help your brother along the road,” the Hank Williams number concluded, “No matter where you start/For the God that made you made them, too/These men with broken hearts.”

In Elvis’s case, this simple lesson was not just a matter of paying lip service to an abstract principle.

It was what he believed, it was what his music had stood for from the start: the breakdown of barriers, both musical and racial. This is not, unfortunately, how it is always perceived 30 years after his death, the anniversary of which is on Thursday. When the singer Mary J. Blige expressed her reservations about performing one of his signature songs, she only gave voice to a view common in the African-American community. “I prayed about it,” she said, “because I know Elvis was a racist.”

And yet, as the legendary Billboard editor Paul Ackerman, a devotee of English Romantic poetry as well as rock ’n’ roll, never tired of pointing out, the music represented not just an amalgam of America’s folk traditions (blues, gospel, country) but a bold restatement of an egalitarian ideal. “In one aspect of America’s cultural life,” Ackerman wrote in 1958, “integration has already taken place.”

It was due to rock ’n’ roll, he emphasized, that groundbreaking artists like Big Joe Turner, Ray Charles, Chuck Berry and Little Richard, who would only recently have been confined to the “race” market, had acquired a broad-based pop following, while the music itself blossomed neither as a regional nor a racial phenomenon but as a joyful new synthesis “rich with Negro and hillbilly lore.”

No one could have embraced Paul Ackerman’s formulation more forcefully (or more fully) than Elvis Presley.

Asked to characterize his singing style when he first presented himself for an audition at the Sun recording studio in Memphis, Elvis said that he sang all kinds of music — “I don’t sound like nobody.” This, as it turned out, was far more than the bravado of an 18-year-old who had never sung in public before. It was in fact as succinct a definition as one might get of the democratic vision that fueled his music, a vision that denied distinctions of race, of class, of category, that embraced every kind of music equally, from the highest up to the lowest down.

It was, of course, in his embrace of black music that Elvis came in for his fiercest criticism. On one day alone, Ackerman wrote, he received calls from two Nashville music executives demanding in the strongest possible terms that Billboard stop listing Elvis’s records on the best-selling country chart because he played black music. He was simply seen as too low class, or perhaps just too no-class, in his refusal to deny recognition to a segment of society that had been rendered invisible by the cultural mainstream.

“Down in Tupelo, Mississippi,” Elvis told a white reporter for The Charlotte Observer in 1956, he used to listen to Arthur Crudup, the blues singer who originated “That’s All Right,” Elvis’s first record. Crudup, he said, used to “bang his box the way I do now, and I said if I ever got to the place where I could feel all old Arthur felt, I’d be a music man like nobody ever saw.”

It was statements like these that caused Elvis to be seen as something of a hero in the black community in those early years. In Memphis the two African-American newspapers, The Memphis World and The Tri-State Defender, hailed him as a “race man” — not just for his music but also for his indifference to the usual social distinctions. In the summer of 1956, The World reported, “the rock ’n’ roll phenomenon cracked Memphis’s segregation laws” by attending the Memphis Fairgrounds amusement park “during what is designated as ‘colored night.’”

That same year, Elvis also attended the otherwise segregated WDIA Goodwill Revue, an annual charity show put on by the radio station that called itself the “Mother Station of the Negroes.” In the aftermath of the event, a number of Negro newspapers printed photographs of Elvis with both Rufus Thomas and B.B. King (“Thanks, man, for all the early lessons you gave me,” were the words The Tri-State Defender reported he said to Mr. King).

When he returned to the revue the following December, a stylish shot of him “talking shop” with Little Junior Parker and Bobby “Blue” Bland appeared in Memphis’s mainstream afternoon paper, The Press-Scimitar, accompanied by a short feature that made Elvis’s feelings abundantly clear. “It was the real thing,” he said, summing up both performance and audience response. “Right from the heart.”

Just how committed he was to a view that insisted not just on musical accomplishment but fundamental humanity can be deduced from his reaction to the earliest appearance of an ugly rumor that has persisted in one form or another to this day. Elvis Presley, it was said increasingly within the African-American community, had declared, either at a personal appearance in Boston or on Edward R. Murrow’s “Person to Person” television program, “The only thing Negroes can do for me is buy my records and shine my shoes.”

That he had never appeared in Boston or on Murrow’s program did nothing to abate the rumor, and so in June 1957, long after he had stopped talking to the mainstream press, he addressed the issue — and an audience that scarcely figured in his sales demographic — in an interview for the black weekly Jet.

Anyone who knew him, he told reporter Louie Robinson, would immediately recognize that he could never have uttered those words. Amid testimonials from black people who did know him, he described his attendance as a teenager at the church of celebrated black gospel composer, the Rev. W. Herbert Brewster, whose songs had been recorded by Mahalia Jackson and Clara Ward and whose stand on civil rights was well known in the community. (Elvis’s version of “Peace in the Valley,” said Dr. Brewster later, was “one of the best gospel recordings I’ve ever heard.”)

The interview’s underlying point was the same as the underlying point of his music: far from asserting any superiority, he was merely doing his best to find a place in a musical continuum that included breathtaking talents like Ray Charles, Roy Hamilton, the Five Blind Boys of Mississippi and Howlin’ Wolf on the one hand, Hank Williams, Bill Monroe and the Statesmen Quartet on the other. “Let’s face it,” he said of his rhythm and blues influences, “nobody can sing that kind of music like colored people. I can’t sing it like Fats Domino can. I know that.”

And as for prejudice, the article concluded, quoting an unnamed source, “To Elvis people are people, regardless of race, color or creed.”

So why didn’t the rumor die? Why did it continue to find common acceptance up to, and past, the point that Chuck D of Public Enemy could declare in 1990, “Elvis was a hero to most... straight-up racist that sucker was, simple and plain”?

Chuck D has long since repudiated that view for a more nuanced one of cultural history, but the reason for the rumor’s durability, the unassailable logic behind its common acceptance within the black community rests quite simply on the social inequities that have persisted to this day, the fact that we live in a society that is no more perfectly democratic today than it was 50 years ago. As Chuck D perceptively observes, what does it mean, within this context, for Elvis to be hailed as “king,” if Elvis’s enthronement obscures the striving, the aspirations and achievements of so many others who provided him with inspiration?

Elvis would have been the first to agree. When a reporter referred to him as the “king of rock ’n’ roll” at the press conference following his 1969 Las Vegas opening, he rejected the title, as he always did, calling attention to the presence in the room of his friend Fats Domino, “one of my influences from way back.” The larger point, of course, was that no one should be called king; surely the music, the American musical tradition that Elvis so strongly embraced, could stand on its own by now, after crossing all borders of race, class and even nationality.

“The lack of prejudice on the part of Elvis Presley,” said Sam Phillips, the Sun Records founder who discovered him, “had to be one of the biggest things that ever happened. It was almost subversive, sneaking around through the music, but we hit things a little bit, don’t you think?”

Or, as Jake Hess, the incomparable lead singer for the Statesmen Quartet and one of Elvis’s lifelong influences, pointed out: “Elvis was one of those artists, when he sang a song, he just seemed to live every word of it. There’s other people that have a voice that’s maybe as great or greater than Presley’s, but he had that certain something that everybody searches for all during their lifetime.”

To do justice to that gift, to do justice to the spirit of the music, we have to extend ourselves sometimes beyond the narrow confines of our own experience, we have to challenge ourselves to embrace the democratic principle of the music itself, which may in the end be its most precious gift.
http://www.nytimes.com/2007/08/11/op...=1&oref=slogin





Where Have all the ‘Hit Records’ Gone?
Franklin Paul

They call it a “hit record,” but these days vinyl has nothing to do with what’s hot in musical entertainment.

Recording industry bible Billboard this week said it will supplement its “Hot 100″ singles chart with information about songs streamed over the Internet. That’s right — songs not bought at a store or downloaded onto a digital music player or heard on the radio. These are songs available through Web sites like Yahoo Music or AOL Music.

The move comes two years after Billboard succumbed to the 800-pound gorilla called iTunes and baked digital downloads into its charts.

“In the new Billboard Hot 100 formula, radio audience will average about 55 percent of the chart’s total points. Digital sales will account for about 40 percent, and streaming media will determine 5 percent. Physical singles — in line with the music industry’s retreat from that product over the past decade — will account for less than 1 percent of the chart’s new formula,” Billboard said.

You’d be hard pressed to find a physical copy of Rihanna’s “Umbrella”, Plain White T’s “Hey There Delilah”, or Sean Kingston’s “Beautiful Girls” in a record store, since big music knows there is big money in digital media, including the next medium Billboard may start to track — ringtones.

This makes me wonder. When is the last time you bought a physical CD or a single? (I’ll answer first: I bought a CD this year — one CD.)
http://blogs.reuters.com/2007/08/03/...-records-gone/





Amazon Leads Investment in Music Site AmieStreet
Yinka Adegoke

AmieStreet, a digital music site that prices songs of new artists according to their popularity, said on Monday that Amazon.com Inc. is leading a first round of investment in the start-up.

Started last October by three Brown University graduates, AmieStreet allows musicians to post songs with a variable pricing model, which is different from the one-price model used by Apple Inc.'s popular iTunes Music Store.

A new song on AmieStreet.com is initially priced at zero cents. The song is automatically given a starting price after users begin to download the song. The price rises gradually with popularity, to a maximum of 98 cents.

"The idea of having customers directly influence the price of songs is an interesting and novel approach to selling digital music," Jeff Blackburn, senior vice president for business development at Amazon, said in a statement.

Terms of the investment were not disclosed. AmieStreet said Amazon led the round, which included a few private investors.

Amazon said in the spring it will open a digital music store by the end of the year. So far it has announced it will sell music from one major record company EMI Group and a large number of independent labels.

The vast majority of individual songs sold on iTunes cost 99 cents each regardless of their popularity.

Executives at Warner Music Group and other music labels have complained that songs should not all be sold at one price, but Apple has refused to budge on the issue though iTunes does have varied pricing on some albums and promotions.

AmieStreet co-founder and chief marketing officer Joshua Boltuch told Reuters the new funding would allow the start-up to expand its social networking features.

"We really wanted to do a better job of displaying the networking going on the site," he said.

Boltuch said the company hopes to offer more services to communities that have developed on the site as fans share or recommend songs or artists to others.

Existing social networking sites like MySpace and Bebo also serve as a promotional and marketing service for artists trying to build a fan base around their network pages.

AmieStreet earns most of its money from sharing revenue from music sales. According to its Web site, up to 70 percent of the price of a song or album goes to the artist. The company would not say how much music sells or if it is yet profitable.

Boltuch and his co-founders Elliott Breece and Elias Roman, graduated from Brown last year and had been running the company out of their shared house in a Long Island suburb of New York, with early funding from friends and family.

Boltuch said the new funding would also be used to expand their new office space and facilities in New York.

Some months after the site's test launch, the three founders were invited to Seattle in the spring to meet Amazon executives, including founder and chief executive Jeff Bezos, to discuss how they might work together.
http://www.reuters.com/article/techn...32885420070806





Terra Firma Gains Deal To Take EMI Private
FMQB

Terra Firma's bid to close on EMI is close to being finalized as more than 90 percent of EMI's shareholders have accepted the offer of 265p per share (or Ł3.2billion pounds including debt) to purchase the music group. Regulatory authorities in Brussels and Washington have given their approval.

In an internal memo obtained by FMQB, Chairman of the EMI Group Eric Nicoli said, "Accordingly, all material conditions to the offer have now been satisfied and it is expected that the offer will become wholly unconditional later this month. After this time, there are a few further formalities to complete the process of making us a privately-owned company, including the delisting of EMI from the London Stock Exchange, but as soon as the offer becomes wholly unconditional, Terra Firma will be the controller of the EMI Group and all of its operations worldwide."

He added, "In the Terra Firma team, we have owners who believe in the music business and are highly committed to EMI, and it puts an end to the incessant speculation about the future ownership of the company and the uncertainty that brings to us all. In fact, EMI will be the only purely privately-held of the four so-called music majors and I believe that will be of enormous benefit to all EMI stakeholders."

Change is expected to occur at the company after Terra Firma closes the deal, but Nicoli says, "This will be change for the good. In the past eight years, as well as my role at EMI, I have been non-executive Chairman of three private equity owned companies, all of which benefited from, and were very successful in, private ownership. Terra Firma can provide us with the stability and investment we need right now to come through this difficult period of industry transition and to accelerate our programme to be the world's most innovative and consumer-focused music company, as well as the very best home to musical and executive talent. We are proud to represent a unique roster of awesomely talented artists and songwriters, and our priority will continue to be to create an environment in which they can flourish."
http://fmqb.com/Article.asp?id=449623





Chrysalis Founder Holds Key Card Amid Sale Talk
Gavin Haycock

Senior management at music group Chrysalis are keen to pursue a sale, but a major issue yet to be resolved is what direction founder, chairman and key stakeholder Chris Wright wants to take the business, sources familiar with the matter said on Wednesday.

