P2P-Zone  

Go Back   P2P-Zone > Peer to Peer
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Peer to Peer The 3rd millenium technology!

Reply
 
Thread Tools Search this Thread Display Modes
Old 03-12-08, 12:19 PM   #1
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,017
Default Peer-To-Peer News - The Week In Review - December 6th, '08

Since 2002


































"A lay person getting this -- first of all, it's 60 pages thick. It's full of legalese and jargon from the company. They see the record company suing them for thousands of dollars. They get scared." – James Brink


"His job is to make money off you. You’re from Mississippi. I thought you would have known that." – Howlin’ Wolf to Muddy Waters in Cadillac Records



































December 6th, 2008




Ho Ho Ho

Firefox Pirates Take Over Amazon
Ernesto

Amazon, the world’s largest online retailer, is under attack by online pirates. An add-on for the Firefox browser called ‘Pirates of the Amazon’ makes it possible to shop at the Amazon store but leave without paying a dime. Instead, on Amazon product pages the add-on integrates links to ‘free’ copies on The Pirate Bay.

The timing of the ‘Pirates of the Amazon‘ launch could not have been more (un)fortunate. At the busiest time of the year for on- and offline retailers, this Firefox browser add-on offers users a download link to pirated copies of products that can normally be found in the Amazon online store.

When the add-on is installed, it integrates a new “download 4 free” button into the Amazon product page when the same article is also available via The Pirate Bay. It works for CDs, DVDs, games, books and basically all products that can be converted to a digital format.

With their mashup of the largest online retailer and the largest BitTorrent tracker, the project aims to “be a counterpart to the current models of media distribution”, and to “redistribute the wealth”.

The people behind the project have chosen to link to The Pirate Bay, but clearly state that they act independently. “We are not affiliated with The Pirate Bay, and do not host or even link to any illegal content,” they write. “This artistic project addresses the topic of current media distribution models vs. current culture and technical possibilities.”

‘Pirates of the Amazon’ is not the only pirate add-on for Firefox, in fact there are quite a few. IMDB, Last.fm, and Rotten Tomatoes all have their own pirate skin available. Most of them use the Greasemonkey add-on which allows the installation of all kinds of useful user scripts which customize the web to your pirate needs.
http://torrentfreak.com/firefox-pira...amazon-081203/





Teen Transplant Candidate Sued Over Music Downloads

Ross Township woman says she isn't guilty of piracy

A young Pittsburgh woman who needs a transplant has another fight on her hands. She's being sued by the music industry for illegally downloading music from the Internet.

But 19-year-old Ciara Sauro strongly denies the charge and says she and her mother are overwhelmed with medical debts.

"Look and see where it (the downloads) came from, and look and see that it's not me. It's not fair to do to me," said Sauro.

Sauro, who lives in Ross Township, is disabled with pancreatitis. She needs an islet cell transplant and is hospitalized weekly.

Because she didn't defend herself against a copyright lawsuit, a federal judge in Pittsburgh ruled she's a music pirate, and that could cost the Sauros almost $8,000 in fines.

"I already have severe depression. I mean, it's so hard to sit there and think that I have to get in trouble for something that I didn't do. It's not fair," Sauro said.

Sauro and her mother, Lisa, are being sued for the fines because they didn't challenge a music industry lawsuit in Pittsburgh federal court.

The lawsuit accuses Ciara Sauro of illegally sharing 10 songs online with strangers through free Internet software.

"You want to know the truth? I make $8.25 an hour. She can't work. This child is very sick. I mean, what am I supposed to do?" Lisa Sauro said.

The Sauros said they've lived in their home since Ciara's father moved out. They claim the Internet account in the lawsuit was opened by him at his new address.

"I just want them to know that I have to go through enough stress in my life with my sickness and my family, and I don't think that they should go after people just because they want money for something that's not even fair to us," Ciara Sauro said.

Attorney James Brink told WTAE Channel 4 Action News that he's offering to represent the Sauros for free and ask a judge to reopen the case.

Brink, who has defended other similar lawsuits, said the persons being sued only have so many days to respond before a judge enters a default judgment. He also said it's common for people to be intimidated by the legal documents.

"A lay person getting this -- first of all, it's 60 pages thick," he said. "It's full of legalese and jargon from the company. They see the record company suing them for thousands of dollars. They get scared."

An attorney who represents the record companies in the lawsuit against the Sauros did not return phone calls for comment Monday.
http://www.thepittsburghchannel.com/...65/detail.html





Punters Buying Used PCs to Avoid Vista

XP proving to be golden oldie
Sylvie Barak

PUNTERS ARE APPARENTLY scrambling to get their hands on used, second hand PCs (WiR, 11/29/08 – Jack), not just because they offer a cheap fix in tough economic times, but mainly because they come loaded with Windows XP rather than Vista.

Studies carried out by both Gartner and IDC have found that because older software is often incompatible with Vista, many consumers are opting for used computers with XP installed as a default, rather than buying an expensive new PC with Vista and downgrading.

Big business, which typically thinks nothing about splashing out for newer, more up-to-date PCs, is also having trouble with Vista, with even firms like Intel noting XP would remain the dominant OS within the company for the foreseeable future.

Josh Kaplan, president of computer repair outfit, Rescuecom, told PC World people wanted to stick with XP to avoid standardisation problems. His company has resold XP-based PCs to companies that use software that is incompatible with Vista and which would require a substantial upgrade to become compatible. " Having five PCs that are Vista and five XP can create training and compatibility issues," he said.

Of course, buying a second-hand PC without having to shell out for a Vista license is also much cheaper and certain cheeky resellers are attempting to bump up their own profits even further by selling computers with illegitimate copies of XP bunged in, something which Gartner severly frowns upon, by the way.

Naughty, naughty, chipping away at Microsoft’s billions like that.

You should all be ashamed of yourselves. Tut, tut.
http://www.theinquirer.net/feeds/rss...ld-second-hand





The Outlook for Vista Gets Even Worse
Glyn Moody

As someone who has been following Microsoft for over 25 years, I remain staggered by the completeness of the Vista fiasco. Microsoft's constant backtracking on the phasing out of Windows XP is perhaps the most evident proof of the fact that people do not want to be forced to “upgrade” to something that has been memorably described as DRM masquerading as an operating system. But this story suggests an even greater aversion:

Studies carried out by both Gartner and IDC have found that because older software is often incompatible with Vista, many consumers are opting for used computers with XP installed as a default, rather than buying an expensive new PC with Vista and downgrading.

Big business, which typically thinks nothing about splashing out for newer, more up-to-date PCs, is also having trouble with Vista, with even firms like Intel noting XP would remain the dominant OS within the company for the foreseeable future.

What's really important about this is not so much that Vista is manifestly such a dog, but that the myth of upgrade inevitability has been destroyed. Companies have realised that they do have a choice – that they can simply say “no”. From there, it's but a small step to realising that they can also walk away from Windows completely, provided the alternatives offer sufficient data compatibility to make that move realistic.

That may not have been the case before, but the similar poor uptake of Microsoft's OOXML, taken together with the generally good compatibility of OpenOffice.org with the original Microsoft Office file formats, implies that we may well be near the tipping point for migrations to free software on the desktop.

That doesn't mean everyone is going to rip out Windows and replace it with GNU/Linux, simply that they will stop upgrading Microsoft Office too, and start using OpenOffice.org on new systems instead. More people will come into contact with OpenOffice.org, and start using it at home – not least because they are actually *allowed* to take copies from office systems. Throw in Firefox usage that is starting to creep up to significant levels, even in the UK, and you have the recipe for a subsequent migration to GNU/Linux systems running these same apps that is almost painless.

Registration is free, and gives you full access to our extensive white paper library, downloads, speciality areas and more.

I'm obviously not the only one thinking along these lines. Last weekend, Dell was advertising its new Inspiron Mini 9 in at least one national newspaper. This would have been unthinkable even a year ago, when the company's fear of upsetting the mighty Microsoft by mentioning the “L” word would have been too great, and is further evidence that GNU/Linux is indeed becoming a mainstream option.
http://www.computerworlduk.com/commu...1573&blogid=14





Windows Market Share Dives Below 90% for First Time

Posts biggest one-month drop in the past two years; Mac OS X gains ground
Gregg Keizer

Microsoft Corp.'s Windows OS last month took its biggest market share dive in the past two years, erasing gains made in two of the past three months and sending the operating system's share under 90% for the first time, an Internet measurement company reported today.

In November, 89.6% of users who connected to the Web sites that Net Applications Inc. monitors did so from systems powered by Windows, a drop of 0.84 of a percentage point from October. The decrease was the largest slip by Windows in the past two years and easily bested other recent down months, including May 2008 and December 2007, when Windows lost 0.51 and 0.63 percentage points, respectively.

Apple Inc.'s Mac OS X, meanwhile, posted its biggest gain in the same two-year period, growing by 0.66 percentage point to end the month at 8.9%. November was the third month running that Apple's operating system remained above 8%.

Vince Vizzaccarro, Net Applications' executive vice president of marketing, attributed Windows' slip to some of the same factors he credited with pushing down the market share of Microsoft's Internet Explorer browser. "The more home users who are online, using Macs and Firefox and Safari, the more those shares go up," he said. November was notable for a higher-than-average number of weekend days, as well as the Thanksgiving holiday in the U.S., he said.

Windows' share typically falls on weekends and after work hours, as users surf from home computers, a larger percentage of which run Mac OS X than do work machines.

Notable in Windows' downturn was a dramatic drop in share of the aged Windows XP -- the largest decrease since January 2008 -- and a major uptick in Windows Vista's share. While XP lost 1.81 percentage points, Vista gained back 1.16 points of that, its largest move since last January.

Windows 2000, the only other edition that Net Applications tracks, continued its slide toward 1%, falling to 1.56% during November.

As expected, Vista cracked the 20% mark for the first time last month, ending November with a 20.45% share.

Windows' share shows no sign of stopping its slow slide; in the past 12 months, Microsoft's market share has fallen from 91.79%, a decrease of more than 2 percentage points. During the same period, Apple has increased its operating system market share by 1.56 points, or a gain of 21.3%.

Net Applications also noted a small boost in market share for the open-source Linux operating system, which grew from 0.71% in October to 0.83% last month. In August and September, however, Linux had a share above the 0.9% mark.
http://www.computerworld.com/action/...icleId=9121938





November OS Share Numbers: Should Microsoft Be Scared?
Tom Reestman

The latest numbers from Net Applications’ Operating System stats are available, and they provide a nice epilogue to last month’s numbers. In October the Mac’s share was down, and Vista’s was up, prompting some to write about the apparent anomaly.

I countered that notion with my own writeup that showed both Windows and Mac have ups and downs in their numbers, so any single month isn’t particularly relevant. This is also true because Net Applications’ numbers themselves are really just a measure of OS usage hitting their network of web sites worldwide (~40,000 sites). It may be as accurate an OS measure as any, but one would still have to say it’s not conclusive. If anything, since some of those sites could be IE-only, it might even be skewed against any non-Microsoft OS.

But the data is sure fun to play with.

Looking at November’s numbers for just Windows and Mac we see the Mac back up, wiping out the tiny “loss” of last month while adding over half a point. Meanwhile, while Vista is up again (~1.2 points), XP is down (~1.8 points). This is just additional confirmation of the point in my previous article: Vista’s gains are coming primarily at XP’s expense. Hardly unexpected.

For even more fun, let’s take a look at Windows (all flavors) and Mac (Intel and PowerPC) over the last two years (in the graph below note that the Windows scale is in the left, and Mac scale is on the right):

From 12/06 to 11/08 Windows loses 4.2 percent while Mac gains 3.2. Where did the other 1 percent of Windows losses go? Well, Linux picked up nearly half a point, and I assume the other half-point went to the ever-popular — and every statisticians’ best friend — category known as “Other.”

In short, the trends are these:

• Vista is gaining share.
• XP is losing share as fast (or faster) than Vista is gaining it.
• Windows “net” is that it’s losing share.
• Mac is gaining share.

Obviously, these things go slowly. After all, the above graph took two years. It’s not like Microsoft should panic now that that they’ve dipped below 90 percent; nor should Apple crow that they’re up to nearly 9. That’s a 10 to 1 disparity; it’s pretty obvious which one is the 800 pound gorilla in the room.

Still, the overall trends are not in Microsoft’s favor, and Apple’s move from 5.7 to 8.9 represents a 56 percent increase in two years. That’s impressive no matter how you look at it.
http://theappleblog.com/2008/12/03/n...oft-be-scared/





Danish ISP Ordered Again to Block Pirate Bay

Landmark decision or just a needle prick?
Jan Libbenga

Danish ISP Sonofon (part of Tele2) has once again been ordered by a Danish court to block the controversial Swedish BitTorrent site The Pirate Bay. The record industry represented by The International Federation of the Phonographic Industry (IFPI) calls it a landmark ruling and says the decision confirms the illegality of Pirate Bay.

The judgment delivered Wednesday by the Danish appeal court upholds the decision earlier this year requiring access to the Pirate Bay to be blocked. The court believes Sonofon is contributing to the infringements by allowing access to the pirate site.

IFPI Chairman and CEO John Kennedy believes the decision "sets a precedent for other countries and highlights the key role that ISPs should play in helping protect copyright online". Jesper Bay, head of the Danish IFPI, expects other ISPs to follow suit, he told the Danish magazine Computer World.

However, the IFPI may have picked the wrong ISP: Sonofon does not have substantial broadband operations in Denmark and is losing market share. Also, Tele2 could still take the case to the Supreme Court.

The original court case to force Danish ISP Tele2 to block The Pirate Bay was initiated by the IFPI itself earlier this year. A similar Danish court order obtained by the record industry in 2006 to cut off the murky Russian music download site AllofMP3.com at DNS level was quickly sidestepped by internet users - as was the blocking of The Pirate Pay.

So far, IFPI's actions against The Pirate Bay haven’t exactly diminished the Pirate Bay's popularity. The site is actually celebrating its fifth birthday this week and reached 25 million users earlier this month.

The four individuals responsible for setting up and running the site are facing criminal prosecution in Sweden and the hearing is scheduled to begin in February in Stockholm.
http://www.theregister.co.uk/2008/11...ck_pirate_bay/





European Council Agrees on New Version of the Telecom Package

The European ministers with responsibility for telecommunications arrived at a joint position on the planned amendment of the Telecom Package at a meeting in Brussels on Thursday 27th of November. They largely accepted the compromise proposed by the French presidency of the Council that copyright aspects should be excluded. Proposed amendment 138 to the framework directive for the regulation of the telecommunications market, which the European Parliament proposed in order to ensure that users could access "lawful content", was not accepted by the Council. The European Parliament had wanted to ensure that any interference with the rights and freedoms of end users would require a court order.

During the debate, Denmark and Austria were among those wanting to keep that clause, signalling their opposition to the controversial French plans to introduce a system of "graduated response" to copyright infringements, which could go all the way up to barring access to parts of the internet. Bulgaria, Poland and Hungary too wanted the package to completely exclude questions of copyright enforcement and the promotion of creative content. French government spokesman Luc Chatel said, however, that in the end there were only three abstentions when the amendment was eliminated. He said the EU Member States had not wanted the entire legislative process to be blocked on this point.

In advance of the Council session, two MEPs – Guy Bono of the Socialists and Daniel Cohn-Bendit of the Greens – called upon the ministers in a letter to resist the "dictation" of the French Council presidency, which they accused of ignoring the current proposals of the Commission and the Parliament. They said President Nicolas Sarkozy wanted to introduce a "three strikes and you're out" law under which repeated illegal downloads would mean internet users' having their web access blocked. This "graduated response" would enable their internet access to be blocked for copyright infringement without any prior court order. The two MEPs therefore asked the Council to respect their proposed amendment 138. They said deleting the article nine months before the European elections would give a very bad impression of European democracy in general and the Council in particular.

The position taken by the government representatives means that the "universal service directive" now requires internet providers to cooperate more closely with the entertainment industry. The ministers deleted the Parliament's addendum to promote "lawful content". The Council erased proposed amendment 166, by means of which Parliament wanted to guarantee that "any restrictions to users' rights to access content, services and applications, if they are necessary, shall be implemented by appropriate measures, in accordance with the principles of proportionality, effectiveness and dissuasiveness." Ultimately it is now left up to the Member States independently to embody internet prohibitions in their laws in cases of copyright infringement.

The ministers further scrapped suggestions for the setting up an EU regulatory body. The Parliament had already transformed the "super-regulator" originally proposed by the European Commission into the "Body of European Regulators in Telecommunications" (BERT), a committee holding fewer powers. If things go in accordance with the wishes of the Council, the existing regulators will now only cooperate in a joint group called "GERT" (Group of European Regulators in Telecoms). The Commission is not to have a right of veto. Viviane Reding, the European Commissioner for the Information Society and Media, expressed her regrets that Europe was thus throwing away the prospects of a strong common telecoms market.

The German Government achieved a majority in favour of a proposed amendment to the French stipulation, to give more weight in future to the investment risks implied by regulatory decisions dealing with the establishment of new broadband networks. In a watered-down version of the original German proposal, incentives are to be given to investors in, for example, the extension of fibre-optic networks. With reference to the EU's dispute with the German Government over "regulatory holidays" incorporated in the German telecommunications law (TKG), aimed at easing controls over Deutsche Telekom in "new markets", Reding emphasized that there would be no such regulatory holidays.

The package also contains provisions for consumer protection as well as a revised directive on data protection in electronic communications. According to the Council's version, providers may store connection and location data if this is "unconditionally necessary" for maintaining the functioning and security of the network. The Council, Commission and Parliament now want firmly to lash down the final regulatory framework in what they call a "trilog" procedure. If this works, no second reading in Parliament will be necessary.
http://www.heise-online.co.uk/news/E...ckage--/112095





Internet Service Provider (ISP) Filtering
Gov’t faq

Part of the Australian Government's Cyber-safety plan is the introduction of Internet Service Provider (ISP) level filtering. The policy reflects the view that ISPs should take some responsibility for enabling the blocking of 'prohibited' material on the internet, as they do in a number of western, developed countries.

The Government's election commitment was that filtering would block content using a blacklist of prohibited sites maintained by the Australian Communications and Media Authority (ACMA) in accordance with legislation. The ACMA blacklist is a list of internet web sites, predominantly comprising images of the sexual abuse of children, which are defined as 'prohibited' under Australian legislation which has been in place since 2000.

Consideration is also being given to more sophisticated filtering techniques for those individual families who wish to exclude additional online content in their own homes.

The Government's approach will be informed by the filtering technologies adopted in countries such as the United Kingdom, Sweden, Norway, Finland, Denmark and Canada where ISP filtering, predominantly of child pornography, has been successfully introduced without affecting internet performance to a noticeable level.

The Government's ISP filtering policy is being developed through an informed and considered approach, including industry consultation and close examination of overseas models to assess their suitability for Australia.

ACMA laboratory trial

ACMA completed a laboratory trial of available ISP filtering technology in 2008. The trial looked specifically at the effect of a range of filter products on network performance, effectiveness in identifying and blocking illegal and inappropriate content, scope to filter non-web traffic, and the ability to customise the filter to the requirements of different end-users.

The laboratory trial indicated that ISP filtering products have developed in their effectiveness since they were last assessed in 2005.

The results of the laboratory trial have been published in the report Closed Environment Testing of ISP-Level Internet Content Filtering, which the Minister publicly released on 28 July 2008.

ISP filtering live pilot

In 2008-09 the Government is undertaking a live Pilot of ISP filtering which will provide valuable information on the effectiveness and efficiency of filters installed in a 'real world' ISP network. The live Pilot is proceeding in close consultation with the internet industry.

The Government is committed to working closely with the internet industry to address any concerns, including costs and internet speeds. These concerns will be carefully considered during the Pilot and will further inform the Government's cyber-safety policy.
http://www.dbcde.gov.au/communicatio..._isp_filtering





Children's Welfare Groups Slam Net Filters

Support for the Government's plan to censor the internet has hit rock bottom, with even some children's welfare groups now saying that that the mandatory filters, aimed squarely at protecting kids, are ineffective and a waste of money.

Live trials of the filters, which will block "illegal" content for all Australian internet users and "inappropriate" adult content on an opt-in basis, are slated to begin by Christmas, despite harsh opposition from the Greens, Opposition, the internet industry, consumers and online rights groups.

Holly Doel-Mackaway, adviser with Save the Children, the largest independent children's rights agency in the world, said educating kids and parents was the way to empower young people to be safe internet users.

She said the filter scheme was "fundamentally flawed" because it failed to tackle the problem at the source and would inadvertently block legitimate resources.

Furthermore there was no evidence to suggest that children were stumbling across child pornography when browsing the web. Doel-Mackaway believes the millions of dollars earmarked to implement the filters would be far better spent on teaching children how to use the internet safely and on law enforcement.

"Children are exposed to the abusive behaviours of adults often and we need to be preventing the causes of violence against children in the community, rather than blocking it from people's view," she said.

"The constant change of cyberspace means that a filter is going to be able to be circumvented and it's going to throw up false positives - many innocent websites, maybe even our own, will be blacklisted because we reference a lot of our work that we do with children in fighting commercial sexual exploitation."

Doel-Mackaway noted the claims by the internet industry that the filters would be easily bypassed, would not block content found on peer-to-peer networks and chat rooms and would be in danger of being broadened to include legitimate content such as regular pornography, political views, pro-abortion sites and online gambling.

Laboratory test results released in June by the Australian Communications and Media Authority found available filters frequently let through content that should be blocked, incorrectly block harmless content and slow network speeds by up to 87 per cent.

James McDougall, director of the National Children's and Youth Law Centre, expressed similar views to Save the Children.

He said the mandatory filters simply would not work and children should be able to make decisions for themselves. Concerned parents could easily install PC-based filters on their computers if they desired, or ask their internet providers to switch on voluntary filtering.

"This is called a child protection measure yet the vast majority of all serious child abuse does not occur on the internet, it occurs in the home," said McDougall.

"I take issue with the minister's perspective that children are themselves the danger in a sense that we have to make this decision for them because they are not capable of making it for themselves - I think there's very little evidence to support that and plenty of evidence to show that children are responsible decision makers given the skills and information."

Other childrens' welfare organisations, such as Child Wise and Bravehearts, continue to support the filters, saying the flaws are acceptable as long as they help block some child pornography.

On Thursday, as political activist group GetUp announced its plans for an elaborate anti-filtering campaign, 70 ISP filtering stakeholders converged on the University of NSW to examine the merits of the proposed censorship scheme.

"There seemed to be some consensus that the proposed mandatory filter model would not actually be directed at the real channel of child porn distribution, which is not the blacklist of known web sites, but via various other internet protocols and tools," said David Vale, executive director of UNSW's Cyberspace Law and Policy Centre.

"The idea of doing whatever was possible in stopping the problem at the source, including education of parents, kids, teachers and politicians, and serious law enforcement efforts at detection and prosecution of perpetrators and distributors, was seen as probably as, or more, effective than a filter initially aimed at preventing inadvertent browsing of child porn on the web by young people.

"Another aspect was the potential for the filter, once in place, to become the subject of a repeated bidding war, depending on which minor politicians had balance of power in parliament, or who had the 'moral panic of the day'."

Senator Conroy's spokesman, Tim Marshall, has consistently failed to respond to requests for comment on the issue.
http://www.theage.com.au/articles/20...?page=fullpage





Anti Internet Filtering Rebels Hit the Streets

Protests planned across the country
Darren Pauli

Opponents to the government's Internet content filtering scheme will take to the streets in a series of protests planned in Australia's capital cities.

The protests, organised by members from activist groups including the Electronic Freedom Project and Digital Liberty Coalition, will be held at Sydney's Town Hall, Brisbane Square, Melbourne's State Library, Adelaide Parliament House, Perth's Stirling Gardens and at Tasmania's Parliament Lawns.

Participants have created Facebook groups and a YouTube video to rally support and direct activists to the events. Opposition and Greens senators have expressed interest in attending the protests.

The government initiative, funded as part of the government's $125.8 million cyber safety plan, will impose mandatory ISP-level Internet content filtering nation-wide, and will block Web pages detailed in two blacklists operated by the Australian Communications and Media Authority (ACMA).

Prescribed filtering technology, short-listed following a July trial, will be tested again by ISPs during the Christmas period.

A spokesperson from one of the country's largest ISPs, who requested anonymity, told Computerworld he expects the filters to fail because the prescribed filtering technology is unsuitable for most networks.

Sources privy to the pilot's EOI documents say the trial will be restricted to 12Mbps — a small fraction of ISP network connections — which they say will undermine the final test results.

Critics made similar comments after the filtering technology was tested last July against a simulated load of 30 users. They said even the most accurate filter, which returned a 94 percent accuracy rating, would incorrectly block up to 10,000 Web pages out of 1 million.

The trial is expected to use a blacklist of 10,000 banned Web pages, using the rumoured 1300-page blacklist held by the ACMA mixed with dummy data.
http://www.computerworld.com.au/arti...16&fpid=1&pf=1





The Tangled Web of Porn In the Office
Anna Kuchment and Karen Springen

Jenna Jameson now has a 9-to-5 job. Fully one quarter of employees who use the Internet visit porn sites during the workday, according to October figures from Nielsen Online; that's up from 23 percent a year ago. And hits are highest during office hours than at any other time of day, reports M. J. McMahon, publisher of AVN Online magazine, which tracks the adult video industry.

What's driving workers to get their kicks on company time? It's one more thing we can pin on the slow economy. "People are looking for an escape," says Steve Hirsch, CEO of Vivid Entertainment Group, an adult online-video provider. And rightly or wrongly, they think their bosses are too busy to notice, says Dawn Adams, CEO of Wisconsin consulting firm HResults. "Managers are dealing with so many issues right now," she says, "that sometimes people are able to hide out and no one knows what they're doing." AVN's McMahon attributes the rise in workplace porn to the proliferation of free Web sites, such as xtube.com, that allow users to quickly log on and off. But a larger factor is the evolving sense—not universally shared—that porn is no big deal. "You're looking at a younger consumer who has grown up with pornography being out there in the pop culture," McMahon says.

Some can't seem to stay away from it. Earlier this year, nine Washington, D.C., city employees—including at least one from Child and Family Services—were fired for viewing porn sites thousands of times while on the job. The worst offender reportedly logged an average of one hit every 2.5 minutes.

The threat to companies isn't just the lost hours of productivity and the risk of sexual-harassment lawsuits. Adult sites also expose computers to viruses, adware and spyware—though such ills can serve as smoking guns. At her last job, Adams fired an executive for spending hours a day on adult sites. "His computer was always crashing," she says. "That's how we found out."
http://www.newsweek.com/id/171279





UK.Gov Says Exteme Porn Isn't Illegal If You Delete It...

...unless you know how to recover a hard drive
John Ozimek

The Ministry of Justice promised to provide public guidelines to the new extreme porn legislation this week and – behold! – here they are ( http://www.justice.gov.uk/news/announcement261108a.htm ).

They have been greeted with some degree of criticism from those opposed to the legislation, on the grounds that they add little new to what was already known and fail to make matters as clear as they could. Much of this criticism, however, is as much to do with the substance of the law as the guidelines.

What almost all those involved agree – whether for or against – is that we shall not know how wide-reaching this new law will be until the first few cases are heard before a court. Everything else is mere parlour room speculation – and readers who wish to indulge in a little speculation of their own should proceed rapidly to the end of this artcle.

To fall foul of the new law – ss 62-67 of the Criminal Justice Act 2008 ( http://www.opsi.gov.uk/acts/acts2008...#pt5-pb1-l1g63 ) – images must be pornographic, grossly offensive and portray activity that threatens harm to life or limb, or involves sex with a corpse or animal.

"Life-threatening" is defined according to the usual dictionary definition: "serious injury" is not defined, but "could include the insertion of sharp objects or the mutilation of breasts or genitals".

"Explicit and realistic" take their ordinary dictionary definition.

The guidance is clear that the material will include "images which are indistinguishable from photographs and films": that includes cgi; and also, if sadville ever gets its act together, some of the more extreme performances of virtual sadism ( http://uncensored.xstreetsl.com/modu...&ItemID=737231 ).

Deleting an image will be sufficient to prove you no longer "possess" it – unless you have the skill to recover it. In which case you could still be done: techies beware.

Two interesting features of this new law arise in respect of potential defences. The first is where the material in question is a BBFC classified film, that should be an absolute defence. However, if you extract images or sequences from that film, your defence may fall.

That raises the interesting question of whether the BBFC would ever pass for viewing any scene, however transitory, that would fall foul of the Obscene Publications Act. The interesting answer from the BBFC was that although they knew of no such instance, the theoretical possibility was always there, not least because juries in different parts of the UK might have different views on what constituted obscenity.

Back in 1997, the Police took possession of material produced by Nigel Wingrove. Mr Wingrove is no stranger to controversy, being both the impressario behind the Satanic Sluts, and an avant-garde filmmaker famed as producer of Visions of Ecstasy ( http://www.imdb.com/title/tt0098604/ ), the only work still banned by the BBFC on the grounds of potential blasphemy.

When Mr Wingrove objected that the material in question had been passed by the BBFC, the Police suggested that they might have to raid that body as well.

Such a move would have been devastating for film in the UK, which is why it never happened. The BBFC has no formal powers at all to ban film: but Councils use its recommendations almost without question. Loss of faith in the BBFC system could lead to a collapse of the classification system – and the need for government to intervene.

A question asked by opponents of the law is whether the new legislation might trigger such a collapse – or at least cause problems. Despite repeated claims by its advocates that this offence is merely a filling in of loopholes under the OPA, it clearly is not, criminalising categories of image that would not fall foul of the existing law.

If, as seems inevitable, images from mainstream film eventually end up on the charge sheet in court, this may turn out to be a field day for moralists who have always insisted that the BBFC do not go far enough.

The guidelines further confirm that although you may possess pics of you and your beloved (singular or plural) indulging your taste for the extreme, this defence does not extend to the photographer, unless they were also a participant in the hanky-panky. Whether that means they have to set the timer going, then rush round the front to appear in the action, or just need to alternate turns with the camera and the nipple clamps is still unclear.

Debate - NSFW

As promised, here are some images or suggested images from mainstream film that might not stand the test set by the new law. Do feel free to comment and or provide your own suggestions and links (whilst recognising that our moderators are only human and do not all have cast-iron stomachs).

We start with our now familiar pic of two Satanic Sluts taking a bloodbath ( http://salvationgroup.com/satanic/sluts/087a.jpg ) together

Then there is the rape scene ( http://www.wwnorton.com/college/film...ge022_0000.jpg ) from "Clockwork Orange ( http://www.imdb.com/title/tt0066921/ )" – which has been banned from Youtube.

Here is an award winning Finish short ( http://www.youtube.com/watch?v=LJhHLSLzk9s ), which highlights the problem that this law might pose for much of the horror genre.

From "Matador ( http://www.youtube.com/watch?v=DpOQ20Z1mgo )", by Pedro Almodovar, look carefully for the instant where the hero holds his girlfriend's head underwater in the bath so that she starts to drown whilst they are having sex. The guidelines target asphyxiation.

And here's some gratuitous violence ( http://www.youtube.com/watch?v=YiHHdhxxp-Q ).

A writer on UK film has also suggested a couple more scenes, for which we have been unable to obtain links:

The scene in "The Man who Fell to Earth ( http://www.imdb.com/title/tt0074851/ )", where David Bowie's character threatens his girlfriend with a gun in a classic sex scene set to the tune "Hello Mary Lou".

In "Blue Velvet ( http://www.imdb.com/title/tt0090756/ )" Dorothy holds Jeffrey at knifepoint after discovering him spying on her. She orders him to undress and they subsequently have sex.

If, however, you enjoy gross mutilation in a non-sexual context, have no fear: this new legislation will not touch such classics as Saw ( http://www.imdb.com/title/tt0387564/ ), Saw II, Saw III etc.

Apparently extreme images are only dangerous if watched by sexual deviants: psychopaths and murderers are unaffected by them.
http://www.theregister.co.uk/2008/11/28/extreme_images/





Cash Demand Over 'Porn Downloads'
Jim Reed

Thousands of internet users have been told they'll be taken to court unless they pay hundreds of pounds for illegally downloading and sharing hardcore porn movies.

Newsbeat's found out that people across the UK have been accused of using file-sharing networks to get hold of dozens of adult titles without paying for them.

A German company called DigiProtect claims the users are breaking copyright law and is demanding £500 to settle out of court.

A 20-page legal letter lists the name of the film involved along with the time and date of the alleged download.

Lawyers say they have been contacted by hundreds of worried individuals over the past few weeks.

Many deny copying the movies and say they have no idea why they were identified in the first place.

Michael Coyle from Southampton-based solicitors Lawdit is acting on behalf of hundreds of people who have already received legal papers in the post.

"It's the embarrassment factor," he said. "One lady told us she fainted when she opened her letter. Teenagers right up to old-age pensioners have been accused of downloading hardcore porn. The overriding feeling is one of outrage."

'Upset and angry'

Twenty-seven-year-old 'Helen', not her real name, from Hull, told Newsbeat she was "upset, scared and angry" after a letter landed on her doormat last month demanding £525 for sharing a single adult movie over the net.

"It's a big letter accusing me of downloading a porn film called Young Harlots In London. "I've never heard of it before, certainly never seen it and never downloaded it."

"I got a letter from my ISP a few months back saying that they had received a court order which meant they had to release my details to a law firm."

"I waited for the letter to turn up. It gives me three weeks to pay up, or they'll take me to court."

"I think their methods of going about this have been completely wrong. They are terrifying quite a number of people."

Sixty-year-old 'Mary' from Bedfordshire received a similar letter.

"I'm a pensioner, so it was such a shock. I didn't even know what a P2P network was before this," she said. "I didn't sleep for a week."

Porn campaign

The illegal sharing of copyright material over the web is a major headache for music, movie and game companies.

Six million people in the UK alone are thought to download music and movie files for free each year with more than half under-25s said to use file-sharing networks like Gnutella, BitTorrent and eDonkey.

When an individual user downloads sections of a film or song over the network, they are simultaneously uploading different parts of the film to other users.

The government recently brokered a deal between record labels and internet companies that was meant to discourage this kind of illegal copying.

Broadband providers like BT, Tiscali and Virgin agreed to send warning letters to customers identified by the music industry body, the BPI, as illegal file-sharers.

A handful of independent music and gaming companies have gone further and started taking direct legal action.

But this is thought to be the first time pornographic material has been targeted.

Michael Coyle said: "The cynical lawyer in me would say this is a money-making exercise.

"If you send out 10,000 letters and ask for £500 each time, you only have to get half to pay up and you've made a significant amount of money.

"Because it is porn, the person who's being accused won't want to go to court and is more likely to pay up to make the matter go away even if they are completely innocent."

Lawyers representing DigiProtect say the £500 demand is calculated as a token sum in damages for lost sales plus the "considerable" costs involved in obtaining evidence and legal fees.

IP addresses

Little is known about DigiProtect, the German firm behind the latest wave of copyright litigation.

The company is based in Frankfurt and brands its business with the motto "turn piracy into profit".

It has represented a range of rights holders in the past including the game company Atari and the German techno band Scooter.

It tracks down alleged pirates by logging the individual Internet Protocol, or IP, address of internet users logged on to file-sharing networks.

It then applies to the High Court to force broadband companies to release the physical contact details of customers matched to those addresses.

In legal letters to internet users seen by Newsbeat, the company claims: "Each copy… represents a potential lost sale and is tantamount to someone walking into a shop and taking a physical copy without paying for it and then giving a copy to anyone who asks for it."

But critics claim the technology DigiProtect uses to track internet use is unreliable.

The websites that allow users to access the file-sharing network have told Newsbeat that fake IP addresses are routinely entered into the system to throw companies like DigiProtect off the scent.

The growing popularity of wireless, or WiFi, networks in the home means it is easy to share an internet connection with a neighbour, especially in a block of flats.

"It's positively encouraged to have an open wireless network these days," said Michael Coyle at Lawdit. "Most people use very standard default passwords so it's very easy to use someone else's WiFi."

Lawyers representing DigiProtect claim the technology behind the company's tracking process is "highly sophisticated" and has been backed by courts in Europe.

They say it is the responsibility of broadband users to ensure they will not allow others to use their internet connections for unlawful purposes like illegal file-sharing.

'Completely misrepresented'

Many of the letters seen by Newsbeat indicate that DigiProtect is acting on behalf of one of the biggest adult studios in the United States, Evil Angel, run by American porn mogul John Stagliano.

When contacted, Mister Stagliano appeared to be unaware of the £500 DigiProtect is demanding from alleged file-sharers to settle out of court.

"It's not my understanding that they ask for anything near that. I think the amount was $50 (£34) or €50 (£43)," he said.

"I would be very surprised and I wouldn't be happy because it would mean it was completely misrepresented to me."

DigiProtect refused to comment directly for this article.

But in a statement, its legal representatives Davenport Lyons said: "[The £500 settlement fee] consists mainly of the cost of the considerable work required to identify the owner of the IP address.

"The sum in the settlement is a fraction of what would be ordered by a court if an individual were found liable after a trial.

"There is no compulsion on the individual to accept this settlement if he is innocent."

"Where submissions are made (such as someone claiming that they have not uploaded the copyright material or that the ISP has wrongly identified them as the owner of the IP address) we look into these carefully before deciding whether to proceed."

"The lawyer representing people accused who says this is a money making scheme is simply wrong.

"This action is designed to prevent further illegal exploitation of our client's copyrighted material and the settlement sum in no way compensates for the loss suffered or the cost of getting the settlement."
http://news.bbc.co.uk/go/pr/fr/-/new...00/7766448.stm





Most Employers Restrict Staff Time On Internet, Says Survey
John Carvel

Two-thirds of employers monitor staff use of the internet during working hours and block access to sites deemed irrelevant to the job, a survey of managers revealed yesterday. The Chartered Management Institute said the censoring of employees' web browsing was an example of old-fashioned thinking in boardrooms where senior executives have not caught up with the business benefits of exploiting new technology.

The institute interviewed 1,000 managers aged 35 and under, working in industry, commerce, local government and the police. Their most common complaint was that older bosses regarded the internet as "a massive timewaster". Half said their organisations did not take up web-based technology until it was tried and tested, and 16% described their employers as "dinosaurs". The survey found most young managers wanted to use the internet for research, professional development and other aspects of getting the job done. But employers treated it with suspicion. The survey found 65% of organisations monitored usage, rising to 86% in local government and 88% in the police. This led 65% of employers to block access to "inappropriate" sites, rising to 89% in local government and 90% in the utilities. Eighteen per cent of employers limited internet access to certain times of day, rising to 38% in the insurance industry.

The survey, published in association with Ordnance Survey, found a generation gap in the use of internet technology. Jan Hutchinson, human resources director at Ordnance Survey, said: "The low-level adoption of new technology runs in tandem with employers' belief that internet usage is a timewaster. The longer this situation is allowed to remain unchallenged, the greater the likelihood UK employers will fall behind their international competitors."
http://www.guardian.co.uk/technology...blocked-access





Young Workers' Use of Social Networking Sites Concerns IT Staffs
Steve Johnson

Social-networking sites such as Facebook and MySpace are being targeted so often by cybercrooks and other mischief-makers that half of the information-technology specialists surveyed recently by Intel expressed concern about workers under 30, who disproportionately use such sites.

Of the 200 corporate and government IT professionals in the United States and Canada who were surveyed, 13 percent said they regard so-called Generation Y employees as "a major security concern," and 37 percent tagged them as "somewhat of a security concern." The biggest worry they mentioned was the tendency of many Gen Yers to frequent social-networking sites like Facebook and MySpace.

Among other problems, the IT executives said employees using such sites may download viruses that wind up on their employer's computers or reveal information about themselves on the networking sites that compromises their employer's business secrets. To prevent such problems, some companies, including Intel, ban their workers' access to social networking sites.

"Their wide-ranging use of the Internet can expose the company to malicious software attacks," said Mike Ferron-Jones, who directs an Intel program that monitors new computing trends. "This is a big deal now, and it's going to get bigger as more Gen Yers come into the workforce."

On the positive side, the IT executives noted that Gen Yers tend to be computer savvy and are brimming with new ideas, which are highly desirable corporate qualities.

MySpace executives didn't respond to a Mercury News request for comment on the report. But Facebook spokesman Barry Schnitt acknowledged that his site has seen increasing cyberassaults.

"The more a site grows, the more it becomes a target of bad guys," he said. Nonetheless, he stressed that Facebook "acts aggressively and proactively to protect our users."

Among other things, Facebook does statistical analysis of how often people send messages to identify scammers targeting large numbers of its users. And while he declined to provide data on how many scams are launched against the site each year, he said "only a very small percentage of users have been impacted by security issues."

Even so, the threat posed by identity thieves, con artists and malevolent hackers is considerable and growing, other experts have concluded.

On Tuesday, cybercrime specialists at the security software company McAfee in Santa Clara said they had discovered a link for a movie posted on Facebook. After the link is clicked, a so-called worm detours the user's Internet searches to certain Web-based ads, according to McAfee threat researcher Craig Shmugar.

McAfee's list of top 12 Christmas scams also warns that people on some social-networking sites have been receiving messages that say "You've got a new friend." When clicked, the messages downloads software that steals their financial information.

Increasing numbers of employees access social-networking sites at their job or while using a personal computer linked to work. And the problems they encounter on those sites can turn into big headaches for their employers, according to experts.

In a study earlier this year, security firm Sophos said, "Organizations are facing the dual concerns of social-networking Web sites causing productivity issues by distracting employees from their work" as well as viruses or other malicious computer code "being introduced to the workplace."

Sophos warned employers to be particularly wary of the common tendency of people to use the same password for every site they access. If a crook successfully guesses the person's social-network password, the study said, "They may well be guessing it for the company network, too."

Users of social-networking sites tend to be unusually trusting and willing to share information, said Scott Mitic, chief executive of TrustedID in Redwood City, which offers identity-theft protection services. While they would never dream of leaving their trash cans out when going on vacation, they often seem unconcerned about revealing details of planned trips on social-networking sites.

"I can tell you right now of my friends on Facebook whose house I should be breaking into," he said. "I know who's in Russia now. I know who's on a business trip to L.A."

Because some of Intel's computer chips can block viruses and other security threats, the company may be able to use the research to promote its technology, said Ferron-Jones. But he added that Intel — like other companies — also benefits from its employees using sites like Facebook to confer with customers or business associates.

That poses a big dilemma for businesses grappling with the social-networking phenomenon, he said, adding, "how do you harness all of the good, but avoid the bad?"


What Is Gen Y?

The cohort of people born immediately after Generation X, Gen Y is generally considered to be the last generation of Americans entirely born in the 20th century. As generations are not defined by a formal process, there is no precise consensus as to which birth years constitute Generation Y. Market research suggests, however, that if the common years of 1978-2000 are used, the size of Generation Y is approximately 76 million.
http://www.siliconvalley.com/news/ci_11138550





"Koobface" Virus Turns Up On Facebook
Jim Finkle

Facebook's 120 million users are being targeted by a virus dubbed "Koobface" that uses the social network's messaging system to infect PCs, then tries to gather sensitive information such as credit card numbers.

It is the latest attack by hackers increasingly looking to prey on users of social networking sites.

"A few other viruses have tried to use Facebook in similar ways to propagate themselves," Facebook spokesman Barry Schnitt said in an e-mail. He said a "very small percentage of users" had been affected by these viruses.

"It is on the rise, relative to other threats like e-mails," said Craig Schmugar, a researcher with McAfee Inc.

Koobface spreads by sending notes to friends of someone whose PC has been infected. The messages, with subject headers like, "You look just awesome in this new movie," direct recipients to a website where they are asked to download what it claims is an update of Adobe Systems Inc's Flash player.

If they download the software, users end up with an infected computer, which then takes users to contaminated sites when they try to use search engines from Google, Yahoo, MSN and Live.com, according McAfee.

McAfee warned in a blog entry on Wednesday that its researchers had discovered that Koobface was making the rounds on Facebook.

Facebook requires senders of messages within the network to be members and hides user data from people who do not have accounts, said Chris Boyd, a researcher with FaceTime Security Labs. Because of that, users tend to be far less suspicious of messages they receive in the network.

"People tend to let their guard down. They think you've got to log in with an account, so there is no way that worms and other viruses could infect them," Boyd said.

Social network MySpace, owned by News Corp, was hit by a version of Koobface in August and used security technology to eradicate it, according to a company spokeswoman. The virus has not cropped up since then, she said.

Privately held Facebook has told members to delete contaminated e-mails and has posted directions at www.facebook.com/security on how to clean infected computers.

Richard Larmer, chief executive of RLM Public Relations in New York, said he threw out his PC after it became infected by Koobface, which downloaded malicious software onto his PC. It was really bad. It destroyed my computer," he said.

McAfee has not yet identified the perpetrators behind Koobface, who are improving the malicious software behind the virus in a bid to outsmart security at Facebook and MySpace.

"The people behind it are updating it, refining it, adding new functionalities," said McAfee's Schmugar.

(Reporting by Jim Finkle, Additional reporting by Emily Kaiser; Editing by Toni Reinhold)
http://www.reuters.com/article/techn...4B37LV20081205





French RIAA Vs. SourceForge, Take Two
Serdar Yegulalp

Last month the French RIAA, the SPPF, declared that it was bringing suit against SourceForge for aiding and abetting peer-to-peer piracy. It sounded ludicrous, and now there's better evidence to show it is indeed every bit as stupid as it sounded.

For a local perspective on the lawsuit, I was directed to the blog of the "CoPeerRight Agency", which according to their masthead is "the first specialized agency in the protection of royalties and the fight against digital piracy on Peer-to-Peer networks and the Internet" ("1ère agence spécialisée dans la protection des droits d'auteur et la lutte contre la contrefaçon numérique sur les réseaux Peer-to-Peer et Internet"). They seem to be of the general stance that online file sharing is not illegal, or at the very least does not deserve to be countered by suing everyone in sight on shaky legal ground.

The blog entry in question is entirely in French, which I do read (although not at a collegiate level), and with some effort I found what seem to be the key reasons for the lawsuit against SourceForge. Here's the original French:

Quote:
Nous aimerions revenir sur l’assignation étonnante de SourceForge, qui ne manque pas de nous plonger dans la perplexité. Le directeur général de la SPPF, Jérôme Roger, explique cette mise en cause de la manière suivante : « SourceForge est une société qui a travaillé pour le compte de Shareaza et que nous avons mise en cause dans la mesure où ses ingénieurs ont procédé au développement du logiciel – qui a aujourd’hui disparu en tant que logiciel P2P – Shareaza ». Mais, tout d’abord, le logiciel Shareaza existe toujours puisque sa dernière version date du 1er octobre 2008 (version 2.4.0.0).

Par ailleurs, en suivant le raisonnement adopté par la SPPF, pourquoi ne pas attaquer 01net qui propose des liens vers Shareaza, Limewire, eMule, Azureus etc. ? De même, si toute société qui développe des programmes permettant de commettre des actes de contrefaçon numérique devait être assignée en justice, pourquoi ne pas attaquer les navigateurs Internet comme Firefox (distribué par Mozilla Foundation), ou Chrome (développé par Google) ?

Le directeur général de la SPPF mentionnait que 180 logiciels avaient été identifiés comme permettant l’échange illégal d’œuvres de son répertoire, pourquoi alors la société a-t-elle ciblé trois éditeurs en particulier ? Enfin, d’après les explications de la SPPF justifiant ces procédures judiciaires, pourquoi n’a-t-elle pas attaqué BitTorrent qui est le protocole utilisé par le logiciel Vuze ?
Here is my (admittedly shaky) translation; corrections are welcome:

Quote:
We would like to return to the astonishing indictment of SourceForge, which does not fail to plunge us into perplexity. The managing director of the SPPF, Jerome Roger, explains the reasoning for this in the following way: “SourceForge is a company which worked on behalf of Shareaza and which we blamed insofar as its engineers carried out the development of the software - which disappeared today as a P2P program - Shareaza”. But, first of all, the Shareaza software has always been available, up to its most recent version dated October 1, 2008 (version 2.4.0.0).

