P2P-Zone  

Go Back   P2P-Zone > Peer to Peer
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Peer to Peer The 3rd millenium technology!

Reply
 
Thread Tools Search this Thread Display Modes
Old 21-05-08, 09:59 AM   #1
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,016
Default Peer-To-Peer News - The Week In Review - May 24th, '08

Since 2002


































"Fuck that. I am keeping them up." – Alex Phillips


"It's not 1692, it's 2008. Santa Fe needs to embrace this technology, it's not going away." – Ron Trujillo



































May 24th, 2008




Danish Copyright Censorship Proposal Revealed
Ben Jones

In February a Danish court forced ISP Tele2 to block its subscribers from accessing The Pirate Bay, following a similar order late last year to block allofmp3.com. A new proposal before the Danish government would mean that such actions would be quick and easy to do, without the need for a single court hearing.

Back in February we reported on the IFPI forcing, via the Danish courts, an ISP to block its subscribers from accessing The Pirate Bay. This case was the third occasion where an industry lobby group had flexed its muscles to block a website, a similar measure was used to block allofmp3.com and mp3sparks.com. However, the legality of these actions under European law, specifically the Infosoc directive, is dubious at best.

Nevertheless, two of the largest opposition parties in Danish parliament think it is a good idea – despite the ineffectiveness of the block – to streamline the process, making it quicker and easier to do. A proposal (Danish) before the government seems to create a tribunal to handle these cases.

Whereas in the past cases have involved a rights holder suing an ISP and forcing a block through the courts, this proposal creates a tribunal to do it instead. This tribunal will apparently consist of members appointed by government ministers, who will then rule on blocks with no judicial oversight. Any sites blocked would have to go through the courts to appeal and the site would remain blocked unless and until successful.

If that was not bad enough, there is also talk of a secretariat that would handle ’simple’ cases, so the appointed tribunal would not even have to hear the majority of cases. Cases would be put to the tribunal by copyright holders that feel they have had their rights infringed by the target site. As with the court cases, though, it’s extremely unlikely that the accused site will be invited or even made aware of any such proceedings, and allowed to state their case.

“This is a wet dream for organizations like IFPI,” is the view of Ole Husgaard, chairman of the Danish Pirate Party. “This isn’t even a law proposal, so there is not all the work usually done in our parliament when passing laws; this can be passed in a month or two. If it is, I would guess that we will have at least 2000 sites on the blocking list within 12 months - without a single court case having been decided, if any get started at all.”

He’s not alone in his pessimism. “It’s blatant censorship of course.” is the opinion of The Pirate Bay’s brokep. “It’s not in the interest of the citizens, so I hope the government understands that if they go against the people like that, they should be replaced. It is also not a huge step before they start censoring other stuff - let’s say political parties that have thoughts about changing the current government.”

As analysis of the Pirate Bay block has found it contrary to EU laws, it’s curious as to the motivation behind this proposal. The only rational one would be bribery – either legal or not – and so the question we are forced to ask is, are Danish politicians cheaper to buy than those in New York?
http://torrentfreak.com/danish-copyr...oposal-080517/





US Plots "Pirate Bay Killer" Trade Agreement
kdawson

An anonymous reader sends word that Wikileaks has revealed that the United States is plotting a 'Pirate Bay killing' multi-lateral trade agreement, called 'ACTA,' with the EU, Japan, Canada, Mexico, Switzerland and New Zealand.

"The proposal includes clauses designed to criminalize the non-profit facilitation of copyrighted information exchange on the Internet, which would also affect transparency sites such as Wikileaks. The Wikileaks document details provisions that would impose strict enforcement of intellectual property rights related to Internet activity and trade in information-based goods. If adopted, the treaty would impose a strong, top-down enforcement regime imposing new cooperation requirements upon Internet service providers, including perfunctory disclosure of customer information, as well as measures restricting the use of online privacy tools."
http://yro.slashdot.org/article.pl?sid=08/05/23/1251202





Linking to Movies Leads to $4 Million in Fines
Jacqui Cheng

Hollywood has been granted another victory in its war against piracy, this time at the expense of two linking sites that the Motion Picture Association of America believes profited from enabling copyright infringement. Both ShowStash.net and Cinematube.net have been hit with multimillion dollar judgments recently for copyright infringement of various movies and TV shows.

Even though ShowStash and Cinematube didn't host any of these files, both were found guilty of contributory copyright infringement, according to the judges' opinions, because they searched for, identified, collected, and indexed links to illegal copies of movies and TV shows. Aside from monetary damages, both sites are now prohibited from engaging in further activity that would infringe upon the studios' work.

The damages totaled $2.7 million for ShowStash and $1.3 million for Cinematube, neither of which were particularly well-known to the general Internet community. The MPAA doesn't seem to care much that it gives free publicity to these tiny sites when it makes announcements of its litigation plans, however. The organization apparently hopes that others will merely feel threatened by the prospect of paying out millions of dollars and shut down voluntarily.

"Our goal is to stop this kind of blatant and illegal activity," MPAA executive VP John Malcolm said in a statement. "These judgments indicate that the studios will not hesitate to vigorously pursue litigation against this type of site."

The MPAA announced the two judgments just two weeks after the organization was awarded $110 million in damages from TorrentSpy. The MPAA hailed the decision as a clear victory for the movie studios that served as the icing on the cake after TorrentSpy's announcement that it would shut down for good on March 24.

With two more (albeit relatively small) victories under its belt, the MPAA is even more confident in its stance against sites that merely link to potentially copyrighted material. It wouldn't be surprising to see ShowStash and Cinematube eventually mirror TorrentSpy's decision to shut down, too.

It's not uncommon to find illegal movies being hosted on servers outside the US, which is why sites based in the US have not hesitated to merely tell users how to get to them. The increase in lawsuits against sites that point to illegal movies, however, may push more of them to move operations overseas too in order to skirt further litigation.
http://arstechnica.com/news.ars/post...-in-fines.html






RIAA Victorious: Guilty Sentence for Online Music Pirate
Michael Bordash

The beginning of the end of the wild west.

Barry Gitarts, 25, was found guilty of criminal copyright infringement on Thursday May 22, 2008, a violation of the NET ACT. Based in Brooklyn, NY, he was part of the APC ("Apocalypse Production Crew"), a piracy group responsible for distributing downloads of pre-release movies, music, software and games.

This is a landmark case as Mr Girarts is the first accused pirate to try his case in front of a jury, according to the RIAA. The trial was held for only three days in Alexandria, Virginia. U.S. Attorney Chuck Rosenberg summed up the result quite simply: "Music piracy is stealing and, unless you want to end up in a federal prison, don't do it."

This trial was a result of the U.S. Justice Departments international effort "Operation Fastlink" that targeted violators of the NET ACT. This act made it a crime to infringe on copyrights for financial gain, illegally distribute $1,000 or more in music within a 6-month period and to distribute any pre-release content. Overall, the operation netted 200 search warrants in 15 countries.

Gitarts faces a up to five years in prison and will be sentences on August 8th 2008.
http://www.internetdj.com/article.php?storyid=996





FCC Hearing Speakers Lash Out at Comcast

The FCC hearing brought together a number of disparate interest groups and dozens of speakers condemning Comcast for infringing upon the neutrality of the Internet.

Comcast has been accused of interfering with connections on users who send large personal files through the Internet, particularly digital video and audio music using BitTorrent peer-to-peer filesharing software.
Greg Kell

The FCC public hearing, in a session hosted by Stanford Law School, focused on its fact finding mission on broadband network management practices. Several large Internet service providers attended, including Comcast Communications, AT&T, Time Warner and Verizon.

Several free Internet access advocates and representatives of radio stations were also present before the Federal Communications Commission.

Comcast, the nation's second-largest ISP, has been accused of interfering with connections on users who send large personal files through the Internet, particularly digital video and audio music using BitTorrent peer-to-peer filesharing software.

This practice was condemned by a number of interest groups and dozens of speakers who accuse the Internet Service Provider of infringing upon the neutrality of the Internet.

Comcast has claimed that users who send large audio and video files absorbs bandwidth which interferes with users who send only email and other lightweight data forms. The company also has claimed that it is graciously helping to put a stop to online illegal pirating.

However, most speakers didn't see it that way. Most speakers argued that Comcast service practices on frequent users of BitTorrent cause inbound connections to disconnect during midstream from computers.

Comcast installed new software or equipment on its networks that began selectively interfering with some of its customers' TCP/IP connections around May 2007. The most widely discussed interference was with certain BitTorrent peer-to-peer (P2P) file-sharing communications, but other protocols have also been affected.

"No one should be messing with the openness of the Internet," Commissioner Michael Copps said. "It's going to be a major fight with powerful forces on the other side."

Copps said he favors "an enforceable principle of non-discriminatory behavior to our Internet policy statement. This won't be easy, but that's exactly why we need a for-sure enforcement process ... to sift through the complaints... and over time establish a precedent."

"I think what the commission is focused on is 'What are the appropriate policies from a consumer perspective, making sure that consumers continue to have access to all the information that's available over the Internet.' And I think that we'll continue to end up focusing on that underlying principal, which harkens back to the networking principles we adopted back in 2005," FCC Chairman Martin said.

"I just want to make sure that we did try to make this as open and transparent as possible," he said.

There is no timetable for FCC action at this time. The commission will remain in fact-finding mode for at least several months.
Comcast has been accused of interfering with connections on users who send large personal files through the Internet, particularly digital video and audio music using BitTorrent peer-to-peer filesharing software.
http://www.halflifesource.com/fcc_he...rticle2395.htm





Comcast Invests in P2P Video-Delivery Startup

Comcast Corp., which is under federal investigation for blocking some file-sharing traffic, is investing in a startup that delivers high-definition video using file-sharing techniques.

Seattle-based GridNetworks on Monday said that Comcast would make an unspecified investment in the company and collaborate on developing so-called peer-to-peer file-sharing techniques that are "friendly" to Internet service providers.

Comcast, the country's second largest Internet service provider, hampers some file-sharing traffic by its subscribers in an attempt to keep the traffic from slowing down Web surfing by other subscribers. Complaints by consumer groups and legal scholars that the company is discriminating against particular software have led to an investigation by the Federal Communications Commission.

Comcast has said that it will stop targeting specific types of traffic by the end of the year. It has also reached out to file-sharing companies to try to develop mutually acceptable techniques.

Tony Werner, Comcast's chief technology officer, said Monday that Comcast is "working hard" with technology companies and the Internet Engineering Task Force to improve the efficiency of peer-to-peer file sharing.

File-sharing applications like BitTorrent are frequently used to spread pirated movies and music. But GridNetworks and a dozen other startups are instead developing the technology as a way to deliver legal files, like rented high-definition movies, cheaply over the Internet.

In October, GridNetworks raised $9.5 million in capital, with Cisco Systems Inc. as one of the investors.

The Comcast deal was announced at the Cable Show in New Orleans, hosted by the National Cable and Telecommunications Association.
http://news.yahoo.com/s/ap/20080519/...UWTFL9VGas0NUE





Time Warner, Cable Unit Unveil Separation Details
Merissa Marr

Time Warner Inc. (TWX) unveiled details of its planned spinoff of Time Warner Cable Inc. (TWC), a step that will transform the media conglomerate into one more focused on movies, TV programming and magazines.

As part of the separation - expected to take place in the fourth quarter - Time Warner is set to reap a $9.25 billion windfall from a special $10.27-a-share dividend to be paid by the cable company.

Time Warner Cable's board cleared the terms of the deal at a meeting Tuesday. Time Warner, whose board gave its stamp of approval Thursday, plans to distribute its stake in the cable company to its investors. The separation is the first big move by Time Warner's new chief executive, Jeff Bewkes, who has been under pressure to kick-start the company's stock price. Not only will it make Time Warner more content-focused, it will free up management to find a long-term solution for the company's AOL Internet unit.

With the split, Time Warner is losing a major generator of cash. But cutting loose the cable company has big benefits. It allows Time Warner to slash its $34.6 billion debt load, which includes cable debt, by two-thirds. Time Warner Cable has net debt of $13 billion and will borrow to pay the $10.9 billion dividend. Time Warner could use its windfall to cut its debt further, buy back shares or make an investment.

As an independent company, Time Warner Cable will be free to chart its own course in a market where it faces competition from phone and satellite-TV companies. Its freedom also could make acquisitions easier, at least in the long run.

Wednesday, Bewkes said, "After the transaction, each company will have greater strategic, financial and operational flexibility and will be better positioned to compete." He added, "Separating the two companies also will help their management teams focus on realizing the full potential of the respective businesses and will provide investors with greater choice in how they own this portfolio of assets."

Time Warner Cable will start life as a stand-alone company with significant debt - courtesy of the special dividend. Its ratio of debt to earnings, a key indicator in the cable industry, will rise to around 3.75 times from around 2.3 times, according to people familiar with the situation.

Several analysts had anticipated a one-time dividend as part of the separation, but of a lower sum. In a research report last month, Citigroup analyst Jason Bazinet predicted a $6-a-share dividend, which implied a debt ratio within the 3.25 range the company has been targeting. Time Warner Cable likely will tap its strong cash flow to pare its debt.

The mechanics of the parting are complicated by several factors, including Time Warner's complex ownership of Time Warner Cable. Time Warner is also eager to complete a separation in a tax-efficient way.

The split will take place in three steps. The first involves unwinding a related holding company called New York Group, which will increase Time Warner's cable stake to 85% from 84%.

Next, Time Warner Cable will pay the dividend, effectively shifting debt onto its balance sheet. Time Warner then will allocate its Time Warner Cable stake to its shareholders "in a tax-efficient manner" - likely through a stock dividend or some other means. "The exact form of the distribution will be determined shortly before the closing of the transaction, based on market conditions," the company said Wednesday.

In addition, Time Warner has agreed to provide a commitment for a supplemental two-year term loan of up to $3.5 billion in case the cable company can't refinance a two-year $9 billion loan Time Warner Cable is taking out to pay the lion's share of the dividend.

Shares of Time Warner closed Tuesday at $16.15 and rose to $17.01 in recent premarket activity. Time Warner Cable shares closed at $30.22 and saw no premarket trading.

(Donna Kardos of Dow Jones Newswires contributed to this report.)
http://www.lloyds.com/CmsPhoenix/Dow...aspx?id=392254





Cable Hedges its Wireless Bets
Marguerite Reardon

It's mobile or bust for cable operators that seem to be trying anything and everything to get into the wireless market.

One of the biggest shifts over the next decade in the cable market is likely to be a move toward wireless services. As cable operators face stiff competition from phone companies, cable operators large and small are looking for ways to take their services mobile.

Brian Roberts, CEO of Comcast, the largest cable operator in the U.S., talked up his company's investment in a new joint venture to blanket the country with 4G, or fourth-generation, wireless at the industry's trade show in New Orleans this week.

Earlier this month, Comcast and Time Warner joined forces with Sprint Nextel and Clearwire to form a company that will build the next-generation wireless network using a technology called WiMax. Comcast is fronting $1.05 billion as part of the deal, and Time Warner Cable is putting in $500 million to help make the new network a reality.

Roberts said during his keynote speech Sunday that he sees the network as a way to open up new applications and devices for the company.

But Comcast and Time Warner aren't the only cable operators getting into the wireless game. Cablevision recently announced it will expand its Wi-Fi hot-spot service to create an outdoor Wi-Fi network throughout its existing cable footprint. The idea is to extend its Optimum broadband service to customers on the go.

So why are cable companies, which have no history of successfully doing anything in wireless, so hot to get into the market? The answer is simple. They have to if they want to compete with AT&T and Verizon Communications.

The phone companies have introduced TV service and faster, fiber-based broadband services into cable's territories. Services like Verizon's Fios are gaining market share. And even though the phone companies haven't integrated wireless into their offering yet, it's coming.

But with the cell phone market already 84 percent penetrated--according to the CTIA--the cable industry recognizes it needs to offer a new kind of wireless service. As wireless networks get faster, consumers are taking many of their broadband applications, like e-mail, Web surfing, and social networking, on the go.

"The delineation between wireline and wireless services is starting to blur," said Mike Roudi, group vice president of wireless services for Time Warner Cable. "And we think about mobility as a long-term opportunity that occurs when new networks are built that can deliver true broadband speeds wirelessly."

Roudi said this is why Time Warner has joined Google and Intel as investors in the new Clearwire.

Comcast's head of wireless, Tom Nagel, echoed Roudi's comments.

"Customers are already showing us that mobility and wireless are important," Nagel said. "And with wireless we can let them enjoy our products inside and outside the home with ubiquitous connectivity to a high-speed network."

Cablevision is taking a slightly different route. The company is using Wi-Fi to extend its existing broadband network to more customers, a smart choice considering the number of Wi-Fi devices already in the market. Not only do most laptops come with Wi-Fi embedded in them, many cell phones are also getting Wi-Fi. In fact, in the next three years some 1.2 billion Wi-Fi-enabled gadgets will be in the market, according to IDC.

"As more and more devices become Wi-Fi enabled, whether they be laptops, iPhones, BlackBerrys, or other portable devices, we believe we can create a compelling broadband wireless network throughout our footprint for our Optimum Online high-speed data service customers," Tom Rutledge, Cablevision's COO, said during the company's conference call with investors this month.

Cablevision will build the new network in the same footprint as its existing cable infrastructure. And the network, which will take two years to deploy, will deliver 1.5 megabits per second. The service will be an extension of it broadband service and will be offered free of charge.

Cablevision already has Wi-Fi hot spots up and running in 15 highly trafficked areas, such as tourist destinations. For example, Cablevision's Wi-Fi is available on all three Bridgeport & Port Jefferson Ferry boats that connect Long Island, N.Y., to Bridgeport, Conn., a popular summertime route for many Optimum Online customers.

Risky business for cable

While it makes sense for cable operators to get into the wireless market, there's no guarantee that any of the plans that have been announced will actually work. In 2005, Comcast and Time Warner, along with Cox Communications and Advance/Newhouse Communications, formed a joint venture with Sprint Nextel called Pivot that was supposed to develop wireless services that the cable operators could bundle and resell to their customers. Two and a half years later, Comcast and Time Warner have pulled out of the partnership and Pivot is essentially dead.

Executives at the cable companies say the new Clearwire deal is different from the Pivot relationship.

"When we did Pivot it was a co-marketing arrangement with Sprint," Time Warner's Roudi said. "From a retail perspective, Time Warner was selling a Sprint-branded service and device. But with Clearwire, we will control the customer relationship including the service and phones. We will handle pricing, marketing, customer care, and billing."

Comcast and Time Warner believe that they each learned a great deal from the Pivot experience. And the companies believe they won't make the same mistakes in the new Clearwire partnership.

But many of the same challenges that the companies faced before haven't gone away. For instance, Comcast and Time Warner still need to figure out how to integrate their existing services and platforms into a wireless network. And while they may be marketing and selling the service themselves, technological integrations are still difficult when working with a partner that controls the network.

Even AT&T and Verizon Wireless, which essentially own their wireless networks, are still trying to figure out how to integrate their services.

Cable's "plan C"

But if the Sprint Nextel/Clearwire investment doesn't pan out, Comcast and Time Warner still have another shot at the wireless market with 20 megahertz of spectrum they acquired from the Federal Communications Commission's Advanced Wireless Spectrum auction held in 2006. Through a consortium called SpectrumCo., Comcast, Time Warner, and other cable operators spent $2.37 billion on a large swath of wireless spectrum that covers about 99 percent of the country.

Comcast's hiring last month of Dave Williams, the former CTO of Telefonica O2 Europe and former vice president of strategic planning at Cingular Wireless, prompted speculation that the company may be considering building its own wireless network or even buying a wireless company. But so far the company remains mum on its plans for the spectrum.

"Wireless spectrum is a valuable commodity," said Comcast's Nagel. "It's like holding the rights to oil or water. It will always have value. And it gives us flexibility for the future. We don't have any specific plans now, but over time we'll understand how to best use or monetize the spectrum."

But as cable companies, like Comcast, look to invest in new wireless networks, they might be overlooking a big opportunity. In cities, such as Philadelphia and New Orleans, citywide Wi-Fi networks built by EarthLink are being shut down as the Internet service provider abandons the network service market.

Comcast, which serves Philadelphia, and Cox Communications, which serves New Orleans, could easily buy these assets for a fraction of what EarthLink paid to install them. (EarthLink spent $20 million to build Philadelphia's network, which is 80 percent complete.)

For example, Comcast could test new wireless services using the existing network. It could see how customers use wireless broadband services outside their home, and then apply the lessons learned to services it plans to develop for the Clearwire WiMax network.

But so far, Comcast has not shown any interest in the network. The reason is likely political. Comcast was among the most vocal opponents to the Philadelphia Wi-Fi network. So justifying the purchase of these assets might be too difficult to spin.

But as other citywide Wi-Fi networks falter, cable operators in different parts of the country might consider picking up the assets. According to The Wall Street Journal, MetroFi, a Wi-Fi service provider, is also struggling. It has networks in Portland, Ore.; Aurora, Ill.; San Jose, Calif.; and other Silicon Valley towns.

"These citywide Wi-Fi networks could let cable companies put their toe in the water," said Craig Settles, an independent consultant specializing in municipal Wi-Fi. "Wi-Fi networks in many cities have failed because of the business models, not because of the technology. Cable companies already have the customer base and the services that could be rolled out onto these networks. So it makes sense."
http://www.news.com/8301-10784_3-994...?tag=ndfd.lede





Group Wants Wi-Fi Banned from Public Buildings

A group in Santa Fe says the city is discriminating against them because they say that they're allergic to the wireless Internet signal. And now they want Wi-Fi banned from public buildings.

Arthur Firstenberg says he is highly sensitive to certain types of electric fields, including wireless Internet and cell phones.

"I get chest pain and it doesn't go away right away," he said.

Firstenberg and dozens of other electro-sensitive people in Santa Fe claim that putting up Wi-Fi in public places is a violation of the Americans with Disabilities Act.

The city attorney is now checking to see if putting up Wi-Fi could be considered discrimination.

But City Councilor Ron Trujillo says the areas are already saturated with wireless Internet.

"It's not 1692, it's 2008. Santa Fe needs to embrace this technology, it's not going away," Trujillo said.

The city attorney hopes to have a legal recommendation by the end of the month.
http://kob.com/article/stories/S451152.shtml?cat=517





MetroFi Shutting Down WiFi Service in Bay Area Cities
Bay Area News Group

Wireless Internet service provider MetroFi, the company providing much-touted citywide service, is logging out of the business. The Mountain View-based company said it's discontinuing its free WiFi service because the business model of online advertising as its primary income has not worked out financially. It provides WiFi service to Foster City, Sunnyvale, downtown San Jose, Santa Clara, Cupertino, Concord, Portland, Ore., and Naperville, Ill. MetroFi notified the cities by letter May 13, offering to sell its equipment so the cities could assume control of the systems, look for someone to buy each system or dismantle the equipment spread around the cities - including streetlight-mounted antennas that transmit a wireless signal. "We are hoping to hear back from these cities no later than the end of this month," said Lucie Poulicakos, MetroFi's vice president of operations. The company is considering bankruptcy and other options, she added.
http://www.siliconvalley.com/news/ci_9343626





Cable Prices Keep Rising; Customers Keep Paying
Matt Richtel

Americans discouraged by higher gas prices and airline fares may decide to spend more vacation time at home, perhaps watching television.

But that, too, will cost them more than ever.

Cable prices have risen 77 percent since 1996, roughly double the rate of inflation, the Bureau of Labor Statistics reported this month.

Cable customers, who typically pay at least $60 a month, watch only a fraction of what they pay for — on average, a mere 13 percent of the 118 channels available to them. And the number of subscribers keeps growing.

The resiliency of cable is all the more remarkable because the Internet was supposed to change all things digital. Technology has led to more choices and lower prices for news and music as well as cellphone and landline minutes — not to mention computers, cameras, music players and phones themselves.

Yet here is a rare instance where Silicon Valley has failed to break a traditional media juggernaut. And not for lack of trying.

Technology companies keep insisting they will provide new low-cost ways to get video into the home, but so far their efforts have created more black boxes to stash under the TV, not real competition for cable that could bring prices down.

“A couple of years ago, there was a thesis that we were at the twilight of Comcast as the gatekeeper,” said Craig Moffett, a cable industry analyst at Sanford C. Bernstein & Company. “That thesis still titillates some. But technologically and economically, it’s probably not going to happen.”

So why hasn’t technology had a bigger impact? One answer is the alliance between cable companies and Hollywood producers of content to sell channels in bundles, rather than letting consumers pay only for the channels they want.

The producers of cable television content share $15 billion to $20 billion a year in fees from cable subscribers, roughly equal to the $20 billion they receive in advertising revenue, Mr. Moffett said.

Without those fees, the cable companies say, prices would go up.

“If each channel depended on individual consumers electing to pay individually for it, this would slash potential viewership and seriously hurt the ability of most channels to attract their current level of advertising dollars,” said Jenni Moyer, a spokeswoman for Comcast. “Lost ad revenue would have to be replaced by higher license fees.”

The industry says the digital era has brought its customers better image quality, more on-demand services and solid value through packages that combine cable, phone and Internet service. It also says consumers are actually getting more viewing value for their dollar, at least relative to inflation. The National Cable & Telecommunications Association says that from 1998 to 2006, the price consumers paid for each viewing hour was essentially flat.

The chief economist of the Federal Communications Commission, Gregory S. Crawford, disagrees, saying the industry is not factoring in the real cost of the programming that subscribers are watching. By his analysis, the increase has been around 50 percent from 1997 to 2005.

The F.C.C. and some politicians have been in a pitched battled with the cable industry, trying to get it voluntarily to offer so-called à la carte pricing. But cable companies insist that this is not economically feasible.

Kevin J. Martin, chairman of the F.C.C., said in an interview that since 1996, when Congress increased competition in telecommunications, prices have dropped for many other services.

“We’ve seen the opposite occur in the cable industry,” he said. “The dramatic increases in pricing we’ve seen are one of the most troubling issues from a consumer point of view.”

In 2007, average monthly revenue for each Cablevision subscriber was $75, up from $65 in 2005, according to SNL Kagan, a research company. At Time Warner it was $64, up from $54.50.

The cable industry has never felt the pricing pressures the music industry is feeling. The most obvious reason is that Internet speeds have not been fast enough to permit easy downloading of movies and other video material.

That is changing, though. People are viewing millions of videos online each month — albeit mostly short video clips, and not Hollywood movies. At the same time, the use of file-sharing tools like BitTorrent to download illegally popular movies and television shows is growing.

Another factor helping the cable industry is the difficulty of getting video from the computer onto the TV. That may not be a deterrent for those who have grown accustomed to watching movies on their laptop. But the last thing many consumers want to do is hook up wires or program a new box before sitting back to relax and watch TV.

In that sense, the lure of cable appears to have a sociological component. In a stress-filled life, cable television is easy to use.

“I work eight hours a day facing a computer. When I come home, the last thing I want to do is mess with another computer,” said Eric Yu, 24, a college student in San Francisco who pays around $80 a month for cable.

Mr. Yu said he watches only a handful of channels, including some in high definition like National Geographic. But to get them, he has to pay for a premium package. “I just pay the bill and try to forget about it,” he said. “It lessens the pain.”

Evelyn Tan, 22, a friend of Mr. Yu, takes a different approach. She pays Comcast $33 a month for Internet access and does not get cable television — but she does watch TV programming.

In fact, she watches ABC shows like “Desperate Housewives” and “Gray’s Anatomy,” which are free on the Web. When she wants to watch shows or movies that are not readily available online, she says she easily pirates them. “I would not pay for cable TV at all,” she said.

Broadcast networks like ABC, NBC and Fox are starting to put their programming on the Internet. But most cable channels do not because they depend on subscriber revenue.

Albert Cheng, executive vice president for digital media at the Disney-ABC Television Group, said the industry was trying to prepare for an era in which more video is watched on computers.

“It wasn’t lost on us what happened to the music industry,” Mr. Cheng said. Even though the audience is growing for ABC shows online, he said, this is supplementing, rather than undercutting, the television audience.

Enter Silicon Valley. It is trying to marry the content people want with their preferred setting for viewing it. There is a host of new set-top boxes and consumer devices aimed at bringing video and other content from the Internet to the TV.

Apple’s iTunes store offers 20,000 episodes of some 800 shows at typically $1.99 or $2.99 an episode, effectively creating an à la carte option. But consumers must either watch on their computers, wire the computer to the television or get an Apple TV.

This week Roku, a Silicon Valley start-up, began selling a $99 box that streams movies from Netflix straight to the TV. And this summer Hewlett-Packard is expected to introduce a device called the MediaSmart Connect, a sleek box connecting computer and TV that lets users watch Internet videos as well as rent or buy some 6,000 movies through CinemaNow, an H.P. partner.

But the box will also demonstrate how much of a gap still separates the computer screen and the TV screen.

Carlos Montalvo, vice president for marketing of connected entertainment at H.P., said the MediaSmart Connect and similar devices would not offer much of the programming provided over cable, or even programming that content companies allow to be delivered over the Internet to computers. The reason, he said, is that this content is licensed to be shown only on a computer, not delivered via computer to a TV.

“Simply because the technology is there doesn’t mean that the large opus of content — both television and movies — that is available on the two-foot screen can move automatically to the large-screen TV,” he said.
http://www.nytimes.com/2008/05/24/te...y/24cable.html





Bell Canada Opens Online Video Store as P2P Debate Rages On
Nate Anderson

P2P competition?

Sometimes I get the itch to work in PR. No, it doesn't happen much, but once in a while I see the sort of inexplicable corporate decision that makes me long to have been in the room when it was being discussed. Case in point: yesterday's announcement from Bell Canada that the telecom behemoth was officially launching its downloadable video store... just as Bell is caught up in a government inquiry into its traffic-shaping practices. It's hard to imagine a time at which touting your own downloadable video store makes less sense than when you're on the hot seat for throttling all P2P traffic, much of which competes with Bell to offer video (including entirely legal BitTorrent downloads from the CBC). Yes, you could look worse as a company, but puppies and shotguns would probably need to be involved.

Calling all wormherders

Bell Canada's announcement wasn't a complete surprise, as the company has had the store in beta for a year now. But officially launching the store now poses unavoidable comparisons to the FCC investigation of Comcast in the US, where a company called Vuze accused the cable giant of throttling its legal P2P video sales while at the same time just happening to compete with Vuze by offering unthrottled video-on-demand through its cable system.

Canada's CRTC is currently investigating Bell for the throttling it recently rolled out across its entire data network, including bandwidth sold on a wholesale basis to smaller ISPs. Although the regulator declined to make the company change its ways while the hearing is in progress, the recently-released list of pointed questions for Bell shows that the CRTC is committed to truly understanding the issue, and it wants to see hard data to back up Bell's decisions.

Launching a video store in such a climate is guaranteed to bring out the (justified or not) conspiracy theories. In fact, only a day after the announcement, those theories are running rampant round the 'Net. The Globe & Mail's Jack Kapica even posted a roundup of them last night on his blog, and he called the Canadian reaction to the news "loud and immediate."

No one appears to believe that Bell will filter or degrade its own video traffic, and that has led to charges of unfair behavior. As Kapica put it, "There are restraint-of-trade laws that are created to stop this kind of nonsense. And if those laws can't stop this kind of behavior, there is an army of people out there who are pushing hard to make such practices illegal... With the opening of the Bell Video Store, Bell has opened a can of worms that is net neutrality in Canada. And those worms can't be herded back into the can easily."

"Several of us have Macs at home..."

The store itself is roughly what you would expect, with a small selection of high-profile movies from Paramount and other "major Hollywood studios" like Eros Entertainment (which, surprisingly, does not produce porn films).

Of course, it doesn't work with Macs or Linux machines because the site uses Windows Media DRM. Not even the creators of the store like this solution; on the FAQ page, in answer to the inevitable question about Mac compatibility, the answer begins, "First off, several of us have Macs at home and this is just as frustrating for us..." It then goes on a bit plaintively, "We're hoping that one day Microsoft, Apple, the content owners and video sites like ours will have a big group hug and we can all share content.... Please share any ideas on how we can get MAC [sic] and PC to play nice together."

The store does work with XP or Vista, and the content can be streamed to media extender like the Xbox 360 or downloaded to a handful of portable devices from Archos. iPods are not covered; neither, apparently, are Zunes, so this should be a really useful feature for most users.

The move does give Canadians one more option when it comes to grabbing online video content, since iTunes in Canada doesn't yet offer movies. But given the restrictions on the service and the fact that it is launching with a mere 1,500 pieces of content (much of this television shows, concerts, and the like), it's no great leap forward, and it seems to have launched at just the right moment to tap into a wave of anti-Bell, pro-net neutrality sentiment.

We've already noted that the P2P throttling issue is leading to a "net neutrality showdown" in Canada, so it's simply amazing to watch as Bell takes one of the guns from its holster, points it right at the tip of its boot, and blasts away. Limping into a gunfight with a fraction of your available ammo isn't a strategy for victory, but we'll have to wait another couple of months to see whether the move will incense regulators in the same way it has the blogosphere.
http://arstechnica.com/news.ars/post...-rages-on.html





Banks’ Terms Imperil Deal to Buy Out Bell Canada
Andrew Ross Sorkin and Michael J. de la Merced

The $51.8 billion takeover of Bell Canada, the largest leveraged buyout ever proposed, appeared to be in trouble over the weekend as the Wall Street banks that committed to finance the deal sought to renegotiate the lending terms, people on both sides of the transaction said on Sunday.

The deal for Bell Canada, Canada’s largest telecommunications company, is the latest buyout to run into trouble since the credit market started tightening last summer. Over the two prior years, banks had rushed to finance giant private equity deals, reaping lucrative fees along the way.

But those banks now find themselves largely unable to resell the debt, leaving them staring at billions of dollars in potential losses because many have already suffered from losses tied to subprime mortgages.

As a result, they have sought to back away from their financing commitments again and again, even as they risk angering buyout firms, some of their largest clients.

More than a dozen buyouts over the last year have been revised or have collapsed, including those for the student lender Sallie Mae, the equipment operator United Rentals and the mortgage provider PHH.

Just last week, Clear Channel Communications agreed to lower its takeover price to $18 billion as part of a legal settlement among its two buyers and a group of six banks that had balked at financing the deal.

The negotiations over the Bell Canada buyout began to fray late Friday, said people on both sides of the deal, who were in closed-door discussions all weekend.

The banks backing the deal, led by Citigroup, Deutsche Bank and the Royal Bank of Scotland, sent revised terms to the consortium of buyers. The new terms included higher interest rates, tighter loan restrictions and stronger protections for the banks, far exceeding the original terms, these people said.

Members of the buyers’ group — the Ontario Teachers Pension Plan; the buyout firms Providence Equity Partners, Madison Dearborn Partners and Merrill Lynch Global Private Equity; and Toronto-Dominion Bank — held several conference calls over the weekend to discuss their options. Among the possibilities is filing a lawsuit against the banks to force them to complete the deal on its original terms, these people said.

“It’s patently obvious that the banks have no intention of closing the deal,” one executive who read the revised terms said.

Another executive called the situation “Clear Channel, the sequel.” Several members of the Bell Canada bank group, including Citigroup, Deutsche Bank and R.B.S., were also involved in the earlier deal.

Even the banks themselves have made explicit comparisons to the Clear Channel deal. As part of their legal briefs, Clear Channel’s buyers said that one Deutsche Bank executive joked to a Citigroup banker that they should “just slap a (redacted by banks) logo” on materials for a Clear Channel meeting and “send them up to Providence” — a reference to the banks’ apparent efforts to also escape their commitment to finance the Bell Canada deal. Such evidence may complicate banks’ legal defenses should the dispute head to court.

The fight for Clear Channel, a radio broadcaster, concluded only after a rancorous legal row that could have led to bitter court battles in New York and Texas, where Clear Channel is based. The settlement of that fight had given hope to Bell Canada shareholders: Shares in its parent company, Bell Canada Enterprises, rose 4.1 percent over the last week.

Analysts and investors in Canada have speculated that the Bell Canada deal, which is scheduled to close by June 30, may be repriced. Shares in the company, which is based in Montreal, have traded consistently below the offered price of 42.75 Canadian dollars a share. The shares closed at 38.80 Canadian dollars on Friday. Canadian and United States dollars are roughly equal in value.

Joseph McKay, an analyst at Desjardins Securities, wrote in a research note last week that the deal’s price may fall as low as 39.25 Canadian dollars a share.

What follows next may largely be a retread of previous buyout battles like the one over Clear Channel. That company filed suit against the banks in its home state, Texas, claiming that those firms sought to interfere with its takeover agreement. Bell Canada may try a similar move, jockeying for home-court advantage by suing in Canada. And the Ontario pension fund, the lead investor in the deal, may be able to rally political support to close the deal on favorable terms.

The banks may be split among themselves as well. Toronto-Dominion, one of the buyout’s backers, may feel additional heat at home to try to broker a revised deal. (By law, Bell Canada cannot be owned by foreigners.) A settlement effort by Morgan Stanley, one of the banks in the Clear Channel deal, helped broker that transaction’s compromise.

Already, the Bell Canada deal appears to have surmounted two major obstacles. After reworking its board structure, the company won conditional approval from Canada’s broadcast regulator.

In March, a Quebec court approved the transaction, dismissing efforts by some of the company’s bondholders to kill the buyout. But those bondholders are appealing the decision.

Ian Austen contributed reporting.
http://www.nytimes.com/2008/05/19/bu...ss/19deal.html





Bell Canada Takeover Is Blocked
Ian Austen

Uncertainty surrounding a proposed $51.8 billion leveraged buyout of Bell Canada increased Wednesday after an appeals court sided with angry bondholders in a ruling.

In an unanticipated move, a five-judge panel of the Quebec Court of Appeal found that Canada’s largest telecommunications company “never attempted to justify the fairness and reasonableness of an arrangement that results in a significant adverse economic impact on the debenture holders while at the same time it accords a substantial premium to the shareholders.”

Within minutes of the release of the decision early Wednesday evening, Bell said that it would appeal to the Supreme Court of Canada and suggested that it would extend the current June 30 closing date for the deal.

“The judgment overturning the Quebec Superior Court decision rewrites Canadian law relating to the duty of Canadian boards of directors to maximize value for shareholders in the context of a change-of-control transaction, as well as to the entitlements of bondholders,” Martine Turcotte, the company’s chief legal officer, said in a statement.

The Ontario Teachers’ Pension Plan, which is leading the buyout group, did not respond to requests for comment.

Bell said that the closing date for the deal now depended on the supreme court’s willingness to hear the case and the timing of any hearing that could result.

In Wednesday’s decision, the appeal court set aside a lower court ruling that allowed the deal, the largest leveraged buyout in history, to proceed. It returned the case to the lower court for a new hearing.

The decision to take the company private disturbs bondholders because it will burden Bell with about 30 billion Canadian dollars in additional debt. That will most likely depress the price of current bonds because of concerns that a debt-laden Bell is a riskier investment.

In its decision, the appeal court noted that before agreeing to the buyout, Bell executives, including Michael J. Sabia, the president and chief executive, emphasized the company’s interest in maintaining a high credit rating.

Other recent developments have also raised questions about the deal’s viability. Last week a consortium of banks providing financing for the deal proposed substantial alterations to the terms of their loans to the purchasers, who also include Providence Equity Partners, Madison Dearborn Partners and Merrill Lynch Global Private Equity and the Toronto-Dominion bank, according to people knowledgeable about the deal.

The sweeping revisions sought by the banks, including proposals to change interest rates, suggested to some investors and analysts that the banks were trying to escape the lending commitments, which they made last June, before the start of the current turmoil in credit markets.

The legal turmoil surrounding the case, if it continues for any extended period of time, might provide the bankers with at least an argument for walking away. Under the sale terms, Bell is required to resolve all regulatory issues and do its best to wind up litigation related to the purchase.

The widespread expectation among legal specialists in Canada had been that the appeal court would follow the trial judge’s lead and dismiss the bondholders’ complaint.

Shortly before the decision was released, Lionel David Smith, a professor specializing in commercial law at McGill University in Montreal, described the bondholders’ case as “an uphill battle.”

It is not clear if the supreme court will hear Bell’s appeal. Professor Smith said that much of the bondholders’ case was based on a legal concept known as oppression that is relatively untested by the high court in Canada.

Oppression cases have usually involved disputes between owners or shareholders of relatively small companies or partnerships, he said, and involved actions that, while legal, were outside of the partners’ or owners’ private understandings. The appeals court did not address the oppression arguments directly.

While Professor Smith said that it was quite possible that the supreme court would hear the case, that is not likely to happen before the deal’s deadline date.

Bell shares have been trading below the takeover price of 42.75 Canadian dollars. There is some hope in the investment community that Telus, the dominant telephone company in Western Canada, might make another attempt to acquire Bell if the private equity bid failed.

Telus looked at Bell last year but did not bid, apparently because of Bell’s reluctance to provide access to its internal financial data.

A purchase by Telus might also raise serious competition questions, particularly given that the government is now seeking to lure more operators into the wireless phone business, which is now split between Telus, Bell and Rogers Communications.
http://www.nytimes.com/2008/05/22/bu...ess/22bce.html





$50 Billion Telecom Deal Falls Apart
Heather Timmons

The world's largest corporate deal in an emerging market, a tie-up worth nearly $50 billion between two telecommunication companies, Bharti Airtel in India and MTN Group in South Africa, came to a screeching halt Saturday.

Bharti called off negotiations after MTN turned Bharti's takeover plan upside down, proposing to take over Bharti instead. After bankers from both sides agreed in principle to a Bharti-controlled structure on May 16, MTN's board met this week and proposed a different transaction, in which Bharti Airtel would become a subsidiary of MTN, Bharti said Saturday.

"This convoluted way of getting an indirect control of the combined entity would have compromised the minority shareholders of Bharti Airtel and also would not capture the synergies of a combined entity," Bharti said in a statement.

"More importantly," Bharti added, "Bharti's vision of transforming itself from a homegrown Indian company to a true Indian multinational telecom giant, symbolizing the pride of India, would have been severely compromised." The situation was "completely unacceptable," Bharti said.

MTN Group had no immediate comment.

