P2P-Zone  

Go Back   P2P-Zone > Peer to Peer
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Peer to Peer The 3rd millenium technology!

Reply
 
Thread Tools Search this Thread Display Modes
Old 14-05-08, 10:20 AM   #1
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,016
Default Peer-To-Peer News - The Week In Review - May 17th, '08

Since 2002


































"We’ve been told by corporate America that we cannot fix the things we own. All we can do is buy their stuff and like it. All this technology, and it’s not ours. It’s somebody else’s. 'Make' is about taking that back off and making it yours." – Shannon O’Hare


"Anything you do will be an abuse of somebody else’s aesthetics. I think you’re born an artist or not. I couldn’t have learned it. And I hope I never do because knowing more only encourages your limitations." – Robert Rauschenberg


"NAB salutes Sens. Lincoln and Wicker and their Senate colleagues for formally recognizing radio airplay's enormous value to both record labels and recording artists. The undeniable fact is that radio airplay is a musician's greatest promotional tool and generates millions of dollars in revenue annually for RIAA-member companies and performers." – Dennis Wharton


"The industry has finally been able to get some hard data about how removing DRM restrictions from legitimately purchased tracks affects piracy. The statistics show that there's no effect on piracy." – Bill Rosenplatt



































May 17th, 2008




Tanya Andersen Wins $108,000 Against Recording Industry
Ashbel S. Green

An Oregon federal magistrate has awarded nearly $108,000 to a Beaverton single mother who said the recording industry falsely accused her of illegally downloading music.

The money represents Tanya Andersen's attorney fees and costs in successfully fighting a lawsuit filed by the recording industry against her.

The attorney fee award is separate from a national class action lawsuit Andersen filed against the recording industry last year.

Andersen's legal battle with the Recording Industry Association of America has gained national attention as a case of David vs. Goliath. Her suit accuses the industry of a waging a "campaign of threat and intimidation" against her and others who have never illegally downloaded music.

"While we respectfully disagree with the magistrate judge's decision to award extraneous fees -- including on counterclaims that the defendant herself brought and dropped -- it is important to note this decision is only a recommendation and falls significantly short of defendant's requests. We will likely file an objection in short order," said Cara Duckworth director of communications for the Recording Industry Association of America.

The recording industry has taken legal steps against thousands of people suspected of illegally downloading music since 2003.

The industry sued Andersen in 2005, but dropped the case last year after failing to turn up evidence that she illegally downloaded music.
http://blog.oregonlive.com/breakingn...108000_ag.html





The Pirate Bay File Police Bribery Complaints
enigmax

The chief investigating officer in the Pirate Bay case who was revealed as recently working for Warner Bros, has been reported to the police. Yesterday the Pirate Bay crew filed “at least” three complaints, and further people have been reported for bribing the police.

The Pirate Bay case hasn’t even got to trial yet and already the controversy surrounding it is building up like some Hollywood plot.

Not only was the police star witness against the Pirate Bay previously employed by one of the plaintiffs, Warner Bros., but it was revealed that after this work he would return to his job as a police officer. Highly suspect to say the least, but not unusual in this case - the IFPI’s expert witness used to work for them too.

Various media and anti-piracy agencies all want a large piece of the Pirate Bay crew and between them are demanding millions of dollars in compensation, a point that is contested by Brokep: “In fact, they owe us a shitload of money. All the time we’ve spent on being called criminals and hunted down by private investigators and getting our stuff stolen by them - it’s gonna be expensive for them.”

Brokep says their initial target is police officer and IT forensics expert Jim Keyzer, who they clearly see as corrupt:

“We reported the police officer yesterday. For a lot of different reasons, at least three criminal complaints were filed. But you know what? It’s illegal to bribe the police as well. So more people have been reported to the police.”

The Pirate Bay crew say that when the case is over, they will demand compensation for all the time and money they have invested in this “media circus”.

Brokep is clearly in defiant mood: “So who’s the fucking criminals really? Hey Hollywood assholes - Be afraid. Very afraid. The law is coming to serve justice.”
http://torrentfreak.com/the-pirate-b...plaint-080516/





Michael Jackson to Take on The Pirate Bay
Ernesto

Micheal Jackson and several other artists plan to take on The Pirate Bay. The king of pop hired the infamous ‘Web Sheriff’ to protect his rights. “Hey Michael - do you want us to pay you in small kids maybe?” was the first response of Pirate Bay admin Brokep.

The Web Sheriff announced today that Michael Jackson joined the Village People, UB40 and the rights holders of Bob Marley’s music, in an attempt to get compensation for the losses they allegedly suffered at the hands of the popular BitTorrent website.

Pirate Bay’s Brokep commented on the announcement by saying: “The common thing for all of these artists of course is that no one listens to them anymore.”

This is not the first time the Sheriff, aka John Giacobbi, has clashed with the Pirate Bay folks. Last November he announced that he planned to sue them in the U.S., France and Sweden for infringing the rights of Prince.

Web Sheriff will demand $100 million dollars in compensation, slightly less than the MPAA asked for last week. Adding them both together amounts to a record breaking claim. “The good thing about this is that we just broke TorrentSpy’s lawsuit. Maybe time to call Guinness, we like to break world records and we just broke one I think,” Brokep writes.

In the meantime, The Web Sheriff is still trying to get ABBA on board. “It would also be good/appropriate if the members of ABBA could take up the fight against these pirates, as they personify the Swedish music industry’s successes and are renowned ambassadors for Sweden, contrary to The Pirate Bay.” he said previously.

Again, Brokep disagrees, he sees The Pirate Bay as Sweden’s true ambassadors. “All over digg.com and other cool social networks there is always the comment “last place on earth with true freedom is Sweden” or ‘I really want to move to Sweden’,” he wrote a few months ago.

It will be interesting to see how this develops, for now, all the Web Sheriff has ever done is making threats. You would think that he must know by now that this has no effect on The Pirate Bay team.
http://torrentfreak.com/michael-jack...te-bay-080516/





Judge in Internet Music Sharing Case May Grant New Trial
Larry Oakes

The judge in a landmark music copyright infringement award against a Brainerd woman notified attorneys today that he's considering granting a new trial on the grounds that he improperly instructed the jury about what constitutes illegal file-sharing on the internet.

U.S. District Judge Michael Davis said in an order filed this morning in Minneapolis that he may have made a "manifest error of law" last October when he instructed a Duluth jury that simply uploading songs to a music file-sharing network could be considered illegal distribution, even in the absence of proof that anyone received them.

In a verdict hailed by the music recording industry, the jury found Jammie Thomas, 30, willfully violated the copyrights of six recording companies and should pay them $222,000. Jurors found that Thomas, operating on her home computer under the user name "tereastarr" on the Kazaa file-sharing network, copied or distributed 24 songs, and it set damages at $9,250 for each.

Thomas' attorney said the award was excessive and filed a motion asking Davis to reduce it. But Davis, in today's order, wrote that he'll consider granting a new trial on different grounds.

"The Court is concerned that Jury Instruction 15 may have been contrary to binding Eighth Circuit [U.S. Court of Appeals] precedent," Davis wrote. He then cited a case in which the appeals court "stated that `infringement of [the distribution right] requires an actual dissemination''' or, in other words, proof that someone received the songs.

Davis wrote that no party to the case made him aware of that precedent. His order did not say how it was brought to his attention.

He ordered that attorneys for Thomas and the record companies submit briefs by May 29 on whether he erred. He wrote that he'll hear oral arguments on those briefs on July 1 in U.S. District Court in Duluth.

In apparent recognition of the case's importance to the music industry and to the millions of people who download and share music, the judge also suggested that "interested parties" submit friend-of-the-court briefs by the same deadline.

The civil trial drew national attention because it was the first Internet piracy suit by the recording industry against a customer to go to trial. The Recording Industry Association of America said the verdict and its aggressive letter-writing campaign to colleges were spreading the word that people can pay a price for illegally downloading or sharing music.
http://www.startribune.com/entertain...refer=Homepage





Jury Rejects Dish Network's $1 Billion Piracy Claim
AP

A jury found Thursday that a company that makes encryption technology for DirecTV violated federal and state piracy provisions, but awarded rival Dish Network Corp. just $1,500 of the $1 billion it sought.

Dish Network, formerly EchoStar, requested $1 billion in damages against News Corp.'s NDS Group over allegations NDS hacked its satellite signals. The $1,500 award, the statutory minimum, stemmed from one incident of testing on the satellite broadcaster's encryption cards.

The case, originally filed in 2003, was heard in U.S. District Court in Santa Ana.

"This verdict is a complete vindication of NDS' position at trial, and it puts an end to the lie that NDS is any way responsible for ... piracy," said Darin Snyder, an attorney for NDS Group. "This is also a vindication of NDS' long-term anti-piracy strategy."

Dish Network spokeswoman Kathie Gonzalez said in a statement that the company was disappointed with the jury's damage award, but noted the panel did find NDS violated provisions of the Federal Communications Act and California law.

"We will continue to vigorously prosecute those individuals and companies that engage in stealing our satellite signals," she said in the statement.
http://www.siliconvalley.com/news/ci_9272766





Double Standard? UMG Fights "Excessive" Infringement Damages
Nate Anderson

When Jammie Thomas was found guilty of infringing the copyrights of 24 songs during a trial in Minnesota last year, a jury fined her $222,000 in statutory damages. Given that the record labels arguably lost about 70¢ per song from her (the amount paid by digital download stores like iTunes), this means that Thomas' fine was 13,214 times the actual loss. So when Ray Beckerman of Recording Industry vs. The People recently unearthed a case from last year in which Universal complained about having to pay a mere 10 times the actual damages in a court case of its own, critics smelled the salty tang of hypocrisy.

The case in question involves now-deceased rapper The Notorious B.I.G., whose album Ready to Die incorporated an unlicensed sample of "Singing in the Morning" from the Ohio Players after a Hendrix sample was denied clearance. The sample made its way onto the final album and even onto reissued albums. Bridgeport Music and Westbound Records, which control the rights to the song, sued. A district court ruled in their favor; Bridgeport took the $150,000 maximum in statutory damages, while Westbound sought compensatory and punitive damages. Westbound scored big, earning $366,939 from the jury along with punitive damages of a whopping $3.5 million.

Clear those samples!

In appealing the ruling, Universal argued that the punitive damages award was "grossly excessive and should be vacated or at least reduced." The reason? It's excessive. The brief quotes a Supreme Court ruling that said, "In practice, few awards exceeding a single-digit ratio between punitive and compensatory damages, to a significant degree, will satisfy due process." Universal pointed out that the award in question was "approximately 10 to 1, far above the line of unconstitutional impropriety."

They convinced the Sixth Circuit Court of Appeals with the claim. The judges on the appeals court found that "the jury's $3.5 million punitive damage award was unconstitutionally excessive."

The Universal case isn't quite the same as the Jammie Thomas case, since Thomas was hit with statutory damages and neither actual nor punitive damages were at issue (the RIAA simply says it can't possibly calculate actual damages and doesn't try to do so). But there's an overlap in principle, since in P2P lawsuits the goal seems to be "sending a message" to file-swappers. That's fine, of course, but are the damages in these cases "unconstitutionally excessive"?

Thomas raised that issue herself. The RIAA argued that Thomas should pay up, in part because the award was actually far lower than it could have been (at $150,000 per infringement, Thomas could have owed substantially more). "Where, as here, the amount awarded by the jury was less than 10 percent of what the jury could have awarded," wrote the RIAA at the time, "there is no basis for a remittur or a new trial."

The US government, which felt the need to weigh in, agreed. The Department of Justice concluded that "the damages awarded under the Copyright Act's statutory damages provision did not violate the Due Process Clause; they were not 'so severe and oppressive as to be wholly disproportioned to the offense or obviously unreasonable.'"

Fortunately, statutory damages are discretionary, but they're already so high in these sorts of cases that any attempt to raise them (as Congress considered doing in the PRO-IP Act) is bound to be seen as "gluttonous." When RIAA members like Universal object (and win) cases on the grounds that they shouldn't have to pay a penalty 10 times higher than actual damages, surely noncommercial file-swappers, operating from homes, coffee shops, and dorm rooms, shouldn't be hit with these massive fines, either, when Universal's on the other side of the courtroom. Let the penalty be commensurate with the infringement.
http://arstechnica.com/news.ars/post...t-damages.html





Big Content Fighting Campus P2P by Lobbying for State Laws
Nate Anderson

Neither DMCA takedown notices nor RIAA prelitigation letters have any necessary correlation with on-campus P2P usage rates, as the recent upsurge in RIAA letters this last month shows (the RIAA says that the higher volume is a result of changes to the way MediaSentry detects P2P use). Making such letters a metric for judging school enforcement against P2P would thus seem to be problematic, but that was one provision of a bill introduced earlier this year in Tennessee. As federal efforts creak slowly forward, copyright owners are increasingly taking their war on higher ed P2P to the states, and the higher ed community needs to stay vigilant to keep such laws from gaining traction.

At an EDUCAUSE higher ed IT conference last week in Washington, campus IT specialists detailed their fight to stave off technological mandates imposed by local legislatures. Their basic complaint is that P2P is a social phenomenon with deep roots, not a merely collegiate practice. They say that singling out campuses is unfair, especially since only 20 percent of students nationally live on campus. But the entertainment industries are apparently convinced that a collegiate crackdown is necessary, and they're willing to go local to make it happen.

The RIAA goes to Nashville

Tom Danford, the CIO for the Tennessee Board of Regents, detailed his university system's fight against the Tennessee law. The idea for the bill began with a 2006 senate joint resolution that asked schools in the state to educate students about P2P and develop policies to deal with it. But when the University of Tennessee continued to top RIAA piracy lists, the music lobby pushed for a legislative remedy with more teeth than a mere resolution.

That bill landed in January of this year after the RIAA hired a local lobbyist to shepherd it through the state legislature. The bill would have forced universities to enforce a P2P policy, analyze their networks for P2P use, certify that no P2P transmissions were taking place, and use affirmative, technology-based deterrents to filter P2P. The Board of Regents estimated that such measures would cost them $14 million to implement.

In addition to the cost, the bill did not distinguish between legitimate and non-legitimate P2P transmissions. It also might have allowed the RIAA to sue institutions for breaching their duty under the law, something not normally allowed against state schools. The bill was eventually expanded to include private schools in the state.

Danford and others caught wind of the bill early due to a new initiative in which they examined every new bill for potential impacts on higher education. Catching the bill early allowed them to educate legislators about the severe limitations of most technological solutions, and by doing so, Danforth helped to make the bill "more palatable."

In its current form, the legislation basically codifies the earlier senate resolution into law. The technological mandates are gone, as are RIAA policing powers; instead, universities have to issue a one-time report to the legislature on their progress. Should any institution receive more than 50 new infringement notices, however, it will come under increased scrutiny.

Beyond the sunny South

Tennessee isn't the only state dealing with the issue. Illinois has seen a similar law introduced recently, and while higher-ed groups have tried to negotiate on its language, progress has been slow. California's State Assembly held a March 4 "informational hearing" on the issue and the RIAA's Mitch Glazier was on hand to prod the state to action. The rumor mill suggests that the state of Washington might see a bill of its own soon, as well.

The frustration here on the part of higher ed is understandable, as they hate being singled out for rules that don't apply to commercial ISPs—where more infringement actually takes place. But with colleges essentially playing defense as the entertainment industry continues to set the terms of the debate, the fear is that at some point these laws may start to gain traction somewhere in the US and spread from there.

But the issue isn't just technological, and it's not just about colleges. "By the time students reach us, they've already been downloading since the age of 3," Danford says, and he can't see why colleges should be specially burdened with handling a society-wide issue. It doesn't help that legislators are generally being told that "piracy" is running rampant at colleges and that a simple technological fix could shut it down. Given that premise, why aren't schools doing so? Do they hate copyrights?

Legislators don't often know how to evaluate these claims; as one national higher-ed lobbyist said, "most members of Congress would not know how to download a file, legally or illegally," so when the entertainment industry talks about piracy, lost tax revenue, and out-of-work musicians and filmmakers, they listen.

Beating back technological mandates requires a consistent educational effort, often beginning with legislative staffers. Fortunately, many of these people are young, fresh from college, and understand the issues far better than the legislators.

Colleges and universities, already having long experience of offering "continuing education," have found themselves caught up in educating legislators at all levels of government about the limits of technology, the costs of these mandates, and the limits of copyright owners' data collection methods. While it can be frustrating to spend resources on this sort of lobbying, Danford argued that it's absolutely essential to prevent bad tech policy being made by legislators in the Nashville, Springfield, or a state capitol near you.
http://arstechnica.com/news.ars/post...tate-laws.html





How It Does It: The RIAA Explains How It Catches Alleged Music Pirates
Catherine Rampell

To catch college students trading copyrighted songs online, the Recording Industry Association of America uses the same file-sharing software that online pirates love, an RIAA representative told The Chronicle at the organization's offices during a private demonstration of how it catches alleged music pirates. He also said the group does not single out specific colleges in its investigations.

The demonstration was given by an RIAA employee who would speak only on condition of anonymity because of concern that he would receive hate e-mail.

The official explained that one way the RIAA identifies pirates is by using LimeWire, a popular peer-to-peer file-sharing program that is free online and used by many college students (there is also a more-robust version of the program sold for a small fee).

Here's how the process works: The RIAA maintains a list of songs whose distribution rights are owned by the RIAA's member organizations. It has given that list to Media Sentry, a company it hired to search for online pirates. That company runs copies of the LimeWire program and performs searches for those copyrighted song titles, one by one, to see if any are being offered by people whose computers are connected to the LimeWire network. For popular songs, the search can turn up dozens, if not hundreds, of hits. A search on Madonna's latest release, "4 Minutes," turned up more than a hundred users trading various copies of the song.

The LimeWire software allows users who right-click on any song entry and choose "browse host" to see all of the songs that a given file sharer is offering to others for download. The software also lists the IP address of active file sharers. (An IP address is a unique number, assigned by Internet-service providers, that identifies every connection to the Internet.) While the names of the people associated with particular IP addresses are not public, it is easy to find out which IP addresses are registered to each Internet-service provider. Using public, online databases (such as those at arin.net or samspade.org), Media Sentry locates the name of the Internet-service provider and determines which traders are located at colleges or universities.

Swift Detection

The process mimics how pirates themselves locate files but with a significant difference: speed. Media Sentry has automated the process by using scripting software that types in the songs, grabs the IP addresses, checks them, and forwards the information to the RIAA.

The RIAA's first step against campus pirates is usually to send a Digital Millennium Copyright Act takedown notice, which asks the college to remove infringing content from its network.

In collecting evidence for those takedown notices, Media Sentry investigators do not usually download suspect music files. Instead, the company uses special software to check the "hash," a sort of unique digital fingerprint, of each offered file to verify that it is identical to a copyrighted song file in the RIAA's database. In the rare cases in which the hashes don't match, the investigators download the song and use a software program sold by Audible Magic to compare the sound waves of the offered audio file against those of the song it may be infringing upon. If the Audible Magic software still doesn't turn up a match, then a live person will listen to the song.

If there is a match, Media Sentry investigators will then engage in a so-called TCP connection, or an electronic "handshake," with the computer that is offering the file to verify that the computer is online and is ready to share the song.

Based on that information, the RIAA will send a letter to the college asking for the song to be removed. The letter lists the name of the file and the date and time when Media Sentry investigators saw it available online.

On listservs and in interviews, some university administrators have recently questioned the validity of some of these takedown notices because they say they do not have any record of a download at the named IP address at the specified time. RIAA officials said this is because investigators performed only a "handshake."

Seeking Settlements

In more serious cases of piracy, the RIAA sometimes decides to send out "prelitigation settlement letters," which asks alleged infringers to cough up several thousand dollars in lieu of going to court and potentially facing a much more expensive punishment.

Before sending out the prelitigation settlement letters, Media Sentry investigators always download music files believed to be infringing on licensed songs. Live human beings then listen to those songs to verify that the files are infringing. A letter goes out to the college with the date and time when investigators saw that the song was available for sharing.

While the process for generating both takedown notices and settlement letters is largely automated, the RIAA said that before each warning is sent out, a full-time RIAA employee reviews each case to make sure the claim is legitimate and that the alleged pirate is in the United States. Thanks to the speed and ease of the automated process, though, the RIAA is "able to identify hundreds of instances of infringement on a daily basis," according to RIAA spokeswoman Cara Duckworth. She also acknowledged that the RIAA can tell only when a song is being offered for users to illegally download; investigators have no way of knowing when someone else is actually downloading the song.

The organization does not perform similar automated investigations for file traders on commercial ISP's (that is, Internet- service providers not operated by universities, such as Comcast). All notices received by commercial Internet-service providers are processed manually.

"The automated takedown notice program we have right now is solely university-focused," said the anonymous RIAA representative. "We're trying to make universities aware that they have an issue with peer-to-peer file sharing on their network, and so we don't send automated notices to commercial ISP's, I think because they are generally aware that there's a problem."

The RIAA said it does not single out particular academic institutions to be "made examples of."

"We have no capability of targeting any school at all," said the RIAA representative, who argued that there is a large "misperception" among university administrators that individual colleges are being picked on. "Technically we can't do it. We find what we find with this process, and that's what we send to schools."
http://chronicle.com/free/2008/05/2821n.htm





Want to Download? Take the Quiz
Andy Guess

For all the high-tech tactics colleges have employed to slow or block students’ illegal file sharing activity, few have actually turned to methods used in the classroom to get the message across. A university in Missouri thinks it’s found the right solution, combining an age-old teacher’s tool with a dash of discipline.

Last academic year, Missouri University of Science and Technology, in Rolla, received some 200 Digital Millennium Copyright Act “takedown” notices from the recording industry, notifying the institution that users of its network had made copyrighted works available for download. This academic year — at a time when colleges across the country have been experiencing sudden spikes in copyright complaints — the university received eight. Karl F. Lutzen, a systems security analyst at the university, chalks it up to Missouri S&T’s unusual method of regulating students’ network usage: In order to download (or upload) files on any peer-to-peer network whatsoever, all on-campus users have to pass an online quiz on copyright infringement.

But not just once. Passing the test — with a perfect score — enables peer-to-peer access for six hours on the user’s on-campus registered machines, presumably enough time to download that (legal) song, TV show or e-book. The next time, the student, staff or faculty member has to go to the intranet Web page and take the randomized test again, for a maximum of eight uses per month (which, kind of like vacation days, can accrue to at most 20).

“The idea is that we had a policy where we permitted peer-to-peer protocols for educational and research use,” Lutzen said, and as long as it was for legitimate reasons, “we didn’t have a problem with people using it.... This solution, more or less, through educational and technical controls, enforces that policy.”

The system works by taking advantage of “traffic shaping” technology used by most campus networks to prioritize certain types of data over others. For example, without traffic shaping that limits outgoing peer-to-peer traffic (regardless of a university’s policy on file sharing), a campus network could easily and quickly become a hub for downloaders around the world. By quickly isolating specific users and turning their ability to send and receive peer-to-peer data off or on, Missouri S&T is harnessing the traffic shaping technology to tie access to the online quiz.

“Based on the amount of grumbling it’s actually working pretty well,” Lutzen said.

When students pass the quiz, P2P access is granted within 10 seconds for use by any program, whether it’s a game or software program that needs to download an update, LimeWire, BitTorrent or another program. From that point on, there’s no way for the university to monitor whether users’ file-sharing activity is legal — but, on the other hand, there’s also no way for them to claim ignorance. If a student fails to make a perfect score, though, he or she has a minute or two to try again. But the questions change, and so does the order. Theoretically, students can memorize the questions, Lutzen said, but they’d still have to pay attention to how the answers are arranged (which also changes) and end up learning the material anyway.

Questions include asking students what kinds of works are protected by copyright and the difference between copying a CD and downloading music. The university’s sanctions for violations of copyright policy are strict: 14 days of revoked network access for the first offense and 28 days, plus community service, for the second, and so on.

Colleges have taken widely divergent approaches to the problem of illegal file sharing, from a “look the other way” philosophy to complete bans. Most inform their students of the legal aspects of peer-to-peer networks and (sometimes reluctantly) hand over “pre-litigation” letters sent by the recording industry that offer certain students discounted settlements in order to avoid copyright infringement lawsuits. Some have gone so far as to block peer-to-peer access altogether, and others — like Missouri S&T — offer legal alternatives, such as Ruckus.

But the combination of strict enforcement on the campus network and educational requirements is novel. Last year, the University of Michigan used similar traffic-shaping tools to begin informing students when they were uploading data over peer-to-peer networks, but that hasn’t been matched with any blocking mechanisms. Michigan’s goal was to prevent students from inadvertently offering copyrighted content for others to download — which is sometimes the default option on file-sharing programs — and becoming susceptible to litigation. (Missouri S&T, formerly the University of Missouri at Rolla, essentially accomplishes the same goal, because uploading on peer-to-peer networks is also limited to the six-hour blocks enabled by the quiz.)

“I think that this is an interesting and new area, I think it’s great to have a thousand flowers bloom and try different things,” said Tracy Mitrano, the director of Cornell University’s IT policy as well as its Computer Policy and Law Program. At Cornell, she said, students who receive DMCA notices take an intensive educational program that they must pass. Missouri S&T’s program, meanwhile, was “another layer deeper” than Michigan’s system, dubbed BAYU (for Be Aware You’re Uploading), she said.

Mitrano added that she and others at Cornell were discussing how to move some of its post-infringement educational resources to the “front end,” when students enroll, since many come into college with downloading habits ingrained since middle school. It’s better “trying to front-load it rather than have it be ‘discipline’ even though it’s just education,” she said.

Lutzen agrees: “I think the model of putting education up front and limiting the usage is what needs to be looked at. How that’s done is up to the institution.”
http://www.insidehighered.com/news/2008/05/15/p2p





Anti-Performance Royalty Bill Hits Senate
FMQB

A bipartisan resolution that opposes the idea of imposing a royalty rate on radio stations for the music they play was introduced in the U.S. Senate this week. The resolution, introduced by Sens. Blanche Lincoln (D-AR) and Roger Wicker (R-MS), has gained the support of Sens. Wayne Allard (R-CO), Sam Brownback (R-KS), Lisa Murkowski (R-AK), Ben Nelson (D-NE) and James Webb (D-VA). Similar legislation was introduced last year in the U.S. House of Representatives by Reps. Gene Green (D-TX) and Mike Conaway (R-TX), which is called the Local Radio Freedom Act. That resolution currently has support from more than 200 House members.

"Congress should not impose any new performance fee, tax, royalty, or other charge relating to the public performance of sound recordings on a local radio station for broadcasting sound recordings over the air, or on any business for such public performance of sound recordings," reads the Senate resolution.

Commenting on the resolution's introduction, NAB EVP Dennis Wharton stated, "NAB salutes Sens. Lincoln and Wicker and their Senate colleagues for formally recognizing radio airplay's enormous value to both record labels and recording artists. The undeniable fact is that radio airplay is a musician's greatest promotional tool and generates millions of dollars in revenue annually for RIAA-member companies and performers."
http://fmqb.com/Article.asp?id=699543





Company Hopes To Challenge CRB's Existence
Susan Butler

Royalty Logic hopes to challenge the very existence of the U.S. Copyright Royalty Board, which sets rates for compulsory licenses under federal copyright law.

The company filed a motion on Tuesday with the federal Appeals Court in Washington, D.C., which will be hearing the webcasters' appeal of the CRB's rate decision from last year, asking for permission to file additional legal arguments. The arguments challenge the constitutionality of the law that created the CRB.

Royalty Logic was a party in the webcaster rate trial. The company wanted the authority to compete with SoundExchange, which the CRB denied. SoundExchange is the only organization currently authorized to license and collect royalties for sound recording owners, musicians and vocalists under section 114 of the Copyright Act.

That section authorizes the public performance (e.g., streaming) of sound recordings over non-interactive digital services as long as certain royalties are paid and other conditions are met. The CRB is authorized by law to set those rates through a two-year rate-setting process.

The deadline for filing legal briefs with the Appeals Court has passed. Therefore, Royalty Logic is asking the court to permit the filing of additional arguments for consideration.

If permitted to file the brief, Royalty Logic will argue that the law creating the CRB violates the appointments clause of the U.S. Constitution. In other words, Congress improperly permitted the Librarian of Congress, which controls the Copyright Office, to appoint the three Copyright Royalty Judges.

If a court held that the law is unconstitutional, it is conceivable that decisions made by the CRB would be null and void.
http://www.billboard.biz/bbbiz/conte...26152efdf2d303





House Approves New Property Seizure Law

The criminals in the federal government are now trying to legalize the seizure of computers and other property under the guise of strengthening intellectual property laws. HR 4279 or the Prioritizing Resources and Organization for Intellectual Property Act of 2008 which was recently passed by the U.S. House of Representatives, will give the government draconian powers to do just this. This legislation gives the government the power to seize property that facilitates the violation of intellectual property laws. The legislation also mandates the formation of a formal Intellectual Property Enforcement Division within the office of the Deputy Attorney General to enforce this madness. In addition, a new office called the Office of the United States Intellectual Property Enforcement Representative is created within the Executive Office of the President. If you boil it down to brass tax, this legislation allows the U.S. government to lawfully seize your computer if it has one unauthorized mp3 file on its hard drive. It also provides the authorization for the creation of offices within the executive branch to enforce a law that is impossible to enforce.

Below is taken from section 202 of HR 4279 that gives the federal government the authorization to seize property that may have been used to facilitate an intellectual property violation. The language in this section indicates that a violation would include downloading a single unauthorized mp3 file on to a computer.

d) Unauthorized Recording of Motion Pictures- Section 2319B(b) of title 18, United States Code, is amended to read as follows:

`(b) Forfeiture and Destruction; Restitution-

`(1) CIVIL FORFEITURE PROCEEDINGS- (A) The following property is subject to forfeiture to the United States:

`(i) Any copies of a motion picture or other audiovisual work protected under title 17 that are made without the authorization of the copyright owner.

`(ii) Any property constituting or derived from any proceeds obtained directly or indirectly as a result of a violation of subsection (a).

`(iii) Any property used, or intended to be used, to commit or facilitate the commission of a violation of subsection (a) that is owned or predominantly controlled by the violator or by a person conspiring with or aiding and abetting the violator in committing the violation, except that property is subject to forfeiture under this clause only if the Government establishes that there was a substantial connection between the property and the violation of subsection (a).


This is the 1980s equivalent of the government being given the legal authority to seize cassette recorders if they were used in recording a song off of the radio. Under this legislation, downloading even a single mp3 file unauthorized by the copyright owner will give the federal government the power to take your computer. There is no way that the federal government can enforce this. In fact, it is insane that the U.S. House of Representatives is more concerned about keeping the record and movie industry happy by passing this legislation than they are with real issues. Incredibly, this bill was passed by a vote of 410-11. Two of the dissenting voters included Dennis Kucinich and Ron Paul.

John Conyers a fascist and anti-Constitutionalist member of the U.S. House of Representatives who originally introduced this bill made the following statements describing the purpose of the legislation. His statements were republished in a Billboard Magazine report.

(1) prioritize intellectual property protection to the highest level of our government;

(2) make changes to IP law to enhance the ability of IP owners to effectively enforce their rights;

(3) make it easier to criminally prosecute repeat offenders;

(4) increase penalties for IP violations that endanger public health and safety.


Basically speaking, Conyers believes that downloading illegal mp3 and movie files endanger public health and safety. Conyers is either an insane individual that belongs in a mental institution for making such a ridiculous statement or he and everybody else who voted for this bill is in the back pockets of the RIAA, the MPAA and the rest of the music and movie industry. Common sense would dictate that such a law is unenforceable and should have not been seriously entertained. This is just another sign that this country is run by a bunch of fascists who are trying to find as many ways to undermine civil liberties under the guise of enforcing the law. What is really ridiculous about this, is the fact that the Constitution which is the supreme law of the land is violated by these fascist tyrants in Congress every single day of the week. If they were actually serious about enforcing the law, why are they not following the Constitution? Why do they reject it?

Maybe if the movie and music industry stopped putting out horrible content, their sales would be a little better. It seems as if they are trying to blame people who download unauthorized mp3 and movie files for their shortcomings in business. Perhaps they should do what smaller independent music and film production companies have done and embrace the technological revolution instead of stifling it by trying to push this anti-American legislation down our throats.

It is understandable to go after people who are illegally profiting off of selling material that isn’t their own but there really isn’t a need for government involvement. The record industry should sue those people if they believe that there are groups or individuals who are unfairly profiting off of their work. A court can decide if the claims they present are valid. However, to give powers to an already corrupt government to seize private property from people who are violating copyright laws by merely having downloaded mp3 files or movie files on their computer is unenforceable and beyond the scope of government. Section 301 of the bill establishes the Office of the United States Intellectual Property Enforcement Representative and section 501 of the bill establishes the Intellectual Property Enforcement Division within the Department of Justice under the office of the Deputy Attorney General. These particular offices will be established to serve as the enforcement arm for this legislation.

How many more powers is this corrupt legislature going to give to a renegade executive branch that is already engaging in perpetual war, setting up a police state, authorizing torture, destroying national sovereignty and other horrors? The federal government is full of petty bureaucrats and tyrants that can’t do anything right to begin with, and the U.S. House of Representatives voted overwhelmingly to expand government again through this legislation. With 410 of these tyrants voting for this legislation, it is doubtful that we will be successful in defeating this bill in the U.S Senate or if it goes to the dictator in chief.
http://www.roguegovernment.com/news.php?id=8997





IFPI Advises Kids to Use LimeWire and Kazaa
Ernesto

Together with the charity Childnet, IFPI recently launched a campaign to educate kids, teachers and parents about the dangers of filesharing. Ironically, the legal alternatives they suggest direct the kids to LimeWire, Kazaa and sites that sell hardcore adult movies.

The campaign’s leaflet (pdf) is distributed through schools and colleges, libraries, record stores, teaching portals and websites in 21 countries. It advises kids and parents about the dangers of filesharing, and advises them to use the legal music online stores, which are listed on pro-music.org, with the aim of keeping kids safe online.

IFPI proudly announced their new campaign a few weeks ago, writing: “The campaign comes as millions of people take advantage of the explosion of new ways of accessing music digitally, but still lack clarity on safety and legal issues, on finding legitimate sites, on the basics of copyright and on how to unpick the jargon of digital music.”

IFPI has always been concerned with the safety of children, and on pro-music.org they maintain a list of download stores that are ’safe’ to use. I was of course curious about these legal stores, and since i’m from the Netherlands, I decided to give the Dutch legal stores a try. This turned out to be an interesting experiment.

To my surprise, the first 4 sites on the list were all gone, some had quit, and others redirected to websites that didn’t sell any music. Even worse, commodore.nl -the first site on the list- served ads for a scam site that sells filesharing software.

I finally got something that looked like a music store when I got to the fifth link, dance-tunes. However, when I searched for the latest Radiohead album, nothing came up. The site only has a few mp3s, and nothing of my choice.

The journey continued, and with sixth site, download.nl, I finally found some good music. Interestingly however, the songs I found were not for sale. Instead, I was advised to download LimeWire, Shareaza and Kazaa Lite. This may indeed sound a little confusing, but the IFPI apparently wants kids to use filesharing software after all.

So, to sum up my legal music experiment. I tried the first 6 sites advised by IFPI, 4 didn’t sell any music, the fifth only listed a few songs, and the sixth website I tried advised me to install LimeWire or Kazaa. It gets even worse further down the list where the kids end up at sites that sell hardcore adult movies.

Viviane Reding, EU Commissioner for Information Society and Media said about the new campaign: “The new guide is a very good example of an initiative that offers simple, practical advice to parents and teachers to keep young people safe and legal while enjoying music on the Internet.

I guess she didn’t try it herself.
http://torrentfreak.com/ifpi-advises...ire-and-kazaa/





France Says Canada Considering "Three Strikes and You're Out" ISP Policy
Michael Geist

Last month I wrote about the pressure to adopt "graduated response," a policy that is better described as "three strikes and you're out" for ISP subscribers. While Canada has yet to take a public position on the issue, a new French document cites Canada as an example of a country that is negotiating an ISP three strikes policy. In particular, the latest Olivennes bill draft submitted by the Conseil d'Etat, states:

La méthode et le dispositif des Accords de l’Élysée soulèvent d’ailleurs un vif intérêt à l’étranger. De nombreux pays d’Europe (comme la Grande_Bretagne) ou d’autre continents (comme le Canada ou le Japon) ont d’ores et déjà initié un processus de négociation comparable, encadré par les pouvoirs publics, que ceux_ci viendront relayer en tant que de besoin.

Given that there has been no Canadian public statement consistent with the French claim, either the French are simply wrong (and should be corrected) or Canadian officials may have privately indicated a willingness to move in this direction. The latter possibility is very troubling given the likelihood that new Canadian copyright legislation is likely to be introduced within the next few weeks.
http://www.michaelgeist.ca/content/view/2915/125/





Bell Accused of Privacy Invasion

University of Ottawa legal clinic urges investigation of internet traffic shaping
Peter Nowak

Bell Canada is facing a growing list of critics for its internet traffic-shaping practices. (Ryan Remiorz/Canadian Press)

The Canadian Internet Policy and Public Interest Clinic, a University of Ottawa legal clinic specializing in internet- and other technology-related law, has joined the assault on Bell Canada Inc. and its traffic-shaping practices, urging an investigation by the country's privacy commissioner.

The group says Bell has failed to obtain the consent of its retail and wholesale internet customers in applying its deep-packet inspection technology, which tells the company what subscribers are using their connections for. Bell is using DPI to find and limit the use of peer-to-peer applications such as BitTorrent, which it says are congesting its network.

The CIPPIC, which is made up mainly of lawyers and law students from the University of Ottawa, says Bell has not only failed to show that its network is congested and that its actions are necessary, but it has also run afoul of the Personal Information Protection and Electronic Documents Act (PIPEDA) in doing so.

"Practices [such as] those involving the collection and use of personal information are not necessary to ensure network integrity and quality of service," wrote CIPPIC director Philippa Lawson in a letter to the commissioner dated May 9.

"Moreover, subscribers whose traffic is being inspected have not consented to the inspection and use of their data for this purpose."

Bell says it is using DPI only to read the "header" on the type of traffic, which determines what kind of usage it is. But CIPPIC contends that DPI must be used to "open the envelope” on the traffic for it to be of any use to an internet service provider, thus violating the user's privacy.

"The evidence is clear that DPI technologies permit the collection and use of personal data about internet subscribers. The extent to which Bell is actually taking advantage of this capability is less clear," wrote Lawson, who was previously a counsel with the consumer group Public Interest Advocacy Centre.

"However, the literature on DPI suggests that DPI necessarily involves some collection and/or use of personal data in order for it to be a useful tool for ISPs."

Pierre Leclerc, a spokesman for Bell, said the company does not look at the content its customers access.

"Bell respects the privacy of our customers," he said. "We are in compliance with our privacy obligations."

CIPPIC said Bell has not disclosed its packet-inspection methods in its terms of service, privacy statement, code of fair information practices or frequently asked questions.

"Consent is only meaningful when affected individuals understand what they are consenting to," Lawson wrote. "If Bell is relying on its published policies as set out above to inform its customers and obtain their implied consent to its use of DPI for traffic management purposes, we submit that it has not met the standard of informed consent required by [PIPEDA]."

Investigation of other ISPs urged

The group has called on Privacy Commissioner Jennifer Stoddart to investigate Bell as well as other ISPs that have either admitted to or are reportedly engaging in traffic shaping — notably Rogers Communications Inc., Shaw Communications Inc., Cogeco Inc. and Eastlink — and ensure compliance with PIPEDA.

CIPPIC is the second group to accuse Bell of privacy invasion in the past month. In April, the Canadian Association of Internet Providers, which represents 55 smaller ISPs that rent portions of Bell's network, also said the company was invading users' privacy in a complaint to the Canadian Radio-television and Telecommunications Commission.

Additionally, the association said Bell's traffic shaping was causing its members to lose customers and incur unneeded costs. It requested an urgent interim cease-and-desist order until the practice could be fully investigated. Its complaint was supported by Primus Telecommunications Canada Inc. and Wireless Nomad, a co-operative ISP in Toronto.

The CRTC said it would issue its decision on the interim request some time in May. Tom Copeland, chairman of the internet providers' association, says he expects an answer this week.

Internet experts have said the traffic-shaping showdown is the tip of the iceberg in the battle over net neutrality. A growing list of organizations — including the NDP, the National Union of Public and General Employees and the government's Standing Committee on Canadian Heritage — are calling on the CRTC and the government to institute legislation that will prevent ISPs from controlling what goes over the internet.
http://www.cbc.ca/technology/story/2...tech-bell.html





Deep Packet Inspection Under Assault Over Privacy Concerns
Nate Anderson

Add the Canadian Internet Policy and Public Interest Clinic (CIPPIC) to the list of groups concerned about the privacy implications of widespread deep packet inspection (DPI) by ISPs. CIPPIC has filed an official complaint with Canada's Privacy Commissioner, Jennifer Stoddart, asking her office to investigate Bell Canada's use of DPI (and we're flattered to be quoted as an expert source in the complaint). In addition, the group would welcome a wider investigation into possible DPI use at cable operators Rogers and Shaw, as well.

In writing up this morning's announcement of a massive new 80Gbps DPI appliance from Procera Networks, I noted that privacy concerns were one of the storm clouds in DPI's bright blue skies. Because DPI can drill down into packet headers and then further into the actual content being pumped through the tubes, it raises all sorts of questions from privacy advocates concerned about the easy collection of private personal information. Current gear is so sophisticated that it can reconstitute e-mails and IM conversations out of asymmetric traffic flows and it can essentially peek "under the hood" of any non-encrypted packet to take a look at what it contains.

Bell Canada's use of DPI gear has now ensnared the company in a pair of government actions over net neutrality concerns and privacy. Bell, apparently sensitive to such concerns, has made clear in its own responses to the network neutrality proceeding that its DPI gear looks at packet headers and traffic flows as a means of identifying various applications and protocols. Bell does not use DPI to actually peer at packet contents, however. "The content itself is not actually reviewed, analyzed or stored," Bell says.

But that's not good enough for CIPPIC, a group based at the University of Ottawa. Canada, like many European countries, has fairly strict rules about collecting and using personal data, and CIPPIC points out that "data packets gathered by ISPs through the use of DPI are (or can be) associated with identifiable subscribers via the IP addresses attached to those data packets."

CIPPIC seems to be making the case that IP addresses can be personal information (especially when linked a list of visited websites or to particular searches that can be gleaned from search engines with a subpoena). This fits with a recent recommendation from the top data privacy working group in the EU, which said that IP addresses should be considered personal information for precisely these reasons.

But even if what Bell is doing now passes muster, CIPPIC is worried about the widespread installation of gear that can so easily be used for other things. "The evidence is clear that DPI technologies permit the collection and use of personal data about internet subscribers," says the complaint. "If Bell is somehow able to limit the data it inspects via DPI to non-personal data, we remain concerned about the longer term viability of any such limitation, and the pressure on Bell (and other ISPs) to use DPI to distinguish among traffic in ways that necessarily involve the collection and use of personal data."

How else could Bell control traffic on its network? CIPPIC has some ideas, first among them "invest in more infrastructure to accommodate the additional demand generated by P2P traffic." But if that's not feasible, the group suggests other ways to control traffic that don't rely on widespread collection of personal information or on discriminatory throttling:

• Set limits on the amount of data per second that any user can transmit on the network
• Set dynamic data limits that relax when congestion is low and increase when congestion is high
• Cache popular files (in a non-discriminatory fashion)
• Work with protocol/application developers to develop application and network level congestion mechanisms
• Institute per-user bandwidth caps and/or metered pricing (which it is now doing)
• Develop business models to encourage heavy bandwidth usage during off-peak hours

Stoddart has previously shown a willingness to stand up for consumers on technical issues when she went public with her concerns about intrusive DRM. CIPPIC's complaint gives her office another chance to delve into the privacy issues surrounding new technology.

Here in the US, the same privacy concerns have been raised about DPI. Texas disaster recovery and managed services company Data Foundry objects to network operators doing this deep level of inspection, and in an FCC filing last year, the company charged that "broadband providers' AUP/TOS/Privacy Policies, in combination with Deep Packet Inspection, allow intrusive monitoring of the content and information customers transmit or receive. This contractual and technical capability interferes with and may well eliminate all sorts of privileges presently recognized under law... Broadband service providers have no justifiable reason to capture this information."

The issues go beyond just IP addresses, encompassing attorney/client privilege, trade secrets, and other protected communications, but DPI vendors have assured Ars that they have little interest in examining content; most traffic information can be gleaned from packet headers, destination IP addresses, flow patterns, handshakes, and the like. Given the sheer capabilities of these devices, though, it seems at least worthwhile to have a detailed discussion about the potential privacy implications.
http://arstechnica.com/news.ars/post...n-critics.html





Charter To Begin Tracking Users' Searches And Inserting Targeted Ads

Charter Communications is sending letters to its customers informing them of an "enhanced online experience" that involves Charter monitoring its users' searches and the websites they visit, and inserting targeted third-party ads based on their web activity. Charter, which serves nearly six million customers, is requiring users who want to keep their activity private to submit their personal information to Charter via an unencrypted form and download a privacy cookie that must be downloaded again each time a user clears his web cache or uses a different browser.