In addition, while following the reasoning adopted by the SPPF, why not attack 01net which has connections with Shareaza, Limewire, eMule, Azureus etc? In the same way, if any company which develops programs that enable acts of digital piracy were to be accused, why not attack Internet browsers like Firefox (distributed by Mozilla Foundation), or Chrome (developed by Google)?

Whey, then, if the managing director of the SPPF mentioned that 180 Software had been identified as enabling the illegal exchange of works in its [SPPF's] repertory, did the company target three editors in particular? Lastly, according to the explanations of the SPPF justifying these legal procedures, why didn't it attack BitTorrent which is the protocol used by the software application Vuze?
If my reading of this is correct, the SPPF is bringing suit against SourceForge not only for the mere act of hosting the Shareaza project, but for actively collaborating with them in its development. This to me speaks of an astounding level of ignorance on the part of the SPPF with regard to how software is developed -- either on SourceForge or in general, really.

I'll have more as I can dig it up.
http://www.informationweek.com/blog/...h_riaa_vs.html





How an Italian Judge Made the Internet Illegal

New technology? It's all a mistake
John Ozimek

Italian bloggers are up in arms at a court ruling early this year that suggests almost all Italian blogs are illegal. This month, a senior Italian politician went one step further, warning that most web activity is likely to be against the law.

The story begins back in May, when a judge in Modica (in Sicily) found local historian and author Carlo Ruta guilty of the crime of "stampa clandestina" – or publishing a "clandestine" newspaper – in respect of his blog. The judge ruled that since the blog had a headline, that made it an online newspaper, and brought it within the law’s remit.

The penalties for this crime are not onerous: A fine of 250 Euros or a prison sentence of up to two years. Carlo Ruta was fined and ordered to take down his site, which has now been replaced by a blank page, headed "Site under construction", and a link directing surfers to his new site. Hardly serious stuff – except that he now has a criminal record, and his original site has disappeared.

The offence has its origins in 1948, when in apparent contradiction of Article 21 of the Italian Constitution guaranteeing the right to free expression, a law was passed requiring publishers to register officially before setting up a new publication. The intention, in the immediate aftermath of Fascism, may have been to regulate partisan and extremist publications. The effect was to introduce into Italian society a highly centrist and bureaucratic approach to freedom of the Press.

A further twist to this tale took place in 2001, with the realisation that existing laws were inadequate to deal with the internet. Instead of liberalising, the Italian Government sought to bring the internet into the same framework as traditional print media. Law 62, passed in March 2001, introduces the concept of "stampa clandestina" to the internet.

The suspicion expressed by a number of commentators is that this extension of the law suited government and publishers alike. The state was able to maintain its benevolent stranglehold on the media, whilst publishers could use the system of authorisation and regulation as a means to extend state subsidies to their ventures on the internet.

What few noticed at the time was that this law had the capacity to place blogs on a par with full-blown journalism. It would only take a judge to decide that something as simple as a headline was what defined a "newspaper".

One of the supporters of this law in 2001 was Giuseppe Giulietti, now a Deputy with the Italia di Valori Parliamentary Grouping.

Back then, he brushed aside criticism of the proposed law with the reassurance that "The Press Law has never had as its objective the regulation of the online community".

What a difference a few years make. Earlier this month, the same Giuseppe Giulietti could be found writing to the Minister for Justice that "current logic means that almost the entire Italian internet, by its very nature, could be considered illegal – "stampa clandestina" – which is a complete contravention of the democratic rulebook".

So is this just a storm in a teacup? After all, if this law potentially affects some 5 million Italian websites, there are at least 4,999,999 that have not yet been taken down. Why was Carlo Ruta singled out?

One clue lies in the location of the court that found him guilty (Sicily). Another, in the fact that his blog contained much detailed research of links between politics and the mafia – always a sensitive subject in Italy.

Since May, a Calabrian journalist and blogger, Antonino Monteleone, has also fallen foul of local magistrates, suggesting that the genie is now well and truly out of the bottle. Failing a reversal of the Ruta ruling in a higher court, it is going to need action at the parliamentary level to guarantee an Italian freedom to blog and to return the law to what most Italians believed it to be.
http://www.theregister.co.uk/2008/09...aw_kills_blog/





Berlusconi Plans to Use G8 Presidency to 'Regulate the Internet'

Forza Italia?
Chris Williams

Italian president and media baron Silvio Berlusconi said today that he would use his country's imminent presidency of the G8 group to push for an international agreement to "regulate the internet".

Speaking to Italian postal workers, Reuters reports Berlusconi said: "The G8 has as its task the regulation of financial markets... I think the next G8 can bring to the table a proposal for a regulation of the internet."

Italy's G8 presidency begins on January 1. The role is taken by each of the group's members in rotation. The holder country is responsible for organising and hosting the G8's meetings and setting the agenda. Italy's last G8 presidency in 2001, also under Berlusconi, was marred by riots at the annual meeting in Genoa.

Berlusconi didn't explain what he meant by "regulate the internet", but the mere mention of it has prompted dismay among Italian commentators. Berlusconi owns swathes of the Italian mass media.

The left-wing newspaper L'Unita wrote: "You can not say that it is not a disturbing proclamation, given that the only countries in the world where there are filters or restrictions against internet are countries ruled by dictatorial regimes: those between China, Iran, Cuba, Saudi Arabia."

La Stampa reports Italian bloggers are planning to protest against any move by the president to tighten government control over the web tomorrow. They plan to display anti-Berlusconi banners on their websites.

Any G8 move next year to "regulate the internet" led by Berlusconi is likely to attract criticism. He has often been accused of using his power to try to silence dissent. He lost a long-running libel battle against The Economist earlier this year after it said he was not "fit to run Italy" and was this week suing American critic Andrew Stille for defamation*.

However, the governments of industrialised nations have been ramping up their rhetoric against internet content they view as unacceptable. The UK has introduced new laws and revived arcane ones to clamp down on extremist websites and niche pornography. Australia is busy implementing filters.
http://www.theregister.co.uk/2008/12...i_g8_internet/





A Premier With a Hand in TV News Sues His Journalist Critics
Rachel Donadio

Prime Minister Silvio Berlusconi governs with a solid majority, oversees RAI, the state broadcaster, and owns the country’s leading private television networks.

So why, with all those means at his disposal, does the prime minister continue to respond to his journalist critics not on television or in the press but instead with lawsuits?

In recent years, Mr. Berlusconi has sued the magazine The Economist for writing that he was not “fit to run Italy” and the British journalist David Lane for his 2004 book, “Berlusconi’s Shadow,” which explored the origins of his fortune and noted that some of his associates had been investigated for Mafia ties. Mr. Berlusconi lost those cases in lower court and either has appealed them or still has the possibility of doing so.

Now, he has set his sights on Alexander Stille, America’s best-known Italianist and one of the prime minister’s most vocal Anglophone critics. A lower court in Milan was expected to rule on Tuesday in a defamation case filed against Mr. Stille by a close associate of Mr. Berlusconi. But in court on Tuesday the judge postponed the decision until mid-January at the request of the plaintiff's lawyer, an attorney for Mr. Stille said.

Mr. Berlusconi is not alone in suing reporters. In Italy — where journalists often play fast and loose with the facts and the legal system is devised to protect personal honor — politicians, magistrates and public figures sue journalists so often that the Italian National Press Federation has a “solidarity fund” to help with legal fees and damages.

“It’s one of the intimidation techniques of the political class,” said Franco Abruzzo, a journalism professor and a former editor of the financial daily Il Sole 24 Ore.

And something of a bipartisan sport as well. In 1999, Massimo d’Alema, a former Communist who was then a center-left prime minister, sued a political cartoonist for a drawing that showed him whiting out names in the Mitrokhin Report on Western cooperation with the Soviets during the cold war.

Yet, when the plaintiff is Mr. Berlusconi, the situation inevitably takes on other dimensions.

“What makes it different is that he’s the most powerful politician and richest man,” said Mr. Lane, the Rome correspondent of The Economist and a target of Mr. Berlusconi’s lawsuits. “He controls the media. He’s working from a position of maximum strength.”

Indeed, some see such lawsuits as part of a more troubling pattern in which Mr. Berlusconi tries to intimidate the press — even as he claims that the same news media organizations he largely controls are out to get him.

In 2002, Mr. Berlusconi criticized three left-wing critics — the comedian Daniele Luttazzi, the talk-show host Michele Santoro and the journalist Enzo Biagi — from RAI, which soon canceled their programs. (Mr. Luttazzi and Mr. Santoro eventually returned to television, and Mr. Biagi died last year.)

Today, Italy’s answer to Tina Fey, Sabina Guzzanti, famous for imitating members of the government, and Beppe Grillo, a Michael Moore-style provocateur, are given little airtime on television, albeit for complicated reasons, in spite of their large populist followings. Yet a leading send-up show, “Striscia la Notizia,” routinely mocks those in power and is shown on Mr. Berlusconi’s Mediaset network. In the case to be heard Tuesday in Milan, Fedele Confalonieri, the chairman of Mediaset, is suing over several passages in Mr. Stille’s 2006 book on the rise of Mr. Berlusconi, “The Sack of Rome.”

Mr. Confalonieri objected to Mr. Stille’s having reported that he was investigated in 1993 for illegal financing of the Socialist Party, without also noting that he was later cleared of those charges.

He found fault with Mr. Stille’s assertion that Mr. Berlusconi “has fused his business and private life almost totally,” as evidenced by his appointing Mr. Confalonieri, “his oldest childhood friend,” to run Mediaset.

And he objected to Mr. Stille’s quoting someone who said that many of Mr. Berlusconi’s close associates based their friendships “on blackmail” because they were the ones who knew where “all the skeletons in the closet are hidden.”

Although the assertions were not new and had been reported in the Italian press, Mr. Confalonieri maintained in his suit that they “directly damage the honorability and the reputation” of the parties in question. Mr. Confalonieri and Mediaset are seeking undisclosed damages.

A lawyer for Mr. Confalonieri, Vittorio Virga, said other journalists had avoided lawsuits by publishing retractions saying they now considered Mr. Confalonieri “a gentleman.”

“We shook hands and ‘arrivederci,’ ” Mr. Virga said. But Mr. Stille, he added, “didn’t show any initiative toward making peace.”

For his part, Mr. Stille, a professor at the Columbia University Graduate School of Journalism and the author of several well-regarded books on Italy, said that being sued for printing facts was “a Kafkaesque experience.”

“If they had been sincerely interested in setting the record straight and establishing the truth, they had many simpler ways,” Mr. Stille said.

Mr. Berlusconi’s lawyer, Nicolò Ghedini, said Italian newspapers rarely punished erring journalists so public figures had to defend their names in court. He added, “How come a journalist should have the right to defame?”

Under Italian law, even printing that someone has been investigated can be tantamount to defamation. Yet defamation suits are difficult to win, and public officials are usually on the short end.

But Mr. Stille and others contend that the point is not to win a judgment as much as to intimidate journalists and news outlets with the prospect of a lengthy and expensive court proceeding if they write something unfavorable. “For each of these suits, you may affect the behavior of another 100 journalists,” Mr. Stille added.

Such litigation seems to have an effect.

Mr. Lane, of The Economist, said he was considering cutting all references to Mr. Berlusconi in the Italian — but not the British — edition of his forthcoming book on the Mafia. “I’m too tired of spending my own money,” he said. “There are no medals to be won by being sued by Berlusconi.”
http://www.nytimes.com/2008/12/02/wo...e/02italy.html





Judge Throws Out Case Against Journo Bugged by Police

Same charges that Damian Green faces
John Oates

Sally Murrer, a journalist for the Milton Keynes Citizen, has had charges against her for receiving leaked information dismissed by the judge.

Murrer faced charges of aiding and abetting misconduct in a public office brought by Thames Valley Police. An ex-police officer, Mark Kearney, his son, and another reporter faced related charges.

Mr Justice Southwell said the reporters were entitled to protection under the European Convention on Human Rights. The judge ruled that police bugging evidence was inadmissible because journalists have the right to protect their sources. Thames Valley Police's case relied on bugged conversations between Murrer and Kearney.

Southwell said: "The protection of journalists' sources is a cornerstone of the freedom of the press... which is so important for a healthy and democratic society.", according to the BBC.

All four were formally acquitted at Kingston Crown Court today.

Murrer told the Press Gazette :"I’m totally numb, it’s a fantastic victory for all the press – not just me but every journalist in the country." Murrer doubts she will be able to work as a reporter again.

Mark Kearney was at the centre of a previous enquiry into the bugging of MPs. He was responsible for bugging conversations between MP and solicitor Sadiq Khan and one of his constituents at Woodhill Prison.

The judge's decision has casted further doubt over the arrest of Shadow Home Office minister Damian Green who could face similar charges for receiving information leaked by a Home Office official.
http://www.theregister.co.uk/2008/11...ase_dismissed/





EU to Search Out Cyber Criminals
BBC

The measures aim to improve data sharing between forces

Remote searches of suspect computers will form part of an EU plan to tackle hi-tech crime.

The five-year action plan will take steps to combat the growth in cyber theft and the machines used to spread spam and other malicious programs.

It will also encourage better sharing of data among European police forces to track down and prosecute criminals.

Europol will co-ordinate the investigative work and also issue alerts about cyber crime sprees.

Data share

The five-year plan won the backing of the EU ministers at a meeting which also granted 300,000 euros (£250,000) to Europol to create the system to pool crime reports and issue alerts about emerging threats.

The ministerial meeting also backed the anti-cyber crime strategy that will see the creation of cross-border investigation teams and sanction the use of virtual patrols to police some areas of the net.

Other "practical measures" include encouraging better sharing of information between police forces in member nations and private companies on investigative methods and trends.

In particular the strategy aims to tackle the trade in images of children being sexually abused. In a statement outlining the strategy the EU claimed "half of all internet crime involves the production, distribution and sale of child pornography".

Forces will also take part in "remote searches" and patrol online to track down criminals. The EU said controls were in place to ensure that data protection laws were not breached as this information was gathered and shared.

"The strategy encourages the much needed operational cooperation and information exchange between the Member States," said EC vice-president Jacques Barrot in a statement.

"If the strategy is to make the fight against cyber crime more efficient, all stakeholders have to be fully committed to its implementation," he added.
http://news.bbc.co.uk/2/hi/technology/7758127.stm





Guitarist Satriani Sues Coldplay
BBC

Grammy nominees Coldplay have been sued by rock guitarist Joe Satriani, who claims the band's song Viva La Vida uses one of his riffs.

In court papers filed in Los Angeles on Thursday, he said the song used "substantial original portions" of his 2004 instrumental If I Could Fly.

Satriani, 52, wants a jury trial and is seeking damages and "any and all profits" for the alleged plagiarism.

Coldplay are shortlisted for seven Grammys, including song of the year.

Viva La Vida is credited to the band's four members - singer Chris Martin, bass player Guy Berryman, guitarist Johnny Buckland and drummer Will Champion.

The song's title was inspired by Mexican artist Frida Kahlo.

It appeared on the album Viva La Vida or Death and All His Friends - which was released in June and went to number one in 36 countries - and was also one of their hit singles.

Satriani's track appears on his album Is There Love in Space?
http://news.bbc.co.uk/2/hi/entertainment/7766683.stm





Forrester Predicts Digital Boom Over Next Five Years
FMQB

JupiterResearch, a division of Massachusetts-based Forrester Research, released a new report titled U.S. Music Forecast, 2008 to 2013 in which they predict that 55 percent of U.S. online consumers will pay to download digital music in 2013. The report also said that digital music sales will total 41 percent of the entire U.S. music market by 2013, up from 18 percent this year. However, JupiterResearch also noted that growth in digital music sales will not compensate for declining CD sales, with the overall U.S. music market shrinking over the next five years from $10.2 billion to $9.8 billion, according to Reuters. However, 64 percent of the subscribers to digital services and 57 percent of consumers who download music have still bought a CD in a store in the past year.

Also of importance is the fact that while online piracy has long made up the bulk of digital downloads, paying for music is becoming increasingly popular. Researchers credited companies such as Amazon.com with helping propel digital sales by allowing consumers to buy music that can be transferred between various devices without restrictions. The report also found that digital music consumers are shifting an average of 60 percent of their music spending to digital formats.

Just before Thanksgiving, Atlantic Records revealed that more than half of its music sales in the United States already come from digital products, including downloads and ringtones. Atlantic is the first of the major labels to reach that milestone.
http://fmqb.com/Article.asp?id=1022392





Rising Royalties Send Yahoo's Launchcast Net Radio Service to CBS
Michael Liedtke

Yahoo is plugging its Internet radio service into CBS's Webcasting network in a move driven by dramatically higher fees for airing music online.

Yahoo's retreat from operating a standalone service, announced today, makes it the second major Web site this year to flee the rising royalty rates by hitching its radio service to CBS. AOL Radio, owned by Time Warner, hooked up with CBS in June.

Yahoo's radio channel, called Launchcast, will combine with CBS beginning in February.

Under the arrangement, Yahoo will depend on CBS Radio to power Launchcast and sell all the ads on the service. Yahoo employees will still oversee the programming for Launchcast's roughly 150 channels, drawing from CBS Radio's content.

In return for the helping hand, Yahoo's highly trafficked news and sports sections will feature some of CBS's top-rated radio stations, including WFAN in New York and KNX-AM in Los Angeles.

The combination also will widen Launchcast's audience by enabling users to listen to the service through the Firefox and Safari Web browsers for the first time. Launchcast's player has worked only with Microsoft's Internet Explorer.

Much of the promise of Internet radio is that it offers a vastly wider selection of music than commercial radio. So Launchcast's annexation into a traditional radio network saddened the founder of a rival Internet service, Pandora Media.

"It's a real shame because Yahoo was such a pioneer in this field," said Tim Westergren, who now serves as Pandora's chief strategy officer nearly nine years after he started the company. "It should serve as a cautionary tale of what can happen when copyright holders too much money."

CBS believes its system for targeting ads at Web listeners in specific ZIP codes will help boost Launchcast's revenue and ultimately provide the service with more resources, said David Goodman, president of CBS Radio's digital media and integrated marketing

Yahoo has been taking a hard look at all its services as management tries to trim about $400 million in annual expenses, but the company was reassessing its commitment to Internet radio well before the cost-cutting campaign began in October, said Michael Spiegelman, who heads Yahoo's music service.

The reason: a March 2007 decision by the U.S. Copyright Royalty Board that raised the royalties for music streamed over online radio. That aided the music industry, which is desperate to offset steadily declining revenue from compact disc sales, but it meant by some estimates that royalties could eat 70 percent of Internet radio stations' revenue.

Recently passed legislation has opened a window for Internet radio stations to negotiate lower royalties with the music industry, but Yahoo didn't want to run the risk of facing higher costs for a service that has never been a big moneymaker.

"Because of the unfavorable rates, we didn't think it made sense to invest in the product," Spiegelman said.

Launchcast evolved from Broadcast.com, which Yahoo acquired in 1999 in a deal initially valued at $5.7 billion. One of Broadcast's founders, Mark Cuban, used his part of the windfall to buy the Dallas Mavericks, a National Basketball Association franchise that he still owns.

Yahoo's waning interest in Launchcast had already diminished its audience. It shrunk 43 percent to 2.9 million U.S. listeners in the year ending in October, according to the Internet research firm comScore Inc.

Some of those listeners appear to have migrated to Pandora, which boasted an audience of 5.3 million in October, a 58 percent gain, comScore said.

Pandora is "cautiously optimistic" it will be able to decrease its royalty rates so its radio service can play on, Westergren said. If the higher royalty fees are passed along, Pandora would have to pay $17 million to $18 million to cover the bill this year, consuming almost all of its projected revenue, Westergren said.
http://www.siliconvalley.com/news/ci_11127937





Apple May be Chilling iTunes Competition: Critics
David Lawsky

Apple might be unfairly blocking rival software makers who want to sell music for its iPhone, according to some rivals and a technology rights group.

The iTunes store accounts for four out of five songs sold on the Internet in the United States and is becoming more important as CDs fade. A milestone was reached last month when Atlantic Records announced digital sales had surpassed CD sales.

Everyone agrees Apple achieved its dominance in music downloads and players with good products and marketing, which makes it entirely legal. Apple is not a monopoly because there are hardware competitors such as Microsoft Corp's Zune.

Nonetheless, rivals and a technology rights group are concerned Apple is overly aggressive.

Apple declined to comment, but its lawyer wrote a competitor and said the company is defending its rights under copyright law.

Apple's music business operates in three parts. First there is the hardware, an iPod or iPhone. Second, iTunes software on computers manages music on the hardware. Finally, there is the iTunes store, which sells music. The whole process is easy but importing music from competitors is more difficult, the critics say.

But Susan Kevorkian of IDC reports more vigorous competition, saying Amazon.com Inc has ramped up usage of its service in a scant 10 months and Wal-Mart Stores Inc has also captured some market share.

Apple has a few small rivals for iTunes. They include WinAmp, gtkpod for the alternate operating system Linux and Songbird.

"We love Apple's products," said Rob Lord, chief executive of Songbird.

His for-profit company makes software designed to run on iPods, or any other music player.

User Choice

"Users should have the choice of the iTunes store or somebody else's store," Lord said, adding consumers should be able to switch to Nokia, Blackberry In Motion Ltd or MP3 players without having to dump their entire music library.

Analysts do not believe companies such as Lord's pose a real threat to Apple's exclusive approach to music marketing.

"This may not be a big deal in the long run. Most people who go to alternatives probably wouldn't have bought songs from iTunes in the first place," said Michael Gartenberg with Jupiter Media.

But it is a big enough deal that Apple felt compelled to act last month, out of concern its copyright was violated.

Apple told the operator of website bluwiki.com to remove postings that talked about ways to work around a special Apple file, known as iTunesDB. Apple said copyright law prohibited such talk.

People such as Lord need to use iTunesDB for their software to work properly with the iPhone and iPod touch, both of which have protected versions of iTunesDB.

Sam Odio, operator of bluwiki, disliked the Apple notice, but did what it demanded, removing several postings.

"When a lawyer calls you up and implicitly threatens litigation that would bankrupt your little project you obviously have no choice but to comply," he said.

The technology rights group Electronic Frontier Foundation has taken on Odio as a nonpaying client to see if it can protect his freedom to post.

"This is a pure attack on interoperability," said Fred von Lohmann, a lawyer for the Foundation.

He said that, until a year ago, iPods worked well with many kinds of music software.

"In October of last year, they added (software) which has no purpose other than to prevent applications other than iTunes from working," he added.

Von Lohmann said court precedents make it clear others have a right to write software for iPods and iPhones.

(Editing by Andre Grenon)
http://www.washingtonpost.com/wp-dyn...120302026.html





Warner Music Pitches Music Tax To Universities: You Pay, We Stop Suing

Back in March, we noted that Warner Music Group had hired Jim Griffin, a music industry guy who has been pushing the concept of a "blanket license" for file sharing. The idea would be to get various ISPs to simply add an additional fee to everyone's internet access, have that money go into a pool that the recording industry would be responsible for paying out -- and then let people have free reign for file sharing. This is a bad idea for a variety of reasons. It's basically a music tax -- allowing the record industry to be lazy. Someone else gets to go out and collect all this money and hand it over to the industry to distribute (or, actually, not distribute). It effectively sets the business model of the recording industry in stone, and harms better, more innovative business models by inserting the recording industry (and not the musicians) into a role where they don't belong.

We hadn't heard much about this music tax lately, but apparently Griffin has been focused on getting universities to buy into the plan first. An anonymous reader passed on some details, saying that Columbia, Stanford, University of Chicago, University of Washington, MIT, University of Colorado, University of Michigan, Cornell, Penn State, University of California at Berkeley and University of Virginia have expressed interest and talks are under way. A basic presentation that's being given to these universities is below (if you're reading via another site, click through to see it):

There's obviously something appealing about ending the lawsuits and letting people file share freely. But, it's quite problematic to add an effective "tax" when none is necessary. Plenty of other business models, such as those we've outlined here and elsewhere can suffice to fund the creation of music. On top of that, giving the proceeds of this tax to the very industry that has so badly mismanaged musicians for so many years is a travesty -- sort of like bailing out the failed auto industry or banking industry. The presentation says that a nonprofit has been set up to handle the money, claiming that it's "to be clear we intend to operate with good intentions and not profit as a motive," but given the way the industry has acted in the past, that's difficult to take at face value. Also, this isn't really a license. It's a "covenant not to sue" -- meaning that lawsuits could still result.

Of course, while the introduction frames this as a "voluntary" blanket licensing program, the presentation also mentions that they'll need some way to get all ISPs and universities to buy into the plan, or they'll have to work out a way to "avoid massive leakage." So, basically, it's not voluntary at all. It's either join, or get saddled with significant limitations. In other words: all ISPs and universities need to agree to pay a huge tax to the very industry that hasn't been able to adapt, and then trust them to distribute the funds fairly.
http://techdirt.com/articles/20081204/1534153023.shtml





An Online Sales Boom That May Not Last
Claire Cain Miller

In a rare bright spot for the retail industry, e-commerce sites had a strong holiday weekend, with online sales from Friday through Monday up 13 percent compared with last year, according to data released Wednesday by comScore.

The Monday after Thanksgiving was the second-heaviest online spending day on record, comScore said, behind only Dec. 10, 2007. Online sales climbed to $846 million, up 15 percent from the previous year.

“It was higher than I would have anticipated, but I’m not entirely surprised, just because the level of discounting was so aggressive,” said Andrew Lipsman, a senior industry analyst at comScore, which tracks a variety of Internet data.

Still, strong Web sales are unlikely to bail out the retail industry, which is contending with a recession and a sharp decline in consumers’ wealth. E-commerce now accounts for only 7 percent of overall sales, according to Shop.org, the e-commerce arm of the National Retail Federation. And online sales were down 2 percent for the season so far — the first decline since the Web became a significant retail channel.

The Monday after Thanksgiving — which Shop.org calls Cyber Monday — has been a bellwether for online holiday sales. Sales growth on that day has historically fallen within two percentage points of total online sales growth for the season.

This year will be a different story, Mr. Lipsman said. ComScore has predicted that sales will be flat this season, and the firm is not changing its forecast as a result of sales Monday.

“There was evidently some pent-up demand,” said Scott Silverman, executive director of Shop.org. “The consumer could have said, ‘I’m going to do most of my shopping this day,’ and we could see a drop-off for the rest of the season.”

The online sales growth over the weekend mirrored offline sales, which the National Retail Federation said increased 18 percent over last year. Many retailers will give precise figures Thursday in their November sales reports.

Online, the virtual big-box stores, which had some of the steepest discounts, got the most visits. On Monday, eBay, Amazon, Wal-Mart, Target and Best Buy were the top e-commerce sites, Nielsen Online said.

At PayPal, which is used to process almost all eBay sales, the number of transactions Monday was up 27 percent from the year before, said Jim Griffith, whom eBay calls its marketplace expert. To lure shoppers, the auction site is promoting $1 holiday “doorbusters.”

The most popular product sold on eBay Monday was the Nintendo Wii game console — 3,017 were sold for an average price of $349. The Wii Fit, an add-on device for the console, was also popular, with 1,305 units sold for an average $143.

Amazon.com had strong sales of consumer electronics and toys, said Sally Fouts, a spokeswoman for the company. Deals included a Logitech universal remote control, marked down to $137.28 from $249.99, and a Canon digital camera, down to $159.94 from $299.99.

Beauty products accounted for a surprisingly large slice of sales Monday, said Sucharita Mulpuru, an e-commerce analyst at the research firm Forrester. “Cosmetics are doing really well this year, because it’s those affordable luxuries,” she said.

Average order values have been smaller this year, Ms. Mulpuru said: “It may not be a sweater, but it’s a scarf.”

One reason that shoppers finally filled their online shopping carts might be that there are five fewer shopping days between Thanksgiving and Christmas this year than last. “People have to spend a certain amount of money during Christmas,” Ms. Mulpuru said, “and that money was not spent in November, which means it has to be spent in December.”
http://www.nytimes.com/2008/12/04/te.../04online.html





Black Friday Fails to Stem Sales Drop
AP

A shopping lift on the day after Thanksgiving could not save a weak November for most retailers, fueling more concerns about a bleak December and beyond amid what could be a deep and long recession.

As merchants reported their November sales figures on Thursday, disappointments cut across all sectors as shoppers, worried about layoffs and shrinking retirement funds, focus on necessities.

Among the beneficiaries of that was Wal-Mart Stores, which posted sales results that beat Wall Street estimates. However, Costco Wholesale, usually a strong performer, reported a bigger-than expected sales decline. And mall-based stores like Limited Brands, Bon-Ton Stores and Pacific Sunwear of California fared much worse.

“It looks like Black Friday gave a modest boost so instead of sales being miserable they are just terrible,” said Ken Perkins, president of RetailMetrics, a research company. December and beyond will prove a big challenge for retailers, he said, because there is “no near-term catalyst to loosen purse strings.”

Sales data from the Thanksgiving weekend showed a buying binge on Black Friday — so named because it historically was the day that a surge of shoppers pushed stores into profitability — but shoppers retreated the rest of the weekend.

And even at the stores on Friday, they focused on bargains and on small-ticket purchases as they cut their holiday budgets — meaning only modest sales gains for the weekend. The worry is that shoppers will not return to malls until the final days before Christmas, making the typical lull between Thanksgiving weekend and the final days before Dec. 25 even more pronounced as shoppers wait for the best deals.

Wal-Mart reported a 3.4 percent gain in same-store sales, surpassing the 2.1 percent increase forecast by analysts. The results excluded sales from fuel. Including fuel, sales increased 3 percent.

Costco reported a 5 percent decline in same-store sales, larger than the 2.4 percent drop analysts expected. Excluding the effect of lower gas prices and currency fluctuations, Costco would have posted a 3 percent sales gain.

Bon-Ton reported a 16 percent decline in same-store sales, worse than the 14.5 percent drop that Wall Street anticipated. Limited Brands posted an 8 percent drop, though the results were better than the 11.6 percent decline that Wall Street expected.

Pacific Sunwear reported a 10 percent same-store sales drop for the month, not as steep as the 14.3 percent decline Wall Street projected.
http://www.nytimes.com/2008/12/05/bu...my/05shop.html





Top 10 Most Pirated Games of 2008
Ernesto

As 2008 is slowly moving toward its end, we start taking a look at the most pirated titles in various categories. First up are games. As expected, Spore is by far the most downloaded game on BitTorrent, in part thanks to the DRM that came with the game.

Traditionally, games can’t compete with the most pirated movies and TV-shows in actual download numbers, but Spore came very close this year.

Only 10 days after the game’s launch date, already half a million people had downloaded the game. During the months after that, another million people obtained a copy of the game via BitTorrent. According to our estimates, Spore was downloaded 1.7 million times since early September, a record breaking figure for a game.

When we posted about the impressive download rate on Spore - inflated due to the DRM that was put into the game - EA doubted our statistics. EA’s Mariam Sughayer said that every BitTorrent download was not a successful copy, and that several downloads didn’t work, were buggy, or contained viruses. We wont deny that on badly moderated torrent sites, malicious torrents probably can be found. However, this constitutes less than 1% of the available torrents, and they are not added to our statistics.

Below is the list of the 10 most downloaded (PC) games on BitTorrent in 2008, with an estimated download count for each. In second place we see The Sims 2, also from the hands of Spore creator Will Wright. Assassins Creed completes the top 3 with just over a million downloads.

PC Game Downloads on BitTorrent in 2008 as of December 4, 2008

# game downloads released

1 Spore (1,700,000) (Sept. 2008)
2 The Sims 2 (1,150,000) (Sept. 2004)
3 Assassins Creed (1,070,000) (Nov. 2007)
4 Crysis (940,000) (Nov. 2007)
5 Command & Conquer 3 (860,000) (Mar. 2007)
6 Call of Duty 4 (830,000) (Nov. 2007)
7 GTA San Andreas (740,000) (Jun. 2005)
8 Fallout 3 (645,000) (Oct. 2008)
9 Far Cry 2 (585,000) (Oct. 2008)
10 Pro Evolution Soccer 2009 (470,000) (Oct. 2008)
torrentfreak.com

http://torrentfreak.com/top-10-most-...f-2008-081204/





A Generation of Local TV Anchors Is Signing Off
Brian Stelter

One of the most familiar voices in Denver is about to sign off for the last time.

In October, three weeks after Ernie Bjorkman, an institution in Colorado television, signed a new annual contract worth close to a quarter of a million dollars, he was told he was being let go by KWGN, the CW affiliate in Denver, a victim of consolidation with another station.

In the self-assured baritone of his profession, Mr. Bjorkman, a 36-year television veteran who will be paid through the end of his contract period, said, “I don’t think we’re going to see the anchor people grow old with the audience anymore.”

Across the country, longtime local TV anchors are a dying breed. Facing an economic slump and a severe advertising downturn, many stations have cut costs drastically in the last year, and veteran anchors, with their expensive contracts, seem to be shouldering a disproportionate share of the cutbacks. When station managers are forced to make cuts, hefty anchor salaries are a tempting target.

In Chicago, the 23-year anchor Diann Burns was laid off from WBBM. In Boston, the renowned sports anchor Bob Lobel was let go by WBZ. In Houston, the 26-year veteran Carolyn Campbell was dismissed from KHOU.

When the anchors depart, they take decades of experience and insight with them. “Basically, you replace someone who knows City Hall with someone who can’t find it,” said John Beard, who lost his job at KTTV last December after 26 years as a news anchor in Los Angeles.

Almost all of the country’s 1,300 television stations with network affiliations have a face, or a pair of faces, that represent their news operations better than any logo or commercial can. Many years after signing off, the larger-than-life characters are still fixtures of newscast lore, like Bill Beutel in New York, Fahey Flynn in Chicago and Ann Bishop in Miami.

While some anchors in top markets can still command million-dollar salaries — like Chuck Scarborough and Sue Simmons on WNBC in New York — the positions are becoming more vulnerable to the market forces that are roiling local TV, analysts say.

“There is certainly an erosion of longtime anchors happening at many stations across the country, for a very simple reason: economics,” said Al Primo, a television news consultant who developed the “Eyewitness News” format in the 1960s and 1970s.

Mr. Primo says anchors’ salaries now seem “out of sync with the reality” of budgets. As stations record lower revenue, managers are trying to adjust anchor salaries accordingly.

“We’ve been aggressive in our cost controls,” said Peter Diaz, the executive vice president of the Belo Corporation, which instituted a companywide wage freeze at its 20 TV stations in mid-November. Although anchors have separate contracts, they have been asked to participate in the freeze, and many have agreed, he said.

Local TV, although it lacks the glamour of the network nightly news or the prestige of print newspapers, remains the most popular single source of news in the United States. Slightly more than half of the population watches local news regularly, according to the Pew Research Center for People and the Press, while only 34 percent read a newspaper each day and 29 percent watch a network evening newscast.

But the ratings for the broadcasts have gradually eroded over the years. The typical late newscast now reaches 12 percent of viewers watching TV in a given market, down from 21 percent 10 years ago.

The news departments are not alone in feeling the squeeze. Advertising is falling sharply, partly because of cutbacks in spending by automakers and car dealerships, which represent the single largest category of advertiser for broadcasters.

Until mid-November, a trade association for stations, the Television Bureau of Advertising, had expected total commercial revenue to be flat compared with 2007. It revised the forecast, however, and predicted a 7.1 percent decline. The group expects a 7 to 11 percent decrease in revenue next year. Already, the financial pressures are trickling down to newsrooms.

“The conditions are as bad as I’ve ever seen, and I’ve been on TV since 1980,” said Rich Rodriguez, who is 54 and has anchored newscasts for 20 years, most recently at KSEE in Fresno, Calif. He was laid off in October. When the station’s general manager asked him to take a 25 percent pay cut, Mr. Rodriguez refused. He was fired the same day his first grandchild was born.

“It’s scary for people over 50,” he said.

Many stations — and viewers — still place a premium on the gravitas that older anchors provide. But confronted by the era of always-available news and information on the Internet, local stations are being forced to rethink their mission.

On the Web, users can assemble their own newscast from an around-the-clock buffet of options, making anchors seem somewhat superfluous, especially to younger viewers. Perhaps as a result, station layoffs are in the news almost every day now, said Tom Petner, who edits the television industry newsletter ShopTalk.

“The industry is moving from star players to more of a team sport,” he said.

News is still a profit center for many local TV owners; it represents about 40 percent of an average station’s revenue. But as that revenue shrinks, local news operations have automated many of their technical operations and spread their staffs ever more thinly.

“There aren’t a lot of bodies left to cut, unless you scale back newscasts,” said Robert Papper, chairman of Hofstra University’s journalism department. After surveying 300 newsrooms last summer, Mr. Papper projected that about 360 local TV news jobs had been lost this year. (That represents only a small fraction of the thousands of journalists laid off by newspapers, though TV news operates with a much smaller base of employees.)

Mr. Papper says longtime anchors at top-rated stations in local markets are at little risk of being laid off. But “if I were a very highly paid anchor of a No. 3 station, I’d be really nervous,” he said.

Looking forward, Mr. Bjorkman, the Colorado newsman, says he doubts that many TV anchors will manage to stay in the same market for decades. He expects more mergers, consolidations and cost-cutting as local news grapples with competition online and on digital channels.

His last day in local TV will be Dec. 31. Presciently, Mr. Bjorkman, 57, started taking veterinary technician classes two years ago, acting on a decades-old dream of working with animals. While performing his veterinary internships, some residents have recognized Mr. Bjorkman as their local anchor, and a few have wondered whether he was working undercover on an investigative reporting assignment.

He has explained to them, this will be his new full-time assignment. He finished his course work in September, two weeks before he found out he would lose his anchor job. “I’m ready to reinvent myself,” he said.
http://www.nytimes.com/2008/12/01/bu.../01anchor.html





Who Needs a TV? I’m Watching on a Laptop
Laura M. Holson

I HAVE been compared to many things in my life; never, though, to Sasquatch.

But that is what Alan Wurtzel, president of research at NBC Universal, suggested when I told him I had gotten rid of my television set last year and started watching “30 Rock” and “CSI” on my laptop instead. “I hear about people like you,” he said, a hint of skepticism in his voice. “But the notion that people have forsaken watching cable and network television is an urban myth.”

Then he hissed what sounded vaguely like an insult.

“You probably read.”

Yes, I do enjoy The New Yorker or a John Irving novel from time to time. But just because I don’t have a television set doesn’t mean I don’t crave “Gossip Girl” and obsess over whether Serena will (finally!) get back together with Dan. It’s just that I don’t have a large television in my living room and a monthly payment to make to my cable company. I don’t need one: the major networks and many other broadcasters have made it easy to find their shows free online.

Most Americans still watch shows primarily on their televisions. I’ll concede that point to Mr. Wurtzel. But there is much to suggest that watching shows online is more than just a passing fancy. The Internet has proved to be an excellent promotional vehicle. NBC says 7 out of 10 viewers were spurred to watch some shows on television only after sampling them first online. At ABC, 8 percent of viewers they track — or about one out of every 12 people — watch network shows solely online.

Consider the following. My friend Louise uses a projector hooked up to her laptop to watch “Lost” on a white wall in her living room. My 24-year-old niece never owned a television set until I gave her mine. Now she uses it for DVDs and watches “America’s Next Top Model” online. And it’s not just for the cosmotini set. A 40-something executive I know watched the last presidential debate between John McCain and Barack Obama on his home computer.

Of course, my house wasn’t always television free. When I lived in Los Angeles, I had cable but was rarely home to catch my favorite shows. I paid extra for HBO but only to watch “Entourage.” Unlike other friends, I never subscribed to TiVo, knowing I would feel guilty if I let shows stack up.

The funny thing is, despite not having a television, I actually watch more network programming than I did when I had cable. The difference is that I am more selective. No more flipping channels just to see what’s on, the television equivalent of a one-night stand. Instead I am in a committed relationship.

For network television shows the best places to start are their home Web sites, including ABC.com, NBC.com, CBS.com and Fox.com, where shows are posted usually within 24 hours of being shown on television. ABC.com, in my experience, is one of the simplest to use. It was a pioneer in putting shows online, although stingy in the early days because it didn’t want to share its toys with other sites.

ABC.com also demands viewers be engaged, requiring them to click a button to continue watching the program after an ad ends. It is a deceptively smart strategy: I was forced to sit through a 30-second commercial — and click — to find out whether Mike Delfino actually died from smoke inhalation on “Desperate Housewives.” It’s only 30 seconds I figured (and I can watch the countdown) which kept me in my seat.

To save time, I usually stay away from sites like Veoh.com, Joost.com, Bebo.com or AOL. Quite simply, there is little there to entice me. Each has a similar syndicate of already-released movies and television shows, and can be confusing if you are not sure what to look for. The exception is Sling.com, which offers much of the same content, but with a more user-friendly setup.

Of course there is a plethora of sites with pirated content, but I don’t go to those because I don’t want to get busted.

Recently I was talking with Quincy Smith, the president of CBS Interactive, who wanted me to visit the CBS channel on YouTube. But it was so cumbersome to find that Mr. Smith had to guide me on the phone as I sat in front of my laptop. MGM plans to offer movies there, too, but the list is not comprehensive.

The one standout is Hulu.com, a joint venture of NBC and Fox. It is well organized and simple to use. (Even Mr. Smith called it “the gold standard.”) It not only has current shows like “The Office,” “The Simpsons,” “24,” and “Heroes,” but a trove of classics like the original “Battlestar Galactica,” “Married With Children” and “The Mary Tyler Moore Show.”

The site, too, like others, has cable shows including the quirky “It’s Always Sunny in Philadelphia” and “The Daily Show With Jon Stewart.” Quite honestly, I never watched “The Daily Show” when I owned a television; I discovered it on Hulu. I can almost say the same for “Saturday Night Live,” which I gave up watching in the 1990s. During election season, though, I eagerly checked Hulu for both shows to see what I might have missed.

Of course, it wouldn’t be television without a blooper or two. So many online “Gossip Girl” fans showed up to watch last season’s shows, they threatened to crash cwtv.com. As a result the CW banned the show online, hoping viewers instead would watch it on their televisions. Fans protested, though, and the show reappeared online, much to my delight and that of my 14-year-old neighbor who agrees that Jenny Humphrey’s new model friend, Agnes, is a bad influence.

Then there’s iTunes. Apple’s media store has been selling TV shows for three years now, and buying is easy to do. The problem I have with iTunes is that you have to pay for the shows in order to watch them. With so many legal ways to get shows free, there’s little incentive for me to pay unless it’s something I can’t stream, like “Mad Men” or “Entourage.” And yes, while a series like “Lost” may require multiple viewings to fully appreciate them, do I really need to own episodes of “Two and a Half Men”?

Movies, too, pose a problem for entertainment companies who might want to put them on their sites. On Hulu and others, there are a number free — “Ordinary People” and “Men in Black” among them — but none are current.

“That’s a whole different business for us,” said Albert Cheng, a digital media executive at ABC. “We are still trying to figure out if there is a movie audience.” I am a dinosaur in this regard, so buying a $10 DVD at the Virgin Megastore and playing it on my computer works fine until downloading or streaming movies becomes easier.

While watching shows online works for me, I know it is not for everyone. Shows don’t appear until the next day, a deal killer for the truly obsessed. And it is hard to find live sports events (or delayed for that matter) online, particularly if it is a big game.

Besides, movies and sports events have more appeal when viewed on a large screen — that’s what big-screen TV is made for. No one is going to mistake their 13-inch laptop screen for a 50-inch high-definition plasma. I recently watched David Lean’s eye candy “Lawrence of Arabia” on Hulu and ached to experience it on my brother-in-law’s home theater in his den.

Speaking of him, I asked him recently if he would ever watch his beloved San Francisco 49ers football team, or any show for that matter, on a magazine-size laptop. He looked at me, incredulous. “Are you serious?” he asked. “Does anybody really do that?”

Mr. Wurtzel is probably smiling.
http://www.nytimes.com/2008/12/04/te.../04basics.html





Viacom and NBC Universal Are Latest to Trim Jobs
Tim Arango and Brian Stelter

The downturn in the media industry got even deeper Thursday, as more than 1,000 people who work at Viacom and NBC Universal lost their jobs.

Viacom, the big media company controlled by Sumner M. Redstone, said Thursday that it would cut nearly 7 percent of its work force, or 850 jobs, and freeze salaries for its top managers. NBC Universal, meanwhile, said it was laying off 500 employees, including several longtime correspondents for NBC News.

Viacom’s cuts are intended to save $200 million to $250 million in 2009. The cuts at NBC are a result of the company’s plan, announced in October, to shave $500 million, or roughly 3 percent, from the budget in 2009.

“This kind of message is never easy, but it is the right step to make, and the right time to make it,” Jeffrey A. Zucker, chief executive of NBC Universal, wrote in a memo in October. “We have no choice but to respond quickly to the external economic forces that are affecting the entire world economy.”

The cuts at Viacom and NBC Universal, which is owned by the General Electric Company, are part of a swirl of cost reductions across the media industry, from magazines to newspapers to television, amid both the economic downturn and more fundamental shifts, as advertising flows from traditional media to the Internet.

Executives at the Walt Disney Company, the News Corporation and the CBS Corporation have all said they are eyeing cost savings.

Most employees who are losing their jobs at Viacom, which includes MTV, VH1 and the Paramount movie studio, were notified Thursday, but they will be paid for the rest of the year before severance payments begin, a Viacom spokesman said.

At NBC, the cuts included correspondents from NBC News, among them Mark Mullen, who served as the Beijing bureau chief during the Summer Olympics; the “Dateline NBC” West Coast correspondent John Larson; and the Dallas-based correspondent Don Teague.

At Universal Studios, the chairman, Marc Shmuger, and the co-chairman, David Linde, wrote in a memo that the head count would be reduced by about 3 percent. Additionally, the studios will be “scaling back on travel, overtime, consultants, premieres, conferences, newspaper marketing and general administrative costs,” they wrote.

In a memorandum sent Thursday morning to employees, Philippe P. Dauman, Viacom’s president and chief executive, and Thomas E. Dooley, the chief financial officer, wrote: “Saying goodbye to friends and colleagues is always difficult, particularly when we have shared so much. Those of you who will be leaving should be proud of your contributions, which we will always respect and appreciate.”

Viacom said it would take a pretax charge of $400 million to $450 million to its fourth-quarter earnings.

In a statement Thursday morning, Mr. Dauman said, “We are moving rapidly to adapt to the challenges presented by the current economic environment. The changes we are making in our organization and process will better position Viacom to navigate the economic slowdown and generate sizable efficiencies that will help us to drive our businesses as the marketplace stabilizes and conditions improve.

Mr. Dauman and Mr. Dooley are among the more than 1,000 senior managers who will not receive a salary increase in 2009. But they could still receive a bonus, which has been a larger part of their compensation. In 2007, Mr. Dauman received a salary of $2 million, which was raised to $2.5 million this year. His bonus last year was $7 million, and his target bonus for 2008, according to a regulatory filing, is $9.5 million.

Mr. Dooley, who is also among the handful of executives whose salaries are disclosed, received $1.6 million in salary in 2007, which was raised to $2 million in 2008. His bonus last year was $5.6 million, and his target bonus for 2008 is $7.6 million.

In a research note about Viacom published Thursday, Michael Nathanson, an analyst at Sanford C. Bernstein, said “the near-term advertising environment is fraught with risk in this weak macroeconomic environment and the company has repeatedly proven in the past six months that it has relatively little visibility into near-term advertising trends.”

The cuts at NBC extended to CNBC, the business news network, which will cut several dozen positions, according to an employee who requested anonymity to speak about the employment status of colleagues.