Interest in Chrysalis has intensified in the wake of private equity firm Terra Firma's 2.4 billion pound ($4.87 billion) bid for EMI, the world's third-largest music firm.

Warner Music is also considering the possibility of going private, according to a New York Post report on Wednesday that sent the company's shares up nearly 15 percent.

The going-private discussion at Warner Music, home to artists such as Madonna and Kid Rock, "is understood to be in its infancy," that report said.

Now the recent disposal by Chrysalis of its radio assets for 170 million pounds has analysts asking how much longer the considerably smaller British rival to EMI can stay independent.

"Chrysalis Music is well placed to build upon and exploit its position as a leading international independent music business and that is our focus," Chrysalis Music CEO Jeremy Lascelles said on Wednesday.

That independence could come via an appropriately structured bid or with Wright taking the business private, analysts said.

"The balance of probability is edging more towards private rather than public status," said Bridgewell Securities analyst Patrick Yau.

Buyers In The Wings

Dresdner Kleinwort's Richard Menzies-Gow upgraded Chrysalis to buy from hold on Tuesday, saying there was little logic for Chrysalis' music business to stay public.

"We believe there are numerous interested suitors ready to offer an attractive price for the business, more than is currently implied in the share price," said Menzies-Gow.

Potential bidders cited by analysts include Sony/ATV, a joint venture between Sony and Michael Jackson, Publicis unit Universal Music -- the world's biggest music firm and private equity vehicles that focus on music publishing.

However, with a 26 percent stake, Wright can influence any decision but his intentions remain unclear, Menzies-Gow said.

Music industry sources said all major music publishers would be interested in looking at Chrysalis, but so far there were no signs that the company was seeking to solicit any offers.

Chrysalis shares ended 9.3 percent higher at 127-1/2 pence, the second-best performance among London media stocks. The shares have risen 13 percent since July 30, the day shareholders approved the sale of the company's radio assets.

With Wednesday's gains, Chrysalis has a market value of just over 210 million pounds.

Rich Asset Pool

Analysts say the jewel in Chrysalis' crown is its music publishing assets. The company's catalogue has around 65,000 publishing copyrights and spans decades and genres.

Blondie, Billy Idol, David Bowie and Jethro Tull feature among its singer/songwriters while current chart acts include Feeder, OutKast and Ray LaMontagne. Michael Jackson, Mariah Carey and Madonna rank among artists who have recorded material from Chrysalis songwriters. The company, whose artists also include Damon Albarn, owns classic masters by Tom Jones and Engelbert Humperdinck plus Beatles' producer royalties.

Analysts think the music publishing business of Chrysalis alone could fetch around 180-200 million pounds following the sale of its radio assets to Global Radio, the private equity firm chaired by former ITV Chief Executive Charles Allen.

"It seems clear to us that the remaining businesses are themselves prime take-private or consolidation candidates, a suspicion underlined by the scaling back of the corporate overhead over the next year and a half," said Bridgewell's Yau.

Phil Riley, CEO of Chrysalis Radio, is expected to resign from the board once the radio disposal is completed. Group CEO Richard Huntingford and Finance Director Michael Connole are due to step down by the end of the year. Investor relations and a number of group functions are also going.

Menzies-Gow thinks that with Lascelles and Finance Director Neil Fenton expected to step into respective group positions, it is unlikely there will be a sale of Chrysalis in the short term.

Dresdner thinks and exit is more likely to be over the next two to four years, particularly as the company has paid down its group debt to just 20 million pounds.
http://www.reuters.com/article/busin...STING_dealtalk





Chatterbox

remember what the sticker said that came on your ipod.

"please don't steal music"

First thoughts when seeing that for the first time:

"Okay then, I'll just infringe the copyrights instead"
http://suprbay.org/showthread.php?t=735





News From The North



The TankGirl Diaries


Swedish MP Challenges Prime Minister on P2P Legislation

Karl Sigfrid, a member of the Swedish parliament and a member of the ruling Moderate Party, has challenged country's prime minister Fredrik Reinfeldt - also a Moderate - to keep the promise he gave to the Swedish filesharers in a television interview before the Swedish parliamentary election last summer. Right before the election the entire Swedish political field felt the heat from the newly founded Pirate Party whose popularity was quickly rising and who threatened to steal a number of seats from the established political parties. When asked about his party's stance on filesharing, the party chairman Reinfeldt stated that he is not going to criminalize an entire generation of young Swedes just because they are sharing music and movies online. He also said that the Swedish justice system has better things to do than to chase filesharers.

Reinfeldt's liberal conservative Moderate Party - positioned right from the center by European standards - was then in opposition. In the election they got a landslide victory that made Reinfeldt the prime minister of the 9 million people Scandinavian country. Now, after being almost a year in power, Reinfeldt's government is pushing for legislation that would give copyright organizations police-like powers to snoop the IP addresses of filesharers and to demand their personal information from the ISPs without due process and without a chance for the targets to defend their privacy. This would open Sweden for the similar mafia-style extortion practices as utilized by the RIAA in the USA. To prevent this from happening, Sigfrid wrote a long and thorough debate article to one of the biggest Swedish newspapers, Dagens Nyheter. In the article, he refers to the recent recommendation by Juliane Kokott, the Advocate General of European Union's Court of Justice, which is the highest court in Europe. The Advocate General recommended that ISPs should not be allowed to reveal the identities of their customers in civil cases, which most of the p2p cases are. The new law proposed by the Swedish government would have a precisely opposite effect, giving the copyright industry special rights to violate the privacy of net users in order to harass filesharers.

Sigfrid notes how recent studies show that only 25% of the nation supports present copyright laws while already 44% of the Swedes including virtually the entire younger generation would legalize all private filesharing. "The technical evolution has made the present copyrights obsolete", Sigfrid writes. "The selling of CDs and DVDs from shops and via mail is being replaced by modern filesharing technologies. The decay of the record industry is a fact that we cannot and should not even try to prevent. To try to stop filesharing through legislation in order to save the record industry is as futile as it would be to try to ban cars in order to save the horse cart industry." Sigfrid also notes that many remarkable free market economists - including Nobel laureates Milton Friedman and Friedrich von Hayek - have criticized copyrights as monopolies that harm the market economies instead of helping them. "Instead of making tougher copyright laws we should make them more lenient, and we should legalize private P2P altogether", Sigfrid says.

Sigfrid's bold challenge to the prime minister has made him an instant hero among the Swedish pirates but the main figures of the Moderate Party have not yet responded at all to his article. Prime minister Reinfeldt has advised, through his representative, the reporters to contact justice minister Beatrice Ask in the matter, and justice minister herself has suddenly become unavailable for the press along with her state secretary Magnus Graner.
http://www.p2pconsortium.com/index.php?showtopic=14028





Swedish Pirate Chief in Berkeley: “We Will Trigger a Global IPR Revolution”
TankGirl

Rick Falkvinge, the founder and chairman of the Swedish Pirate Party, has been touring on West Cost, giving inspiring keynote talks and raising loud ARRRRRs from the audiences at OSCON Open Source Convention in Portland, at Hillside Club in Berkeley, and at both Google and Stanford University in Stanford. Here is the core part of his opening speech at the classy Hillside Club in Berkeley, where the panel guests included Fred von Lohmann from EFF, Anthony Falzone from Stanford's Fair Use Project and Karl Fogel from QuestionCopyright.org.

Rick Falkvinge:


“We don't care if the record labels lose money”

The filesharing debate tends to focus on economic principles. Does filesharing reduce record label profits? And at that point it it often goes: yes it does, no it doesn't, he said, she said... trench warfare style discussion. And that's not very productive. If you have a lot of conflicting reports just giving the opposite conclusions, you unfortunately tend to lose the audience.

So we have taken a different focus. We honestly don't care if the record labels lose money. Because at its heart copyright is a commercial monopoly. It was created in a time when books were distributed by horse and cart to bookstores. And if you were to find an infraction of copyright in those days – you could see a copied book in a bookstore; you could see an unauthorized concert – and the key here is that you could see those in public places with a naked eye.

Today, however, copyright has trapped into our private communication. It's illegal for me to send a piece of music in e-mail to any of you guys here today. And if copyright is to be enforced in this new environment, that means that every piece of private communication must be monitored by law enforcement and by corporate interest groups watching over copyright in order to make sure I don't send their piece of music in private communication. And that includes every letter sent to my lawyer or doctor.

“Lady Justice has a problem”

They are also attacking not only the postal secret but something called the common carrier principle, which means basically that the messenger is never responsible for the contents of the message. They are now saying that Internet service providers should be responsible for what their users do on Internet. So, Lady Justice has a problem. On one side of the scale is one income source for the entertainment industry – essentially a luxury consumption. On the other side of the scale are two foundations for a democratic society. Hmm....

It actually gets worse still. If you allow corporate interest groups to start monitoring private communications, you lose whistle blower protection. Because if you have somebody uncovering a scandal and mailing a reporter about it, that means that that mail will get read along the way by somebody who is just trying to enforce copyright. But since the mail will have been read along the way, it does not matter what they can or cannot do with that information. It can not be unread – the whistle blower protection is gone. And by extension goes freedom of the press. Because if you cannot find any sources for misbehaving government, then what are you going to print? Weekly horoscope? Quarterly profits of the record business? You get the picture... So instead of the whistle blower protection you get self-censorship. If you know you're under surveillance, you tend to put a lid on yourself. You tend to not say what you would say if you know you're in private.

“To form an identity you need private communications”

I'll tell you an anecdote on this from when we were at the Gay Pride Parade in Stockholm. It was sort of a theoretical construct for me at the time that if you don't have access to private communications you lose you're right to form an identity. That's because forming an identity is a process that takes place in a very private exchange between you and a couple of friends. So while I was logically and rationally reasoning about this, when I said this to a couple of people at the Pride Park in Stockholm, you could see that it hit them very hard and very emotionally. You could see the penny drop; you could see them going back to the time when they went through this process. So these people really understand what this is about and why it is important to be able to to have private communications.

So this is what the conflict is about. The copyright industry would like you to believe that it is about lost profits that they would in some magical way have a right to; that it is about percentages of sales diminishing. It's not. It's about vital civil liberties that are a foundation of a democratic society that need to be eroded or abolished in order to maintain a crumbling monopoly.

“Politicians are lost – but the copyright industry is not”

The problem is that the politicians do not understand this. They genuinely do not. They're too occupied by their health care, their defense policy, their energy policy, school, tax and so forth. For them this becomes basically an issue like what color is this school in back of beyond nowhere going to be. So they just brush the issue aside. The copyright industry, however, unfortunately understands this perfectly. I'm going to give you two examples of this.

In Brussels – which is the European equivalent of Washington D.C. - the copyright lobby recently tried to make amendments to a bill that would give four years in prison to anybody accepting filesharing – passively accepting. This is assumed to happen at the Internet service provider level. And those four years in prison would have given the copyright industry a practically unlimited access to warrantless wiretapping inmost states of Europe. Like I said: there goes the postal secret. They do understand this.

Another example is that when I was at a copyright insiders' seminar in Sweden just six weeks ago the Danish chief antipiracy jurist stepped onto the podium and said: “You know guys, we really need to filter the Internet. But the politicians do not understand filesharing, nor do they understand why it is so important for us to filter the Internet. So what we need to do is to associate filesharing with child pornography – because politicians understand child pornography and they want to filter that.” This is how unscrupulous and cynical these people are.

“These are not lunatic ideas. We are just ahead of the Bell Curve.”

So our solution was to bypass the politicians. We did pretty well and we are continuing to do pretty well. To sum up our platform, we're saying that:

- in terms of copyright, attribution is good, it's part of why many people create
- filesharing should be free
- copyright has nothing to do in my private communications, it should get out of there
- the commercial copyright term of lifetime plus seventy years is ludicrous, no investor makes calculations based on a lifetime or 125 years
- DRM is evil
- patents are even more evil, they range from useless to pointless to immoral to diabolical
- privacy is good
- due process is good and a transparent government is even better

And this is the whole of our platform. We do not care about energy policy, about school policy and so on and so forth. We focus on where we have something to add to the debate. And we have influenced other parties as well. After the election it turns out that we actually took quite a few votes from the other parties. They came to us and said: “Er... guys... we don't understand this issue... do you think you can explain it to us?” Of course we would! That's what we wanted all along: for the politicians to care about the issue. I'm just sort of disappointed that we had to take their votes and threaten to take their jobs over it.