A combination with MTN would have been Bharti Airtel's first major foray outside India. The two companies have roughly the same number of subscribers and market capitalization, so any deal was expected to be more like a merger of equals, bankers and analysts said. Bharti seems to have been unwilling to cede control of the deal, though, they said.

Bharti said Saturday that discussions had gone on until late Friday night "without a breakthrough" and that it had decided to "disengage" from the discussions.

The lead bankers from Bharti and MTN had agreed to structure the deal so that Bharti Airtel would be the parent company. MTN's counterproposal would have made Bharti Airtel a subsidiary of MTN but given Bharti's parent company, Bharti Enterprises, a controlling stake in the combined company, said one Bharti executive briefed on the negotiations. Even though Bharti Enterprises would control the new telecommunications giant, that was not acceptable to Bharti, he said. "Our vision is to become a global Indian telecom," he said, adding that the collapse of the deal was "really about Indian pride."

The collapse of the deal is likely to be a major blow for Sunil Bharti Mittal, the chairman and managing director of Bharti Airtel, and founder of Bharti Enterprises, an Indian conglomerate with ambitious international plans. It is also likely to take a heavy toll on MTN's stock price. The company's shares have traded up more than 16 percent in the past month on the Johannesburg Stock Exchange on talk of a deal.

Bharti said Saturday that more than a dozen bankers from the United States and Europe had given it "confident letters of funding" of over $60 billion. The company said it would continue to look for international expansion opportunities.
http://www.nytimes.com/2008/05/25/te...bharti.html?hp





Sandvine Gets Agnostic About Bandwidth

Bandwidth-management vendor offers ‘application agnostic’ system
Todd Spangler

Sandvine, the Canadian company whose technology has been at the center of the storm surrounding Comcast’s peer-to-peer bandwidth-throttling practices, has created an extension to its platform that will scale back Internet connections in what it calls an “application-agnostic” fashion.

The FairShare system, which works with Sandvine’s network switches, allows service providers to curtail bandwidth based on subscriber-usage metrics from various sources to balance available bandwidth and resources among all subscribers.

The idea is to improve the overall “quality of experience” for subscribers by smoothing out spikes in bandwidth usage, according to Tom Donnelly, Sandvine’s executive vice president of marketing and sales.

“Ultimately, not all bits are equal,” he said. “A file transfer that takes 1 hour instead of 55 minutes is not really less satisfactory. But a voice call that doesn’t go through is unacceptable.”

And, he said, while the original impetus for Sandvine’s system was to control floods of P2P file-sharing, other applications are now consuming sizable chunks of bandwidth too.

“It’s not just about focusing on one class of traffic anymore,” he said. “There’s a diversity of applications that need to be taken into consideration.”

But FairShare also seems designed as a response to the brouhaha over Comcast’s bandwidth-management techniques, which use Sandvine’s Policy Traffic Switch to slow down P2P traffic. (Comcast has never confirmed that it is using the Sandvine system.)

After advocacy groups complained to the Federal Communications Commission about the practice, the agency launched a probe into whether Comcast violated its Internet management principles. Cox Communications, meanwhile, was fingered last week by German research team as similarly “blocking” peer-to-peer connections.

In March, Comcast said it would work collaboratively with BitTorrent and that it planned to “migrate by year-end 2008 to a capacity management technique that is protocol agnostic”--indicating the cable operator may decide to drop Sandvine.

Donnelly, asked about the possibility Comcast may pick a new bandwidth management platform, responded: “We feel reasonably confident in our relationships with our largest customers. Our products are widely deployed throughout the network. We’re talking about a very large number of devices.”

Sandvine, based in Waterloo, Ontario, claims to have 100 service provider customers worldwide, serving 50 million broadband and 10 million wireless subscribers. Its key competitors are Cisco Systems, Arbor Networks and Allot Communications.

Donnelly said FairShare has already been deployed by a North American service provider, but he declined to identify the customer.

FairShare uses technology from two companies Sandvine acquired last year, CableMatrix Technologies and Simplicita Software.
http://www.multichannel.com/article/CA6561982.html





Cold, Dark Countries Whipping US in Broadband Usage
Nate Anderson

The Organization for Economic Cooperation and Development (OECD) has released updated broadband data that finds the US still in 15th place worldwide. While that's not a total catastrophe, the US has been sinking for several years (it was fourth in 2001) and has yet to show any real signs of improvement. But broadband in general is booming, growing 187 percent since 2004 in OECD countries. During that same period, average advertised speeds rose from 2Mbps to 9Mbps and prices plunged. Broadband remains red-hot, even in the coldest climates, and nothing is hotter than fiber-to-the-home, which now accounts for 8 percent of all OECD broadband connections.

We reported on an earlier OECD paper that outlined why fiber optics would be the backbone of the broadband future, even when the last-mile link is delivered by cable or DSL. The new OECD data shows just how quickly fiber direct to the home is progressing; it now makes up a stunning 40 percent of all broadband connections in Japan and 34 percent in Korea. The US comes in 11th in FTTH with a percentage point or two.

A common complaint made by those who defend US broadband progress is that the decline in OECD rankings can largely be explained by geography, as countries with high population densities build out infrastructure cheaply and quickly. While we've debunked that idea in the past when it comes to broadband in general, the new report shows that it doesn't hold water when it comes to FTTH, either.

The report notes that "some of the key developments in fibre deployments have been away from the main city centres. The previous three years have seen a surge in the number of smaller communities investing in fibre-to-the-home infrastructure. For example, the town of Nuenen in the Netherlands with 8,000 homes is reported to have passed 7,200 in the town and signed up 6,500 subscribers for FTTH services."

Two of the countries above the US on the FTTH chart, Norway and Sweden, have substantially higher fiber rollout levels (almost 8 percent of Sweden's connections are fiber optic) despite lower population densities. When it comes to overall broadband connections, the link between density and high-speed Internet lines breaks down even further; five of the 14 countries ahead of the US on the overall broadband chart actually have lower population densities.

As the chart above makes clear (the red line is population density, the blue is broadband usage), Canada, Sweden, Finland, Norway, and Iceland all have lower population densities and yet are managing to beat us in broadband penetration.

Come to think of it, all five of them are also quite cold and dark for long periods of time; perhaps huddling inside around a monitor all winter provides more impetus to meet up with friends, shop, and search for entertainment online. We're in dire need of a national broadband strategy; maybe it's as simple as cooling the country and blotting out the sun.
http://arstechnica.com/news.ars/post...and-usage.html





The New York Times Calls For Network Neutrality Legislation
Sarah Lai Stirland

Network neutrality advocates' lobbying efforts were thrust into the national spotlight on Monday when The New York Times' opinion pages ran an editorial urging rapid passage of a bill on the subject.

Wrote the NYT:

Quote:
Users of the Internet take for granted their ability to access all Web sites on an equal basis. That could change, however, if Internet service providers started discriminating among content, to make more money or to suppress ideas they do not like. A new “net neutrality” bill has been introduced in the House, which would prohibit this sort of content discrimination. Congress has delayed on this important issue too long and should pass net neutrality legislation now.
The Times goes on to make the argument that net-neutrality advocates have been making all along -- that heading down the path of discrimination will end up stifling innovation. The Federal Communications Commission, the author of the editorial argued, should actively enforce anti-discrimination policies.

But the question at issue isn't so much the content as the kinds of applications that get blocked, as the recent skirmishes and subsequent truce between the file-sharing company BitTorrent and Comcast, the nation's largest cable provider, illustrates.

Under that deal, Comcast and BitTorrent have agreed to work together to find both hardware and software solutions to enable BitTorrent's peer-to-peer system to run more smoothly over Comcast's network architecture.

BitTorrent has also promised to publish information about what it's doing online to make the process more transparent.

And that's the keyword: Transparency. Net Neutrality advocates continue to pound on the word "discrimination," because network owners' traffic management practices seem so arbitrary and inexplicably opaque.

Indeed, if we want the internet to retain its original open nature, network owners should not be allowed to retain sole decision-making control over what kind of protocols should run over their networks, argued Susan Crawford, a visiting law professor at Yale during a recent panel discussion on the subject matter at The Technology Policy Summit in Hollywood.

"Under a common-carrier-like regime for internet access, the network manager isn't making those decisions, everyone else is making those decisions," she said.

Perhaps, as many of the network neutrality advocates suggest -- the rule concerning network neutrality should be transparency.

Network providers and applications builders should always be required to publicize their design decisions so that the rest of the world can understand how networks are being managed, and why traffic is flowing the way it is flowing.

I'm not sure if this makes sense, but it's an idea that the presidential candidates could start discussing.

Barack Obama has already started the discussion. He has said that he is committed to ensuring network neutrality, and his aides have said that an Obama administration would make the kind of blocking activity that Comcast engaged in against BitTorrent illegal. (It's not really clear how it would do this, though.)

Both Obama and Hillary Clinton have sponsored pro-network neutrality legislation, although Clinton has been criticized by some advocates for not speaking out more forcefully on the subject matter.

John McCain has been vague about network neutrality both in congressional debates and on the campaign trail. He simply says that the issue is one that can be addressed by market forces.

Absent the relevant information and a consistent level of disclosures about how networks are run however, it's difficult to see how market forces can operate efficiently. In the case of Comcast and BitTorrent, the truce was only reached after pressure mounted through public outcry, the threat of litigation, and a high-profile investigation by federal regulators.

Perhaps McCain's senior policy adviser Douglas Holtz-Eakin would like to answer this question at this week's annual Computers, Freedom and Privacy conference in New Haven when he discusses the next administration's technology policy priorities.
http://blog.wired.com/27bstroke6/200...w-york-ti.html





Cable Execs: We Won't Throttle P2P
Steve Donohue

Following some tests showing that P2P delivery can be optimized within their networks, Comcast and Verizon say they won’t block or throttle Internet traffic delivered via peer-to-peer networks.

Verizon and file-sharing firm Pando Networks shared the results of a trial that Verizon ran with Pando and other firms in February in which they tested how P2P files are delivered if an ISP teams up with a P2P company.

Pando CEO Robert Levitan said before February’s test, 98 percent of the data delivered to users in the P2P test came from outside Verizon’s network. During the P2P test, the amount of P2P content delivered to Verizon subscribers from inside its network grew from 2 percent to 50 percent, Levitan said.

The data appears to indicate that network providers can "manage" or optimize the P2P traffic without hitting the user consumption. Executives from the major high-speed Internet providers said it shows that ISPs need to work with P2P companies to improve content delivery and manage network traffic.

“Network congestion does present a series of unique challenges. It’s critical for the industry to recognize those challenges and have collaboration across all of the interest groups,” Comcast vice president of Internet services Barry Tishgart told attendees at a panel here Tuesday afternoon.

Tishgart acknowledged that P2P networks could help Comcast and other broadband ISPs improve the delivery of video to subscribers. “Video on the Internet has the potential to provide tremendous customer benefits. Obviously P2P plays a very large role in that, and the future growth of video on the Internet,” he added.

In the Pando test, the hop count -- or the distance data had to travel on Verizon’s network -- was reduced by 80 percent, from 5.5 hops to 0.89 hops, Levitan said.

Comcast plans to run a similar P2P trial next month, Levitan said. The fact that Comcast and Verizon are partnering with P2P firms -- a sector once denigrated by major ISPs -- is significant, Levitan stressed.

“If you told anybody a year ago that the largest ISPs in the world would be sitting down with P2P companies and talking about how to improve P2P delivery -- nobody would believe you,” Levitan added.

But while ISPs are beginning to collaborate more with P2P companies, convincing major content providers to use P2P technology to deliver programming to consumers remains a challenge, Comcast’s Tishgart and Verizon senior technologist Doug Pasko said.

“A lot of big issues are still out there on digital rights management,” Pasko said when asked why more major content providers aren’t relying on P2P networks.

Levitan said the damage to the reputation of P2P companies will impact content providers.

“There’s certainly been some reputation damage that’s gone on. Enterprises and certain content companies might have some bias towards it,” Tishgart said. “I think that’s going to be a challenge, and finally some of the technical challenges to overcome.”

Also Tuesday:

• Pasko said Verizon is investigating how to use P2P technology to deploy new features on its FiOS TV set-top boxes.

• Pando’s Levitan maintained that delivering video through P2P technology is much more efficient than streaming video from a server. “The online video business model does not work. For most people, if you want to deliver high quality video, the more video you deliver, the more [money] you lose. In order to... make money on video delivery, that’s where peer-to-peer comes in."

• Wachovia Video Network vice president Patty Perkins said the bank relies on P2P technology to deliver five-minute videos to 70,000 employees each day.

• P2P technology can be used by content providers for the live delivery of programming, Levitan said.
http://www.contentinople.com/author....&doc_id=154410





Mininova Faces Legal Action: Filter or Else
Ernesto

No torrent site on earth is more popular than Mininova. Surprisingly, however, all the legal pressure seems to have been focused on sites such as The Pirate Bay. Mininova - against all the odds - appears to have stayed under the radar. All that changed today as Mininova is now facing legal action by Dutch anti-piracy agency, BREIN.

BREIN, the Dutch anti-piracy outfit responsible for shuttering or forcing torrent sites such as Demonoid overseas, has announced that it will take BitTorrent-behemoth Mininova to court. BREIN hopes the court will force Mininova to filter its search results, so that all .torrent files which may point to unauthorized content are removed.

Mininova is currently the largest BitTorrent site with over 30 million unique visitors per month. Mininova displays user submitted torrents and carries legitimate premium content from publishers such as CBC. Unlike The Pirate Bay, the site does not have their own BitTorrent tracker.

It transpires that BREIN and Mininova have been secretly trying to reach a mutually beneficial agreement for more than a year now, but when one side believes they are acting within the law and the other side believes the opposite, a legal clash seems inevitable.

Erik Dubbelboer, one of the co-founders of Mininova, told TorrentFreak that Mininova will not cave in to pressure from BREIN. He expects to have more details about the upcoming lawsuit later this week: “We will proceed to court with full confidence. We operate within the law, as we maintain our ‘notice and take down’ policy. That is, we remove search results if a copyright holder asks us to.”

Sites like YouTube operate in a similar manner - if the site receives a demand from a copyright holder that it should take content down, it does so under its DMCA obligations and there is no further action. Mininova doesn’t even host any unauthorized content, only .torrent files, which should make it even less of a target than YouTube. Typically, BREIN doesn’t see it that way.

Tim Kuik, managing director of BREIN, said that Mininova’s business model is based on illegal activity. “A notice and take down procedure is absolutely insufficient for a site that makes use of unauthorized files, structurally and systematically,” he added.

The announced legal action will focus on the question whether Mininova has to filter their search results or not. BREIN wants Mininova to install such a filter, Mininova on the other hand doesn’t want to censor the search results. The outcome of the case is likely to have a huge impact on the future of other BitTorrent sites, and even sites such as Google and YouTube.
http://torrentfreak.com/mininova-fac...r-else-080519/





Cubit an Approximate Matching Peer-To-Peer Overlay

Approach

Cubit is a scalable peer-to-peer system that can efficiently find the k closest data items to any search key. The central insight behind Cubit is to create a keyword metric space that captures the relative similarity of keywords, to assign portions of this space to nodes in a light-weight overlay and to resolve queries by efficiently routing them through this space. The system comprises a protocol for object and node assignment, a gossip-based protocol for maintaining the overlay, and a routing protocol to efficiently route queries.

Figure 1: The edit-distance between keywords. The five keywords create a keyword space that cannot be accurately embedded into a plane.
A keyword is any word that appears in the title of an object stored in Cubit. In order to fully specify the problem of approximate string matching, we need to choose a notion of distance between two keywords, or more generally between two text strings. Such distance should correspond to our intuition on which strings are similar and which strings are very different.

Cubit uses the most common notion of distance on strings, the edit-distance. It is equal to the minimum number of insertions, deletions and substitutions needed to transform one string to another. The keywords then lie in the keyword space, illustrated in Figure 1, a metric space induced on keywords by the edit-distance.

Node ID Assignment

Cubit nodes are distributed in the same space as keywords. Each node in Cubit is assigned a unique string ID chosen from the set of keywords associated with previously inserted objects in the system. Specifically, at join time each node independently selects a random keyword, ensuring uniqueness by detecting ID collisions. The ID of a node determines its "position" in the keyword space. This position determines how a given node is used in Cubit. First, each Cubit node is responsible for storing the set of keywords for which it is the closest node. Second, Cubit implements a distributed protocol which navigates through nodes in the keyword space, gradually zooming in on a neighborhood of a given (possibly misspelled) keyword, and thus locates nodes that store possible matches.

Figure 2: In this example, the solid circles represent peers in node A's peer-set, the empty circles represent other peers, and the squares represent object keywords in the system. The shaded region depicts the sub-space that is closer to A than any other node.

Navigation

The navigation protocol is the core component of Cubit. To support this protocol, Cubit creates and maintains a multi-resolution overlay network on nodes such that each node has several peers at every distance from itself; the peers at a given distance are chosen to maximize the coverage of that region. Such overlay design is inspired by the small-world construction in which a grid is augmented by a sparse set of randomly chosen edges, with roughly the same number of edges for each distance scale. In the resulting graph a simple greedy routing algorithm (which on each step minimizes the distance to target) succeeds in finding short routes to any given target.

The desired property of the search protocol is to obtain the k closest objects to the set of keywords, as measured by the phrase distance metric. For each keyword in the search phrase, the protocol obtains the k closest objects from each node which meets the following edit distance criterion: its ID is within an edit-distance of q from the keyword, where q is the product of the keyword length and the expected number of perturbations per character (which is a parameter in the system). The protocol selects m closest nodes if fewer than m nodes meet edit-distance criterion, where m is called the search fan-out. The keyword search protocol is illustrated in Figure 3.

Figure 3: The Cubit search protocol operates iteratively to collect more and more information of the target region. In this example, x is the location of the search term in the keyword space, the solid circles are node A's peers, empty circles are additional nodes in the space, and the circle around x are all nodes within edit-distance q of x. Node A first finds the m = 2 closest nodes to x from its peer-set, and request their m closest nodes. In this example, two new closer nodes are discovered and subsequently sent the same query. The protocol terminates when all nodes within the circle around x, or the m closest nodes have been discovered. These nodes are queried for their closest objects to x.

Load Balancing

Since search terms tend to follow a Zipf distribution, the resulting skewed load distribution can lead to excess routing load on nodes within the vicinity of popular keywords.

In Cubit, if the load generated by queries for a popular keyword w overwhelms the available resources of node i, the node can send an off-loading request to its closest neighbors requesting them to create a synthetic node located at w. Nodes receiving such a request create a synthetic node at w whose IP address and port correspond to their own, thus enabling queries for that portion of the keyword space to be terminated at any one of the moff neighbors. The original requester is then tasked with keeping the virtual nodes updated with changes to objects in the off-loaded region as well as changes to its leaf-set. This off-loading operation disperses hot-spots in keyword popularity without requiring global information or coordination. Figure 4 illustrates the protocol.

Figure 4: In this example, the keyword "love" is closest to node A and is generating a high degree of load. Node A creates a virtual node centered around the keyword love, which includes its leaf set and all objects in the region within p edit-distance from love. This virtual node is sent to A's nearest neighbors. Queries that arrive at these neighbors for keywords within an edit-distance p of love can be answered without node A
http://www.cs.cornell.edu/~bwong/cubit/approach.html





Justin Frankel’s latest

About REAPER

REAPER is reasonably priced Windows software for multitrack audio production.

REAPER requires no dongle, has no copy protection, and can be evaluated with full functionality.

• Portable - supports running from USB keys or other removable media
• 64 bit audio engine
• Excellent low-latency performance
• Stunning multiprocessor performance
• Direct multi-track recording to many formats including WAV/BWF/W64, AIFF, WavPack, FLAC, OGG, and MIDI.
• Extremely flexible routing
• Supports a wide range of hardware (nearly any audio interface, outboard hardware, many control surfaces)
• Support for VST, VSTi, DX, DXi effects
• ReaPlugs: high quality 64 bit effect suite
• Tightly coded - installer is just over 3MB

Editing features

• Tool-less mouse interface -- spend less time clicking
• Drag and drop files to instantly import them into a project
• Support for mixing any combination of file type/samplerate/bit depth on each track
• Easily split, move, and resize items
• Each item has easily manipulated fades and volume
• Tab to transient support
• Configurable and editable automatic crossfading of overlapping items
• Per-item pitch shift and time stretch
• Arbitrary item grouping
• Markers and envelopes can be moved in logical sync with editing operations
• Ripple editing - moving/deletion of items can optionally affect later items
• Multiple tempos and time signatures per project
• Ability to define and edit project via regions
• Automation envelopes

For more information on the developer of REAPER and its moderately altruistic goals, visit Cockos Incorporated.
http://www.reaper.fm/





5 Groovy Sites for Free Music Downloads

Want to fill up your MP3 player for free without facing the wrong end of an RIAA lawsuit? These five sites offer DRM-free downloads from exciting artists.
Emru Townsend

Short of "free food" and "free beer," "free music" is one of the sweetest phrases you can hear. But getting tunes gratis doesn't have to mean ending up on the RIAA's Most Wanted list. These five sites will let you easily fatten up your music collection with tracks that creators and recording labels are giving away--all in DRM-free, MP3 format. An extra bonus: None of these sites require an e-mail address or any kind of registration.

What's the catch? Well, don't expect to find much top-40 material here; the four major labels are still pretty tight-fisted with their properties. But that's not really much of a catch: Saying good-bye to Mariah Carey and Madonna means saying hello to independent artists (some of whom have been in the business just as long) who will round out your most-played list quite nicely.

1. Venzero Mixtape

Some audio player manufacturers will happily give you music, on the condition that you buy their product first. German company Venzero is a bit more generous, having launched the Venzero Mixtape: a rotating collection of MP3 tracks by "exquisite bands" that anybody can download. Or at least that's the theory. Since launching the Venzero Mixtape, the company has changed the lineup only once. The nine tracks that make up the current mixtape are a pleasure to listen to, however, so even if Venzero never gets around to picking up where it left off, you still come out ahead.

2. Epitonic

My favorite brick-and-mortar record stores--I can call them that because they still have plenty of vinyl--not only offer a wide variety of music but also have staff who can talk intelligently about what they offer. Even when I walk in just to say hi, I usually end up walking out with a new CD and new knowledge.

The closest experience to that in the online world is Epitonic, where you don't get just free music--you get free schooling too. The site features extensive writeups on all the featured artists (including links to similar acts), streaming audio, and at least one free MP3 per album.

Unfortunately, Epitonic hasn't really been updated for almost two years. But the site has enough content that you can still spend hours, if not days, exploring new musical avenues.

3. Mush Records

Like other independent music labels, Mush Records has artists who cover a lot of stylistic ground (they describe their range as "electronic instrumental, underground hip-hop, downtempo, abstract hip-hop, experimental, indie-rock, jazz-based grooves, turntablist compositions, electronic pop, saturated folk, left-field, dreamy stuff, more versions of hip-hop, and on and on"). And Mush is not afraid of giving away music and videos for free, since the company expects visitors' interest to be piqued enough for them to spend a few dollars on a CD.

Unlike Epitonic, Mush Records separates the areas where you learn about artists from where you download media. On the one hand, it makes music discovery a little less organic. On the other hand, the site's extensive archive of articles written about their artists gives a more textured look at their work. Either way, a collection of 70-plus free tracks is nothing to sneeze at.

4. iSound

If you're a musician, iSound seems like a dream come true: The site provides tools for artists to create their own pages to promote and sell their music online. If you're a music fan, iSound seems like a potential nightmare--you'd expect to have to wade through plenty of questionable material to find one gem.

Both of those perceptions are accurate, but what separates iSound from similar online services are three features that let music fans quickly zero in on what they like. First is a search tool that finds bands based on their similarity to three artists you enter; second is a list of the 200 most popular tracks; and third is an icon that tells you if a band has any downloadable MP3s before you click through to their page. Using these tools I easily racked up more hits than misses.

5. The Live Music Archive

The top two reasons I love going to concerts are the feeling of camaraderie (I'm surrounded by people who are into the same music, though I run the risk of a Coke spilling on my shirt) and the chance to hear my favorite songs performed outside of a studio setting, sometimes arranged in new and creative ways. The next best thing to being there is a concert recording, but relatively few bands make recordings available for sale, and many bootlegs are kind of iffy soundwise.

Then there are the bands that don't mind exploring the gray area in between. The Live Music Archive features high-quality concert recordings from bands that are cool with noncommercial distribution of their performances. Dip into the extensive roster, and you'll find names like Robyn Hitchcock, Billy Bragg, and the godfathers of sanctioned bootlegs, the Grateful Dead.
http://www.pcworld.com/article/id,146009/article.html





Apple Wants More Mobile Music From Labels
Saul Hansell

As part of Apple’s efforts to improve on the shortcomings of its popular iPhone, the company has approached some of the major music labels to try to expand the variety of ringtones and other musical features available on the device, several label executives said last week. The negotiations are very active right now and a final deal has not been set, said the executives, who requested anonymity so as not to disrupt the ongoing talks.

“They want a big launch in June,” said one label executive familiar with the discussions. That executive said that a deal may come after June 9, when Apple’s chief executive, Steven P. Jobs, speaks to the company’s developers conference, a logical date for the introduction of the next generation of iPhone. An Apple spokesman declined to comment on the company’s plans.

Ringtones are a very profitable corner of the music business these days, as the price for a short segment of a song is higher than for the full song. Right now, Apple offers ringtones as a 99-cent upgrade to its regular 99-cent music tracks, but not all tracks can be converted into ringtones. Apple is looking to expand its inventory, the executives said.

The company is also hoping to add answer tones, also known as ringback tones — songs that a caller hears instead of the “ring ring” sound while waiting for someone to answer. In some cases, these command an even higher wholesale price than ringtones.

Also under discussion is whether Apple can sell songs from its iTunes store directly to iPhones over the cell-phone broadband network. With the next generation of phone expected to use much faster 3G technology, this is technically feasible. Here too, music labels argue that they should be paid more for an over-the-air download than a standard track bought over the internet, where the wholesale price is about 70 cents.

All sides understand the stakes are significant. Apple, which is the dominant player in digital music, is growing fast as a mobile phone maker. Expectations are high (maybe impossibly so) for the next generation of iPhone. Apple has arranged deals with carriers in most of the world. (Piper Jaffray estimates that Apple now works with carriers that reach 575 million cellphone users, up from 153 million potential customers in the six countries in which the iPhone is now sold.)

But the wireless market is vast, and other carriers and handset makers are trying to add music features to their phones and services. So if Apple holds out for terms that the labels won’t agree to, it risks losing momentum on music on phones. That’s particularly true in Europe where Nokia and Sony Ericsson are strong and the initial reaction to the iPhone has been tepid.

A label executive told me that the current negotiations, which only began a few weeks ago, may be the opportunity for the music companies to press Apple on some of their other longstanding requests. Top among them is the flexibility to set different prices on individual tracks. Right now, Apple sells all tracks for 99 cents. (Apple does allow for variable prices for full album downloads as well as various bundles. The labels love to add extra artwork, bonus cuts or other features that add a few bucks to the price of a digital album.)

Apple has loosened its pricing structure a little bit. It is selling some television shows from HBO at $2.99, above the $1.99 it sells all other TV shows for. The music labels would like to argue that this should open the door to their being able to charge more than 99 cents for hit songs and less for older works. But there’s no evidence that Apple sees it that way.

Meanwhile Universal Music Group is still pressing to get Apple to consider bundling a monthly music subscription with some of its iPhone and iPod models. Under this idea, an iPhone might come with the right to download and listen to any song from the major labels for a period of a year or two. Two executives said this was still under discussion, but it is unlikely to be part of whatever mobile music deals are announced in June. The gap between what Apple wants to pay and what the labels think such a service is worth is still far too high, the executives said.
http://bits.blogs.nytimes.com/2008/0...c-from-labels/





Napster Rolls Out All-MP3 Download Store
Alex Veiga

Napster Inc. (NAPS) begins selling MP3s Tuesday, a move the online music service hopes will lure iPod users and turn around Napster's sliding fortunes.

The company is the latest to make the switch to the unrestricted file format, which makes it music tracks compatible with virtually any music player or other device.

"It's great that we have finally gotten here," said Chris Gorog, Napster's chairman and chief executive. "It is really the beginning of a level playing field, which I think is essential for Napster, but also for the health of the digital music business in general."

Tracks downloaded as part of Napster's subscription service will continue to have copyright restrictions.

For much of the decade, major record labels refused to license their music for downloading as MP3s. But steep annual declines in CD sales and the growing dominance of Apple Inc. (AAPL)'s iPod music players and its iTunes Music Store led the labels to ease that position last year to remain competitive.

Amazon.com is the only other retailer offering MP3 downloads from all the major record labels.

ITunes began selling MP3 versions of recordings from artists on EMI Group PLC labels last year, but the tracks are more expensive and higher quality than standard copy-protected versions.

Napster MP3s will be priced at 99 cents each, while full-album downloads will start at $9.95, the company said.

Rob Enderle, principal analyst with the Enderle Group, said he can't picture many iPod and iTunes users shifting to Napster, since iTunes software is so integrated with Apple music players.

The exception may be someone looking for a track that Apple doesn't offer, he said.

Napster might have a better shot competing against Amazon, which isn't solely focused on selling music downloads.

"Napster's brand and focus on the medium should give it an advantage," Enderle said.

Gorog said Napster plans to differentiate itself from rivals through a modest marketing campaign that emphasizes it has the biggest catalog of music licensed for downloads.

Napster boasts a catalog of more than 6 million tracks. Amazon says its catalog exceeds 5 million tracks.

Los Angeles-based Napster, which first disclosed its plan to shift to MP3s earlier this year, is also betting that an all-MP3 download store will entice some buyers to sign up for its all-you-can-eat music subscription offerings - the firm's bread and butter.

Napster recently said it had about 760,000 subscribers as of March 31.

Napster shares closed at $1.54 Monday after rising a penny, or 0.65 percent. In the past year, the stock has traded between $1.33 and $3.92.
http://apnews.myway.com//article/200...D90P5BBG0.html





Napster Goes DRM-Free
Antony Bruno

As promised, Napster has stripped DRM from all paid downloads on its digital music service in favor of unprotected MP3s. As of today (May 20) all six million songs in the Napster catalog are now available to purchase without DRM protection. The company first announced plans to make the switch in January.

The new MP3 files will be of higher quality than the DRM version (256 kbps compared to 192 kbps). But will still cost only 99 cents. And unlike other digital retailers also making the switch over to DRM-free files -- such as Wal-Mart -- Napster has the support of all four major labels as well as all its existing indie label and aggregator deals.

Most notably, Sony BMG is on board, replicating the "agency" model it started using with the AmazonMP3 store.

The move gives Napster the largest catalog of legal MP3s on the Internet, far outpacing the 2 million songs on AmazonMP3. However Napster at heart remains a subscription service.

"We're really focused on subscription and driving subscribers as our business model," says Napster COO Christopher Allen. The MP3 store, he says, is designed to not only sell more a la carte singles, but eventually convert customers to its monthly subscription plans.

"It's a way for us, through MP3s, to get some exposure to our subscription service," he continues. "They may be initially attracted to the MP3s... and I think it will result in more subscribers over time."

The profit margin on a monthly subscription fee is much better than that of an a la carte download, which is why Napster will continue making subscription its core model. The company is gambling that the proliferation of Internet-connected devices -- such as mobile phones, home stereos and eventually car radios -- will some day convince music fans that a monthly subscription to access all the music they want from any device is more compelling than buying it.

Until that time comes, however, selling digital music in an interoperable format like MP3 is a fairly compelling offer. Napster still allows users to listen to any song in its library in full for free up to three times. Adding the option to purchase any song as well in a manner that is fully interoperable with any device is considered a much-needed development.

"It's great that they're doing it," says Jupiter Research analyst David Card. "Back in the day, they originally thought selling singles and albums would be a good way to get people used to their product and then upsell them on subscriptions. That just has never played out. But part of the reason was that when you bought those songs, they couldn't play on the most popular device-the iPod. So this will be a chance to really test that, because the service isn't crippled anymore."

The DRM-free move however has not yet made it to the Napster Mobile service, which is the default mobile music service for several wireless operators worldwide, including AT&T Mobility (which also counts eMusic as a digital music provider). As of now, music purchased via Napster mobile will still be encoded in the Windows Media DRM.

But Allen says that will change "soon." Like all other mobile music services, Napster Mobile operates a "dual-delivery" model-sending one copy of any song purchased from a supporting mobile phone to the users PC, and another to the phone itself, both wrapped with Windows DRM.

Allen says Napster and its carrier partners are currently testing a new system that would send a DRM-free version to users' computers, and another copy to the phone without the Windows technology. Napster president Brad Duea has previously stated such a system would make Napster Mobile available to 12 million phones compared to the 12,000 it is today.

Napster said it would continue to support all Windows Media DRM files purchased to date, unlike the now-defunct MSN Music service. However there is no program or promotion to let customers replace their previously purchased DRM-laden files with the new unprotected versions.
http://www.billboard.biz/bbbiz/conte...9d4bee4dc1d1b1





Killed by the courts, reanimated by Redmond

Microsoft Confirms Windows Adheres to Broadcast Flag
Greg Sandoval

Microsoft has acknowledged that Windows Media Centers will block users from recording TV shows at the request of a broadcaster.

"Microsoft included technologies in Windows based on rules set forth by the (Federal Communications Commission)," a Microsoft spokeswoman wrote in an e-mail to CNET News.com. "As part of these regulations, Windows Media Center fully adheres to the flags used by broadcasters and content owners to determine how their content is distributed and consumed."

The software company was responding to questions about why some users of Windows Vista Media Center were prevented from recording NBC Universal TV shows, American Gladiator and Medium on Monday night.

The "rules," in which the spokeswoman is apparently referring to are those proposed by the FCC, which would require software and hardware makers to honor "broadcast flags." The flags are code that broadcasters can insert into the data stream of TV shows that typically require restrictions on the recording of the shows. What she didn't say is that the "rules" aren't rules at all.

The courts struck down the FCC's proposal in 2005, saying the regulator lacked the authority to tell electronics makers how to interpret the signals they receive. Since then, Microsoft and other manufacturers have retained the option of whether to honor the flags.

News that the world's largest software maker has voluntarily agreed to help broadcasters control the recording of their shows is bound to outrage enthusiasts of digital video recorders, as it represents the biggest threat to the practice known as time shifting since the FCC's attempt to require flag adherence.

"Microsoft has put the requirements of broadcasters above what consumers want," said Danny O'Brien, a staffer at the Electronic Frontier Foundation, an advocacy group for Internet users that is looking into Monday's block. "They've imposed restrictions way beyond what the law requires. Customers need to know who Microsoft is listening to and how that affects their equipment. Right now, the only way customers know what Microsoft has agreed to is when the technology they've bought suddenly stops working. Microsoft needs to come clean and tell its customers what deals it has made."

The question of whether NBC Universal issued a flag for American Gladiator has yet to be answered. NBC Universal said last week that it needed time to look into the matter. Microsoft's spokeswoman did not offer any information on whether NBC Universal activated a flag. The software company did, however, inform us that accidents do happen.

"In some cases content may be incorrectly flagged in the actual broadcast, which may affect the consumer's TV experience," Microsoft's spokeswoman wrote. "The success of the entire distribution chain is dependent on all involved maintaining the necessary checks and quality control so that coding is correctly applied thereby avoiding any unexpected outcome."
http://www.news.com/8301-10784_3-994...l?tag=nefd.riv





NBC Admits "Inadvertent" Broadcast Flag Use, Still Doesn't Explain Why it Actually Worked
Richard Lawler

Just an update on the broadcast flag controversy: NBC has copped to an "inadvertent mistake" in flagging the broadcast of American Gladiators as content prohibited from recording, while Microsoft stated it is only following the FCC's rules, and "fully adheres to flags used by broadcasters". This conveniently ignores the fact that there is no legal requirement for Windows Vista Media Center to recognize the broadcast flag and disable recording, but it does.

Errant metadata can and does happen, but for such a "feature" to be buried within one's software unknowingly is troubling.

Expect to hear more from the EFF and others questioning why Media Center unnecessarily turns parts of itself off at a broadcaster's command, and rightly so.

What's most disturbing, and likely to go sadly without protest is that someone out there is actually watching, and trying to record for later, American Gladiators. The more you know indeed
http://www.engadget.com/2008/05/20/n...-doesnt-expla/





Digital Rights Misery: When Technology Is Designed to Fail
Jeff Porten

When I was reporting from CES in Las Vegas last January, one of the more interesting technology experiences I had was away from the show floor, back in my hotel room. After a long night and little sleep, I decided to watch a little television; apparently this is common in Vegas, as my budget hotel considered a 42-inch plasma TV to be normal furnishing for a room that omitted a couch and a comfortable chair.

There were a few dozen local and cable channels on the menu, and if I found those boring, I had plenty of on-demand movies to choose from. Most amusing: the $40 daily package for both wireless Internet and the entire library of, ahem, adult entertainment. That's a bundle that knows its target (expense-accounting) audience.

But I had other options, in case there was nothing on, or if the remote control was too far away from the bed. My new Palm Centro had both SprintTV and MobiTV installed; for a few bucks a month, I could catch about 100 channels there. Meanwhile, my MacBook was on the night table, and I had a few movies and a season of The Simpsons on the hard drive.

Then I realized that the cable TV that I pay for is 2,000 miles away; if only I had had the foresight to buy a Slingbox, I could have watched my home Comcast lineup on either my MacBook or my Palm.

I love technology, but this is just whack.

Brave New Digital World -- What made all of this particularly interesting was a video that the Consumer Electronics Association was distributing, titled "DTV 101." Don't bother looking for a copy yourself; it's the most boring video you can imagine. Here's the summary of what the CEA wants you to know:

• On 17-Feb-09, analog TV broadcasts in the United States will be cut off and replaced by digital-only transmission.
• That will free up all of the current analog broadcast spectrum that is now being used for Law and Order episodes and Head-On commercials. The CEA strongly wants to imply that this spectrum will go to police and firefighters, as opposed to making billions of dollars for consumer electronics industries.
• The CEA repeats ad nauseam that you'll continue to get free broadcast TV, and all you need to do is add a converter box to your old TV. That will cost around $50, but there will be a $40 coupon from the federal government. This is starting now, in 2008, in an apparent bid to drive voters to the Libertarian Party when they realize Uncle Sam is buying everyone a new gadget.

But if you're a member of a typical American family, your home is populated with more televisions than people, and each of your older sets will need its own converter. Charmingly, even then your old TV is probably the wrong aspect ratio (4:3 versus the increasingly common 16:9; your widescreen Mac is 16:10, just to make it more confusing), so 25 percent of your screen will generally be filled with thrilling black bars.

Reading between the lines, you won't be forced to buy one or more new TVs next year, but you're probably going to anyway. Eventually, your analog sets will go the way of TVs with UHF dials. Note to younger TidBITS readers: "UHF channels" are where we used to go, late at night, to watch really bad movies and sitcom reruns. This is why your parents still think cable TV is niftier than you do, and why we're amused when you choose to watch TV Land and really bad movies.

The truth is that you will see a vastly improved experience with the new technology. In the past we've seen upgrades from black-and-white to color, and from broadcast channel selection to the far greater bandwidth of coaxial cable; digital television, likewise, is the sort of change that will eventually make you wonder how you ever got by in the old days.

Unfortunately, the upgrade is coming with a cost, and one that's greater than the mere price of a shiny new TV.

Complexity by Design -- For example, take a look at this screen capture from the CEA video, showing a standard digital-to-analog converter setup. Look closely at that remote control on the right, which is just for the converter. The people who stick with their old TVs are the demographic least likely to be able to navigate yet another 100-button remote control, but they're going to be stuck with them. My parents, who lovingly drove me insane with their technology choices, decided that the universal remote control I bought for them was too complicated; instead, they Velcroed three remotes to a triangular Lucite block. For families like mine, it's time to buy a bigger chunk of Lucite.

The pernicious issue is that my parents, like most people, saw 400-button remotes as nothing more than an annoying inconvenience. This is extremely odd considering how central television has been to our culture: Americans average over four hours a day watching the tube, and for most people it's their primary source for news, politics, and what remains of a shared experience in a highly fractured culture. Most of this is true in all modernized societies. Yet for some reason we continue to think that discussion of technologies we use to control television is frivolous.

We have been carefully and methodically trained to believe it's our fault when important technologies make us feel inadequate and incapable. We have accepted the creation of a category of digital have-nots, who either rely on tech-savvy friends and family, or who do without.

This is not an accident. The seeping loss of control from the individual naturally places that control in the hands of the providers of media and the manufacturers of technology.

A perfect example came when I took the screen capture of the converter that I provided earlier. When I was watching the CEA DVD through Apple's DVD Player, Mac OS X's Grab application gave the following error message: "Screen grabs are unavailable during DVD playback." Due to agreements between the creators of commercial DVDs and computer manufacturers, including Apple, a standard feature of the Mac is disabled during this special case to prevent copyright infringement. In other words, Grab is designed to fail deliberately. As a geek member of the digital "haves," I knew this issue was easily resolved by watching the same DVD with Videolan's VLC, which does not trigger the automatic failure.

Take a moment to think about what is occurring here. The consumer electronics industry produces a DVD for the express purpose of writers like me using it to write articles like this one, but my consumer electronics are designed to prevent me from using it. Then I find that I can use it regardless - but only because I am proficient with the technology.

It can only be seen as ludicrous when CEA policy, as implemented in the shipping technology, blocks the usage of CEA's own media outreach. But ludicrous does not mean laughable or unimportant. The technology is attempting to control how I may use this media; for most people, and many other journalists, that control would be successful.

Control Means Ka-Ching -- You're probably already familiar with one way in which the industry uses technological control to create revenue streams. Let's say, back in that hotel room, I was struck with a sudden urge to watch Spider-Man 3. I could watch it on Sprint TV, where it would cost $5.99 for a three-day rental, streamed at 320 by 172 resolution. I could purchase (but not rent, as of a few weeks ago) the movie from the iTunes Store for $9.99 and watch on my MacBook. I could rent it on-demand in my hotel room, which would give me a plasma screen picture, but would cost $11.99 for 24 hours. Or with my MacBook and MasterCard in hand, I could wander down the street and rent a DVD with all the extras from a kiosk for $1.99. Of course, if I already owned the DVD, and had left it at home, that wouldn't have mattered at all; the cost to rent another copy remains the same.