CNBC confirmed Thursday that “The Big Idea,” hosted by the advertising guru Donny Deutsch at 10 p.m., will be placed on hiatus. The program has struggled to find an audience for the last four years. Mr. Deutsch will remain at CNBC, where he will produce monthly specials and appear on programs like NBC’s “Today” show, a spokesman said.

In a move also related to cost pressures, CNBC’s vice president for long-form programming, Josh Howard, told employees on Wednesday that he was leaving. “Producing quality long-form programming is an expensive undertaking, and in this economic environment not all news organizations can continue to afford to do it,” Mr. Howard said in an e-mail message to staff members.
http://www.nytimes.com/2008/12/05/bu...05layoffs.html





U.S. Media Thrive Worldwide, But Not U.S. Image
Tim Arango

Shortly after the attacks on 9/11, a delegation of high-level media executives, including the heads of every major studio, met several times with White House officials, including at least once with President Bush’s former top strategist, Karl Rove, to discuss ways that the entertainment industry could play a part in improving the image of the United States overseas.

One of the central ideas was using “soft power” by spreading American television and movies to foreign audiences, especially in the Muslim world, to help sway public opinion.

There were few tangible results from the meetings — lesser ways of supporting the war on terrorism like public service announcements and packages of free DVDs sent to American soldiers.

But since then, the media companies have gotten what they wanted, even if the White House has not. In the last eight years, American pop culture, already popular, has boomed around the globe while opinions of America itself have soured.

The television program “CSI” is now more popular in France than in the United States. Hollywood movies routinely sell far more tickets overseas than at home. A Russian remake of the TV show “Married With Children” has been so popular that Sony, the producer of the show, has hired back the original writers to produce new scripts for Russia. Even in the Muslim world, American pop culture has spread.

But so far, cultural popularity has not translated into new friends. The latest data from the Pew Global Attitudes Project, released in June, shows that the image of the United States remained negative in the 24 countries in which Pew conducted surveys (although in 10 of those the favorability rating of the United States edged up slightly).

Joseph S. Nye Jr., the Harvard professor who coined the phrase “soft power” in 1989 to refer to the ways beyond military muscle that America influences the world, said that “what’s interesting about the last eight years is that polls show a decline in American attractiveness.”

He added: “But then you ask the follow-up questions and you see that American culture remains attractive, that American values remain attractive. Which is the opposite of what the president has said — that they hate us for who we are and what we believe in.”

Jeffrey Schlesinger, the head of international television at Warner Brothers, had a simpler explanation for the popularity of American entertainment.

“Batman is Batman, regardless of if Bush is in the White House or not,” he said.

And Batman will still be Batman with Barack Obama in the White House. The issue of America’s image abroad was a campaign platform for the president-elect, who said in a foreign policy speech in April, “We all know that these are not the best of times for America’s reputation in the world.”

With the curtain closing on the Bush presidency, pollsters are left to wonder about the long-term effects on America’s standing. Steven Kull, the director of the Program on International Policy Attitudes at the University of Maryland, said that before the election, his data suggested a slight improvement in America’s image abroad after a long decline. “It’s turned a corner, but it’s not anywhere near positive territory,” he said.

Mr. Kull says he was surprised to find that in pre-election polling, less than half of those polled in 22 foreign countries — 46 percent — said relations between the United States and the world would improve under a President Obama.

“It’s not just about not being Bush, and that there will be a clean slate,” Mr. Kull said. “There were all these underlying issues that were amplified during the Bush era, and they are not simply going to go back in the trunk.”

Bryce Zabel, a television producer who was chairman of the Academy of Television Arts and Sciences at the time and a participant in the 2001 meetings with the White House, argued then that the United States needed to regard itself like a consumer brand.

“Products like Coca-Cola are far more effectively branded around the globe than the United States itself,” he wrote in a memo that was circulated around Hollywood. “The American entertainment and communications industry has the technological and creative expertise to improve relations between our country and the rest of the world.”

Hilary Rosen, the former chairwoman of the Recording Industry Association of America, who was also present at the post-9/11 meetings, said that Mr. Rove and other White House officials were looking for the kind of support Hollywood gave the United States during World War II.

“They wanted the music industry, the movie industry, the TV industry to produce propaganda,” she said. “Rove was putting a lot of pressure on us.”

For Hollywood, a much more important development was happening globally, as rising standards of living around the world resulted in more money spent on entertainment. Big, comfortable multiplexes being erected in countries like Russia and Mexico were helping draw moviegoers.

In 2003, the domestic box office brought in $9.2 billion for American studios, and foreign countries generated $10.9 billion, according to the Motion Picture Association of America. In 2007, domestic was $9.6 billion, while international rose to more than $17 billion.

The growth overseas has surprised even some American media executives. “It was something that, two or three years ago, was thought to have gone into a slower growth position,” Jeffrey L. Bewkes, Time Warner’s chief executive, said to a gathering of investors in June about the international appeal of American television. “And then it came roaring back over the last couple of years.”

The foreign interest in American entertainment has been particularly pronounced in television. In many countries, particularly in Europe, American television shows, once relegated to late night, are being shown in prime time.

“Let’s say, at the beginning of the decade, more or less all over Europe you saw on the big channels almost no U.S. series on prime time,” says Gerhard Zeiler, the chief executive of the RTL Group, Europe’s largest television broadcaster. “Now, all over Europe you have a lot of American series in prime time.”

According to the European Audiovisual Observatory, part of the executive branch of the European Union, the number of hours of American programming on major European networks in 2000 was about 214,000. In 2006, the most recent year for which statistics are available, that figure grew by nearly 50,000 hours, to more than 266,000 hours.

“Increasingly a lot of that money is coming from television,” said Barry M. Meyer, chairman and chief executive of Warner Brothers. “The demand for American-produced television shows is stronger than it has ever been.”

American culture is blossoming even in the Middle East, where polls consistently show starkly negative views of the United States. Viacom started MTV Arabia last fall and introduced Nickelodeon Arabia in July on satellite services — endeavors that entail lessons in cultural sensitivity.

Much of America’s programming is beamed to Middle Eastern audiences from two satellite channels, MBC2 and MBC4, owned by the Saudi-financed Middle East Broadcasting Center. In prime time recently on MBC4 was “8 Simple Rules,” the ABC sitcom that starred the late John Ritter, and the gossip shows “The Insider” and “Inside Edition.” Oprah Winfrey’s show is also popular.

Amahl Bishara, an assistant professor of anthropology at Tufts University who recently spent two years in the West Bank studying the media there, said she noticed that MBC2, which carries American movies, was particularly popular.

“There’s an acute understanding of the difference between the U.S. government and the American people,” she said. “And they look at U.S. entertainment as just that, entertainment.”
http://www.nytimes.com/2008/12/01/bu...ia/01soft.html





"Four Christmases" Ends Bond's UK Box Office Reign

James Bond's month-long dominance of the UK box office came to an end over the weekend as seasonal comedy "Four Christmases" took over the No. 1 spot.

The story of a San Francisco couple forced to visit their in-laws over the festive season, starring Reese Witherspoon and Vince Vaughn, took 2.3 million pounds ($3.44 million) on its opening three days, according to Screen International on Tuesday.

The record-breaking "Quantum of Solace," with Daniel Craig in his second outing as 007, slipped to second place, adding 1.5 million for a 5-week British total of 47.6 million pounds.

Clint Eastwood's new film "Changeling," a tale of corruption and deceit in 1928 Los Angeles, was new at three while espionage drama "Body of Lies" with Leonardo DiCaprio and Russell Crowe slipped two places to fourth.

"My Best Friend's Girl," with Kate Hudson, Jason Biggs and Dane Cook in a love-triangle comedy was down at five from three.

Also falling two places, to sixth, was "High School Musical 3: Senior Year," while comedy newcomer "What Just Happened" came in at seven with Robert de Niro and Bruce Willis laying bare the off-screen horrors of Hollywood.

"Zack and Miri Make a Porno" slipped three places to eight while zombie-rich horror thriller "Quarantine" was down one at nine.

The week's biggest faller, down from six to 10, was video game spin-off "Max Payne."

(Editing by Paul Casciato)

($1=.6692 Pound)
http://www.reuters.com/article/james...4B15ZS20081202





Recession-Hit Americans Flocking to Movies
Sue Zeidler

True to form and in keeping with past recessions, Americans are flocking to the movies, the chief executive of the largest U.S. theater chain said on Wednesday.

"We're approximately two-thirds of the way through the quarter, and we are having a very good fourth quarter this year compared to last year as an industry," Regal Entertainment Group's CEO Mike Campbell told Reuters.

Movie theaters are seeing double-digit growth in box office revenue and high single-digit growth in attendance so far this quarter on the appeal of films like "Twilight," "Madagascar: Escape 2 Africa," and "Bolt," according to Campbell.

He said the movie industry has done well during all the recessions in the past 50 years. "It is still the most affordable out of home entertainment option," he said.

Regal owns 549 theaters operating 6,754 screens and competes with Sumner Redstone's privately held National Amusements.

National Amusements is facing a debt squeeze, and analysts have said it would make sense for Redstone to sell the chain to raise money. They value the chain at about $500 million to $700 million.

Asked if Regal would want to buy National Amusements, Campbell said their domestic theater assets would be a good fit with its business, and his company would look at the assets if they went up for sale.

But he added that Regal would have to tap capital markets to finance a deal, and limited access to credit in the current environment would make any acquisition difficult.

(Additional reporting by Jui Chakravorty Das and Gina Keating, editing by Tiffany Wu)
http://www.reuters.com/article/oddly...4B35W220081204





Got Their Musical Mojo Working
A. O. Scott

In “Cadillac Records,” Darnell Martin’s rollicking and insightful celebration of Chicago blues in its hectic golden age, Jeffrey Wright plays the singer and guitarist Muddy Waters. This feat is made even more impressive and interesting when you reflect that in the same movie season Mr. Wright has portrayed another notable real-life African-American, the former Secretary of State Colin L. Powell, in Oliver Stone’s “W.” The man is equally credible as a statesman and a bluesman. If that’s not range, what is?
Much more than racial typecasting or clever mimicry is at work in these performances. Mr. Wright can hardly be said to bear a strong physical resemblance to Muddy Waters or Mr. Powell — or, for that matter, to the Rev. Dr. Martin Luther King Jr., whom he played in the HBO film “Boycott,” or to the painter Jean-Michel Basquiat, so brilliantly impersonated in “Basquiat.”

Rather, Mr. Wright, as protean and serious an actor as any working in American movies, seems to be writing his own version of “Thirteen Ways of Looking at a Black Man,” the literary scholar Henry Louis Gates Jr.’s collection of essays on various styles of African-American manhood.

In each case, whether playing a former soldier or a tormented artist, Mr. Wright directs our attention away from the familiar, public face of the character in question toward a private zone where ambition struggles with anxiety, and where what seems to be at stake is nothing less than the integrity and viability of the self. And so, in his Muddy Waters, we see pride, ambition and uncertainty cohabiting with musical genius, sexual appetite and stubborn professionalism.

“Cadillac Records” is by no means Mr. Wright’s film alone, and his work is enriched by the skill and verve of a prodigious ensemble. The film is not — thank goodness — another dutiful musical biopic, but rather the group portrait of a remarkable, volatile constellation of artists, including Little Walter (Columbus Short), Chuck Berry (Mos Def), Etta James (Beyoncé Knowles), Howlin’ Wolf (Eamonn Walker) and Willie Dixon, the bassist and songwriter who narrates in the mellow, countrified voice of Cedric the Entertainer.

These musical innovators are gathered together — promoted, exploited and given shiny new Caddies with heavy strings attached — by Leonard Chess (Adrien Brody), a Jewish entrepreneur in postwar Chicago who sees “race music” as a potential gold mine. That it also turns out to be an agent of wholesale cultural transformation — an old song observes that the blues had a baby, and they called it rock ’n’ roll — does not faze him in the least.

Few subjects are as encrusted with legend, hyperbole and sheer bunk as the history of American popular music, and there will no doubt be pedants who will object to some of the liberties “Cadillac Records” has taken with the literal truth. At times Leonard Chess seems so stressed out by running the record company bearing his name that you wish he had, say, a brother to share the burden. The real Leonard Chess did, but for now Phil Chess will have to join Nesuhi Ertegun, brother of Ahmet, in the ranks of music industry siblings neglected by Hollywood.

In any case, Ms. Martin, who wrote as well as directed “Cadillac Records,” does not need to lean too heavily on the historical record, or on the dreary conventions of pop-culture hagiography, because she has a clear and complicated set of ideas about her characters and a deep appreciation of the music they made. It is, sadly, all too rare for a movie about important musicians to pay intelligent attention to the sounds and idioms that make their lives worth dramatizing in the first place.

But in “Cadillac Records” you hear most of the important advances and developments that defined urban blues in the 1940s and ’50s. When Muddy Waters, newly arrived in Chicago from Mississippi, plugs his guitar into an amplifier, a new sonic mutation occurs. Then Chuck Berry comes along, playing in a speedier, country-inflected style that makes him the first major star to cross from the R&B to the pop charts.

“Cadillac Records” would be worth seeing for the music alone. Mr. Wright’s renditions of Muddy Waters’s signature songs are more than respectable, while Ms. Knowles’s interpretations of Ms. James’s hits — “At Last” and “I’d Rather Go Blind,” in particular — are downright revelatory.

And so, it should be said, is Ms. Knowles’s performance. In her previous film roles she has seemed guarded and tentative, as if worried that her charisma would melt from too much emotional heat. Here, playing a needy, angry, ferociously talented and fantastically undisciplined woman, she is as volcanic and voluptuous as an Italian movie star. Or, more to the point, a real soul diva of the old school.

The music is also a window into history, and “Cadillac Records” is an uncommonly astute treatment of race in America at the end of the Jim Crow era. Its dense, anecdotal narrative is built around the sometimes uneasy friendship between Leonard Chess and Muddy Waters, his first big star. Chess is devoted to his artists, but he also profits from their art, and Mr. Brody shows him to be neither a paragon of racial enlightenment nor a predator.

“His job is to make money off you,” Howlin’ Wolf says to Muddy Waters, who is hurt by what he sees as Chess’s double-dealing. “You’re from Mississippi. I thought you would have known that.”

The rivalry between those two bluesmen is another source of intrigue in “Cadillac Records,” which sustains a remarkable number of dramatically important relationships, any one of which could have been a movie in its own right. Muddy Waters is also a mentor to Little Walter — a troubled, reckless, brilliant harmonica player — and a steadfast (if unfaithful) husband to Geneva (Gabrielle Union). Chess, meanwhile, though he is married (his wife, Revetta, is played by Emmanuelle Chriqui) is nearly undone by his passion for Etta James.

So much passion, so much pain, so much tenderness and violence. If you dig up an album from the heyday of Chess Records, you’ll find all that and more. And “Cadillac Records” is nearly as good as one of those albums, which is saying a lot. This movie is crowded and sprawling, and if it rambles sometimes, that’s just fine. Like those big, boxy Caddies (and like Howlin’ Wolf, if he did say so himself), it’s built for comfort, not for speed. It hums, it purrs and it roars.

“Cadillac Records” is rated R (Under 17 requires accompanying parent or adult guardian). It has smoking, swearing, sex and mayhem in excess, which is just the right amount.

CADILLAC RECORDS

Opens on Friday nationwide.

Written and directed by Darnell Martin; director of photography, Anastas Michos; edited by Peter C. Frank; music by Terence Blanchard; production designer, Linda Burton; produced by Andrew Lack and Sofia Sondervan; released by TriStar Pictures. Running time: 1 hour 48 minutes.

WITH: Adrien Brody (Leonard Chess), Jeffrey Wright (Muddy Waters), Gabrielle Union (Geneva Wade), Columbus Short (Little Walter), Cedric the Entertainer (Willie Dixon), Emmanuelle Chriqui (Revetta Chess), Eamonn Walker (Howlin’ Wolf), Eric Bogosian (Alan Freed), Mos Def (Chuck Berry) and Beyoncé Knowles (Etta James).
http://movies.nytimes.com/2008/12/05/movies/05cadi.html





New DVDs: Douglas Fairbanks
Dave Kehr

In 1940 the fledgling Film Library of the Museum of Modern Art published the first two volumes in what was meant to be a series of monographs on film history: a study of the director D. W. Griffith, written by the library’s founding curator, Iris Barry, and an appreciation of the actor Douglas Fairbanks, written by the British journalist Alistair Cooke.

It’s no coincidence that MoMA chose to begin its version of film history with these two figures: if Griffith was the first modern filmmaker, then Fairbanks was a plausible candidate as the first modern movie star. With his boundless energy and incandescent smile, Fairbanks counts among the earliest major performers to emerge, not from the one- and two-reel films that had been the norm in the nickelodeon days, but from the feature-length film as it began to develop around 1912.

From the vantage point of the 21st century, we may find it hard to identify with nickelodeon stars like Dustin Farnum and Francis X. Bushman. Their personalities seem remote and restricted, their gestures too broad and too big, the emotions they express too heavy and pious, still smothered in Victorian values. But in Fairbanks we recognize a contemporary: a bright, open-faced young man who moves quickly and naturally, who lives in a world of speed and mass communication that is recognizably our own, who aspires not to the tragic martyrdom of the Victorians but to immediate pleasures and ordinary happiness.

This is the performer whose development is traced in “Douglas Fairbanks: A Modern Musketeer,” an extraordinary, well-produced set of 10 features and one short film that arrives on Tuesday from Flicker Alley. These aren’t the more familiar costume epics from Fairbanks’s later career — several of which have been issued in fine editions by Kino International — but rather the modern-day comedies that first established his screen personality.

In “His Picture in the Papers,” the earliest (1916) film in this collection, Fairbanks plays Pete Prindle, the mildly rebellious son of a Kellogg-like health-food magnate. Pete hopes to get some publicity for his father’s appallingly bland product line by performing a stunt — any stunt — that will get the family name mentioned in the New York press.

The film still has the frantic pace and slapstick humor of a two-reel comedy, but Fairbanks is already taking advantage of the extended feature format (in this edition, the movie runs 62 minutes) to develop his personality in asides that have no direct bearing on the plot. When he goes to visit his fiancée, he’s so eager to get to her second-story apartment that he climbs right up the front of her building, an early manifestation of a careerlong aversion to taking the stairs.

For Fairbanks, a dedicated amateur gymnast, such moments of physical exuberance came naturally. On “His Picture” he was teamed for the first time with the director John Emerson and the screenwriter Anita Loos (the future author of “Gentlemen Prefer Blondes”), and their collaboration extended through eight more films, three of which are included here: “The Mystery of the Leaping Fish,” a bizarre short with Fairbanks as a drug-addled detective named Coke Ennyday; the western comedy “Wild and Woolly”; and the Ruritanian adventure “Reaching for the Moon.”

Working with Emerson and Loos, Fairbanks (who contributed substantially to his own scripts, often under the pseudonym Elton Thomas) elaborated the character audiences came to call “Doug”: an energetic striver, of middle- or upper-middle-class origins, whose romantic notions and passionate enthusiasms (for the cowboy life in “Wild and Woolly,” or a fantasy of royal origins in “Reaching”) are first presented as comic but ultimately allow him to save the day.

This pattern reaches one of its high points in “A Modern Musketeer,” a 1917 feature that was one of 11 films Fairbanks made with Allan Dwan, the great master of early film form. Long available only in an incomplete print, the movie was restored in 2006 with footage found by the Danish Film Institute and makes its first appearance on DVD with this set.

In it Fairbanks plays a Kansas go-getter whose obsession with Alexandre Dumas drives him to ever more preposterous acts of romantic gallantry. In the end he is able to unleash his inner swashbuckler when, during a visit to the Grand Canyon, he is called on to rescue a young woman (Marjorie Daw) from the clutches of an outlaw gang.

Dwan’s early command of match-cut editing — the apparently seamless presentation of action across a series of shots — is shown off to tremendous advantage here: Fairbanks seems to cut through space like an arrow in flight, a pure line of strength and beauty.

“A Modern Musketeer” begins with a winking prologue in which Fairbanks presents himself in full costume as D’Artagnan, tugging at his false mustache and adjusting his wig to assure his audience that Doug could indeed be found somewhere beneath the shrubbery. Fairbanks was testing the waters for what would be the next development in his career, the transition to period adventure films that began with “The Mark of Zorro” in 1920.

With “Zorro,” Fairbanks inverted his successful formula. No longer was he an ordinary individual who dreamed of being a hero, but a hero (Zorro, the masked scourge of corrupt officials in Colonial California) who disguised himself as an average guy (Don Diego, the foppish son of a landowner). The reversal, of course, only made the fantasy seem more potent: “Zorro” began a line of superheroes with secret identities that remains very much (perhaps too much) with us today.

The Flicker Alley set offers “Zorro” in a glisteningly sharp print made from a source close to the camera negative, and the other titles in the box have been mastered with consummate care, even when the source material is not perfect. The movies are presented with period-accurate color tinting and accompanied by appropriate scores performed by some of the leading figures in silent-film music, including Philip Carli, Robert Israel and Rodney Sauer, the leader of the Mont Alto Motion Picture Orchestra.

A 32-page booklet offers an essay by Jeffrey Vance and Tony Maietta, the authors of “Douglas Fairbanks,” a new pictorial biography that the University of California Press is releasing next week. This one’s a keeper. (Flicker Alley, $89.99, not rated.)
http://www.nytimes.com/2008/12/02/mo...eo/02dvds.html





Five Best CD and DVD Burning Tools
Adam Pash

The internet has made it easier than ever to share media and data with friends, family, and co-workers, but that doesn't mean burning your own CDs and DVDs is a thing of the past. Blank optical discs are dirt cheap, they work virtually everywhere, and if you bought your computer sometime in the last 5 years, chances are you've got the necessary hardware to quickly burn anything you want to a disc in just a few minutes. Now all you need is the right authoring tools. Earlier this week we asked you to share your favorite CD and DVD burning tools, and today we're back with the five most popular answers. Keep reading for a closer look at your favorites, then cast a vote for the burning tool you like best.

InfraRecorder (Windows)

InfraRecorder is a free, open-source CD and DVD burning application for Windows. InfraRecorder covers almost any of your optical needs, including support for burning disc images, copying discs, creating quick audio CDs, writing video DVDs, erasing discs, and more. InfraRecorder is lightweight and decidedly bloat-free, and it's even available as a portable app you can carry on your thumb drive to satisfy your burning needs no matter where you are.

ImgBurn (Windows/Linux)

ImgBurn is a free CD and DVD Swiss Army knife for Windows (it also runs on Linux under Wine). ImgBurn can write data from a variety of formats, burns audio CDs, ISOs, and video DVDs, including regular DVD, HD DVD, and Blu-ray DVD. As an added bonus, ImgBurn can read a disc to an image on your hard drive and build a disc image from files on your computer. It's fast, easy to use, and doesn't cost a penny. Incidentally, this app is still actively developed by the same developer who built the once very popular DVD Decrypter.

K3b (Linux)

K3b (which stands for KDE Burn Baby Burn) is an open-source burning application for Linux. Like the rest, K3b supports common tasks like burning audio CDs, data discs, disc images and disc copying. For movie lovers, K3b can even rip your DVDs to your hard drive in either of the popular DivX or Xvid formats. If you're running Linux, K3b is easily one of the most popular options for burning anything to your optical discs.

CDBurnerXP (Windows)

CDBurnerXP is a free authoring software for Windows. Despite its name, CDBurnerXP works with Windows Vista, 2000, 2003 Server, and XP; it also burns to CD and DVD, including HD and Blu-ray. It's got a small footprint, and like most of the other options, burns data discs, audio CDs, and ISOs without a hitch. CDBurnerXP is light, fast, and free, requires .NET 3.5.

Nero (Windows/Linux)

Nero 9 is a shareware optical media authoring tool for Windows that's long been the go-to favorite for robust, user-friendly CD and DVD burning for a price. Detractors complain that Nero is slow and bloated (and the 370MB download, 2GB free space requirement, and long install time doesn't inspire confidence to the contrary), but fans argue that you can install only what you need from Nero and that its simplicity more than makes up for the bloat. Nero 9 is an $80 shareware, Windows only, requires .NET 3.0. Linux users can give Nero Linux a go for $25.

This week's honorable mentions go out to Windows-only applications BurnAware Free (original post) and Ashampoo (original post), followed by Linux-only Brasero (the Gnome counterpart to the KDE-focused K3b) and Mac OS X-only Toast. Whether or not the CD or DVD authoring tool that's the apple of your eye made the short list, let's hear more about it in the comments.
http://lifehacker.com/5100069/five-b...-burning-tools





Ars Ultimate Home Theater PC Guide: 1080p HDMI Edition
Brian Won

A PC in your entertainment center

TiVo and its brethren get credit for introducing the average consumer to the concept of the digital video recorder (DVR) and opening the door to bigger and better things. The Home Theater PC (HTPC) is the computer enthusiast's answer to all the things that a DVR generally does, with the potential to do everything a full-fledged computer does. The concept had a bit of a slow start until Microsoft's release of Windows XP Media Center Edition (MCE) 2005, which gave the very familiar Windows a living room interface and the hardware support that HTPCs needed.

No matter what operating system you use for your HTPC, the same general concepts exist: recording and time-shifting TV are the device's most basic functions; playback and recording of DVD and Blu-ray are secondary but (perhaps) no less critical, followed by distribution of audio content and, in more ambitious setups, serving up digital media in its capacity as the whole home network's media storage center. And don't forget the ability to do mundane things like browsing the web from ten feet away on a shiny new 1080p HDTV.

The newest evolution in the HTPC is the continuing development of HDMI (High Definition Multimedia Interface). HDMI allows a protected connection that carries both audio and video over a single cable, and in the current version, 1.3a, HDMI is finally established enough that it now just works. . . most of the time. When the last update was published, HDMI for content-protected video was working fairly well in the HTPC arena, but HDMI for content-protected audio was not yet working very well. That has changed in the past few months, as AMD, NVIDIA, and Intel have all made substantial improvements in getting full-blown HDMI working. Things are now solid enough to make HDMI a vital part of the HD-capable HTPC.

It has been over three and a half years since the HTPC has gone mainstream. Today, the HTPC front-end is fairly well established, with a slick interface and a compact, living-room-friendly form factor, and it's reliable enough that you rarely notice it's there. Toss in working HDMI for both audio/video signals, and it's possible to fit an HTPC in your entertainment center with even fewer cables strewn about than ever before.

Going beyond the DVR

Though it has made great strides in the past few years, the HTPC is still fundamentally a geek endeavor. An off-the-shelf DVR is almost certainly going to be cheaper, use less power, and be easier to setup than an HTPC. Using an Xbox 360, PS3, AppleTV, or something else as a Media Center Extender to get content to your TV will also be cheaper (and probably easier). If you can skip recording and just playback recorded content, the Western Digital WD TV is cheap and effective. As Mythtv.org points out, lots of solutions exist, almost all of them cheaper than building your own HTPC.

You get lots of potential for additional capability with an HTPC, capabilities like massive amounts of storage space: There's nothing stopping you from building an HTPC with a few terabytes of hard disk space, assuming you're willing to deal with the cost and power consumption. You won't find that in an off-the-shelf DVR. (Of course, with an off-the-shelf DVR, you can call technical support when it breaks; or, more appropriately, when your family's DVR breaks and they live 300 miles away, they can call tech support so you can continue watching The Office, uninterrupted.)

Have a standard-definition DVR already and want to go high-definition (HD)? Sure, it would be cheaper to buy an HD-capable DVR, but what if you want Blu-ray, too? A Sony PlayStation 3 might be able to do the Blu-ray part, but with only 80GB max, it's severely lacking in space. Hence, for those with needs desires beyond the average DVR user, the HTPC starts to make sense.

The fact that you can do it all in one box with an HTPC is the real reason for building one. The HTPC can handle DVR duties, HD playback, and even gaming (now that finding fast yet quiet video cards for 1920x1080 gaming is no longer the chore it once was).
Evolution in the HTPC: proper HDMI support

The biggest change since the last update is the ability to implement the fully protected content path in an HTPC necessary to play HD content (both audio and video).

On the video hardware side, HDCP (high-bandwidth digital content protection), AACS (Advanced Access Content System), and the other mechanisms for the Protected Video Path have worked for the last generation or two of computer hardware. To get full-resolution protected content output on your monitor or TV, both the video source (the video card in your HTPC) and the display (monitor/TV) must support HDCP. Today, most do.

To play protected audio has been a bit more difficult until very recently, as no current video or sound card (no matter which hardware it has) supports the Protected Audio Path needed to get compressed multichannel audio (Dolby TrueHD or DTS-HD MA) from your Blu-ray to your speakers via HDMI. The fix, as Anandtech and others discovered, is to let your HTPC decompress the multichannel audio, and send it over HDMI as uncompressed 8-channel LPCM. The hangup then became that hardware did not incorporate enough bandwidth to accommodate uncompressed 8-channel audio over HDMI, or if it did, the drivers or something else didn't work.

Redemption (or at least a workable fix) finally arrived in summer, 2008. AMD's Radeon HD 4000-series graphics cards, NVIDIA's GeForce 8200/8300 chipset, and Intel's G45 chipset all support 8-channel LPCM and actually work. Technically, Intel's G965 and G35 chipsets also support 8-channel LPCM, but the drivers never made it a pleasant experience.

ASUS's brand-new soundcard, the Xonar HDAV 1.3 would also work if you really needed to get an existing system with only video-over-HDMI to contain audio, but one look at the price of the Xonar HDAV 1.3 (almost $200), plus the thought of cramming another card into an already-crowded HTPC case, makes it a less than ideal solution for a new build.

Anandtech has considerable discussion on this in several recent articles, including one on 8-channel LPCM over HDMI and two more on chipsets with integrated video.

Three approaches to the HTPC

As a freshening of the last installment of our HTPC guide, the approach we take to the HTPC is unchanged. We focus on a three-box setup, all of which are equipped to deal with 1080p HD content. In a new twist for this update, we now focus on HDMI support for the entire content stream, both video and audio. This is actually fairly easy to do once you know what to buy, but that does mean a little preparation and research before breaking out the credit card.

To remind people, building an HTPC generally is not an inexpensive endeavor: we deliberately choose to go for a fairly powerful setup to emphasize the differences that might otherwise be blurred with an off-the-shelf HD DVR. A mid-range Athlon X2 and just about any off-the-shelf hard drive can handle a few HD streams in Linux without breaking a sweat, which is a significant improvement from where things were just three years ago.

Many people now have a Home Media Server (aka, the back-end in the last update) sitting in a study or closet somewhere with far more storage than most would want to stick in a little box in their A/V stack, and instead they use a very lightweight front-end HTPC. So there's no longer a single, do-it-all box sitting next to the TV in the most ambitious HTPC setups, and this means quite a few more areas of expansion that we can address.

This gives us three systems in the HTPC System Guide:
All-in-one HTPC: this is what most people traditionally think of as the classic HTPC: a single box that sits next to your TV and plugs neatly into your TV, network (wired or wireless), and antenna/cable. This normally has at least two tuners in it, so you can watch and time-shift content at the same time as you record something else in the background. It also has enough space for most of your video files, and probably your pictures, music, DVD ripping, and whatever else you need to do.

The other two HTPC options come in the form of a one-two punch:
Lightweight front-end: this sits by your TV like a traditional HTPC does, except it offloads the storage and heavy lifting to the back-end. It streams all of the content off of the back-end, so the front-end can be very compact, low power, and unobtrusive. No tuners, only minimal storage, for minimal footprint in more ways than one. In fact, a media center extender might work here for those willing to explore the option.
Back-end: in a two-part setup, this does the heavy lifting, containing the tuners and all of the media. Since it's out of the living room, it can be much bigger with significantly more emphasis on storage and performance, without costly burnt offerings at the altar of low-noise components. Cramming a stack of 1TB hard drives in a low-cost software RAID5 may be an exercise in overheating in the living-room-friendly chassis of an all-in-one box, but it's cake in most good quality conventional chassis.

These three options, taken together, represent the spectrum of HTPC in its late 2008 incarnation.

Software essentials

There are several good media center front-ends out right now. The most familiar package for many will be Windows Vista Home Premium, which includes Windows Media Center. The familiar Windows MCE interface on top of Windows itself means that the learning curve is essentially zero for most users. For the back-end, regular versions of Windows or the new Windows Home Server (WHS) are easy enough to use to store data, although WHS had a few initial bumps that left a modestly sour impression on early adopters.

MythTV is the next major front-end. It's in the process of being ported to Windows, but for now, consider it Linux-only. It has excellent front- and back-end support, and is fairly easy to setup. Hardware support is also pretty good, but like all Linux-based media center software, the lack of high-definition acceleration support from Intel (Clear Video), AMD (UVD), and NVIDIA (Pure Video) means that you have to use a considerably more powerful processor to play back HD than you do in Windows. Such acceleration under Linux is coming soon since the last update, but only AMD has made any serious headway so far.

If you want to explore the home media server concept without paying Microsoft for two different operating systems, though, MythTV is definitely worth considering. Numerous flavors of MythTV are available to fit your needs, too—KnoppMyth, MythBuntu, and more. In fact, MythTV is worth checking out even if you are already familiar with Windows.

Additional Windows-based front-ends exist, including Beyond TV and MediaPortal, but they don't yet have the penetration that Windows MCE does. The application is somewhat more evolved in terms of support for front-end/back-end and multiple drives, but our experience is somewhat limited with BeyondTV (and almost non-existent with MediaPortal) at the moment, so while we know it's capable, we're reluctant to pass judgment on just how capable.

SageTV supports both Windows and Linux, and it supports the front-end/back-end concept pretty well from what we've seen. Much like MythTV, getting the back-end and front-end talking to each other looks almost painless. It's hard for us to say much more than that; we liked what we saw, but haven't used it much.

Many other media center software packages exist—we've doubtless skipped a few—but these are some of the major ones for the PC. Less-popular ones include J. River Media Center, Freevo, GBPVR, and Orb. Front-ends such as XBMC and Apple's Front Row are somewhat beyond the scope of this article.

• Microsoft Windows Vista Home Premium. Cost: $92.99 (12/1/2008) [Comparison shop for this item]
• MythTV. Cost: free. [Product Page]
• BeyondTV. Cost: $99.99 (12/1/2008) [Product Page]
• SageTV. Cost: $79.95 (12/1/2008) [Product Page]

It's not about the Benjamins

As mentioned previously, you'll probably end up spending quite a bit more than what a plain ol' DVR would cost, even an HD-capable one. Maybe you'll be able to recycle a second system into something acceptable for the living room. You might decide that the HTPC concept stands on its own merit.

More than likely, though, building an HTPC will be an exercise in geek pride. Not just recording over-the-air HD or serving files to every computer in the house, but the ability to do it well and without compromise. Instead of being stuck with 500GB inside your DVR—maybe more with an external drive plugged in, cluttering the shelf—you have a few terabytes of storage available. If you elected to use software RAID in Linux or Windows, or the chipset RAID part of your motherboard, you gain some fault tolerance (good luck finding that in an off-the-shelf DVR).

Much like the Green System Guide, the HTPC doesn't boil down to saving money. Rather, it comes down to performance and capability: the knowledge that you can get things done exactly the way you want.

All-in-one system

The all-in-one HTPC does everything with a case that blends into your living room, be it a single box or one of many sitting on your home theater rack. It offers reasonable storage capacity, fairly decent performance, and ease of upgrading in several directions, such as adding a discrete high-performance video card for gaming or a quad-core CPU for heavy-duty encoding.

We do leave one important decision up to the builder, despite our constant harping about 1080p capability: Blu-ray. A BD-ROM drive is reasonably affordable, but most lack any writing ability whatsoever, even to CD-RW. Going to a Blu-ray writer is considerably more expensive, and we're not sure if it should be a mandatory component quite yet. Weigh the cost and benefits yourself, then make the call.
Motherboard
Zotac GF8300-A-E

We use the motherboard's onboard video and audio in the HTPC, which means we must be particularly careful in its selection if we want proper HDMI support.

In the previous update, AMD 780G-based boards were the choice, owing to superior video performance and a competitive feature-set. In the past six months, NVIDIA and Intel have released updated products in this area, with the NVIDIA GeForce 8200/8300/9300-chipset being the best choice at the moment. The key reason is NVIDIA's implementation of HDMI on the GeForce 8200/8300, which has proper uncompressed 8-channel LPCM output (which is particularly critical for Blu-ray discs). Intel's G45 chipset has proper support, but their implementation is not as good (1080p/24 output is/was broken), while AMD's integrated video chipsets are missing LPCM entirely at the moment.

Aside from 8-channel LPCM over HDMI, the motherboard is expected to provide enough connectivity for the rest of the system. Not all HTPC builders need all of the features most motherboards have, but enough memory slots, enough SATA ports, Firewire (particularly if your cable box supports Firewire out), S/PDIF out, decent fan control, and enough expansion slots are checkboxes on the list. If you're a Windows builder, you will be able to take advantage of the integrated graphics' hardware acceleration for HD video (AMD UVD, NVIDIA PureVideo, Intel Clear Video) on higher-end chipsets, which will let you get by with a slower CPU if you so choose. AMD UVD support finally arrived in Linux last month, too, although we have yet to experiment with it.

Intel builders will want to look at the Gigabyte GA-EG45M-DS2H, Asus P5Q-EM HDMI, and their competition. They are very good boards, merely handicapped by Intel's less complete driver support and the fact that AMD processors give more for the money in HTPC territory. HTPC builders going far beyond the minimum specifications needed for 1080p playback and into quad-core territory will definitely want to go Intel, as Anandtech has found that most current AMD Socket AM2+ microATX boards may not handle 125W and 140W TDP AMD processors, such as the Phenom 9750 and 9850, without risking overheating and permanent board damage.

Most NVIDIA GeForce 8200/8300 boards aren't quite as flexible as the board we chose, although they are still very good. The Gigabyte GA-M78SM-S2H and Asus M3N78-VM both lack Firewire, while the MSI K9N2GM-FIH lacks S/PDIF. If you prefer to use AMD-based boards—perhaps 8-channel LPCM support over the onboard HDMI is not important or you simply prefer them—the Asus M3A78-EM and Gigabyte GA-MA78GM-S2H are both excellent, feature-packed choices with HDMI, Firewire, S/PDIF out, etc.

The Zotac GF8300-A-E has four DDR2 sockets, six internal SATA, one PATA, Firewire, four USB 2.0 ports plus headers for eight more, DVI outputs with an adapter for HDMI, and a coaxial S/PDIF out. One PCI-e x16 and one PCI-e x1 slot for the tuner cards, plus two PCI slots round out the package. About the only drawbacks are having to use an adapter for HDMI, which is trivial, plus lousy placement of the main ATX power connector.

Cost: $84.99 (12/1/2008) [Comparison shop for this item]
Processor
AMD Athlon X2 5200+ Retail

Your choice of operating system will dictate the processor you go with here—specifically if your OS of choice supports your video chipset's onboard HD video acceleration, be that AMD's UVD, NVIDIA's PureVideo, or Intel's Clear Video. At this time, chipset onboard HD acceleration seems to be limited to Windows; Linux drivers for AMD supposedly support UVD now, but Intel and NVIDIA seem to be lagging.

This breaks the CPU needs of the all-in-one HTPC box into two options: the hardware-assisted route, where a dual-core CPU as slow as 1.5GHz would do the trick per SilentPCReview, or the software-only route that a Linux-based front end is going to have to take, which needs something along the lines of an Athlon 64 X2 5200+. AMD's energy-efficient Athlon X2 4450e or 4850e would be a better choice for Windows users whose MCE of choice can use HD acceleration. For unassisted playback, the 4450e and 4850e's respective 2.3GHz and 2.5GHz clockspeeds might prove a bit weak, so we stick with a faster processor.

Intel builders have similar choices: the hardware assisted route, where a dual-core CPU as slow as 1.2GHz would do the trick, or the software-only route, where a Core 2 Duo E7200 or older should work fine. The Pentium Dual-Core E2200 is about as slow as we would go on the low-end as the price/performance doesn't make too much sense with anything older and hotter-running. On the faster side, the Core 2 Duo E8500 or Core 2 Quad Q9400 offer much more flexibility, particularly if heavy-duty media encoding is expected to be a regular task for your HTPC setup.

Remember, if you plan to run an OS/hardware combo with support for GPU-based hardware acceleration, you can get away with a considerably slower dual-core part. Just make sure you're running a fairly modern dual-core part; older, slower CPUs are often outclassed by their more modern brethren in all aspects, particularly power consumption, which is very important in keeping your HTPC low-noise and living-room friendly.

The AMD Athlon X2 5200+ is one of AMD's cooler-running processors. At 2.7GHz, 2x512KB cache, and a thermal design power (TDP) of just 65W, it's not quite as good as the current Intel chips, but it's competitive, and the ability to pair it with a modern chipset such as the NVIDIA Geforce 8200/8300 or AMD 780G convinces us to make it the processor of choice. We go with the retail box for the longer warranty.

Cost: $66 (12/1/2008) [Comparison shop for this item]
Heatsink
Scythe Ninja Mini

The retail heatsink is perfectly adequate, but for lower noise, the Scythe Ninja Mini or some of the other aftermarket heatsinks available do a better job. If your chassis has appropriately placed fans already, it may be possible for you to run your Ninja Mini without the included fan, further lowering noise.

Cost: $20.99 (4/27/2008) [Comparison shop for this item]
Memory:
4GB DDR2-800

Since the last installment, memory has only gotten cheaper (!). 4GB is unnecessary for a HTPC, but at this price, it's almost impossible to say no to 4GB. A lighter-weight OS and MCE front-end such as Mythbuntu can get by with 1GB or even 512MB, but didn't we mention just how cheap memory is?

We stick with DDR2 that requires the JEDEC-standard 1.8v for optimal compatibility and lowest power dissipation. Keep in mind that for the lowest prices on memory, you may be dealing with minute-to-minute sales and rebates.

Cost: $28.26 (12/1/2008) [Comparison shop for this item]
Video
None—onboard

Six months ago, chipset integrated graphics (IGP) had a clear choice: the AMD 780G was faster and more capable than its counterparts. Today, NVIDIA's GeForce 8200/8300/9300 and Intel's G45 chipset now give an array of choices to HTPC builders who don't need much from their GPUs aside from hardware acceleration of high-definition content and multichannel audio support over HDMI. AMD's 780G and faster 790GX lacks 8-channel LPCM over HDMI support, which excludes them from the HTPC despite being excellent choices otherwise.

Superior 3D performance used to be the AMD 780G's other major advantage from its competition, but NVIDIA's faster GeForce chipsets have caught up. As gaming is not an emphasis for the HTPC, we stick with onboard video. If your HTPC does need to game on a casual basis, the midrange AMD Radeon HD 4670 and NVIDIA GeForce 9600GT are excellent choices. Higher-end, the Radeon HD 4850 and GeForce 9800GTX+ are both very good. As a plus, AMD's Radeon 4000-series cards support 8-channel LPCM over HDMI.

Cost: n/a
TV tuner
Two Hauppauge WinTV-HVR-1800 HD tuners

Not much has changed in the land of HD tuners. The key sticklers remain compatibility. Check sites like LinuxTV.org and its ilk for Linux compatibility, which is essential for many MCE front ends. If you're Windows-centric, then quite a few more cards should work for you.

We go with two Hauppauge WinTV-HVR-1800 tuners, which take advantage of the PCI-e slots on our motherboard and are widely supported in multiple OSes. With two tuners on each card, this gives tremendous flexibility to watch live TV and record one, two, or three shows in the background. If you're hooked into cable, don't forget to check if your cable box supports (and if your cable company enables it) FireWire out; that may let you plug the cable box directly into your system via FireWire, allowing you to dispense with a separate tuner card.

Alternative tuners include the Hauppauge Nova-T-500 for DAB signals outside the USA. For in the USA, the SiliconDust HD Homerun is very popular, as is the Dvico FusionHDTV 7, AverMedia AverTV HD A180, and the PCI version of the Hauppauge WinTV-HVR-1800, the WinTV-HVR-1600.

The Hauppauge HD PVR USB is also worth looking at if you need high-definition video recording from component video sources. It's not exactly a tuner, but the capabilities it has are worth noting.

Cost: $94.99 each ($189.98 total) (12/1/2008) [Comparison shop for this item]
Sound:
None—onboard

Onboard sound is fine for a HTPC, particularly with the motherboard's IGP supports handling compressed multichannel audio into uncompressed 8-channel LPCM for passthrough via HDMI. If you won't be using audio over HDMI, almost all motherboards with onboard sound support 7.1 analog out, and many support S/PDIF out.

If you need more, cards such as the Bluegears b-Inspirer and Auzentech X-plosion 7.1 are good choices, although they lack the ability to handle HDMI. The newly released Asus Xonar HDAV 1.3 is the only card that does this at the moment. Gaming enthusiasts may want to look at Creative's venerable X-fi XtremeGamer, although the Asus Xonar cards handle EAX reasonably well too.

Cost: n/a
Communications
Network card—none (onboard)

The average HTPC doesn't move, so the standard onboard gigabit Ethernet is just fine. If you need wireless, a cheap 802.11g or more capable 802.11n card is easy to set up. Keep in mind the bandwidth needed to stream HD content, especially 1080p flavors, requires a solid wireless signal if you are going that route.

Cost: n/a
Hard drive
Two Western Digital Greenpower 1TB (WD10EADS)

Boot and storage drives are both the same size here. We could go for a smaller boot drive, but with physical space at a premium inside the typical HTPC chassis and hard disks being cheap, we elect to splurge, because the additional space is likely to be very useful somewhere down the line. Not to mention the price of 1TB drives has also plunged, like memory, to very affordable levels.

Somewhat less extravagant would be the Western Digital WD6400AAKS, a very fast 640GB two-platter drive courtesy of its use of some the highest-density platters available today. Alternative 1TB recommendations include the Samsung F1 1TB, Seagate Barracuda 7200.11 1TB (ST31000333AS), Western Digital Caviar Black 1TB, and Hitachi 7K1000.B 1TB, all of which pack the latest, fastest 333GB/platter, 7200rpm designs from their respective manufacturers. If even more space is needed, Seagate's 7200.11 1.5TB (ST31500341AS) is surprisingly affordable, although we would hold off until this drive is a little more mature before buying.

Western Digital's GreenPower 1TB drive has a 5400rpm spindle speed, 333GB/platter design, 32MB cache, three-year warranty, and relatively low power and noise for a desktop 3.5" drive, making it ideal for HTPC use. The slower 5400rpm spindle speed hurts performance in access time-dependent areas, but most HTPCs never see very stressful use, and the WD10EADS is plenty fast to start with, so this should not be an issue.

Cost: $114.99 each ($229.98 total) (12/1/2008) [Comparison shop for this item]
Optical drive
LG GGC-H20L

With the emphasis on HDMI in this installment, adding a Blu-ray drive is essential. To keep things affordable we settle for a Blu-ray reader only, although if you can justify the high cost of the drive as well as the media, the LG GGW-H20L or Lite-On DH-4B1S are both excellent.

The cheapest Blu-ray option around is the Lite-On DH-4O1S, but it's a reader only, which is a bit limiting in the All-in-One HTPC. If Blu-ray is not necessary, there are plenty of excellent choices in DVD-RW drives. The Pioneer DVR-216D, Samsung SH-S223F, LG GH22LP20, and Optiarc AD-7200S are all viable choices.

LG's GGC-H20L supports Blu-ray reads up to 6x, DVD reads/writes up to 16x, CD reads/writes up to 40x, has a 4MB cache, as well as an SATA interface.

Cost: $149.99 (12/1/2008) [Comparison shop for this item]
Case
Antec Fusion V2

We looked at the Silverstone LC17, Silverstone GD02, Thermaltake Bach, Lian-Li PC-V800B, and quite a few others before we decided on the Antec Veris Fusion V2. We checked out the lower end too, such as the In-win BT566T before making our decision.