Reader Matt copied us on a letter he sent to Charter's VP of Customer Operations and CEO:

Quote:
Dear Mr. Stackhouse,

I am a high speed internet subscriber in the Fort Worth, TX area. For the last year or so I have had Charter’s 10 Megabit service and I am a satisfied customer. I am writing, however, because I am concerned by your recent letter discussing the “enhancement” that will be coming soon to my Charter web browsing experience (targeted, in-line advertisement manipulation). I appreciate Charter’s respect for my privacy, but the method that Charter has provided to opt-out of this tracking scheme is insecure and woefully inadequate.

The method that you provide to opt-out is as follows. First, a customer must visit www.charter.com/onlineprivacy. Once at the site, the customer must enter his or her complete name and address. Upon submission of this personal information, the customer must accept a cookie from Charter that indicates his or her opt-out status. While this process sounds simple on face, further consideration reveals that this opt-out method is fraught with privacy concerns and places the burden on your paying customer, rather than Charter.

The most pressing privacy issue with this opt-out method is that the opt-out form presented at the aforementioned URL is not encrypted. As I’m sure you realize, this means that a user submitting his or her address to Charter is doing so in the clear, leaving this personal information open to eavesdropping. It is not difficult to create an SSL-encrypted web form. It is troubling that Charter has not done so in this case.

The fact that this opt-out system relies on a cookie to keep users opted out is also a privacy issue. By telling customers who visit the opt-out page that, “if you delete your cookies or cache files… you will have to opt-out again,” you are encouraging users to keep those files that good privacy practices dictate should be frequently purged. Ironically, the best reason to purge one’s cookies often is to prevent internet marketers from tracking one’s behavior online.

In addition to the critical privacy concerns, the steps required to avoid being tracked by this new advertising system place the burden on your customers, rather than on Charter where it belongs. A customer should be able to opt-out of this advertising tracking system in a manner that will rarely, if ever, require the customer to opt-out again. Instead, because the system uses cookies, a customer must insecurely opt-out of being tracked on each PC in his or her home. Further compounding the work that the customer has to do, if the he or she deletes cookies in accordance with safe browsing techniques, it will be necessary to insecurely opt-out on each and every PC again.

I suggest that rather than force your customers through unending iterations of opting out of this advertising system, you should allow customers like me to opt-out at the cable modem level via a secure, encrypted form on your website. I’m glad to hear that Charter has an appreciation for my privacy, but please change your opt-out process to demonstrate that you also have an appreciation for my time and security online.
Matt's letter focuses on the flawed opt-out clause, but the program itself, an implementation of "deep packet inspection," is more worrying to us. Deep packet inspection allows an ISP to monitor not only its users searches and visited websites, but also the type of activity (e.g., email or peer-to-peer), which could be used for traffic shaping and threatens net neutrality.
http://consumerist.com/5008801/chart...g-targeted-ads





Charter Will Monitor Customers’ Web Surfing to Target Ads
Saul Hansell

Charter Communications, the fourth-largest cable system in the United States, has started telling its high-speed Internet customers that it is going to keep track of every site they visit on the Web.

The cable company will sell the data to a firm called NebuAd, which in turn will use it to show ads to Web-surfing Charter customers that are meant to be related to their interests. (Visit a knitting site yesterday and see yarn ads today.)

Charter started sending letters out to several hundred thousand customers in four markets: Fort Worth, Tex.; San Luis Obispo, Calif.; Oxford, Mass.; and Newtown, Conn. (The letters were first reported by DSLreports.com.)

Charter said it will start testing the system within 30 days and will make a decision whether to roll it out to its 2.8 million Internet customers a few months after that.

Using data from Internet service providers for what the advertising people call behavioral targeting raises all kinds of questions about privacy, disclosure and who owns the information about where Internet users surf.

I called Charter to ask about this Tuesday, and the company quickly put Ted Schremp, its senior vice president for product management and strategy, on the phone. That immediately set Charter apart from the other Internet companies in the United States that have been identified as working with NebuAd: Embarq and Wide Open West. Neither of them would discuss the matter when I last asked.

Charter is taking “for the most part, a high road approach,” according to Mr. Schremp. “We have told customers exactly what we are doing,” he said. The letter to customers, he added, was “very forthcoming” and “not buried in mouse type and legal disclosures.”

The five-paragraph letter positioned the monitoring program as an “an enhanced online experience that is more customized to your interests and activities.”

“As a result,'’ the letter said, “the advertising you typically see online will better reflect the interests you express through your web-surfing activity. You will not see more ads — just ads that are more relevant to you.”

The letter contained a link to a Web page with answers to some common questions. A second link in the letter goes to a page that allows users to opt out of the system.

I suggested to Mr. Schremp that there are likely to be a fair number of customers who don’t consider having their Internet activities tracked to be an enhancement.

He responded several ways. He said that Charter convened focus groups of customers in two cities and found that most didn’t object when the program was explained to them. (A key aspect of the NebuAd system is that it claims not to record any personally identifiable information about users. Rather, it associates each user’s behavior with 1,000 categories of interest to advertisers.)

He offered his personal view that the system is harmless and well within the norms of the Internet these days. “The mainstream Internet user is hugely aware of the fact that the fundamental economic model on the Internet is advertising,” he said. While some people object to targeted advertising systems like Google’s Gmail, which displays ads related to the text of e-mail users are reading, many others don’t.

“All we are doing is, in an anonymous format, providing additional context to serve those ads. To the extent those ads are more meaningful to me as Ted Schremp, I will have a better Internet experience than the generic ads that are part of Yahoo and everything online.”

For those customers who disagree, Mr. Schremp said that Charter is offering the ability for them to choose not to be part of the system. I suggested that most privacy experts prefer opt-in systems where information isn’t collected until the user explicitly grants permission. He said that opt-out has become the norm for all targeting on the Internet.

How much money is NebuAd paying Charter for access to information about its customers’ surfing behavior? Mr. Schremp wouldn’t say. (Robert Dykes, NebuAd’s chief executive, said last month that the company was willing to pay Internet providers several dollars per subscriber per month.)

Mr. Schremp did acknowledge that raising revenue was a main goal for Charter in this: “We want to leverage technology in a way that makes sense for our economic model.”
http://bits.blogs.nytimes.com/2008/0...ref=technology





Money for Jams

BT's top internet architect proposes congesting charging for the internet. Before you protest, consider that it could mean faster browsing and an end to data caps.
Clive Akass

Bob Briscoe talks about the internet with the world-weary air of a man who has spent years banging his head against a brick wall.

The web is clogging up with the increasing use of bandwidth-hungry applications and there are calls for content providers such as the BBC to contribute to the cost of boosting capacity. Internet service providers (ISPs) try to answer the problem by imposing download caps and throttling heavy users. Briscoe believes that much of this is unnecessary and barely effective.

A couple of tweaks to internet protocols would make access ‘blisteringly fast’ for light users while heavy users downloading as much as they do now would be hardly affected. But it would also involve a congestion charge reminiscent of that imposed on motorists who enter central London at peak times, though Briscoe objects strongly to the use of the term.

Briscoe has to be taken seriously: he heads the team charged by BT to redesign the internet, along with others across the world. Somehow they all have to agree. And Briscoe is trying to get them to jettison one of the internet’s basic principles: equal flow rates for each data stream. The story goes back to late 1986 when the internet underwent a series of ‘congestion collapses’.

In mid-1987 Van Jacobson, of Lawrence Berkeley Laboratory, introduced a solution that has served the internet ever since. It conformed to the internet’s founding principle that traffic control is done by the ‘edge’ computers (your PC and a web server, say) using the Transport Control Protocol (TCP), while equipment on the intervening network does the routing using the Internet Protocol (IP).

If data arrives too fast for a router to handle, it starts to drop packets, causing the destination machine to request retransmission. Jacobson’s idea was that a source machine should halve its data rate when this happens, and then build up speed until packets start dropping off again.

This algorithm, applied as a TCP patch to the mere 30,000 machines then on the Net, was phenomenally successful, speeding everything up as well as relieving congestion, and its effect initially was to give each user of a channel a roughly equal share of capacity.

That it is still functioning at all, 20 years later, is testament to its strength a billion machines share internet resources by making between 10 and 100 rate adjustments a second. It was fair enough for the kind of bursty traffic generated by older web activity, such as email and browsing. But recent applications, such as peer-to-peer (P2P) file-sharing, transfer data more or less continuously, perhaps 24 hours a day.

Yet each P2P stream, under the ‘equality’ principle, has exactly the same right to a channel at any instant as a light user who is using a channel in very short snatches at a time (see image here). Applications such as P2P make things far worse by sending data in multiple TCP streams, each with the same claim on capacity as one person using a single stream.

Throwing bandwidth at the problem is similar to throwing water uphill because TCP allocates the same measly share of the new capacity, says Briscoe. A costly quadrupling of the capacity of the 10Mbits/sec link would boost the transfer rate of light users from 20Kbits/sec to just 80Kbits/sec.

Data rates are not so bad in practice because some service providers themselves prioritise some traffic and throttle heavy users.

But this is patching over the cracks of a flawed architecture, in Briscoe’s view, and throttling only marginally improves speeds for light users while punishing heavy users. Briscoe has nothing against these. “We want them to use the internet. That is what it is there for,” he says. Briscoe’s proposals shift the focus from data volume to congestion volume, measured by the number of dropped packets you cause.

They involve two protocol tweaks. One is ‘weighted TCP’, a refinement of the protocol to allow application programmers to give internet traffic different priority weights. Typical bursty traffic would be heavily weighted to get a greater share of capacity if it hits a bottleneck, yet heavy, near-continuous traffic would be barely affected.

To see why, imagine you are approaching a ticket barrier with two school parties in front of you. If the teachers in charge tell the kids to step aside for you, you would get straight through yet the children have hardly been slowed down at all. So what is to stop programmers giving all their traffic high weight? This is where the congestion charging comes in, and so does some tricky reasoning.

Service providers would still offer flat-rate access, but instead of download caps they would have a congestion allowance. If your congestion volume exceeds your limit you could still transfer all you wish along uncongested routes or you can pay for a greater allowance.

Your software would give light, bursty traffic high weight because it will have little effect on your congestion volume; but big downloads would be set low to minimise your congestion hit. Big users, including businesses, could buy higher congestion limits. But if you played your weightings right you could download as much as you liked with little or no congestion charge.

Similarly, network operators could be charged more for sending traffic through congested routes of other networks. They compete to sell capacity, so it would still pay them to keep their own infrastructure clear, but they would have an incentive to seek out clear routes. Oddly, because traffic is controlled from the edge, operators cannot see congestion outside their own network.

Briscoe’s answer is a second protocol tweak, this time to the Internet Protocol standard, to enable a mechanism called re-feedback, which flags how much congestion your packets will be allowed to cause.
“There’s one spare bit in IP and that’s all we need,” he said. A bonus is that the system could scupper Denial of Service attacks.

It would require no hardware changes at the user level, and no infrastructure changes except at the access gateways. But getting changes approved is perhaps the biggest problem of all. Jacobson’s algorithm and TCP equality, however illusory, have achieved the status of Holy Writ.

Briscoe, by his own admission, blew his top in frustration at a 2006 meeting of the Internet Engineering Task Force (IETF) after trying for a year to explain his ideas. There are signs that people are taking his ideas more seriously, but don’t expect changes to come in very soon. “From past experience at the IETF I reckon it could take me five years to get it through,” Briscoe said.
http://www.pcw.co.uk/2216389





CRTC Launching Probe Into Internet Traffic Shaping
Peter Nowak

The CRTC is launching a public consultation on internet traffic shaping after rejecting a request by smaller Canadian internet service providers to end Bell Canada's throttling practices, saying the companies had failed to demonstrate that their businesses will be irreparably harmed by the action.

The Canadian Association of Internet Providers, which represents 55 smaller ISPs that rent portions of Bell's network in order to provide internet services to their own customers, had asked the Canadian Radio-television and Telecommunications Commission last month for an urgent cease-and-desist order.

Bell has been slowing the speeds of its own subscribers who use peer-to-peer applications such as BitTorrent since November, and extended the practice to its wholesale customers in March, prompting the complaint by CAIP. Bell has said it was doing so in order to prevent a small portion of users from slowing down internet speeds for the majority.

CAIP had asked for temporary relief from the throttling while the CRTC fully probed the issue.

"The commission finds that CAIP has not demonstrated that its members will suffer irreparable harm if the interim relief was not granted," the CRTC said on Wednesday, citing two previous Supreme Court of Canada decisions that spelled out criteria for such action.

The CRTC also said it would address the larger issue of a full probe in a letter to Bell and CAIP to be sent on Thursday. Peggy Nebout, a spokesperson for the regulator, said the letter would start a process that will allow the public to comment on the issue of traffic shaping. The CRTC expects to make a decision in the fall, she said.

The CAIP rejection represents a victory for Bell, which has come under fire from a number of organizations, including the NDP, the National Union of Public and General Employees, and the Canadian Internet Policy and Public Interest Clinic (CIPPIC). Although other major Canadian ISPs, including Rogers Communications Inc., also throttle speeds, Bell has been targeted by critics because it is the only phone company in Canada to engage in the practice. Phone companies are required by CRTC regulations to rent out their networks to smaller providers.

Bell in April asked the Federal Court of Canada to scrap that requirement.

Mirko Bibic, head of regulatory affairs for Bell, said the CRTC's decision to reject CAIP's request was the correct one.

"It was certainly the right decision based on the facts that were before the commission," Bibic said. "We look forward to dealing with the final disposition of the CAIP application in accordance with whatever process the commission sets out tomorrow. We look forward to that because we'll be able to get more facts on the table."

Tom Copeland, chair of CAIP, said he was immensely disappointed with the decision. More than 1,100 individuals wrote letters to the CRTC in support of the group's request, Copeland said, which indicated that the larger public good was at stake.

Public good not considered, CAIP says

"They didn't consider the public good simply because they felt we didn't meet the test for irreparable harm," he said. "The public good in this case is stronger than most regulatory issues they take up."

Copeland said the group is reviewing its options, which could include an appeal.

University of Ottawa internet law professor Michael Geist said he was not surprised the CRTC rejected CAIP's request for immediate action.

"That was a tough standard to meet, so it's not particularly surprising... but the substantial questions that CAIP has raised remain unanswered," he said.

The CRTC will also on Thursday open up its framework on the regulation of new media in broadcasting for public consultation. Geist, who has seen a draft of the framework, said it contains provisions for limiting how much control ISPs have over how people use the internet.

"The issue of net neutrality will be put on the table from a broadcast perspective. This decision puts it on the table from a telecom perspective as well," he said. "It's clear that many groups were seeking to jump in on this issue, and many more will come to the fore."

Bell must also now deal with a complaint filed by CIPPIC to the Privacy Commissioner earlier this week. The Ottawa-based legal clinic said traffic shaping and use of "deep packet inspection" technology by Bell and other large ISPs is a violation of the Personal Information Protection and Electronic Documents Act.

Bibic said CIPPIC's complaint is based on an incomplete understanding of DPI technology, and Bell looks forward to setting the record straight.

"It's based purely on conjecture," Bibic said. "It would have been far more constructive to have a dialogue with CIPPIC than for it to send out an application like this to the Privacy Commissioner."
http://www.cbc.ca/technology/story/2...tech-caip.html





Elude Your ISP's BitTorrent Blockade

More and more Internet service providers are blocking or throttling traffic to the peer-to-peer file-sharing service. Find out whether you've been targeted, and learn how get around the restrictions.
Tom Spring

I'm a fan of live music and a patron of online communities such as eTree.org, where music junkies swap copyright-free music. So I was stung when I recently tried to download a live recording of a Dave Matthews concert only to discover that my BitTorrent client was dead in the water.

My system and Net connection checked out fine, so paranoia immediately set in: Was my Internet service provider, RCN, blocking BitTorrent? I called RCN and the tech I spoke to confirmed my suspicions, telling me that the ISP had added BitTorrent to its list of prohibited programs because many people use the software to download copyrighted material. The fact that the concert I was trying to download was copyright-free didn't sway him.

Later I called RCN's press department as a reporter, and the story changed. The ISP's spokesperson told me that the customer support rep I had talked to earlier misspoke. RCN has never intentionally blocked peer-to-peer traffic, the spokesperson said, and it supports the principles behind Net neutrality. Within 24 hours, my bandwidth-related problems with BitTorrent vanished.

Of course, most people can't call their ISP and (honestly) identify themselves as professional journalists. But that doesn't mean you have no recourse if your ISP starts blocking your file-sharing activities. A number of tips and tools can help you determine whether you're facing a BitTorrent blockade and, if so, help you get around it.

Torrent to a Trickle

If you suspect that your ISP is blocking or throttling your BitTorrent traffic, call your ISP and ask whether you're being blocked. But don't trust that you'll get a straight answer.

If your ISP's support reps won't tell you what's going on, look at the company's terms-of-service agreement (most are available online). Here again, though, you may find the answer unsatisfactory. Some ISPs couch their bandwidth management practices in vague policy statements that are difficult to decipher.

If your ISP won't come clean about its BitTorrent bandwidth policy, you can try any of a handful of ways to test whether your BitTorrent traffic is being throttled.

One method is to test your own connection speed. BitTorrent download speeds for popular files with many sources should be in the same ballpark as your bandwidth speeds in benchmark test results.

A popular Web-based tool, Glasnost, claims to be able to check whether your ISP is meddling with your BitTorrent traffic. The tool, created by the Max Planck Institute for Software Systems, requires no download; performing the test takes about 4 to 7 minutes.

For diehard techies who are willing to tinker, the Electronic Frontier Foundation developed a tool called Pcapdiff that tests whether your ISP is disrupting BitTorrent traffic.

Last, the makers of the BitTorrent client Vuze have created a plug-in for their peer-to-peer file swapping client. Downloading and running it on your PC won't help you determine whether your ISP is meddling with BitTorrent traffic — but it will help Vuze, which uses the data to lobby the FCC to prohibit limitations on BitTorrent.

---PB---

Evasion of the Bit Snatchers

If you discover or strongly suspect that your ISP is slowing your BitTorrent traffic, you can try several countermeasures, none of them a sure bet. One of these techniques may work for one ISP but not for another.

First, try using encryption to cloak your peer-to-peer traffic. Most clients such as BitComet, BitTorrent, uTorrent, and Vuze, support in-client encryption. Turning this feature on makes it much harder, though not impossible, for your ISP to detect that you're using peer-to-peer software. Here's how to proceed.

BitComet: Go to the Options menu, choose Preferences-Advanced-Connection, and select Protocol encryption.

BitTorrent and uTorrent: Go to the Preferences panel and select the BitTorrent tab. Choose Protocol encryption and select enabled.

Vuze: First you must change your user profile from the default beginner mode to advanced. Go to the Tools drop-down menu, open the Configuration Wizard, and select advanced. Next return to the Tools drop-down menu and select Options-Connection-Transport Encryption. Check Require encrypted transport, go to the Minimum encryption drop-down menu, and select RC4 encryption.

A second method of evading an ISP's throttling practices is to change the way the BitTorrent protocol acts. This method may work against ISPs that try to throttle speeds based on a standard set of BitTorrent configurations.

Troubleshooting your BitTorrent client's protocol settings can be tricky. To reconfigure your software, refer to the instructions provided by the publisher of the BitTorrent client you're using. One simple yet effective way to experiment with alternate BitTorrent protocol configurations is to simply try a different BitTorrent client. Different clients use different default protocols, and one may perform better on your ISP's network.

The default communications port used by BitTorrent traffic is 6881. ISPs know this and watch that port like a hawk. If an ISP throttles or blocks BitTorrent traffic traveling through this port, your file-sharing speeds will plummet.

To elude ISP throttling, BitTorrent clients enable you to switch the port or port range that your computer uses for BitTorrent traffic. Some BitTorrent clients will automatically attempt to configure your firewall or router to allow traffic to pass through the new port; with others you may have to open ports on your router manually. The excellent Port Forward site will step you through the process of tweaking your router to permit incoming connections.

One more-advanced method of obfuscating your BitTorrent traffic involves using an encrypted tunnel that, as the name suggests, shields from your ISP the type of data you are sending and receiving.

Free services such as The Onion Router (TOR) and I2P are designed for sending anonymous and encrypted messages, but some people have adapted them to use BitTorrent connections. The Vuze client has built-in support for routing your traffic through TOR and I2P.

For about $US5 a month, commercial virtual private network providers such as Relakks and SecureIX can help you prevent your ISP from identifying BitTorrent traffic. In marketing its service, SecureIX promises that it will "disable P2P throttling." The company offers a free tier of service with a bandwidth limit set to 256 kbps.

But ISPs are catching on to these advanced encryption techniques, reportedly clamping down and throttling encrypted tunnels despite being unsure that the encrypted data is BitTorrent traffic. The most extreme method an ISP may use to manage peer-to-peer traffic is to block anything that appears to be BitTorrent traffic, encrypted or not. If that happens to you, you must either switch ISPs or stop using BitTorrent software.
http://www.pcworld.idg.com.au/index....1;fp;16;fpid;1





Comcast Lied to FCC, Blocks BitTorrent Traffic 24/7
Ernesto

New data on Comcast’s interference with BitTorrent traffic shows that the company misinformed the FCC this February. Comcast has always argued that BitTorrent upstream traffic was only blocked during periods of heavy network traffic, this turns out to be a lie.

BitTorrent throttling is not a new phenomenon, but it is getting more attention lately, because the number of people who use BitTorrent keeps growing. Up until today however, there has been no reliable data that revealed the scope of it.

Last week we reported on a new and reliable tool that tests whether or not your BitTorrent traffic is being limited. The tool is developed by the Max Planck Institute, who have released new data today. The findings reveal that the BitTorrent connections of half of Comcast and Cox’s customers are being cut. In addition, the data shows that these practices take place 24/7, disproving Comcast’s earlier statement to the FCC

“Comcast’s network management practices (1) only affect the protocols that have a demonstrated history of generating excessive burdens on the network; (2) only manage those protocols during periods of heavy network traffic,” Comcast wrote in a filing to the FCC last February.

This is far from the truth. There is little difference in the percentage of blocked customers throughout day. Furthermore, the data shows that there is also no difference between weekends and weekdays. BitTorrent is simply blocked all day long, no matter how busy their network is.

The Max Planck Institute tested the connections of 788 Comcast customers, 494 (62%) experienced a slowdown of BitTorrent traffic. Comcast is not alone though, well over 50% of the Cox subscribers that participated in the study were also throttled. The good news is, other ISPs don’t seem to restrict BitTorrent traffic on a wide scale.

Ben Scott, policy director of Free Press, said in a response: “Consumers have no reason left to trust their cable company. This independent study confirms that Comcast is still blocking its customers from using popular applications — despite the FCC’s investigation and widespread public outrage. And worse, the harmful practice appears to be spreading through the marketplace.”

After being pressured by the press and thousands of upset customers, Comcast has announced that it will stop targeting BitTorrent transfers, (somewhere in the future) and promised to invest in its network capacity. For the time being the company will continue to throttle BitTorrent users.

We have asked the FCC for a response, but they had not yet responded at time of going to press.
http://torrentfreak.com/comcast-lied...ic-247-080515/





Cablevision Offer Baffles Wall Street (Again)
Tim Arango and Richard Pérez-Peña

Not for the first time, and probably not for the last, Wall Street is wondering just what the Dolans are thinking.

Like many actions taken by the Dolans, the family that controls Cablevision Systems, based on Long Island, and a host of New York properties like Madison Square Garden, the Knicks and the Rangers, their recent bid to buy Newsday from the Tribune Company for $650 million has resulted in a collective head scratch.

That offer, once considered a long shot, was thrust to the front of the line over the weekend when the News Corporation, controlled by Rupert Murdoch, pulled its bid, saying it would not raise its offer to compete with Cablevision.

That left Cablevision with the prevailing bid. An announcement of a deal could come as early as Monday morning, barring a last-minute complication, said a person involved with the talks who would not be named because they were confidential.

The Newsday bid had the backing of both Dolans — James L. Dolan, the chief executive, and his father, Charles F., the company founder — even if the two still have an uneasy relationship. Three years ago, father and son fought publicly over the fate of an expensive satellite project called Voom, a favored venture of the elder Mr. Dolan’s; when it lost millions, his son shut it down.

About two weeks ago, both Dolans flew to Chicago to meet with Sam Zell, the chief executive of Tribune, and on Sunday, Cablevision’s bankers and lawyers were in Chicago finishing the final deal points.

Both Dolans have attended meetings about Newsday, but the tension between the two has been obvious, said one person present who was granted anonymity because of the confidential nature of the discussions. The family has been a lightning rod for public criticism — not least of all because of the soap opera that has been the Knicks — and the father is known to laugh off the words of critics, while the younger Mr. Dolan is more thin-skinned.

The Newsday bid has come amid a flurry of deal activity from Cablevision after an unsuccessful bid by the Dolan family last fall to take the company private in a $10.6 billion deal. Most analysts question the rationale for buying Newsday and had hoped Cablevision’s quest failed.

But when it comes to the Dolans, the only thing that is predictable about them is that they are unpredictable.

“We’ve seen this movie before,” said Craig E. Moffett, an analyst at Sanford C. Bernstein & Company. “Jimmy made the comment the other day that their shareholders pay him to grow the company. Maybe he believes that, I don’t know. Shareholders pay him to increase shareholder value. Even if you squint hard enough to justify these deals, it isn’t what shareholders signed up for.”

Last week, the company spent $496 million in stock and cash to acquire the Sundance Channel, a deal that was tepidly accepted by most investors and analysts.

The price, Mr. Moffett said, “was less bad than we expected.” Previously, the company flirted with taking a large stake in AEG Live, the concert promoter owned by the billionaire Philip F. Anschutz. That deal fell through, to the relief of many investors, who just wish the company would use its cash to buy back shares.

“It’s always a fun parlor game to figure out the Dolan family’s motivations,” said David C. Joyce, an analyst at Miller Tabak & Company.

Cablevision’s Newsday bid had a touch of audacity to it, coming as it did after offers from two dyed-in-the-ink newspapermen: Mr. Murdoch, whose News Corporation owns The New York Post, and Mortimer B. Zuckerman, owner of The Daily News. Both Mr. Murdoch and Mr. Zuckerman bid $580 million, or $70 million less than Cablevision.

“If you look at The Post and Zuckerman’s bid, there are real synergies there,” Jill A. Greenthal, a senior adviser at the private equity firm the Blackstone Group, said last week at a forum on the media in New York City. “If you look at Cablevision’s bid, he really wants to own a Long Island newspaper, which I’m not sure I understand.”

The Dolans, as is their custom, refused to comment for this article. In the company’s quarterly earnings conference call last week, James Dolan shrugged off questions about Newsday. “We haven’t spoken about it before,” he said, “and we really aren’t going to speculate about rumors.”

This contrasted with the bravado of Mr. Murdoch in his own earnings call on Wednesday: “No, I don’t think Cablevision will prevail; just be patient for a couple days.”

An executive of another business who has worked closely with the Dolans said their interest in Newsday could not be entirely economic “because there’s not a business rationale to spend what they’re willing to spend.” This person spoke anonymously to avoid alienating the Dolans for future business.

But even if the prospective deal has an element of vanity to it, Cablevision could make the following argument. It has roughly three million cable subscribers in Long Island, New York, New Jersey and Connecticut, while Newsday has about 300,000 subscribers. Cablevision’s customer relationships could help it sell more subscriptions, while overlapping ad sales forces at the two companies could result in cost savings. And Cablevision owns a 24-hour local news channel in Long Island, which could use the news gathering capacity of Newsday — and in theory cut costs.

“To be fair, those synergies probably do exist,” Mr. Moffett said. “But it ends there, and it’s far from sufficient that it would support owning Newsday at that price.”

The Cablevision empire is a strange dichotomy: one side is a cable company that is regarded as one of the best run in the country, while the other side includes Madison Square Garden, the Knicks and the Rangers — and all the publicity and drama that go with owning pro sports franchises in New York City.

Mr. Moffett, talking about the cable portion of Cablevision’s recent quarterly earnings — which make up about 75 percent of the company’s revenue — said, “It was another in the line of an amazing string of quarters.”

As a sign of the strength of the cable side, Mr. Moffett noted that Cablevision recently passed Verizon Communications as the largest provider of fixed-line phone service on Long Island.

“In four years, they went from not having phone service to being bigger than the phone company,” he said.

A cynical theory for the Dolans’ recent deal-making is making the rounds of Wall Street. Under this line of thinking, the family is so angered that shareholders killed the buyout that the Dolans now consider the company their own private fief.

“That’s ridiculous,” Mr. Moffett said. “No one’s going to say, ‘I’m going to light up some of my billions just to spite shareholders.’ ”
http://www.nytimes.com/2008/05/12/bu...blevision.html





Deutsche Telekom May Gain Control of Greek Company
Anthee Carassava

With its sales slipping and fixed-line customers defecting, Deutsche Telekom looked set this week to complete plans to buy a stake worth nearly 3 billion euros ($4.6 billion) in Greece’s former phone monopoly.

The deal would give Deutsche Telekom control of the Greek company’s management and access to Europe’s fastest-growing telecommunications market: the Balkans.

Details of the deal, including the final purchase price and scope of management control Deutsche Telekom will have over the company, OTE, remained unclear, but financial advisers worked over the weekend trying to complete the agreement ahead of its expected announcement sometime this week.

“We have had very constructive discussions,” said George Alogoskoufis, Greece’s finance minister. But he acknowledged that some issues he declined to describe were unsettled.

Deutsche Telekom, Europe’s biggest telephone company, has already agreed to buy a 19.9 percent stake from a private equity group, Marfin Investment Group Holdings, for 2.6 billion euros. It wants to buy an additional 3 percent from the Greek state and eventually increase its stake to control management and become OTE’s biggest shareholder.

The deal envisions that each company will initially control half the seats on the 10-member board of directors, with Deutsche Telekom appointing OTE’s chief executive and the Greek state appointing the chairman.

The company, according to Mr. Alogoskoufis, will retain its current name, and the government will have to be consulted on labor issues and future disposals for as long as it retains control of at least 5 percent of the company.

Deutsche Telekom has been seeking growth potential in new markets on the Continent. OTE, which operates fixed-line and mobile operations in the fast-growing Balkans, fits neatly into Deutsche Telekom’s designs.

“The two companies will complement each other in a big region,” said Anna Bischof, a spokeswoman for Deutsche Telekom. “That’s what makes the deal so lucrative for us.”

The Greek state currently controls a 28.03 percent stake in OTE, part of which it wants to sell as the centerpiece of a multibillion-dollar privatization program.

The government announced plans to seek a strategic investor in OTE two years ago. A deal with another European telecommunications operator fell through. A new agreement would have to be ratified by Parliament.
http://www.nytimes.com/2008/05/12/bu...12telecom.html





EarthLink to Pull the Plug on Wi-Fi in Philadelphia
Deborah Yao

EarthLink Inc. is pulling the plug on its troubled wireless high-speed Internet network in Philadelphia, once touted as a national model.

EarthLink, which pinned its future on municipal Wi-Fi networks following rapid declines in its dial-up Internet access business, said Tuesday that it could not find a buyer for the $17 million network.

It also said talks to give the network to the city or a nonprofit organization had failed, even after offering to pay $1 million in cash and donate the Wi-Fi equipment.

City officials have said it would cost taxpayers millions of dollars each year to operate the network, which will shut down after June 12.

Also Tuesday, the company sued the city in U.S. District Court seeking to remove its Wi-Fi equipment from streetlights and cap its liability at $1 million.

''It's been an unfortunate situation,'' Earthlink Chief Executive Officer Rolla Huff told The Associated Press. ''It was a great idea a few years ago, ... but it's an idea that simply didn't make it.''

Huff said EarthLink will stay focused on serving people using dial-up Internet service and casual Internet surfers who want an economical plan.

Atlanta-based Earthlink plans to shutter a similar network in New Orleans on Saturday. The company has reached agreements with the cities of Corpus Christi, Texas, and Milpitas, Calif., which are taking over ownership of their networks. And it is in talks with Anaheim, Calif., over its network there, Huff said.

Huff said EarthLink's Wi-Fi assets are now part of the company's discontinued operations. He doesn't expect to take a charge against earnings for closing Philadelphia's network.

Four years ago, Philadelphia officials announced they would try to create one big citywide Wi-Fi hot spot to make high-speed Internet access the norm in poor neighborhoods.

The plan, announced with great fanfare, attracted attention from cities around the world and built Philadelphia's cachet among technophiles.

Under a contract finalized in early 2006 and approved by City Council two years ago, Earthlink agreed to charge $21.95 a month -- and half that to low-income households.

EarthLink paid the full cost of building the network and pledged to pay the city rent for use of light posts where Wi-Fi equipment would hang.

EarthLink's goal was to create a direct Internet pipeline into homes so it would not have to buy capacity from phone companies. But the technology proved unreliable and difficult to deploy.

EarthLink later said that its Wi-Fi business model had not panned out.

It also wasn't a big seller. The company has 5,942 subscribers in Philadelphia out of a projected minimum of 100,000, according to its lawsuit. EarthLink said it is losing up to $200,000 a month operating the network because subscriber fees covered less than half of costs.

Doug Oliver, a spokesman for Mayor Michael Nutter, said EarthLink flip-flopped on whether it wanted Wi-Fi.

''Now they say, 'We don't want to do it. We're walking away and we're taking our marbles,''' he said. ''We are left to respond the best way we can, in the best interest of the city.''

Craig Settles, a technology business strategy consultant in Oakland, Calif., faulted EarthLink for rushing the recent negotiations with the city.

''EarthLink was putting a lot of pressure to be done and be gone, while the city has its things it has to deal with,'' he said. The talks were ''not as lengthy as they make it seem to be.''

Philadelphia officials recently said they want EarthLink to abide by the contract, but would rather not go to court to enforce it.

Councilman Frank Rizzo, an early opponent of the Wi-Fi network, said the network remains incomplete and EarthLink is vulnerable to litigation.

He also hasn't heard of anyone interested in buying EarthLink's network.

''Comcast and Verizon, they haven't even sniffed around,'' he said of the companies that provide cable and phone-based Internet access in Philadelphia.

The stock fell 14 cents to $9.10 in afternoon trading Tuesday.

------

AP Business Writer Rachel Metz in New York contributed to this report.
http://hosted.ap.org/dynamic/stories...LATE=DEFAU LT





Super-Fast Broadband Via the Sewer System
Pem Charnley

Bournemouth, UK, is often mocked by many of the British for the average age of its citizens. In short, a seaside resort where many go to die. Jack Dee once quipped that the shop windows are all fitted with bi-focals to allow passers-by to ascertain what lies within.

But the citizens, it seems, are having the last laugh as it has been reported this week that the town is to be the first in the UK to make use of the sewer system in a whole new way.

Rather than rely on the rather un-environmentally friendly process of digging up swathes of countryside and road to lay cables, H2O Networks Ltd have been called in for the gig.

As is so often the case, simple ideas seem to have manifest benefits and using sewer systems to lay fibre optic cables is a case in point.

As already stated, there is no need to dig up roads.

Conventional cables are normally laid a mere 45 cm below ground. Utilising the sewer systems means that the cables lie a full 10 metres below ground, decreasing the likelihood of damage and increasing security in potentially dangerous situations.

And of course, with no digging needed, with the sewers already in place, getting the fibre optics laid can be achieved far more quickly.

So, as many Britons languish behind with slow internet access, Bournemouth is casually reinventing itself as a rather fast, happening town, and in the not-too-distant future, will enjoy internet speeds approaching 100Mbps.

The UK has 360,000 miles worth of sewers. As Elfed Thomas, CEO of H2O Networks says:

“This is just the start of bringing next generation connectivity to the UK.”
http://ecoworldly.com/2008/05/11/sup...-sewer-system/





Hollywood Private Eye Convicted In Wiretap Trial

Self-proclaimed "private eye to the stars" Anthony Pellicano was found guilty on Thursday of racketeering and conspiracy for wiretapping foes of his high-powered Hollywood clients.

A Los Angeles federal jury convicted Pellicano on 76 of the 77 charges against him after deliberating two weeks. He was expected to spend the rest of his life in prison when he is sentenced later this year.

The jury also delivered guilty verdicts on a former Los Angeles police officer. Verdicts against three other co-defendants were still being read.

Pellicano, 64, was charged with running a vast criminal scheme involving wiretapping telephones and bribing police and telephone company officials to run illegal checks on those causing trouble for his clients.

The trial exposed the seamy side of the movie industry with stars and studio executives testifying they hired Pellicano, or were spied on by him, during disputes ranging from cheating spouses and paternity lawsuits to show business contracts.

All of the celebrities testified they were unaware of any illegal activities by Pellicano, and none was charged.

Pellicano, who once worked for lawyers representing Tom Cruise, Elizabeth Taylor and Michael Jackson, pleaded not guilty and acted as his own lawyer in the case.

The jury heard testimony from comics Garry Shandling and Chris Rock, Paramount Pictures chief executive Brad Grey and former Walt Disney Co president Michael Ovitz.

Ovitz, once one of the most powerful players in Hollywood, told the court he hired Pellicano to investigate journalists writing negative stories about him but said he never told the private detective to threaten anyone or use wiretapping.

Prosecutors allege it was Pellicano who in June 2002 left a dead fish with a rose in its mouth and a note saying "Stop" on the shattered car windshield of Los Angeles Times investigative journalist Anita Busch.

Busch's complaint to police triggered a raid on Pellicano's Hollywood office that eventually led to his trial.

(Editing by Xavier Briand)
http://www.reuters.com/article/domes...31394420080515





"Iron Man" Pounds Rivals At Movie Box Offices

Superhero movie "Iron Man" pounded the competition at North American box offices for the second straight weekend, landing at No. 1 with just over $50 million in ticket sales, according to studio estimates on Sunday.

The movie about a comic book superhero in a high-tech suit of armor blasted past two new entries, family adventure "Speed Racer" and romantic comedy "What Happens in Vegas," which both posted about $20 million in ticket sales.

(Editing by Bill Trott)
http://www.reuters.com/article/compa...55421420080511





Uncertain Futures for Bounty at Cannes

The French festival opens at a time when fewer companies are shopping for films, and few critics are reviewing new releases.
Manohla Dargis and A. O. Scott

When the 61st Cannes Film Festival opens here on Wednesday, all the customary glamour, spectacle and high Gallic seriousness will be in place: the red carpet, the hatchet-faced guards, the shouting paparazzi, the promenading stars and bleary-eyed journalists. If the Americans look a little more anxious than usual, it’s not just the enfeebled dollar. Everyone may be expecting the bounty of good and even great films from around the world over the next 12 days, but the excitement is tempered by a sense that those films are facing unusually difficult prospects back in the United States.

For one thing, there are suddenly fewer companies shopping for movies. Last week Warner Brothers shut down two of its specialty divisions, Warner Independent Pictures and Picturehouse, a move that followed the downsizing earlier this year of another of its subsidiaries, New Line Cinema. Warner Independent recently released Michael Haneke’s “Funny Games” and David Gordon Green’s “Snow Angels,” neither of which found much of an audience. Its biggest successes had been Luc Jacquet’s “March of the Penguins” (2005) and George Clooney’s “Good Night, and Good Luck” (2005). Picturehouse’s recent releases include Olivier Dahan’s “Vie en Rose,” which won an Oscar for its star, Marion Cotillard, and Guillermo del Toro’s critically revered “Pan’s Labyrinth” (2006), which had its premiere at Cannes.

Studio specialty divisions are not the only ones affected. The number of film critics writing for traditional print outlets has thinned dramatically in the last year as media companies face shrinking revenues and uncertain futures. Whereas big-budget commercial releases can almost always buy a solid opening weekend at the box office with wall-to-wall publicity and advertising, smaller films depend greatly on the support of critics to find their audiences. That’s especially true these days, with so many films opening theatrically — more than 600 titles in 2007 — and competing for a seemingly shrinking audience.

“The current situation is a nightmare,” Gary Palmucci wrote in an e-mail message over the weekend. Mr. Palmucci is a top executive at Kino International, a small New York company whose titles include “Old Joy” (2006) and Mr. Haneke’s original German-language version of “Funny Games” (1997). “The Cuisinarting of accelerated production, release schedules, critics buckling under the strain of reviewing them all, the commensurate effect on attention spans and priorities of various generations of filmgoers — it all adds up to a major migraine for the small, specialized distributor.”

Even bigger companies seem to be approaching this year’s festival with a measure of caution. Peter Rice, president of Fox Searchlight Pictures (distributor of the box office hits “Juno” and “Little Miss Sunshine”), wrote that economic uncertainty “increases the pressure to make smart acquisition choices because the marketplace is very unforgiving at present.”

The challenges are particularly great for foreign-language films, though not only because American audiences resist subtitles. Howard Cohen, co-president of Roadside Attractions, a Los Angeles independent distribution company, observed that the entire independent film business is facing difficulties, using last year’s crop at Cannes as an example. Writing in an e-mail message, he said: “The English-language fare that is available for U.S. rights at Cannes with any box office hope, like ‘We Own the Night’ last year, is a) rare, and b) usually goes to the studios or their dependents. The very arty remainder in the actual festival (i.e., ‘Paranoid Park,’ ‘Clean,’ ‘Factotum,’ ‘Japanese Story,’ ‘Jindabyne’ — the list is long) are of less interest since they don’t tend to perform.”

On a less gloomy note, Mr. Cohen also pointed out that several foreign-language films from last year’s festival, including “The Diving Bell and the Butterfly,” “The Band’s Visit,” “4 Months, 3 Weeks and 2 Days” and “Caramel,” which his company released in February, have all grossed (or are approaching) $1 million at the United States box office. (“The Diving Bell” has made more than $6 million domestically.)

This year some of the foreign-language films likely to attract interest, if not frenzied bidding, include new work from several Cannes mainstays. Among them are Jean-Pierre and Luc Dardenne, the Belgian brothers who have twice won the Palme d’Or (for “Rosetta” in 1999 and “L’Enfant” in 2005). Their new film, “Le Silence de Lorna,” is about an Albanian woman living in Belgium who gets mixed up with a mobster. Also returning to the main competition is the Turkish filmmaker Nuri Bilge Ceylan, whose earlier Cannes favorites include “Distant” (2003) and “Climates” (2006). “Three Monkeys,” his new entry, involves the struggle of a family to stay together, a generic description for a film bound to be characteristically elusive and elegant. The Argentine writer and director Lucrecia Martel, one of the few women represented in competition, follows “The Holy Girl,” her 2004 tale of spiritual and sexual confusion, with “The Headless Woman,” about the aftermath of a car accident.

For many, these directors are the real stars of Cannes. In America their names may be met with blank stares, but here they walk up the same red carpet as some of the most prominent Hollywood filmmakers and celebrities. And this may be the ultimate measure of the festival’s integrity as well as a reminder of its noble traditions.

France is the country, after all, that helped establish Clint Eastwood as a major international artist decades ago. Mr. Eastwood, last here in 2003 with “Mystic River,” returns with “Changeling,” a period film about a missing child that stars Angelina Jolie. It is Cannes that made Steven Soderbergh into an instant auteur when his 1989 feature debut, “Sex, Lies and Videotape,” won the Palme d’Or. Mr. Soderbergh, who was here last year with “Ocean’s Thirteen,” a high-priced bagatelle and red-carpet bonanza, is back in competition with “Che,” a two-part biography of Che Guevara that runs more than four hours.

Just as anticipated is the rather shorter “Synecdoche, New York,” the directorial debut of Charlie Kaufman, best known for narratively kinked, intellectually venturesome screenplays like “Being John Malkovich,” “Adaptation” and “Eternal Sunshine of the Spotless Mind.”

“Synecdoche, New York,” which stars Philip Seymour Hoffman and Michelle Williams in a Kaufmanesque tale about a theater director facing physical and metaphysical crises, does not have an American distributor. We can only wait and see what the anxious Americans will do.
http://nytimes.com/2008/05/14/movies/14cann.html?8dpc





Book Lifts Lid on Star of Eerie First Dracula Film
Dave Graham

The first screen portrayal of Dracula was so eerie, some critics asked whether the actor himself could be a vampire. But since his death, little has been done to resurrect Max Schreck's reputation -- until now.

Schreck is best remembered for playing the cadaverous vampire Count Orlok in F.W. Murnau's 1922 silent classic "Nosferatu: A Symphony of Horror," the first, unauthorized cinematic adaptation of Bram Stoker's novel "Dracula."

The rest of his career has been largely forgotten -- unjustly, in the view of German author Stefan Eickhoff, who has written what he says is the first biography of Schreck.

"Whoever hopes to discover a vampire will be disappointed, but they will find an actor of real skill and versatility," said Eickhoff. "Yet he himself remains somewhat shrouded in mystery."

"Nosferatu" failed to make its lead a star, but achieved such cult status that some film scholars speculated his name -- Schreck means "fear" or "fright" in German -- was a pseudonym.

In 1953, Greek-born critic Adonis Kyrou mischievously asked in his book "Le Surrealisme au Cinema" whether the actor was a vampire. The idea caught hold and later inspired a film.

Despite years of research, Eickhoff found there were virtually no anecdotes featuring Schreck, nor any references to him in the memoirs of the many people he had worked with.

Instead, Eickhoff's biography provides a detailed chronicle of the career of Schreck, a civil servant's son who appeared in around 800 stage and screen roles. Glimpses into the man behind the actor's mask remain few and far between.