Unless, of course, I spent 30 seconds setting up an illegal Internet download, which would give me a permanent copy, at an arbitrarily high resolution (up to and including Blu-ray, if I had the patience), that I could watch anywhere regardless of whether I had purchased the physical media, or had it with me.

Most of us have in some sense already paid for Spider-Man 3, as well as hundreds of other movies: they're part of a river of programming that show up on our television systems. But unless you've set up some form of digital recording system, unless you've figured out how to move those videos from there to your computer, unless you've mastered converting those videos into other formats, those videos stay locked in their own walled gardens. Many of us have done all of the above, but the vast majority have not and cannot. This allows Columbia Pictures to claim that mechanism is as important as content, which is why the same movie can be $12 in one place, $2 in another, and time-limited everywhere.

This is great for the studios, but it's not how the audience thinks (or should think) of their product. Paying for some form of content should directly connect to real received value: a performance of a movie in a theater. A DVD with additional commentary and deleted scenes. And yes, convenient on-demand availability, when appropriate. But too often, the "value" is based upon an indirect conspiracy to make it difficult or impossible to use the media you've already paid for, making the end result a tax on the technological have-nots.

Going forward, this situation is primed to worsen steadily. As I mentioned earlier, there are Trojan horses in the digital television picture, as copyright protection mechanisms such as HDCP are unavoidably bundled with new hardware. Already it is clear that the technological elite will always be able to circumvent such mechanisms, and if not, will probably continue to be able to "borrow" content from the Internet in formats that allow the freedom that can't be paid for.

Free Speech, Not Free Beer -- I want to be clear which argument I am not making. We do not and should not have unlimited rights to any and all media. I'm not arguing for the abolition of copyright; even authors who serially release their works into the public domain or Creative Commons would insist upon their right to continue to choose to do so.

Likewise, it's a diversion from my argument to frame this solely in terms of economic cost. Cost is an issue, of course, but not the primary one; there is nothing unethical about Columbia Pictures attempting to charge me $12 to watch a movie in a hotel room. What is unethical, in my view, is the crippling of essential technologies for the sole purpose of allowing that $12 tax on the technologically unsophisticated to exist. The question we need to ask ourselves is not how we need to protect the creators of content, but rather, what societal costs are we paying when technology is designed to fail because we value protecting a movie over all other uses the technology may have?

There should be a way to create consensus on how we should interact with media. Restrictive technologies, computers that are designed to fail, and punitive laws that prop up those technologies do not advance that discussion or society in general. The more we tolerate such activities, the more we purchase these products with no argument, the greater the danger that we allow the 21st century to develop with corporate control trumping our rights to free speech amongst ourselves. There's more to come, so stay tuned.

[Special thanks for valuable commentary on drafts of this article go to Adam Engst, Tarleton Gillespie, Peter Hirtle, and Fred von Lohmann. Jeff will be presenting a talk on this topic to IEEE Philadelphia on 20-May-08.]
http://db.tidbits.com/article/9611





How Do We Fight Corporate Control of the Internet?
Annalee Newitz

Last week I wrote about the premise of Oxford professor Jonathan Zittrain's new book, The Future of the Internet and How to Stop It (Yale University Press). He warns about a future of "tethered" technologies like the digital video recorder and smartphones that often are programmed remotely by the companies that make them rather than being programmed by users, as PCs are. As a partial solution, Zittrain offers up the idea of Wikipedia-style communities, where users create their own services without being "tethered" to a company that can change the rules any time.

Unfortunately, crowds of people running Web services or technologies online cannot save us from the problem of tethered technology. Indeed, Zittrain's crowds might even unwittingly be tightening the stranglehold of tethering by lulling us into a false sense of freedom.

It's actually in the best interest of companies like Apple, Comcast, or News Corp to encourage democratic, freewheeling enclaves like Wikipedia or MySpace to convince people that their whole lives aren't defined by tethering. When you get sick of corporate-mandated content and software, you can visit Wikipedia or MySpace. If you want a DVR that can't be reprogrammed by Comcast at any time, you can look up how to build your own software TV tuner on Wikipedia. See? You have freedom!

Unfortunately, your homemade DVR software doesn't have the kind of easy-to-use features that make it viable for most consumers. At the same time, it does prove that tethered technologies aren't your only option. Because there's this little puddle of freedom in the desert of technology tethering, crowd-loving liberals are placated while the majority of consumers are tied down by corporate-controlled gadgets.

In this way, a democratic project like Wikipedia becomes a kind of theoretical freedom -- similar to the way in which the U.S. constitutional right to freedom of speech is theoretical for most people. Sure, you can write almost anything you want. But will you be able to publish it? Will you be able to get a high enough ranking on Google to be findable when people search your topic? Probably not. So your speech is free, but nobody can hear it. Yes, it is a real freedom. Yes, real people participate in it and provide a model to others. And sometimes it can make a huge difference. But most of the time, people whose free speech flies in the face of conventional wisdom or corporate plans don't have much of an effect on mainstream society.

What I'm trying to say is that Wikipedia and "good crowds" can't fight the forces of corporate tethering -- just as one person's self-published, free-speechy essay online can't fix giant, complicated social problems. At best, such efforts can create lively subcultures where a few lucky or smart people will find that they have total control over their gadgets and can do really neat things with them. But if the denizens of that subculture want millions of people to do neat things too, they have to deal with Comcast. And Comcast will probably say, "Hell no, but we're not taking away your freedom entirely because look, we have this special area for you and 20 other people to do complicated things with your DVRs." If you're lucky, Comcast will rip off the subculture's idea and turn it into a tethered application.

So what is the solution, if it isn't nice crowds of people creating their own content and building their own tether-free DVRs? My honest answer is that we need organized crowds of people systematically and concertedly breaking the tethers on consumer technology. Yes, we need safe spaces like Wikipedia, but we also need to be affirmatively making things uncomfortable for the companies that keep us tethered. We need to build technologies that set Comcast DVRs free, that let people run any applications they want on iPhones, that fool ISPs into running peer-to-peer traffic. We need to hand out easy-to-use tools to everyone so crowds of consumers can control what happens to their technologies. In short, we need to disobey.
http://www.alternet.org/columnists/story/86205/





Zuneral this Saturday!

We regret to report the sudden, unexpected death of Digital Rights Management. Details of the tragedy at present remain unclear, but he was rushed to the hospital following a direct collision with an oncoming future last week at 10 PM. He was seven years old.

Zuneral Services
May 24th (this Saturday)
6:30 PM
JFK Park, Memorial Drive
Cambridge, MA

Yesterday, in preparation of the public funeral that will take place this Saturday, members of Harvard College Free Culture entombed the recently-deceased Digital Rights Management in Quincy Courtyard at around 5 PM. As part of the healing process, all the attendees took part in saying goodbye to DRM by constructing its coffin.

The decedents are encased into their pourable-but-not-too-liquidy coffin

The final funeral and burial services for the recently deceased will take place at 6:30 PM on Saturday, May 24th in Cambridge’s JFK Park. A reception will follow to give attendees the chance to reminisce of the short life and accomplishments of DRM and to grieve together.
http://www.hcs.harvard.edu/~freecult...this-saturday/





Netflix Player by Roku

CNET Editors' Rating
7.7/10
Very good

Product Summary

The good: Streams Netflix Watch Now titles to your TV; affordable $100 price tag; unlimited viewing with no additional charge beyond standard ($8.95 or higher) monthly Netflix fee; PC-free movie watching; simple setup; includes built-in wired and 802.11g Wi-Fi networking; works with all TVs; upgradeable firmware allows for new features, interface improvements, and bug fixes.

The bad: While growing, the number of Watch Now titles currently available for streaming is still pretty paltry, especially when it comes to popular recent releases; video quality doesn't come close to DVD or HD; far too many titles don't appear in their original wide-screen version; no surround sound; can't manipulate queue via TV screen; yet another box under the TV.

The bottom line: While it's still a work in progress--and currently lean on quality content--the Netflix Player's simple operation, overall convenience, and cheap price makes it a compelling option for Netflix subscribers looking for instant gratification.
http://reviews.cnet.com/digital-medi...-33018087.html





Magicians Ask: What’s Up His Sleeve?
Stephanie Rosenbloom

Los Angeles

CHANCES are you’ve never heard of John Gaughan.

He doesn’t advertise. He doesn’t have a Web site. There is no street entrance to his workshop, a former 1930s aircraft school alongside railroad tracks on a dry, industrial stretch of road that straddles the city limits of Los Angeles and Glendale. Visitors must drive around back, past stacks of steel beams and cans of spray paint, toward a chain-link fence topped with barbed wire.

That Mr. Gaughan, 68, is not easily found befits an artisan who has spent most of his life creating large-scale illusions for many of the world’s most famous magicians and illusionists: Siegfried & Roy, David Blaine, Criss Angel, David Copperfield, Doug Henning, Mark Wilson, Ricky Jay.

He has also created stage illusions for enchanters of a different sort: Jim Morrison, Elton John, Michael Jackson, Alice Cooper, Barbra Streisand, Cher.

Yet while Mr. Gaughan’s artistry has, for instance, helped Mr. Angel seemingly jump through the body of another man, Mr. Gaughan doesn’t get the glory. In the world of legerdemain, his are vital but unseen hands.

“You know, in the old days of comedy there was a Charlie Chaplin and then there were the rest of the comedians,” said Milt Larsen, who in 1963 founded the Magic Castle in Hollywood, the clubhouse of the Academy of Magical Arts, which promotes the art and history of magic. “In music, there was Irving Berlin and then there were the rest of the composers. There’s always some king of the pack, and as far as I’m concerned, Johnny Gaughan is the king of the pack.”

In online forums, where science and magic buffs debate how illusionists seemingly defy the laws of physics, there are those in the know who succinctly answer: “All I have to say is John Gaughan.”

Follow Mr. Gaughan out of the sunlight, beneath an arch of iron griffins and into his warehouse. He shares it with a pair of shrieking parrots: Luther (retired from a circus in Buenos Aires) and Max (who used to wow the crowds at Busch Gardens). The space is filled with satyrs’ heads, masks, handcuffs used by Harry Houdini, a glass box penetrated with swords, a videotape labeled “floating heads.”

Discomfortingly human-looking automatons, frozen at a chess board or on a trapeze, peer from dusty corners.

“It’s pretty spooky at night in here,” said Mr. Gaughan, winding across uneven floors toward a little office practically wallpapered with 18th- and 19th-century magic props (wands, wooden hands, tiny cages, a spirit bell to conjure the dead).

In the digital age, when magicians have slick rock-style television programs and their illusions are on YouTube, Mr. Gaughan runs a low-tech operation. Three men work in his shop, and much of what is there is from another era, when a magician could send a chill through an audience by simply evoking Mephistopheles (as opposed to having himself run over by a steamroller like Mr. Angel has done).

“The way we do it here, we just get a piece of plywood and just start cutting and whaling on it,” said Mr. Gaughan, who in the abracadabra industry is known for “big magic,” such as levitating and morphing a beast into a prince in Broadway’s “Beauty and the Beast.” “We don’t even draw pictures or anything because it has to be built for your eye and in all different directions.”

He helped create illusions and props ranging from the trick wheelchair that concealed Gary Sinise’s legs in the film “Forrest Gump” to levitations at the Kabuki-za Theater in Tokyo. For a television show with Mr. Blaine, Mr. Gaughan worked on an illusion in which a woman’s watch vanishes and reappears down the street in the display window of a jewelry store. Mr. Blaine then picks up a piece of newspaper, holds it to the store window and pulls the watch out without cracking the glass.

Mr. Blaine said in an e-mail message that Mr. Gaughan is “a magical genius.”

Mr. Gaughan said he admires Mr. Blaine’s integrity: “He doesn’t use any stooges at all.”

Stooges, or audience plants, are commonly used by magicians and stunt performers. “That’s kind of the assumption,” Mr. Gaughan said. “You know, I can’t really say one way or the other because of — I just shouldn’t.”

Keeping secrets, not only from the public but also from other illusionists, is essential to Mr. Gaughan’s reputation.

“The reason people come to John is that they trust him,” said Jim Steinmeyer, an illusion designer who has collaborated with Mr. Gaughan. “They would stop coming to him if they didn’t.”

Mr. Copperfield and Siegfried & Roy, through publicists, declined to comment for this article. A publicist for Mr. Angel did not respond to interview requests.

Nowadays Mr. Gaughan is one in a circle of elders of magic. But growing up in Dallas he was just another boy who hung around a shop called Douglas Magicland.

“I was the demonstrator and he was the kid who would come in,” recalled Mark Wilson, 79, the magician who produced and starred in network television’s first weekly magic series, “The Magic Land of Allakazam,” shown on CBS and ABC in the early 60s.

Before long, Mr. Gaughan, then 14, began working for Mr. Wilson and his assistant (and wife), Nani Darnell. “He would help us put magic kits together that we would sell in department stores,” said Mr. Wilson, who has taught the likes of Cary Grant, Dick Van Dyke and Johnny Carson to perform tricks.

In 1961, Mr. Gaughan followed Mr. Wilson to Los Angeles, where he also studied industrial design at California State University. As Mr. Wilson’s star rose, he opened his own workshop in a house on Venice Boulevard. During the Watts riots, Mr. Wilson said, “Johnny went to the house and stayed all night to be sure everything was safe.” (Mr. Gaughan said he was perched on the roof with a fire extinguisher.)

Eventually, Mr. Wilson moved his operation to the space that is Mr. Gaughan’s shop (though he is relocating to another site about three miles away).

Mr. Gaughan is also a top collector of magic memorabilia, restoring antique devices and replicating lost creations such as the Turk, a famed 1700s chess-playing automaton that rarely lost a game, trouncing Benjamin Franklin and Napoleon Bonaparte, according to legend. It was destroyed in a fire in 1854. Using a couple of pieces that survived the fire, Mr. Gaughan succeeded in building a working replica of the automaton after some 25 years.

“There are 8 or 10 people that build illusions,” said Mr. Steinmeyer, who is the author of “Hiding the Elephant: How Magicians Invented the Impossible and Learned to Disappear.” “To me, what’s unique about John is his interest in historical work.”

Mr. Steinmeyer and other professionals credit Mr. Gaughan with unraveling enduring mysteries and reintroducing them to modern magicians. “What’s a shame is that secrets fall out of fashion,” Mr. Steinmeyer said.

IN describing Mr. Gaughan’s abilities, his peers point to a 20th-century illusion called “Impossibilities” created by Dr. Samuel Cox Hooker, which, as Mr. Wilson described it, has “fooled every major magician in the country.”

Mr. Gaughan acquired the illusion from Dr. Hooker’s estate, cracked its secrets and performed it twice at the Los Angeles Conference on Magic History. Playing cards rise and lower at his command, and a disembodied teddy bear head floats off a table.

Mr. Wilson had read about the illusion and thought: “Well, of course if I see it I’ll understand it. I’ll know how to do it.”

But that was not the case.

“He just fooled the hell out of me,” said Mr. Wilson, quickly apologizing for his enthusiastic language. Even so, he said, “I don’t think I want to know how to do it because I enjoy being fooled.”

And Mr. Gaughan enjoys fooling. Standing beside the legendary chess-playing Turk, he said: “There’s been over 800 different books and articles and plays, even films, about this piece, and no one ever got it right. The way I got it was I found some letters in one library written to another guy that was in another museum and put them together and it kind of told the story.”

The resurrected automaton has been on tour, including to Hungary, the homeland of its builder, Wolfgang von Kempelen. “It still fools people,” Mr. Gaughan said.
http://www.nytimes.com/2008/05/18/fashion/18magic.html





Indiana Jones And The Kingdom Of The Crystal Skull Review

After nearly twenty years, Dr. Jones is back in cinemas. And how is he liking the fifties, we wonder...?
Mike Jennings

The world of entertainment has been awash with high-profile comebacks in the last couple of years. Doctor Who, of course, has proven to be a huge success on the small screen, and Led Zeppelin have joined a veritable festival of bands to embark on money-spinning tours. Next week, another blockbuster will be delivered to our screens in the form of ultimate chick-flick, Sex and the City.

Sure, they’ve been successful – some hugely so. But this is an entirely different trove of treasure. It’s Indiana Jones, and there will be hell to pay if Spielberg has screwed it up.

I’m happy to report that he hasn’t, not by a long shot. Indiana Jones and the Kingdom of the Crystal Skull is an absolute triumph, and a picture-perfect tribute to one of cinema’s great action franchies. It’s also a little deeper than that, too, pleasing fans with self-referential wry humour and a dollop of sensible direction alongside some of the more lunatic elements of the story.

Not to give anything away, but the plot is a little bit mental. Sure, Raiders of the Lost Ark had its Nazis, The Temple of Doom had human sacrifice and The Last Crusade had, well, the Crusades, but Kingdom of the Crystal Skull could well top that for having an odd, out-there plot. But it fits in this movie – the plot is as over the top as some of the action, and that’s what makes it such a joy to watch.

And plenty of action there is, too. Reams of set pieces are torn from the screen and practically land in your lap, leaping from celluloid to eyelid with vivacity, weight and huge amounts of enjoyment.

A conscious decision in production was made to steer clear of CGI effects when possible and perform stunts the old-fashioned way, and it’s certainly paid off – everything, from sword-fights on duelling jeeps to motorcycle chases and mad dashes through ancient ruins and treasure-filled warehouses feels suitably weighty and satisfying.

Punches make ridiculous sounds – it’s not so much Sylvester Stallone punching sides of beef as Thor giving Zeus a damn good hiding with his hammer – and it makes for a hugely enjoyable couple of hours.

The rest of the stunts are fantastically done, exhibiting plenty of the old imagination and endeavour that’s made the Indiana Jones franchise such a powerful force. It’s also endearing to see that most of the cast performed their own stunts – even Harrison Ford. Watching the cast close-up during these moments is always better than gazing at the back of some stunt-man’s head.

Of course, Harrison Ford has gotten a little bit older since he last appeared as the legendary Dr Henry Jones Jr. This is referenced several times throughout – often by the surprisingly excellent Shia LeBeouf, as Mutt – and contributes to several funnier moments. It’s gratifying that his aging hasn’t been ignored, and Indy hasn’t been painted as an immortal action hero whose wrinkles have been removed in post-production. It’s a far better movie for it.

Ford’s older, wiser Jones isn’t just a comedy addition to an established individual; it’s been used to develop the character, too. Often, it’s through regression: watching Indiana hurtle around caves and use his ingenuity to fight off fifteen guys is total escapism and harks back to the old days. But he’s also got the older, wiser cynicism and grumpiness that you might expect of someone that age.

LeBeouf has come in for criticism before the film’s even hit cinemas, and for no reason other than that a fair few people didn’t seem to enjoy his performance in Transformers. As Indiana’s sidekick he’s generally excellent, bringing a new, paternal dimension to the pairing.

Ray Winstone is also good, acting some action to his CV alongside the countless gangster movies. Karen Allen even reprises her role as the superb Marion Ravenwood, easily slipping back into the role she made her own back in Raiders of the Lost Ark. John Hurt and Jim Broadbent appear, too, and are great, as usual.

In fact, the only real weak link in the cast is Cate Blanchett, playing the typically evil Russian villain. It’s pretty much the only depthless character in the movie, and it shows – everything seems geared towards mimicking the classic Communist cliché, and that seems to have been enough for Spielberg. She’s especially weak in the first half of the movie, coming into her own as the slightly ludicrous ending draws nearer.

Luckily, her performance is often masked by the stunning and atmospheric surroundings. Globe-trotting has often been Indiana’s forte, and there’s no shying away from that here, with dank caves, epic ruins, lush jungles and Indy’s college campus all featuring.

Each is produced with aplomb, too, looking as though you could reach out and touch them. Several scenes also highlight the superb lighting that lends the various sets an extra layer of adventurous atmosphere. They’re thick with cobwebs, dust, and thousands of years of dirt and grime – and that’s just Indy’s grizzled face. Luckily, his surroundings follow suit.

One minor complaint could be, potentially, the ending, which may feel a little rushed – quite a lot happens in a pretty short space of time and just about shoe-horns the film under the two hour limit. However, it’s almost forgivable here; Indiana Jones is about break-neck action and an endless soppy ending – I’m thinking Return of the King – probably wouldn’t feel right at all. It’s a tidy way to wrap things up, but leaves you especially aching for more.

Blanchett and the rushed ending aren’t huge issues, though, in the face of a true summer blockbuster. It’s everything an Indiana Jones film should be: stunning action sequences, a silly – yet riveting – plot, Russians, curses, tombs, caves, jungles, whips and Fedoras, allied with a mountain of adventure and a truckful of nostalgia.

It’s released on Thursday, so do yourself a favour and step back in time to the Indiana Jones classics of a couple of decades ago: it’s two hours of pure entertainment and escapism. And after all, it’s a hell of a lot better than Sex and the City.
http://www.denofgeek.com/movies/5698..._review.ht ml





Call Him the Worst Director (Then Duck)
John Schwartz

This seems to pain Mr. Boll, a gregarious 42-year-old German whose best-known movies are based on video games. So he has shared the pain with his critics, literally, challenging several to a series of boxing matches in 2006. Mr. Boll, a former boxer, thumped them handily.

But what he really wants is respect.

There is a Web site called StopUweBoll.org, with a petition demanding that he stop making movies. The petition had drawn only 18,000 names until last month, when Mr. Boll told the horror-movie Web site FearNet.com that he would quit making films if a million people signed. With his own version of “bring it on,” the list has now grown to more than a quarter of a million.

Why play along? “I have to live with it,” Mr. Boll said with an unhappy smirk. “It’s better to make fun with it,” as an alternative to “being depressed, sitting at home, slowly crying.”

We won’t even talk about UweBollIsAntichrist.com.

During a lunch interview in New York, he pressed a freshly copied DVD into a reporter’s hands. It was a rough cut of a serious film he’s been working on, about a brutal prison rape in Germany in 2006. “I would be interested to see what you think about it,” he said.

He also noted that there are counterpetitions urging him to keep making films. At least part of what is going on, he argued, is an online pile-on, a “can you top this?” game with Mr. Boll on the bottom.

“Is it the movies are all so bad?” he asked. “Something is not fitting together in the story, that I’m the worst of the worst.”

Mr. Boll’s most recent film, “Postal,” might not be the best vehicle for winning respect. The first sequence of the film, which opens on Friday, portrays 9/11 hijackers squabbling over the precise number of virgins who will be awaiting them after their martyrdom. The scene switches to a World Trade Center’s-eye view of an oncoming jet.

As the movie’s scattershot plot rocks along, the audience gets a long full-frontal look at a nude Dave Foley, the boyish comic best known for his work in the Kids in the Hall comedy troupe and on the television show “News Radio,” who portrays a sleazy satyr of a cult leader. By the time the film’s protagonist, played by Zack Ward, uses a cat for a silencer, the boundaries of good taste have been left so far behind that the Hubble Space Telescope couldn’t spot the border signs.

Considering the gross-out and sexual-humor quotient of many recent films, “Postal” could well find an audience. The raucous crowd at a screening presented by the New York City Horror Film Festival last month erupted in laughter for every startlingly transgressive joke. As a couple left the theater, a woman told her date, “It made no sense, but it was hysterical.”

“Postal,” like Mr. Boll’s “BloodRayne,” “Alone in the Dark” and “In the Name of the King: A Dungeon Siege Tale,” originated as a violent video game. Many of the reviews for those films have been startlingly negative. A reviewer for Entertainment Weekly wrote of “Alone in the Dark,” which starred Christian Slater, Tara Reid and Stephen Dorff, “Far be it from me to dismiss a man’s effort in a sentence, but the film on your teeth after a three-day drunk possesses more cinematic value.”

As vicious as many of the professional reviews have been, video gamers’ online critiques are even more vituperative, and largely unprintable. Some of their complaints sound a bit like those of Jane Austen fans who decry adaptations that miss the essence of their beloved author’s canon. Except that instead of lamenting, say, the way the filmmakers behind “Northanger Abbey” completely misunderstood the importance of the humorous references to Anne Radcliffe’s masterpiece, “The Mysteries of Udolpho,” they excoriate Mr. Boll for shifting the story of “BloodRayne” from Nazi Germany to 18th-century Romania. They also think Rayne’s outfit is not hot enough.

The reaction of gamers is not based solely on the faithfulness of the way the games are interpreted, said Daniel Morris, publisher of the world’s best-selling PC-games magazine, PC Gamer. “One thing to understand is that gamers face a certain geek stigma,” he said. “And it’s certainly not helped when movies come out based on games, and the movies are just no good.”

Mr. Boll’s defenders do not claim that his films are great art. But they do say he’s not that bad.

Sam Beddoes, a freelance Web designer in England who has a Web site, HooplaNet (hooplanet.co.uk), that runs reviews and humor, said in an e-mail interview, “I don’t think anybody deserves the kind of abuse the Internet gives Uwe.” (It’s pronounced OO-veh.) Although he called Mr. Boll’s “House of the Dead” “laughable (Sorry, Uwe!),” he said he found his other films “far better than anybody has given credit for.”

Mr. Boll’s films have been compared to the output of Troma Entertainment, which includes “The Toxic Avenger” and “Surf Nazis Must Die.” Lloyd Kaufman, the co-founder of Troma, said he found “Postal” “pretty funny” and called it “a kind of Troma fromage” — or, rather, hommage. Mr. Boll, he said, is “heroic, and a genuine independent spirit,” but also safe for reviewers to attack because he is not tied to the big Hollywood companies and the advertising dollars they wield. “They can’t say that Michael Bay is a no-talent.”

The film industry is certainly not helping Mr. Boll. Earlier this month he received an e-mail message from the chief buyer for the Regal Entertainment Group, the largest theater chain in the country, informing him that Regal would not be exhibiting “Postal”: “While I have respected your past work this film falls short of the type of product the Regal Theater Group would consider commercial.”

Mr. Boll denounced the decision as politics. (The film portrays President Bush as not only in league with Osama bin Laden but also in love with him.) “We still aim for 1,000 screens,” he said. (Mr. Boll’s own company is distributing the film.)

Mr. Boll said his business model can take such disappointments. The films may perform modestly at the box office (“In the Name of the King,” for example, has brought in $11.8 million worldwide), but that represents about 15 percent of his revenues, with television, DVD rights and video on demand bringing in the rest. Provisions in the German tax code allow his investors to benefit through write-offs. And he stays away from the Hollywood system, producing the movies himself.

“Because I don’t have in-between people,” he said, “I make more money.”

Mr. Boll’s defense of his work is equally straightforward. “I don’t make political decisions that can destroy the earth,” he said. “I make movies.”

Which is not to say that he won’t wallop those who ridicule him. The boxing matches, in September 2006, left one of his opponents vomiting and sucking oxygen from a tank. One of the people he fought, Rich Kyanka of the comedy Web site Something Awful (somethingawful.com), complained at the time that Mr. Boll had suggested the match was only for show.

Mr. Kyanka, via e-mail, declined comment. “The guy’s essentially a real life troll,” he wrote. “Boll wants people to talk about him so he can get free publicity.” He added, “I’m not going to feed him.”

Those who have worked with Mr. Boll say they see a different man. Mr. Foley said he found him, in person, to be “quite a sweet guy” but tough.

Why work for the director called the worst in the world? “I knew nothing about Uwe Boll” at first, Mr. Foley said. He watched “BloodRayne,” he said, and found it so over-the-top gory that “it made me laugh.” It had, he said, the absurd feel of a Terry Gilliam film.

Mr. Boll is “like a quintessential German intellectual artist who has almost taken film arbitrarily as the medium he’s going to work in. The art form is, almost, in being hated,” Mr. Foley said. Comparing him to the comedian Andy Kaufman, he added, “It’s his relationship with the audience that is his creation, his relationship with the critics, more than the movies.”

What, then, does that make an actor like, say, Dave Foley?

“A pawn, I suppose, a bit of pigment on the canvas,” Mr. Foley said.

“This is either going to be the worst movie I’ve ever been in, or it’s going to be brilliant,” he said. “There’s not any middle ground.” Of course, he added, “I hope it’s brilliant.”

The creator of the StopUweBoll.org petition is Bert Harvey, a 29-year-old game designer at Flying Lab Software, near Seattle. “I really think that he is the P. T. Barnum of our generation, and even bad press is good press for him,” Mr. Harvey said.

If Mr. Harvey’s petition tops a million signatures, Mr. Boll says, he will insist on a careful examination of the results. “I cannot accept that this is, like, a hundred thousand people voting 10 times,” he said. But if that total isn’t reached, critics will still have the consolation that Mr. Boll will appear as a character in the upcoming video game Postal III.

“They can kill me every day of their life,” Mr. Boll said. “As long as I’m able to make movies, I’m happy.”

John Metcalfe contributed reporting.
http://www.nytimes.com/2008/05/18/movies/18schw.html





Heavy Metal, Light on the Success
John Anderson

AT the opening night party of the recent Hot Docs film festival in Toronto the crowd mostly consisted of the usual suspects. City bigwigs, nonfiction filmmakers, Canadian academics, programmers, the press. But there were also what appeared to be members of a biker gang. And that guy over there, wasn’t he in the film drinking a beer through his nose?

If movies are supposed to bring people together, “Anvil! The Story of Anvil” was fulfilling its mission, working pan-cultural magic on the Hot Docs crowd, just as it had in January at the Sundance Film Festival, where it was an out-of-competition hit and the talk of the shuttle buses. The story of a 30-year-old unheralded heavy-metal band (and a few of its fans; see above), “Anvil!” has been chosen as the centerpiece of the Los Angeles Film Festival next month. And the film and band land in Brooklyn on May 31, as part of the Sundance Institute at BAM series.

Like the vapor trail of a rock-arena smoke machine, uncommon fellowship has followed “Anvil!” since its germination in a Toronto restaurant four years ago. At that dinner was an unusual trio: Sacha Gervasi, a suave British screenwriter (“The Terminal”); Rebecca Yeldham, a producer attending the Toronto Film Festival in support of her film “The Motorcycle Diaries”; and the lead singer-guitarist for the largely unheralded Canadian heavy-metal band Anvil, Steve Kudlow, called Lips, who in the 1980s liked to appear onstage in a bondage harness, playing slide guitar with a sex toy.

Mr. Gervasi and Ms. Yeldham had been looking for a project to do together, but as Mr. Gervasi recalled, Ms. Yeldham’s eyes glazed over at the Anvil idea.

“I had no interest in metal music,” Ms. Yeldham said. “In the ’80s I was listening to the Go-Gos.”

At some point during their meal Mr. Kudlow made a melancholy admission: During one of his many less-than-glamorous, non-rock ’n’ roll careers, he had delivered fish to that same restaurant. After all those years of lugging in the snapper and cod, this was the first time he had sat in the dining room.

“Rebecca knew then,” Mr. Gervasi said, “that there was a movie here.”

Summarized by some as a real-life “This Is Spinal Tap,” “Anvil!” tracks Mr. Kudlow, the drummer Robb Reiner and their long slog through a morass of record company rip-offs, incompetent management, under-publicized tours, changing tastes, a reunion with the former producer and the creation of a new album. The film wasn’t sold in a Sundance price war and hasn’t yet made anyone’s career (although traffic and CD sales have increased on the band’s Web site, anvilmetal.tk).

And yet for everyone involved, it has been a success. “Whatever happens with the movie from here on in is sort of irrelevant,” said Mr. Gervasi, who worked as an Anvil roadie when he was 15. (Later he worked for Ted Hughes, the British poet laureate, as an assistant.) “It’s already a success in terms of achieving what we wanted to achieve.”

Money was never Anvil’s motivation. “I can’t envision myself being a millionaire,” Mr. Kudlow said, “but I can envision myself going to a gig every night and making enough money to make ends meet. I want to be the biggest bar band in the world and work endlessly.”

Given Anvil’s snake-bit history — its original lead singer was killed in a highway accident when a shipping container fell off a truck — it’s unwise to speculate about where the movie will take the group. As the tongue-in-cheek title “Anvil! The Story of Anvil” implies, Anvil takes itself less seriously than Metallica, Iron Maiden, Anthrax or any of the other heavy metal bands for whom blinding guitar speed, studded leatherware and general bombast proved a route to success. Anvil never achieved fame and fortune, but it never stopped playing either.

For three decades Mr. Kudlow and Mr. Reiner have kept Anvil together, entertaining hope that the band might return to its brief mid-1980s glory, though even that never involved big paydays. Mr. Kudlow said the band was owed hundreds of thousands of dollars in unpaid royalties by record companies he would rather not name. Mr. Gervasi noted with a smile that one of the companies that rejects the band in the movie recently expressed an interest in signing it.

“I think they find that hilariously ironic,” Mr. Gervasi said. “And a couple of years ago they might have jumped at the chance, but Lips told me all a label does is market a band, and since they have the movie to do that, why on earth would they sign their lives away?”

Mr. Gervasi, who mortgaged his home in the Hollywood Hills to finance this film, said he made it with Ms. Yeldham “because I needed to make a statement I was in control of.”

“That doesn’t mean,” he added, “I’m not grateful for having the greatest, most highly paid day job in the world.” But “The Terminal,” which was directed by Steven Spielberg and starred Tom Hanks, “became their movie,” Mr. Gervasi said. “I couldn’t have had a bigger Hollywood experience, but I want to make stories that connect with people and feel they come from me and it was really hard for people to hear what I had to say because —— ”

“The voice got lost along the way,” Ms. Yeldham interjected.

The appeal of “Anvil!” is that it’s about dreams being neither realized nor abandoned. The band’s story is also about opposites — Mr. Kudlow, for whom the glass is always half full, and Mr. Reiner, who isn’t so sure — not just attracting, but staying together.

“My initial reaction to the film was, ‘Who cares about this?’ ” Mr. Reiner said by phone. “The Toronto Sun here did a big blowout on the movie being at Hot Docs and a big picture of the band. I’m shocked at what’s going on. And when I saw how audiences reacted at Sundance, it opened my eyes that this movie has something else to it.”
http://www.nytimes.com/2008/05/18/movies/18ande.html





Regal Plans to Add 3-D Movie Screens

The Regal Entertainment Group, the world’s largest cinema operator, has reached an agreement to equip 1,500 screens to show three-dimensional films.

The accord, with Real D, will allow Regal to show 3-D movies in most American markets, the company, based in Knoxville, Tenn., said in a statement on Tuesday.

Regal will install the technology once Digital Cinema Implementation Partners, a group of theater exhibitors, completes plans for an industry conversion to digital projectors.

Studios are producing more films in 3-D. DreamWorks Animation SKG and Walt Disney’s Pixar unit pledged to make 3-D versions of every film starting next year.
http://www.nytimes.com/2008/05/21/bu.../21cinema.html





Hip-Hopper Is Pardoned by Governor
Kirk Semple

During a federal immigration hearing in 1995, Gov. David A. Paterson, then a New York State senator, testified on behalf of the hip-hop pioneer Ricky Walters, who was facing deportation to his native Britain for convictions on attempted murder and weapons charges.

The immigration judge decided to block the deportation of Mr. Walters, known as Slick Rick, who had shot and wounded a relative and another man in 1990. But an immigration appeals court overturned the decision later that year, prompting a renewed effort by federal immigration officials to deport him.

On Friday, 13 years after he first took the stand on behalf of Mr. Walters, Mr. Paterson again came to the musician’s defense, granting him a rare pardon of his criminal convictions.

In issuing the pardon, Mr. Paterson cited Mr. Walters’s clean record during his prison term as well as his community volunteer work and antiviolence counseling of young people. Mr. Walters, the governor said, “has been living without incident in the community for more than 10 years.”

The pardon allows Mr. Walters, 43, to seek federal relief from deportation and permission to remain in this country, where he has lived since 1976. Under federal law, a resident alien convicted of an aggravated felony or weapons offense can be deported.

The pardon erases the attempted murder conviction as grounds for deportation, his lawyers said, but Mr. Walters must still seek a waiver for the weapons conviction. His lawyers do not expect opposition by immigration officials to his request.

“This has been a long and difficult road and I am happy for this to be settled once and for all,” Mr. Walters said in a statement issued by a public relations firm. “I look forward to enjoying this time with my family and friends and to continue leading an honest and productive life.” Mr. Walters, who lives with his wife and two children in an apartment building he owns in the Bronx, declined to be interviewed.

Michael Krinsky, one of Mr. Walters’s lawyers, said he planned to submit a request for a waiver of deportation on behalf of his client within the next two weeks.

The pardon was only the 10th issued by a New York governor since the administration of Gov. Nelson A. Rockefeller, said Erin Duggan, a spokeswoman for Mr. Paterson. Of the 10 pardons, 4 were intended to help thwart a deportation, she said.

Some lawyers hailed the pardon as a victory for immigrants at a time when the federal government is being far more aggressive about deportation.

“I think it’s clearly an important recognition by the governor of the need to prevent yet another injustice occurring as a result of draconian immigration laws,” said Steven Banks, the chief attorney of the Legal Aid Society, which represents immigrants with criminal records facing deportation. “Today’s pardon establishes the principle that rehabilitation is to be valued.”

Manuel D. Vargas, senior counsel with the Immigrant Defense Project of the New York State Defenders Association, said that Mr. Walters’s fame clearly helped his case. “Sadly, there are lots of folks who are in the same situation with similar favorable equities who don’t have this opportunity,” he said. “But it’s good to see that at least this one individual is getting this opportunity.”

Mr. Walters’s troubles began in 1990 when he shot and wounded his cousin and a bystander in the Bronx.

Mr. Walters, who gained worldwide fame with his 1988 hip-hop album “The Great Adventures of Slick Rick,” said that the cousin, Mark Plummer, had been extorting money from him and had arranged at least one attempt on his life.

Mr. Walters pleaded guilty to attempted murder and weapons charges. He served about five years in prison and was on work release for about a year and a half.

In 1995, Mr. Walters nearly won the right to stay in the United States. An immigration judge granted him permission to stay in the country, according to an account issued on Friday by Mr. Paterson’s office.

That year, the Board of Immigration Appeals also found that allowing Mr. Walters to remain in the United States “appears to be in the best interest of the country.”

But the appeals board had to vacate its decision on a technical ground: Mr. Walters had served five years and 33 days in prison and the law did not permit convicts who had served more than five years in prison to receive relief from deportation. Mr. Walters continued his legal fight all the same, was released on parole in 1997 and discharged from parole supervision in 2000.

Over the years, many legal, political and entertainment figures have come to Mr. Walters’s defense. Governor Paterson, who in the 1980s and ’90s knew people in the hip-hop industry, had testified in 1995 after hearing Mr. Walters speak at a church, about his “mistakes and lost opportunities,” Ms. Duggan said.

Entertainers like Will Smith, Chris Rock, Russell Simmons and Jay-Z; numerous New York legislators; the Rev. Jesse L. Jackson; and even Mr. Walters’s parole supervisor have written supportive letters to Mr. Paterson, citing Mr. Walters’s clean record and his contributions to American society, according to the governor’s office.
http://www.nytimes.com/2008/05/24/ny.../24pardon.html





Say it ain’t so Nick

OLPC's a Con - Former Insider

Departing software chief stings Negroponte
Andrew Orlowski

The former security director of the One Laptop Per Child non-profit has blasted the project for losing sight of its goals, accusing chairman Nicholas Negroponte of deceiving the public. It's all about shipping kit, says Ivan Krstić in an incendiary essay.
"I quit when Nicholas told me — and not just me — that learning was never part of the mission. The mission was, in his mind, always getting as many laptops as possible out there; to say anything about learning would be presumptuous, and so he doesn't want OLPC to have a software team, a hardware team, or a deployment team going forward," writes Krstić.

"Nicholas' new OLPC is dropping those pesky education goals from the mission and turning itself into a 50-person nonprofit laptop manufacturer, competing with Lenovo, Dell, Apple, Asus, HP and Intel on their home turf, and by using the one strategy we know doesn't work."

Ouch.

Negroponte's decision to embrace Windows has seen top-level resignations from the OLPC project. CTO Mary Lou Jepsen left in January, and former software chief and president Walter Bender departed in April. Krstić resigned in March.

OLPC is a poster child for free software innovation, with critics acknowledging value in its advances in mesh networking and the radical task-based UI Sugar. But the F/OSS ideals are now being jetissoned, writes Krstić, along with the crown jewels:

"In reality, Nicholas wants to ship plain XP desktops. He's told me so. That he might possibly fund a Sugar effort to the side and pay lip service to the notion of its 'availability' as an option to purchasing countries is at best a tepid effort to avert a PR disaster."

Not everyone thinks Sugar is a successful UI - judge for yourself in our extensive hands-on.

You can read more of this wide-ranging and thoughtful essay here.

"I’ve thought for a while that sending laptops to developing countries is simply the 21st century equivalent of sending bibles to the colonies," adds Python language author Guido van Rossum in the comments.
http://www.theregister.co.uk/2008/05/16/krstic_olpc/





Analysis: Should YouTube Censor Al-Qaida?
Shaun Waterman

Joseph Lieberman, I-Conn., called Monday for YouTube to take down al-Qaida videos that users had posted, but the site said most of the videos his office had flagged did not contain material that violated their guidelines and rejected his request that they act to remove all material from U.S. designated terror groups.

In a letter to Eric Schmidt, the chairman and chief executive officer of Google Inc., which owns YouTube, Lieberman urged the popular video-sharing service to enforce its own "community guidelines" against "graphic or gratuitous violence" and said the company should change its rules "to address violent extremist material."

In the letter, released to the media and dated Monday, Lieberman wrote that removing videos produced by al-Qaida and other extremist groups should be straightforward, because "so many of the Islamist terrorist organizations brand their material with logos or icons identifying their provenance."

In a blog posting, YouTube said it welcomed the dialogue with Lieberman but noted that "most of the videos" his office had drawn to their attention "did not contain violent or hate speech content" and had therefore not been removed from the site "because they do not violate our Community Guidelines."

YouTube, which hosts millions of videos posted every day by its user-community, also rejected the idea that it should pre-screen content for videos produced by al-Qaida and other terrorist groups.