While far from perfect, the Antec Fusion offers two 3.5" bays for hard drive, one 5.25" exposed, a VFD, IR receiver, and potential for very low noise cooling via its side-mounted 120mm fans. The 120mm fans are very well positioned to pull air off of the CPU heatsink, which is something low-noise builders will want to take advantage of. The factory Antec Tri-cool 120mm fans are good enough for this use as well, which minimizes additional costs. The standard-size ATX power supply also helps, and the included 430W unit makes it a very good value compared to higher-priced offerings from Silverstone, Ahanix, Lian-Li, and others. There are some newer flavors of the Veris Fusion since the last update, but we prefer the original (and prefer to provide our own remote).

430W is serious overkill for this system, so the Sparkle SPI250EP 250W is probably more appropriate, but the fact that Antec's included 430W unit is already pretty low noise and fairly efficient means we stick with the included PSU. If you're using a chassis other than the Fusion that does not include a power supply, then we would strongly consider the Sparkle SPI250EP, Seasonic S12II 330W, or Antec's own Earthwatts EA380.

Builders may wish to look at chassis other than the Antec Fusion V2, particularly very-low-noise builders and those seeking to put more than two hard drives into their all-in-one HTPC. Budget builders may also want to look at something cheaper, but once you factor in the price of a power supply, the Antec Fusion is a pretty good deal.

Swapping out the stock fans in the Fusion to the Scythe S-flex SFF21D fans will help bring the noise down from the relatively low stock levels into very-low-noise territory, as would a power supply swap to the Enermax Modu82+ 425W. Doing both of these upgrades, though, means you're not using a lot of stock parts in the Fusion, and hence makes the Fusion somewhat less attractive on the value front. Individual builders should evaluate their needs here, particularly since the living room is not a super quiet place, which makes swapping out to the lowest-noise components unnecessary for most HTPCs.

Cost: $173.99 (12/1/2008) [Comparison shop for this item]
Input devices
Gyration GO 2.4 Optical Air Mouse and Compact-size Keyboard

If you need serious range because your living room is 100 feet long or you just have a lot of RF interference, the Adesso Wireless SlimTouch Mini and Gyration GO PRO 2.4 are both reported to have a 100 foot/30meter range.

In the more pedestrian range, the Gyration GO 2.4 lineup is pretty decent, as is Logitech Cordless Desktop S510, Logitech Cordless Desktop S520, and the Logitech Cordless Mediaboard Pro. All should work fine in Linux, although we're not 100% sure about the various idiosyncracies of the S520 and Linux. The Logitech MX5500 is also excellent, but not all features work in Linux.

Cost: $98.92 (12/1/2008) [Comparison shop for this item]
Microsoft Remote Control

As far as media center remotes go, the Microsoft Remote is actually quite good, and is liked by most. The Snapstream Firefly, Soundgraph Imon, and quite a few others, are pretty good too. If you need a little more integration, the Logitech Harmony 550 and its brethren are very useful as well.

Many components now come with remotes, including many TV tuners and even some of Antec's cases. You may want to give the included remote a shot before picking up another, although we've found we still prefer the Microsoft one.

Cost: $29.97 (4/27/2008) [Comparison shop for this item]
Total price: $1,073.07, not including shipping and handling (12/1/2008, no OS)

Lightweight front end

Much like the all-in-one, the lightweight front end is intended to sit in your living room, feeding content from the big server in the closet or the study to your home theater. It's fairly low noise and blends in unobtrusively, and probably takes even less power than the all-in-one because it has less hardware inside.

The key differences that result from this are the small, single hard drive and the absence of any tuners; all of the storage takes place on the back end, as does the tuning and encoding. While we do keep the optical drive in the lightweight front-end, a variation could omit the DVD drive and hard drive entirely. We won't be quite that ambitious here, but we do keep the possibility in mind. Our take on the lightweight front end doesn't get quite as low-power as it could, in large part because we intend for it to support 1080p in all operating systems—this means we include enough CPU power to decode 1080p without assistance from the video card to support current Linux-based HTPC front ends that do not yet support PureVideo/UVD/ClearVideo.

For the Lightweight Front End, take the all-in-one specification and make the following changes:
Video
Tuners—none

We put the tuners in the back end, allowing us to slim things down in the front end. The case now holds the motherboard, CPU, memory, power supply... and, depending on your ambition, the hard drive and optical drive. Not much else, which allows it to run very cool and very quietly.

Cost: n/a
Hard drive
Seagate Momentus 5400.5 160GB 2.5" SATA

With no need for massive storage, the hard drive's primary raison d'être in the lightweight front end is to hold the OS. You could do this over a network boot or even with a few gigabytes of flash memory, but we go the conventional route here with a regular mechanical drive.

Incidentally, solid-state disks (SSD) may not yet be a good idea, mostly due to the lack of benefits for the HTPC. Even cheaper SSD's such as the OCZ Core V2 are substantially more expensive, and are generally equal, at best, in write performance (which is critical for a HTPC). Most importantly as far as the HTPC is concerned, SSDs save very little additional power (per Techreport and others).

2.5" laptop drives tend to run cooler and consume less power than their 3.5" desktop counterparts. The Seagate Momentus 5400.5 (ST9160310AS) offers excellent performance for a laptop drive, 160GB of space, 8MB of cache, a 5400rpm spindle speed, sub-12ms seek time, and a three-year warranty.

Cost: $56.99 (12/1/2008) [Comparison shop for this item]
Case
Antec Fusion V2

We keep the existing recommendation because it's already reasonably low noise and it's fairly well-built. We feel compelled to note that with no add-in PCI or PCI-e cards and only a 2.5" laptop drive, you could potentially move to a much smaller chassis, particularly if you shifted from the standard-sized 5.25" optical drive to a slim unit such as the Samsung SH-S082H.

The challenges of going to something this small add up when you realize you don't know how quiet or well-built many of the components are. Finding low-noise, high-quality ATX and SFX power supplies is much easier than looking for quiet 1U or FlexATX units. A few do exist, such as the SFX form-factor Seasonic Eco Power 300W and FlexATX form-factor Sparkle SPI220LE, but be aware of their drawbacks, particularly the fact that both actually tend to be noisier than many of their ATX counterparts at loads typically seen in a HTPC, which is exactly what we're trying to avoid.

For actual case recommendations, the Foxconn DH153C, Chenbro PC40523, HEC 7K09BB, and several others are smaller and more compact than most of the cases in the primary all-in-one HTPC recommendation. They carry compromises such as smaller, noisier fans, and even with a PSU swap to a suitable lower-noise unit, their relatively poor internal airflow may find them to be more noisy than we'd like them to be.

Cost: $173.99 (12/1/2008) [Comparison shop for this item]
Total price: $708.10, not including shipping and handling (12/1/2008, no OS)

It may look just like the all-in-one HTPC box, but the lightweight front end ends up being a little more than half the cost. It's still more than a comparable media center extender, but it's also much more capable and flexible. For example, install a powerful discrete video card like an NVIDIA GeForce 8800GT 512MB, and you could have a formidable gaming setup in your living room.

Heavy-duty back end

The back-end does all of the heavy lifting in this setup, but because it sits out of the way in the closet, it can be bigger, a little more noisy, and store a lot more data without having to cram everything into a tiny chassis in your living room. We also don't have to worry about content protection very much, as the back-end is just storing and crunching media rather than actually talking directly to your TV.

If you have an existing PC that's perfect for this role, you may not even want to build a new one. The case may be big and beige, but if you've got enough SATA ports on the motherboard, internal 3.5" bays for the hard drives, and a suitable power supply, why not reuse an existing box? There are many approaches to this; using the recommendations below may be a useful way to modify an existing system rather than building an entirely new one.
Motherboard
Asus P5Q-EM HDMI

The key features we look for on the back end motherboard are at least six SATA ports—preferably in RAID to give us additional configuration options—passive cooling, and onboard video. This restricts us to slightly higher-end choices, but the price difference between the P5Q-EM HDMI and the cheaper P5Q-VM is pretty small, so it's not a significant issue. Losing on chipset RAID support and HDMI are also very minor negatives.

We go Intel in the back end as we don't need the higher integrated video performance of the competing AMD or NVIDIA chipsets. For users wishing to go for maximum processing power with quad-core chips, Intel's quad-cores are faster and cooler than the AMD competition, although that is somewhat diluted by the fact that AMD has continually slashed the prices on their quad-cores. AMD users still have plenty of options if going Intel doesn't appeal to them; the Gigabyte GA-MA78GM-S2H offers both onboard video and six SATA ports, but it has only two PCI-e slots (one x16 and one x1) and lacks chipset RAID5. The Asus M3A78-EM is similar, but offers four DIMM slots instead of two.

The Asus P5Q-EM HDMI is based on the Intel G45/ICH10R offering, including four DDR2 sockets, one PCI-e x16, two PCI-e x1, and one PCI slot, six SATA 3.0Gbps ports with RAID0/1/0+1/5 support, HDMI, DVI, VGA, FireWire, six USB 2.0 ports (plus headers for six more), and onboard Ethernet.

Cost: $134.99 (12/1/2008) [Comparison shop for this item]
Processor
Intel Core 2 Duo E8500 Retail

We could go lighter on the processor if your encoding requirements don't happen in real time, or we could go much heavier (Core 2 Quad Q9400 anyone?) to do simultaneous encodes if you demand that much performance. The 45nm Core 2s are very energy-efficient compared to their older 65nm siblings, so we feel they're worth the additional cost.

AMD users can look at the Athlon X2 4450e on the low-end, which is the latest, most energy-efficient version of the Athlon 64 X2. Somewhat higher end, the X2 5200+ in the all-in-one recommendation is a pretty good choice, and for massive encoding jobs where quad-cores help, one of the cooler-running AMD Phenoms such as the 9550 should be an excellent choice. If you choose to run a higher-end chip like the Phenom 9850 or 9950, you'll want to make sure your motherboard supports it; some AMD 780G boards have trouble with 125W and 140W TDP Phenoms.

The Intel Core 2 Duo E8500 has a 3.16GHz clock speed, 6MB of L2 cache, and runs both cooler and slightly faster than its older 65nm brethren, such as the Core 2 Duo E6850. The retail boxed version comes with a three-year warranty and a heatsink/fan that's decent enough to let us skip an aftermarket heatsink.

Cost: $174.99 (12/1/2008) [Comparison shop for this item]
Memory
4GB DDR2-800

Since the last installment, memory has only gotten cheaper (!). 4GB is unnecessary for a HTPC, but at this price, it's almost impossible to say no to 4GB. The back-end is supposed to do heavy lifting anyway, the low price is just another excuse for 4GB. A lighter weight OS such as Mythbuntu can get by with 1GB or even 512MB, but didn't we mention just how cheap memory is?

We stick with DDR2 that requires the JEDEC-standard 1.8v for optimal compatibility and lowest power dissipation.

Cost: $28.26 (12/1/2008) [Comparison shop for this item]
Video
None—onboard

Onboard video is fine. It won't even be used most of the time, as the back end can be remotely managed. If you're buying a motherboard for the back end that doesn't have onboard video, then pick up whatever's cheap and works; both NVIDIA and AMD have plenty of cheap low-end PCI-e cards.

Cost: n/a
Two Hauppauge WinTV-HVR-1800 HD tuners

We can use the exact same tuners from the all-in-one HTPC here in the back-end.

We go with two Hauppauge WinTV-HVR-1800s, which take advantage of the PCI-e x1 slots on our motherboard and are widely supported in multiple OSes. If you're hooked into cable, don't forget to check if your cable box supports (and if your cable company enables it) FireWire-out; that may let you plug the cable box directly into your system via FireWire, allowing you to dispense with a separate tuner card.

Alternative tuners include the Hauppauge Nova-T-500 for DAB signals outside the USA. For in the USA, the SiliconDust HD Homerun is very popular, as is the Dvico FusionHDTV 7, AverMedia AverTV HD A180, and the PCI version of the Hauppauge WinTV-HVR-1800, the WinTV-HVR-1600.

The Hauppauge HD PVR USB is also worth looking at if you need high-definition video recording from component video sources. It's not exactly a tuner, but the capabilities it has are worth noting.

Cost: $94.99 each ($189.98 total) (12/1/2008) [Comparison shop for this item]
Sound
None—onboard

Onboard sound more than does the job—which will probably comprise of sitting there and doing exactly nothing most of the time.

Cost: n/a
Communications
None—onboard

Gigabit Ethernet is onboard, and should prove more than adequate for serving files. We don't recommend wireless for streaming HD, as 802.11g or even 802.11n is hard-pressed to do this without a strong, consistent signal. You can try it if you like, as it does work, it's just not as reliable as a nice run of Cat5e.

Cost: n/a
Hard drive
Three Western Digital Greenpower 1TB (WD10EADS)

One drive for boot, two more drives for data. Feel free to add or subtract drives as you need to, set them up in RAID (chipset RAID with the ICH10R, software RAID via the OS, or whatever you feel like...), etc. Since the last update, almost every major drive maker has updated their product lines to higher density 333GB/platters, for improved performance and reduced power consumption.

We recommend keeping the OS drive separate to prevent occasional hiccups in recording and playback, as the data drive needs to be constantly accessed. Modern drives now are more than fast enough to prevent this in a single-disk setup, but start talking multiple HD streams and it could be an issue, so we avoid it entirely by going to multiple disks.

1TB for a boot disk is probably excessive, but since hard drive space rarely goes to waste in a HTPC, we think it's a viable choice. Seagate's new Barracuda 7200.11 1.5TB (ST31500341AS) is also an attractive option, although it appears to need a little additional firmware development at the moment. Smaller drives such as the Western Digital WD6400AAKS may be more suitable for builds that need less space.

Shop around for drives; if you're not building a high-end hardware RAID5 off of an Areca ARC-1220 or 3ware 9650SE-8LPML, then you probably don't need to worry too much about nearline drives, and, as a result, pretty much anything will work. The Seagate 7200.11 1TB (ST31000333AS), Hitachi 7K1000.B 1TB, Western Digital Caviar Black 1TB, and Samsung F1 1TB are all excellent choices. All work fine for light use like they'd see in the HTPC Back-End. If you must go nearline (be it for the higher MTBF, or because you do plan to go high-end RAID), the nearline versions of the drives mentioned here would be the Seagate ES.2 1TB, Western Digital RE3 1TB, and Hitachi E7K1000.

We go with the Western Digital Greenpower 1TB (WD10EADS) because of its low noise, low power consumption, more than adequate performance, 32MB cache, and three-year warranty. The WD10EADS is an update over the previous WD10EACS with 333GB/platter rather than 250GB/platter for improved performance and reduced power consumption, and the performance of the slower Greenpower drives is still more than adequate for the Back-end.

Cost: $114.99 each ($344.97 total) (12/1/2008) [Comparison shop for this item]
Optical drive
LG GGW-H20L

In the all-in-one, Blu-ray is a substantial chunk of the budget, so we make it optional.

With someone spending substantially more money on what would probably be a front-end/back-end setup, the extra cost to go Blu-ray as an additional 1080p source is significantly less of a hit. Being able to write to Blu-ray is nice too, although it's still a luxury for most given the high cost of writable media. Lite-On has some excellent choices in the form of the DH-4B1S BD-writer and the DH-4O1S BD-ROM if you don't like the options from LG, such as the GGC-H20L.

Unlike its cheaper GGC-H20L sibling that only reads Blu-ray, the LG GGW-H20L is a 6x Blu-ray burner, 16x DVD-writer, 40x CD-writer, has 4MB cache and a SATA interface.

Cost: $224.99 (12/1/2008) [Comparision shop for this item]
Pioneer DVR-216D

The more mundane task of ripping DVDs could probably be handled by the Blu-ray drive, but using a separate DVD drive that's just over a tenth of the cost probably makes more sense. Plus, the Pioneer DVR-216D is an excellent reader.

Pioneer's DVR-216D supports DVD reads and writes up to 20x, CD reads up to 40x, has a 2MB cache as well as a SATA interface. Its competition, such as the Samsung SH-S223F, LG GH22LP20, and Optiarc AD-7200S, are also appropriate choices.

Cost: $26.99 (12/1/2008) [Comparison shop for this item]
Case
Antec NSK6580

Boring and mundane, but it holds up to five 3.5" drives with grommeted mounts in addition to three 5.25" devices. Add in a 92mm fan or two in the front to keep the drives cool, and the Antec NSK6580 does everything we need it to do for a pretty good price. We go for the black version in this update as it happened to be cheaper, but check the silver version as well in your shopping.

The included Antec Earthwatts 430W PSU makes this case an excellent value, as the cost of going to a separate PSU such as the Corsair VX450 or Enermax Modu82+ 425W would be substantial for a box that doesn't need to be ultra-low noise.

If you have ambitions beyond a handful of hard drives, the Chenbro SR10769BK, Lian-Li PC-V1200Bplus II, and quite a few other chassis can hold more drives and keep them properly cooled. The Chenbro SR10769BK, in particular, takes up to eight 3.5" drives with optional hotswap available, although for home use we'd definitely swap the fans out from the stock high-flow/high-noise Delta units to something more ear-friendly.

Cost: $88 (12/1/2008) [Comparison shop for this item]
Nexus Real Silent 92mm fan

Low noise, low-flow, the Nexus Real Silent 92mm provides more than enough airflow to keep the hard drives cool in the NSK6580 with 27cfm of air at 19.2dBA. With only three drives, we only specify one, but if you intend to fully populate your NSK6580 with five drives, you might want to consider two.

Cost: $9.99 (12/1/2008) [Comparison shop for this item]
Mouse
Logitech Optical Wheel Mouse USB

Since we expect the back end to be controlled via remote most of the time, buy whatever you like for a mouse. Optical mice are cheap enough that we buy one of those, but that's about it.

Cost: $9.95 (12/1/2008) [Comparison shop for this item]
Keyboard
Logitech keyboard

If you find it comfortable, then buy it. Logitech, Microsoft, and other name-brand units are all pretty decent. Keep in mind the important nature of personal preference in this decision and the fact you probably won't be using it too often.

Cost: $6.90 (12/1/2008) [Comparison shop for this item]
Total price: $1,241.01, not including shipping and handling (12/1/2008, no OS)
http://arstechnica.com/guides/buyer/...00812-htpc.ars





MPAA: Opposition to Selectable Output Control "Astonishing"
Matthew Lasar

The Motion Picture Association of America met with the Federal Communications Commission late last week to blast its opponents, who are leery of granting Hollywood the right to limit output on HDTVs and other devices. Michael O’Leary and Frank Cavaliere of the MPAA told FCC Commissioner Jonathan Adelstein that critics of a proposed waiver on selectable output control (SOC) are living in the past. The duo responded to charges by the Consumer Electronics Association (CEA) that SOC could hobble millions of HTDVs. Broadcast lobbyist Eddie Fritts of the Fritts Group also attended the meeting.

"At its core, the position of CEA is that technology should be frozen in time, and any new services that require advanced technology should be banned," the MPAA told Adelstein on November 25. "This position is quite astonishing, coming from an organization that in the past has advocated in favor of technological innovation."

As Ars has reported, CEA has been on the war path, trying to stave off the MPAA's bid to obtain FCC permission to work with cable and satellite companies to block analog output of pre-DVD release movies. Current agency policy forbids SOC use against either analog or digital transmission. But MPAA argues that analog is insecure, and that broadcast over it would "facilitate the illegal copying and redistribution of this high value content, causing untold damage to the DVD and other 'downstream' markets."

Not one iota

CEA met with the FCC on November 18 and warned that 20 million HDTVs could be affected by an SOC waiver. "The MPAA has not demonstrated why it should be permitted to disable the features and functionality of a consumer's lawfully-purchased HDTV set," three CEA Vice Presidents told the FCC. The advocacy group Public Knowledge filed around the same time, and argued that the disability count could get higher if you include DVRs "and other consumer electronics devices that rely on analog connections." These also will be "effectively turned off, even if the TVs also have digital inputs."

At the November 25 meeting, MPAA all but called both groups a pack of worrywarts. "To be clear, the MPAA's waiver would not affect the continuity of consumers' existing services or their ability to view and record any program presently available for recording," they argued. "Rather, grant of the waiver will provide consumers with entirely new home viewing options without affecting by one iota any of the other programming options they currently enjoy."

O’Leary, Cavaliere, and Fritts also tried their hand at a historical analogy that strikes Ars as pretty weak. Ten years ago CEA strongly boosted the DVD, they observed, for which millions of consumers bought DVD players, setting aside their VCRs. "At that time, there was no concern expressed by CEA that 'lawfully purchased' VCRs would be 'disabled,'" the MPAA noted. "Nor did Public Knowledge suggest then that VCRs would 'be effectively turned off.'"

It's unclear why anyone would suggest those things, of course, since DVD players do not physically limit the output of other devices. More reasonably, MPAA protests that various electronic device makers are not subject to the SOC ban, and can cut deals with studios to stream early run content over AppleTV, PlayStation 3, and other systems through what's called a Multi-Channel Video Programming Distribution agreement. "By contrast, 60 million plus consumers do have the necessary connections and equipment by virtue of their MVPD subscriptions for the new service for which we are seeking the waiver," their filing concluded. "This competitive disadvantage for MVPDs and their customers can be eliminated if the waiver is granted."

But Public Knowledge, which has been following this proceeding for months, quickly filed a response to MPAA's latest comments, noting that various studios plan to roll out early-run movies without SOC. "MPAA has presented no evidence that analog or protected digital outputs are the source of copyright infringement or that the waiver would have any effect on infringement," PK's Jef Pearlman concluded, "while there is significant evidence that neither is true."

The FCC told Ars on Monday that the MPAA's SOC request won't appear on the agenda of the agency's next Open Commission meeting, scheduled for December 18. But, judging from the trade association's aggressive lobbying, the big studios aren't giving up on this prize yet.
http://arstechnica.com/news.ars/post...tonishing.html





Hoping to Draw Market Share With Touch Screens
Jenna Wortham and Matt Richtel

This holiday, cellphone makers and carriers are pushing some shiny new toys: phones with touch-sensitive screens like the one on the Apple iPhone.

The companies are hoping to duplicate the blockbuster success of the iPhone with models that, in their glassy minimalism, end up looking a lot like it. These include the G1, powered by Google’s Android software; the Instinct from Samsung; the LG Dare; and, most recently, Research in Motion’s much-anticipated BlackBerry Storm.

But with consumers keeping a close watch on their bank balances, analysts and industry experts say most touch-screen phones will have trouble getting onto the list of this season’s must-have gadgets.

The surge of touch screens has its roots in the introduction of the iPhone on AT&T’s network in June 2007, which left rival carriers scrambling for comparable offerings.

“What you’re seeing right now is the first wave of competitors spurred by the media juggernaut for the iPhone,” said Ed Snyder, a telecommunications industry analyst with Charter Equity Research. Mr. Snyder said that when the iPhone hype hit, “no credible cellphone executive could not get a touch-screen phone started.”

Since its introduction, the iPhone, which is available only through AT&T in the United States, has helped AT&T steal customers from other carriers. Wireless service operators are now concentrating on retaining current subscribers as much as they are trying to reel in new ones, said Charles Golvin, a principal analyst at Forrester Research. Part of that strategy, Mr. Golvin said, is offering perks like exclusive “presales” of hot new models to subscribers.

Phone shoppers say carriers and contracts have a big influence on their decisions about phones. “I’m pretty sure my next phone will be a touch screen,” said Vernon McIntosh, 40, a personal trainer from New York who is an AT&T customer.

Mr. McIntosh was in a Verizon store last week and said he was choosing between an iPhone and the BlackBerry Storm. “But I’m not eligible for an upgrade at AT&T,” he said. “It might be cheaper to switch contracts.”

To help drum up excitement for the release of the Storm, Verizon Wireless rolled out a teaser campaign in early October that zeroed in on the phone’s distinctive feature: a palpable clicking sensation when the screen is pressed.

The Storm, which costs $200 after rebate with a new two-year contract, also has built-in appeal for the existing base of BlackBerry fanatics, and it appears to be a hit. When the Storm went on sale Nov. 21, people lined up outside Verizon stores to get their hands on it, and many stores quickly sold out.

An employee at a Verizon Wireless store in Midtown Manhattan said Friday that none of the company’s stores in Manhattan had the Storm in stock, but that people were still streaming in to place orders. The earliest those customers can expect their phones to ship is Dec. 15, the employee said.

Nancy Stark, a spokeswoman for Verizon, said she could not provide figures on sales or inventory for the Storm, although she did say it had been the company’s “fastest-selling phone to date.” Verizon’s next touch-screen models are the $350 HTC Touch Pro, available now, and the $249 Samsung Omnia, which is for sale online and will be in stores next week.

Touch-screen phones do have their critics. Mr. Snyder says the bigger screens are a drain on battery life, and the phones require users to look at the screen instead of getting to know the phone’s buttons by feel.

“You’re getting all these extras so you can look at the phone and stand still, when you bought the phone so you could move,” he said. “Only a niche of users are going to be willing to spend money to have the extra capability.”

“The hype surrounding the touch-screen technology far exceeds its impact,” Mr. Snyder said.

Dave Perry, a business developer who was shopping in a Verizon store in Manhattan last week, said he liked the user-friendliness and big screens of touch-screen phones. “But there are drawbacks: the accuracy of typing and reliability of the screen,” he said.

“I don’t necessarily think the technology is where it needs to be,” Mr. Perry said, adding that the occasional problems and slow responses from the devices were “not something I’m willing to wait for.”

Touch-screen phones remain a fraction of the overall mobile phone market, but sales have been soaring. In the 12 months through September, sales of the phones in North America grew 130 percent, in contrast to 4 percent growth in the overall phone market, according to comScore M:Metrics, a market research firm.

As of September, M:Metrics data shows, more than 2.6 million people in North America had some model of the iPhone. The second-most-popular touch-screen model was the LG Voyager, which was available through Verizon Wireless and had 851,000 users.

Mr. Golvin said it was unlikely that touch-screen phones would take over the industry.

“There’s no question that it’s a very fast-growing segment of the market,” Mr. Golvin said. “It’s become one of the form factors that some consumers want.”

But Mr. Golvin said there had been similar frenzies for flip phones and candy-bar-style phones when they were introduced. “And yet today, there are still plenty of people who prefer a flip phone.”

Touch-screen technology first appeared in devices like the Treo that were aimed at professional users, and the screens were best activated with thin plastic styluses. Since the advent of the iPhone, more touch screens are activated with the fingers, and the phones themselves are aimed at mainstream users.

The phones also tend to cost several hundred dollars, which could hurt sales in an economic downturn. For its part, Sprint is fighting the barrage of high-end phones from its competitors with a new marketing campaign that emphasizes the money-saving value of its phones and plans.

Ev Gonzalez, director of device marketing for Verizon Wireless, said the company recognized that touch-screen technology was not for everyone. In fact, he said, touch screens are likely to show up on a limited number of the company’s devices.

“There are consumers who are looking for straight phone services,” Mr. Gonzalez said. “Where the touch screen is not needed, we won’t provide it.”
http://www.nytimes.com/2008/12/01/te...y/01phone.html





Maybe Canadians Have More Friends
Alex Mindlin

Canadian Internet users are far more likely than Americans to use a social networking Web site, according to September figures released by the research firm comScore. That number is consistent with Canadians’ generally heavy use of sophisticated Internet features like online video.

“We joke that it’s because of those long winter nights up there,” said Andrew Lipsman, a senior analyst at comScore.

But it also reflects the broader truth that the popularity of such Web sites, and which services are at the top, can vary sharply in neighboring countries.

“One site may catch on in a certain country, and another may catch on elsewhere,” said Mr. Lipsman. “Often it’s whichever one gained prominence in the early phase of the game.”

For example, Google’s Orkut service, which has a third of Facebook’s traffic in the United States, is the dominant social networking site in both India and Brazil.
http://www.nytimes.com/2008/12/01/te...t/01drill.html





James Boyle's "The Public Domain" -- a Brilliant Copyfighter's Latest Book, from a Law Prof Who Writes Like a Comedian
Cory Doctorow

Jamie Boyle, of the Duke Center for the Public Domain, has a new book out, The Public Domain: Enclosing the Commons of the Mind. Boyle ranks with Lessig, Benkler and Zittrain as one of the most articulate, thoughtful, funny and passionate thinkers in the global fight for free speech, open access, and a humane and sane policy on patents, trademarks and copyrights. A legal scholar who can do schtick like a stand-up comedian, Boyle is entertaining as well as informative.

I've got a copy on its way to me, but while I'm waiting, I'm delighted to discover that Jamie talked his publisher, Yale University Press, into offering the book as a free, CC-licensed download. And right there, in the preface, I'm hooked:

Each person has a different breaking point. For one of my students it was United States Patent number 6,004,596 for a “Sealed Crustless Sandwich.” In the curiously mangled form of English that patent law produces, it was described this way:

A sealed crustless sandwich for providing a convenient sandwich without an outer crust which can be stored for long periods of time without a central filling from leaking outwardly. The sandwich includes a lower bread portion, an upper bread portion, an upper filling and a lower filling between the lower and upper bread portions, a center filling sealed be- tween the upper and lower fillings, and a crimped edge along an outer perimeter of the bread portions for sealing the fillings there between. The upper and lower fillings are preferably comprised of peanut butter and the center filling is comprised of at least jelly. The center filling is pre- vented from radiating outwardly into and through the bread portions from the surrounding peanut butter.

“But why does this upset you?” I asked; “you’ve seen much worse than this.” And he had. There are patents on human genes, on auctions, on algorithms. The U.S. Olympic Committee has an expansive right akin to a trademark over the word “Olympic” and will not permit gay activists to hold a “Gay Olympic Games.” The Supreme Court sees no First Amendment problem with this. Margaret Mitchell’s estate famously tried to use copyright to prevent Gone With the Wind from being told from a slave’s point of view. The copyright over the words you are now read- ing will not expire until seventy years after my death; the men die young in my family, but still you will allow me to hope that this might put it close to the year 2100. Congress periodically considers legislative proposals that would allow the ownership of facts. The Digital Millennium Copyright Act gives content providers a whole array of legally protected digital fences to en- close their work. In some cases it effectively removes the privilege of fair use. Each day brings some new Internet horror story about the excesses of intellectual property. Some of them are even true. The list goes on and on. (By the end of this book, I hope to have convinced you that this matters.) With all of this going on, this enclosure movement of the mind, this locking up of symbols and themes and facts and genes and ideas (and eventually people), why get excited about the patenting of a peanut butter and jelly sandwich? “I just thought that there were limits,” he said; “some things should be sacred.”

The Public Domain: Enclosing the Commons of the Mind, [url=http://www.thepublicdomain.org/download/]Download The Public Domain[/ur], The Public Domain on Amazon
http://www.boingboing.net/2008/11/30...s-the-pub.html





Facebook Aims to Extend Its Reach Across the Web
Brad Stone

Facebook, the Internet’s largest social network, wants to let you take your friends with you as you travel the Web. But having been burned by privacy concerns in the last year, it plans to keep close tabs on those outings.

Facebook Connect, as the company’s new feature is called, allows its members to log onto other Web sites using their Facebook identification and see their friends’ activities on those sites. Like Beacon, the controversial advertising program that Facebook introduced and then withdrew last year after it raised a hullabaloo over privacy, Connect also gives members the opportunity to broadcast their actions on those sites to their friends on Facebook.

In the next few weeks, a number of prominent Web sites will weave this service into their pages, including those of the Discovery Channel and The San Francisco Chronicle, the social news site Digg, the genealogy network Geni and the online video hub Hulu.

Facebook Connect is representative of some surprising new thinking in Silicon Valley. Instead of trying to hoard information about their users, the Internet giants have all announced plans to share at least some of that data so people do not have to enter the same identifying information again and again on different sites.

Supporters of this idea say such programs will help with the emergence of a new “social Web,” because chatter among friends will infiltrate even sites that have been entirely unsociable thus far.

For example, a person might alert his Facebook friends to the fact that he is watching a video on CBS.com and invite them to join him there to watch together and discuss the video as it plays.

“Everyone is looking for ways to make their Web sites more social,” said Sheryl Sandberg, Facebook’s chief operating officer. “They can build their own social capabilities, but what will be more useful for them is building on top of a social system that people are already wedded to.”

MySpace, Yahoo and Google have all announced similar programs this year, using common standards that will allow other Web sites to reduce the work needed to embrace each identity system. Facebook, which is using its own data-sharing technology, is slightly ahead of its rivals.

The effort is particularly important for Facebook, which once represented the seemingly boundless promise of the Web 2.0 boom. It desperately wants to make certain the other Web companies do not supplant it and become the most popular hub for online socializing.

Facebook, with 120 million members worldwide, has also been under extra pressure to get its revenue to match its media hype and membership growth. Responding to reports that Facebook was looking for more capital after raising $235 million last year, Ms. Sandberg said she would not rule that out. “There is a lot of interest in investing in us and we are always open to the right financing at the right price,” she said.

The most immediate challenge confronting Facebook is to create an enduring stream of advertising revenue.

A survey last week from the research firm IDC suggested that social networks were a miserable place for advertisers: just 57 percent of all users of social networks clicked on an ad in the last year, and only 11 percent of those clicks led to a purchase, IDC said. And it turns out that marketers are not so interested in advertising on pages filled with personal trivia and relationship updates.

“What in heaven’s name made you think you could monetize the real estate in which somebody is breaking up with their girlfriend?” Ted McConnell, a general manager at Procter & Gamble, asked last month at an industry conference.

This is where Facebook Connect could help. No money changes hands between Facebook and the sites using Connect, and executives are wary of discussing how it could bring in revenue. But there are some obvious possibilities.

Facebook has detailed information about its users: their real identities, what they like and dislike and whom they associate with. With a member’s permission, it could use that data to help other Web sites deliver more personalized ads. Similarly, those sites could tell Facebook what its users are doing elsewhere, helping to make its own ads more targeted.

“It’s becoming very clear that advertisers don’t know how to advertise on Facebook,” said Charlene Li, an independent consultant and social media analyst. “But if you take a group of Facebook friends and put them on a travel site where they are spending more time and generating more ad dollars in a focused area like travel, that is an opportunity ripe for getting revenues back and sharing it.”

Facebook executives argue that Connect will naturally increase traffic on the site and increase ad revenue as a result. Ms. Sandberg said the company had no plans to explore any other advertising potential with Connect.

That reluctance is partly born of experience. Last year, Facebook was lambasted for its Beacon advertising program, which some thought failed to properly warn users that their actions on other sites were being shared on Facebook. Some users’ purchases on e-commerce sites, for example, were broadcast to their friends, in some cases spoiling gift plans.

As a result, Facebook executives have been exceedingly circumspect with Connect, introducing it slowly and pitching it as a privacy tool. They argue that it allows users to set their privacy settings once on Facebook and then apply them on other sites.

Facebook has also taken other precautions. According to staff members at the political advocacy group MoveOn.org, which led the charge against Beacon, Facebook executives gave them an early briefing this summer about Connect.

For now, Facebook is also carefully authorizing each partner in the Connect program and reviewing how it will use data on Facebook members and discuss the feature publicly. It plans to allow Web sites to register themselves for Connect, without having to seek approval, in the next few weeks.

“They so desperately want to avoid another Beacon,” said an executive with a company that plans to use Connect but has been waiting for a green light from Facebook for months. This person did not want to be quoted by name criticizing Facebook.

When asked about the potential promises and pitfalls of Connect, Mark Zuckerberg, Facebook’s chief executive, said: “We want to make the experience as lightweight and easy to use as possible. But we also have to make sure that people understand what’s going on and have control over it.”

Executives at the social network MySpace, which has similar goals, are more outspoken in discussing their identification system.

“There are so many important issues to get right,” said Jason Oberfest, a vice president at MySpace. “Consumers need to understand where their data is going and how it’s being used.”

“Then, if we can get the privacy issues right, if it’s totally clear to the user what is happening, there is potential for advertising,” Mr. Oberfest added. “But certainly not without a lot of testing and consideration.”
http://www.nytimes.com/2008/12/01/te...1facebook.html





An Amicus Brief: Issues in the Cyberbullying Case That Affect You
Pamela Jones

I was trying to figure out how to explain to you all that is involved in the case of the U.S. v. Lori Drew, the cyberbullying case that so many lawyers are expressing concerns about. I felt I needed a lawyer to explain it, but where would I find one who felt like doing some unpaid work, and over the Thanksgiving holiday to boot?

Then I had a brainstorm. I could show you the amicus brief submitted in the case by the Electronic Frontier Foundation, the Center for Democracy and Technology, and Public Citizen, which was also signed by "14 individual faculty members listed in Appendix A who research, teach and write scholarly articles and books about internet law, cybercrime, criminal law and related topics at law schools nationwide". Appendix A is at the very end. If you look at the list, you'll see that it's some of the finest and most knowledgeable lawyers and law professors specializing in cyberlaw. The brief was written by Jennifer Granick of EFF and Philip R. Malone of Harvard Law School's Berkman Center for Internet and Society's Cyberlaw Clinic.

I think when you read it, it will turn your hair white. It did me. In fact, I don't think it's overstating it a bit to say that unless this case is overturned, it is time to get off the Internet completely, because it will have become too risky to use a computer. At a minimum, I'd feel I'd need to avoid signing up for membership at any website, particularly MySpace. Why particularly MySpace? The Times Online has their statement:
MySpace, which is a division of News Corporation, owner of The Times, said in a statement that it “respects the jury's decision and will continue to work with industry experts to raise awareness of cyber-bullying and the harm it can potentially cause.”
If it respects this decision, I don't feel safe there. I didn't even want to visit its web site to try to find its terms of use. But according to this article, MySpace gets to be the one that decides if we've violated their terms:
MySpace users agree that the social networking site has the final say on deciding whether content posted by users violates a long list of regulations contained in the agreement.
There is no recourse. They make the law and if you mess up, you go to jail. You used a computer, after all, didn't you, and their server isn't yours, and if they say you have violated their terms, you have. I'd also never upload anything to YouTube, and I wouldn't use anyone's blogging software. I'd definitely stay out of the Cloud, because I don't own those computers either, leaving me open to Computer Fraud & Abuse Act allegations, which is what Drew was charged with. In short, it'd be time for me to just pack up and leave, if this verdict stands. If you think EULAs were bad, imagine after this ruling if they can be tied to the CFAA. Do you think it'll be long before folks are tossed in jail for defining fair use in ways a copyright owner doesn't like? Would Microsoft hesitate to criminalize its EULA terms? You think? You trust?

The case is not yet done, in that there is a motion that the judge took under advisement and said he will rule on this coming Monday. And there are other developments, as reported by St. Louis Today:
Drew lawyer H. Dean Steward has filed a motion to dismiss the case, arguing repeatedly that prosecutors in Los Angeles over-reached and that Drew could only be prosecuted if she both read MySpace's terms and knowingly and intentionally violated them. Wu has appeared to lean towards granting that motion in court, although he has declined prior chances to do so. Steward has also filed a motion for a new trial, which could lead to a federal appeals court tossing out the case.
Wu is the judge, the Honorable George H. Wu. There are some serious issues, legal issues, raised by the case, in other words. The legal issues are not about who is or isn't morally awful; the legislative branch can always write new laws to address a new issue that they realize someone needs to write a law for. The legal issues raised are what happens to everyone who uses a computer if the Computer Fraud & Abuse Act is applied to actions that were not contemplated as covered by the legislators when they drafted the act. Here's the analysis by the US Departmenet of Justice of the CFAA, dated long before this case. More reactions:
"The statute was never intended to cover this kind of conduct," says Michael Scott, professor of law at Southwestern School of Law, Los Angeles. "Lori Drew did not do the key acts that the prosecution alleged, but rather a third party did, so it seems strange that the person who pulled the trigger is not prosecuted but the one standing next to her is."

Or at least criminalize it before you prosecute anyone. Andrew Grossman goes to the heart of the matter, in the Christian Science Monitor:
"What happened to Megan Meier was a tragedy, not a crime," says Andrew Grossman, senior legal policy analyst in the Center for Legal and Judicial Studies at the Heritage Foundation in Washington. "This case should never have been brought. The strongest evidence for the prosecution had nothing or little to do with the charges. This verdict is a loss for civil liberties and leaves all Internet users at risk of prosecution under federal law. It is a prime example of overcriminalization."
And that's why it'd be time to get off the Internet and go back to a typewriter. Really. You read a great deal about judges and how they shouldn't be allowed to be activists and use their positions to create law. But the amicus brief raises a serious question: what about prosecutors? Is society in safe hands if prosecutors get to broadly interpret a law retroactively in creative and aggressive ways to make it apply to activities that have nothing to do with what the law was written to address? How about web sites? If violating a web site's terms of use is criminalized by the CFAA, have we not given private companies the ability to write the criminal laws? Do you feel safe if they are allowed to arbitrarily decide what is or isn't criminal? And then change it whenever they feel like it, without notice to you? Here's a question for you, from AlmostLegally:
At my office, the company I work for says “don’t send personal email from your work computer.” But if I do, is that a federal crime?

For example, Groklaw has terms of use. I ask you not to post comments about politics and not to troll or spam or personally attack anyone. If you violate those terms, should I apply the CFAA to you and send you to jail? One year for each misdemeanor and a $100,000 fine, because you violate something I made up to suit myself? On what basis should I be given such power? Have we lost our minds? I surely don't want any such powers.

Note that's one of the concerned comments in the New York Times article I linked to at the very beginning, a comment by Andrew M. Grossman, senior legal policy analyst for the Heritage Foundation, again:
"If this verdict stands, it means that every site on the Internet gets to define the criminal law," Grossman told The Times. "That's a radical change. What used to be small-stakes contracts become high-stakes criminal prohibitions."

Did you ever think you could be criminally prosecuted for not abiding by a web site's terms of use? Neither did I. And that raises another question. Do I now have a responsibility to police you and make sure you are abiding by my 'laws'? Does anybody know? And there's another point that the brief raises: can you retroactively define something as criminal and put people in jail for conduct they had no notice was criminal conduct before they did it?

The law is not supposed to surprise or ambush you. The law draws a line in the sand, as drawn by the legislators, who draw it where they think they need to to accomplish something very specific. They don't write laws that say, "Don't do bad stuff." If they did, it'd be likely found unconstitutional, on the grounds of vagueness, because who knows what "bad stuff" is if it isn't defined?

Did you know that YouTube's Terms of Use say not to do "bad stuff"? I didn't either, never having read it, because like the majority of you, I rarely read terms of use. But the brief tells us that it says that. If we apply the CFAA to that web site's terms of use, is it now a crime to do "bad stuff"? Actually, yes, if you use a computer to do it, whatever it is that someone someday might conceivably define as "bad stuff". Who gets to define "bad stuff"? Google? Some prosecutor somewhere you don't even live? A blogger mob? An enemy who can't sleep without inventing new and mean ways to ruin your life? Does the CFAA not empower such conduct?

Do you actually want a world like that? In some ways, it's worse than lawlessness, worse than the old Wild West. Why worse? Because in the West in the old days, might made "right". That's clear enough, and you knew where you stood. Practice shooting, or move East where there were laws. But if the law is vague or retroactively redefined just to get you, because someone in power decides you deserve it, you have laws but you can't rely upon them, because they are not necessarily fairly applied or reliably defined, so you are in constant danger of having a law used just to get you personally, because someone doesn't like the way you part your hair.

Like that never happens in real life.

The entire point of the rule of law is that it's dependable and predictable and it applies equally to everyone. You don't wake up to a knock on your door, and find the police have defined you mysteriously as a criminal without warning. I'm not talking about this case's specifics now. Everyone agrees that bullying is not a good thing, and I sympathize with prosecutors. I've known some, and I liked them all. They are men and women, in my experience, who care deeply about the victims of crime, and that's a beautiful quality. But the rule of law is beautiful too, but only if it's dependable, fair, and applied without favoritism. Not to mention Constitutional. Anonymous speech is protected under the US Constitution, as the brief points out. PCWorld quotes some more lawyers:
If the charges against Drew are upheld, it will be a serious blow to anyone who wants to remain anonymous on the Internet, said Brock Meeks, a CDT spokesman. "Everybody that is sympathetic to this case and saying finally we've got something to nail her on here, they're not looking hard enough at the fact that the Justice Department blundered by using this anti-hacker law," he said.

The charges suggest that anyone who uses a fake name to sign up for a Web service like Yahoo or Gmail could be charged with a federal crime, Meeks said. "If that's a federal crime, then I'm certainly guilty of a federal crime and there are probably a million other people out there who are probably also guilty."

Is it not Kafkaesque if you can be dragged into court on a whim in any location in the world, if the computer you are alleged to have misused is located there, even if it's half a country or even a world away from where you reside and they can put you in jail for a crime that wasn't defined as a crime at the time of your conduct in question? It'd be one thing if you were given a notice that this was the new interpretation; but if you just wake up to find out you are a retroactive criminal, you might as well be in a Kafka novel, because there is absolutely no way to ever know what the definition of criminal conduct will be tomorrow or when it can retroactively be applied to you. Drew, according to reports of the testimony at trial, never read the terms of use. Yes, but she should have known, said the prosecutor. She must have. How do you know? Should the law guess? We can be put in prison because although there is no proof we knew something, we might have or could have or must have?

If you think I am overstating what the brief is saying, feel free to say so, but do read it. At least then, you'll know what the uproar is all about. I know from some of your comments that you think the verdict was all about Lori Drew. I don't think so. I think it's about us.

Update: I remembered reading a detail about the case in one of the first articles about it, if not the first, namely that Megan was underage when she opened her MySpace account, and that her mother allowed her to do so, despite it being a violation of the web site's Terms of Use, and I found it now, from the St. Charles Journal:
MySpace has rules. A lot of them. There are nine pages of terms and conditions. The long list of prohibited content includes sexual material. And users must be at least 14.

"Are you joking?" Tina asks. "There are fifth-grade girls who have MySpace accounts."

As for sexual content, Tina says, most parents have no clue how much there is. And Megan wasn't 14 when she opened her account. To join, you are asked your age but there is no check. The accounts are free.

As Megan's 14th birthday approached, she pleaded for her mom to give her another chance on MySpace, and Tina relented.

She told Megan she would be all over this account, monitoring it. Megan didn't always make good choices because of her ADD, Tina says. And this time, Megan's page would be set to private and only Mom and Dad would have the password.
If only the parents would have the password, it means to me that they were the ones who set it up. And at the time of the suicide, Megan was still not yet 14, the age limit MySpace sets for opening an account. "This time" is referring to an earlier account that the parents had shut down, so they apparently allowed her to have an account even earlier, or she just opened it herself. Either way, it was a violation of the web site's terms of use:
Tina Meier was wary of the cyber-world of MySpace and its 70 million users. People are not always who they say they are.

Tina knew firsthand. Megan and the girl down the block, the former friend, once had created a fake MySpace account, using the photo of a good-looking girl as a way to talk to boys online, Tina says. When Tina found out, she ended Megan's access.
So the girl herself set up a fake account as well as violating the terms of use by opening an account when she was underage. Excuse me for pointing this out, but shouldn't this mother also be prosecuted for violating MySpace's Terms of Use, now found a violation of a criminal statute, the Computer Fraud & Abuse Act? Before you answer, remember that Drew was found not guilty of intent to cause harm. If not, I'd like to hear your arguments. That same article, by the way, tells us about an incident that makes me wonder just what exactly caused the suicide:
Monday, Oct. 16, 2006, was a rainy, bleak day. At school, Megan had handed out invitations to her upcoming birthday party and when she got home she asked her mother to log on to MySpace to see if Josh had responded.

Why did he suddenly think she was mean? Who had he been talking to?

Tina signed on. But she was in a hurry. She had to take her younger daughter, Allison, to the orthodontist.

Before Tina could get out the door it was clear Megan was upset. Josh still was sending troubling messages. And he apparently had shared some of Megan's messages with others.

Tina recalled telling Megan to sign off.