So we've talked to many other parties in Sweden who are starting to pick up the ideas. The Norwegian Liberal party even went so far as to copy our entire stance on copyright, word for word, sentence for sentence – and they are in the Norwegian parliament. So the ideas are spreading. They are not like fringy lunatic ideas. They are just ahead of the Bell Curve. We built an an organization. On the election day we had 2,000 volunteers covering 93% of the polling stations nationwide. I'm extremely happy with that number. And, like I said, we had a record first election.

To give you two more numbers: my personal candidacy for parliament came at rank 15 out of over 5,700 candidates. I didn't get a seat because the party didn't get enough votes, but it tells you something about how strongly people feel about these issues. Also, in the school mock elections we got 4.5% - and those people are going to vote next time around. It's also notable that we were not on the school ballot. So those were all write-ins.

“Let's play who-wants-to-be-prime-minister”

So we're aiming for 4%. How can people with only 4% of the seats have any influence? How can you contain your laughter looking at 15 or 16 people out of 350 who claim to be pirates? Well, it turns out that there are two blocks in Swedish parliament who always come very tied. So we aim to be a wedge in between them. That means both of these blocks will need our support to form a majority government. That means we get to sit down and play who-wants-to-be-prime-minister. And whoever wants to be the prime minister the most, will need to give us the best offer in terms of intellectual property reform. Then we will go along in whatever they want in everything else, and we'll have a reform.

Why Sweden then? Why would anybody care about a frozen country of the size of a shoebox around the European Arctic Circle? Well, it happens to be a perfect place to trigger a global intellectual property reform. First of all, the copyright laws in Europe are at the state level. There are no laws at the federal level in Europe. That means Sweden is at liberty to change its laws, as long as it can justify doing so. Second, if you look at how the global production is divided between the three major economic centers, out of the 60 trillion dollars GDP in global production the U.S. Has 12 trillion, Europe has 12 trillion, and China has 10 trillion. That means that the U.S. Copyright lobby can not threaten trade sanctions against Europe – because the two parties are equally strong. This is not the case like if this would originate in South America, which is not as strong.

So I'm going to argue that the best way to initiate a copyright reform in U.S. Is actually to take the Scenic Route through Europe. Because the first country that says “No, we actually don't think that this is good” is going to set off a chain of events that will force a global change in this age of the Internet.
http://www.p2pconsortium.com/index.php?showtopic=13933





US Pirate Party Seeks Legitimacy, Starts in Utah
Jacqui Cheng

It's a common sentiment among tech-savvy audiences that the current copyright and patent system in the US is "broken" to some degree. And while some politicians have put issues like patent and copyright reform at the top of their lists, there aren't many political parties out there that make it one of their sole issues. That's where the US "Pirate Party" hopes to step in; the group is now hoping to establish itself as an officially-acknowledged political body in the state of Utah.

Established in 2006, the US arm of the international "pirate party movement" says that it believes the government should encourage creativity and freedom instead of smothering it. According to the group's web site, "Creativity has come to a standstill in this country for those who wish to work within, and benefit from, the confines of the law." The Pirate Party cites current copyright and patent laws as the reason for this, and "that our law not only allows this, but enables this, is a travesty and a crime against innovators everywhere."

However, contrary to what the party's name implies, the US Pirate Party does not condone piracy. "We've chosen to adopt the Pirate name so as to pay homage to the creative artists of the past, or as they would now be known, Pirates, thieves, and copyright infringers," reads the web site.

The group has now begun to accept statements of support in order to establish itself as a viable political party in Utah. Apparently known for its "strong history" of political diversity and technological progress, Pirate Party spokesperson Andrew Norton says that Utah seems to be the ideal state to register in. The group needs 2,000 signatures from registered voters before next February in order to establish itself as a political party. Doing so will allow the Pirate Party to place candidates on the state's primary ballot under the party's name—otherwise, they must list the individuals as unaffiliated or write-in candidates.

"Voters in Utah are now one step closer to being able to voice their opinions on the key issues our party stands for," Norton said in a statement. But there's a big gap between being "established in Utah" and "viable political force"—and that's not even taking into account the extremely narrow scope of the party's supported issues. The two-party system in the US is extremely entrenched, and even the strongest independent forces are still working hard to make a significant dent in the US government. Even if the group succeeds in getting established in Utah, the Swedish Pirate Party's failed efforts to gain a parliamentary seat foreshadow the steep uphill battle that the group will face in coming years.
http://arstechnica.com/news.ars/post...s-in-utah.html





Raid Casualty Comes Forward to Tell His Story

Hours before the raids were news and broadcast across the net and the mass media, an XS member (FallsInc) tried to warn those of us in the inner circle that the noose was about to tighten around US Modchip shops. In all honesty many amongst us didn't give too much credence to the tip. Those of us running this site aren't running Modchip shops. To our Utter shock and dismay, hours later we watched as one shop after another in the US market either went down, stopped answering the phones and stopped taking orders. Shops, big and small across 16 states were raided, and had modding, piracy, and alot of unrelated goods and materials confiscated under the wide brush strokes of the DCMA.

The following is a firsthand account, written in his own words of the last 24 or so hours in the life of FallInc.

FallsInc - When ICE hit me, they had a warrant for my grandma's house where I had all my packages sent. They had a picture of the house, and a description of it, meaning they were ready to come find me. When they were there, they didn't find much, since I hadn't had my computer and most modding stuff there for a while, but I continued to have the orders sent there for security of the packages. They went in the house and woke everyone up and watched them get dressed and started going though everything that was in my old room, and the stuff I had in the garage. They took anything that was related to gaming. They opened all the mail I had waiting for me there (which included someone's Xbox and $150 for a mod and 400gb), and took all the consoles and all console parts that I had stored there they even took my original xbox1 games, that were in retail cases. They took my 360, power brick and video cable, while its modded with xtreme 5.1b, it has never had 1 single burned game booted on it. They also felt it necessary to take all my old Xbox parts, mostly dead, my controllers for the 360 and Wii (?) and packed it in a box, and left.

They got my phone number from my grandma and they called me, but I was sleeping, just like everyone else in Ohio. They eventually figured out where I was, and came to find me at my girlfriends' house. They asked me about modding and what I did, and how I did it. They showed me the list of modchips that they collected, and asked me if I ever imported modchips from Canada. I told them I did, but I didn't know it was a Canadian site until after I made the order. They asked me how much money I made, and how many mods I've done, and how many chips I still had, and where they were and where my computers were.

I wasn't forced to turn over my stuff since they didn't have a warrant for where it all was, but they told me that if I volunteered it, it would look better when the case is reviewed. They also said that I would have a better chance of getting it back (at first, they promised that I would get it back in 10 days, but once we got to the location, that was changed to "better chance" and "looks better in the eyes of XX". I did the only thing I felt I could do, I let them take what they wanted. We went to where I had my workshop area. They took my laptop, and desktop, and the soldering iron (which was one of their main things to find for some reason). All the chips and relative parts were taken on the recommendation of the computer forensics guy who was to be doing the analysis on my things.

In their defense, the ICE people who came to my girlfriends house were nice people, and they tried to help me make the right decision. I knew they were just doing their job, but I have been out of work since early may, and modding is the only thing that was keeping me above water with the bills. Now I can't mod, and I can't even sell anything off to pay for bills either since it has all been confiscated due to a ludicrous interpretation of the DCMA. Now it's all said and done, and I just have to wait for them to decide what I did wrong, but while I'm waiting, I have NOTHING of any worth anymore, other than a computer monitor, and my car. Because of what happened I'm not allowed to see my girlfriend and our 4 month old daughter, and last night, I slept in my car and my girlfriend sent me a text message telling me it felt like someone was taking me away from her. They took my life away. I would like to formally thank Microsoft and Nintendo for cracking down on the little guy with a soldering iron in his garage, rather than going after the people that are responsible for the bootlegs being available.

HSD - Xbox-Scene and it's affiliate sites do not condone or endorse piracy, however we do strive to discuss, educate, and explore methods of modifying and operating game consoles in ways not originally intended or envisioned by the manufacturers. We whole heartedly believe in the right to backup your investment. This act in and of itself isn't legal in many jurisdictions. Running a "modchip" store, site or service in many jurisdictions isn't legal. XS advises that anyone, regardless of country you are in take the time to educate yourselves on what is legal, and not legal in your jurisdiction. FallsInc wasn't some large modchip site or service. He was an individual making a few coins on the side. While his story won't be the last we'll hear about the raids, we do encourage everyone reading, especially those in the US to take the time and the measures necessary to ensure that you won't be in the next batch of raids.

This isn't JUST a problem for the United States. Europe isn't exempt from the broad strokes of the bloated DCMA legislation. Europe in 2001 passed the EU copyright Directive which has many similarities to the DCMA. There are many good resources on the net about the DCMA and the EUCD. Wikipedia is a good start Digital Millennium Copyright Act.

I'd like to thank FallsInc for coming forward and sharing his story with us.
http://www.xbox-scene.com/xbox1data/...llysyVJWYQ.php





Rights and Wrongs on Copyright
Steven Musil

Rapper Eminem feels like he's getting shortchanged by the Internet--and it's a feeling shared by many.

The rapper, whose music is available through Apple's iTunes, is suing the company for copyright infringement, saying that his music publishers have not given Apple permission to offer the artist's music for download. Eight Mile Style and Martin Affiliated, the companies representing Eminem, demand that Apple stop offering downloads.

Part of the problem may be confusion over who owns the rights to downloads. Apparently, Eminem is asserting that record companies do not hold these rights exclusively. Apple pays a portion of the revenue it collects from Eminem downloads to Universal Music Group, which distributes the music, but not to Eminem's publishers.

Meanwhile, many bloggers feel they are being ripped off by automated digital plagiarism, in which software bots copy thousands of blog posts per hour and publish them verbatim onto Web sites on which contextual ads next to them can generate money for the site owner.

Such Web sites are known among Web publishers as "scraper sites" because they effectively scrape the content off blogs, usually through RSS (Really Simple Syndication) and other feeds on which those blogs are sent.

Lorelle VanFossen, a writer who has a popular blog about blogging, is frustrated by her near-daily encounters with plagiarism.

"I make my living from my writing, and when people take it because they are ignorant of copyright laws--or think that because it's on the Internet, it's free--it makes me really mad," she said. "It's stealing content, in my mind."

More typical conflicts over content use on the Net involve tech start-ups that are sued by media conglomerates for copyright infringement. Quite often, the defendants call on Ira Rothken, a medical researcher turned lawyer who has backed long-shot copyright cases. Rothken is defending TorrentSpy, a search engine often used by file sharers to locate pirated films. TorrentSpy is facing a copyright suit filed by the Motion Picture Association of America, the trade group that represents the top film studios.

In May, a federal magistrate judge ordered the company to turn over user information stored in its servers' random access memory (RAM). The courts have never before ruled that RAM, a computer's temporary memory, is a tangible document that must be produced and turned over to litigants in civil cases, according to legal experts. Rothken has filed an appeal, and on August 13 will try to persuade a U.S. District Court judge in Los Angeles to reverse the decision. At stake is nothing less than Internet anonymity, say some legal experts. If companies can be compelled to turn over RAM any time they face a civil suit, then no U.S. Web site can ever again promise not to share user data, according to Rothken.

Theft of content is one thing, but a tech trade group is accusing a handful of sports leagues and media companies of trying to intimidate the public by issuing inaccurate warnings about making "unauthorized" copies of their work, according to a complaint filed with the Federal Trade Commission. The complaint by the Computer & Communications Industry Association (CCIA)--a trade group that represents tech giants such as Microsoft, Google and Yahoo--names the National Football League, Major League Baseball, NBC-Universal, Morgan Creek Productions, DreamWorks Pictures, Harcourt and Penguin Group.

An example of what CCIA is referring to is the little speech that TV or radio announcers make during breaks in games. Most sports fans can recite at least a smidgen of the boilerplate. While the statements have become a tradition during professional football and baseball broadcasts, the CCIA claims such statements are false and are harmful to consumers and technology companies. Similar warnings can be found in books, CDs and DVDS, according to the CCIA.

Some CNET News.com readers also expressed frustration with the current state of copyright laws.

"With the way things are right now, consumers are not seeing any of the benefits of the 'digital age' and are instead seeing their rights slip away in a barrage of draconian laws," one reader wrote to the News.com TalkBack forum.
http://news.com.com/Week+in+review+R...?tag=nefd.lede





Q&A: William Gibson, Science Fiction Novelist

Heading into Spook Country with the cyberspace guru
Steve Ranger

Science fiction novelist William Gibson has been exploring the relationship between technology and society ever since he burst on to the literary scene with his cyberpunk classic Neuromancer in 1984. He invented the word 'cyberspace' and his influential works predicted many of the changes technology has brought about. silicon.com's Steve Ranger caught up with him in the run up to the launch of his latest novel, Spook Country.

silicon.com: You've written much about the way people react to technology. What's your own attitude towards technology?
Gibson: I'm not an early adopter at all. I'm always quite behind the curve but I think that's actually necessary - by not taking that role as a consumer I can be a little more dispassionate about it.