Only in death does Schreck's character begin to come alive. The most revealing descriptions of the Berliner come from tributes paid to Schreck after he died suddenly in 1936.

Eickhoff's biography, "Max Schreck -- Gespenstertheater" (Ghost theatre) is due to be published later this year.

Loner

Contemporaries remembered Schreck, who was married but had no children, as a loyal, conscientious loner with an offbeat sense of humor and a talent for playing the grotesque.

One recalled how he lived in "a remote and strange world" and would spend hours walking through dense, dark forests.

"Nosferatu" helped propel Murnau to a brief but successful Hollywood career, but Schreck faded from the limelight.

The haunting film, which critics later saw as a metaphor for the collective trauma Germany suffered after defeat in World War One, changed the names of Bram Stoker's characters because the filmmakers failed to get permission to adapt his novel.

After the release, Stoker's widow sued the production company for breach of copyright, and won a court order to have all prints of the film destroyed. Since it had already been distributed worldwide, this ultimately proved impossible.

Over time, "Nosferatu" became seen internationally as a landmark of early German film and the horror genre -- while Schreck's other work has languished in relative obscurity.

Schreck died of heart failure aged 56, and was buried in an unmarked grave near Berlin, where he was born in 1879.

In the years that followed, his name has lived on in filmlore, thanks to the undying appeal of his most famous role.

In the 1992 sequel "Batman Returns," Christopher Walken plays a villain called Max Shreck, while in 2000, E. Elias Merhige's movie "Shadow of the Vampire" cast Willem Dafoe as Schreck the real-life bloodsucker hired to star in "Nosferatu."

Unlike Bela Lugosi and Christopher Lee, stars of later Dracula adaptations, Schreck never reprised the role and spent most of his subsequent film career in small, non-horror parts.

But as an actor, he was the equal of both, said Eickhoff.

"Their Draculas were refined creatures, whereas Schreck's was a more ancient, nightmarish vision," he said. "In a way, he resembled Lee a bit in that he tested himself in the most varied of roles. And funnily enough, both of them sang too."
http://www.reuters.com/article/newsO...83779720080509





Preserving Old Movies, At 40 Degrees
AP

While Scarlett O'Hara stayed cool at home, Dorothy Gale took a year out to go skipping down a digital yellow brick road in a Hollywood film lab.

The recently-reunited Technicolor duo could well be spending much of the rest of the millennium killing time with Lassie, Annie Oakley, Tarzan and a canned colony of heroes and villains from the silent-film era.

Thousands of pre-1951 movies captured on volatile nitrate film are kept in frigid, low-humidity vaults in a modest cinderblock building owned by the George Eastman House Museum on the piney outskirts of Rochester. Cold storage saves them from rotting away within a lifetime or, worse yet, burning up.

In most cases, these are original camera negatives from the first half-century of motion pictures, classics such as "The Wizard of Oz" and "Gone With the Wind," the silent era's top-grossing "Big Parade," Lon Chaney in "The Phantom of the Opera" and Cecil B. DeMille's 1923 version of "The Ten Commandments."

While even the best-kept vintage reels are starting to buckle with age, a beloved movie's master negative is a sacred object that would cost untold millions to replace.

Much of that value lies in its power to produce the finest-quality copies, be it on 35mm film, Blu-ray DVD or some dazzling format that pops up in, say, the early 26th century.

"I really hope that 500 years from now people can still look at this because it's wonderful stuff," Deborah Stoiber, vault manager at Eastman's Louis B. Mayer Conservation Center, said during an inspection of one of 12 dark vaults kept refrigerated year-round at 40 degrees Fahrenheit and 30 percent humidity.

On the shelves of this climate-controlled celluloid nursing home are prized Technicolor films such as "Meet Me in St. Louis" and "Little Women"; silent gems starring Mary Pickford and Greta Garbo; a Lumiere brothers' chronicle of President McKinley's inauguration parade in 1897; and "Olympia," a Nazi propaganda feature on the 1936 Berlin Olympics shot by Adolf Hitler's filmmaker, Leni Riefenstahl.

The magical way in which a chilly, dry setting retards shrinking, fading or "nitric melt" inevitably raises concern about the long-term survival of other vulnerable pieces of the world's film heritage, from safety-based acetate stock adopted in the 1950s to television recordings to flimsy digital-video cassettes.

"Nitrate is turning out to be a historically durable medium that, if stored properly, rivals paper - and well-made paper - as a storage medium for image and sound," said Patrick Loughney, motion-picture curator at Eastman, the world's oldest museum of photography and film.

Its out-of-the-way bunker is one of just a handful of nitrate repositories run by major film archives around the country. It isn't listed in phone books or open to the public. Nor does the plain, single-story building draw the eye on a road where the occasional home is backed by woods or farmland.

On the shelves are 6,600 titles, or 22,836 reels - the oldest surviving negatives or prints dating to the dawn of moving pictures in 1893. The Rochester Institute of Technology's Image Permanence Institute estimates that climate control can preserve films still in pristine shape for another 800 to 900 years.

Considering how a nitrate fire blinded Alfredo, the projectionist in "Cinema Paradiso," each vault is rigged with sprinklers and blowout doors.

"Nitrate burns at 16,000-to-17,000 feet per second, dynamite at 24,000-to-25,000 feet," Loughney said. "It has that disturbing quality of producing its own oxygen, so you can't put it out with water. If properly stored and handled, then it's no more dangerous that any other kind of hazardous substance, like gasoline."

That knowledge came the hard way. Made primarily from sulfuric acid and cotton, nitrocellulose was blamed for disastrous warehouse and theater fires, chiefly in the two decades after Rochester-based Eastman Kodak Co. adapted it from flexible roll film it pioneered in 1889.

Nitrate film was heavily recycled for its high silver content. But the main reason some 90 percent of U.S. holdings has vanished is neglect. In severe cases of exposure to heat, damp and temperature swings, scenes become obscured by a psychedelic collage of bubbles, swirls and flashes of light.

Library of Congress vaults contain half of the estimated 300 million feet of nitrate film in U.S. storage. The Film & Television Archive at the University of California, Los Angeles, is next with about 80 million feet.

Among Eastman's 28 million feet are DeMille's silent-film collection, an early Lumiere film featuring monks walking up a hill in Indochina in 1894 and Garbo in "Flesh and the Devil," made in 1926. Stoiber's personal favorite is "When Flowerland Awakens in Japan," a stenciled short film from 1912.

"It doesn't matter if it's 'Wizard of Oz' or an obscure newsreel that's incomplete and unidentified, they're all treated the same way - as a historic artifact," she said.

A California native who keeps a winter coat at the office, Stoiber gets through examining the entire collection every few years. One telltale sign a film is starting to decompose: "It smells like wet dog."

Gently unwinding the cyan negative of "Gone With the Wind" through her fingers - the Technicolor system required scenes to be recorded simultaneously in yellow, cyan and magenta - she pointed out an original splice in which Rhett - on his knees - proposes to Scarlett, whose second husband has just died.

"See this warping, how it curls a little?" Loughney interjected. "That's an early, early stage of deterioration" in a celebrated 69-year-old movie "not very well stored in the first 50 years of its life."

The chilled-vault solution began gaining traction among film custodians in the 1970s and storage centers have sprouted in the last 20 years, most recently at UCLA and the Library of Congress.

One unavoidable trade-off that shortens a popular film's life expectancy is when its corporate owner, encountering the latest technology, borrows it back for reformatting. "The Wizard of Oz" returned in March after undergoing a special-edition DVD makeover, just as "Gone With the Wind" did from 2002 to 2004.

Interest in nitrate films has ballooned of late "because in the age of video, the DVD and the Internet, a corporate liability that was expensive to store got converted back into a corporate asset," Loughney said.

Similarly, film preservation has entered a golden age, bolstered by private foundation funds that also flow toward repairing far less familiar or "orphan" movies. Enter Eastman's vaunted team of specialists, fueled since 1996 by newcomers trained at its pioneering film-preservation school.

One of Daniel Wagner's yearlong projects as a preservation officer at Eastman is using digital technology to remove dust and scratches and restore missing chunks of "Attack of the Indians," an 8-minute film shot in 1911 by Native American filmmaker James Youngdeer.

Only four of Youngdeer's 120 movies are known to survive, and this one - scanned back onto 35mm film - will someday show up in screenings around the world, starting at Eastman's Dryden Theater.

"When I started my career 30 years ago, it was taken for granted that films like this would never be recovered," Loughney said.

Finding old movies sometimes involves global detective work, with long-lost negatives turning up in places such as Russia and China where they didn't get thrown away so often. Old or new, however, many titles await expert intervention.

"We have a lot of films that won't be got to in my lifetime, but that's OK," Loughney said. "We keep them alive for another 50 years before somebody else raises the money. The most effective preservation strategy is cold storage because it buys you time."
http://www.cbsnews.com/stories/2008/...n4085779.shtml





Hollywood Actors And Studios Clash Over Internet Clips

Getting Hollywood actors paid for their smallest performances -- video clips on the Internet -- is shaping up as one their biggest sticking points in stalemated contract negotiations with major studios.

Whether actors must give consent for snippets of their film and TV work to be displayed online, and how much they should earn for them, was the No. 1 disputed issue cited by the Screen Actors Guild after labor talks broke down last Tuesday.

Studios want to freely distribute YouTube-style clips of old TV shows and movies without seeking actors' permission and pay them a flat fee rather than bargain on a price with each performer individually.

The actors' union staunchly opposes that move.

"What they're asking us to do is erase 50 years of our customs and practice," SAG President Alan Rosenberg said in a recent interview.

The debate is the latest example of how the economics of traditional media are being upended by the growing popularity of video-sharing Web sites like YouTube, and how audiences' tastes and habits are being transformed in the process.

According to Internet marketing research firm comScore, 134 million Americans view online videos each month, with YouTube alone attracting 80 million unique visitors monthly.

The bulk of what they see consists of homemade footage and unauthorized clips of TV shows and movies, some of it blended into video "mash-ups" like the popular "Brokeback to the Future" parody trailer poking fun at the "Back to the Future" movies and the gay cowboy romance "Brokeback Mountain."

Old Rules, New Media

Studios and broadcast networks have long been free to use clips for promotional purposes -- as in traditional movie trailers and TV "promo" ads -- without paying the actors who appear in them anything extra.

But when reusing clips as entertainment, such as inserting outtakes or excerpts from one TV show into another, producers must get consent from every performer appearing in that clip and bargain with each separately on a rate of pay.

Under SAG contract rules originating 50 years ago, each performer in a clip must receive at least the "day-player" minimum of $759, even if the clip is just a few seconds long.

Those rules stood the test of time in the pre-digital era, but as companies seek to develop a "legitimate" market for clips to compete with the explosion of pirated footage on the Internet, studios say the old rules have become too onerous.

Instead, they are seeking a fixed payment to actors for re-use on the Internet in lieu of the bargaining process.

SAG says actors fear losing control over their images, especially when it comes to advertising and video "mash-ups."

"We're willing to help them build this new business, but they don't take our concerns seriously," Rosenberg said.

The studios argue that actors' work already is widely exploited -- without their consent or compensation -- through Internet piracy, and that they only stand to gain from clips licensed or distributed by the industry.

"The enormous administrative burden created by (existing) rules ... allows a clips black market to flourish on its own -- with or without us," the Alliance of Motion Picture and Television Producers, the studios' negotiator, said last week.

The clips conflict is an issue unique to actors, one not addressed in the contracts settled this year with directors and striking screenwriters.

Labor talks between the studios and SAG are expected to resume at the end of this month. The existing contract covering 120,000 film and TV actors expires June 30.

(Editing by Bob Tourtellotte and Doina Chiacu)
http://www.reuters.com/article/domes...33346620080512





HBO Film About 2000 Recount Draws Protests From Democrats
Edward Wyatt

Wounds from the Florida recount, still healing for many Democrats, are being ripped open again for some prominent former advisers to Al Gore. They say that a coming HBO film dramatizing the ballot battle after the 2000 election unfairly blames them for the Democrats’ failure to secure the White House.

Warren Christopher, the former secretary of state who served as the public face of the Gore team in the early days of the recount effort, said this week that he believed the film, “Recount,” was “pure fiction” in its portrayal of him as a weak strategist unprepared to stand up to the aggressive tactics of James A. Baker III, the former secretary of state who was the chief Republican adviser.

William M. Daley, Mr. Gore’s campaign chairman, who helped to lead the Democratic recount team in Florida, said the film created misperceptions about the Gore team’s decision-making process. Mr. Gore, who oversaw the team from Washington, is largely absent from the film.

Even Mr. Baker questioned the portrayal of Mr. Christopher. “I don’t think I was as ruthless as the movie portrays me, and I know he was not as wimpish as it makes him appear,” Mr. Baker said.

The film, which has its premiere on May 25 on HBO, stars John Hurt as Mr. Christopher, Tom Wilkinson as Mr. Baker, Mitch Pileggi as Mr. Daley and Laura Dern as Katherine Harris, then the Florida secretary of state. Kevin Spacey plays Ron Klain, the Gore lawyer who led the on-the-ground recount effort and through whose eyes much of the action is seen.

As many dramatizations do, “Recount” includes invented scenes and dialogue. Danny Strong, who wrote the screenplay, said in an interview that while those inventions condensed events, they reflect what actually happened. “The film tries to give the essence of the truth,” he said, and is based on his own research and interviews, as well as on books and newspaper and magazine articles documenting the recount effort.

Dramatizations of historical events, particularly political ones, have frequently given trouble to writers and producers trying to create compelling entertainment. In 2006 ABC made changes to “The Path to 9/11” after complaints from former Clinton administration officials that it portrayed them as less than vigilant in their pursuit of Osama bin Laden. CBS dropped plans to show “The Reagans,” a 2003 mini-series, after Republican and conservative groups protested its portrayal of President Reagan as forgetful and unsympathetic to AIDS victims. (The series was broadcast on Showtime.)

“Recount,” which has been screened for invited audiences in Washington and New York and will be shown in Florida this week, is inspiring similar protests.

“I think a lot of the strategizing in the script that I saw was somebody’s hindsight rather than what we had to deal with in the immediate aftermath of the election,” Mr. Daley said. He added: “The perception that Warren Christopher was some wuss who got hoodwinked by Jim Baker is absolute fantasy in the mind of somebody who is trying to make themselves out to be bigger than they were.”

Neither Mr. Christopher nor Mr. Daley has seen the completed film, which has been sent to television reporters and critics for review. Mr. Daley said he requested and was given a draft of the script last year by HBO after filming had begun. Mr. Baker, who has seen the film, said he reviewed a draft of the script before production began and requested changes that were incorporated into the film.

Mr. Christopher said he learned of the film from his tailor, who was asked by the filmmakers to reproduce one of Mr. Christopher’s suits. He said he offered to review the script but never received one. The New York Times gave him a transcript of the scenes in which his character appears.

“I was stunned by the excerpt,” he said in an interview. “Much of what the author has written about me is pure fiction. It contained events that never occurred, words I never spoke and decisions attributed to me that I never made.”

The film portrays Mr. Christopher as blocking attempts by other Gore advisers to rally protesters and to take the fight over disputed ballots to court. He is depicted as backing away from confrontation during a meeting with Mr. Baker, seeking compromise and negotiation as the Republicans prepare for war.

The portrait stands in stark contrast to Mr. Baker’s. This is largely because the film is edited to jump directly from scenes in which Mr. Baker prepares the Bush team for “a street fight,” giving directions about where to stage protests, to scenes where Mr. Christopher counsels caution and calls for an “orderly process” without protesters.

That characterization of Mr. Christopher has some support. Accounts published in The New York Times in 2000 characterized Mr. Christopher as urging caution and a disciplined approach to the recount.

Early reviews of “Recount” have been positive. Writing on huffingtonpost.com, Jeffrey Wells calls it “a thoroughly engaging, first-rate political drama.” But, he added, “I can’t see how this film won’t be seen as having done serious damage to the reputation” of Mr. Christopher, whom Mr. Wells says is portrayed “as one of the great all-time wimps.”

Mr. Strong disputes that characterization. “It was our goal to show him as a noble statesman who held a deep concern at how the rest of the world would be negatively affected if the United States was not able to handle a disputed election in a nonviolent manner,” he said.

The film is Mr. Strong’s first produced screenplay. Also an actor who appeared for four seasons on “Gilmore Girls,” Mr. Strong said he focused his book research on four works by reporters who covered the 36 days between the election and the Supreme Court decision that ended the recount.

Mr. Strong gave several people depicted in the film the opportunity to review the script before filming began. Among them, he said, was Mr. Klain, who oversaw much of the day-to-day activity in Florida after Mr. Christopher returned to California for a family matter.

Mr. Klain said the film “gets the big things right,” but faults its portrait of Mr. Christopher. “He was as intense and vigorous an advocate for Vice President Gore as anyone there,” Mr. Klain said.

Mr. Christopher and Mr. Daley were interviewed by the film’s creators only after filming began. Mr. Christopher said he was told that scenes involving his character had already been filmed; Mr. Strong denied that, saying the scenes were to be filmed that day.

Mr. Strong confirmed that Mr. Christopher offered to review the script but, he said, he decided not to send one. “I didn’t feel comfortable sending it to him because I didn’t feel that he was being totally candid in our interview,” Mr. Strong said. “He wasn’t as forthright with me as other people I’ve interviewed.”

Mr. Strong also said that the film did not intend to pin the blame for the Democrats’ defeat on anyone. In a later interview, though, he said Mr. Christopher and Mr. Daley “wanted to concede from Day One.” He said that conclusion was supported by one of his primary sources, “Too Close to Call,” a book by Jeffrey Toobin, who served as a consultant on the film. In it Mr. Toobin argues that by the end of the first week, both Mr. Daley and Mr. Christopher were “making the case for surrender.”
http://www.nytimes.com/2008/05/14/ar...on/14reco.html





HBO Seen Selling Shows on Apple's iTunes: Sources
Kenneth Li

Time Warner Inc's HBO cable network is expected to start selling shows on Apple Inc's iTunes digital entertainment service, with flexible pricing, sources familiar with the discussions said on Monday.

Episodes of some HBO shows are likely to be sold at the standard price of $1.99 per episode or higher, these sources said, marking the first time Apple has agreed to selling television shows at different prices in the United States.

Although some global iTunes stores, including Japan, already sell songs at different prices, Apple has resisted offering music or television shows at different prices for the sake of simplicity for consumers.

The deal could be announced as early as tomorrow, one of the sources said.

But studio and music company executives have pushed for variable pricing, such as the ability to sell some content at lower prices and new releases at higher prices, which they believe would improve sales from its older catalogs.

Apple's pricing structure also was part of the reason why General Electric's NBC Universal decided last year to pull its shows from iTunes.

Since then, NBC has made some shows available for streaming on Apple's iPhone as well made some available for sale on iTunes's U.K. store.

For HBO -- home to hit series like "The Sopranos" and "Sex and the City" -- the move marks the first time it has made its shows available for sale in electronic form. It is currently testing a broadband service for subscribers in Wisconsin, which streams episodes of shows shortly after their first airing.

HBO plans to make some of the shows available on iTunes when its sells them on DVD, after the initial airing of the entire season, one source said, preserving its relationship with subscribers and cable operators who pay HBO a fee for every new subscriber.

Other broadcast and cable networks make their shows available as early as the next day after broadcast.

At launch, HBO will likely offer mostly shows from its archives, one source said.

HBO declined comment. An Apple representative was not immediately reachable.

The news was first reported by Portfolio.com.

(Reporting by Kenneth Li; editing by Jeffrey Benkoe and Carol Bishopric)
http://www.reuters.com/article/enter...EN568620080512





In the Age of TiVo and Web Video, What Is Prime Time?
Brian Stelter

This week, the television upfronts — in which the broadcast networks present their schedules to advertisers — will open with a mystery. Who stole six million viewers?

That’s the number who were watching prime time television last May, a month affectionately known as “sweeps,” but have disappeared this year, according to the overnight Nielsen ratings. Each of the major broadcast networks, save for Fox, has seen its audience decline this season. The ratings for hit shows like “American Idol” and “CSI” have approached record lows.

Where some of last May’s 44 million viewers went is not a mystery, according to the networks. The writers’ strike this winter deflated the ratings and accelerated the flight of viewers to cable channels.

But the more significant shift can’t be blamed on the strike. In the past television season, there has been a sharp increase in time-shifting. Some of the six million are still watching, but on their own terms, thanks to TiVos and other digital video recorders, streaming video on the Internet, and cable video on demand offerings. So while overall usage of television is steady, the linear broadcasts favored by advertisers are in decline.

The mystery, then, is what the networks should do now.

Brad Adgate, research director of the advertising agency Horizon Media, said that advertisers were paying attention to the changes.

“Part of the reason why advertisers buy television is because of its immediacy,” Mr. Adgate said. As more consumers time-shift their viewing, “there becomes less of a difference between ads in magazines and ads on television.”

Broadcast television remains the dominant medium for advertising, as the $9 billion upfront market attests, but its prime-time audience is gradually shrinking. Time-shifting has cushioned the declines, but in ways that are trickier to measure and pitch to marketers. With on-demand options available in more households than ever, networks have no choice but to adapt.

For starters, the prime-time schedules crafted by television programmers might become less important with each passing year. David Wolf, a senior executive with the consulting firm Accenture’s media and entertainment practice, said that “must-see TV” — the longtime slogan for of NBC’s Thursday night lineup — might become a television relic.

“The days of the ‘lineup’ are numbered,” Mr. Wolf said. In other words, with fewer viewers watching linear over-the-air television, networks can’t assume that a heavyweight lead-in like “Dancing With the Stars” will keep viewers watching all the way to the late local news, a pattern that has helped networks introduce new shows.

It may also mean that matching up programs becomes less important, or at least less potentially damaging. Last fall’s powerhouse Thursday at 9 p.m. match-up — ABC’s “Grey’s Anatomy” versus CBS’s “CSI” versus NBC’s “The Office” — was a scheduling move influenced by time-shifting. All three shows are popular among the young, upscale viewers who record and stream shows most often.

“I think that scheduling decision would have been a lot harder to make in a non-DVR world,” said a senior network executive who spoke on the condition of anonymity in order to be candid about the issue. “It would have been more of a zero-sum game then.”

Many of the top-rated broadcast shows now have 20 percent to 25 percent ratings gains when DVR viewing is calculated. In urban areas, the gains are even greater. In Los Angeles, fully half the 18- to 49-year-old viewership for some shows, including “The Office” and another NBC sitcom, “30 Rock,” happens on a time-shifted basis.

Some viewers shift their viewing only slightly, overlapping shows scheduled later in the evening.

Of 20 shows time-shifted most often, only one (“Medium”) is on at 10 p.m. As appointment viewing wanes, hit franchises — ones that viewers will record or watch online each week — become even more important.

“As a result of time-shifting, the biggest shows are getting bigger and some of the smaller shows are getting negatively impacted,” the senior television executive said.

At a series of upfront presentations this week, the networks are likely to discuss the dizzying number of new ways to watch television. Last week, for example, the General Electric unit NBC started streaming some episodes to the Apple iPhone, and Microsoft added show downloads to its online store.

The availability of television shows online has become widespread surprisingly quickly. Some series are viewed millions of times a week via free, advertising-supported streaming Web sites like Hulu, Veoh and Fancast (and the network sites themselves). DVRs and online streams offer “a fairly large library of content available on an on-demand basis,” said Amy Banse of Comcast Interactive Media.

“The Hills,” the most popular show on Viacom’s MTV, is a leading example of the shift. Comparing television ratings with online streams is imprecise, but the audience for the series soars when on-demand options are factored in. Since the show returned on March 24, premiere episodes have averaged 3.7 million “live” viewers on Monday nights. Almost a million more viewers have watched each episode using DVRs. On the Internet, episodes and excerpts have been streamed another 32 million times. Some overlap undoubtedly exists, as some fans watch the episode both on TV and online. But every viewing is another advertising opportunity for MTV.

Streaming is particularly popular among younger viewers, who are able to sample shows they would otherwise miss. In a first-of-its-kind experiment, the CW decided last month to stop streaming the teen drama “Gossip Girl” on its Web site and steer viewers to the television broadcast in an effort to bolster its over-the-air ratings. Stephanie Savage, an executive producer, said she worried that the move would alienate viewers. After all, each episode put online had been streamed hundreds of thousands of times.

“There were a lot of question marks,” she said.

But executives at the CW, a joint venture between a Time Warner unit and the CBS Corporation, were pleased with the results when the ratings rose slightly in late April, Ms. Savage noted, and the episodes are still for sale for $1.99 each at Apple’s iTunes store, where they regularly rank No. 1.

Cable operators offer yet another on-demand option. Comcast and Time Warner Cable, the country’s two largest cable providers, are increasingly promoting their video-on-demand platforms, which are mostly associated with movies and premium programming. One-third of United States households now have on-demand capabilities, and Comcast said its platform recorded more than 300 million video views in March, up 50 percent over the previous year.

But of all the time-shifting technologies, digital video recorders are the most popular. One in four American households now uses a digital video recorder to time-shift shows and skip commercials, up from about 15 percent last May. The broadcast networks experienced a 60 percent rise in recorded viewing this season. Last year, in recognition of the growth of DVRs, many television networks converted to a new ratings metric for buying and selling ad time that includes shows watched within three days of the broadcast.

For networks, the DVR is a friend and an enemy: “the classic frenemy,” said Alan Wurtzel, the head of research for NBC.

While they enable viewers to watch more hours of television, they hurt the rate of commercial recognition, as about half of all commercials are skipped in time-shifting modes.

“Honestly, if I could wish away the DVR, I would,” Mr. Wurtzel added. “But I can’t. It’s growing.”

Time Warner is trying a half-measure: letting viewers start an episode anytime during the hour of its broadcast. “I’d like to see this get to the point where we have so much content that consumers can actually plan their lives around knowing that they don’t have to plan their lives,” said Peter C. Stern, the executive vice president for product management at Time Warner Cable.
http://www.nytimes.com/2008/05/12/bu...12ratings.html





What is Blocking Vista Users from Recording NBC Shows?
Greg Sandoval

Some users of Windows Vista Media Center say they were blocked from recording the NBC Universal TV shows American Gladiator and Medium on Monday night.

"Restrictions set by the broadcaster and/or originator prohibit recording of this program," the error message read.

At Thegreenbutton.com a message board popular with DVR enthusiasts, those affected tried to figure out what was causing the block. When this kind of thing happens, people immediately question whether TV and cable networks are trying to thwart time-shifting technologies and force people to watch commercials again. Even though it's rarely done, content providers do have the ability to communicate with some time-shifting hardware to block the recording of shows or broadcasts.

"This is indicative of why the current DRM schemes are flawed," said Marcel Good, an IT director in Northern California and one of the people prevented from recording the NBC shows. "It affects people who intend to legally consume content. They have no intention of stealing the content. The people who want to steal already have ways around DRM."

On Tuesday, the cause for the block of the NBC Universal shows was still unclear. Representatives from both the network and Microsoft said they would need time to look into the matter.

Until they do, here are the few available clues. Most of those who posted at Thegreenbutton were Vista users recording digital cable with ATI cablecard tuners.

A TiVo spokeswoman said the DVR company received no customer complaints about being blocked from recording.

This isn't the first time a Vista Media Center user has complained about being barred from recording. A person identified as Alex from Canada wrote 14 months ago at Thegreenbutton: "Often a small number of my shows fail to record, and in the Windows event log I see errors about 'copy protection set by the broadcaster.'"

The shows Alex tried to record came from the Toronto-based W Network. Alex was running Windows Vista Ultimate 32bit and when attempting to record the show Friends: Trial by Jury received this message in Media Center's event logs: "Friends was not recorded. Recording of this content is prohibited by the content provider."

Jessica Zahn, a program manager in Microsoft's Media Center TV group, who according to Thegreenbutton has volunteered to answer questions at the site, apparently responded to Alex (a Microsoft spokeswoman said she could not confirm the message came from Zahn). The person who responded under the username JessZahn said the problem had either one of two causes.

"The broadcaster is setting the 'Copy Never' flag and Media Center's behavior is expected or Media Center is misinterpreting data it receives," and someone at Microsoft would need to study the stream of the show to know for sure.

What remains unclear, however, is whether those who posted complaints at Thegreenbutton shared the same cable provider.
http://www.news.com/8301-10784_3-994...l?tag=nefd.top





Older DVR Owners Are More Likely to Skip All Ads
Mike Vorhaus

Since upfront season is upon us, let's take a look at people's attitudes toward ad skipping.

Approximately 30% of online Americans, ages 12 to 64, own or subscribe to a TiVo or a DVR service from their cable or satellite company. And of course, we assume that everyone with one of those devices is skipping all their TV ads all the time. But that isn't true.

When asked about their ad-skipping tendencies, people report quite a bit of diversity in the percentage of ads they skip. One surprising finding? Older Americans are more likely to skip ads all of the time. When asked whether they skip ads 100% of the time, 52% of men ages 55 to 64 said they do. By comparison, only 21% of males ages 12 to 17 report skipping ads 100% of the time.

Many people might assume that young men and women are the heaviest ad skippers, given that this behavior requires the use of a newer technology. Perhaps one explanation of the results is that the older men are very focused on their TV viewing, while the younger people may well be multitasking while watching TV: texting, instant messaging, surfing the web and playing a game (or two). In that case, who needs ad skipping? They just pay attention to other media when the ads are on TV or, worse yet, perhaps the TV is just "background music" for the younger demos.
http://adage.com/digital/article?article_id=126951





Disney to Create Lab to Test Ads for ABC, ESPN
Ryan Nakashima

Will people remember three-second video ads on their mobile phones? Do high-definition commercials on big screens get people's hearts racing more than other pitches? Is the sports ticker crawl distracting or does it add value to the 30-second TV spot?

A laboratory in Austin, Texas, to be founded by The Walt Disney Co. by the end of the year aims to answer these questions and more by testing the biometric reactions of a pool of up to 4,000 people to advertising that takes advantage of the latest technology.

In a controlled living room setting, scientists will measure heart rate and skin conductivity and track the gaze of participants who are exposed to new ad models over the Internet, mobile devices and TV screens.

The first results are expected by early 2009.

The media giant, which owns ABC and ESPN, is seeking to learn whether consumers are more engaged by new and interactive ads and ultimately if the company can charge more for them.

Disney planned to announce the formation of the lab to advertisers attending its upfront sales pitch for the coming TV season in New York on Tuesday.

''One of the reasons for engaging in an initiative like this is to determine, once and for all, if there is additional value,'' Artie Bulgrin, senior vice president of research and sales development for ESPN, told The Associated Press.

The sports media juggernaut says subscribers to its premium high-definition channels were economically better off and considers them more attractive to advertisers. Now, it will clinically test whether HD ads have more impact, Bulgrin said.

The lab will be headed by Duane Varan, executive director of the Interactive Television Research Institute at Murdoch University in Perth, Australia.

Varan said biometric testing helps cut to the heart of audience reactions to visual ads, which can sometimes be missed by focus group surveys.

''TV is not a rational medium, it's an emotional medium,'' Varan said. ''We can get to a deeper layer of what's motivating people by seeing how they behave, observing them in experimental settings and seeing how their body reacts.''

The initiative comes as media companies are struggling to recover from the 100-day Hollywood writers strike that depleted scripted shows and hurt network ratings.

It also affirmed the rapid growth of Internet advertising.

Disney chief executive Robert Iger said in March that the company expected to reap $1 billion in annual online revenue by September, including content downloads, online game subscriptions and other e-commerce.

Video advertisements on the ABC.com full episode player already have clickable portions and some come with games attached.

''We want to drive developments in technology, advertising and serving the consumer, not react to them,'' said George Bodenheimer, president of ESPN and ABC Sports.
http://www.denverpost.com/nationworld/ci_9236497





Bloomberg L.P. Fills Post, Suggesting Shift to News
Tim Arango

The news business may be in the doldrums, but the competition over business news could be heating up.

Bloomberg L.P., the financial data and news giant founded by Mayor Michael R. Bloomberg of New York, said Monday that it had hired Norman Pearlstine, the former top editor of Time Inc. and The Wall Street Journal, to the new position of chief content officer.

The move suggests that Bloomberg, whose fortunes have been buoyed by the selling of its hugely profitable data terminals to brokerage firms and investment banks, plans to expand the journalism side of its business.

Bloomberg’s sprawling operation, which includes 2,300 editorial employees, a television outfit and a radio station, has largely been used as a tool for the Bloomberg terminals. But the growth in terminal sales has slowed with the economy and as Wall Street suffers from the fallout of the mortgage crisis.

Adding Mr. Pearlstine to its masthead will polish Bloomberg News’ journalistic credentials at a time when the company is gearing up for new competition on almost all fronts. Last May, the Thomson Corporation bought Reuters for $17 billion to form the world’s largest financial data company. And last fall, Rupert Murdoch’s News Corporation completed its $5 billion takeover of Dow Jones & Company, owner of The Wall Street Journal, Barron’s and Dow Jones Newswires.

Also last fall, News Corporation introduced Fox Business News, a cable channel in direct competition with Bloomberg TV and CNBC, which is owned by NBC Universal.

In an interview, Mr. Pearlstine stressed that his immediate concern would be developing existing Bloomberg properties rather than looking to acquire new ones.

“I would say the specifics of the job are very much a work in progress,” he said. “The initial focus is going to be on some of the multimedia products.”

Mr. Pearlstine just had his own stint as a deal maker for the private equity firm Carlyle Group, working for the past 20 months as adviser on media and telecommunications acquisitions. But the company did not complete any deals in those areas during his time there.

Recently, Newsweek and The New York Post reported that Mayor Bloomberg might be considering an acquisition of The New York Times Company, but the mayor denied the rumor and Arthur Sulzberger Jr., the company’s chairman, said it was not for sale.

Monday morning, Mr. Pearlstine; Matthew A. Winkler, Bloomberg’s editor in chief; and Daniel L. Doctoroff, the president of Bloomberg, assembled in an auditorium at the company’s New York City headquarters to address employees. The takeaway from the gathering, according to an employee who was present but was granted anonymity to speak about a closed-door company meeting, was that the news organization would have a brighter spotlight on it.

“People are really excited about this,” this person said. “It means a bigger presence for us.”

On the surface, a union of Mr. Pearlstine and Bloomberg L.P. may seem a mismatch in personality and culture. Bloomberg is known as being systematic and bureaucratic with a relentless focus on efficiency; Mr. Pearlstine, a highly visible member of the New York media scene, comes from the clubby world of Time Inc. and The Wall Street Journal, where personal relationships count for more.

While Time Inc. still retains vestiges of a heritage of collegiality and informality, at Bloomberg, Mr. Pearlstine will find another level of egalitarianism: there are no offices, only open desks. He will have a desk in the newsroom as well as on the executive floor.

Until Monday, Bloomberg required its editors and reporters to conduct a daily “autopsy” in which they would scour newspapers and analyze why a particular paper chose, say, to run a Reuters dispatch over a Bloomberg article.

A video message set to the Beatles song “Revolution” that Mr. Winkler sent to the staff Monday shows the editor tearing a copy of The New York Times’ business section to symbolize the elimination of the daily autopsy.

The vast majority of Bloomberg’s revenue comes from selling data terminals, which includes its news service. Its revenue in 2007 was $5.4 billion, of which an estimated $4.7 billion came from selling financial data, according to Inside Market Data, a trade publication.

“They’re not fundamentally a journalistic organization,” said Paul Steiger, a former managing editor of The Journal and former colleague of Mr. Pearlstine. “It’s about the machine. The journalism promotes the machine.”

But that journalism is becoming a fast-growing machine itself. It has 2,300 editorial employees around the world, compared with 1,500 in 2005 and 1,200 in 2001.

Mr. Steiger predicted Mr. Pearlstine would be able to “harness” some of the journalistic talent at Bloomberg. Mr. Winkler, he said, “has an enormous amount of talent that he’s stockpiled. Norm can direct that, he can energize that.”

Mr. Pearlstine and Mr. Winkler have known each other for more than 25 years; in the early 1980s, Mr. Pearlstine hired Mr. Winkler to work for him at The Journal’s European edition.

Mr. Winkler said growth in terminal sales was slowing this year, mainly because of layoffs at investment banks and other financial institutions. The company had 273,000 subscribers last year, up from 243,000 in 2006. Each subscriber pays a fee of about $1,500 a month. Mr. Winkler also said advertising at Bloomberg Markets, the company’s magazine, and at Bloomberg TV was up on the year.

“The credo around here is, if you stop growing, you die,” Mr. Winkler said.

Bloomberg’s media properties have cautiously stepped out from under the terminal’s shadow recently. For the first time, Bloomberg Markets was honored this year as a finalist for a National Magazine Award, for a series on the subprime mortgage crisis.

Bloomberg TV, which has quietly toiled in the shadow of CNBC for about 14 years, recently revamped its look to appeal to a wider audience. While its viewership is assumed to be low, it does not participate in Nielsen ratings. Bloomberg executives view television as an essential platform.

“You cannot be in the news business today without being in television,” Mr. Winkler said.

The issue of how the company might continue to grow was raised at the gathering Monday when one of the employees in the audience asked whether a potential deal was in the works.

Mr. Doctoroff, denying that any deal was in the works, told the gathering, “We do have greater aspirations, and in what form those aspirations will be fulfilled, we’re going to all have to sit and figure that out,” according to another employee who also agreed to speak on the condition of anonymity because the meeting was meant to be confidential.

Yet Mr. Winkler and Mr. Pearlstine seemed to distance themselves from the long-held company mantra that they are “builders not buyers” — meaning the company would seek growth organically rather than through acquisitions. Mr. Pearlstine noted Mr. Doctoroff’s résumé — he worked at Lehman Brothers and Oak Hill Capital, a private equity firm — and suggested that his expertise in deal making might be put to use.

As Mayor Bloomberg’s term in office approaches its end in 2009, there is no shortage of speculation as to what his future holds. He retains a 68 percent stake in Bloomberg — a portion that Fortune valued last year at close to $13 billion. Merrill Lynch is the other major shareholder, with a 20 percent stake.

The mayor is made aware of most major decisions at the company, but a spokesman for the mayor declined Monday to comment. Mr. Pearlstine said his “substantive conversations” were with Mr. Winkler and Mr. Doctoroff, and that he did not feel comfortable identifying who else he spoke with.
http://www.nytimes.com/2008/05/13/bu...bloomberg.html





CBS to Pay $1.8 Billion for CNET Networks
A.R. Sorkin

CBS said Thursday it would buy CNET Networks for $1.8 billion in cash, marking its biggest online acquisition since hiring Quincy Smith, a former media and technology investment banker, to lead its interactive unit in late 2006. The deal came as CNET, whose assets include a popular technology-news Web site, was trying to fend off a group of activist investors seeking to take control of its board of directors.

A year and a half ago, Leslie Moonves, the chief executive of CBS, sought to reassure Wall Street that his efforts to expand CBS’s Web footprint would not include expensive acquisitions.

“We are not going to spend $1.6 billion on YouTube,” he told The New York Times, referring to the video-sharing site that Google had recently bought. “We are looking for the next YouTube and Quincy knows all the players.”

Mr. Moonves now appears to have decided that CBS needs to spend at least that much to build out its Internet presence and make it attractive to advertisers.

“There are very few opportunities to acquire a profitable, growing, well-managed Internet company like CNET Networks,” he said in a press release Thursday. “Together, CBS and CNET Networks will have significant additional exposure to the fastest-growing advertising sector and can accelerate our growth through a number of new content, promotion and advertising initiatives.”

CBS said Thursday it would pay $11.50 for each CNET share, a substantial 45 percent premium to where the stock closed on Wednesday.

During the dot-com boom, shares of CNET reached nearly $80, but the company’s fortunes have fallen since then, and it recently announced layoffs.

A group of investors including the hedge-fund firm Jana Partners, unhappy with the company’s recent performance and management, have been hoping to take control by getting their allies elected to the CNET board.

CBS has picked up smaller Web properties in the last year or so, including Last.fm, a music Web site for which it paid $280 million, according to regulatory filings. It also acquired Wallstrip, an irreverent financial Web program, and DotSpotter, a celebrity gossip site.

But at $1.8 billion, Thursday’s deal for CNET is the biggest by far in its recent Internet expansion.

Mr. Smith, who worked at investment-banking boutique Allen & Company before joining CBS in November 2006, said in a press release that CNET had a “near-perfect category symmetry” with the content at CBS Interactive, which includes CBSNews.com and CBSSports.com.

“Together we will have a terrific opportunity to not only grow our established businesses, but to build new attractive verticals of content as well,” Mr. Smith said.
http://dealbook.blogs.nytimes.com/20...rks/index.html





Report: Ars Technica Bought by Wired Digital

The Malden-based company that produces the Ars Technica blog has been acquired by Condé Nast Inc. for a reported $25 million, according to an online report.

Ars Technica, which is a blog for personal computer enthusiasts, was co-founded in 1998 by Ken "Caesar" Fisher, who is now a doctoral candidate in religion at Harvard's Graduate School of Arts and Sciences, according to his online biography.

Fisher did not immediately return requests for comment.

The company's co-founder is Chicago-based Jon Stokes. The eight-employee company is expected to be integrated into San Francisco-based Wired Digital, a division of CondéNet and the online arm of Condé Nast, according to the TechCrunch website.

No financial details were reported by the website.

Condé Nast also bought in late 2006 Somerville-based Reddit.com, an online news aggregator that was started in June 2005 by two University of Virginia graduates with a $12,000 investment from micro venture capital firm Y Combinator.
http://www.bizjournals.com/masshight...2/daily36.html





Historic Senate Vote Rejects FCC's Rules

In a near-unanimous voice vote tonight, the Senate passed a "resolution of disapproval" that would nullify the Federal Communications Commission's latest attempt to dismantle longstanding media ownership limits.

Last December, the FCC voted to remove the "newspaper/broadcast cross-ownership" ban that prohibits one company from owning a broadcast station and the major daily newspaper in the same market. The resolution of disapproval (Senate Joint Resolution 28), introduced by Sen. Byron Dorgan (D-N.D.), would nullify the FCC's new rules if passed by Congress and signed by the president. The House version of the resolution was introduced by Reps. Jay Inslee (D-Wash.) and Dave Reichert (R-Wash.) in March.

Today, the Bush administration issued a statement opposing the resolution and threatening to veto it. The statement called the FCC's new rules the product of "extensive public comment and consultation" but failed to mention that only 1 percent of public comments supported the administration's position.

Josh Silver, executive director of Free Press, which coordinates the StopBigMedia.com Coalition, made the following statement:

"Today's historic Senate vote is a resounding victory for the vast majority of Americans who oppose media consolidation. We applaud the bipartisan leadership of Senators Dorgan and Snowe for acting in the public interest. But to stop Big Media from polluting our local airwaves with more junk journalism and propaganda, we need the House to move this legislation forward quickly.

"At this watershed moment, public outrage against Big Media has reached a breaking point. The Bush administration's threats to undercut this bipartisan effort in Congress show how out of touch this president is with the will of the American people. But we’re not going to stand idly by and let the White House green light Big Media's expansion. The great pendulum of political change is swinging away from corrosive consolidation and toward better media."
http://www.freepress.net/node/39877





In Their TV Tastes, the Rich Are Different

Many of their favorite shows earn modest ratings
Kevin Downey

The very rich are quite different from the rest of us in many ways, and one of them is what they watch on television. They like shows that most others don’t.

Programs enjoyed by the very rich include ABC’s “Saturday Night Football” and “What About Brian” as well as NBC’s “Friday Night” and “30 Rock.”

All four rank in the top 15 among affluent viewers measured on median income, but none ranks higher than 80th among the general household population.

That’s according to a report from Magna Global, using analysis of Nielsen Media Research ratings to rank programs according to their median household income among adults 25-54.

While a couple of the shows matched with the general viewing public’s favorites, like No. 1 “Desperate Housewives,” most were quite different.

That skew in preferences is also seen in the networks favored by rich viewers. Though NBC has slid from first to fourth place in 18-49s over the past few years, it ranks No. 2 in median household income behind only ABC, and it has seven of the top 20 shows in median income.

“Affluent programs are important to advertisers because [their viewers] have more money to spend,” says Steve Sternberg, executive vice president of audience analysis at Magna. “But obviously, they are more important to some advertisers than others.”

ABC’s audience has a median income of $64,000, based on adults 25-54 in fourth quarter, compared to NBC’s $60,000, CBS’s $59,000, Fox’s $53,000 and the CW’s $45,000.

Among middling performers with affluent viewers propping up NBC is “The Office,” a comedy that so far this season ranks only No. 28 among all shows in the 18-49 demographic. But it is tied with ABC’s “Housewives” at No. 1 in affluence, with its viewers having a median income of $70,000.

More telling, “Scrubs” ranks only No. 51 among 18-49s but No. 6 in affluence with a median of $68,000, tied with ABC’s “Grey’s Anatomy” and “Lost” and NBC’s “Studio 60 on the Sunset Strip,” which is partly why it is remarkably in its sixth season despite never having been more than a modest performer for NBC.

It has consistently had a high median income in the regular reports issued by Magna over the years.

Shows like “Scrubs” probably give the creators of a few first-season shows on NBC and other networks some hope of survival.

NBC Thursday sitcom “Rock,” for instance, is far from a sure bet for renewal. For the season it’s tied at No. 85 in the 18-49 demographic, but its viewers have a median income of $65,000, enough to be tied at No. 11 in affluence with several other shows.