"I will Mom," Megan said. "Let me finish up."

Tina was pressed for time. She had to go. But once at the orthodontist's office she called Megan: Did you sign off?

"No, Mom. They are all being so mean to me."

"You are not listening to me, Megan! Sign off, now!"

Fifteen minutes later, Megan called her mother. By now Megan was in tears.

"They are posting bulletins about me." A bulletin is like a survey. "Megan Meier is a slut. Megan Meier is fat."

Megan was sobbing hysterically. Tina was furious that she had not signed off.

Once Tina returned home she rushed into the basement where the computer was. Tina was shocked at the vulgar language her daughter was firing back at people.

"I am so aggravated at you for doing this!" she told Megan.

Megan ran from the computer and left, but not without first telling Tina, "You're supposed to be my mom! You're supposed to be on my side!"
Am I the only parent who notices that this child was left alone on the Internet, with admonitions to stop but delayed enforcement? And can you *prove* in a court of law that it was not the mother's failure to support her, as the child apparently viewed it, that actually caused the death? This child had tried to kill herself before, the article points out, an attempt that had nothing to do with the cyberbullying. No doubt that's why the local authorities didn't prosecute, since they said there was no way to actually say what exactly caused the suicide:
"We did not have a charge to fit it," McGuire says. "I don't know that anybody can sit down and say, 'This is why this young girl took her life.'"
Incidentally, Megan's mother was quoted in that article saying this:
"I don't feel their intentions were for her to kill herself. But that's how it ended."
That is what the jury found, actually, that Drew had no intention of causing a suicide. She didn't set up the account, according to testimony at trial, or send the messages. But if the mother recognized that there was no intention to cause the suicide, why did she not tell the court that and prevent the prosecutor from going after Drew for intent to cause the suicide?

Update 2: Orin Kerr, one of Drew's attorneys, has posted his summary of what happened and what happens next:
The jury agreed that it is a federal crime to intentionally violate the Terms of Service on a website, and that Drew directly or indirectly did so, but it acquitted Drew of having violated Terms of Service in furtherance of the tortious act. That is, the jury ruled that Drew is guilty of relatively lower-level crimes for violating MySpacs Terms of Service (for being involved in the setting up of a fake MySpace account). It acquitted Drew for any role in inflicting distress on Meier or for anything related to Meier's suicide. The maximum allowed penalty for the misdemeanor violations are one year in prison for each violation, although the majority of federal misdemeanors result in a sentence of probation.

The next step in the case is that the trial judge will rule on whether there was enough evidence for the jury to find that Drew violated the Terms of Service intentionally, or whether the TOS violation was only negligent or reckless or knowing. If the judge agrees that there was enough evidence for the jury to find that Drew violated the Terms of Service intentionally, the case will go on to sentencing for the crime of having violated MySpace's Terms of Service.

After sentencing, if that happens, the sentence will be followed by an appeal before the Ninth Circuit on the legal question of whether it is in fact a federal crime to violate the Terms of Service of a website. For those not following my coverage of the case, I am one of Drew's attorneys, and yes, if there is an appeal, I will be very heavily involved in it.
http://www.groklaw.net/article.php?s...81128005538214





Google’s Gatekeepers
Jeffrey Rosen

In 2006, Thailand announced it was blocking access to YouTube for anyone with a Thai I.P address, and then identified 20 offensive videos for Google to remove as a condition of unblocking the site.

‘If your whole game is to increase market share,’ says Lawrence Lessig, speaking of Google, ‘it’s hard to . . . gather data in ways that don’t raise privacy concerns or in ways that might help repressive governments to block controversial content.’

In March of last year, Nicole Wong, the deputy general counsel of Google, was notified that there had been a precipitous drop in activity on YouTube in Turkey, and that the press was reporting that the Turkish government was blocking access to YouTube for virtually all Turkish Internet users. Apparently unaware that Google owns YouTube, Turkish officials didn’t tell Google about the situation: a Turkish judge had ordered the nation’s telecom providers to block access to the site in response to videos that insulted the founder of modern Turkey, Mustafa Kemal Ataturk, which is a crime under Turkish law. Wong scrambled to figure out which videos provoked the court order and made the first in a series of tense telephone calls to Google’s counsel in London and Turkey, as angry protesters gathered in Istanbul. Eventually, Wong and several colleagues concluded that the video that sparked the controversy was a parody news broadcast that declared, “Today’s news: Kamal Ataturk was gay!” The clip was posted by Greek football fans looking to taunt their Turkish rivals.

Wong and her colleagues asked the Turkish authorities to reconsider their decision, pointing out that the original offending video had already been voluntarily removed by YouTube users. But after the video was taken down, Turkish prosecutors objected to dozens of other YouTube videos that they claimed insulted either Ataturk or “Turkishness.” These clips ranged from Kurdish-militia recruitment videos and Kurdish morality plays to additional videos speculating about the sexual orientation of Ataturk, including one superimposing his image on characters from “Queer Eye for the Straight Guy.” “I remember one night, I was looking at 67 different Turkish videos at home,” Wong told me recently.

After having many of the videos translated into English, Wong and her colleagues set out to determine which ones were, in fact, illegal in Turkey; which violated YouTube’s terms of service prohibiting hate speech but allowing political speech; and which constituted expression that Google and YouTube would try to protect. There was a vigorous internal debate among Wong and her colleagues at the top of Google’s legal pyramid. Andrew McLaughlin, Google’s director of global public policy, took an aggressive civil-libertarian position, arguing that the company should protect as much speech as possible. Kent Walker, Google’s general counsel, took a more pragmatic approach, expressing concern for the safety of the dozen or so employees at Google’s Turkish office. The responsibility for balancing these and other competing concerns about the controversial content fell to Wong, whose colleagues jokingly call her “the Decider,” after George W. Bush’s folksy self-description.

Wong decided that Google, by using a technique called I.P. blocking, would prevent access to videos that clearly violated Turkish law, but only in Turkey. For a time, her solution seemed to satisfy the Turkish judges, who restored YouTube access. But last June, as part of a campaign against threats to symbols of Turkish secularism, a Turkish prosecutor made a sweeping demand: that Google block access to the offending videos throughout the world, to protect the rights and sensitivities of Turks living outside the country. Google refused, arguing that one nation’s government shouldn’t be able to set the limits of speech for Internet users worldwide. Unmoved, the Turkish government today continues to block access to YouTube in Turkey.

THE ONGOING DISPUTE between Google and Turkey reminds us that, throughout history, the development of new media technologies has always altered the way we think about threats to free speech. At the beginning of the 20th century, civil libertarians in America worried most about the danger of the government silencing political speech: think of Eugene V. Debs, the Socialist candidate for President, who was imprisoned in 1919 for publicly protesting American involvement during World War I. But by the late 1960s, after the Supreme Court started to protect unpopular speakers more consistently, some critics worried that free speech in America was threatened less by government suppression than by editorial decisions made by the handful of private mass-media corporations like NBC and CBS that disproportionately controlled public discourse. One legal scholar, Jerome Barron, even argued at the time that the courts should give unorthodox speakers a mandatory right of access to media outlets controlled by giant corporations.

Today the Web might seem like a free-speech panacea: it has given anyone with Internet access the potential to reach a global audience. But though technology enthusiasts often celebrate the raucous explosion of Web speech, there is less focus on how the Internet is actually regulated, and by whom. As more and more speech migrates online, to blogs and social-networking sites and the like, the ultimate power to decide who has an opportunity to be heard, and what we may say, lies increasingly with Internet service providers, search engines and other Internet companies like Google, Yahoo, AOL, Facebook and even eBay.

The most powerful and protean of these Internet gatekeepers is, of course, Google. With control of 63 percent of the world’s Internet searches, as well as ownership of YouTube, Google has enormous influence over who can find an audience on the Web around the world. As an acknowledgment of its power, Google has given Nicole Wong a central role in the company’s decision-making process about what controversial user-generated content goes down or stays up on YouTube and other applications owned by Google, including Blogger, the blog site; Picasa, the photo-sharing site; and Orkut, the social networking site. Wong and her colleagues also oversee Google’s search engine: they decide what controversial material does and doesn’t appear on the local search engines that Google maintains in many countries in the world, as well as on Google.com. As a result, Wong and her colleagues arguably have more influence over the contours of online expression than anyone else on the planet.

In response to the rise of online gatekeepers like Wong, some House Democrats and Republicans have introduced a bipartisan bill called the Global Online Freedom Act, which would require that Internet companies disclose to a newly created office in the State Department all material filtered in response to demands by foreign governments. Google and other leading Internet companies have sought modifications to the bill, arguing that, without the flexibility to negotiate (as Wong did with Turkey), they can’t protect the safety of local employees and that they may get kicked out of repressive countries, where they believe even a restricted version of their services does more good than harm. For the past two years, Google, Yahoo and Microsoft, along with other international Internet companies, have been meeting regularly with human rights and civil-liberties advocacy groups to agree on voluntary standards for resisting worldwide censorship requests. At the end of last month, the Internet companies and the advocacy groups announced the Global Network Initiative, a series of principles for protecting global free expression and privacy.

Voluntary self-regulation means that, for the foreseeable future, Wong and her colleagues will continue to exercise extraordinary power over global speech online. Which raises a perennial but increasingly urgent question: Can we trust a corporation to be good — even a corporation whose informal motto is “Don’t be evil”?

“To love Google, you have to be a little bit of a monarchist, you have to have faith in the way people traditionally felt about the king,” Tim Wu, a Columbia law professor and a former scholar in residence at Google, told me recently. “One reason they’re good at the moment is they live and die on trust, and as soon as you lose trust in Google, it’s over for them.” Google’s claim on our trust is a fragile thing. After all, it’s hard to be a company whose mission is to give people all the information they want and to insist at the same time on deciding what information they get.

THE HEADQUARTERS OF YOUTUBE are in a former Gap building in San Bruno, Calif., just a few miles from the San Francisco International Airport. In the lobby, looming over massage chairs, giant plasma-screen TVs show popular videos and scroll news stories related to YouTube. The day I arrived to interview the YouTube management about how the site regulates controversial speech, most of the headlines, as it happens, had to do with precisely that topic. Two teenagers who posted a video of themselves throwing a soft drink at a Taco Bell employee were ordered by a Florida judge to post an apology on YouTube. The British culture secretary had just called on YouTube to carry warnings on clips that contain foul language.

The volume of videos posted on YouTube is formidable — Google estimates that something like 13 hours of content are uploaded every minute. YouTube users can flag a video if they think it violates YouTube’s community guidelines, which prohibit sexually explicit videos, graphic violence and hate speech. Once flagged, a video is vetted by YouTube’s internal reviewers at facilities around the world who decide whether to take it down, leave it up or send it up the YouTube hierarchy for more specialized review. When I spoke with Micah Schaffer, a YouTube policy analyst, he refused to say how many reviewers the company employs. But I was allowed to walk around the office to see if I could spot any of them. I passed one 20-something YouTube employee after another — all sitting in cubicles and wearing the same unofficial uniform of T-shirt and jeans. The internal reviewers were identifiable, I was told, only by the snippets of porn flickering on their laptops.

The idea of a 20-something with a laptop in San Bruno (or anywhere else, for that matter) interpreting community guidelines for tens of millions of users might not instill faith in YouTube’s vetting process. But the most controversial user flags or requests from foreign governments make their way up the chain of command to the headquarters of Google, in Mountain View, Calif., where they may ultimately be reviewed by Wong, McLaughlin and Walker.

Recently, I spent several days talking to Wong and her colleagues at the so-called Googleplex, which has the feeling of a bucolic and extraordinarily well-financed theme camp. As we sat around a conference table, they told me about their debates as they wrestled with hard cases like the dispute in Turkey, as well as the experiences that have informed their thinking about free speech. Walker, the general counsel, wrote for The Harvard Crimson as an undergraduate and considered becoming a journalist before going into law; McLaughlin, the head of global public policy, became a fellow at Harvard’s Berkman Center for Internet and Society after working on the successful Supreme Court challenge to part of the federal Communications Decency Act. And Wong, a soft-spoken and extremely well organized woman, has a joint degree in law and journalism from Berkeley and told me she aspired to be a journalist as a child because of her aunt, a reporter for The Los Angeles Times.

I asked Wong what was the best analogy for her role at Google. Was she acting like a judge? An editor? “I don’t think it’s either of those,” she said. “I definitely am not trying to pass judgment on anything. I’m taking my best guess at what will allow our products to move forward in a country, and that’s not a judge role, more an enabling role.” She stressed the importance for Google of bringing its own open culture to foreign countries while still taking into account local laws, customs and attitudes. “What is the mandate? It’s ‘Be everywhere, get arrested nowhere and thrive in as many places as possible.’ ” So far, no Google employees have been arrested on Wong’s watch, though some have been detained.

When Google was founded, 10 years ago, it wasn’t at all obvious whether the proprietors of search engines would obey the local laws of the countries in which they did business — and whether they would remove links from search results in response to requests from foreign governments. This began to change in 2000, when a French Jew surfed a Yahoo auction site to look for collections of Nazi memorabilia, which violated a French law banning the sale and display of anything that incites racism. After a French judge determined that it was feasible for Yahoo to identify 90 percent of its French users by analyzing their I.P. addresses and to screen the material from the users, he ordered Yahoo to make reasonable efforts to block French users from accessing the prohibited content or else to face fines and the seizure of income from Yahoo’s French subsidiary. In January 2001, Yahoo banned the sale of Nazi memorabilia on its Web sites.

The Yahoo case was a landmark. It made clear that search engines like Google and Yahoo could be held liable outside the United States for indexing or directing users to content after having been notified that it was illegal in a foreign country. In the United States, by contrast, Internet service providers are protected from most lawsuits involving having hosted or linked to illegal user-generated content. As a consequence of these differing standards, Google has considerably less flexibility overseas than it does in the United States about content on its sites, and its “information must be free” ethos is being tested abroad.

For example, on the German and French default Google search engines, Google.de and Google.fr, you can’t find Holocaust-denial sites that can be found on Google.com, because Holocaust denial is illegal in Germany and France. In the wake of the Yahoo decision, Google decided to comply with governmental requests to take down links on its national search engines to material that clearly violates national laws. (In the interest of disclosure, however, Google has agreed to report all the links it takes down in response to government demands to chillingeffects.com, a Web site run by Harvard’s Berkman Center that keeps a record of censored online materials.)

Of course, not every overseas case presents a clear violation of national law. In 2006, for example, protesters at a Google office in India demanded the removal of content on Orkut, the social networking site, that criticized Shiv Sena, a hard-line Hindu political party popular in Mumbai. Wong eventually decided to take down an Orkut group dedicated to attacking Shivaji, revered as a deity by the Shiv Sena Party, because it violated Orkut terms of service by criticizing a religion, but she decided not to take down another group because it merely criticized a political party. “If stuff is clearly illegal, we take that down, but if it’s on the edge, you might push a country a little bit,” Wong told me. “Free-speech law is always built on the edge, and in each country, the question is: Can you define what the edge is?”

INITIALLY, GOOGLE’S POLICY of removing links to clearly illegal material on its foreign search engines seemed to work. But things changed significantly after Google bought and expanded YouTube in 2006. Once YouTube was available in more than 20 countries and in 14 languages, users began flagging hundreds of videos that they saw as violations of local community standards, and governments around the globe demanded that certain videos be blocked for violating their laws. Google’s solution was similar to the one the French judge urged on Yahoo: it agreed to block users in a particular country from accessing videos that were clearly illegal under local law. But that policy still left complicated judgment calls in murkier cases.

In late 2006, for example, Wong and her colleagues debated what to do about a series of videos that insulted the king of Thailand, where a lêse-majesté law makes criticisms of the king a criminal offense. Wong recalls hearing from an employee in Asia that the Thai government had announced that it was blocking access to YouTube for anyone with a Thai I.P. address. Soon after, a Thai government official sent Wong a list of the U.R.L.’s of 20 offensive videos that he demanded Google remove as a condition of unblocking the site. Some of the videos were sexually explicit or involved hate speech and thus clearly violated the YouTube terms of service. Some ridiculed the king — by depicting him with his feet on his head, for example — and were clearly illegal under Thai law but not U.S. law. And others — criticizing the Thai lêse-majesté law itself — weren’t illegal in Thailand but offended the government.

After an extensive debate with McLaughlin and Walker, Wong concluded that since the lêse-majesté law had broad democratic support in Thailand, it would be better to remove the videos that obviously violated Thai law while refusing to remove the videos that offended the government but didn’t seem to be illegal. All three told me they were reassured by the fact that Google could accommodate the Thai government by blocking just the videos that were clearly illegal in Thailand (and blocking those for Thai users only), leaving them free to exercise their independent judgment about videos closer to the line. The Thai government was apparently able to live with this solution.

Over the past couple of years, Google and its various applications have been blocked, to different degrees, by 24 countries. Blogger is blocked in Pakistan, for example, and Orkut in Saudi Arabia. Meanwhile, governments are increasingly pressuring telecom companies like Comcast and Verizon to block controversial speech at the network level. Europe and the U.S. recently agreed to require Internet service providers to identify and block child pornography, and in Europe there are growing demands for network-wide blocking of terrorist-incitement videos. As a result, Wong and her colleagues said they worried that Google’s ability to make case-by-case decisions about what links and videos are accessible through Google’s sites may be slowly circumvented, as countries are requiring the companies that give us access to the Internet to build top-down censorship into the network pipes.

IT’S NOT ONLY FOREIGN COUNTRIES that are eager to restrict speech on Google and YouTube. Last May, Senator Joseph Lieberman’s staff contacted Google and demanded that the company remove from YouTube dozens of what he described as jihadist videos. (Around the same time, Google was under pressure from “Operation YouTube Smackdown,” a grass-roots Web campaign by conservative bloggers and advocates to flag videos and ask YouTube to remove them.) After viewing the videos one by one, Wong and her colleagues removed some of the videos but refused to remove those that they decided didn’t violate YouTube guidelines. Lieberman wasn’t satisfied. In an angry follow-up letter to Eric Schmidt, the C.E.O. of Google, Lieberman demanded that all content he characterized as being “produced by Islamist terrorist organizations” be immediately removed from YouTube as a matter of corporate judgment — even videos that didn’t feature hate speech or violent content or violate U.S. law. Wong and her colleagues responded by saying, “YouTube encourages free speech and defends everyone’s right to express unpopular points of view.” In September, Google and YouTube announced new guidelines prohibiting videos “intended to incite violence.”

In addition to Lieberman, another outspoken critic of supposed liberal bias at YouTube and Google is Michelle Malkin, the conservative columnist and blogger. Malkin became something of a cause célèbre among YouTube critics in 2006, when she created a two-minute movie called “First, They Came” in the wake of the violent response to the Danish anti-Muhammad cartoons. After showing pictures of the victims of jihadist violence (like the Dutch filmmaker Theo Van Gogh) and signs declaring “Behead Those Who Insult Islam,” the video asks, “Who’s next?” and displays the dates of terrorist attacks in America, London, Madrid and Bali.

Nearly seven months after she posted the video, Malkin told me she was “flabbergasted” to receive an e-mail message from YouTube saying the video had been removed for its “inappropriate content.” When Malkin asked why the video was removed, she received no response, and when she posted a video appealing to YouTube to reinstate it, that video, too, was deleted with what she calls the “false claim” that it had been removed at her request. Malkin remains dissatisfied with YouTube’s response. “I’m completely flummoxed about what their standards are,” she said. “The standards need to be clear, they need to be consistent and they need to be more responsive.”

I watched the “First, They Came” video, which struck me as powerful political commentary that contains neither hate speech nor graphic violence, and I asked why it was taken down. According to a YouTube spokesman, the takedown was a routine one that hadn’t been reviewed by higher-ups. The spokesman said he couldn’t comment on particular cases, but he forwarded a link to Malkin’s current YouTube channel, noting that it contains 55 anti-jihadist videos similar to “First, They Came,” none of which have been taken down. (“First, They Came” can now be found on Malkin’s YouTube channel, too.)

The removal of Malkin’s video may have been an innocent mistake. But it serves as a reminder that one person’s principled political protest is another person’s hate speech, and distinguishing between the two in hard cases is a lot to ask of a low-level YouTube reviewer. In addition, the publicity that attended the removal of Malkin’s video only underscores the fact that in the vast majority of cases in which material is taken down, the decision to do so is never explained or contested. The video goes down, and that’s the end of it.

Yet even in everyday cases, it’s often no easier to determine whether the content of a video is actually objectionable. When I visited YouTube, the management showed me a flagged French video of a man doubled over. Was he coughing? Or in pain? Or playacting? It was hard to say. The YouTube managers said they might send the item to a team of French-language reviewers for further inspection, but if the team decided to take down the video, its reasons would most likely never become public.

AS THE LAW PROFESSOR TIM WU TOLD ME, to trust Google, you have to be something of a monarchist, willing to trust the near-sovereign discretion of Wong and her colleagues. That’s especially true in light of the Global Network Initiative, the set of voluntary principles for protecting free expression and privacy endorsed last month by leading Internet companies like Google and leading human rights and online-advocacy groups like the Center for Democracy and Technology. Google and other companies say they hope that by acting collectively, they can be more effective in resisting censorship requests from repressive governments and, when that isn’t possible, create a trail of accountability.

Google is indeed more friendly to free speech than the governments of most of the countries in which it operates. But even many of those who are impressed by Wong and her colleagues say the Google “Decider” model is impractical in the long run, because, as broadband use expands rapidly, it will be unrealistic to expect such a small group of people to make ad hoc decisions about permissible speech for the entire world. “It’s a 24-hour potential problem, every moment of the day, and because of what the foreign governments can do, like put people in jail, it creates a series of issues that are very, very difficult to deal with,” Ambassador David Gross, the U.S. coordinator for International Communications and Information Policy at the State Department, told me. I asked Wong whether she thought the Decider model was feasible in the long term, and to my surprise, she said no. “I think the Decider model is an inconsistent model because the Internet is big and Google isn’t the only one making the decisions,” she told me.

When I pressed Wong and her colleagues about who they thought should make these decisions, they said they would be happiest, of course, if more countries would adopt U.S.-style free-speech protections. Knowing that that is unlikely, they said they would prefer that countries around the world set up accountable bodies that provide direct guidance about what controversial content to restrict. As an example of his preferred alternative, Andrew McLaughlin pointed to Germany, which has established a state agency that gathers the U.R.L.’s of sites hosting Nazi and violent content illegal under German law and gives the list to an industry body, which then passes it on to Google so that it can block the material on its German site. (Whenever Google blocks material there or on its other foreign sites, it indicates in the search results that it has done so.)

It is striking — and revealing — that Wong and her colleagues would prefer to put themselves out of business. But it is worth noting that even if Google’s suggestion were adopted, and governments around the world began to set up national review boards that told Google what content to remove, then those review boards might protect far less free speech than Google’s lawyers have. When I raised this concern, McLaughlin said he hoped that the growing trends to censor speech, at the network level and elsewhere, would be resisted by millions of individual users who would agitate against censorship as they experienced the benefits of free speech.

There’s much to be said for McLaughlin’s optimism about online free-speech activism. Consider recent experiences in Turkey, where a grass-roots “censuring the censors” movement led more than 400 Turkish bloggers to shutter their Web sites in solidarity with mainstream sites that were banned for carrying content that, among other things, insulted Turkey’s founding father. In America, and around the world, the boundaries of free speech have always been shaped more by political activism than by judicial decisions or laws. But what is left out of McLaughlin’s vision is uncertainty about one question: the future ethics and behavior of gatekeepers like Google itself.

“Right now, we’re trusting Google because it’s good, but of course, we run the risk that the day will come when Google goes bad,” Wu told me. In his view, that day might come when Google allowed its automated Web crawlers, or search bots, to be used for law-enforcement and national-security purposes. “Under pressure to fight terrorism or to pacify repressive governments, Google could track everything we’ve searched for, everything we’re writing on gmail, everything we’re writing on Google docs, to figure out who we are and what we do,” he said. “It would make the Internet a much scarier place for free expression.” The question of free speech online isn’t just about what a company like Google lets us read or see; it’s also about what it does with what we write, search and view.

WU’S FEARS THAT violations of privacy could chill free speech are grounded in recent history: in China in 2004, Yahoo turned over to the Chinese government important account information connected to the e-mail address of Shi Tao, a Chinese dissident who was imprisoned as a result. Yahoo has since come to realize that the best way of resisting subpoenas from repressive governments is to ensure that private data can’t be turned over, even if a government demands it. In some countries, I was told by Michael Samway, who heads Yahoo’s human rights efforts, Yahoo is now able to store communications data and search queries offshore and limits access of local employees, so Yahoo can’t be forced to turn over this information even if it is ordered to do so.

Isolating, or better still, purging data is the best way of protecting privacy and free expression in the Internet age: it’s the only way of guaranteeing that government officials can’t force companies like Google and Yahoo to turn over information that allows individuals to be identified. Google, which refused to discuss its data-purging policies on the record, has raised the suspicion of advocacy groups like Privacy International. Google announced in September that it would anonymize all the I.P. addresses on its server logs after nine months. Until that time, however, it will continue to store a wealth of personal information about our search results and viewing habits — in part to improve its targeted advertising and therefore its profits. As Wu suggests, it would be a catastrophe for privacy and free speech if this information fell into the wrong hands.

“The idea that the user is sovereign has transformed the meaning of free speech,” Wu said enthusiastically about the Internet age. But Google is not just a neutral platform for sovereign users; it is also a company in the advertising and media business. In the future, Wu said, it might slant its search results to favor its own media applications or to bury its competitors. If Google allowed its search results to be biased for economic reasons, it would transform the way we think about Google as a neutral free-speech tool. The only editor is supposed to be a neutral algorithm. But that would make it all the more insidious if the search algorithm were to become biased.

“During the heyday of Microsoft, people feared that the owners of the operating systems could leverage their monopolies to protect their own products against competitors,” says the Internet scholar Lawrence Lessig of Stanford Law School. “That dynamic is tiny compared to what people fear about Google. They have enormous control over a platform of all the world’s data, and everything they do is designed to improve their control of the underlying data. If your whole game is to increase market share, it’s hard to do good, and to gather data in ways that don’t raise privacy concerns or that might help repressive governments to block controversial content.”

Given their clashing and sometimes self-contradictory missions — to obey local laws, repressive or not, and to ensure that information knows no bounds; to do no evil and to be everywhere in a sometimes evil world — Wong and her colleagues at Google seem to be working impressively to put the company’s long-term commitment to free expression above its short-term financial interests. But they won’t be at Google forever, and if history is any guide, they may eventually be replaced with lawyers who are more concerned about corporate profits than about free expression. “We’re at the dawn of a new technology,” Walker told me, referring not simply to Google but also to the many different ways we now interact online. “And when people try to come up with the best metaphors to describe it, all the metaphors run out. We’ve built this spaceship, but we really don’t know where it will take us.”
http://www.nytimes.com/2008/11/30/ma...0google-t.html





Hogan's Litvack Discusses Google/Yahoo
Nate Raymond

Google Inc. and Yahoo! Inc. called off their joint advertising agreement just three hours before the Department of Justice planned to file antitrust charges to block the pact, according to the lawyer who would have been lead counsel for the government.

Sanford "Sandy" Litvack (right) left Hogan & Hartson in September to consult for the department's antitrust division on a possible court challenge to the Web giants' agreement. The companies abandoned the deal in November after the Justice Department informed them it would seek to block the deal.

"We were going to file the complaint at a certain time during the day," says Litvack, who rejoins Hogan & Hartson today. "We told them we were going to file the complaint at that time of day. Three hours before, they told us they were abandoning the agreement."

The agreement, announced in April, would have given Yahoo the ability to use Google to sell advertising along the side of Yahoo pages. (Google's ads would have replaced ads previously sold by Yahoo's own platform.) The proposal came amid Microsoft Corporation's $44.6 billion hostile takeover bid for Yahoo. Microsoft abandoned that deal a month after the proposed Google-Yahoo deal became public, and as the Department of Justice and state regulators began looking into the Google pact for possible antitrust violations.

The never-filed government complaint would have charged that the agreement violated Sections 1 and 2 of the Sherman Act, Litvack tells the Am Law Daily in one of his first interviews since the companies canned the venture. Section 1 bans agreements that restrain trade unreasonably. Section 2 makes it unlawful for a company to monopolize or attempt to monopolize trade.

"It would have ended up also alleging that Google had a monopoly and that [the advertising pact] would have furthered their monopoly," Litvack says.

The complaint would have sought a preliminary injunction to stop the agreement from going forward. "The fact that we filed a lawsuit would not by itself have stopped them," he says. "We would have had to get an injunction from the court, and we would have sought that."

Five firms were involved in the negotiations, Litvack says. Google was represented in the negotiations by Clearly Gottlieb Steen & Hamilton and Wilson Sonsini Goodrich & Rosati. Yahoo turned to Latham & Watkins, Hunton & Williams, and Skadden, Arps, Slate, Meagher & Flom.

Litvack acknowledges that Microsoft Corporation and other companies lobbied the department to block the agreement, both publicly and and in private meetings. Litvack insists, though, that Microsoft's lobbying had no bearing on his recommended course of action or on the division's ultimate decision. Microsoft was represented by Cadwalader, Wickersham & Taft.

The Department of Justice said in a November 5 press release that its investigation showed Google was "by far the largest provider" of Internet search and advertising, as well as Internet search syndication. The agreement with Yahoo, had it gone forward, would have accounted for 90 percent of those markets, the release said. Litvack says by publicizing Google's current market share in the press release the department "may or may not be" trying to put the company on notice for possible future antitrust actions.

"[The department is] making it clear to the parties and to the world that this is how the division viewed these particular aspects of Google's business," Litvack says. That said, Litvack says the change in administration may mean a shift in how the division handles future antitrust matters.

When the case closed November 5, Litvack says "there was some talk about my staying to do some other stuff, but I decided to come back" to Hogan & Hartson. He's happy to be back, he says, but does regret that he won't get to go to court in what would have been the highest-profile antitrust case in years.

"Of course I was looking forward to it," he says. "We felt pretty good about it, we felt pretty confident. Yeah, I would have liked to have done it."
http://amlawdaily.typepad.com/amlawd...s-litvack.html
JackSpratts is offline   Reply With Quote
Old 05-12-08, 09:52 AM   #2
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,017
Default

In Courtroom Showdown, Bush Demands Amnesty for Spying Telecoms
David Kravets

The Bush administration on Tuesday will try to convince a federal judge to let stand a law granting retroactive legal immunity to the nation's telecoms, which are accused of transmitting Americans' private communications to the National Security Agency without warrants.

At issue in the high-stakes showdown — set to begin at 10:00 a.m. PST — are the nearly four dozen lawsuits filed by civil liberties groups and class action attorneys against AT&T, Verizon, MCI, Sprint and other carriers who allegedly cooperated with the Bush administration's domestic surveillance program in the years following the Sept. 11 terror attacks. The lawsuits claim the cooperation violated federal wiretapping laws and the Constitution.

In July, as part of a wider domestic spying bill, Congress voted to kill the lawsuits and grant retroactive amnesty to any phone companies that helped with the surveillance; President-elect Barack Obama was among those who voted for the law in the Senate. On Tuesday, lawyers with the Electronic Frontier Foundation are set to urge the federal judge overseeing those lawsuits to reject immunity as unconstitutional. At stake, they say, is the very principle of the rule of law in America.

"I think it does set a very frightening precedent that it's okay for people to break the law because they can just have Congress bail them out later," says EFF legal director Cindy Cohn. "It's very troubling."

The judge presiding over the case, U.S. District Judge Vaughn Walker of San Francisco, announced late Monday he wanted to discuss 11 questions at Tuesday's hearing, one of which goes directly to the heart of the immunity legislation.

Is there any precedent for this type of enactment that is analogous in all of these respects: retroactivity; immunity for constitutional violations; and delegation of broad discretion to the executive branch to determine whether to invoke the provision?

Carl Tobias, a professor at the University of Richmond School of Law, says the immunity legislation, if upheld, "makes it possible to extend immunity to other areas of the law."

He agreed, for example, that it would not be far-fetched to imagine Congress immunizing ExxonMobil for the 1989 Valdez oil spill "for national security reasons." A jury awarded about $5 billion in punitive damages in that case, an amount the courts reduced to $500 million.

In the telecom immunity challenge, the government argues that the telecoms should not be punished, or suffer the threat of punishment, for a surveillance program that the Bush administration claims was designed only to fight terrorism. The government also denies the lawsuits' allegations that the surveillance was a broad dragnet that sucked down Americans' communications on a wholesale basis.

The administration also says the immunity is warranted because the lawsuits threaten to expose government secrets.

The EFF brought the original spying lawsuit in 2006 against AT&T, and has since been joined by dozens of others targeting the nation's telecommunications companies.

The EFF's case, which has been consolidated with the others in the U.S. District Court of San Francisco, includes so-called whistle-blower documents from a former AT&T technician. The EFF claims the documents describe a secret room in an AT&T building in San Francisco that is wired to share raw internet traffic with the NSA.

The government sought to dismiss the original EFF case, and others that followed, on the grounds that they threatened to expose state secrets. Judge Walker has ruled against the government, saying the case could proceed.

The government appealed. But before the appeal was decided, Congress on July 9 gave the president the power to grant immunity to the carriers.

The EFF is now challenging the immunity legislation on the grounds that it seeks to circumvent the Constitution's separation of powers clause, as well as Americans' Fourth Amendment rights against unreasonable searches and seizures.

"The legislation is an attempt to give the president the authority to terminate claims that the president has violated the people's Fourth Amendment rights," the EFF's Cohn says. "You can't do that."

Two weeks ago, the administration told Walker in a court filing that the immunity legislation "represents the considered judgment of our nation's political branches that, in the unique historical circumstances following the 9/11 attacks, telecommunications companies should not bear the burden of defending against claims that those companies assisted the government in its efforts to detect and prevent further terrorist attacks."

Congress, the government continued, "concluded that those companies should not face further litigation if they provided such assistance pursuant to a court order or a written certification, directive or request from a senior government official, or did not provide the alleged assistance."

The immunity law allows the government to file a classified brief with Judge Walker activating immunity for a particular communication company. Walker then has little power to deny the request, unless the judge finds the immunity legislation is itself unconstitutional.

Oral arguments in Walker's courtroom are scheduled for 10 a.m. PST on Tuesday. Threat Level will cover the proceedings live.
http://blog.wired.com/27bstroke6/200...guin.html#more





BitTorrent: Register Report on Protocol Change is "Utter Nonsense"
Lincoln Spector

BitTorrent has slammed a report in The Register that suggests a planned protocol change could threaten the stability of the Internet.

According to blogger Richard Bennett, developers of the BitTorrent client uTorrent are reportedly taking steps that could slow gamers and voice-over-IP throughput, and even bring the Internet to a crawl. Writing for the The Register, Bennett described uTorrent's preference for the User Datagram Protocol (UDP) as a warning of slow times ahead.

As an Internet protocol, UDP is not as well-known as TCP, which has important traffic control features. Bennett says uTorrent's switch to UDP as its default peer-to-peer protocol could make the amount of ungovernable traffic could go through the roof. "By most estimates," according to Bennett, "P2P accounts for close to half of internet traffic today. When this traffic is immune to congestion control, the remaining half will stumble along at roughly a quarter of the bandwidth it has available today: half the raw bandwidth, used with half efficiency, by 95% of internet users. Oops."

ISPs could control the problem by slowing down UDP traffic, but Bennett argues that "such throttling will utterly destroy VoIP."

Is Bennett right? His article makes some pretty broad assumptions ("most [P2P downloaders] have a sense of entitlement where their etiquette gene should be") and offers few references. And as one Slashdot.org forum participant said of Bennett's article," the bottleneck for end users is typically the uplink on their last mile connection, so this probably won't bring the internet down or crash any ISPs, but it will make life worse for people sharing the connection."

When contacted by the Industry Standard, BitTorrent marketing manager Simon Morris described the Bennett's report as "utter nonsense," and said that the switch to uTP -- a UDP-based implementation of the BitTorrent protocol -- was intended to reduce network congestion. "It completely mischaracterizes what we're trying to do with uTP," Morris said in an email. "We're trying to roll out a protocol that is latency sensitive/performance neutral, NOT a greedy one that kills the internet."
http://www.thestandard.com/news/2008...utter-nonsense





BitTorrent Site Pwns Anti-Piracy Outfit
Ernesto

Anti-piracy organizations are known for their excellent lobbying skills. However, knowledge of the Internet and technology doesn’t seem to be a prerequisite. Recently the Lithuanian anti-piracy outfit changed its name, but forgot to register the new domain. It now belongs to the owner of one of the largest BitTorrent sites in the country.

There are a lot of BitTorrent users in Lithuania, and the two largest BitTorrent sites in the country, Torrent.lt and Linkomanija.net are in the top 20 of Lithuania’s most visited websites.

Of course, a country with plenty of ‘pirates’ has to have its own anti-piracy organization, and Lithuania is no different. The local anti-piracy outfit goes by the name ANVA, an acronym for ‘Antipiracines Veiklos Asociacija’. Their main targets are the local BitTorrent sites, which they have announced they will sue for millions in damages.

To use the word ‘Lithuania’ in a Lithuanian organization’s name requires government approval. Recently, ANVA changed its name to LANVA, after they succeeded in getting this authorization. This seal of approval may give the organization more credibility, but there is a small problem. They forgot to register the domain lanva.lt when they changed their name. Before, they were using anva.lt, but while they did make a new logo with the L included, registering a new domain didn’t come to mind.

Usually, mistakes like this can be easily overcome by paying a certain amount of money to the person who was smart enough to register the domain, but not this time. Kestas Ermanas, the owner of one of the largest BitTorrent sites in Lithuania, registered the domain as soon as he found out about the name change, and he is not planning to hand it over to his arch rival.

The domain Kestas bought currently displays the following message: “This is how it works. Whatever you sink, we build back up. Whomever you sue, ten new pirates are recruited. Wherever you go, we are already ahead of you. You are the past and the forgotten, we are the Internet and the future.”

LANVA has scheduled an emergency meeting next Thursday to discuss what they can do to get the lanva.lt domain in their possession. The chances that they will get the domain through a dispute are very slim though. There have been several cases in Lithuania where large companies sued owners of domain names, and they lost every single time.

This is not the first time that an anti-piracy organization has had a domain dispute with a BitTorrent site. October last year The Pirate Bay got hold of the domain name of IFPI, under which they wanted to launch the “International Federation of Pirate Interests.” The case was later lost by The Pirate Bay, but the fact that they acquired it in the first place is yet another example of the tech illiteracy of these organizations.
http://torrentfreak.com/bittorrent-s...outfit-081206/





Change.gov Set Free
Lawrence Lessig

Consistent with the values of any "open government," and with his strong leadership on "free debates" from the very start, the Obama team has modified the copyright notice on change.gov to embrace the freest CC license.

This is great news about a subject that's harder than it seems. One might well ask why is this an issue at all? The one thing copyright law is pretty good at is exempting works of the government from copyright protection. Why should the published work of a transition, or a President, be any different?

I don't think it should be, but I get why this is a hard issue. Whether or not one was free to republish works printed by the GPO, the freedom that digital technologies enables here is certainly enough to give one pause. I'm fine with the pause; I'd be happy to defend the freedom explicitly. But it is understandable that this is something that any administration would have to think through.

I'm glad the thought in this administration led to the right conclusion, so quickly, and in the midst of so much else going on.
http://lessig.org/blog/2008/12/changegov_set_free.html





DMCA Exemptions Desired to Hack iPhones, DVDs
Chris Soghoian

For copyright activists, Christmas comes but once every three years: a chance to ask Santa for a new exemption to the much-hated Digital Millennium Copyright Act's prohibitions against hacking, reverse engineering, and evasion of digital rights management (DRM) schemes protecting all kinds of digital works and electronic items.

Judging from the list of 19 exemptions requested this year, some in the cyberlaw community are thinking big. (Disclosure: One of the DMCA exemption requests was submitted on behalf of this blogger by Harvard University's Cyberlaw Clinic.)The requests include the right to legally jailbreak iPhones to use third-party software, university professors wishing to rip clips from DVDs for classroom use, YouTube users wishing to rip DVDs to make video mashups, a request to allow users to hack DRM protecting content from stores that have gone bankrupt or shut down, and a request to allow security researchers to reverse-engineer video games with security flaws that put end users at risk.

Electronic Frontier Foundation uber-lawyer Fred von Lohmann told Wired News earlier this week that the government "has repeatedly dismissed any consumer-oriented fair uses, such as making backup copies of DVDs or video games, as well as requests for exemptions to enable copying DVDs to laptops and portable devices." He also told them that the DMCA exemption process is "hopelessly broken."

That depressing outlook doesn't seem to have stopped Lohmann from co-authoring two significant requests to the copyright office for exemptions squarely targeted at members of the public.

The highlights
The 19 requests are too lengthy to blog, and so only the most noteworthy (to this blogger) have been presented here. Those wishing to read through the others can find all of the submitted exemption requests at the Copyright Office's Web site.

First, the EFF has asked that consumers be allowed to jailbreak or hack smartphones to run lawfully obtained third-party software on the devices. Such an exemption, if granted, would be great news for the estimated 1 million users who have hacked their iPhone, and risked the wrath of Steve Jobs as his engineers played cat-and-mouse to stop the jailbreaking. Such an exemption would also be fantastic news for Mozilla, which is currently prohibited by Apple's terms of service from bringing the popular Firefox browser to iPhone.

In the EFF's second request, the group has asked the Copyright Office to permit end users to circumvent the DRM protecting DVDs, for the purpose of creating noncommercial videos that fall squarely within the protections of fair use. While such circumvention is already trivially easy to do with tools such as Handbreak, it is technically illegal to do so. For the millions of YouTube users who remix and mash up snippets of copyrighted works (including Sen. John McCain), such an exemption would mean digital freedom.

In complementary filings, representatives from Duke University, the University at California at Berkeley, Middle Tennessee State University and the Library Copyright Alliance asked for a similar exemption for DVD ripping, but solely for professors who wish to create compilations of digital film clips for classroom use. A more limited professor exemption was granted back in 2006, but only for those teaching film studies. Both groups would like to see that exemption expanded to professors and K-12 teachers from all fields.

The Cyberlaw Clinic at Harvard University, representing this blogger, has asked the Copyright Office to allow end users to circumvent the DRM protecting music, video, software, and games in the event that a central authenticating server is shut down. This has happened several times in the past few years, including Microsoft's MSN Music Store, Google's Video store, Yahoo Music, and Wal-Mart. The team also asked that researchers be permitted to reverse engineer functioning DRM stores (such as Apple's iTunes) before any shuttering is announced, for good-faith documentation purposes.

Finally, Professor J. Alex Halderman has expanded his successful "Sony Rootkit" 2006 request, and has asked that security researchers be allowed to circumvent the DRM in digital works, software or games that create or exploit security vulnerabilities on the computers of end users. While his request is broad, the main focus is on DRM schemes such as SafeDisc and SecuROM, which are widely used in the video game industry (such as in Electronic Arts' Spore).

Next steps
During the next few months, the Copyright Office will allow members of the public to submit comments on the exemptions requested during this cycle. Later, in March, two public hearings will be held, in Washington, D.C., and California. There will likely be appearances by several public-interest groups and law school clinics speaking in support for their exemptions requests, while representatives from the recording, motion picture, and software industries are likely to show up to fight against such efforts to weaken the DMCA. At the very least, the hearings promise to be quite a spectacle.
http://news.cnet.com/8301-13739_3-10112046-46.html





Valve Says DRM is Stupid, But Microsoft Still Doesn't Get It
Ben Kuchera

Valve is a wonderfully open company—in many cases, direct questions sent to the publisher will be answered by a member of the creative team within hours. One gamer recently e-mailed Valve and asked why he saw EA's logo on a commercial for Left 4 Dead: he bought the game via Steam but didn't want to support EA after the Spore DRM debacle. He got a reply from a managing director at the company, Gabe Newell, that was to the point: EA only handles distribution for the physical product, and Valve thinks most DRM is "just dumb."

"Left 4 Dead is developed entirely by Valve. Steam revenue for our games is not shared with third parties. Around the world we have a number of distribution partners to handle retail distribution of our games (i.e. make discs and boxes). EA is one of those partners," Newell wrote. In other words, if you buy Left 4 Dead through Steam, EA doesn't see any of your money. This should be good news for gamers who want to slaughter some zombies but don't want to break their EA boycott.

Newell doesn't have kind words for the use of digital rights managements. "As far as DRM goes, most DRM strategies are just dumb. The goal should be to create greater value for customers through service value (make it easy for me to play my games whenever and wherever I want to), not by decreasing the value of a product (maybe I'll be able to play my game and maybe I won't)," he wrote. "We really really discourage other developers and publishers from using the broken DRM offerings, and in general there is a groundswell to abandon those approaches."

Buying Left 4 Dead on Steam supports Valve, not EA

It's easy for him to say; Steam is its own form of DRM, one that makes programs like SecuROM redundant. "You'd have to ask Valve for specific numbers," PC Gaming Alliance President Randy Stude told Ars, "but I believe piracy on Steam is very low." You can add games you obtained at retail to the Steam service to take advantage of its social networking features, but you need your CD key to do it; cracked games are out of luck. Don't assume that buying a game via Steam means escaping SecuROM however, as EA has included the program on some its own games that it has released via Steam, such as Crysis: Warhead.
If we don't kick you in the gut, can we punch you in the face?

Newell's take attracted the attention of others in the gaming industry. "I think the problem with DRM is not so much the particular method used, but the attitude behind it. It makes us feel like we're all being punished for the sins of the few," Microsoft's Games for Windows Community Manager Ryan Miller wrote on his blog. "It is also pretty clear that most DRM is not a problem for the pirates, just for the legitimate consumers. These two factors combine to make a ton of bad feelings on the consumer side."

This is an arguable sentiment: gamers do care about the method of DRM that is used. Programs such as SecuROM (which don't uninstall along with the game) and limits on the number of installations allowed anger PC gamers. When we reported on the use of SecuROM in Grand Theft Auto IV on the PC, many of our readers pledged not to buy the game on principle.

Miller addresses that controversy directly. "Rockstar has put an interesting twist on the much-maligned software by removing the install limits that have plagued other games, though the software still installs components that can be very difficult to remove should you want them off your hard drive," he wrote. "It seems like a reasonable compromise to me, but what do you think? Is the lack of install limits enough to overlook the installation of code you can't remove?"

This is the sort of question that may sound reasonable from Miller's point of view, but will enrage PC gamers. SecuROM serves no purpose other than to annoy legitimate customers, and a version of the game that lacks the program (and is superior for that) will be available to pirates as soon as the game is released, if not before. The fact that Rockstar won't limit installations, a new twist on DRM that has drawn bile from gamers and seemingly given pirates the high ground, doesn't excuse the use of SecuROM in the game.

While Steam is a step in the right direction, giving gamers the ability to play games on multiple systems without having to worry about losing discs or CD keys, some gamers have reported issues getting their games to work in offline mode, and worry about Valve shutting down the servers at some point in the future. Piracy is a complex issue with no easy answer, but what's clear is that gamers are less and less willing to put up with intrusive DRM technology in their games, but there doesn't seem to be much of a movement to lessen its use among game publishers.

What the industry has to understand is that gamers have the upper hand, as they can simply go to the torrents for a free version of each game that includes no DRM. Until publishers do more to welcome their legitimate customers as friends instead of treating them as potential pirates, piracy will continue to eat at profits and morale.
http://arstechnica.com/news.ars/post...nt-get-it.html





Microsoft Targets Windows XP Pirates

Criminal gangs create their own version of XP called Blue Edition
Mark Harris

Microsoft today announced legal action around the world against online auctioneers who allegedly orchestrated international marketing schemes and sold counterfeit software.

At the centre of its lawsuits is the so-called Blue Edition of Windows XP, a counterfeit version of Microsoft's aging operating system on CD.