The blog posting said the site "encourages free speech and defends everyone's right to express unpopular points of view. We believe that YouTube is a richer and more relevant platform for users precisely because it hosts a diverse range of views, and rather than stifle debate we allow our users to view all acceptable content and make up their own minds."

A Lieberman aide said the material he was concerned about went beyond the bounds of acceptable free speech.

"It is not reasonable, let alone legal, for an al-Qaida spokesman to visit the United States and try to recruit and build support here," the aide told UPI. "Why is it reasonable for the same person to do that in this virtual community?"

Al-Qaida and other groups are using YouTube in their efforts to legitimize their violence, spread their ideas and recruit potential terrorists. "Shouldn't the community guidelines ban (U.S.-)designated (foreign terrorist organizations) from using the service?" the aide asked.

The answer Lieberman's critics offer is that he is misunderstanding the nature of the Internet. "There is nothing YouTube or Sen. Lieberman can do to keep these videos off the Internet," John Morris, senior counsel at the Center for Democracy and Technology, told UPI, adding that many of the propaganda videos produced by al-Qaida and other groups "contained nothing that is illegal."

Morris pointed out that removing such material automatically might not be as easy as it seems. "The idea that they would have to review every video (posted), even by a semi-automated process, is not a practical reality."

"If automated means were used to identify material, would a news report or documentary containing the same material … be blocked or removed simply because the logo (of al-Qaida or another terror group) appeared (in it)?" asked Ben Venzke of Intel Center, a private sector contractor that monitors extremist Web communications for clients including the U.S. government.

Venzke said most were not posted on YouTube by the groups themselves, but by individuals who had found them elsewhere, "and may not even support the terrorists' goals."

"The core underlying issue," he said, "is that whether you take these videos off YouTube or not, they will always be available at numerous other locations online. New outlets are popping up constantly, and when you take one down, 10 more simply appear to fill the gap. The problem is the very nature of the Internet itself. It makes controlling and denying access to information simply impossible."

Nonetheless, Lieberman's aide said the senator was just asking the company to enforce its own rules and that many of the videos YouTube declined to take down "are in our opinion clearly in violation of the community guidelines. … YouTube is still not enforcing its own rules."

In his letter, Lieberman quoted the community guidelines: "Graphic or gratuitous violence is not allowed. If your video shows someone getting hurt, attacked, or humiliated, don't post it."

Many of the videos produced by al-Qaida's media arms in Iraq and Afghanistan "show attacks on U.S. forces in which American soldiers are injured and, in some cases, killed," wrote Lieberman.

Even though many roadside bomb attacks against coalition vehicles are shown in the mid-distance, there are plenty of other videos that show more graphic scenes. But Morris, of the Center for Democracy and Technology, noted that "top-selling movies have scenes depicting extreme violence" and that it was appropriate that YouTube should enforce its own guidelines.

The company is "quite insulated from legal liability by the U.S. Criminal Code," and "any effort to legislate (to get videos made by designated foreign terror groups off the Internet) would be struck down on First Amendment grounds."

Lieberman's aide said that Google's responsibility not to post terrorist videos was something the company "has to wrestle with. … They are the dominant player in this (video-sharing) market."

But Venzke echoed the feelings of several intelligence professionals UPI has spoken to about this issue -- that Lieberman is barking up the wrong tree. "Removing material from YouTube would have little to no effect on key terrorist groups' primary dissemination efforts," he told UPI. "There are no major jihadi groups … using YouTube as their primary release point."
http://www.upi.com/International_Sec...al-qaida/6060/





The Last Roundup: MAIN CORE
Kevin

In my case, there’s no way the programs I want to talk to Congress about should be public ever, unless maybe in 200 years they want to declassify them. You should never learn about it; no one at the Times should ever learn about these things.

—Russell Tice, Former NSA SIGINT Officer


I’m going to provide a one paragraph summary, just to make sure that the implications of this are clear to everyone:

The U.S. Government has, almost certainly, established a database and tracking system for something like eight million Americans who have been designated as threats to national security. The system is called MAIN CORE and it is being run under the auspices of highly classified Continuity of Government (COG) operations. MAIN CORE uses a variety of intelligence sources as inputs, including your email, web activity, telephone and private financial information. In the event of a major national security crisis, it is alleged that Americans listed in the MAIN CORE database, “Could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.”

The Last Roundup, by Christopher Ketcham, appeared in the May/June 2008 issue of Radar Magazine. (Full text here and here.)

Below are some excerpts from The Last Roundup. I have provided explicit pointers to the related materials on Cryptogon:

According to a senior government official who served with high-level security clearances in five administrations, “There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” [See: AT&T Invents Programming Language for Mass Surveillance]

He and other sources tell Radar that the database is sometimes referred to by the code name Main Core. One knowledgeable source claims that 8 million Americans are now listed in Main Core as potentially suspect. In the event of a national emergency, these people could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.



In the days after our hypothetical terror attack, events might play out like this: With the population gripped by fear and anger, authorities undertake unprecedented actions in the name of public safety. Officials at the Department of Homeland Security begin actively scrutinizing people who—for a tremendously broad set of reasons—have been flagged in Main Core as potential domestic threats. Some of these individuals might receive a letter or a phone call, others a request to register with local authorities. Still others might hear a knock on the door and find police or armed soldiers outside. In some instances, the authorities might just ask a few questions. Other suspects might be arrested and escorted to federal holding facilities, where they could be detained without counsel until the state of emergency is no longer in effect.



Another well-informed source—a former military operative regularly briefed by members of the intelligence community—says this particular program has roots going back at least to the 1980s and was set up with help from the Defense Intelligence Agency. He has been told that the program utilizes software that makes predictive judgments of targets’ behavior and tracks their circle of associations with “social network analysis” and artificial intelligence modeling tools. [See: Synthetic Environments for Analysis and Simulation]

“The more data you have on a particular target, the better [the software] can predict what the target will do, where the target will go, who it will turn to for help,” he says. “Main Core is the table of contents for all the illegal information that the U.S. government has [compiled] on specific targets.” An intelligence expert who has been briefed by high-level contacts in the Department of Homeland Security confirms that a database of this sort exists, but adds that “it is less a mega-database than a way to search numerous other agency databases at the same time.”

A host of publicly disclosed programs, sources say, now supply data to Main Core. Most notable are the NSA domestic surveillance programs, initiated in the wake of 9/11, typically referred to in press reports as “warrantless wiretapping.” [See: NSA, AT&T and the NarusInsight Intercept Suite]

In March, a front-page article in the Wall Street Journal shed further light onto the extraordinarily invasive scope of the NSA efforts: According to the Journal, the government can now electronically monitor “huge volumes of records of domestic e-mails and Internet searches, as well as bank transfers, credit card transactions, travel, and telephone records.” Authorities employ “sophisticated software programs” to sift through the data, searching for “suspicious patterns.” In effect, the program is a mass catalog of the private lives of Americans. And it’s notable that the article hints at the possibility of programs like Main Core. “The [NSA] effort also ties into data from an ad-hoc collection of so-called black programs whose existence is undisclosed,” the Journal reported, quoting unnamed officials. “Many of the programs in various agencies began years before the 9/11 attacks but have since been given greater reach.”

The following information seems to be fair game for collection without a warrant: the e-mail addresses you send to and receive from, and the subject lines of those messages; the phone numbers you dial, the numbers that dial in to your line, and the durations of the calls; the Internet sites you visit and the keywords in your Web searches; the destinations of the airline tickets you buy; the amounts and locations of your ATM withdrawals; and the goods and services you purchase on credit cards. All of this information is archived on government supercomputers and, according to sources, also fed into the Main Core database.

Main Core also allegedly draws on four smaller databases that, in turn, cull from federal, state, and local “intelligence” reports; print and broadcast media; financial records; “commercial databases”; and unidentified “private sector entities.” Additional information comes from a database known as the Terrorist Identities Datamart Environment, which generates watch lists from the Office of the Director of National Intelligence for use by airlines, law enforcement, and border posts. According to the Washington Post, the Terrorist Identities list has quadrupled in size between 2003 and 2007 to include about 435,000 names. The FBI’s Terrorist Screening Center border crossing list, which listed 755,000 persons as of fall 2007, grows by 200,000 names a year. A former NSA officer tells Radar that the Treasury Department’s Financial Crimes Enforcement Network, using an electronic-funds transfer surveillance program, also contributes data to Main Core, as does a Pentagon program that was created in 2002 to monitor anti-war protestors and environmental activists such as Greenpeace.

If previous FEMA and FBI lists are any indication, the Main Core database includes dissidents and activists of various stripes, political and tax protestors, lawyers and professors, publishers and journalists, gun owners, illegal aliens, foreign nationals, and a great many other harmless, average people.

A veteran CIA intelligence analyst who maintains active high-level clearances and serves as an advisor to the Department of Defense in the field of emerging technology tells Radar that during the 2004 hospital room drama, James Comey expressed concern over how this secret database was being used “to accumulate otherwise private data on non-targeted U.S. citizens for use at a future time.” Though not specifically familiar with the name Main Core, he adds, “What was being requested of Comey for legal approval was exactly what a Main Core story would be.” A source regularly briefed by people inside the intelligence community adds: “Comey had discovered that President Bush had authorized NSA to use a highly classified and compartmentalized Continuity of Government database on Americans in computerized searches of its domestic intercepts. [Comey] had concluded that the use of that ‘Main Core’ database compromised the legality of the overall NSA domestic surveillance project.”

If Main Core does exist, says Philip Giraldi, a former CIA counterterrorism officer and an outspoken critic of the agency, the Department of Homeland Security (DHS) is its likely home. “If a master list is being compiled, it would have to be in a place where there are no legal issues”—the CIA and FBI would be restricted by oversight and accountability laws—“so I suspect it is at DHS, which as far as I know operates with no such restraints.” Giraldi notes that DHS already maintains a central list of suspected terrorists and has been freely adding people who pose no reasonable threat to domestic security. “It’s clear that DHS has the mandate for controlling and owning master lists. The process is not transparent, and the criteria for getting on the list are not clear.” Giraldi continues, “I am certain that the content of such a master list [as Main Core] would not be carefully vetted, and there would be many names on it for many reasons—quite likely, including the two of us.”

http://cryptogon.com/?p=2590





Welcome to America

When writer Elena Lappin flew to LA, she dreamed of a sunkissed, laid-back city. But that was before airport officials decided to detain her as a threat to security ...
Elena Lappin

Somewhere in central Los Angeles, about 20 miles from LAX airport, there is a nondescript building housing a detention facility for foreigners who have violated US immigration and customs laws. I was driven there around 11pm on May 3, my hands painfully handcuffed behind my back as I sat crammed in one of several small, locked cages inside a security van. I saw glimpses of night-time urban LA through the metal bars as we drove, and shadowy figures of armed security officers when we arrived, two of whom took me inside. The handcuffs came off just before I was locked in a cell behind a thick glass wall and a heavy door. No bed, no chair, only two steel benches about a foot wide. There was a toilet in full view of anyone passing by, and of the video camera watching my every move. No pillow or blanket. A permanent fluorescent light and a television in one corner of the ceiling. It stayed on all night, tuned into a shopping channel.
After 10 minutes in the hot, barely breathable air, I panicked. I don't suffer from claustrophobia, but this enclosure triggered it. There was no guard in sight and no way of calling for help. I banged on the door and the glass wall. A male security officer finally approached and gave the newly arrived detainee a disinterested look. Our shouting voices were barely audible through the thick door. "What do you want?" he yelled. I said I didn't feel well. He walked away. I forced myself to calm down. I forced myself to use that toilet. I figured out a way of sleeping on the bench, on my side, for five minutes at a time, until the pain became unbearable, then resting in a sitting position and sleeping for another five minutes. I told myself it was for only one night.

As it turned out, I was to spend 26 hours in detention. My crime: I had flown in earlier that day to research an innocuous freelance assignment for the Guardian, but did not have a journalist's visa.

Since September 11 2001, any traveller to the US is treated as a potential security risk. The Patriot Act, introduced 45 days after 9/11, contains a chapter on Protecting The Border, with a detailed section on Enhanced Immigration Provision, in which the paragraph on Visa Security And Integrity follows those relating to protection against terrorism. In this spirit, the immigration and naturalisation service has been placed, since March 2003, under the jurisdiction of the new department of homeland security. One of its innovations was to revive a law that had been dormant since 1952, requiring journalists to apply for a special visa, known as I-visa, when visiting the US for professional reasons. Somewhere along the way, in the process of trying to develop a foolproof system of protecting itself against genuine threats, the US has lost the ability to distinguish between friend and foe. The price this powerful country is paying for living in fear is the price of its civil liberties.

None of this had been on my mind the night before, when I boarded my United Airlines flight from Heathrow. Sitting next to an intriguingly silent young man who could have been a porn star or a well camouflaged air marshal, I spent most of the 11-hour flight daydreaming about the city where he so clearly belonged and that I had never visited. My America had always been the east coast: as tourist, resident, journalist, novelist, I had never ventured much past the New York-Boston-Washington triangle. But I was glad that this brief assignment was taking me to sunkissed LA, and I was ready to succumb to LA's laid-back charm.

The queue for passport control was short. I presented my British passport and the green visa waiver form I had signed on the plane. The immigration official began by asking the usual questions about where I was staying and why I was travelling to the US. It brought back memories of another trip there to write a series of articles about post 9/11 America for the German weekly Die Zeit. I had written about commuters who preferred the safety of train travel to flying, and about a wounded New York that had become a city of survivors. I had seen a traumatised, no longer cockily immortal America in a profound state of mourning. But it had seemed to me that its newly acknowledged vulnerability was becoming its strength: stunned by an act of war on its own soil, Americans had been shocked into a sudden hunger for information about the world beyond their borders.

"I'm here to do some interviews," I said.

"With whom?" He wrote down the names, asked what the article was about and who had commissioned it. "So you're a journalist," he said, accusingly, and for the first time I sensed that, in his eyes, this was not a good thing to be. "I have to refer this to my supervisor," he said ominously, and asked me to move to a separate, enclosed area, where I was to wait to be "processed". Other travellers came, waited and went; I was beginning to feel my jetlag and some impatience. I asked how long I'd have to wait, but received no reply. Finally, an officer said, noncommittally, "It seems that we will probably have to deport you."

I'm not sure, but I think I laughed. Deport? Me? "Why?" I asked, incredulously.

"You came here as a journalist, and you don't have a journalist's visa." I had never heard of it. He swiftly produced the visa waiver (I-94W) I had signed on the plane, and pointed to what it said in tiny print: in addition to not being a drug smuggler, a Nazi or any other sort of criminal, I had inadvertently declared that I was not entering the US as a representative of foreign media ("You may not accept unauthorised employment or attend school or represent the foreign information media during your visit under this program").

My protestations that I had not noticed this caveat, nor been alerted to it, that I had travelled to the US on many occasions, both for work and pleasure, that I had, in fact, lived there as a permanent resident and that my husband was a US citizen, as was my New York-born daughter, all fell on deaf ears. He grinned. "You don't care, do you?" I said, with controlled anger. Then I backtracked, and assumed a begging, apologetic mode. In response, he told me I would have to be "interviewed", and that a decision would then be taken by yet another superior. This sounded hopeful.

Finally, after much scurrying around by officers, I was invited into an office and asked if I needed anything before we began. I requested a glass of water, which the interrogating officer brought me himself. He was a gentle, intelligent interrogator: the interview lasted several hours and consisted of a complete appraisal of my life, past and present, personal and professional. He needed information as diverse as my parents' names, the fee I would be paid for the article I was working on, what it was about, exactly, and, again, the names of people I was coming to interview. My biography was a confusing issue - I was born in one country, had lived in many others: who was I, exactly? For US immigration, my British passport was not enough of an identity. The officer said, pointedly, "You are Russian, yet you claim to be British", an accusation based on the fact that I was born in Moscow (though I never lived there). Your governor, went my mental reply, is Austrian, yet he claims to be American. After about three hours, during which I tried hard to fight jetlag and stay alert, we had produced several pages that were supposed to provide the invisible person in charge with enough material to say yes or no to my request to be allowed entry. My interrogator asked one last obligatory question, "Do you understand?"

"Yes, I understand," I sighed, and signed the form. The instant faxed response was an official, final refusal to enter the US for not having the appropriate visa. I'd have to go back to London to apply for it.

At this moment, the absurd but almost friendly banter between these men and myself underwent a sudden transformation. Their tone hardened as they said that their "rules" demanded that they now search my luggage. Before I could approach to observe them doing this, the officer who had originally referred me to his supervisor was unzipping my suitcase and rummaging inside. For the first time, I raised my voice: "How dare you touch my private things?"

"How dare you treat an American officer with disrespect?" he shouted back, indignantly. "Believe me, we have treated you with much more respect than other people. You should go to places like Iran, you'd see a big difference." The irony is that it is only "countries like Iran" (for example, Cuba, North Korea, Saudi Arabia, Zimbabwe) that have a visa requirement for journalists. It is unheard of in open societies, and, in spite of now being enforced in the US, is still so obscure that most journalists are not familiar with it. Thirteen foreign journalists were detained and deported from the US last year, 12 of them from LAX.

After my luggage search, the officer took some mugshots of me, then proceeded to fingerprint me. In the middle of this, my husband rang from London; he had somehow managed to locate my whereabouts, and I was allowed briefly to wipe the ink off my hands to take the call. Hearing his voice was a reminder of the real world I was beginning to feel cut off from.

Three female officers arrived to do a body search. As they slipped on rubber gloves, I blenched: what were they going to do, and could I resist? They were armed, they claimed to have the law on their side. I was an anonymous foreigner who had committed a felony, and "those were the rules". So I was groped, unpleasantly, though not as intimately as I had feared. Then came the next shock: two bulky, uniformed and armed security men handcuffed me, which they explained was the "rule when transporting detainees through the airport". I was marched between the two giants through an empty terminal to a detention room, where I sat in the company of two other detainees (we were not allowed to communicate) and eight sleepy guards, all men. I would have been happy to spend the night watching TV with them, as they agreed to switch the channel from local news (highlight: a bear was loose in an affluent LA neighbourhood) to sitcoms and soaps. Their job was indescribably boring, they were overstaffed with nothing to do, and so making sure I didn't extract a pen or my mobile phone from my luggage must have seemed a welcome break. I listened to their star-struck stories about actors they had recently seen at LAX. We laughed in the same places during Seinfeld, an eerie experience. I was beginning to think I could manage this: the trip was a write-off, of course, but I could easily survive a night and a day of this kind of discomfort before flying back. But then I was taken to the detention cell in downtown LA, where the discomfort became something worse.

Though my experience was far removed from the images of real torture and abuse at Abu Ghraib prison in Iraq, it was also, as one American friend put it, "conceptually related", at distant ends of the same continuum and dictated by a disregard for the humanity of those deemed "in the wrong". American bloggers and journalists would later see my experience as reflecting the current malaise in the country. Dennis Roddy wrote in the Pittsburgh Post-Gazette: "Our enemies are now more important to us than our friends ... Much of the obsession with homeland security seems to turn on the idea of the world infecting the US."

On a more practical level, this obsession, when practised with such extreme lack of intelligence (in both senses of the word), as in the case of my detention, must be misdirecting valuable money and manpower into fighting journalism rather than terrorism. Ordinary Americans, rather than the powers that be, are certainly able to make that distinction. According to an editor at the LA Times, there has been a "tremendous" response from readers to the reporting on my case, and I have received many emails expressing outrage and embarrassment. The novelist Jonathan Franzen wrote, "On behalf of the non-thuggish American majority, my sincere apologies."

These would have been comforting thoughts the following morning when I was driven back (in handcuffs, of course) to the communal detention room at LAX, and spent hours waiting, without food, while the guards munched enormous breakfasts and slurped hot morning drinks (detainees are not allowed tea or coffee). I incurred the wrath of the boss when I insisted on edible food. "I'm in charge in here. Do you know who you are? Do you know where you are? This isn't a hotel," he screamed.

"Why are you yelling?" I asked. "I'm just asking for some decent food. I'll pay for it myself." A Burger King fishburger never tasted so good. And it occurred to me that a hotel or transit lounge would have been a better place to keep travellers waiting to return home.

As documented by Reporters Without Borders and by the American Society of Newspaper Editors (Asne) in letters to Colin Powell and Tom Ridge, cases such as mine are part of a systemic policy of harassing media representatives from 27 friendly countries whose citizens - not journalists! - can travel to the US without a visa, for 90 days. According to Asne, this policy "could lead to a degradation of the atmosphere of mutual trust that has traditionally been extended professional journalists in these nations". Asne requested that the state department put pressure on customs and immigration to "repair the injustice that has been visited upon our colleagues". Someone must have listened, because the press office at the department of homeland security recently issued a memo announcing that, although the I-visa is still needed (and I've just received mine), new guidelines now give the "Port Directors leeway when it comes to allowing journalists to enter the US who are clearly no threat to our security". Well, fine, but doesn't that imply some journalists are a threat?

Maybe we are. During my surreal interlude at LAX, I told the officer taking my fingerprints that I would be writing about it all. "No doubt," he snorted. "And anything you'll write won't be the truth."
http://www.guardian.co.uk/world/2004...5/usa.weekend7





Report Details Complaints Over Interrogations
Eric Lichtblau and Scott Shane

F.B.I. agents complained repeatedly, beginning in 2002, about the harsh interrogation tactics that military and C.I.A. interrogators were using in questioning terrorism suspects, like making them do dog tricks and parade in the nude in front of female soldiers, but their complaints appear to have had little effect, according to an exhaustive report released Tuesday by the Justice Department’s inspector general.

The report describes major and repeated clashes between F.B.I. agents and their counterparts over the rough methods being used on detainees in Guantánamo Bay, Afghanistan and Iraq — some of which, according to the inspector general, may have violated the Defense Department’s own policies at the time.

It also provides new insight into the intense debates at senior levels of the Justice Department, the Defense Department and the National Security Council over what should and should not be allowed — a debate in which the Defense Department prevailed.

The inspector general found that in a few instances, F.B.I. agents participated in interrogations using pressure tactics that would not have been permitted inside the United States. But the “vast majority” of agents followed the bureau’s legal guidelines and “separated themselves” from harsh treatment.

For instance, F.B.I. agents expressed “strong concerns” about the abusive treatment by the C.I.A. in 2002 of Abu Zubaydah, a senior Al Qaeda figure, leading to tense discussions between senior officials at the two agencies over how such important prisoners should be handled.

Still, the bureau “had not provided sufficient guidance to its agents on how to respond when confronted with military interrogators who used interrogation techniques that were not permitted by the F.B.I.,” and that fueled confusion and dissension, the report said.

“In sum, while our report concluded that the F.B.I. could have provided clearer guidance earlier, and while the F.B.I. and DoJ could have pressed harder for resolution of F.B.I. concerns about detainee treatment, we believe the F.B.I. should be credited for its conduct and professionalism in detainee interrogations in the military zones in Afghanistan,” in Iraq and at Guantánamo Bay, the report said. DoJ refers to the Justice Department, the bureau’s parent agency.

Jameel Jaffer, who tracks detainee issues for the American Civil Liberties Union, took a more critical stance. “The report confirms that senior F.B.I. officials knew as early as 2002 that other agencies were using abusive interrogation methods,” Mr. Jaffer said. “The report shows unequivocally, however, that the F.B.I.’s leadership failed to act aggressively to end the abuse.”

He said the report documents “a failure of leadership” at the bureau, and “only underscores the pressing need for an independent and comprehensive investigation of prisoner abuse.”

The report said that several senior Justice Department Criminal Division officials raised concerns with the National Security Council in 2003 about the military’s treatment of detainees, but saw no changes as a result of their complaints.

John Ashcroft, the former attorney general, declined to be interviewed by the inspector general’s office of the department he had headed, an unusual refusal and one that hampered investigators’ attempts to learn of discussions inside the council, the report said.

A Pentagon spokesman had no immediate comment on the report.

The inspector general’s office started its investigation in late 2004, following widespread public attention to the question of detainee treatment spurred by graphic photographs of prisoners at the Abu Ghraib prison in Iraq.

The American Civil Liberties Union, through a lawsuit, also unearthed numerous internal e-mail messages from the bureau about agents’ complaints of rough interrogation tactics at Guantánamo Bay, which proved central in the Justice Department’s review.

The investigation examined about a half-million documents and included surveys of 1,000 F.B.I. agents regarding their experiences with interrogation tactics by military and C.I.A. interrogators, as well as interviews with hundreds of other bureau personnel, officials said. The investigation centered on the accounts of what the agents witnessed in the treatment of prisoners at Guantánamo Bay, in Iraq and in Afghanistan, and how those complaints were handled. The Justice Department’s inspector general does not have jurisdiction over the Pentagon.

The bulk of the report was completed last year, but its public release by the inspector general was bottled up for months because of concerns from the Defense Department about the disclosure of sensitive information centering on interrogation tactics. The final report from the inspector general, unlike some earlier terrorism investigations, was released with relatively few blacked-out sections.

The bureau stationed agents at Guantánamo Bay and other military detention sites to assist in the questioning of detainees taken into custody after the terror attacks of Sept. 11, 2001, but the rough tactics by military interrogators soon became a major source of friction between the bureau and sister agencies. Agents complained to superiors beginning in 2002 that the tactics they had seen in use yielded little actual intelligence, prevented them from establishing a rapport with detainees through more traditional means of questioning, and might violate bureau policy or American law.

One bureau memorandum spoke of “torture techniques” used by military interrogators. Agents described seeing things like inmates handcuffed in a fetal position for up to 24 hours, left to defecate on themselves, intimidated by dogs, made to wear women’s underwear and subjected to strobe lights and extreme heat and cold.

Ultimately, the bureau ordered its agents not to participate in or remain present when such tactics were used. But that directive was not formalized until May 2004, and it governed only the bureau’s own agents. Robert S. Mueller III, director of the F.B.I., told Congress that he was not made aware of his agents’ concerns until 2004.

Democrats in Congress have been anxiously awaiting the findings from the inspector general as they seek to push for answers from the Bush administration about how interrogation policies were developed. Representative Jerrold Nadler, the New York Democrat who leads a House Judiciary subcommittee on the Constitution and civil right, told reporters on Monday, in advance of the report’s release, that he sensed a “a reluctance to confront senior administration officials” about interrogation policies from the bureau and elsewhere. He said the report should help answer key questions about how policies were executed.
http://www.nytimes.com/2008/05/21/wa...detain.html?hp





10 Ways You Might be Breaking the Law With Your Computer
Debra Littlejohn Shinder

For many years, the Internet was the “final frontier,” operating largely unregulated — in part because of the jurisdictional nightmare involved in trying to enforce laws when communications crossed not just state lines but also national boundaries. That was then; this is now.

Legislation that affects the use of Internet-connected computers is springing up everywhere at the local, state, and federal levels. You might be violating one of them without even knowing it.

In this article, we’ll take a look at some of the existing laws and some of the pending legislation that can affect how we use our computers and the Internet. Nothing in this article should be construed as legal advice; this is merely an overview of some of the legislation that’s out there, how it has been interpreted by the courts (if applicable), and possible implications for computer users.

Note: This information is also available as a PDF download.

#1: Digital Millennium Copyright Act (DMCA)

Most computer users have heard of this law, which was signed in 1998 by President Clinton, implementing two World Intellectual Property Organization (WIPO) treaties. The DMCA makes it a criminal offense to circumvent any kind of technological copy protection — even if you don’t violate anyone’s copyright in doing so. In other words, simply disabling the copy protection is a federal crime.

There are some exemptions, such as circumventing copy protection of programs that are in an obsolete format for the purpose of archiving or preservation. But in most cases, using any sort of anti-DRM program is illegal. This applies to all sorts of copy-protected files, including music, movies, and software. You can read a summary of the DMCA here.

If you’re a techie who likes the challenge of trying to “crack”DRM,” be aware that doing so — even if you don’t make or distribute illegal copies of the copyrighted material — is against the law.

#2: No Electronic Theft (NET) Act

This is another U.S. federal law that was passed during the Clinton administration. Prior to this act, copyright violations were generally treated as civil matters and could not be prosecuted criminally unless it was done for commercial purposes. The NET Act made copyright infringement itself a federal criminal offense, regardless of whether you circumvent copy-protection technology or whether you derive any commercial benefit or monetary gain. Thus, just making a copy of a copyrighted work for a friend now makes you subject to up to five years in prison and/or up to $250,000 in fines. This is the law referred to in the familiar “FBI Warning” that appears at the beginning of most DVD movies. You can read more about the NET Act here.

Many people who consider themselves upstanding citizens and who would never post music and movies to a P2P site think nothing of burning a copy of a song or TV show for a friend. Unfortunately, by the letter of the law, the latter is just as illegal as the former.

#3: Court rulings regarding border searches

Most Americans are aware of the protections afforded by the U.S. Constitution’s fourth amendment against unreasonable searches and seizures. In general, this means that the government cannot search your person, home, vehicle, or computer without probable cause to believe that you’ve engaged in some criminal act.

What many don’t know is that there are quite a few circumstances that the Courts, over the years, have deemed to be exempt from this requirement. One of those occurs when you enter the United States at the border. In April of this year, the Ninth Circuit Court of Appeals upheld the right of Customs officers to search laptops and other digital devices at the border (the definition of which extends to any international airport when you are coming into the country) without probable cause or even the lesser standard of reasonable suspicion. The Electronic Frontier Foundation (EFF) and other groups strongly disagree with the ruling. You can read more on the EFF Web site.

Meanwhile, be aware that even though you’ve done nothing illegal and are not even suspected of such, the entire contents of your portable computer, PDA, or smart phone can be accessed by government agents when you enter the United States. So if you have anything on your hard drive that might be embarrassing, you might want to delete it before crossing the border.

#4: State laws regarding access to networks

Many states have criminal laws that prohibit accessing any computer or network without the owner’s permission. For example, in Texas, the statute is Penal Code section 33.02, Breach of Computer Security. It says, “A person commits an offense if the person knowingly accesses a computer, computer network or computer system without the effective consent of the owner.” The penalty grade ranges from misdemeanor to first degree felony (which is the same grade as murder), depending on whether the person obtains benefit, harms or defrauds someone, or alters, damages, or deletes files.

The wording of most such laws encompasses connecting to a wireless network without explicit permission, even if the wi-fi network is unsecured. The inclusion of the culpable mental state of “knowing” as an element of the offense means that if your computer automatically connects to your neighbor’s wireless network instead of your own and you aren’t aware of it, you haven’t committed a crime — but if you decide to hop onto the nearest unencrypted wi-fi network to surf the Internet, knowing full well that it doesn’t belong to you and no one has given you permission, you could be prosecuted under these laws.

A Michigan man was arrested for using a café’s wi-fi network (which was reserved for customers) from his car in 2007. Similar arrests have been made in Florida, Illinois, Washington, and Alaska. See

#5: “Tools of a crime” laws

Some states have laws that make it a crime to possess a “criminal instrument” or the “tool of a crime.” Depending on the wording of the law, this can be construed to mean any device that is designed or adapted for use in the commission of an offense. This means you could be arrested and prosecuted, for example, for constructing a high gain wireless antenna for the purpose of tapping into someone else’s wi-fi network, even if you never did in fact access a network. Several years ago, a California sheriff’s deputy made the news when he declared “Pringles can antennas” illegal under such a statute.

#6: “Cyberstalking” laws

Stalking is a serious crime and certainly all of us are in favor of laws that punish stalkers. As Internet connectivity has become ubiquitous, legislatures have recognized that it’s possible to stalk someone from afar using modern technology. Some of the “cyberstalking” laws enacted by the states, however, contain some pretty broad language.

For example, the Arkansas law contains a section titled “Unlawful computerized communications” that makes it a crime to send a message via e-mail or other computerized communication system (Instant Messenger, Web chat, IRC, etc.) that uses obscene, lewd, or profane language, with the intent to frighten, intimidate, threaten, abuse, or harass another person. Some of the lively discussions on mailing lists and Web boards that deteriorate into flame wars could easily fall under that definition. Or how about the furious e-mail letter you sent to the company that refused to refund your money for the shoddy product you bought?

Closely related are the laws against “cyber bullying” that have recently been passed by some states and local governments.

The best policy is to watch your language when sending any type of electronic communications. Not only can a loss of temper when you’re online come back to embarrass you, it could possibly get you thrown in jail.

#7: Internet Gambling laws

Like to play poker online or bet on the horse races from the comfort of your home? The federal Unlawful Internet Gambling Enforcement Act of 2006 criminalizes acceptance of funds from bettors — but what about the bettors themselves? Are they committing a crime?

Under this federal law, the answer is no, but some state laws do apply to the person placing the bet. For example, a Washington law passed in 2006 makes gambling on the Internet a felony. The King County Superior Court just recently upheld that law, although challengers have vowed to take it to the Supreme Court.

Be sure to check out the state and local laws before you make that friendly online bet.

#8: Security Breach Disclosure laws

A California law passed in 2003 requires that any company that does business in California must notify their California customers if they discover or suspect that nonencrypted data has been accessed without authorization. This applies even if the business is not located in California, as long as you have customers there, and no exception is made for small businesses.

#9: Community Broadband Act of 2007

This is a piece of pending federal legislation that was introduced in July of 2007 as U.S. Senate Bill 1853. In April 2008, it was placed on the Senate Legislative Calendar under General Orders and is still winding its way through the legislative process. This federal law would prohibit state and local governments (municipalities and counties) from passing laws that prohibit public telecommunications providers from offering Internet services.

This is in response to laws passed in a few states, as a result of lobbying from the telecom industry, that prohibit cities from installing and operating public broadband networks, such as public wi-fi networks. The big telecom companies have a vested interest in preventing cities from establishing networks that could compete with their own services by providing free or low cost Internet services because the public services are partially or wholly taxpayer-subsidized.

If this law passes, it could make it easier to find free or low cost ISP services in cities that choose to build public networks. On the other hand, it could (depending on how it’s funded) cause tax increases for those who live in those municipalities, including those who don’t use the public networks.

#10: Pro IP Act

Back on the copyright front, the House of Representative recently approved by an overwhelming majority HR 4279, which imposes stricter penalties for copyright infringement. It creates a new position of “copyright enforcement czar” in the federal bureaucracy and gives law enforcement agents the right to seize property from copyright infringers.

This may all sound fine in theory, but when you look at the way other seizure and forfeiture laws have been applied (for instance, the ability of drug enforcement officers to seize houses, computers, cars, cash, and just about everything else that belongs to someone tagged as a suspected drug dealer — and in some cases not returning the property even when the person is acquitted or not prosecuted), it makes many people wary. Read more about the bill here.

Some local jurisdictions have already established seizure authority for piracy. See this article for more information.
http://blogs.techrepublic.com.com/10things/?p=356





China's All-Seeing Eye

With the help of U.S. defense contractors, China is building the prototype for a high-tech police state. It is ready for export.
Naomi Klein

Thirty years ago, the city of Shenzhen didn't exist. Back in those days, it was a string of small fishing villages and collectively run rice paddies, a place of rutted dirt roads and traditional temples. That was before the Communist Party chose it — thanks to its location close to Hong Kong's port — to be China's first "special economic zone," one of only four areas where capitalism would be permitted on a trial basis. The theory behind the experiment was that the "real" China would keep its socialist soul intact while profiting from the private-sector jobs and industrial development created in Shenzhen. The result was a city of pure commerce, undiluted by history or rooted culture — the crack cocaine of capitalism. It was a force so addictive to investors that the Shenzhen experiment quickly expanded, swallowing not just the surrounding Pearl River Delta, which now houses roughly 100,000 factories, but much of the rest of the country as well. Today, Shenzhen is a city of 12.4 million people, and there is a good chance that at least half of everything you own was made here: iPods, laptops, sneakers, flatscreen TVs, cellphones, jeans, maybe your desk chair, possibly your car and almost certainly your printer. Hundreds of luxury condominiums tower over the city; many are more than 40 stories high, topped with three-story penthouses. Newer neighborhoods like Keji Yuan are packed with ostentatiously modern corporate campuses and decadent shopping malls. Rem Koolhaas, Prada's favorite architect, is building a stock exchange in Shenzhen that looks like it floats — a design intended, he says, to "suggest and illustrate the process of the market." A still-under-construction superlight subway will soon connect it all at high speed; every car has multiple TV screens broadcasting over a Wi-Fi network. At night, the entire city lights up like a pimped-out Hummer, with each five-star hotel and office tower competing over who can put on the best light show.

Many of the big American players have set up shop in Shenzhen, but they look singularly unimpressive next to their Chinese competitors. The research complex for China's telecom giant Huawei, for instance, is so large that it has its own highway exit, while its workers ride home on their own bus line. Pressed up against Shenzhen's disco shopping centers, Wal-Mart superstores — of which there are nine in the city — look like dreary corner stores. (China almost seems to be mocking us: "You call that a superstore?") McDonald's and KFC appear every few blocks, but they seem almost retro next to the Real Kung Fu fast-food chain, whose mascot is a stylized Bruce Lee.

American commentators like CNN's Jack Cafferty dismiss the Chinese as "the same bunch of goons and thugs they've been for the last 50 years." But nobody told the people of Shenzhen, who are busily putting on a 24-hour-a-day show called "America" — a pirated version of the original, only with flashier design, higher profits and less complaining. This has not happened by accident. China today, epitomized by Shenzhen's transition from mud to megacity in 30 years, represents a new way to organize society. Sometimes called "market Stalinism," it is a potent hybrid of the most powerful political tools of authoritarian communism — central planning, merciless repression, constant surveillance — harnessed to advance the goals of global capitalism.

Now, as China prepares to showcase its economic advances during the upcoming Olympics in Beijing, Shenzhen is once again serving as a laboratory, a testing ground for the next phase of this vast social experiment. Over the past two years, some 200,000 surveillance cameras have been installed throughout the city. Many are in public spaces, disguised as lampposts. The closed-circuit TV cameras will soon be connected to a single, nationwide network, an all-seeing system that will be capable of tracking and identifying anyone who comes within its range — a project driven in part by U.S. technology and investment. Over the next three years, Chinese security executives predict they will install as many as 2 million CCTVs in Shenzhen, which would make it the most watched city in the world. (Security-crazy London boasts only half a million surveillance cameras.)

The security cameras are just one part of a much broader high-tech surveillance and censorship program known in China as "Golden Shield." The end goal is to use the latest people-tracking technology — thoughtfully supplied by American giants like IBM, Honeywell and General Electric — to create an airtight consumer cocoon: a place where Visa cards, Adidas sneakers, China Mobile cellphones, McDonald's Happy Meals, Tsingtao beer and UPS delivery (to name just a few of the official sponsors of the Beijing Olympics) can be enjoyed under the unblinking eye of the state, without the threat of democracy breaking out. With political unrest on the rise across China, the government hopes to use the surveillance shield to identify and counteract dissent before it explodes into a mass movement like the one that grabbed the world's attention at Tiananmen Square.

Remember how we've always been told that free markets and free people go hand in hand? That was a lie. It turns out that the most efficient delivery system for capitalism is actually a communist-style police state, fortressed with American "homeland security" technologies, pumped up with "war on terror" rhetoric. And the global corporations currently earning superprofits from this social experiment are unlikely to be content if the lucrative new market remains confined to cities such as Shenzhen. Like everything else assembled in China with American parts, Police State 2.0 is ready for export to a neighborhood near you.

Zhang Yi points to an empty bracket on the dashboard of his black Honda. "It used to hold my GPS, but I leave it at home now," he says. "It's the crime — they are too easy to steal." He quickly adds, "Since the surveillance cameras came in, we have seen a very dramatic decrease in crime in Shenzhen."

After driving for an hour past hundreds of factory gates and industrial parks, we pull up to a salmon-color building that Zhang partly owns. This is the headquarters of FSAN: CCTV System. Zhang, a prototypical Shenzhen yuppie in a royal-blue button-down shirt and black-rimmed glasses, apologizes for the mess. Inside, every inch of space is lined with cardboard boxes filled with electronics parts and finished products.

Zhang opened the factory two and a half years ago, and his investment has already paid off tenfold. That kind of growth isn't unusual in the field he has chosen: Zhang's factory makes digital surveillance cameras, turning out 400,000 a year. Half of the cameras are shipped overseas, destined to peer from building ledges in London, Manhattan and Dubai as part of the global boom in "homeland security." The other half stays in China, many right here in Shenzhen and in neighboring Guangzhou, another megacity of 12 million people. China's market for surveillance cameras enjoyed revenues of $4.1 billion last year, a jump of 24 percent from 2006.

Zhang escorts me to the assembly line, where rows of young workers, most of them women, are bent over semiconductors, circuit boards, tiny cables and bulbs. At the end of each line is "quality control," which consists of plugging the camera into a monitor and making sure that it records. We enter a showroom where Zhang and his colleagues meet with clients. The walls are lined with dozens of camera models: domes of all sizes, specializing in day and night, wet and dry, camouflaged to look like lights, camouflaged to look like smoke detectors, explosion-proof, the size of a soccer ball, the size of a ring box.

The workers at FSAN don't just make surveillance cameras; they are constantly watched by them. While they work, the silent eyes of rotating lenses capture their every move. When they leave work and board buses, they are filmed again. When they walk to their dormitories, the streets are lined with what look like newly installed streetlamps, their white poles curving toward the sidewalk with black domes at the ends. Inside the domes are high-resolution cameras, the same kind the workers produce at FSAN. Some blocks have three or four, one every few yards. One Shenzhen-based company, China Security & Surveillance Technology, has developed software to enable the cameras to alert police when an unusual number of people begin to gather at any given location.

In 2006, the Chinese government mandated that all Internet cafes (as well as restaurants and other "entertainment" venues) install video cameras with direct feeds to their local police stations. Part of a wider surveillance project known as "Safe Cities," the effort now encompasses 660 municipalities in China. It is the most ambitious new government program in the Pearl River Delta, and supplying it is one of the fastest-growing new markets in Shenzhen.

But the cameras that Zhang manufactures are only part of the massive experiment in population control that is under way here. "The big picture," Zhang tells me in his office at the factory, "is integration." That means linking cameras with other forms of surveillance: the Internet, phones, facial-recognition software and GPS monitoring.

