P2P-Zone  

Go Back   P2P-Zone > Peer to Peer
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Peer to Peer The 3rd millenium technology!

Reply
 
Thread Tools Search this Thread Display Modes
Old 28-05-08, 07:44 AM   #1
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,017
Default Peer-To-Peer News - The Week In Review - May 31st, '08

Since 2002


































"Nokia, the world’s largest maker of cellphones, sells more phones every week than Apple has sold since the iPhone’s introduction." – Edward Snyder


"When you think of new technology, it's often the case that it takes time for the authorized uses to exceed the unauthorized use." – Michael Geist


"If Hollywood could order intellectual property laws for Christmas, what would they look like? This is pretty close." – David Fewer


"Call me a cynic but MediaDefender's actions have already spoken volumes about its ethics. The only way to root out the full story is to get these folks in front of a magistrate." – Charles Cooper


































May 31st, 2008




The Most Crazy Tech Story Since the HP Pretexting Scandal
Charles Cooper

This is one of the more bizarre stories to hit the tech world since the Hewlett-Packard pretexting scandal.

Check out the post from Revision3 CEO Jim Louderback detailing the inside story of the denial-of-service attack which crippled his company's servers over the Memorial Day weekend.

Revision3 tracked the attack back to an Internet address belonging to a subsidiary of Artist Direct, called MediaDefender. And it admitted as much when confronted with the evidence. I'll let Jim take it from here:

Quote:
So I picked up the phone and tried to get in touch with ArtistDirect interim CEO Dimitri Villard. I eventually had a fascinating phone call with both Dimitri Villard and Ben Grodsky, vice president of operations at Media Defender.

First, they willingly admitted to abusing Revision3's network, over a period of months, by injecting a broad array of torrents into our tracking server. They were able to do this because we configured the server to track hashes only--to improve performance and stability. That, in turn, opened up a back door which allowed their networking experts to exploit its capabilities for their own personal profit.

Second, and here's where the chain of events come into focus, although not the motive. We'd noticed some unauthorized use of our tracking server, and took steps to de-authorize torrents pointing to non-Revision3 files. That, as it turns out, was exactly the wrong thing to do. MediaDefender's servers, at that point, initiated a flood of SYN packets attempting to reconnect to the files stored on our server. And that torrential cascade of "Hi"s brought down our network.

Grodsky admits that his computers sent those SYN packets to Revision3, but claims that their servers were each only trying to contact us every three hours. Our own logs show upwards of 8,000 packets a second.

"Media Defender did not do anything specific, targeted at Revision3″, claims Grodsky. "We didn't do anything to increase the traffic"--beyond what they'd normally be sending us due to the fact that Revision3 was hosting thousands of MediaDefender torrents improperly injected into our corporate server. His claim: that once we turned off MediaDefender's back-door access to the server, "traffic piled up (to Revision3 from MediaDefender servers because) it didn't get any acknowledgment back."
I've never heard of Grodsky but the man's brass obviously has served him well professionally. MediaDefender "did not do anything specific, targeted at Revision3?" Other than borrow Revision3's servers without permission and for its own profit, that is. (Here is where everyone can exclaim in concert, "WTF?"

At this point, Revision3 says it's not planning to file a lawsuit. Not because it doesn't have a case but pursuing a court remedy would likely cost a lot of money. But here's an opportunity for a public-regarding watchdog like the Electronic Frontier Foundation to get involved. Maybe temporary insanity will serve as a defense strategy because the emerging story boggles the imagination. And now you have to wonder whether Revision3 is the only victim or whether there are others.

Call me a cynic but MediaDefender's actions have already spoken volumes about its ethics. The only way to root out the full story is to get these folks in front of a magistrate.
http://news.cnet.com/8301-10787_3-9954993-60.html





FTC Settles with Private Investigators in HP Spy Scheme
Dibya Sarkar

The Federal Trade Commission said today it agreed to $600,000 in settlements and judgments against several private investigators involved in the Hewlett-Packard boardroom spying case.

The FTC last year filed a complaint against those investigators for allegedly obtaining consumers' private phone records without their knowledge and consent and selling them to third parties.

Palo Alto-based HP hired the investigators in 2005 to secretly examine the private telephone logs of journalists, board members and HP employees to identify the source of leaks to the media. The company admitted to the scheme in September 2006.

The FTC settlement imposed a $67,000 penalty against Matthew DePante, his father, Joseph DePante, and their now-defunct company, Action Research Group Inc., which was based in Clearwater, Fla. All but $3,000 was suspended due to their inability to pay.

The U.S. District Court for the Middle District of Florida, Orlando division, also entered default judgments against DePante's subcontractors, Bryan Wagner, who must pay $428,085, and Cassandra Selvage and her company, Eye in the Sky Investigations Inc., who must pay $110,762.

Action Research Group relied on Selvage and Wagner to get the records through pretexting, or "using false pretenses, fraudulent statements, fraudulent or stolen documents or other misrepresentations, including posing as an account holder or as an employee of a phone company," the FTC said in a release.

Selvage and Wagner were two of five private investigators believed to have acted as "pretexters" in the HP scandal.

The agency said Action Research Group sold the confidential phone records, including lists of calls made and the dates, times, and duration of the calls, since at least 2005.

The court orders also bar the defendants from obtaining and selling consumers' phone records without their consent to third parties and engage in pretexting.

The DePantes' attorneys, Richard Preira and Susy Ribero-Ayala, said both father and son maintained their innocence in the court settlement, but agreed to pay the $3,000 to settle the case.

State criminal charges were dismissed against Matthew DePante. Preira said that both father and son have gone on to other careers.

Court documents did not list attorneys for Selvage or Wagner.
http://www.siliconvalley.com/news/ci...nclick_check=1





YouTube: Viacom Challenge Threatens Internet Freedom
Larry Neumeister

A $1 billion copyright infringement lawsuit over YouTube's ability to keep copyrighted material off its popular video-sharing site threatens how hundreds of millions of people exchange all kinds of information on the Internet, owner Google Inc. said.

The company's lawyers made the claim in papers filed in U.S. District Court in Manhattan as Google responded to Viacom Inc.'s latest lawsuit alleging that the Internet has led to "an explosion of copyright infringement" by YouTube and others.

The back-and-forth between the companies has intensified since Viacom brought its lawsuit last year, saying it was owed damages for the unauthorized viewing of its programming from MTV, Comedy Central and other networks, including such hits as "The Daily Show with Jon Stewart."

In papers submitted to a judge late Friday, Google said YouTube "goes far beyond its legal obligations in assisting content owners to protect their works."

It said that by seeking to make carriers and hosting providers liable for Internet communications, Viacom "threatens the way hundreds of millions of people legitimately exchange information, news, entertainment and political and artistic expression."

Google said YouTube was faithful to the requirements of the 1998 Digital Millennium Copyright Act, saying the federal law was intended to protect companies like YouTube as long as they responded properly to content owners' claims of infringement.

On that score, Viacom says Google has set a terrible example.

In a rewritten lawsuit filed last month, Viacom said YouTube consistently allows unauthorized copies of popular television programming and movies to be posted on its Web site and viewed tens of thousands of times.

Viacom said it had identified more than 150,000 unauthorized clips of copyrighted programming—including "SpongeBob SquarePants," "South Park" and "MTV Unplugged" episodes and the documentary "An Inconvenient Truth"—that had been viewed "an astounding 1.5 billion times."

The company said its count of unauthorized clips represents only a fraction of the content on YouTube that violates its copyrights.

It said Google and YouTube had done "little or nothing" to stop infringement.

"To the contrary, the availability on the YouTube site of a vast library of the copyrighted works of plaintiffs and others is the cornerstone of defendants' business plan," Viacom said.
http://www.breitbart.com/article.php...show_article=1





RIAA Drops Allofmp3 Lawsuit; Pretends Mp3Sparks Doesn't Exist

It's been quite some time since we heard about Allofmp3, the Russian online music download store that offered extremely low prices on DRM-free downloads (you even got to pick your format). The company insisted that it was legal in Russia, and had all the appropriate licenses. Multiple times, the company was brought to court in Russia, and every time, it was found to be legitimate. In fact, the company even tried to pay royalties for the music it sold, but the recording industry refused to accept the payments.

However, the entertainment industry had US diplomats lean on Russia, claiming that if it didn't shut down the site, the US would block Russia's admittance into the WTO. So, eventually, Russia did shut down the site through somewhat questionable means. Of course, within minutes of it being shutdown, the company reappeared under the name Mp3Sparks. In fact, Allofmp3.com accounts worked just fine on Mp3Sparks. And, of course, there are a dozen or so other Russian online download stores that also offer the same sort of deal (and all of which are playing by Russian copyright laws).

For some reason, though, Mp3Sparks just hasn't received nearly as much attention as Allofmp3, and it seems like The Pirate Bay has taken on the role of "public enemy number 1" for the recording industry. So, it should come as little surprise that the RIAA has dropped its lawsuit against Allofmp3.com, saying that the company is now defunct, while totally ignoring Mp3Sparks.
http://techdirt.com/articles/20080527/0044331223.shtml





Judge Refuses To Sign RIAA 'Ex Parte' Order
NewYorkCountryLawyer

The RIAA just can't get enough of going after University of Maine students, but it appears that the judges in Portland, Maine, may be getting wise to the industry's lawyers' antics. RIAA counsel submitted yet another ex parte discovery order to the Court ("ex parte" meaning "without notice"), in BMG v. Does 1-11, but this time the judge refused to sign, pointing out that there is no emergency since there is no evidence that records are about to be destroyed. This is the same judge who has previously suggested the imposition of Rule 11 sanctions against the RIAA lawyers, accusing them of gamesmanship."
http://news.slashdot.org/article.pl?.../05/29/2259238





MPAA Threatens World’s Premier Usenet Indexer
enigmax

Newzbin, considered by many to be the internet’s premier indexer and .nzb provider, is under legal threat from the MPAA. The site, which was the creator of Usenet’s answer to the .torrent file, will likely have to undergo significant changes in order to appease the movie studios.

Newzbin is one of the original Usenet indexing sites and creators of the .NZB format. In a very general way, .NZB files might be considered Usenet’s equivalent of .torrent files. They make the otherwise-complicated Usenet a breeze to use. Downloading from Usenet with Newzbin is easy, and together with a good news provider, very quick.

The increased popularity of services such as Newzbin didn’t go unnoticed with the MPAA. On 22nd May 2008, administrator ‘Caesium’ made an announcement:

Quote:
Newzbin has today received a letter from the Motion Picture Association (MPA). In the letter, they claim that some editors may be reporting material from Usenet that is infringing the copyright of their members.

While these claims have not been substantiated, it should be noted that Newzbin does not condone the distribution or indexing of such materials. We will immediately act to remove any items that are found to be infringing copyright.

Please take a moment to refer to our Terms and Conditions, in particular sections 4 and 4.2.

Please note that we may revoke privileges, or ban accounts, of users found to be violating these Terms and Conditions.
Since this announcement, worried Newzbin users have contacted TorrentFreak to see if we could find out exactly what had been going on. Understandably, Newzbin didn’t want to tell us much.

However, if one looks closely at the announcement, it doesn’t tell us anything that we didn’t already know. The terms and conditions have been in place since 2007, there doesn’t appear to be anything new in those.

Of course Newzbin doesn’t condone the indexing of copyright works. How can it? It is a proper company that charges users for access, not an underground operation hiding in the shadows. It appears to comply fully with the laws in the UK, where the service is based. Newzbin also say they will remove anything that infringes copyright. NZB files do not, so at that point they probably believed they would have little work to do.

But the MPAA isn’t known for letting the law stand in the way of a good threat, threats which have closed several US-based NZB sites in the past such as NZB-Zone and forced others to adjust the way they operate. Newzbin has not been sued, we can confirm that, but it will have to change the way it operates too, if it is to comply with the movie industry demands.

Caesium is hinting at possible changes to the site in the future. It’s a possibility that all .NZB related reports will have to be removed. An alternative to appease the MPAA would be to remove only the posts related to movies and TV shows, an arrangement favored by BinNews.com when faced with the same legal threats.

At this point it is far from clear what measures Newzbin will be finally forced to take to stop the threat of legal action turning into an actual lawsuit. Newzbin appear to be being as upfront as they can at this point and are suggesting that if users only use the site for .NZB files, then they should consider not renewing their subscription. For those who aren’t scared of making their own .NZBs ‘BinSearch’-style, the site will still be of great use, even if the most draconian measures are taken.

BinSearch provides Usenet indexing with a do-it-yourself .NZB creator. Anyone who knows the full scene release name of the material they seek will adjust to it in a few minutes, but it’s no Newzbin. For the uninformed, the learning curve is steep.

Newzbin has a secret weapon which has made it so attractive. ‘Editors‘ are essentially human beings who make reports which link to specific content on Usenet. Newzbin can then generate a .NZB file, based on the report. Anyone with an NZB capable news reader, like Grabit, can use them. It seems that it’s this human intervention with the creation of reports which poses the legal headache.

Newzbin is considering that it may have to fully automate its operations in order to be totally sure of staying the friendly side of the law - no more human intervention, no more ‘editor’ named reports. No more easily browsable pre-determined categories. A simple Usenet search engine would likely attract little attention and would be entirely legal, as confirmed by Caesium: “…we’re pretty sure nobody is going to tell us that having an automated searchable index of the entire contents of Usenet is going to cause any problems.”

But why would anyone bother using a degraded Newzbin over, say, the very useful (but limited) ‘BinSearch’? After all, there would be presumably little to separate them, feature-wise.

The plan is to introduce a feature where Newzbin users can tag. This way the site can provide an entirely legal automated index - no Newzbin staff involved - with only the users adding the tags. It sounds like a great solution and may even prove just as workable longer term.

They say every cloud has a silver lining and for Newzbin, that might come in the form of a greatly increased userbase. Newzbin is currently a subscription service but the changes may well turn it into a free site, which effectively opens it up to everyone rather than just its current paying userbase. That’s a hell of a lot of tags. Thankfully there will likely be a ratings system, to ensure quality tagging.
http://torrentfreak.com/mpaa-threate...ndexer-080528/





B.C. Man Who Runs Popular File-Sharing Website Targeted in Hollywood Lawsuit

Five years ago, Gary Fung set up a small website in his B.C. home to let visitors search for files available through a then-emerging peer-to-peer file-sharing system called BitTorrent.

What started as a hobby project to help Fung improve his programming skills has grown into one of the largest file-sharing websites on the Internet - with five paid staff members and growing advertising revenues - and has made Fung the target of a major lawsuit launched by the Hollywood film industry.

"At first, it was a side-project to learn some of the language and databases - mostly for technical reasons," says the 25-year-old Richmond man, who started isohunt.com while studying computer engineering at the University of British Columbia.

"I hosted it off my cable modem at home, so it hardly had any traffic."

But in the years since, Fung has put his studies on hold as he maintains a website that sees 18 million visitors a month, linking them to more than 25 million files ranging from music and movies to video games and software.

Fung first heard from the Motion Picture Association of America - or MPAA - more than three years ago, when the association's lawyers wrote him demanding copyrighted movies be taken down immediately.

The MPAA launched a lawsuit in a U.S. court in 2006.

Fung says he's always been watching the long list of legal cases that have dogged other file-sharing websites, prompting many to shut down to avoid costly court battles and in several instances resulting in multimillion-dollar settlements.

But, while other websites have collapsed long before their legal cases were resolved, Fung says he intends to fight the lawsuit through the courts.

BitTorrent works differently than other popular file sharing methods.

Users download a small file - called a torrent - connecting them to a tracker, which keeps tabs on who else has a particular movie, piece of music or software program.

Instead of downloading from one computer, someone obtaining a file through BitTorrent is actually downloading small pieces from hundreds or even thousands of users, as well as also uploading small pieces themselves.

Fung's site doesn't host the actual file or do the tracking - it crawls other websites looking for the small torrent files and puts them into a searchable database.

Fung argues that sites such as his simply automate the process and don't have any control over whether users share files legally or abuse the system.

"That's really a problem with the copyright system and how people want to share things. It's a social problem, and it's far beyond what we can control," says Fung, who insists he removes material if the copyright owners follow a formal complaint process.

The MPAA, however, claims BitTorrent websites like isohunt.com exist for no other reason than to trade in pirated material.

"All of them are inducing massive copyright infringement, and they are making a lot of money doing so," says John Malcolm, the association's anti-piracy director.

"All of these films that are either being hosted by these sites or to which they are providing links or torrents, are stolen movies. They're not paying any licensing fees, there is no deal with any artists, there is no deal with any studio."

Malcolm rejects Fung's argument that he's not responsible for how people use his site, saying it's not the role of copyright holders to police the Internet and ask for their material not to be shared.

"There are a lot of sites out there where copyrighted material appears, but these are businesses that have a legitimate business model that is not exclusively premised on copyright infringement in order to work," says Malcolm.

The judge in the lawsuit is currently deciding whether to hand down a summary judgment or order a full trial.

Malcolm wouldn't explain why the MPAA is pursuing its lawsuit against Fung - a Canadian - in a U.S. court, other than to say it was free to choose from a number of jurisdictions.

But industry associations have long complained that Canada's copyright laws provide a haven for movie and music pirates without much consequence.

"Canada's laws are not up to snuff, that's been recognized by all sorts of people," Malcolm says. "With respect to laws to address online piracy, they are not what they should be."

The MPAA and Fung will both be watching how Ottawa updates Canadian copyright laws with legislation expected sometime this year.

However, University of Ottawa copyright expert Michael Geist says Canada's laws already cover many forms of illegal file sharing, and he says changes to the law likely wouldn't affect sites like Fung's.

Geist, who holds the Canada research chair in Internet and e-commerce, says efforts to paint Canadian law as weak aren't fair.

"Copyright law applies online in the same way that it does offline," he says. "While we are anticipating changes in the law, I think it would be a misnomer to suggest the Internet was a free-for-all."

Trading copyrighted movies and software is already illegal, Geist says, while it is illegal to upload - but not to download - music.

There have already been several criminal cases involving online movie piracy, but those have been against individual users, not large websites.

Under both Canadian and U.S. law, Geist says, one of the issues a court would have to weigh is how much copyright infringement is occurring, compared with legitimate uses.

"They fall in a bit of a grey zone not because the law has a shortcoming, but because their activities themselves include some that are clearly permitted under the law, and some that may involve acts of infringement," says Geist.

Geist notes file sharing systems like BitTorrent are already seeing more legitimate uses.

A national Canadian broadcasting agency recently used BitTorrent to post free downloads of its "Canada's Next Great Prime Minister" program.

"When you think of new technology, it's often the case that it takes time for the authorized uses to exceed the unauthorized uses," says Geist.
http://canadianpress.google.com/arti...mnTJxfHaBD01dw





OiNK Investigation: Police Start Making Arrests
enigmax

TorrentFreak has received information which suggests that British police have made good on their claim that they would go after ex-users of OiNK. Last week, several officers arrested at least one individual for the seeding of a single album. It is believed police are in the process of arresting and questioning others.

When the OiNK tracker was shutdown in 2007, a statement appeared on the site’s homepage. This time - and unusually for the UK - it would be the police investigating a file-sharing case, not some anti-piracy group flexing their muscles in civil action. But even now, months after OiNK was shutdown, no-one - including OiNK admin Alan Ellis - has been charged with anything.

Would OiNK users really become a target for the police, despite the presumed civil status of sharing music on P2P networks? If so, why?

Right from the start, there has been a concerted effort by various elements of the music industry to portray everyday citizens using OiNK - presumably including the likes of Trent Reznor - as hardened criminals out to ruin the industry. At the time, BPI Chief Executive Geoff Taylor called OiNK a “closed criminal network” and unfortunately this type of comment set the general tone for many follow up news articles.

In reality, OiNK offered no music of its own but was the venue of an unofficial virtual party, where a limited number of people listened to music without fees or charges, in a modern take on pirate radio - but with a twist. If people had some music to share with others then so much the better, they could bring it along, add it to the index (and that’s all OiNK was, an index) and everyone could listen, to see if they liked it too.

Of all things, it was certainly not about money and a large proportion of the members wouldn’t even have considered that sharing music would result in police knocking on the door, any more than as a result of them using YouTube. But knock they did.

Last week Cleveland Police arrested a user of OiNK in the Cheshire area, who was questioned and later released on police bail. It is alleged that the individual - a normal user of the site who has no previous involvement with the police and no criminal convictions - uploaded a solitary album in early 2007.

Furthermore, information suggests that the police will be arresting and interviewing more users in the course of this investigation but at this stage it is unclear exactly who they are targeting and why. A one-off album uploader seems an unlikely target, particularly as legally in the UK, the fact that the album was allegedly pre-released - as opposed to released after retail - means little.

Going on previous cases, uploading (sharing) would be a civilly actionable offense - lawyers Davenport Lyons in the UK are happy to send out bills to those it claims uploaded its client’s games and the police aren’t interested. But for reasons no-one seems to fully understand, the police are involved in this case and have sent a car full of officers to make an arrest at the individual’s place of work, all for sharing a few minutes of music.

Another issue up for debate is the big question mark sitting over the usefulness of site logs. Stats are manipulated all the time for one reason or another and trackers have to rely on a user’s torrent client reporting data correctly. To be anywhere close to proving infringement it is necessary to track the transfer of data from within the swarm by directly receiving data from the uploader. This is fairly trivial, does not require the site logs and importantly should’ve been done at the time the album was uploaded. Why there has been such a huge delay in taking further action is unknown.

Last year saw an unexplained shift in the way copyright actions are dealt with in the UK. Out of nowhere, both OiNK and the popular TV-Links sites were taken down by police action where one would usually expect a civil lawsuit, leaving prominent legal experts intrigued as to the legal basis.

Uploading one album is not the world’s most heinous crime, in fact, unless the UK legal system changed overnight, it’s not a crime at all since there would’ve been no commercial gain for the user. So what route is this investigation taking? What is the significance of arresting this individual and investigating others over a seemingly small civil issue, and why has it taken so long to do so?

As usual, there are more questions than answers. The arrests have started, but it is unknown how many people are involved. We contacted the Police department that was responsible for at least one arrest, however, they did not respond to our inquiries. If you have any information, please contact TorrentFreak here, as we will post an update of the arrests later this weekend.
http://torrentfreak.com/oink-investi...rrests-080530/





Proposed Secret Copyright Deal Takes Aim at iPods, Providers
Vito Pilieci

The Canadian government is secretly negotiating an agreement to revamp international copyright laws which could make information on iPods, laptops and other personal electronic devices illegal and greatly increase the difficulty of travelling with such devices.

The agreement could also impose strict regulations on Internet service providers, forcing those companies to hand over customer information without a court order.

Called the Anti-Counterfeiting Trade Agreement (ACTA), the new plan would see Canada join other countries, including the United States and members of the European Union, to form an international coalition against copyright infringement.

Details of the agreement, which is expected to be tabled at July's meeting of G8 nations in Tokyo, were leaked on the Internet on Friday.

The agreement is being structured much like the North American Free Trade Agreement, except it would create rules and regulations regarding private copying and copyright laws. Federal trade agreements do not require parliamentary approval.

The agreement would create an international regulator that would turn border guards and other public security personnel into copyright police. The security officials would be charged with checking laptops, iPods and even cellular phones for content that "infringes" on copyright laws, such as ripped CDs and movies.

The guards would also be responsible for determining which content infringes on copyright laws.

The agreement also proposes that any content copied from a DVD or digital video recorder be open for scrutiny by officials - even if the content was copied legally.

"If Hollywood could order intellectual property laws for Christmas, what would they look like? This is pretty close," said David Fewer, staff counsel at the University of Ottawa's Canadian Internet Policy and Public Interest Clinic.

"The process on ACTA so far has been cloak and dagger. This certainly raises concerns."

The leaked ACTA document states officials should be given the "authority to take action against infringers (i.e., authority to act without complaint by rights holders)".

Anyone found with infringing content in their possession would be open to a fine. They may also have their device confiscated or destroyed, according to the four-page document.

The proposal includes "civil enforcement" measures which would give security personnel the "authority to order ex parte searches" (without a lawyer present) "and other preliminary measures."

In Canada, border guards already perform random searches of laptops at airports to check for child pornography. ACTA would expand the role of those guards.

On top of these relatively small-scale enforcement efforts, ACTA also proposes imposing new sanctions on Internet service providers. It would force providers to hand over personal information pertaining to "claimed infringement" or "alleged infringers" - users who may be transmitting or sharing copyrighted content over the Internet.

Currently, rights holders must collect evidence to prove someone is sharing copyrighted material over the Internet. That evidence is then presented to a judge who can issue a court order telling the Internet service provider to identify the customer.

Mr. Fewer has been following the progress of ACTA and has exhausted every avenue at his disposal to gain insight into its details. He said Friday's leak of the "discussion paper" which outlines the priorities of the agreement is the first glimpse anyone has had into ACTA.

"We knew this existed, we filed an Access to Information request for this, but all it provided us with was the title. All the rest of it was blacked out," he said.

"Those negotiations can take place behind closed doors. At the end of the day, we may be provided with something that has been negotiated which is a fait accompli in which civil society gets no opportunity to critique it."

Mr. Fewer expressed particular concern about one area of the proposal that calls for ACTA to operate outside of accepted international forums such as the World Trade Organization, the World Intellectual Property Organization or the United Nations.

The document proposes that ACTA create its own governing body and be overseen by a committee made up of representatives from member nations. Organizing its own governing body would make ACTA unaccountable to any existing international trade organization.

"This initiative is unprecedented," he said.

The paper was leaked online by Sunshine Media, the company that runs the Wikileaks.org website - a whistleblowing site created to help circulate secret documents.

In October, David Emerson, minister of International Trade, announced that Canada would take part in ACTA's creation. The initiative was originally aimed at stopping large-scale piracy, such as printing operations that make and sell thousands of copies of movies that are still showing in theatres.

"We are seeking to counter global piracy and counterfeiting more effectively," Mr. Emerson said at the time. "This government is working both at home and internationally to protect the intellectual property rights of Canadian artists, creators, inventors and investors."