Also doing well in affluence but not necessarily overall ratings is ABC’s “Brian,” a weak drama stuck at No. 82 in the ratings so far this season but, like “30 Rock,” tied at No. 11 in affluence.

Of course, many factors go into whether or not a show makes it another season, notably its overall rating and its ability to retain viewers from lead-in programs. Recent shows with affluent viewers like Fox’s “The O.C.,” ABC’s “Six Degrees” and CBS’s “The Class” are either already gone or in their final throes.

Sternberg says programs like “Studio 60” aren’t likely to see a second season despite their viewers’ affluence.

“If [‘Studio 60’] had held onto its initial audience, I would say yes,” he says. “But since it has been declining I have to say it’s borderline at best.”
http://www.medialifemagazine.com/art...icle_10573.asp





Five Social Networking Sites Of The Wealthy
Nicola Ruiz

In the real world, the average Joe watches the Red Sox-Yankees game from the bleachers while the affluent mingle in the corporate boxes. Everyday Eddie deals with parking and public restrooms during his day at the beach, yet the mega-rich drop their keys with the valet and settle into a reserved lounge chair at a private club.

Online, the waters are parting too.

Though it once seemed that the Web was the last place where status didn't matter, the elite are now looking for a comfortable place to mingle with like-minded people. They're leaving Facebook and LinkedIn to the riffraff.

"It's taken a while for wealthy consumers to start using networking sites, mostly due to privacy issues and concerns," says Milton Pedraza, CEO of the Luxury Institute, a New York-based research company that focuses on high-net-worth individuals.

"But now they want to leverage all those social-networking advantages. Before, they had the opportunity to network at annual international meetings, but now they can connect to like-minded people in Dubai or anywhere in the world in an instant."

According to a January survey by the Luxury Institute, wealthy-consumer participation in online social networks is on the rise. Of the 805 people surveyed (each with a minimum gross annual income of $150,000) in 2008, 60% of respondents said they participate in a social network, up from 27% in 2007.

Participation levels for the wealthy in leading social networks were 16% for MySpace, 13% for LinkedIn and 11% for Facebook. On average, a wealthy person has membership in 2.8 social networks with an average of 110 connections. Unfortunately, according to Pedraza, too many invites, "pokes" and unrequited connections, coupled with the leaks in privacy, make exclusive sites more alluring.

A new breed of social site
The wealthy are instead heading to a new crop of ultra-exclusive social networks that have blossomed over the past few years, such as aSmallWorld, which launched in 2004. This year also saw the launch of Diamond Lounge and Squa.re.

Some networks come with strict invite-only policies and a rigorous application process based on education, job title, connections and lots of virtual velvet rope. Others, such as Squa.re and Quintessentially, are more lenient, requiring simply an invite from any existing member.

ASmallWorld, by far the most well-known and well-attended site for digital A-listers, was launched in March 2004 by former Lehman Brothers banker Erik Wachtmeister. Born into a diplomat family (his father was the Swedish ambassador to the U.S.), Wachtmeister started networking at an early age.

"I realized there was an existing community of people who are connected by three degrees of separation: They stay at the same resorts when they travel, frequent the same restaurants and have similar lifestyles. They needed a platform to share and receive information--it was a huge untapped opportunity," Wachtmeister says.

ASmallWorld has grown to include 320,000 members globally (Facebook boasts 40 million, by contrast) with 65% of the members in the U.K., Italy, Germany and France and 20% in the U.S. The rest are sprinkled throughout the Middle East and Asia. Wachtmeister's site has been even called "MySpace for millionaires" by the Wall Street Journal. But Wachtmeister maintains that aSmallWorld is a niche community that doesn't allow self-promotion or aggressive networking.

Once invited to join the network (only selected members with a sturdy Rolodex are given invite powers), a member can browse the market guide (a high-end Craigslist where there are currently 500 member-listed yachts for sale), surf the luxury-travel guide and global-event guide, or participate in forum discussions--one of the site's most active and popular functions.

"Anyone with good lawyers in Phuket, Thailand?" a member recently asked on aSmallWorld's forum. He continues: "I'm building a sustainable-apartment development and need some U.K.-Thai contracts written up for an investor."

Another writes that she's "looking for recommendations for the U.K.'s and/or Europe's top cosmetic doctors to perform liposuction or the fat-dissolving laser treatment."

Participating in the forums and access to the site is free, supported by advertisers such as Cartier, Moet & Chandon and Patek Philippe--all lured on board by the guarantee of targeting a luxury-obsessed audience.

Striking a balance
Others are jumping on the bandwagon too, but finding the balance between staying exclusive and making a profit is a big challenge.

Case in point: The newly launched DiamondLounge.com. Significantly smaller, with only 150 members, the company has flip-flopped between fee-based and free, and has shifted its focus from business networking and social site to dating and fun, "like an online club," says owner Arya Marafie. He says a slow and controlled growth in these early days is critical to the site's long-term success.

"We spent a tremendous amount of time making sure that we selected the right club members, because these are the people who will invite the next group," says Marafie, adding that most of those hand-selected people are CEOs, lawyers, directors or doctors. But Marafie admits that this mix will most likely change as the site switches to a party-like environment.

"Being wealthy won't automatically get you in the door," says Marafie, "You have to be interesting and bring something to the table." He says the average age of his members is 35 to 40, significantly older than the MySpace or Facebook demographic. However, according to a study by comScore Media Metrix, 68% of the 55 million MySpace users and 50% of Facebook's 15 million users are now 25 and older.

Next month, the Luxury Institute is also launching a network catering to the affluent. For an annual fee of $250, LuxuryRatings.com will offer access to member ratings of several different types of service providers, from wealth advisers to art dealers to yacht brokers. The fee eliminates the need for online advertising, which, Pedraza says, would be a conflict of interest.

Will it work?
"People are unhappy with the free-for-all at LinkedIn and Facebook and MySpace. They are looking for a specialized group to mingle with, and paying a fee weeds out the ones who don't belong," says Chris Curtis, director of Web Business Ownership LLC, a Delaware-based Internet consulting company.

"Exclusive sites are becoming more prevalent because not everyone is willing to network with people they don't know," she adds. "It provides a more formal type of introduction within a closed circle. [The networks] have staying power, but only if they listen to the needs of the society that they are creating."

But do the rich and successful have time to be searching the Web and schmoozing? "If it's worth their time, yes," says Pedraza. "I know people who are building a yacht, and peer-to-peer insight about where to go and who to work with is the sweet spot."

Getting to that spot, however, is the challenge. If you want to be inside these clubs, aim for one of the more lenient ones that require an easy-to-find invite where all members have invite powers. Choose carefully, though, because just like in high school, once everyone can join the cool club, it's no longer cool. The alternative is to pay the yearly $250 dues to join a site such as LuxuryRatings.com.

But if you're looking for an invite from the more exclusive groups, you simply have to know someone who matters.

"If you don't know anyone in the group, maybe it's not quite right for you," says Wachtmeister.
http://www.forbes.com/2008/05/02/soc...0502style.html





OLEDs, e-Paper Encroach on LCDs
Yoichiro Hata

LCDs and plasma screens may be the dominant choice for TVs today, and LCDs the displays of choice for almost every other application, but a pair of upstart technologies is vying to replace them. Organic LEDs, which have already made inroads in the portable display market, are threatening to move into the living room as a new TV display. Electronic paper, meanwhile, is carving out a share in portable devices, consumer electronics and electronic signs that demand particularly low power consumption and long battery life.

At the recent Display 2008 show here, E Ink, Fujitsu and Bridgestone independently exhibited advances of their e-paper displays, which are characteristically thin, light in weight and power stingy. For its part, Sony exhibited a prototype of a 0.3-mm-thick OLED display—more commonly known as an OEL (organic electroluminescent) display in Asia— which is a reduced-profile version of the 1.4-mm OLED the company designed into its OLED TV monitor, the XEL-1, launched in December. The company also demonstrated a 0.2-mm prototype, the thinnest OLED yet.

In addition, Sony showed a prototype 27-inch OLED TV monitor capable of displaying high-definition video images in a 1,920 x 1,080-pixel format.

Handheld devices, not TV sets, are the target for e-paper, most versions of which are bistable; that is, even if power is turned off, they retain the contents of a screen without the need for electrical refresh. A reflective display that requires neither the backlight of a transmissive LCD nor the light emission mechanisms of an OLED, e-paper is suitable for applications that demand a display with especially low power consumption.

Thinness is not the only strength of an OLED display, whose screen size can be as large as 30 inches on the diagonal. OLEDs offer many other features that suit them for TV receivers, including color reproduction that exceeds the NTSC specification and a quick response time, of several microseconds. Peak brightness is more than 1,000 candelas/meter2, and the contrast ratio is more than 10,000:1.

Samsung is already jumping on the OLED bandwagon. "We will produce 40- or 42-inch TVs with organic-electroluminescence displays by 2010," said Lee Woo Jong, a vice president who heads up marketing for Samsung SDI's mobile-display division. Samsung will start volume production of 14-inch OLED panels for notebook computers by the end of this year.

Chi Mei EL, a manufacturer of display panels based in Taiwan, has its eye on OLEDs too. The company will begin commercial production of 12.1-inch organic-EL displays for notebooks in the first half of 2009, with a plan to get into volume production for 32-inch panels for TV receivers in the latter half of next year, said vice president Park Sung Soo.

Despite the advances, problems remain in applying organic-EL technology to larger panels. OLED panels are produced by compiling thin-film transistors (TFTs) on a glass substrate, followed by a series of organic layers for injecting, transmitting and/or recombining electrons and holes. In producing large panels, it has proved impossible to reuse the same manufacturing techniques originally developed for making TFTs or emission layers for small OLED panels.

For instance, for its first OLED TV, the 11-inch XEL-1, Sony used low-temperature polysilicon technology as the TFT base and small-molecule material for its organic film. But for the company's 27-inch OLED prototype, Sony engineers used an advanced "microcrystal" silicon TFT technology, tapping into a technique the company calls laser-induced pattern-wise sublimation.

Yoshi Ishibashi, chief of Sony's processing technology department, explained that there are three production process methods for TFTs: laser annealing, direct deposition and solid-phase growth. "We think that there are no better choices than using laser annealing in the silicon crystallization process for large-size panels," said Ishibashi.

Although the electron mobility of microcrystal silicon is somewhat inferior to that of polycrystalline silicon, it has another important benefit, Ishibashi said: When it comes to manufacturing large substrates, microcrystal silicon's high in-plane uniformity is a major advantage.

The industry has yet to find the optimal solution for manufacturing organic films. In Sony's XEL-1, a metal mask is placed immediately beneath the substrate, while organic materials vaporized from the melting pot are vapor-deposited onto it at RGB pixel location. But for substrates beyond a certain size, the metal mask will become distorted by its own weight or will emit heat from the melting pot, thus losing positional accuracy and decreasing aperture ratio and definition.

So Sony's engineering team sought out another technique for its 27-inch prototype. "The [laser-annealing] technique is also attractive for combining white organic EL with color filters," Ishibashi said. Using a color filter can achieve ultrahigh density, because there is no mask required to pattern discrete red, green and blue subpixels. That lowers the cost of production, although the color purity decreases and power consumption rises.

The number of bad pixels won't change, regardless of panel size. "So we need to get rid of the causes of the bad pixel as best we can," said Takatoshi Tsujimura, senior director of the OLED product division at Kodak. "To realize this, the combined use of white organic EL and a color filter is the best approach."

According to Tsujimura, the luminescence efficiency improves twofold by installing white pixels to the conventional triad of RGB subpixels. "It's because no color filters are used for white pixels," he said. "Thus, nothing prevents white light from coming through 100 percent. This is how high efficiency is achieved."

Organic-EL panels are finding their way into applications other than displays, including solid-state lighting and solar cells. Kaneka, a diversified chemical manufacturer, last month said it would begin joint research with Osaka University on an OLED lighting device and an organic thin-film solar cell.

OLED's thinness, lightness and surface-emitting properties make it useful for illumination purposes. Thinness and light weight are particular advantages in automotive and aircraft applications.

"Organic ELs can already exhibit 50 lumens per watt; 100 lumens/W is expected to be realized in 2010," said Gidas Sorin, CEO of German company Novaled. In contrast, the highest efficiency of a light bulb is approximately 20 lumens/W.

If OLED technology was one cornerstone of the Display 2008 expo here, then e-paper was the other. Several companies demonstrated advances in this technology, which is already being used in cell phones, e-book readers, signage, labels and cell phones.

To manufacture its electrophoretic-display (EPD) e-paper, pioneer E Ink produces a "sheet" that comprises microencapsulated particles in a transparent liquid; a common electrode; and a release layer, which display makers or OEMs remove to laminate the sheet to a backplane. Inside the capsules are positively charged white and negatively charged black particles.

E Ink's "sheet" technology has already been adopted in more than 10 million Motorola cell phones. The same technology is also used in Kindle, the portable book reader Amazon.com launched last year in the U.S. market, as well as seven other e-book readers now in production.

E Ink also exhibited an e-paper device that accommodates a stylus pen input. It is built around a control IC—the S1D13521B, jointly developed by Seiko Epson and E Ink—along with E Ink's AM300 development kit and a built-in electromagnetic induction-type tablet made by Wacom.

Wacom specifically developed a very thin, light panel: At 0.35 mm and 40 grams, it's half as thick as and half the weight of its predecessor. To trim the weight, Wacom engineers used PET film in place of a glass substrate.

"We expect five to six companies to launch products based on the AM300 development kit this summer," said Ryosuke Kuwata, vice president of E Ink.

Fujitsu, meanwhile, showed off e-paper technology with a multicolor cholesteric LCD. The panel, which does not use color filters, is constructed by combining three stacked display layers—one each for red, green and blue. The company exhibited an 8-inch, full-color PDA display panel capable of showing 1,024 x 768 pixels.

For its part, Bridgestone is working on a proprietary EPD technology called Quick Response Liquid Powder Display. QR-LPD is based on "electro-liquid powder," which straddles liquids and conventional powdered solids. The electro-liquid powder, which flows like a particulate suspension, is extremely sensitive to electricity, thus ensuring fast responsiveness: Response time is as fast as 0.2 ms. The powder comprises positively charged black particles and negatively charged white ones.

Bridgestone exhibited an A3-size full-color panel (4,096 colors) using a color filter. The company said it has also developed a foldable display.
http://www.eetimes.com/showArticle.j...leID=207601457





Academic Says Gadgets Threaten Internet's Future
Peter Griffiths

The rise of gadgets like the iPhone, Blackberry and Xbox threatens to unravel the decades of innovation that helped to build the Internet, a leading academic has warned in a new book.

Professor Jonathan Zittrain says the latest must-have devices are sealed, "sterile" boxes that stifle creativity and turn consumers into passive users of technology.

Unlike home computers, new Internet-enabled gadgets don't lend themselves to the sort of tinkering and collaboration that leads to technological advances, he says.

The mix of gadgets, over-regulation and Internet security fears could destroy the old system where mainstream technology could be "influenced, even revolutionized, out of left field".

"I don't want to see a two-tier world where only the experts can survive ... and the non-experts are stuck between something they don't understand and something that limits them," Zittrain told Reuters in an interview.

Zittrain, professor of Internet governance and regulation at the Oxford Internet Institute, Oxford University, says the Internet's simple, open architecture is key to its enormous success and also its flaws.

Amateur enthusiasts have come up with scores of new ideas by tinkering with the Internet on home computers. However, hackers have caused huge disruption by exploiting its loose structure.

Zittrain contrasts one of the first mass-produced home computers, the Apple II from the 1970s, with Apple's latest gadget, the iPhone. He says the iPhone is typical of what he calls "tethered appliances".

"They are appliances in that they are easy to use, while not easy to tinker with," he writes. "They are tethered because it is easy to for their vendors to change them from afar, long after the devices have left warehouses and showrooms."

They are a world away from the "generative Internet", a term Zittrain uses to describe the open, creative, innovative approach that helped build the Internet.

The rise of viruses and fraud has also led to tighter controls on PCs, particularly those in schools, universities, offices and public places, Zittrain says.

People are often blocked from experimenting with shared computers and their input is severely limited.

There is still time to save the Internet, he believes, although the answer lies in social rather than technological changes.

Society should resist more regulation and place its trust in the Internet's users. The success of Wikipedia, the online encyclopaedia written and edited by its readers, shows how self-governance can work.

Internet users should see themselves as "netizens", active participants in the online world rather than passive consumers.

"The community itself exercises a form of self-restraint and policing," he said. "You see it in Britain when you try to jump a queue, you see it on Wikipedia when a page is vandalised.

"The challenge to the technologists is to build technologies to let people of good faith help without having to devote their lives to it."

* The Future of the Internet and How To Stop It, futureoftheinternet.org , is published by Penguin.

(Editing by Steve Addison)
http://www.reuters.com/article/newsO...75110620080508





FMS: Spam-Proof Anonymous Message Boards on Freenet
Ian Clarke

A few weeks ago I started hearing quite a bit of buzz about a new tool called the Freenet Messaging System or FMS. I went to its website within Freenet (we call them “freesites”), and downloaded it. Normally downloading and running code from an anonymous system isn’t a good idea, but Freenet makes it easy to digitally sign content, and the author, while anonymous, seems pretty honorable.

If you are familiar with Usenet, feel free to skip the rest of this paragraph. Usenet is a discussion system that was very popular in the early days of the Internet. To use Usenet you need a NNTP client, which are a bit like email clients, and then you can post to newsgroups, forums on particular topics. NNTP is the protocol used to access Usenet, just as HTTP is the protocol used to access the web, and SMTP is the protocol used to send emails. Newsgroups have names like alt.humor.puns. These days the easiest way to use Usenet is probably through Google Groups, which, among other things, provides a web-based interface to Usenet. A number of dedicated NNTP clients still exist, one of the better ones is Thunderbird, which is primarily an email client created by the Mozilla Foundation, the creators of the Firefox web browser.

FMS evokes some nostalgia because it basically makes Freenet look like Usenet, allowing users to read messages posted to online forums, and also to post their own messages. The major difference is that because it is Freenet, everyone can remain anonymous. Currently FMS has about 30 boards on topics ranging from science, to religion, to discussion of Freenet and FMS itself. Here is what it looks like in Thunderbird:

FMS is not the first such messaging system in Freenet, another popular one is called Frost. Unfortunately, over the past few months Frost has been plagued by a familiar problem on the Internet, spamming. Unlike the Internet, Frost’s spammers are not motivated by financial gain, rather their goal seems to be pure mischief. Whatever their motivation, they’ve rendered Frost next to useless. Freenet’s anonymity makes it next to impossible to prevent spam using the same techniques that are conventionally employed on the Internet.

So how does FMS address this problem? It’s pretty cool, but first I need to give a quick crash course in how Freenet works.

Freenet is basically a globally distributed “Map” or “Dictionary”. You can insert data under “keys”, and then someone else, given the appropriate key, can retrieve that data. Freenet keys are somewhat analogous to URLs on the world wide web, except unlike URLs, they don’t point to the physical location of the data.

Freenet has a few different types of keys, which impose various constraints on the data that can be inserted under them. The type of key used by FMS is called a “Subspace-Signed Key” or SSK. The SSK itself contains a cryptographic public key, and any data inserted under a SSK must be signed by the corresponding private key. An SSK is used much like a file-system directory from which anyone can read, but only the “owner” of the SSK can write. Websites in Freenet are typically inserted under an SSK so only the author can update them.

Typically, email is “push” - senders push email to your email inbox. FMS takes the opposite approach, to receive messages from people you must “pull” it from their outbox. Because user’s outboxes are SSKs, all of a user’s messages are automatically signed and their integrity is checked by Freenet. With FMS, receiving messages from a particular is a voluntary act - and the only result of spamming is to flood your own outbox.

So how do users decide whom they should pull from? FMS creates a “web of trust” between users, where each user indicates how much they trust other users they’ve communicated with. If person A trusts person B, and person B trusts person C, then person A can trust person C - and so on. Here is a representation of the current web of trust in FMS:

If a user proves to be untrustworthy, by spamming for example, then users can change their trust rating for that user, and this will propagate through the trust web, so that others quickly stop pulling messages from the spammer’s outbox.

Ok, so how do you join the web of trust in the first place? FMS employs a clever mechanism based on the concept of “thinkcash” or CAPTCHAs. Every FMS user inserts these CAPTCHA tests, which can then be solved by a new user in order of that person to become minimally trusted by the existing user. Basically, you need to prove you are human. This is what this looks like in FMS:

FMS is not without its shortcomings. It is likely that the necessity to pull from the outbox of every user will only scale to a limited point, however FMS is being actively developed, and it is likely that these problems can be overcome in due course.

If you would like to try FMS, go and install Freenet, then click on the link to the Freenet Message System that will appear on the front page, you can download it from there. Pre-built versions of FMS are provided for Windows and Linux, however if you use a Mac you’ll need to compile it yourself (although this was pretty painless once I discovered I needed to add a -D USE_BUNDLED_SQLITE=ON to the cmake command).
http://locut.us/blog/2008/05/11/fms-...ds-on-freenet/





MySpace Wins $230 Million Anti-Spam Judgment
Anick Jesdanun

A notorious "Spam King" and his partner now owe MySpace about $230 million in damages after a federal judge awarded the popular online hangout what is believed to be the largest anti-spam judgment ever.

The judgment is a big victory for MySpace, although service providers often have a tough time collecting such awards. But even if the News Corp. (NWS) (NWS)-owned site never collects, it hopes the judgment deters other spammers.

"Anybody who's been thinking about engaging in spam are going to say, 'Wow, I better not go there,'" MySpace's chief security officer, Hemanshu Nigam, told The Associated Press on Tuesday. "Spammers don't want to be prosecuted. They are there to make money. It's our job to send a message to stop them."

U.S. District Judge Audrey B. Collins in Los Angeles ruled in MySpace's favor Monday after Sanford Wallace and Walter Rines failed to show up for a court hearing.

Wallace earned the monikers "Spam King" and "Spamford" as head of a company that sent as many as 30 million junk e-mails a day in the 1990s. He left that company, Cyber Promotions, following lawsuits from leading Internet service providers such as Time Warner Inc. (TWX) (TWX)'s AOL, only to re-emerge in a spyware case that led to a $4 million federal judgment against him in 2006.

"MySpace has zero tolerance for those who attempt to act illegally on our site," Nigam said in a statement. "We remain committed to punishing those who violate the law and try to harm our members."

Nigam told the AP that Wallace and Rines created their own MySpace accounts or took over existing ones by stealing passwords through "phishing" scams.

They then e-mailed other MySpace members, he said, "asking them to check out a cool video or another cool site. When you (got) there, they were making money trying to sell you something or making money based on hits or trying to sell ring tones."

MySpace said the pair sent more than 730,000 messages to MySpace members, many made to look like they were coming from trusted friends, giving them an air of legitimacy. Under the 2003 federal anti-spam law known as CAN-SPAM, each violation entitles MySpace to $100 in damages, tripled when conducted "willfully and knowingly."

In court papers, MySpace said the activities resulted in bandwidth and delivery-related costs, along with complaints from hundreds of users. The company also said some of the outside Web sites contained adult material, potentially harming teens who use MySpace.

The Los Angeles-based company described the amount of the award as a "landmark."

John Levine, a board member for the anti-spam advocacy group Coalition Against Unsolicited Commercial Email, said that past spam judgments he knows of have been in the tens of millions of dollars.

There was no telephone listing for Wallace in the Las Vegas area, to which he moved in 2004 to pursue night club promotion work. Service was disconnected for two listed numbers for Rines in Stratham, N.H., his last known address; a third number in Stratham was unlisted.

Collins awarded the amounts sought by MySpace: $157.4 million jointly against Rines and Wallace and an additional $63.4 million against Rines under CAN-SPAM - plus $1.5 million more against the pair under California's anti-phishing law and $4.7 million in attorneys fees. MySpace said it was entitled to another $3 million from Rines and Wallace under a different section of CAN-SPAM.

Collins also issued injunctions barring similar activities in the future.

MySpace has another anti-spam case pending against a high-profile defendant, Scott Richter, who it claims gained access to MySpace profiles using stolen passwords and then sent spam bulletins from those accounts.

MySpace said the junk messages from Wallace and Rines came after Richter's.
http://apnews.excite.com/article/200...D90L6QC00.html





Data Centers, Power Consumption, and Global Warming - Will the Web Crash?
Tyler Shears

So you’ve heard the hype on going green, wouldn’t you like to know how the internet fits into the big picture of saving energy? Every time you search Google you could power an 11-watt light bulb for an hour… Think that’s bad? Wait until you put that into perspective including sites like YouTube and every other bandwidth hog on the web…

So you now know one single Google search query consumes 2 to 8 watt-hours of energy. To put this on a scale, Google processes petabytes of information on a daily basis while indexing the web and doing other various things. If we average this out to 4.5 watt hours per query, and consider Google is easily handling 400 million queries a day based on comScore metrics, then we can see 1,800,000,000 (1.8 billion) watt-hours of energy being used daily just for basic search queries. The Google Complex itself uses the amount of power as 3,333 California homes.

If you’d dare to look at the bandwidth from a site like YouTube (making up over 10% of total internet bandwidth usage) and put into perspective how much power is required to simply run a search query versus serving up video content, the issue should become a bit more clear. Myspace, Facebook and the other networks sites of the like are also bandwidth hogs sharing robust amounts of digital media at high speeds.

And I digress…

How are we going to reduce the overall power consumption of the internet?

How are we going to reduce the overall heat consumption?

And do we really need to…

When a big company like Intel or Google refers to “greening” or “going green” with their server technologies the first step is finding a renewable or more efficient power source. Generally wind-power and biomass come to mind, but we’re going to need more than that to power the web as you can already see.

Right now there’s strong efforts by Intel and Google to start going green with their data center technology. Is this enough? I’m convinced that if the overall public keeps the pressure on going green and saving our environment that our technology will match pace and hopefully save the day… but in a less ideal world we’ve got bigger problems.

The amount of heat produced by these data centers is another intimidating issue we have to face… With the currently technology available we’re forced to use AC units and massive cooling centers to keep all of the servers at around 70 degrees or less. The hot air gets pumped out of the centers and usually outside, although some companies are finally using this excess heat to power office buildings and heat up pools in surrounding areas. Again, this is a good step and recycling is always ideal… but what about all this heat?

Shouldn’t the focus be on creating less heat rather than reusing the heat more effectively? A great deal of power used at these data centers is used in the cooling process alone, sometimes even more in cooling than actually running the servers. There’s a debate as to whether to use forced air cooling or liquid cooling, but either way you’re using a ton of power to cool off your servers. While it seems the big chip manufacturers are focusing on this, it becomes less pressing of an issue when you just find better ways to use the heat… but this is also a problem.

What About Global Warming?

How is that going to effect the cooling of these servers? Imagine how much harder it is to cool your house in the middle of the summer as it is, what if everything was a few degrees warmer? Well multiply that feeling time 10,000 and that’s the kind of issues data centers face. If we don’t set the pace now and start making our top priority in reducing overall heat production in data centers, we may end up with data centers that can’t cool themselves. No data centers, no internet.

What do you think will happen?
http://www.gimmiethescoop.com/data-c...-the-web-crash





This, From That
John Schwartz

The muffins are rolling.

The muffin cars, electric-powered vehicles built to resemble cupcakes, scoot around the open spaces of the San Mateo Event Center & Expo, a sprawling fairground about 20 miles south of San Francisco and, on this day, a million miles from normal.

Just inside the gates of the third annual Maker Faire, a converted fire engine belches an occasional explosive flare that sends a chest-pounding Pfoomp! throughout the fairground, startling bystanders over and over again. That contraption was made by folks from the Crucible, an industrial arts studio based in Oakland where people can take lessons in welding, blacksmithing and many, many other ways to play with heat and flame.

Nearby is the Swarm, a set of 30-inch cut-aluminum orbs that roll around on the grass, self-powered but guided by remote control. Children are playing keep-away with them.

But they are definitely not playing tag with Justin Gray’s fire sculptures around the corner. It could have something to do with the fact that they look like menacing tanks on clanking treads. Or it could be the way Robot Libby, the one that emits a horrifying turbine whine from a metallic ball bobbing on a heavy iron chain, spits gouts of multicolored flame. (As Mr. Gray manipulates the remote control, the machine mixes powders into the flame to change its color: strontium for red, copper for bluish green, steel powder for a fireworks effect.) Each burst sends a heat wave that rocks the onlookers back a step or two.

At first blush, then, this festival, sponsored by Make magazine, is a gathering place of pyromaniacs and noise junkies, the multiply pierced and the extensively tattooed. But wander awhile, and the showy surface gives way to a wondrous thing: the gathering of folks from all walks of life who blend science, technology, craft and art to make things both goofy and grand.

“We are grabbing technology, ripping the back off of it and reaching our hands in where we are not supposed to be,” says Shannon O’Hare, who has brought his three-story Victorian mansion on wheels, one of the most prominent examples of the anachronistic style known as steampunk, to the Faire. He is holding forth in a vintage British military uniform and pith helmet, and is gesturing with a hand that holds a sloshing tankard of ale.

“We’ve been told by corporate America that we cannot fix the things we own,” says Mr. O’Hare, who goes by Major Catastrophe and works as a fabricator for the stage and businesses. “All we can do is buy their stuff and like it.” Cars have become too complex to work on under a shade tree, and people have no idea what is inside their cellphones and cameras. “All this technology, and it’s not ours. It’s somebody else’s,” Mr. O’Hare says. “ Make is about taking that back off and making it yours.”

The makers, as they call themselves, are a varied bunch. Cris Benton, the former chairman of the architecture department at the University of California, Berkeley, stood at the Faire, patiently explaining how he and his like-minded friends take aerial photographs by hoisting cameras on kites, a cunning combination of high tech and old crafts.

In the darkened building next door, Terry Schalk, a professor at the University of California, Santa Cruz, fires up an enormous, arc-throwing Tesla coil in hopes of getting youngsters more interested in science.

“This is a real geek fest,” says Professor Schalk, a high-energy physicist in both senses of the phrase.

“If I was a kid, I’d wet my pants here,” he joked.

Some 65,000 people came to see the sprawling display of inventiveness and potentially hazardous fun. Many of them read Make magazine and its sister publication, Craft, and go to Web sites like Instructables.com that encourage people to take on projects and share what they learn. (Recent online projects have shown people how to convert a novelty French-fry telephone into a carrying case for an iPod; how to make a computer-powered coffee warmer from an old Intel Pentium chip plugged into a P.C.’s U.S.B. port; and how parents and children can build a small vibrating robot together.)

Armchair MacGyvers visit Web sites like BoingBoing.net that lovingly chronicle the more audacious projects here and at events like the anarchic Burning Man festival in the Nevada desert. These overlapping, even incestuous, communities form the “maker movement” of do-it-yourself enlightenment. In an age where just about every human activity, from shopping to sex, can be performed in the virtual world, they choose to get their hands dirty.

This is part of the Bay Area’s high-tech, adamantly nonconformist culture, steeped in engineering and art and innovation in garages that incubate billionaires and crowded with guys who make late-night runs to the pharmacy for bandages and burn cream. But it is not just a California thing. Make has fans around the world, with a paid circulation of 100,000; its Web site gets 2.5 million visitors each month. The publisher has started a second Faire in Austin, Tex., with hopes of further expansion.

The founders of the magazine and the Faire are tugging on a thread that makes its way across America’s gearhead culture, zigzagging back through the Homebrew Computer Club, which helped produce the first personal computers, and Roy Doty’s how-to cartoons in Popular Mechanics magazine. But it goes farther still, back to those two bicycle mechanics, Orville and Wilbur Wright, and even back to those tinkerers Benjamin Franklin and Thomas Jefferson, whose hand-designed folding chairs are an elegant marvel.

What the makers are doing, then — mixing and matching technologies and hacking and tinkering — is encoded within the nation’s DNA.

“It’s deeply American,” said Xeni Jardin, an editor of BoingBoing. As for the family-friendly setting, she said, “It’s like Burning Man without all the icky hippie elements, without the pants-free guy on a bike.”

Edward Tenner, an author of works on the ways that technology affects society, said tinkering had waxed and waned but never disappeared in American culture. A great deal of mechanical know-how, he said, came from people raised on farms, where they had to fix their own equipment. But these days, he said, “this improvisation is starting to flourish in a mainly suburban and perhaps urban milieu.”

As important as tinkering has been to the nation’s past, it could become a much bigger deal before long, said David Pescovitz, a research director at the Institute for the Future, a consultancy in Silicon Valley. A new report from the institute argues that the makers could force enormous changes in the ways that goods and services are designed and manufactured. The renewed urge to tinker, along with flexible manufacturing technologies, could shift production from big companies and stores to communities of makers and consumers, Mr. Pescovitz said.

“It’s about having a deeper connection with the stuff around you, and through that with the people around you,” he said. That is why his research group took the slogan from the pins given out at the Futurama pavilion at the 1939 World’s Fair — “I have seen the future” — and edited it for the report to “I am making the future.”

“If you want something done right, do it yourself. That’s really what it’s about,” Mr. Pescovitz said.

It is, then, a new realm of hacking, in the fine original meaning of the term among techies. That now-debased term, as the author Steven Levy put it in his book “Hackers: Heroes of the Computer Revolution,” originated at the Massachusetts Institute of Technology model railroad club in the 1960s in the context of solutions to problems that showed “innovation, style and technical virtuosity.”

Hacking moved from model trains to software. But now it is returning to its roots in the physical world, as hobbyists hack their computers, their cars and just about anything else they can pry open, even if it voids the warranty.

Tim O’Reilly, the founder of O’Reilly Media, the company that publishes Make and Craft, said he felt echoes of the urge to transform tools and toys that he saw with the original personal-computer hobbyists in the 1970s and with the open-source software movement more recently. “We’ve ridden this wave before,” Mr. O’Reilly said. “We see hackers first, and then we see entrepreneurs and then we see it become part of the mainstream. And we’re still in that early hacker-enthusiast phase, but I’m really convinced that there is a manufacturing revolution on its way as part of what we’re seeing here.”

Which brings us back to the muffin cars. Keith Johnson and his daughter Karydis zip around the fairground in his cupcake-shaped runabout, which conceals a tiny electric all-terrain vehicle and the handlebars from a Hello Kitty bicycle. The “frosting” is sprinkled with oversize Prozac capsules. His head, and his baby’s, poke up out of a hole in the frosting.

His is one of more than a dozen cupcakes at the Faire. A founder of the cupcake makers group, Greg Solberg, is an engineer with Tesla Motors, a company that makes high-performance electric cars. Mr. Johnson is a specialist in preserving digital materials at Stanford University. The community of cupcake-car makers once rigged each car with speakers tied into an FM radio transmission system so they could all play the same music, whether the soundtrack from Disney’s Main Street Electrical Parade or Wagner’s “Ride of the Valkyries.”

When you see the members of the Acme Muffineering team rolling through their formations, however, it is difficult to suppress a single word trying to bubble up through the mists of consciousness: Shriners.

The Bay Area, Mr. Johnson notes, has a community of people whose left brains and right brains are on speaking terms, and who like to make things — as he put it, “to combine the skills that they use in their professions with their creativity to create whimsical and wonderful and sometimes useful things.”

The transport may be silly, Mr. Johnson acknowledges, but the theme is green. “We like to encourage people to use their imaginations and build energy-efficient and fun cars,” he said.

Those who came to the show did not necessarily take such a philosophical approach. Matt Miller, a postdoctoral student at the University of California, San Francisco, said he was back for his second Faire because “I like fire.” He said he subscribed to Make because he didn’t have a lot of time but lived “vicariously through others’ hobbies.”

Roxanne Stafford, a designer who visited the Faire without knowing much about it, said she was “a little overwhelmed” by the size, the variety and the noise.

She added, however, that she found an underlying message in it all. With the ghastly images from the Iraq war and the uses of technology that usually make the news, it is easy to conclude that people simply make things and use technology “to destroy one another,” she said.

“Things like Maker Faire give people hope,” she said. “Creativity is the best expression of humanity.”
http://www.nytimes.com/2008/05/13/sc...make.html?8dpc





Craig (of the List) Looks Beyond the Web
Noam Cohen

Imagine what it might have been like to be Dr. Kleenex. You invent a modern miracle, the cheap paper handkerchief, and suddenly you become the person blamed for America’s disposable culture, praised for a more convenient life, or both.

There never was a Dr. Kleenex, though — the product was created by a team of researchers at Kimberly-Clark laboratories in the 1920s. But there is a real Craig in Craigslist, and lately he is looking at life beyond his little list that happens to be the seventh-most-popular Web site in the United States.

It is also a site that is deeply tied up with the fate of newspapers — indeed, many in the newspaper industry blame the site’s founder, Craig Newmark, for the downturn in their classified-advertising business.

An ardently no-frills, ad-free, user-sensitive site, Craigslist has, by the estimate of its chief executive, Jim Buckmaster, generated more than 600 million free classified listings. (Though nearly all listings remain free, Craigslist has added modest fees for job listings and real estate brokers in certain big cities, and from those fees the company generates $80 million to $100 million in annual revenue. It has a staff of 25, including Mr. Newmark.)

In the United States and beyond, Craigslist is digging even deeper into the classified-ad markets. Once, an announcement that Craigslist was expanding meant adding cities like Miami, Minneapolis and Philadelphia. These days, it means smaller places like Janesville, Wis., (population: about 60,000) and Farmington, N.M., (roughly 38,000) as well as Cebu in the Philippines and, by Mr. Newmark’s request, a site for Ramallah on the West Bank.

In the face of this expansion, Mr. Newmark is becoming more of a public figure, capitalizing on his success to promote causes that include supporting the Barack Obama campaign and financing investigative journalism — not, he insists, to compensate for any damage Craigslist has done to the newspaper business, which he calls “an urban myth.”

Sitting in a coffee shop in San Francisco a month ago, explaining his plans in neat mathematical style, Mr. Newmark presented an unassuming public presence. He was perched on an ordinary seat, a six-year-old Prius parked nearby, a Kangol beret on his balding head.

He used to spend two-thirds of his time working on customer service issues (including notifying an Internet service provider about a scammer on the site), he said, and the remaining third on “founder issues,” a catchall term he uses for his public-spirited work. That division, he said, would now be half and half.

But before he can extricate himself from customer issues, Mr. Newmark will have to resolve some of the growing business and legal complexities that surround Craigslist, a laid-back operation that is bumping into tough-minded competitors.

A Delaware lawsuit accuses him and Mr. Buckmaster of boardroom chicanery, an assertion they emphatically deny. Their accuser is the online giant eBay, which became a minority shareholder in 2004, with a stake of roughly 28 percent.

And while officials at Craigslist, including Mr. Newmark, maintain that for many years he has not had a significant leadership role there, the eBay lawsuit describes Mr. Newmark, in addition to being a large shareholder, as chairman (the board has two members; it had been three).

The suit was set in motion by eBay’s decision to introduce a rival online-classified site, Kijiji, in the United States last year. Kijiji is already the market leader in Canada, Germany, Italy and Taiwan.

EBay’s complaint contends that after the Kijiji move, Mr. Newmark and Mr. Buckmaster plotted in secret to dilute eBay’s influence in the company, including an effort to deprive it of its board seat. The lawsuit asks the court to reverse those provisions.
Craigslist is expected to respond to the complaint this month, but on its blog it offered an assessment: “Sadly, we have an uncomfortably conflicted shareholder in our midst, one that is obsessed with dominating online classifieds for the purpose of maximizing its own profits.”

The phrase “maximizing its own profits” broadly outlines the fight between the two companies.

Despite its success, Craigslist prides itself on its grass-roots instincts and user-based content — including harnessing its users to identify and block bad actors on the site. Even broad strategic decisions, such as which areas to expand into, are described as reflecting user requests made at online forums at the site.

As the complaint indicated, last year Mr. Buckmaster wrote to Meg Whitman, then the chief executive of eBay, saying, “We are no longer comfortable having eBay as a shareholder, and wish to explore options for our repurchase, or for otherwise finding a new home for these shares.”

In an e-mail message of its own, eBay stressed that the two companies would remain joined. “We would obviously prefer to see this resolved without litigation,” eBay wrote. “With that said, we will only accept a resolution that preserves our rights and the full value of our investment in Craigslist. We will continue to act openly and in good faith as a minority shareholder.”

The competition between the companies is also heating up outside court. EBay has recently sent e-mail messages to its users promoting Kijiji, and Craigslist in the last few weeks has added 120 cities, half of them overseas, where Kijiji has been dominant.
The Web sites’ expansion comes as newspapers are experiencing a steep downturn in classified advertising, magnified by the badly depressed housing market and weaker overall economy. Print classified advertising declined 16 percent last year, to $14.2 billion, according to the Newspaper Association of America, below the 1996 level, even without adjusting for inflation.

In this straitened market, Craigslist becomes shorthand for the threat that online advertising outlets are seen as posing to newspapers.

Mr. Buckmaster responds, saying that Craigslist has no sales force and has not sought to win over newspaper advertisers, in contrast to companies like the job-listing site Monster. “That to me is a direct attack on newspapers,” he said. “We put a service out there.”

“There are bigger things that have been more problematic for newspapers,” he added, including circulation losses and basic mismanagement. “Newspapers have an enormous amount of debt. That is not something that can be laid at our doorstep.”

Clayton Frink is the publisher of The Capital Times in Madison, Wis., where Craigslist arrived in 2005. The newspaper late last month stopped printing daily, adopting a Web strategy and printing weekly.

“They have ads we would have had once upon a time,” he said, but added that his staff did not consider it “No. 1 or No. 2 or 3 of Web sites that hurt our business.” The bigger enemy, he said, is the changing marketplace, noting that large employers used to buy a page and a half for job listings and “now they put in a small ad saying to see their Web site.”

“What Craigslist does well is build a community and a feel of a community,” he said. “Building communities is going to be critical for any online product, whether a newspaper or not.”

Also, Craigslist no longer sneaks up on local newspapers. Sammy Lopez, publisher of The Daily Times in Farmington, said: “We’ve been kind of watching them. You can get on Craigslist and see if people have been requesting a site. I asked someone to look at that four or five months ago, and saw that they had.”

He said the knowledge that Craigslist would be arriving someday led the paper to improve its online presentation of classified ads, creating more categories and clear entry points. He noted that a vibrant classified-ad section was both a revenue source and a reason that people buy the paper and visit the Web site.

Mr. Newmark is a believer in the power of technology to improve life — whether in the blogging he does for Mr. Obama, a visit he recently made to Israel where he argued in favor of microloans and technological innovation to build up the Palestinian economy, or the use of online tools to make government more transparent.

He promotes these projects on his personal blog. As of the last couple of weeks, he has been writing posts on Twitter.com, too.

The list of good-government and good-journalism Web sites Mr. Newmark is involved with — sometimes financially, but more often as adviser and advocate in the Silicon Valley world — speak for themselves: factcheck.org, sunlightfoundation.com, PRWatch.org, NewsTrust.net, publicintegrity.org.

An article in The Observer of London two years ago described him as “readying his armory of cash to invest in citizen journalism projects.” Mr. Newmark says he never donated more than $20,000 to any organization.

But he has not followed the common path to Silicon Valley philanthropy — create a successful Web site, sell the Web site either to a larger company or through an initial public offering, acquire a pile of cash, then give away part of that.

While unwilling to discuss his wealth, he said he could be a lot richer if he wanted to. “We know these guys in Google and the eBay guys,“ he said, “and they are not any happier than anyone else. A lot of money is a burden.”
http://www.nytimes.com/2008/05/12/te...y/12craig.html





Craigslist’s Countersuit Criticizes eBay’s Tactics
Laurie J. Flynn

Craigslist, the online classified ad company, filed a countersuit Tuesday against its minority owner eBay, accusing it of unfair competition, false advertising, trademark infringement and diluting the value of the Craigslist trademark.

Craigslist’s lawsuit, filed in California Superior Court in San Francisco, is the company’s first substantive response to a lawsuit eBay filed against Craigslist last month in the Delaware Court of Chancery accusing the smaller company of unfairly and secretly trying to dilute the value of eBay’s investment in the company by more than 10 percent and deprive it of a board seat.

The countersuit exposes how the tension between the companies has been growing since shortly after eBay’s 2004 purchase of a 28.4 percent interest in Craigslist. Craigslist’s suit says eBay has continually tried to exert control over Craigslist, a privately held company in San Francisco that is widely known for its anticorporate philosophy.

It revealed that eBay acquired the shares by buying an option to acquire the shares of a minority shareholder of Craigslist, whom the company did not identify. The suit said that because eBay’s option prevented Craigslist from finding another buyer, Craigslist then repurchased the shares and issued new shares to eBay.

The suit does not state the purchase price or give a value for the shares owned by Craig Newmark, Craigslist’s founder, or Jim Buckmaster, its chief executive.

In its suit, Craigslist asks the court to restore eBay’s holdings to Craigslist.

The company has also accused eBay of “business interference, false advertising, phishing attacks, free-riding” and other misdeeds.

Kimberly Rubey, an eBay spokeswoman, called Craigslist’s claims "unfounded and unsubstantiated" and described them as ploy to distract attention from eBay’s claims in its suit. “EBay has, and will continue to be, a minority shareholder who believes in Craigslist, shares its values and acts with openness, honesty and integrity in its dealings with Craigslist’s board and the online community,” Ms. Rubey said. “We strongly refute any suggestion to the contrary.”