This is how this Golden Shield will work: Chinese citizens will be watched around the clock through networked CCTV cameras and remote monitoring of computers. They will be listened to on their phone calls, monitored by digital voice-recognition technologies. Their Internet access will be aggressively limited through the country's notorious system of online controls known as the "Great Firewall." Their movements will be tracked through national ID cards with scannable computer chips and photos that are instantly uploaded to police databases and linked to their holder's personal data. This is the most important element of all: linking all these tools together in a massive, searchable database of names, photos, residency information, work history and biometric data. When Golden Shield is finished, there will be a photo in those databases for every person in China: 1.3 billion faces.

Shenzhen is the place where the shield has received its most extensive fortifications — the place where all the spy toys are being hooked together and tested to see what they can do. "The central government eventually wants to have city-by-city surveillance, so they could just sit and monitor one city and its surveillance system as a whole," Zhang says. "It's all part of that bigger project. Once the tests are done and it's proven, they will be spreading from the big province to the cities, even to the rural farmland."

In fact, the rollout of the high-tech shield is already well under way.

When the Tibetan capital of Lhasa was set alight in March, the world caught a glimpse of the rage that lies just under the surface in many parts of China. And though the Lhasa riots stood out for their ethnic focus and their intensity, protests across China are often shockingly militant. In July 2006, workers at a factory near Shenzhen expressed their displeasure over paltry pay by overturning cars, smashing computers and opening fire hydrants. In March of last year, when bus fares went up in the rural town of Zhushan, 20,000 people took to the streets and five police vehicles were torched. Indeed, China has seen levels of political unrest in recent years unknown since 1989, the year student protests were crushed with tanks in Tiananmen Square. In 2005, by the government's own measure, there were at least 87,000 "mass incidents" — governmentspeak for large-scale protests or riots.

This increased unrest — a process aided by access to cellphones and the Internet — represents more than a security problem for the leaders in Beijing. It threatens their whole model of command-and-control capitalism. China's rapid economic growth has relied on the ability of its rulers to raze villages and move mountains to make way for the latest factory towns and shopping malls. If the people living on those mountains use blogs and text messaging to launch a mountain-people's-rights uprising with each new project, and if they link up with similar uprisings in other parts of the country, China's dizzying expansion could grind to a halt.

At the same time, the success of China's ravenous development creates its own challenges. Every rural village that is successfully razed to make way for a new project creates more displaced people who join the ranks of the roughly 130 million migrants roaming the country looking for work. By 2025, it is projected that this "floating" population will swell to more than 350 million. Many will end up in cities like Shenzhen, which is already home to 7 million migrant laborers.

But while China's cities need these displaced laborers to work in factories and on construction sites, they are unwilling to offer them the same benefits as permanent residents: highly subsidized education and health care, as well as other public services. While migrants can live for decades in big cities like Shenzhen and Guangzhou, their residency remains fixed to the rural community where they were born, a fact encoded on their national ID cards. As one young migrant in Guangzhou put it to me, "The local people want to make money from migrant workers, but they don't want to give them rights. But why are the local people so rich? Because of the migrant workers!"

With its militant protests and mobile population, China confronts a fundamental challenge. How can it maintain a system based on two dramatically unequal categories of people: the winners, who get the condos and cars, and the losers, who do the heavy labor and are denied those benefits? More urgently, how can it do this when information technology threatens to link the losers together into a movement so large it could easily overwhelm the country's elites?

The answer is Golden Shield. When Tibet erupted in protests recently, the surveillance system was thrown into its first live test, with every supposedly liberating tool of the Information Age — cellphones, satellite television, the Internet — transformed into a method of repression and control. As soon as the protests gathered steam, China reinforced its Great Firewall, blocking its citizens from accessing dozens of foreign news outlets. In some parts of Tibet, Internet access was shut down altogether. Many people trying to phone friends and family found that their calls were blocked, and cellphones in Lhasa were blitzed with text messages from the police: "Severely battle any creation or any spreading of rumors that would upset or frighten people or cause social disorder or illegal criminal behavior that could damage social stability."

During the first week of protests, foreign journalists who tried to get into Tibet were systematically turned back. But that didn't mean that there were no cameras inside the besieged areas. Since early last year, activists in Lhasa have been reporting on the proliferation of black-domed cameras that look like streetlights — just like the ones I saw coming off the assembly line in Shenzhen. Tibetan monks complain that cameras — activated by motion sensors — have invaded their monasteries and prayer rooms.

During the Lhasa riots, police on the scene augmented the footage from the CCTVs with their own video cameras, choosing to film — rather than stop — the violence, which left 19 dead. The police then quickly cut together the surveillance shots that made the Tibetans look most vicious — beating Chinese bystanders, torching shops, ripping metal sheeting off banks — and created a kind of copumentary: Tibetans Gone Wild. These weren't the celestial beings in flowing robes the Beastie Boys and Richard Gere had told us about. They were angry young men, wielding sticks and long knives. They looked ugly, brutal, tribal. On Chinese state TV, this footage played around the clock.

The police also used the surveillance footage to extract mug shots of the demonstrators and rioters. Photos of the 21 "most wanted" Tibetans, many taken from that distinctive "streetlamp" view of the domed cameras, were immediately circulated to all of China's major news portals, which obediently posted them to help out with the manhunt. The Internet became the most powerful police tool. Within days, several of the men on the posters were in custody, along with hundreds of others.

The flare-up in Tibet, weeks before the Olympic torch began its global journey, has been described repeatedly in the international press as a "nightmare" for Beijing. Several foreign leaders have pledged to boycott the opening ceremonies of the games, the press has hosted an orgy of China-bashing, and the torch became a magnet for protesters, with anti-China banners dropped from the Eiffel Tower and the Golden Gate Bridge. But inside China, the Tibet debacle may actually have been a boon to the party, strengthening its grip on power. Despite its citizens having unprecedented access to information technology (there are as many Internet users in China as there are in the U.S.), the party demonstrated that it could still control what they hear and see. And what they saw on their TVs and computer screens were violent Tibetans, out to kill their Chinese neighbors, while police showed admirable restraint. Tibetan solidarity groups say 140 people were killed in the crackdown that followed the protests, but without pictures taken by journalists, it is as if those subsequent deaths didn't happen.

Chinese viewers also saw a world unsympathetic to the Chinese victims of Tibetan violence, so hostile to their country that it used a national tragedy to try to rob them of their hard-won Olympic glory. These nationalist sentiments freed up Beijing to go on a full-fledged witch hunt. In the name of fighting a war on terror, security forces rounded up thousands of Tibetan activists and supporters. The end result is that when the games begin, much of the Tibetan movement will be safely behind bars — along with scores of Chinese journalists, bloggers and human-rights defenders who have also been trapped in the government's high-tech web.

Police State 2.0 might not look good from the outside, but on the inside, it appears to have passed its first major test.

In Guangzhou, an hour and a half by train from Shenzhen, Yao Ruoguang is preparing for a major test of his own. "It's called the 10-million-faces test," he tells me.

Yao is managing director of Pixel Solutions, a Chinese company that specializes in producing the new high-tech national ID cards, as well as selling facial-recognition software to businesses and government agencies. The test, the first phase of which is only weeks away, is being staged by the Ministry of Public Security in Beijing. The idea is to measure the effectiveness of face-recognition software in identifying police suspects. Participants will be given a series of photos, taken in a variety of situations. Their task will be to match the images to other photos of the same people in the government's massive database. Several biometrics companies, including Yao's, have been invited to compete. "We have to be able to match a face in a 10 million database in one second," Yao tells me. "We are preparing for that now."

The companies that score well will be first in line for lucrative government contracts to integrate face-recognition software into Golden Shield, using it to check for ID fraud and to discover the identities of suspects caught on surveillance cameras. Yao says the technology is almost there: "It will happen next year."

When I meet Yao at his corporate headquarters, he is feeling confident about how his company will perform in the test. His secret weapon is that he will be using facial-recognition software purchased from L-1 Identity Solutions, a major U.S. defense contractor that produces passports and biometric security systems for the U.S. government.

To show how well it works, Yao demonstrates on himself. Using a camera attached to his laptop, he snaps a picture of his own face, round and boyish for its 54 years. Then he uploads it onto the company's proprietary Website, built with L-1 software. With the cursor, he marks his own eyes with two green plus signs, helping the system to measure the distance between his features, a distinctive aspect of our faces that does not change with disguises or even surgery. The first step is to "capture the image," Yao explains. Next is "finding the face."

He presses APPLY, telling the program to match the new face with photos of the same person in the company's database of 600,000 faces. Instantly, multiple photos of Yao appear, including one taken 19 years earlier — proof that the technology can "find a face" even when the face has changed significantly with time. "

It took 1.1 milliseconds!" Yao exclaims. "Yeah, that's me!"

In nearby cubicles, teams of Yao's programmers and engineers take each other's pictures, mark their eyes with green plus signs and test the speed of their search engines. "Everyone is preparing for the test," Yao explains. "If we pass, if we come out number one, we are guaranteed a market in China."

Every couple of minutes Yao's phone beeps. Sometimes it's a work message, but most of the time it's a text from his credit-card company, informing him that his daughter, who lives in Australia, has just made another charge. "Every time the text message comes, I know my daughter is spending money!" He shrugs: "She likes designers."

Like many other security executives I interviewed in China, Yao denies that a primary use of the technology he is selling is to hunt down political activists. "Ninety-five percent," he insists, "is just for regular safety." He has, he admits, been visited by government spies, whom he describes as "the internal-security people." They came with grainy pictures, shot from far away or through keyhole cameras, of "some protesters, some dissidents." They wanted to know if Yao's facial-recognition software could help identify the people in the photos. Yao was sorry to disappoint them. "Honestly, the technology so far still can't meet their needs," he says. "The photos that they show us were just too blurry." That is rapidly changing, of course, thanks to the spread of high-resolution CCTVs. Yet Yao insists that the government's goal is not repression: "If you're a [political] organizer, they want to know your motive," he says. "So they take the picture, give the photo, so at least they can find out who that person is."

Until recently, Yao's photography empire was focused on consumers — taking class photos at schools, launching a Chinese knockoff of Flickr (the original is often blocked by the Great Firewall), turning photos of chubby two-year-olds into fridge magnets and lampshades. He still maintains those businesses, which means that half of the offices at Pixel Solutions look like they have just hosted a kid's birthday party. The other half looks like an ominous customs office, the walls lined with posters of terrorists in the cross hairs: FACE MATCH, FACE PASS, FACE WATCH. When Beijing started sinking more and more of the national budget into surveillance technologies, Yao saw an opportunity that would make all his previous ventures look small. Between more powerful computers, higher-resolution cameras and a global obsession with crime and terrorism, he figured that face recognition "should be the next dot-com."

Not a computer scientist himself — he studied English literature in school — Yao began researching corporate leaders in the field. He learned that face recognition is highly controversial, with a track record of making wrong IDs. A few companies, however, were scoring much higher in controlled tests in the U.S. One of them was a company soon to be renamed L-1 Identity Solutions. Based in Connecticut, L-1 was created two years ago out of the mergers and buyouts of half a dozen major players in the biometrics field, all of which specialized in the science of identifying people through distinct physical traits: fingerprints, irises, face geometry. The mergers made L-1 a one-stop shop for biometrics. Thanks to board members like former CIA director George Tenet, the company rapidly became a homeland-security heavy hitter. L-1 projects its annual revenues will hit $1 billion by 2011, much of it from U.S. government contracts.

In 2006, Yao tells me, "I made the first phone call and sent the first e-mail." For a flat fee of $20,000, he gained access to the company's proprietary software, allowing him to "build a lot of development software based on L-1's technology." Since then, L-1's partnership with Yao has gone far beyond that token investment. Yao says it isn't really his own company that is competing in the upcoming 10-million-faces test being staged by the Chinese government: "We'll be involved on behalf of L-1 in China." Yao adds that he communicates regularly with L1 and has visited the company's research headquarters in New Jersey. ("Out the window you can see the Statue of Liberty. It's such a historic place.") L1 is watching his test preparations with great interest, Yao says. "It seemed that they were more excited than us when we tell them the results."

L-1's enthusiasm is hardly surprising: If Yao impresses the Ministry of Public Security with the company's ability to identify criminals, L-1 will have cracked the largest potential market for biometrics in the world. But here's the catch: As proud as Yao is to be L-1's Chinese licensee, L-1 appears to be distinctly less proud of its association with Yao. On its Website and in its reports to investors, L-1 boasts of contracts and negotiations with governments from Panama and Saudi Arabia to Mexico and Turkey. China, however, is conspicuously absent. And though CEO Bob LaPenta makes reference to "some large international opportunities," not once does he mention Pixel Solutions in Guangzhou.

After leaving a message with the company inquiring about L-1's involvement in China's homeland-security market, I get a call back from Doni Fordyce, vice president of corporate communications. She has consulted Joseph Atick, the company's head of research. "We have nothing in China," she tells me. "Nothing, absolutely nothing. We are uninvolved. We really don't have any relationships at all."

I tell Fordyce about Yao, the 10-million test, the money he paid for the software license. She'll call me right back. When she does, 20 minutes later, it is with this news: "Absolutely, we've sold testing SDKs [software development kits] to Pixel Solutions and to others [in China] that may be entering a test." Yao's use of the technology, she said, is "within his license" purchased from L-1.

The company's reticence to publicize its activities in China could have something to do with the fact that the relationship between Yao and L-1 may well be illegal under U.S. law. After the Chinese government sent tanks into Tiananmen Square in 1989, Congress passed legislation barring U.S. companies from selling any products in China that have to do with "crime control or detection instruments or equipment." That means not only guns but everything from police batons and handcuffs to ink and powder for taking fingerprints, and software for storing them. Interestingly, one of the "detection instruments" that prompted the legislation was the surveillance camera. Beijing had installed several clunky cameras around Tiananmen Square, originally meant to monitor traffic flows. Those lenses were ultimately used to identify and arrest key pro-democracy dissidents.

"The intent of that act," a congressional staff member with considerable China experience tells me, "was to keep U.S. companies out of the business of helping the Chinese police conduct their business, which might ultimately end up as it did in 1989 in the suppression of human rights and democracy in China."

Pixel's application of L-1 facial-recognition software seems to fly in the face of the ban's intent. By his own admission, Yao is already getting visits from Chinese state spies anxious to use facial recognition to identify dissidents. And as part of the 10-million-faces test, Yao has been working intimately with Chinese national-security forces, syncing L-1's software to their vast database, a process that took a week of intensive work in Beijing. During that time, Yao says, he was on the phone "every day" with L-1, getting its help adapting the technology. "Because we are representing them," he says. "We took the test on their behalf."

In other words, this controversial U.S. "crime control" technology has already found its way into the hands of the Chinese police. Moreover, Yao's goal, stated to me several times, is to use the software to land lucrative contracts with police agencies to integrate facial recognition into the newly built system of omnipresent surveillance cameras and high-tech national ID cards. As part of any contract he gets, Yao says, he will "pay L-1 a certain percentage of our sales."

When I put the L-1 scenario to the Commerce Department's Bureau of Industry and Security — the division charged with enforcing the post-Tiananmen export controls — a representative says that software kits are subject to the sanctions if "they are exported from the U.S. or are the foreign direct product of a U.S.-origin item." Based on both criteria, the software kit sold to Yao seems to fall within the ban.

When I ask Doni Fordyce at L-1 about the embargo, she tells me, "I don't know anything about that." Asked whether she would like to find out about it and call me back, she replies, "I really don't want to comment, so there is no comment." Then she hangs up.

You have probably never heard of L-1, but there is every chance that it has heard of you. Few companies have collected as much sensitive information about U.S. citizens and visitors to America as L-1: It boasts a database of 60 million records, and it "captures" more than a million new fingerprints every year. Here is a small sample of what the company does: produces passports and passport cards for American citizens; takes finger scans of visitors to the U.S. under the Department of Homeland Security's massive U.S.-Visit program; equips U.S. soldiers in Iraq and Afghanistan with "mobile iris and multimodal devices" so they can collect biometric data in the field; maintains the State Department's "largest facial-recognition database system"; and produces driver's licenses in Illinois, Montana and North Carolina. In addition, L-1 has an even more secretive intelligence unit called SpecTal. Asked by a Wall Street analyst to discuss, in "extremely general" terms, what the division was doing with contracts worth roughly $100 million, the company's CEO would only say, "Stay tuned."

It is L-1's deep integration with multiple U.S. government agencies that makes its dealings in China so interesting: It isn't just L-1 that is potentially helping the Chinese police to nab political dissidents, it's U.S. taxpayers. The technology that Yao purchased for just a few thousand dollars is the result of Defense Department research grants and contracts going as far back as 1994, when a young academic named Joseph Atick (the research director Fordyce consulted on L-1's China dealings) taught a computer at Rockefeller University to recognize his face.

Yao, for his part, knows all about the U.S. export controls on police equipment to China. He tells me that L-1's electronic fingerprinting tools are "banned from entering China" due to U.S. concerns that they will be used to "catch the political criminals, you know, the dissidents, more easily." He thinks he and L-1 have found a legal loophole, however. While fingerprinting technology appears on the Commerce Department's list of banned products, there is no explicit mention of "face prints" — likely because the idea was still in the realm of science fiction when the Tiananmen Square massacre took place. As far as Yao is concerned, that omission means that L-1 can legally supply its facial-recognition software for use by the Chinese government.

Whatever the legality of L-1's participation in Chinese surveillance, it is clear that U.S. companies are determined to break into the homeland-security market in China, which represents their biggest growth potential since 9/11. According to the congressional staff member, American companies and their lobbyists are applying "enormous pressure to open the floodgates."

The crackdown in Tibet has set off a wave of righteous rallies and boycott calls. But it sidesteps the uncomfortable fact that much of China's powerful surveillance state is already being built with U.S. and European technology. In February 2006, a congressional subcommittee held a hearing on "The Internet in China: A Tool for Freedom or Suppression?" Called on the carpet were Google (for building a special Chinese search engine that blocked sensitive material), Cisco (for supplying hardware for China's Great Firewall), Microsoft (for taking down political blogs at the behest of Beijing) and Yahoo (for complying with requests to hand over e-mail-account information that led to the arrest and imprisonment of a high-profile Chinese journalist, as well as a dissident who had criticized corrupt officials in online discussion groups). The issue came up again during the recent Tibet uproar when it was discovered that both MSN and Yahoo had briefly put up the mug shots of the "most wanted" Tibetan protesters on their Chinese news portals.

In all of these cases, U.S. multinationals have offered the same defense: Cooperating with draconian demands to turn in customers and censor material is, unfortunately, the price of doing business in China. Some, like Google, have argued that despite having to limit access to the Internet, they are contributing to an overall increase of freedom in China. It's a story that glosses over the much larger scandal of what is actually taking place: Western investors stampeding into the country, possibly in violation of the law, with the sole purpose of helping the Communist Party spend billions of dollars building Police State 2.0. This isn't an unfortunate cost of doing business in China: It's the goal of doing business in China. "Come help us spy!" the Chinese government has said to the world. And the world's leading technology companies are eagerly answering the call.

As The New York Times recently reported, aiding and abetting Beijing has become an investment boom for U.S. companies. Honeywell is working with Chinese police to "set up an elaborate computer monitoring system to analyze feeds from indoor and outdoor cameras in one of Beijing's most populated districts." General Electric is providing Beijing police with a security system that controls "thousands of video cameras simultaneously, and automatically alerts them to suspicious or fast-moving objects, like people running." IBM, meanwhile, is installing its "Smart Surveillance System" in the capital, another system for linking video cameras and scanning for trouble, while United Technologies is in Guangzhou, helping to customize a "2,000-camera network in a single large neighborhood, the first step toward a citywide network of 250,000 cameras to be installed before the Asian Games in 2010." By next year, the Chinese internal-security market will be worth an estimated $33 billion — around the same amount Congress has allocated for reconstructing Iraq.

"We're at the start of a massive boom in Chinese security spending," according to Graham Summers, a market analyst who publishes an investor newsletter in Baltimore. "And just as we need to be aware of how to profit from the growth in China's commodity consumption, we need to be aware of companies that will profit from 'security consumption.' . . . There's big money to be made."

While U.S. companies are eager to break into China's rapidly expanding market, every Chinese security firm I come across in the Pearl River Delta is hatching some kind of plan to break into the U.S. market. No one, however, is quite as eager as Aebell Electrical Technology, one of China's top 10 security companies. Aebell has a contract to help secure the Olympic swimming stadium in Beijing and has installed more than 10,000 cameras in and around Guangzhou. Business has been growing by 100 percent a year. When I meet the company's fidgety general manager, Zheng Sun Man, the first thing he tells me is "We are going public at the end of this year. On the Nasdaq." It also becomes clear why he has chosen to speak with a foreign reporter: "Help, help, help!" he begs me. "Help us promote our products!"

Zheng, an MBA from one of China's top schools, proudly shows me the business card of the New York investment bank that is handling Aebell's IPO, as well as a newly printed English-language brochure showing off the company's security cameras. Its pages are filled with American iconography, including businessmen exchanging wads of dollar bills and several photos of the New York skyline that prominently feature the World Trade Center. In the hall at company headquarters is a poster of two interlocking hearts: one depicting the American flag, the other the Aebell logo.

I ask Zheng whether China's surveillance boom has anything to do with the rise in strikes and demonstrations in recent years. Zheng's deputy, a 23-year veteran of the Chinese military wearing a black Mao suit, responds as if I had launched a direct attack on the Communist Party itself. "If you walk out of this building, you will be under surveillance in five to six different ways," he says, staring at me hard. He lets the implication of his words linger in the air like an unspoken threat. "If you are a law-abiding citizen, you shouldn't be afraid," he finally adds. "The criminals are the only ones who should be afraid."

One of the first people to sound the alarm on China's upgraded police state was a British researcher named Greg Walton. In 2000, Walton was commissioned by the respected human-rights organization Rights & Democracy to investigate the ways in which Chinese security forces were harnessing the tools of the Information Age to curtail free speech and monitor political activists. The paper he produced was called "China's Golden Shield: Corporations and the Development of Surveillance Technology in the People's Republic of China." It exposed how big-name tech companies like Nortel and Cisco were helping the Chinese government to construct "a gigantic online database with an all-encompassing surveillance network — incorporating speech and face recognition, closed-circuit television, smart cards, credit records and Internet surveillance technologies."

When the paper was complete, Walton met with the institute's staff to strategize about how to release his explosive findings. "We thought this information was going to shock the world," he recalls. In the midst of their discussions, a colleague barged in and announced that a plane had hit the Twin Towers. The meeting continued, but they knew the context of their work had changed forever.

Walton's paper did have an impact, but not the one he had hoped. The revelation that China was constructing a gigantic digital database capable of watching its citizens on the streets and online, listening to their phone calls and tracking their consumer purchases sparked neither shock nor outrage. Instead, Walton says, the paper was "mined for ideas" by the U.S. government, as well as by private companies hoping to grab a piece of the suddenly booming market in spy tools. For Walton, the most chilling moment came when the Defense Department tried to launch a system called Total Information Awareness to build what it called a "virtual, centralized grand database" that would create constantly updated electronic dossiers on every citizen, drawing on banking, credit-card, library and phone records, as well as footage from surveillance cameras. "It was clearly similar to what we were condemning China for," Walton says. Among those aggressively vying to be part of this new security boom was Joseph Atick, now an executive at L-1. The name he chose for his plan to integrate facial-recognition software into a vast security network was uncomfortably close to the surveillance system being constructed in China: "Operation Noble Shield."

Empowered by the Patriot Act, many of the big dreams hatched by men like Atick have already been put into practice at home. New York, Chicago and Washington, D.C., are all experimenting with linking surveillance cameras into a single citywide network. Police use of surveillance cameras at peaceful demonstrations is now routine, and the images collected can be mined for "face prints," then cross-checked with ever-expanding photo databases. Although Total Information Awareness was scrapped after the plans became public, large pieces of the project continue, with private data-mining companies collecting unprecedented amounts of information about everything from Web browsing to car rentals, and selling it to the government.

Such efforts have provided China's rulers with something even more valuable than surveillance technology from Western democracies: the ability to claim that they are just like us. Liu Zhengrong, a senior official dealing with China's Internet policy, has defended Golden Shield and other repressive measures by invoking the Patriot Act and the FBI's massive e-mail-mining operations. "It is clear that any country's legal authorities closely monitor the spread of illegal information," he said. "We have noted that the U.S. is doing a good job on this front." Lin Jiang Huai, the head of China Information Security Technology, credits America for giving him the idea to sell biometric IDs and other surveillance tools to the Chinese police. "Bush helped me get my vision," he has said. Similarly, when challenged on the fact that dome cameras are appearing three to a block in Shenzhen and Guangzhou, Chinese companies respond that their model is not the East German Stasi but modern-day London.

Human-rights activists are quick to point out that while the tools are the same, the political contexts are radically different. China has a government that uses its high-tech web to imprison and torture peaceful protesters, Tibetan monks and independent-minded journalists. Yet even here, the lines are getting awfully blurry. The U.S. currently has more people behind bars than China, despite a population less than a quarter of its size. And Sharon Hom, executive director of the advocacy group Human Rights in China, says that when she talks about China's horrific human-rights record at international gatherings, "There are two words that I hear in response again and again: Guantánamo Bay."

The Fourth Amendment prohibition against illegal search and seizure made it into the U.S. Constitution precisely because its drafters understood that the power to snoop is addictive. Even if we happen to trust in the good intentions of the snoopers, the nature of any government can change rapidly — which is why the Constitution places limits on the tools available to any regime. But the drafters could never have imagined the commercial pressures at play today. The global homeland-security business is now worth an estimated $200 billion — more than Hollywood and the music industry combined. Any sector of that size inevitably takes on its own momentum. New markets must be found — which, in the Big Brother business, means an endless procession of new enemies and new emergencies: crime, immigration, terrorism.

In Shenzhen one night, I have dinner with a U.S. business consultant named Stephen Herrington. Before he started lecturing at Chinese business schools, teaching students concepts like brand management, Herrington was a military-intelligence officer, ascending to the rank of lieutenant colonel. What he is seeing in the Pearl River Delta, he tells me, is scaring the hell out of him — and not for what it means to China.

"I can guarantee you that there are people in the Bush administration who are studying the use of surveillance technologies being developed here and have at least skeletal plans to implement them at home," he says. "We can already see it in New York with CCTV cameras. Once you have the cameras in place, you have the infrastructure for a powerful tracking system. I'm worried about what this will mean if the U.S. government goes totalitarian and starts employing these technologies more than they are already. I'm worried about the threat this poses to American democracy."

Herrington pauses. "George W. Bush," he adds, "would do what they are doing here in a heartbeat if he could."

China-bashing never fails to soothe the Western conscience — here is a large and powerful country that, when it comes to human rights and democracy, is so much worse than Bush's America. But during my time in Shenzhen, China's youngest and most modern city, I often have the feeling that I am witnessing not some rogue police state but a global middle ground, the place where more and more countries are converging. China is becoming more like us in very visible ways (Starbucks, Hooters, cellphones that are cooler than ours), and we are becoming more like China in less visible ones (torture, warrantless wiretapping, indefinite detention, though not nearly on the Chinese scale).

What is most disconcerting about China's surveillance state is how familiar it all feels. When I check into the Sheraton in Shenzhen, for instance, it looks like any other high-end hotel chain — only the lobby is a little more modern and the cheerful clerk doesn't just check my passport but takes a scan of it.

"Are you making a copy?" I ask.

"No, no," he responds helpfully. "We're just sending a copy to the police."

Up in my room, the Website that pops up on my laptop looks like every other Net portal at a hotel — only it won't let me access human-rights and labor Websites that I know are working fine. The TV gets CNN International — only with strange edits and obviously censored blackouts. My cellphone picks up a strong signal for the China Mobile network. A few months earlier, in Davos, Switzerland, the CEO of China Mobile bragged to a crowd of communications executives that "we not only know who you are, we also know where you are." Asked about customer privacy, he replied that his company only gives "this kind of data to government authorities" — pretty much the same answer I got from the clerk at the front desk.

When I leave China, I feel a powerful relief: I have escaped. I am home safe. But the feeling starts to fade as soon as I get to the customs line at JFK, watching hundreds of visitors line up to have their pictures taken and fingers scanned. In the terminal, someone hands me a brochure for "Fly Clear." All I need to do is have my fingerprints and irises scanned, and I can get a Clear card with a biometric chip that will let me sail through security. Later, I look it up: The company providing the technology is L-1.
http://www.rollingstone.com/politics..._allseeing_eye
JackSpratts is offline   Reply With Quote
Old 21-05-08, 10:00 AM   #2
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,016
Default

‘Big Brother’ Database for Phones and E-Mails
Richard Ford

A massive government database holding details of every phone call, e-mail and time spent on the internet by the public is being planned as part of the fight against crime and terrorism. Internet service providers (ISPs) and telecoms companies would hand over the records to the Home Office under plans put forward by officials.

The information would be held for at least 12 months and the police and security services would be able to access it if given permission from the courts.

The proposal will raise further alarm about a “Big Brother” society, as it follows plans for vast databases for the ID cards scheme and NHS patients. There will also be concern about the ability of the Government to manage a system holding billions of records. About 57 billion text messages were sent in Britain last year, while an estimated 3 billion e-mails are sent every day.

Home Office officials have discussed the option of the national database with telecommunications companies and ISPs as part of preparations for a data communications Bill to be in November’s Queen’s Speech. But the plan has not been sent to ministers yet.

Industry sources gave warning that a single database would be at greater risk of attack and abuse.

Jonathan Bamford, the assistant Information Commissioner, said: “This would give us serious concerns and may well be a step too far. We are not aware of any justification for the State to hold every UK citizen’s phone and internet records. We have real doubts that such a measure can be justified, or is proportionate or desirable. We have warned before that we are sleepwalking into a surveillance society. Holding large collections of data is always risky - the more data that is collected and stored, the bigger the problem when the data is lost, traded or stolen.”

David Davis, the Shadow Home Secretary, said: “Given [ministers’] appalling record at maintaining the integrity of databases holding people’s sensitive data, this could well be more of a threat to our security, than a support.”

The proposal has emerged as part of plans to implement an EU directive developed after the July 7 bombings to bring uniformity of record-keeping. Since last October telecoms companies have been required to keep records of phone calls and text messages for 12 months. That requirement is to be extended to internet, e-mail and voice-over-internet use and included in a Communications Data Bill.

Police and the security services can access the records with a warrant issued by the courts. Rather than individual companies holding the information, Home Office officials are suggesting the records be handed over to the Government and stored on a huge database.

One of the arguments being put forward in favour of the plan is that it would make it simpler and swifter for law enforcement agencies to retrieve the information instead of having to approach hundreds of service providers. Opponents say that the scope for abuse will be greater if the records are held on one database.

A Home Office spokesman said the Bill was needed to reflect changes in communication that would “increasingly undermine our current capabilities to obtain communications data and use it to protect the public”.
http://business.timesonline.co.uk/to...cle3965033.ece





Secret Data in FBI Wiretapping Audit Revealed With Ctrl+C
Ryan Singel

Once again, supposedly sensitive information blacked out from a government report turns out to be visible by computer experts armed with the Ctrl+C keys -- and that information turns out to be not very sensitive after all.

This time around, University of Pennsylvania professor Matt Blaze discovered that the Justice Department's Inspector General's office had failed to adequately obfuscate data in a March report (.pdf) about FBI payments to telecoms to make their legacy phone switches comply with 1995 wiretapping rules. That report detailed how the FBI had finished spending its allotted $500 million to help telephone companies retrofit their old switches to make them compliant with the Communications Assistance to Law Enforcement Act or Calea-- even as federal wiretaps target cellphones more than 90 percent of the time.

This isn't the first time the Justice Department has made such an error. In 2007, a U.S. attorney referred to Threat Level's own David Kravets (then at the AP) as a hacker for discovering similar hidden information in a Balco steriod case filing. As far back as 2003, a report on minorities in the Justice Department was also vulnerable. The gaffes may seem humorous, but tell that to confidential informants, for whom such a slip-up could be fatal.

In fact, all one needs to do is open the Calea report with Adobe Reader or Foxit reader, and highlight the tables and cut and paste them into a text editor, something Blaze discovered accidentally when trying to copy a portion of the report into an e-mail to a student.

Some of the tidbits considered too sensitive to be aired publicly?

The FBI paid Verizon $2500 a piece to upgrade 1,140 old telephone switches. Oddly the report didn't redact the total amount paid to the telecom -- slightly more than $2.9 million dollars -- but somehow the bad guys will win if they knew the number of switches and the cost paid.

FBI survey results about wiretaps could also be found hidden under the redaction layer.

For the record, in 2005 and 2005, from talking to federal, state and local law enforcement agencies believed that the top emerging technologies causing surveillance concerns were VOIP, broadband and prepaid cellphones. While cops have long fretted about encryption and one might expect it to be in this list, it seems to have never been a problem for wiretapping.

In 2005, only 8 percent had tried tapping internet phone calls, but that number rose to 34 percent in 2006. In 2006, 35 percent of agencies had tried some sort of surveillance on broadband, but the question wasn't asked in 2005.

The price of wiretaps and pen traps still limits surveillance, according to 68 percent of agencies in 2005 and 65 percent in 2006. Meanwhile, telecoms seem to be getting better at providing data in standard formats to cops, whose complaints about data format fell dramatically from 60 percent in 2005 to 12 percent in in 2006.

But, oddly, 41 percent of agencies in 2006 say investigations have been hampered by companies not complying with Calea's mandates, while in 2005, that number was only 22 percent.

Other nuggets? Hidden info in a blacked-out screenshot of the FBI's wiretapping help-line complaint-management software reveals that even wiretappers have IT problems.

Cops in Montgomery County, Maryland had trouble right after Christmas in 2007 getting wiretap info delivered. Not far away in Baltimore (the honorary wiretap capital of the United States), cops had problems just before Christmas using the FBI's database of cell towers, which help cops figure out target's location and movements. Kenner, Louisiana, cops just wanted a user name and password to chat in the Law Enforcement forum on ASKCalea.

Now that the cat is out of the bag, one is sure to see a crime wave across the country.

Professor Matt Blaze suggests following NSA's technical recommendations on how to redact documents. Threat Level merely suggests that report writers start telling the classifiers to stop acting like censors from WWII carrier groups.
http://blog.wired.com/27bstroke6/200...t-data-in.html





Proposed Treaty Turns Internet Into a Virtual Police State
Ben Jones

Leaked documents are one of the banes of modern western politics. They reveal exercises and actions being proposed that are generally objectionable to the public. Such a leak occurred with the Anti-Counterfeiting Trade Agreement (ACTA) which seeks to turn the internet into a virtual police state.

Again, it’s one of the few bastions of anti-corruption, Wikileaks, that has spilled the beans on this unsavory topic. Yesterday the site revealed a document proposing a treaty that will significantly limit the privacy and rights of Internet users, to the benefit of multimillion dollar companies.

“ACTA” is basically an attempt to criminalize the Internet, thus allowing a virtual police state to occur by the selective prosecuting of crimes. In short, it’s an international treaty, or hopes to be, that will greatly increase already draconian copyright measures, in a poor attempt to appease the copyright and patent industries.

The proposal is based on the assumption that ‘intellectual property rights’ (a term used nine times on the first page of the proposal, and 24 times over the entire 3 ½ page document) trump personal privacy, data protection, probable cause, and lots of other important principles in western democracies.

The measure which has received wider publicity is the so-called ‘Pirate Bay killer’. At the end of page two, there is a list of things that should be included in a signee’s legal framework, and in the section about criminal sanctions it states “significant willful infringements without motivation for financial gain to such an extent as to prejudicially affect the copyright holder (e.g., Internet piracy)”. Think non-profit, personal use file-sharing.

Of course, this could go two ways, as the MPAA, for instance, has been guilty of ‘Internet piracy’ in the past, with it’s university toolkit.

Worst of all though, are the following two points speaking of “establishment and imposition of deterrent-level penalties” and “ex-officio authority to take action against infringers”. It is argued that the current level of penalties aren’t harsh enough (“people are still doing it, so they’re no deterrent”), so there should be room for harsher punishments. Combine this with the ability to prosecute without a rights holder complaint, which means that people could be liable for millions, or imprisoned (they are talking about CRIMINAL enforcement) for sharing Steal this Film, or Paulo Coelho’s books. So, these people actively want you to share would have no say in any such prosecution.

There are some other pure gems proposed, such as “ex officio authority for customs authorities to suspend import, export and trans-shipment of suspected IPR infringing goods”. Given that copyright law is so complex and convoluted, and that judges make mistakes in the cases they hear, this is worrying.

Unsurprisingly, the US patent office is backed up beyond belief and dominated by patent trolls that wait until a successful business is established, before pouncing to clean up. This would mean the death for any new and innovative products, or art. If that wasn’t bad enough, there is a further provision for rights holders to prod customs officials into suspension. Thus, a company can make an allegation, forcing a competitors products to be held in limbo until sorted.

Protest has been swift. TorrentFreak occasional contributor Jamie King wrote on his own blog: “In the form that it currently appears to exist, ACTA would ratchet-up further the rights of Hollywood and Recording Industry Association of America (RIAA) at the expense of all of our civil liberties. It provisions to criminalize information use practices currently allowed under U.S., European, and international law are completely disproportionate to the ‘problems’ it claims to address.”

Andrew Norton, chairman of the American Pirate Party was much less restrained: “The very existence of the Anti-Counterfeiting Trade Agreement (ACTA) – be it in policy or just planning, sends one definite message to people around the world; Corruption is rife in the interested countries. There can be no other reason for yet another ‘intellectual property’ (itself a misnomer) law aimed at protecting business interests and expanding government intrusion into the private affairs of it’s citizens, in the name of ‘protection’.”

Of course, the other area most affected by this would be whistle-blower sites like Wikileaks itself. The owner of any leaked document can claim copyright infringement on its publication, and have it pulled. In this, ACTA is a very effective censorship tool. For some reason, though, this aspect has not been widely reported, or even mentioned.
http://torrentfreak.com/proposed-tre...-state-080524/





Govt May Get Keys to Your BlackBerry Mailbox Soon
Rashmi Pratap

In a major change of stance, Canada-based Research In Motion (RIM) may allow the Indian government to intercept non-corporate emails sent over BlackBerrys. This is expected to solve the row between the Department of Telecom (DoT) and RIM to a large extent, since the government’s security concerns pertain more to emails from individual users than enterprise customers.

At the core of the issue is the data encryption technology used in BlackBerrys. BlackBerry uses a very high level of encryption — at 256 bits — while sending data. BlackBerry scrambles messages before sending and unscrambles them at the receiver’s BlackBerry. Owing to security concerns, the government wants to be able to intercept and decode the data.

However, the government’s decryption software can decode messages encrypted only up to 40 bits. India wants RIM to either hand over the decryption keys or reduce encryption to 40 bits.

According to officials close to the development, Canadian High Commissioner David Malone and RIM officials met telecom secretary Siddhartha Behura on May 7. “It was explained by RIM that it should be possible for the government to monitor emails to non-business enterprise customers,” sources told ET. “RIM is considering giving access to individual users’ email to the government. Details on this will be provided in two or three weeks,” sources said.

BlackBerry offers two kinds of services — for enterprise (corporate) customers and for individual (non-corporate) users. Majority of its 1,14,000-plus customers in India are from the enterprise segment. However, decrypting emails of non-corporate customers is a larger security concern for Indian intelligence agencies.

A RIM spokesperson said: “RIM operates in more than 135 countries around the world and respects the regulatory requirements of governments. RIM does not comment on confidential regulatory matters or speculation on such matters in any given country.”

Cyber law expert Pavan Duggal, however, said the move to give partial access to the government could open up potential legal risks for BlackBerry service providers. In India, Blackberry services are offered by Bharti Airtel, Reliance Communications, Vodafone and BPL Mobile.

“By virtue of Sec 79 of IT Act 2000, network service providers are made liable for all third-party data or information made available by them. Therefore, if such an action takes place, then potential of legal action arising cannot be ruled out,” Mr Duggal told ET.

He said there was a need for providing a more comprehensive solution to the issue. “BlackBerry issue has various ramifications — jurisdiction, location of servers, applicable law and a sovereign government exercising the right to intercept data located in foreign land. These piecemeal solutions will not work,” he said.

The issue came to light after the Directorate of Revenue Intelligence expressed inability to intercept any exchange of messages between hawala dealers and militant groups that use BlackBerry device.

Security agencies are said to be insisting that RIM must place its server, through which the information is routed to BlackBerry handhelds, in India. This is not acceptable to RIM as it does not do so in other countries where it offers services.

India has repeatedly assured RIM that its commercial interests will be protected and an amicable solution will be arrived at. Globally, there are over 14 million BlackBerry users and RIM has a large interest in the Indian market, which is adding nearly 10 million subscribers every month.
http://economictimes.indiatimes.com/...ow/3041313.cms





Hit Pause On The Evil Button: Google Assists In Arrest Of Indian Man
Michael Arrington

These stories are becoming more common as Internet companies operate under the laws of many counties.

In February A Moroccan man was arrested for pretending to be the Moroccan king’s younger brother, Prince Moulay Rachid, on Facebook. Facebook complied with Morrocca information requests about the man, leading to his arrest. The man was granted a royal pardon after his sentencing, and was out of jail by mid March.

Today we’re hearing of another arrest, this time in India. 22-year-old IT professional Rahul Krishnakumar Vaid. His crime was writing in an orkut community named “I hate Sonia Gandhi.” Sonia Gandhi is a prominent politician in India.

Vaid was charged under section 292 of Indian Penal Code and section 67 of the Information Technology Act because he created a profile and then posted content in vulgar language about Sonia Gandhi in the community.

During investigations, the cyber crime cell of Pune police communicated with Google (which owns Orkut) seeking details about the man who formed this forum and circulated the obscene content. It was known that the vulgar message about Sonia Gandhi was circulated through an email address – Rahulvaidindia@gmail.com . The owner of the email id Rahul Vaid was traced, using information supplied by Google, to Chakarpur in Gurgaon city of Haryana.