The document is reported to have been drafted by the Office of the United States Trade Representative. A spokeswoman with the office refused to comment on the document.

Michael Geist, Canada research chair of Internet and E-commerce law at the University of Ottawa and expert on Canadian copyright law, criticized the government for advancing ACTA with little public consultation.

He said documents detailing ACTA's plans would not need to be leaked online if the process were transparent.

"That's what happens when you conduct all of this behind closed doors," he said. "The lack of consultation, the secrecy behind it and the speculation that this will be concluded within a matter of months without any real public input is deeply troubling."

The Department of International Trade said they would not comment on the document.
http://www.canada.com/ottawacitizen/...7-56ac6d28e822





Net Neutrality Bill Hits House of Commons
Peter Nowak

NDP digital spokesman Charlie Angus doesn't believe the CRTC has all the tools it needs to prevent interference in the internet by service providers

The NDP has followed through with its promise to introduce legislation to the House of Commons that seeks to keep the internet open and free from control by service providers.

"This bill is about fairness to consumers," said Charlie Angus, the NDP's digital spokesman, in the House of Commons on Wednesday. "The internet is a critical piece of infrastructure not just for Canada but for the world ... this bill protects the innovation agenda of Canada."

The private member's bill, C-552, is in reaction to moves by some of Canada's largest internet service providers (ISPs), including Bell Canada Inc. and Rogers Communications Inc., to limit their customers' uses of the internet. Bell, Rogers and a few others say a small percentage of customers have been congesting their networks by using peer-to-peer applications such as BitTorrent, so they have slowed the internet down at peak times of the day.

The ISPs' actions have provoked outrage from internet users, with about 300 protesters taking to the steps of Parliament Hill on Tuesday. Critics have said the targeting of peer-to-peer applications is just the tip of the iceberg. If ISPs are allowed to decide which internet applications can and can't be used, innovative new companies that were born from experimentation — such as Google, Amazon and eBay — may not happen in the future.

"Net neutrality affects everybody, every person, every business, every hospital, every institution is involved in the exchange of information over the internet," Angus told CBCnews.ca. "This shouldn't be about party lines."

The four-page bill seeks to amend the Telecommunications Act and "prohibit network operators from engaging in network management practices that favour, degrade or prioritize any content, application or service transmitted over a broadband network based on its source, ownership or destination, subject to certain exceptions."

It also looks to prohibit "network operators from preventing a user from attaching any device to their network and requires network operators to make information about the user's access to the internet available to the user."

The proposed bill makes exception for ISPs to manage traffic in reasonable cases, Angus said, such as providing stable speeds for applications such as gaming or video conferencing.

"There are areas where telecoms have to be able to exercise rights, but that doesn't give them the ability to arbitrarily interfere or discriminate," Angus said.
NDP wary about government intervention

The NDP is "very wary" about the government intervening in the internet, Angus told the House of Commons. But the bill isn't about regulating the internet, it's about ensuring there will be scrutiny of those who provide access to it, he said.

Now that the bill has been tabled, it has to wait to be called up in private members' business in the House. Angus is far down on the randomly generated list that determines the order in which members are scheduled to present their bills or motions, but he said he will try to trade positions with another party member to bring it up the list for discussion.

The point of the bill, Angus said, is to give MPs who otherwise have no idea what net neutrality is a reference point. It also gives critics a focal point for their arguments.

Officials at Bell and Rogers did not immediately return requests for comment.

A spokesperson for Minister of Industry Jim Prentice also did not immediately return a request for comment. The spokesperson also did not reply to requests for comment on the net neutrality rally.

Prentice earlier this month told the House that the government was against regulating the internet and would leave the matter to be resolved by ISPs and their customers.

Scott Brison still to weigh in

Liberal industry critic Scott Brison has not weighed in on the issue, despite having held meetings with Bell, Rogers and several smaller ISPs a few weeks ago. His spokesman did not reply to a request for comment on Wednesday.

Liberal MP Mauril Belanger spoke at the rally on Tuesday and said he was in favour of net neutrality, but added that the Canadian Radio-television and Telecommunications Commission already has all the tools it needs at its disposal to punish abuse by ISPs.

Section 27 (2) of the Telecommunications Act says: "No Canadian carrier shall, in relation to the provision of a telecommunications service or the charging of a rate for it, unjustly discriminate or give an undue or unreasonable preference toward any person, including itself, or subject any person to an undue or unreasonable disadvantage."

Section 36 also says: "Except where the commission approves otherwise, a Canadian carrier shall not control the content or influence the meaning or purpose of telecommunications carried by it for the public."

Despite those two sections, Angus said CRTC chairman Konrad von Finckenstein told the Standing Committee on Canadian Heritage two weeks ago that the regulator did not have sufficient means to punish ISPs violating the rules. Finckenstein said the CRTC needs the ability to impose monetary penalties for violating both the Telecommunications and Broadcasting Acts.

"It is something we need in our tool box," he said.
http://www.cbc.ca/technology/story/2...h-netbill.html





Stuck with Analog Rights in Digital World
Michael Geist

Earlier this month, some fans of the NBC television programs American Gladiators and Medium found themselves unable to digitally record the shows on their personal computers. The reason for the blocked recordings raises important technical and legal questions about the rights of consumers to "time shift" television programs in the digital era.

The blocked recordings affected people that record television programs on their personal computers using the Microsoft Windows Vista Media Centre. Most people are unaware that Microsoft has inserted a feature that allows a broadcaster or content owner to stop the digital recording of a show by triggering a "broadcast flag" that specifies its preference the show not be recorded. When the user tries to record it, Microsoft's software recognizes the flag and issues a warning that the program cannot be recorded.

While there was speculation that the NBC broadcast flag was triggered accidentally, the incident provided an important reminder about the current fragility of consumer digital rights. The law in the U.S. has granted consumers the rights to time shift programs for decades, yet broadcasters can seemingly stop the ability to record programs in the digital world with the flick of a switch.

Cable providers enjoy similar capabilities. Digital cable boxes used by companies such as Rogers and Shaw include a CableCard that allows users to watch and record digital television shows. The CableCards feature functionality (technically known as CGMS-A) that allows broadcasters and cable companies to establish limits on recording programs.

Programs are broadcast with one of three specifications – copy freely, copy once, or copy never. The copy never specification is typically used for pay-per-view or video-on-demand programming. As the recent NBC incident illustrates, however, there is the potential for far broader restrictions. In fact, Internet chat sites are filled with postings from aggrieved Canadian consumers who claim that they have been blocked from recording a wide range of television shows.

As broadcasters and content owners increasingly sell or stream their content online, the incentives to block consumers from making their own recordings grows. In the United States, the law restricts the ability to block digital recordings, since cable companies face potential fines for blocking content that is not either video on demand or pay-per-view. There are no similar restrictions in Canada.

Not only are Canadians more vulnerable to abusive use of a broadcast flag, but their rights to even record "copy freely" programs are open to question. The Canadian Association of Broadcasters recently told the CRTC that consumers who record television shows for later viewing, whether on a VCR or PVR, violate the law.

There has been recent speculation that Industry Minister Jim Prentice will soon introduce new legislation that would legalize time shifting in Canada. However, the use of broadcast flags or other recording restrictions in Canada suggests that the legal reform may be too little, too late.

Creating a Canadian time shifting provision might allow for the recording of analog television programs that cannot be blocked through a CableCard or the Windows Vista Media Centre. In the digital world, however, the new right will be illusory since technology can be used to trump the law. Moreover, Prentice may actually make it illegal to circumvent the blocked recordings, meaning that Canadians that attempt to exercise their rights to record television programs in the digital environment could face the prospect of tens of thousands of dollars in liability.

Addressing the rights of Canadians to record television programs is long overdue. In tackling the issue, Prentice must be sure to avoid merely providing Canadians with analog rights in a digital world.
http://www.thestar.com/article/429825





Did Deutsche Telekom Spy on Journalists and Board Members?

German telecommunications giant Deutsche Telekom stands accused of having monitored telephone calls of business journalists, board members and shareholders. An anonymous fax may result in a criminal investigation.

Had it not been for the money, there is a good chance that the entire "unsavory story" -- as a senior executive at German telecommunications giant Deutsche Telekom AG called it last week -- would never have come to light. Most of all, though, it was a fax that revealed the story -- and exposed an absurd concoction of economic spying, power-hungry megalomania, paranoia, and a complete disregard for the freedom of the press.

The fax arrived at the company's headquarters in Bonn about four weeks ago, addressed to the head of Telekom's legal department. And the threatening undertones seemed difficult to ignore, especially given the words that appeared at the end of the three-page document, which SPIEGEL has obtained: "You should not underestimate my aggressive potential and my staying power."

It was, at the very least, a reckoning in two parts: The head of a Berlin management consulting company, from whom the fax came, was calling on Telekom's head lawyer to contact him without delay. The goal, he wrote, was to achieve "a controlled termination of our business relationship protected against indiscretion." At the same time, the letter was the formal end to long-term activities that apparently served one overriding purpose: to spy on German business journalists, members of the supervisory board and senior company executives, including monitoring their telephone communications with one another.

Journalists, Board Members and Shareholders

The company itself, led by then CEO Kai-Uwe Ricke and monitored by a supervisory board headed up by then Deutsche Post CEO Klaus Zumwinkel, is accused of being behind the alleged spying. And the Berlin consulting firm, whose chief executive sent the April 28 fax, was hired to carry it out. The goal of the "Clipper" and "Rheingold" surveillance programs, as well as other "secondary projects," the fax makes clear, was to "analyze several hundred thousand landline and mobile connection data sets of key German journalists reporting on Telekom and their private contacts."

But that wasn't all. The same procedure, according to the memo, was repeated with "several supervisory board members on the employee side" -- "for a total period of one-and-a-half years."

Other spying campaigns had already been "specifically planned and assigned," including "the surveillance of one of your shareholders, a company headquartered in New York." This is likely a reference to Telekom shareholder Blackstone. Moreover, the letter continues, the office of an "important business journalist," had been infiltrated by a mole who had reported "directly to corporate security" at Telekom for several months. The head of the security company leaves no doubt that "the projects, even by intelligence standards, can be described as unusually broad and sophisticated."

All of this, according to written allegations, was ordered "directly by management (in close cooperation with the then chairman of the supervisory board) and paid for directly by the chairman of the board, through the office of the supervisory board." But apparently not all fees were paid and a dispute eventually erupted.

It is still unclear how much of the alleged spying operation is in fact true. Telekom confirmed that it has turned the matter over to the public prosecutor's office. Company representatives, citing the ongoing investigation, have declined to comment on details of the case but said the operation was apparently coordinated with the supervisory board and its chairman. "We take this situation very seriously. We will do everything within our power to support the prosecutor's office in its efforts to conduct a thorough investigation," says current Telekom CEO René Obermann.

A Host of Criminal Charges

Lothar Schröder, Telekom's chief union negotiator and deputy head of the supervisory board, who may have been a target of surveillance himself, is outraged: "If the accusations are confirmed, it would be an unprecedented breach of trust and an unbelievable scandal, and those responsible for it should be brought to justice as quickly as possible." Schröder nevertheless said that he was convinced the current management is interested in a speedy and thorough investigation.

Obermann reacted immediately when the security department first became aware that something was amiss. The head of security was replaced and the entire department was completely reorganized. In addition to reporting the incident to the chancellery and the Finance Ministry in Berlin, Obermann forwarded the entire case to the office of the public prosecutor in Bonn. The task that office now faces is to determine who may have been guilty of what crimes in the period between 2005 and 2006 -- a period when Obermann's predecessor Ricke was still in charge of the company. Investigators are still examining the extensive Telekom material and have not yet launched an official investigation.

But such an investigation, company officials believe, is only a matter of time. Even if only a fraction of the allegations are true, the company could face a host of criminal charges, ranging from violation of the secrecy of telecommunications to bribery and even extortion.

There were many indications last week that at least some low-level spying must have taken place against several labor representatives and members of the supervisory board, including Wilhelm Wegner, the head of the group works council. There was also mounting evidence that agreements had in fact been made with the Berlin-based company that contacted Telekom in February to demand payment of supposedly unpaid invoices ranging in the six figures. Moreover, there are indications that former CEO Ricke and his Supervisory Board Chairman Zumwinkel were frustrated that reports of confidential board meetings were repeatedly leaked to the press.

Trouble Was Brewing

The Berlin consulting firm was allegedly hired in the spring of 2005 to explore where the leaks could be coming from. The firm was asked to compare the telephone records of members of the supervisory board with those of well-known business journalists who reported on Telekom.

The snooping campaign against the head of the works council happened in a turbulent phase for Telekom. Following the dramatic plunge of Telekom's stock from a high in March 2000, CEO Ron Sommer resigned in July 2002 under pressure from the German government, a major shareholder in the company. Ricke took over the post in November. He reorganized Telekom management and turned his back on his glamorous predecessor's global visions. With his tough cost-cutting measures and the sale of several divisions Ricke, whose father had also run Telekom in the past, returned the company to financially sound footing.

Even analysts and shareholders began to respect the awkward and graying Ricke. But trouble was brewing inside Telekom. Employees were becoming increasingly concerned about job security. In early 2005, Ricke had announced that Telekom would have to cut at least 8,500 jobs a year in the future.

Searching for the Moles

When members of the works council began mentioning a figure of roughly 45,000 jobs that the company planned to eliminate by 2008, the service workers' union Ver.di became involved. Ver.di made its deep opposition to the job cuts clear when it referred to Telekom's plans as "clear-cutting," "an outrage" and a "scandal when it comes to employment policy."

Ricke relented. The members of his executive board -- especially René Obermann, head of the mobile division at the time, and Walter Raizner, head of the landline division, T-Com -- were already deeply suspicious of one another, and treated each other as rivals more than colleagues. The discord made it all the more attractive for the press to report on internal meetings.

The environment in which the company was operating changed dramatically during this period. The landline business faced growing competition from small upstart providers, leading to sharp declines in prices and sales. The boom in fast DSL Internet connections had only just begun and had yet to yield the anticipated results. Even the mobile telephony business was no longer achieving the growth rates of earlier years. But while major European competitors adjusted to the new realities by gradually breaking down the classic barriers between mobile telephony, landlines and the Internet, senior executives at Telekom headquarters in Bonn were unable to agree on a strategy for the company. The constant endless meetings didn't help, ending, as they often did, in half-hearted solutions poorly suited to solving Telekom's problems.

The direct consequences were customer flight, crumbling earnings and an ongoing decline in the company's stock price. Criticism of the company grew even further when US investment group Blackstone bought a slice of Telekom in 2006.

Speculation over replacement of the indecisive Telekom CEO began circulating in the press, fueled by internal memos from meetings of the executive and supervisory boards that could only demonstrate one thing: that Ricke was indecisive and wavering. His tenure as CEO quickly came to an end after that. Supervisory Board Chairman Zumwinkel forced the hapless chief executive to resign and replaced him with Obermann.

'As Full of Holes as Swiss Cheese'

That was in November 2006, the date when Telekom now assumes the spying came to an end. The author of the fax from Berlin, on the other hand, claims "we can prove that we were still involved in the 'Clipper' project after November 2006." The fax says one only need to ask people like Zumwinkel or Ricke.

At the end of last week, both executives sharply denied having had any knowledge of specific eavesdropping activities. But former CEO Ricke also did not deny that Telekom, during his tenure, repeatedly tried to find leaks within the company. "Telekom," said Ricke, "was as full of holes as Swiss cheese." According to Ricke, internal documents were repeatedly leaked to the public, especially during the second half of his term, "some of which contained information that could affect the stock price" -- about planned acquisitions abroad, for example, or planned job cuts.

Speaking to SPIEGEL last Friday, Ricke said: "We discussed this often in the executive board, and we decided to take active steps to combat it." In consultation with Supervisory Board Chairman Zumwinkel, the corporate security department, which was then headed by Labor Director Heinz Klinkhammer, was "many times assigned to complete the necessary investigations."

Several steps were taken to expose the informants, including applying individual, secret codes to all executive board documents. Occasionally, documents containing false information were distributed before executive board meetings, the goal being to determine "which pieces of information are reaching which press organizations."

In some cases, the corporate security department "hit pay dirt after some detective work." Ricke, however, insists that he was unfamiliar with the methods that the department's several hundred employees used, emphasizing: "I never gave illegal orders at the time, and certainly never asked anyone to eavesdrop on telephone connection data."

A spokesman for Zumwinkel issued a similar statement: "A supervisory board director cannot give instructions to employees of the company. The alleged storage of data occurred, if at all, without the consent of the then supervisory board chairman." The spokesman went on to say: "It's a good thing that the alleged procedures and incidents are being investigated."

Required by Law to Protect Confidentiality

Both men have said that they are not willing to rule out the possibility that the eavesdropping campaigns existed. They also insist that they had no knowledge that anything illegal was taking place.

Telekom's underhanded use of data is being exposed at a time when the government is holding the Bonn-based company to extremely high standards, in terms of both data confidentiality and trustworthiness. As of Jan. 1, all telephone and Internet providers in Germany are required to keep all connection data on file for six months. This reflects an EU decision reached after the 2004 Madrid terrorist attacks, as well as the wishes of German investigators. Otherwise, they fear, all evidence could already be deleted if they happen upon a suspect months after a crime was committed and then attempt to unravel the network of accomplices.

But this makes industry leader Telekom into something of a law enforcement arm of the state, now more than ever. And it makes it all the more embarrassing that the company is now under suspicion of having abused the wealth of data at its disposal.

Just how sensitive such data is, whether collected by Telekom or other telecommunications companies, was made clear by Germany's high court in March when it significantly narrowed the scope of new regulations governing data storage. Under the ruling, investigators can only gain access to the telephone records of suspects charged with serious crimes that carry a potential prison sentence of more than five years. In all other cases, Telekom is required to preserve the secrecy of its customers' data.

But now Telekom's old management has come under the suspicion that it was less than trustworthy for many years, and not just with the personal data of its own supervisory board members and executives. The attempt to match up the board members' and executives' phone records with those of journalists suggests a stunning disregard for democratic values.

Courts in the past have tightened the reins several times on investigators who were eavesdropping on journalists with the intent of uncovering their sources within government agencies and judicial bodies. Thus, for example, the German Constitutional Court declared the search of the Cicero editorial offices in 2004 to have been illegal. An attempt by authorities in the state of Saxony to use the telephone records of a Dresdner Morgenpost journalist in an investigation was likewise struck down.

And it was revealed in 2006 that the Bundesnachrichtendienst (BND), the German foreign intelligence agency, had illegally placed journalists under surveillance for years while searching for a mole in its own ranks. As recently as a few weeks ago, the federal government had to issue a public apology when it was revealed that the BND had lapsed back into its old practices with SPIEGEL reporter Susanne Koelbl.

It should have been clear to the Telekom executives that by scanning employees' and board members' telephone records for calls made to journalists, they were not just operating in a gray area, but in a forbidden zone. In that zone, putting too much trust in the head of a Berlin consulting is apparently a dangerous thing.

According to the letter from that company manager, the situation had become "extremely threatening" to him and his company. If his fax were to be passed on to third parties other than Telekom CEO Obermann, the company would have to "interpret it as a declaration of war," the manager wrote, adding that he does not wish to lose the opportunity to defend himself "in the media, if necessary."

He is likely to have that chance very soon.

By Beat Balzli, Jürgen Dahlkamp, Frank Dohmen and Klaus-Peter Kerbusk

Translated from the German by Christopher Sultan
http://www.spiegel.de/international/...555363,00.html





Global Dreams for a Wireless Web
John Markoff

Menorca, Spain

SITTING on the porch at Finca Torrenova, his 800-acre retreat on this Mediterranean island, Martin Varsavsky ticks off the credentials of the group of Internet entrepreneurs finishing lunch at a nearby table.

“He has 40 million uniques, he has 50 million, and he has 8 million,” Mr. Varsavsky says, referring to the number of visitors to Web sites owned by his guests — many of whom are also business associates and have joined him for several days of brainstorming about the digital future.

These days, commercial victory on the Internet is all about scale, and Mr. Varsavsky, a 48-year-old from Argentina, can be forgiven for speaking longingly and in detail about his peers’ achievements. No stranger to success — he has had a tidy crop of new media and telecommunications hits since the 1990s — he is still struggling to bring his newest Internet venture to fruition.

Three years ago, aiming to create a global wireless network, he founded FON, a company based in Madrid that wants to unlock the potential power of the social Internet. FON’s gamble is that Internet users will share a portion of their wireless connection with strangers in exchange for access to wireless hotspots controlled by others.

The swaps, in theory, would allow “Foneros” to have ubiquitous, global wireless access while traveling for business or pleasure. But despite $55.2 million in backing from such corporate heavyweights as Google and BT, the former British Telecom, as well as newer enterprises like Skype and a handful of venture capital firms, FON and Mr. Varsavsky are still missing a crucial ingredient: scale.

At the moment, there are just 830,000 registered Foneros around the world, and only 340,000 active Wi-Fi hotspots run FON software. Because it’s built upon the concept of sharing Wi-Fi access, FON works well only if there are Foneros everywhere.

And as he struggles to expand the FON network, Mr. Varsavsky faces particular hurdles now that the Internet’s commercial side has reached a crossroads. Born a few decades ago as an anarchic, digital version of a barn-raising, the wireless Internet is now a battleground between two giant technology consortiums seeking to rein in the Web’s chaotic openness in favor of creating uniform, global access built upon wireless data networks.

The two camps, known as WiMax and L.T.E., for “long-term evolution,” are both top-down, highly structured approaches that will cost billions of dollars to build and may close a door on some of the architectural openness that led to the rapid growth of the Internet.

But their potential advantage is that closed standards can encourage the kind of growth that offers more access to mainstream consumers and business users, as occurred when Microsoft imposed a measure of conformity on software development.

For his part, Mr. Varsavsky hopes that FON can offer a middle ground — deploying the original, bottom-up strengths of the early Internet movement and at the same time wedding them to a more formal, corporate approach to expansion.

Although FON faces huge obstacles in realizing those ambitions, the company also has a growing number of devotees.

“The wireless Internet market today is fragmented and complex — it can be accessed through 3G operators, through WiMax, through private hotspots, through paid hotspots and through corporate networks,” said Michael Jackson, a partner at Mangrove Capital in London and a former FON board member. “In summary, it is a nightmare for a consumer. FON can and will change this.”

But others have their doubts.

“I know that the people at Google like this idea,” said John Saw, the chief technology officer at Clearwire, the WiMax start-up of Craig McCaw, which recently announced a $14.5 billion joint venture to build a nationwide WiMax network with Sprint, Google, Intel, Comcast and others. “But we’re skeptical.”

Undeterred, Mr. Varsavsky says that what he currently lacks in scale he can make up for in huge cost savings, particularly because FON avoids the expensive proposition of having to build a worldwide network of cellular towers and Wi-Fi nodes from scratch.
“Our army of Foneros is a much more efficient way of distributing a signal,” he says. “We believe WiMax operators will be happy to have some customers use their services for free and save billions in infrastructure deployment.”

MR. VARSAVSKY has worked overtime trying to line up more high-profile partners for FON. To that end, he traveled to Cupertino, Calif., last fall to meet with Steve Jobs, the chief executive of Apple.

During that 90-minute meeting, Mr. Varsavsky says, the two men discussed why a partnership might make sense.

Apple has sold millions of its Wi-Fi routers to residential customers, and its community of Wi-Fi users who share router access would be an ideal platform for FON. For his part, Mr. Jobs had developed an interest in Wi-Fi sharing because of the expanding number of iPhone users who are often frustrated by locked Wi-Fi access points.

But, Mr. Varsavsky says, from the moment that he and Mr. Jobs met, their discussion devolved into an argument. (Mr. Jobs did not respond to requests to comment on the meeting.)

At the outset, Mr. Varsavsky recalled, Mr. Jobs asked sharply, “Who needs your community?” and “Why should British Telecom bother to do a deal with you, and why shouldn’t people just leave their routers open for sharing?”

Mr. Varsavsky says he responded, “Why should you bother to do a deal with AT&T? Shouldn’t iPhones just be connected freely with any cellphone network?”

Mr. Varsavsky says he left the meeting with the uncomfortable feeling that Apple might end up as a competitor rather than as a partner. But it wasn’t only because of Mr. Jobs’s legendary stubbornness that the Apple meeting apparently went awry. Mr. Varsavsky’s own substantial ego also came into play — something he freely acknowledges when he talks about how he first got into business.

“My father died and my mother was saying, ‘Martin, get a job, get a job,’ ” he recalls. “And I would go to job interviews and they would say, ‘How do you see yourself in five years?’ And I would say, ‘Well, at least as your boss!’ ”

That attitude surfaced in other forums as well. In high school in Argentina during the 1970s, he says, he persuaded classmates to open their own office supply store to compete with a store across the street from their school. He also declared his interest in left-leaning politics, which he said attracted the attention of the Argentine military junta that was purging high schools of dissidents. In the “dirty war” of 1976-83, the government killed thousands it suspected of being leftists.

An officer told the school to expel him, Mr. Varsavsky says, and he left for Brazil. Around the same time, he believes, his cousin was kidnapped and killed by the military. The Varsavsky family fled to the United States, and Mr. Varsavsky earned his undergraduate degree in economics and philosophy at New York University in 1981. He later attended Columbia University, where he received graduate degrees in international affairs and business administration.

MR. VARSAVSKY says start-ups got into his blood during graduate school, when he made his first million in a real estate foray: renovating and reselling lofts in New York.

After moving to Spain in the 1990s, he had three big telecommunications and Internet successes. He says that a $200,000 investment he made to start a long-distance company, Viatel, in 1990 was worth about $240 million when he cashed in his stake in 1999; that the 5 million euros he used to start Jazztel in 1997 has given him a stake now worth about 150 million euros; and that the 38 million euros he used to start a Spanish Internet service provider, Ya.com, in 1999 had grown to about 149 million euros when he sold the company the next year.