Craigslist said that while the two companies agreed that eBay’s interest in Craigslist would not preclude the two companies from competing, eBay misused its role as minority owner of Craigslist to gain access to company information and then use it to compete unfairly.

Craigslist contends that eBay used its shareholder status to plant on Craigslist’s board company officials who had responsibility for a competing site, Kijiji.com.

Craigslist added, “Under the guise of shareholder requests for information, eBay has hounded Craigslist with improper demands for confidential Craigslist information, which could be used for anticompetitive purposes."

Craigslist also accused eBay of diluting the value of the Craigslist trademark by diverting customers looking for Craigslist to the Kijiji site. Craigslist’s suit says that eBay placed misleading advertising on Google.com intended to direct users to Kijiji. Inside eBay, the suit contends, Kijiji is known as the “Craigslist killer.”

On several occasions, Meg Whitman, eBay’s former chief executive and a member of the board, has expressed an interest in acquiring the remainder of Craigslist, the suit contended. The suit also says that after buying a Dutch classified ad site for $290 million, an eBay official asked Craigslist executives, “What do you think we would pay for the largest classified ad site in the United States?”
http://www.nytimes.com/2008/05/14/te...gy/14ebay.html





XM Satellite Loss Widens

XM Satellite Radio Holdings Inc reported a wider first-quarter loss on Monday as costs to lure and retain subscribers rose.

XM, which is awaiting regulatory approval of its proposed merger with Sirius Satellite Radio Inc, said its first-quarter net loss was $129 million, or 42 cents per share. That compared with $122 million, or 40 cents per share, a year earlier.

Its loss excluding merger-related expenses appeared to be in line with the average analyst forecast of 41 cents, according to Reuters Estimates, but it was not immediately clear if the numbers were directly comparable.

Revenue rose 17 percent to $308 million, which was lower than the average analyst forecast of $313 million, according to Reuters Estimates.

Washington-based XM, whose program lineup includes Major League Baseball and Oprah Winfrey, added about 303,000 net new subscribers and ended the quarter on March 31 with 9.33 million subscribers compared with 7.91 million subscribers in the first quarter of 2007.

XM said the average cost of adding each subscriber, a measure known as subscriber acquisition cost (SAC), rose to $73 in the first quarter from $65 a year earlier. Cost per gross addition, which includes SAC as well as marketing costs, declined to $99 from $103.

Its churn rate, a measure of subscribers that quit the service, held at 1.8 percent.

Sirius is expected to report its quarterly results later on Monday.

The results come as the two companies await the opinion of the U.S. Federal Communication Commission, after the U.S. Department of Justice approved the deal in March. XM and Sirius hope to convince regulators that the deal would provide consumers with more choice in radio programming and could lead to lower prices in some cases.

Critics of the deal, which includes the main lobby group for the terrestrial radio industry, say it would create a monopoly of satellite providers.

(Reporting by Franklin Paul and Yinka Adegoke; Editing by Derek Caney)
http://uk.reuters.com/article/mediaN...AS355120080512





Sirius Revenue Up 33% In First Quarter
FMQB

Sirius Satellite Radio announced first quarter fiscal results for 2008, with a 33 percent increase in revenue and a narrowing of the satcaster's losses. Total revenue was up to $270.4 million from $204 million in the first quarter of '07. Average monthly revenue per subscriber was $10.42 in Q1, down slightly from $10.46 per subscriber last year. Sirius ended the quarter with 8,644,319 subscribers, a 31 percent increase from the end of Q1 2007. Sirius saw its net loss shrink by 28 percent, from $144.7 million in '07 to $104.1 million in this year's first quarter.

"Sirius continues to demonstrate robust subscriber and revenue growth, along with strong cost discipline and significant improvement in our bottom line," said CEO Mel Karmazin. "Compared with a year ago, first quarter 2008 subscribers grew 31%, revenue grew 33%, while cash operating costs only grew 8%, leading to a 55% decline in our adjusted loss from operations. We await the FCC decision on our pending merger with XM, and we are eager to deliver the strong benefits of the combined company to our subscribers and stockholders."
http://fmqb.com/Article.asp?id=699334





Clear Channel, Lenders Resolve Dispute Over Buyout
Joseph Altman

Clear Channel Communications Inc. has settled a legal dispute with the lenders funding its private equity buyout, clearing the way for the radio and outdoor advertising company to finally seal the deal nearly two years after it was first announced.

Under the agreement announced late Tuesday, Clear Channel shareholders would receive $36 a share, down from the earlier price of $39.20 a share and less than initial offers rejected by some shareholders as too low. That reduces the deal's value to $17.9 billion from $19.5 billion.

San Antonio, Texas-based Clear Channel and its private equity buyers, Bain Capital and Thomas H. Lee Partners, had sued a consortium of six banks, accusing them of trying to undermine the deal by changing the terms.

Proceedings in that lawsuit in a Texas court, and in a separate suit filed by the equity firms in New York, were delayed Monday as the parties continued to haggle over whether the banks must fund promised loans for the takeover.

Tuesday night's agreement settles those lawsuits, but the amended buyout offer still requires shareholder approval.

"This revised agreement is a win for our shareholders because it provides them with substantial value and certainty while avoiding the delay and inherent risks associated with complex litigation," Clear Channel Chief Executive Mark Mays said in a written statement.

The buyout of the nation's largest radio station operator and a global powerhouse in outdoor advertising has been tumultuous from the beginning.

First, some shareholders insisted on a higher per-share price and a chance to keep owning a part of the privatized company. Then the credit markets seized up and banks, once eager to fund ever bigger leveraged buyouts, got skittish, and Clear Channel's share price declined on fears the deal wouldn't close.

After Clear Channel announced the original deal in November 2006, the equity partners were twice forced to raise their offer when some large shareholders signaled they would oppose earlier bids of $37.60 and $39 per share. The offer of $39.20 was finally approved in September 2007.

Some shareholders also wanted to continue owning a minority stake, and the buyers agreed to allowed them to retain as much as 30 percent of the new entity, a concession maintained in the settlement Tuesday.

Clear Channel said it now expects the deal to close by the end of the third quarter, but the parties have agreed to extend the deadline for completion of the takeover to Dec. 31.

The private equity investors and the banks will deposit their funds into an escrow account within 10 business days to help ensure the deal will go through, Clear Channel said.

A busted deal would have subjected the private equity firms to roughly $500 million in fees. But funding the loan at the original terms would have cost the banks $3 billion to $4 billion in write-downs with fewer institutions looking to buy up the debt.

As deadlines approached for the deal to get completed, the equity firms and Clear Channel accused the banks of trying to sink the buyout by changing the loan terms, a charge the banks have denied.

The lawsuits accusing Citigroup Inc., Morgan Stanley, Credit Suisse Group, Wachovia Corp., Deutsche Bank AG and The Royal Bank of Scotland Group PLC of tortious interference were filed in March.

"The banks are very pleased to have reached a constructive resolution of the matter," said Chad Leat, chairman of Citigroup's alternative asset group and a representative of the lenders.

Clear Channel shares gained $1.43, or 4.4 percent, to close at $34.30 Tuesday. The shares had jumped nearly 10 percent the previous day, when reports surfaced that the parties were working on a settlement that would re-price the deal at $36 per share.
http://hosted.ap.org/dynamic/stories...LATE=DEFAUL T





NPR Station WBUR Boston Adds Support for Free Audio Standard

The Free Software Foundation (FSF) has marked a milestone in their PlayOgg.org campaign with the announcement that National Public Radio (NPR) news station WBUR Boston has begun worldwide webcasting in the free audio format Ogg Vorbis.

Robin Lubbock, WBUR's director of new media said, "WBUR has a great schedule of news and information programming 24 hours a day, which we are very happy to make available to Ogg Vorbis listeners. It's exciting to work with the Free Software Foundation to give a new audience the chance to listen to WBUR's award winning programing as well as the wonderful programs from NPR and the BBC Worldservice that you can find daily on WBUR."

Peter Brown, executive director of the FSF, responded to the news stating, "I would like to thank WBUR general manager Paul La Camera, for so graciously listening to the case we made for free audio standards. The leadership displayed by WBUR in providing a free audio format will help to bring this issue the national attention and recognition it deserves, and will serve as a vital step in educating the public and other publicly funded radio stations. We urge NPR listeners to stream WBUR's Ogg Vorbis stream, and to acknowledge and thank WBUR for this work when making your contributions."

Unlike MP3, Windows Media, Real Audio or Quicktime, Ogg Vorbis is not restricted by software patents. The threat of these patent lawsuits chills independent development of multimedia software tools. The use of unencumbered formats like Ogg Vorbis is necessary for providing access to publicly funded news and other programming without dependence on the patent-holding corporations and proprietary software vendors.

Patent-encumbered formats owned by companies like Microsoft and Apple require listeners to use non-free software; controlled by them, not by the users. They design their software to restrict the users and spy on their activities. If users choose Ogg Vorbis for audio and Ogg Theora for video, they can use many different media players, including free software designed to respect their freedom and privacy.

Joshua Gay, FSF campaigns manager explained the campaign, "[i]t is time for our publicly funded broadcasters to take seriously the impact their decisions to webcast only in proprietary formats have on the future of free unencumbered audio standards. Today, WBUR has made an important commitment to free standards, and we are now working with other publicly funded broadcasters to follow their example".

The WBUR stream is available at http://www.wbur.org/listen/, or you can go directly to http://www.wbur.org/listen/feed/ogg.m3u.

Resources and a mailing list to track related events can be found at http://PlayOgg.org. Technical details about the Ogg Vorbis format are at http://xiph.org/vorbis/

About The Free Software Foundation

The Free Software Foundation, founded in 1985, is dedicated to promoting computer users' right to use, study, copy, modify, and redistribute computer programs. The FSF promotes the development and use of free (as in freedom) software -- particularly the GNU operating system and its GNU/Linux variants -- and free documentation for free software. The FSF also helps to spread awareness of the ethical and political issues of freedom in the use of software, and its Web sites, located at fsf.org and gnu.org, are an important source of information about GNU/Linux. Donations to support the FSF's work can be made at http://donate.fsf.org. Its headquarters are in Boston, MA, USA.
http://www.fsf.org/news/wbur-streams-ogg-vorbis





Milestones

Robert Rauschenberg, Titan of American Art, Is Dead at 82
Michael Kimmelman

Robert Rauschenberg, the irrepressibly prolific American artist who time and again reshaped art in the 20th century, died Monday night. He was 82.

His death was confirmed by his gallery, PaceWildenstein in Manhattan.

Mr. Rauschenberg’s work gave new meaning to sculpture. “Canyon,” for instance, consisted of a stuffed bald eagle attached to a canvas. “Monogram” was a stuffed Angora goat girdled by a tire atop a painted panel. “Bed” entailed a quilt, sheet and pillow, slathered with paint, as if soaked in blood, framed on the wall. They all became icons of postwar modernism.

A painter, photographer, printmaker, choreographer, onstage performer, set designer and, in later years, even a composer, Mr. Rauschenberg defied the traditional idea that an artist stick to one medium or style. He pushed, prodded and sometimes reconceived all the mediums in which he worked.

Building on the legacies of Marcel Duchamp, Kurt Schwitters, Joseph Cornell and others, he thereby helped to obscure the lines between painting and sculpture, painting and photography, photography and printmaking, sculpture and photography, sculpture and dance, sculpture and technology, technology and performance art — not to mention between art and life.

Mr. Rauschenberg was also instrumental in pushing American art onward from Abstract Expressionism, the dominant movement when he emerged during the early 1950s. He became a transformative link between artists like Jackson Pollock and Willem de Kooning and those who came next, artists identified with Pop, Conceptualism, Happenings, Process Art and other new kinds of art in which he played a signal role.

No American artist, Jasper Johns once said, invented more than Mr. Rauschenberg. Mr. Johns, John Cage, Merce Cunningham and Mr. Rauschenberg, without sharing exactly the same point of view, collectively defined this new era of experimentation in American culture. Apropos of Mr. Rauschenberg, Cage once said, “Beauty is now underfoot wherever we take the trouble to look.”

Cage meant that people had come to see, through Mr. Rauschenberg’s efforts, not just that anything, including junk on the street, could be the stuff of art (this wasn’t itself new), but that it could be the stuff of an art aspiring to be beautiful — that there was a potential poetics even in consumer glut, which Mr. Rauschenberg celebrated. “I really feel sorry for people who think things like soap dishes or mirrors or Coke bottles are ugly,” he once said, “because they’re surrounded by things like that all day long, and it must make them miserable.”

The remark reflected the optimism and generosity of spirit that Mr. Rauschenberg became known for. His work was likened to a Saint Bernard: uninhibited and mostly good-natured. He could be the same way in person. When he became rich, he gave millions of dollars to charities for women, children, medical research, other artists and Democratic politicians.

A brash, garrulous, hard-drinking, open-faced Southerner, he had a charm and peculiar Delphic felicity with language that nevertheless masked a complex personality and an equally multilayered emotional approach to art, which evolved as his stature did. Having begun by making quirky small-scale assemblages out of junk he found on the street in downtown Manhattan, he spent increasing time in his later years, after he had become successful and famous, on vast international, ambassadorial-like projects and collaborations.

Conceived in his immense studio on the island of Captiva, Fla., these projects were of enormous size and ambition; for many years he worked on a project that grew literally to exceed the length of its title, “The 1/4 Mile or 2 Furlong Piece.” They generally did not live up to his earlier achievements. Even so, he maintained an equanimity toward the results. Protean productivity went along with risk, he believed, and risk sometimes meant failure.

The process — an improvisatory, counterintuitive way of doing things — was always what mattered most to him. “Screwing things up is a virtue,” he said when he was 74. “Being correct is never the point. I have an almost fanatically correct assistant, and by the time she re-spells my words and corrects my punctuation, I can’t read what I wrote. Being right can stop all the momentum of a very interesting idea.”

This attitude also inclined him, as the painter Jack Tworkov once said, “to see beyond what others have decided should be the limits of art.”

He “keeps asking the question — and it’s a terrific question philosophically, whether or not the results are great art,” Tworkov said, “and his asking it has influenced a whole generation of artists.”

That generation was the one that broke from Pollock and company. Mr. Rauschenberg maintained a deep but mischievous respect for these Abstract Expressionist heroes like de Kooning and Barnett Newman. Famously, he once painstakingly erased a drawing by de Kooning, an act both of destruction and devotion. Critics regarded the all-black paintings and all-red paintings he made in the early 1950s as spoofs of de Kooning and Pollock. The paintings had roiling, bubbled surfaces made from the torn scraps of newspapers embedded in paint.

But these were just as much homages as they were parodies. De Kooning, himself a parodist, had incorporated bits of newspapers as flotsam in pictures, and Pollock stuck cigarette butts to canvases.

Mr. Rauschenberg’s “Automobile Tire Print,” from the early 50’s — resulting from Cage’s driving an inked tire of a Model A Ford over 20 sheets of white paper — poked fun at Newman’s famous “zip” paintings.

At the same time, Mr. Rauschenberg was expanding on Newman’s art. The tire print transformed Newman’s zip — an abstract line against a monochrome backdrop with spiritual pretensions — into an artifact of everyday culture, which for Mr. Rauschenberg had its own transcendent dimension.

Mr. Rauschenberg frequently alluded to cars and spaceships, even incorporating real tires and bicycles, into his art. This partly reflected his own restless, peripatetic imagination. The idea of movement was logically extended when he took up dance and performance.

There was, beneath this, a darkness to many of his works, notwithstanding their irreverence. “Bed” was gothic. The all-black paintings were solemn and shuttered. The red paintings looked charred, with strips of fabric, akin to bandages, from which paint dripped, like blood. “Interview,” which resembled a cabinet or closet with a door, enclosing photographs of toreros, a pinup, a Michelangelo nude, a fork and a softball, suggested some black-humored encoded erotic message.

There were many other images of downtrodden and lonely people, rapt in thought; pictures of ancient frescoes, out of focus as if half remembered; photographs of forlorn, neglected places; bits and pieces of faraway places conveying a kind of nostalgia or remoteness. In bringing these things together, the art implied consolation.

Mr. Rauschenberg, who knew that not everybody found it easy to grasp the open-endedness of his work, once described to the writer Calvin Tomkins an encounter with a woman who had reacted skeptically to “Monogram” and “Bed” in his 1963 retrospective at the Jewish Museum, one of the events that secured Mr. Rauschenberg’s reputation: “To her, all my decisions seemed absolutely arbitrary — as though I could just as well have selected anything at all — and therefore there was no meaning, and that made it ugly.
“So I told her that if I were to describe the way she was dressed, it might sound very much like what she’d been saying. For instance, she had feathers on her head. And she had this enamel brooch with a picture of ‘The Blue Boy’ on it pinned to her breast. And around her neck she had on what she would call mink but what could also be described as the skin of a dead animal. Well, at first she was a little offended by this, I think, but then later she came back and said she was beginning to understand.”

Milton Ernest Rauschenberg was born on Oct. 22, 1925, in Port Arthur, Tex., a small refinery town where “it was very easy to grow up without ever seeing a painting,” he said. (In adulthood he renamed himself Robert.) His grandfather, a doctor who immigrated from Germany, had settled in Texas and married a full-blooded Cherokee. His father, Ernest, worked for a local utility company. The family lived so frugally that his mother, Dora, made him shirts out of scraps of fabric. Once she made herself a skirt out of the back of the suit that her younger brother was buried in. She didn’t want the material to go to waste.

For his high school graduation present, Mr. Rauschenberg wanted a ready-made shirt, his first. All this shaped his art eventually. A decade or so later he made history with his own assemblages of scraps and ready-mades: sculptures and music boxes made of packing crates, rocks and rope; and paintings like “Yoicks” sewn from fabric strips. He loved making something out of nothing.

He studied pharmacology briefly at the University of Texas in Austin before he was drafted during World War II. He saw his first paintings at the Huntington Gallery in California while stationed in San Diego as a medical technician in the Navy Hospital Corps, and it occurred to him that it was possible to become a painter.

He attended the Kansas City Art Institute on the GI Bill, traveled to Paris and enrolled at the Académie Julian, where he met Susan Weil, a young painter from New York who was to enter Black Mountain College in North Carolina. Having read about and come to admire Josef Albers, then the head of fine arts at Black Mountain, Mr. Rauschenberg saved enough money to join her.

Albers, a disciplinarian and strict modernist who, shocked by his student, later disavowed ever even knowing Mr. Rauschenberg, was on the other hand recalled by Mr. Rauschenberg as “a beautiful teacher and an impossible person.”

“He wasn’t easy to talk to, and I found his criticism so excruciating and so devastating that I never asked for it,” Mr. Rauschenberg added. “Years later, though, I’m still learning what he taught me.”

Among other things, he learned to maintain an open mind toward materials and new media, which Albers endorsed. Mr. Rauschenberg also gained a respect for the grid as an essential compositional organizing tool.

For a while, he moved between New York, where he studied at the Art Students League with Vaclav Vytlacil and Morris Kantor, and Black Mountain. During the spring of 1950, he and Ms. Weil married. The marriage lasted two years, during which they had a son, Christopher, who survives him along with Mr. Rauschenberg’s companion, Darryl Pottorf.

Mr. Rauschenberg experimented at the time with blueprint paper to produce silhouette negatives. The pictures were published in Life magazine in 1951; after that Mr. Rauschenberg was given his first solo show, at the influential Betty Parsons Gallery. “Everyone was trying to give up European aesthetics,” he recalled, meaning Picasso, the Surrealists and Matisse. “That was the struggle, and it was reflected in the fear of collectors and critics. John Cage said that fear in life is the fear of change. If I may add to that: nothing can avoid changing. It’s the only thing you can count on. Because life doesn’t have any other possibility, everyone can be measured by his adaptability to change.”

Cage acquired a painting from the Betty Parsons show. Aside from that, Mr. Rauschenberg sold absolutely nothing. Grateful, he agreed to host Cage at his loft. As Mr. Rauschenberg liked to tell the story, the only place to sit was on a mattress. Cage started to itch. He called Mr. Rauschenberg afterward to tell him that his mattress must have bedbugs and that, as Cage was going away for a while, Mr. Rauschenberg could stay at his place. Mr. Rauschenberg accepted the offer. In return, he decided he would touch up the painting Cage had acquired, as a kind of thank you, painting it all-black, being in the midst of his new, all-black period. When Cage returned, he was not amused.

“We both thought, ‘Here was somebody crazier than I am,’ ” Mr. Rauschenberg recalled. In 1952 Mr. Rauschenberg switched to all-white paintings, which were, in retrospect, spiritually akin to Cage’s famous silent piece of music, during which a pianist sits for 4 minutes and 33 seconds at the keyboard without making a sound. Mr. Rauschenberg’s paintings, like the music, in a sense became both Rorschachs and backdrops for ambient, random events like passing shadows. “I always thought of the white paintings as being not passive but very — well, hypersensitive,” he told an interviewer in 1963. “So that people could look at them and almost see how many people were in the room by the shadows cast, or what time of day it was.”

Kicking around Europe and North Africa with the artist Cy Twombly for a few months after that, he began to collect and assemble objects — bits of rope, stones, sticks, bones — which he showed to a dealer in Rome who exhibited them under the title “scatole contemplative,” or thought boxes. They were shown in Florence, where an outraged critic suggested that Mr. Rauschenberg toss them in the river. The artist thought that sounded like a good idea. So, saving a few scatole for himself and friends, he found a secluded spot on the Arno. “‘I took your advice,’’ he wrote to the critic.

Yet the scatole were crucial to his development, setting the stage for bigger, more elaborate assemblages like ‘“Monogram.’’ Back in New York, Mr. Rauschenberg showed his all-black and all-white paintings, then his erased de Kooning, which de Kooning had given to him to erase, a gesture that Mr. Rauschenberg found astonishingly generous, all of which enhanced his reputation as the new enfant terrible of the art world.

Around that time he also met Mr. Johns, then unknown, who had a studio in the same building on Pearl Street where Mr. Rauschenberg had a loft. The intimacy of their relationship over the next years, a consuming subject for later biographers and historians, coincided with the production by the two of them of some of the most groundbreaking works of postwar art.

In Mr. Rauschenberg’s famous words, they gave each other “permission to do what we wanted.’’ Living together in a succession of lofts in Lower Manhattan until the 1960’s, they exchanged ideas and supported themselves designing window displays for Tiffany & Company and Bonwit Teller under the collaborative pseudonym Matson Jones.

Along with the combines, Mr. Rauschenberg in that period developed a transfer drawing technique, dissolving printed images from newspapers and magazines with a solvent and then rubbing them onto paper with a pencil. The process, used for works like “34 Drawings for Dante’s ‘Inferno’,” created the impression of something fugitive, exquisite and secretive. Perhaps there was an autobiographical and sensual aspect to this. It let him combine images on a surface to a kind of surreal effect, which became the basis for works he made throughout his later career, when he adapted the transfer method to canvas.

Instrumental in this technical evolution back then was Tatyana Grossman, who encouraged and guided him as he made prints at her workshop, Universal Limited Art Editions, on Long Island; he also began a long relationship with the Gemini G.E.L. workshop in Los Angeles, producing lithographs like the 1970 “Stoned Moon” series, with its references to the moon landing. His association with theater and dance had already begun by the 1950s, when he began designing sets and costumes for Cunningham, Paul Taylor and Trisha Brown and for his own productions. In 1963, he choreographed “Pelican,’’ in which he performed on roller skates wearing a parachute and helmet of his design to the accompaniment of a taped collage of sound. This fascination both with collaboration and with mixing art with technologies dovetailed with yet another endeavor. With Billy Klüver, an engineer at Bell Telephone Laboratories, he started Experiments in Art and Technology, a nonprofit foundation to foster collaborations between artists and scientists.

In 1964, he toured Europe and Asia with the Merce Cunningham Dance Company, the same year he exhibited at the Whitechapel Gallery in London and the Venice Biennale as the United States representative. That sealed his international renown. The Sunday Telegraph in London hailed him as “the most important American artist since Jackson Pollock.’’ He walked off with the international grand prize in Venice, the first modern American to win it. Mr. Rauschenberg had, almost despite himself, become an institution.
Major exhibitions followed every decade after that, including one at the Pompidou Center in Paris in 1981, another at the Guggenheim in 1997 and yet another that landed at the Metropolitan Museum in 2005.

When he wasn’t traveling in later years, he was in Captiva, a slender island off Florida’s Gulf coast, living at first in a modest beach house and working out of a small studio. In time he became Captiva’s biggest residential landowner while also maintaining a town house in Greenwich Village back in New York. He acquired the land in Captiva by buying adjacent properties from elderly neighbors whom he let live rent-free in their houses, which he maintained for them. He accumulated 35 acres, 1,000 feet of beach front and nine houses and studios, including a 17,000-square-foot two-story studio overlooking a swimming pool. He owned almost all that remained of tropical jungle on the island.

“I usually work in a direction until I know how to do it, then I stop,” he said in an interview in the giant studio on Captiva in 2000. “At the time that I am bored or understand — I use those words interchangeably — another appetite has formed. A lot of people try to think up ideas. I’m not one. I’d rather accept the irresistible possibilities of what I can’t ignore.”

He added: “Anything you do will be an abuse of somebody else’s aesthetics. I think you’re born an artist or not. I couldn’t have learned it. And I hope I never do because knowing more only encourages your limitations.”
http://www.nytimes.com/2008/05/14/ar...enberg.html?hp
JackSpratts is offline   Reply With Quote
Old 14-05-08, 10:21 AM   #2
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,016
Default

Steve Miller Band Celebrates 40 Years With DVD Set

As the Steve Miller Band marks the 40th anniversary of the release of its first two albums, it will release its first DVD, "Live From Chicago," a three-disc set due May 20.

The first disc contains live footage shot in July 2007 at Chicago's Ravinia Amphitheater during a two-day stand. Disc two takes viewers on a tour of Chicago by way of a first-person documentary that traces Steve Miller's Chicago blues roots, while the third disc provides bonus footage from the Ravinia gigs.

Portions of the DVD will be broadcast on PBS as part of its spring and summer fundraising drive.

Miller says he initially "wasn't very interested" in doing a concert DVD but was impressed by the previous work of director/producer Daniel E. Catullo III and producer Jack Gulick.

"I was really pleasantly surprised by them and how much work they put into it and what a great job they did," Miller says. "I think they really captured the kind of joy and fun and happiness we have at our concerts ... doing what we do without too much rock 'n' roll posing and that kind of bulls--t. It's a really good, straightforward representation of who the Steve Miller Band is and what we do, period."

Miller and his band are also hoping to release new, blues-oriented recordings shortly. Earlier this year, the group recorded more than three dozen blues tunes on the soundstage at George Lucas' Skywalker Ranch in Marin County, California. The troupe was joined by Sonny Charles of the Checkmates, who's now a full-fledged Steve Miller Band member. Miller tells Billboard.com that he hopes to make the recordings available sooner rather than later.

"I think I'm probably just gonna put them on my Web site and sell it that way," says Miller, who's grouped the songs into three separate albums. "I haven't figured it out yet, but I'm not too worried about it. I'm just gonna make sure everybody that wants to get it can get it."

Miller started the project with about 5,000 songs that he kept on a hard drive and eventually whittled down to the final grouping. "It's such an amazing list of great material. It just makes me laugh every time we put it on," says Miller, adding that the vast majority of tracks are covers.

"There's a lot of Junior Parker tunes, 'Next Time You See Me,' a bunch of Howlin' Wolf tunes, 'Who's Been Talkin',' some Delta blues stuff, some John Lee Hooker things, some esoteric stuff, things that you haven't heard in a long time, some Bo Diddley things like 'You Pretty Thing' ... It's just incredible what we have here."

Miller says he plans to perform many of those songs during his group's annual summer tour, which kicks off May 24 in West Palm Beach, Florida, with Joe Cocker opening, and wraps August 17 in Murphys, California.
http://www.reuters.com/article/enter...39382920080511





Music Biz Hopes Device Upgrades Boost Mobile Sector

Perhaps no single device has had more impact on mobile music than Apple's iPhone.

While only 6.7 percent of overall mobile customers use their phone to listen to music, rising to 27.9 percent for smart-phone users, a full 74.1 percent of iPhone owners reported using the device as an MP3 player, according to M:Metrics.

The majority of this music, however, is transferred from the computer, rather than purchased through the phone and downloaded wirelessly. That may change this summer once Apple unveils what many expect will be a new version of the iconic device, featuring access to high-speed third-generation (3G) wireless networks.

The company has not made an official announcement, but signs point to an early June release. Apple has stopped restocking retailers with the current iPhone version, which analysts say is a sure sign that a new model is imminent. Apple's Worldwide Developers Conference is scheduled for June 9, and CEO Steve Jobs will deliver the keynote address.

Existing iPhone models connect to an older, slower wireless network but compensate with access to high-speed Wi-Fi Internet networks. Those using the iPhone to download music from iTunes, for instance, must use this Wi-Fi connection. While certainly faster than cellular networks, Wi-Fi does not offer nearly the same range of coverage.

Apple has sold more than 5 million iPhones worldwide, but many tech-savvy buyers, particularly in Europe, have been holding out for a 3G version. Upgrading the iPhone to 3G is considered crucial if Apple is to meet its stated goal of selling 10 million iPhones this year.

Smart Phones Get Smarter

Even if Apple manages to reach its goal, the iPhone would still represent only about 1 percent of all mobile phones available. For the music industry, as significant as the iPhone mobile music usage figures are, the greater significance is how they inspire other device manufacturers to reach for similar levels. The company with the most to lose from the iPhone's momentum is Research in Motion, maker of the popular BlackBerry.

In the United States, RIM leads the smart-phone market with a 40 percent share, but Apple is close behind at 28 percent, according to research group Canalys. Apple has begun incorporating support for Microsoft-based corporate e-mail applications into the iPhone, which is considered a direct attack on the BlackBerry.

So RIM is fighting back on the iPhone's turf -- entertainment. The two newest BlackBerry devices, the Pearl and the Curve, are aimed directly at the high-end consumer market. Available music applications include a MediaGuide service that identifies songs played on the radio; streaming XM Satellite Radio; a still-pending full-track downloads service from PureTracks; and a service called NuTsie from Melodeo that enables users to play their iTunes library on either device. It also plans to unveil a 3G version of the BlackBerry, expected later in August.

Verizon's Vision

But smart phones cover only a small part of the market. In the United States, there are only about 20 million smart phones, compared with 250 million mobile phones. What the music industry wants most is to turn every mobile phone into a music-playing device.

Which is why there are high hopes for Verizon Wireless and its plans with partner Rhapsody. Record labels are looking to Verizon -- with more than 67 million subscribers and a nationwide advertising campaign that heavily incorporates music -- as the standard-bearer for mobile music in the coming year.

When MTV Networks merged its Urge music service with Rhapsody in 2007, Verizon agreed to be the mobile platform for the service. The vision is that Rhapsody will become the default music service for Verizon Wireless, but exactly how that is implemented won't be clear until this summer.

Verizon Wireless and Rhapsody originally planned to launch the service in spring 2008, but RealNetworks CEO Rob Glaser says the process is three months behind schedule because Verizon Wireless wanted to make the service available to the widest spectrum of phones possible.

The upshot is that the mobile music effort will receive a double shot in the arm -- a few iPhone and BlackBerry owners using their phones to access a lot of music, as well as a whole lot of Verizon subscribers using their phones to access just a little.
http://www.reuters.com/article/techn...51444620080512





In the studio

Cheap Thrills
Andrew Bird

I recently spent four days recording at the Wilco Loft — a gesture, most kind, extended to me by Jeff Tweedy, et al. The Loft is in my neighborhood in Chicago and has been the locus for Wilco’s recording and vintage gear collecting over the last decade. They have a cozy yet massive space with a great MCI sound board and tape machine, plus any guitar, bass, obscure amp or piece of percussion you could imagine (in perfect operating order). With Neal Jensen, our live sound engineer, behind the board, Mark Greenberg handling the digital realm, and Wilco’s loft manager Jason Tobias hosting, I brought Martin Dosh down to play drums on the tracks we recorded in Nashville and Jeremy Ylvisaker to play some bass. We also tracked the final two songs as a band. This was incredibly challenging. It should be simple, right? Put three musicians in a room, put up some microphones and press “record.”

Writing songs and performing live have with time become almost the same process for me. The improvisation and conversation with the audience from show to show keep the songs fluid and alive. On the other hand, making a record is like a show that gets drawn out over a year or more, but with no cathartic resolution. When I’m in the studio things can quickly unravel and that’s not surprising. The audience has disappeared and you are given the attractive, but dangerous option to control everything. This is why I decided to start in Nashville with the basics - voice and guitar - because it’s easy to lose your rudder in overdub realm. Knowing that the mostly unadorned Nashville songs sound great frees me up to indulge myself a bit. Sometimes you make the song better; more often than not things can get over-wrought.

Although I have a lot of excellent help, I’m producing my own record here, from microphone placement to deciding when to break for lunch. There’s a reason for the division of labor that was once the norm in the recording industry, where the producer took care of the details and delegation — even song choice — so that the musicians could just focus on performing. I’d love to be coddled and just walk on to a soundstage and do my job, but I’m afraid that relinquishing control would ultimately result in a limiting of imagination.

In the studio, a number of things can conspire to turn the natural act of making music into an awkward dance. First there is no audience, no one to impress. Second is the temptation to be too careful, to isolate every sound and not let it migle with other sounds. The third deals with the voice, the most personal and vulnerable instrument. Recording vocals can be fraught with aural illusions akin to the weirdness of hearing your own voice on your answering machine. ”That’s not me, is it?” You sing into a device that converts your voice into an electric current, which travels through wires and gadgets to a tape machine. You scrutinize that voice, make adjustments to your proximity to the microphone, switching between “head voice” and “chest voice.” When you belt it out it almost always sounds thin and small but when you sing quiet, close and intimate it sounds thick, warm and huge — but then it can lose gusto. Recording is full of counterintuitive stuff like this, so you can see how quickly the original sentiment of a song can get derailed.

There is also no guarantee that singing with emotional abandon that feels so right at that moment won’t sound totally wrong on playback. I have this intense aversion to canned emotion, yet that’s exactly what recording is: a reconstituted, canned facsimile of a performance. I am determined to subvert this and perhaps that’s why I ascribe mystical/religious properties to microphones, tape machines record players — technology that still physically touches something else. Conversely, I regard computers as necessary but heretical and potentially corrupting collaborators.

I spent the entire first day in The Loft getting the perfect violin sound. We seem to have taken a “more is more” approach, employing three separate rigs — the violin sound coming from my bridge pick-up and going through two different looping pedals and other effects into three different amps. One amp is for the rhythmic pizzicato loops; another is for the arco/bowed sound which comes out of a spinning, two-headed Victrola-like horn. The third rig is for the solo violin.

One problem that we faced here was that the lead violin coming through all the amps overpowered the structural loops. To fix that we added a third channel, which I can switch to exclusively. This seems to have worked, though we spent a lot of time scratching our heads and starting sentences with “Wait, so…” and “What if ….” We also use two room microphones to pick up the acoustic violin sound and the sound of all these amps bouncing off the walls and making all of the strings on the guitars in the room (about 60 of them) resonate sympathetically. So all together there are some six channels devoted to violin. Like I said, more is more.

Martin arrived the next day and we ended up getting the best drum sound with my old RCA 44 ribbon microphone from the 1940s. (It’s the diamond shaped mic you see in old radio and TV broadcasts.) Martin played on three Nashville tunes: “Oh No,” “Nomenclature” and “Fitz and the Dizzyspells.”

We discuss a lot of things to help us get the songs just right — like not hitting cymbals because the crashes can be “cheap thrills.” Instead we favored the dark, walloping sound of the toms. Often times the choice becomes: Do you give the song what it wants? Or do you go against its demands? “Oh No” seemed to be asking for a 1970s Jackson Brown or Fleetwood Mac type of dead snare drum sound. That “everything’s gonna be just fine” sort of beat. The pitfall of approaching it like this is that your song can get hijacked by someone else’s record collection. I personally feel that the world has had its fill of 70s light rock. So we’re forced to be more creative. Not a bad alternative, though sometimes, you just say, “Why fight it? This just feels too good.”

Another technique we used was to run the tape machine twice as fast when recording the drums so when we play them back at normal speed they drop an octave and produce a huge, warbly sound. Cymbal crashes sound especially strange. They remind me of a John Cage tone poem for a 1940’s radio show.

I know this studio talk may be less interesting to some readers, but I do actually enjoy some of the studio geekery. I feel like it is a deliberate creative process to hear a sound in my head and then rummage around for the object that makes that sound. Sometimes, as I’ve noted before, the object itself gets assigned a mystical value and must be on a song, though I know most listeners could not care less whether we use a Telefunken mic or a 30-year-old calf skin drum head.

For me, it’s more about creating a ritual and knowing that every note is getting converted to an electric signal that passes through wires and is physically written on to analog tape. I like to stay connected to physical acts and processes, like my old wind-up Victrola’s thick needle being dragged through the valleys of an old 78 r.p.m. record, as opposed to filling hard drives with weightless bits. Though I admit this may be mostly psychological, I think the old equipment helps give some value to the notes. I like to think that at least our subconscious can tell the difference. CD’s — or mp3s I should say — sound more and more like karaoke or cheap, little music boxes to me.
http://measureformeasure.blogs.nytim...cheap-thrills/





Free Music Studio Means No More Excuses
Eliot Van Buskirk

Virtual instruments may be going the way of recorded music: free and online.

We've seen plenty of sites that let you make or mix music in a rudimentary way, but none that offer the deep feature set of Hobnox AudioTool. This free online electronic music studio lets you compose with two TB-303 Bass Line generators, Roland TR-808 and TR-909 drum machines and two banks of effects pedals including three delays, crusher, detune, flanger, reverb, a parametric equalizer and a compressor. By clicking the mouse button, you can drag virtual cables between any output and any input to customize the setup.

Composing music in this way is a bit tedious, because you need to add and shape each note individually. But this is exactly how many electronic musicians work, because it allows so much control over each element of the loops and allows you to create melodies and beats without playing them.

Testing AudioTool, I encountered no serious issues, and was able to create and edit beats in the same way that one would do with Reason or similar software. The only time I noticed a drop-out was when I messed with the length of a sequence as it was playing, which isn't something you really need to do anyway. The program loads with a demo song already in place, but you can start your own composition by clicking the Clear Pattern button on each synthesizer.

The site currently requires Java, although that could change soon. The developers at Hobnox who made AudioTool would prefer to use Flash entirely, but say its support for dynamic audio is lacking. They suggest that those who want to support online virtual instruments should join the Make Some Noise campaign, which hopes to convince Adobe to add sound manipulation features to Flash and to shore up one specific unstable audio feature, allowing Hobnox and other developers to push the envelope with more evolved online music tools.

As of right now, the only way to export a song from AudioTool is to record it as it plays using Total Recorder, Audio Hijack or similar software. Hobnox says it's working on a new version of the tool will allow users to save and load songs and will add new effects, a synthesizer, a drum computer, a sequencer and even a sample editor. In addition, the next version should support collaboration, so that groups of friends can work on the same song.

If you'd like to get started with Hobnox AudioTool but haven't programmed beats before, watch this simple tutorial.
http://blog.wired.com/music/2008/05/...usic-stud.html





Trailblazers, But Selling a Romantic Kind of Love
Stephen Holden

Has any pop song evoked a generation’s romantic self-infatuation more hauntingly than Joni Mitchell’s “Woodstock”?

Sheila Weller, in her book “Girls Like Us: Carole King, Joni Mitchell, Carly Simon — and the Journey of a Generation” (Atria Books), which weaves the biographies of these singer-songwriters into a post-feminist history, writes: “It was the first line of the chorus — ‘We are stardust, we are golden’ ” — that “conveyed the impression of hundreds of thousands of people speaking as one.”

Stardust-sprinkled, golden children determined to save the world was one way of describing the youth culture’s heady self-image. The generational axiom that all you need is love persisted into the 1970s during the so-called cooling of America, when soft-rock singer-songwriters like Ms. Mitchell, Ms. King and Ms. Simon and male equivalents like James Taylor, Jackson Browne and John Denver personalized the communal conversation.

As Ms. Weller astutely emphasizes, the three singers in her biography belonged to the first generation of women to come of age with the pill. The belief in love as the answer coincided with the women’s liberation movement. An unvoiced question suggested by the book that has persisted through these women’s lives and their music is whether romantic love and promiscuity are compatible.

As fiercely as the rock counterculture rejected its parents’ tastes in music, all three women are revealed here as heavily indebted to traditional pop and its quasi-religious faith in romantic love. For Ms. Mitchell, an early epiphany was the swooningly beautiful 18th variation from Rachmaninoff’s Rhapsody on a Theme of Paganini, which she discovered in the movie “The Story of Three Loves” and visited a record store to play repeatedly. Another early idol was Édith Piaf, the French voice of female suffering and resilience. The song choices and lush arrangements on some of Ms. Mitchell’s later records pay homage to her favorite Billie Holiday torch songs.

Ms. Simon grew up in a privileged household listening to classical music and to Richard Rodgers and the Gershwins. Her career-making hit, “That’s the Way I’ve Always Heard It Should Be,” is an art song with a semiclassical melody in the style of Gabriel Fauré. But she had to wait until the early 1980s to begin recording popular standards with an orchestra.

Ms. King, who idolized Rodgers and Hammerstein, translated their aesthetic into a less flowery, Brill Building style of soul-flavored teenage pop with optimistic messages in the cheerleading spirit of Hammerstein. What is “You’ve Got a Friend” but a plainer, demystified echo of “You’ll Never Walk Alone”?

For years these women, consciously or not, suppressed their attachment to the supposedly square music of the past, the better to be current. They concentrated on folk-rock and light pop-gospel, styles that were deemed more authentic than anything to come from Broadway or Tin Pan Alley.

But if medical science allowed them to be sexual pioneers, they were still gripped by fairy-tale mythology. Even as they pursued serial relationships in and out of marriage, they embraced the credo expressed in Rodgers and Hammerstein’s quintessential postwar romantic sermon, “Some Enchanted Evening,” which imagined that true love could ignite in the eye contact of strangers across a crowded room.

In the early years of the sexual revolution, there was widespread belief by men and women alike that romantic sex was the most important thing in life, the key to happiness and a pathway to world peace. The dictum “Make love, not war” was taken seriously. It is also easy to forget that in the ’60s and ’70s, music was the rock generation’s primary mode of communication with itself, in much the same way that computers are today. In the communal, post-hippie fantasy that evaporated as the ’70s wore on, rock stars were exalted as a new hip aristocracy.

Drugs fortified the mystique. Marijuana and LSD were embraced as pathways toward a higher consciousness. Various forms of speed were easy to obtain and carried little stigma. At hip Hollywood parties jars of pills were passed around with scarcely a second thought, and cocaine became epidemic: anything to deny a steadily mounting realization that the imminent revolutions in human consciousness, politics and erotic pleasure were dreams that would not come true.

“Girls Like Us” chronicles the singer-songwriters’ lives from birth in the early and mid-1940s (born before 1946, they are technically not baby boomers, though their names are synonymous with boomer musical tastes) to the present. The pathway for personal true stories, performed by those who lived them, was paved by the established literary vogue for confessional poetry.

For those who are still curious, “Girls Like Us” is a gossipmonger’s feast that names many of the lovers and husbands referred to in the women’s lyrics. Of the three, only Ms. Simon talked to Ms. Weller. Information about Ms. Mitchell’s and Ms. King’s personal lives was compiled from extensive interviews with former husbands, close friends and relatives. The one man common to all three was James Taylor, a prince with a heroin habit (since kicked); he was Ms. King’s sometime musical partner (but not her lover), Ms. Mitchell’s lover and later Ms. Simon’s husband in a turbulent marriage that ended in divorce.

Especially in Ms. Mitchell’s songs through the late-’70s, almost every reference is explicitly autobiographical. Aside from a series of intense, tumultuous love affairs and a short-lived early marriage to a fellow folk singer, the central drama of her life, Ms. Weller says, was her early pregnancy and giving up of a baby daughter, with whom she reunited three decades later. The overriding subject of her songs through the ’70s is fervent erotic love. The passion is obsessive, tortured and combative and yields diminishing ecstatic returns as the years pass.

Ms. Simon’s notorious hit, “You’re So Vain,” Ms. Weller reports, reflected her “belle of the ball year and a half,” during which she “had belt-notched” Cat Stevens, Kris Kristofferson, Jack Nicholson, Warren Beatty and Mick Jagger. Along with Mr. Taylor, they are the most famous names in a life of ceaseless erotic adventure pursued by a self-described romantic.

Many of Ms. King’s later songs evoke her headlong infatuations with two rugged cowboy-woodsmen who became her third and fourth husbands, for whom she forsook Los Angeles to live in the wilds of Idaho, milk goats and become an environmental advocate. Of the three, Ms. King gave up the most to live out her fantasies.

Only in retrospect is it clear that the ultimate demise of traditional pop romanticism actually began later than is commonly thought. Today’s erotic pop ethos of cold heat didn’t begin to coalesce until the emergence of Madonna. Desire without passion and celebration of the body as a machine engaged in sexual competition replaced rapturous surrender in love songs. As melody, the primary vehicle for love songs, has diminished in importance, so have the number and intensity of those songs.