Most societal change now is technologically driven, so there's no way to look at where the human universe is going without looking at the effect of emergent technology. There's not really anything else driving change in the world, I believe.

Has the impact of technology been positive or negative?
I'm absolutely agnostic about it and if I was either a Luddite or a technophile I couldn't possibly function in my job. I think that, generally speaking, technologies are morally neutral until humans beings pick them up and use them for something.

It's a positive thing depending on what happens when we use it. Nothing that I can see other than the market drives the emergence of new technologies. The technologies that change society most profoundly aren't legislated into existence.

There's a blue plaque in London that says, in effect, 'Broadcast television was invented here'. Nobody in that room above the shop was filled with a kind of eldritch horror and a vision of a world of closed circuit surveillance - it was the last thing they were thinking.

All of the big changes that emergent technologies bring us are, for the most part, completely unanticipated by the people that introduce those technologies. It's out of control by its very nature and if you could control it, it wouldn't work.

Unlike many of your novels, which are set in the future, Spook Country is in the near past. What's different about writing about the past rather than the future?
I'm writing speculative fiction about the year before last [rather than] speculative fiction about the year after next Tuesday which is what I was doing for a while.

There's not a lot of clever, made-up, semi-imaginary new technology cluttering the thing up but all the pressures in these books the characters are feeling are ultimately technologically driven, so I'm using the same tools to look at the same things but without the conceit that one is viewing this in some imaginary future.

So what's the difference?
It's much harder to just make shit up to get oneself out of a tight plot spot. When I'm writing about the future if I get really stuck I can just go back and reinvent some other aspect of the amazing whatsit machine that makes it possible to drive the truck past the checkpoint, or whatever it is.

For me it's harder work to irradiate the content of a shipping container [in Spook Country] in a way that at least convinces me, than it is to dream up some gizmo from Chiba city that will crawl in there and do it all by itself.

So why not write about the future?
The trouble is there are enough crazy factors and wild cards on the table now that I can't convince myself of where a future might be in 10 to 15 years. I think we've been in a very long, century-long period of increasingly exponential technologically-driven change.

We hit a point somewhere in the mid-18th century where we started doing what we think of technology today and it started changing things for us, changing society. Since World War II it's going literally exponential and what we are experiencing now is the real vertigo of that - we have no idea at all now where we are going.

Will global warming catch up with us? Is that irreparable? Will technological civilisation collapse? There seems to be some possibility of that over the next 30 or 40 years or will we do some Verner Vinge singularity trick and suddenly become capable of everything and everything will be cool and the geek rapture will arrive? That's a possibility too.

You can see it in corporate futurism as easily as you can see it in science fiction. In corporate futurism they are really winging it - it must be increasingly difficult to come in and tell the board what you think is going to happen in 10 years because you've got to be bullshitting if you claiming to know. That wasn't true to the same extent even a decade ago.

What would you say are the big themes of Spook Country?
In the process of doing the tour I will be informed by interviewers of what the broad themes are. I haven't been interviewed sufficiently to be able to tell you. It's set in the same world as Pattern Recognition and involves some of the same characters but they're a few years down the road and the world has changed a bit. I suppose one of the things it's trying to do is take some measure of how much the world has changed since Pattern Recognition.

How has technology changed writing?
The thing that has affected me most directly during Pattern Recognition, and subsequently, is the really strange new sense I have of the Google-ability of the text. It's as though there is a sort of invisible hyperlink theoretical text that extends out of the narrative of my novel in every direction.

Someone has a website going where every single thing mentioned in Spook Country has a blog entry and usually an illustration so, every reference, someone has taken it, researched it and written a sort of little Wikipedia entry for it and all in the format of a website that pretends to be from a magazine called Node, which is an imaginary magazine, within Spook Country, and which turns out to be imaginary in the context of the narrative.

I have this sense when I write now that the text doesn't stop at the end of the page and I suppose I could create web pages somewhere and lead people to them through the text which is an interesting concept. I actually played with doing that in Spook Country but I didn't know enough about it. Everything is bending towards hypertext now.

You've done a reading in Second Life. What did you make of that
It's a lot more corporate than the vision I had. What I find most interesting about Second Life is that I've noticed now, very occasionally, I'll see on the street someone who looks as though they have escaped from Second Life. There are people who look all too much like Second Life avatars and I don't know if they were there before or whether I just hadn't notice them.

How well do you think your earlier novels such as Neuromancer have stood the test of time?
Any imaginary future as soon as you get it down on screen starts to acquire an instant patina of quaintness - it's just the nature of things.

If I were a smart 12-year-old picking up Neuromancer for the first time today I'd get about 20 pages in and I'd think 'Ahhaa I've got it - what happened to all the cell phones? This is a high-tech future in which cellular telephony has been banned'.

So I completely missed that [mobile phones]. When people ask me about Neuromancer as a predictive construct, they always ask about the technology. They don't ask about globalisation which wasn't even a word when I started that book but the world of Neuromancer is a post-globalised world and it's hurting from it and that may carry a lot of people through it today. But if that wasn't there then maybe it would be hopelessly dated.

Except for the Soviet Union - which is another whopping anachronism looming in the background of Neuromancer - there don't seem to be any nation states in that world, it's completely corporate.

So what's next?
I think what I may be doing here with this current batch of books is attempting to take the measure of the present, which will allow me to try that sort of projection again. I sort of hope so, otherwise I don't know what I'll do!
http://networks.silicon.com/webwatch...9168006,00.htm





Product Packages Now Shout to Get Your Attention
Louise Story

In the last 100 years, Pepsi had changed the look of its can, and before that its bottles, only 10 times. This year alone, the soft-drink maker will switch designs every few weeks.

Kleenex, after 40 years of sticking with square and rectangular boxes, has started selling tissues in oval packages.

Coors Light bottles now have labels that turn blue when the beer is chilled to the right temperature. And Huggies’ Henry the Hippo hand soap bottles have a light that flashes for 20 seconds to show children how long they should wash their hands.

Consumer goods companies, which once saw packages largely as containers for shipping their products, are now using them more as 3-D ads to grab shoppers’ attention.

The shift is mostly because of the rise of the Internet and hundreds of television channels, which mean marketers can no longer count on people seeing their commercials.

So they are using their bottles, cans, boxes and plastic packs to improve sales by attracting the eyes of consumers, who often make most of their shopping decisions at the last minute while standing in front of store shelves.

“The media is fragmented, and we can’t find people — we can’t get them to sit down and listen to our argument on a television spot,” said Jerry Kathman, chief executive of LPK, a brand agency based in Cincinnati. “The package can convey that argument.”

As recently as the 1990s, most package designs were retained for seven or more years. Now marketing executives say they are constantly planning package overhauls. The average life of a package before its next makeover is down to two years, they add.

Shoppers have also grown accustomed to looking for a little visual pop on aisle shelves as design has become a mainstream marketing tool — Target stores in particular use that visual pop as a key advertising theme, for example. Sameness carries a risk that a product will fade into the background.

“Consumers are looking for what’s new,” said Kimberly Drosos, director for package development at Unilever North America, which recently changed the shape of its Suave shampoo bottles for the first time in 25 years, and sells Axe shower gel bottles shaped like video-game joysticks.

Ms. Drosos added: “They say, ‘What else do you have for me? That was nice last year, but I want the packaging to be refreshing.’ ”

There are many other reasons behind the shift. Some packaging changes are occurring because companies are trying to shrink container sizes and reduce their environmental impact, or because of new approaches for old products (Orbit now sells gum in a bottle made to fit in a car’s cup holder). Some brands are bragging that their bottles of cleansers and other household products are attractive enough to be left out in plain view, rather than hidden in a closet or drawer.

“It’s an inexpensive way to really deliver that newness to people’s homes,” said Becky Walter, director for innovation design and testing at Kimberly-Clark, the maker of Kleenex, Huggies and other brands. “It’s not like they have to go out and purchase new furniture.”

Evian is among the marketers using packaging to add a sense of luxury to ordinary products — its new “palace bottle” water, for example, is being sold in restaurants and hotels. The bottle has an elegant swanlike neck and sits on a small silver tray. Technology is also driving the changes — like the thermochromatic ink in the Coors label that changes the color of the label’s mountains with the temperature of the beer bottle.

And in the next few years, Pepsi drinkers may smell a sweet aroma that is sprayed out when they pop open Pepsi cans — such as a wild cherry scent misting from a Wild Cherry Pepsi can. Executives at the company have also considered cans that can spray a light water mist when they are opened, but they are unlikely to add that feature soon because of the cost, they say.

Laurent Nielly, who heads packaging innovation for Pepsi in North America, said young people — Pepsi’s central audience — have shorter attention spans than previous generations, so bottles and other containers have to change more often. Pepsi is experimenting with the designs on its Mountain Dew bottles, selling aluminum bottles covered in graffiti-like designs that will be changed 12 times from May to October. The bottles are sold only in eastern Virginia now, but the soda maker may expand the approach if sales of the bottles go well.

If products aren’t spraying consumers, they may someday be talking to them.

Some companies are studying technology to put a computer chip and tiny speaker inside a package. This idea might be particularly useful for big companies like Unilever that want to cross-promote their various brands. So a package of cheese could say “I go well with Triscuit crackers” when a shopper takes it off the shelf. As the costs of the chips come down, marketing executives said this and other technologies would appear more on shelves.

All these packaging makeovers may make trips to the grocery stores more entertaining. Or the result could be confusion, if not downright annoyance.

“If you’re walking down a row in a supermarket and every package is screaming at you, it sounds like a terrifying, disgusting experience,” said Tracy Lovatt, director for behavioral planning at BBDO North America, an advertising agency in the Omnicom Group. “But if brands use this wisely, new packaging can be quite powerful. It’s the thing that will interrupt you at the store, and get you to spend time with that brand, and then, hopefully, buy in.”
http://www.nytimes.com/2007/08/10/bu...ackage.html?hp





It’s an Ad, Ad, Ad, Ad World
Louise Story

It is only a matter of time until nearly all advertisements around the world are digital.

Or so says David W. Kenny, the chairman and chief executive of Digitas, the advertising agency in Boston that was acquired by the Publicis Groupe for $1.3 billion six months ago.

Now Mr. Kenny is reshaping the digital advertising strategy for the entire Publicis worldwide conglomerate, which includes agencies like Saatchi & Saatchi, Leo Burnett and the Starcom MediaVest Group and the global accounts of companies like Procter & Gamble, American Express, Hewlett-Packard and General Motors.

The plan is to build a global digital ad network that uses offshore labor to create thousands of versions of ads. Then, using data about consumers and computer algorithms, the network will decide which advertising message to show at which moment to every person who turns on a computer, cellphone or — eventually — a television.

More simply put, the goal is to transform advertising from mass messages and 30-second commercials that people chat about around the water cooler into personalized messages for each potential customer.

“Our intention with Digitas and Publicis is to build the global platform that everybody uses to match data with advertising messages,” Mr. Kenny said. “There is a massive transformation happening in the way consumers live and the data we have about them, but very few companies have stepped up to it yet.”

Publicis announced last Tuesday an important step in its digital plan: the acquisition of the Communication Central Group, a digital agency in China founded in 1995, for an undisclosed amount. The agency, to be called Digitas Greater China, will give Publicis a foothold in the Chinese advertising market, which analysts within Publicis estimate is growing at about 20 percent a year, much faster than global growth in the market, which hovers around 5 percent a year.

“There’s a chance to invest right now in China, India, Russia and Brazil, which will pay off big over the next five years,” Mr. Kenny said. “These economies are going to boom, and ads there are going to go directly to mobile and directly to the Internet.”
Beyond the growth potential, Publicis executives see these economies as important sources of low-cost labor for a Digitas subsidiary called Prodigious, a digital production unit that works with all agencies in the Publicis Groupe. Prodigious already uses workers in Costa Rica and Ukraine to produce copious footage for companies like G.M.

Greater production capacity is needed, Mr. Kenny says, to make enough clips to be able to move away from mass advertising to personalized ads. He estimates that in the United States, some companies are already running about 4,000 versions of an ad for a single brand, whereas 10 years ago they might have run three to five versions. And he predicts that the number of iterations will grow as technology improves.

The Publicis digital plan can be viewed as a reaction to the changes in how consumers live, but it is also a response to competition among Google, Yahoo and Microsoft. Publicis is trying to carve out a niche as a middleman between those online giants and the consumer brand companies that buy advertising. The role is not unlike the way agencies have long connected advertisers to offline media like television networks, newspapers and magazines.