Then, after this first round of success, Mr. Varsavsky was hit with a loss that he describes as a striking, gut-wrenching failure. His German start-up EinsteinNet, founded in 2000 as an effort to sell software over a private fiber optic network, collapsed in 2003, leaving him with a personal loss of $50 million.

“I used the most money of my own in a company where I lost it all, and I consider it my business black eye,” he recalls, saying that he also drew a valuable lesson from the misadventure: “I don’t invest on my own. If other people don’t want to back me, it’s a sanity check.”

TO that end, Mr. Varsavsky has become a tireless networker, traveling the world to participate in a continuous parade of technology conferences and cultivating a global retinue of friends and contacts. He has also been active on the philanthropic front, earning kudos from a onetime resident of the White House.

“Martin represents the future of entrepreneurial culture and is helping to transform the way people give,” former President Bill Clinton says. “He has found different ways to use his acute business sense and creativity to improve our world and the lives of others.”

This month, Mr. Varsavsky brought together more than 70 Internet business people and technologists from Europe, Asia, Latin America and the United States for a conclave on his Menorca farm. Some guests represented the more than 20 digital enterprises in which he has a stake; others were “friends of Martin,” a loose-knit group that comprises his informal business network around the world.

The four-day conclave featured several unscripted “tech talks” in which entrepreneurs described problems they faced building their businesses. Participants included Lukasz Wejchert, the chief executive of Onet, Poland’s dominant Internet portal.

Deals with companies like Onet will be crucial if Mr. Varsavsky is to make good on his goal of having a million FON customers on each of three continents by 2010. The two companies recently came close to a deal, Mr. Wejchert says, but Onet decided that it was still to early for it to become an Internet service provider in Poland because the regulatory environment worked against new entrants.

That major players like Onet are beginning to find FON a potentially profitable partner is promising, and Mr. Varsavsky’s formidable networking abilities with politicians and entrepreneurs are also a plus. Ultimately, however, FON’s success will hinge on its strategic soundness and operational prowess — not on Mr. Varsavsky’s skills at working the cocktail circuit.

He likes to refer to FON as a “revolution,” but so far his crusade has had difficulty gathering momentum because formal corporate alliances have been slow to jell.

In Mr. Varsavsky’s approach, FON’s business is subsidized by non-Foneros — passing Web surfers who buy time for access to the network — which he can then share with FON’s customers. The approach is different from that of Boingo, a Wi-Fi aggregator based in Los Angeles that charges users a monthly fee for using hotspots while they are traveling.

Yet both FON and Boingo have faced significant resistance from Internet service providers that carefully restrict access to their customers, leaving the idea of a seamless wireless Internet based on Wi-Fi technology an unfulfilled dream so far.

Mr. Varsavsky said he initially hoped that selling $30 Wi-Fi routers embedded with FON software would be all he needed to expand the ranks of Foneros around the globe. But this approach failed to gain traction fast enough, and he shifted gears. Now he is trying to steadily stack up distribution deals with I.S.P.’s.

While some I.S.P.’s have ignored his company, Mr. Varsavsky says FON has gained ground among I.S.P.’s that are looking for a way to attract new customers in competitive markets as well as to compete with high-speed wireless cellular networks.

FON now has a growing range of alliances, including ones with the BT Group, Neuf Cegetel in France, Livedoor (a Japanese I.S.P.), and Time Warner in the United States, as well as a recent agreement with the city of Geneva, which is distributing hundreds of FON routers to residents. Now strongest in Britain, France and Japan, FON has recently made progress with new agreements with two major Japanese retailers and a Taiwanese I.S.P. And Mr. Varsavsky said he is close to major agreements in India and Russia.

FON’s losses have shrunk from more than a million euros a month to less than 500,000, Mr. Varsavsky says. He also hasn’t given up his belief that a coming generation of wireless Internet technology will eventually give FON an even bigger boost.

The first generation of Wi-Fi technology was limited in range, making it impractical for Foneros to share their routers widely. But a new wireless technology, known as 802.16, which should be more widely available to consumers over the next two years, will offer far greater ranges.

This next generation of wireless communication, called WiMax by Intel and others, may allow him to complete his dream — in effect making it possible to weave together a wireless digital network in an urban area with nothing more than an army of Foneros willing to let their routers be used as micro cell towers.

“Why should anyone have to build their own towers?” he asks.

FON’s future, he argues, will revolve around universal access to the wireless Internet. In the meantime, he faces a big obstacle in one of the world’s most lucrative communications markets: the United States, where newer cellular networks with flat-rate pricing may prove a challenge because they will provide universal high-speed coverage.

In Europe, the Internet landscape looks more promising. The European Commission’s decision last summer to place a price cap on voice calls — to make cellphones more affordable for residents traveling within the European Union — didn’t include mobile data. Recent high-speed wireless networks introduced in Europe also use per-megabyte pricing, discouraging the streaming of large files like video.

That leaves a potentially big opportunity for a widely accessible sharing solution for travelers. Yet even in Europe, there are potential roadblocks, not the least of which has been a historically inhospitable atmosphere for entrepreneurial gambits.

“Europe has a larger market than the U.S.A., but it is culturally fragmented and risk-averse,” Mr. Varsavsky says. “But the differences are narrowing, and now there are European venture capitalists and a local entrepreneurial culture.”

Yet he remains undaunted when he discusses his unfinished revolution and FON’s prospects.

“FON,” he said, “is like a telephone company built by the people,” he said.
http://www.nytimes.com/2008/05/25/technology/25web.html





The Dawn of Free Internet Access?
Betsy Schiffman

It's the sort of news that ought to scare the pants off Comcast executives. FCC Chairman Kevin Martin has proposed the commission auction off a portion of the 25 megahertz spectrum with a free provision -- meaning that whoever licenses the spectrum must provide internet access to people for free.

We won't know whether the FCC will proceed with the idea (the commissioners vote on June 12), but the fact that the proposal is even up for consideration must be gratifying to the millions of Comcast and Cox victims who may pay upwards of $40 per month for shoddy broadband access and awful customer service.

A "free" broadband spectrum auction could also help spur internet adoption in the U.S., where there is still a big gaping divide between the broadband haves and have-nots.

"We've been pushing for [free internet access] as a matter of policy for two years," says John Muleta, founder and CEO of M2Z Networks, a company that aims to provide free ad-supported broadband access. "This country is stuck with a low [adoption rate of broadband web access], mainly because it's either not available or it's not affordable in many markets."

Of course, we've heard this song before. Back in 1999, everyone offered free, ad-supported internet access. Yahoo and Kmart teamed up on a free ISP called BlueLight.com; NBC's online arm, NBCi launched one, too; so did many of the major web players of the time, such as AltaVista, Excite and Lycos. Few free ISPs still exist today.

The key difference between then and now, according to Muleta, was that the free ISP of yesteryear was a dial-up service, and its livelihood depended on the terms negotiated with telecom providers.

"The problem was that [the free ISPs] couldn't control their destiny," Muleta says. "The limitation was the deal you could get from the telcos, and the service was supported by banner ads. Now people recognize the value of search-[based advertising.]"

So is Muleta talking to Google, Yahoo or Microsoft about a partnership for the free access?

"We're a Silicon Valley company and we're always talking to potential partners," Muleta says.
http://blog.wired.com/business/2008/...wn-of-fre.html

Among the conditions proposed by Martin would be censorship of speech and content – Jack.





Councilman Plans Demo of Porn Filter
John Woolfolk

San Jose City Councilman Pete Constant on Friday will host a public demonstration of technology he says can effectively filter Internet pornography without impeding legitimate research.

Constant, who has been pushing the city to install filtering technology at public libraries, has invited critics - including the San Jose director of the American Civil Liberties Union - to test the system, which is used in Arizona. The council next month is scheduled to decide whether to reconsider the city's current policy.

Also invited is Library Director Jane Light, who gave a dim assessment of filtering technology in a report to the council earlier this month. She said various systems, including the one Constant advocates, allow objectionable material while blocking legitimate sites.

The public also is invited to test the technology. The demonstration will be from 3 to 5 p.m. Friday in Committee Room 120 at the City Hall wing, 200 E. Santa Clara St.
http://www.siliconvalley.com/news/ci_9412496





Potty-Mouthed Hackers Steal Comcast.net Keys, Go for a Spin

Users redirected to rogue site
Dan Goodin

Unknown hackers hijacked Comcast's domain name for three hours overnight, sending subscribers who tried to access webmail and other services to a rogue site that bragged of the exploit.

Comcast lost control of the comcast.net address after the attackers changed registration information stored by its domain registrar, Network Solutions, a Comcast spokesman said. The unauthorized change redirected people attempting to visit the site to a page that read: "KRYOGENIKS Defiant and EBK RoXed COMCAST. sHouTz To VIRUS Warlock elul21 coll1er seven." The page was displayed after the attackers altered the site's IP resolution information, replacing Comcast's IP address with the rogue address 209.62.20.186.

Comcast spokesman Charlie Douglas said there was no immediate evidence that the attackers' page tried to install malware or steal user credentials. But some participants in this DSLReports forum reported their email clients were redirected to the impostor address, prompting concern their login sequence could have been intercepted. Douglas said security people are still investigating.

Comcast engineers restored the correct domain name settings about three hours after they were altered. By late Thursday morning, comcast.net was accessible to most people. But some users, including some with private DNS servers that hadn't been updated, still got errors. (Windows users who are getting errors may want to try flushing their DNS cache using using the command "ipconfig /flushdns", sans the quotes.)

It's still unclear how the attackers accessed the registration settings on store with Network Solutions. A brute force password attack is one possibility, but you'd think Network Solutions has safeguards in place to detect thousands of unsuccessful login attempts. A Network Solutions spokeswoman said the company is working with Comcast to figure out how the hackers obtained the login credentials to the account.

The ability of unknown hackers to hijack the domain name of one of America's biggest internet providers is yet another reminder of the fragility of the net's domain name system. While DNS attacks in recent years have focused on more esoteric methods such as cache poisoning and DNS rebinding, the attack shows that old-fashioned account compromises are also sufficient to alter substantial amounts of web traffic.

Douglas said Comcast is working with unnamed law enforcement agencies to track down the attackers.

Little is known about the interlopers, except for a few traces left behind that hint at some sophomoric sensibilities. In addition to their cryptic defacement, they altered the address for Comcast's administrative contact to "69 dick tard lane, dildo room."
http://www.theregister.co.uk/2008/05...main_hijacked/





NNSquad

Network Neutrality Squad

NNSquad Network Measurement Agent (NNMA)
Beta 2.0.0.6 Release - 29 May 2008

Installable (Win 2000, XP, Vista) BETA Distribution (Zip / Tar)
Source (LGPL) BETA Distribution (Zip / Tar)


The NNSquad Network Measurement Agent (NNMA) monitors network activity on computer systems, looking for and flagging a variety of potential problems. NNMA also includes a special function that attempts to detect reset (RST) packets that may have been injected into a TCP connection by any entity not located at the connection endpoints (for more on this feature, please see the NNMA methodology notes).

While the reset packet detection system included in this release is of interest, NNSquad views this package as more important in the long run as a development base for a broad range of network measurement functionalities and associated communications and analysis efforts.

The NNSquad Network Measurement Agent (NNMA) Beta 2.0.0.6 is released as open source software under the LGPL, by the Network Neutrality Squad project of People For Internet Responsibility (PFIR). It was developed from the "Buster" network management and security program, which was specifically open-sourced by its authors at Praemio, Inc. in furtherance of the NNSquad project. Additional licensing details are included in both the installable and source distribution archives.

This package is suitable for installation on Windows 2000, XP, and Vista. It should not be installed on earlier versions of Windows.

Please let us know if you're interested in coordinating on ports to other platforms, such as Linux, BSD, and Mac, or embedded hardware (e.g. WRT54G router).

Special thanks to John Bartas for all of his diligent and continuing work on this software for NNSquad.

NNMA is currently experimental, proof-of-concept "beta" software. Bugs and potentially undesirable behavior may be present, and there are cosmetic issues that will be eliminated as development continues. The user accepts all risks from installation and use of this software. Full documentation is not currently available for this beta package. If you're not comfortable working with beta software, please do not install this package.

Please see the release notes (in the README.txt file within both the installable and source distribution archives) for more information.
http://www.nnsquad.org/agent





Ozzie: Open Source a More Disruptive Competitor Than Google
Mary Jo Foley

Google has nothing on open source when it comes to potential competitive threats to Microsoft, according to Redmond’s Chief Software Architect Ray Ozzie.

Ozzie fielded a number of questions on his role at Microsoft and the company’s evolving technology strategies during an appearance at the Sanford Bernstein Strategic Decisions Conference on May 28. (I listened to his session via the Webcast.)

Ozzie reiterated that it often takes a strong competitor to truly galvanize Microsoft.

“Microsoft has built up a culture of crisis,” Ozzie told conference attendees.

Competitors like his former employer, Lotus, and now, Google, have spurred the company to make changes to its business to stay ahead, Ozzie said. But while Google is a “tremendously strong competitor,” Ozzie acknowledged, “open source was much more potentially disruptive” to Microsoft’s business. (He noted that, unlike Google, many open-source programmers aren’t beholden to shareholders.)

Ozzie said that competing with open source “made Microsoft a much stronger company.” He cited changes Microsoft has made to its business model — such as focusing on making its closed-source software interoperable with open-source products — as directly attributable to that competition.

During the rest of his hour-long talk, Ozzie focused on many of his favorite topics, such as the need for a mesh for devices and people (Live Mesh) and the importance of giving customers choice (with Software+Services, rather than a 100% cloud-services approach). A few other tidbits from his remarks that I found interesting:

* The changing nature of the operating system in an increasingly services-based world. Ozzie noted that if a new operating system were designed today, it wouldn’t be a single piece of software that operates a single computer. It would be something that could accommodate multiple devices, with the user at the center. That sounds like Live Mesh — but perhaps he was also hinting about Microsoft’s post-Windows, distributed operating system I keep hearing rumors about…

* Yahoo as an “accelerator.” Ozzie deftly deflected questions about Microsoft’s on-again/off-again deal-making with Yahoo. “Yahoo was not a strategy unto itself,” he said. “It was an accelerator to the ad platform.” Ozzie spoke highly of Yahoo’s work in the social-networking and community space, adding that these kinds of services represented the next wave in communications technology. He also pooh-poohed any notion that Microsoft might be wavering on its commitment to being an online player. “We are very, very serious about the online space,” he said.

* Programming tools that work across a variety of devices. At the very end of his remarks, Ozzie made a passing reference to the need for not just programming tools and services that can accommodate multi-core/many-core systems, but also tools that can work across a variety of devices. He noted that there’s a need for development tools for building software that works across multiple devices. A reference to the Live Mesh Software Development Kit (SDK), expected to debut at Microsoft’s Professional Developers Conference in late October? Perhaps….
http://blogs.zdnet.com/microsoft/?p=1418





The Real Fight Over Fake News
Saul Hansell

“The Daily Show” is a bellwether for the evolution of Internet video. It is also one of those programs that signify for people why they pay so much money for cable.

Until recently, few of the main made-for-cable programs have been available to watch in full over the Internet, even as broadcast networks have started streaming full episodes of most of their shows. The reason is that cable and satellite systems pay large fees to networks for what they have seen as exclusive rights to their content. (Their deals with broadcast networks are less restrictive.)

In recent months, that has started to change as programs such as USA’s “Monk” and “Tyler Perry’s House of Payne” on TBS become available on the Internet. But many other signature cable programs, like ESPN’s “SportsCenter” and CNN’s “Larry King Live” are not regularly Webcast in their entirety.

That’s why my eyebrows jumped when I saw the announcement last week that full episodes of three Comedy Central shows — “The Daily Show,” “The Colbert Report” and “South Park” — will start being Webcast, both on MTV-owned sites and on the Fancast site from Comcast. (Comedy Central, which is owned by Viacom’s MTV Networks unit, has been Webcasting “South Park” episodes for a few months.)

Just last November, Comedy Central told me that it was not putting full episodes on the redesigned site for “The Daily Show” because of its deal with the cable operators. Instead, it created an awkward compromise in which a series of “clips” from the show would play one after another so users could see all the content from the show. But these clips couldn’t be expanded to the full computer screen, and they didn’t include the opening titles that help create the feeling of a television show.

It’s taken me several days of going back and forth with representatives of both MTV Networks and Comcast to figure out what has changed. I can’t say that I’ve entirely succeeded. The deals between cable companies and networks are dark and nuanced documents with many overlapping quid pro quos.

It turns out MTV’s main deals with cable operators these days do give it the right to distribute all of its content online, said Mark Jafar, an MTV spokesman. And indeed it has started Webcasting some of its signature programs like “The Hills” and “SpongeBob SquarePants.” Comedy Central, however, was under a different set of contracts until early this year because Viacom only bought the network in 2003.

The Webcasting trend is not pleasing the large cable operators. Indeed, when Glenn Britt, the chief executive of Time Warner Cable, was asked recently how he feels about the cable networks putting more content online, he said “Guess what? We do mind.”

Webcasting a program the same day it is broadcast, “will erode your other business model,” Mr. Britt said at the Cable Show in New Orleans earlier this month. If this happens, he said, “we have to intervene at some point.”

Alexander Dudley, a Time Warner Cable spokesman, elaborated when I asked him about Viacom’s move to Webcast full episodes of “The Daily Show.”

“They can’t have it both ways,” he said. “If they put content they ask cable companies to pay for online for free, they are making it less valuable and we should be expected to pay less for it.”

When I asked Comcast the same question, a spokeswoman also expressed some concern about making sure that some of the programming it pays for remains exclusive. But Comcast is not as outraged as Time Warner. One reason is that the company’s experience with offering video-on-demand versions of cable programs appears to have increased viewership of its traditional channels. As a result, it is less worried that online streaming might divert paying customers.

Comcast, unlike Time Warner, also has its own Internet streaming service, Fancast, that can profit from the move to Internet viewing. And it is using its relationships with cable networks to get programming for it. MTV said it is looking to syndicate Comedy Central programs to other online sites as well.

MTV, of course, is very much trying to have it both ways. Its core audience is increasingly moving from watching clips on YouTube to watching full episodes on Hulu and the broadcast network Web sites. Yet, as Mr. Jafir made clear in an e-mail to me, the company also needs to defer to the cable companies, known sometimes as MSOs, that provide so much of its revenue today:

Quote:
We’ve always worked hard, and we continue to work hard, to strike the right balance between protecting and growing the businesses of our MSO partners and being wherever our audiences are consuming entertainment….We’re definitely not in the business of making all our content available for “free” anywhere — monetization and preservation of the value of our content is a strategic priority for all our distribution across platforms.
Can you see Jon Stewart’s eyebrows flying up at that?
http://bits.blogs.nytimes.com/2008/0.../index.html?hp





What's Online

Legitimizing Marijuana
Dan Mitchell

JANE WELLS of CNBC keeps a blog called Funny Business, but her recent reports on California’s medical marijuana industry are about a business that is increasingly being taken seriously. They amount to a short primer on how the business works and how the operators of the state’s estimated 500 dispensaries deal with the high risks and high costs of working in a legal gray area (www.cnbc.com).

Medical marijuana is legal in California, but federal law still bans sales. Amid the uncertainty that this creates — including the occasional raid by federal agents — a full-fledged industry has blossomed, taking in about $2 billion a year and generating $100 million in state sales taxes, CNBC reported.

Setting up a clinic “can cost as much as a hundred grand,” Ms. Wells reports. The equipment, the cuttings from which plants are grown and office space all tend to be expensive. And from there, the costs only grow, mostly in the form of legal fees. Many clinics keep lawyers on retainer.

Nonetheless, “this is the business model of the future,” says JoAnna La Force of Farmacy, an herbal remedy shop in Southern California. Ms. LaForce says her business is close to breaking even (www.medicalmarijuanafarmacy.com).

A slew of ancillary businesses has grown up around medical marijuana. Bill Britt, identified on the Web site as a patient, has found a new career as an expert witness in cases brought against dispensaries and patients, earning $250 to $350 a case.

He gained his expert knowledge by attending Oaksterdam University, a trade school in Oakland, Calif. At Oaksterdam (www.oaksterdamuniversity.com), students learn everything from “The Politics of Cannabis” to botany to business operations.

Getting into the quasi-legitimate marijuana business is a challenge, says Jeff Jones, chancellor of Oaksterdam’s Los Angeles campus. But, he adds, “The investment is well worth it, except for the federal risk.”

A DISTINCTION, OF SORTS As air travel grows increasingly nightmarish even as it gets more expensive, Patrick Smith, writer of Salon’s Ask the Pilot column, has been singing the praises of Southwest Airlines, the (relatively) cut-rate, bare-bones carrier (www.salon.com).

Southwest recently took first place in a survey of airline satisfaction conducted by the University of Michigan.

Mr. Smith’s initial explanation was this: “People don’t expect much. Southwest Airlines is nothing if not unpretentious” and has “mastered the art of get-what-you-pay-for satisfaction.”

His readers, though, thought otherwise. Many wrote to say that, though Southwest dispenses with a lot of perks, it offers a basic level of customer service that bigger airlines often do not.

Mr. Smith acknowledged that Southwest’s comparatively small size gave it an advantage in maintaining a consistent level of service. Nevertheless, it is “the last of a nearly vanished breed: an airline with a true personality, that large numbers of fliers have unwavering fondness for.”

BACK ON DRUGS As a test of airport security, a customs officer planted marijuana in the side pocket of a random suitcase at Narita International Airport in Tokyo, the BBC reports (news.bbc.co.uk).

The test failed when the sniffer dogs were unable to detect the pot. But the officer could not remember which bag he had used.

Using an actual passenger’s suitcase is against regulations, and the airport’s customs service has apologized.

Meanwhile, the marijuana is still out there. “Anyone finding the package has been asked to contact customs officials,” according to the BBC. So far, nobody has spoken up.
http://www.nytimes.com/2008/05/31/te.../31online.html





US Residents in Military Brigs? Govt Says it's War
Matt Apuzzo

If his cell were at Guantanamo Bay, the prisoner would be just one of hundreds of suspected terrorists detained offshore, where the U.S. says the Constitution does not apply.

But Ali Saleh Kahlah al-Marri is a U.S. resident being held in a South Carolina military brig; he is the only enemy combatant held on U.S. soil. That makes his case very different.

Al-Marri's capture six years ago might be the Bush administration's biggest domestic counterterrorism success story. Authorities say he was an al-Qaida sleeper agent living in middle America, researching poisonous gasses and plotting a cyberattack.

To justify holding him, the government claimed a broad interpretation of the president's wartime powers, one that goes beyond warrantless wiretapping or monitoring banking transactions. Government lawyers told federal judges that the president can send the military into any U.S. neighborhood, capture a citizen and hold him in prison without charge, indefinitely.

There is little middle ground between the two sides in al-Marri's case, which is before a federal appeals court in Virginia. The government says the president needs this power to keep the nation safe. Al-Marri's lawyers say that as long as the president can detain anyone he wants, nobody is safe.

___

A Qatari national, al-Marri came to the U.S. with his wife and five children on Sept. 10, 2001 — one day before the terrorist attacks in New York and Washington. He arrived on a student visa seeking a master's degree in computer science from Bradley University, a small private school in Peoria, Ill.

The government says he had other plans.

According to court documents citing multiple intelligence sources, al-Marri spent months in al-Qaida training camps during the late 1990s and was schooled in the science of poisons. The summer before al-Marri left for the United States, he allegedly met with Osama bin Laden and Sept. 11 mastermind Khalid Sheikh Mohammed. The two al-Qaida leaders decided al-Marri would make a perfect sleeper agent and rushed him into the U.S. before Sept. 11, the government says.

A computer specialist, al-Marri was ordered to wreak havoc on the U.S. banking system and serve as a liaison for other al-Qaida operatives entering this country, according to a court document filed by Jeffrey Rapp, a senior member of the Defense Intelligence Agency.

According to Rapp, al-Marri received up to $13,000 for his trip, plus money to buy a laptop, courtesy of Mustafa Ahmad al-Hawsawi, who is suspected of helping finance the Sept. 11 attacks.

A week after the attacks, Congress unanimously passed the Authorization for Use of Military Force. It gave President Bush the power to "use all necessary and appropriate force" against anyone involved in planning, aiding or carrying out the attacks.

The FBI interviewed al-Marri that October and arrested him in December as part of the Sept. 11 investigation. He rarely had been attending classes and was failing in school, the government said.

When investigators looked through his computer files, they found information on industrial chemical suppliers, sermons by bin Laden, how-to guides for making hydrogen cyanide and information about chemicals labeled "immediately dangerous to life or health," according to Rapp's court filing. Phone calls and e-mails linked al-Marri to senior al-Qaida leaders.

In early 2003, he was indicted on charges of credit card fraud and lying to the FBI. Like anyone else in the country, he had constitutional rights. He could question government witnesses, refuse to testify and retain a lawyer.

On June 23, 2003, Bush declared al-Marri an enemy combatant, which stripped him of those rights. Bush wrote that al-Marri possessed intelligence vital to protect national security. In his jail cell in Peoria, however, he could refuse to speak with investigators.

A military brig allowed more options. Free from the constraints of civilian law, the military could interrogate al-Marri without a lawyer, detain him without charge and hold him indefinitely. Courts have agreed the president has wide latitude to imprison people captured overseas or caught fighting against the U.S. That is what the prison at Guantanamo Bay in Cuba is for.

But al-Marri was not in Guantanamo Bay.

"The president is not a king and cannot lock people up forever in the United States based on his say-so," said Jonathan Hafetz, a lawyer who represents al-Marri and other detainees. "Today it's Mr. al-Marri. Tomorrow it could be you, a member of your family, someone you know. Once you allow the president to lock people up for years or even life without trial, there's no going back."

Glenn Sulmasy, a national security fellow at Harvard, said the issue comes down to whether the nation is at war. Soldiers would not need warrants to launch a strike against invading troops. So would they need a warrant to raid an al-Qaida safe house in a U.S. suburb?