He was then charged under section 292 of Indian Penal Code and section 67 of the Information Technology Act because he created a profile and then posted content in vulgar language about Sonia Gandhi in the community. If he’s convicted, he can be imprisoned for up to five years and may have to pay a fine up to Rs one lakh.

This is an issue that needs to be addressed everywhere, but the hot spots right now are areas where extreme laws make what would be legitimate actions in the US or Europe into fairly serious crimes in their jurisdictions. Our companies have to decide if they’ll defy the law and take the consequences. On the upside, users will flock to them knowing their data is secure.
http://www.techcrunch.com/2008/05/18...of-indian-man/





Google Queried by Congressman on Privacy Plans

Privacy concerns raised
Bloomberg News

Google is facing more scrutiny over its acquisition of DoubleClick after a U.S. lawmaker demanded to know how the Internet company will protect consumers' privacy once their operations are combined. The companies collect "a great deal of data" on consumers' Internet activities, Rep. Joe Barton, R-Texas, said Wednesday in a letter to Google Chief Executive Eric Schmidt. Barton, the House commerce committee's senior Republican, asked Schmidt to respond to six questions on the combination by June 6. Barton, whose panel oversees Internet policy, requested information on whether the companies will merge their data when they combine and how they plan to use them.
http://www.siliconvalley.com/news/ci_9343627





FTC Wants to Know What Big Brother Knows About You

'Behavioral targeting' on web is debated
Peter Whoriskey

How do you find a bride these days?

One of the nation's leading online tracking companies knows.

Monitoring consumers at roughly 3,000 Web sites, Revenue Science identified brides by picking out bridal behavior it had seen: anyone who'd gone online to read about weddings in the news, entered "bridesmaid dresses" into a search engine or surfed fashion pages for wedding styles.

The company found 40,000 such people, whom it knows by random number, not name, and sent them a tailored online ad.

"A successful campaign," according to company president Jeff Hirsch.

The growing practice of "behavioral targeting," or sending ads to online users based on their Internet habits, is now under scrutiny by the Federal Trade Commission, whose review could shape not only Web advertising rules but the character of the Web itself.

For while public interest groups argue that compiling profiles of largely unsuspecting Internet users ought to be illegal, online advertisers and publishers respond that their ad targeting tactics protect privacy and may be essential to support the free content on the Web.

Behavioral targeting allows many Web sites to raise ad prices, because advertisers will pay more when they can isolate a particular audience.

Limiting behavioral targeting could "jeopardize the consumer's ability to get free content on the Internet," said Paul Boyle of the Newspaper Association of America, a trade group that represents the business interests of most U.S. dailies, including The Washington Post.

The FTC is considering guidelines, for now voluntary, that would make it harder to target behavior. The principles were issued in December after town hall meetings, and the public comment period ended last month.

As the commission's deliberations begin, some federal and state lawmakers are weighing measures that would be mandatory. New York lawmakers, for example, are considering a law similar to the FTC guidelines.

Now that many Americans spend as much time interacting with the Web as they do watching TV, there is a wealth of information available for targeters: what articles a person reads in online newspapers, what queries he or she types into search engines and what items the person shops for.

Revenue Science and its peers say that because the user profiles they keep are organized by randomly assigned numbers, no personally identifying information is ever stored.

But privacy groups argue that while the items collected by targeters may be "anonymous" when viewed individually, taken together they could enable someone to match the file on "User 927" to a person. For example, if someone repeatedly does an "ego search" on his or her own name, that file might have the name in it repeatedly.

"It is not anonymous if the companies are tracking the same user over time," said Ari Schwartz of the Center for Democracy and Technology, an advocacy group that has filed comments with the FTC.

Especially troubling, he said, is that the targeters can monitor what people are reading, whether it's news or dinner recipes.

Underlying the FTC debate among public interest groups and Web media and advertising groups such as Google, eBay, newspapers and magazines are larger questions about the Web economy.

With surfers accustomed to accessing online entertainment for free, media companies have been pushed toward online advertising, rather than subscriptions or fees, to make money. But by many measures, online advertising revenue has proven disappointing.

While television advertising amounts to $64 billion annually, online advertising amounts to $11 billion, according to TNS Media Intelligence. Even at hugely popular sites, such as YouTube and social networks such as Facebook and MySpace, which each count tens of millions of visitors a month, owners have struggled to make money from ads. Television networks and newspapers, too, have seen that online advertising generates but a fraction of what they receive in print or broadcast, even on a per-person basis. Behavioral targeting promises to bolster sagging online ad revenue with a more profitable approach.

Most online ad targeting is relatively unsophisticated. Advertisers might know the geographic area of a user based on his or her Internet address. Or an advertiser might target a user based on the context of the Web page being read. An online magazine for audiophiles is a natural place for stereo ads, for example.

But if there is no obvious product to pitch on a Web page, the value of the ad space may be very low and is likely to attract only low-paying ads such as those flashing ads about looking for a lost classmate.

What behavioral targeting does is allow advertisers to target ads based not on what's on the page but who is looking at it.

Revenue Science, like other ad targeting services, tracks users by placing a "cookie," or small file, on a computer when it connects to one of the 3,000 Web sites that the company works with. The cookie essentially identifies that browser as a visitor to sites working with Revenue Science and gives each one a randomly assigned number. No names or other personally identifiable information, such as age or address, are recorded in the cookie.

When a user visits such a site, Revenue Science can record what pages were viewed, what search queries were entered and other information. It can even count, if a newspaper or other publisher allows, how many times a person sees a story regarding any given search term, whether it is "al Qaeda" or "denture adhesive."

The practice becomes more powerful as users move from site to site, betraying more information about their tastes. While some Web sites refuse to share their behavior files with other sites, the ad networks offer financial incentives to Web sites that do. (The Washington Post, which uses Revenue Science, does not allow Web behavior from The Post's site to be accessed by others.)

Detecting from previous Web visits and searches that a reader may be interested in new sport-utility vehicles, for example, a Web site can make as much as 10 times the amount of money showing an ad to that user, compared with an undifferentiated ad.

But while the tactic may lead to profits, it also creates unease. A March poll by Harris Interactive showed that six in 10 people are not comfortable when Web sites use information about a person's online activity to tailor advertisements or content.

As the long-brewing debate shifts to the Federal Trade Commission and possibly Congress, newspapers are likely to play a leading role. The Newspaper Association of America has filed a brief with the FTC arguing that some of the voluntary rules proposed by the agency's staff might violate the First Amendment.

More than 600 newspapers have formed an ad consortium with Yahoo. Another company, formed by the New York Times and three other chains, similarly offers advertisers behavioral targeting.

"The problem for newspapers is that a story headlined 'Two Dead in Baghdad' isn't very product-friendly," said Kent Ertugrul, chief executive of Phorm, a behavioral targeting company working with British newspapers. "But if you know who is looking at the page, that's where the opportunity is."

It is just such added revenue, newspaper lobbyists argue, that the troubled newspaper industry may need to survive the online transition.

In its first draft of voluntary guidelines, the FTC staff called for clear warnings of tracking and for allowing users to permanently opt out of a Web site's tracking mechanism.

"Every Web site," according to the FTC's draft rules, should allow consumers to "choose whether or not to have their information collected for such purpose."

But the newspaper association argues that allowing the user to opt out isn't necessary: If a user doesn't want to be tracked by a site -- assuming the user is aware of being tracked -- he or she can simply avoid that site. Besides, Boyle noted, users are free to periodically delete the cookies on their computers.

"I really don't know that there is a personal privacy issue here," Boyle said. "The government really needs to let things play out."
http://www.washingtonpost.com/wp-dyn...052102989.html





Shops Secretly Track Customers Via Mobile Phone

Signals given off by phones allow shopping centres to monitor how long people stay and which stores they visit
Jonathan Richards

Customers in shopping centres are having their every move tracked by a new type of surveillance that listens in on the whisperings of their mobile phones.

The technology can tell when people enter a shopping centre, what stores they visit, how long they remain there, and what route they take as they walked around.

The device cannot access personal details about a person’s identity or contacts, but privacy campaigners expressed concern about potential intrusion should the data fall into the wrong hands.

The surveillance mechanism works by monitoring the signals produced by mobile handsets and then locating the phone by triangulation – measuring the phone’s distance from three receivers.

It has already been installed in two shopping centres, including Gunwharf Quays in Portsmouth, and three more centres will begin using it next month, Times Online has learnt.

The company that makes the dishes, which measure 30cm (12 inches) square and are placed on walls around the centre, said that they were useful to centres that wanted to learn more about the way their customers used the store.

A shopping mall could, for example, find out that 10,000 people were still in the store at 6pm, helping to make a case for longer opening hours, or that a majority of customers who visited Gap also went to Next, which could useful for marketing purposes.
In the case of Gunwharf Quays, managers were surprised to discover that an unusually high percentage of visitors were German - the receivers can tell in which country each phone is registered - which led to the management translating the instructions in the car park.

The Information Commissioner's Office (ICO) expressed cautious approval of the technology, which does not identify the owner of the phone but rather the handset's IMEI code - a unique number given to every device so that the network can recognise it.

But an ICO spokesman said, "we would be very worried if this technology was used in connection with other systems that contain personal information, if the intention was to provide more detailed profiles about identifiable individuals and their shopping habits.”

Only the phone network can match a handset's IMEI number to the personal details of a customer.

Path Intelligence, the Portsmouth-based company which developed the technology, said its equipment was just a tool for market research. "There's absolutely no way we can link the information we gather back to the individual,” a spokeswoman said. “There's nothing personal in the data."

Sharon Biggar, the company's chief operating officer, said that one of the stores which had already deployed the receivers did not want its name revealed for fear of alarming its customers.

Liberty, the campaign group, said that although the data do not meet the legal definition of ‘personal information’, it "had the potential" to identify particular individuals' shopping habits by referencing information held by the phone networks.

The receivers together cost about £20,000 to rent per month. About 20 the units, which are unobtrusive, cream-coloured boxes about the size of a satellite dish, would be needed to cover the Bluewater shopping centre.

Bluewater, in Kent, said it had no plans to deploy the equipment. A spokesman for Gunwharf Quays was not available for comment.

Owners of large buildings currently have to rely on manual surveys to find out how customers use the space, which can be relevant to questions of design such as where the toilets should be located or which stores should be placed next to one another.

Other types of wireless technology, such as wi-fi and Bluetooth, can be used to locate devices, but the regular phone network signal is preferable because it is much more powerful and fewer receivers are needed to monitor a given area.

Phone networks have long been capable of gauging the rough location of a handset using three phone masts, but the margin error can be as great as 2km. The process is also less efficient when the phone is indoors. Path Intelligence's technology can tell where a phone is to "within a couple of metres."

"You're basically going to know that that person has been in Starbucks," Toby Oliver, the company's chief technology officer, said.

Even when the owner is not using it, a mobile phone makes contact with the network every couple of minutes, which is enough for the receivers to get a reading on its position.
http://technology.timesonline.co.uk/...cle3945496.ece





Internet Story of Pasco 'Wizard' Teacher Spreads Like Magic
Jeffrey S. Solochek

LAND O'LAKES, FLA — Marge Whaley has been called her share of names during her 16 years on the Pasco County School Board.

But nothing compares to the vitriol of Whaley's correspondence from the past two weeks.

"I've been called the worst things I've been called as a School Board member," said Whaley, who has received as many as 50 angry calls and e-mails a day from all over the country. "I got called an 'effing' idiot on my voice mail. … I got called an incompetent turd."

The subject of their venom? A local TV report about a Pasco substitute teacher who claimed to be fired for "wizardry."

• • •

Ordinarily, the sacking of a substitute teacher doesn't make the news at all.

But Jim Piculas said the magic word when he called the local CBS news outlet seeking help and attention to his story.

"It just sounded outrageous," Channel 10 reporter Janie Porter recalled. "The term 'wizardry' that he used, it sounded like the kind of story that would generate a lot of buzz online and on TV."

So instead of sending his call to some nameless producer behind the scenes, the station sent a crew out to interview him and capture his disappearing toothpick trick on tape.

The May 5 story, with the eye-catching Internet headline "Magic trick costs teacher job," quickly launched the 48-year-old former Marine and banker from Tarpon Springs onto the World Wide Web. The report noted that district officials said "it wasn't just the wizardry," and that Piculas "had other performance issues" such as failing to follow the class lesson plan.

In fact, assistant superintendent Renalia DuBose told the St. Petersburg Times, it wasn't the magic trick at all. Rather, the district had written reports from the principal and a teacher at Rushe Middle School detailing Piculas' use of profane language, his inability to control the class and his decision to put a student in charge — something the student's parent complained about.

But those details got drowned out as the tale bounced from blog to blog. It was the wizardry angle, with all its Harry Potter imagery, that grabbed the spotlight.

"The teacher was very smart," said Sree Sreenivasan, a professor of new media at the Columbia University School of Journalism. "It was in his interest to spin it the way he did. … That's a headline I would click and read."

So, too, would thousands of people across the globe.

A story for bloggers

Dozens of bloggers all over the world linked to the story, offering their own comments about the sorry state of Pasco County, Florida, schools and teachers.

Within a day, mainstream media across the country began picking up on the story, too. Piculas said he has received about 20 calls a day from far-flung locales seeking interviews, all of which he rejected. Perhaps the biggest hit was MSNBC's Countdown With Keith Olbermann, which deemed the Pasco County school district one of its three "Worst Persons in the World" for May 7.

"He did a magic trick in which he made a toothpick disappear. Then he got an urgent summons to a meeting at which the principal accused the teacher of, quote, wizardry. (In mocking voice) 'He turned me into a newt,' " Olbermann said in the broadcast, laughing. "Now, most of Florida is in the Eastern time zone. But apparently Land O'Lakes is one of those pockets that uses its own clock. Their time zone is apparently the Middle Ages."

Superintendent Heather Fiorentino sent Olbermann an e-mail urging him to check the record for himself.

"There were several compelling reasons for the dismissal, none of which were even remotely related to 'Wizardry,' as was suggested in the news accounts," she wrote.

Some local reporters looked at the district files and didn't write about Piculas. Others, including Channel 10, aired follow-ups giving more detail about what happened during Piculas' last classroom stint in January.

Still, the original story slogged on. Each link it received from another Web site pushed it higher up the Google search page, where more people could find it.

Some bloggers urged readers to contact Pasco school officials with their opinions about firing the "wizard."

That they did.

The abuse begins

Whaley appears to have received the most e-mails and calls. But the school also got its share of calls. So did Fiorentino and her secretaries. School Board member Allen Altman said he got about 40 e-mails, mostly from outside Florida, most of which could not be reprinted in a family newspaper.

"It was just amazing to me how crude and profane people would be without doing any research to find out if there was any fact behind what they had read in an online story out of state," he said.

Piculas, who said he never intended for the story to be anything but local, expressed dismay at the arc that it had taken. The reader response particularly bothered him.

"Is there so little going on in these peoples' lives? I don't know what these people are thinking. That they are my advocates and that somehow a profanity-laced e-mail is going to benefit me?" he said. "They've got some issues of their own. If I met any of these board members, I would apologize to them profusely."

Made for the Internet

While there's no set recipe to set a story on fire on the Internet, each one has some similarities.

The stories generally are somewhat outlandish or unusual, Sreenivasan said. It helps if the report has a pithy headline that fits in an e-mail subject line, like "Teacher fired for wizardry."

"This is all par for the Internet course," he said. "These are the stories that some journalists love."

And once a story hits on the Internet, it stays there forever.

"It's very difficult to undo this information once it's out there," said Mary Madden, a senior research specialist for the Pew Internet and American Life Project.

She noted that 11 percent of adult Internet users will Google job candidates' names to see what's been written about them on the Web; and 19 percent look into the Web life of colleagues and co-workers.

That could have ill effects for both Piculas, who is applying for teaching jobs in Hillsborough and Hernando counties, and for the school district, which will be known as the county that fires wizards — at least until the next water-skiing squirrel comes along.

A lessons about truth

The entire chain of events left Whaley with a bitter aftertaste. She found herself disgusted with the nasty comments she received, but also with peoples' seeming disregard for facts.

"It really made me stop and think," Whaley said of the versions of Piculas' firing that made the Web. "Because I go to the Internet for information, say, to look at information on medication I'm taking. Now I'll be more careful.

"You really can't count on every Web site … because you're likely to get information that isn't true," she said.
http://www.tampabay.com/news/educati...icle511648.ece





Milestones

Michael Rossman, Who Fought for Campus Rights, Dies at 68
Margalit Fox

Michael Rossman, an organizer of the Free Speech Movement at the University of California, Berkeley, who was later known for his books on politics, society and education, died May 12 at his home in Berkeley. He was 68.

The cause was leukemia, his wife, Karen McLellan, said.

Mr. Rossman’s first book, “The Wedding Within the War” (Doubleday, 1971), was a collection of essays chronicling his experiences in the free speech, antiwar and counterculture movements. Reviewing the collection in The New York Times Book Review, the historian Martin Duberman called it “a dazzling, moving book,” adding: “I find the life Rossman is trying to fashion for himself admirable, and the book he’s written about it exhilarating.”

Mr. Rossman’s other books include “On Learning and Social Change” (Random House, 1972) and “New Age Blues: On the Politics of Consciousness” (Dutton, 1979).

Michael Dale Rossman was born on Dec. 15, 1939, in Denver and reared in Northern California. His father, Harold, was the editor of The Labor Herald, the weekly newspaper of the Congress of Industrial Organizations in California. Mr. Rossman studied at the University of Chicago before transferring to Berkeley, from which he received a bachelor’s degree in mathematics in 1963.

Mr. Rossman was a graduate student in math at Berkeley when the Free Speech Movement burst into being on Oct. 1, 1964. He was among the hundreds of students who massed around a police car that day and the next to stop officers from taking away the civil rights organizer Jack Weinberg. (Mr. Weinberg had been arrested for violating a longstanding university ban on political advocacy on campus.)

A close friend of Mario Savio, the movement’s best-known leader, Mr. Rossman left graduate school in 1966 to devote himself to activism, lecturing on campuses around the country. The Free Speech Movement, which quickly spread to other universities, made political discourse a basic right on college campuses throughout the nation.

Mr. Rossman remained a community activist to the end of his life. For the last three decades, he also taught primary-school science in Berkeley.

In addition to his wife, Mr. Rossman is survived by two sons, Lorca, of Olema, Calif., and Jaime Kaszynski of Olympia, Wash; a brother, Jared, of Redway, Calif.; a sister, Devora Rossman of Mendocino, Calif.; and one grandchild.

As a consequence of his involvement with the Free Speech Movement, Mr. Rossman spent nine weeks in jail in 1967. There, he was assigned to garbage detail, a job far less punitive than his jailers must have imagined.

As Mr. Rossman explained in an essay in “The Wedding Within the War,” he had no sense of smell.
http://www.nytimes.com/2008/05/19/ed...19rossman.html





Supreme Court Upholds Law Aimed at Child Pornography
David Stout

The Supreme Court on Monday upheld a 2003 federal law aimed at child pornography, concluding in a 7-to-2 opinion that a federal appeals court was wrong to find the law unconstitutionally vague.

“Child pornography harms and debases the most defenseless of our citizens,” Justice Antonin Scalia wrote for the court. “Both the state and federal governments have sought to suppress it for many years, only to find it proliferating through the new medium of the Internet.”

The ruling scathingly rejected contentions that the 2003 legislation was so broadly written that it could make it a crime to share or even describe depictions of children in explicit sexual situations, even if the depictions are inaccurate, the children do not really exist and the intention is innocent.

Monday’s decision in United States v. Williams reinstated the conviction of Michael Williams of Florida, who was caught in a federal undercover operation in April 2004 and found guilty later of “pandering” child pornography, a charge defined in part as promoting or distributing real or “purported” material in a way that reflects the belief — or is intended to persuade another — that the material is indeed child pornography.

Mr. Williams was nabbed offering to trade nude pictures of his young daughter and other forms of child pornography in an Internet chat room. He did not actually have pictures of his daughter, but he did have 22 pornographic images of other children on his computer hard drive. He pleaded guilty to possessing that material, which has long been a crime, and was sentenced to five years in prison. That aspect of the case against him was not part of the Supreme Court argument.

Instead, lawyers on his behalf challenged the “pandering” charge, which also carries a five-year sentence, asserting that it was so “overly broad” as to violate the First Amendment guarantee of free speech. The United States Court of Appeals for the 11th Circuit found that argument persuasive, reasoning that offering a copy of “Snow White” on false claims that it depicts minors engaging in sex could be construed as criminal behavior.

But Justice Scalia dismissed the 11th Circuit’s finding, its reliance on what he considered far-fetched hypothetical situations and the notion that the statute under review would cause all sorts of fact-finding problems. Judges and juries are routinely called upon to assess difficult issues of fact and intent involving charges like conspiracy, incitement and solicitation, he wrote.

In 2002, the court struck down a law that made it a crime to create, distribute or possess “virtual” child pornography that uses computer-generated images or young-looking adults rather than real children. But, as Justice Scalia noted on Monday, the Supreme Court has held that the government can criminalize the mere possession of actual child pornography, as distinct from mere possession of pornography involving adults.

Justice Scalia’s opinion not only swept aside the defendant’s contention that the law as written was too vague but said it made no difference whether the pornography was offered for sale or was promoted as being free. Consider a drug case, he suggested: “It would be an odd constitutional principle that permitted the government to prohibit offers to sell illegal drugs, but not offers to give them away for free.”

Joining the opinion were Chief Justice John G. Roberts Jr. and Justices John Paul Stevens, Anthony M. Kennedy, Clarence Thomas, Stephen G. Breyer and Samuel A. Alito Jr.

Justices David H. Souter and Ruth Bader Ginsburg dissented, with Justice Souter writing that promoting images that are not real children engaging in pornography still could be prosecuted under the law at issue.
http://www.nytimes.com/2008/05/20/wa...scotus.html?hp





Senators OK $1 Billion for Online Child Porn Fight
Anne Broache

A U.S. Senate panel has unanimously approved a bill that would encourage federal, state, and local police to use and create special software designed to nab child pornography swappers on peer-to-peer file-sharing networks.

The Senate Judiciary Committee on Thursday voted to send an amended version of the Combating Child Exploitation Act, chiefly sponsored by Sen. Joe Biden (D-Del.), to the full slate of politicians for a vote.

All told, the bill would allocate more than $1 billion over the next eight years for a broad array of efforts aimed at tackling Internet crimes against children. It calls for hiring 250 new federal agents at the FBI, the Immigrations and Custom Enforcement Agency, and the U.S. Postal Service dedicated to child exploitation cases; for beefing up personnel, equipment, and educational programs designed to combat Internet crimes against children; and for creating new forensics laboratories if the attorney general deems it necessary to deal with a "backlog" of online child exploitation cases.

"We need to give law enforcement the funds and the tools to pull the plug on Internet predators," Biden said in a statement.

An amendment adopted Thursday also adds new sections to the original bill that would rewrite existing child pornography laws. One section is designed to make it clear that live Webcam broadcasts of child abuse are illegal, which the bill's authors argue is an "open question." Another change is aimed at closing another perceived loophole, prohibiting digital alteration of an innocent image of a child so that sexually explicit activity is instead depicted.

It's unclear whether the changes are necessary. The Justice Department in the past, for instance, has netted guilty pleas in cases related to live Webcam recordings involving minors engaged in sexual acts.

The bill's passage follows a hearing last month at which Biden and other senators suggested they saw considerable promise in software designed to detect child pornography sources--specifically a tool called "Operation Fairplay." The so-called "comprehensive computer infrastructure" was developed two years ago by Special Agent Flint Waters in the Wyoming Attorney General's Office, where the system is still housed, and is currently being used by online child exploitation investigators nationwide.

The bill approved Thursday allocates $2 million for the attorney general to build upon that software by creating a "National Internet Crimes Against Children Data System," which would make information about ongoing cases--particularly high-priority ones--accessible to investigators nationwide and coordinate development of new software tools designed to detect alleged child predators in real time.

Through the existing Fairplay system, investigators log onto peer-to-peer file-sharing networks as any other person would and search for files containing certain keywords that are likely to indicate child pornography is involved. Then they download files--frequently videos, sometimes as long as 20 to 30 minutes, with names like "children kiddy underage illegal.mpg" and much more obscene--to their own machines. The Fairplay software allows the investigator to obtain the IP address of the file's sender and, in some cases, display its geographic location in map form.

Once armed with an IP address and date and time of the download, investigators can subpoena the Internet service provider for more information, such as name and address of the subscriber who was assigned it at that moment. It's not clear whether any wiretaps are also conducted to monitor ongoing file-swapping.

Through that process, investigators have identified more than 600,000 unique computers allegedly trafficking in child pornography and traced them to the United States. But Biden and others have voiced dismay that they're only equipped with the resources to investigate about 2 percent of those potential cases.
http://www.news.com/8301-10784_3-994...?tag=nefd.lede





Teen Charged After Posting Nude Photos of 16-Year-Old on MySpace
Anne Jungen

Felony charges were filed today against a La Crosse teen accused of posting nude photographs of a 16-year-old female on his MySpace page.

Alex Phillips, 17, of W4300 Hwy. M, No. 79, was charged with possession of child pornography, sexual exploitation of a child and defamation in La Crosse County Circuit Court.

La Crosse County authorities confirmed Saturday that Phillips' Web site had two photographs of the naked girl after receiving a tip from police in Janesville, Wis., according to the criminal complaint.

Phillips had no intention of removing the photographs, the complaint stated. Told by police he could go to jail for posting the photos, “his reply was, ‘(Expletive) that. I am keeping them up,’” according to the complaint.
http://www.lacrossetribune.com/artic.../08myspace.txt





Police Quiz Photographer Over Nude Shots

Police have interviewed photographer Bill Henson about an art exhibition featuring nude shots of teenagers.

The exhibition was to open at the Roslyn Oxley9 gallery in the Sydney suburb of Paddington last night.

The gallery agreed to suspend the exhibition while police conduct interviews.

Police still need to talk to a 13-year-old girl who appears on the invitation for the exhibition.

They also want to speak to her parents, before deciding if the exhibition should go ahead.

Images from the exhibition that were displayed on the gallery's website have been taken down.

Detectives from the Child Exploitation Internet Unit are reviewing them.

The Department of Community Services has also been contacted.

The Minister for Community Services, Kevin Greene, says police and the Office of the Children's Guardian are investigating to see if the photos break any laws.

'Revolting'

The exhibition has reopened the debate about censorship and what constitutes pornography.

Gallery staff say they received a large number of phone complaints before the exhibition was suspended.

Prime Minister Kevin Rudd has told Channel Nine the photos are revolting.

"Kids deserve to have the innocence of their childhood protected," Mr Rudd said.

"I have a very deep view of this. For God's sake, let's just allow kids to be kids.

"Whatever the artistic merits of that sort of stuff, frankly I don't think there are any."

The New South Wales Opposition Leader, Barry O'Farrell, says the photographs are inappropriate.

"Art will always push society's boundaries, but protection of our children must always be the priority," he said.

"It wasn't OK for a 14-year-old model fully dressed to be on the catwalk for Australian Fashion week, [so] it's definitely not OK for naked children to have their privacy and childhood stolen in the name of art."

Child protection advocate Hetty Johnston thinks police should lay charges.

"It's child pornography by any name you want to call it."

'Surprising' reaction

But art market analyst Michael Reid saw the photos before the exhibition was due to open.

He says they do not sexualise the children involved.

"I went and had a very good look at that exhibition before it opened up," Mr Reid said.

"In my opinion it didn't [sexualise the children]."

College of Fine Arts Associate Professor Joanne Mendelsohn thinks the reaction to Henson's work is surprising.

"I remember seeing a major exhibition of his work at the Art Gallery of New South Wales, it might have been his Venice works, about 10 years ago. Not a peep, not a murmur, and yet the work that was shown then is remarkably similar to the work that has caused such an uproar now," she said.
http://au.news.yahoo.com/080522/21/16z28.html





Pixels at an Exhibition
Virginia Heffernan

What do video artists make of YouTube? Every minute, 10 hours of video are uploaded to the video-sharing site, which now shows hundreds of millions of videos each day. The place is a mess. Maybe artists should avoid it altogether.

The curator and Internet-art booster Rachel Greene has come up with another suggestion: artists could use YouTube, like a supply store, slag heap or rag-and-bone shop. To make the point, she recently asked a set of art-world figures — Sue de Beer, Matthew Higgs, Matthew Ronay and Wayne Koestenbaum — to present and project their favorite YouTube videos in Manhattan on May 13 at the Kitchen gallery. According to catalog copy for the show, “Artists Using YouTube,” some of the videos on exhibit provide “indirect fodder” for the artists’ own work.

Fodder — aha. Maybe that’s purpose of YouTube.

The shrewdest contributor to the show is the video artist Sue de Beer. De Beer’s first choice of clip is inspired: the final scene from “The American Soldier,” Rainer Werner Fassbinder’s 1970 film. Two slight men appear, backing nervously away from the camera, each with a gun pointed at the viewer. What an ingenious start. A woman in the frame cries out. The two men startle and turn, just as the camera does an about-face to show another armed man, on his knees, who fires two shots. Down fall both original men, as the film turns to slo-mo. The film is black and white, and the shapes are just simple enough — lockers, as at a bus station; short staircase; pay phone — to be readable at YouTube’s dirtiest resolution.

The person who originally uploaded the Fassbinder clip to YouTube was evidently drawn to the song on the soundtrack (“So Much Tenderness”) and framed the clip as a music video. But de Beer finds other significance in it. The threadbare print, the (mostly) immobile camera and the institutional quality of the set suggest a surveillance video. Indeed, one of de Beer’s other YouTube selections shows actual surveillance footage from the 1999 shooting at Columbine High School. She’s pressing the connection. Taken together, the Fassbinder and Columbine images are a good reminder that since 1970, when “The American Soldier” appeared, documentary audiences have had considerable practice reading surveillance and evidentiary images. With Columbine scenes and murders of all kinds playing on thousands of screens in the YouTube googolplex — the Saddam Hussein execution, the shooting of a police officer in New Hampshire — the Fassbinder scene comes to seem like one of them. Just as primitive artifacts placed in the context of high modernism seem to anticipate it, or interpret it, so a vintage film clip set online amid the YouTube flotsam can take on entirely new meaning.

De Beer also chose a video that shows the fashion designer Coco Chanel pricklishly fielding interview questions in unsubtitled French while smoking in the middle of her ornate drawing room. It’s moving and even unnerving to see a clip like this liberated from commentary. Even five years ago, you’d never have encountered it except in a documentary about fashion or feminism, where its significance would be assigned by pedantic talking heads. On YouTube, the strange tableau takes on a life of its own. Chanel can’t settle down; she fairly squirms and won’t take a seat in her own house. Similarly uncomfortable-looking is the dancer in de Beer’s final choice, “Footworkin,” an amateur video that shows a living-room dancer flapping and kicking to “My Funny Valentine.” Behind the dancer is a wilted bouquet of foil balloons, whose muted shine recalls the gilded mirror behind Chanel. De Beer draws bright lines with her curatorial choices, proposing connections between disparate images and showing how video clips are reincarnated by the format and community of YouTube. It’s an imaginative collection.

The other contributions to “Artists Using YouTube” aren’t as wisely chosen. The artist Matthew Higgs is also a curator, which might explain why his collection advertises its theme — the grooviness of the 1980s — so relentlessly. The archival clips he chose from YouTube serve as an audiovisual lecture, in which they do nothing but loyally make that case. One clip, of Talking Heads playing “Born Under Punches” in Rome in 1980, is shot largely at groin level, amid sound equipment that is being manipulated for feedback squeals and other effects; it’s like being close to the crooked spine and fritzed nervous system of a body that’s simultaneously pushing its sex appeal. The camerawork is pushy and invasive, and Tina Weymouth is stunning, but the film gains nothing, and loses much, by being on YouTube.

Higgs’s second entry, “New Order: Confusion,” is a music video, apparently originally sent to TV stations to promote the song (“For heavy rotation,” a card proposes at the end). It’s a kind of nocturnal race through New York City — subways covered in graffiti, old Times Square marquees and the twin towers in the distance — that seems coked-up on instant nostalgia. But does Higgs expect viewers only to share the ’80s love? It seems so: his final selection, a 1988 video by the Fall, is straight from the nostalgia-channel VH1 Classic, complete with the logo bug. Pop-culture connoisseurs should know about these videos. But get a collection on DVD. As YouTube entries, they don’t have much to say.

Matthew Ronay, a sculptor and another contributor to the exhibition, sent Rachel Greene, the curator, an enormous list of links, flinging at her a series of sobs from the heart — a daunting stream of words and images half-designed as a filibuster. He chose videos that purport to show the supernatural, things like levitation and magic, and though no single one is decisive, they suggest in the aggregate that something is going on here. After Sept. 11, Ronay explained in an e-mail message to Greene, he felt drawn to Islam. “Is my desire to investigate Islam similar to the way that people became interested in Eastern religions during Vietnam?” Looking for answers, he writes, “I read some Joseph Campbell and Unabomber.”

You can’t help watching closely the video clips Ronay provided. A man rises into the air over a circle of fire. Alligators are hypnotized. Gurus of every stripe dilate. Ronay is obsessive. He’s got more. He’s trying to nail something down. Something in the compulsive amassing of evidence for animism, voodoo, shamanism and other paranormal phenomena is heartbreaking and rousing. In his e-mail message to Greene, he relates his YouTube search terms — “spells,” “sacrifice,” “rewilding” — and you can picture him skimming hundreds of videos looking for the face of God.

But Ronay is nonetheless a victim of YouTube. Unlike de Beer, whose rarefied selections make heavy demands on the viewer, Ronay approaches video through search terms, which means he encounters only videos that have been rigged to be found by someone with his interests. What’s more, the videos are prepackaged as proof of a paranormal realm, and that’s no different from how he employs them; he offers no new purpose for the clips. (It seems not to have even occurred to the fourth contributor to the exhibition, the art critic Wayne Koestenbaum, that YouTube videos could be considered freestanding art. As of this writing, he hadn’t settled on specific entries — only subject matter — for his part of the exhibition.)

No artist should take lightly the opportunity to use YouTube. In my view, YouTube is neither a nascent art form nor a video library but a recently unearthed civilization. Everything’s muddy and looks kind of ruined. If you don’t have firm convictions about visual art, you won’t come on them just by poking around; everything will seem worthless. But while most of the stuff being dusted off and put into baggies at YouTube are indeed bent spoons and dime-a-dozen arrowheads, an archeologist with his eyes open can still be surprised by treasure.
http://www.nytimes.com/2008/05/18/ma...l?ref=magazine





Can e-Publishing Overcome Copyright Concerns?

Every so often, I get an e-mailed request like this:

“Dear David: I’ve checked the O’Reilly and Amazon sites, but I can’t seem to find electronic versions of your Missing Manual books.

“I’ve checked out Safari (safari.oreilly.com), where I can pay a subscription fee for unlimited monthly access to hundreds of computer books from various publishers. But that’s not practical for a single book purchase. I also saw the single-chapter PDF purchase option–again, not practical if you’d like the complete book.

“Sounds like a few butts might need to be kicked in the publishing world to push them into the 21st century. Thanks in advance for your help.”

With a sigh, I always reply to these queries with the same sad response:

“Unfortunately, I’ve had terrible experiences releasing my books in electronic form. Twice in my career, ‘blind’ people e-mailed me, requesting a PDF of one of my books. Both times, I sent one over–and both times, it was all over the piracy sites within 48 hours, free for anyone to download.

“I’ve got a mortgage and three kids to put through college, and it broke my heart! Unfortunately, the bad apples have once again spoiled it for everyone else.”

Now, I realize that my position is unpopular in some circles. And the piracy issue really does bum me out, because some of my how-to books (on Windows Vista and Mac OS X, for example) are 900-page behemoths that would be so much easier to carry, read and search right on the screen.

But this week, I came across a blog post by author Steven Poole on just this topic. (It’s at http://stevenpoole.net/blog/free-your-mind, and it contains a couple of naughty words.) He recently conducted an experiment: he offered an electronic download of one of his books, called “Trigger Happy,” on a “pay what you like” model. In assessing the results, he writes:

“Is this, as some people say, an exciting new Internet-age business model for writers and other creative types?

“Er, not really. The proportion of people who left a tip after downloading “Trigger Happy” was 1 in 1,750, or 0.057%.”

Mr. Poole, as it turns out, is just as disinclined as I am to make free electronic delivery his primary distribution channel. Here’s how he covers the “information wants to be free” line of reasoning, which he calls “the Slashdot argument”:

“It says that books, music, films, software and so on ought to be freely distributed to anyone who wants them, simply because they can be freely distributed.

“What is the writer or musician to do, though, if she can’t earn money from her art? Simple, says the Slashdotter: earn your money playing live (if you’re one of those musicians who plays live), or selling T-shirts or merchandise, or providing some other kind of ‘value-added’ service. Many such arguments seem to me to be simple greed disguised in high-falutin’ idealism about how ‘information wants to be free.’

“…I think the Slashdot argument can actually be disposed of rapidly with one rhetorical question, as follows.

“Oh Mr. Freetard, you work as a programmer, do you? How interesting. So do you perform all your corporate programming duties for free, and earn your keep by selling personally branded mousemats on the side?

“Didn’t think so.”

But what about the Radiohead experiment, where the band released an album online using a “pay what you like” system–and succeeded?

As Mr. Poole points out, that’s fine if you’re already an established name: “If there’s been a comparable success by a band that hasn’t already gained its cultural capital and name-recognition through the evils of copyright and corporate promotion, I’d like to know about it.”

So yes, this is how I, as an author who’s been twice-burned, truly feel. And yet I realize that it puts me, rather awkwardly, on the same side of the piracy issue as the record companies and movie companies, who are suing teenagers for downloading songs, and of whom I’ve made endless fun.

Actually, authors like me are lucky; our work is, at this point, pretty much protected with unbreakable copy protection. That is, our bound and published books can’t be duplicated infinitely and distributed by the millions online.

So what would I do if I were in the business of music or movies, where piracy is so much easier?

I’m just happy I don’t have to answer that question.
http://pogue.blogs.nytimes.com/2008/.../index.html?hp





Apple, CBS Sued by Device-Maker Over 'Mighty Mouse' Trademark

Apple, maker of the iPod media player, and CBS were sued for trademark infringement by closely held computer-accessory firm Man & Machine over the name of Apple's wireless "Mighty Mouse" device. Apple started selling computer mice under the name "Mighty Mouse" more than a year after Man & Machine began selling waterproof and chemical-resistant computer mice to labs and hospitals under that name in 2004, according to the suit filed Tuesday in Greenbelt, Md. Man & Machine claims its earlier use trumps Apple's, even though Apple sells more products. The names of both products play on the 1942 animated super hero mouse whose trademark rights are partly owned by CBS. New York-based CBS is accused of licensing "Mighty Mouse" to Apple for computer devices when its trademark doesn't cover such goods. Man & Machine and CBS both hold trademark applications for the term and are challenging each other for approval at the U.S. Patent and Trademark Office.
http://www.siliconvalley.com/news/ci...nclick_check=1





“First-sale” doctrine an issue in summary judgment

Federal Court Slaps Down Autodesk Arguments, Favors eBay Seller

The US District Court in Seattle on Wednesday ruled in favor of eBay seller Timothy S. Vernor, denying Autodesk’s request for “summary judgment” against Vernor. In doing so the court ruled that Vernor had the right to appeal for relief from Autodesk actions based on the “first sale” doctrine of copyright law. In finding for Vernor, Judge Richard Jones’ ruling dismissed most of Autodesk’s wide-ranging legal arguments as without standing.

If allowed to stand, the ruling effectively pulls the heart out of the license agreements that accompany most retail software products on the market today. You can be sure that not only Autodesk, but most software companies, will take action of some sort in response. It is unimaginable that Autodesk will not appeal this decision.

The case is not over; the court has ordered both sides to sit down and discuss whether the case should continue and settle Vernor’s claim that Autodesk engaged in unfair trade practices in violation of state law in either California (Autodesk’s home) or Washington state (Vernor’s home). Their report to the court is due June 27.

The 21-page ruling sifts through the many and varied arguments raised by both parties. It did so by first settling the issue of whether or not the “first sale” doctrine applied. Once the court found that “first sale” applied, his findings then used “first sale” as a lens for examining all other claims.

To summarize, the court ruled:

• Vernor has legal standing to seek relief;
• Vernor is entitled to protection from Autodesk based on the “first sale doctrine” of copyright law;
• Vernor’s sale of boxes of AutoCAD is not “contributory copyright infringement” as Autodesk alleged;
• Autodesk has not established that its license binds Vernor or his customers;
• There is room for further argument on Vernor’s claim of unfair trade practices.

Here are some quotes from the ruling:

“Autodesk’s additional contention that Mr. Vernor’s harm flows from eBay’s policies rather than Autodesk is specious. … EBay would have taken no action against Mr. Vernor but for Autodesk’s allegations. There is no basis to blame eBay for the consequences of Autodesk’s copyright enforcement efforts.”

“Not only has Autodesk failed to surmount the thorny issues of privity and mutual assent inherent in its contention that its License binds Mr. Vernor and his customers, it has ignored the terms of the License itself. The Autodesk License is expressly “nontransferable.” … Autodesk does not explain how a nontransferable license can bind subsequent transferees.”

A copy of the ruling will be posted at CADCAMNet tonight.
http://aecnews.com/news/2008/05/21/3414.aspx





Little Orphan Artworks
Lawrence Lessig

CONGRESS is considering a major reform of copyright law intended to solve the problem of “orphan works” — those works whose owner cannot be found. This “reform” would be an amazingly onerous and inefficient change, which would unfairly and unnecessarily burden copyright holders with little return to the public.

The problem of orphan works is real. It was caused by a fundamental shift in the architecture of copyright law. Before 1978, copyright was an opt-in system, granting protection only to those who registered and renewed their copyright, and only if they marked their creative work with the famous ©. But three decades ago, Congress created an opt-out system. Copyright protection is now automatic, and it extends for almost a century, whether the author wants or needs it or even knows that his work is regulated by federal law.