Having lived out your fantasies until “the heyday in the blood is tame” (to quote Shakespeare), what remains? In Ms. Mitchell’s newest album, “Shine” (Hear Music), love is barely mentioned. The stardust has turned to ash, and the gold has tarnished. As she surveys the ravaged planet, this disenchanted, 60-something ex-romantic throws up her hands and declares, “If I had a heart, I’d cry.” Passion has curdled into bitterness.
http://www.nytimes.com/2008/05/13/ar...ic/13roma.html





100 Essential Jazz Albums
David Remnick

While finishing “Bird-Watcher,” a Profile of the jazz broadcaster and expert Phil Schaap, I thought it might be useful to compile a list of a hundred essential jazz albums, more as a guide for the uninitiated than as a source of quarrelling for the collector. First, I asked Schaap to assemble the list, but, after a couple of false starts, he balked. Such attempts, he said, have been going on for a long time, but “who remembers the lists and do they really succeed in driving people to the source?” Add to that, he said, “the dilemma of the current situation,” in which music is often bought and downloaded from dubious sources. Schaap bemoaned the loss of authoritative discographies and the “troubles” of the digital age, particularly the loss of informative aids like liner notes and booklets. In the end, he provided a few basic titles from Louis Armstrong, Count Basie, Benny Goodman, Miles Davis, and other classics and admitted to a “pyrrhic victory.”

What follows is a list compiled with the help of my New Yorker colleague Richard Brody. These hundred titles are meant to provide a broad sampling of jazz classics and wonders across the music’s century-long history. Early New Orleans jazz, swing, bebop, cool jazz, modal jazz, hard bop, free jazz, third stream, and fusion are all represented, though not equally. We have tried not to overdo it with expensive boxed sets and obscure imports; sometimes it couldn’t be helped. We have also tried to strike a balance between healthy samplings of the innovative giants (Armstrong, Ellington, Parker, Davis, Coltrane, etc.) and the greater range of talents and performances.

Since the nineteen-seventies, jazz has been branching out in so many directions that you would need to list at least another hundred recordings, by the likes of Steve Coleman, Stanley Jordan, Joe Lovano, Jacky Terrasson, John Zorn, David Murray, Avishai Cohen, Béla Fleck, Eliane Elias, Roy Hargrove, Dave Douglas, Matthew Shipp, Gonzalo Rubalcaba, Fat Kid Wednesdays, and many, many others. There is a suggestion below of the dazzling scope of contemporary jazz, but the focus is on the classic jazz that is Schaap’s specialty.


1. Fats Waller, “Handful of Keys” (Proper, 2004; tracks recorded 1922-43).

2. King Oliver, “King Oliver’s Creole Jazz Band: The Complete Set” (Challenge, 1997; tracks recorded 1923).

3. Louis Armstrong, “The Complete Hot Five and Hot Seven Recordings” (Sony, 2006; tracks recorded 1925-29).

4. Louis Armstrong, “The Complete RCA Victor Recordings” (RCA, 2001; tracks recorded 1932-33 and 1946-47).

5. Louis Armstrong, “Louis Armstrong Plays W. C. Handy” (Columbia, 1954).

6. Fletcher Henderson, “Tidal Wave” (Verve, 1994; tracks recorded 1931-1934).

7. Bessie Smith, “The Essential Bessie Smith” (Sony, 1997; tracks recorded 1923-33).

8. Bix Beiderbecke, “The Bix Beiderbecke Story” (Proper, 2003; tracks recorded 1924-30).

9. Django Reinhardt, “The Classic Early Recordings in Chronological Order” (JSP, 2000; tracks recorded 1934-39).

10. Jelly Roll Morton, “Jelly Roll Morton: 1926-1930” (JSP, 2000).

11. Sidney Bechet, “The Sidney Bechet Story” (Proper, 2001; tracks recorded 1923-50).

12. Duke Ellington, “The OKeh Ellington” (Sony, 1991—tracks recorded 1927-31).

13. Duke Ellington, “Golden Greats” (Disky, 2002; tracks recorded 1927-48).

14. Duke Ellington, “Never No Lament: The Blanton-Webster Band” (RCA, 2003; tracks recorded 1940-42).

15. Duke Ellington, “Ellington at Newport 1956” (Sony, 1999).

16. Duke Ellington, “Money Jungle” (Blue Note Records, 1962).

17. Coleman Hawkins, “The Essential Sides Remastered, 1929-39” (JSP, 2006).

18. Coleman Hawkins, “The Bebop Years” (Proper, 2001; tracks recorded 1939-49).

19. Billie Holiday, “Lady Day: The Master Takes and Singles” (Sony, 2007; tracks recorded 1933-44).

20. Teddy Wilson, “The Noble Art of Teddy Wilson” (ASV Living Era, 2002; tracks recorded 1933-46).

21. Lester Young, “The Lester Young/Count Basie Sessions 1936-40” (Mosaic, 2008; available direct through Mosaic).

22. Lester Young, “Kansas City Swing” (Definitive, 2004; tracks recorded 1938-44).

23. Count Basie, “The Complete Decca Recordings” (Verve, 1992; tracks recorded 1937-39).

24. Count Basie, “The Complete Atomic Basie” (Blue Note, 1994; tracks recorded 1958).

25. Benny Goodman, “At Carnegie Hall—1938—Complete” (Columbia, 1999).

26. John Kirby Sextet, “Night Whispers: 1938-46” (Jazz Legends, 2005).

27. Chick Webb, “Stomping at the Savoy” (Proper, 2006; tracks recorded 1931-39).

28. Benny Carter, “3, 4, 5: The Verve Small Group Sessions” (Polygram, 1991; tracks recorded 1954).

29. Charlie Christian, “The Genius of the Electric Guitar” (Definitive, 2005; tracks recorded 1939-41).

30. James P. Johnson, “The Original James P. Johnson: 1942-1945 Piano Solos” (Smithsonian Folkways, 1996).

31. The Nat King Cole Trio, “The Best of the Nat King Cole Trio: The Vocal Classsics, Vol. 1, 1942-1946” (Blue Note, 1995).

32. Charlie Parker, “The Complete Savoy and Dial Sessions” (Uptown Jazz, 2005; tracks recorded 1944-48).

33. Charlie Parker, “Bird: The Complete Charlie Parker on Verve” (Polygram, 1988; tracks recorded 1946-54).

34. Charlie Parker, “Best of the Complete Live Performances on Savoy” (Savoy, 2002; tracks recorded 1948-49).

35. Dizzy Gillespie and Charlie Parker, “Town Hall, New York City, June 22, 1945” (Uptown Jazz, 2005).

36. Dizzy Gillespie, “The Complete RCA Victor Recordings, 1947-49” (RCA, 1995).

37. Thelonious Monk, “Genius of Modern Music, Vol. 1” (Blue Note, 2001; tracks recorded 1947).

38. Thelonious Monk, “Live at the It Club, 1964” (Sony, 1998).

39. Thelonious Monk, “Thelonious Monk with John Coltrane: The Complete 1957 Riverside Recordings” (Riverside, 2006).

40. Lennie Tristano and Warne Marsh, “Intuition” (Blue Note, 1996; tracks recorded 1949 and 1956).

41. Miles Davis, “The Complete Birth of the Cool” (Blue Note, 1998; tracks recorded 1948-50).

42. Miles Davis, “Bags’ Groove” (Prestige, 1954).

43. Miles Davis, “Kind of Blue” (Sony, 1959).

44. Miles Davis, “Highlights from the Plugged Nickel” (Sony, 1995; tracks recorded 1965).

45. Miles Davis, “Bitches Brew” (Columbia, 1969).

46. Bud Powell, “The Amazing Bud Powell, Vol. 1” (Blue Note, 2001; tracks recorded 1949-1951), Vol. 2 (Blue Note, 2001; tracks recorded 1953).

47. Gerry Mulligan, “The Original Quartet with Chet Baker” (Blue Note, 1998; tracks recorded 1952-53).

48. Modern Jazz Quartet, “Django” (Prestige, 1953).

49. Art Tatum, “The Best of the Pablo Solo Masterpieces” (Pablo, 2003; tracks recorded 1953-56).

50. Clifford Brown and Max Roach, “Clifford Brown & Max Roach” (EmArcy, 1954).

51. Sarah Vaughan, “Sarah Vaughan with Clifford Brown” (EmArcy, 1954).

52. Charles Mingus, “Mingus at the Bohemia (Debut, 1955).

53. Charles Mingus, “Mingus Ah Um” (Columbia, 1959).

54. Charles Mingus Sextet, “Cornell 1964” (Blue Note, 2007).

55. Ella Fitzgerald, “Ella Fitzgerald Sings the Cole Porter Songbook” (Verve, 1956).

56. Sonny Rollins, “Saxophone Colossus” (Prestige, 1956).

57. Sonny Rollins, “Night at the Village Vanguard” (Blue Note, 1957).

58. Sonny Rollins and Coleman Hawkins, “Sonny Meets Hawk!” (RCA, 1963).

59. Tito Puente, “King of Kings: The Very Best of Tito Puente” (RCA, 2002; tracks recorded 1956-60).

60. Sun Ra, “Greatest Hits—Easy Listening for Intergalactic Travel” (Evidence, 2000; tracks recorded 1956-73).

61. Abbey Lincoln, “That’s Him” (Riverside, 1957).

62. Art Blakey and the Jazz Messengers, “Moanin’” (Blue Note, 1958).

63. Ahmad Jamal Trio, “Cross Country Tour: 1958-1961” (Verve, 1998).

64. The Dave Brubeck Quartet, “Time Out” (Sony, 1959).

65. Jimmy Witherspoon, “The ’Spoon Concerts” (Fantasy, 1989; tracks recorded 1959).

66. Ornette Coleman, “Beauty Is a Rare Thing: The Complete Atlantic Recordings” (Atlantic, 1993; tracks recorded 1959-61).

67. Ornette Coleman, “Dancing in Your Head” (Horizon, 1973).

68. Freddie Hubbard, “Open Sesame” (Blue Note, 1960).

69. Jimmy Smith, “Back at the Chicken Shack” (Blue Note, 2007; tracks recorded in 1960).

70. Dinah Washington, “First Issue: The Dinah Washington Story” (Polygram, 1993; tracks recorded 1943-61).

71. John Coltrane, “My Favorite Things” (Atlantic, 1960).

72. John Coltrane, “The Complete 1961 Village Vanguard Recordings” (GRP, 1997; tracks recorded 1961).

73. John Coltrane, “A Love Supreme” (Impulse!, 1964).

74. John Coltrane, “Ascension” (Impulse!, 1965).

75. Eric Dolphy, “Out There” (New Jazz, 1960).

76. Eric Dolphy, “Out to Lunch!” (Blue Note, 1964).

77. Bill Evans, “The Complete Village Vanguard Recordings, 1961” (Riverside, 2005).

78. Jackie McLean, “A Fickle Sonance” (Blue Note, 1961).

79. Stan Getz and João Gilberto, “Getz/Gilberto” (Verve, 1963).

80. Dexter Gordon, “Our Man in Paris” (Blue Note, 1963).

81. Andrew Hill, “Smokestack” (Blue Note, 1963).

82. Lee Morgan, “The Sidewinder” (Blue Note, 1963).

83. Albert Ayler, “Spiritual Unity” (ESP, 1964).

84. Archie Shepp, “Four for Trane” (Impulse!, 1964).

85. Horace Silver, “Song for My Father” (Blue Note, 1964).

86. Wes Montgomery, “Smokin’ at the Half Note” (Verve, 2005; tracks recorded 1965).

87. Cecil Taylor, “Conquistador!” (Blue Note, 1966).

88. Betty Carter, “Betty Carter’s Finest Hour” (Verve, 2003; tracks recorded 1958-92).

89. Frank Sinatra, “Sinatra at the Sands with Count Basie & the Orchestra” (Reprise, 1966).

90. Frank Sinatra, “The Capitol Years” (Capitol, 1990; tracks recorded 1953-62).

91. Nina Simone, “Sugar in My Bowl: The Very Best of Nina Simone, 1967-1972” (RCA, 1998).

92. Pharoah Sanders, “Karma” (Impulse!, 1969).

93. Chick Corea, “Return to Forever” (ECM, 1972).

94. Keith Jarrett, “The Köln Concert, 1975” (ECM, 1999).

95. World Saxophone Quartet, “World Saxophone Quartet Plays Duke Ellington” (Nonesuch, 1986).

96. Charlie Haden and Hank Jones, “Steal Away” (Polygram, 1995).

97. Joshua Redman Quartet, “Spirit of the Moment: Live at the Village Vanguard” (Warner Bros., 1995).

98. Cassandra Wilson, “Traveling Miles” (Blue Note, 1999).

99. Wynton Marsalis Septet, “Live at the Village Vanguard” (Sony, 1999).

100. The Bill Charlap Trio, “Live at the Village Vanguard” (Blue Note, 2007).

http://www.newyorker.com/online/2008...urrentPage=all





Music Rules: Top 10 Music Websites That Delivers Greatest Free Music
Nelson Doyle

If you're searching for the best free music sites on the Internet, well then these 10 deliver all that, and then some. Great music found here.

Music is truly the universal language to billions of screaming fans around the world and no matter what native language that you speak - music is music, so what's the need to translate the words.

The music websites that are presented in this article are listed from best to better, and from top to bottom of the page. Yes, in this author's opinion, these are the best free legal music websites on the Internet. So, enjoy the music and jam the day away.

Imeem
If you really dig your music, then you have come to the right place. Imeem is the biggest and most comprehensive music resource on the web to get great music. Join the Imeem community and share your music interests with others or watch
music videos if you are not too busy.

Last.fm
Last.fm offers more music than you can shake a stick at. Join the community and make new friends who share the same interests as you do. Last.fm members can play full tracks and customize your playlist according to your own unique tastes.

Pandora
Fall in love again, with the possibility of stumbling across a brand new artist, group or band that have been captured through Music Genome Project and overseen by Pandora, so that the flow of new musical talents don't go unnoticed. If you enjoy sampling the sounds of a creative crop of new and still probably new, undiscovered talented, then you will find a whole new world of sounds to delight your listening pleasures.

MOG
MOG's slogan says it best “Where Music Junkies Get Their Fix”. Listen to millions of full-length songs for free or share your music playlists and opinions with others in your community.

Macidol
Do your own an iPod and want to download new songs and Podcasts from your favorite artists for free? Macidol allows its members to download free music for your iPod legally. You name it - Macidol probably has it.

Music.com
Looking for the hottest popstars and rockstars on earth, then what are you waiting for, because music.com has it going on and a little of that, too. Watch music videos, listen or download the hottest music for free.

Jamendo
Open your ears to a whole new world of music talent at Jamendo. This site offers its members full free albums to download from the emerging new pool of artists and musicians from all four corners of the planet. Wanting something new to listen to, then Jamendo is the place for you.

Allmusic
Get to know your favorite recording artists better than ever before and listen or download some free music at Allmusic. Read the Allmusic blog or watch a music video, but by all means relax and have some fun.

Jango
Jango is a custom radio that plays the music you want for free. Create your own music playlists to store and play on your own radio channel or choose from the stations that Jango provide. Membership is required to participate.

Go Video [Codes]
Give your website, blog, MySpace or any sort of web-based page a booster shot and customize it to the max with free music videos from the hottest music talent in the world. Select the video that you want to retrieve the code for by artist or title, and then you are ready to cut and paste the video code onto your website or web-based page, so that all of your friends and fans can soon enjoy.
http://www.musicouch.com/Musicouching/Music-Rules-Top-10-Music-Websites-That-Delivers-Greatest-Free-Music.122475





Free Music: 22 Websites That Are Driving Daggers Into The Heart Of The RIAA

Here’s a quick roundup of some of the websites where you can find the music that you love for free. The market for these kind of websites is exploding so it’s definitely not a complete list but it should give you a good start.

1) BeeMP3.com
BeeMP3.com is a mp3 search engine. The BeeMP3 crawler searches through the Net and indexes all the brand new and popular songs. They claim to have over 800,000 mp3 files and are adding 10,000 mp3 files daily.

2) Blip
Blip is a quick way to tell your friends what song you’re into right this minute. You also find out what your favorite people are listening to in real-time — no need to refresh the page. TechCrunch called it “Twitter for music” and that seems like a good description.

3) Critical Metrics
Critical Metrics is a database of highly recommended songs. The site keeps track of awards, hot lists, must lists, 5-star reviews, artist picks, testimonials, select discographies, and other notable on-the-record expressions of love and enthusiasm.

4) Deezer
Based out of France, Deezer offers, free of charge and legally, all kinds of music, from rock to hip-hop, jazz, electro and world music.

5) Free Albums Galore
Free Albums Galore is a full-album “mp3 blog” for listeners of eclectic music. You won’t find a lot of popular artists here, but the site posts only complete albums, not individual or scattered tracks.

6) Free Music Zilla
Free Music Zilla is a tool specialized for social music downloading. It lets you download free music from almost all of the social music services, including many on this list. It is not available for Mac unfortunately.

7) GrooveShark Lite
Grooveshark gives you the ability to find and listen to any song and get personalized recommendations. It has an excellent, easy-to-use interface.

8) Hype Machine
The Hype Machine tracks a variety of MP3 blogs. If a post contains MP3 links, it adds those links to its database and displays them on the front page.

9) Imeem
Imeem is a social network that offers access to a wide range of media including music, video and photos.

10) Internet Audio Archive
The Internet Audio Archive contains over a hundred thousand free digital recordings ranging from alternative news programming, to Grateful Dead concerts, to Old Time Radio shows, to book and poetry readings, to original music uploaded by its users.

11) Jango
Jango allows you to create a custom radio station just by typing in an artist’s name. You get the music you want, along with similar favorites of Jango users who share your taste. You can customize your station by adding more artists and rating songs that you want to play more or less.

12) Last.fm
Last.fm is one of the most popular custom radio sites. It also has social networking features and the ability to choose specific songs for a playlist. Unlike many sites on this list, Last.fm saves some of its best features for premium subscribers who pay a fee for the service.

13) Musicovery
Musicovery is a unique website that lets users choose which songs to play based on things like mood, genre, and musical era. It has a unorthodox interface that shows songs in relation to each other creating a kind of “music map.”

14) Music Search Online
Music Search Online is a mp3 search engine. Each result has a link to listen to the song or download the mp3 to your computer.

15) MuxTape
MuxTape is a simple way to create and share mp3 mixtapes. Anyone who signs up for an account receives their own subdomain (ex. http://samplename.muxtape.com/) which makes it easy to share the collection with friends and family.

16) Pandora
One of the most popular music sites on the Internet, Pandora is great for finding new music. The site’s database has the Music Genome Project at its core which contains in-depth information on each song (up to 400 attributes, including melody, harmony, instrumentation, rhythm, vocals, and lyrics). You can create as many custom radio stations as you want, but you’re not able to play specific songs on demand.

17) SeeqPod
SeeqPod is a media search engine. It allows you to find, play, and enjoy the vast multitude of rich media files and applications available online, including video, audio, slideshows, Adobe Flash files, and more. The interface is somewhat cluttered however. It’s worth noting that SeeqPod’s database is used to power many other music sites, including several on this list.

18) SpiralFrog
SpiralFrog is an ad-supported Web site that offers over 700,000 songs for you to download.

19) Skreemr
SkreemR is a search engine for locating mp3 files on the web. They have a feature called AudioRank which helps suggest the version of each song with the highest quality.

20) Slacker
Slacker is a custom radio station site with an emphasis on letting people access their stations in many different places.

21) Songerize
Songerize is a simplified interface for the SeeqPod music search engine. The site describes itself as “SeeqPod’s ‘I’m Feeling Lucky’ button”, which is about right. You can get to the song you want to hear very quickly, all you need to do is enter the song title and the artist name.

22) Songza
Songza is a music search engine with the ability to create playlists and ranks results by quality. It has one of the best user interfaces of all the websites on this list.
http://www.tinydad.com/free-music-22-websites-driving-daggers-into-the-heart-of-the-riaa/





How Apple is Changing DRM

As more stores and record labels abandon digital rights management, Apple may have an alternative plan for subscription services, writes Tim Anderson

When Apple approached record companies about selling their music digitally five years ago, they "were extremely cautious and required Apple to protect their music from being illegally copied", according to Steve Jobs's recollection of the process. That meant using digital rights management (DRM) - a software wrapper - to protect songs from unlimited copying. Jobs says it is crucial to the contract: "If our DRM system is compromised and their music becomes playable on unauthorized devices, we have only a small number of weeks to fix the problem or they can withdraw their entire music catalog from our iTunes store."

But what's the real effect of DRM? Last year, EMI began offering songs without it on iTunes. "The industry has finally been able to get some hard data about how removing DRM restrictions from legitimately purchased tracks affects piracy," says Bill Rosenplatt, DRM specialist and president of GiantSteps Media Technology Strategies. "The statistics show that there's no effect on piracy."

No effect. The assertion is remarkable. If DRM does not in fact discourage piracy, then it is merely a nuisance for the user. Now the Guardian understands that most download stores will remove DRM on permanent music downloads. "We are going to be selling non-DRM music from the summer", says Dave Elston, HMV's digital content manager, adding that it would solve "obvious interoperability issues" - primarily compatibility with Apple's iPod. Amazon has announced that its DRM-free MP3 download store, already online in the US, will be rolled out internationally later this year. Napster in the US is moving to MP3 for non-subscription downloads, and sources close to the company implied that the UK service will follow suit. And Apple offers DRM-free downloads for an increasing number of tracks.

Ironically, the music companies are now abandoning DRM because it worked too well. Apple wouldn't license its version to rivals - so the best-selling iPod drove the iTunes store to its present position, where it is the third-largest music retailer in any form in the US. Rosenblatt says that record labels "have been desperate to find a viable competitor to Apple and iTunes". Industry sources suggest that Apple's iTunes store has more than 70% of the UK download market, and growing. "The record companies don't like dealing with Apple, because Apple is in a position where it can dictate the economic terms and dictate the business models," says Rosenblatt. "What's going to draw people away from iTunes? One answer is to get rid of DRM."

Licences revoked

In the meantime, some early adopters are suffering the consequences of DRM's failure. Last month, former customers of Microsoft's defunct MSN Music store in the US received an unwelcome email. "As of August 31, 2008, we will no longer be able to support the retrieval of licence keys for the songs you purchased from MSN Music or the authorization of additional computers," it said.

So what does that mean? Protected music files are encrypted and locked with a key. To play the file, the media player must acquire a digital licence that is specific to the PC or portable device on which it is played. The licence may permit music to be copied to other computers or devices, but each device must be individually authorised by an online licence server. Without such a server, former customers of MSN Music will not be able to play their DRM-protected music on any new PCs or portable players that they buy.

The problem is worse than it first appears, since a "new" device may actually be your existing PC. Some users habitually reinstall Windows to keep it running sweetly, but doing so removes its authorisation; even adding or changing a hardware component can also break the DRM, as Microsoft notes matter-of-factly in a support article. Worse still, the DRM component in Windows can get corrupted for no apparent reason.

This is a common problem for users installing the BBC's iPlayer software, for example, which also uses Microsoft DRM. The fix, described in detail on the iPlayer support pages, involves deleting all the files in the hidden DRM folder within Windows. A side effect is that existing licences are destroyed - so existing DRM-protected files could well no longer play. In other words, there are multiple scenarios in which customers who have bought music, supposedly for a lifetime, may need to re-authorise their purchases. If the licence server has been turned off, the music will never, ever play again. What if you back up your licences? This used to be possible through Windows Media Player. But Microsoft removed the option from version 11, introduced for Windows Vista. Microsoft's Adam Anderson told us that licence backup did not work properly anyway.

Getting your backup

"The ability to back up content was not granted by every service, leading to user confusion and frustration," he says. "Third-party digital content service providers are best positioned to meet the backup and restoration needs of their customers." So the trail leads back to the licence server - which Microsoft is turning off for its customers. Why is it doing that? According to Rob Bennett, who wrote the shock email, it was too complicated to support. "Every time there is an OS upgrade, you saw support issues. People would call in because they couldn't download licences. We had to write new code, new configurations each time," he told CNet.

There are a few mitigating factors. One is that purchased downloads usually include the right to burn CDs - thus removing the DRM, and allowing proper backup. Though it's not quite perfect: most download formats are compressed. The CD will sound the same as the download - but if it is ripped back to a PC in a lossy format (such as MP3), the recompressed file will not sound as good.

Customers outside the US are not directly affected by Microsoft's move. Although several download services in the UK use Microsoft DRM - including MSN Music (which is run by Nokia), Napster and HMV - these stores have their own licence servers. Still, if Microsoft itself has done this, and if DRM for this type of purchase is on the way out, then customers with an investment in downloaded music should be cautious. Best burn them to CD, just in case. Some, however, won't let you. Subscription services such as Napster To Go, which gives temporary access to around 5m songs, will keep using DRM. But so far the subscription concept has not taken off.

Yet Rosenblatt thinks that subscriptions may turn out to be Apple's answer to the DRM-free competition - because it has already laid the groundwork with films which expire a certain length of time after being downloaded or watched. "You can now rent a movie on your iPod. The functionality on the iPod that enables that to happen is part of the functionality that you would need to support music subscription services," Rosenblatt says.

Same old problems

And that could mean the record labels will face the same problem all over again. Just as they remove DRM from their products, Apple would re-impose it. Apple customers with a subscription would probably never buy from third-party services, even while the likes of Amazon could undercut iTunes and be iPod-compatible.

Mark Mulligan, digital music analyst at Jupiter Research, also expects Apple to change its approach. "It's highly likely Apple will get into the next-generation service game. That could be Apple selling iPods preinstalled with unlimited access to music, or with a bundle to a subscription offering," he says. Mulligan sees the market evolving into multiple tiers. At the top end, a minority will be willing to pay a premium for the best quality, DRM-free downloads. The middle tier will be "subsidised offerings like Nokia's Comes With Music, where you buy a device and the cost of the music is included subsidised"; while at the bottom will be advertising-supported services such as Qtrax, SpiralFrog and We7, where free music is paid for by embedded advertising.

That would leave Apple with the top-end iTunes downloads and a subscription business. But would Jobs back it? In January 2007, Reuters asked him if Apple would do so. "Never say never, but customers don't seem to be interested in it," Jobs said. "The subscription model has failed so far." Which hardly rules it out forever. DRM might not stop pirates, but it does rivals. And in business, the latter can be a greater threat than the former.
http://www.guardian.co.uk/technology/2008/may/15/drm.apple





Sony BMG Releases More DRM-Free Music
Posted by Greg Sandoval

Sony BMG, one of the top four recording companies, is releasing more DRM-free songs through a partnership with Dada USA, a mobile-entertainment company based in Italy.

Songs from Sony BMG artists such as the Foo Fighters, Kelly Clarkson, and The Strokes, will be offered through a new music service, Dada Entertainment, where users can pay $9.99 to obtain 15 tokens. Each token can be redeemed for a music download or ringtone or other content such as games or wallpaper.

The unprotected MP3 files can be transferred to an iPod, mobile phone, or any other digital music-playing device, the companies said Tuesday. Over-the-air downloads aren't ready yet, but Dada said in a statement that it expects to launch that in coming months.

The problems are obvious with this one. Music subscription services such as Napster offer unlimited music for about $13 a month. And the subscription services don't restrict users to a song library exclusively of Sony BMG songs (a Dada representative said the company is trying to cut licensing deals with other labels).

The good news is the music found at Napster is laden with DRM. The songs from this jointly operated service aren't. They are also cheaper than the downloads at iTunes and most other online music stores.

Perhaps most importantly, this is another example of a major label experimenting with songs stripped of copy-protection software.
http://www.news.com/8301-10784_3-9943023-7.html





Neil Young to Release Archive on Blu-Ray Discs

Rocker Neil Young plans to release his entire music archive on Blu-ray discs, a sign that the discs' capabilities are building appeal among musicians as well as movie studios.

Blu-ray discs hold much more data than DVDs, are easily updated over the Internet and offer better picture and sound quality.

Young revealed his plans Tuesday at a Sun Microsystems Inc. conference in San Francisco. Santa Clara-based Sun makes the Java technology that gives Blu-ray discs their interactive menus and ability to accept updates over an Internet connection.

The first installment of Young's archive will cover the years 1963 to 1972 and will be released as a 10-disc set this fall on Reprise/Warner Bros. Records.

Young said the archives will be released chronologically and include some previously unreleased songs, videos, handwritten manuscripts and other memorabilia, in addition to the high-resolution audio that Blu-ray technology is known for.

Fans can download more content like songs, photos and tour information directly to the Blu-ray discs as the content becomes available.

Blu-ray's rival format HD DVD effectively died with maker Toshiba Corp.'s announcement in February that it will no longer produce HD DVD players.

Most of the Blu-ray discs manufactured so far have been used for high-definition movies.

Musical artists such as AC/DC, Bruce Springsteen and Destiny's Child released concert videos on Blu-ray discs, but Young's support of the technology for his ambitious archive project demonstrates more fully the capabilities of Blu-ray as a music medium.

Earlier technology didn't offer the ability to browse archive material while listening to songs in high-resolution audio, Young noted.

"Previous technology required unacceptable quality compromises," he said in a statement. "I am glad we waited and got it right."
http://ap.google.com/article/ALeqM5g7PU369D66DFPT3h6RDkR9s61AnQD90GAE0G0





Neil Young Gets New Honor - - His Own Spider

Iconic singer and songwriter Neil Young has had an honor bestowed upon him that is not received by many musicians -- his own spider.

An East Carolina University biologist, Jason Bond, discovered a new species of trapdoor spider and opted to call the arachnid after his favorite musician, Canadian Neil Young, naming it Myrmekiaphila neilyoungi.

"There are rather strict rules about how you name new species," Bond said in a statement.

"As long as these rules are followed you can give a new species just about any name you please. With regards to Neil Young, I really enjoy his music and have had a great appreciation of him as an activist for peace and justice."

Young, 62, is a veteran rock musician who rose to fame in the 1960s with the band Buffalo Springfield and later became a member of Crosby, Stills, Nash & Young, whose 1970 release "Deja Vu" has become a classic rock album.

The singer/songwriter, whose solo work ranges from older albums such as "Harvest" to newer CDs like "Living with War," has long been an activist for social and anti-war causes.

Bond discovered the new spider species in Jefferson County, Alabama, in 2007. He said spiders in the trapdoor genus, who tend to live in burrows and build trap doors to seal off their living quarters, are distinguished from one species to the next on the basis of differences in genitalia.

He confirmed through the spider's DNA that the Myrmekiaphila neilyoungi is an identifiable, separate species of spider within the trapdoor genus.

Young is not the first musician to have a creature named after him. A species of beetle that looks as if it is wearing a tuxedo -- the whirligig beetle, or Orectochilus orbisonorum -- was named earlier this year after the late rock 'n' roll legend Roy Orbison and his widow Barbara.
http://www.reuters.com/article/lifestyleMolt/idUSSP19797120080511





Model Train Maker Lionel Emerges from Bankruptcy

Legendary model train maker Lionel LLC has emerged from bankruptcy protection, the company's Web site and court documents show.

"After more than seven long years of legal warfare, a brutal financial restructuring, and a lot of corporate soul searching, Lionel has fully emerged from bankruptcy," Chief Executive Jerry Calabrese wrote in a note on the company's Web site, www.lionel.com.

Lionel, which has been in business since 1900, sought bankruptcy protection in 2004 after a trade-secrets dispute with MTH Electric Trains.

"Lionel's emergence from bankruptcy has been achieved by paying all of its creditors all of the money they were owed, in addition to interest for all the time during which the company was in bankruptcy," Calabrese wrote.

Rock musician Neil Young, who once had a 20-percent stake in Lionel, will still have a role at the company, Calabrese wrote in a separate statement on the Web site.

"As he has for the better part of the last two decades, Neil will be working with our engineers and product guys to make sure that Lionel continues to honor its pledge to make the best and most affordable model trains in the world." It was not clear if he still holds a stake in Lionel or what his specific role would be and the company did not return calls for comment.

Lionel, which sells its model trains at big-box retailers like Target Corp and hobby shops, and MTH settled their dispute last October, paving the way for Lionel to obtain financing to exit bankruptcy.

Documents filed with the U.S. bankruptcy court of the Southern district of New York show that Lionel emerged from bankruptcy on May 1.

Calabrese wrote that in addition to Young, pre-bankruptcy owners Luella Davis and Dick Kughn would remain involved with the company, along with Guggenheim Investment Management LLC, which provided much of the new financing for the company's exit from bankruptcy. (Reporting by Chelsea Emery, Editing by Toni Reinhold)
http://www.reuters.com/article/companyNews/idUSN0539524820080505





DriveSavers Breathes Life Into a Dead Drive
Joel Evans

In computer circles a well known statement when it comes to hard drives is that it’s not a matter of “if” a hard drive dies but “when”. Well, unfortunately for my brother-in-law that time came a couple of weeks ago for his external hard drive. He had stored all of his music and all of the photos that his family has taken of their two year old son on an external Maxtor. One day he turned it on, heard some musical tones and then a whirring sound, a clicking sound, and that was it. It wouldn’t show up on his computer and was presumed dead. Being the geek in the family, he asked if he could send it my way.

The first thing I did was plug it into power to hear the noises for myself. Sure enough, I heard the music tones and then the whirring and clicking. Some Google searches turned up pretty much nothing about the sounds, but having had an external drive before, I knew what the sounds meant: dead drive.

The next thing I did was hook it up to my PC. It actually started to get recognized but then wouldn’t show up in My Computer. I then plugged it into another computer, just to be sure, and found that it was recognized but again, not showing up in My Computer. Then I went into Device Manager and saw it there … but I still couldn’t access it. Thinking there might still be hope, I contacted Seagate/Maxtor tech support. Unfortunately, it was now too late to call so I sent them an e-mail describing the problem instead.

The next day I had yet to receive a reply, so I dialed them up. I spoke with a tech (who still couldn’t tell me what the musical tones meant), and then after seeing that I couldn’t browse to the drive he declared it dead. Since it was out of warranty he basically said that I was out of luck. Strangely enough, after I got off that call I received a response to my e-mail where the tech suggested I download Seagate’s SeaTools and test the drive. I did as instructed and he drive failed every test and in some cases wouldn’t even run the test.

Still not believing that it was time to throw in the towel, I remembered a company that specializes in recovering dead hard drives: DriveSavers. I dialed them up and after answering a series of questions, I was quoted a range with an estimated recovery price of $1500 and a turnaround time of 5-7 days. Once I agreed to the price I was e-mailed a PDF with instructions on how to get the drive to them. I overnighted the drive, wrapped in bubble wrap and extra cushioning to avoid any additional damage (they recommended a ziploc or anti-static bag). I also e-mailed customer service a description of the drive contents and what I believed might be the directory structure. They requested this information as it would serve as an indicator of whether or not they recovered the drive.

The next day I received an e-mail letting me know that the drive had been received and that the recovery process had begun.

Here’s a detailed account of what DriveSavers did to try to bring back the dead drive:

DriveSavers initiated the recovery process by taking my external drive to their Certified Class 100 cleanroom (think ER for hard drives). Here, the engineers wearing specialized, certified cleanroom garments (see pictures below) carefully perform surgery on dead drives.

My drive in particular suffered electro-mechanical failure resulting in severe media damage to the platter surface and logical corruption to the file system. In other words, the drive failed in about every way you can imagine. Using an extensive supply of hard drive components, the cleanroom engineers utilized proprietary techniques to create a bit-for-bit image of the drive and placed the image onto a clean target drive.

“We did a combination of things to get the image,” said Michael Hall, Director of PC Engineering. “We had to replace the actuator assembly and components on the printed circuit board. By performing these actions, we were able to image about 25 percent of the drive.”

Unfortunately, the data I needed back was not on the image that they first acquired. At this point, they performed a full platter swap and were able to image all readable sectors that did not have physical media damage.

Next, the drive went to their Windows software engineering team to manually extract the critical files requested.

According to Michael Hall, “Although there was severe media corruption on this drive, DriveSavers engineers were able to successfully recover the majority of the critical data by utilizing our proprietary software and methodology.”

Again, my drive failed in about every way you can imagine. It had electro-mechanical failure resulting in severe media damage. Seagate considered it dead, but I didn’t give up. It’s actually pretty amazing that they were able to recover nearly all of the data. Of course, they had to do some rebuilding, but that’s what you expect when you send it to the ER for hard drives.

So, how much did it end up costing? Pricing is determined by the drive capacity, complexity and completeness of the data recovery. The cost for recovering data from a drive with severe media damage, like mine, is about $1900. An average single drive data recovery costs about $1500.

In my case they restored approximately 80 percent of the drive and put it on a new external hard drive. Depending on the size of the data, it either goes to an external (you can supply one if you want) or DVDs. In addition to hard drives they can restore removable media, digital cameras, tape, and even iPods and MP3 players.

Not everyone can afford to spend that amount on recovering data but it’s all about what the data means to you. In the case of this drive, it holds memories that would have been gone forever. So, it was a small price to pay.

Read more about them at DriveSavers.com. Be sure to check out their Museum of Disk Disasters, too.
http://www.geek.com/drivesavers-breathes-life-into-a-dead-drive/





End of Intel, AMD Duopoly Near? Via Readies Isaiah Chip
Brooke Crothers

Is the end of the Intel-AMD duopoly nigh? Via Technologies is hoping this may be the case when it announces the "Isaiah" processor later this month.

The company's first high-performance x86 chip will be targeted at the mainstream PC market--another first for the Taipei-based chip supplier. Via processors have historically appeared in ultrasmall mobile devices (such as the OQO), embedded computers, or thin-client computers.

"It puts us into the mainstream market for the first time," said Richard Brown, vice president, corporate marketing at Via.

Isaiah, like Via processors before it, will still hew to the lower-power line, however.

Correction: Isaiah's TDP (Thermal Design Power or power envelope) is not confirmed at this point. However, Glenn Henry, president of Centaur Technology (the company that designed Isaiah), has said publicly that Isaiah will consumer more power than Intel's Atom processor.

Other differences include: Atom uses a more simple "in-order execution" design compared to Isaiah's Superscalar, out-of-order design.

Because of this more sophisticated design, Isaiah may deliver higher performance than Atom, though independent benchmarking will be the final judge.

Via subsidiary Centaur Technology designed the processor. "Centaur has been working on this for the last three years. It's between two and four times the performance of C7 (Via's current processor). So, it' very, very close to (Intel's) Core 2. Core 2 solo (single core)," Brown said.

The Via C7 processor is currently being used in a design that may herald more Isaiah-based mainstream notebooks. The $398 Everex gBook is being sold at Wal-Mart with a 15-inch screen, a 1.5GHz Via C-7M processor, 512MB of DDR2 system memory, a 60 GB hard disk drive, optical drive, Ethernet, and wireless. It uses the gOS Version 2 operating system, a Linux distribution.

"We're in full agreement with the optimized PC concept," Brown said. An idea put forward by Nvidia's CEO Jen-Hsun Huang, it postulates that a consumer will get better PC price-performance by adding a $50 graphics card rather than a two or three hundred dollar quad-core processor. "You can have a processor like Isaiah matched with a better graphics card," Brown said. "There's opportunity in both desktops and notebooks."

Last month, Via and Nvidia announced a platform billed as the "The World's Most Affordable Vista Premium PC," the sub-$45 processing platform will combine Via's Isaiah processor with an integrated Nvidia graphics chipset.
http://www.news.com/8301-10784_3-9945568-7.html





Crown Copyright is Overdue for Retirement
Michael Geist

As Industry Minister Jim Prentice prepares to introduce new copyright legislation, Crown copyright is unlikely to be part of the reform package.

According to documents obtained under the Access to Information Act, there may be a disturbing reason behind the government's reluctance to address it – Crown copyright costs Canadians hundreds of thousands of dollars while being used as a tool to suppress public criticism of government programs.

Dating back to the 1700s, Crown copyright reflects a centuries-old perspective that the government ought to control the public's ability to use official documents.

Today Crown copyright extends for 50 years from creation and it requires anyone who wants to use or republish a government report, parliamentary hearing, or other protected work to first seek permission. While permission is often granted, it is not automatic.

The Canadian approach stands in sharp contrast to the situation in the U.S. where the federal government does not hold copyright over work created by an officer or employee as part of that person's official duties.

Government reports, court cases and congressional transcripts can be freely used and published.

The existence of Crown copyright affects both the print and audio-visual worlds and is increasingly viewed as a barrier to Canadian filmmaking, political advocacy and educational publishing.

For example, while U.S. governmental reports are freely available and often used for commercial purposes without the need for prior permission, Canadian publishers seeking to release a Canadian report as a commercial title would need approval from the government to do so.

To obtain permission, the publisher would be required to provide details on the intended use and format of the work, the precise website address if the work is to appear online, as well as the estimated number of hard copies if the work is to be reprinted.

If the work is to be sold commercially, the publisher would be required to disclose the estimated selling price.

Filmmakers and educational publishers face similar barriers. Unlike their U.S. counterparts, they must budget for lengthy, expensive approval processes for the use of government clips in their films or documents in their textbooks.

Beyond the policy reasons for abandoning Crown copyright, internal government documents reveal other concerns. Financially, the federal Crown copyright system costs taxpayers a whopping sum every year.

Documents from Public Works and Government Services Canada, which administers the Crown copyright system, reveal that in the 2006-7 fiscal year, Crown copyright generated less than $7,000 in licensing revenue while costing more than $200,000 to administer.

In most instances, Canadians obtain little return for this investment: 95 per cent of Crown copyright applications are approved, with requests ranging from archival photos to copies of the Copyright Act.

More troubling are the 5 per cent of cases where permission is declined. While in some instances refusal stems from the fact that the government does not have rights to the requested work, government documents reveal that some requests are declined for what appear to be politically motivated reasons.

For example, an educational institution's request to reproduce a photo of a Snowbird airplane was denied on the grounds the photo was to be used in an article raising questions about the safety of the program.

Similarly, a request to reproduce a screen capture of the Nexus cross-border program with the U.S. was declined, since it was to be used in an article that would not portray the program in a favourable light.

Although it seems unlikely that Crown copyright authorization was needed to use these images, the government's decision to deny permission smacks of censorship and misuse of Canadian copyright law.

Given the significant costs associated with a program that does more harm than good and that appears susceptible to political manipulation, any new copyright reform should eliminate Crown copyright and adopt in its place a presumption that government materials belong to the public domain to be freely used without prior permission or compensation.
http://www.thestar.com/article/424333





The End Of Copyright
Ernest Adams

I think we are witnessing the beginning of the end of a major era in world history. It may take fifty years, it may take a hundred, but the age of copyright is drawing to a close. I don’t know if this is a good thing or a bad thing, but it’s inevitable. And I say this as the author of two books and over 75 columns like this one, all copyrighted.

Just 550 years ago this year, a guy named Johann Gutenberg figured out how to make large quantities of metal type in a hurry. He didn’t invent printing—the Chinese had been doing that with wooden blocks for centuries—but he did find a way to make it fast and efficient. Gutenberg changed the world and helped to bring on the Renaissance.

There were no copyright laws at that point. Before the printing press, books in Europe were copied by hand, and having someone go to the trouble of copying your book was about the highest praise an author could get. But with the printing press, the concept of intellectual property was born. Over the next two centuries or so, copying books went from being high praise to being a crime. As printing presses were large and heavy—i.e. difficult to conceal and difficult to move—it wasn’t all that hard to prosecute the offenders. The smaller and faster they got, though, the tougher it became.

I’m old enough to remember when photocopiers became commonplace. At first, there used to be signs in libraries, warning the users against duplicating copyrighted material—any copyrighted material, ever. But people did it anyway. They didn’t think they were doing any harm, and they weren’t planning to sell the copy, they just needed it for their own use.

When enough people feel that it’s OK to do a thing, that thing ceases to be wrong in their own cultural context. You can complain about moral relativism all you like, but the facts are inescapable: that’s how people behave. When the photocopier came along, people simply didn’t think it was wrong to copy a few pages out of a book, even though it was against the law and the authors would have preferred that they buy the whole book. So eventually, the Fair Use doctrine evolved with respect to copyright materials. The law changed. It’s now OK to photocopy parts of books for educational, non-commercial use. In effect, the authors and book publishers had to give some ground in the face of the overwhelming tide of public opinion.

You can see where this is going, can’t you?

On June 27, 2005, the US Supreme Court decided to hold companies that make file-sharing software responsible for copyright infringements perpetrated by the software’s users. Everyone expected that they would rule as they did when Universal City Studios sued Sony over the Betamax in 1984: there were legitimate uses of the technology, and it shouldn't be held responsible simply because it can be used unlawfully. Instead, however, they ruled that file-sharing software actively encourages piracy and the makers should be held accountable.

The Supreme Court's action has done the exact opposite of what MGM and the other content distributors who brought the suit hoped it would. File-sharing software will become open-source and public domain. File-sharing will continue to grow ever more popular, but now there will be no one to sue. The Supreme Court's ruling hasn't even delayed the inevitable; it has actually brought it closer.

There’s no intrinsic reason why someone should continue to get paid for something long, long after the labor they expended on it is complete. Architects don’t get paid every time someone steps into one of their buildings. They’re paid to design the building, and that’s that. The ostensible reason we have patent and copyright law is, as the US Constitution says, “to promote the Progress of Science and useful Arts.” But travesties like the Digital Millennium Copyright Act don’t promote the progress of science; they actively discourage it. So do software and biotechnology patents. The patent system was intended to allow inventors to profit for a limited time on particular inventions, not to allow huge technology companies to put a stranglehold on innovation by patenting every tiny advance they make.