Sulmasy says no. That's how Congress wrote the bill and "if they feel concerned about civil liberties, they can tighten up the language," he said.

That would require the politically risky move of pushing legislation to make it harder for the president to detain suspected terrorists inside the U.S.

Al-Marri is not the first prisoner who did not fit neatly into the definition of enemy combatant.

Two U.S. citizens, Yaser Esam Hamdi and Jose Padilla, were held at the same brig as al-Marri. But there are differences. Hamdi was captured on an Afghanistan battlefield. Padilla, too, fought alongside the Taliban before his capture in the United States.
By comparison, al-Marri had not been on the battlefield. He was lawfully living in the United States. That raises new questions.

Did Congress really intend to give the president the authority to lock up suspected terrorists overseas but not those living here?

If another Sept. 11-like plot was discovered, could the military imprison the would-be hijackers before they stepped onto the planes?

Is a foreign battlefield really necessary in a conflict that turned downtown Manhattan into ground zero?

Also, if enemy combatants can be detained in the U.S., how long can they be held without charge? Without lawyers? Without access to the outside world? Forever?

These questions play to two of the biggest fears that have dominated public policy debate since Sept. 11: the fear of another terrorist attack and the fear the government will use that threat to crack down on civil liberties.

"If he is taken to a civilian court in the United States and it's been proved he is guilty and it's been proved there's evidence to show that he's guilty, you know, he deserves what he gets," his brother, Mohammed al-Marri, said in a telephone interview Friday from his home in Saudi Arabia. "But he's just been taken there with no court, no nothing. That's shame on the United States."

Courts have gone back and forth on al-Marri's case as it worked its way through the system. The last decision, a 2-1 ruling by a 4th U.S. Circuit Court of Appeals panel, found that the president had crossed the line and al-Marri must be returned to the civilian court system. Anything else would "alter the constitutional foundations of our Republic," the judges said.

The full appeals court is reviewing that decision and a ruling is expected soon. During arguments last year, government lawyers said the courts should give great deference to the president when the nation is at war.

"What you assert is the power of the military to seize a person in the United States, including an American citizen, on suspicion of being an enemy combatant?" Judge William B. Traxler asked.

"Yes, your honor," Justice Department lawyer Gregory Garre replied.

The court seemed torn.

One judge questioned why there was such anxiety over the policy. After all, there have been no mass roundups of citizens and no indications the White House is coming for innocent Americans next.

Another judge said the question is not whether the president was generous in his use of power; it is whether the power is constitutional.

Whatever the decision, the case seems destined for the Supreme Court. In the meantime, the first military trials are set to begin soon against detainees at Guantanamo Bay. Al-Marri may get one, too. Or he may get put back into the civilian court system. For now, he waits.
http://news.yahoo.com/s/ap/20080524/...9U4FhHg6Ss0NUE





Studios Reach Deal With TV Actors
Michael Cieply

Hollywood took another step toward labor peace Wednesday morning, as a union representing television actors reached a tentative three-year deal with production companies after talks had become stuck over the re-use of performers’ images on the Internet.

The agreement between the American Federation of Television and Radio Artists and the producers builds pressure on another, bigger actors union, the Screen Actors Guild, to craft a similar solution. SAG’s talks over a new contract with the Alliance of Motion Picture and Television Producers — which is set to expire at the end of June — stalled earlier this month, but were set to resume later on Wednesday. The most difficult issue in the talks with Aftra surprisingly did not hinge on compensation of artists for work in new media, as during the recent three-month writers’ strike. Instead, it had to do with the granting of permission. Actors have traditionally had the right to approve the use of clips from their work on television. But producers had asked for the ability to use clips on the Web without permission from each actor, arguing that flexibility was needed to counter the widespread piracy of shows on the Internet.

“We did not see it coming. It was a huge issue to tackle,” Roberta Reardon, president of the federation, said of the demand for use of the clips. Ms. Reardon said the union had agreed that within 90 days of the contract’s final approval to work out a system under which performers might give advance or blanket permissions covering an entire series, for which the actors will be compensated.

The federation’s contract covers performers on nearly a dozen series, including ABC’s “Cashmere Mafia” and HBO’s “Curb Your Enthusiasm.”

The settlement followed three weeks of talks, and back-to-back sessions that ran through the holiday weekend, and continued until the early hours on Wednesday. The federation’s national board is expected to review the tentative agreement next week, and, if it approves terms, to submit the deal to a vote of the membership of approximately 70,000.

In the last half-year, Hollywood’s movie and television producers weathered a three-month strike by writers, and ultimately set new contracts with unions representing writers, directors and, now, some of its television actors.

In each case, negotiators have fought over difficult questions related to new media. According to Ms. Reardon, her union’s tentative deal closely followed those struck earlier by writers and directors. It established union jurisdiction over new media compensation and set pay schedules for digital media. An earlier round of talks between producers and the Screen Actors Guild, which represents about 120,000 actors, ran aground over a number of issues, which included the companies’ demand for freedom to use clips.

In a statement on its Web site, the producers alliance called the Aftra deal “an agreement that makes the new media framework work for all actors.”

Hollywood has been bracing for the possibility of another strike, should no agreement be reached with the actors guild by June 30, when its contract expires. Companies have been rushing to wrap their movie productions before that deadline, and little work has been scheduled for the weeks beyond, promising what some have called a de facto strike — a period with little production because of uncertainty over labor talks.

Members of the Writers Guild of America East and the Writers Guild of America West on Nov. 5 began a walk-out that went on for 100 days before they reached a new deal with producers. Like Aftra, the Directors Guild of America reached terms without striking.

Last month, the International Alliance of Theatrical Stage Employees, which represents about 25,000 movie and television workers on the West Coast, recessed talks toward a new contract to take effect when its current deal expires in August of 2009. Representatives of the craft unions said they planned to defer their negotiations while the actors came to terms with the companies.
http://www.nytimes.com/2008/05/29/bu.../29studio.html





Netflix Sees DVD-By-Mail Peak in as Soon as 5 Years

Reed Hastings, chief executive of Netflix Inc, said he expects the company to have 10 million subscribers by next year, but the DVD-by-mail business will peak in as soon as five years.

"We think the by-mail business is very strong but will probably peak in the next five years," said Hastings at the Netflix Investor Day in San Francisco on Wednesday. A slide at the presentation showed the peak in five to 10 years.

"Our key challenge is growing earnings per share and subscribers while funding streaming (online video) which should give us years of subscriber and earnings expansion," he told analysts.

Hastings told investors that the company's online investment in 2008 and 2009 is expected to be "fairly inefficient," but noted the reason for higher spending was to cultivate better partnerships and content.

He cited as risks the growing popularity of stand-alone DVD rental kiosks, improving video-on-demand services from cable and satellite companies and more competition in streaming from Web giants like Amazon.com Inc and Apple Inc and the potential of renewed promotional spending by Blockbuster Inc in the by-mail sector.

But Hastings and other company executives were bullish on the company's long-term position given its successful expansion into the streaming DVD market.

"Once we're in streaming ... we can attract well beyond 20 million subscribers worldwide," he said.

(Reporting by Sue Zeidler, editing by Jeffrey Benkoe, Phil Berlowitz)
http://www.reuters.com/article/filmN...43042120080529





20 Seconds, and a Movie Has Arrived
David Pogue

Last year, the movie industry raked in more than $40 billion.

What are they doing wrong?

Well, for one thing, most people can’t consume the product — movies — without getting in the car and driving somewhere, to a theater or video store.

Imagine, though, if you could watch any movie, any time, without budging from your sofa, by downloading it. All kinds of companies have been tripping over each other to deliver this movie paradise, including Amazon.com, TiVo, Movielink, Apple, Vudu, Netflix, CinemaNow, Vongo and MovieFlix.

Unfortunately, each service is fatally flawed.

Internet download services offer instant gratification, but most require you to watch on your computer screen, which is nobody’s idea of normal. Set-top boxes like TiVo, Apple TV and Vudu deliver movies to your TV, but erase your rented movies after only 24 hours. DVD-by-mail services like Netflix offer terrific selection, but it takes at least a day to receive the movies.

This week, Roku and Netflix unveiled a little $100 box that aims to eliminate all of those drawbacks. Delivery to your TV, not your computer? Check. Instant delivery from the Net? Check. Eliminate the 24-hour viewing window? Check.

Oh, yeah — and all the movies are free.

To understand what makes the Netflix Player a flawed masterpiece, it helps to understand its history. (This will take six paragraphs, which you can skip if you want just the punch line.)

Netflix is the largest DVD-by-mail service, with 8.2 million members and about 100,000 movies. Its Web site offers terrific tools for finding, recommending and organizing movies that you want to see. The glaring downside is having to wait for the next DVD to come in the mail. (Yes, Western civilization has come to this: complaining that it takes a whole day to get a movie.)

Early last year, Netflix tried to address that problem with Instant Watching, a service that lets you watch streaming Netflix movies in your Web browser. The movie wait was reduced from one day to 20 seconds.

The best part: there’s no extra charge for this. It’s free with regular Netflix DVD-by-mail membership (for example, $14 a month to check out two DVDs at a time). You can watch movies all day long, if you like.

Instant Watching introduced a new verb: movie surfing. Watch 10 minutes of a movie and then decide it’s not for you? No problem. Switch to a different movie.

The only wrinkle: You’re watching on your PC. Only the weird watch “Lord of the Rings” sitting in a desk chair.

“O.K.,” said Netflix. “You want Instant Watching on your TV? We can do that.” And it came up with the Netflix Player, manufactured and sold by Roku (Roku.com).

This thing could not be simpler. I was watching my first movie six minutes after opening the box.

Like all Internet movie services, the Netflix Player requires a high-speed Internet connection. It found and connected to my wireless network instantly and flawlessly. (You can connect it to your home network with a cable if you prefer.)

It connects to your TV using any kind of modern video connection: HDMI cable, component cables, S-Video or even those old red-white-yellow RCA cables. The nine-button remote lets you choose a movie, skip around in it or pause.

Usually, fast-forwarding or rewinding an Internet streaming movie is a hellish game of guess and wait. You can jump to a new spot on the movie’s scroll bar, but you have no idea where you’ll land; you don’t see a sped-up picture, as you do when fast-forwarding a DVD. Only when you release the mouse and wait 15 or 30 seconds for the movie to “rebuffer” do you see where you wound up.

On the Roku box, little thumbnail images of the movie scenes flash by, one for every 10 seconds of movie. When you stop scanning, you still have to wait 15 or 30 seconds — but at least you’ll know you landed at roughly the right scene in the movie.

You’re supposed to line up movies for this box at Netflix.com, where a new, second movie queue awaits. Any changes you make here appear on the box in seconds. On the TV, your wish list appears as a parade of colorful DVD cases on a scrolling shelf.

Having to scurry over to your computer can be a drag, but it does afford three benefits. First, it keeps the player’s on-screen menus extremely simple. Second, it lets you use all of those great Netflix.com tools to find and pick your flicks. Third, it lets Mac fans enjoy Instant Watching (since so far, watching on your computer requires Windows).

The video quality depends on the speed of your Internet connection. The clarity over slower hookups, like DSL, will disappoint you. If you have a fast cable modem (technically, 2.2 megabits a second or better), you get what Netflix calls near-DVD quality. I call it TV quality.

The ever-growing Instant Watching catalog now offers 10,000 movies and recent TV episodes. Unfortunately, as on most Internet movie services, the majority of it is the dregs, with titles like “Tan Lines,” “Dead and Breakfast” and “National Parks of the West.”

Netflix lets you sort movies by rating, year, genre, whatever—but it really needs to let you sort by “likelihood you’ve ever heard of this movie or anyone associated with it.”

Fortunately, there are still plenty of recognizable titles buried in the junk: “Unforgiven,” “Air Force One,” “Amadeus,” “Driving Miss Daisy,” “The Killing Fields,” “Philadelphia” “The Shining,” “Men in Black,” “Blade Runner,” “Five Easy Pieces,” “Cool Hand Luke,” “A Clockwork Orange,” “March of the Penguins” and so on.

But what do they all have in common? They’re old.

Netflix Instant Watching is at the bottom of the release pecking order. It gets movies after they have finished their runs in the hotel, airline, DVD and pay-per-view “windows.” It gets them when movie channels like HBO and Starz get them, and sometimes even later.

Netflix makes little apology for the age. It views its DVD-by-mail and Instant Watching features as two parts of one service. When movie freshness matters, get them on DVD; when delivery speed matters, use Instant Watching. As long as Hollywood’s lawyers run the show, you’ll never be able to have both.

In the game of Internet movies, the Netflix Player is revolutionary. It’s the first Internet service that delivers movies to your TV without a per-movie fee — an incredibly strange, liberating feeling. It’s also the first that doesn’t require you to download or store your movie collection.

Finally, it’s the first without a 24-hour time limit. If you feel like watching a movie again, you can watch it next week or next year, without paying a penny more.

Roku also says that this box is wired for the future. When Instant Watching goes to high definition, the Player will be ready. Roku also says mysteriously that its deal with Netflix is not exclusive; technically, the box is equipped for future rivals.

Is the Netflix Player, then, the movie box the world is waiting for? Not quite. It falls short on the age of its movies, the smallish selection of good ones and the not-quite-pristine video quality. And as with all Internet movies, you don’t get subtitles, director commentaries or any other DVD extras.

But it comes darned close. For movie lovers who already subscribe to Netflix, at least, this one-time $100 expenditure is practically a no-brainer.
http://www.nytimes.com/2008/05/22/te...h/22pogue.html





Amazon to Launch Streaming Video

Amazon.com Inc (AMZN.O), the largest Internet retailer, will launch a streaming video service in the next few weeks to augment its digital offerings, the company's chief executive said on Wednesday.

Jeff Bezos, speaking at The Wall Street Journal's three-day D: All Things Digital conference taking place north of San Diego, did not elaborate, and a company spokeswoman would not provide more information.

The Seattle-based company has been beefing up its digital media offerings in order to better compete with rivals such as Apple Inc (AAPL.O), which dominates the category with the popular iTunes music download service.

Besides recently launching an electronic book reader, the Kindle, Amazon has been building a digital music store and now offers downloadable movies, television shows and videos on its Web site.

It also has a deal with TiVo Inc (TIVO.O), maker of the popular digital video recorder, that allows users to rent videos from Amazon's Unbox service and watch them on their televisions.

Amazon is not alone in looking at streaming online video, allowing viewers to essentially rent movies via the Web rather than download large files to store on personal computers or other devices.

On Wednesday, the chief executive of DVD-by-mail company Netflix Inc (NFLX.O, Reed Hastings, said the company is currently funding streaming video in order to "give us years of subscriber and earnings expansion." Hastings spoke at the company's investor day in San Francisco.

"Once we're in streaming ... we can attract well beyond 20 million subscribers worldwide," Hastings said.

(Additional reporting by Susan Zeidler in San Francisco)

(Reporting by Alexandria Sage, editing by Gerald E. McCormick)
http://www.reuters.com/article/inter...32602720080528





Entering Virtual Worlds for Real-Life Pitches
Eric Pfanner

IN 2002, when Electronic Arts signed a multimillion-dollar agreement with McDonald’s to place virtual burgers in an online version of its popular Sims video game, the move drew protests from players who resented the commercial intrusion.

But the Sims, a virtual family designed by players, are only becoming more brand-conscious. Starting in June, people who play The Sims 2, the current version of the game, will be able to buy a “stuff pack” (on a disc or online) that lets them decorate their simulated families’ homes with Ikea furniture. Last year a similar deal was made with H&M, the Swedish clothing retailer, that lets players buy a disc full of H&M-branded clothing for their Sims avatars.

While most other “stuff packs” contain generic accouterments — one called “Glamour Life,” for instance, lets players pick from label-free furnishings and evening gowns — the Ikea pack will let players move items like the Ektorp sofa and the Leksvik coffee table into their families’ virtual homes.

Electronic Arts, the world’s largest video game company, said it made the deal with Ikea, the Swedish furniture manufacturer, in response to requests in online players’ forums for more modern, realistic furniture.

“Because we have such a direct relationship with our players, the players help shape the product strategy,” said Nancy Smith, president of the Sims label, which has sold more than 100 million copies.

The deal is yet another example of how the traditional lines between paid-for content and marketing material are blurring in the media world. Companies that sell products and services are increasingly eager to place their wares inside television shows and other media rather than relying on stand-alone commercials. Media companies like Electronic Arts, meanwhile, are looking to sponsorship deals to help recoup the growing cost of developing games.



For marketers, the huge fan bases for some video games are a potentially rich target audience. In one recent blockbuster release, Grand Theft Auto IV sold more than six million copies in its first week. The Grand Theft Auto series is published by Take-Two Interactive, which Electronic Arts has been trying to buy, though it has persistently been rebuffed.

In addition to sponsorship agreements like the Ikea-Sims deal, game companies have been trying to sell advertising space and time in games, often on billboards or other elements of the virtual backdrop. In games played online, ad space can be sold across networks of games for specific time periods, as it is on television.

But analysts say that advertisers have been skittish about such ads, in part because of their limited reach. Some networks, for instance, work only with games played on a single system like Microsoft’s Xbox or Sony’s PlayStation.

Other advertisers may worry about placing their brands in controversial material. The Grand Theft Auto franchise is notorious for its violent and sexually laced content, and the latest title contains only spoof ads, for products like the “new iFruit phone,” which resembles Apple’s iPhone but is promoted with this pitch: “No buttons. No reception. No storage capacity. All ego.”

Michael Goodman, an analyst at the Yankee Group, said that last year, marketers spent about $180 million on in-game advertising, including sponsorships like Ikea’s deal. He has predicted that spending would rise to $332 million this year, but said he was considering lowering that forecast slightly, as growth seems to be slower than expected.



For marketers seeking a safe environment for their brands, tie-ins seem to offer a measure of control. Also, by putting the name of the sponsor brand on the game’s packaging, they go beyond simple product placement deals like Electronic Arts’ arrangement with McDonald’s (a similar deal with Ford Motor allows people who play Sims online to download virtual cars at no charge).

“Ikea sees this as a new channel to reach the young and the young at heart,” an Ikea spokeswoman, Charlotte Lindgren, said in an e-mail message.

The “stuff packs” will cost about $20.

The Ikea partnership with Electronic Arts is similar to the deal with H&M, though that promotion also allowed players to take part in a fashion show. A winning design will be sold in actual H&M stores this summer.

Steve Seabolt, vice president for global brand development for The Sims, said Electronic Arts was pursuing similar arrangements with other companies. He declined to say which one might be next, but named as potential partners consumer electronics companies, like Philips, Electrolux and Sony, as well as brands like Starbucks, Dunkin’ Donuts, Pepsi, Coca-Cola and Borders books.

The Sims 3 is set to be released next year, with new features like a town center that has plenty of virtual storefronts (read: opportunities for advertising).

Electronic Arts and Ikea declined to provide financial details of their agreement. Mr. Goodman, the Yankee Group analyst, said that while advertisers typically pay for space upfront, in this case the two companies might have agreed to share revenue from sales of the software discs.

Mr. Seabolt of Electronic Arts said his company was willing to be flexible for marketers considering The Sims. “This is anything but a one-size-fits-all proposition,” he said. “We make a huge effort to sit down with clients and really understand their marketing objectives.”
http://www.nytimes.com/2008/05/29/bu...ia/29adco.html





Seagate Plans SSD, 2TB Hard Drive for Next Year

Selling hard drives will remain Seagate's focus for now
Agam Shah

Seagate will introduce its first solid-state drive (SSD) storage and 2TB hard drive next year, said company CEO Bill Watkins.

The company's first SSD product will be targeted at enterprises that need speedy storage and can afford to pay a premium for the expensive drives. Seagate has no plans to release SSD drives for consumers, as the high prices could deter them for the next few years, Watkins said in an interview.

The release date and price information for the 2TB hard drive were not available. Seagate released 1TB hard drives, the Barracuda 7200.11 and Barracuda ES.2, in the middle of 2007.

While there is no competition now between hard drives and SSDs, Seagate is thinking of going to SSDs in the long term to replace hard drives.

"SSDs are not price-competitive yet," Watkins said. The storage market is driven by cost per gigabyte, and though SSDs provide benefits such as power savings, they won't be in laptops in the next few years, Watkins said. Low-power consumption capabilities and high speeds make SSDs useful for laptops, but the cost per gigabyte won't come down at least for the next few years, Watkins said.

"If the cost per gigabyte comes down to 10 cents, maybe," Seagate will focus on SSD storage for consumers, Watkins said.

A 128GB SSD costs $460, or $3.58 per gigabyte, compared with $60 for a 160GB hard drive, said Krishna Chander, a senior analyst at iSuppli.

"It will take three to four years for SSDs to come to parity with hard drives" on price and reliability, Chander said.

Besides price, other issues will keep SSDs from the consumer space, Watkins said.

Users seek fat storage to carry data, and hard drives can store terabytes of data, something SSDs can't do, Watkins said. SSDs also have write issues, with cells in the drives deteriorating quickly and reducing storage capacity, a general problem that plagues flash drives.

Even enterprise adoption of SSDs could be slow, Watkins said. "People are still trying to get tape out of the enterprise," he said.

Seagate's SSD would be mainly for data centers that rely on processing data quickly, like indexing servers or search servers, that can temporarily store data until it is ultimately moved to permanent storage on hard drives or tape. Solid-state drives can move data up to 10 times quicker than hard drives, but data has to ultimately be moved to larger and more reliable storage, Watkins said.

The SSD drive could also be useful for data centers looking to save on energy consumption and costs.

Seagate is taking a wait-and-see approach to SSDs, similar to the company's approach to optical storage. Seagate acquired optical-storage company Quinta in 1997 when everyone thought optical storage would replace hard drives, Watkins said. Seagate wasn't sure how far rotating media technology would stretch, but the cost per gigabyte fell and hard drives overtook optical drive technology.

Selling hard drives will remain Seagate's focus for now, but it will make sure the SSD component is available to customers, Watkins said. The company is internally researching and developing SSD storage.

The company already offers hybrid drives like the Momentus that combine NAND flash storage with hard drives to reduce power consumption and improve boot times.

Seagate has been making noise in the SSD market for a year now, but it has been mostly vaporware, iSuppli's Chander said. Seagate needs to get a leg up on its competition by getting into the game early and packaging SSDs in volume.

"They haven't stretched out. They are losing an opportunity. The reality is no matter what, in the next three to five years, SSDs are going to come out," Chander said.

Entering the SSD market early could give Seagate an advantage over its major competitor, Western Digital, which is too deeply lost in the hard drive market to make its presence felt in the SSD market, Chander said.
http://www.computerworld.com/action/...&intsrc=kc_top





Encryption Chip Will End Piracy, Open Markets, Says Bushnell

Speaking at yesterday's Wedbush Morgan Securities annual Management Access Conference, the Atari founder suggested that game piracy will soon be a thing of the past thanks to a new chip.

"There is a stealth encryption chip called a TPM that is going on the motherboards of most of the computers that are coming out now," he pointed out

"What that says is that in the games business we will be able to encrypt with an absolutely verifiable private key in the encryption world - which is uncrackable by people on the internet and by giving away passwords - which will allow for a huge market to develop in some of the areas where piracy has been a real problem."

Bushnell thinks that piracy of movies and music, however, is probably unstoppable because "if you can watch it and you can hear it, you can copy it."

"Games are a different thing, because games are so integrated with the code. The TPM will, in fact, absolutely stop piracy of gameplay.

"As soon as the installed base of the TPM hardware chip gets large enough, we will start to see revenues coming from Asia and India at a time when before it didn't make sense."
http://www.gamesindustry.biz/article...-says-bushnell





Finnish Appeals Court Rules Breaking CSS Illegal
Thomas Nybergh

Due to an appeal court decision from a couple of days back, breaking the not very effective CSS copy protection used on most commercial DVD-Video discs is now a criminal act in Finland. The verdict is contrary to what a district court thought of the same case last year when two local electronic rights activists were declared not guilty after having framed themselves by spreading information on how to break CSS . Back then it was to the activists' benefit has CSS been badly broken and inneffective ever since DeCSS came out.
http://yro.slashdot.org/article.pl?sid=08/05/26/1357257
JackSpratts is offline   Reply With Quote
Old 28-05-08, 07:45 AM   #2
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,017
Default

Milestones

Sydney Pollack, Film Director, Dies at 73
Michael Cieply

Sydney Pollack, a Hollywood mainstay as director, producer and sometime actor whose star-laden movies like “The Way We Were,” “Tootsie” and “Out of Africa” were among the most successful of the 1970s and ’80s, died on Monday at his home in Los Angeles. He was 73.

The cause was cancer, said a representative of the family.

Mr. Pollack’s career defined an era in which big stars (Robert Redford, Barbra Streisand, Warren Beatty) and the filmmakers who knew how to wrangle them (Barry Levinson, Mike Nichols) retooled the Hollywood system. Savvy operators, they played studio against studio, staking their fortunes on pictures that served commerce without wholly abandoning art.

Hollywood honored Mr. Pollack in return. His movies received multiple Academy Award nominations, and as a director he won an Oscar for his work on the 1985 film “Out of Africa” as well as nominations for directing “They Shoot Horses, Don’t They?” (1969) and “Tootsie” (1982).

Last fall, Warner Brothers released “Michael Clayton,” of which Mr. Pollack was a producer and a member of the cast. He delivered a trademark performance as an old-bull lawyer who demands dark deeds from a subordinate, played by George Clooney. (“This is news? This case has reeked from Day One,” snaps Mr. Pollack’s Marty Bach.) The picture received seven Academy Award nominations, including Best Picture, and a Best Actor nomination for Mr. Clooney.

Mr. Pollack became a prolific producer of independent films in the latter part of his career. With a partner, the filmmaker Anthony Minghella, he ran Mirage Enterprises, a production company whose films included Mr. Minghella’s “Cold Mountain” and the documentary “Sketches of Frank Gehry,” released last year, the last film directed by Mr. Pollack.