In the UK, Microsoft began seven civil cases for alleged trademark infringement against traders on various internet auction sites for selling "high quality counterfeit" Windows and Office software.

Hundreds of buyers duped

Microsoft reckons that these sellers may have sold over 900 individual counterfeits to an estimated value of over £69,000.

Similar legal proceedings - 63 in all - were launched in the US, Germany, France, Argentina, Brazil, Canada, Colombia, the Dominican Republic, Japan, Mexico and New Zealand, emphasising the global nature of software piracy.

Despite the rampant sale of counterfeit and pirated software on internet auction sites, none of the actions Microsoft filed today have been brought against eBay or other auction sites.

In fact, says Microsoft, "Certain internet auction platforms, like eBay, proactively cooperate in the fight against counterfeiters."
http://www.techradar.com/news/softwa...pirates-490950





Forget Citigroup and Lehman, Puppet Show Needs a Bailout
Jennifer Steinhauer

There are many ways to measure California’s tanking economy: an 8.2 percent unemployment rate; a multibillion-dollar state budget gap; threatened endowments of the city’s museums, causing some cultural institutions to nearly default on mortgages; and the continued weakening of the Hollywood studio system. But the meltdown of the marionettes may say it all.

Near a freeway overpass on a decidedly scrappy edge of downtown Los Angeles is a marionette puppet theater that has enchanted children over nearly five decades, several recessions, two riots, at least four failed urban renewal plans and an earthquake or two.

The Bob Baker Marionette Theater’s shows, employing an eclectic selection of Mr. Baker’s 3,000 handmade puppets prancing about a shoebox-size theater perpetually decked out in gold garlands, are a staple of a Los Angeleno childhood. It is the cultural equivalent of the annual march by the nation’s third graders to the neighborhood firehouse.

But the struggling California economy and some bad business decisions by Mr. Baker have left the Bob Baker marionettes in a deep financial ditch, and Mr. Baker, a rather unheralded Hollywood legend, with an uncertain future. “We have all kinds of problems that have come up recently,” Mr. Baker said. “But we’re not going to close. We’re going to fight this out to the very bitter end.”

Over the last few months Mr. Baker, 84, has fallen $30,000 behind on his mortgage and lost a rent-paying tenant, while his two major sources of revenue have dried up. First, the public schools have reduced financing for field trips. And second, some of his lower-income parents, he said, unemployed and swimming in debt, are unable to come up with the $15-per-ticket admission.

“We’ve had quite a few people call who are losing their houses and have to cancel birthday parties,” he said.

In addition, Mr. Baker said, a few years ago he refinanced the theater’s mortgage to help pay for rising operating costs, and the mortgage payments have shot up. A business deal he made to improve his space went bad. He said he was negotiating with his lenders, and added ruefully, “I am more of an artist than a businessman.”

In a city where children’s movies are often screened in a Hollywood theater with white-glove popcorn service and the organic certifications of birthday cakes are debated at length on Web sites aimed at parents, Mr. Baker’s theater is a charming throwback.
As they have for generations, children gather in a circle on the floor of the 200-person capacity auditorium as Mr. Baker’s elaborately appointed marionettes scamper about to the sounds of old phonograph records, scratches and all. The theater is one of the few places in Los Angeles that routinely attracts racially and economically diverse groups of children.

A typical show requires about 15 workers, including 8 puppeteers, a lighting designer, a costume maker and ticket takers. There are usually two productions a year, one with a Christmas theme. The second show might be “Something to Crow About,” a barnyard spectacular; the Latin-flavored “Fiesta”; or a revue like “Bob Baker’s Musical World,” which might evolve over the season and employ a rotation of 100 or more puppets. Mr. Baker also performs puppet shows around Southern California for birthday parties and other events. The annual budget, Mr. Baker said, is about $360,000.

Victoria Hurley, 42, grew up in Los Angeles going to the shows, and now takes her children, who are 5 and 3. “They still serve the exact kind of ice cream with the exact same wooden spoon I got 30 years ago,” Mrs. Hurley said. “The quality of the entertainment has certainly held up fantastically, but I think the building could use some sprucing. It is almost like they haven’t even repainted. I personally think it is charming, but if I came from New York and brought my children I might feel otherwise.”

At a recent performance of “The Nutcracker,” an eclectic mix of Mr. Baker’s handmade puppets appeared, ranging from a Mouse King, resplendent in velvet, to what is perhaps best described as selections from the “Soul Train” collection, white leisure suits and gold trim included.

The marionettes are handled by Mr. Baker’s students, who spend a good year under his tutelage before they are allowed to don black clothing and work before an audience. As they moved through the room they occasionally dropped a puppet into the lap of a delighted toddler. As usual, the whole affair ended with a cup of vanilla ice cream handed to each child.

The shows are not exactly linear. The “Soul Train” marionettes, for example, are wedged into “The Nutcracker,” and the story seems oddly lacking in the middle section. But the focus is really on the puppets, in their glorious velvet and gossamer.

“There is a magic thing about a live puppet show,” Mr. Baker said recently. “I was watching the children just today and they were hugging the puppets, and then they always come up after me and ask me how they work. A lot of children who come here have never been to a live show and may never go to a live show again.”

The number of people whose careers as puppeteers Mr. Baker started is “amazing, at least a dozen professionally,” said Greg Williams, 51, a professional puppeteer who helps Mr. Baker with his road shows. “I started with him when I was 15, and was cleaning the party room. I went from there to doing the sets to the lights. One day a puppeteer wasn’t available, and I got shoved on the floor,” Mr. Williams said.

Mr. Baker “gets a lot of the neighborhood kids, and some of these kids who look like they would have no future are here entertaining and enjoying it,” Mr. Williams said. Mr. Baker still does many private birthday parties personally. “You get those Beverly Hills parents and you need to keep those people happy,” he added.

Mr. Baker, whose puppet passion began at an early age, has had an authentic Hollywood career — something not immediately evident given his modest site downtown.

He grew up in what is now Koreatown, in a house often full of actors and others from the “theatrical world,” Mr. Baker said, and graduated from Hollywood High School. When he was a little boy, his father took him to a holiday show at an area department store, which featured, as many store entertainments did in the early 20th century, puppets.

When he turned 7 he bought two puppets and soon started working the birthday party circuit. He said his first party was for Mervyn LeRoy, a producer and director for both Warner Brothers and MGM, which set off a word-of-mouth campaign. Years later he would perform at Liza Minnelli’s fourth birthday party. (And, keeping it in the family, a few years after that, he appeared in the 1954 Judy Garland film, “A Star Is Born,” conducting a marionette show.)

In the 1940s Mr. Baker worked as a puppet maker for George Pal, creator of the Puppetoons, whose movies and television credits include cult films like Edgar G. Ulmer’s “Bluebeard” (1944), the original “Star Trek” series and “Bewitched.”

Mr. Baker started his production company in 1949 with his business partner, Alton Wood (who died in 2001). It has remained one of the more well-known training grounds for puppet makers who have gone on to work in fantasy films.

But it is the theater, opened in 1960 in a warehouselike building, for which Mr. Baker is best known around town. The elaborate facade meant to suggest “Alice in Wonderland” is long gone, as are the evening performances, which Mr. Baker said faded after the 1965 Watts riots made people afraid to venture downtown at night. Weekends and shows for school groups — along with sales of puppets and movie work — have sustained him, and he hopes the doors of his theater will stay open.

“My mother used to say, ‘We can fall into a mud puddle and come up smelling like roses,’ ” Mr. Baker said. “We have gone through some pretty hard times, and I just have to see the light of day. We’re just going to make it.”
http://www.nytimes.com/2008/12/02/theater/02pupp.html





New Windows Worm Builds Massive Botnet

Half a million PCs infected, botnet still growing, says researcher
Gregg Keizer

The worm exploiting a critical Windows bug that Microsoft Corp. patched with an emergency fix in late October is being used to build a new botnet, a security researcher said today.

Ivan Macalintal, a senior research engineer with Trend Micro Inc., said that the worm, which his company has dubbed "Downad.a" -- it's called "Conficker.a" by Microsoft and "Downadup" by Symantec Corp. -- is a key component in a new botnet that criminals are creating.

"We think 500,000 is a ball park figure," said Macalintal when asked the size of the new botnet. "That's not as large as some, such as [the] Kraken [botnet], or Storm earlier, but it's still starting to grow."

Last week, Microsoft warned that the worm was behind a spike in exploits of a bug in the Windows Server service, which is used by the operating system to connect to network file and print servers. Microsoft patched the service with an emergency fix it issued Oct. 23, shortly after it discovered a small number of infected PCs in Southeast Asia.

However, the new worm is a global threat, said Macalintal. "This has real potential to do damage," he said. Trend Micro has spotted infected IP addresses on the networks of Internet service providers (ISPs) in the U.S., China, India, the Middle East, Europe and Latin America.

The worm first appeared about a week and a half ago, and began spreading in earnest just before Thanksgiving, he added.

Macalintal also said that it appears the botnet is being built by a new group of cyber-criminals, not one of the gangs that lost control of compromised computers when McColo Corp., a California hosting company, was yanked off the Internet. When McColo went offline, crooks lost access to the command-and-control servers which gave marching orders to some of the world's biggest botnets, including "Srizbi" and "Rustock."

One result of the McColo takedown was a temporary slump in spam; some message security vendors said last week that they had seen a sharp increase in spam as the hackers managed to regain control of their botnets.

Security experts, including those at Trend Micro, are coordinating efforts, said Macalintal, to pass along their lists of worm-infected PCs to ISPs, who have been asked to contact the computers' owners and urge them to clean their machines of the worm.

"But that's an uphill climb," admitted Macalintal.

Users who haven't applied the emergency patch -- labeled MS08-067 by Microsoft -- should do so as soon as possible, Macalintal said.
http://www.computerworld.com/action/...icleId=9121958





Hacker in Final Showdown to Avoid Extradition to US

Briton accused of biggest hack in US military history wins delay in judicial review
Bobbie Johnson,

The British man accused of hacking into US military computers will have his final showdown in the UK courts next month.

After almost four years of fighting extradition to the US as a result of what prosecutors have called "the biggest military computer hack of all time", Londoner Gary McKinnon will face a judicial review conducted by the high court on January 20.

McKinnon – who used the online name Solo – is accused of hacking into computers belonging to the Pentagon, Nasa and US armed forces in raids conducted between 2001 and 2002.

Prosecutors say he shut down thousands of machines and caused up to $700,000 worth of damage, while the 42-year-old claims he was searching for evidence of UFOs.

Over the course of the case, defence lawyers argued that McKinnon will face unduly harsh punishment for his actions and should instead face trial in the UK, since the alleged hacking attacks were conducted from a house in north London.

By the time the decision is made, it will be almost seven years since McKinnon ended his activities. During that time a succession of arguments have been made against his removal – including that he faces up to 60 years in prison or detention at Guantánamo Bay, and that he should receive leniency because he suffers from Asperger's syndrome.

Such protestations have so far proved unsuccessful, however, with a string of decisions against him, including rulings by the law lords and the home secretary. McKinnon's last chance to avoid removal to the US will come in next month's judicial review.

Prosecutors acting for the government argued that McKinnon's review should take place today but his lawyers succeeded in pushing it back until the new year.

The news brought cheer to some campaigners who see the date as an auspicious sign. Coinciding with the inauguration of Barack Obama as president, supporters at the Free Gary website suggested the date could be the equivalent of "waving a couple of fingers" at the Bush administration.

In recent months campaigners – including former home secretary David Blunkett have argued that McKinnon should be tried in the UK because of his medical condition.

His supporters are hopeful that they can sway the final judgment, particularly after Gordon Brown spoke about the case publicly for the first time last week and hinted that McKinnon may not end up in a US jail.

During prime minister's questions last week, Brown was asked about McKinnon's situation and said that existing conventions would enable him to serve any prison sentence in Britain, rather than in the US.

"The UK and the US are signatories to the Council of Europe convention on the transfer of sentenced persons, which enables a person found guilty in the United States of America to serve their sentence in the UK," he told MPs.
http://www.guardian.co.uk/technology...adition-hacker





Leaked Army Files Highlight Dangers of Peer-To-Peer
Ben Worthen

Organizations that have suffered data breaches usually rush to plug technology or policy holes that led to the loss of information, but trying to retrieve data that has already leaked can be a difficult task.

Once information is out, it’s hard to get back

Consider the case of an apparent data breach of Army soldiers’ names and personal information, the details of which were described in an August letter sent by then Sen. Joseph Biden to Pete Geren, secretary of the Army. The letter, which has been reviewed by The Wall Street Journal, mentions “files containing the personal identifying information of nearly 24,000 U.S. soldiers” that became publicly accessible through a so-called peer-to-peer network. “The files include full names and social security numbers” of the soldiers, the letter says.

The Army wouldn’t confirm or deny the existence of the files, and said it doesn’t comment on ongoing investigations or incidents. A spokeswoman replied in an email that the Army has taken steps in recent months to boost its security. However, there’s little it can do about information on computers the government doesn’t control; in that situation, “the Army can only ask the owner of a public site to remove the information,” she says in the email.

In this case the files—spreadsheets that appear to be lists of soldiers due for promotion—made their way to a peer-to-peer file-trading network, which lets people connect their computers directly to one another. People most commonly use these networks—examples include Limewire and BitTorrent—to swap music files or videos.

But in many cases the software used to connect to the network also makes available all the files on someone’s computer, such as bank statements or work documents. It’s not clear how the apparently leaked Army information reached the network, but one possible scenario is that someone in the military had stored the information on a home computer that was used to exchange files.

Businesses and other organizations are just starting to appreciate the risk these networks pose. For example, peer-to-peer networks were named on only a few ballots in a recent survey by the Ponemon Institute, a privacy think tank, asking security professionals to identify potentially-dangerous software. But it was considered the single greatest threat among the security pros that cited it.

This wouldn’t be the first time that military files have been available over peer-to-peer networks, says Robert Boback, chief executive of Tiversa Inc., a security company that specializes in peer-to-peer technology. He says that he’s come across many such documents in the past, although he declined to say whether this included the list mentioned in Mr. Biden’s letter.

The Army says that its policy forbids people from installing peer-to-peer software on Army-owned computers. Additionally, in May the Army stopped including social-security numbers and other personally-identifiable information on promotion lists. And in June, the Army developed a training program on the threat of information leaks and how to prevent them, which personnel will be required to take.

Breaches like this are preventable, says Bob Gourley, former chief information officer for the Defense Intelligence Agency. It requires investing in technology that would control who has access to certain information and strict enforcement of policies now in place. It requires effort, time and money. Unfortunately, organizations don’t seem willing to make that effort. “We’ve had 10 years of warning of how damning and dangerous this kind of activity can be,” he says. “Why is it still occurring when it doesn’t have to?”


Comments

Can you please stop oversimplifying everything?

Almost rarely, except if the program is a delicate trojan, do peer-peer files share “everything” on a computer. Instead, the idiot installs and then OPTs in to share particular folders — such as My Documents for everyone to use.
Comment by Sigh. - December 2, 2008 at 3:26 pm

Ben -
In the case of Bittorrent, there is no concept of sharing one of your folders (or accidentally sharing your whole hard drive). Instead, you explicitly download a file, and as you download it you also upload pieces of it to others. The “danger” you’re talking about does not apply to Bittorrent. Just because BitTorrent is a P2P application does not mean it creates these dangers. Skype is also a P2P application, and like BitTorrent it also does not create these dangers. You correctly do not mention Skype in your post. I wish you would amend or remove your reference to Bittorrent. I hope you can correct your article.
Best regards,
Simon Morris
VP Marketing
BitTorrent, Inc.
Comment by Simon Morris - December 2, 2008 at 3:33 pm
http://blogs.wsj.com/biztech/2008/12...-peer-to-peer/





Thieves Winning Online War
John Markoff

Internet security is broken, and nobody seems to know quite how to fix it.

Despite the efforts of the computer security industry and a half-decade struggle by Microsoft to protect its Windows operating system, malicious software is spreading faster than ever. The so-called malware surreptitiously takes over a PC and then uses that computer to spread more malware to other machines exponentially. Computer scientists and security researchers acknowledge they cannot get ahead of the onslaught.

As more business and social life has moved onto the Web, criminals thriving on an underground economy of credit card thefts, bank fraud and other scams rob computer users of an estimated $100 billion a year, according to a conservative estimate by the Organization for Security and Cooperation in Europe. A Russian company that sells fake antivirus software that actually takes over a computer pays its illicit distributors as much as $5 million a year.

With vast resources from stolen credit card and other financial information, the cyberattackers are handily winning a technology arms race.

“Right now the bad guys are improving more quickly than the good guys,” said Patrick Lincoln, director of the computer science laboratory at SRI International, a science and technology research group.

A well-financed computer underground has built an advantage by working in countries that have global Internet connections but authorities with little appetite for prosecuting offenders who are bringing in significant amounts of foreign currency. That was driven home in late October when RSA FraudAction Research Lab, a security consulting group based in Bedford, Mass., discovered a cache of half a million credit card numbers and bank account log-ins that had been stolen by a network of so-called zombie computers remotely controlled by an online gang.

In October, researchers at the Georgia Tech Information Security Center reported that the percentage of online computers worldwide infected by botnets — networks of programs connected via the Internet that send spam or disrupt Internet-based services — is likely to increase to 15 percent by the end of this year, from 10 percent in 2007. That suggests a staggering number of infected computers, as many as 10 million, being used to distribute spam and malware over the Internet each day, according to research compiled by PandaLabs.

Security researchers concede that their efforts are largely an exercise in a game of whack-a-mole because botnets that distribute malware like worms, the programs that can move from computer to computer, are still relatively invisible to commercial antivirus software. A research report last month by Stuart Staniford, chief scientist of FireEye, a Silicon Valley computer security firm, indicated that in tests of 36 commercial antivirus products, fewer than half of the newest malicious software programs were identified.

There have been some recent successes, but they are short-lived. On Nov. 11, the volume of spam, which transports the malware, dropped by half around the globe after an Internet service provider disconnected the Mycolo Corporation, an American firm with Russian ties, from the Internet. But the respite is not expected to last long as cybercriminals regain control of their spam-generating computers.

“Modern worms are stealthier and they are professionally written,” said Bruce Schneier, chief security technology officer for British Telecom. “The criminals have gone upmarket, and they’re organized and international because there is real money to be made.”

The gangs keep improving their malware, and now programs can be written to hunt for a specific type of information stored on a personal computer. For example, some malware uses the operating system to look for recent documents created by a user, on the assumption they will be more valuable. Some routinely watch for and then steal log-in and password information, specifically consumer financial information.

The sophistication of the programs has in the last two years begun to give them almost lifelike capabilities. For example, malware programs now infect computers and then routinely use their own antivirus capabilities to not only disable antivirus software but also remove competing malware programs. Recently, Microsoft antimalware researchers disassembled an infecting program and were stunned to discover that it was programmed to turn on the Windows Update feature after it took over the user’s computer. The infection was ensuring that it was protected from other criminal attackers.

And there is more of it. Microsoft has monitored a 43 percent jump in malware removed from Windows computers just in the last half year.

The biggest problem may be that people cannot tell if their computers are infected because the malware often masks its presence from antivirus software. For now, Apple’s Macintosh computers are more or less exempt from the attacks, but researchers expect Apple machines to become a larger target as their market share grows.

The severity of the situation was driven home not long ago for Ed Amaroso, AT&T’s chief security official. “I was at home with my mother’s computer recently and I showed her it was attacking China,” he said. “ ‘Can you just make it run a little faster?’ she asked, and I told her ‘Ma, we have to reimage your hard disk.’ ”

Beyond the billions of dollars lost in theft of money and data is another, deeper impact. Many Internet executives fear that basic trust in what has become the foundation of 21st century commerce is rapidly eroding. “There’s an increasing trend to depend on the Internet for a wide range of applications, many of them having to deal with financial institutions,” said Vinton G. Cerf, one of the original designers of the Internet, who is now Google’s “chief Internet evangelist.”

“The more we depend on these types of systems, the more vulnerable we become,” he said.

The United States government has begun to recognize the extent of the problem. In January, President Bush signed National Security Presidential Directive 54, establishing a national cybersecurity initiative. The plan, which may cost more than $30 billion over seven years, is directed at securing the federal government’s own computers as well as the systems that run the nation’s critical infrastructure, like oil and gas networks and electric power and water systems.

That will do little, however, to help protect businesses and consumers who use the hundreds of millions of Internet-connected personal computers and cellphones, the criminals’ newest target.

Despite new technologies that are holding some attackers at bay, several computer security experts said they were worried that the economic downturn will make computer security the first casualty of corporate spending cuts. Security gets hit because it is hard to measure its effectiveness, said Eugene Spafford, a computer scientist at Purdue University.

He is pessimistic. “In many respects, we are probably worse off than we were 20 years ago,” he said, “because all of the money has been devoted to patching the current problem rather than investing in the redesign of our infrastructure.”

The cyber-criminals appear to be at least as technically advanced as the most sophisticated software companies. And they are faster and more flexible. As software companies have tightened the security of the basic operating systems like Windows and Macintosh, attackers have moved on to Web browsers and Internet-connected programs like Adobe Flash and Apple QuickTime.

This has led to an era of so-called “drive-by infections,” where users are induced to click on Web links that are contained in e-mail messages. Cyber-criminals have raised the ability to fool unsuspecting computer users into clicking on intriguing messages to a high art.

Researchers note that the global cycle of distributing security patches inevitably plays to the advantage of the attacker, who can continually hunt for and exploit new backdoors and weaknesses in systems. This year, computer security firms have begun shifting from traditional anti-virus program designs, which are regularly updated on subscribers’ personal computers, to Web-based services, which can be updated even faster.

Security researchers at SRI International are now collecting over 10,000 unique samples of malware daily from around the global. “To me it feels like job security,” said Phillip Porras, an SRI program director and the computer security expert who led the design of the company’s Bothunter program, available free at www.bothunter.net.

“This is always an arm race, as long as it gets into your machine faster than the update to detect it, the bad guys win,” said Mr. Schneier.
http://www.nytimes.com/2008/12/06/te...6security.html





Who Protects The Internet?

This guest post is written by Matt Rutherford, Web Strategist and technology producer for Charlie Rose. Matt focuses on the macro themes affecting the internet and the wider world. You can read Matt’s previous guest post, Larry Lessig Defends Copyright, Loves Charlie Rose Remixes, here.

Who protects the internet? In part, it’s this man – General Kevin Chilton, US STRATCOM commander and the head of all military cyber warfare. We’re broadcasting an interview tonight with General Chilton, in which he discusses the threat of cyber warfare, along with his other remits of space warfare and the US nuclear deterrent. Chilton is fascinating, and amongst other things has been a NASA space shuttle pilot, logging over 700 hours in space. You can watch the full interview here (and it is embedded below).

The discussion with General Chilton brings to light a crucial question, however. Is the internet actually protected? The military remit is to defend the .mil networks, prevent online espionage, and develop offensive strike capabilities. But who’s protecting the rest? Given its integration with every aspect of our lives and economy, it’s surprising just how little we know about who defends our electronic nervous system.

The Threat

There’s copious discussion about exactly how vulnerable the US is to online attack. The alleged Russian DoS attacks on Estonia in 2007, and on Georgia this summer, highlighted the potential damage of state sponsored attacks. China has also been developing cyber warfare capabilities for some time, mounting online intelligence operations against Taiwan, and almost certainly against the US. The Chinese military has openly stated that it plans to be able to win an “informationized war” by the middle of this century. Russia, Israel and Romania are also alleged to have high-level cyber warfare capabilities.

This developing threat from state actors led Sami Saydjari, CEO of Cyber Defense LLC, to testify to the US House Committee of Homeland Security in 2007, saying:
Quote:
“The US is vulnerable to a strategically crippling cyber attack from nation-state-class adversaries.” Such an attack has the potential to turn the US “from being a superpower to a third-world nation practically overnight.”
I should point out that many have disputed the apocalyptic nature of Saydjari’s statement. Kevin Mitnick, the reformed hacker, noted in a recent phone call:

Quote:
“Could we face a mass DOS attack, as in Georgia and Estonia? I don’t think so. I think it would be more of a surveillance operation to get intelligence. Technically you could have a mass attack against the thirteen root nameservers around the world. But as for cyber war, I don’t think we’re at that point yet, I think it’s over-stated.”
Regardless of the impact of an offensive cyber attack, everyone appears to agree on the insidious danger from online intelligence gathering. Former counter-terrorism chief Richard Clarke eloquently summarized this in Foreign Policy recently:

Quote:
“People tend to think about attacks that change things—turn off power grids, or whatever. And while that’s possible, what is happening every day is quite devastating, even though it doesn’t have a kinetic impact and there are no body bags. What’s happening every day is that all of our information is being stolen. So, we pay billions of dollars for research and development, both in the government and the private sector, for engineering, for pharmaceuticals, for bioengineering, genetic stuff… and all that information gets stolen for one one-thousandth of the cost that it took to develop it.”
Who protects us?

The problem is that it isn’t clear who has the remit for comprehensive defense of the internet. The US military and intelligence agencies defend government networks and track targets online, both domestically and abroad. A new Bush-ordained funding boost in January this year will help them become more coordinated. However, as Richard Clarke goes on to note, “the problem is that much of what we need to protect is not in the U.S. government; it’s in our private companies and our private networks”.

The Department of Homeland Security’s National Cyber Security Division operates various public-private initiatives, such as the rather prosaic National Cyber Security Awareness Month. But beyond this, the general response appears highly fragmented with little grand oversight or public-private coordination. I emailed Jonathan Zittrain to ask his opinion on ‘who protects the internet’. He replied:

Quote:
“Basically no one. At most, a number of loose confederations of computer scientists and engineers who seek to devise better protocols and practices — unincorporated groups like the Internet Engineering Task Force and the North American Network Operators Group. But the fact remains that no one really owns security online, which leads to gated communities with firewalls — a highly unreliable and wasteful way to try to assure security.”
Hackers to the rescue?

When Obama appoints a white house CTO, there will at least be an official figurehead in charge of this matter. Proposed candidates for the role currently include Eric Schmidt, Steve Ballmer, Jeff Bezos and Julius Genachowski from IAC.

However, perhaps the future of internet security really lies in the hands of the community. Indeed, Jonathan Zittrain talked about ‘good hackers’ on our show in May, and he argues the importance of community policing in The Future of the Internet. The last few years of the internet have been about empowering the masses, and removing intermediary apparatus – so why not leverage the community to defend its cyber territory? The Week in Review is edited and published by Jack Spratts. Indeed, this is already happening, to a certain extent. Just look at Dan Kaminsky, a computer consultant who discovered a fundamental flaw in DNS, allowing him control over any website online. This flaw was astounding in what it gave access to – yet Dan Kaminsky didn’t turn to a government agency or organization, or abuse the hack himself. Instead he made a phone call to Paul Vixie, one of the creators of the BIND9 DNS routing software, and they assembled a team of civilians and private companies to resolve this apocalyptic vulnerability.

It will be interesting to see what happens from here. And whilst it’s certainly entertaining to envision vigilante hackers and rag-tag groups of high school kids overcoming nation states, I think there’s more serious matters at stake. The way that the internet community reacts and operates with state apparatus in defending against cyber threats will be a crucial indicator of our future society. How reliant are we on the nation-state to protect us? Will it ever be possible for internet communities to erode the relevance of the nation state? Or will the internet turn out to be just as Hobbesian as the real world has been?

Charlie Rose’s discussions with General Kevin Chilton and Jonathan Zittrain are available at our website, www.charlierose.com. Matt Rutherford can be reached at matt@charlierose.com.
http://www.techcrunch.com/2008/12/02...-the-internet/





Secret Geek A-Team Hacks Back, Defends Worldwide Web
Joshua Davis

How to Plug the Hole in the Internet

In June 2005, a balding, slightly overweight, perpetually T-shirt-clad 26-year-old computer consultant named Dan Kaminsky decided to get in shape. He began by scanning the Internet for workout tips and read that five minutes of sprinting was the equivalent of a half-hour jog. This seemed like a great shortcut—an elegant exercise hack—so he bought some running shoes at the nearest Niketown. That same afternoon, he laced up his new kicks and burst out the front door of his Seattle apartment building for his first five-minute workout. He took a few strides, slipped on a concrete ramp and crashed to the sidewalk, shattering his left elbow.

He spent the next few weeks stuck at home in a Percocet-tinged haze. Before the injury, he'd spent his days testing the inner workings of software programs. Tech companies hired him to root out security holes before hackers could find them. Kaminsky did it well. He had a knack for breaking things—bones and software alike.

But now, laid up in bed, he couldn't think clearly. His mind drifted. Running hadn't worked out so well. Should he buy a stationary bike? Maybe one of those recumbent jobs would be best. He thought about partying in Las Vegas ... mmm, martinis ... and recalled a trick he'd figured out for getting free Wi-Fi at Starbucks.

As his arm healed, the details of that Starbucks hack kept nagging at him. He remembered that he had gotten into Starbucks' locked network using the domain name system, or DNS. When someone types google .com into a browser, DNS has a list of exactly where Google's servers are and directs the traffic to them. It's like directory assistance for the Internet. At Starbucks, the port for the low-bandwidth DNS connection—port 53—was left open to route customers to the Pay for Starbucks Wi-Fi Web page.

So, rather than pay, Kaminsky used port 53 to access the open DNS connection and get online. It was free but super-slow, and his friends mocked him mercilessly. To Kaminsky that was an irresistible challenge. After weeks of studying the minutiae of DNS and refining his hack, he was finally able to stream a 12-second animated video of Darth Vader dancing a jig with Michael Flatley. (The clip paired the Lord of the Sith with the Lord of the Dance.)

That was more than a year ago, but it still made him smile. DNS was the unglamorous underbelly of the Internet, but it had amazing powers. Kaminsky felt drawn to the obscure, often-ignored protocol all over again.

Maybe the painkillers loosened something in his mind, because as Kaminsky began to think more deeply about DNS he became convinced that something wasn't right. He couldn't quite figure it out, but the feeling stuck with him even after he stopped taking the pain pills. He returned to work full time and bought a recumbent stationary bike. He got hired to test the security of Windows Vista before it was released, repeatedly punching holes in it for Microsoft. Still, in the back of his mind, he was sure that the entire DNS system was vulnerable to attack.

Then last January, on a drizzly Sunday afternoon, he flopped down on his bed, flipped open his laptop, and started playing games with DNS. He used a software program called Scapy to fire random queries at the system. He liked to see how it would respond and decided to ask for the location of a series of nonexistent Web pages at a Fortune 500 company. Then he tried to trick his DNS server in San Diego into thinking that he knew the location of the bogus pages.

Suddenly it worked. The server accepted one of the fake pages as real. But so what? He could now supply fake information for a page nobody would ever visit. Then he realized that the server was willing to accept more information from him. Since he had supplied data about one of the company's Web pages, it believed that he was an authoritative source for general information about the company's domain. The server didn't know that the Web page didn't exist—it was listening to Kaminsky now, as if it had been hypnotized.

When DNS was created in 1983, it was designed to be helpful and trusting—it's directory assistance, after all. It was a time before hacker conventions and Internet banking. Plus, there were only a few hundred servers to keep track of. Today, the humble protocol stores the location of a billion Web addresses and routes every piece of Internet traffic in the world.

Security specialists have been revamping and strengthening DNS for more than two decades. But buried beneath all this tinkering, Kaminsky had just discovered a vestige of that original helpful and trusting program. He was now face-to-face with the behemoth's almost childlike core, and it was perfectly content to accept any information he wanted to supply about the location of the Fortune 500 company's servers.

Kaminsky froze. This was far more serious than anything he could have imagined. It was the ultimate hack. He was looking at an error coded into the heart of the Internet's infrastructure. This was not a security hole in Windows or a software bug in a Cisco router. This would allow him to reassign any Web address, reroute anyone's email, take over banking sites, or simply scramble the entire global system. The question was: Should he try it?

The vulnerability gave him the power to transfer millions out of bank accounts worldwide. He lived in a barren one-bedroom apartment and owned almost nothing. He rented the bed he was lying on as well as the couch and table in the living room. The walls were bare. His refrigerator generally contained little more than a few forgotten slices of processed cheese and a couple of Rockstar energy drinks. Maybe it was time to upgrade his lifestyle.

Or, for the sheer geeky joy of it, he could reroute all of .com into his laptop, the digital equivalent of channeling the Mississippi into a bathtub. It was a moment hackers around the world dream of—a tool that could give them unimaginable power. But maybe it was best simply to close his laptop and forget it. He could pretend he hadn't just stumbled over a skeleton key to the Net. Life would certainly be less complicated. If he stole money, he'd risk prison. If he told the world, he'd be the messenger of doom, potentially triggering a collapse of Web-based commerce.

But who was he kidding? He was just some guy. The problem had been coded into Internet architecture in 1983. It was 2008. Somebody must have fixed it by now. He typed a quick series of commands and pressed enter. When he tried to access the Fortune 500 company's Web site, he was redirected to an address he himself had specified.

"Oh shit," he mumbled. "I just broke the Internet."

Paul Vixie, one of the creators of the most widely used DNS software, stepped out of a conference in San Jose. A curious email had just popped up on his laptop. A guy named Kaminsky said he'd found a serious flaw in DNS and wanted to talk. He sent along his phone number.

Vixie had been working with DNS since the 1980s and had helped solve some serious problems over the years. He was president of the Internet Systems Consortium, a nonprofit that distributed BIND 9, his DNS software. At 44, he was considered the godfather of DNS. If there was a fundamental error in DNS, he probably would have fixed it long ago.

But to be on the safe side, Vixie decided to call Kaminsky. He picked up immediately and within minutes had outlined the flaw. A series of emotions swept over Vixie. What he was hearing shouldn't be possible, and yet everything the kid said was logical. By the end of the third minute, Vixie realized that Kaminsky had uncovered something that the best minds in computer science had overlooked. This affected not just BIND 9 but almost all DNS software. Vixie felt a deep flush of embarrassment, followed by a sense of pure panic.

"The first thing I want to say to you," Vixie told Kaminsky, trying to contain the flood of feeling, "is never, ever repeat what you just told me over a cell phone."

Vixie knew how easy it was to eavesdrop on a cell signal, and he had heard enough to know that he was facing a problem of global significance. If the information were intercepted by the wrong people, the wired world could be held ransom. Hackers could wreak havoc. Billions of dollars were at stake, and Vixie wasn't going to take any risks.

From that moment on, they would talk only on landlines, in person, or via heavily encrypted email. If the information in an email were accidentally copied onto a hard drive, that hard drive would have to be completely erased, Vixie said. Secrecy was critical. They had to find a solution before the problem became public.

Andreas Gustafsson knew something was seriously wrong. Vixie had emailed the 43-year-old DNS researcher in Espoo, Finland, asking to talk at 7 pm on a hardwired line. No cell phones.

Gustafsson hurried into the freezing March evening—his only landline was the fax in his office a brisk mile walk away. When he arrived, he saw that the machine didn't have a handset. Luckily, he had an analog phone lying around. He plugged it in, and soon it let off an old-fashioned metallic ring.

Gustafsson hadn't spoken to Vixie in years, but Vixie began the conversation by reading aloud a series of numbers—a code that would later allow him to authenticate Gustafsson's emails and prove that he was communicating with the right person. Gustafsson responded with his own authenticating code. With that out of the way, Vixie got to his point: Find a flight to Seattle now.

Wouter Wijngaards got a call as well, and the message was the same. The Dutch open source programmer took the train to the airport in Amsterdam, got on a 10-hour flight to Seattle, and arrived at the Silver Cloud Inn in Redmond, Washington, on March 29. He had traveled all the way from Europe, and he didn't even know why. Like Gustafsson, he had simply been told to show up in Building Nine on the Microsoft campus at 10 am on March 31.

In the lobby of the Silver Cloud, Wijngaards met Florian Weimer, a German DNS researcher he knew. Weimer was talking with Chad Dougherty, the DNS point man from Carnegie Mellon's Software Engineering Institute. Wijngaards joined the conversation—they were trying to figure out where to have dinner. Nobody talked about why some of the world's leading DNS experts happened to bump into one another near the front desk of this generic US hotel. Vixie had sworn each of them to secrecy. They simply went out for Vietnamese food and avoided saying anything about DNS.

The next morning, Kaminsky strode to the front of the conference room at Microsoft headquarters before Vixie could introduce him or even welcome the assembled heavy hitters. The 16 people in the room represented Cisco Systems, Microsoft, and the most important designers of modern DNS software.

Vixie was prepared to say a few words, but Kaminsky assumed that everyone was there to hear what he had to say. After all, he'd earned the spotlight. He hadn't sold the discovery to the Russian mob. He hadn't used it to take over banks. He hadn't destroyed the Internet. He was actually losing money on the whole thing: As a freelance computer consultant, he had taken time off work to save the world. In return, he deserved to bask in the glory of discovery. Maybe his name would be heralded around the world.

Kaminsky started by laying out the timeline. He had discovered a devastating flaw in DNS and would explain the details in a moment. But first he wanted the group to know that they didn't have much time. On August 6, he was going to a hacker convention in Las Vegas, where he would stand before the world and unveil his amazing discovery. If there was a solution, they'd better figure it out by then.

But did Kaminsky have the goods? DNS attacks were nothing new and were considered difficult to execute. The most practical attack—widely known as cache poisoning—required a hacker to submit data to a DNS server at the exact moment that it updated its records. If he succeeded, he could change the records. But, like sperm swimming toward an egg, whichever packet got there first—legitimate or malicious—locked everything else out. If the attacker lost the race, he would have to wait until the server updated again, a moment that might not come for days. And even if he timed it just right, the server required a 16-bit ID number. The hacker had a 1-in-65,536 chance of guessing it correctly. It could take years to successfully compromise just one domain.

The experts watched as Kaminsky opened his laptop and connected the overhead projector. He had created a "weaponized" version of his attack on this vulnerability to demonstrate its power. A mass of data flashed onscreen and told the story. In less than 10 seconds, Kaminsky had compromised a server running BIND 9, Vixie's DNS routing software, which controls 80 percent of Internet traffic. It was undeniable proof that Kaminsky had the power to take down large swaths of the Internet.

The tension in the room rose as Kaminsky kept talking. The flaw jeopardized more than just the integrity of Web sites. It would allow an attacker to channel email as well. A hacker could redirect almost anyone's correspondence, from a single user's to everything coming and going between multinational corporations. He could quietly copy it before sending it along to its original destination. The victims would never know they had been compromised.

This had serious implications. Since many "forgot my password" buttons on banking sites rely on email to verify identity, an attacker could press the button, intercept the email, and change the password to anything he wanted. He would then have total access to that bank account.

"We're hosed," Wijngaards thought.

It got worse. Most Internet commerce transactions are encrypted. The encryption is provided by companies like VeriSign. Online vendors visit the VeriSign site and buy the encryption; customers can then be confident that their transactions are secure.

But not anymore. Kaminsky's exploit would allow an attacker to redirect VeriSign's Web traffic to an exact functioning replica of the VeriSign site. The hacker could then offer his own encryption, which, of course, he could unlock later. Unsuspecting vendors would install the encryption and think themselves safe and ready for business. A cornerstone of secure Internet communication was in danger of being destroyed.

David Ulevitch smiled despite himself. The founder of OpenDNS, a company that operates DNS servers worldwide, was witnessing a tour de force—the geek equivalent of Michael Phelps winning his eighth gold medal. As far as Ulevitch was concerned, there had never been a vulnerability of this magnitude that was so easy to use. "This is an amazingly catastrophic attack," he marveled with a mix of grave concern and giddy awe.

It was a difficult flight back to San Francisco for Sandy Wilbourn, vice president of engineering for Nominum, a company hired by broadband providers to supply 150 million customers with DNS service. What he heard in Redmond was overwhelming—a 9 out of 10 on the scale of disasters. He might have given it a 10, but it was likely to keep getting worse. He was going to give this one some room to grow.

One of Wilbourn's immediate concerns was that about 40 percent of the country's broadband Internet ran through his servers. If word of the vulnerability leaked, hackers could quickly compromise those servers.

In his Redwood City, California, office, he isolated a hard drive so no one else in the company could access it. Then he called in his three top engineers, shut the door, and told them that what he was about to say couldn't be shared with anyone—not at home, not at the company. Even their interoffice email would have to be encrypted from now on.

Their task: Make a change to the basic functioning of Nominum's DNS servers. They and their customers would have to do it without the usual testing or feedback from outside the group. The implementation—the day the alteration went live to millions of people—would be its first real-world test.

It was a daunting task, but everyone who had been in Redmond had agreed to do the same thing. They would do it secretly, and then, all together on July 8, they would release their patches. If hackers didn't know there was a gaping DNS security hole before, they would know then. They just wouldn't know exactly what it was. Nominum and the other DNS software vendors would have to persuade their customers—Internet service providers from regional players such as Cablevision to giants like Comcast—to upgrade fast. It would be a race to get servers patched before hackers figured it out.

Though the Redmond group had agreed to act in concert, the patch—called the source port randomization solution—didn't satisfy everyone. It was only a short-term fix, turning what had been a 1-in-65,536 chance of success into a 1-in-4 billion shot.

Still, a hacker could use an automated system to flood a server with an endless stream of guesses. With a high-speed connection, a week of nonstop attacking would likely succeed. Observant network operators would see the spike in traffic and could easily block it. But, if overlooked, the attack could still work. The patch only papered over the fundamental flaw that Kaminsky had exposed.

On July 8, Nominum, Microsoft, Cisco, Sun Microsystems, Ubuntu, and Red Hat, among many others, released source port randomization patches. Wilbourn called it the largest multivendor patch in the history of the Internet. The ISPs and broadband carriers like Verizon and Comcast that had been asked to install it wanted to know what the problem was. Wilbourn told them it was extremely important that they deploy the patch, but the reason would remain a secret until Kaminsky delivered his talk in Las Vegas.

Even as Kaminsky was giving interviews about the urgency of patching to media outlets from the Los Angeles Times to CNET, the computer security industry rebelled. "Those of us ... who have to advise management cannot tell our executives 'trust Dan,'" wrote one network administrator on a security mailing list. On one blog, an anonymous poster wrote this to Kaminsky: "You ask people not to speculate so your talk isn't blown but then you whore out minor details to every newspaper/magazine/publishing house so your name can go all over Google and gain five minutes of fame? This is why people hate you and wish you would work at McDonald's instead."

With a backlash building, Kaminsky decided to reach out to a few influential security experts in hopes of winning them over. He set up a conference call with Rich Mogull, founder of Securosis, a well-respected security firm; researcher Dino Dai Zovi; and Thomas Ptacek, a detractor who would later accuse Vixie and Kaminsky of forming a cabal.

The call occurred July 9. Kaminsky agreed to reveal the vulnerability if Mogull, Dai Zovi, and Ptacek would keep it secret until the Vegas talk August 6. They agreed, and Kaminsky's presentation laid it out for them. The security experts were stunned. Mogull wrote, "This is absolutely one of the most exceptional research projects I've seen." And in a blog post Ptacek wrote, "Dan's got the goods. It's really f'ing good."

And then, on July 21, a complete description of the exploit appeared on the Web site of Ptacek's company. He claimed it was an accident but acknowledged that he had prepared a description of the hack so he could release it concurrently with Kaminsky. By the time he removed it, the description had traversed the Web. The DNS community had kept the secret for months. The computer security community couldn't keep it 12 days.

About a week later, an AT&T server in Texas was infiltrated using the Kaminsky method. The attacker took over google.com—when AT&T Internet subscribers in the Austin area tried to navigate to Google, they were redirected to a Google look-alike that covertly clicked ads. Whoever was behind the attack probably profited from the resulting increase in ad revenue.

Every day counted now. While Kaminsky, Vixie, and the others pleaded with network operators to install the patch, it's likely that other hacks occurred. But the beauty of the Kaminsky attack, as it was now known, was that it left little trace. A good hacker could reroute email, reset passwords, and transfer money out of accounts quickly. Banks were unlikely to announce the intrusions—online theft is bad PR. Better to just cover the victims' losses.

On August 6, hundreds of people crammed into a conference room at Caesars Palace to hear Kaminsky speak. The seats filled up quickly, leaving a scrum of spectators standing shoulder to shoulder in the back. A group of security experts had mockingly nominated Kaminsky for the Most Overhyped Bug award, and many wanted to know the truth: Was the massive patching effort justified, or was Kaminsky just an arrogant, media-hungry braggart?

While his grandmother handed out homemade Swedish lace cookies, Kaminsky took the stage wearing a black T-shirt featuring an image of Pac-Man at a dinner table. He tried for modesty. "Who am I?" he asked rhetorically. "Some guy. I do code."

The self-deprecation didn't suit him. He had the swagger of a rock star and adopted the tone of a misunderstood genius. After detailing the scope of the DNS problem, he stood defiantly in front of a bullet point summary of the attack and said, "People called BS on me. This is my reply."

By this time, hundreds of millions of Internet users were protected. The bomb had been defused. The problem was, there was little agreement on what the long-term solution should be. Most discussion centered around the concept of authenticating every bit of DNS traffic. It would mean that every computer in the world—from iPhones to corporate server arrays—would have to carry DNS authentication software. The root server could guarantee that it was communicating with the real .com name server, and .com would receive cryptological assurance that it was dealing with, say, the real Google. An impostor packet wouldn't be able to authenticate itself, putting an end to DNS attacks. The procedure is called DNSSEC and has high-profile proponents, including Vixie and the US government.

But implementing a massive and complicated protocol like DNSSEC isn't easy. Vixie has actually been trying to persuade people for years, and even he hasn't succeeded. Either way, the point might turn out to be moot. Kaminsky ended his Las Vegas talk by hinting that even darker security problems lay ahead. It was the type of grandstanding that has made him a polarizing figure in the computer security community. "There is no saving the Internet," he said. "There is postponing the inevitable for a little longer."

Then he sauntered off the stage and ate one of his grandma's cookies.
http://www.wired.com/techbiz/people/...urrentPage=all





Apple Recommends Security Software for Mac Owners
Barry Collins

After years of boasting about the Mac's near invincibility, Apple is now advising its customers to install security software on their computers.

Apple - which has continually played on Windows' vulnerability to viruses in its advertising campaigns - issued the advice in a low-key message on its support forums.

"Apple encourages the widespread use of multiple antivirus utilities so that virus programmers have more than one application to circumvent, thus making the whole virus writing process more difficult," the the support message reads.

It goes on to recommend a handful of products to Mac owners, including Intego VirusBarrier X5, Norton Anti-Virus 11 for Macintosh and McAfee VirusScan for Mac.

Apple has continually played down the threat of viruses on the Mac platform. One of the first adverts in its "I'm a Mac, I'm a PC" campaign focused entirely on viruses.

"Last year there were 114,000 known viruses for PCs," the PC character said in the advert. "PCs, not Macs," the Mac character replied.

Even today, on the Get a Mac FAQ, the company claims: "Mac OS X resists most viruses, so you can do anything - without worrying about losing everything." It does go on to concede that "no computer connected to the internet is 100% immune to viruses and spyware."

Whilst the Mac platform is without doubt a lesser target for virus writers, the company may have been spurred into its security software recommendation by the growing trends towards web exploits that target cross-platform browsers, including Apple's own Safari.
http://www.pcpro.co.uk/news/240255/a...ac-owners.html





Report: Hard Drive Shipments Slumping

iSuppli's 'optimistic' outlook shows HDD sales flat in Q4
Lucas Mearian

Worldwide shipments of hard disk drives (HDD) used in PCs and other consumer electronics gear will be flat or could even decline in the fourth quarter of 2008 compared to last quarter, according to iSuppli Corp.

At the same time, iSuppli is estimating that solid state disk (SSD) drives shipped over the next year will leap 6x from 3.2 million this year to about 18.9 million next year and will produce $1.4 billion in revenue in 2009 compared to $163 million this year. By 2012, iSupply is estimating SSD sales will produce $9.3 billion in revenue from 88.6 million units shipped.