Right now, the music and movie industries are howling and beating their breasts and doing their best to go after anybody who violates their copyrights on a large scale. The fury with which they’re doing it is a measure of their desperation. The Sony rootkit debacle is a perfect example: in an effort to prevent piracy, they secretly installed dangerous spyware into people’s PCs, which itself may have been a criminal act. This was about the dumbest public-relations move since Take-Two lied about the Hot Coffee content, and as with Take-Two, it will cost them vastly more than they could hope to gain from it. Did they really think nobody would find out?

The lawsuits, the spyware, the DMCA: these are the death struggles of an outdated business model. It’s the modern-day equivalent of throwing the Christians to the lions in an effort to discourage Christianity. It didn’t work for the ancient Romans and it won’t work now.

Part of the issue is related to the question of how much money it took to create a copyrighted work in the first place. With books and music, the answer is simply, “not that much.” Forget notions of what their rights may be in law; the idea that a band or an author should be paid millions upon millions over the next several decades for something that it cost them at most a few thousand dollars to make, just feels silly to most people. You’ll notice that it’s the megastars who are fighting the hardest over this in music—Madonna, Metallica, and so on. They’re the ones who stand to lose the most. But the smaller, less well-known groups are embracing new business models for distributing their music. They’re like authors back before the printing press: “Copy my music and listen to it! Please!”

Movies and video games are more problematic. They take millions to make in the first place and a good many of them don’t earn back their investment, even with full copyright protection in place. If we’re going to go on making video games, the publishers have to find a way to make them pay for themselves. One approach is an advertising model, although I’m reluctant to say it because I hate the idea of ads in games. Another is to treat games as a service rather than a product. With broadband distribution, I think this is increasingly likely: you won’t ever have a durable copy of a game, you’ll download it every time you play it. Each instantiation will be unique, personalized for a particular machine and Internet address; encrypted to discourage hacking; and expires after a few hours. After that you’ll have to download a new copy.

Yet another model is the donor model: somebody who is known for creating great work can collect up donations in advance; when he has collected enough to fund the work, he builds it, and releases the game copyright-free when it’s finished. The donors will have paid and everyone else gets it for nothing, but they get it first and perhaps some special recognition for their contribution. I’d be happy to put down $40 two years in advance for a new Sid Meier game, particularly if I knew it would be released copyright-free when it came out. And I bet a lot of other fans of Sid’s work would say the same.

The donors have to trust that the developer will finish it, of course; but this is effectively how freeware development works now. Somebody makes a name for themselves with a piece of freeware; they ask for donations; the donations help to fund further work on a new version. So far it has only been tried on a small scale, but—as the mobile and casual games are showing us—there’s still plenty of demand for small scale games in the world.

(A variant of this system, pioneered by cyberspace engineer Crosbie Fitch, is already in place for music, except that people give pledges rather than donations. When the musician releases the work, she collects all the pledges made towards it. See www.quidmusic.com for details. Credit where it’s due: I first heard about this whole idea from Crosbie.)

In short, there are a heck of a lot of ways to recover the development and marketing costs of video games besides trying to sell individual physical copies and prevent their duplication. That system is awkward, wasteful, and theft-prone. It supports too many middlemen and, like Prohibition, puts money in the pockets of some very nasty gangsters.

Of course, some alternative distribution models still rely on copyright, and publishers will still be trying to prevent people from redistributing their content. But sooner or later that model is doomed. The perceived value of a thing is inversely proportional to the ease with which it can be duplicated. If the public simply refuse to acknowledge that copying books or movies or software is wrong, then in a democracy, it will eventually cease to be wrong. People elect the legislators, and legislators make the laws.

Does the end of copyright mean that books or music or movies or games will die? Of course not. The urge to create is too strong in all of us, and consumers will always be willing to pay for novelty and for excellence. It may mean that nobody gets mega-wealthy any more. What it does mean for sure is that the giant dinosaurs that currently dominate the distribution channels had better learn to adapt or die. There are a lot of fast-moving little mammals in the underbrush eating the dinosaurs’ eggs.

And fifty years from now, kids will be asking, “What does that © symbol mean in this old book, Grandpa?”

From 2005

http://www.gamasutra.com/features/20051128/adams_01.shtml





Orphan Works Bill Clears Senate Committee, May Soon Find Home
Nate Anderson

Twitter: it's not just for telling friends about that burrito you had for lunch. Public Knowledge's Alex Curtis spent yesterday's Senate committee hearing on the orphan works bill "live twittering" the hot markup action to the world as the bill passed out of the Judiciary Committee with only minor changes. Despite making quick progress in both the House and the Senate, the bill has also started attracting attention from copyright holders who worry it could dilute the value of their work.

The US Register of Copyrights, Marybeth Peters, did a great job of explaining what's at issue here in her testimony to Congress back in March.

"We heard from average citizens who wished to have old photographs retouched or repaired but were denied service by the photo shops," she said. "They ask the customer to produce evidence that the photographer has agreed to allow the reproduction of the photo (which will be necessary to retouch or repair the photo). But of course the customer has no idea who the photographer at his parents' wedding was, or quickly hits a brick wall when attempting to track that person down."

These are "orphan works," copyrighted materials that lack any obvious way to find the rightsholder. But just going ahead and using the material can be risky; if a rightsholder shows up after your museum exhibition, documentary, or parents' wedding photographer is in the wild, he or she can seek massive statutory damages.

Orphan works legislation attempts to remedy this problem by allowing people to use material after a "good faith" search for the owner; it also creates electronic databases to make searching for owners easier. Should a rightsholder emerge, that person would be owed money but not massive damages.

The whole procedure worries some copyright owners like Nick Anderson, who does editorial cartoons for the Houston Chronicle. Anderson drew a not-for-publication-in-the-Chronicle cartoon of copyright being flushed down the toilet by an orphan works law to protest what he sees as a move to weaken the value of his portfolio.

"The legislation imposes new and onerous burdens on the current holders of copyrights to protect their work, while severely curtailing their ability to collect damage," he wrote on his blog. "It devalues their work in the marketplace and will open up a Pandora's box of potential infringement scenarios, all while placing the burden for policing the marketplace on artists and authors."

Digital technology is in part responsible for the proliferation of sounds and images without apparent copyright information. As Peters put it, "Digital technology has made it easier for a work or part of a work (such as a sound recording or a 'sample') to become separated from ownership or permissions information, whether by accident or through deeds of bad faith actors."

But the bill is sailing through Congress, which appears bent on trying to pass it before it expires when Congress recesses (probably in September or early October, this being an election year). Both Public Knowledge and Marybeth Peters support the bill, which in itself is something of a once-in-a-blue-moon occurrence, and Senate and House representatives seem to feel the same way.
http://arstechnica.com/news.ars/post...find-home.html





BBC Sends Legal Threat Over Fan's Dr Who Knitting Patterns
Glyn

Mazz has been posting knitting patterns to help other people re-create characters from the cult series using only two sticks and ball of wool. Impressive? The BBC, producers of the series, didn't think so. They sent Mazz a letter, which states:

"We note that you are supplying DR WHO items, and using trade marks and copyright owned by BBC. You have not been given permission to use the DR WHO brand and we ask that you remove from your site any designs connected with DR WHO. Please reply acknowledging receipt of this email, and confirm that you will remove the DR WHO items as requested."
http://www.boingboing.net/2008/05/09...egal-thre.html





Closing the Door to Microsoft Vista

A number of companies are opting not to embrace Redmond's latest operating system and, like GM, are waiting for Windows 7 instead
Aaron Ricadela

General Motors (GM) may take a detour around Vista, the latest computer operating system from Microsoft (MSFT). The automaker has encountered so many speed bumps getting Vista to work on its machines that it may just wait for the next version of Windows, due in 2010 or 2011. "We're considering bypassing Vista and going straight to Windows 7," says GM's Chief Systems & Technology Officer Fred Killeen.

Vista taxes all but the most modern PCs with hefty processing and memory requirements. Many of GM's PCs can't even run the system. "By the time we'd replace them, Windows 7 might be ready anyway," Killeen says. Then there are compatibility problems with all the software that needs to run on Windows. GM's software vendors still haven't ensured all their programs will run on Vista trouble-free. So the company is sticking with Windows XP for now. Killeen figures GM could install Windows 7 in three or four years.

Equal Parts Rejection and Acceptance

Many of Killeen's counterparts across Corporate America are finding themselves similarly vexed by Vista. The resulting delay or rejection of Microsoft's flagship product is stepping up pressure on the company to expand other areas of its business, including online software. Vista was first released in late 2006, but the dismay with it has come into sharper focus as slower-than-expected uptake affects Microsoft's bottom line, Google (GOOG) spiffs up its own free versions of competing software, and corporate tech managers move to put more Apple Macs on employee desks (BusinessWeek, 5/1/08).

Microsoft says it has sold 140 million copies of Vista as of Mar. 31, about the same percentage of all PCs as ran Windows XP at this point in its lifetime. The 140 million includes consumers who have to take the latest version when they buy a new PC as well as businesses that are entitled to Vista rights under licensing agreements, regardless of whether they end up using the system widely.

Among corporate users, it's nothing new for companies like GM to skip releases of Windows, says Mike Nash, a corporate vice-president at Microsoft. He points to customers including Continental Airlines (CAL), Bank of America (BAC), Cerner (CERN), and Royal Dutch Shell, which are installing Vista on thousands of machines, as evidence of the system's acceptance. For their part, consumers are warming to the improved performance and availability of popular software such as Apple's (AAPL) iTunes and Intuit's (INTU) QuickBooks on Vista PCs. "We're seeing tremendous transition to Vista, particularly in the consumer space," Nash says.

Vista vs. Web-Delivered Software

Even as Vista catches on with some users, Microsoft recognizes the need to streamline Windows development as computer users increasingly turn to Web-delivered software, instead of regularly upgrading PCs to run the latest power-hungry programs. "The rush to get into a new product doesn't really exist like it used to," says Al Gillen, an analyst at market researcher IDC. "Killer applications that pull you forward are becoming fewer and further between."

Alaska Airlines (ALK) is among companies that see diminishing value in running the latest Microsoft desktop technology when so many applications are available via a Web browser. "There's no business value in us continuing to chase that upgrade cycle," says Senior Vice-President and CIO Bob Reeder. So as PCs need replacement, the airline buys Vista-equipped machines for its roughly 2,000 office workers from Dell (DELL), then exercises its right to downgrade the machines to XP. About 8,000 PCs used mostly by gate agents and airport crews run a variety of older Windows versions. Reeder says the company plans to skip Vista.

Waiting to Upgrade

Vista delivers security improvements over XP, but doesn't offer compelling features that users clamor for, analysts say. So as IT budgets stagnate or decline, the new operating system isn't winning the war for resources. "Vista doesn't look like a good expenditure of money," says an executive in charge of IT buying at a large engineering and construction firm, who wasn't authorized to speak about his company's purchasing. The IT department is concerned about the cost of new hardware that can run Vista, and the time it will take to move software.

Corporate technology managers and Vista users have pilloried the system for a host of other annoyances and incompatibilities (BusinessWeek, 1/23/08), and many are opting to put off Vista deployments—or forgo the software altogether. Just 7% to 8% of business PCs at clients of Gartner (IT) run the system, and many CIOs are asking for advice about how to skip it, according to the consulting company.

Transco Railway Products, a Chicago maker of railcar parts, may leapfrog Vista because it bought new computers just before the system's release, and probably won't replace them for another year and a half. "We'll probably wait for the next operating system," says Chris Kuersten, Transco's IT manager.

Vista and the Bottom Line

The lack of urgency for upgrading to Vista is starting to hurt Microsoft financially. After two quarters of strong growth, sales in the desktop Windows group, the company's most profitable, fell 2%, to $4.03 billion, during the fiscal third quarter, which ended Mar. 31, leading to an 11% drop in profits for the quarter (BusinessWeek.com, 4/25/08). Microsoft can't afford too many slips like that, since it uses Windows and Office profits to subsidize money-losing efforts including Internet advertising, where it lags Google. Microsoft will likely pour even more money into search engines, Web software, and online ad tools in the wake of its failed bid for Yahoo.

Brent Thill, software research director at Citigroup (C), says sales of Windows desktop products should increase 11%, to $4.2 billion, in the quarter that ends in June. But Vista adoption is still short of where Microsoft would like it to be—just 65% of Windows copies sold in the third quarter were Vista and about 35% were Windows XP. Microsoft wanted the number at 80%, according to Thill. "It's just not taking off," he says. Microsoft attributed the sales shortfall to a comparison with Vista's first quarter on the market, software piracy in China, and unsold PC inventory, but investors are looking for signs of deeper trouble. "Everyone's still scratching their heads, asking, 'Is there something else going on?'" he says.

A More-Modular Windows?

There's plenty afoot at Microsoft headquarters in Redmond, Wash., where developers are hard at work on the next version of Windows. Executives aren't saying much about Windows 7, lest they risk being accused of overpromising and underdelivering again. However, Microsoft CEO Steve Ballmer has sworn the company would never again have a five-year gap between releases, like it did between XP and the oft-delayed Vista.

Chairman Bill Gates and others have hinted that Windows will become more modular (BusinessWeek.com, 1/30/07), letting Microsoft release portions of the product, including its Web browser, on a faster pace. And analysts say Microsoft will likely use virtual machine technology to run older programs, freeing Windows from the burden of having to support a slew of outmoded code, which could step up release dates.

There are other signs of change in Microsoft's approach to Windows. The company on Apr. 22 took its boldest step yet toward unifying its PC desktop franchise with the Web, announcing an online service called Live Mesh that lets users share files among their various PCs, and eventually mobile phones and Macs, within an online version of their desktop. The product, in test mode for now, illustrates Microsoft's strength at encouraging maverick groups—something it will need more of to take on Google and rewire Windows for the Web, says analyst Rob Enderle, principal of the Enderle Group consultancy. "Live Mesh represents the company Microsoft is trying to become," Enderle says. "My hope is with Windows we'll see a lot more of the company they want to become."
http://www.businessweek.com/technolo...rss_topStories





Microsoft Joins Effort for Laptops for Children
Steve Lohr

After a years-long dispute, Microsoft and the computing and education project One Laptop Per Child said Thursday that they had reached an agreement to offer Windows on the organization’s computers.

Microsoft long resisted joining the ambitious project because its laptops used the Linux operating system, a freely distributed alternative to Windows.

The group’s small, sturdy laptops, designed for use by children in developing nations, have been hailed for their innovative design. But they are sold mainly to governments and education ministries, and initial sales were slow, partly because countries were reluctant to buy machines that did not run Windows, the dominant operating system.

Education ministries want low-cost computers to help further education, but many see familiarity with Windows-based computing as a marketable skill that can improve job prospects.

“The people who buy the machines are not the children who use them, but government officials in most cases,” said Nicholas Negroponte, founder of the nonprofit group. “And those people are much more comfortable with Windows.”

The XO laptop weighs 3.2 pounds and comes with a video camera, microphone, game-pad controller and a screen that rotates into a tablet configuration. About 600,000 have been ordered since last fall, with Peru, Uruguay and Mexico making the largest commitments. The alliance between Microsoft and O.L.P.C. comes after long stretches of antagonism, punctuated by occasional talks, between them.

Mr. Negroponte, a former computer researcher at the Massachusetts Institute of Technology and a new-media pioneer, said he first talked to Bill Gates, Microsoft’s chairman, three years ago.

But at the time, Microsoft was fiercely opposed to anything that might promote the use of open-source software like Linux. Since then, Microsoft has become more comfortable in competing against Linux, at times running its products on the same machines in data centers, desktops and laptops, Mr. Negroponte noted.

Back then, he added, the nonprofit laptop project did not have a working machine.

Last year, Mr. Negroponte said, he contacted Mr. Gates again, and this time the Microsoft chairman was receptive. He instructed Craig Mundie, Microsoft’s chief research and strategy officer, to work out a deal with Mr. Negroponte. Those talks began in January in private meetings, when both men were attending the Consumer Electronics Show in Las Vegas.

“Customers have come to us and said they really like the XO laptop and they would like to see Windows on it,” said James Utzschneider, manager of Microsoft’s developing markets unit.

The first of the project’s child-friendly XO laptops running Windows XP will be tested next month in limited trials in four or five countries. Mr. Utzschneider declined to identify the countries, but he said XO laptops running Windows would be generally available by September.The pact with Microsoft is not an exclusive agreement. The Linux version will still be available, and the group will encourage outside software developers to create a version of the project’s educational software, called Sugar, that will run on Windows.

Windows will add a bit to the price of the machines, about $3, the licensing fee Microsoft charges to some developing nations under a program called Unlimited Potential. For those nations that want models that can run both Windows and Linux, the extra hardware required will add another $7 or so to the cost of the machines, Mr. Negroponte said.

The laptops now cost about $200 each, and the project’s goal is to eventually bring the price down to about $100.

O.L.P.C. led the way in designing inexpensive laptops for children in poorer nations, but others have followed, notably Intel with its Classmate PC, which runs Windows and is $400 or less.

The project’s agreement with Microsoft involves no payment by the software giant, and Microsoft will not join One Laptop Per Child’s board. That contrasts with the approach of Intel, which joined the project last July, took a board seat and pledged an $18 million contribution — only to quit in January amid squabbling over Intel’s aggressive sales tactics with the Classmate PC.

Of the Microsoft arrangement, Mr. Negroponte said: “We’ve stayed very pure.”

But the alliance with Microsoft has created some turmoil within the project. Walter Bender, the president who oversaw software development, resigned last month. His departure, Mr. Negroponte said, was “a huge loss to O.L.P.C.”

Inside the project, there have been people who, Mr. Negroponte said, came to regard the use of open-source software as one of the project’s ends instead of its means.

“I think some people, including Walter, became much too fundamental about open source,” Mr. Negroponte said.

In an e-mail message, Mr. Bender wrote that he left the project because he decided his efforts to develop and support the Sugar open-source learning software “would have more impact from outside of O.L.P.C. than from within.”

Outside the constraints of working on a single hardware platform, like the XO laptop, his work, he wrote, should “lead to a broader base, more options, and a better set of tools for children.”
http://www.nytimes.com/2008/05/16/te.../16laptop.html





'$100 Laptop' Platform Moves On
Jonathan Fildes

An independent effort to develop the software originally designed for the $100 laptop has been launched.

Sugar Labs will take the laptop's innovative interface, known as Sugar, to the "next level of usability and utility", according to its founders.

It is intended that the free software will be made available on other PCs, such as the popular Asus Eee.

The launch comes after the announcement that the group behind the $100 laptop has joined forces with Microsoft.

The deal means that One Laptop per Child (OLPC) will now offer the low cost laptops with Windows XP, as well as an open source alternative.

It will also continue to offer the Sugar educational interface that the new foundation intends to continue to develop.

"We will continue to work with OLPC but we will also work with other manufacturers," explained Sugar Labs founder Walter Bender.

"Hopefully it will mean that these ideas will get out there faster and to a broader community."

Divergent views

Until recently Mr Bender was second in command and the person who had been responsible for software and content on the XO, as the $100 laptop is known. He resigned in April.

"I didn't leave OLPC because of the Microsoft deal - it was a symptom rather than the cause," he told BBC News.

"I left OLPC because I think the most important thing it is doing is defining a learning ecosystem."

He said that over time his own views on how best to bring education to children in the developing world had diverged from those held by OLPC founder Nicholas Negroponte.

"One goal is to just maximise the number of laptops you get out to kids. And that is unequivocally Nicholas' goal."

But, he said, there was another approach.

"My approach is to demonstrate to the world a way to [deliver education] that is impactful and can scale but not be the one that necessarily does the delivering of the laptops.

"I felt that OLPC was moving very rapidly towards Nicholas' goal and my goal within the organisation was going to be more difficult to achieve."

Sweet work

Sugar is a user interface that allows children to collaborate even when working on different machines. For example, they can write documents or make music together.

The open source software also contains a journal and automatically saves and backs up all data.

"In order to provide a rich learning experience to as many of the world's children as possible, it is critical to not just provide computers to children, but to ensure that the software that runs on the computers maximizes the potential for engaging in activities that promote learning," said Mr Bender.

"By being independent of any specific hardware platform and by remaining dedicated to the principles of free and open source software, the Sugar platform ensures that others can develop diverse interfaces and applications for governments and schools to choose from."

Sugar Labs will work closely with developers from the open source community to develop the user interface for other computers and operating systems.

It has already been bundled with the most recent releases of the Ubuntu and Fedora Linux operating systems.

OLPC has said it will also continue to develop Sugar through "third parties" and will develop a version for Windows XP, something that Mr Bender does not consider a priority.

"There's a lot of engineering and it is not clear that it's the best use of engineering resources at this moment," he explained.

However, he said, this did not mean that he did not support OLPC's activities.

"I want to make it clear that it is aligned with, rather than against, OLPC."
http://news.bbc.co.uk/go/pr/fr/-/2/h...gy/7405346.stm





Senators Ask FBI to Explain Flawed 'National Security Letter' to Internet Archive
Ryan Singel

A bipartisan group of U.S. senators is asking FBI head Robert Mueller to explain why the feds sought records from the Internet Archive, a digital library, using a controversial administrative subpoena known as a National Security Letter, which is intended for a communications service providers.

The Internet Archive, a digital library of the web and media, beat the November 26 NSL with the help of attorneys at the Electronic Frontier Foundation and the American Civil Liberties Union. In April, the FBI agreed to withdraw the request for records on a Internet Archive user and lift the gag order that typically attaches to such requests.

The six senators sent Mueller a letter Thursday, asking him to explain what happened and to find out if the FBI reported the incident to an oversight board as a possible violation of federal law.

The Internet Archive's case is only the third known legal challenge to NSLs, despite the fact that the the FBI issues tens of thousands a year -- more than 100,000 such letters were issued in 2004 and 2005 combined. But despite the lack of legal challenges from recipients at ISPs, telephone companies and credit bureaus, successive scathing reports from the Justice Department's Inspector General have found illegal letters and a willy-nilly culture within the bureau towards tracking their usage.

The tools are powerful because an FBI agent looking into a possible anti-terrorism case can essentially self-issue the NSL to a credit bureau, ISP or phone company with only the sign-off of the Special Agent in Charge of their office. Recipients may challenge the order in secret court proceedings, but are almost always barred for life from disclosing to anyone, including business partners and significant others, that they received such a letter.

Senator Russell Feingold (D-Wisconsin), the only senator to vote against the USA Patriot Act that eased the usage of NSLs, signed the Thursday letter (.pdf), along with senators John Sununu (R-New Hampshire), Richard Durbin (D-Illinois), Lisa Murkowski (R-Alaska), Ken Salazar (D-Colorado) and Chuck Hagel (R-Nebraska).

Specifically, they asked Mueller if the FBI actually believed that the Internet Archive was an communications service provider. If it were, FBI agents could get subscriber records using an NSL under the auspices of the Electronic Communications Protection Act. But if the Internet Archive is a library, that subpoena would be inapplicable and possibly illegal. That would mean that the NSL should be reported to the Intelligence Oversight Board as a possible violation of law.

The senators are asking Mueller if the Internet Archive subpoena actually was reported to the board.

That's a wise question to ask given that Justice Department Inspector General Glenn Fine has reported that the FBI has been negligent and tardy in reporting possible violations of federal NSL power.

It also makes sense in light of an odd case of a withdrawn NSL to a university that was later used by Mueller to argue for expanded court-free subpoena powers. The FBI only reported that overreaching subpoena for medical records at the end of 2007 as the Inspector General was sniffing around the case.

THREAT LEVEL has its own sets of questions:

First -- In July 2007, FBI agents met with the Internet Archive's lawyers -- the Electronic Frontier Foundation -- to talk about getting information from the Archive. Some four months later, a seemingly totally deficient NSL was dropped on the Archive. It was signed not by the local Special Agent in Charge, but by Art Cummings, a top Justice Department counter-terrorism official.

Knowing that the Internet Archive is represented by lawyers who would jump at the chance to file a constitutional challenge to national security letters, wouldn't you think the FBI would take the four months between the initial meeting and the issuance of the letter to make sure the NSL complied with the law?

This seems especially odd given that in September 2007 -- two months prior -- the NSL statute had been ruled unconstitutional by a federal judge because of the gag order -- a ruling that is currently under appeal by the feds.

Second, the NSL (.pdf) dropped on the Archive is now public, but curiously the boilerplate section of the letter that advises recipients on what kinds of things to search for and what counts as an electronic communication record is blacked out. The law isn't very clear on what that phrase means, but in other cases, is very specific about what is and is not covered under wiretapping rules. NSLs are not supposed to be used to get at the contents of a communication, though they can be used to get things like phone records.

Why does the FBI think that list of possible records should be secret? Does that list contain items that are actually content -- for instance, URLs visited by a person?

Perhaps not surprisingly, the Center for Democracy and Technology called today for new legislation to regulate National Security Letters, saying the FBI is clearly incapable of policing itself.
http://blog.wired.com/27bstroke6/200...rs-ask-fb.html





Air Force Aims for 'Full Control' of 'Any and All' Computers
Noah Shachtman

The Air Force wants a suite of hacker tools, to give it "access" to -- and "full control" of -- any kind of computer there is. And once the info warriors are in, the Air Force wants them to keep tabs on their "adversaries' information infrastructure completely undetected."

The government is growing increasingly interested in waging war online. The Air Force recently put together a "Cyberspace Command," with a charter to rule networks the way its fighter jets rule the skies. The Department of Homeland Security, Darpa, and other agencies are teaming up for a five-year, $30 billion "national cybersecurity initiative." That includes an electronic test range, where federally-funded hackers can test out the latest electronic attacks. "You used to need an army to wage a war," a recent Air Force commercial notes. "Now, all you need is an Internet connection."

On Monday, the Air Force Research Laboratory introduced a two-year, $11 million effort to put together hardware and software tools for "Dominant Cyber Offensive Engagement." "Of interest are any and all techniques to enable user and/or root level access," a request for proposals notes, "to both fixed (PC) or mobile computing platforms... any and all operating systems, patch levels, applications and hardware." This isn't just some computer science study, mind you; "research efforts under this program are expected to result in complete functional capabilities."

Unlike an Air Force colonel's proposal, to knock down enemy websites with military botnets, the Research Lab is encouraging a sneaky, "low and slow" approach. The preferred attack consists of lying quiet, and then "stealthily exfiltrat[ing] information" from adversaries' networks.

But, in the end, the Air Force wants to see all kinds of "techniques and technologies" to "Deceive, Deny, Disrupt, Degrade, [or] Destroy" hostile systems. And "in addition to these main concepts," the Research Lab would like to see studies into "Proactive Botnet Defense Technology Development," the "reinvent[ion of] the network protocol stack" and new antennas, based on carbon nanotubes.

Traditionally, the military has been extremely reluctant to talk much about offensive operations online. Instead, the focus has normally been on protecting against electronic attacks. But in the last year or so, the tone has changed -- and become more bellicose. “Cyber, as a warfighting domain . . . like air, favors the offense,” said Lani Kass, a special assistant to the Air Force Chief of Staff who previously headed up the service's Cyberspace Task Force. "If you’re defending in cyber, you’re already too late."

"We want to go in and knock them out in the first round," added Lt. Gen. Robert Elder, commander of the 8th Air Force, which focuses on network issues.

"An adversary needs to know that the U.S. possesses powerful hard and soft-kill (cyberwarfare) means for attacking adversary information and command and support systems at all levels," a recent Defense Department report notes. "Every potential adversary, from nation states to rogue individuals... should be compelled to consider... an attack on U.S. systems resulting in highly undesireable consequences to their own security."
http://blog.wired.com/defense/2008/0...rce-mater.html





NSA Attacks West Point! Relax, It's a Cyberwar Game
David Axe

Five hours into their assault on West Point, the hackers got serious.

The SQL [structured query language] inserts that came earlier were just pablum intended to lull the Army cadets into a false sense of security. But then the bad guys unleashed a stealthy kernel-level rootkit that burrowed into one workstation, started scraping data and "calling home."

It was a highly sophisticated attack, but this time the bad guys were really good guys in wolves' clothing.

For four days in late April, the National Security Agency -- the nation's most secretive repository of spooks, snoops and electronic eavesdroppers -- directed coordinated assaults on custom-built networks at seven of the nation's military academies, including West Point, the Army university 50 miles north of New York City.

It was all part of the seventh annual Cyber Defense Exercise, a training event for future military IT specialists. The exercise offered a rare window into the NSA's toolkit for infiltrating, corrupting or destroying computer networks.

The 34 Army cadets comprising the West Point IT team operated in a different kind of battlefield, but their combat skills and instincts need to be every bit as sharp. Like George Washington said: "There is nothing so likely to produce peace as to be well prepared to meet the enemy."

The SQL injections, targeting their Fedora Core 8 Web server, were a piece of cake for these IT combatants. Each injection tried to smuggle malicious code inside the seemingly harmless language used by the network’s MySQL software. The cadets handily defended with open source Apache web server modules, plus some manual tweaking of the SQL database to "avoid any surprises," in the words of Lt Col. Joe Adams, a West Point instructor who helped coach the team.

But the kernel-level rootkit was much more dangerous. This stealthy operating-system hijacker can open unseen "back doors" into even highly protected networks. When they detected the rootkit's "calls home" the cadets launched Sysinternal's security software to find the hijacker, then they manually scoured the workstation to find the unwelcome executable file.

Then they terminated it. With extreme prejudice.

"This was probably the most challenging part of the exercise, since it required them to use some advanced techniques to find the rootkit," Adams says. And rooting it out helped boost the West Point team to the top of the pile when, in the aftermath of the exercise, the referees rated all the universities' network defenses.

For the second year in a row, the Army placed first over the Navy, Air Force, Coast Guard and others, winning geek bragging rights and the privilege of holding onto a gaudy, 60-pound brass trophy festooned with bald eagles and American flags. Adams credits the team’s thorough preparation and their excellent teamwork despite the round-the-clock schedule.

At the network control room on the second floor of West Point’s 200-year-old engineering building (which once was an indoor horse corral and still smells like it in some remote corners, according to one instructor), the IT team set up cots and, just for the hell of it, camouflaged netting. They worked in shifts, with one team member always monitoring incoming and outgoing traffic. He or she would alert other cadets -- "router guys" -- to block any suspicious addresses. Meanwhile, off-shift cadets would make food and coffee runs to keep everyone fueled up and alert. Together, the team was "faster than anyone else," Adams says.

But the way the cadets designed their network was a big factor in their victory, too. The NSA dictated some terms: All networks had to be capable of e-mail, chat and other services and had to be up and running at all times despite any attacks or defensive measures. Beyond that, the teams were free to come up with their own designs.

West Point's took three weeks to build. The cadets settled on a fairly standard Linux and FreeBSD-based network with advanced routing techniques for steering incoming traffic in directions of the IT team's choosing.

The choices in software tools for responding to any attack really boiled down to "automatic" versus "custom," says Eric Dean, a civilian programmer and instructor. He adds that while automatic tools that do most of their own work are certainly easier, custom tools that allow more manual tweaking are more effective. "I expect one of the 'lessons learned' will be the use of custom tools instead of automatics."

Even with a solid network design and passable software choices, there was an element of intuitiveness required to defend against the NSA, especially once it became clear the agency was using minor, and perhaps somewhat obvious, attacks to screen for sneakier, more serious ones.

"One of the challenges was when they see a scan, deciding if this is it, or if it’s a cover," says Dean. Spotting "cover" attacks meant thinking like the NSA -- something Dean says the cadets did quite well. "I was surprised at their creativity."

Legal limitations were a surprising obstacle to a realistic exercise. Ideally, the teams would be allowed to attack other schools' networks while also defending their own. But only the NSA, with its arsenal of waivers, loopholes, special authorizations (and heaven knows what else) is allowed to take down a U.S. network.

And despite the relative sophistication of the NSA's assaults, the agency told Wired.com that it had tailored its attacks to be just "a little too hard for the strongest undergraduate team to deal with, so that we could distinguish the strongest teams from the weaker ones."

In other words, grasshopper, nice work -- but the NSA is capable of much craftier network take-downs.
http://www.wired.com/politics/securi...urrentPage=all





Estonian Cyber Defence Hub Set Up
BBC

Seven Nato nations have backed a new cyber defence centre in Estonia, which last year blamed Russia for weeks of attacks on its internet structure.

Germany, Slovakia, Latvia, Lithuania, Italy and Spain will staff and fund the hub in the Estonian capital Tallinn.

Estonia came under cyber attack in 2007 after its decision to remove the bronze statue of a Red Army soldier from the centre of Tallinn.

Moscow denied involvement in the flood of data which crashed computers.

"We have seen in Estonia that a cyber attack can swiftly become an issue of national security," Nato spokesman James Appathurai said after a signing ceremony in Brussels.

"Cyber attacks can cripple societies."

The US will initially send an observer to the project, which will have some 30 staff when fully operational in August.

The centre will provide research, consultation and training on the development of cyber defences for participating national governments.
http://news.bbc.co.uk/go/pr/fr/-/2/h...pe/7401260.stm





Shape-Shifting Malware Hits the Web
Clement James

Security experts have warned that new developments in malware are allowing criminals to stay one step ahead of security software.

Marc Henauer, head of the cyber-crime division at the Swiss Justice and Police Department, said in an interview last week that viruses and other malware now have the capability to change their signature every few hours.

This means that the attackers are often one step ahead of protection software.

Geoff Sweeney, chief technology officer at Tier-3, a behavioural analysis IT security firm, echoed the remarks.

"Self-changing code designed to dynamically evade recognition is a fact of life," he said. "It automatically adapts to the anti-spam and anti-malware engines that it encounters."

Unfortunately the know-how and construction kits used to create this shape-shifting threat are now readily available and are unleashing a wave of malware based on social engineering techniques.

"Highly targeted emails containing personalised information and shape-shifting Trojan attachments are the latest development," said Sweeney.

"Each positive infection increases the 'hit rate' for the next wave of emails sent out by the self-learning automated engines used by sophisticated attackers."

Sweeney believes that a non rules-based monitoring process must be set up to defend all ingress and egress points covering SMTP, DNS, HTTP(s), IM etc.

"Once this is in place, defence against shape-shifting threats becomes possible as does the removal of any previously established covert data leakage channels that will be revealed and dealt with," he said.
http://itnews.com.au/News/76128,shap...s-the-web.aspx





RIPA Decryption Use Disclosed

The Home Office has disclosed police use of powers to demand the decryption of data or production of decryption keys. The powers, created as s53 of the Regulation of Investigatory Powers Act 2000 (RIPA), came into force on 1st October 2007. Since that date eight notices have been served, which with the following results:

• Compliance by recipient of notice, on two occasions;
• Refusal to comply and prosecution, on two occasions;
• Refusal to comply, and the authorities are still considering whether to prosecute, on two occasions;
• No information from the Home Office statement, the remaining two occasions.

None of these cases has yet come to court.

The Home Secretary stated that the four cases where the suspect refused to comply were in terrorism-related investigations; the Register reports that the other four cases were investigations for conspiracy to murder; withholding information in relation to conspiracy to murder; conspiracy to defraud; and making indecent images of children.
http://publicaffairs.linx.net/news/?p=756





Quantum Cryptography Not Yet Perfectly Secure, Researchers Say
Liz Tay

Quantum cryptography – commonly lauded as an absolutely secure avenue of data transfer – has been broken.

The advanced technology was thought to be unbreakable due to laws of quantum mechanics that state that quantum mechanical objects cannot be observed or manipulated without being disturbed.

In quantum cryptography, regular information is encrypted and decrypted with a quantum key. Any attempts to copy a quantum cryptographic key in transit will be noticeable as extra noise, and cause the communication to be aborted.

But a research team at Linköping University in Sweden claim that it is possible for an eavesdropper to extract the quantum cryptographic key without being discovered.

“We weren't expecting to find a problem in quantum cryptography, of course, but it is a really complicated system,” said Jan-Åke Larsson, an associate professor of Applied Mathematics at the University.

“The concern involves authentication, intended to secure that the message arriving is the same as the one that was sent,” he explained. “We have scrutinised the system as a whole and found that authentication does not work as intended.”

“The security of the current technology is not sufficient,” he said.

The currently-used Wegman-Carter authentication protocol requires users to share the key initially, before the quantum cryptographic channel is set up. This key is used to generate future quantum cryptographic keys.

By simultaneously manipulating the initial key and the regular message to be authenticated, an eavesdropper may compromise the security of quantum cryptographic authentication, the researchers suggest.

In a research paper, published in the International engineering journal IEEE Transactions on Information Theory, Larsson has proposed a change in the quantum cryptography process that he expects will restore the security of the technology.

The researchers propose an additional, non-quantum exchange of a small amount of random bits that are separate from the quantum key. The modification is not expected to produce noticeable degradations in the performance of a quantum cryptography system.

While the researchers note that it is difficult to exploit the recently-exposed security gap, Larsson recommends usage of the modification, or an equivalent extra security measure in quantum cryptography.

“With our alteration, quantum cryptography will be a secure technology,” he said.
http://itnews.com.au/News/75938,quan...chers-say.aspx





Google Begins Blurring Faces in Street View
Stephen Shankland

Google has begun testing face-blurring technology for its Street View service, responding to privacy concerns from the search giant's all-seeing digital camera eye.

The technology uses a computer algorithm to scour Google's image database for faces, then blurs them, said John Hanke, director of Google Earth and Google Maps, in an interview at the Where 2.0 conference here.

Google has begun testing the technology in Manhattan, the company announced on its LatLong blog. Ultimately, though, Hanke expects it to be used more broadly.

Dealing with privacy--both legal requirements and social norms--is hard but necessary, Hanke said.

"It's a legitimate issue," he said. He likened the issues some have with Street View to the ones that took place when Google introduced aerial views to Google Maps. It took time for the public, regulators, and Google to get comfortable with the feature, but, "It needs that debate. We see that and try to let it play out."

New jurisdictions, new rules

Street View poses other privacy issues besides just faces. Some people aren't eager to have their houses on display, for example. But much of the hubbub seems to have waned since Google launched Street View in May 2007, and indeed other companies such as Blue Dasher are working on similar technology.

Street View presents a view of dozens of United States cities from a driver's perspective (unless a plastic bag is stuck over the Street View camera). It appears Google has begun collecting imagery in Europe as well, along with detailed 3D maps, including Milan, Rome, and Paris.

A Pittsburg couple sued Google for allegedly photographing images on a private drive in April, but it's legal to take photos from public streets in the United States. However, standards vary.

"A just balance needs to be found between what can be publicized, in deference to the principles of freedom of expression and of information, and what has to be safeguarded from excessive public curiosity, so as to avoid infringing the individual's right to privacy and right to his or her picture," the French embassy observes.

Years of research

The face-blurring technology took a year to develop and is based on prior research that took several more years, Hanke said.

Face detection, which humans perform effortlessly with help from some dedicated neurons in the visual cortex, is a decades-old computer science problem. It's finally arriving in basic form in real-world applications, though, including digital cameras that use it to track and properly expose subjects or take a picture only when subjects are smiling.

There are some potential complications for Google Street View, though. False positives that blur billboards or works of art with faces could degrade Street View a bit, but missing some faces that are visible could pose privacy problems.

Google thinks its technology has struck the right technology balance in general.

"It does a good job of figuring that out. It uses a variety of technologies to filter," Hanke said, though it's "not perfect."

Many times computer algorithms struggle to recognize faces that aren't straightforward views. But that problem isn't as bad for Google: the faces that are obscured by hair, telephone poles, or oblique views are likely the ones identifiable already.
http://www.news.com/8301-10784_3-9943140-7.html





Mormon Church Attempts to Gag Internet Over Handbook
WikiNews

The Wikimedia Foundation has received a copyright infringement claim from The Church of Jesus Christ of Latter-day Saints, widely known as the Mormon Church or LDS Church. The infringement claim is in reference to a URL used as a source in a Wikinews article about Mormon Church documents leaked to the website Wikileaks, titled "Copy of handbook for leaders of the Church of Jesus Christ of Latter-day Saints obtained by Wikinews". The URL was originally cited as a link in the sources subsection of the article. The Wikimedia Foundation is a donor-supported non-profit organization which runs Wikipedia and Wikinews. This is the first time that the Wikimedia Foundation has received a copyright infringement claim regarding an article published by Wikinews.

The Wikinews article, originally published on April 19, described material in the Church Handbook of Instructions. The work is a two-volume book of policies and is a guide for leaders of the Mormon Church. Wikinews obtained the Church Handbook of Instructions from Wikileaks, a whistleblower website which publishes anonymous submissions of sensitive documents while preserving the anonymity of its contributors. Wikileaks describes the material as significant because "...the book is strictly confidential among the Mormon (Church of Jesus Christ of Latter-day Saints, aka LDS in short form) bishops and stake presidents and it reveals the procedure of handling confidential matters related to tithing payment, excommunication, baptism and doctrine teaching (indoctrination)."

The material was released on the Wikileaks website on April 16, and according to the site was first made available on the document sharing website Scribd. A message at Scribd now states: "This content was removed at the request of copyright agent B. S. Broadbent of the Intellectual Property Division of the Church of Jesus Christ of Latter-day Saints."

On May 5, the Wikimedia Foundation received a copyright infringement claim from Intellectual Reserve, Inc., the legal entity that owns the intellectual property of the Mormon Church. The infringement claim is addressed to Jimmy Wales, the designated agent of the Wikimedia Foundation, and requests that access to the link to Wikileaks be removed. The link was removed from the article on May 5 by a Wikinews administrator, and the article remains available without the link. The infringement claim was sent by Berne S. Broadbent, president of Intellectual Reserve, Inc. and director of the Intellectual Property Division of The Church of Jesus Christ of Latter-day Saints. According to Mike Godwin, general counsel for the Wikimedia Foundation, the Mormon Church has not filed a Digital Millennium Copyright Act (DMCA) notice with the foundation.

In 1999, Jerald and Sandra Tanner, prominent critics of The Church of Jesus Christ of Latter-day Saints, released material from the Church Handbook of Instructions to the Internet through their organization Utah Lighthouse Ministry, without including the copyright notice of Intellectual Reserve, Inc. or obtaining permission from the church. The website of the Utah Lighthouse Ministry describes as its purpose: "...to document problems with the claims of Mormonism and compare LDS doctrines with Christianity." The Tanners had received a copy of the 1998 edition of Church Handbook of Instructions from an anonymous sender in October 1999. They published 17 pages of the 160-page handbook on the Utah Lighthouse Ministry website.

The church sent the Tanners a letter threatening a copyright infringement lawsuit if the material was not removed, and the Tanners removed the material from their site the same day, and posted the church's letter to their website. The website still contained links to other locations that had the material, and an article in the Salt Lake Tribune listed addresses of these links. The church sued the Tanners through its company Intellectual Reserve, in the 1999 case Intellectual Reserve v. Utah Lighthouse Ministry.

The plaintiffs filed their complaint on October 13, 1999, and the United States district court issued a preliminary injunction on December 6, 1999 barring posting of the material by the defendants as well as posting links to other websites which contain the material. The New York Times and other news publications called the injunction a "chilling effect". In November 2002, the church dropped the lawsuit against Utah Lighthouse Ministry, on condition that the Tanners destroy all copies of the Church Handbook of Instructions, and not include more than 50 words at a time from the handbook in any of their future articles. ...

Wikileaks has received copyright infringement claims from organizations including the Church of Scientology's Religious Technology Center and the Swiss Bank Julius Baer, and the Chinese government attempts to censor every website with the word "wikileaks" in the web page address. Bank Julius Baer sued Wikileaks after sending cease and desist letters in January 2008 which cited the Digital Millennium Copyright Act. As a result of the lawsuit, the bank obtained an injunction preventing the site's domain name registrar from associating with Wikileaks, but this injunction was lifted in March 2008 and Bank Julius Baer dropped the case.

As of May 13 Wikileaks had not taken down the material on the Church Handbook of Instructions, and a second webpage at the site with a different version of the material was also still available. In a statement to Wikinews, a Wikileaks representative commented on the material hosted at the site: "WikiLeaks will not remove the handbooks, which are of substantial interest to current and former mormons [sic]. WikiLeaks will remain a place were [sic] people from around the world can safely reveal the truth."
http://wikileaks.org/wiki/Mormon_Chu..._over_handbook





Most Chinese Say They Approve of Government Internet Control
Deborah Fallows

Many Americans assume that China's internet users are unhappy about their government's control of the internet, but a new survey finds most Chinese say they approve of internet regulation, especially by the government.

View PDF of Report

http://www.pewinternet.org/PPF/r/246...rt_display.asp





Chinese Internet Censorship: An Inside Look

Cisco, VPNs and other topics related to Internet access in China
Carolyn Duffy Marsan

James Fallows, national correspondent for The Atlantic Monthly, has experienced "The Great Firewall of China" firsthand, an experience people from around the world will share this summer when the Olympics comes to that country. Based in Beijing, Fallows has researched the underlying technology that the Chinese use for Internet censorship, and he explained it in a recent article titled "The Connection Has Been Reset." We e-mailed Fallows questions about how the Chinese government controls Internet content available to its citizens, and here's what he had to say (Check out our slideshow on the 10 ways the Chinese Internet is different from yours).

You describe four blocking mechanisms that the Chinese government uses to prevent Internet users from viewing content considered harmful. How common is it for Chinese Internet users to experience these sorts of redirections, resets and time-out mechanisms? Can you describe your own Internet surfing experience in China?