Apart from that film, Mr. Pollack never directed a movie without stars. His first feature, “The Slender Thread,” released by Paramount Pictures in 1965, starred Sidney Poitier and Anne Bancroft. In his next 19 films — every one a romance or drama but for the single comedy, “Tootsie” — Mr. Pollack worked with Burt Lancaster, Natalie Wood, Jane Fonda, Robert Mitchum, Al Pacino, Dustin Hoffman, Meryl Streep, Tom Cruise, Harrison Ford, Nicole Kidman, Ms. Streisand and others.

Sydney Irwin Pollack was born on July 1, 1934, in Lafayette, Ind., and reared in South Bend. By Mr. Pollack’s own account, in the biographical dictionary “World Film Directors,” his father, David, a pharmacist, and his mother, the former Rebecca Miller, were first-generation Russian-Americans who had met at Purdue University.

Mr. Pollack developed a love of drama at South Bend High School and, instead of going to college, went to New York and enrolled at the Neighborhood Playhouse School of the Theater. He studied there for two years under Sanford Meisner, who was in charge of its acting department, and remained for five more as Mr. Meisner’s assistant, teaching acting but also appearing onstage and in television.

Curly-haired and almost 6 feet 2 inches tall, Mr. Pollack had a notable role in a 1959 “Playhouse 90” telecast of “For Whom the Bell Tolls,” an adaptation of the Hemingway novel directed by John Frankenheimer. Earlier, Mr. Pollack had appeared on Broadway with Zero Mostel in “A Stone for Danny Fisher” and with Katharine Cornell and Tyrone Power in “The Dark Is Light Enough.” But he said later that he probably could not have built a career as a leading man.

Instead, Mr. Pollack took the advice of Burt Lancaster, whom he had met while working with Frankenheimer, and turned to directing. Lancaster steered him to the entertainment mogul Lew Wasserman, and through him Mr. Pollack landed a directing assignment on the television series “Shotgun Slade.”

After a faltering start, he hit his stride on episodes of “Ben Casey, “Naked City,” “The Fugitive” and other well-known shows. In 1966 he won an Emmy for directing an episode of “Bob Hope Presents the Chrysler Theater.”

From the time he made his first full-length feature, “The Slender Thread,” about a social work student coaxing a woman out of suicide on a telephone help line, Mr. Pollack had a hit-and-miss relationship with the critics. Writing in The New York Times, A. H. Weiler deplored that film’s “sudsy waves of bathos.” Mr. Pollack himself later pronounced it “dreadful.”

But from the beginning of his movie career, he was also perceived as belonging to a generation whose work broke with the immediate past. In 1965, Charles Champlin, writing in The Los Angeles Times, compared Mr. Pollack to the director Elliot Silverstein, whose western spoof, “Cat Ballou,” had been released earlier that year, and Stuart Rosenberg, soon to be famous for “Cool Hand Luke” (1967). Mr. Champlin cited all three as artists who had used television rather than B movies to learn their craft.

Self-critical and never quite at ease with Hollywood, Mr. Pollack voiced a constant yearning for creative prerogatives more common on the stage. Yet he dived into the fray. In 1970, “They Shoot Horses, Don’t They?,” his bleak fable of love and death among marathon dancers in the Great Depression, based on a Horace McCoy novel, received nine Oscar nominations, including the one for directing. (Gig Young won the best supporting actor award for his performance.)

Two years later, Mr. Pollack made the mountain-man saga “Jeremiah Johnson,” one of three closely spaced pictures in which he directed Mr. Redford.

The second of those films, “The Way We Were,” about a pair of ill-fated lovers who meet up later in life, also starred Ms. Streisand and was an enormous hit despite critical hostility.

The next, “Three Days of the Condor,” another hit, about a bookish C.I.A. worker thrust into a mystery, did somewhat better with the critics. “Tense and involving,” said Roger Ebert in The Chicago Sun-Times.

With “Absence of Malice” in 1981, Mr. Pollack entered the realm of public debate. The film’s story of a newspaper reporter (Sally Field) who is fed a false story by federal officials trying to squeeze information from a businessman (Paul Newman) was widely viewed as a corrective to the adulation of investigative reporters that followed Alan J. Pakula’s hit movie “All the President’s Men,” with its portrayal of the Watergate scandal.

But only with “Tootsie,” in 1982, did Mr. Pollack become a fully realized Hollywood player.

By then he was represented by Michael S. Ovitz and the rapidly expanding Creative Artists Agency. So was his leading man, Dustin Hoffman.

As the film — a comedy about a struggling actor who disguises himself as a woman to get a coveted television part — was being shot for Columbia Pictures, Mr. Pollack and Mr. Hoffman became embroiled in a semi-public feud, with Mr. Ovitz running shuttle diplomacy between them.

Mr. Hoffman, who had initiated the project, argued for a more broadly comic approach. But Mr. Pollack — who played Mr. Hoffman’s agent in the film — was drawn to the seemingly doomed romance between the cross-dressing Hoffman character and the actress played by Jessica Lange.

If Mr. Pollack did not prevail on all points, he tipped the film in his own direction. Meanwhile, the movie came in behind schedule, over budget and surrounded by bad buzz.

Yet “Tootsie” was also a winner. It took in more than $177 million at the domestic box office and received 10 Oscar nominations, including best picture. (Ms. Lange took home the film’s only Oscar, for best supporting actress.)

Backed by Mr. Ovitz, Mr. Pollack expanded his reach in the wake of success. Over the next several years, he worked closely with both Tri-Star Pictures, where he was creative consultant, and Universal, where Mirage, his production company, set up shop in 1986.

Mr. Pollack reached perhaps his career pinnacle with “Out of Africa.” Released by Universal, the film, based on the memoirs of Isak Dinesen, paired Ms. Streep and Mr. Redford in a period drama that reworked one of the director’s favorite themes, that of star-crossed lovers. It captured Oscars for best picture and best director.

Still, Mr. Pollack remained uneasy about his cinematic skills. “I was never what I would call a great shooter or visual stylist,” he told an interviewer for American Cinematographer last year. And he developed a reputation for caution when it came to directing assignments. Time after time, he expressed interest in directing projects, only to back away. At one point he was to make “Rain Man,” a Dustin Hoffman picture ultimately directed by Mr. Levinson; at another, an adaptation of “The Night Manager” by John le Carré.

That wariness was undoubtedly fed by his experience with “Havana,” a 1990 film that was to be his last with Mr. Redford. It seemed to please no one, though Mr. Pollack defended it. “To tell you the truth, if I knew what was wrong, I’d have fixed it,” Mr. Pollack told The Los Angeles Times in 1993.

“The Firm,” with Tom Cruise, was a hit that year. But “Sabrina” (1995) and “Random Hearts” (1999), both with Harrison Ford, and “The Interpreter” (2005), with Nicole Kidman and Sean Penn, fell short, as Hollywood and its primary audience increasingly eschewed stars for fantasy and special effects.

Mr. Pollack never stopped acting; in a recent episode of “Entourage,” the HBO series about Hollywood, he played himself.

Among Mr. Pollack’s survivors are daughters, Rachel and Rebecca, and his wife, Claire Griswold, who was once among his acting students. The couple married in 1958, while Mr. Pollack was serving a two-year hitch in the Army. Their only son, Steven, died at age 34 in a 1993 plane crash in Santa Monica, Calif.

In his later years, Mr. Pollack appeared to relish his role as elder statesman. At various times he was executive director of the Actors Studio West, chairman of American Cinematheque and an advocate for artists’ rights.

He increasingly sounded wistful notes about the disappearance of the Hollywood he knew in his prime. “The middle ground is now gone,” Mr. Pollack said in a discussion with Shimon Peres in the fall 1998 issue of New Perspectives Quarterly. He added, with a nod to a fellow filmmaker: “It is not impossible to make mainstream films which are really good. Costa-Gavras once said that accidents can happen.”
http://www.nytimes.com/2008/05/26/mo...d-pollack.html





At World’s End, Honing a Father-Son Dynamic
Charles McGrath

ERIE, Pa. — Cormac McCarthy’s Pulitzer Prize-winning novel, “The Road,” takes place in a world that, because of some unexplained catastrophe, has just about ended. The sky is gray, the rivers are black, and color is just a memory. The landscape is covered in ash, with soot falling perpetually from the air. The cities are blasted and abandoned. The roads are littered with corpses either charred or melted, their dreams, Mr. McCarthy writes, “ensepulchred within their crozzled hearts.”

For the crew that has just finished filming the movie version of “The Road” — a joint production of 2929 and Bob Weinstein’s Dimension Films, set to open in November — that meant an upending of the usual rules of making a movie on location. Bad weather was good and good weather bad. “A little fog, a little drizzle — those are the good days,” Mark Forker, the movie’s director of special effects, remarked one morning in late April while the crew was shooting some of the final scenes in the book on a stretch of scraggly duneland by the shore of Lake Erie here. “Today is a bad day,” he added, shaking his head and squinting.

The sky was blue, the sun so bright that crew members were smearing on sunscreen. A breeze was carrying away the fog pumping feebly from a smoke machine. Even worse, green grass was sprouting everywhere, and there were buds on the trees. Some of the crew had hand-stripped a little sapling of greenery, but the rest of the job would have to be done electronically by Mr. Forker, who was also in charge of sky replacement.

“The Road” began filming in late February, mostly in and around Pittsburgh, with a later stop in New Orleans and a postproduction visit planned to Mount St. Helens. The producers chose Pennsylvania, one of them, Nick Wechsler, explained, because it’s one of the many states that give tax breaks and rebates to film companies and, not incidentally, because it offered such a pleasing array of post-apocalyptic scenery: deserted coalfields, run-down parts of Pittsburgh, windswept dunes. Chris Kennedy, the production designer, even discovered a burned-down amusement park in Lake Conneaut and an eight-mile stretch of abandoned freeway, complete with tunnel, ideal for filming the scene where the father and son who are the story’s main characters are stalked by a cannibalistic gang traveling by truck.

The director of “The Road” is an Australian, John Hillcoat, best known for “The Proposition,” and many crew members were Aussies as well. In conversation the “Mad Max” movies, the Australian post-apocalyptic thrillers starring Mel Gibson, came up a lot, and not favorably. The team saw those movies, set in a world of futuristic bikers, as a sort of antimodel: a fanciful, imaginary version of the end of the world, not the grim, all-too-convincing one that Mr. McCarthy had depicted.

“What’s moving and shocking about McCarthy’s book is that it’s so believable,” Mr. Hillcoat said. “So what we wanted is a kind of heightened realism, as opposed to the ‘Mad Max’ thing, which is all about high concept and spectacle. We’re trying to avoid the clichés of apocalypse and make this more like a natural disaster.” He imagined the characters less as “Mad Max”-ian freaks outfitted in outlandish biker wear, he added, than as homeless people. They wear scavenged, ill-fitting clothing and layers of plastic bags for insulation.

The script for “The Road,” by Joe Penhall, is for the most part extremely faithful to Mr. McCarthy’s story of a father and son traveling alone through this blighted landscape and trying to keep alive the idea of goodness and civilization — the fire, they call it. The script does enlarge and develop in flashback the role of the man’s wife (played by Charlize Theron), who disappears quite early from the novel, choosing suicide rather than what she imagines will be starvation or worse. And of course the script lacks Mr. McCarthy’s heightened, almost biblical narrative style.

Some of that could be suggested by the look of the film, Mr. Hillcoat said, but mostly the nature of the bond between the man and the son, who in the script, as in the book, speak to each other in brief, freighted moments, would have to come out in the performances.

Viggo Mortensen, who plays the father, said the same thing. “It’s a love story that’s also an endurance contest,” he explained, and quickly added: “I mean that in a positive way. They’re on this difficult journey, and the father is basically learning from the son. So if the father-son thing doesn’t work, then the movie doesn’t work. The rest of it wouldn’t matter. It would never be more than a pretty good movie. But with Kodi in it, it has a chance to be an extremely good movie, maybe even a great one.”

Kodi is Kodi Smit-McPhee, an 11-year-old Australian who plays the son and bowled everyone over when he tested for the part, greatly reducing the anxiety filmmakers feel when casting a child. Some of the crew privately referred to him as the Alien because of the uncanny, almost freakish way that on a moment’s notice he switched accents and turned himself from a child into a movie star. Days after the filming of a climactic, emotional scene, people on the set were still marveling at Kodi’s performance. A couple said they had puddled up just from watching the monitor and needed to sneak a tear-dabbing finger behind their sunglasses.

In the novel the father and son have a relationship that is both tender and businesslike; they’re trying to survive against great odds, after all, and there isn’t much time for small talk. Both on and off the set Mr. Mortensen and his co-star behaved much the same way. In Erie, while Kodi’s father was away for a bit, Mr. Mortensen, who has a grown son of his own, moved from his suite to Kodi’s room, a double, where they jumped on the beds together. During filming Mr. Mortensen, protective of Kodi, worried, for example, about yanking or dragging him too hard, but also treated him as an equal, a fellow professional who happened to have a very different way of working.

Once he emerged from his trailer, Mr. Mortensen more or less stayed in character all day — bearded, gaunt, wound up and intense, going off by himself every now and then to smoke a cigarette. Kodi, on the other hand, wearing a ratty sweater, a wool cap and a pair of pants much too big for him, wandered around and hummed to himself between takes. He also engaged in lengthy fencing and stick-breaking contests with Jimi Johnson, a video assist operator.

For a scene in which the father, carrying the son on his shoulder, chases down a sandy road after a man who has stolen their belongings, Mr. Mortensen did wind sprints and jogged in place to make himself seem breathless and exhausted. Kodi simply turned limp on cue, and Mr. Mortensen snatched him up like a sack.

The next scene — in which the father and son catch up to the thief, and the father forces the man to take off his clothes, leaving him naked and freezing — took forever to set up. Like neighbors at a barn raising, the crew members erected a canopy over the road to cast an end-of-the-world shadow, and a while later, when the sun had moved, they had to reposition it. While waiting, Mr. Mortensen came back and fretfully studied the monitor. Kodi, meanwhile, dug for sand beetles, showing an especially plump one to Mr. Mortensen.

“Looks like good eatin’,” Mr. Mortensen said, and it wasn’t entirely clear whether he was joking or talking as a man who was supposed to be starving.

The thief was Michael Kenneth Williams (Omar on “The Wire”), one of a string of brand-name actors who turn up briefly in the film. (Robert Duvall is an old, dying man, and Guy Pearce is another father wandering with his family.) Mr. Williams brilliantly improvised while taking off his rags and plastic bags, pleading for his life in a way that causes the boy to take his side. When the first take was over, even before a wardrobe assistant could get there, Mr. Mortensen rushed over to help Mr. Williams pick up his clothes and get dressed again.

“He’s a good actor,” Kodi said.

Mr. Mortensen said, “Yeah, he’s good, isn’t he?”

The rest of the day ticked by slowly, in a way that was a reminder that filmmaking may be the last vestige of 19th-century artisanal labor: hours and hours to capture what on screen would last just a few minutes. When Mr. Hillcoat called it a wrap, a weary Mr. Mortensen headed for the makeup trailer, where he served wine from a stash he kept there. A while later, his face scrubbed of grime, his cheeks flushed a little, Kodi gave Mr. Mortensen a hug before heading out. Mr. Mortensen kissed him on the forehead.

“It was hard to get a rhythm out there today because of the sun,” Mr. Mortensen said on the way back to his trailer, decorated with a Mets banner, a Montreal Canadiens jersey and the flag of the San Lorenzo soccer team of Argentina. “But Kodi was unflappable, as usual. I don’t even think of him as a kid. There are things he’s done on this movie that I’ve never seen anybody do before. And there are many adult actors who never have a moment like he has every day. I can’t say I’ve ever worked with a better partner.”

He stopped to snatch a hamburger, no bun, from the catering table, and after wolfing half of it, he added: “I think of Kodi as a friend. We’re kind of like an old married couple. That’s what our relationship is.”
http://www.nytimes.com/2008/05/27/movies/27road.html





Student Researching Al-Qaida Tactics Held for Six Days

• Lecturers fear threat to academic freedom
• Manual downloaded from US government website

Polly Curtis and Martin Hodgson

A masters student researching terrorist tactics who was arrested and detained for six days after his university informed police about al-Qaida-related material he downloaded has spoken of the "psychological torture" he endured in custody.

Despite his Nottingham University supervisors insisting the materials were directly relevant to his research, Rizwaan Sabir, 22, was held for nearly a week under the Terrorism Act, accused of downloading the materials for illegal use. The student had obtained a copy of the al-Qaida training manual from a US government website for his research into terrorist tactics.

The case highlights what lecturers are claiming is a direct assault on academic freedom led by the government which, in its attempt to establish a "prevent agenda" against terrorist activity, is putting pressure on academics to become police informers.

Sabir was arrested on May 14 after the document was found by a university staff member on an administrator's computer. The administrator, Hisham Yezza, an acquaintance of Sabir, had been asked by the student to print the 1,500-page document because Sabir could not afford the printing fees. The pair were arrested under the Terrorism Act, Sabir's family home was searched and their computer and mobile phones seized. They were released uncharged six days later but Yezza, who is Algerian, was immediately rearrested on unrelated immigration charges and now faces deportation.

Dr Alf Nilsen, a research fellow at the university's school of politics and international relations, said that Yezza is being held at Colnbrook immigration removal centre, due to be deported on Tuesday.

"If he is taken to Algeria, he may be subjected to severe human rights violations after his involvement in this case. He has been in the UK for 13 years. His work is here, his friends are here, his life is here."

Of his detention, Sabir said: "I was absolutely broken. I didn't sleep. I'd close my eyes then hear the keys clanking and I would be up again. As I realised the severity I thought I'd end up in Belmarsh with the nutcases. It was psychological torture.

"On Tuesday they read me a statement confirming it was an illegal document which shouldn't be used for research purposes. To this day no one has ever clarified that point. They released me. I was shaking violently, I fell against the wall, then on the floor and I just cried."

Bettina Rentz, a lecturer in international security and Sabir's personal tutor, said: "He's a serious student, who works very hard and wants a career in academia. This is a great concern for our academic freedom but also for the climate on campus."

Students have begun a petition calling on the university to acknowledge the "disproportionate nature of [its] response to the possession of legitimate research materials".

A spokesman for Nottingham University said it had a duty to inform police of "material of this nature". The spokesman said it was "not legitimate research material", but later amended that view, saying: "If you're an academic or a registered student then you have very good cause to access whatever material your scholarship requires. But there is an expectation that you will act sensibly within current UK law and wouldn't send it on to any Tom, Dick or Harry."

At its annual conference next week the University and College Union will debate a motion on "assaults on academic freedom by the DIUS [Department for Innovation, Universities and Skills]". Sally Hunt, general secretary of the UCU, said: "If we really want to tackle problems like extremism and terrorism, then we need to be safe to explore the issues and get a better understanding. The last thing we need is people too frightened to discuss an issue or research a subject because they fear being arrested or reported."

The higher education minister, Bill Rammell, said: "The government does not want to or has never asked for staff or students to spy on their colleagues or friends. We want universities to work with staff and students on campus to isolate and challenge the very small minority who promote violent extremism."

Sabir's solicitor, Tayab Ali, said: "This could have been dealt with sensibly if the university had discussed the issue with Rizwaan and his tutors. This is the worrying aspect of the extension of detention [under the Terrorism Act]. They can use hugely powerful arrest powers before investigating."
http://education.guardian.co.uk/high...282045,00.html





Emscher 0.6.2b Released
Posted by toni66

Quote:
Changes:

Emscher v0.6.2b
---------------------------------------------------------------------------------
BUGFIX: Trayicon-menu has not been shown on click
BUGFIX: Hubs were not added to Hublist after asking a WebCache

Emscher v0.6.1b
---------------------------------------------------------------------------------
BUGFIX: Error while loading Webcaches
BUGFIX: Webcache-List has not been cleared before showing Webcaches

Emscher v0.6b (Protocol Version: v0.13)
---------------------------------------------------------------------------------
ADD: Settings-Form replacing the Settings-Tab(Now the settings will only be overwritten
if an user has clicked on "OK")
ADD: Network-Thread(In charge of sending/receiving, en-/decrypting and other
connection-management)
ADD: Linkchecker-Thread(Checks in a defined interval if a user has clicked on
an emscher-link)
ADD: Emscher-Corethread(To seperate the GUI from the Core-parts)
ADD: User can seed all files in a certain directory and its subdirectoies
ADD: Openfile-Menuitem in Filemenu
ADD: A double klick on a file opens it
ADD: Now it is possible to select multiple files and to start,stop,recheck or delete them
CHANGE: Webcache- and Chkversion-thread rewritten. They do not need the indy-
component TIDHttp anymore
CHANGE: main.pas rewritten
CHANGE: ID-Generator rewritten(Using less information to generate id)
CHANGE: Waiting time between sent signals is 10ms now because of the id-generator
(because fast calling in a row returns the same id)
CHANGE: Because of the new socket-library the chunk length is 64KB and the Block-length
1KB(1024 Bytes) now
CHANGE: HTL-Maximum is 255 now
CHANGE: Get sources(doing hash-search) if file is not complete
BUGFIX: You could not open a downloaded file for reading only, but writing only
BUGFIX: Everytime you recheck a file it will be copied to the incoming dir
REMOVE: Settings-Tab
REMOVE: All kinds of 8-Byte-IDs
http://downloads.sourceforge.net/ems...0&big_mirror=0
http://downloads.sourceforge.net/ems...2&big_mirror=0

http://www.p2p-zone.com/underground/...ad.php?t=24528





$20 Million Dollar Experiment to See if You'll Rent a Song for 10 Cents
Michael Robertson

A music experiment will soon begin with the ambitious attempt to reinvigorate people to buying music online. For just 10 cents you'll be able to select a song to add to your Music Locker to play whenever you like. These aren't obscure or unknown Indie bands like those you'd find on Amie Street, but include nearly the entire music library of the major record labels. This upcoming service has a big backer which might just surprise you.

Here's how the innovative site works. Over 5 million well known songs are browsable in a web layout. Songs are ranked by the number of listens they have received - similar to the strategy MP3.com invented 10 years ago. Each song can played one time in its entirety with the built in flash player. Subsequent plays are limited to 30 seconds. Next to every song is an "Add" button which for a single credit will add the tune to your personal collection. Credits cost 10 cents and each new customer gets 50 credits for free.

Once a song is added it is accessible from your "My Collection" area where it can be listened to an unlimited number of times. The songs are not downloadable so they are not useful for portable players or your mobile phone. There is also no ability to play the songs on Internet radio, game console and DVR devices (like Tivo) as you can with the Locker from MP3tunes. These 'web songs' are trapped in a tab of your browser.

While the advertisements talk about "buying" songs it is more akin to a rental model. The songs and the permission to play them are stored on a remote machine by a company that may discontinue the service at anytime - like a landlord who can change the rules whenever they feel like it. The first time I wrote about this issue I gave the example of the Coke Music store going flat. Then the Virgin Music store ceased operation and most recently the MSN Music Store announced they would pull the plug on August 31st and all purchased songs would go into the coffin as well. If Microsoft, the richest technology company in the world, cannot keep their store going that indicates you need to expect any store to be in jeopardy of shutting down.

The financial backers of this dime-a-song rental concept might surprise you - major record label Warner Music Group. They quietly invested $20 million into a company called Lala late last year (2007) when they devised this strategy. At that time they also agreed to put printed advertisement for Lala into 25,000,000 CDs in exchange for the right to greater ownership. (WMG also sells CDs plus digital tracks through Lala - a concept I first tried with limited success.) Lala has raised a substantial $34.7 million in investment money to date. At the time of this writing, the service is not yet public but it will be eventually at Lala.com's main page.

Will people pay ten pennies for a restricted web song with pseudo ownership? I have serious doubts. People prefer free stuff on the net and there's plenty of it. You can get full length streaming versions of U2's Pride on Napster, Imeem or even better your choice of 6 videos from YouTube for free. So what would convince someone to buy the Lala version?

WMG and Lala's song rental is an admirable concept with a solid design and interface. And it is a positive sign to see the major labels agreeing for songs to go into a personal locker area - (albeit a highly restrictive one). But any locker needs to be open to the world via an API so the music can flow to the car, phone, portable player as well as multiple PCs like we have at MP3tunes. A successful model needs to give more to paying customers not less to compete with free and the omnipresent black market of piracy.

You can try this dime-a-song rental concept before it is publicly launched via this "hidden URL". Let me know if you think people will pay 10 cents to rent a song in the forum.
http://www.michaelrobertson.com/arch...?minute_id=265





'Give It Away And Pray' Isn't A Business Model... But It Doesn't Mean That 'Free' Doesn't Work
Mike Masnick

I've been noticing an interesting trend lately. While more folks aren't totally averse to the idea that they need to somehow embrace "free," they're mishandling what they do with "free" and then going on to complain how "free" doesn't work. The basic problem is this: they hear about the importance of "free" and so they give something away for free. But they don't have a business model around the free content. They don't understand the economic forces at work. They just give stuff away and pray... and then whine when nothing happens. As we've pointed out before, no one says that "free" by itself pays the bills. You need to have a more complete strategy than that -- and it involves a lot more than "give it away and pray." It's good that they're at least trying, but if they don't understand the real issues and fail at the experiments, they suddenly come back and claim that "free" isn't the answer, and suddenly rule out all business models involving free. And that is a real recipe for failure.

The latest to head down this road is NY Times columnist David Pogue, who bashes the idea of digital publishing of books by pointing to a long and interesting blog post from author Steven Poole, who did the "give away and pray" option along with a tip jar. It didn't make him much money. That shouldn't be any surprise, because tip jars aren't a real business model. But, because Poole seemed to have an expectation in his mind, he ends up being quite disappointed, noting that 1 out of every 1,750 downloads (0.057%) left some money. What's left implicit here is that that figure is too low. What this really means is that Poole didn't really give away the book for free. He had an expectation that people would magically pay for it. But, that's not a business model. That's not tying the free and infinite good to other scarce goods that will help you make money.