The old system filtered copyright protection to those works that needed it; the new system regulates indiscriminately. The Congressional Research Service has estimated that just 2 percent of copyrighted works that are 55 to 75 years old retain any commercial value. Yet the system maintains no registry of copyright owners nor of entities from which permission to use a copyrighted work can be sought. The consequence has been that an extraordinary chunk of culture gets mired in unnecessary copyright regulation.

The solution before Congress, however, is both unfair and unwise. The bill would excuse copyright infringers from significant damages if they can prove that they made a “diligent effort” to find the copyright owner. A “diligent effort” is defined as one that is “reasonable and appropriate,” as determined by a set of “best practices” maintained by the government.

But precisely what must be done by either the “infringer” or the copyright owner seeking to avoid infringement is not specified upfront. The bill instead would have us rely on a class of copyright experts who would advise or be employed by libraries. These experts would encourage copyright infringement by assuring that the costs of infringement are not too great. The bill makes no distinction between old and new works, or between foreign and domestic works. All work, whether old or new, whether created in America or Ukraine, is governed by the same slippery standard.

The proposed change is unfair because since 1978, the law has told creators that there was nothing they needed to do to protect their copyright. Many have relied on that promise. Likewise, the change is unfair to foreign copyright holders, who have little notice of arcane changes in Copyright Office procedures, and who will now find their copyrights vulnerable to willful infringement by Americans.

The change is also unwise, because for all this unfairness, it simply wouldn’t do much good. The uncertain standard of the bill doesn’t offer any efficient opportunity for libraries or archives to make older works available, because the cost of a “diligent effort” is not going to be cheap. The only beneficiaries would be the new class of “diligent effort” searchers who would be a drain on library budgets.

Congress could easily address the problem of orphan works in a manner that is efficient and not unfair to current or foreign copyright owners. Following the model of patent law, Congress should require a copyright owner to register a work after an initial and generous term of automatic and full protection.

For 14 years, a copyright owner would need to do nothing to receive the full protection of copyright law. But after 14 years, to receive full protection, the owner would have to take the minimal step of registering the work with an approved, privately managed and competitive registry, and of paying the copyright office $1.

This rule would not apply to foreign works, because it is unfair and illegal to burden foreign rights-holders with these formalities. It would not apply, immediately at least, to work created between 1978 and today. And it would apply to photographs or other difficult-to-register works only when the technology exists to develop reliable and simple registration databases that would make searching for the copyright owners of visual works an easy task.

A hired expert shouldn’t be required for an orchestra to know if it can perform a work composed during World War II or for a small museum to know whether it can put a photograph from the New Deal on its Web site. In a digital age, knowing the law should be simple and cheap. Congress should be pushing for rules that encourage clarity, not more work for copyright experts.
http://www.nytimes.com/2008/05/20/opinion/20lessig.html





IP Journal

Can a Dead Brand Live Again?
Rob Walker

Do you remember Brim?

The coffee brand? Perhaps you recall its advertising slogan: “Fill it to the rim — with Brim!” Those ads haven’t been shown in years, and Brim itself has been off retail shelves since the 1990s. Yet depending on how old you are, there’s a fair chance that there’s some echo of the Brim brand in your brain. That’s no surprise, given that from 1961 to around 1995, General Foods spent tens, if not hundreds, of millions of dollars to get it there. But General Foods disappeared into the conglomerate now known as Altria, which also acquired Kraft, maker of Maxwell House. With much smaller sales than that megabrand, Brim soon disappeared — except, perhaps, for a vague idea of Brim that lingered, and lingers even now, in the minds of millions of consumers.

What’s that worth? A small company in Chicago, called River West Brands, figures that it’s definitely worth something, and possibly quite a lot. The firm did its own research a year or so ago and claims that among people over the age of 25, Brim had 92 percent “aided national awareness.” What this means is that if you ask people anywhere in America if they have ever heard of Brim, about 9 out of 10 will say yes. If true, that’s potentially a big deal. Building that level of recognition for a new brand of coffee — or anything else — from scratch would involve an astronomical amount of money, a great deal of time, or both.

Marketers like to talk about something called brand “equity,” a combination of familiarity and positive associations that clearly has some sort of value, even if it’s impossible to measure in a convincing empirical way. Exploiting the equity of dead or dying brands — sometimes called ghost brands, orphan brands or zombie brands — is a topic many consumer-products firms, large and small, have wrestled with for years. River West’s approach is interesting for two reasons.

One is that for the most part the equity — the idea — is the only thing the company is interested in owning. River West acquires brands when the products themselves are dead, not merely ailing. Aside from Brim, the brands it acquired in the last few years include Underalls, Salon Selectives, Nuprin and the game maker Coleco, among others. “In most cases we’re dealing with a brand that only exists as intellectual property,” says Paul Earle, River West’s founder. “There’s no retail presence, no product, no distribution, no trucks, no plants. Nothing. All that exists is memory. We’re taking consumers’ memories and starting entire businesses.”

The other interesting thing is that when Earle talks about consumer memory, he is factoring in something curious: the faultiness of consumer memory. There is opportunity, he says, not just in what we remember but also in what we misremember.

River West is a young company, and few of its ideas have been directly tested in the marketplace. The revival of Brim, for instance, has yet to crystallize into a plan with real manufacturing and distribution partners. But River West is starting to bring some familiar names back into the consumer realm. It is thanks to River West that you can buy Nuprin again at CVS. The firm has also played a role in the return of Eagle Snacks to some grocery-store aisles. In late January, Drugstore.com began accepting orders for Salon Selectives, which is also making its way into 10,000 stores, including every Rite Aid in America and grocery chains like Winn-Dixie and Pathmark. And by way of a deal with River West, Phantom, a Canadian hosiery manufacturer, is pushing a new version of Underalls to department-store and boutique clients in the U.S.

Whether these brand-reanimation efforts pan out as a successful business strategy or not, they offer an unusual perspective on the relationship between brands and the brain. By and large, examinations of successful branding tend to focus on names like Harley-Davidson, Apple or Converse, which have developed “cult” followings. Such cases are misleading, though, because they are not typical of most of what we buy. A great deal of what happens in the consumer marketplace does not involve brands with zealous loyalists. What determines whether a brand lives or dies (or can even come back to life) is usually a quieter process that has more to do with mental shortcuts and assumptions and memories — and all the imperfections that come along with each of those things.

River West’s offices, on the 36th floor of the Chicago Board of Trade Building, are sprinkled with the bric-a-brac of obscure products: a Quisp cereal box, Ipana toothpaste packages, Duz detergent bottles. On a wall of Paul Earle’s office is a framed, five-foot-by-three-foot sheet of uncut “Wacky Packages” stickers — those 1970s trading-card-size brand-parody images that rendered the word Crust in the style of the Crest logo, for example. Earle has a Midwestern everyman quality about him: he’s compact, with a big and friendly let’s-get-along voice and a penchant for deadpan jokes. Only his designer-eyeglass frames deviate from his overall demeanor.

Earle loves brands. They are not mere commercial trademarks to him, but pieces of Americana. He seems not just nostalgic but almost hurt about the fate of the “castoff brands” of the world. “If commerce is part of the American fabric, then brands are part of the American fabric,” he said to me on one occasion. “When a brand goes away, a piece of Americana goes away.”

Earle’s professional entanglement with branding began at Saatchi & Saatchi, where he was a cog in a gigantic ad agency working for gigantic clients, like General Mills and Johnson & Johnson. That was in the mid-1990s, and he saw what happened as conglomerates merged: brands that didn’t have the potential for global scale got squeezed to the bottom shelf, or out of existence. He was attracted to the idea of working with “noncore” brands, but when he figured out that big-agency economics made it impractical, he left Saatchi and went to the Kellogg School of Management at Northwestern University, and then took a brand-management job at Kraft.

At Kraft he observed the same mergers-and-consolidation process from a different angle, and he seems to have found it equally frustrating. “These are American icons with loyal consumers,” he says. “It’s not their fault a $40 billion company doesn’t like them anymore. Consumers like them.” He sees reviving brands as “a civic mission” of sorts. “If it weren’t my job,” he said, “it would be my hobby.” He says this in a way that sounds not just plausible but hard to doubt.

Even so, he has set out to make this particular civic mission turn a profit. While he recognizes that a given brand might not be able to survive in the portfolio of a multinational, different sorts of business models might work to sustain it. As surely as the ownership of brands has consolidated through one megamerger after another, the consumer market seems to be moving in the opposite direction, with an individualism-fueled demand for almost unlimited variety. Earle’s theory is that such demand means room for brands like the ones River West owns, and his idea is facing its most significant test to date, by way of the reanimation of Salon Selectives.

Helene Curtis began selling this line of shampoos in 1987, and sales shot past the $100 million mark within a year or so. It was, one Wall Street enthusiast claimed at the time, “probably the most successful hair-care launch in the history of the universe.” Heavily advertised, the brand was a pioneer of the sales pitch, now routine, of a “salon” product available for home use. Unilever bought Helene Curtis in 1996, acquiring a new batch of cosmetic, shampoo and deodorant brands that had to be integrated into those the conglomerate already offered.

It’s often hard to pin down the exact moment a brand disappears, because a product can linger on retail shelves for quite a while before it’s sold down or otherwise liquidated. But by the early 2000s, Salon Selectives had become a casualty of brand-portfolio consolidation. A few years later, River West acquired what was left of it: intellectual property like the trademarks and the original formulas.

River West’s partner in the Salon Selectives effort is called SSB, which has five full-time employees coordinating the efforts of various subcontractors (manufacturers, package-makers) out of River West’s offices. Selective Beauty is run by Gene Zeffren, a former top executive at Helene Curtis with a Ph.D. in chemistry. Earle and Zeffren are partly motivated by the belief that there is a core of Salon Selectives fans out there who miss their product and are eager to buy it again. You would think, then, that the goal would be to give those consumers their old brand back, just as it once was. And sure enough, when I visited Anne West, the chief marketing officer of the new Salon Selectives, there was an array of pink plastic bottle samples in her office, part of an attempt to match the old color as closely as possible. She showed me a video in which a surprising number of randomly confronted Chicagoans, asked if they remembered Salon Selectives, responded by singing the jingle.

Then she showed me storyboards for new Salon Selectives ads, which were not much like the original ones at all. She went on to explain that while the bottle color would be the same, its shape would be different. The reintroduced line also includes a number of new products, and the products are now more aggressively marketed as “customizable” (by hair length, thickness, texture, etc.) than they were in the earlier incarnation. Then there’s the apple scent. West said fans of the brand in its heyday frequently cited that signature smell as one of the things they missed most about the shampoos. So the new version will have an apple scent — but even that was being tweaked and “updated.” The bottom line is that Salon Selectives isn’t coming back just as it used to be, but sort of as it used to be.

West figures that fans of the brand who are nostalgic for their long-lost product just need to know that it’s back. But the real point now is to attract younger customers who probably never used the stuff. The name “Salon Selectives” might sound familiar to them, so the strategy must balance that familiarity with something that makes the product seem fresh and novel. Later West sent me the new Salon Selectives ads, now running on VH1, Lifetime and other cable networks. The Week in Review is edited and published by Jack Spratts. The spots do not announce the return of a favorite old brand, or even allude to the fact that Salon Selectives was ever gone. In one, a woman escapes from prison and immediately washes her hair. The cop who confronts her admits that she doesn’t look like an escaped con but (punch line) as if she “just stepped out of a salon.” This is followed by glimpses of the (pink) bottles and a quick “mix and match” pitch and then, at the very last second, a snippet of the familiar old jingle, rerecorded. West calls this snippet a “button,” and it clearly aims to function as the slightest mental nudge: this is something you know about.

Among River West’s various projects, this is actually one of the more conservative in testing the boundary between the positive associations of a familiar memory and the attractions of novelty. There’s less room to test that boundary because Salon Selectives hasn’t been “dormant” all that long: At least some fans of the old apple scent are going to have opinions about the “updated” version. Much will depend on specific associations with a product — which is not the same thing as a brand. Brands aren’t quite so tangible, so quantifiable. That’s what’s interesting about them.

One of Paul Earle’s professors at Kellogg was John F. Sherry Jr. (now at Notre Dame), who has devoted some study to “retromarketing” and “the revival of brand meaning.” In 2003 he wrote an article (with Stephen Brown of the University of Ulster and Robert V. Kozinets of Kellogg) on the subject for The Journal of Customer Behavior. “Retromarketing is not merely a matter of reviving dormant brands and foisting them on softhearted, dewy-eyed, nostalgia-stricken consumers,” they asserted. “It involves working with consumers to co-create an oasis of authenticity for tired and thirsty travelers through the desert of mass-produced marketing dreck.”

I wasn’t entirely sure what that meant, but Sherry turned out to be more straightforward in conversation. “There’s no real reason that a brand needs to die,” he told me, unless it is attached to a product that “functionally doesn’t work.” That is, as long as a given product can change to meet contemporary performance standards, “your success is really dependent on how skillful you are in managing the brand’s story so that it resonates with meaning that consumers like.”

The holy grail example of brand reanimation is the Volkswagen Beetle, which a few years ago rose from dormancy and became a hit all over again in an updated form that was both nostalgic and contemporary. The reintroduced Beetle layered “nostalgic reassurance” over modern functionality. “It’s a brand that’s memorable for a lot of different reasons,” Sherry said. “But largely because it evokes this past that never was — that was morally superior or simpler, an era of better craftsmanship. That kind of thing.”

Such abstract notions are much on display at the Licensing International Expo, an annual event at which the owners of cultural properties — TV shows, movies, cartoon characters — meet with makers of things and try to negotiate deals granting them a paid license to use the properties to add meaning and market value to whatever things they make. It is a good place to contemplate the business potential of “the brand” in free-floating form, unmoored to any product or company that may have actually created it. A surprising number of the symbols represented at the expo held last summer in New York were simply brand logos. Spam, for instance, had its own booth. IMC Licensing was there on behalf of its clients Oreo, Altoids, Dole and Oscar Mayer. At one point I encountered a person dressed up as a can of Lysol, which is represented by the Licensing Company.

Another firm that represents a number of consumer brands is the Beanstalk Group, which staked out a rather large chunk of floor space at the expo, complete with a coffee bar and about 20 tables. Owned by Omnicom Group, Beanstalk is the licensing firm for a wide range of cultural properties, from Harley-Davidson to Andy Warhol to the United States Army. None of these are dead brands, of course, but Beanstalk’s track record with converting brand meaning into revenue is the reason Paul Earle was at the licensing expo. Beanstalk was exploring strategies to revive the Coleco and Brim brands as, essentially, licensing fodder.

Michael Stone, the president and chief executive of Beanstalk, has a refined sense of the licensing business, and how consumer brands fit into it. He knows what many people think the business boils down to: I make plastic lunchboxes and you own the rights to reproduce images of Spider-Man. How about a Spider-Man lunchbox? Stone cheerfully explained to me that this is merely a “decorative” form of licensing, and that’s not his game. As a point of contrast, he told me about Beanstalk’s involvement with Stanley Works, the venerable maker of hand tools.

Stanley hired Beanstalk about nine years ago. Stanley conducted “consumer permission research” to try to determine where the Stanley brand could go. “I remember looking through the focus-group tests, and there was a guy who absolutely swore that he had a Stanley ladder in his garage.” Stone paused. “Stanley never made ladders.” This is an excellent example of what “brand equity” really means in the marketplace.

In contrast to the fanatical-devotion theory, part of the point of most branding is very specifically to circumvent conscious thought. Psychologists use the word “heuristics” to refer to the mental shortcuts and rules of thumb that allow us to resolve the various routine problems of everyday life without having to make a spreadsheet for every trivial decision. Brand owners want a way into your purchase heuristics. Often it is not so much a matter of, say, a Stanley Works fanatic seeking out all products bearing that trademark; it’s a matter of looking for a product and choosing one with a particular trademark that, for whatever reason, we find acceptable. This is not brand loyalty. It’s brand acquiescence.

We’ve all seen the Stanley name, for instance. And by and large, we trust it. We have a general idea of Stanley that fits into our hardware-store purchase heuristics. But there is a great deal of imperfection and vagueness in these thought processes, and that is good news for a licensor. It suggests that there’s potential — or “permission” — for the Stanley name to migrate onto new products.

What Beanstalk did not do when it took on Stanley as a client was recommend investing in a ladder-production facility and hiring a bunch of workers, plus a sales force to blitz potential retail channels. Stanley Works, as a company, has actually been moving in the opposite direction, closing factories and outsourcing its manufacturing since the 1980s. Instead, Beanstalk worked out a licensing deal with Werner, which was already the biggest maker and distributor of ladders in the country. “They needed another brand because they couldn’t expand the Werner brand anymore,” Stone said. So Werner started making and selling ladders with the Stanley name on them. This gave Werner a way to get more shelf space, reach more consumers and make more sales. What it gave Stanley was its name on a new product and a licensing fee. Beanstalk has worked out many such deals, hooking up the Stanley brand with manufacturers of work gloves and boots, power generators and a variety of other things that Stanley never made (and does not make now).

Too many such deals, or the wrong kinds, can boomerang: this happens with some regularity in the fashion world, when a famous designer name gets spread over so many products, with so little regard to quality, that the entire image of the brand sinks. Still, if you see a ladder made by Stanley, you may well think, Well, there’s a name I can trust. What you’re trusting, though, isn’t Stanley workers in Stanley factories upholding Stanley traditions and values under the watchful eye of Stanley managers. What you’re trusting is Stanley’s recognition that a badly made ladder with the Stanley name on it could be highly damaging to the Stanley brand. You are trusting Stanley’s recognition of the value of its brand and its competence in defending that value.

We circled back around to Beanstalk’s ideas for River West’s brands, particularly Brim. Stone mentioned White Cloud. White Cloud is a brand of toilet paper once owned by Procter & Gamble. P.& G. also owned the Charmin franchise, so eventually it let the trademarks on White Cloud expire. These were then acquired by an entrepreneur, who worked out a licensing deal with Wal-Mart to make White Cloud an exclusive Wal-Mart product. It became, essentially, a store brand, but infused with equity of mass-market familiarity. It’s very doubtful that the typical White Cloud buyer is aware that the product is available only at Wal-Mart. It’s also very doubtful that P.& G. (which would surely prefer that its Charmin didn’t have to compete against a brand that P.& G. itself created) will let anything like that happen again if it can possibly help it.

This is essentially the situation that River West brokered with the Nuprin brand, which was a dead line of ibuprofen painkillers (once upon a time backed by the widely known “Nupe it” ad campaign). Its trademarks were acquired by River West and sold to CVS, where it is back on the shelves as a stealth store brand. (And presumably enjoying better margins than it would if, like a traditional store brand, it competed solely on low price, not trustworthy-brand familiarity.) My read was that this is what Stone thought should happen to Brim — and that Earle had mixed feelings, believing, perhaps, that Brim could come back as something bigger. Even Stone seemed at least somewhat intrigued with the possibilities of licensing a brand that was familiar but dead. “With Stanley we have to be careful — this is a famous brand; we have to do everything right and mitigate all the risks,” he says. “But with Brim, the risks. . . .” He paused. “There really are no risks.”

This brings us to Earle’s ideas about the potential upside of faulty consumer memory. Maybe, for instance, you’re among those who remember Brim. But do you also remember that it was a decaf-only brand? That’s actually why you could “fill it to the rim.” River West’s research found that many who recall the Brim brand have forgotten the decaf detail.

The relationship between brands and memory (faulty or no) is a specialty of Kathy LaTour, an associate professor at the University of Nevada, Las Vegas. In one of her most interesting studies, she worked with Elizabeth Loftus, a memory specialist and now a professor at the University of California, Irvine, and a third researcher, Rhiannon Ellis, to take the issue to its logical extreme: What if, for example, an advertising campaign “implanted memories into consumers of things that never happened?”

The researchers found that subjects presented with a fake Disney World ad inviting them to “remember the characters of your youth: Mickey, Goofy . . . ” were significantly more likely to say they recalled that as children they had met “a favorite TV character at a theme resort” than those who didn’t see the ad. The fascinating thing was what happened when they repeated the experiment, tweaking the ads to include Bugs Bunny, who, of course, is not a Disney character at all. About 16 percent of subjects subsequently claimed that, as children, they shook hands with Bugs Bunny at a Disney theme park. Repeated fake-ad exposure apparently led to higher false-memory rates. In a separate study, Loftus asked subjects with Bugs in their memories what, exactly, they recalled about this incident; of these, 62 percent recounted shaking Bugs’s hand, and more than a quarter specifically recalled him saying, “What’s up, Doc?”

Earle says that this imperfection of memory can be used to enhance whatever new Brim he comes up with. This is “a benefit of dormancy,” he says. The brand equity has value on its own, but it can be grafted onto something newer and, perhaps, more innovative. “Consumers remember the kind of high-level essence of the brand,” he says. “They tend to forget the product specifics.” This, he figures, creates an opening: it gives the reintroduced version “permission” to forget that decaf-only limitation as well and morph into a full line of coffee varieties. “ ‘Fill it to the rim with Brim’ stands for full-flavored coffee,” Earle says, with a chuckle. “Fill it to the rim — it’s great stuff!”

Finding the deceased brands that consumers are likely to remember — sort of — is a process that can begin, of all places, in the library. Earle spent hours going through old issues of People, Time, Glamour and other magazines, “looking for brand names that sounded familiar but that I hadn’t seen lately.” This results in many, many possibilities that don’t work out for one reason or another. But every so often the process yields an Underalls.

Earle was intrigued with Underalls. Produced by Hanes from about 1975 to the mid-1990s, Underalls was once a prominent brand, advertised aggressively. (“O.K. America — show us your Underalls!”) It spawned “flanker” brands like Summeralls, Winteralls and Slenderalls. It was unique and memorable: a good brand. “You see the memorabilia on eBay,” Earle says. “That’s usually a good indicator.”

By way of MarketTools, a research company, River West asked 1,000 women ages 25 to 54 to answer an online survey about hosiery brands. About 850 did so, and among these, 72 percent had heard of Underalls. Among those who recognized the brand, about three-quarters remembered the “Show us your Underalls” tagline. Promising. But River West needed a partner to actually manufacture and distribute whatever the new version of Underalls might be.

It found that partner in Phantom, a hosiery maker based in Toronto. Phantom’s main product line is called Silks, the dominant hosiery brand in Canada. The company also manufactures a number of store brands. Phantom wanted to get into the crowded U.S. hosiery market, says Svetlana Sturgeon, vice president of sales and marketing for Phantom, and it made a certain amount of sense to leverage a name far more familiar to American consumers than Silks would be. Sturgeon jokes that, at first, she did not want to admit at meetings that she remembered the brand (“I’m much too young for that!”). But she did.

The point of the original Underalls was that they combined panties and stockings into one undergarment. (“They were the pioneers in the whole idea of eliminating panty lines,” is how Sturgeon puts this.) In early brainstorming sessions, Phantom and River West tried to come up with “the most expansive but credible definition” of the brand, Earle says. In this case that turned out to be “intimate-apparel solutions,” which means anything you wear under something else that’s “functional and fashion-forward,” Sturgeon says. This includes camisoles and bras and other things the original Underalls never sold. The San Francisco design firm Thinc came up with a new graphic identity and packaging ideas that referenced classic elements of the old ads, but radically updated them. New slogan: “Lovely underneath it all.” With the prototypes complete, Sturgeon has begun the process of meeting with boutique and department-store buyers, in the hope of getting products into stores, at least on a test level, in the fall.

Brand familiarity alone guarantees nothing. Sears owns several well-known brand names — Kenmore, Craftsman, DieHard, the Sears name itself — and is viewed by Wall Street as a basket case. Multinationals routinely go through cycles of acquiring and creating brands and then paring back when, inevitably, some underperform. A tiny number of hard-core loyalists not only doesn’t mean a whole lot when reviving a brand, it might be a problem because those people do remember. A number of the more cultish devotees of the VW Beetle, in fact, forthrightly rejected its reanimated version as a fraud. In that case, those consumers were marginalized by a far wider buying public who weren’t such sticklers.

And really, something like the Beetle is actually a special case: it wasn’t just a well-known product, it was a cultural icon on a level that very few products or brands ever achieve. River West is trying to reanimate brands that are sort of familiar but don’t have anything like a VW level of built-in cultural capital to draw on. If there is a cult of Brim out there somewhere, it’s pretty small and very quiet.

What River West really wants is to bring back these brands in a way that not only builds on their former popularity but also manages, via the skillful management of what we do remember and what we don’t, to transcend it. This would be quite a trick. A few months after he returned from the licensing expo, Earle more or less dropped the strategy of turning Brim into a glorified store brand. These days he’s talking about finding a “really innovative” coffee-manufacturing partner who could make the Brim brand an umbrella for groundbreaking (but unspecified) coffee advances that would work in the general market, not just one chain. He sounded almost protective of the Brim idea, and possibly a bit frustrated that he hadn’t hit on the way to bring it back. “Brim is, within our company, one of our best-known brands,” he said to me at one point. “In fact it’s our absolutely best-known brand. So expectations are high.”

Later he added: “The strength of a dormant brand is we can remake this however we want. The challenge is we can remake this however we want.”

Eventually, Earle introduced me at his office to Scott Lazar, chief executive of another River West partner, Reserve Brands, which is overseeing the revivification of Eagle Snacks. I’d never heard of the brand, but I was assured that plenty of Midwesterners knew it. Eagle had once been owned by Anheuser-Busch and was the beer maker’s way into the salty-snack market dominated by Frito-Lay. Its most well known product, it seems, was the honey-roasted peanut, particularly in tiny bags given out as snacks on airlines. Anheuser-Busch eventually pulled the plug, selling its equipment to Frito-Lay and the trademarks to Procter & Gamble in the mid-1990s. Lazar said that while the new Eagle has acquired those trademarks, the new and expanded product line consists largely of snacks that the old Eagle never made, with names like “Poppers!” and “Bursts!” These are rolling out in a variety of grocery stores across the country. Lazar tried to give me about six large bags of samples, but I demurred on account of limited luggage space.

I ended up with two bags, which Earle and I took downstairs to the bar at the Ceres Cafe. It was crowded and loud, filled with big Chicago men who in some cases had spent the day screaming on the Chicago Board of Trade floor and who in all cases were not shy. We found a place to sit, plopping the Eagle snacks in front of us. And one man after another leaned into our space and pointed at the bags and boomed, “Eagle!” Big hands reached toward the bags to get a scoop of snacks that the old Eagle had never made, and at the time were not in stores, and big voices declared, “I remember those!”
http://www.nytimes.com/2008/05/18/ma...l?ref=magazine





Guessing the Online Customer’s Next Want
Eric A. Taub

Marketers have always tried to predict what people want, and then get them to buy it.

Among online retailers, pushing customers toward other products they might want is a common practice. Both Amazon and Netflix, two of the best-known practitioners of targeted upselling, have long recommended products or movie titles to their clientele. They do so using a technique called collaborative filtering, basing suggestions on customers’ previous purchases and on how they rate products compared to other consumers.

Figuring that out is not so easy. For one thing, people do not always buy what they like. Someone may buy a sweater for their grandmother even though they dislike it and would never get it again. Similarly, a person who rents a movie may actually detest it but knows her child likes it. Or a film that was seen on a small airplane screen may garner a lower rating than if it were seen at a large multiplex.

The search for a better recommendation continues with numerous companies selling algorithms that promise a retailer more of an edge. For instance, Barneys New York, the upscale clothing store chain, says it got at least a 10 percent increase in online revenue by using data mining software that finds links between certain online behavior and a greater propensity to buy.

Using a system developed by Proclivity Systems, Barneys used data about where and when a customer visited its site and other demographic information to determine on whom it should focus its e-mail messages.

For instance, an e-mail message announcing sales might go to those Web site visitors who had purchased certain products or types of products in the past, but who had done so only when the items were on sale. In the simplest terms, if someone buys only when something is on sale, but never buys anything in December, then the e-mail sale flier might not be sent to that customer in December. “There is a digital trail of interest left by customers,” said Sheldon Gilbert, Proclivity’s chief executive and founder.

The observation about sales could be integrated with other behavior. Does the customer buy only when an item reaches a certain price? Is the customer more likely to buy on a weekend or during the week? Must it be organic material? An algorithm would weigh those behaviors to determine the likelihood that someone will open the e-mail message, and once opened, decide to click through to the site and buy the product. The more data, the better it gets at predicting, says Proclivity, which is based in New York.

“One customer found that 10 percent of its population accounted for 60 percent of bargain sales. So on the day of the sale, you can send a full-price ad to everyone else,” said Mr. Gilbert.

Barneys experienced at least a 10 percent increase in online revenue, as compared to control groups, said Larry Promisel, Barneys’ vice president of e-commerce. It found 20 percent more customers would purchase once sent the targeted e-mail messages. The company has saved money by not sending e-mail letters to customers unlikely to buy.

Not only are sales increasing, Mr. Promisel said, but with the store focusing on customers with items they are likely to buy, its clientele feels that it understands their interests, which increases good will.

Still, the problem of knowing what people want is hardly solved. While Netflix has persuaded almost five million subscribers to provide two billion movie ratings to its site, the company still has trouble figuring out exactly what somebody will like.

“I wish I could tell you that our recommendations system was reliable, but it’s not perfect,” said Reed Hastings, Netflix’s chief executive.

At best, Netflix knows that if someone rates a particular drama highly, it can predict what other drama they might like by correlating one’s rating of that film with others. “But if I know your taste in drama, I do not know your taste in horror,” Mr. Hastings said.

As customers value selection and rapid delivery more than recommendations, the company is not that worried about its prediction system. Even a 10 percent improvement of its ratings system has not been possible. Netflix has offered a $1 million prize to anyone who can do that, but to date, only slightly better than a 9 percent improvement has been achieved.

“Using as much information as you can is very important,” said Yehuda Koren, an AT&T Labs researcher, who was part of the group that achieved the results. To do even better, Mr. Koren would “track all clicks, the movies that people searched for, the pages they jumped to, their mouse movements,” information that Netflix does not now collect.

Doing this type of analysis, Mr. Gilbert of Proclivity believes, would stop retailers from sending out buying recommendations based on outdated information.

“I still get e-mails from Amazon recommending books based on the Jared Diamond titles I bought three years ago,” he said. “But I get nothing about my interest in gardening.”
http://www.nytimes.com/2008/05/19/te...recommend.html





Macs Defy Windows' Gravity

Consider this: Apple's retail market share is 14 percent, and two-thirds for PCs costing $1,000 or more.
Joe Wilcox

Should I repeat those numbers? The share data is for first-quarter brick-and-mortar stores, as tabulated by the NPD Group. Apple's market share is but one measure of success. Sales growth is way up, while Windows desktop PC sales are way down.

"In notebooks they're growing two times the market," said Stephen Baker, NPD's vice president of industry analysis. "Windows notebooks are pretty much flat right now."

For the first quarter, Windows notebooks had "zero percent" growth year over year, Stephen said. By comparison, Apple notebooks had "50 to 60 percent growth."

On the desktop, "They're up 45 percent," he continued. "The [overall] market is down 20 percent. Windows desktops would be down 25 percent." The figures are also for first quarter.

I spoke with Stephen earlier this afternoon. He remarked: "iMacs are growing and the Windows desktop ain't. No matter how you look at it, Apple is outperforming Windows."

A statement like that raises the question: Is Windows Vista the problem? The operating system has met with a cool reception, even with Microsoft claiming 140 million licenses have been shipped.

"I don't believe that Vista's to blame," Stephen responded. "The vast majority of consumers don't care [about the installed operating system]."

Apple's market share in what NPD calls the "premium" category, or laptop and desktop PCs selling for $1,000 or more, is nothing short of phenomenal: 66 percent. That's right, two-thirds.

With the exception of the Mac Mini, all Apple computers sell for more than $1,000. "If you don't give people a choice, people will spend more," Stephen said.

Apple's success above $1,000 defies some of the conventional retail thinking about PCs, where the emphasis is on lower pricing and greater features. "Consumers don't care about features," Stephen asserted. "People see a value proposition in an offering that gives them a great experience."

Stephen said Apple appeals to the right segments, like multiple-computer households. Consumers that are buying a second, third or even fourth PC have different buying priorities, such as ease of use.

But the retail stores make a huge difference. "Apple has got better distribution than it's had in the last 15 years," Stephen explained. "They're in the right spot right now. There's the iPod advantage. But the big thing is the stores."

Apple's retail stores aren't just places to buy Mac products. They're part of a larger end-to-end value chain—and with it the promise of a certain kind of experience.

"What Apple drives home: This is a product that we own from factory to finger," Stephen explained. "We exert some control so that you get the best experience. When you get in the store, we get you what you want."

Apple's factory-to-finger approach works for its own retail operations, but what about what Stephen called its "non-captive channels," such as Best Buy? That's where Apple has to compete with many other products. "They've already won when somebody comes into the Apple Store," Stephen said. "How does it play in places where they're not the only answer? How big a handicap is Windows?"

Stephen didn't have an answer, but it's not difficult to guess: not nearly as well in third-party retail shops as through the Apple Store.

Given Apple's end-to-end success—from product conception to production to sale to service—I asked Stephen if Microsoft should open its own company stores, even if only a few flagship ones like Nokia.

"Yes," he said emphatically. "In a multi-hannel enviroment you should have some kind of owned--and operated--channel as well." He cited a couple examples. One of them: "When you look at Coach they have their own showcase stores as well."
http://blogs.eweek.com/applewatch/co...s-gravity.html





The Computer Industry Comes With Built-In Term Limits
Randall Stross

MATHEMATICIANS have long tried, and failed, to solve the Riemann Hypothesis, a stubbornly unyielding math problem. Good luck to whoever tries to figure it out. For the first correct proof, a $1 million prize will be awarded by the Clay Mathematics Institute.

Similarly, two successive Microsoft chief executives have long tried, and failed, to refute what we might call the Single-Era Conjecture, the invisible law that makes it impossible for a company in the computer business to enjoy pre-eminence that spans two technological eras. Good luck to Steven A. Ballmer, the company’s chief executive since 2000, as he tries to sustain in the Internet era what his company had attained in the personal computing era.

Empirical evidence, however, suggests that he won’t succeed. Not because of personal failings, but because Mother Nature simply won’t permit it.

It’s unfortunate, as a $300 billion prize could be collected by Microsoft shareholders: that would be the increase in market capitalization, should the share price return to its high of $59.56, attained in 1999, from its current price of $29.99. (Maybe this was why Mr. Ballmer flirted with Yahoo.)

That prize, however, seems a mirage. You can’t merge-and-acquire your way around the Single-Era Conjecture. Just ask I.B.M., which gobbled up Lotus Development Corporation to no avail.

The Yahoo affair obscures the larger story: Microsoft’s long, long struggle — since 1993 — to maintain its leadership position while the Internet grew ubiquitous. Mr. Ballmer, who joined Microsoft in 1980 as its 15th employee, and Bill Gates, his mentor who will retire next month as a full-time Microsoft employee, have certainly tried their best to avert the inevitable decline of the company’s influence.

In 2000, Mr. Ballmer credited Mr. Gates for noting that no company in the computer business had ever stayed on top through what Mr. Gates called “a major paradigm shift.” The two men wanted Microsoft to be the first company to achieve that goal. An interesting challenge, but some problems are of a size that dwarf the abilities of multibillionaire mortals.

In a 1995 internal memo, “The Internet Tidal Wave,” Mr. Gates alerted company employees to the Internet’s potential to be a disruptive force. This was two years before Clayton M. Christensen, the Harvard Business School professor, published “The Innovator’s Dilemma: When New Technologies Cause Great Firms to Fail” (1997). The professor presented what would become a widely noted framework to explain how seemingly well-managed companies could do most everything to prepare for the arrival of disruptive new technology but still lose market leadership.

It’s Google, of course, that has developed the musculature to step forward and lay claim to being Microsoft’s successor as industry leader in the Internet era. If there had been any way Microsoft could have prepared for this day, it had ample time to do so. In 1993, fully five years before Google’s founding and two years before Mr. Gates’s memo, Nathan P. Myhrvold, then Microsoft’s chief technology officer, wrote his own memo, “Road Kill on the Information Highway.” It spelled out in prescient detail how each of many industries would be flattened by the build-out of digital networks, and it said that the PC software business would be no exception.

It’s no secret that Microsoft’s online businesses have failed to gain leading market positions. But what is not widely appreciated, perhaps, is that the company’s online initiatives have lately been doing worse than ever.

The last year when Microsoft made a profit in its online services business was the fiscal year that ended on June 30, 2005. Its MSN unit used to do a nicely profitable business providing dial-up Internet access to subscribers. When its users began to switch to broadband services provided by others, however, the earnings disappeared. Microsoft’s Web sites brought in a trickle of advertising revenue, which did not grow fast enough to offset the disappearance of the narrowband access business. AOL suffered in similar fashion.

In the 2006 fiscal year, Microsoft’s online services produced a $74 million loss after the previous year’s profit of $402 million. Since then, the numbers have become uglier, as Microsoft’s online segment has added employees and absorbed growing sales and marketing expenses. In the 2007 fiscal year, the online businesses lost $732 million. In the next nine months, through March 31 this year, they recorded a loss of $745 million, almost double the amount in the period a year earlier. With $2.39 billion in revenue for the nine months, the online segment represents only 5 percent of the company’s total revenue.

The numbers at Google, which is nothing but an online services business, have moved in the opposite direction. For rough comparison, profits in its 2005 fiscal year, ended on Dec. 31, were $1.5 billion. The earnings grew to $3 billion in 2006 and $4.2 billion in 2007.

According to Hitwise, an Internet research firm, Google’s share of searches in the United States has increased to almost 67.9 percent in March 2008 from 58.3 percent in March 2006. During the same period, Microsoft’s share has dropped to 6.3 percent from 13.1 percent.

Mr. Ballmer has always been a ham on stage. His comically demonic chants and dances in recent years have been preserved on YouTube. But even way back in the day, he had the gift. At the company’s annual meeting in 1994, when he was overseeing sales and Microsoft was enjoying its moment of triumph over competitors, he shouted at top volume: “It’s market share — market share! market share! market share! — that counts!” He continued: “Because if you have share, you basically leave the competitors” — here he grabbed his own throat for emphasis — “just gasping for oxygen to live in.”

His mock asphyxiation of competitors was later stripped out of its jokey context by government antitrust lawyers. But the imagery is no less apt now than it was then, except that the roles have reversed. As Google continues to gather market share and the Single-Era Conjecture dictates Microsoft’s eclipse, it is Mr. Ballmer’s own online services that now are gasping for oxygen.
http://www.nytimes.com/2008/05/18/te...gy/18digi.html





PC-Windows Bundling, First Hearing at TGI in Paris : UFC Que Choisir Against Darty
Last modified: 05/17/2008 02:38 PM

Ironically, as the hearing for the first out of three assignements introduced by French consumer association UFC-Que Choisir against systematic sale of pre-installed Windows with Personal Computers was held in Court in Paris, we learned that manufacturer Asus was condemned in Caen, Normandy (case Hordoir vs. Asus, 30 April 2008) to reimburse the client for unwanted software licences. While the judgment in Paris is pending, this decision should encourage computer manufacturers to reimburse clients more willingly, otherwise they might be subjected to frequent assignement and condemnation, given the success obtained by the Reimbursement Guide published recently by the "Racketware" team.

Today, in Court in Paris (at Tribunal de Grande Instance), was held the first hearing in the series of trials that oppose consumer association UFC Que Choisir and companies accused of violating several articles of the French Consumer Code, in particular Article L.122-1 that prohibits bundled sales.

Complaint by UFC Que Choisir

Let us recall the facts : when consumers buy the computer of their choice, they are generally forced to simultaneouly acquire the license of pre-installed software, even though it would be easy for the professionals to dissociate both purchases, for a marginal cost [1], as recommended by the Globalisation Institute, a liberal reflection group, in a report for the European Commission [2]. This dissociation would also dissolve the lack of publicity for the software prices and conditions of use. Moreover, it would induce an evolution of software licenses, considered to be unfair and to contain abusive terms [3].

Encouraged by the Director General of the DGCCRF at the time, Mr. Cerruti, at a tripartite meeting in November 2006 [4], this trial is intended to provide a jurisprudence related sales of computers and software. The recent response by Luc Chatel to a written question confirms this need: the Secretary of State said he will not do anything [5].

New victory by an individual: confirmed liberty to choose one's software.

Happy coincidence: on the eave of this hearing, an individual won a new trial in Caen, Normandy. He obtained a posteriori reimbursement of pre-installed software.

The judgement recalls the client's "right and liberty to adopt any particular operating system or use other software and licenses than the systems and software installed by [the manufacturer] on the computers."

One of the jurists in the Racketware team that edits the Reimbursement Guide, comments : "The obstacles introduced by the manufacturer to a simple and fast reimbursement of an amount corresponding to usual prices are clealy condemned by the judge. Asus' practice can thus be assimilated to bundled sales [6]. The manufacturers, and hence, the vendors, will need to revise their practices if they do not want to undergo more frequent appeals."

This is the fourth victory in a proximity juridiction (Rennes, Puteaux, Libourne, Caen). This victory is the first of a long series of procedures [7] conducted along the lines of the http://racketiciel.info/ Reimbursement Guide [8] which meets great success [9].

What is the consumers' opinion?

Petition "Stop racketware" [10] will soon reach 30 000 signatures, which is surprising for a complex matter with so little coverage in traditional media.

Meanwhile, Vista is increasingly rejected. The consumer prefers keeping XP and manufacturers HP and DELL attempt to find way to revive this system to meet demand. As for Microsoft, she receives the timely payment for the Vista license anyway. Only the consumer is the looser : he must pay for software he is not using!

Does the consumer wish anything else than Microsoft products? With bundled sales, he is rarely entitled to speak. Yet EeePC, by the same manufacturer, ASUS, meets a tremendous success: the public chooses an innovative machine that runs a free operating system [11].

What Justice can achieve

The French executive power is schizophrenic. On the one hand, "the State has no more money". On the other hand, according to our estimations, Microsoft tax optimization in France, artificially swollen by bundled sales, is on the order of twice the annual cost of the national family card for train transportation. By ignoring bundled sales, not only does the State act against the consumers' interest, but it comforts the monopoly of the editor that controls from 90 to 95% of market shares [12]. A clear court settlement on bundled sales could compensate for the State's lack of action.