If you work from a Chinese Internet cafe – which is still where the vast majority of Chinese Internet activity happens, since so few people have connected computers in their own homes – you experience all of these blocking mechanisms as a matter of course. In some places, like schools, the blocking can be much cruder and indiscriminate. For instance, I have been in several public schools where the "connected" Internet computers were prevented from using any search engine whatsoever. It can be surprisingly hard to get around the 'Net if you can't run any searches! In cafes and in most home connections, all the mechanisms I describe would prevail.

In some hotels and other buildings that cater to Western visitors, the controls may be somewhat relaxed. The authorities don't really care that much about what non-Chinese citizens are able to find. But from my apartments in first Shanghai and now Beijing, I was not able to reach a wide variety of sites – including, often, my own blog at the Atlantic – unless I connected through a VPN. As a matter of course I fire up my VPN at the start of any online session, not just for security but because otherwise I'll be blocked the first time I try a Wikipedia or Technorati link.

Your article says the Chinese Internet control system is constantly changing and that citizens don't know what is off-limits on any given day. Does that make the control system more or less effective in your opinion?

My friend Eamonn Fingleton, says in a new book about China (In the Jaws of the Dragon) that many kinds of government control in China are surprisingly effective precisely because they are so variable and unpredictable in the way they're enforced. Fingleton uses the term "selective enforcement" to describe this process; some Chinese people refer to it by a Chinese saying that boils down to, "One eye open, one eye shut." The idea is that if you're never quite sure when, why and how hard the boom might be lowered on you, you start controlling yourself, rather than being limited strictly by what the government is able to control directly.

When it comes to the Internet, this haziness about just what is and is not permissible has two implications. At a purely technical level, it makes it harder to reverse-engineer the firewall's filters. One day, you can reach all pages at the BBC. The next day they're blocked. If you're trying to game out the system, you're stymied. And at a social level, it makes it hard for people to be sure that they're ever operating in a truly safe zone, since the rules of enforcement might shift tomorrow.

Which is worse: the Chinese government's Internet control system or the censorship systems used by the United Arab Emirates (UAE) or Singapore? Why?

Well, I don't like to use terms like "worse" in this situation. I will say that China's approach is less transparent. According to Andrew Lih, whom I quote in the story, when filters in the UAE or Singapore block a transmission, they tell you that, right in your face. When you can't reach a site from a computer in China, you're never quite sure what's happened. Is the problem with your ISP? With the site itself? Or is the firewall? You never know for sure.

Are average Chinese Internet users afraid of the government's Internet control system?

No. To begin with, not that many of them are even aware of it. The government discourages upfront discussion of the Great Firewall's existence, what sites or search terms are forbidden, etc. Moreover, to the extent people are aware of it, indications are that they are hardly up in arms. My wife, Deborah Fallows, represents the Pew Internet project in China. In March of this year she released a study showing that a strong majority of Chinese Internet users welcomed the idea of controls over Web content and thought it was only natural that the government would do the controlling. This is a startling concept to many Westerners, but she explains the logic of it here.

Many U.S. organizations -- like libraries and schools -- use similar blocking methods as the Chinese government to prevent users from going to pornography, gambling or hate speech sites. For example, when a student at my daughter's school was arrested for having a gun in his car, her school blocked access to the media coverage of the incident from the school's computers. Why is the Chinese Internet control system so objectionable?

"Objectionable" is your word, not mine. The point I would make is that it is much more thorough-going. In all matters of expression and inquiry in the United States, the default assumption is that people should be able to read or write whatever they want. The exceptions requiring control, like those you mention, are just that: exceptions. For instance: schoolchildren are exceptional cases, for obvious reasons; and public libraries could also be exceptions, for reasons of public decorum. In China, there is no such default assumption about individuals' presumed right to see, read or say whatever they want. That's the difference.

You mention two exceptions to the Chinese Internet control system: VPNs and proxies. Obviously, the Chinese can't shut down the VPNs or foreign businesses wouldn't operate in the country. Why don't they shut down proxies?

There is a bigger point here, which I think would surprise most Westerners who have not spent time in China: As a rule, the Chinese Communist Party is surprisingly selective in the repression and control it exercises within the country. In certain areas – "splittist" discussions like those about Tibet or Taiwan, challenges to Communist Party legitimacy, a few others – it tolerates no deviation at all and cracks down immediately. But in many others it tries to be only as repressive as it has to be. The Week in Review is edited and published by Jack Spratts. That is, it has some awareness of not needlessly antagonizing the population. When it comes to the Internet, this principle also applies. If it absolutely shut down VPNs and proxies, it would probably create more problems for itself, a lot more backlash and trouble, than it would avoid. So as long as VPN and proxy use by ordinary Chinese people remains relatively low, it's not worth the bother to close them down.

Does the Chinese government's Internet censorship strategy work at keeping online information "wholesome?" For example, is there less pornography available online to Chinese Internet users than there is elsewhere?

The "wholesomeness" of what is on the Internet is a big issue in public discussions of 'Net policy. Concern about sexual predators -- and even more basically about "addiction" to online games – comes up in the papers and generally builds public support for controls on the Internet. I am sure people looking for pornography can find it here as anyplace else, but it's less obviously on display in China (online and real-world) than a lot of other places.

In reading your article, it seems to me that the Chinese Internet control system is actually quite brilliant because it succeeds in making, as you point out, "the quest for information just enough of a nuisance that people generally won’t bother." Isn't it really up to the Chinese citizens themselves to care enough to get around the Internet control system? Do you see indications that they are trying to do that?

I agree that the system is quite impressive on its own terms. At least for now, it seems to have figured out the way to get maximum possible "benefits," in terms of limiting disruptive discussion or information, without having maximum oppressiveness or crudeness. Westerners do wonder why the Chinese public doesn't rise up to seek maximum freedom of information on its own. Part of the answers might be found in the Pew study, mentioned above. But at a more basic level, as one person I quoted in the article pointed out: Right now, even with the controls, more Chinese people have more access to more and freer information than has ever been true in the country's very long history. So for now it's understandable that more of them are thinking about what they can find than what they can't.

Cisco says it sold China the same mirroring routers that it makes available to any organization that needs to monitor Internet usage by its employees. If that's true, why should Cisco be criticized more than any other network vendor that sells gear to the Chinese?

This was a minor, passing point in my article, which reflected the fact that I had not done serious independent reporting on the question. What I can do is convey the prevailing view on the question among the Chinese net-cognoscenti. From this perspective, Cisco did a favor to the Chinese government several years ago by selling them the mirroring routers on which the Great Firewall is based, at a time when Chinese authorities could not easily have produced the systems on their own. The likely use of the routers was well understood – and it should be obvious why selling them to a government which intends to monitor its citizens is different from selling them to some company that wants to monitor its employees. But whatever the merits of the argument back then, the entire question is now moot. The Chinese authorities could buy the necessary routers from a variety of sources – notably from the homegrown firm Huawei. So, really few people here spend much time worrying about Cisco’s role anymore.
http://www.networkworld.com/news/200...-internet.html





Syrian Blogger Sentenced to Three Years in Jail
AP

A human rights group says a 24-year-old Syrian blogger has been convicted and sentenced to three years in prison on charges of undermining the prestige of the state and weakening national morale.

In a statement sent to The Associated Press on Wednesday, The National Organization for Human Rights in Syria condemned the verdict issued the day before as "outrageous" and called for Tarek Bayassi's immediate release.

The rights group says Bayassi's sentence was commuted to three years after an original sentence of six years. Bayassi was arrested last May in northwest Syria for surfing sites of Syrian opposition groups and posting comments online.

The Syrian government frequently arrests activists for posting comments critical of the government online.
http://www.iht.com/articles/ap/2008/...ia-Blogger.php





US Closes European Web Sites Promoting Tourism to Cuba

The U.S. government has closed down a number of Internet web sites operating from Spain, which belong to a British citizen resident in that country and are promoting tourism, as reported in the Madrid Público newspaper.

The measures were taken against Steve Marshall, a Briton resident in Tenerife since 1986 and the owner of a travel agency, for which he runs a number of web pages on culture and tourism in Cuba.

According to the report, last October Washington ordered the U.S. server eNom to close down those sites, using the laws of the blockade of Cuba in place for nearly 50 years.

It adds that the U.S. Treasury Department has stated that Marshall’s Internet addresses, in the main tourist guides, have been included on a blacklist for having commercial links with Cuba.

Marshall took his case to the relevant agencies of the European Union (EU), but they have stated that they are unable to do anything, despite him being a British citizen operating from a EU country with European clients.

The EU Commission justified its inability to act by using the argument that the company owning the webs is legally based in the British Virgin Islands, a territory outside of the EU’s remit.

Marshall has been advised by the EU to present a claim for damages via his Spanish company or to ask the UK government to intercede with Washington on his behalf so that he can transfer his web pages to a European server.
Translated by Granma International
http://www.periodico26.cu/english/co...ses051308.html





New Sites Make It Easier To Spy on Your Friends
Vauhini Vara

If you are still relying on Google to snoop on your friends, you are behind the curve.

Armed with new and established Web sites, people are uncovering surprising details about colleagues, lovers and strangers that often don't turn up in a simple Internet search. Though none of these sites can reveal anything that isn't already available publicly, they can make it much easier to find. And most of them are free.

Zaba Inc.'s ZabaSearch.com turns up public records such as criminal history and birthdates. Spock Networks Inc.'s Spock.com and Wink Technologies Inc.'s Wink.com are "people-search engines" that specialize in digging up personal pages, such as social-networking profiles, buried deep in the Web. Spokeo.com is a search site operated by Spokeo Inc., a startup that lets users see what their friends are doing on other Web sites. Zillow Inc.'s Zillow.com estimates the value of people's homes, while the Huffington Post's Fundrace feature tracks their campaign donations. Jigsaw Data Corp.'s Jigsaw.com, meanwhile, lets people share details with each other from business cards they've collected -- a sort of gray market for Rolodex data.

Some people have come across dirt on their loved ones without even looking for it. Doug Orlyk, a 42-year-old librarian in Bensenville, Ill., recently turned to ZabaSearch to find his new boyfriend's address so that he could send him a card. Instead, he found out that the boyfriend had been lying about his age -- he was 43 years old, not 35 as he had claimed to be on the dating site where Mr. Orlyk had met him. "I thought, 'You're a liar! You're older than I am!,'" Mr. Orlyk recalls. His new relationship ended soon thereafter.

Others rely on the Web to gather information on the job. Art Feagles, a technology specialist at the Cate School, a private high school in Carpinteria, Calif., runs the computer system for the alumni and development office. But his colleagues, who fund-raise for the school, keep tapping him for another tech skill: researching potential donors online.

Last year, for example, Mr. Feagles wanted to learn more about a potential donor by using the person's address. So he searched for it in Google Inc.'s Google Earth aerial-mapping program, and saw that the address was for a golf-course condominium. From that, he gathered that this was probably a second home, and therefore the person must be rich -- and a good prospect for a donation.

The Web sites, for their part, say they're merely trying to provide services that people will find useful and entertaining. Ray Chen, a cofounder of Spokeo, says he and his partners "don't want to stalk people." Instead, he says, "we're just trying to make something that's fun to use." Zaba CEO Nick Matzorkis says the dissemination of public information online is "a 21st century reality with or without ZabaSearch."

Larry Yu, a Google spokesman, says the use of Google Earth and Maps to glean personal information about others "is not the intent of the products." He touts their other uses, such as helping users visualize driving directions.

Many online sleuths start by signing up for an account on social-networking sites like Facebook Inc. and News Corp.'s MySpace, where they can search for individuals by name. (News Corp. is the publisher of The Wall Street Journal.) An acquaintance's home address can be dug up using ZabaSearch or another public-records search engine; that can then be plugged into Google Maps, where the Street View feature might show an image of the address from the street, or Zillow, which can estimate the value of the home. Those trying to make a business contact might try Jigsaw, which invites users to provide phone numbers, email addresses, job titles and other information from business cards they've collected.

Some popular Web sites make certain content visible to the public by default -- for instance, photos stored on Yahoo Inc.'s photo-sharing service Flickr, favorite online bookmarks on Yahoo's del.icio.us service and wish lists on Amazon.com. If you enter your email address and password into Spokeo.com, the site will build a list of the people on your email-contact lists. Then it tracks those contacts' activities on Web sites such as Flickr, del.icio.us, Amazon, MySpace and online-radio service Pandora Media Inc., sometimes turning up surprising material, from family albums to embarrassing shopping lists.

The bad news, for those who find themselves targeted by snoops: There is no foolproof way to protect yourself from embarrassing personal-data leaks. But you can avoid many mishaps by going to the root of the leak -- that is, by keeping individual pieces of personal data from being made public in the first place. If you don't want people to find your address online, for example, don't list it in local phone books, which often provide data to online address-search services. If you don't want others to see your Amazon wish list or the photos you've stored on Flickr, visit those sites' privacy pages and adjust your settings accordingly.

Some sites use the ability to snoop as a selling point. The Huffington Post's Fundrace feature, which allows users to enter their addresses and see a map showing their neighbors' political donations, uses this come-on: "Want to know ... whether that new guy you're seeing is actually a Republican or just dresses like one?"

Other sites make it easy to accidentally expose embarrassing details about yourself. Amazon's wish-list feature, for example, lets people create public lists of items they want to buy. Says Amazon spokesman Craig Berman, "We make it really clear that these lists are public and searchable." But some people use the feature as a quasi-private things-to-buy-myself list.

Ruth Funabiki, a 57-year-old law librarian in Moscow, Idaho, recently discovered through Spokeo that a friend added something unusual to her wish list on Amazon.com: one of those disposable pads that protects mattresses from bedwetters. "There's a voyeuristic aspect to it," she says. "I'm embarrassed. I shouldn't be looking."
http://online.wsj.com/public/article....html?mod=blog





Almost Arrested for Taking Photos at Union Station
Andy Carvin

As some of you may know, I've been testing out a Gigapan panorama photo system over the last week, after I received a loaner of their robotic camera mount from Carnegie Mellon's robotics lab. I brought it in to NPR to demonstrate it to colleagues and go on a photo safari to photograph the architecture at Union Station. Apparently, as far as Union Station's security operations are concerned, that's a criminal offense, since we nearly got arrested.

Earlier in the day, I did a brief demo of the Gigapan on the NPR roof. My NPR colleague Wright Bryan expressed interest in watching it in action elsewhere, so I offered to join him for a trip to Union Station, since it has some of the most beautiful architecture in the city. (Our photo editor was going to join us as well, but changed her mind at the last minute.)

We arrived at Union Station just before 4:30pm, where we set up the tripod and the camera at the western end of the main hall. I set the Gigapan to take a 180-degree sweep facing east, which took about 15 minutes to complete. We stood around chatting with passers-by, and were eventually joined by a journalist colleague of Wright's, who was visiting DC for a few days.

About halfway into the panorama, a security guard approached us and asked if we were taking pictures. We said yes, we were, to which she responded "okay" and left. She expressed no concern about our activities and didn't communicate anything with us otherwise.

After the panorama was complete, we relocated to the center of the main hall and proceeded to start the process of taking a 360-degree panorama. Since this would involve around 200 separate photos, it meant we got to stand around for at least 20 minutes. Wright's friend took a few pictures of us posing with the Gigapan, as commuters went about their business, a few giving us quizzical smiles.

Then the security guard returned. She informed us that we would have to cease taking pictures immediately and leave. I asked what the problem was, and she said that this is a private space, and we didn't have permission from management to take pictures. I told her that we were testing equipment for potential use by NPR, showed them our press passes, and noted there were plenty of other people walking around with cameras. She seemed sympathetic to our position, but said she was relaying orders she'd received from someone higher up. I asked if we could speak with them, then twittered it:

Just got told by security to leave. Asked to speak with a supervisor to explain why we can't take pictures at union station.

Soon a second security guard arrived; he said he wasn't a supervisor. He reiterated that we had to stop taking pictures and leave, or we would face arrest. I said we wanted to speak with a supervisor before we would comply. Again, I twittered.

Being asked to leave union station. Still asking to see supervisor.

By now a third security guard arrived. He noticed that the camera was still taking pictures. Not only did he ask us to stop immediately, he told us to erase the pictures, particularly any photos that might include images of them. The first guard repeated his demand we erase the pictures. We refused. The twittering
continued.

Union Station security official saying we'll be arrested if we don't comply. Also told to erase pics of security guards.

Throughout the conversation, which I should point out was conducted in a cordial, but firm tone, we received mixed messages from the security guards. One told us the problem was that we were using a tripod, while another insisted it was because we had "that thing" on top of our tripod. They then changed the story again, and said that journalists couldn't take pictures without permission from management, and that Union Station is a private space run by a private company, not a public space. They never gave us an answer as to why we were first allowed to take photos in the first location, but could not do the same here.
Contradictory messages. First they say tripod is problem, then the gigapan. Either way, cease or be arrested.

I debated them, telling them the story of the security guards who tried to prevent someone from photographing downtown Silver Spring by arguing it was a private space controlled by a private corporation, but was eventually overruled by local officials after much public lambasting. Their reaction was that they were just following orders. I said I wouldn't leave the premise until someone would go on record as to why we were being stopped, and would supply their name as well.

Meanwhile, the Gigapan continued to take photos. They'd ruined the panorama, of course; the first guard got in front of the camera at one point and obstructed the view. They reiterated that we were going to be arrested, so I finally tried to shut off the camera. But the damn thing wouldn't stop taking pictures. It never occurred to me that I'd have to learn how to abort a panorama under pain of arrest, so I fumbled for about a minute as it kept shooting pictures. (I think I heard Wright laughing at this point.)

I managed to shut the camera, and started to disassemble the Gigapan from the tripod as a fourth security person arrived. He was dressed differently than the other three people, and had a former-marine-turned-middle-management air about him. I twittered as he spoke:
Official saying Union Station is a private space, no right to photograph without approval.

I asked for his business card and he handed it to me: Robert H. Mangiante, Assistant Director, IPC International Corporation. He then summed up the situation: pack up your gear and leave now, or we'll arrest you. It's our choice. Our gear was already packed up at this point, and Wright and his friend had an event at the National Press Club anyway, so that was that. The Gigapan went into my backpack, I folded the tripod and we went our separate ways.

I'm still trying to sort out the incident. While I have no doubt that Union Station is managed by a private company, I think it's hard for them to argue it's a private space, and that journalists cannot take photographs there without permission. Granted, it's not a public street like the Silver Spring incident, but the situation is otherwise similar. I also question their right to demand that we erase photos, and am puzzled by the capriciousness of their overall position, given how they first allowed us to take photos but then changed their minds, offering mixed messages as to why.

What do you think? Were we within our rights or not? -andy

PS - Take a close look at the high-res version of the picture. You can make out the first security guard standing in front of the camera at one point, as the second one approaches from behind her, just to her right.
http://www.andycarvin.com/archives/2...os_at_uni.html





Jury Clears Photographer Who Refused to Stop Photographing an Arrest
Thomas Hawk

I was pleased today to see an article about photographer Nick Adams being cleared by a Galveston jury of misdemeanor charges of interfering with police while photographing an arrest at a Mardi Gras celebration in 2007.

While I'm amazed that any prosecutor would actually take this kind of a case to trial (in this case prosecutor April Powers), I'm pleased that a jury had the common sense to dismiss the charges.

In this case Galveston police charged that Adams had entered their roped off perimeter in order to get his shots which resulted in the arrest and charges.

Conveniently, and not surprising to me, police deleted some of Adam's photos while they had him in custody which would have proved he was outside the perimeter established by the police. According to Adams' defense attorney, the digital index from his camera showed that these photos were deleted.

Personally I'd like to see these cops punished for deleting someone's digital camera photos while he was in custody and for arresting him in the first place.

Police brutality is a fact of life. While I believe the overwhelming majority of cops are good cops and have many friends and family who are cops, history has shown that there are still plenty of bad apples out there.

In a world where Rodney King can be half beaten to death by police officers, our right to be able to document police activity is a fundamental protection against police brutality.

When cops, who are trusted with extraordinary powers of authority, try to silence photographers this is a terrible affront on a free press and a free society.

I hope at minimum that Adams files a civil suit against the Galveston Police Department and that they end up paying monetarily for the bad behavior of the officers in question. Police need to be sent a message that they cannot abuse photographers and get away with it.

Last month two brothers who sued Harris County were awarded almost $2 million after they were wrongfully arrested for videotaping a drug raid on a neighbors home. Their case also resulted in the resignation of former Harris County District Attorney Chuck Rosenthal when their suit brought forward racist and pornographic emails on his computer.
http://thomashawk.com/2008/05/jury-c...efused-to.html

Jury clears former Galveston photographer | Chron.com - Houston Chronicle





Popular Game Grand Theft Auto IV Hit By Hackers
Desire Athow

Computer hackers have targeted Grand Theft Auto IV to spread destructive viruses across the world wide web, a leading software security expert revealed today.

The cyber criminals are tempting fans by illegally offering free downloads for bogus versions of the hit game for their PCs.

One specialist detected “Trojan” viruses aimed at the game, which sold six million copies in its first week, within two minutes of logging on.

John Safa, chief technical officer of software security company DriveSentry, said: “People are exploiting the popularity of Grand Theft Auto IV in a way which could bring mayhem to the internet.

“The only thing that many gamers can think of at the moment is Grand Theft Auto IV and hackers are using that interest to try to generate chaos as quickly as they can.”

Enthusiasts are being offered free Grand Theft Auto IV downloads and plug-ins on so-called peer-to-peer networks, where computer users share information without having to go through a central server or website.

Safa, a former hacker, said many young people use these networks to access each other's computers to download files for free and avoid copyright laws.

He found evidence of Trojans – programs that gain backdoor access to a user’s system to steal personal data – just two minutes after logging onto the popular Limewire network.

He said: “Hackers are bombarding the internet with viruses on file-sharing networks.

“While surfing on Limewire, I found a file claiming to offer a program for the XBOX 360 version of Grand Theft Auto IV that actually contained malware named Trojan Downloader.Win32.VB.dck.

“Such computer viruses have the potential to wipe out or steal sensitive information such as a user’s bank details or wipe out important files. Some of these links were offering free downloads for the PC version of Grand Theft Auto IV even though it is not available yet.

“I would urge anybody to tread very carefully around these links, as some links are designed to look official – or even better invest in a good anti-virus package that is capable of protection from the latest threats for their computer.”

Safa, whose antivirus and internet security company has just detected its one millionth computer virus, said that hackers were attempting to deliberately infect machines with similar tactics aimed at the last version of the game in 2005. Then, users were hit after scouring the internet for a program to find interactive sex scenes for the Grand Theft Auto San Andreas version.

He said: “Hackers are increasingly sophisticated in the way they disrupt the web. They will piggyback on anything popular to wreak havoc.”
http://www.security.itproportal.com/...v-hit-hackers/





Radio Tags Raise Concern About Personal ID Theft

Chip technology proliferating in everyday devices
Liz F. Kay

Don't take a hammer to your new U.S. passport. And don't drill a hole in that credit card or zap it in the microwave.

Experts say these measures - recommended on some Web sites as ways to safeguard privacy and security - aren't necessary for people concerned about the growing prevalence of radio frequency identification tags.

The tiny silicon chips are embedded in credit cards, passports and other everyday items and can transmit data about where you go, what you buy and even who you are.

The devices include "smart" car keys, the no-swipe credit card on your key ring, the E-ZPass transponder on your windshield, the prescription bottle in your medicine cabinet, the shirt you buy at the mall and even the soles of your shoes.

The technology - originally designed to track cattle - now speeds up retail transactions, helps authorities confiscate pirated merchandise, identifies company employees, opens electronic locks and tracks shipments of goods through warehouses and stores.

Analysts estimate that RFID tag sales will reach more than $2.3 billion this year - mostly in automotive, security and financial applications.

Potential for abuse

But as RFID technology spreads and grows less expensive, critics say the tags and the signals they emit are likely to be abused by people who would spy on your movements, steal your identity or even target you in a terrorist attack.

The concern has led to some paranoia - and Web sites full of bizarre advice on avoiding RFID snoops. But authorities are beginning to listen to RFID's serious critics.

The U.S. State Department, for example, incorporated metal shielding into the covers of new passports after critics demonstrated how information from the RFID tags embedded in the documents could be read clandestinely from a distance.

Last year, California legislators enacted a law prohibiting employers from requiring employees to implant RFID tags in their bodies.

They and lawmakers in Wisconsin and other states were spurred into action by an Ohio company that tagged employees who worked with confidential documents - voluntarily, according to news reports.

But the real problem, critics say, is that RFID tracking is virtually invisible and undetectable by its subjects.

"A lot of this is done not only without the consumer's knowledge - it's beyond the grasp of most consumers how it works. Non-technical people don't know what the risks are. They just want to buy things and have their privacy and credit card numbers protected," said Avi Rubin, a Johns Hopkins University computer science professor who worked with Massachusetts researchers to crack the encryption scheme of the Exxon Mobil Speedpass in 2005.

Although he and many other computer security specialists say they don't believe the tags pose a serious threat today, they are concerned about the future.

"You can look at this at two different levels - whether it's worthwhile for you as an individual to fuss with wrapping your cards in some sort of sleeve, or looking at the systemic issue: how we got to a point where these cards do make this information available remotely," said Edward W. Felton, a professor of computer science and public affairs at Princeton University, whose graduate students became famous for penetrating the security of electronic voting machines.

RFID chips are encoded with digital information that could, for example, be the inventory number for a pair of jeans, a credit card number, an employee ID or driver's license data, medical records or passport information.

Counter-RFID industry

When an RFID reader sends out an electromagnetic query, the RFID chip transmits the information. While the industry is selling RFID applications as diverse as radio dog collars and fitness monitors, the technology also has spawned a tiny counter-industry of companies that produce metal-lined wallets, passport sleeves and other devices to shield RFID-enabled documents and credit cards.

There are Web sites that hawk anti-RFID T-shirts and other paraphernalia.

Even vocal RFID critics say the problem hasn't reached a crisis level.

Lee Tien, senior staff attorney for the San Francisco-based Electronic Frontier Foundation, said people who raise the alarm realize how it would have felt to warn the public about air pollution the day the Model T was introduced.

The EFF has opposed use of the technology on several fronts. And as a parent, Tien spoke against a proposal for an enhanced California driver's license that could broadcast the name, address, height and weight of drivers - such as his 16-year-old daughter.

But he doesn't oppose the technology itself. "I would honestly have no problem using RFID devices if I knew I could control who was going to read them," Tien said.

Dan Mullen, president of AIM Global, a trade association representing RFID and other data collection technology manufacturers, says that most RFID tags don't contain personal information.

Even if they do, he said, personal data might be safer there than on a retailer's computer systems - given highly publicized breaches of those servers during the past few years.

"If somebody is looking to steal personal information, there are probably richer sources" than RFID tags, he said.
http://www.siliconvalley.com/news/ci...nclick_check=1





To Curb Truancy, Dallas Tries Electronic Monitoring
Gretel C. Kovach

Jaime Pacheco rolled out of bed at dawn last week to the blaring chorus of two alarms. Then Jaime, a 15-year-old high school freshman, smoothed his striped comforter, dumped two scoops of kibble for the dogs out back and strapped a G.P.S. monitor to his belt.

By 7:15, Jaime was in the passenger seat of his grandmother’s sport-utility vehicle, holding the little black monitor out the window for the satellite to register. A few miles down the road, at Bryan Adams High School in East Dallas, he got out of the car, said goodbye to his grandmother and paused to press a button on the unit three times. A green light flashed, and then Jaime headed for the cafeteria with plenty of time before the morning bell.

It was not always like this. Jaime used to snooze until 2 p.m. before strolling into school. He fell so far behind that he is failing most of his classes and school officials sent him to truancy court.

Instead of juvenile detention, Jaime was selected by a judge to be enrolled in a pilot program at Bryan Adams in which chronically truant students are monitored electronically. Since Jaime started carrying the Global Positioning System unit April 1, he has had perfect attendance.

“I’m just glad they didn’t take him to jail,” said Jaime’s grandmother Diana Mendez, who raised him. “He’s a good kid. He was just on a crooked path.”

Educators are struggling to meet stricter state and federal mandates, including those of the No Child Left Behind Act, on attendance and graduation rates. The Dallas school system, which, like other large districts, has found it difficult to manage the large numbers of truant students, is among the first in the nation to experiment with the electronic monitoring.

“Ten years ago the issue of truancy just slid by,” said Jay Smink, executive director of the National Dropout Prevention Center. “Now the regulations are forcing them to adhere to the policies.”

Nearly one-third of American students drop out of school, and Dallas has the seventh-worst graduation rate among large school districts, according to a study released in April by America’s Promise Alliance, founded by Colin L. Powell, the former secretary of state.

At Bryan Adams, 9 of the more than 300 students sent to truancy court this year are enrolled in the six-week pilot program. The effort is financed by a $26,000 grant from Bruce Leadbetter, an equity investor who supports the program’s goals. The bulk of the money pays the salary of a full-time case manager, who monitors the students and works with parents and teachers.

“I can’t do anything with them if they don’t come to school,” said Cynthia Goodsell, the principal at Bryan Adams.

Kyle Ross, who runs the in-school suspension program at Bryan Adams, was skeptical of the electronic monitoring until he saw that it worked. “We’re always yearning for something tangible to use as tools to teach self-efficacy,” Mr. Ross said. “Everyone’s so overwhelmed. We’ll try anything.”

Dallas’s experiments in tracking truancy started three years ago. Last year, case managers used a G.P.S. system to locate a truant student on the verge of overdosing on drugs, and they discovered that a student had skipped school because he was contemplating suicide.

Ricardo Pacheco, 18, who is no relation to Jaime, said electronic monitoring had helped him get on track last year, despite advice from his friends to “just yank it off.”

“It was easier to come to school each day, stay out of the streets and be home every night,” said Mr. Pacheco, a father of two young children and a former gang leader. Now he is about to become the first male from his father’s side of the family to graduate.

“They all dropped out or are in jail,” Mr. Pacheco said.

Paul Pottinger, the chief executive of the company marketing the truancy monitoring system being tested in Dallas, said, “With location verification, they can’t sneak through it, they can’t game it like they can game their parents and game their teachers and game their friends.”

Across the state, in Midland, county justice officials started using electronic ankle monitors last summer to track about 14 of the most chronically truant students. The officials hope to double the number of students monitored next year.

Truancy experts say the results in Texas are promising.

“It’s far better than locking a kid up,” and is cheaper, said Joanna Heilbrunn, a senior researcher for the National Center for School Engagement.

But the future of the Dallas program is uncertain. Mr. Pottinger’s company, the Center for Criminal Justice Solutions, is seeking $365,000 from the county to expand the program beyond Bryan Adams. But the effort has met with political opposition after a state senator complained that ankle cuffs used in an earlier version were reminiscent of slave chains.

Dave Leis, a spokesman for NovaTracker, which makes the system used in Dallas, said electronic monitoring did not have to be punitive. “You can paint this thing as either Big Brother, or this is a device that connects you to a buddy who wants to keep you safe and help you graduate.”

Jaime said he did not mind carrying the tracker.

“I’m actually happy about it, that I get another chance to do my work and catch up,” he said. “I never saw myself getting held back a grade.”
http://www.nytimes.com/2008/05/12/ed.../12dallas.html





Woman Indicted in Missouri MySpace Suicide Case
Linda Deutsch

A Missouri woman was indicted Thursday for her alleged role in perpetrating a hoax on the online social network MySpace against a 13-year-old neighbor who committed suicide.

Lori Drew of suburban St. Louis, who allegedly helped create a MySpace account in the name of someone who didn't exist to convince Megan Meier she was chatting with a 16-year-old boy named Josh Evans, was charged with conspiracy and fraudulently gaining access to someone else's computer.

Megan hanged herself at home in October 2006, allegedly after receiving a dozen or more cruel messages, including one stating the world would be better off without her.

Salvador Hernandez, assistant agent in charge of the Los Angeles FBI office, called the case heart-rending.

"The Internet is a world unto itself. People must know how far they can go before they must stop. They exploited a young girl's weaknesses," Hernandez said. "Whether the defendant could have foreseen the results, she's responsible for her actions."

Drew was charged with one count of conspiracy and three counts of accessing protected computers without authorization to get information used to inflict emotional distress on the girl.

Drew has denied creating the account or sending messages to Megan.

Her attorney, Jim Briscoe, did not immediately return messages seeking comment on Thursday.

A man who opened the door at the Drew family home in Dardenne Prairie, Mo., on Thursday said the family had no comment.

Megan's mother, Tina Meier, told The Associated Press she believed media reports and public outrage helped move the case forward for prosecution.

"I'm thrilled that this woman is going to face charges that she has needed to face since the day we found out what was going on, and since the day she decided to be a part of this entire ridiculous stunt," she said.

Megan's father, Ron Meier, 38, said he began to cry "tears of joy" when he heard of the indictment. The parents are now separated, which Tina Meier has said stemmed from the circumstances of their daughter's death.

Tina Meier has acknowledged Megan was too young to have a MySpace account under the Web site's guidelines, but she said she had been able to closely monitor the account. Meier's family has also acknowledged that Megan was also sending mean messages before her death.

Megan was being treated for attention deficit disorder and depression, her family has said. Meier has said Drew knew Megan was on medication.

MySpace issued a statement saying it "does not tolerate cyberbullying" and was cooperating fully with the U.S. attorney.

U.S. Attorney Thomas P. O'Brien said this was the first time the federal statute on accessing protected computers has been used in a social-networking case. It has been used in the past to address hacking.

"This was a tragedy that did not have to happen," O'Brien said at a Los Angeles press conference.

Both the girl and MySpace are named as victims in the case, he said.

MySpace is a subsidiary of Beverly Hills-based Fox Interactive Media Inc., which is owned by News Corp. The indictment noted that MySpace computer servers are located in Los Angeles County.

Due to juvenile privacy rules, the U.S. attorney's office said, the indictment refers to the girl as M.T.M.

FBI agents in St. Louis and Los Angeles investigated the case, Hernandez said.

Each of the four counts carries a maximum possible penalty of five years in prison.

Drew will be arraigned in St. Louis and then moved to Los Angeles for trial.

The indictment says MySpace members agree to abide by terms of service that include, among other things, not promoting information they know to be false or misleading; soliciting personal information from anyone under age 18 and not using information gathered from the Web site to "harass, abuse or harm other people."

Drew and others who were not named conspired to violate the service terms from about September 2006 to mid-October that year, according to the indictment. It alleges they registered as a MySpace member under a phony name and used the account to obtain information on the girl.

Drew and her coconspirators "used the information obtained over the MySpace computer system to torment, harass, humiliate, and embarrass the juvenile MySpace member," the indictment charged.

The indictment contends they committed or aided in a dozen "overt acts" that were illegal, including using a photograph of a boy that was posted without his knowledge or permission.

They used "Josh" to flirt with Megan, telling her she was "sexi," the indictment charged.

Around Oct., 7, 2006, Megan was told "Josh" was moving away, prompting the girl to write: "aww sexi josh ur so sweet if u moved back u could see me up close and personal lol."

Several days later, "Josh" urged the girl to call and added: "i love you so much."

But on or about Oct. 16, "Josh" wrote to the girl and told her "in substance, that the world would be a better place without M.T.M. in it," according to the indictment.

The girl hanged herself the same day, and Drew and the others deleted the information in the account, the indictment said.

Last month, an employee of Drew, 19-year-old Ashley Grills, told ABC's "Good Morning America" she created the false MySpace profile but Drew wrote some of the messages to Megan.

Grills said Drew suggested talking to Megan via the Internet to find out what Megan was saying about Drew's daughter, who was a former friend.

Grills also said she wrote the message to Megan about the world being a better place without her. The message was supposed to end the online relationship with "Josh" because Grills felt the joke had gone too far.

"I was trying to get her angry so she would leave him alone and I could get rid of the whole MySpace," Grills told the morning show.

Megan's death was investigated by Missouri authorities, but no state charges were filed because no laws appeared to apply to the case.
http://www.siliconvalley.com/news/ci_9270538





Routine Conduct at Risk with MySpace Suicide Case
Anick Jesdanun

Think twice before you sign up for an online service using a fake name or e-mail address. You could be committing a federal crime.

Federal prosecutors turned to a novel interpretation of computer hacking law to indict a Missouri mother on charges connected to the suicide of a 13-year-old MySpace user.

Prosecutors alleged that by helping create a MySpace account in the name of someone who didn't exist, Lori Drew, 49, violated the News Corp.-owned site's terms of service and thus illegally accessed protected computers.

Legal experts warned Friday that such an interpretation could criminalize routine behavior on the Internet. After all, people regularly create accounts or post information under aliases for many legitimate reasons, including parody, spam avoidance and a desire to maintain their anonymity or privacy online or that of a child.

This new interpretation also gives a business contract the force of a law: Violations of a Web site's user agreement could now lead to criminal sanction, not just civil lawsuits or ejection from a site.

"I think the danger of applying a statute in this way is that it could have unintended consequences," said John Palfrey, a Harvard law professor who leads a MySpace-convened task force on Internet safety. "An application of a general statute like this might result in chilling a great deal of online speech and other freedom."

Drew, of O'Fallon, Mo., was indicted Thursday on charges of perpetrating a hoax on the popular online hangout MySpace. Prosecutors say Drew helped create a fake MySpace account to convince Megan Meier she was chatting with a nonexistent 16-year-old boy named Josh Evans. Megan hanged herself at home in October 2006, allegedly after receiving a dozen or more cruel messages, including one stating the world would be better off without her.

Drew, who has denied creating the account or sending messages to Megan, was indicted by a federal grand jury in Los Angeles on one count of conspiracy and three counts of accessing protected computers without authorization to get information used to inflict emotional distress on the girl.

Prosecutors argue that to access MySpace's servers, Drew first had to sign up for the service, which meant providing her name and date of birth and agreeing to abide by the site's terms of service. Those terms bar false registration information, solicitation of personal information from anyone under 18 and use of any information gathered from the Web site to "harass, abuse, or harm another person."

By using a fictitious name, among other things, Drew violated MySpace's terms and thus had no authority to access the MySpace service, prosecutors charged.

"Clearly the facts surrounding this matter are awful and very upsetting, and I certainly understand the instinct of wanting justice to be served," Palfrey said. "On the other hand, this complaint is certainly unusual."

Drew's lawyer, Dean Steward, said Thursday a legal challenge to the charges is planned. Missouri authorities said they investigated Megan's death but filed no charges because no state laws appeared to apply to the case.

Andrew DeVore, a former federal prosecutor who co-founded a regional computer crime unit in New York, said Friday the interpretation raises constitutional issues related to speech and due process — in the latter case, because it doesn't allow for adequate notice of when using an alias online is criminal.

Because corporations would end up setting criminal standards, a completely legal act at one site could be illegal at another, said DeVore, who has no direct involvement in the case.

"What clearly is going on is they couldn't find a way to charge it under traditional criminal law statutes," DeVore said. "The conduct that she engaged in they correctly concluded wouldn't satisfy the statute. Clearly they were looking for some other way to bring a charge."
http://ap.google.com/article/ALeqM5g...fbW6wD90MTFLG0





NY Seeks Internet Violence Law
AP

A proposal in New York would make a felony of committing violent acts for display on Internet video sites.

The state Senate's Republican majority on Tuesday is expected to introduce a bill that would make a felony of violent acts like the brutal beating of a girl in Florida and subsequent attack of a 12-year-old in Indiana.

The measure is also aimed at animal attacks and "bum hunts" in which homeless people are attacked or paid to fight each other on video.

Florida authorities believe the March 30 attack on a girl by several other girls was done so a video could be made posted on YouTube.com.

New York's measure would create crimes of violence intended for play on the Internet and make felony conspiracy apply to anyone who persuaded another to commit the violence.
http://www.theglobeandmail.com/servl...echnology/home





Connecticut Man Says Cops Broke Into His Home and Ripped Out His Catheter

A man alleges that police entered his home illegally and ripped a catheter from his body during a child pornography investigation that led to the arrest of two neighbors.

Andrew Glover, 60, of New Britain filed a notice with the city Thursday that he intends to pursue a federal civil rights lawsuit. He accused the officers of inflicting severe injuries as he was recovering from intestinal surgery in February.

Glover's lawyer, Paul Spinella, said police entered Glover's apartment Jan. 30 and Feb. 28. Glover wasn't involved in child pornography, has not been charged and has no criminal record, Spinella said.

"The poor guy," Spinella said. "They ripped the catheter off his person. They assaulted the guy. He's got major problems as a result of this. He's a mess now."

Lt. James Wardwell, a police spokesman, said Friday that the department had not received the intent-to-sue notice and would not comment. A message was left for the city's corporation counsel.

Glover has two years to file a lawsuit in U.S. District Court.

Spinella said officers "tossed" Glover's apartment during a search Jan. 30. In February, he said, Glover returned home from the hospital after his surgery to find officers searching his apartment again. That's when they assaulted Glover and left him alone in the apartment without calling for medical help, Spinella said.

The police didn't have search warrants, Spinella said.

Glover's neighbors — Harold Spurling and Jeffrey Brisson — were charged Jan. 30 with sexual assault and other crimes. They are accused of molesting children, including a 3-month-old girl found in their apartment, and making movies involving child pornography.

Both men have pleaded not guilty and are being held in lieu of bail.
http://www.foxnews.com/story/0,2933,354837,00.html





Connecticut School Students Sharing Nude Pictures
AP

Westport school officials say middle and high school students have been sharing nude pictures of themselves electronically.

In a letter and e-mail, Superintendent Elliott Landon said the video and still images show students engaging in inappropriate acts while nude in their homes. He said the images have been forwarded to numerous people.

Landon says the behavior is potentially dangerous to the students who are sending the images of themselves.

Landon's letter advised parents to monitor their children's Internet and cell phone use, keep computers in a common space at home and talk to teenagers about the risks of transmitting sexual materials.

Officials in Ohio said last month that some teens were using their cell phones to flirt and send nude pictures of themselves. The messages often spread quickly and sometimes find their way to Web sites.
http://www.newstimes.com/latestnews/ci_9290293





13 Year Old Steals Dad's Credit Card to Buy Hookers

A 13 year old boy from Texas is convicted of fraud after using his Father's credit cards to hire escorts.

A 13 year old from Texas who stole his Dad's credit card and ordered two hookers from an escort agency, has today been convicted of fraud and given a three year community order.

Ralph Hardy, a 13 year old from Newark, Texas confessed to ordering an extra credit card from his father's existing credit card company, and took his friends on a $30,000 spending spree, culminating in playing "Halo" on an Xbox with a couple of hookers in a Texas motel.

The credit card company involved said it was regular practice to send extra credit cards out as long as all security questions are answered.

The escort girls who were released without charge, told the arresting officers something was up when the kids said they would rather play Xbox than get down to business.

Police said they were alerted to the motel by a concerned delivery clerk, whom after delivering supplies of Dr Pepper, Fritos and Oreos had been asked by the kids where they could score some chicks and were willing to pay. They explained they had just made a big score at a "World of Warcraft" tournament and wanted to get some relaxation. On noting the boys age the delivery clerk informed the authorities.

When police arrived at the motel they found $3,000 in cash, numerous electronic gadgets, an Xbox video console with numerous games, and the two local escort girls.

Ralph had reportedly told police that his father wouldn't mind, as it was his birthday last week and he had forgot to get him a present. The father, a lawyer said he had been too busy, but would take him on a surprise trip to Disneyland instead.

Asked why he ordered two escorts, Ralph said he thought it was the thing to do when you win a "World of Warcraft" tournament. They told the suspicious working girls they were people of restricted growth working with a traveling circus, and as State law does not allow those with disabilities to be discriminated against they had no right to refuse them.

The $1,000 a night girls sensing something up played "Halo" on the Xbox with the kids, instead of selling their sexual services.

Ralph's ambition is to one day become a politician.
http://www.money.co.uk/article/10003...m?article=true
















Until next week,

- js.



















Current Week In Review





Recent WiRs -

May 10th, May 3rd, April 26th, April 19th, April 12th, April 5th

Jack Spratts' Week In Review is published every Friday. Submit letters, articles, press releases, comments, questions etc. in plain text English to jackspratts (at) lycos (dot) com. Submission deadlines are Thursdays @ 1400 UTC. Please include contact info. The right to publish all remarks is reserved.


"The First Amendment rests on the assumption that the widest possible dissemination of information from diverse and antagonistic sources is essential to the welfare of the public."
- Hugo Black
JackSpratts is offline   Reply With Quote
Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Peer-To-Peer News - The Week In Review - September 22nd, '07 JackSpratts Peer to Peer 3 22-09-07 06:41 PM
Peer-To-Peer News - The Week In Review - May 19th, '07 JackSpratts Peer to Peer 1 16-05-07 09:58 AM
Peer-To-Peer News - The Week In Review - December 9th, '06 JackSpratts Peer to Peer 5 09-12-06 03:01 PM
Peer-To-Peer News - The Week In Review - September 16th, '06 JackSpratts Peer to Peer 2 14-09-06 09:25 PM
Peer-To-Peer News - The Week In Review - July 22nd, '06 JackSpratts Peer to Peer 1 20-07-06 03:03 PM






All times are GMT -6. The time now is 11:47 AM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
© www.p2p-zone.com - Napsterites - 2000 - 2024 (Contact grm1@iinet.net.au for all admin enquiries)