Unfortunately, both Pogue and Poole then use this to bash the entire concept of free-based business models, with Poole getting unnecessarily offensive in his response:

"I'll call it, for short, "the Slashdot argument". It says that books, music, films, software and so on ought to be freely distributed to anyone who wants them, simply because they can be freely distributed. What is the writer or musician to do, though, if she can't earn money from her art? Simple, says the Slashdotter: earn your money playing live (if you're one of those musicians who plays live), or selling T-shirts or merchandise, or providing some other kind of "value-added" service. The Week in Review is edited and published by Jack Spratts. Many such arguments seem to me to be simple greed disguised in high-falutin' idealism about how "information wants to be free". Perhaps it's not empty pedantry to point out that "information" doesn't want anything in and for itself. The information in which humans traffic is created by humans. And most information-creating humans need to earn dollars or yuan to survive.

While I'm sure there may be some Slashdot-types who may make this argument, it doesn't mean that it's an accurate representation of the more important discussion of these business models. The main problem is his use of "ought," as in people saying things "ought" to be free. It's not that things ought to be free because they can be free -- but that things will be free because that's just basic economics. Price gets driven to marginal cost in a competitive market, and the reason it happens is because others do learn to put in place business models that work, and then if you're the lone holdout, people start to ignore you. Also, I'll note that that Poole brushes off the (indeed, simplistic) business model suggestions as being "high falutin' idealism" but fails to actually try out any real business model.

And then he weakly follows it up by implying that you can't earn money by giving away stuff for free. But, again, he's blaming the wrong thing: he's blaming free for his own failure to use a real business model where the free offering was closely tied to additional scarcity he could sell. He continues, getting even more insulting as he goes:

In any case, I think the Slashdot argument can actually be disposed of rapidly with one rhetorical question, as follows.

Oh Mr Freetard, you work as a programmer, do you? How interesting. So do you perform all your corporate programming duties for free, and earn your keep by selling personally branded mousemats on the side?

Didn't think so.


This misleading and mistargeted argument has been debunked so many times, it's disappointing to see both Poole and Pogue repeat it. But, since it needs a response, let's do it again: you give away the infinite goods, not the scarce goods. Your time is a scarce good. No one is saying that everything needs to be free -- they're saying that infinite goods will be free, because of it's very nature in economics. In fact, Poole's argument is particularly weak when it comes to programmers, because most programmers don't earn any kind of royalties for the software they write. They are paid a salary, for their time -- but not for the software itself (which is an infinite good). And, I won't even get into the number of programmers who work on open source projects for free... or the fact that Poole is blogging for free...

Again, Poole and Pogue are so focused on free, that they fail to distinguish between infinite and scarce goods or the business models involved in what's going on. Poole then weakly dismisses the Radiohead experiment:

Perhaps I could have tried distributing Trigger Happy the Radiohead way, making sure you had to pay a minimum to get the goods. Would I still have attracted 30,000 readers like that? I doubt it. The sublime In Rainbows seems to have been a nice little earner for Radiohead, but that's because they're Radiohead -- and they became Radiohead through the nasty old music-industry business model. So did Nine Inch Nails, whose recent internet release of (the excellent) Ghosts was very clever -- the first nine songs of a triple album for free in compressed mp3; the whole thing in a lossless format for $5. But if there's been a comparable success by a band that hasn't already gained its cultural capital and name-recognition through the evils of copyright and corporate promotion, I'd like to know about it.

Poole and Pogue (who quotes the same snippet) both miss the fact that in both cases described above, the bands in question didn't "give away and pray," but both put together real strategic business models that were focused on using the infinite goods (the music) to sell more scarce goods. In the case of Radiohead (despite some claims to the contrary) at the same time Radiohead announced the downloads it also told fans that it would be selling a beautiful "discbox" for the album as well. This was a very valuable scarce good -- that the free music made a lot more valuable by increasing the demand for it. As for Nine Inch Nails, Trent Reznor offered a tiered system of scarce goods that were all made more valuable by the availability of the music -- proven by the fact that Reznor quickly sold out of his limited edition deluxe offering.

And I still chuckle about the argument that these models "only work for big bands." That's because a few years ago, when we pointed out how this worked for some small up-and-coming bands, people would whine "but that only works for small bands -- big bands would be screwed!" The model, when well designed works for small bands just as well as big bands. No, it might not turn around millions in a week, but it can certainly help an artist make a living. Witness the case of Maria Schneider, who ended up making a Grammy-winning album using some the concepts discussed around these parts. And, of course, we've worked out the details of the type of business model that an up-and-coming band could use to embrace these concepts to grow.

So, it's nice to see someone at least willing to explore the concept of free without shutting out the possibility. But free alone isn't a business model. And it's wrong to blame free for the lack of establishing a complete business model. Just because "give it away and pray" isn't a workable business model, that doesn't mean that there aren't business models that do work. Hopefully, Poole and Pogue will eventually recognize that they're dismissing the wrong thing. They shouldn't be complaining about free (or making misleading accusations about those who simply recognize the economic forces at work) -- they should be complaining about a failure to put in place a real business model to take advantage of what will be free.
http://techdirt.com/articles/20080522/1545021204.shtml





Here's a Script That Lets You Download Any Song You Want
Anonymous Coward

Code:
#!/usr/bin/perl

use strict;
use LWP::Simple;
use Data::Dumper;
use JSON;
$|=1;

die "$0 <search param>" unless $ARGV[0];
my $root_url = "http://next.lala.com/api/AutoComplete/songAutoComplete";
my $content = get "$root_url?prefix=$ARGV[0]";
my $ref = from_json($content);
my $num = 0;
foreach (@{$ref->{data}->{list}}) {
  print "$num : $_->{artist} - $_->{title}\n";
  $num++;
}
print "Download which? > ";
my $req = <STDIN>;
die "not valid" if ($req < 0 or $req > $num);
my $download_url = "http://next.lala.com/api/Player/getTrackUrls?flash=true&webSrc=lala&widgetId=LalaHeadlessPlayer&T=" . $ref->{data}->{list}->[$req]->{playToken};
my $play_url = get $download_url;
my $play_ref = from_json($play_url);
my $download_link = $play_ref->{data}->[0]->{url};
print "Getting: $download_link\n";
my $filename = $ref->{data}->{list}->[$req]->{artist} ."-" . $ref->{data}->{list}->[$req]->{title} . ".mp3";
print "Downloading to $filename\n";
system("wget -O '$filename' $download_link");
It's quick, it's dirty, but it works:

Code:
perl download.pl tiesto
0 : Tiesto - Ten Seconds Before Sunrise
1 : Tiësto - Forever Today
Download which? > 0
Getting: http://cfs-listen-52.lala.com/contentfs/content?t=NjU1MzVVNDM2OTE1OQ%3D%3D-vSOzDPPcV8VwbKW6Bwdv%2FQ%3D%3D
Downloading to Tiesto-Ten Seconds Before Sunrise.mp3
--2008-05-27 18:16:09--  http://cfs-listen-52.lala.com/contentfs/content?t=NjU1MzVVNDM2OTE1OQ%3D%3D-vSOzDPPcV8VwbKW6Bwdv%2FQ%3D%3D
Resolving cfs-listen-52.lala.com... 209.237.235.158
Connecting to cfs-listen-52.lala.com|209.237.235.158|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 3609494 (3.4M) [audio/x-mpeg]
Saving to: `Tiesto-Ten Seconds Before Sunrise.mp3'
http://yro.slashdot.org/comments.pl?...7&cid=23563999





Here's a Better Version that Gets Many More Results from a Different Webservice. Apparently the Front Page One is Very Limited

This one will do paging, use n/p to go next/previous when prompted.

Code:
#!/usr/bin/perl

use strict;
use LWP::Simple;
use Data::Dumper;
use JSON;
$|=1;

die "$0 <search param>" unless $ARGV[0];
my $ref;
my $offset;
my $req;
while(1) {
  $req = "";
  my $root_url = "http://next.lala.com/api/SearchUtils/search/v19.110.0-24?Q=$ARGV[0]&sortKey=relevance&sortDir=desc&Nb=100&Sk=$offset&webSrc=lala";
  my $content = get $root_url;
  $content =~ s/new Date\((\d+)\)/$1/g;
  $ref = from_json($content);

  my $num = 0;
  foreach (@{$ref->{data}->{songs}->{list}}) {
    print "$num : $_->{artist} - $_->{title}\n";
    $num++;
  }

  print "Download which? > ";
  chomp($req = <STDIN>);
  if ($req =~ /n/) {
    $offset+=100;
    next;
  }
  if ($req =~ /p/) {
    $offset-=100;
    $offset=0 if $offset<0;
    next;
  }
  if ($req !~ /\d+/ or $req < 0 or $req > $num) {
    print "Invalid!\n";
    next;
  }
  last;
}
my $download_url = "http://next.lala.com/api/Player/getTrackUrls?flash=true&webSrc=lala&widgetId=LalaHeadlessPlayer&T=" . $ref->{data}->{songs}->{list}->[$req]->{playToken};
my $play_url = get $download_url;
my $play_ref = from_json($play_url);
my $download_link = $play_ref->{data}->[0]->{url};
print "Getting: $download_link\n";
my $filename = $ref->{data}->{list}->[$req]->{artist} ."-" . $ref->{data}->{list}->[$req]->{title} . ".mp3";
print "Downloading to $filename\n";
system("wget -O '$filename' $download_link");
http://yro.slashdot.org/comments.pl?...7&cid=23564837





Here's a Fixed One That Uses Utf-8
Aarku

Code:
#!/usr/bin/perl

use strict;
use LWP::Simple;
use Data::Dumper;
use JSON;
$|=1;

die "$0 <search param>" unless $ARGV[0];
my $ref;
my $offset;
my $req;
while(1) {
  $req = "";
  my $root_url = "http://next.lala.com/api/SearchUtils/search/v19.110.0-24?Q=$ARGV[0]&sortKey=relevance&sortDir=desc&Nb=100&Sk=$offset&webSrc=lala";
  my $content = get $root_url;
  $content =~ s/new Date\((\d+)\)/$1/g;
  $ref = from_json($content, {utf8 => 1});

  my $num = 0;
  foreach (@{$ref->{data}->{songs}->{list}}) {
    next if $_->{playType} eq "Sample";
    print "$num : $_->{artist} - $_->{title}\n";
    $num++;
  }

  print "Download which? > ";
  chomp($req = <STDIN>);
  if ($req =~ /n/) {
    $offset+=100;
    next;
  }
  if ($req =~ /p/) {
    $offset-=100;
    $offset=0 if $offset<0;
    next;
  }
  if ($req !~ /\d+/ or $req < 0 or $req > $num) {
    print "Invalid!\n";
    next;
  }
  last;
}
my $download_url = "http://next.lala.com/api/Player/getTrackUrls?flash=true&webSrc=lala&widgetId=LalaHeadlessPlayer&T=" . $ref->{data}->{songs}->{list}->[$req]->{playToken};
my $play_url = get $download_url;
my $play_ref = from_json($play_url);
my $download_link = $play_ref->{data}->[0]->{url};
print "Getting: $download_link\n";
my $filename = $ref->{data}->{songs}->{list}->[$req]->{artist} ."-" . $ref->{data}->{songs}->{list}->[$req]->{title} . ".mp3";
print "Downloading to $filename\n";
system("curl -o '$filename' $download_link");
http://yro.slashdot.org/comments.pl?...7&cid=23565771





Sigur Rós Offers New LP Details, Free "Gobbledigook" Download
Meghan Jones

Sigur Rós isn't releasing its fifth album, Með suð í eyrum við spilum endalaust, until June 23. But you can get a sneak peek at one of the first tracks off the album-- the Icelandic title of which translates to English as With a Buzz in Our Ears We Play Endlessly-- this very afternoon.

Can it be true? Já! "Gobbledigook" will be played as a world exclusive on Radio 1 this afternoon with DJ Zane Lowe, and then the band will release it-- at 7:30 GMT (2:30 EST)-- as a free download on their website, SigurRós.com.
And that's not the only bonus material Sigur Rós is offering with this new album. A pre-sale for With a Buzz... will begin on June 2, also through the band's website, and anyone who pre-orders the album will then have access to a streaming version of the album beginning June 9.

With A Buzz... is the first album Sigur Rós made outside of its homeland of Iceland, recording in New York, London and Havana as well as Reykjavik. It will also mark the first time vocalist Jón Thor Birgisson sings a track in English. Bet you can guess which one that is. The rest of the album will be in Icelandic, sounding mythical and eerily beautiful, as per usual.

With a Buzz... tracklisting:

1. Gobbledigook
2. Inní mér syngur vitleysingur
3. Góðan daginn
4. Við spilum endalaust
5. Festival
6. Með suð í eyrum
7. Ára bátur
8. Illgresi
9. Fljótavík
10. Straumnes
11. All alright
http://www.pastemagazine.com/article...ownload-t.html





Rowling Offers Glimpse Into Harry Prequel

The secret of what happened before boy wizard Harry Potter went to Hogwarts will be revealed through the unusual channel of a charity auction next month.

Author JK Rowling has penned an 800-word outline of a prequel to the seven book series that has made her into a billionaire which will be sold at the auction on June 10 by bookseller Waterstones.

The outline, which ends with the line "From the prequel I am not working on -- but that was fun!" is one of 13 story outlines written for the auction by famed authors including new Bond writer Sebastian Faulks and Nobel laureate Doris Lessing.

"What's Your Story? just gets more and more exciting -- all these brilliant works by amazing writers and illustrators, every one a small masterpiece," said Waterstone's chief Gerry Johnson.

"We never dreamed that JK Rowling would donate something so precious, and we're incredibly grateful."

The money raised will go to charities English PEN and Dyslexia Action.

Other authors who have donated outline works are Lisa Appignanesi, Margaret Atwood, Lauren Child, Richard Ford, Neil Gaiman, Nick Hornby, Michael Rosen, Axel Scheffler, Tom Stoppard and Irvine Welsh.

(Reporting by Jeremy Lovell; editing by Paul Casciato)
http://www.nytimes.com/reuters/arts/...t-rowling.html





Is Google Violating a California Privacy Law?
Saul Hansell

UPDATED 5/30, 8:45 AM After I wrote about Google’s spat with an advertising trade group over the company’s refusal to put a link to its privacy policy on the home page of Google.com, I discovered that there is actually a California law on the subject.

The California Online Privacy Protection Act of 2003 requires the operator of a commercial Web site that collects personal information about users to “conspicuously post its privacy policy on its Web site.”

How conspicuously? The site needs to link to the policy “located on the homepage or first significant page after entering the Web site.” And the law has some rules for how prominent the link must be.

Google certainly knows about the law. Just before it took effect in 2004, the Mountain View, Calif.-based company expanded the disclosures in its privacy policy in order to comply, according to a report by CNet.

Google, which wants to keep its home page very simple, puts a link to its privacy policy on a page called “About Google,” to which it links from its home page. Steve Langdon, a Google spokesman, said in an e-mail that Google interprets the law as allowing the company to use other methods to provide notice of its privacy policy:

By having a link to our privacy policy one click from our home page, and because the privacy policy is easily found by using the search box on the home page, we comply with this statute.

I don’t see any discussion of any alternatives to a home-page privacy link in published analyses of the law. For example, a 2004 analysis by law firm Cooley Godward Kronish doesn’t list any other option for conspicuous notice other than placing the privacy policy itself or a link to it on a site’s home page. And the California Office of Information Security and Data Protection offers this recommendation to Web sites:

Use a conspicuous link on your home page containing the word “privacy.” Make the link conspicuous by using larger type than the surrounding text, contrasting color, or symbols that call attention to it.

I’ve left a phone message for and sent an e-mail to Joanne McNabb, the chief of California’s Office of Privacy Protection, seeking more clarification of the law. I’ll post her response if I hear from her.

Does Google’s decision to do something different really matter? Google argues that anyone who is curious about its privacy policy can simply search Google to find it. Moreover, privacy policies are more about fine print and legal mumbo jumbo than information that is really useful to people. Also, it’s worth noting that Google says it makes far less use of the data it collects about its users than many other big Web companies. Yahoo and AOL, for example, display advertising based both on information provided by users and on the users’ online surfing behavior. Google doesn’t.

On the other hand, it doesn’t seem like it would be that hard for Google to put a single seven-letter word somewhere on its home page to help those who want to know more about its privacy practices.

Privacy experts say Google is under the microscope because it collects and retains so much information about so many people.

“It wouldn’t be a big privacy issue if it wasn’t Google saying everyone else may be doing this but we don’t need to,” said Marc Rotenberg, the director of the Electronic Privacy Information Center.

UPDATE (FOR THOSE THAT LIKE LEGAL DETAILS):

I had asked Chris Hoofnagle, a senior fellow with the Berkeley Center for Law & Technology. to help me understand Google’s argument. The company pointed out that the law presents some options that include placing the link to the privacy policy on the “first significant page” after the home page. And it allows more flexibility to “online services” than to Web sites.

Here is what Mr Hoofnagle wrote back:

Okay, I think Google is in violation.

They’re not an “online service” for purposes of the act. That term, I believe from analyzing the history of AB 68, was used to broaden the related term “operator” so that the law would cover websites and other online tools (such as chat, adware, etc), but not ISPs. The idea behind including “online service” was to cover information-collecting internet-based services. These services had to be differentiated, because they might not be able to present a privacy policy through a webpage, as the law requires.

See: http://info.sen.ca.gov/cgi-bin/postq...use=B&site=sen

It takes 3 clicks to get to Google’s privacy policy. The provision concerning “first significant page” is to deal with websites that have “splash” pages. It’s hard to believe that the “first significant page” on Google is its “about” page: http://www.google.com/intl/en/about.html, which you have to click on to get to the privacy policy introduction, before you can get to the actual privacy policy.

It’s pretty obvious that the first significant page on Google is the search results page. But that page doesn’t contain the privacy policy or a link to it either.
http://bits.blogs.nytimes.com/2008/0...law/index.html





A Letter from the CEO and Founders

Dear Plaxo member,

We are excited to announce some of the biggest news in the history of Plaxo. Plaxo has signed a definitive agreement** to be acquired by Comcast, the nation's leading provider of entertainment, information and communications products and services. We've got at least a few months to go before the acquisition is completed, but we wanted to send you this note to let you know what's coming up and how it affects you and your account.

Plaxo will remain an independent brand, organization and entity. We've been busy at work on our networked address book service and our next-generation social network, Pulse (if it's been a while, please come back and check out all the new features). And, through additional projects with Comcast, we'll be able to take these services to a lot more users and places than we could on our own... including the TV, phone and more.

If you'd like to read more about some of the great new things we're planning, please read our official announcement.

So, what does this mean for current Plaxo members like you? The services you know and enjoy from Plaxo will not only continue to exist, but will also continue to evolve and improve. We will continue to make our basic services free, and we will continue to serve customers in multiple languages across the world. But, we'll now be able to invest even more in our services, and we will enhance them with more users and more content available across a wider array of devices.

We will also continue to protect your privacy and give you control of your information. We will continue to protect your data with one of the strongest privacy policies, which will remain in effect even after the transition. And, we'll continue to be a strong advocate for the open social web.

We've put together a quick Q&A about your privacy, account and your data.

Last, we'd like to extend an enormous thank you. Whether you've been a Plaxo user for a long time or just recently joined Pulse, we'd like to thank you for making Plaxo a vibrant network. We are excited to open a new chapter today and look forward to helping you keep in touch with the people you care about.

Sincerely,

Ben Golub, Chief Executive Officer
Cameron Ring, Founder and Chief Architect
Todd Masonis, Founder and Vice President of Products





This Is Funny Only if You Know Unix
Noam Cohen

FOR a certain subset of Internet users, “Sudo make me a sandwich” may as well be “Take my wife ... please.”

Perhaps some explanation is in order. Before giving up the goods, however, we should heed the warning of Randall Munroe, the 23-year-old creator of xkcd, a hugely popular online comic strip (at least among computer programmers) where the sandwich line appeared. Mr. Munroe believes that analyzing a joke is like dissecting a frog — it can be done, but the frog dies.

Still, he plays along, explaining that “sudo” is a command in the Unix operating system that temporarily grants godlike powers: “The humor comes from people who have encountered typing a command and having the computer say ‘No,’ and they say, ‘Oh, yeah, sudo says,’ and the computer does it. Kind of like ‘Simon says.’ ”

Hence the set-up: one stick figure says to another, “Make me a sandwich,” only to be told, “No.” Thinking quickly, stick figure No. 1 says, “Sudo make me a sandwich,” and the once-recalcitrant stick figure No. 2 must comply.

Mr. Munroe, a physics major and a programmer by trade, is good for jokes like this three times a week, informed by computing and the Internet. By speaking the language of geeks — many a strip hinges on crucial differences between the C and Python programming languages — while dealing with relationships and the meaning of a computer-centric life, xkcd has become required reading for techies across the world.

The site, which began publishing regularly in January 2006, has 500,000 unique visitors a day, he said, and 80 million page views a month. (Why “xkcd”? “It’s just a word with no phonetic pronunciation,” his Web site, xkcd.com, answers.)

Mr. Munroe has become something of a cult hero. He counts himself as among the fewer than two dozen creators of comic strips on the Web who make a living at it.

At Google headquarters, a required stop on the geek-cult-hero speaking tour, he recently addressed hundreds of engineers, some of whom dutifully waited for him to sign their laptops. He said he had only wanted a tour of the place but had instead been invited to speak. The real thrill, he said, was that a hero of his, Donald Knuth, a professor emeritus of computer science at Stanford and a programming pioneer, was in the front row.

“It’s comparable to Bill Gates’s being in the front row,” he said. “I got to have lunch with him. He’s in his 70s, but people he is in touch with must have told him about it.”

While the comics play on the peculiarities of code, they are as much about escaping the clear, orderly world of commands to engage a chaotic sphere known as real life, or perhaps merely adulthood.

So one comic has a graph showing “my overall health” entering a steep decline “the day I realized I could cook bacon whenever I wanted.” Or, in one of Mr. Munroe’s favorites, a stick-figure couple revel in an apartment filled to the brim with playpen balls, “because we are grownups now, and it’s our turn to decide what that means.”

And, in a rare lapse from his plain-and-simple drawing style, a pair of stick figures walk in an increasingly beautiful landscape after first declaring: “I feel like I’m wasting my life on the Internet. Let’s walk around the world.” At the foot of a gorgeous mountain, however, one turns to the other and says, “And yet, all I can think is that this will make for a great LiveJournal entry.”

Mr. Munroe is clearly still getting used to his celebrity and to running a business. He and his roommate, Derek Radtke, work on the Web site out of their Somerville, Mass., apartment, and they recently hired an employee to handle e-mail.

“People are generally surprised that we make a living from it,” Mr. Munroe said. Without being specific, he said that the sales of xkcd merchandise support the two of them “reasonably well.” He said they sell thousands of T-shirts a month, either of panels from his strip or in their style, as well as posters.

“We’ve been getting a lot more efficient,” he said. “We were losing money on every T-shirt sold overseas for a while.” (But you can make it up in volume, I helpfully suggested. He moved on.)

A fan of newspaper comic strips since childhood, Mr. Munroe can simultaneously call himself an heir to “Peanuts” while recognizing that his quirky and technical humor would never have made it in newspapers.

On the Internet, he said, “You can draw something that appeals to 1 percent of the audience — 1 percent of United States, that is three million people, that is more readers than small cartoons can have.”

In that way, and many others, the Web has been a salvation. “People doing comics on the Internet are free of all the baggage that goes with being with a syndicate,” he said, “the editorial control, the space limits, the no control over what can be done with your cartoon.”

The Internet has also created a bond between Mr. Munroe and his readers that is exceptional. They re-enact in real life the odd ideas he puts forward in his strip. A case in point was the strip called “Dream Girl.” It recounted a dream in which a girl (stick figure with flowing hair) recites a bunch of numbers into the narrator’s ear.

“The xkcd person is the kind of person who would take that and run with it,” he said. The numbers were coordinates and a date months in the future.

The strip’s narrator says he went there and no one came. “It turns out that wanting something doesn’t make it real,” the strip concludes.

But on that day in real life, hundreds of fans met in a park in Cambridge.

And then they all ordered sandwiches.
http://www.nytimes.com/2008/05/26/bu...ia/26link.html





Belgian Copyright Group Demands Google Pay Up to €49 Million
Aoife White

Belgian French-language newspapers said Tuesday they want search engine Google Inc. to pay up to €49 million (US$77 million) in damages for publishing and storing their content without permission.

The newspaper copyright group Copiepresse said it had summoned Google to appear again before a Brussels court in September that will decide on their claim that they suffered damages of between €32.8 million (US$51.7 million) and €49.2 million (US$77.5 million).

The group called on Google to pay a provisional amount of €4 million (US$6.3 million).

The world's largest search engine said it could not comment because it had not yet received the legal documents. Copiepresse said the May 22 summons would be delivered to Google's U.S. headquarters in Mountain View, California.

Last year Google lost a lawsuit filed by the newspapers that forced it to remove headlines and links to news stories posted on its Google News service and stored in its search engine's cache without the copyright owners' permission.

Copiepresse said in its summons that Google had violated Belgian copyright law by reproducing and publishing part of newspapers' stories and by storing the full versions of archived stories in its cached pages.

It said the losses were calculated by a professor at the University Libre de Bruxelles and damages should be based on articles stored via Google Search since April 13, 2001 and Google News since it launched in Belgium in 2006.

It suggested setting up a panel of Belgian experts to examine the figures if Google wanted to contest the case.

Copiepresse also wants Google to publish — without any commentary — a copy of the ruling against it on google.be and news.google.be for 20 days or pay a daily fine of €1 million (US$1.58 million).

The Brussels Court of First Instance ruled in February 2007 that Google could not call on exemptions to copyright law, such as claiming "fair use" for Google News' publication of press articles when it displays headlines, a few lines of text, photos and links to the original page.