“How do we see Google, Yahoo and Microsoft? It’s important to see that our industry is changing and the borders are blurring, so it’s clear the three of those companies will have a huge share of revenues which will come from advertising,” said Maurice Lévy, chairman and chief executive of the Publicis Groupe.

“But they will have to make a choice between being a medium or being an ad agency, and I believe that their interest will be to be a medium,” he added. “We will partner with them as we do partner with CBS, ABC, Time Warner or any other media group.”

Mr. Lévy’s view of the dominant Internet portals diverges from that of other advertising executives. Martin Sorrell, chief executive of the WPP Group, another ad agency conglomerate, has publicly called Google a “frenemy” and has recently acquired 24/7 Real Media, an advertising network that positions his company to compete more directly with Google and other online portals.

Mr. Lévy, who has a penchant for grand ambitions, says he does not plan to compete with Google — rather, he wants Google to need Publicis.

He is widely credited with the transformation of Publicis from a small French ad company into one of the world’s largest advertising holding companies, competing with the WPP Group, Omnicom and the Interpublic Group. Now his stated goal is to stir up the digital sea before he retires in 2010.

By Mr. Lévy’s account, the Publicis purchase of Digitas was the deal that set in motion a string of online acquisitions, as companies like Google, Microsoft and the WPP Group spent billions to buy the online advertising companies DoubleClick, aQuantive and 24/7 Real Media, respectively. Just last month, AOL purchased the behavioral ad network Tacoda.

“We took the initiative, and it has triggered a frenzy of acquisition in the industry,” Mr. Lévy said. “It’s something that can be checked by the date. It’s quite clear we triggered it.”

Digitas, like many digital agencies, started out as a direct marketing firm, reaching consumers mainly through the United States Postal Service. As the Internet emerged, Digitas developed a platform it calls Dashboards to break online ads into their components and figure out which pieces work for which audiences.

Digitas uses data from companies like Google and Yahoo and customer data from each advertiser to develop proprietary models about which ads should be shown the first time someone sees an ad, the second time, after a purchase is made, and so on. The ads vary, depending on a customer’s age, location and past exposure to the ads.

Digitas executives say that consumers end up with a better experience — even a service — if the ads they are shown are relevant and new.

“We now know how many times they’ve seen this ad, so stop annoying them,” said Mark Beeching, executive vice president and worldwide chief creative officer of Digitas. “The more you can standardize and automate in terms of making different versions, hallelujah. That money should be spent creating more content.”

Along with automation, low-cost workers abroad will help create more versions of ads. The Publicis Groupe’s new employees in China, gained through the CCG deal, are paid well by Chinese standards, said Neil Runcieman, former chief executive of CCG and now chief executive of Digitas Greater China.

Mr. Kenny said that Digitas constantly struggles to find enough employees with the technical expertise to use complex data to slice and dice ads for companies like General Motors and Procter & Gamble. As Digitas invests in countries like China and India, he said, the Publicis Groupe will benefit from the global talent pool — and perhaps create more demand for advertising in those countries.

“There’s this rising tide of advertising in emerging economies,” Mr. Kenny said. “But we can also help it rise by sending jobs there.”
http://www.nytimes.com/2007/08/06/bu...06digitas.html





Pay-For-Visit Advertising
theodp

US patent office documents released Thursday show that a startup named Pelago is seeking a patent covering Pay-For-Visit Advertising, which uses GPS, Bluetooth, or RFID on your mobile devices to track your travels to see if you wander into a place of business that appeared in an ad shown earlier on your cellphone, PDA, or laptop. To maximize ad revenue, phone calls are also tracked to see if you dial a number associated with an ad, and financial transactions are examined to see if you make a purchase from an advertiser. The application goes on to note that the system may be of interest to government agencies. Pelago just raised $7.4M from the likes of KPCB and Jeff Bezos.
http://yro.slashdot.org/article.pl?sid=07/08/09/1331207





Jack Cole, Creator of People Locator, Dead at 87
Margalit Fox

Jack Cole, a businessman who used early computer technology to sort the world — or at least millions of the people in it — by street address, creating a series of reverse directories that remain invaluable to detectives, debt collectors, telemarketers and anyone who needs to find someone, died on July 29 at his home in Spearfish Canyon, S.D. He was 87.

The cause was cancer, his daughter, Susan Wright, said.

Sixty years ago, Mr. Cole began publishing the Cole Directory, a set of reverse guides to various United States cities. Known familiarly as crisscross directories, Cole Directories list a city’s residents by address and by telephone number.

The first city directories in the United States were published in the 1780s. Though most were arranged alphabetically by last name, a few early ones were organized by street address. For the next century and a half, compilers of these directories trudged door to door, painstakingly recording the residents of every apartment in every building on every block in the city.

What Mr. Cole did, starting in 1947, was to use I.B.M. punch cards to streamline the process, turning an ordinary telephone book into what today would be called a searchable database. (Cole Directories, which cover about 200 cities, are now published in print and digital forms by the MetroGroup Corporation of Lincoln, Neb.)

Mr. Cole’s books, which quickly became a staple of public library reference shelves, were a boon to people in a range of fields: a direct-mail marketer could aim at customers in prime neighborhoods; a detective could press neighbors for the whereabouts of a deadbeat; a reporter on the trail of an ax murderer could phone the family next door to be told, “He was always such a quiet boy.”

Jack Ridnour Cole was born on Feb. 12, 1920, in Lincoln. He earned an undergraduate degree in business from the University of Nebraska and afterward went to work for I.B.M.

Moving to Dallas to work as an I.B.M. sales representative, Mr. Cole hit upon the idea for his directory. He hired typists to keyboard the entire Dallas telephone book onto punch cards. Directories for other cities soon followed, with Mr. Cole drawing on census records, tax rolls and other data to supplement the information in the phone book.

Mr. Cole’s wife, the former Lois Keller, whom he married in 1941, died in 1997. Besides his daughter, Ms. Wright, of Prescott, Ariz., he is survived by two sons, Dana, of Lincoln, and Jeffrey, of La Quinta, Calif.; a sister, Patricia Cole Sinkey, of Lincoln; eight grandchildren; and eight great-grandchildren.

After selling his directory business in 1973, Mr. Cole turned to other ventures, among them a chain of hunting and fishing lodges. In recent years, after retiring to a cabin in Spearfish Canyon that had been in his family since the 19th century, he became active in environmental causes.

Among her father’s effects in the cabin, Ms. Wright said, was a Cole Directory for Rapid City, S.D., some 50 miles away.
http://www.nytimes.com/2007/08/07/ob...es/07cole.html





Defendant Wins Breathalyzer Source Code
Declan McCullagh

What happened, according to court records and other documents:

When Dale Lee Underdahl was arrested on February 18, 2006, on suspicion of drunk driving, he submitted to a breath test that was conducted using a product called the Intoxilyzer 5000EN.

During a subsequent court hearing on charges of third-degree DUI, Underdahl asked for a copy of the "complete computer source code for the (Intoxilyzer) currently in use in the state of Minnesota."

An article in the Pioneer Press quoted his attorney, Jeffrey Sheridan, as saying the source code was necessary because otherwise "for all we know, it's a random number generator." It is hardly new technology: One criminal defense attorney says the Intoxilyzer is based on the antique Z-80 microprocessor.

A judge granted the defendant's request, but Michael Campion, Minnesota's commissioner in charge of public safety, opposed it. Minnesota quickly asked an appeals court to intervene, which it declined to do. Then the state appealed a second time.

What became central to the dispute was whether the source code was owned by the state or CMI, the maker of the Intoxilyzer.

Minnesota's original bid proposal that CMI responded to says that "all right, title, and interest in all copyrightable material" that CMI creates as part of the contract "will be the property of the state." The bid proposal also says CMI must provide "information" to be used by "attorneys representing individuals charged with crimes in which a test with the proposed instrument is part of the evidence," which seems to include source code.

Campion's office, on the other hand, claims the source code is confidential, copyrighted and proprietary. It has asked for what's known as a "writ of prohibition" barring the source code from being released.

The Minnesota Supreme Court rejected the request, saying "a writ of prohibition is an extraordinary remedy and is only used in extraordinary cases."

This isn't the first time breathalyzer source code has been the subject of legal scrutiny. A Florida court ruled two years ago that police can't use electronic breathalyzers as courtroom evidence against drivers unless the source code is disclosed. Other alleged drunk drivers have had charges thrown out because CMI refuses to reveal the Intoxilyzer source code.

Excerpt from Minnesota Supreme Court's ruling:
The district court ordered the production of the "complete computer source code" for the Intoxilyzer 5000EN. In support of its order, the district court found that under the contract between the state and CMI, the state owned the source code for the Intoxilyzer 5000EN. The court of appeals concluded that the district court's finding was not clearly erroneous given the concession in the state's petition seeking the writ of prohibition that it owned that portion of the source code created exclusively for the Intoxilyzer 5000EN...

Having carefully reviewed the record presented and the arguments of the parties, we conclude that we cannot decide the copyright issues raised. Although the parties direct us to copyright law regarding works for hire and derivative works, they provide only a superficial application of that law to the facts of this case. Perhaps that is because the factual record before us is inadequate, thereby making any determination regarding either copyright theory impossible.

Resolution of this issue, however, does not require us to apply federal copyright law because we also conclude that the commissioner has failed to meet his burden of demonstrating that the information sought is clearly not discoverable and that he has no adequate remedy at law. While on the one hand the commissioner argues that ownership of the source code for the Intoxilyzer 5000EN is to be determined under federal copyright law and that under that law he does not have possession, custody or control of the source code, on the other hand he concedes that the state owns and thus controls some portion of the source code. That concession is supported by the express language of the RFP granting CMI the right to supply the Intoxilyzer 5000EN to the state.

Further, given the express language of the RFP that requires CMI to provide the state with "information to be used by attorneys representing individuals charged with crimes in which a test with the (Intoxilyzer 5000EN) is part of the evidence" when production of the information is mandated by court order "from the court with jurisdiction of the case," it is not clear to us that the commissioner is unable to comply with the district court's order. Accordingly, we cannot conclude that the district court ordered the production of information that is clearly not discoverable...

We do not agree that the commissioner lacks adequate remedies at law. As discussed above, irrespective of whether the state owns any portion of the source code, CMI agreed, in the RFP, to provide the attorneys representing individuals charged with crimes "in which a test with the (Intoxilyzer 5000EN) is part of the evidence" information necessary to comply with a court's order. We conclude that the commissioner's ability to enforce its contract with CMI constitutes an adequate legal remedy.

None of the four circumstances justifying the issuance of a writ of prohibition...are present in this case. We, therefore, hold that the court of appeals properly denied the commissioner's petition for a writ of prohibition.
http://news.com.com/Police+Blotter+D...3-6201632.html





BitTorrent Addresses Closed Source Issues
Thomas Mennecke

BitTorrent gained prominence in the file-sharing community largely due to its open source nature. What began as an unknown file-sharing client quickly diversified into a vast collection of applications. Developers were able to take the original BitTorrent source code and forge their own creations. The result of this ability includes the development of Azurues, BitComet, Transmission, and of course, uTorrent (micro Torrent).

The mainline BitTorrent client had some following, however never came close to the consumer penetration of uTorrent or Azureus. With its nearly 17 million users, fully functional user interface, low memory footprint and nearly indistinguishable CPU consumption, the closed source uTorrent became an attractive target for BitTorrent, Inc. On December 7, 2006, Bram Cohen, CEO or BitTorret, and Ludvig (Ludde) Strigeus, developer of uTorrent, formally announced BitTorrent, Inc.'s acquisition.

It was reasonably assumed that not a whole lot was going to change after the acquisition. Bram Cohen had assured everyone that the community experience surrounding uTorrent would remain intact.

"What does this mean for the uTorrent community? Not much, at least not at first. The intention is to maintain the website as it is, and keep the forums and community active."

That's all good and well, but the primary concern revolves around the open source nature of the BitTorrent protocol. The BitTorrent protocol is, or at least was, open prior to uTorrent becoming the official client (BitTorrent version 6.0). With uTorrent primed to become the official client, many were concerned that the BitTorrent protocol would become closed. According to the uTorrent acquisition FAQ, this concern was addressed directly.

"Q: How will this impact the BitTorrent open source development community as a whole?

A: There will be no impact to the BitTorrent open source development community. We are committed to maintaining the preeminent reference implementation of BitTorrent under an open source license."

BitTorrent 6.0, the official mainline client based on uTorrent, was released on July 28, 2006. Unlike previous official releases, there was no corresponding source code. While it's understandable that uTorrent's code may not be released, concerns remain that the protocol may advance while leaving the open source community behind.