ISuppli's "pessimistic outlook" for hard drive shipments estimates that as few as 149.4 million units will go out during the current quarter, a 10% sequential drop. ISuppli's more optimistic outlook calls for global HDD shipments of 157.5 million units in the quarter ending Dec. 31, basically flat compared to the 158.3 million units shipped in the third quarter. If that forecast holds true, overall HDD shipments for 2008 would total 593.2 million units, up 14.9% compared to the 516.2 million units shipped in 2007, iSuppli said.

Krishna Chander, a storage analyst at iSuppli, said her company considers the optimistic sales forecast more accurate because it is in line with sales predictions from leading hard drive makers, such as Seagate Technology LLC and Western Digital Corp. (WDC). Seagate in October predicted the HDD industry would ship 156 million units in the fourth quarter; WDC's outlook, when extrapolated, amounts to about 161.7 million.

"OEMs that traditionally purchase more components in the fourth quarter are reducing their procurement budgets or are buying with low incoming inventory -- resulting in reduced pricing for HDDs," Chander said.

In September, iSuppli forecast HDD shipments would rise 4.9% sequentially in the fourth quarter and 16.6% for all of 2008. Next year will bring even greater uncertainty, according to iSuppli. HDD unit sales growth is predicted to range from 4.3% to 6.8% above 2008 levels.

The average selling price of an HDD is also expected to drop sharply next year, iSuppli stated. HDDs are expected to sell for about $58 in the second quarter of 2009 before recovering to the near $60 range late in the fourth quarter. Those prices reflect an average of all HDDs regardless of size. "This weak pricing represents a drag on the HDD industry as a whole, one that will make it harder to cut a profit," iSuppli stated.
http://www.computerworld.com/action/...&intsrc=kc_top





In Deal With Hitachi, Intel Will Expand Its Flash Memory Business
Ashlee Vance

Intel, the world’s largest chip maker, records most of its profit from its core business, the microprocessors that serve as the brains of most computers. But the company’s side venture in flash memory — which is used to store songs on digital music players and photos on digital cameras — has been another story.

Although Intel does not disclose financial details of the business, flash-based storage is an intensely competitive industry, with specialty companies like SanDisk and giant electronics makers like Samsung and Toshiba battling for market share amid eroding prices of the underlying high-speed memory. Some shareholders have been pushing Intel to exit that low-margin business, which it operates through a joint venture with Micron.

But Intel is taking a different approach. On Tuesday, it will announce a deal with Hitachi to become the sole supplier of flash memory for Hitachi’s forthcoming line of high-end solid-state computer drives intended for computer servers and storage systems. Intel and Hitachi also plan to share research and development costs.

Although solid state drives are expensive, they are faster, tougher and more energy-efficient than traditional drives with spinning disks. Intel and the other players are hoping the drives will become popular for data-center computers used by corporate customers — potentially a more profitable market than the consumer laptops where the solid state drives are mostly used now.

“We believe this combination spreads out the risk and gives the venture the highest probability for success,” said Troy Winslow, a director of marketing at Intel.

Hitachi Global Storage Technologies, formed in 2003 after Hitachi acquired I.B.M.’s storage business, is the third-largest seller of hard disk drives, trailing Seagate Technology and Western Digital. As such, it has deep ties to the server and storage makers, whose corporate customers have often been more willing to pay a premium for higher-performance technologies, like flash drives.

Intel and Hitachi plan to release their first drives in the early part of 2010, making them late to the market. STEC, a company that sells solid state drives, will ship products valued at $50 million to business customers this year, according to its chief executive, Manouch Moshayedi. Samsung is the other leading seller of solid state drives.

Hardware makers like EMC and Sun Microsystems are just beginning to introduce products based on solid state drives. Analysts expect sales of the new drives to accelerate sharply in 2010 and 2011.

“What Intel doesn’t want is another company like Intel dominating the memory business,” said David Wu, an analyst with Global Crown Capital. “They desire anything that weakens Samsung’s presence in storage.”
http://www.nytimes.com/2008/12/02/te...y/02intel.html





Too Good to Ignore: 6 Alternative Browsers

Internet Explorer, Firefox and Safari lead the market, but there are other browsers out there for PC and Mac users. Which are better?
Michael DeAgonia, Ryan Faas and Preston Gralla

When Microsoft, Mozilla or Apple comes out with a new version of Internet Explorer, Firefox or Safari, it makes news -- mainly because most of us use one or more of these three Web browsers. In fact, with the exception of Google's Chrome (which made a big splash, mostly because it came from Google), most of the alternative browsers out there tend to get lost in the shuffle.

And it's too bad, because some of these relatively unknown browsers are good -- and could be better for some users than the ones they're using now. We asked three of our writers to take some lesser-known browsers out for a spin and see how they do.

They chose six candidates: Camino (for the Mac), Maxthon (for the PC), OmniWeb (for the Mac), Opera (both the Mac and the PC versions) and Shiira (for the Mac). Which is the best? It all depends on what you need from a browser.

For example, Camino is for those who want a simple, basic browser, while Maxthon is overflowing with every power feature in the book. OmniWeb offers speed and an interesting approach to tabbing (but, at a base price of $14.95, is the only browser in this roundup that isn't free), while Opera brings with it a number of features it has pioneered over the years, along with a strong fan base. Finally, Shiira has an interface that is more Mac than Apple's own Safari.

It's possible that none of these will do what you need better than the browser you're already using. But as we all know, sometimes you have to step outside of the tried and true in order to find something really great.

Check these browsers out -- one of them may work for you.

Camino 1.6.4

Camino, an open-source browser based on Mozilla's Gecko rendering engine, is clearly designed to be a simple, easy-to-use, yet fully functional browser. With a look and feel very similar to Safari and Firefox, almost anyone will find it easy to work with in seconds; I found myself completely at home with Camino from the second I launched it.

One major difference between Camino and Firefox is that Camino was designed and programmed specifically for the Mac instead of ported over as Firefox was (so it's less likely to "feel" like a Windows application). In addition, one gets the impression that the developers of Camino didn't try to duplicate all the features of Firefox and focused on the core browsing functionality, which probably results in leaner code overall and thereby increased performance and stability.

At a Glance
Camino 1.6.4

The Camino Project
Price: Free

Pros: Designed for the Mac, straightforward design, stable

Cons: Standard feature set

Camino isn't big on flashy features. It does have a few that, while not unique, are nice to have. For example, Camino lets you save the URLs for all pages currently opened in tabs as a set that re-opens all of them -- in the same positions. This is a pretty nifty feature if you repeatedly open the same set of pages every morning when checking sites (or if you use a number of Web-based applications every day).

Beyond that, the features and preferences options are pretty standard browser fare, though I do have to commend Camino's developers for including a Web features tab in the browser's preferences that includes the options to block Flash animations and advertising as well as to prevent Web animations from repeating.

Given that many Web browsers now try to implement too many features, some of which are better left to separate applications (RSS being a common example, which Camino eschews), I found Camino's straightforward focus refreshing. The approach leads to a simple design that implements the core features in an uncluttered fashion. Combined with the Web features options that put a user in control of just how much distracting Web content he wants to see, I couldn't help thinking that this would be the perfect browser for people like my father -- you know, the type of person who wants a cell phone that's nothing more than a phone.

Since Camino keeps its feature set small and targeted, I was not surprised to find it to be very stable; it renders content both well and quickly. As with Shiira, Camino handled Flash, scripting and other complex Web technologies very well. When I compared it to Safari, Firefox and Shiira on the Mac, it outperformed those other browsers in rendering some pages. Sites heavy with Flash content and animations, in particular, seemed to load, render and function faster when I used Camino.

I should note that some Camino add-ons are available. Like the add-ons available for Firefox, these tools offers various capabilities, from backing up bookmarks to changing the look using themes or skins, though the choices for Camino are more limited.

All in all, Camino is probably not the perfect browser for everyone. If you're looking for a more full-featured browser, you may want to opt for Firefox, Safari or Shiira. But if you want a stable, simple and no-nonsense Web browser (or one that can easily limit distracting content) Camino is a good choice.

-- Ryan Faas

Maxthon 2.1.4

If you're looking for a browser that bristles with power features, and don't mind a somewhat unattractive interface and some confusing configuration, then Maxthon is the browser for you. It's got just about every feature built into competing browsers, and many that you won't find anywhere else -- such as a "file sniffer" that makes it easy to download YouTube videos and a pop-up notepad for pasting or dragging text you want to save. Power users will love it. Those who like sleek design will turn away.

The interface is quite cluttered, with a file menu, Address Bar, Favorites Bar and other toolbars, and stray icons near the top and bottom of the screen. Think of it as the un-Chrome. But there's a reason for the clutter: The browser has so many features, they need to fit somewhere. And you can customize the interface, if you like, to cut down on the clutter.

Maxthon has far too many features to cover in a short review, but among my favorites is its great tab and window handling. You can, for example, create two side-by-side browser instances, each with their own tabs; you can create tab groups; you can "tear off" a tab into a separate browser instance and then recombine it; you can assign a shortcut key to any URL and visit that URL just by pressing the key -- and that's just for a start.

The browser also uses "mouse gestures," so that you can navigate forward, backward and so on by moving your mouse in a certain way. It has a great tool for filling out Web forms, a built-in screen capture tool, and an innovative search screen that lets you do a search and then click on tabs in that screen to see the results from various search engines. And there's a CPU Saver mode that minimizes Maxthon's processor use, freeing up your CPU for other tasks.

At a Glance
Maxthon 2.1.4

Maxthon International Ltd.
Price: Free

Pros: Lots of power features

Cons: Cluttered interface, confusing configuration

All that is to the good, but there are some problems, mostly because Maxthon uses the same Trident rendering engine used by Internet Explorer. For example, click Tools --> Internet Options, and you'll come to a familiar tabbed Internet Options screen. In fact, it looks like the screen for changing Internet Explorer's options -- because that's exactly what it is.

There's far more than all this, and there are plug-ins available as well. You simply won't find a browser with more features.

In fact, when you make a change to the Maxthon Internet Options screen, you'll also make changes to Internet Explorer. And while this screen has an option for setting your home page, it won't work for Maxthon -- you need to select Tools --> Maxthon Setup Center and make your changes there. I contacted Maxthon, and a rep told me that the Options screen is used to control the Trident rendering engine only, and doesn't affect other Maxthon options such as setting the home page.

Still, if you're a power user, you can get used to those eccentricities. If you're looking for the most features in a browser, live with Maxthon a while, and you may learn to love it.

-- Preston Gralla

OmniWeb 5.8

OmniWeb has been around longer than Mac OS X, dating back to the NeXT platform of the 1990s. Throughout its history, OmniWeb has always been an excellent citizen of technologies specific to the NeXT -- and later, OS X -- platform, and the polish shows through in even minor details.

Even though OmniWeb was one of the first native browsers to grace OS X, with an interface that has remained top-notch, it has faced rivals such as Firefox and Camino that are powered by speedy Gecko-based rendering engines -- not to mention Apple's own Safari browser, which has been integrated with OS X since 2003. That's kept OmniWeb's browser share limited to a fairly small audience. However, the advances seen in OmniWeb since its rendering engine revamp in 2004 may mean it's time for surfers to give this browser another serious look.

OmniWeb, now at Version 5.8, is easily one of the best examples of a properly implemented interface on the Mac today. The Omni Group has always taken care to make sure that its products feel like native Mac applications instead of ports from other platforms, and the attention to detail makes using OmniWeb a joy.

Some of OmniWeb's best features include extensive (if not zealous) ad-blocking, auto-saved Web browsing sessions and site-specific preferences. From the unique tab drawer -- more on this later -- to support for browsing Web pages using OS X's built-in Speech Recognition, OmniWeb's embrace of Mac-specific technologies wrapped in a clean and uncluttered interface makes the product a delightful browser alternative.

At a Glance
OmniWeb 5.8

The Omni Group
Price: $14.95

Pros: Feels like a native Mac application, excellent feature set, good performance

Cons: Not free

It renders Web pages quickly, easily on par with the fastest of the competition, right up there with Safari and Firefox. That's significant because rendering speeds used to be a major source of disappointment, something that changed with Omni Group's embrace of Apple's own open-source WebKit frameworks. WebKit is used by Apple itself in several of its software packages -- Mail, Safari and Dashboard, to name a few -- and the Omni Group's adoption of this technology allowed it to focus on designing an elegant user interface instead of worrying about updating its rendering engine with every new Web standard.

Among the interface niceties is the aforementioned tab drawer. Instead of offering up a layout like its competitors -- with small tabs displayed horizontally near the address field -- OmniWeb shows a resizable window pane attached to the browser. The pane, which can be displayed on the right or left side of the main browser window, previews tabs as mini-Web pages rendered in real time. The real-time page rendering allows you to skip on to other sites when one is loading slowly, while still keeping an eye on the site's progress.

OmniWeb may be the most properly implemented interface on the Mac.
Click to view larger image

OmniWeb's user experience is top-notch and Mac-like -- something that can't be said about competitors like Firefox -- but that experience comes at a price. At a time when most Web browsers are free, a license for OmniWeb 5.8 costs $14.95, while an upgrade license from earlier versions costs $4.95.

Even if you don't want to pay for a browser, I still recommend downloading the software and taking it for a free 30-day test run. The thought of paying for a browser probably won't sit well with those accustomed to free alternatives -- especially since the alternatives themselves are good -- but after using OmniWeb for a few days, you might decide it's worth the price.

-- Mike DeAgonia

Opera 9.6

Opera is a Windows-based browser that has been ported to many different platforms, including most Unix variants such as Mac OS X and Linux/FreeBSD/Solaris; cell phone operating systems, including Windows Mobile, PalmOS, BlackBerry OS, and even the popular Wii gaming station. But despite its ubiquitous nature, Opera has so far only captured 2% of the browser market. That's something of a surprise, because it isn't as though this browser lacks ability or features.

Version 9.6 for Macintosh is a fast, option-laden browser that represents a formidable entry in an extremely competitive product category. Opera uses its own proprietary rendering engine called Presto to display Web content; this engine is almost as capable at rendering code as the Gecko engine used by Firefox and Camino, and nearly as fast as Safari and OmniWeb's WebKit engine. In fact, there were some sites that Gecko had trouble rendering accurately, but Opera displayed most sites properly.

There are many things to like about Opera, including customizable skins, live preview of Web pages when you mouse over tabs and a welcome full-screen mode -- especially useful for recent Windows converts who are accustomed to viewing Web pages using every bit of screen real estate possible.

One of Opera's standout features is the Speed Dial startup page. Speed Dial lets you customize a page with up to nine different sites, with each site's content displayed in miniaturized format. Clicking on the mini-page brings up the site in a full browser window.

At a Glance
Opera 9.6

Opera Software ASA
Price: Free

Pros: Fast, very customizable, Speed Dial feature

Cons: Cluttered interface

Another Opera plus is the extensive search engine support built into the browser. As well as the usual suspects like Google and Yahoo, Opera also supports Ask, Wikipedia, eBay and Yahoo Shopping. Interestingly enough, Opera also supports Bit Torrent searching and downloads, as this browser doubles as a Bit Torrent client.

Opera also offers support for widgets. Although similar in function to those found in Mac OS X, Opera's widgets are freed from the restraints of the Dashboard, instead floating on the desktop like any application window.

The Opera interface is a little more cluttered than some of the other browsers I've looked at, but skin support in concert with the ability to alter interface details means you can customize to your heart's content. With the addition of Mouse Gestures, it's entirely possible to browse pages without using any of the interface elements at all, relying instead on mouse or trackpad swipes to navigate pages.

The bottom line is that Opera is a good example of healthy competition in the browser market, and the price of admission -- free! -- is certainly worth giving this program a once-over.

-- Mike DeAgonia

Opera 9.6

There was a time, years ago, when Opera seemed to be giving Internet Explorer and Netscape a run for their money. Now it's the great forgotten browser, rarely mentioned or used.

And that's a shame. Opera sports a clean interface with easy access to its innovative capabilities, and is a model of simplicity and elegance, with attractive icons and tabs, and plenty of features within easy reach. If you're looking for a powerful alternative to your existing browser, you won't go wrong with Opera.

Much has been made of browser Address Bar tools such as Chrome's Omnibox and Firefox's Awesome Bar. But no one bothers to mention that Opera has already been there and done that. As with those browsers, type parts of a URL into Opera's address bar, and you'll get a list of likely matches. Better yet, type in search terms, and Opera will do a Google search for them.

That's just one of the innovative features you'll find in Opera; there are too many to mention them all. What Opera calls "Speed Dial" is also useful. When you open a new tab, Opera opens a page with space for multiple thumbnails of Web pages. Click on any blank thumbnail and enter a URL, and from then on, when you open a new tab, it will open to a page with those thumbnails. To visit any page, click it.

Opera also features an excellent download manager that lets you pause and resume downloads, and then open any files you've downloaded. For each download, you're also shown information such as where it was downloaded from, where you downloaded it to, file size and so on. There's also a progress indicator showing you current download speed.

At a Glance
Opera 9.6

Opera Software ASA
Price: Free

Pros: Elegant interface, innovative features

Cons: Not as many add-ins as Firefox

Useful for anyone who fills out Web forms (which pretty much means all of us), is the Wand, which not only remembers passwords and fills them in, but also fills in other information, such as name, address, e-mail address and so on.

Opera sports many other features as well, such as a quick way to turn off all images on a Web site with the single click of a button, and a way to view every single link on a Web page.

Opera has too many innovative features to enumerate.
Click to view larger image

Opera's main drawback is that it doesn't have add-ins as Firefox does, so you won't be able to extend the browser's features. You can download Opera widgets, but they aren't really add-ins -- they're instead gadgets that live on your desktop.

Apart from the lack of add-ins, though, you'll find Opera an excellent browser. If you're looking for a great blend of simplicity and features, it's well worth the download.

-- Preston Gralla

Shiira 2.2

Shiira is a relatively new entrant to the Mac Web browser market. Like Apple's Safari and Google's Chrome, Shiira is based on WebKit.

One of the first unique interface elements that I noticed was Shiira's PageDock. The PageDock provides the same functionality as tabbed browsing, but with complete thumbnails of every page that is opened.

At first, I saw this as something that took up valuable screen real estate, but after a little use, I found it to be an invaluable addition to the browser experience -- making it easy to see not only what each "tab" was (beyond just a name), but also what was happening on each page, which proved particularly nice with any page that sported dynamic content (from Facebook chats to sites featuring animation elements). For those who prefer traditional tabbed browsing, the PageDock can be turned off.

As I explored Shiira, I noticed that many of its features and interfaces took cues from Apple's Mac OS X interface. There's a button that displays all open pages next to each other like Apple's Exposé feature, making it easy to pick one page to work with. Bookmarks, history and RSS feeds can also be browsed from floating translucent pallets reminiscent of Apple's iLife and iWork applications.

The preferences dialog borrows heavily from the look of the Mac's System Preferences application. Even the bookmarking tool that Shiira refers to as the Shelf offers column and list views patterned after the Mac's Finder window (as is the customizable window toolbar).

All of these made Shiira seem more Mac-like to me than Apple's own Safari browser. What I found particularly nice was that, much like the PageDock, these features all served useful functions rather than just being eye candy.

At a Glance
Shiira 2.2

Shiira Project
Price: Free

Pros: New approach to tabs, Apple-inspired interface, stable

Cons: Some options seem unfinished

I also found a couple of unusual features that seemed so intuitive that I couldn't believe they weren't more common in other browsers. These include menu items for automatically e-mailing the URL or entire contents of a page with a single click, and a very effective full-screen-mode option that would be perfect for presentations or watching video.

As far as performance, I found Shiira to be very solid. It loaded pages of all kinds, rendered Flash animation with no problems, and even beat out Safari and Firefox in terms of rendering speed on a couple of pages (albeit not by a particularly noteworthy margin). The browser was also very stable. All of this is important because, bells and whistles aside, the most important piece of a browser to me is that it can actually surf the Web painlessly and quickly.

Shiira feels more Mac-like than Apple's own Safari.
Click to view larger image

Unfortunately, I did see some unfinished aspects of this open-source browser. Some of Shiira's preference options seemed unfinished. For example, the RSS feed preferences pane refused to open at all (even so, the built-in RSS reader functioned fairly well -- though being used to full featured stand-alone RSS readers, I'm not sure it would be my first choice). In addition, the pane in the preferences dialog called Key Mappings, which should allow users to assign keyboard shortcuts to menu items, does not seem to be implemented yet (though I was able to open the pane itself).

Even so, the combination of good features, Apple-inspired interface and overall performance left me convinced that, with a little more development, Shiira could easily give other Mac browsers a run for their money. Without a doubt, Shiira is definitely worth a look, but be prepared to spend a little time getting used to its interface.
http://www.computerworld.com/action/...icleId=9121009





Opera 10 Alpha Aces Acid3 Browser Test

Newest preview boosts browsing performance by 30%, claims Norwegian company
Gregg Keizer

Opera Software ASA yesterday launched a preview of its next browser, Opera 10, that aces the Acid3 Web standards test, a mark that most browser makers have pursued without success.

Opera 10 also contains the Norwegian browser maker's newest rendering engine -- dubbed Presto 2.2 -- that the company plans to use as the foundation for all future builds of its desktop and mobile products. Opera claimed that the new engine boosts rendering speeds by up to 30% over its predecessor, Presto 2.1, which debuted last June as part of Opera 9.5. Other additions include an auto-update tool and a spell-checker that works as users type in the browser window.

The results of Computerworld's tests

Opera 10-- 100
Webkit -- 100
Firefox 3.1, nightly build (XP) -- 92
Firefox 3.1, Beta 1 (XP) -- 88
Opera 9.6.2 (XP) -- 85
Chrome 0.4.154.31 (XP) -- 79
Safari 3.2.1 (XP/Mac) -- 75
Firefox 3.0.4 (XP) -- 71
Firefox 2.0.018 (XP) -- 52
IE8 Beta 2 (XP) -- 21
IE7 (XP) -- 12

But Opera also touted its perfect Acid3 score yesterday. "Opera has fine-tuned its standards support and, as a result, Opera 10 alpha achieves an Acid3 100/100 Test score," the company said in a statement Thursday.

Earlier this year, Opera and the WebKit project, the open-source initiative that produces the engine that powers both Apple Inc.'s Safari and Google Inc.'s Chrome, duked it out over Acid3 bragging rights.

On March 26, Opera claimed that it had created a "reference build," a version used internally for testing and development, of its browser that scored 100 on Acid3, a test suite produced by the Web Standards Project that checks how closely a browser follows certain standards, particularly specifications for Web 2.0 applications.

Later that same day, WebKit developers countered with similar claims, and backed them up with in-progress builds to prove them. More recently, WebKit programmers said that after more work, their engine was "the first browser to fully pass Acid3" by not only scoring a perfect 100, but also meeting Acid3's "smooth animation" requirement.

Computerworld's tests confirmed that the alpha of Opera 10 scored 100 on Acid3, and that only WebKit matched it. Acid3 was run on either an iMac powered by Mac OS X 10.5, or a PC running Windows XP SP3.

The Opera 10 preview can be downloaded from the company's site in versions for Windows, Mac OS X and Linux.
http://www.computerworld.com/action/...icleId=9122719





Web Marketing That Hopes to Learn What Attracts a Click
Stephanie Clifford

ONLINE advertisers are not lacking in choices: They can display their ads in any color, on any site, with any message, to any audience, with any image.

Now, a new breed of companies is trying to tackle all of those options and determine what ad works for a specific audience. They are creating hundreds of versions of clients’ online ads, changing elements like color, type font, message, and image to see what combination draws clicks on a particular site or from a specific audience.

It is technology that could cause a shift in the advertising world. The creators and designers of ads have long believed that a clever idea or emotional resonance drives an ad’s success. But that argument may be difficult to make when analysis suggests that it is not an ad’s brilliant tagline but its pale-yellow background and sans serif font that attracts customers.

The question is, “how do we combine creative energy, which is a manual and sort of qualitative exercise, with the raw processing power of computing, which is all about quantitative data?” said Tim Hanlon, executive vice president of VivaKi Ventures, the investment unit of Publicis Groupe.

“I think it’s clear that the traditional process of agencies is clearly not going to survive the digital era without significant changes to our approaches,” Mr. Hanlon said.



The push to automate the creative elements of ad units is coming from two companies in California, not Madison Avenue.

Adisn, based in Long Beach, and Tumri, based in Mountain View, are working both sides of the ad equation. On one, they are trying to figure out who is looking at a page by using a mix of behavioral targeting and analysis of the page’s content. On the other side, they are assembling an ad on the fly that is meant to appeal to that person.

Both companies assume there is no perfect version of an ad, and instead assemble hundreds of different versions that are displayed on Web sites where their clients have bought ad space, showing versions of an ad to actual consumers as they browse the Web.
That might lead to finding that an ad for a baby supply store is more popular with young mothers when it features a bottle instead of diapers.

(Adisn and Tumri both measure the ad’s effectiveness based on parameters the advertiser sets, like how many people clicked on the ad or how many people actually bought something after clicking on it. They compare those with standard ads they run as part of a control group.)

Adisn’s approach has been to build a database of related words so it can assess the content of a Web site or blog based on the words on its pages.

Adisn then buys space on Web sites, and uses its information to find an appropriate ad to show visitors to those sites. If a visitor views pages about beaches, weather and Hawaii, it might suggest that the visitor is interested in Hawaiian travel.

Based on that analysis, Adisn’s system pulls different components — actors, fonts, background images — to make an ad. For example, it might show an ad with a blue background, an image of a beach, and a text about tickets to Hawaii. “Once we’ve built this huge database of hundreds of millions of relationships” between words, said Andy Moeck, the chief executive of Adisn, the system can “make a very good real-time decision as to what is the most relevant or appropriate campaign we could show.”

Simple Green, the cleaning brand, began working with Adisn this year to advertise a new line of products called Simple Green Naturals.

“If it’s a woman looking at a kitchen with a stainless steel refrigerator, they can show a stainless steel product,” said Jessica Frandson, the vice president for marketing for Simple Green. While Ms. Frandson gave Adisn a general idea of what she wanted, she also let the agency do almost random combinations with about 10 percent of her ads to see which of those combinations had the highest click-through rates.

“If it wants to be purple and orange, if that’s going to be appealing to my customer, then so be it,” she said.

Even Mr. Moeck said he was often surprised by the success of certain ads. “Some of it, I just scratch my head and say, ‘I have no idea,’ ” he said.

Tumri’s approach is slightly different. It creates a template for ads, including slots for the message, the color, the image and other elements.

Unlike Adisn, it does not buy ad space, but lets clients — like Sears and Best Buy — choose and buy space on sites themselves. And rather than building a contextual database like Adisn, Tumri uses whatever targeting approach advertisers are already using, whether it is behavioral or contextual or demographic, and assembles an ad on the fly based on that information.

“It’s reporting back to the advertiser and agency saying, ‘Guess what? The soccer mom in Indiana likes background three, which was pink, likes image four, which was the S.U.V., and likes marketing message 12, about room, safety and comfort,” said Calvin Lui, chief of Tumri.



Some advertisers are using that information just to see which version of the ad works best, but Mr. Lui emphasized that the appropriate ad is not static, and changes all the time as content on the page changes.

While the planners and buyers in advertising agencies are intrigued by the idea of measuring each part of an ad, the creative staff that designs ads is less focused on measurement and more focused on the overall effect.

“I think the creative community has to get very comfortable with results-based outcomes in marketing,” said Mr. Hanlon, whose company has an interest in Tumri. “There are a lot of creative people who didn’t sign up for that kind of world.”

Bant Breen, the president of worldwide digital communications at Initiative, the Interpublic Group media buying and planning firm, had a similar view. “The traditional creative process right now is not structured to essentially deliver hundreds of permutations, or hundreds of ideas for messaging,” said Mr. Breen, whose firm is using Tumri to determine which ads are working.

“There’s no doubt that there will be a lot of data that can be collected that could be applied to the creative process.”

But, he said, “that’s not necessarily an easy discussion to have with great art directors.”
http://www.nytimes.com/2008/12/03/bu...ia/03adco.html





Times Extra Adds Outside Sources to New York Times
Kevin Purdy

The New York Times launched a new version of their front page today, "Times Extra," that incorporates up to eight related or supporting blog posts and news articles from outside sources, including news firms the Times could be seen as in direct competition with. The Grey Lady is only lightly treading in the content-aggregation/link-friendly waters, though—you have to click the "Extra" button in the upper right to get the extra sources, and the cookie switches back to a standard view after 24 hours. Still, it's an intriguing step forward by an old media company looking to what's new—new in the last decade, at least.
http://lifehacker.com/5101831/times-...new-york-times





Craigslist Rant Ends in Rare Criminal Charges

Colorado man charged with criminal libel for comments he allegedly posted on Craigslist
Scott Michels

A Colorado man accused of posting comments about his ex-girlfriend on the Web site Craigslist has been charged under a rarely used criminal libel law.

J.P. Weichel faces up to 18 months in prison if convicted for unflattering statements he allegedly posted in Craigslist's "rants and raves" section.

Colorado's criminal libel law, passed in 1963, bans statements "tending to blacken the memory of one who is dead" or that "impeach the honesty, integrity, virtue, or reputation or expose the natural defects of one who is alive."

Although similar laws, which trace their roots back to at least the 15th century, are on the books in at least 16 states, they are rarely used and many others have been struck down as unconstitutional. A study by the Media Law Resource Center found 77 reported actual or threatened criminal libel prosecutions between 1965 and 2002, although the actual number is likely higher.

But observers say there has been a rise in criminal libel cases since late 1990s, many of them tied to the easy access and false sense of anonymity of the Internet. In 2008, at least 13 such cases have been brought, in such states as Wisconsin, Colorado, Minnesota, Florida, Louisiana, Montana and Oklahoma, according to the center.

"Many people convince themselves it's anonymous," said Sandra Baron, the director of the Media Law Resource Center, who said criminal libel laws should be abolished. "And, of course, the reach of the Internet is such that once it's out there, it's so widespread and so provocative that it inspires people to want to take action to stop it."

The case against Weichel began when his former lover reported postings about her to the police. Court records cited by The Associated Press say one Web post allegedly written by Weichel suggested the woman traded sexual acts for legal services from her attorney.

When confronted by detectives, Weichel allegedly said he was "just venting," according to the AP.

Weichel, who has not yet entered a plea in the case, could not be immediately reached for comment. His lawyer declined to comment. He was charged in October, and a court hearing is scheduled for later this month. Web sites like Craigslist are generally not legally liable for comments posted by their users.

Most libel cases are civil lawsuits and criminal charges for false statements are rare.

There have been several controversial criminal libel prosecutions in the past several years. A college student in Colorado was investigated under the law in 2004 for publishing a satirical online journal that was critical of the University of Northern Colorado. Prosecutors eventually declined to file charges.

The Web site featured a photograph of a professor, altered to look like Kiss guitarist Gene Simmons, with a caption describing the person in the photograph as a former Kiss roadie who made a fortune by riding "the tech bubble of the nineties like a $20 whore."

A Web site in Tulsa, Okla., that features comments criticizing local politicians has been subpoenaed for the names of its anonymous posters in a criminal libel investigation, according to local news reports. A New Mexico man was convicted in 2005 of criminal libel after he carried a picket sign in front of the local police department that called an officer a "liar" and "dirty cop."

First Amendment advocates warn that the prosecutions may stifle free speech. Criminal libel laws have their origins in the Star Chamber, which prosecuted critics of the British crown.

"Criminal libel is just an anachronism," said Thomas Kelly, a First Amendment lawyer in Denver. "Using the criminal law to punish speech is just such an ugly display of the power of the state that I think most law enforcement officers would tell someone with a complaint like that to file a civil action."

The Associated Press contributed to this article
http://abcnews.go.com/TheLaw/story?id=6370213&page=1





CPJ's 2008 Prison Census: Online and in Jail

New York, December 4, 2008--Reflecting the rising influence of online reporting and commentary, more Internet journalists are jailed worldwide today than journalists working in any other medium. In its annual census of imprisoned journalists, released today, the Committee to Protect Journalists found that 45 percent of all media workers jailed worldwide are bloggers, Web-based reporters, or online editors. Online journalists represent the largest professional category for the first time in CPJ's prison census.

CPJ's survey found 125 journalists in all behind bars on December 1, a decrease of two from the 2007 tally. China continued to be world's worst jailer of journalists, a dishonor it has held for 10 consecutive years. Cuba, Burma, Eritrea, and Uzbekistan round out the top five jailers from among the 29 nations that imprison journalists. Each of the top five nations has persistently placed among the world's worst in detaining journalists.

At least 56 online journalists are jailed worldwide, according to CPJ's census, a tally that surpasses the number of print journalists for the first time. The number of imprisoned online journalists has steadily increased since CPJ recorded the first jailed Internet writer in its 1997 census. Print reporters, editors, and photographers make up the next largest professional category, with 53 cases in 2008. Television and radio journalists and documentary filmmakers constitute the rest.

"Online journalism has changed the media landscape and the way we communicate with each other," said CPJ Executive Director Joel Simon. "But the power and influence of this new generation of online journalists has captured the attention of repressive governments around the world, and they have accelerated their counterattack."

In October, CPJ joined with Internet companies, investors, and human rights groups to combat government repression of online expression. After two years of negotiations, this diverse group announced the creation of the Global Network Initiative, which establishes guidelines enabling Internet and telecommunications companies to protect free expression and privacy online. Yahoo, Google, and Microsoft have joined the initiative.

Illustrating the evolving media landscape, the increase in online-related jailings has been accompanied by a rise in imprisonments of freelance journalists. Forty-five of the journalists on CPJ's census are freelancers; most of them work online. These freelancers are not employees of media companies and often do not have the legal resources or political connections that might help them gain their freedom. The number of imprisoned freelancers has risen more than 40 percent in the last two years, according to CPJ research.

"The image of the solitary blogger working at home in pajamas may be appealing, but when the knock comes on the door they are alone and vulnerable," said CPJ's Simon. "All of us must stand up for their rights--from Internet companies to journalists and press freedom groups. The future of journalism is online and we are now in a battle with the enemies of press freedom who are using imprisonment to define the limits of public discourse."

Antistate allegations such as subversion, divulging state secrets, and acting against national interests are the most common charge used to imprison journalists worldwide, CPJ found. About 59 percent of journalists in the census are jailed under these charges, many of them by the Chinese and Cuban governments.

About 13 percent of jailed journalists face no formal charge at all. The tactic is used by countries as diverse as Eritrea, Israel, Iran, the United States, and Uzbekistan, where journalists are being held in open-ended detentions without due process. At least 16 journalists worldwide are being held in secret locations. Among them is Gambian journalist "Chief" Ebrima Manneh, whose whereabouts, legal status, and health have been kept secret since his arrest in July 2006. From the U.S. Senate to the West African human rights court, international observers have called on authorities to free Manneh, who was jailed for trying to publish a critical report about Gambian President Yahya Jammeh.

Nowhere is the ascendance of Internet journalism more evident than in China, where 24 of 28 jailed journalists worked online. China's prison list includes Hu Jia, a prominent human rights activist and blogger, who is serving a prison term of three and a half years for online commentaries and media interviews in which he criticized the Communist Party. He was convicted of "incitement to subvert state power," a charge commonly used by authorities in China to jail critical writers. At least 22 journalists are jailed in China on this and other vague antistate charges.

Cuba, the world's second worst jailer, released two imprisoned journalists during the year after negotiations with Spain. Madrid, which resumed cooperative programs with Cuba in February, has sought the release of imprisoned writers and dissidents in talks with Havana. But Cuba continued to hold 21 writers and editors in prison as of December 1, all but one of them swept up in Fidel Castro's massive 2003 crackdown on the independent press. In November, CPJ honored Héctor Maseda Gutiérrez, who at 65 is the oldest of those jailed in Cuba, with an International Press Freedom Award.

Burma, the third worst jailer, is holding 14 journalists. Five were arrested while trying to spread news and images from areas devastated by Cyclone Nargis. The blogger and comedian Maung Thura, who uses the professional name Zarganar, was sentenced to a total of 59 years in prison during closed proceedings in November. Authorities accused Maung Thura of illegally disseminating video footage of relief efforts in hard-hit areas, communicating with exiled dissidents, and causing public alarm in comments to foreign media.

Eritrea, with 13 journalists in prison, is the fourth worst jailer. Eritrean authorities have refused to disclose the whereabouts, legal status, or health of any of the journalists they have imprisoned. Unconfirmed online reports have said that three of the jailed journalists may have died in custody, but the government has refused to even say whether the detainees are alive or dead.

Uzbekistan, with six journalists detained, is the fifth worst jailer. Those in custody include Dzhamshid Karimov, nephew of the country's president. A reporter for independent news Web sites, Karimov has been forcibly held in a psychiatric hospital since 2006.

Here are other trends and details that emerged in CPJ's analysis:

• In about 11 percent of cases, governments have used a variety of charges unrelated to journalism to retaliate against critical writers, editors, and photojournalists. Such charges range from regulatory violations to drug possession. In the cases included in this census, CPJ has determined that the charges were most likely lodged in reprisal for the journalist's work.

• Violations of censorship rules, the next most common charge, are applied in about 10 percent of cases. Criminal defamation charges are filed in about 7 percent of cases, while charges of ethnic or religious insult are lodged in another 4 percent. Two journalists are jailed for filing what authorities consider to be "false" news. (More than one type of charge may apply in individual cases.

• Print and Internet journalists make up the bulk of the census. Television journalists compose the next largest professional category, accounting for 6 percent of cases. Radio journalists account for 4 percent, and documentary filmmakers 3 percent.

• The 2008 tally reflects the second consecutive decline in the total number of jailed journalists. That said, the 2008 figure is roughly consistent with census results in each year since 2000. CPJ research shows that imprisonments rose significantly in 2001, after governments imposed sweeping national security laws in the wake of the 9/11 terrorist attacks on the United States. Imprisonments stood at 81 in 2000 but have since averaged 128 in CPJ's annual surveys.

• The United States, which is holding photographer Ibrahim Jassam without charge in Iraq, has made CPJ's list of countries jailing journalists for the fifth consecutive year. During this period, U.S. military authorities have jailed dozens of journalists in Iraq--some for days, others for months at a time--without charge or due process. No charges have ever been substantiated in these cases.

CPJ does not apply a rigid definition of online journalism, but it carefully evaluates the work of bloggers and online writers to determine whether the content is journalistic in nature. In general, CPJ looks to see whether the content is reportorial or fact-based commentary. In a repressive society where the traditional media is restricted, CPJ takes an inclusive approach to work that is produced online.

The organization believes that journalists should not be imprisoned for doing their jobs. CPJ has sent letters expressing its serious concerns to each country that has imprisoned a journalist.

CPJ's list is a snapshot of those incarcerated at midnight on December 1, 2008. It does not include the many journalists imprisoned and released throughout the year; accounts of those cases can be found at www.cpj.org. Journalists remain on CPJ's list until the organization determines with reasonable certainty that they have been released or have died in custody.

Journalists who either disappear or are abducted by nonstate entities, including criminal gangs, rebels, or militant groups, are not included on the imprisoned list. Their cases are classified as "missing" or "abducted."
http://www.cpj.org/imprisoned/cpjs-2...jailed-mor.php





Facebook Group Creator Detained by Croatian Police
AP

Send good karma, post a photo, criticize the prime minister — all things you can do with the click of a mouse at Facebook, right?

In Croatia, the last one might be a click too far. A man who launched a Facebook group critical of Prime Minister Ivo Sanader has been detained and questioned by police.

Some in the country are crying foul, sensing a move to quash cyber-debate.

Political analyst Jelena Lovric called the detention a "notorious abuse of police for political purposes." And the leader of the opposition Social Democrats, Zoran Milanovic, said Monday the police action endangered freedom of expression.

The kerfuffle in the Balkan country, which was once part of Yugoslavia, had its origins several months ago when Niksa Klecak, 22, set up an anti-Sanader group on Facebook, the social networking Web site. The name of the group was, "I bet I can find 5,000 people who dislike Sanader."

Last Friday, though, the hammer fell. Police questioned Klecak for three hours and searched his home and computer.

Krunoslav Borovec, a senior national police official, rejected criticism of the detention. Police acted legally, he said, because Klecak's group displayed a photo montage of Sanader in a Nazi uniform. Nazi symbols are banned under Croatian law.

Croatian police chief, Vladimir Faber, also insisted the investigation was "motivated by the content, not the author's political affiliation."

And the prime minister himself had no problem with the police action, either.

"There is no satire with Nazi insignia," Sanader told Croatian state-run radio. "The photo montage, he said, "was not an attack on me, but Croatian democracy."

But Klecak, who is a member of the Social Democrats' youth branch, wasn't buying the explanation about Nazism. He was convinced, he said, that his was a "politically motivated case."

Lovric, the political analyst, said the case exposed officials' fear of the Web. The government "cannot influence Internet, and that deeply frightens it," Lovric said.

Traditional Croatian news organizations are relatively free, although they do face pressure from political or business interests. But opposition against Sanader is boiling on Web sites — and it has exploded since the police action against Klecak.

The government may find quashing debate on the Web a bit difficult. New anti-government Facebook sites are popping up like animals in the Whack-A-Mole arcade game.

One, calling for a protest against Sanader later this month, has gathered 80,000 members. Klecak's group has grown to 6,200 members since Friday — exceeding his original goal of 5,000. And another Facebook group, called "Search my flat, you Gestapo gang, Croatia is not a police state," surfaced over the weekend and already has about 2,600 members.

By contrast, a group called "I bet I can find 7,000 people who LIKE Sanader" has just 19 members so far.

Still, the online activists may find that cyber-protests don't necessarily translate into real ones. It's easier to click a mouse than to take to the streets. A Facebook-launched protest against mafia-style murders in Zagreb, the capital, drew just a few hundred people.

And in Egypt earlier this year, a Facebook group called for a general strike on President Hosni Mubarak's 80th birthday. The group had 60,000 cyber-members, but the protest was a bust.

And real-life detention and questioning can certainly make a point. Damir Kajin, another opposition politician in Croatia, said the police action "was a message to those who found a new way of political fighting on the Internet."
http://www.siliconvalley.com/news/ci...nclick_check=1





Croat Police Apologize For Facebook Arrest

Croatia's police officials apologized on Wednesday for detaining a local web activist who had put up posters calling for an anti-government rally, but denied any political motivation for their act.

The man was part of a group on Facebook, the online social networking site, which called an anti-government rally in several towns, including the capital Zagreb, for December 5. The group has more than 80,000 members.

"Posting posters does not constitute a disturbance of public order," national police chief Vladimir Faber told a news conference.

He said some police officers would face disciplinary action for arresting the young man in Zagreb.

His comments came only hours after Prime Minister Ivo Sanader, faced with mounting criticism from opposition and media, asked the Interior Ministry to investigate possible abuse of police authority.

"No one in Croatia can be detained or arrested because of a different opinion or because of a protest against my or any other political view. My main task as a prime minister is to defend that right," Sanader said in a statement.

In the last few days police have held and questioned several Internet activists who were criticizing or ridiculing the government.

Last Friday police questioned a member of the main opposition party, the Social Democrats, after he launched a group called "I bet I can find 5,000 Facebookers who dislike Sanader."

Police said they had acted because he posted a photo montage portrait of Sanader in a Nazi uniform and that no abuse of police authority had taken place.

An editorial in a local daily this week, entitled "Stop Facebook," said the authorities were acting in a manner similar to Yugoslav communists, who distrusted the media and wanted to control it.

Sanader, whose government hopes to conclude European Union membership talks by the end of next year, said he wanted a report from Interior Minister Tomislav Karamarko on those cases.

"I asked for a report on police actions and I want appropriate sanctions if police did not respect regulations," his statement said.

(Reporting by Igor Ilic, Editing by Alison Williams)
http://www.nytimes.com/reuters/techn...k-sanader.html





Cops Arrest Two in Brisbane on Pirate Film Website Raid
David Earley

TWO Brisbane men have been arrested over an illegal movie download site that distributed millions of films to punters all around the world.
The two men were nabbed yesterday during a raid by Australian Federal Police on their Parkinson home, on Brisbane's south side, and they have been charged with copyright and proceeds of crime offences.

Last year a man was convicted for distributing one movie over the internet.

But the Brisbane pair, aged 21 and 27, are alleged to have transferred the equivalent to 14.3 million copies of digital movies and television programs to about 400,000 members around the world, as well as paying subscribers, via an offshore BitTorrent tracker website.

As well as the hundreds of thousands of casual members, the two men are thought to have collected up to $10,000 per month from "VIP Members", who paid a $10 per month fee for direct access to downloadable content.

A bank account belonging to one of the men, containing more than $50,000, was frozen overnight, while investigations into other bank accounts continue.

During the raid three computers and other hardware were seized, as well as more than 1200 DVDs.

The men have been charged with distributing copyrighted material and dealing in proceeds of crime worth $10,000 or more.

They will appear in Brisbane Magistrates Court on December 18 and face a maximum 10 years jail and/or a fine of $66,000.
http://www.australianit.news.com.au/...013044,00.html





Quebec Seller of Pirated Software Fined $100,000 for Contempt of Court

Microsoft Corp. has welcomed a $100,000 fine imposed on a Quebec man who pleaded guilty to contempt of court for persevering in sales of counterfeit software.

Carmelo Cerrelli of Montreal recently pleaded guilty in Federal Court and was fined $50,000 on each of two counts of contempt.

"The problem of software piracy continues to be a primary focus for Microsoft since it affects a wide range of Canadians, from the rights holders to consumers to legitimate businesses," Christopher Tortorice, anti-piracy lawyer for Microsoft Canada, said Monday.

Cerrelli, who operated under the name Inter-Plus, was found in December 2006 to have violated Microsoft's copyright and was ordered to pay $700,000 in damages.

In November 2007, more counterfeit software was seized at his place of business, including versions of the Windows operating system and Microsoft Office.

"The substantial fine handed down by the Federal Court of Canada in the contempt proceedings emphasizes that orders of the court must be respected," Tortorice said in a news release.
http://www.brandonsun.com/story.php?story_id=114622





Canadian Parliament Closed in Bid to Keep Prime Minister in Power
Ian Austen

With the approval of Canada’s formal head of state, Prime Minister Stephen Harper shut down Canada’s parliament until Jan. 26, seeking to forestall a no-confidence vote he was sure to lose.

Mr. Harper, who won re-election less than two months ago, acted after receiving the approval of Governor General Michaëlle Jean, Queen Elizabeth II’s representative. Had his request been rejected, he would have been forced to choose between stepping down or facing the no-confidence vote on Monday.

The current turmoil was touched off last week when Mr. Harper presented an economic plan that outraged the opposition by calling for nothing in the way of a stimulus for Canada’s flagging economy. Instead, it recommended cutbacks, including a threat to cut off public financing for political parties, something his Conservative Party could weather more easily than his opponents.

Since then the two rival parties, the Liberals and New Democrats, have hastened to put together a coalition with the separatist Bloc Québécois to replace Mr. Harper’s Conservative-led government.

Technically, what Mr. Harper did was to “prorogue” Parliament, a move that stops all actions on bills and the body’s other business, and thus goes well beyond an adjournment. It is not unprecedented — prorogues are used routinely to break off sessions for elections, for example — but this is the first time any members here could recall the maneuver being used in the midst of a political crisis.

Mr. Harper declared the parliamentary suspension after a two-and-a-half hour meeting in Ottawa with Ms. Jean. “The public is very frustrated by the current situation in Parliament,” he told reporters as snow swirled outside of Rideau Hall, the governor general’s official residence, ”and we are all responsible for it.”

In contrast to the relative indifference to the elections two months ago, the current situation has provoked a passionate debate in the country online, in public and through radio call-in shows.