The company claims its Google News service is "entirely legal."
http://www.smartmoney.com/news/ON/in...27-000446-1249





The Guessing Game Has Begun on the Next iPhone
John Markoff

Can Steven P. Jobs top the iPhone ... with another iPhone?

Last June, Mr. Jobs began selling what has become one of the most talked-about consumer products in history. Now he faces a new challenge as Apple prepares to introduce an updated version of the phone next month.

After almost a year of strong sales that have made it one of the dominant smartphones in the United States, the iPhone has settled down to a less-than-spectacular pace: roughly 600,000 units a month, according to the company.

Apple, based in Cupertino, Calif., had shipped about 5.5 million phones by the end of March, the most recent figures it has released. It sold just 1.7 million phones in the first three months of this year, meaning it must sell more than 8 million phones to reach Mr. Jobs’s publicly stated goal of selling 10 million iPhones in 2008.

“They’re going to have a difficult time” hitting that number, said Edward Snyder, an analyst at Charter Equity Research. He said that Nokia, the world’s largest maker of cellphones, sells more phones every week than Apple has sold since the iPhone’s introduction.

So what could Apple’s impresario have up his sleeve to pick up the pace — and to keep the second-generation iPhone from being a letdown?

Although the company will not publicly confirm the arrival of a second iPhone, Apple watchers have concluded that a new version will be introduced June 9, the opening day of Apple’s Worldwide Developers Conference.

Apparently in preparation for the event, stocks of the existing iPhone have been dwindling in the last month.

Although AT&T stores still have phones in stock, according to a company spokesman, the supply has largely dried up in Apple’s retail outlets, and the phones are no longer available through the company’s online store.

Apple may be trying to avoid the anger it faced last September when it cut the iPhone’s price by $200 just two months after it went on sale, making early buyers feel cheated. Mr. Jobs offered those customers a $100 store credit.

Cutting down on supply means fewer angry buyers when their new phone is suddenly obsolete.

“You can say what you want about Steve Jobs, but he’s learning from his mistakes,” said Roger Entner, a senior vice president at IAG Nielsen, a market research firm. “They are cleaning out the supply channel.”

Even as supplies shrink, Apple has been signing a series of deals with cellphone network providers around the world. On Tuesday the cellular operator TeliaSonera said it would offer the iPhone in seven countries, including Sweden, Norway and Denmark.

The only major countries without an iPhone distribution agreement are Japan, Russia and China.

Meanwhile the Apple rumor mill has wound up to a fever pitch in recent weeks with speculation about the new phone’s features.

One Web site that tracks imports even decided that shipping manifests indicated that the company had already brought millions of iPhones into the country in dozens of seaborne shipping containers. Industry executives, however, said this would be an odd move for Apple, which in the past has introduced products by air — shipping the first batch at the last moment.

Both Mr. Jobs and Randall L. Stephenson, the chief executive of Apple’s partner AT&T, have promised a new iPhone model this year that would run on a high-speed wireless data network. AT&T is building such a network, which uses technology known as 3G and is intended to support a range of new applications, including mobile digital video. The company said last week that the network would be largely finished by the end of June.

But analysts say faster downloads may not be enough to touch off a new wave of consumer interest in the iPhone.

“Subscribers don’t care what the radio interface of their cellular phone is,” Mr. Snyder said.

If he is to rekindle the excitement that greeted the iPhone’s introduction, Mr. Jobs is likely to need something else. So far, he has been successful in hiding any surprise features from the dozens of Web sites and bloggers that track the company’s new products.

There has been speculation about a higher-resolution camera, possible support for digital video recording, a slightly bulkier and more curved case, and the addition of a global positioning system receiver that would allow new Web services tied to a person’s location.

Mr. Jobs is certain to make much of the availability of many new iPhone programs that Apple will begin selling through its iTunes store in the coming months. He could also accelerate sales by cutting the phone’s price or letting operators offer subsidies, as they do with many other phones. In the United States the phone now costs $399 or $499 depending on the amount of memory.

Bells and whistles aside, the new phone may have a few new shortcomings as well. Company executives have acknowledged that the new 3G networks will be a challenge for its engineers, because using them burns up more battery power compared with the slower Edge networks used by current iPhones.

IPhone users have turned out to be prodigious consumers of wireless data. For example, the iPhone customers of T-Mobile, the German cellular operator, consume 30 times more data than its other wireless customers, according to Chetan Sharma, an independent wireless industry analyst.

Mr. Sharma estimates that iPhone users in the United States consume two and a half to three times more data than users of other cellphones. Faster networks could widen that gap and further extend the iPhone’s influence in the telecommunications world.

“IPhone is not only having an impact on data revenues,” he said, “but also on device design, mobile advertising road maps, and applications and services that are being contemplated for the future.”
http://www.nytimes.com/2008/05/28/te...8apple.html?hp





China Takes Playoff Games off Air

NBA playoff games have been taken off air by China's state television network because they are considered too entertaining for a nation still recovering from the Sichuan earthquake.

All entertainment in China was stopped last week for three days of national mourning for the victims of the 7.9 magnitude quake that struck the western province on May 12.

State TV sports channel CCTV 5, like most other stations, returned to normal programming last Thursday and showed the Western Conference finals game between the Los Angeles Lakers and San Antonio Spurs on May 22.

But subsequent encounters in that series and the Eastern Conference playoff finals between Detroit and Boston were not shown.

"These games are not in accordance with the atmosphere of the nation after the devastation of the earthquake. They are too entertaining" Jiang Heping, director of the state TV sports channel, told Reuters.

"We did show one game but then we were informed not to continue," Jiang added.

Basketball is one of the most popular spectator sports in China and NBA games have been shown on CCTV for more than 20 years.

When Chinese exports Yao Ming and Yi Jianlian faced off for the first time in the NBA last November, the television audience for the game between Houston and Milwaukee was estimated to be between 100 million and 200 million.

Jiang said he hoped games would be back on air by the time the NBA championship series starts next month.

The Sichuan earthquake is already known to have killed more than 67,000 people and injured nearly 362,000 others.

(Reporting by Nick Mulvenney; Editing by Ken Wills and Ed Osmond)
http://www.reuters.com/article/sport...14592420080528





Why Walter Bender Left One Laptop Per Child
Steve Lohr

When Microsoft joined the One Laptop Per Child project earlier this month, I wrote an article noting the change in heart by both sides. The O.L.P.C. project, intended to bring cheap computers to children in poorer nations, had been committed to using the freely distributed Linux operating system, an open-source alternative to Microsoft’s Windows. And Microsoft had resisted joining anything that promoted open-source software.

Walter Bender, a longtime collaborator of Nicholas Negroponte, the founder of the nonprofit laptop group, left O.L.P.C. in April. Mr. Bender oversaw software development for the project. His departure had been the subject of blog posts that suggested his exit was because a pact with Microsoft was in the works.

When I wrote the news article, I sent Mr. Bender an e-mail, asking him why he left. He replied that he decided his efforts to advance the cause of open-source learning software “would have more impact from outside of O.L.P.C. than from within.”

I also asked Mr. Negroponte about Mr. Bender’s departure, and he called it “a huge loss.” Mr. Negroponte said that, in his view, some people had come to see open-source software as an end of the project instead of a means. “I think some people, including Walter, became much too fundamental about open source,” he said.

After the article was published May 16, Mr. Bender sent a letter to the Times, taking issue with Mr. Negroponte’s comment and elaborating on his own views: “Mr. Negroponte is wrong when he asserts that I am a free and open-source (FOSS) fundamentalist. I am a learning fundamentalist.”

I talked to Mr. Bender last Friday to discuss his views at more length and give them a broader airing.

“Microsoft stepping in is the symptom, not the disease,” he said in the interview. The issue, in his view, is whether the tools that bring computing to children are “agnostic on learning” or “take a position on learning.”

“O.L.P.C. has become implicitly agnostic about learning,” he said. The project’s focus, he said, is on bringing low-cost laptop computers to children around the world. “It’s a great goal, but it’s not my goal,” he said.

Mr. Bender is a founder of Sugar Labs, a new organization whose goal is to continue developing and promoting the use of Sugar open-source education software.

The Sugar software, which provides the user interface for O.L.P.C. laptops, is the means toward the end of a “constructionist learning model,” said Mr. Bender. It’s an approach that builds on the conceptual work of Jean Piaget, the Swiss philosopher and developmental theorist, and the practical research of his intellectual descendants like Seymour Papert, the M.I.T. computer scientist, educator and inventor of the Logo programming language, designed for education.

The constructionist model, put simply, says people learn best by building things — solving problems by “constructing” answers as active agents — instead of by being passive recipients of facts and received knowledge.

Computing is potentially an ideal tool for constructionist education because a computer is a universal machine and software is a building material without material constraints. (In fairness, Mr. Negroponte, founder of the M.I.T. Media Lab, has also been a champion of the constructionist education agenda over the years.)

Mr. Bender said he thinks the collaborative, interactive learning environment embodied by Sugar could be “a game changer in how technology and education collide.” He says he wants to see the Sugar software run on many different kinds of hardware and software platforms, even on Windows, if the Sugar experience is not sacrificed.

“It’s not about Microsoft being evil,” Mr. Bender said. “It’s about optimizing the chance of having a positive impact on education, and that is what Sugar is about. And that mission would be endangered by being too tightly coupled to one hardware vendor, O.L.P.C.”

O.L.P.C. says that Sugar will continue to be offered on its machines, and the project has announced it plans to work with outside developers to port the software to Windows. “I’m not sure what that means,” Mr. Bender said. “I can’t do it, and I’m not going to work on it.”

However, Mr. Bender said that in the last two weeks, he has talked to four laptop manufacturers he won’t name, including major PC makers, about making Sugar-based machines — with no Windows in the recipe.
http://bits.blogs.nytimes.com/2008/0...-am/index.html





Web Start-Up a Joint Israeli-Palestinian Venture
Dina Kraft

Nibbling doughnuts and wrestling with computer code, the workers at G.ho.st, an Internet start-up here, are holding their weekly staff meeting — with colleagues on the other side of the Israeli-Palestinian divide.

They trade ideas through a video hookup that connects the West Bank office with one in Israel in the first joint technology venture of its kind between Israelis and Palestinians.

“Start with the optimistic parts, Mustafa,” Gilad Parann-Nissany, an Israeli who is vice president for research and development, jokes with a Palestinian colleague who is giving a progress report. Both conference rooms break into laughter.

The goal of G.ho.st is not as lofty as peace, although its founders and employees do hope to encourage it. Instead G.ho.st wants to give users a free, Web-based virtual computer that lets them access their desktop and files from any computer with an Internet connection. G.ho.st, pronounced “ghost,” is short for Global Hosted Operating System.

“Ghosts go through walls,” said Zvi Schreiber, the company’s British-born Israeli chief executive, by way of explanation. A test version of the service is available now, and an official introduction is scheduled for Halloween.

The Palestinian office in Ramallah, with about 35 software developers, is responsible for most of the research and programming. A smaller Israeli team works about 13 miles away in the central Israeli town of Modiin.

The stretch of road separating the offices is broken up by checkpoints, watch towers and a barrier made of chain-link fence and, in some areas, soaring concrete walls, built by Israel with the stated goal of preventing the entry of Palestinian suicide bombers.

Palestinian employees need permits from the Israeli army to enter Israel and attend meetings in Modiin, and Israelis are forbidden by their own government from entering Palestinian cities.

When permits cannot be arranged but meetings in person are necessary, colleagues gather at a rundown coffee shop on a desert road frequented by camels and Bedouin shepherds near Jericho, an area legally open to both sides.

Dr. Schreiber, an entrepreneur who has already built and sold two other start-ups, said he wanted to create G.ho.st after seeing the power of software running on the Web. He said he thought it was time to merge his technological and commercial ambitions with his social ones and create a business with Palestinians.

“I felt the ultimate goal was to offer every human being a computing environment which is free, and which is not tied to any physical hardware but exists on the Web,” he said. The idea, he said, was to create a home for all of a user’s online files and storage in the form of a virtual PC.

Instead of creating its own Web-based software, the company taps into existing services like Google Docs, Zoho and Flickr and integrates them into a single online computing system.

G.ho.st also has a philanthropic component: a foundation that aims to establish community computer centers in Ramallah and in mixed Jewish-Arab towns in Israel. The foundation is headed by Noa Rothman, the granddaughter of Yitzhak Rabin, the Israeli prime minister slain in 1995.

“It’s the first time I met Palestinians of my generation face to face,” said Ms. Rothman, 31, of her work with G.ho.st. She said she was moved by how easily everyone got along. “It shows how on the people-to-people level you can really get things done.”

Investors have put $2.5 million into the company so far, a modest amount. Employing Palestinians means the money goes farther; salaries for Palestinian programmers are about a third of what they are in Israel.

But Dr. Schreiber, who initially teamed up with Tareq Maayah, a Palestinian businessman, to start the Ramallah office, insists this is not just another example of outsourcing.

“We are one team, employed by the same company, and everyone has shares in the company,” he said.

At G.ho.st’s offices in Ramallah, in a stone-faced building with black reflective glass perched on a hill in the city’s business district, employees say they feel part of an intensive group effort to create something groundbreaking. Among them are top young Palestinian programmers and engineers, recruited in some cases directly from universities.

The chance to gain experience in creating a product for the international market — a first for the small Palestinian technology community — means politics take a backseat to business, said Yusef Ghandour, a project manager.

“It’s good we are learning from the Israeli side now,” Mr. Ghandour said. The Israelis, he said, “are open to the external world, and there is lots of venture capital investment in Israel, and now we are bringing that to Palestine.”

The departure of educated young people mostly to neighboring Jordan and the Persian Gulf states is a major problem for the Palestinian economy and has been especially damaging to its technology industry. Since the Oslo peace process broke down in 2000, a wave of Israeli-Palestinian business ties have crumbled as well.

Political tensions make it somewhat unpopular for Palestinians to do business with Israelis, said Ala Alaeddin, chairman of the Palestinian Information Technology Association. He said the concept of a technology joint venture across the divide was unheard-of until G.ho.st opened its doors. A handful of Palestinian tech companies handle outsourced work for Israeli companies, but most focus on the local or Middle Eastern market.

“It’s much easier to have outsourcing than a partnership,” Mr. Alaeddin said. “A joint venture is a long-term commitment, and you need both sides to be really confident that this kind of agreement will work.”

Benchmark Capital, a Silicon Valley venture capital firm with offices in Israel, invested $2 million in G.ho.st. Michael Eisenberg, a general partner at the firm, said Benchmark was “in the business of risky investments,” but that G.ho.st presented entirely new territory.

Recalling his discussions with Dr. Schreiber, Mr. Eisenberg said: “Frankly, when he first told me about it I thought it was ambitious, maybe overly ambitious. But Zvi is a remarkable entrepreneur, and I started to feel he could actually pull this off.”

The video hookup runs continuously between the offices. Chatting in the Ramallah conference room, two Palestinian programmers wave hello to Israeli colleagues conferring over a laptop in the Modiin office.

“We are doing something across cultures and across two sides of a tough conflict,” Dr. Schreiber said. “I was prepared for the possibility that it might be difficult, but it hasn’t been.”
http://www.nytimes.com/2008/05/29/te...29compute.html





Ultra-Tight Ticket Security Gets Ready for Beijing Olympic Ceremonies
AP

China has ratcheted up surveillance and security in every phase of the Beijing Olympics - even the tickets.

In a move unprecedented for the Olympics, tickets for the opening and closing ceremonies are embedded with a microchip containing the bearer's photograph, passport details, addresses, e-mail and telephone numbers.

The intent is to keep potential troublemakers from the 91,000-seat National Stadium as billions watch on TV screens around the world. Along with terrorists, Chinese officials fear protesters might wreck the glitzy ceremonies, unfurling Tibet flags, anti-China banners or even T-shirts adorned with strident messages.

Aside from concerns about privacy and identity theft, the high-tech tickets also threaten chaos at the turnstiles.

Tickets for the Aug. 8 opening ceremony are the most expensive of the Games - with a top price of US$720 - and many are in the hands of dignitaries and friends. Delays could create terrible publicity on opening night.

"They should be concentrating on sniffing out the kinds of dangerous stuff rather than worrying about the identify of the people with the tickets," said Roger Clarke, an Australian security expert. His Xamax Consultancy in Canberra advises businesses in online security and identity authentication.

"The way in which you recognize an evildoer, somebody who wants to throw a bomb, somebody who wants to unfurl a Tibet flag is not on the basis of their identity," Clarke added. "It's the act that they perform and it's the materials they carry with them."

China has toughened visa restrictions and increased checks at hotels and entertainment areas - all designed to keep track of foreigners as the Games approach. Several large public gatherings have been cancelled. Thousands of closed-circuit TV cameras will be deployed in and around the venues. Organizers have acknowledged that some security officials will be dressed in volunteer uniforms. Passengers riding the subway and major bus routes will also undergo strict checks.

China has developed some of the world's most advanced RFID (radio frequency identification) technology, some aimed at keeping tight control over its citizens and borders. It's used on Chinese driver's licences and ID cards.

Chinese authorities initially considered tying all 6.8 million tickets to individuals, which was attempted two years ago for soccer's World Cup in Germany. German officials eventually backed off the plan - it made tickets difficult to transfer or resell - and scanned only 500-1,000 tickets at each game rather than all tickets.

The plan was aimed at deterring scalpers and soccer hooligans. But initially it caused long lines and criticism from fans and soccer's world governing body, which said it was too strict and elaborate.

Microchips are embedded in all Beijing Olympic tickets, but only opening and closing tickets contain the photos and passport data. This makes them - in theory - nontransferable. The other tickets are transferable, and the RFID technology is being touted as a deterrent and an anti-counterfeit device. That's useful in China, which produces fake products from DVDs to heart medicine.

Ticketmaster China, the official ticketing provider for the Games, predicts every event in every venue will be sold out - an Olympic first.

"We noticed the problem in Germany in 2006, and we learned a lesson from them," said Yang Yichun, director of the technology department for the Beijing organizing committee. "We have made contingency plans to deal with any potential problems."

One fan of the system is Minister of Science and Technology Wan Gang, who attended a World Cup game in Dortmund two years ago and is confident Beijing's technology is better.

"We're fully prepared and we are confident we can overcome all the difficulties," Wan said.

Clarke, the Australian security expert, said inaccurate data, ticket holders mixing up tickets and the possibility for identity theft were likely.

"If somebody is handing out six tickets to six people, they somehow have to shuffle these tickets successfully to get the right ticket in the right hands," Clarke said. "If they fail and then people are separated in the queue, we'll get enormous delays at the gates."

The International Olympic Committee has said it is comfortable with Beijing's ticketing security. IOC spokeswoman Emmanuelle Moreau said the RFID technology was "tested thoroughly by BOCOG this summer and satisfied both BOCOG and the IOC that the technology is sound."

Xu Chaoying, one of China's leading experts in RFID, is the general manager of Beijing Dalang Telecom Co. Ltd., which lost in a bid for the Olympic RFID contract. Xu called RFID "mature technology" and discounted the comparison to Germany.

"For the 2006 World Cup, I think the main problem was about privacy," Xu said. "People doubted whether the data in the tickets would be completely deleted. But as for the technology, there shouldn't be any problem."

Xu said it was possible the wireless technology could be disrupted, but he said any problems would be easy to fix.

Clarke disputed this. He said if Chinese officials choose to use a rudimentary RFID system, it would expose the data to easy theft. A more secure system using encrypted data would add complexity and more possibilities for chaos at the gate.

He said the high-tech ticket might also distract from procedures like frisks and bag checks, both more likely to uncover contraband entering the stadium.

"There's always a risk when you start putting efforts into an inappropriate mechanism that you deflect resources away from the important ones," Clarke said. "You reduce your effectiveness in finding flags and bombs and weapons because you've got too many people spending too much time worrying about other things."
http://canadianpress.google.com/arti...c9SKKHck3Hz_iA





Blackberry Spurns Indian Spy Call

The Canadian manufacturer of Blackberry mobile phones has rejected demands by the Indian government that it help decrypt suspicious text messages.

Research in Motion says its technology does not allow any third party - even the company itself - to read information sent over its network.

The Indian authorities have been reluctant to allow the widespread use of Blackberries in the country.

They fear militants and criminals may take advantage of the secure system.

A number of other countries around the world have expressed similar fears.

Master key

"The Blackberry security architecture for enterprise customers is purposefully designed to exclude the capability for Research in Motion (RIM) or any third party to read encrypted information under any circumstances," the company was quoted by Times of India newspaper as saying.

The Indian government's department of telecommunication and the security agencies have asked the Canadian firm to provide the master key so that they can access the contents transferred between the handheld devices.

In India, Blackberry services are provided by Bharti Airtel, Reliance Communications, Vodafone and BPL Mobile.

The country has only about 115,000 Blackberry customers at the moment, but it is a rapidly growing market.
http://news.bbc.co.uk/go/pr/fr/-/2/h...ia/7420911.stm





Republicans Shift, a Little, on Surveillance Bill Standoff
AP

A months-long logjam over a new government surveillance bill may be coming to an end, with Republicans offering a compromise that would let people who think they were illegally spied on by the government have their day in court - albeit a secret one.

House and Senate Republicans on Thursday unveiled their latest proposal aimed at resolving the roughly 40 civil lawsuits filed against telecommunications companies that allegedly cooperated in the so-called warrantless wiretapping program.

The Republican proposal makes other concessions. It would:

-Allow an inspector general investigation of the warrantless wiretapping program.

-Allow a secret court to review in advance a government's plan for the surveillance of non-U.S. citizens abroad to make sure the privacy of Americans they may come in contact with is protected.

-Confirm that the new law would be the exclusive authority to conduct electronic surveillance - essentially outlawing a revival of the warrantless wiretapping in the future.

House and Senate staff from both parties said the proposal represents a real shift toward the House Democratic surveillance bill.

House Majority Leader Steny Hoyer of Maryland said he received the GOP proposal Wednesday and is reviewing it.

The most important shift comes in the matter of the telecom lawsuits.

The companies allegedly allowed the government to eavesdrop in the United States on phone and computer lines for nearly six years after the Sept. 11, 2001, terrorist attacks without the permission of the secret Foreign Intelligence Surveillance Court created 30 years ago precisely for that purpose. Those lawsuits are pending before a single federal court.

The White House favors the Senate version of an electronic surveillance bill that grants full immunity to the telecommunications companies. The House-approved version would let the cases go to court, leaving it up to judges to determine whether the companies acted illegally.

The new Republican proposal- which Sen. Kit Bond of Missouri said is backed by the White House and intelligence agencies- would allow the FISA court to decide. It would require the attorney general to certify that the companies acted lawfully and at the request of the president.

The court would be allowed to read the requests to telecom companies for the wiretaps to be placed, and the plaintiffs could file their complaints with the court. The court could dismiss the lawsuits if it finds that supported by "a preponderance of the evidence."

"We have to draw a line in the sand and say we've compromised enough," said Rep. Lamar Smith of Texas, the top Republican on the House Judiciary Committee.

Smith said at a Republican news conference that he and other lawmakers were coming forward to pressure Democrats to accept their proposal.

"There's not a whole lot farther you can go without seriously damaging" national security, said Michigan Rep. Peter Hoekstra, the top Republican on the House Intelligence Committee.

Hoyer called Republican "rhetoric" at the news conference "unhelpful."

The American Civil Liberties Union says the Republican compromise language on telecom immunity is not an improvement over the original Senate bill. The FISA court is still not empowered to determine whether the warrantless wiretapping program was legal- just whether the attorney general sent a letter to the companies requesting assistance.

The compromise "just says that the existence of an order - whether legal or not - is enough to dismiss the cases," said Michelle Richardson, a legislative consultant with the ACLU.

The new surveillance law is intended to help the government pursue suspected terrorists by making it easier to eavesdrop on international phone calls and e-mails between foreigners abroad and Americans in the U.S and remove barriers to collecting purely foreign communications that pass through the United States- for instance, foreign e-mails stored on a server.
http://www.siliconvalley.com/news/ci...nclick_check=1





Move to Protect Canadians' Privacy on Net Irritates Police, Attracts Others

Sweeping changes to Canada's home on the World Wide Web will put the country on the vanguard of Internet privacy.

But while law enforcement isn't happy about potentially losing an important investigative tool, the half-million Canadians whose personal information is currently publicly available on the Internet shouldn't rest easy that they are safe from wired snoops.
It's long been standard for website registrars to publicly provide detailed contact information for individuals who own domain names under dot-ca and dot-com through an easy Internet search called a Whois (pronounced who-is).

The Canada Internet Registration Authority says it will buck the trend by June 10, instituting new privacy policies that will protect private information from roaming eyes.

The existing Whois system provides the domain owner's name, home address, phone number and e-mail.

It's a treasure trove for spammers, said Michael Geist, a law professor at the University of Ottawa and Canada Research Chair of Internet and E-commerce Law.

"We're talking about one of the largest freely available online directories of personal information in the country," he said.

Domain names, heralded as the real estate of the 21st century, are becoming commonplace for a generation of computer-savvy Canadians eager to own their own spot on the World Wide Web.

The number of Canadian domain names hit the one million mark in April, and has been increasing by about 650 each day since then.

About 70 per cent of those are owned by upwards of 600,000 Canadians, says the registration authority.

"This will put us at the forefront of individual privacy protection in the world," said ByronHolland, president of the authority.

Canada's 2004 Personal Information Protection and Electronic Documents Act didn't exist when the first dot-ca domain name, upei.ca, was registered by the University of Prince Edward Island in 1988.

The law regulates how private-sector organizations collect, use and disclose personal information in the course of commercial business.

Holland said the changes to the Whois will bring the registration authority in line with the legislation.

"It's (currently) consistent with the letter of the law, because it's made clear that information is released, but I don't believe it's consistent with the spirit of the law."

Geist said the changes have raised the ire of law enforcement and intellectual property lawyers, who have used the Whois search to track down sexual predators and copyright violators.

"They've sought to maintain the status quo though it arguably violates privacy legislation."