Despite what vendors and manufacturers pretend, the solutions we suggest (identical pre-installation for all copies of a model, but selective activation upon client's request) have a minimal cost, they are simple and fast to set up [1]. A clear court settlement on bundled sales would cut manufacturers' dilatory arguments.

Besides, bundled sales illustrates a real problem in France: the law exists and only needs to be enforced. A clear court settlement on bundled sales would re-delineate the spirit of the law where it has been continually eroded by the influence of manufacturers and vendors for their exclusive profit.

Live from Paris Tribunal de Grande Instance

Today's hearing shows that the result of this action mainly relies on the Court's decision. It should be noted that Darty's representents seem to exempt the vendor from its responsibilities regarding customers, just as today's State Secretary Luc Chatel eludates his responsibility [13]. Associations AFUL and April celebrate the quality of the pleading by UFC-Que Choisir representents, which included several key arguments from the Racketware team.

Alain Coulais, one of the leaders of the Racketware workgroup, says: "With a victory at Tribunal de Grande Instance, the current situation, which is unfavourable to all consumers, will evoluate towards optionality during the purchase, which is favourable to all consumers and to the State. For a marginal cost, everyone would be winning: the majority that still wants to buy a machine with pre-installed software, the growing minority that knowingly chooses alternative solutions like GNU-Linux, and those who have acquired licenses that entitle them to re-use the software on several machines".
http://www.aful.org/communiques/court-paris-ufc-darty





Vista Laid Low by New Malware Figures

27 percent of PCs running Vista compromised by at least one piece of malware
John E. Dunn

It looks as if Vista's reputation for improved security could be heading for the pages of history. PC Tools has renewed last week's attack on the platform with new figures that appear to back up its claim that Vista is almost as vulnerable as its predecessors.

According to analysis from the Australian company's ThreatFire user base, 58,000 PCs running Vista were compromised by at least one piece of malware over the six months to May 2008, equivalent to 27 percent of all Vista machines probed. Vista made up 12.6 percent, or 190,692, of the 1,513,502 machines running Windows in the user base.

In total, Vista suffered 121,380 instances of malware from its 190,000 user base, a rate of malware detection per system is proportionally lower than that of XP, which saw 1,319,144 malware infections from a user base of 1,297,828 machines, but it indicates a problem that is worse than Microsoft has been admitting to.

Only a week ago, PC Tools revealed that Vista was as likely to be hit with software vulnerabilities as Windows 2000, a claim that was denied by a Microsoft staffer in a blog.

The problem with the figures given in all cases is that it is still hard to make direct - and therefore meaningful - comparisons. As PC Tools makes clear, that malware was detected did not mean harm had been done, simply that Vista's own security had in some way been circumvented to the degree that its ThreatFire tool stepped in.

"It is important to highlight that all systems used in the research pool were at the very least running PC Tool's ThreatFire and that because the technology is behavioral-based, the data refers to threats that actually executed and triggered our behavioral detection on the client machine", said PC Tools' CEO, Simon Clausen, before aiming a kick at Microsoft's own security software.

"Furthermore, in response to alternative research from Microsoft's Malicious Software Removal Tool, PC Tools highlights that the MSRT is not a comprehensive anti-virus scanner, but a malware removal tool for a limited range of "specific, prevalent malicious software."

An obvious objection to this is that any operating system will suffer a degree of malware compromise, which could be traced back to a variety of issues including user behavior. The acid test for Vista will be its ability to resist serious attacks over the longer term, something it has so far managed to do. However, the figures do suggest that malware writers are mastering the OS, a possible sign of trouble to come

PC Tools has publicized details of some of the malware types it has found on Vista systems during its scans, including three pages of variants based on Trojan.Agent, a few of which were described as serious.

At time of writing, Microsoft had not responded to PC Tools' allegations.
http://www.computerworld.com.au/inde...0;fp;16;fpid;1





Permanent Denial-of-Service Attack Sabotages Hardware

Researcher to demonstrate a permanent denial-of-service (PDOS) attack that remotely wipes out hardware via flash firmware updates
Kelly Jackson Higgins

You don’t have to take an ax to a piece of hardware to perform a so-called permanent denial-of-service (PDOS) attack. A researcher this week will demonstrate a PDOS attack that can take place remotely.

A PDOS attack damages a system so badly that it requires replacement or reinstallation of hardware. Unlike the infamous distributed denial-of-service (DDOS) attack -- which is used to sabotage a service or Website or as a cover for malware delivery -- PDOS is pure hardware sabotage.

“We aren't seeing the PDOS attack as a way to mask another attack, such as malware insertion, but [as] a logical and highly destructive extension of the DDOS criminal extortion tactics seen in use today,” says Rich Smith, head of research for offensive technologies & threats at HP Systems Security Lab.

Smith says a PDOS attack would result in a costly recovery for the victim, since it would mean installing new hardware. At the same time, it would cost the attacker much less than a DDOS attack. “DDOS attacks require investment from an attacker for the duration of the extortion -- meaning the renting of botnets, for example,” he says.

Smith will demonstrate how network-enabled systems firmware is susceptible to a remote PDOS attack -- which he calls “phlashing” -- this week at the EUSecWest security conference in London. He’ll also unveil a fuzzing tool he developed that can be used to launch such an attack as well as to detect PDOS vulnerabilities in firmware systems.

His so-called PhlashDance tool fuzzes binaries in firmware and the firmware’s update application protocol to cause a PDOS, and it detects PDOS weaknesses across multiple embedded systems.

The danger with embedded devices is that they are often forgotten. They don’t always get patched or audited, and they can contain application-level vulnerabilities, such as flaws in the remote management interface that leave the door open for an attacker, according to Smith. And remote firmware updates aren’t typically secured, but rather set up to occur by default.

Smith says remotely abusing firmware update mechanisms with a phlashing attack, for instance, is basically a one-shot attack. “Phlashing attacks can achieve the goal of disrupting service without ongoing expense to the attacker; once the firmware has been corrupted, no further action is required for the DOS condition to continue,” he says.

But HD Moore, director of security research for BreakingPoint Systems, says a more effective attack than waging a DOS on firmware would be to deliver malware. “It seems like if you can do a remote update of firmware, it would better to deliver a Trojan'ed firmware image, instead of just a DOS,” Moore says.

Meanwhile, Smith says he’s not aware of any phlashing PDOS attacks in the wild to date, but there are a few precautions to protect against these attacks. “Unfortunately, there isn't a magic bullet, but making sure the flash update mechanisms have authentication so as not just anyone can perform an update is a start,” Smith says. “Beyond this, flash update mechanisms need to be designed with malicious attacks in mind.”

Smith has no plans yet for releasing his PhlashDance tool.
http://www.darkreading.com/document....WT.svl=news1_1





Apple iTunes Targeted by Phishers
Robert Vamosi

We've seen banks, even eBay and PayPal, all targeted by phishers. Now they've turned their attention to iTunes, creating a bogus site that reportedly looks like an iTunes billing page asking for current credit card information.

"We've never seen Apple as the target," Proofpoint's Andrew Lochart told Computerworld on Tuesday. "It's probably indicative that the bad guys see Apple's online presence as large enough to be a target."

In addition to asking for credit card information, the phony iTunes page also asks for one's social security number and mother's maiden name.

In general, if you receive an e-mail with a link to a site requesting personal financial information, be very cautious about proceeding. Bookmark or type in the URLs for sites containing financial information, such as your bank or e-commerce sites like iTunes. Never link directly from an unsolicited e-mail.
http://news.cnet.com/8301-10789_3-9949507-57.html





Japan Cracks Down on Virus with Copyright Law
Yuri Kageyama

A student who allegedly spread a computer virus was convicted Friday of copyright infringement in a case that has highlighted the lack of laws in Japan to police cyberspace.

Masato Nakatsuji, 24, a graduate student at Osaka Electro-Communication University, was charged with maliciously spreading a virus by embedding it in an image from a Japanese animation film he illegally copied and distributed.

The virus he allegedly used, the "Harada virus," is one of Japan's top viruses, and Nakatsuji's arrest in January was the first in Japan involving the making or spreading of viruses.

Downloading the Harada virus and the image destroyed data on victims' computers and moved information stored on their computers onto the Internet, according to police.

Nakatsuji was found guilty in Kyoto District Court Friday and received a suspended sentence of three years.

Police considered other charges, including damage to property and obstructing business, before deciding that copyright violation charges would hold up best in court.

Nakatsuji did not contest the charge, police say. His lawyers argued for a fine instead of jail time, saying it was unfair to penalize Nakatsuji more heavily because a virus was involved in the copyright violation, Japanese daily newspaper Mainichi reported.
http://seattlepi.nwsource.com/busine...ter_virus.html





Spain Arrests 'Prolific' Hackers

Spanish police have arrested five hackers they describe as being among the most active on the internet.

The hackers, who include two 16-year-olds, are accused of disrupting government websites in the United States, Asia and Latin America.

Police say they co-ordinated attacks over the internet and hacked into 21,000 web pages over two years.

The inquiry began in March after a Spanish political party's site was disabled after the Spanish election.

The five were arrested in Barcelona, Burgos, Malaga and Valencia.
http://news.bbc.co.uk/go/pr/fr/-/2/h...pe/7406260.stm





Annoying Software: a Rogues' Gallery

Which software is guilty of annoying us the most? Here's an identity parade of the chief suspects.
Rupert Goodwins

No gain without pain?

The internet has brought us many joys. It's rewritten the rules of business and pleasure.

And pain. For it allows what may have seemed like bright ideas at the time ('let's use it to make sure our customers have the latest software', for example) to turn into a stinking pit of misery — usually, but by no means always, after marketing gets its fangs in.

Here are just ten of the guilty parties who try to do the impossible: to make us hate the internet and wish it had never been invented — and who very nearly succeed.

Adobe Reader
What does Adobe Reader do? Displays PDF pages. How does it do it? With as much bloody-minded bureaucracy, delay and needless interaction as possible. Perhaps it's because we humans have been spoiled by books, where the gap between wanting to read something and reading it is as short as the time taken to lift the cover. But Reader's incessant updates (demanding you reset your computer — why?), thundering great list of modules to load, and hour-glass-provoking pauses for thought have given Portable Document Format a reputation for being as welcome as a flatulent camel in the kitchen.

Which is a shame, because other lightweight PDF readers seem to manage perfectly well.

Apple
Oh, Apple. You created a domain where humans came first. You took usability and distilled it into an art form. Now look at you. iTunes is a music player the size of a fat-bottomed whale that gobbles resources like krill. It spends half its time trying to sell us stuff and the other half trying to stop us using it. But that's not as bad as your auto-update policy: slipping us stealth copies of Safari under the cover of important version updates to iTunes and Quicktime — what is this, Make Microsoft Look Good day?

Windows Update
Your machine will reset in four minutes. Your machine will not shut down until these five updates are installed. You must restart your machine now. You will install Microsoft Genuine Advantage. Please wait while these updates are installed. Please shut down all applications before applying this update. Pop! New updates are ready to be installed. And now that we've stopped you doing whatever it was you were doing (like we care), shall we go ahead and install them now, or would you rather be interrupted yet again later?

We've been kind and not talked about Vista.
RealPlayer
If this software turned up at your door, you'd call the police. RealPlayer commits just about every sin in the book, sprinkling itself across your desktop and offering 'Free games!'. It installs a 'Message Center' that tells you about microcelebrities. There is more advertising embedded in the application than used to be on the front page of The Times. And you just wanted to stream The Archers.

At least Europe's been spared Real's Rhapsody music shop. When we looked at a beta before a subsequently abandoned UK launch, we were given software to install. 'Disable your firewall', it commanded. 'Drop dead', we replied.

Java
Java doesn't do anything by itself. It's a programming language. Programming languages are like sewage plants: if the average user becomes aware of them, something's gone wrong.

Java doesn't know this. Java wants to be in your face. Java wants to be updated. Java wants to tell you the good news about Sun. Have you heard about Sun? Here's a nice picture of our logo. And fancy a copy of OpenOffice? No? Well, never mind. Java's installed a copy of Yahoo Toolbar in your browser instead. Because that's what programming languages are there to do, right?

Yahoo
And talking of Yahoo. Please stop. Please stop trying to take over my email, my search engine, my home page. Please stop 'updating' your IM client to include more emoticons, animations, noises and whatnot — or at least have the good grace to produce a grown-ups' edition I can use at work without feeling like I should still be reading Smash Hits. And yes, when I ask to exit the software, that's because I really want to, not because I'm having a crisis of doubt.

And there is absolutely no point in a toolbar that just replicates all the options on your web site's front page. Not unless you want to come across as the sort of shrill, desperate, needy software company that makes big noises about user relationships but in fact knows less about its users than the Queen does about shopping in Lidl.

Norton Antivirus
It's a little unfair to pick on Norton Antivirus and make it carry the sins of half the desktop malware industry — but only a little unfair. If ever a class of software deserved to be cast into the lower reaches of Hell and run on Satan's own desktop, it is this. Performance- sapping, space-hogging, noisy, irritating and prone to inducing just as many problems as they purport to solve, these horrible, ineffective, expensive lumps of digital thuggery keep entire platoons of support engineers in business and home users in tears. We know. We get the phone calls.

Preinstalled software bundles
After quarter of a century of the IBM PC, we still don't understand why so many companies feel obliged to create swathes of below-par software to install on the computers they sell. Notebook makers are the worst, and Sony the king of them all: the first job for any new Vaio owner is to strip out the layers of desktop 'enhancements', media 'managers' and system 'control software' that serve only to get in the way of doing things the way you know how to do them, interfere with other software packages and suck up such enormous amounts of resources on start-up that two weeks after you've bought one, you're still not sure whether it's broken or not.

Outlook/Exchange
Free, web-based email systems have more storage than you can use. They have powerful, accurate, swift search systems. They have clean interfaces, with threaded conversations and sane attachment management.

Then there's Microsoft's Outlook. Things have been getting better for those whose corporate upgrade strategy allows it, but with major updates happening every four years or so that's a long time to be looking at a non-threaded, licence-restricted storage- squeezed, treacle-slow-searching email system. Especially while the online services get better and better, and doubly so now that email is the single most important business application ever created.

Flash
There's nothing wrong with Flash, provided you don't use it to construct web sites where people want to find information, navigate easily or do anything beyond passively consume exactly what you choose to give them in exactly the way you've decided.

There's also nothing wrong with using it for a splendid splash screen replete with movies, sound and animation — if you don't mind frustrating, annoying and possibly even driving away people who might, just might, have something better to do.

In fact, Flash-based web sites are quite possibly one of the most useful pieces of network technology around. Like heroin or microlights, they ensure that those who think it's a good idea aren't around to annoy us for too long.
http://reviews.zdnet.co.uk/software/...9419834,00.htm





Judge's Report in Jack Thompson Case: Guilty on 27 Charges
Ben Kuchera

In early 2007 the Florida Bar filed a five count, 38-page complaint against Florida Lawyer Jack Thompson, seeking sanctions against the outspoken critic of video games. "This is frankly once again just the Bar going off the deep end trying to use Bar rules to limit my First Amendment activism," Thompson said about the matter, according to Law.com. The trial ended in December 2007, and the verdict was expected in late April of this year. Judge Dava Tunis had asked for an extension in order to, among other things, deal with 400 "pleadings, e-mails, letters and missives (including pictorials)" sent by Thompson since the end of the trial. Judge Tunis has now released her report, with recommendations that Thompson be found guilty of 27 of the 31 charges.

These are not small offenses, as Judge Tunis recommended a guilty verdict for, among other things, "knowingly making a false statement of material fact or law to a tribunal," "using means that have no purpose other than to embarrass, delay, or burden a third person," "engaging in conduct involving dishonesty, fraud, deceit, or misrepresentation," and "making statements that the lawyer knows to be false or with reckless disregard as to the truth or falsity concerning to the qualifications or integrity of a judge."

It's hard to take Thompson's communications with the courts, the press, or government officials seriously at this point. Thompson has included gay pornography in his court filings, causing the Judge presiding over the case to note that "Mr. Thompson made available for unlimited public viewing, on the court’s docketing system, these graphic images." In this most recent case, Thompson created a picture book in reaction to "the court's inability to comprehend" what he was saying. The book contained pictures of swastikas, a copied dollar bill, monkeys, and, in a surreal touch, a handprint with the word "slap" written under it. That's leaving out the cartoon squirrels. Earlier this year, Thompson asked why another gaming writer doesn't "just molest children directly rather than through Rockstar. It would be more personal that way."

Before the release of Grand Theft Auto IV, Jack Thompson wrote Ars Technica a letter that compared the game to polio. These frenzied, nearly constant communications are at the heart of most of Thompson's troubles. Wisely, the Florida Supreme Court has declared that it will no longer accept any filings from the man unless they have been signed by another lawyer.

Thompson still has time before the Supreme Court makes a final ruling on these charges. A hearing covering possible sanctions will be held on June 4; Judge Tunis' final report is not due until early September.

The majority of the primary reporting on this case was done by GamePolitics.com, with the backing of the ECA. "I want to mention that without ECA president Hal Halpin, this series would not have been possible," writer Dennis McAuley wrote. "When I pitched the idea to Hal and asked that the gamer advocacy organization (which owns GamePolitics) cover the not-insignificant cost of acquiring the initial round of transcripts, he didn't hesitate. When we needed additional transcripts later, Hal insisted that the ECA cover the expense."

McCauley invited Thompson to share his closing statement, and any other insights he had about the trial. After ranting at the writer, Thompson finally stated that he "spent nine days in trial. I don't have to relive it for a twit who couldn't care less what really happened there, asshole."

Despite the ambivalence of the mainstream media in reporting on this case, and no matter what the final outcome turns out to be, the coverage of the trial has done something more damaging than any attack Thompson could have dreamed up on his own: it has let the public judge the man through his own actions and words.

GamePolitics was able to get Thompson's closing statement, and the man spoke like a captain straightening his coat as the ship goes down. "I'm simply making the argument, Judge, that my motivations—which I have tried to make clear, maybe to the point of nausea—are religious and that my efforts against the distribution of adult material, pornographic material, violent material, adult rated material to children is violative of the law as well as violative of Scripture. I quoted the biblical passage where Jesus says, reportedly: 'If any one of you should cause one of these little ones to stumble, it would be better that a millstone be tied around your neck and that you be cast in the uttermost depths of the sea.'"
http://arstechnica.com/news.ars/post...7-charges.html





Place to Pee: New Belgian Urinal-Based Video Game
Michael Thompson

As if peeing into a urinal wasn't fun enough already, it's now possible to play video games while doing so. Two men in Belgium (the home of the world's greatest beers) have unveiled Place to Pee, a video game that relies on players hitting sensors in urinals to control game play.

Werner Dupont and Bart Geraets (a software and electrical engineer, respectively), the game's developers and self-labeled beer fans, created the Place to Pee games to be playable for two bathroom visitors at time. According to Dupont and Geraets, the idea for the game came to them while they were drinking some Belgian trappist ale, a time when most breakthroughs of genius take place.

The two different modes feature a ski race that has players compete against each other on a virtual slalom course and a space battle where you fire on hostile aliens. Despite the fact that players are required to relieve themselves into a urinal in order to actually play, women are capable of competing in the game, as well: apparently, female players can get in on the action by utilizing a specially-designed paper cone.

While these games are recent creations, they seem to be a part of the same franchise that was shut down by Belgian gendarmes this past summer due to claims of indecency.
http://arstechnica.com/journals/thum...m-by-beer-fans





Web Game With a Message Debunks H.I.V. Myths
Brian Stelter

Hot or Not, a Web site where people submit photographs of themselves so that strangers can rate how attractive they are on a scale of 1 to 10, has spawned many imitators (plus a fair number of critics who view it as a sign of the end of civilization as we know it).

One new spinoff, Pos or Not, has a serious purpose (tasteful or not). The site, www.posornot.com, introduced in late April, is an H.I.V. education effort disguised as a game. It shows photographs and brief biographies of men and women ages 21 to 30, and asks visitors to decide whether each is H.I.V. positive or negative. The message is that you can’t judge someone’s virus status by looks, occupation or taste in music.

The site is sponsored by MTV’s college network and the Kaiser Family Foundation, a nonprofit group that focuses on health policy. “We feel it’s another kind of activist tool to get out the word about H.I.V. protection,” said Stephen K. Friedman, the general manager of mtvU, the college and university offshoot of Viacom’s MTV network.

The first trial by mtvU of what Mr. Friedman calls “games for change” was Darfur Is Dying, an online simulation of a refugee camp that has logged more than 1.5 million plays since 2006. Other companies have sponsored games about the Israeli-Palestinian conflict, the immigration debate and the world’s water resources.

The network wants the word about its H.I.V. site and its message to be spread like a popular YouTube video. It enlisted celebrities like Wyclef Jean, a musician, and Rosario Dawson, an actress, to make promotions for the game, which are playing across MTV’s networks.

The game — if it can really be called that — was played about 5.1 million times by 400,000 people in its first three weeks, according to mtvU. Entertainment Weekly’s Web site suggested it might be the “most depressing use” of an Internet trend ever, but suggested that any H.I.V. outreach effort could be beneficial.

Mr. Friedman said that in a media-saturated climate, maybe young people have to be shocked into paying attention. “Looking at the statistics that one in four people who are H.I.V. positive in the U.S. don’t know it, it’s pretty staggering,” he said. “We hope that something like this will get under their skin.”

“If it makes some people uncomfortable,” he added, “that’s not necessarily a bad thing.”
http://www.nytimes.com/2008/05/19/bu...dia/19mtv.html





Feud Fuels Bill O'Reilly's Blasts at GE
Howard Kurtz

Bill O'Reilly, the Fox News star, is mounting an extraordinary televised assault on the chief executive of General Electric, calling him a "pinhead" and a "despicable human being" who bears responsibility for the deaths of American soldiers in Iraq.

On the surface, O'Reilly's charges revolve around GE's history of doing business with Iran. But the attacks grow out of an increasingly bitter feud between O'Reilly and the company's high-profile subsidiary, NBC, one that has triggered back-channel discussions involving News Corp. owner Rupert Murdoch, Fox News Chairman Roger Ailes, NBC chief executive Jeff Zucker and General Electric's CEO, Jeffrey Immelt.

Ailes called Zucker on his cellphone last summer, clearly agitated over a slam against him by MSNBC host Keith Olbermann. According to sources familiar with the conversation, Ailes warned that if Olbermann didn't stop such attacks against Fox, he would unleash O'Reilly against NBC and would use the New York Post as well.

Both Fox and the Post are owned by Murdoch, who complained about Olbermann's conduct in separate calls to Zucker and Immelt.

The high-level appeals failed, and O'Reilly has escalated his criticism of GE in recent weeks, declaring, "If my child were killed in Iraq, I would blame the likes of Jeffrey Immelt."

GE has long had a corporate presence in Iran, which U.S. officials say is providing weapons and training for Shiite militias in the Iraq conflict. Under growing criticism from the public and its own shareholders, GE announced in 2005 that it would accept no new business in Iran and would wind down existing contracts, which mostly involved sales of oil, gas and energy and health-care equipment. The remaining work, valued at less than $50 million, amounts to less than .01 percent of GE's income, and the company says the final four contracts will expire within weeks.

What began four years ago as a colorful feud between rival commentators, instigated by Olbermann as a way of drawing attention, has become a tale of bruised egos and secret maneuvering at the highest levels of two multinational giants.

Fox News spokesman Brian Lewis said Ailes never offered a "quid pro quo" involving a cease-fire by O'Reilly and Olbermann. "That's editorial control of Bill's show, and we don't do that," he said. "Bill doesn't run topics by Roger, or anyone else for that matter."

Lewis dismissed the notion that Ailes has ever suggested using Murdoch's tabloid for revenge, saying: "Roger doesn't control the editorial policy of the New York Post."

Olbermann delights in ridiculing "Bill-O" virtually every night for his style, his interviews and his opinions, lambasting what he calls "Fox Noise" and often bestowing on O'Reilly his "Worst Person in the World" award.

O'Reilly has denounced NBC just as vehemently but now aims higher on the corporate ladder. On his Fox News show this month, O'Reilly said that Immelt "is doing business right this minute with Iran, who are killing our soldiers. . . . That Immelt man answers to me. . . . That's why I'm in this business right now, to get guys like that."

Days later, O'Reilly interviewed Tom Borelli, a portfolio manager and dissident GE shareholder. The program played a clip of Borelli, at GE's annual meeting, telling Immelt that the company's products are keeping Iranian President Mahmoud Ahmadinejad "comfy when he's plotting to kill U.S. troops and trying to annihilate Israel. It's just an outrage."

Last week, in an unrelated segment with CBS's Kimberly Dozier about being injured in Iraq, O'Reilly used a graphic that combined GE's logo with a photo of Ahmadinejad. The heading: "Business Partners."

GE spokesman Gary Sheffer called O'Reilly's remarks "offensive," saying: "He has a right to his opinion, and we equally have a right to be appalled by it. We felt he crossed the line. . . . Nothing we supply, or any goods and services we have supplied to Iran, is in any way endangering U.S. troops."

Asked about O'Reilly's motivation, Sheffer said that executives at Murdoch's News Corp. "tell us if the attacks on O'Reilly end, the attacks on GE will end. They've had conversations with our news executives saying, 'If you stop, we'll stop.' " An NBC spokeswoman confirmed the calls.

Fox would not comment on the criticism of Immelt, and O'Reilly declined to be interviewed. Some Fox staffers say Olbermann was out of bounds last month when he imagined the fate of "a poor kid" born to a transgendered man who became pregnant, adding: "Kind of like life at home for Bill's kids."

The sniping between O'Reilly and Olbermann initially seemed like good entertainment. But NBC News President Steve Capus grew alarmed when O'Reilly began saying that NBC correspondent Richard Engel was taking an antiwar position in his reporting from Iraq and that the network wasn't recognizing the early success of President Bush's surge.

"It is one thing to have corporate jousting between Keith and O'Reilly," Capus said. "When it becomes an over-the-top, inaccurate distortion and gross misrepresentation of the job being performed by Richard Engel, then I'm going to be concerned and feel the need to act."

Early last year, the sources say, Capus called Ailes to say that O'Reilly had gone over the line with reckless attacks on Engel. But, the sources recounted, Ailes said he agreed that NBC was against the war and had aligned itself with Olbermann's mockery. Capus, he said, had the power to shut down the situation by telling Olbermann to back off.

The conversation grew tense as Capus asked whether Ailes was threatening him with retaliation by O'Reilly and News Corp. if Olbermann kept up his criticism. Ailes kept returning to highly personal comments by Olbermann, whom he referred to with an expletive, and the impasse remained. The sources declined to be identified furnishing details of private conversations.

In last summer's conversation between Ailes and Zucker -- the two men have known each other since Zucker tapped him as a commentator for the "Today" show in the early 1990s -- the onetime Republican consultant asked whether NBC still cared about the truth. Olbermann had inaccurately called Ailes "the lead political consultant for Rudy Giuliani's presidential campaign." Ailes worked for Giuliani's New York mayoral campaign in 1989, but no evidence has surfaced that he played a role in the presidential bid.

Zucker did nothing as a result of the call. "I have never asked Keith Olbermann to tone anything down," he said in a brief interview.

Olbermann said in an interview that his sources say Ailes was offering the campaign advice, which he did not explain or detail in his commentary. It would be a major breach of journalistic ethics for the head of a news channel to advise a politician, especially one his reporters are covering.

Fox's Lewis laughed off the charge, saying: "If he was offering Rudy advice, you think Rudy would have done as badly as he did? No way Roger was giving him advice."

Murdoch's call to Zucker, which was polite in tone, involved a request that Olbermann not air video from a Daily Kos blogger who had made a scene at O'Reilly's Long Island home. That, Murdoch said, should be off limits.

Activist Mike Stark had confronted O'Reilly when he was retrieving his newspaper, planted derogatory signs on his street and distributed derogatory material to neighbors. Olbermann says the only time he ever talked to Stark was to interview him about a stunt in which he called O'Reilly's radio show and mentioned Olbermann's name.

Olbermann says that NBC Senior Vice President Phil Griffin called to ask him to exercise restraint but that he had already decided to criticize Stark for going to O'Reilly's home. He told viewers, "with great regret," that Stark's behavior was "not acceptable."

He and NBC are fair game for O'Reilly, Olbermann says, but "when you start accusing a corporation of murdering Americans, with the thinnest and most ridiculous arguments behind it," it is unfair to GE employees.

While O'Reilly is cheered by conservatives and Olbermann is a hero on the left, their dispute is more personal than ideological. Fox staffers say they don't share O'Reilly's obsession with Olbermann, noting that the "O'Reilly Factor" audience of 2.5 million viewers is 2 1/2 times the size of Olbermann's. "Countdown," however, has become increasingly competitive among younger viewers.

O'Reilly initially retaliated in 2006 with a petition on his Web site that urged MSNBC to fire Olbermann. But he does not mention Olbermann's name on the air. Instead, he routinely assails NBC -- sometimes naming Zucker and Capus -- as an organization that "spews out far-left propaganda," is "the most aggressive anti-Bush network" and is "in the tank" for Barack Obama.

Immelt had GE put out an internal memo last month, saying "a Fox News personality" has been "misleading viewers about our company." GE may continue selling equipment to Iranian hospitals under a humanitarian program licensed by the U.S. government.
http://www.washingtonpost.com/wp-dyn...051802313.html





CN8 Fires Barry Nolan Over Bill O’Reilly Protest
Jessica Heslam

CN8 has fired veteran TV journalist Barry Nolan for publicly protesting the decision by the local Emmy Awards to honor Fox News blowhard Bill O’Reilly.

Nolan tells MediaBiz he was fired Tuesday following a two-week, unpaid suspension.

“I knew going in that there was serious risk that I’d lose my job,” Nolan said yesterday, “but nobody likes it when people tell them to stifle, not even Edith Bunker.”

A CN8 spokeswoman issued this statement: “Effective May 20, Barry Nolan is no longer employed by CN8, The Comcast Network. Backstage will continue to air weeknights at 8:00 p.m. with host, Sara Edwards, and its talented team of reporters and contributors.”

Before the May 10 awards, Nolan sent e-mails to industry colleagues encouraging them to write to the Emmy governors - if they shared his opinion - and let them know “this is an appalling choice for an honor.”

“He’s delusional,” Nolan said of O’Reilly, a former Boston TV anchor. “He’s a man that mangles the facts.”

At the awards, Nolan said he quietly put fliers on tables that “simply had” quotes from O’Reilly as well as three pages from the sexual harassment lawsuit O’Reilly settled that was brought by his former producer.

Security approached Nolan and told him he couldn’t distribute information at the event.

Nolan says he has no regrets about speaking out against giving O’Reilly “the highest honor” that the local Emmy Awards can bestow. Past winners include Mike Wallace and Natalie Jacobson.

“When they announced O’Reilly people booed,” Nolan said, “and it wasn’t me. I was quiet.”

Nolan says he just got his five-year watch at CN8. As for his future, he plans to get his lawn in good shape and spend time with his wife.
http://www.bostonherald.com/business...Reilly_protest





Why Old Media is Running Scared of Google
Charles Cooper

Talk about missing the forest for the trees. With everyone and their mother-in-law predicting a coming wave of acquisitions of so-called new media companies by old media outfits, that future's already snuck up on us.

In the last year:

• Cox bought Adify
• Hi-Media Group bought Fotolog
• Time Warner's AOL bought Bebo, Quigo, Third Screen Media
• Comcast bought Plaxo
• Disney bought Club Penguin
• CBS bought Last.fm, CNET Networks, Wallstrip, Dotspotter
• Microsoft bought 1.6 percent of Facebook
• Hearst bought Kaboodle and Answerology
• Jupiter Media bought MediaBistro
• News Corp. bought Photobucket, Beliefnet
• The New Times bought Freakonomics blog
• Forbes bought Clipmarks
• Discovery bought Treehugger

If you use News Corp.'s 2005 acquisition of MySpace.com as the starting point, the list gets longer. Going back that far, there's been more than $19 billion worth of significant mergers between the biggest old and new media players in the online media industry.

After Microsoft launched its late January takeover bid for Yahoo, a lot of new media start-ups hoped it would trigger a chain reaction where they'd be able to cash out. It's easy to understand their anxiety. A recent report from PubMatic concluded that:

• On average, Web site monetization dropped by 23 percent from 49 cents in March to 38 cents in April.

• Among the verticals, social networking led the plunge with monetization dropping 47 percent, from 37 cents in March to 19 cents in April, below January lows of 22 cents. Entertainment monetization dropped 17 percent from 40 cents in March to 33 cents in April. Gaming and sports were down marginally (4 percent and 5 percent, respectively). Technology remained relatively flat at 83 cents in April vs. 82 cents in March, but is still off January highs of 92 cents.

Maybe a bunch will still cash out before the window slams shut but the more interesting question is why more media giants haven't built their online empires organically? The snarky explanation is that they're too hidebound and slowed by bureaucracy to think creatively about this stuff. But that's too easy and misses the bigger point.

I think Piper Jaffrey's Gene Munster offers a better answer when he wrote in a recent report that Google "has forced old media companies to realize they must act immediately or lose relevance in the Internet space." He may be right about that. These companies typically came late to the party when they recognized that lots of their customers (and advertisers) were heading to the Internet. And thanks to the Yahoo novella, we've seen how even a company like Microsoft, which doesn't fit under the "old media" label, finds itself scrambling to find answers to the Google question.

I just don't know whether the land grab strategy will be enough to restrain Google's growing appetite. Maybe it is, but I wouldn't want to take that bet.
http://www.news.com/8301-10787_3-994...l?tag=nefd.top





After Forays With ABC and HBO, a Video Blogger Returns to Video Blogging
Brian Stelter

“It’s weird,” Amanda Congdon says, looking off-camera, eyeing her own image reflected on the computer screen in her Los Angeles apartment. “It’s just weird when you come back.”

Ms. Congdon, 26, became the closest thing to an Internet sensation by hosting “Rocketboom,” one of the first Web video series to become a breakout hit. But since she departed the show in 2006, her attempts to go mainstream have largely fallen flat.

She signed a development deal with HBO, but nothing came of it. She joined ABC News to produce eccentric newscasts, but she clashed with the culture there and exited quietly last fall. And she established a production company but remained largely offline for months.

Now Ms. Congdon, feeling a little burned by big media, is back blogging and hosting and producing. Working with the independent production studio Media Rights Capital, she is reintroducing herself on “Sometimes Daily,” an irregular look at life through Ms. Congdon’s eyes.

Ms. Congdon and her creative partner Mario Librandi aren’t entirely sure what to call it. “It’s an interactive variety show that is embedded into my life,” Ms. Congdon said in an interview.

Returning to the form “just takes some adjustment,” she said in a new video. “I missed it.”

The segments will be centered on a weekly theme. (Last week’s was “outsider.” An upcoming one will be “tattoos.”) Ms. Congdon and Media Rights hope to build a fan base and advertiser interest around the videos.

“She was really one of the first, if not the very first, Internet blog stars,” said Dan Goodman, the president of digital media for Media Rights Capital. “She has been entertaining people in the digital space since there were people to entertain there.”

For many Web users, Ms. Congdon introduced the concept of the video blog, or “vlog,” in her nearly two years on “Rocketboom.” The irreverent daily shows, initially taped in front of a world map in a Manhattan apartment, were promoted as having at least 200,000 viewers each day, though there was no independent confirmation of that. Mentions on “CSI,” in BusinessWeek and in other mainstream media outlets fueled the site’s growth.

By mid-2006, though, Ms. Congdon and her business partner, Andrew Michael Baron, were feuding over creative and financial direction, each of them said at the time. (Ms. Congdon owned 49 percent of the company, and Mr. Baron owned 51 percent.) When she left “Rocketboom,” the show continued with a new host.

Ms. Congdon set out on a seven-week road trip, documented in “Amanda Across America” videos, of course. She wanted to stay in the online video medium, but she also wanted to experiment with big media.

ABC News felt right at first, she said; looking back, she calls it “the most innovative network news site at the time.” But she found producers at ABC to be unresponsive to her ideas, calling it a “slow and messy process.” It didn’t help that online reporters discovered her freelance commercial work for the chemical company DuPont, raising conflict-of-interest questions that ABC skirted by calling her an independent contractor. (Last fall, when Ms. Congdon left, ABC characterized her tenure as “a great experiment for both of us.”)

Around the time she started at ABC, owned by the Walt Disney Company, she started a development deal with Time Warner’s HBO that expired in November. “I still have yet to climb that mountain,” she said. “Hopefully I’ll get there someday.”

As the two media deals ended, conversations picked up with Media Rights Capital. Ms. Congdon and Mr. Librandi have complete creative control over their work, while the studio runs the business side, they said. “Sometimes Daily” may resemble “Rocketboom” in some ways, but it is intended to be more interactive.

“I wrote both shows, so there’s going to be similarity in the tone,” Ms. Congdon said. “But there’s not going to be a lot of Amanda at a desk in this series.”

Indeed, in one of the first segments of “Sometimes Daily,” Ms. Congdon is seen reading the news in front of an upside-down map, only to discover she was having a nightmare. Dream sequences, person-on-the-street interviews, sketch comedy and live Webcasts will all show the theme of the week intersecting with Ms. Congdon’s life.

With the new site, Ms. Congdon will find out whether she can reconnect to her “Rocketboom” fans and whether she can reinvent the vlog form as she pioneered it four years ago.

“When ‘Rocketboom’ came out, the 2.0 technologies on the Web were nowhere near where they are today,” Mr. Librandi said. “I think that alone is going to spawn a whole new era of online shows.”
http://www.nytimes.com/2008/05/19/bu...19congdon.html





A Sober Warning About Indiana Jones' Fedora
Lore Sjöberg

I'm jazzed to see Indiana Jones and the Kingdom of the Crystal Skull, but my anticipation is dimmed somewhat by the inevitable ensuing upturn in fedora sales. When I go to San Diego Comic-Con this July, I fully expect to see fedoras popping up like mushrooms on the damp lawn of fandom.

It's not the cosplayers that I'm concerned with -- at least they're aware they're playing dress up. It's the folks who say, "Wow, that hat looks so good on Indy, I'm sure it will look just as good with my pre-faded ColecoVision T-shirt."

I hear the Motion Picture Association of America is now rating movies higher on the adultitude scale if they feature smoking, on the grounds that onscreen cigarette puffing influences people to take up the habit themselves. While I think movie fedoras have the same effect, I'm not calling for anything that drastic. I think a disclaimer in 5-foot-tall letters at the beginning of the movie would be fine.

Something like:

"WARNING: Indiana Jones is a fictional character. His movies are all set decades ago. He is more physically attractive than 98 percent of humanity. These are all reasons you should not attempt to dress like him."

See how much that would benefit humanity (except for the hat-selling portion of humanity)?

That's not the only sartorial tragedy that could be prevented by a stern warning at the beginning of a Hollywood blockbuster. For instance:

"WARNING: This movie is set in a magical land with soaring dragons, powerful, reality-warping wizards and people who can wear hooded cloaks without looking like complete dorks. None of these things exist in real life."

"WARNING: In this movie, black, ankle-length dusters make the main characters look mysterious. If you wear one to the local 7-Eleven, the only mystery will be whether you think you know karate but don't, or whether you think you know kung fu but don't."

"WARNING: The extremely cool facial hair styles the bad guys have in this movie, if worn by someone with a body mass index over 30, will make that person look like a '40s-era hotel clerk."

Come to think of it, fashion choices aren't the only problem. Lots of movies are fine in the theater, but have an unfortunate tendency to leak all over the real world. My solution: more warnings.

"WARNING: A character in this comedy talks about sex a lot in a funny accent. This guarantees that most of the people who see it will immediately start quoting it in a poor imitation of the accent. This will become incredibly tiresome before you even get to the car."

"WARNING: This movie contains punch lines. If you repeat these punch lines to people who have already seen the movie, they may laugh. Do not take this as a sign that you, yourself, are funny. This will only lead to disappointment and, in extreme cases, dismemberment."

"WARNING: This movie takes place in space. This means that it will be unrealistic in about 500 different ways. While we encourage you to debate this in online forums, because such chatter translates into merchandise sales via some mechanism we don't fully understand, we are obliged to caution you that most people you encounter will tune you out for the rest of your life once you use the phrase inertial compensators."

"WARNING: Yes, we know many of you want to have sex with one or more actresses in this movie. That's why we put them in the film. Declaring that you would be willing to sleep with them establishes nothing but your sexual orientation, and declaring that you would not be willing to sleep with them establishes nothing but your capacity for self-delusion."

"WARNING: The key lines from this movie will soon be attached to pictures of adorable kitties. You will find this inexplicably funny, and this fact will make you hate yourself."
http://www.wired.com/culture/lifesty.../alttext_0521a

















Until next week,

- js.



















Current Week In Review





Recent WiRs -

May 17th, May 10th, May 3rd, April 26th, April 19th, April 12th

Jack Spratts' Week In Review is published every Friday. Submit letters, articles, press releases, comments, questions etc. in plain text English to jackspratts (at) lycos (dot) com. Submission deadlines are Thursdays @ 1400 UTC. Please include contact info. The right to publish all remarks is reserved.


"The First Amendment rests on the assumption that the widest possible dissemination of information from diverse and antagonistic sources is essential to the welfare of the public."
- Hugo Black
JackSpratts is offline   Reply With Quote
Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Peer-To-Peer News - The Week In Review - September 22nd, '07 JackSpratts Peer to Peer 3 22-09-07 06:41 PM
Peer-To-Peer News - The Week In Review - May 19th, '07 JackSpratts Peer to Peer 1 16-05-07 09:58 AM
Peer-To-Peer News - The Week In Review - December 9th, '06 JackSpratts Peer to Peer 5 09-12-06 03:01 PM
Peer-To-Peer News - The Week In Review - September 16th, '06 JackSpratts Peer to Peer 2 14-09-06 09:25 PM
Peer-To-Peer News - The Week In Review - July 22nd, '06 JackSpratts Peer to Peer 1 20-07-06 03:03 PM






All times are GMT -6. The time now is 02:44 PM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
© www.p2p-zone.com - Napsterites - 2000 - 2024 (Contact grm1@iinet.net.au for all admin enquiries)