The issue has also inflamed old regional tensions. In Western Canada, the main base of support for the Conservatives, political commentators are arguing that the coalition is an attempt by more populous Ontario and Quebec to deny political influence to the West.

At the same time, many Quebecers, particularly French speakers, have been offended by Conservative suggestions that they have no interest in remaining a part of Canada. In the House of Commons, where debate is not always temperate, the political rhetoric has been particularly heated.

Some Conservative members are now suggesting that the coalition members are near-traitors.

“That is as close to treason and sedition as I can imagine,” Bob Dechert, a Conservative member said on Wednesday, echoing a refrain widely heard from callers to radio programs in Mr. Harper’s home province of Alberta.

Ms. Jean cut short a trip to Europe on Wednesday and flew back to Ottawa in an effort to deal with the growing political crisis. Her meeting with Mr. Harper began at 9:30 a.m.

Stéphane Dion, the Liberal Party leader and head of the opposition, had urged her to turn down Mr. Harper’s request in a letter dated Dec. 3.

“A prime minister cannot request that the Parliament be prorogued to avoid a confidence vote,” he wrote. “It would be an abuse of power on the part of the executive branch without precedent in the history of Parliament.”

On Thursday, the coalition of the Liberal and New Democratic parties said it would continue with its effort to form a government despite the closure of parliament and condemned Mr. Harper’s tactics as undemocratic.

Mr. Dion, who would become the coalition’s prime minister, addressed reporters before the closed doors of the House of Commons. “For the first time in the history of Canada, the prime minister of Canada is running away from the Parliament of Canada,” he said.

“We do not want any more of his words, we don’t believe them,” Mr. Dion said of Mr. Harper’s pledges to work with the opposition on the federal budget before Parliament reopens in January. “We want to see changes, monumental changes.”

The leader of the New Democrats, Jack Layton, also decried Mr. Harper’s move. “He’s put a lock on the door on the House of Commons,” he said. “He refuses to face the people of Canada through their elected representatives.”
http://www.nytimes.com/2008/12/05/wo...canada.html?hp





Help Crack the Sensor-Size Code
David Pogue

If there’s a single factor that predicts the quality of the photos you’ll get from a camera, a single letter grade that lets you compare cameras, it’s this: the sensor size.

Big sensors absorb more light, so you get sharper detail, better color, and clearer low-light images. Small sensors, on the other hand, pack too many light-absorbing pixels into a tiny space. So heat builds up, creating digital “noise” (random speckles) in your photos.

But here’s the problem: it’s really hard to find out how big a camera’s sensor is. The manufacturers diligently bury this detail. It’s not on the box, it’s not in the ads, and sometimes it’s not even on the camera’s Web site.

And even if you find the sensor-size measurement online, it’s very hard to compare the sensor sizes of different cameras. The companies publish this spec in two different formats to make comparison difficult. For small cameras, they use a bizarre fraction like “1/2.5 inches.” This is a diagonal measurement; divide 1 by 2.5, and you find out that the sensor is actually 0.4 inches diagonally. In other words, a smaller denominator is better.

For an S.L.R., though, sensor sizes are published as millimeters on a side, like “24 x 16 mm.” If you convert that to inches, and then calculate the diagonal, you find out that that’s 1.14 inches diagonally.

In short, it’s a lot of work to find out the true diagonal measurement of a camera’s sensor size.

So here’s my request: Among Pogue’s Posts readers, I’m quite sure there’s a Web genius who could create an online sensor-size calculator. It would let you plug in the ratio (for a small camera, like 1/1.8) or the millimeters on a side (for an S.L.R., like 24 x 16)—and, with one click, give you what you really want to know: the diagonal measurement, in inches.

If you will create such a calculator, I’ll blog it and refer to it in my writings. And you’ll be doing the world a huge favor. Any takers?

=======
UPDATE: The challenge has been met… in two hours! Reader Ryan Willers has not only built the calculator beautifully, but even registered http://sensor-size.com, to make finding and remembering it simple.

Congratulations, Ryan–and thank you!

UPDATE 2: Emil H. has also done a beautiful job!

Holy cow, people… two solutions in three hours? Next week, I’ll assign you guys a program that solves the Federal deficit and Social Security!
http://pogue.blogs.nytimes.com/2008/...sor-size-code/





Mobiles Distract Drivers More than Chatty Passengers

Mobile phone calls distract drivers far more than even the chattiest passenger, causing drivers to follow too closely and miss exits, US researchers reported on Monday.

Using a handsfree device does not make things better and the researchers believe they know why - passengers act as a second set of eyes, shutting up or sometimes even helping when they see the driver needs to make a manoeuvre.

The research, published in the Journal of Experimental Psychology: Applied, adds to a growing body of evidence that mobile phones can make driving dangerous.

Lee Strayer of the University of Utah and colleagues have found in a series of experiments using driving simulators that handsfree mobile phones are just as distracting as handheld models.

They have demonstrated that chatting on a mobile phone can slow the reaction times of young adult drivers to levels seen among senior citizens, and shown that drivers using mobile telephones are as impaired as drivers who are legally drunk.

For the latest study, also using a simulator, Strayer's team showed that drivers using a handsfree device drifted out of their lanes and missed exits more frequently than drivers talking to a passenger. They tested 96 adults aged 18 to 49.

"The passenger adds a second set of eyes, and helps the driver navigate and reminds them where to go," Strayer said in a statement.

"When you take a look at the data, it turns out that a driver conversing with a passenger is not as impaired as a driver talking on a mobile phone," he added.

Passengers also simplify conversation when driving conditions change, the researchers wrote.

"The difference between a cell phone conversation and passenger conversation is due to the fact that the passenger is in the vehicle and knows what the traffic conditions are like, and they help the driver by reminding them of where to take an exit and pointing out hazards," Strayer said.
http://networks.silicon.com/mobile/0...9357393,00.htm





Behavioral Screening -- the Future of Airport Security?
Dana Rosenblatt

Keep your shoes and belts on: Waiting in long airport security lines to pass through metal detectors may soon be a thing of the past.

Airport security checkpoints may become opportunities for screeners to study passengers' intentions.
1 of 2

Security experts say focus is shifting from analyzing the content of carry-ons to analyzing the content of passengers' intentions and emotions.

"We are seeing a needed paradigm shift when it comes to security," says Omer Laviv, CEO of ATHENA GS3, an Israeli-based security company.

"This 'brain-fingerprinting,' or technology which checks for behavioral intent, is much more developed than we think."

Nowhere is the need for cutting-edge security more acute than Israel, which faces constant security threats. For this reason, Israel has become a leader in developing security technology.

Several Israeli-based technology companies are developing detection systems that pick up signs of emotional strain, a psychological red flag that a passenger may intend to commit an act of terror. Speedier and less intrusive than metal detectors, these systems may eventually restore some efficiency to the airplane boarding process.

One firm, WeCU (pronounced "We See You") Technologies, employs a combination of infra-red technology, remote sensors and imagers, and flashing of subliminal images, such as a photo of Osama bin Laden. Developers say the combination of these technologies can detect a person's reaction to certain stimuli by reading body temperature, heart rate and respiration, signals a terrorist unwittingly emits before he plans to commit an attack.

With these technologies, the emphasis is on speed and seamlessness. Ehud Givon, CEO of WeCU, envisions a day when a passenger can breeze through a security checkpoint in 20 to 30 seconds.

Although traditional security profiling can discriminate by race and religion, security experts say behavioral profiling is more fair, more effective and less expensive.

WeCU has received grants from the Transportation Security Administration within the U.S. Department of Homeland Security, which hopes to implement a system to pinpoint internal threats such as airline employees intending terrorist acts.

Once these technologies are in place, a passenger may pass through a security screening without realizing it. For example, passengers could use an automated check-in system or gaze at a screen with departures information without realizing they've just been exposed to the words "Islamic jihad" written in Arabic.

These stimuli, explains Givon, will intrinsically elicit some sort of biometric response -- whether the passenger knows it or not -- that can be picked up by WeCU's strategically placed sensors.

"I believe that we introduce a new layer in security," Givon says. "This is something that couldn't be done in the past: finding the connection between a certain individual and the intent to harm."

The Orwellian-sounding startup has gone further to develop a system that detects a passenger's behavioral intentions by scanning their every step, literally. While walking around certain parts of the airport terminal, a passenger may not realize he has stepped on a "smart carpet" filled with hidden biometric sensors.

The technology is still under development, says Givon, who believes it will be strong enough to pick up biometric information from a footstep. If a passenger is wearing heavy hiking boots, for example, WeCU will rely on biometric sensors combined with video and thermal biometric imaging to detect malicious intent.

Another option from WeCU is a "smart seat," or cushion full of hidden biometric sensors that could provide a more detailed read on someone sitting in an airport waiting area, Givon says.

While the technology sound like something from a James Bond flick or even "A Clockwork Orange," Givon insists that passengers will not find the techniques intrusive. "We don't want you to feel that you are being interrogated," he says.

Givon is negotiating contracts with airports worldwide and believes his company's technology may be implemented as soon as 2010.

Nemesysco, another Israeli-based technology company, believes the key to a person's emotions and intentions lies in their voice. The company's patented LVA, or Layered Voice Analysis, technology can pick up verbal cues from a passenger who may pose a threat.

Unlike a polygraph test, which checks for lies, Nemesysco's systems work as an "emotion detector," says Nemesysco CEO Amir Liberman. In other words, it's not what passengers say, but how they say it.

Nemesysco's devices use a series of patented signal-processing algorithms that can differentiate between a "normal" voice and a"'stressed" voice. If emotional stress is detected, officials can determine if the passenger should be taken aside for further questioning.

The system works on the premise that all voices have a certain frequency, and any deviation of that baseline frequency can indicate stress.

Liberman says it takes approximately five to 10 seconds for their system to capture a "normal" voice in casual conversation, which establishes a baseline. Their system then measures changes from the baseline voice that signify an increase in stress, excitement, anticipation, hesitation or other emotions that can indicate a potential terrorism threat.

A computer processes the voice patterns and then flashes words such as "high risk," "medium risk," "excited" and "highly stressed." Through his system, Liberman says, he "can see what's going on in your brain."

Versions of Nemesysco's system already have been successfully tested at Moscow Domodedovo International Airport, where officials used it to target criminals and drug traffickers. A version was recently implemented at another major international airport which Liberman declined to identify.

Layered Voice Analysis also has been used to test for insurance fraud and on the TV program "Big Brother Australia."

Layered Voice Analysis has limitations, including the inability to trace the vocal patterns of a person with a speech impediment. But the system is more effective than current security measures, claims Liberman, who believes a terrorist currently can pass through airport security with explosive material "that can take down any plane."

In fact, many experts express little confidence in the current state of airport security.

Philip Baum, London-based editor of Aviation Security International magazine, says would-be terrorists could easily slip through security checkpoints, even with new regulations that check for liquids.

"The archaic system of an X-ray machine and metal detector cannot pick up other potential threats posed by passengers," Baum says. "I can have a ceramic weapon or chemical weapons and walk through an archway metal detector and it won't be picked up. Yet we have huge faith in these metal detectors that can only pick up one substance."

Laviv, whose consulting firm focuses on securing mass transportation systems, is equally skeptical.

"It is possible today to hijack an aircraft using only five or six able-bodied passengers who are well-trained in Kung Fu fighting," he says. "There is no technology in place in airports to detect a threat like that.
"The question is, should our desire be to look for each and every threat agent, rather than focus our efforts on identifying the [violent] intention of the passenger?"
http://www.cnn.com/2008/TECH/12/02/a...ity/index.html





DNA Database 'Breach of Rights'
BBC

Thousands of DNA samples from innocent people are currently retained

Two British men should not have had their DNA and fingerprints retained by police, the European Court of Human Rights has ruled.

The men's information was held by South Yorkshire Police, although neither was convicted of any offence.

The judgement could have major implications on how DNA records are stored in the UK's national database.

The judges said keeping the information "could not be regarded as necessary in a democratic society".

Home Secretary Jacqui Smith said she was "disappointed" by the European Court of Human Rights' decision.

The database may now have to be scaled back following the unanimous judgement by 17 senior judges from across Europe.

Under present laws, the DNA profiles of everyone arrested for a recordable offence in England, Wales and Northern Ireland are kept on the database, regardless of whether they are charged or convicted.

Discriminatory

The details of about 4.5m people are held and one in five of them does not have a current criminal record.

Both men were awarded £36,400 (42,000 Euros) in costs, less the money already paid in legal aid.

The court found that the police's actions were in violation of Article 8 - the right to respect for private and family life - of the European Convention on Human Rights.

It also said it was "struck by the blanket and indiscriminate nature of the power of retention in England and Wales".

The judges ruled the retention of the men's DNA "failed to strike a fair balance between the competing public and private interests," and that the UK government "had overstepped any acceptable margin of appreciation in this regard".

The court also ruled "the retention in question constituted a disproportionate interference with the applicants' right to respect for private life and could not be regarded as necessary in a democratic society".

'Privacy protection'

The home secretary said: "DNA and fingerprinting is vital to the fight against crime, providing the police with more than 3,500 matches a month.

"The government mounted a robust defence before the court and I strongly believe DNA and fingerprints play an invaluable role in fighting crime and bringing people to justice.

"The existing law will remain in place while we carefully consider the judgement."

Solicitor Peter Mahy, who represented the men, said that the decision will have far-reaching implications.

"It will be very interesting to see how the UK government respond.

"The government should now start destroying the DNA records of those people who are currently on the DNA database and who are innocent of any crime."

Human rights group Liberty said it welcomed the court's decision.

Director Shami Chakrabarti said: "This is one of the most strongly worded judgements that Liberty has ever seen from the Court of Human Rights.

"That court has used human rights principles and common sense to deliver the privacy protection of innocent people that the British government has shamefully failed to deliver."

'Invasion of privacy'

Phil Booth, of the NO2ID group, which campaigns against identity cards, said: "'This is a victory for liberty and privacy.

"Though these judgements are always complicated and slow in coming, it is a vindication of what privacy campaigners have said all along.

"The principle that we need to follow is simple - when charges are dropped suspect samples are destroyed. No charge, no DNA."

The Nuffield Council on Bioethics reports on the ethical questions raised by recent advances in biological and medical research.

Its director, Hugh Whittall, said: "We agree wholeheartedly with this ruling. The DNA of innocent people should not be kept by police.

"People feel it is an invasion of their privacy, and there is no evidence that removing from the DNA database people who have not been charged or convicted will lead to serious crimes going undetected.

"The government now has an obligation to bring its own policies into line."

Rights breach claim

One of the men who sought the ruling in Strasbourg, Michael Marper, 45, was arrested in 2001.

He was charged with harassing his partner but the case was later dropped. He had no previous convictions.

The other man - a teenager identified as "S" - was arrested and charged with attempted robbery but later acquitted.

In both cases the police refused to destroy fingerprints and DNA samples taken when the men were taken in to custody.

The men went to the European Court of Human Rights after their cases were thrown out by the House of Lords.

They argued that retaining their DNA profiles is discriminatory and breaches their right to a private life.

The government claims the DNA profile from people who are not convicted may sometimes be linked to later offences, so storing the details on the database is a proportionate response to tackling crime.

Scotland already destroys DNA samples taken during criminal investigations from people who are not charged or who are later acquitted of alleged offences.

The Home Office has already set up a "contingency planning group" to look into the potential implications arising from a ruling in favour of the men.
http://news.bbc.co.uk/1/hi/uk/7764069.stm





Big Brother Police to Get 'War-Time' Power to Demand ID in the Street - on Pain of Sending You to Jail
James Slack

State officials are to be given powers previously reserved for times of war to demand a person's proof of identity at any time.

Anybody who refuses the Big Brother demand could face arrest and a possible prison sentence.

The new rules come in legislation unveiled in today's Queen's Speech.

They are presented as a crackdown on illegal immigration, but lawyers say they could be applied to anybody who has ever been outside the UK, even on holiday.

The civil rights group Liberty, which analysed clauses from the new Immigration and Citizenship Bill, called them an attempt to introduce compulsory ID cards by the back door.

The move would effectively take Britain back to the Second World War, when people were stopped and asked to 'show their papers'.

Liberty said: 'Powers to examine identity documents, previously thought to apply only at ports of entry, will be extended to criminalise anyone in Britain who has ever left the country and fails to produce identity papers upon demand.

'We believe that the catch-all remit of this power is disproportionate and that its enactment would not only damage community relations but represent a fundamental shift in the relationship between the State and those present in the UK.'

One broadly-drafted clause would permit checks on anyone who has ever entered the UK - whether recently or years earlier.

Officials, who could be police or immigration officers, will be able to stop anyone to establish if they need permission to be here, if they have it, and whether it should be cancelled.

No reasonable cause or suspicion is required, and checks can be carried out 'in country' - not just at borders.

The law would apply to British citizens and foreign nationals, according to Liberty's lawyers. The only people who would be exempt are the tiny minority who have never been abroad on holiday or business.

A second clause says that people who are stopped 'must produce a valid identity document if required to do so by the Secretary of State'. Failure to do so would be a criminal offence with a maximum penalty of 51 weeks in jail or a £5,000 fine.

Currently, police are allowed to ask for identity documents only if there is a reasonable suspicion that a person has committed an offence.

During the Second World War, ID cards were seen as a way of protecting the nation from Nazi spies, but in 1952 Winston Churchill's government decided they were not needed in peacetime.

They were thought to be hindering the police because so many people resented being asked to produce them.

Liberty director Shami Chakrabarti said last night: ' Sneaking in compulsory identity cards via the back door of immigration law is a cynical escalation of this expensive and intrusive scheme.'

Tory spokesman Damian Green said: 'This scheme will do nothing to improve our security, may make it worse, and will certainly land the taxpayer with a multi-million bill.

'Labour should concentrate on things that will improve our security, like a dedicated border police force.'

LibDem spokesman Chris Huhne said: 'Ministers seem to be breaking their promise that no one would ever have to carry an ID card. This is a sly and underhand way of extending the ID card scheme by stealth.'

There was also concern last night that the Government is seeking to revive controversial plans for secret inquests.

The measure - which would have let the authorities hold a hearing like the Jean Charles de Menezes inquest behind closed doors - was removed from counter-terrorism legislation earlier this year.

But it could be re-introduced as part of a Coroners and Death Certification Bill.

Other Bills set to be unveiled include plans to extend flexible working and new laws giving every employee the right to request time off to train.

These have been widely criticised by business leaders who warn that extending employees rights will damage small firms.

Under a new welfare crackdown, benefit cheats will lose their handouts for one month and council staff will be given powers to use 'lie detector' technology to root out fraudsters.

Dole claimants who refuse to seek work could be made to dig gardens as punishment or they may be ordered to spend an entire nine-to-five day in an office looking through vacant jobs.

Plans for a crackdown on cigarette sales are being reviewed, and a new statutory code of conduct to govern the banks has been added to the list of forthcoming Bills.

The Speech is reported to have undergone last-minute changes, driven by Business Secretary Peter Mandelson, to reflect the economic crisis.

But he is said to have failed in a bid to block health measures on tobacco sales.

Of the Bills dropped altogether, the most high-profile is the Communications Data Bill, which would have created a giant 'Big Brother' database of phone calls, emails and internet visits.

The Home Office said last night it had no intention of making people carry ID cards.

A spokesman said: 'It is simply wrong to claim there are any plans whatsoever to make identity cards compulsory for British citizens or to require British citizens to have an ID card at all times and present it when asked.

'To maintain effective immigration control it is only right that we ask everyone attempting to enter the UK to produce a valid identity document.'

Every worker wins right to training

Ministers are to press ahead with a raft of new workplace rights in the Queen's Speech, despite fears about the impact on businesses battling the recession.

Government sources said plans to extend flexible working have been revived and the country's 22 million workers will get a new right to ask for time off to train.

Business Secretary Lord Mandelson has lost a battle against plans to give millions of parents the right to flexible working.

The flexible working scheme is now expected to be extended in April to 4.5million parents of children up to the age of 16. Plans to extend paid maternity leave from 39 weeks to 52 weeks are also likely to go ahead.

The move will anger business leaders, who say extending employees' rights will hit small firms.

The 'right to train', to be implemented in 2010, will be less contentious as many businesses accept the need to improve employees' skills, especially in difficult economic times.

A tighter rein on the banks

Banks will have to sign up to a compulsory code of practice under plans to be revealed in the Queen's Speech.

It will tear up the voluntary 'Banking Code' which has been in place since 1997.

Key commitments will include ensuring charges are 'open and transparent' and treating customers in financial difficulties in a 'sympathetic and positive' way.

The move comes amid growing fury at the way banks are failing to keep their side of the bargain over the £37billion Government bailout.

In a pre-emptive move, Lloyds TSB - one of the three banks being part-nationalised - will today launch a new charter for small businesses.

The six-point plan will only help businesses with an annual turnover of up to £1million. About 600,000 customers will benefit.

Lloyds said it will agree 'any reasonable request for short-term finance' and promised to pass on the full benefit of any further cuts in Bank of England base rate.

It also promised not to change the interest rate or availability of an overdraft as long as the business does not exceed the agreed limit.
http://www.dailymail.co.uk/news/arti...ing-jail.html#





Washing Hands 'Affects Moral Judgment'

The old adage that cleanliness is next to godliness has now received scientific support after researchers discovered washing your hands can affect your moral judgment.
Murray Wardrop

A new study has found that people are more likely to be lenient in making decisions if they have just washed their hands.

British scientists who carried out the research said the findings suggest that jurors in criminal trials who have cleansed their hands may make their verdict less severe.

And voters may be more likely to excuse a politician's misdemeanours when going to the ballot box if they have just had a shower.

In the study, 22 people who had washed their hands, and 22 who had not, were made to watch a disgusting three-minute clip of heroin addicts from the hit film Trainspotting.

All 44 were then asked to rate how morally wrong they deemed the series of acts shown to them on a scale of one to nine, with one being acceptable and seven being very wrong.

The actions included stealing money from a wallet, lying on a job application, cooking and eating the family dog, killing a dying plane crash survivor to avoid starvation, and abusing a kitten.

All said they thought the actions were 'wrong'. However, the participants who had washed their hands were less likely to judge the actions as harshly as the group who had not.

In another experiment, a group was asked to read sentences with words such as 'purity' and 'cleanliness' before being posed the same moral dilemmas. Another group was given sentences with neutral words.

Again, the 'clean' group judged the unethical behaviour less harshly.

Lead researcher Dr Simone Schnall, a psychologist at the University of Plymouth, said: "We like to think we arrive at decisions because we deliberate, but incidental things can influence us.

"This could have implications when voting and when juries make up their minds."

Lancaster University psychologist Professor Carey Cooper described the findings as "terrifying".

He said: "It suggests that washing can make us more prepared to accept wrongdoing.

"It is very scary when you think of the implications, especially in the judicial world."
http://www.telegraph.co.uk/sciencean...-judgment.html





Firm Makes One Billionth Mouse
Maggie Shiels

A Silicon Valley company has hailed as a major landmark the production of their one billionth computer mouse.

Logitech's description comes at a time when analysts claim the days of the mouse are numbered.

"It's rare in human history that a billionth of anything has been shipped by one company," said Logitech's general manager Rory Dooley.

"Look at any other industry and it has never happened. This is a significant milestone," he told the BBC.

But sounding the death knell for the device is Gartner analyst Steve Prentice who said "the mouse will no longer be mainstream in three to five years."

However he did acknowledge the manufacture of the one billionth mouse was a "tremendous achievement."

"It speaks volumes to the success of the mouse that they (Logitech) have produced a billion and good luck. But past performance is not a guarantee of future success.

"The world has changed and the nature of machines has changed. The multi-touch interface I believe really does seal the coffin of the mouse," added Mr Prentice.

He claimed the other technologies that will consign the mouse to the dustbin of history will involve facial and movement recognition for the mainstream market.

Mr Dooley however believed the new technologies will have a place alongside the computer mouse and that it does not have to be an either or situation for users.

"The fundamental functionality of the mouse has not changed for 40 years and that is one of the keys to its success. We do not envisage unlearning all those years of learning but that doesn't mean to say there will not be a place for touch interfaces.

"Touch will augment the things you can do today with the mouse and keyboard interface," he added.

Challenge

The mouse faces some stiff competition. Laptops and notebooks use a touch pad and are increasingly taking the place of the desktop computer. Apple's iPhone and Nintendo's Wii game have introduced a new generation to the world of touch screens and movement sensors.

HP is pushing a mouse-less TouchSmart PC while Microsoft have invested heavily in 'surface' computers which react to gestures and touch.

Mr Dooley however put talk of the death of the mouse down to hyperbole.

"The reality is it's always easy for people to drum up interest in a story by making an extreme statement. And in the story of the "mouse is dead" campaign by Bill Gates a few months ago, that was started to drum up interest in Windows 7, the next version of the operating system."

"The challenge with these new technologies is going to be will you touch a screen that is two feet away from you a thousand times a day? Is touch accurate enough to let you get into the cell of a spreadsheet.

"Those are just some simple questions we believe will not necessarily be answered by the touch interface of tomorrow, " Mr Dooley explained to the BBC.

Mr Prentice strongly disagreed and said that the pace of progress cannot be denied.

"Just look forward five years and computer screens will be built into the walls of our homes and that would make it difficult to drive with a mouse. That's where all the new technology like multi touch and facial recognition comes in. This is where the computer stops being a computer and becomes part of a building.

"Push things back 30 years and we would never had said we'd sit in front of a computer or that computers would hold all our music when everyone bought gramophones. Computers are not just computers anymore, they are part of our lives," added Mr Prentice.

Logitech's one billionth mouse rolled off the production line in the middle of November.

As part of the fanfare around that, the company has launched a global competition to find the mouse with a reward of $1000 of Logitech products going to the winner. Clues as to its whereabouts will be posted on the company's blog.

The computer mouse will achieve a milestone of its own next week when it turns 40.

It was 9 December 1968 when Douglas C. Engelbart and his group of researchers at Stanford University put the first mouse through its paces.
http://news.bbc.co.uk/1/hi/technology/7751627.stm





Bush Signs Law Promoting Censorship of Kids' Programming
Stephanie Condon

President Bush on Tuesday signed the Child Safe Viewing Act, requiring the Federal Communications Commission to explore the market for technologies that allow parents to censor the programming their children watch.

The new law requires the FCC to issue a notice of inquiry to examine what advanced content-blocking technologies are available for various communication devices and platforms. It also calls for the FCC to consider how to encourage the development and use of such technologies without affecting content providers' pricing or packaging.

The term "advanced blocking technologies" is defined in the law as technology that enables parents to protect their children from "any indecent or objectionable video or audio programming, as determined by such parent, that is transmitted through the use of wire, wireless, or radio communication."

The FCC will have to report its findings to Congress within 270 days.

The bill was introduced last year by Sen. Mark Pryor, D-Ark. It passed unanimously in the Senate and passed without objection in the House in October.
http://news.cnet.com/8301-13578_3-10111752-38.html





Edward S. Rogers Jr., Canadian Media Mogul, Dies at 75
Ian Austen

Edward S. Rogers Jr., who transformed Canada’s first FM radio station into one of North America’s most diverse communications and media companies, died on Tuesday at his home in Toronto. He was 75.

The death was announced by Rogers Communications, the company he founded and of which he remained chief executive. The announcement said that the death of Mr. Rogers, who was known as Ted, was related to congestive heart failure.

Businesses controlled by Mr. Rogers included Canada’s largest wireless operator, its biggest cable television system, several of its largest-circulation magazines, the leading provider of residential Internet service, 52 radio stations, 10 television stations, a shopping channel, a national sports cable network and the Toronto Blue Jays baseball team.

Rogers Communications, which posted revenue of about 10 billion Canadian dollars last year, currently outperforms its rivals, particularly Bell Canada, by most financial measures. But in the past, Mr. Rogers’s reliance on debt brought the operation close to ruin more than once. And his relentless drive for expansion sometimes created clashes with regulators, competitors and consumers.

As Mr. Rogers told his story, the creation of his company was almost predestined as a way to honor the memory of his father, who had the same name.

The senior Mr. Rogers had invented the first vacuum tube that allowed radios to be plugged into wall outlets and operate off household alternating current, rather than rely on batteries.

His father used the proceeds from his invention to build a radio manufacturing company and opened a Toronto radio station, CFRB, for Canada’s First Rogers Batteryless.

When the younger Mr. Rogers was 5 years old, his father died. Three years later, in financial distress, his mother, Velma, sold the family’s stake in the business.

With help from his stepfather, John W. Graham, Mr. Rogers made his first broadcast acquisition, an FM radio station, while still a law student in Toronto, using mostly borrowed money.

When he bought the station, CHFI, in 1960, fewer than 3 percent of homes in the Toronto area had FM radio receivers. While Mr. Rogers was an FM broadcaster more out of financial necessity than by choice, he did believe that its superior sound quality would eventually make it the dominate radio system. He overcame Toronto’s lack of receivers by selling low-cost FM sets that doubled as ads for CHFI.

From that point on, Mr. Rogers tried to focus his efforts on new technologies.

“If you’ve got a product that’s on the growth trend your company can just explode,” he said.

That was certainly the case with cable television, the business that was to create the foundation of the Rogers operation.

In its early days, cable was an easier sell in Canada than in the United States because it offered Canadian viewers a clear view of American channels, which had a wider variety of programming.

Not everything worked according to plan. Rogers Communications lost $500 million in the 1990s when it joined a partnership to start the first alternative long-distance telephone company in Canada when the monopoly system ended. And debt, much of it with low ratings and high interest rates, grew alarmingly as his acquisitions continued, particularly his hostile takeover of Maclean-Hunter in 1994 for 3.1 billion Canadian dollars.

While Mr. Rogers was mainly interested in Maclean-Hunter’s cable operations, he retained most of its magazines, including Maclean’s, the largest Canadian newsmagazine, and Chatelaine, the leading Canadian publication aimed at women.

Everything eventually worked out, and the debts were largely retired. While cable companies in the United States are just now making forays into wireless phone service, Rogers Communications has Canada’s most up-to-date network and the country’s largest wireless customer base.

Mr. Rogers was active in the company’s daily operations until last October, when he was hospitalized.

His successor is not clear; a trust will maintain his family’s control over the company. His son, Edward III, is currently the head of the Rogers cable unit, while his daughter Melinda Rogers is the senior vice president of strategy and development for the overall holding company. Mr. Rogers is also survived by his wife, Loretta, and two other daughters, Lisa Rogers and Martha Rogers.

While it is a very small part of Rogers’s business, the acquisition with the least obvious purpose was the company’s purchase of the Toronto Blue Jays in 2000. Mr. Rogers was not a big baseball fan, and he never became strongly associated with the team.

But the team ownership did enable Rogers to buy the SkyDome, the retractable-roofed stadium where the Jays play, a feature of Toronto’s skyline. Soon after the deal, the stadium was emblazoned with the Rogers name.
http://www.nytimes.com/2008/12/03/bu.../03rogers.html





Mobile Broadband to Hit 42Mb/sec in 2009
Stuart Turton

Mobile broadband speeds could hit a blistering 42Mb/sec as early as next year, according to Ericsson's chief technology officer.

The idea seems far-fetched given that even the fastest dongles currently hover at around 7.2Mb/sec, but according to John Cunliffe, the technology to smash that barrier is just around the corner.

"If you look at what's actually happening, the fastest service in the UK at the moment is 7.2Mb/sec, but we can easily see how we get to 14Mb/sec by improving the codes using the modulation," he tells PC Pro.

"After that there are two steps that can boost speed. We go to the modulation that is 64 QAM... that's 64 combinations of information in the same slot as one piece of information. In other words it's massively spectrally effecient. We think that's going to give us 21Mb/sec.

"But then there's another technique called MIMO, multiple in multiple out. What this means is you have multiple radios on a device, this is like Wi-Fi uses with the N standard.

With MIMO we can go from 14Mb/sec to 28Mb/sec. They're two paralell paths, but we can then combine them to get 42Mb/sec. Essentially this is happening through 2009."

Cunliffe acknowledges that while the technology to boost speeds exists, it may take another year or so for the dongles themselves to catch up. However, he doesn't think speeds will stop at 42Mb/sec.

"We think even more in the future, we can probably squeeze that to 80Mb/sec, and that's before we even get to Long Term Evolution."

For a comprehensive roundup of all the UK's mobile broadband services, read our feature.
http://www.pcpro.co.uk/news/240672/m...c-in-2009.html





Net Speed Rules Come into Force
BBC

Customers will be better informed about the speed of their net connection under new rules.

The Ofcom-backed code of practice has won pledges from net firms to give more information about line speeds.

Net firms covering 95% of the UK's broadband users have signed up to the voluntary scheme which comes into force on 5 December.

Over the next six months Ofcom will monitor net firms to ensure they live up to their promises.

No penalty

The code of conduct was drawn up in response to research that suggested consumers were confused by adverts that promised broadband speeds that few consumers could achieve.

Almost a quarter of people do not get the speed they expect, according to early results from Ofcom research, which is due to be published in full in 2009.

The code requires net firms to:

• Give new customers an accurate estimate of the maximum speed their line can support.

• Explain how technical issues could slow speeds and give advice about how to combat these problems.

• Downgrade a customer's deal, at no penalty, if line speeds are a lot lower than the original estimate.

Customers must also get timely warnings if they breach the data download caps that many net firms impose on customers.

Consumers can check whether their net firm has signed up to the code of practice via the Ofcom website.

Anna Bradley, chair of Ofcom's Communications Consumer Panel, welcomed the code.

"The new code will help consumers make better informed choices," she said in a statement.

"It addresses the concerns that we raised with Ofcom and the ISPs last year about broadband speeds - about the mismatch between the speeds that consumers think they are buying and what they actually get."
http://news.bbc.co.uk/2/hi/technology/7764489.stm





Comcast To Offer Bandwidth Use Tracker In January

Online tool to be available January 5 for all users...
Karl Bode

When Comcast recently started capping all users at 250GB per month, they annoyed some by failing to provide a tool to track usage, though they did tell us they were working on it. An anonymous Comcast tipster informs us that Comcast will soon implement a viewable online usage meter starting January 5. According to the source, the tool won't update users in real time, but will have a three hour delay. It will also retain three months of bandwidth usage records, and will come with the option of monitoring multiple MAC addresses.

At the moment, the Comcast FAQ tells users to do a web search for bandwidth meters or use the meter included in the McAfee Security Suite the company gives out free to subscribers.

Given the Comcast cap is so high, the vast majority of Comcast users will never run into it, and those who will probably use a software client or router firmware to track their usage.

But after their tangle with the FCC for forging packets and throttling P2P traffic, Comcast's all about transparency. According to Comcast, less than 1% of all users will ever brush against the current cap. Still, should the cable operator ever use lower caps or implement overages, they'd need to be sure that customers understand how much bandwidth they're using.

A recent survey indicated that 83% of Americans don't know how much bandwidth they consume, or even what a gigabyte is. AT&T, who recently starting testing caps ranging from 20-150GB caps with $1 overages, offers customers in Nevada and Texas test markets an online web usage tool. So does Time Warner Cable, who is testing caps ranging from 5-40GB with $1-$1.50 overages in Beaumont, Texas.
http://www.dslreports.com/shownews/C...-January-99427





New Coalition Drawing Up Nationwide Broadband Access Strategy
Cecilia Kang

President-elect Barack Obama has said getting affordable high-speed Internet service to every American home would create jobs, fuel economic growth and spark innovation. Yesterday, representatives from technology and telecommunications companies, labor unions and public interest groups frequently at odds with one another agreed to provide the next president with a roadmap for how to accomplish those goals.

That map could include tax breaks, low-interest loans, subsidies and public-private partnerships to encourage more investments in upgrading and building out high-speed networks, representatives from Google, AT&T and public interest group Free Press said during a panel discussion on broadband policy that also served as a coming-out party for their newly formed coalition.

The details of how to meet those goals still must be worked out by the group, whose aim is to bring more affordable high-speed Internet access to every consumer.

Many of the group members have been at odds with each other on whether the government should set limits on how much spectrum a company can hold, the use of unlicensed devices on fallow broadcast airwaves and net neutrality -- the notion that network operators should be prevented from blocking or slowing Internet traffic. The formation of the group is an effort to move beyond their differences.

"The coalition is a positive in that it demonstrates we agree that we have a broadband problem, which not everyone was willing to admit to two years ago," said Ben Scott, policy director at Free Press and a member of the group. "The key is whether we'll see this group produce policy solutions that will require difficult choices."

At stake is the nation's ability to compete technologically and economically, the group said. The United States has dropped from the top 10 nations for broadband access, speeds and price in the last several years. The coalition is pushing for a federal plan that would provide access to high-speed Internet service, much as the government did with electricity, roads and phone service.

Obama famously used the Internet for outreach during his campaign and received 370,000 donations online. He's proposed using blogs, social networking tools and community Web pages known as wikis to connect citizens to government agencies. And Obama has argued for massive upgrades to technology infrastructure such as high-speed, or broadband, Internet.

So far the coalition's plans to increase broadband usage mirrors Obama's plan, but there could be disagreement over deployment, analysts said.

Communications Workers of America President Larry Cohen said the union supports a proposal by Sen. John D. Rockefeller IV (D-W.Va.) to increase definitions for broadband to 10 megabits per second for downloads by 2010. The current definition for broadband speed in the United States is 768 kilobits per second downstream, which is far below standards in many other nations.

Achieving that goal at prices acceptable to consumers, however, would be expensive for telecom and cable network operators. Some in the coalition could push for laws that would achieve lower prices and higher speeds through more wireless and telecom competitors, but that could cause further disagreement among members, Scott said.

Some have already suggested requesting funds from the federal economic stimulus plan for broadband deployment. Yesterday, an aide to House Speaker Nancy Pelosi (D-Calif.) said Pelosi was in favor of that idea.

AT&T chief lobbyist Jim Cicconi said the company has moved closer to the view of public interest groups and Google that the Web should be open for all users without discrimination of technology and content on their network. But unlike Free Press and consumer groups, AT&T opposes new laws or rules on net neutrality, saying Federal Communications Commission rules are sufficient, and any violation should be handled on a case-by-case basis.

"There will be significant outstanding debates that will be very tough and there will still be daylight between the groups on many, many issues," said Rebecca Arbogast, an analyst at investment firm Stifel Nicolaus. "But both sides are in a phase right now where they are emphasizing how much they share in terms of their views on what is an appropriate framework for looking at this issue."
http://www.washingtonpost.com/wp-dyn...120203164.html





AT&T Plans to Cut 12,000 Jobs
AP

AT&T, the telecommunications company, said Thursday that it was cutting 12,000 jobs, or about 4 percent of its work force, because of the economic downturn.

The company, based in Dallas, said the job cuts would take place in December and throughout 2009. The company also cited a changing business mix and a more streamlined structure as other reasons for the layoffs.

It was not immediately clear what departments and cities would suffer the cuts. However, like most telecom companies, AT&T has been seeing many customers defect from landline phones to wireless services, and the company noted that it would still be hiring in 2009 in parts of the business that offer cell phone service and broadband Internet access.

The company also said it planned to reduce capital spending next year.

AT&T plans to take a charge of about $600 million in the fourth quarter to pay for severance costs. The company noted that many of its non-management employees have guaranteed jobs because of union contracts. All affected workers will receive severance a “in accordance with management policies or union agreements,” the company said. http://www.nytimes.com/2008/12/05/te...s/05phone.html

Landline Operations at a Glance

AT&T isn't disclosing where it is cutting 12,000 jobs, 4 percent of its work force. But the company did say one reason for the cuts is a ''changing business mix.'' That refers, at least in part, to the long-term trend in which customers are abandoning traditional landline phone service for wireless options or phone service from the cable company. Here are the 22 states where AT&T provides local phone service:

Alabama, Arkansas, California, Connecticut, Illinois, Indiana, Florida, Georgia, Kentucky, Louisiana, Kansas, Michigan, Mississippi, Missouri, Nevada, North Carolina, Ohio, Oklahoma, South Carolina, Tennessee, Texas and Wisconsin.
http://www.nytimes.com/aponline/busi...ance.html?_r=1





Free Web Plan Being Pushed by FCC Head
Amy Schatz

Outgoing Federal Communications Commission Chairman Kevin Martin is pushing for action in December on a plan to offer free, pornography-free wireless Internet service to all Americans, despite objections from the wireless industry and some consumer groups.

At its December meeting, the FCC could also consider new rules designed to speed up consideration of disputes between independent cable programmers and cable providers such as Time Warner Cable Inc. and Comcast Corp., which either refuse to carry some channels or put them on specialty tiers of service that cost subscribers more.

The agency also will ask for more feedback on its proposal to require programmers to sell their channels to cable operators individually instead of in bundles.

The free Internet plan is the most controversial issue the agency will tackle in December. Mr. Martin shelved plans to consider a wider variety of sticky issues pending at the agency, including a request by the Hollywood studios to hobble TVs and set-top boxes so studios can offer copy-protected theatrical releases sooner.

The proposal to allow a no-smut, free wireless Internet service is part of a proposal to auction off a chunk of airwaves. The winning bidder would be required to set aside a quarter of the airwaves for a free Internet service. The winner could establish a paid service that would have a fast wireless Internet connection. The free service could be slower and would be required to filter out pornography and other material not suitable for children. The FCC's proposal mirrors a plan offered by M2Z Networks Inc., a start-up backed by Kleiner Perkins Caufield & Byers partner John Doerr.

Consumer advocates have objected to the FCC's proposed pornography filter, while the wireless industry has objected to the entire free Internet plan. To address concerns about the filter, the FCC is proposing that adults could opt out and access all Internet sites.

T-Mobile USA, in particular, has raised concerns. The Deutsche Telekom AG unit paid about $4 billion a few years ago for nearby airwaves and has complained that the free wireless Internet plan will likely result in interference for consumers of its new 3G wireless network. The FCC dismissed the company's interference concerns this fall, although T-Mobile disagreed with that finding.
http://online.wsj.com/article/SB122809560499668087.html





Stimulus Plan to Include Internet-Access Funds
Corey Boles and Fawn Johnson

The federal government's economic stimulus package will include investment in broadband Internet infrastructure and funds to upgrade and repair the national power grid alongside more traditional funding for road and bridge repair, a senior aide to House Speaker Nancy Pelosi said Tuesday.

Details of the package including how much money will be included in the larger economic rescue package for the technology investments and how such funding would be allocated are still being worked out, the aide said.

The overall size of the package, including an income tax cut for the majority of working Americans, could be around $500 billion, but that too is still being finalized.

The investments in technology infrastructure would fit in with Speaker Pelosi's determination that the spending package not only gives the ailing U.S. economy a short-term jolt, but also pays dividends over the longer term, the aide said.

A substantial investment in upgrades to the country's power grid could be a precursor to a revamped energy policy placing more emphasis on renewable energy technologies -- a key priority of both Rep. Pelosi and President-elect Barack Obama.

Similarly, the goal of universal broadband Internet coverage was often mentioned by Obama on the campaign trail.

Unlike other traditional forms of infrastructure spending, the backbone to the Internet has largely been financed by private companies in the U.S.

Congress could opt to provide hefty tax credits to the phone and cable companies who have been responsible for the rollout of broadband Internet access. Or lawmakers could opt to expand existing subsidies to the companies to offset the costs of providing high-speed Internet service in rural, underpopulated parts of the country.

A third option would be to increase aid to states, which are likely to have a better idea where Internet service isn't currently available.

Several major technology and communications companies including Google Inc., AT&T Inc., Verizon Communications Inc., Alcatel-Lucent and Cisco Systems Inc. have joined forces with unions, state governments, and advocacy groups to press the case for the inclusion of Internet build-out incentives in the stimulus package.

"We're reasonably confident that if we work together like we are here that we can see broadband incentives in the economic recovery package in January," Communications Workers of America President Larry Cohen said Tuesday.

More than 50 companies and organizations that have previously disagreed on some aspects of Internet policy signed on to a statement saying Obama should make high-speed Internet access a top national priority.

Mr. Cohen said 100,000 jobs could be created by immediately investing in more high-speed Internet networks across the country. "Jobs is the best single stimulus," he said.

The demand for services created by broadband Internet access could create another two million jobs, Mr. Cohen argued.

As with his campaign, Mr. Obama's transition operation regularly refers to Internet access as an important factor in creating jobs and spurring innovation.

The "call to action" statement that the CWA and companies have signed says Internet access could be boosted in underserved areas through tax incentives, grants, low-cost loans, loan guarantees and government subsidies.
http://online.wsj.com/article/SB122825292368073455.html





Pirates of the Amazon Abandon Ship
Brad Stone

Earlier this week, two students from the Piet Zwart Institute in Rotterdam, the Netherlands, made headlines by releasing a plug-in for the Firefox Web browser that made it easy for people who were browsing books, music and movies on Amazon.com to download the same products free through the Pirate Bay, the illicit BitTorrent site.

Lawyers for Amazon.com promptly served the students’ Internet service provider with a take-down notice, and on Thursday the students complied and removed the tool.

In an interesting twist, the students now say their project was a parody and an “experiment on interface design, information access and currently debated issues in media culture,” according to their Web site. One of the students, John, who did not give his last name, tried to explain further in an e-mail message.

Amazon and the Pirate Bay “might look like opposites, but are actually quite similar in regards to the mainstream media content they provide,” he wrote. “Our project demonstrated this practically. So it’s a parody of any kind of media consumerism, whether corporate or subcultural.”

Parodies are given a certain amount of protection under United States copyright law.

John added: “The project struck quite some nerve; it surprised us that most people did not seem to get the humor and absurdity of it.”

Florian Cramer, the course director of the Media Design program at Piet Zwart, wrote further about the project Friday on Nettime, a mailing list that covers issues of Internet culture and art. Mr. Cramer maintained that Pirates of the Amazon was legal, since the tool only provided simple links between two Web destinations, Amazon.com and the Pirate Bay. He also lamented the hostile reaction from the Internet community, saying that a majority of commentators failed to see the artistic nature of the experiment, and he worried that his students were being censored.

“With the take down notice from Amazon.com, our students have been scared away from pursuing their art, research and learning in our institute,” Mr. Cramer wrote. “We do not want a culture in which students have to preemptively censor their study because their work confronts culture with controversial and challenging issues.”

The students will be collecting further reactions to Pirates of the Amazon for their project. So, Bits readers, let’s give them a hand. What do you think of this experiment in free media, piracy and interface design?
http://bits.blogs.nytimes.com/2008/1...-abandon-ship/


















Until next week,

- js.



















Current Week In Review





Recent WiRs -

November 29th, November 22nd, November 15th, November 8th, November 1st

Jack Spratts' Week In Review is published every Friday. Submit letters, articles, press releases, comments, questions etc. in plain text English to jackspratts (at) lycos (dot) com. Submission deadlines are Thursdays @ 1400 UTC. Please include contact info. The right to publish all remarks is reserved.


"The First Amendment rests on the assumption that the widest possible dissemination of information from diverse and antagonistic sources is essential to the welfare of the public."
- Hugo Black
JackSpratts is offline   Reply With Quote
Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Peer-To-Peer News - The Week In Review - September 22nd, '07 JackSpratts Peer to Peer 3 22-09-07 06:41 PM
Peer-To-Peer News - The Week In Review - May 19th, '07 JackSpratts Peer to Peer 1 16-05-07 09:58 AM
Peer-To-Peer News - The Week In Review - December 9th, '06 JackSpratts Peer to Peer 5 09-12-06 03:01 PM
Peer-To-Peer News - The Week In Review - September 16th, '06 JackSpratts Peer to Peer 2 14-09-06 09:25 PM
Peer-To-Peer News - The Week In Review - July 22nd, '06 JackSpratts Peer to Peer 1 20-07-06 03:03 PM






All times are GMT -6. The time now is 01:08 PM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
© www.p2p-zone.com - Napsterites - 2000 - 2024 (Contact grm1@iinet.net.au for all admin enquiries)