But he said bringing the Internet authority's policies in line with the law on June 10 will let potential whistleblowers - or those worried their political blog postings will lead to a home visit from a dissatisfied Internet user - breathe a little easier, Geist said.

Knowing that such personal information is currently available with a few clicks of a mouse has created a quandary for privacy seekers, he said.

"Those who criticize a company or their own employer (on their own website) often do it at great personal risk," he said.

"They're between a rock and a hard place: If they post accurate information they get to keep the domain but may suffer consequences at work, but if they post fake information they may be safe at work but they run the risk of losing the domain."

Canadians who already own domain names won't enjoy the same luxury of privacy right away. Given that their Whois data are already available on third-party websites, there's little the registration authority can do to reign in that information.

Holland says it's not a cause for concern, as any edits made to existing information after June 10 won't be publicly available.

There's also little risk of the dot-ca becoming a place for the rest of the world to stash its electronic dirty laundry, Geist said.

Only Canadian residents or companies can register the unique domain names, and personal information will still be collected and available to the registration authority.

Domain names also have the potential to be extremely valuable as online advertising revenue rises into the billions. Ownership of the lucrative domain name sex.com, for example, went for a record $12 million in 2006.

While the Internet authority's change is unlikely to make anyone rich, the president of authority said Canadians' predilection for privacy means they may begin to snap up dot-ca domains instead of the generic dot-com.

"Given that we will be the world leader in the space, absolutely, it'll make Canadians more likely to choose a dot-ca (versus other domains)."

The change won't affect businesses and organizations, which will still have their information publicly available.

Dot-ca is a country code, and Canada owns all names that end with .ca. It costs about $10 per year to register a domain.
http://canadianpress.google.com/arti...yCBNXclu1m8W-w





Russian Court Suspends Ingushetia Website

A court in Moscow suspended the main opposition website in the troubled south Russian region of Ingushetia on Monday while prosecutors investigate regional government's accusations it spreads extremist material.

The government of Ingushetia brought the case against the ingushetiya.ru website owned by local businessmen Magomed Yevloev. Ingushetia has tried to control media outlets as it struggles to contain growing violence in the region.

"Today the Kuntsevsky district court in Moscow upheld a motion by the Republic of Ingushetia ... to order Magomed Yevloev to close his Internet activities," the court's statement said of the investigation.

Yevloev's lawyer, Kaloi Akhigov, said the accusations were political.

"The website shows Ingushetia as it really is and they don't like it," Akhilgov said.

"We are going to challenge this court order."

Akhilgov said the ingushetiya.ru website is hosted in the United States, meaning that the court has to order all Internet providers in Russia to switch off the website -- a logistical challenge by the June 5 deadline, he said.

Ingushetia borders Chechnya, a scene of two separatist wars since 1994. While Chechnya has calmed, violence has increased in the neighbouring regions of Ingushetia and Dagestan.

Ingushetia's government wants to present a picture of normality in the region and control the information flow. Eyewitness said police beat journalists at anti-government meetings and confiscated cameras earlier this year.
http://www.reuters.com/article/inter...62585820080526





In-Flight Surveillance Could Foil Terrorists in the Sky
Michael Reilly

CCTV cameras are bringing more and more public places under surveillance – and passenger aircraft could be next.

A prototype European system uses multiple cameras and "Big Brother" software to try and automatically detect terrorists or other dangers caused by passengers.

The European Union's Security of Aircraft in the Future European Environment (SAFEE) project uses a camera in every passenger's seat, with six wide-angle cameras to survey the aisles. Software then analyses the footage to detect developing terrorist activity or "air-rage" incidents, by tracking passengers' facial expressions.

The system performed well in tests this January that simulated terrorist and unruly passenger behaviour scenarios in a fake Airbus A380 fuselage, say the researchers that built it.

Systems to analyse CCTV footage – for example, to detect violence (with video) or alert CCTV operators to unusual events – have been designed before. But the SAFEE software must cope with the particularly challenging environment of a full aircraft cabin.

Threat indicators

As crew and passengers move around they often obscure one another, causing a risk the computer will lose track of some of the hundreds of people it must monitor. To get around this, the software constantly matches views of people from different cameras to track their movements.

"It looks for running in the cabin, standing near the cockpit for long periods of time, and other predetermined indicators that suggest a developing threat," says James Ferryman of the University of Reading, UK, one of the system's developers.

Other behaviours could include a person nervously touching their face, or sweating excessively. One such behaviour won't trigger the system to alert the crew, only certain combinations of them.

Ferryman is not ready to reveal specifically which behaviours were most likely to trigger the system. Much of the computer's ability to detect threats relies on sensitive information gleaned from security analysts in the intelligence community, he tells New Scientist.

Losing track

But Mohan Trivedi of the University of California, San Diego, US, is sceptical. He has built systems that he says can track and recognise individual people as they appear and disappear on different floors of his laboratory building.

It correctly identifies people about 70% of the time, and then only under "optimal conditions" that do not exist inside an airplane cabin, he says.

"[Ferryman's] research shows that a system detects threats in a very limited way. But it's a very different thing using it day in and day out." Trivedi says. "Lighting and reflections change in the cabin every time someone turns on a light or closes a window shade. They haven't shown that they have overcome these challenges."

Ferryman admits that his system will require thousands of tests on everyday passengers before it can be declared reliable at detecting threats.

The team's work is being presented this week at the International Conference on Computer Vision Systems in Greece.
http://technology.newscientist.com/c...n-the-sky.html





Billboards That Look Back
Stephanie Clifford

In advertising these days, the brass ring goes to those who can measure everything — how many people see a particular advertisement, when they see it, who they are. All of that is easy on the Internet, and getting easier in television and print.

Billboards are a different story. For the most part, they are still a relic of old-world media, and the best guesses about viewership numbers come from foot traffic counts or highway reports, neither of which guarantees that the people passing by were really looking at the billboard, or that they were the ones sought out.

Now, some entrepreneurs have introduced technology to solve that problem. They are equipping billboards with tiny cameras that gather details about passers-by — their gender, approximate age and how long they looked at the billboard. These details are transmitted to a central database.

Behind the technology are small start-ups that say they are not storing actual images of the passers-by, so privacy should not be a concern. The cameras, they say, use software to determine that a person is standing in front of a billboard, then analyze facial features (like cheekbone height and the distance between the nose and the chin) to judge the person’s gender and age. So far the companies are not using race as a parameter, but they say that they can and will soon.

The goal, these companies say, is to tailor a digital display to the person standing in front of it — to show one advertisement to a middle-aged white woman, for example, and a different one to a teenage Asian boy.

“Everything we do is completely anonymous,” said Paolo Prandoni, the founder and chief scientific officer of Quividi, a two-year-old company based in Paris that is gearing up billboards in the United States and abroad. Quividi and its competitors use small digital billboards, which tend to play short videos as advertisements, to reach certain audiences.

Over Memorial Day weekend, a Quividi camera was installed on a billboard on Eighth Avenue near Columbus Circle in Manhattan that was playing a trailer for “The Andromeda Strain,” a mini-series on the cable channel A&E.

“I didn’t see that at all, to be honest,” said Sam Cocks, a 26-year-old lawyer, when the camera was pointed out to him by a reporter. “That’s disturbing. I would say it’s arguably an invasion of one’s privacy.”

Organized privacy groups agree, though so far the practice of monitoring billboards is too new and minimal to have drawn much opposition. But the placement of surreptitious cameras in public places has been a flashpoint in London, where cameras are used to look for terrorists, as well as in Lower Manhattan, where there is a similar initiative.

Although surveillance cameras have become commonplace in banks, stores and office buildings, their presence takes on a different meaning when they are meant to sell products rather than fight crime. So while the billboard technology may solve a problem for advertisers, it may also stumble over issues of public acceptance.

“I guess one would expect that if you go into a closed store, it’s very likely you’d be under surveillance, but out here on the street?” Mr. Cocks asked. At the least, he said, there should be a sign alerting people to the camera and its purpose.

Quividi’s technology has been used in Ikea stores in Europe and McDonald’s restaurants in Singapore, but it has just come to the United States. Another Quividi billboard is in a Philadelphia commuter station with an advertisement for the Philadelphia Soul, an indoor football team. Both Quividi-equipped boards were installed by Motomedia, a London-based company that converts retail and street space into advertisements.

“I think a big part of why it’s accepted is that people don’t know about it,” said Lee Tien, senior staff attorney for the Electronic Frontier Foundation, a civil liberties group.

“You could make them conspicuous,” he said of video cameras. “But nobody really wants to do that because the more people know about it, the more it may freak them out or they may attempt to avoid it.”

And the issue gets thornier: the companies that make these systems, like Quividi and TruMedia Technologies, say that with a slight technological addition, they could easily store pictures of people who look at their cameras.

The companies say they do not plan to do this, but Mr. Tien said he thought their intentions were beside the point. The companies are not currently storing video images, but they could if compelled by something like a court order, he said.

For now, “there’s nothing you could go back to and look at,” said George E. Murphy, the chief executive of TruMedia who was previously a marketing executive at DaimlerChrysler. “All it needs to do is look at the audience, process what it sees and convert that to digital fields that we upload to our servers.”

TruMedia’s technology is an offshoot of surveillance work for the Israeli government. The company, whose slogan is “Every Face Counts,” is testing the cameras in about 30 locations nationwide. One TruMedia client is Adspace Networks, which runs a network of digital screens in shopping malls and is testing the system at malls in Chesterfield, Mo., Winston-Salem, N.C., and Monroeville, Pa. Adspace’s screens show a mix of content, like the top retail deals at the mall that day, and advertisements for DVDs, movies or consumer products.

Within advertising circles, these camera systems are seen as a welcome answer to the longstanding problem of how to measure the effectiveness of billboards, and how to figure out what audience is seeing them. On television, Nielsen ratings help marketers determine where and when commercials should run, for example. As for signs on highways, marketers tend to use traffic figures from the Transportation Department; for pedestrian billboards, they might hire someone to stand nearby and count people as they walk by.

The Internet, though, where publishers and media agencies can track people’s clicks for advertising purposes, has raised the bar on measurement. Now, it is prodding billboards into the 21st century.

“Digital has really changed the landscape in the sort of accuracy we can get in terms of who’s looking at our creative,” Guy Slattery, senior vice president for marketing for A&E, said of Internet advertising. With Quividi, Mr. Slattery said, he hoped to get similar information from what advertisers refer to as the out-of-home market.

“We’re always interested in getting accurate data on the audience we’re reaching,” he said, “and for out-of-home, this promises to give a level of accuracy we’re not used to seeing in this medium.”

Industry groups are scrambling to provide their own improved ways of measuring out-of-home advertising. An outdoor advertising association, the Traffic Audit Bureau, and a digital billboard and sign association, the Out-of-Home Video Advertising Association, are both devising more specific measurement standards that they plan to release by the fall.

Even without cameras, digital billboards encounter criticism. In cities like Indianapolis and Pittsburgh, outdoor advertising companies face opposition from groups that call their signs unsightly, distracting to drivers and a waste of energy.

There is a dispute over whether digital billboards play a role in highway accidents, and a national study on the subject is expected to be completed this fall by a unit of the Transportation Research Board. The board is part of a private nonprofit institution, the National Research Council.

Meanwhile, privacy concerns about cameras are growing. In Britain, which has an estimated 4.2 million closed-circuit television cameras — one for every 14 people — the matter has become a hot political issue, with some legislators proposing tight restrictions on the use and distribution of the footage.

Reactions to the A&E billboard in Manhattan were mixed. “I don’t want to be in the marketing,” said Antwann Thomas, 17, a high school junior, after being told about the camera. “I guess it’s kind of creepy. I wouldn’t feel safe looking at it.”

But other passers-by shrugged. “Someone down the street can watch you looking at it — why not a camera?” asked Nathan Lichon, 25, a Navy officer.

Walter Peters, 39, a truck driver for a dairy, said: “You could be recorded on the street, you could be recorded in a drugstore, whatever. It doesn’t matter to me. There’s cameras everywhere.”
http://www.nytimes.com/2008/05/31/bu...billboard.html





Weak Economy Bolsters Sales of Picture-Tube TVs
Eric A. Taub

The slowing American economy has had an unexpected effect on the television business: a resurgence in the popularity of the standard picture-tube TV.

According to new sales figures from the DisplaySearch research firm, tube TVs edged out plasma models to become the second-most-popular technology during the first quarter of this year. In the fourth quarter of 2007, it was plasma that enjoyed the number-two spot, after L.C.D.

The reasons are simple, according to Paul Gagnon, the company’s director of North American TV research. It all has to do with price sensitivity and the sense among consumers that they should purchase a cheap digital-capable set before the nation switches to all-digital broadcasting next year.

Enjoying the boom in picture-tube TV sales are the low-cost mass marketers like Wal-Mart. Tube sets have all but disappeared from big-box consumer electronics retailers, like Best Buy, Circuit City and even Costco. In terms of revenue, the venerable RCA brand, owned by China’s TCL, has captured a 46 percent market share, putting it in first place.

And while picture-tube TVs may be hard to find here, that’s not the case in the rest of the world. Tube TVs still outsell L.C.D. sets worldwide, although the two technologies are now neck and neck. In the first quarter of this year, 22.1 million tube TVs were sold worldwide, compared with 21.1 million L.C.D. sets.

For those who still want to buy a flat-panel TV, the economy has also caused consumers to rethink their need for the biggest and best.

Television sales normally fall after the holiday buying boom, and this year was no exception. But unit sales of sets 40 inches and larger dropped by a larger-than-expected 36 percent in the first quarter of 2008 compared with the last quarter of 2007. Meanwhile, sales of sets smaller than 40 inches in size decreased only 33 percent. “With the Super Bowl in January, typically sales of larger sets do well in the first quarter,” Mr. Gagnon said. “Sales of TVs in the 30- to 37-inch size were stronger than expected.” Smaller sets mean lower revenue for the manufacturers.

On the plasma front, Panasonic remained the sales leader, even though plasma now accounts for just 6 percent of worldwide TV sales. And in the United States, Vizio, the low-cost manufacturer, has seen its plasma market share almost double from the fourth quarter of last year, from 5.7 percent to 10 percent. (Panasonic’s first-place share of the U.S. plasma business dropped from 38 to 35 percent.)

One bright spot for the industry: sales of still-pricey TVs 50 inches and larger “was stronger than expected,” Mr. Gagnon said. If the rich do not always get richer, so far at least many seem to have retained their ability to buy big TVs.
http://bits.blogs.nytimes.com/2008/0...ture-tube-tvs/





Inside the Attack that Crippled Revision3
Jim Louderback, CEO

As many of you know, Revision3’s servers were brought down over the Memorial Day weekend by a denial of service attack. It’s an all too common occurrence these days. But this one wasn’t your normal cybercrime – there’s a chilling twist at the end. Here’s what happened, and why we’re even more concerned today, after it’s over, than we were on Saturday when it started.

It all started with just a simple “hi”. Now “hi” can be the sweetest word in the world, breathlessly whispered into your ear by a long-lost lover, or squealed out by your bouncy toddler at the end of the day. But taken to excess – like by a cranky 3-year old–it gets downright annoying. Now imagine a room full of hyperactive toddlers, hot off of a three hour Juicy-Juice bender, incessantly shrieking “hi” over and over again, and you begin to understand what our poor servers went through this past weekend.

On the internet, computers say hi with a special type of packet, called “SYN”. A conversation between devices typically requires just one short SYN packet exchange, before moving on to larger messages containing real data. And most of the traffic cops on the internet – routers, firewalls and load balancers – are designed to mostly handle those larger messages. So a flood of SYN packets, just like a room full of hyperactive screaming toddlers, can cause all sorts of problems.

For adults, it’s typically an inability to cope, followed either by quickly fleeing the room, or orchestrating a massive Teletubbies intervention. Since they lack both legs and a ready supply of plushies, internet devices usually just shut down.

That’s what happened to us. Another device on the internet flooded one of our servers with an overdose of SYN packets, and it shut down – bringing the rest of Revision3 with it. In webspeak it’s called a Denial of Service attack – aka DoS – and it happens when one machine overwhelms another with too many packets, or messages, too quickly. The receiving machine attempts to deal with all that traffic, but in the end just gives up.
(Note the photo of our server equipment responding to the DoS Attack)

In its coverage Tuesday CNet asked the question, “Now who would want to attack Revision3?” Who indeed? So we set out to find out.

Internet attacks leave lots of evidence. In this case it was pretty easy to see exactly what our shadowy attacker was so upset about. It turns out that those zillions of SYN packets were addressed to one particular port, or doorway, on one of our web servers: 20000. Interestingly enough, that’s the port we use for our Bittorrent tracking server. It seems that someone was trying to destroy our bittorrent distribution network.

Let me take a step back and describe how Revision3 uses Bittorrent, aka BT. The BT protocol is a peer to peer scheme for sharing large files like music, programs and video. By harnessing the peer power of many computers, we can easily and cheaply distribute our huge HD-quality video shows for a lot less money. To get started, the person sharing that large file first creates a small file called a “torrent”, which contains metadata, along with which server will act as the conductor, coordinating the sharing. That server is called the tracking server, or “tracker”. You can read much more about Bittorrent at Wikipedia, if you really want to understand how it works.

Revision3 runs a tracker expressly designed to coordinate the sharing and downloading of our shows. It’s a completely legitimate business practice, similar to how ESPN puts out a guide that tells viewers how to tune into its network on DirecTV, Dish, Comcast and Time Warner, or a mall might publish a map of its stores.

But someone, or some company, apparently took offense to Revision3 using Bittorrent to distribute its own slate of shows. Who could that be?

Along with where it’s bound, every internet packet has a return address. Often, particularly in cases like this, it’s forged – or spoofed. But interestingly enough, whoever was sending these SYN packets wasn’t shy. Far from it: it’s as if they wanted us to know who they were.

A bit of address translation, and we’d discovered our nemesis. But instead of some shadowy underground criminal syndicate, the packets were coming from right in our home state of California. In fact, we traced the vast majority of those packets to a public company called Artistdirect (ARTD.OB). Once we were able to get their internet provider on the line, they verified that yes, indeed, that internet address belonged to a subsidiary of Artist Direct, called MediaDefender.

Now why would MediaDefender be trying to put Revision3 out of business? Heck, we’re one of the biggest defenders of media around. So I stopped by their website and found that MediaDefender provides “anti-piracy solutions in the emerging Internet-Piracy-Prevention industry.” The company aims to “stop the spread of illegally traded copyrighted material over the internet and peer-to-peer networks.” Hmm. We use the internet and peer-to-peer networks to accelerate the spread of legally traded materials that we own. That’s sort of directly opposite to what Media Defender is supposed to be doing.

Who pays MediaDefender to disrupt peer to peer networks? I don’t know who’s ponying up today, but in the past their clients have included Sony, Universal Music, and the central industry groups for both music and movies – the RIAA and MPAA. According to an article by Ars Technica, the company uses “its array of 2,000 servers and a 9GBps dedicated connection to propagate fake files and launch denial of service attacks against distributors.” Another Ars Technica story claims that MediaDefender used a similar denial of service attack to bring down a group critical of its actions.

Hmm. Now this could have been just a huge misunderstanding. Someone could have incorrectly configured a server on Friday, and left it to flood us mercilessly with SYN packets over the long Memorial Day weekend. If so, luckily it was pointed at us, and not, say, at the intensive care unit at Northwest Hospital and Medical Center But Occam’s razor leads to an entirely different conclusion.

So I picked up the phone and tried to get in touch with ArtistDirect interim CEO Dimitri Villard. I eventually had a fascinating phone call with both Dimitri Villard and Ben Grodsky, Vice President of Operations at Media Defender.

First, they willingly admitted to abusing Revision3’s network, over a period of months, by injecting a broad array of torrents into our tracking server. They were able to do this because we configured the server to track hashes only – to improve performance and stability. That, in turn, opened up a back door which allowed their networking experts to exploit its capabilities for their own personal profit.

Second, and here’s where the chain of events come into focus, although not the motive. We’d noticed some unauthorized use of our tracking server, and took steps to de-authorize torrents pointing to non-Revision3 files. That, as it turns out, was exactly the wrong thing to do. MediaDefender’s servers, at that point, initiated a flood of SYN packets attempting to reconnect to the files stored on our server. And that torrential cascade of “Hi”s brought down our network.

Grodsky admits that his computers sent those SYN packets to Revision3, but claims that their servers were each only trying to contact us every three hours. Our own logs show upwards of 8,000 packets a second.

“Media Defender did not do anything specific, targeted at Revision3″, claims Grodsky. “We didn’t do anything to increase the traffic” – beyond what they’d normally be sending us due to the fact that Revision3 was hosting thousands of MediaDefender torrents improperly injected into our corporate server. His claim: that once we turned off MediaDefender’s back-door access to the server, “traffic piled up (to Revision3 from MediaDefender servers because) it didn’t get any acknowledgment back.”

Putting aside the company’s outrageous use of our servers for their own profit, and the large difference between one connection every three hours and 8,000 packets a second, I’m still left to wonder why they didn’t just tell us our basement window was unlocked. A quick call or email and we’d have locked it up tighter than a drum.

It’s as if McGruff the Crime Dog snuck into our basement, enlisted an army of cellar rats to eat up all of our cheese, and then burned the house down when we finally locked him out – instead of just knocking on the front door to tell us the window was open.

In the end, here’s what I know:

• A torrential flood of SYN packets rained down on Revision3’s network over Memorial Day weekend.

• Those packets – up to 8,000 a second – came primarily from computers controlled by MediaDefender, who is in the business of shutting down illegal torrent sites.

• Revision3 suffered measurable harm to its business due to that flood of packets, as the attacks on our legitimate and legal Torrent Tracking server spilled over into our entire internet infrastructure. Thus we were unable to serve videos and advertising through much of the weekend, and into Tuesday – and even our internal email servers were brought down.

• Denial of service attacks are illegal in the US under 12 different statutes, including the Economic Espionage Act and the Computer Fraud and Abuse Act.

Although I can only guess, here’s what I think really happened. Media Defender was abusing one of Revision3’s servers for their own purposes – quite without our approval. When we closed off their backdoor access, MediaDefender’s servers freaked out, and went into attack mode – much like how a petulant toddler will throw an epic tantrum if you take away an ill-gotten Oreo.

That tantrum threw upwards of 8,000 SYN packets a second at our servers. And that was enough to bring down both our public facing site, our RSS server, and even our internal corporate email – basically the entire Revision3 business. Smashing the cookie jar, as it were, so that no one else could have any Oreos either.

Was it malicious? Intentional? Negligent? Spoofed? I can’t say. But what I do know is that the FBI is looking into the matter – and it’s far more serious than toddlers squabbling over broken toys and lost cookies.

MediaDefender claims that they have taken steps to ensure this won’t happen again. “We’ve added a policy that will investigate open public trackers to see if they are associated with other companies”, promised Grodsky, “and first will make a communication that says, hey are you aware of this.”

In the end, I don’t think Media Defender deliberately targeted Revision3 specifically. However, the company has a history of using their servers to, as Ars Technica said, “launch denial of service attacks against distributors.” They saw us as a “distributor” – even though we were using Bittorrent for legitimate reasons. Once we shut them out, their vast network of servers were automatically programmed to implement a scorched earth policy, and shut us down in turn. The long Memorial Day weekend holiday made it impossible for us to contact either Media Defender or their ISP, which only exacerbated the problem.

All I want, for Revision3, is to get our weekend back – both the countless hours spent by our heroic tech staff attempting to unravel the mess, and the revenue, traffic and entertainment that we didn’t deliver.

If it can happen to Revision3, it could happen to your business too. We’re simply in the business of delivering entertainment and information – that’s not life or death stuff. But what if MediaDefender discovers a tracker inside a hospital, fire department or 911 center? If it happened to us, it could happen to them too. In my opinion, Media Defender practices risky business, and needs to overhaul how it operates. Because in this country, as far as I know, we’re still innocent until proven guilty – not drawn, quartered and executed simply because someone thinks you’re an outlaw.

- Jim Louderback
CEO - Revision3

UPDATE
We’ve received several requests for some technical data to illustrate the specifics of the attack. So we’ve provided a text file with some more “under the hood” data.

This file represents every packet we identified as being part of the DoS for a period of time less than .02 *seconds* on Monday morning. If you count, there’s a total of 96 packets. (We removed 12 legitimate packets from the trace). We used a combination of tcpdump and wireshark to gather this information. (this particular trace is from tcpdump)

View the text file: rev3packettrace.txt
http://revision3.com/blog/2008/05/29...pled-revision3

















Until next week,

- js.



















Current Week In Review





Recent WiRs -

May 24th, May 17th, May 10th, May 3rd, April 26th, April 19th

Jack Spratts' Week In Review is published every Friday. Submit letters, articles, press releases, comments, questions etc. in plain text English to jackspratts (at) lycos (dot) com. Submission deadlines are Thursdays @ 1400 UTC. Please include contact info. The right to publish all remarks is reserved.


"The First Amendment rests on the assumption that the widest possible dissemination of information from diverse and antagonistic sources is essential to the welfare of the public."
- Hugo Black
JackSpratts is offline   Reply With Quote
Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Peer-To-Peer News - The Week In Review - September 22nd, '07 JackSpratts Peer to Peer 3 22-09-07 06:41 PM
Peer-To-Peer News - The Week In Review - May 19th, '07 JackSpratts Peer to Peer 1 16-05-07 09:58 AM
Peer-To-Peer News - The Week In Review - December 9th, '06 JackSpratts Peer to Peer 5 09-12-06 03:01 PM
Peer-To-Peer News - The Week In Review - September 16th, '06 JackSpratts Peer to Peer 2 14-09-06 09:25 PM
Peer-To-Peer News - The Week In Review - July 22nd, '06 JackSpratts Peer to Peer 1 20-07-06 03:03 PM






All times are GMT -6. The time now is 11:22 PM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
© www.p2p-zone.com - Napsterites - 2000 - 2024 (Contact grm1@iinet.net.au for all admin enquiries)