"Sorry, source code for BitTorrent 6.0, like the source code for uTorrent, will not be released. However, versions 5 and earlier were of course released under open source licenses, and remain available for you to modify and redistribute subject to the terms of their respective licenses."

It's true enough that earlier versions of the BitTorrent protocol are available, however considering that BitTorrent is continuously evolving, older versions offer little benefit to a forward looking developer. To many in the BitTorrent community, BitTorrent, Inc. has turned its back on the open source movement. Addressing these concerns, Ashwin Navin, President of BitTorrent, Inc., spoke to Slyck.com.

"That's a true statement," Ashwin told Slyck.com, referring to the uTorrent acquisition FAQ. "We'll always maintain an open source version, although it may not necessarily reflect the latest client on the site."

There are two aspects to the BitTorrent open source debate - the protocol itself, and the client. What helped motivate BitTorrent's decision to close the mainline client?

"There are two issues people need to come to grips with. Developers who produce open source products will often have their product repackaged and redistributed by businesses with malicious intent. They repackage the software with spyware or charge for the product. We often receive phone calls from people who complain they have paid for the BitTorrent client."

As a company that distributes a free product, no one should ever have to pay for the BitTorrent client. Ashwin told Slyck.com that by keeping the source closed, it creates a "certain amount of distinction" between the official client and maliciously repackaged software.

Considering that uTorrent has always been closed source, these facts may not upset too many people. uTorrent became the single most popular BitTorrent client, despite its closed source nature. Yet there's still one remaining issue, that being the protocol.

With previous versions (prior to 6.0), the protocol was just as open as the old mainline client. This has changed with the release of 6.0. Developers, community members and newcomers to the BitTorrent scene have expressed concern that keeping up with the latest protocol developments may be difficult, if not impossible.

However this will not be the case, Ashwin told Slyck.com. Although the latest documentations won't be published for the world to see, an aspiring BitTorrent developer or a hardened coder can still obtain the specifications on the latest protocol extensions by obtaining a SDK license.

"I don't think we've ever said no" to an aspiring BitTorrent programmer, Ashwin said.

While the BitTorrent client and the latest protocol may not be published, therefore technically closed source, the protocol is still open. The details of the protocol extensions, including all the latest revisions, are still available to whoever wants them, providing they obtain the easily obtainable SDK license. BitTorrent's recent move isn't going to make everyone happy, but those wishing to help develop the BitTorrent community probably won't notice much of a difference.
http://www.slyck.com/story1566_BitTo..._Source_Issues





Latest Beta is BitTorrent's Best Release Yet
Michael Calore

BitTorrent, Inc. has released the beta version of its next peer-to-peer sharing client. The beta release of BitTorrent 6.0 is the most elegant official BitTorrent client yet. And that's not too surprising, since the company has simply dressed up BitTorrent's younger, leaner cousin and branded it as a new release.

Fans of Ludvig Strigeus' tiny µTorrent client will be happy to learn that this 6.0 beta is the first release to fully incorporate the µTorrent code into the official BitTorrent client. BitTorrent purchased µTorrent in December, 2006. The company took over development of the independent client while keeping Strigeus involved in the role of technical advisor.

At first glance, it looks like BitTorrent has just taken the µTorrent client, made a few minor enhancements and re-released it under the BitTorrent brand name.

"It's basically the same code base as µTorrent, but we've done a bunch of maintenance to the code," says BitTorrent CEO and co-founder Bram Cohen. "There are a bazillion tiny little things going on in there."

Indeed, the user interface of the new beta looks almost exactly the same as the old µTorrent. The multi-pane interface remains, as does the tabbed info window that sits at the bottom, under your list of active torrents. The icons are more refined and there's a new menu bar option called "Get Stuff" that simply launches the BitTorrent download store in a browser window. µTorrent has always had an admirably clean user interface, and these additions aren't intrusive. One more bit of µTorrent's legacy remains as well -- there are no Mac or Linux versions. BitTorrent 6.0 beta is a Windows-only download, but support for Vista was added recently, and it's present in the new beta. Cohen also says his team is working on a Mac OS X client, which will be released soon. A Linux client is further out, but the current Windows client runs under Wine.

The client performs admirably on Windows XP. It's a 1MB download, so it's quite a bit heavier than the last build of µTorrent, which was around 200KB in size. The client still uses an incredibly small amount of memory -- it averaged around 6MB while downloading a single torrent. The client did have a bit of a tough time maintaining upload connections when we first started it up, but after about 2 or 3 minutes, the fluctuations went away.

There are two minor limitations in BitTorrent 6.0 beta that shouldn't cause too many headaches. First is the absence of any embedded search engines other than the default, which runs searches at BitTorrent's content store. You can add search engines for other torrent trackers like etree.org and dimeadozen if you want, but you'll have to add them by hand (under preferences > user interface), and if you had them in your last client, they won't carry over when you install the beta. Second, unlike with previous upgrades, you'll be forced to manually re-add all of your active torrents to your queue (and restart them) when you first fire up the new beta.

Cohen says these are simply issues with the beta software. Any bumps in the upgrade path will be ironed out when the client leaves the beta phase and becomes an official release. The transition will be seamless in the final release of BitTorrent 6.0, he says.

Also, fans of µTorrent needn't worry about their favorite client being swallowed up or disappearing. BitTorrent will continue to maintain two clients -- one version of the original µTorrent at uTorrent.com (which it acquired along with the client last year) and an officially branded version at BitTorrent.com.

"Any enhancements to the core engine will go into both clients," says Cohen, "but then the BitTorrent client will be further enhanced on top of that."
http://blog.wired.com/monkeybites/20...look-late.html





Democracy Arrives for Web TV with Miro Player

Imagine having to use a different TV set to watch every TV channel - one for Channel 4, one for Sky, one for Viacom channels. Because every media company wants to control the user interface for online video, that's the current future we're looking at, with Amazons UnBox player for films bought from Amazon, iTunes for films downloaded from Apple, and so on. The only way round it would be if all of them collaborated on a single player - tho small producers would doubtless get left out in the long run. And even then, as Cory Doctorow rightly says, online video is too important to leave in the hands of one company.

Miro, is a video player created by a non-profit foundation in America created under the open source GPL license, which basically allows anyone else to re-use it and adapt it for free. Better still it's an excellent video player. Search for and download YouTube videos? Manage video on your own machine and play and open ANY FORMAT? Subscribe to video podcasts and webisodes? Download legit BitTorrents. The Week in Review is edited and published by Jack Spratts. And because it's an open source system, there's lots of people building on it and improving it all the time (this system has been developed for years as 'Democracy Player') and you don't need to worry about hidden nasties like the Amazon EULA, which requests users to. The Participatory Culture Foundation, which develops it, has also created the Broadcast Machine, which makes it easy to run your own iTunes-subscribable video channel on your website.

Good news for anyone who is concerned about online video ending up in the pockets of one greedy media tycoon.
http://www.netribution.co.uk/2/content/view/1229/182/





Ex-Keyboardist Sues Marilyn Manson
FMQB

Former Marilyn Manson keyboardist Stephen Gregory Bier Jr. — a.k.a. Madonna Wayne Gacy — is suing the band leader, claiming that Manson used the band's money to fund his lavish lifestyle, drug habit and the production of his upcoming film, Phantasmagoria: The Visions of Lewis Carroll, among other things. The breach-of-contract lawsuit says specifically that Manson took assets belonging to the rest of the band to purchase Nazi paraphernalia, African masks made of human skin and the full skeleton of a four-year-old Chinese girl, all of which he has on display in his California mansion, according to MTV News. Bier is seeking unspecified general, compensatory and punitive damages as well as lost salary, bonuses and attorneys' fees, which he "believes to be in excess of $20 million."

Bier also says in the lawsuit that after the band achieved mainstream success, Manson's antics cost them financially as lawsuit after lawsuit was filed against them. These include a suit resulting from Manson's alleged attack on a security guard in 2000 and a sexual misconduct suit filed a year later. The suit also says that in 2000, Manson "forced the band to spend a substantial sum of money to pay a video production company to keep certain video footage out of an upcoming DVD about the band... [as] this video footage showed Manson making racist statements and jokes about African-Americans while feeding his pet snake," according to MTV.

The suit goes on to say that when Bier questioned Manson about his exorbitant money spending, Manson claimed the cash had come from sales of his autobiography, The Long Hard Road Out of Hell. But Bier says it was the band's shared assets, not Manson's own money, that was used to "supply his [cocaine and Vicodin] habit," as well as to fund his stint in a $3,000-a-day rehab facility. Then, when Bier tried to use some of the money he earned as part of Marilyn Manson to buy a home, he was denied access to it by the band's business managers.

The lawsuit also reportedly names Manson's management, lawyers and accountants as defendants, along with Manson's film production company, the band's merchandise company and the corporation that was established to oversee the group's various tours.

Meanwhile, Manson has denied the charges. He told MTV News, "The fact that he's claiming that I've treated him unfairly, financially, is really ridiculous. And I would never spend my money on a Chinese girl skeleton. That would be crossing the line. It's a Chinese boy, for the record," he joked, before continuing. "[Bier and his lawyers are] going for shock value, obviously, and I couldn't be less surprised by how unshocking these things would be to the public."

Manson said he will defend himself against the allegations. "I wish there was some sort of legal angle to this whole thing, or some sort of common sense, or just even camaraderie after all the years that we knew each other," he continued. "I don't have an explanation for it. It just seems like another ex-bandmember suing me and trying to assassinate my personality as a means to financial gain, and it just seems old. It's just not fair. If I spent my money on anything, it was my family, and paying his salary for a year when we weren't even touring."
http://fmqb.com/Article.asp?id=451653





Iran Detains Scores at "Satanic" Rock Gig: Media

Iranian police detained more than 200 people and seized alcohol and drugs in a raid on a "satanic" underground rock concert, media in the conservative Islamic state reported on Saturday.

Iran, which has launched an annual summer crackdown on "immoral behavior", bans alcohol, narcotics and parties with unrelated men and women dancing, drinking and mixing. Western popular music is frowned upon.

The police operation took place on Wednesday night in the town of Karaj near the capital Tehran, at an event with local disc jockeys, rock and rap groups performing, the media said.

"Most of those arrested are wealthy young people ... who came to this party with the goal of attending a provocative, satanic concert," daily Tehran-e Emrouz quoted a senior police official, Reza Zarei, as saying.

Karaj's public prosecutor, Ali Farhadi, said invitations had been sent out via the Internet and that people from Britain and Sweden were among those held. Zarei suggested they were expatriate Iranians visiting the country.

Farhadi said 150 bottles of alcoholic drinks, 800 "obscene" CDs and different kinds of drugs had been confiscated by police, as well as "inappropriate" dresses that those behind the event were giving to female guests as gifts.

"Some 230 people who attended a rock party in Karaj were identified and arrested," Farhadi said on the Web site of Iran's state broadcaster.

He said 20 video cameras had also been seized and that the organizers had planned to blackmail girls after filming "inappropriate and obscene" videos of them.

Under sharia, Islamic law, imposed after Iran's 1979 revolution, women are obliged to cover their hair and wear long, loose clothing to disguise their figures and protect their modesty. Violators can receive lashes, fines or imprisonment.
http://www.reuters.com/article/wtMos...23282220070804





'Charm' School

'Voodoo' Principal Axed For Spell-Ing
Todd Venezia and Erin Calabrese

When rules and discipline failed to keep students at a Manhattan high school in line, the principal allegedly tried another technique - black magic.

Maritza Tamayo turned Unity HS on Sixth Avenue into a Hogwarts wannabe with a campaign of magical Santeria rites, which included white robes, mystic headdresses, splattered chicken blood, burning incense and tarot cards, officials said.

All the hocus-pocus was an attempt to "calm the students down," said a report released yesterday by Special Schools Investigator Richard Condon.

Tamayo allegedly called on the expertise of a friend, Gilda Fonte, of The Bronx, who is a priestess in Santeria, an Afro-Cuban religion similar to voodoo. It combines the worship of Nigerian deities and Roman Catholic saints.

Together, they conducted the dark and secret ceremonies during winter break in January 2006, while no children were present. Tamayo then got an underling to pay part of the schoolhouse shaman's $1,800 service fee, the investigator's report said.

"It's very poor judgment," said Condon, who recommended Tamayo be fired.

Yesterday, the Department of Education agreed and canned Tamayo from the $133,000-a-year job she had held since 1997.

According to the report, the wayward wizardry began when Tamayo told an assistant principal that it would take the powers of Santeria to "cleanse the building" of bad spirits that caused students to act up.

The assistant principal, Melody Crooks-Simpson, told investigators that Tamayo told her she needed to "burn sage" inside the building and "sprinkle chicken blood on the building," the report said.

Crooks-Simpson said that Tamayo's alleged plan to solve the school's problems by dabbling in sorcery sent chills up her spine, so she decided not to attend.

But magic wasn't the only problem for Tamayo. She also allegedly used $250 in school money - and forced teachers to put up another $100 - to pay Fonte to drive students to the school to take their Regents exam.

Tamayo yesterday denied the allegations to The Post.

She insisted that she is a devout Lutheran who doesn't practice Santeria but simply likes to adorn her home and office with lots of plants and primitive and religious art from Colombia and her husband's native Peru.

"I have plants [at work] because I like plants. I have a doll that a student left because it was Black History month, so I kept it," Tamayo said at her apartment in Forest Hills, Queens.

She said she had no reason to perform rituals at Unity, anyway. "It's not a school that has fights," she said.

Tamayo said the allegations sound like the work of a vindictive union rep.

"She didn't like the incense. It was in my office. She didn't have to smell it," Tamayo said.

The principal said that when the rep recently told her, "I'm going to retire in September, and I'm going to go out with a bang," she wondered what she meant.

"Maybe this [the accusations] is what she meant."

Additional reporting by Yoav Gone and Heidi Singer
http://www.nypost.com/seven/08082007...alabrese.ht m





Wonder Walls

The Reform Institute and Brickfish Partner to Beautify the U.S.-Mexican Border

User Generated Content Campaign Increases Awareness and Awards Entrants for Their Artistic Interpretations
Press Release

Brickfish, the online content marketing platform, today announced a partnership with non-partisan public policy think tank, The Reform Institute, to launch the “Design Your Portion of the Border Fence” campaign. The thought-provoking contest invites entrants to offer their opinions on the U.S.-Mexico border fence debate with original designs for decorating it. The online contest, located at www.Brickfish.com/politics/Borderfence, encourages participants to combine imagination and passion with artistic interpretations of what border-crossers should see when traveling from one side of the border to the other.

“Congress has failed to legislate much-needed comprehensive immigration reform that fixes our dysfunctional immigration system and balances security with the needs of our economy,” said Cecilia Martinez, executive director of The Reform Institute. “Instead, Washington has authorized construction of the border fence. We created the ‘Design Your Portion of the Border Fence’ campaign to offer an attention-grabbing and fun way for independent thinkers, Internet activists, and passionate individuals everywhere to engage in debate and creatively express the message they feel that the fence conveys about the U.S. We are expecting some pretty outrageous entries, from murals emblazoned with peace signs to bold warnings telling people not to cross.”

Tapping into the highly controversial debate surrounding the creation of a U.S.-Mexican border fence, entrants are asked to submit an original design that expresses a stance on the issue. The campaign requires entrants to decide which side of the border fence they are painting, Mexico or U.S., and to get creative. The grand prize winner, selected by The Reform Institute Art Jury, will receive $1000. A paid, limited time freelance position with The Reform Institute will be offered to the entry that presents the most passionate stance on the issue. In addition, one entry representing each side of the debate will be awarded $500. Anyone can visit the campaign to view, vote on and share their favorite entries across the Internet.

According to Martinez, the Brickfish platform creates a perfect environment for increasing public awareness on the important topic of immigration reform. The Company’s content-driven, peer-to-peer approach enables interested people to share their views and opinions through User Generated Content (UGC) in a truly open and transparent way. Audience members can vote on, review and share campaign entries through email, Instant Messaging and hundreds of Internet sites, thereby leveraging the viral nature of the Internet and social media to make a difference.

“The Reform Institute is committed to a nonpartisan approach that recognizes the value in advocating open dialogue on a wide range of topics facing the world today,” said Shahi Ghanem, CEO of Brickfish. “The ‘Design Your Portion of the Border Fence’ campaign encourages people who may otherwise be disenchanted with the political process to invest energy in supporting an important cause. Our goal is to raise awareness of vital issues and get people more people actively involved in making change.”

The “Design Your Portion of the Border Fence” contest ends September 12. For more information about Brickfish, visit www.Brickfish.com.
http://home.businesswire.com/portal/...&newsLang =en





Checking the Board



Connecticut Artist Wins Top Prize at Kent Art Show
Brian Saxton

It's a bright summer day in New York City and three young people are studying a bulletin board on the corner of a busy street in the SoHo district.

A few feet away, another young woman is arranging dresses for sale under a wide umbrella.

For Newtown artist Ruth Newquist, the moment is impossible to resist.

"I just love SoHo," Newquist said Thursday. "It's exciting. The buildings are full of history and the people there dress in such wonderful colors."

What Newquist saw that day she later recorded in a vibrant watercolor that has earned her the top award in this year's President's Show at the Kent Art Association.

In addition to a $500 prize, it's also won Newquist the chance to hang her own show in the association's gallery next year.

"I'm pretty excited," Newquist said. "The show will allow me to exhibit 22 of my paintings."

Association president Alexis Lynch, who said this year's show attracted 191 entries, said the three independent judges chose Newquist's work for three reasons.

"It was her style, her composition and her technique that caught their eye," Lynch said. "They thought it was a sensational work of art."

Newquist's winning picture, "Checking the Board," is symbolic of her love for painting cityscapes and especially snapshots of SoHo, which caught her imagination when she retired in 1995.

Today she paints in oils and watercolors and is known for cityscapes and New England rural and urban landscapes.

"Color is my focus -- it creates the mood, and each one of my paintings has its own mood," Newquist said.

Painting has been a lifelong journey for Newquist, who spent 25 years teaching art at New Fairfield High School.

Inspired by a childhood love of art, Newquist, who grew up in Pennsylvania, earned a bachelor's of fine arts from Moore College of Art in Philadelphia while studying with such great painters as Ranulph Bye, Reginald Marsh and Frank Reilly.

Today Newquist, who works out of her studio in Newtown, is a signature artist member of the National Watercolor Society and an artist member of the Salmagundi Club in New York City.

Newquist is also a member of the Catharine Lorillard Wolfe Art Club and the Hudson Valley Art Association in New York; the North Shore Art Association in Gloucester, Mass.; and the Connecticut Watercolor Society.

Her honors include the top watercolor award in the 2001 Salmagundi Club annual members exhibition and the Thomas C. Picard Award for an oil painting in the 2002 Salmagundi Club annual members exhibition.

"Painting can sometimes be a struggle, but for me it's pure joy," Newquist said.

Newquist, who also studied with the Art Students League in New York City, moved to Newtown in 1967. Four years later, her husband, Laurence, an artist, founded the Society of Creative Arts in Newtown.

Her husband died in 1997, but Newquist is still actively involved with SCAN and its sponsorship of art shows, exhibits, classes and demonstrations.

Newquist took a SCAN watercolor workshop this week conducted by Don Andrews of Fairhope, Ala., an internationally recognized artist and instructor.

Newquist said SCAN now has 300 members, 20 demonstrations and three shows a year, indicating a growing public interest in art.

"I think it shows people are looking for ways to relax or dream," Newquist said. "They want to get away from the chaos of everyday living."

Sitting on a stone bench outside the Newtown Meeting House on Main Street, Newquist reflected on her work.

"We artists never stop working," Newquist said. "We see pictures everywhere. That's the wonderful thing about being an artist."
http://www.newstimeslive.com/news/st...&source=tabbox





Connecticut Painter Still at the Canvas as 100th Birthday Nears
Dave Collins

WEST HARTFORD, Conn. (AP) -- Alan Tompkins has built an impressive resume as an artist and teacher during his 99 years.

Degrees from Columbia and Yale; a painting selected for the prestigious annual exhibit at the Chicago Art Institute in 1936; federal commissions to paint murals at four post offices; numerous book illustrations and portraits; a stint as the General Electric Co.'s design supervisor in the 1940s. Add to that teaching jobs at Cooper Union School of Art and Columbia University, and director of the Hartford Art School.

But as he approaches 100, he's devoting much of his time to establishing that he is, indeed, a painter.

"When you have lectured and taught at other places, there's a tendency for people to say you're a teacher," he says. "What they don't realize is that when I taught at Columbia, I taught six hours a week and the other 94 hours I was painting in my studio.

"I am a painter, a professional painter. I resist using the word artist even. But I painted. I've devoted my life to it, and that's one of my wishes is to be known as a painter."

That's why Tompkins has his work on view in an exhibit at the Hartford Art School at the University of Hartford. The free show, which runs through Aug. 23, coincides with the school's 130th anniversary, the University of Hartford's 50th anniversary and Tompkins' 100th birthday, which is Oct. 29.

The show is called simply "An Exhibition of Paintings by Alan Tompkins" and includes pieces from recent years and some dating back to the 1940s and 1950s.

Tompkins, partly bald and bespectacled, sits at a conference table in an office at the art school one recent morning. He wears a brown jacket, gray pants, and a gray and white striped shirt, and struggles a bit with some questions because his hearing isn't what it used to be.

But there are no signs of weakness in his responses. He is firm and authoritative in his speech, and gets a little annoyed when he's asked what he depicts in his paintings.

"You seem to have the idea that painters look at something and paint it," he says. "That's not the case. I would say in none of these paintings was there something set up to look at to paint. That's something that hobbyists do, and I want to make it very clear that I'm not a hobbyist. I'm a professional."

In her 2006 book, "Alan Tompkins - Painter," Linda Powers Tomasso describes him as a "sensitive, sophisticated painter intellectually grounded in twentieth century modernism" and "an extraordinarily articulate spokesman for his discipline."

Influenced by Picasso, Klee, Matisse and others, Tompkins says the inspiration for his paintings comes from life and his thoughts about it. His favorite subjects are the human figure and landscapes.

"Cathie Red," an oil on canvass, is a portrait of his late daughter. The colors are mostly muted shades of brown and gray, except for his daughter's bright red sweater, white shirt and black hair. She is sitting in a chair, arms folded, her eyes, nose and mouth barely visible.

One of his earliest works, "Hitchhiker," shows a man with an angular face and build in a dark suit on a dark day holding out his thumb on the side of a rural road.

"Faculty Club Dining Room" is a sad, almost ghastly piece, with people sitting at tables with their heads tilted downward. Tompkins uses muted shades of gray, bluish green and gold pastels. The faces are blurry, conveying a sense of mourning or prayer. A beam of white light flows from what appears to be a window surrounded by plush drapery.

But ask Tompkins to discuss his works in more detail and he can't.

"If I did so, I would be speaking against my theory," he says. "There is no verbal equivalent to a painting. The minute you try to do it, you're off the track. You're losing your way. Words are incapable of repeating what graphics can give you."

He also says that words can get in the way of appreciating art, and believes exhibits should be viewed in silence. He mentions the silent viewings held every Wednesday at the New Britain Museum of American Art, which is 20 minutes away and houses one of his paintings.

"Think how rare that is today," he says. "Turn on your television set and you get a thousand images thrown at you with music. You go to the movies, always music and voice. When you use the sense of sight by itself, there is a whole richness of life that can be revealed to you through the graphic elements."

Tompkins grew up in the suburbs of New York City, well before the barrage of electronic devices like televisions and computers. He was born in New Rochelle, N.Y., in 1907, the youngest of three children. His father, Edward DeVoe Tompkins, was deputy commissioner of docks for the City of New York, and his mother, Maude Peck, was a teacher and administrator in city schools.

He was schooled at Citizens' Military Training Camps at Fort Devens, Mass., where President Calvin Coolidge awarded him a medal for the best graduating student in 1925, according to Tomasso. He went on to Columbia, starting as a pre-engineering student because of his father's profession. But he flunked calculus and switched his major to art history (the school didn't have an art school at the time) after he did a portrait of the college's dean, who was impressed.

He graduated from Columbia in 1929 with a bachelor's degree and traveled abroad before getting a bachelor's in fine arts at Yale University in 1933. Three years later, "Hitchhiker," was accepted into the prestigious annual exhibition of the Art Institute of Chicago.

A leading critic at the time, C.J. Bulliet, said "Hitchhiker" was the best piece in the show. While Bulliet said it was "a show of a thousand yawns," he declared Tompkins' painting as "chief of the yawnless pictures."

"That was the first sort of public notice that I had, and I was only two or three years out of Yale at the time," Tompkins says.

In the 1930s, the federal government awarded him commissions to paint murals at three post offices in Indiana, and a fourth in North Carolina. Tompkins and his family moved to Stratford, Conn., in 1938, and he took on jobs for book illustrations, murals and portraits while teaching part time at Cooper Union.

The 1940s brought a four-year stint as a designer at GE, where Tompkins' designs for kitchen appliances were patented. He left GE in 1947 and took a part-time teaching job at Columbia while continuing with side jobs.

The family moved to Hartford in the early 1950s when Tompkins was named assistant director of the Hartford Art School. He became director in 1957 and helped oversee the school's merger with Hillyer College and the Hartt College of Music to become the University of Hartford.

Tompkins, who designed the new university's seal, was named vice chancellor for the visual arts. He left the art school administration in 1969, but continued teaching art history and visual studies courses for five more years before retiring.

His wife, Florence, died in 1984. A year later, his daughter, Catherine, died of cancer, and his remaining child, Alan, died suddenly of cancer in 1999. His grandson, Charles Tompkins, a 38-year-old financial adviser from Seattle, flew to Connecticut recently to help his grandfather set up the new exhibit. He said his grandfather's longevity has been a blessing to his family.

"We're very, very thankful ... that he has been granted this extended 100 years to share his work with us and his enthusiasm for art," Charles Tompkins said.

"I think it's extended his life by many years to have this passion. That's a good enough message for anyone out there who's looking for an inspiration: If you're passionate about something, keep doing it."

Alan Tompkins insists he has no special thoughts about turning 100, and said his new show was not planned to coincide with his centenary.

"Suddenly, I looked at the calendar and found that I was going to be 100," he said. "That was an afterthought."
http://hosted.ap.org/dynamic/stories...08-10-11-59-06





Two Outlaws, Blasting Holes in the Screen
A. O. Scott

THE story of “Bonnie and Clyde” has been told so many times that it has acquired the patina of legend. It’s the kind of historical fable that circulates to explain how the world once was and how it came to be the way it is now: a morality tale in which the wild energies of youth defeat the stale certainties of age, and freedom triumphs over repression.

I’m not talking about the adventures of the actual Clyde Barrow and Bonnie Parker, who robbed and shot their way through Texas, Oklahoma and adjacent states in the bad old days of the Great Depression. Their exploits have been chronicled in books, ballads and motion pictures, never more famously than in the movie named after them, which first opened in New York 40 years ago this month. The notoriety of “Bonnie and Clyde,” directed by Arthur Penn from a long-gestating script by David Newman and Robert Benton and produced by Warren Beatty, who also played Clyde, has long since eclipsed that of its real-life models.

The ups and downs of the movie’s early fortunes have become a touchstone and a parable, a crucial episode in the entwined histories of Hollywood, American film criticism and postmodern popular culture. “Bonnie and Clyde” was a scandal and a sensation largely because it seemed to introduce a new kind of violence into movies. Its brutality was raw and immediate, yet at the same time its scenes of mayhem were choreographed with a formal panache that was almost gleeful.

Their horror was undercut by jaunty, rambunctious humor and by the skittering banjo music of the soundtrack. The final shootout, in which Mr. Beatty and Faye Dunaway’s bodies twitch and writhe amid a storm of gunfire (not long after their characters have successfully made love for the first time), was both awful and ecstatic, an orgy of blood and bullets. The filmmakers seemed less interested in the moral weight of violence than in its aesthetic impact. The killings were alluring and gruesome; that the movie was so much fun may well have been the most disturbing thing about it.

As we endure another phase in the never-ending argument about movie violence — renewed by the recent popularity of extremely brutal horror films like the “Saw” and “Hostel” cycles; made momentarily acute by the Virginia Tech massacre last spring; forever hovering around the edges of dinner-table conversations and political campaigns — it’s worth re-examining this legend to see if it has anything left to teach us.

“Bonnie and Clyde” had its North American premiere on Aug. 4, 1967, at the Montreal film festival. When it opened in New York a short time later, the initial critical reception ranged from dismissal to outright execration. Leading the charge was Bosley Crowther, chief film critic of The New York Times, who attacked “Bonnie and Clyde” as “a cheap piece of bald-faced slapstick comedy.” Crowther’s short, merciless review — the film’s “blending of farce with brutal killings is as pointless as it is lacking in taste” — was followed by a Sunday column that made the case at greater length.

The most celebrated, and consequential, brief for the defense was longer still. In more than 9,000 words in the Oct. 21 issue of The New Yorker, Pauline Kael, then a freelance contributor, hailed “Bonnie and Clyde” as “the most excitingly American movie since ‘The Manchurian Candidate,’ ” which had come out five years earlier. Hardly an unqualified rave (“probably part of the discomfort that people feel about ‘Bonnie and Clyde’ grows out of its compromises and its failures,” she noted), Kael’s article instead made a sustained argument for the film’s status as a cultural event.

“ ‘Bonnie and Clyde,’ ” she wrote, “brings into the almost frighteningly public world of movies things that people have been feeling and saying and writing about. And once something is said or done on the screens of the world, it can never again belong to a minority, never again be the private possession of an educated, or ‘knowing’ group. But even for that group there is an excitement in hearing its own private thoughts expressed out loud and in seeing something of its own sensibility become part of our common culture.”

And so “Bonnie and Clyde” was the somewhat improbable vehicle — a period picture made, with some reluctance, by a major movie studio (Warner Brothers) at the insistence of an ambitious young movie star — by which a new mode of expression and a new set of values entered the cultural mainstream. The movie was quickly marked as a battlefield in an epochal struggle: between “the kids” and their stodgy, respectable elders, between the hip and the square.

According to the standard accounts, now duly taught in classrooms and rehearsed around baby-boom Elderhostel campfires, hip triumphed. By the beginning of 1968 the squares had been routed. Time magazine, which had run a dismissive review, put Bonnie and Clyde, as rendered by Robert Rauschenberg, on its Dec. 8 cover, accompanying an essay by Stefan Kanfer called “The New Cinema: Violence ... Sex ... Art.”

Crowther, after 27 years at The Times, retired. His place was taken by Renata Adler, a writer for The New Yorker who was not yet 30. Kael, already a contentious and influential figure in the world of movie criticism, joined the staff of The New Yorker, where for the next quarter-century she would reign as the most imitated and argued-about film reviewer in the English-speaking world. “Bonnie and Clyde” was nominated for 10 Academy Awards.

That it won only two — best supporting actress for Estelle Parsons and best cinematography for Burnett Guffey — may have helped to assure its enduring cachet. Too complete a victory would have led to a loss of credibility. Hip is, by definition, an oppositional stance that the embrace of the establishment can only compromise.

The products of the liberal Hollywood establishment — the earnest, socially responsible dramas that Crowther frequently championed and that Kael in particular despised — did not retreat in the face of a generational challenge mounted by “Bonnie and Clyde” (and also, less noisily, by “The Graduate”). The big Oscar winners that year were “In the Heat of the Night” and “Guess Who’s Coming to Dinner,” both movies about gray-haired, socially empowered white men whose prejudices are demolished by Sidney Poitier, at the time Hollywood’s all-purpose answer to America’s race problem.

At the height of the ’60s, the solution proposed by those movies — that basically decent men could work toward mutual understanding and respect — might have seemed wishful at best. The Oscar ceremonies took place on April 10, 1968, a week after the assassination of the Rev. Dr. Martin Luther King Jr. The summer before, “Bonnie and Clyde” had opened against a backdrop of rioting in Newark and Detroit. Part of the film’s mythology has been a product of that coincidence. American cities were burning, the war in Vietnam and the protests against it were escalating, and a new revolutionary consciousness was in the air, somehow shared by college students and third-world guerrillas, by artists and the urban poor.

As J. Hoberman notes in “The Dream Life,” his revisionist history of the ’60s and its movies, “ ‘Bonnie and Clyde’ popularized the attitude Tom Wolfe would derisively call ‘Radical Chic.’ ” Its hero and heroine exist in a state of vague solidarity with the poor and destitute — the banks they rob are the real enemies of the people, and they are admired by hard-luck farmers and sharecroppers — but they themselves are much too glamorous to pass as members of the oppressed masses.

They are not fighting injustice so much as they are having fun, enjoying the prerogatives of outlaw fame. They exist in a kind of anarchic utopia where the pursuit of kicks is imagined to be inherently political. In this universe the usual ethical justifications of violent action are stripped away, but the aura of righteousness somehow remains.

When pressed by his brother, Buck, about the killing of a bank employee — “It was him or you, right?” — Clyde mumbles that he had to do it, even though the audience knows there was no real question of self-defense. Later, Bonnie’s humiliation of a Texas ranger is justified because the ranger is such a brutal, reactionary authority figure. His subsequent pursuit of the criminals, in contrast, is treated as sadistic and irrational.

But the Barrow gang’s own sadism is evident when the outlaws kidnap a nervous undertaker and his girlfriend after stealing the man’s car. The couple turns out to be the very embodiment of square: He complains about his hamburger; she reveals that she lied to him about her age. These people are along for the ride, but they just don’t get it.

Not Getting It has been, ever since, the accusation leveled against critics of a certain kind of movie violence by its defenders. The easiest way to attack movie violence is to warn of its real-world consequences, to worry that someone will imitate what is seen on screen. The symmetrically literal-minded response is that because violence already exists in the world, refusing to show it in movies would be dishonest.

Neither of these positions quite acknowledges the particularity of cinematic violence, which is not the same as what it depicts. Even the most bloodthirsty moviegoer would be likely to leave a real fusillade like the one at the end of “Bonnie and Clyde” sickened and traumatized, rather than thrilled. The particular charge of that scene, and others like it, is that it tries to push the pretense — the art — as close to trauma as possible and to make the appreciation of that art its point. Missing the point is what marks you as square.

The Hollywood and critical establishments, both of them in the early stages of a generational upheaval, did not miss the point for long. “Bonnie and Clyde” was hardly the first picture to push against the limits of what was conventionally seen as good taste. But it conducted its assault in the name of a higher form of taste, fusing the bravado of youth with the prestige of art. It legitimized the connoisseurship of violence, which does not present itself as an appetite for cheap thrills, but rather as a taste for the finer things.

Thus the geysers of blood at the end of Sam Peckinpah’s “Wild Bunch” two years later could be savored for the director’s visual and formal audacity. The unflinching brutalities of ’70s movies like “The Godfather” and “Chinatown” became hallmarks of the honesty and daring of the New Hollywood. (At the same time the harsh, righteous vengeance unleashed in the “Dirty Harry” and “Death Wish” movies appalled many of the same critics who dug the radical chic of “Bonnie and Clyde.”)

By the 1990s, as a newer generation of filmmakers began to fetishize the glories of post-“Bonnie and Clyde” American cinema, stylized, tongue-in-cheek violence became a sign of rebellious independence. The ear-slicing sequence in Quentin Tarantino’s “Reservoir Dogs” seemed like a deliberate attempt to replicate the kind of shock produced by the wildest moments in “Bonnie and Clyde,” but without the pretense of political or social relevance. This year the best-picture Oscar went to “The Departed,” a movie whose jolting, cold-blooded killings occasioned little objection.

And to raise objections at this point is, perhaps, worse than square. It seems philistine. But I can’t escape the feeling that, just as it has become easier since “Bonnie and Clyde” to accept violence in movies, and more acceptable to enjoy it, it has become harder to talk seriously about the ethics and politics of that violence. The link between real and pretend violence has been so completely severed that some of the ability of movies to offer a critical perspective — to elicit thought as well as gasps and chuckles — has been lost. We’ve become pretty comfortable watching the infliction of pain, and quick to laugh it off.

Don’t misunderstand: I still get a kick out of “Bonnie and Clyde,” but it’s accompanied by a twinge of unease, by the suspicion that, in some ways that matter and that have become too easy to dismiss, Bosley Crowther was right.
http://www.nytimes.com/2007/08/12/mo....html?ref=arts


















Until next week,

- js.



















Current Week In Review





Recent WiRs -

August 4th, July 28th, July 21st, July 14th, July 7th, June 30th

Jack Spratts' Week In Review is published every Friday. Submit letters, articles and press releases in plain text English to jackspratts (at) lycos (dot) com. Submission deadlines are Thursdays @ 1400 UTC. Please include contact info. Questions or comments? Call (617) 939-2340, country code U.S.. The right to publish all remarks is reserved.


"The First Amendment rests on the assumption that the widest possible dissemination of information from diverse and antagonistic sources is essential to the welfare of the public."
- Hugo Black
JackSpratts is offline   Reply With Quote
Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Peer-To-Peer News - The Week In Review - May 19th, '07 JackSpratts Peer to Peer 1 16-05-07 09:58 AM
Peer-To-Peer News - The Week In Review - April 14th, '07 JackSpratts Peer to Peer 1 11-04-07 11:26 AM
Peer-To-Peer News - The Week In Review - December 9th, '06 JackSpratts Peer to Peer 5 09-12-06 03:01 PM
Peer-To-Peer News - The Week In Review - September 16th, '06 JackSpratts Peer to Peer 2 14-09-06 09:25 PM
Peer-To-Peer News - The Week In Review - July 22nd, '06 JackSpratts Peer to Peer 1 20-07-06 03:03 PM






All times are GMT -6. The time now is 07:13 AM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
© www.p2p-zone.com - Napsterites - 2000 - 2024 (Contact grm1@iinet.net.au for all admin enquiries)